Unnamed: 0.1
int64 0
113k
| Unnamed: 0
float64 0
113k
⌀ | title
stringlengths 7
246
| abstract
stringlengths 6
3.31k
|
---|---|---|---|
108,900 | 108,900 |
Towards Lossless ANN-SNN Conversion under Ultra-Low Latency with
Dual-Phase Optimization
|
Spiking neural network (SNN) operating with asynchronous discrete events
shows higher energy efficiency. A popular approach to implement deep SNNs is
ANN-SNN conversion combining both efficient training in ANNs and efficient
inference in SNNs. However, the previous works mostly required thousands of
time steps to achieve lossless conversion. In this paper, we first identify the
underlying cause, i.e., misrepresentation of the negative or overflow residual
membrane potential in SNNs. Furthermore, we systematically analyze the
conversion error between SNNs and ANNs, and then decompose it into three folds:
quantization error, clipping error, and residual membrane potential
representation error. With such insights, we propose a dual-phase conversion
algorithm to minimize those errors. As a result, our model achieves SOTA in
both accuracy and accuracy-delay tradeoff with deep architectures (ResNet and
VGG net). Specifically, we report SOTA accuracy within 16$\times$ speedup
compared with the latest results. Meanwhile, lossless conversion is performed
with at least 2$\times$ faster reasoning performance.
|
108,901 | 108,901 |
Ergodic variational flows
|
This work presents a new class of variational family -- ergodic variational
flows -- that not only enables tractable i.i.d. sampling and density
evaluation, but also comes with MCMC-like convergence guarantees. Ergodic
variational flows consist of a mixture of repeated applications of a
measure-preserving and ergodic map to an initial reference distribution. We
provide mild conditions under which the variational distribution converges
weakly and in total variation to the target as the number of steps in the flow
increases; this convergence holds regardless of the value of variational
parameters, although different parameter values may result in faster or slower
convergence. Further, we develop a particular instantiation of the general
family using Hamiltonian dynamics combined with deterministic momentum
refreshment. Simulated and real data experiments provide an empirical
verification of the convergence theory and demonstrate that samples produced by
the method are of comparable quality to a state-of-the-art MCMC method.
|
108,902 | 108,902 |
Manifold Characteristics That Predict Downstream Task Performance
|
Pretraining methods are typically compared by evaluating the accuracy of
linear classifiers, transfer learning performance, or visually inspecting the
representation manifold's (RM) lower-dimensional projections. We show that the
differences between methods can be understood more clearly by investigating the
RM directly, which allows for a more detailed comparison. To this end, we
propose a framework and new metric to measure and compare different RMs. We
also investigate and report on the RM characteristics for various pretraining
methods. These characteristics are measured by applying sequentially larger
local alterations to the input data, using white noise injections and Projected
Gradient Descent (PGD) adversarial attacks, and then tracking each datapoint.
We calculate the total distance moved for each datapoint and the relative
change in distance between successive alterations. We show that self-supervised
methods learn an RM where alterations lead to large but constant size changes,
indicating a smoother RM than fully supervised methods. We then combine these
measurements into one metric, the Representation Manifold Quality Metric
(RMQM), where larger values indicate larger and less variable step sizes, and
show that RMQM correlates positively with performance on downstream tasks.
|
108,903 | 108,903 |
Learning-Based sensitivity analysis and feedback design for drug
delivery of mixed therapy of cancer in the presence of high model
uncertainties
|
In this paper, a methodology is proposed that enables to analyze the
sensitivity of the outcome of a therapy to unavoidable high dispersion of the
patient specific parameters on one hand and to the choice of the parameters
that define the drug delivery feedback strategy on the other hand. More
precisely, a method is given that enables to extract and rank the most influent
parameters that determine the probability of success/failure of a given
feedback therapy for a given set of initial conditions over a cloud of
realizations of uncertainties. Moreover predictors of the expectations of the
amounts of drugs being used can also be derived. This enables to design an
efficient stochastic optimization framework that guarantees safe contraction of
the tumor while minimizing a weighted sum of the quantities of the different
drugs being used. The framework is illustrated and validated using the example
of a mixed therapy of cancer involving three combined drugs namely: a
chemotherapy drug, an immunology vaccine and an immunotherapy drug. Finally, in
this specific case, it is shown that dash-boards can be built in the 2D-space
of the most influent state components that summarize the outcomes'
probabilities and the associated drug usage as iso-values curves in the reduced
state space.
|
108,904 | 108,904 |
Robust Testing in High-Dimensional Sparse Models
|
We consider the problem of robustly testing the norm of a high-dimensional
sparse signal vector under two different observation models. In the first
model, we are given $n$ i.i.d. samples from the distribution
$\mathcal{N}\left(\theta,I_d\right)$ (with unknown $\theta$), of which a small
fraction has been arbitrarily corrupted. Under the promise that
$\|\theta\|_0\le s$, we want to correctly distinguish whether $\|\theta\|_2=0$
or $\|\theta\|_2>\gamma$, for some input parameter $\gamma>0$. We show that any
algorithm for this task requires $n=\Omega\left(s\log\frac{ed}{s}\right)$
samples, which is tight up to logarithmic factors. We also extend our results
to other common notions of sparsity, namely, $\|\theta\|_q\le s$ for any $0 < q
< 2$. In the second observation model that we consider, the data is generated
according to a sparse linear regression model, where the covariates are i.i.d.
Gaussian and the regression coefficient (signal) is known to be $s$-sparse.
Here too we assume that an $\epsilon$-fraction of the data is arbitrarily
corrupted. We show that any algorithm that reliably tests the norm of the
regression coefficient requires at least $n=\Omega\left(\min(s\log
d,{1}/{\gamma^4})\right)$ samples. Our results show that the complexity of
testing in these two settings significantly increases under robustness
constraints. This is in line with the recent observations made in robust mean
testing and robust covariance testing.
|
108,905 | 108,905 |
Multi-scale Attention Flow for Probabilistic Time Series Forecasting
|
The probability prediction of multivariate time series is a notoriously
challenging but practical task. On the one hand, the challenge is how to
effectively capture the cross-series correlations between interacting time
series, to achieve accurate distribution modeling. On the other hand, we should
consider how to capture the contextual information within time series more
accurately to model multivariate temporal dynamics of time series. In this
work, we proposed a novel non-autoregressive deep learning model, called
Multi-scale Attention Normalizing Flow(MANF), where we integrate multi-scale
attention and relative position information and the multivariate data
distribution is represented by the conditioned normalizing flow. Additionally,
compared with autoregressive modeling methods, our model avoids the influence
of cumulative error and does not increase the time complexity. Extensive
experiments demonstrate that our model achieves state-of-the-art performance on
many popular multivariate datasets.
|
108,906 | 108,906 |
KGRGRL: A User's Permission Reasoning Method Based on Knowledge Graph
Reward Guidance Reinforcement Learning
|
In general, multiple domain cyberspace security assessments can be
implemented by reasoning user's permissions. However, while existing methods
include some information from the physical and social domains, they do not
provide a comprehensive representation of cyberspace. Existing reasoning
methods are also based on expert-given rules, resulting in inefficiency and a
low degree of intelligence. To address this challenge, we create a Knowledge
Graph (KG) of multiple domain cyberspace in order to provide a standard
semantic description of the multiple domain cyberspace. Following that, we
proposed a user's permissions reasoning method based on reinforcement learning.
All permissions in cyberspace are represented as nodes, and an agent is trained
to find all permissions that user can have according to user's initial
permissions and cyberspace KG. We set 10 reward setting rules based on the
features of cyberspace KG in the reinforcement learning of reward information
setting, so that the agent can better locate user's all permissions and avoid
blindly finding user's permissions. The results of the experiments showed that
the proposed method can successfully reason about user's permissions and
increase the intelligence level of the user's permissions reasoning method. At
the same time, the F1 value of the proposed method is 6% greater than that of
the Translating Embedding (TransE) method.
|
108,907 | 108,907 |
The use of deep learning in interventional radiotherapy (brachytherapy):
a review with a focus on open source and open data
|
Deep learning advanced to one of the most important technologies in almost
all medical fields. Especially in areas, related to medical imaging it plays a
big role. However, in interventional radiotherapy (brachytherapy) deep learning
is still in an early phase. In this review, first, we investigated and
scrutinised the role of deep learning in all processes of interventional
radiotherapy and directly related fields. Additionally we summarised the most
recent developments. To reproduce results of deep learning algorithms both
source code and training data must be available. Therefore, a second focus of
this work was on the analysis of the availability of open source, open data and
open models. In our analysis, we were able to show that deep learning plays
already a major role in some areas of interventional radiotherapy, but is still
hardly presented in others. Nevertheless, its impact is increasing with the
years, partly self-propelled but also influenced by closely related fields.
Open source, data and models are growing in number but are still scarce and
unevenly distributed among different research groups. The reluctance in
publishing code, data and models limits reproducibility and restricts
evaluation to mono-institutional datasets. Summarised, deep learning will
change positively the workflow of interventional radiotherapy but there is room
for improvement when it comes to reproducible results and standardised
evaluation methods.
|
108,908 | 108,908 |
A scalable deep learning approach for solving high-dimensional dynamic
optimal transport
|
The dynamic formulation of optimal transport has attracted growing interests
in scientific computing and machine learning, and its computation requires to
solve a PDE-constrained optimization problem. The classical Eulerian
discretization based approaches suffer from the curse of dimensionality, which
arises from the approximation of high-dimensional velocity field. In this work,
we propose a deep learning based method to solve the dynamic optimal transport
in high dimensional space. Our method contains three main ingredients: a
carefully designed representation of the velocity field, the discretization of
the PDE constraint along the characteristics, and the computation of high
dimensional integral by Monte Carlo method in each time step. Specifically, in
the representation of the velocity field, we apply the classical nodal basis
function in time and the deep neural networks in space domain with the H1-norm
regularization. This technique promotes the regularity of the velocity field in
both time and space such that the discretization along the characteristic
remains to be stable during the training process. Extensive numerical examples
have been conducted to test the proposed method. Compared to other solvers of
optimal transport, our method could give more accurate results in high
dimensional cases and has very good scalability with respect to dimension.
Finally, we extend our method to more complicated cases such as crowd motion
problem.
|
108,909 | 108,909 |
A model aggregation approach for high-dimensional large-scale
optimization
|
Bayesian optimization (BO) has been widely used in machine learning and
simulation optimization. With the increase in computational resources and
storage capacities in these fields, high-dimensional and large-scale problems
are becoming increasingly common. In this study, we propose a model aggregation
method in the Bayesian optimization (MamBO) algorithm for efficiently solving
high-dimensional large-scale optimization problems. MamBO uses a combination of
subsampling and subspace embeddings to collectively address high dimensionality
and large-scale issues; in addition, a model aggregation method is employed to
address the surrogate model uncertainty issue that arises when embedding is
applied. This surrogate model uncertainty issue is largely ignored in the
embedding literature and practice, and it is exacerbated when the problem is
high-dimensional and data are limited. Our proposed model aggregation method
reduces these lower-dimensional surrogate model risks and improves the
robustness of the BO algorithm. We derive an asymptotic bound for the proposed
aggregated surrogate model and prove the convergence of MamBO. Benchmark
numerical experiments indicate that our algorithm achieves superior or
comparable performance to other commonly used high-dimensional BO algorithms.
Moreover, we apply MamBO to a cascade classifier of a machine learning
algorithm for face detection, and the results reveal that MamBO finds settings
that achieve higher classification accuracy than the benchmark settings and is
computationally faster than other high-dimensional BO algorithms.
|
108,910 | 108,910 |
Wasserstein t-SNE
|
Scientific datasets often have hierarchical structure: for example, in
surveys, individual participants (samples) might be grouped at a higher level
(units) such as their geographical region. In these settings, the interest is
often in exploring the structure on the unit level rather than on the sample
level. Units can be compared based on the distance between their means, however
this ignores the within-unit distribution of samples. Here we develop an
approach for exploratory analysis of hierarchical datasets using the
Wasserstein distance metric that takes into account the shapes of within-unit
distributions. We use t-SNE to construct 2D embeddings of the units, based on
the matrix of pairwise Wasserstein distances between them. The distance matrix
can be efficiently computed by approximating each unit with a Gaussian
distribution, but we also provide a scalable method to compute exact
Wasserstein distances. We use synthetic data to demonstrate the effectiveness
of our Wasserstein t-SNE, and apply it to data from the 2017 German
parliamentary election, considering polling stations as samples and voting
districts as units. The resulting embedding uncovers meaningful structure in
the data.
|
108,911 | 108,911 |
Reachability Constrained Reinforcement Learning
|
Constrained reinforcement learning (CRL) has gained significant interest
recently, since safety constraints satisfaction is critical for real-world
problems. However, existing CRL methods constraining discounted cumulative
costs generally lack rigorous definition and guarantee of safety. In contrast,
in the safe control research, safety is defined as persistently satisfying
certain state constraints. Such persistent safety is possible only on a subset
of the state space, called feasible set, where an optimal largest feasible set
exists for a given environment. Recent studies incorporate feasible sets into
CRL with energy-based methods such as control barrier function (CBF), safety
index (SI), and leverage prior conservative estimations of feasible sets, which
harms the performance of the learned policy. To deal with this problem, this
paper proposes the reachability CRL (RCRL) method by using reachability
analysis to establish the novel self-consistency condition and characterize the
feasible sets. The feasible sets are represented by the safety value function,
which is used as the constraint in CRL. We use the multi-time scale stochastic
approximation theory to prove that the proposed algorithm converges to a local
optimum, where the largest feasible set can be guaranteed. Empirical results on
different benchmarks validate the learned feasible set, the policy performance,
and constraint satisfaction of RCRL, compared to CRL and safe control
baselines.
|
108,912 | 108,912 |
SQ-VAE: Variational Bayes on Discrete Representation with Self-annealed
Stochastic Quantization
|
One noted issue of vector-quantized variational autoencoder (VQ-VAE) is that
the learned discrete representation uses only a fraction of the full capacity
of the codebook, also known as codebook collapse. We hypothesize that the
training scheme of VQ-VAE, which involves some carefully designed heuristics,
underlies this issue. In this paper, we propose a new training scheme that
extends the standard VAE via novel stochastic dequantization and quantization,
called stochastically quantized variational autoencoder (SQ-VAE). In SQ-VAE, we
observe a trend that the quantization is stochastic at the initial stage of the
training but gradually converges toward a deterministic quantization, which we
call self-annealing. Our experiments show that SQ-VAE improves codebook
utilization without using common heuristics. Furthermore, we empirically show
that SQ-VAE is superior to VAE and VQ-VAE in vision- and speech-related tasks.
|
108,913 | 108,913 |
Towards on-sky adaptive optics control using reinforcement learning
|
The direct imaging of potentially habitable Exoplanets is one prime science
case for the next generation of high contrast imaging instruments on
ground-based extremely large telescopes. To reach this demanding science goal,
the instruments are equipped with eXtreme Adaptive Optics (XAO) systems which
will control thousands of actuators at a framerate of kilohertz to several
kilohertz. Most of the habitable exoplanets are located at small angular
separations from their host stars, where the current XAO systems' control laws
leave strong residuals.Current AO control strategies like static matrix-based
wavefront reconstruction and integrator control suffer from temporal delay
error and are sensitive to mis-registration, i.e., to dynamic variations of the
control system geometry. We aim to produce control methods that cope with these
limitations, provide a significantly improved AO correction and, therefore,
reduce the residual flux in the coronagraphic point spread function.
We extend previous work in Reinforcement Learning for AO. The improved
method, called PO4AO, learns a dynamics model and optimizes a control neural
network, called a policy. We introduce the method and study it through
numerical simulations of XAO with Pyramid wavefront sensing for the 8-m and
40-m telescope aperture cases. We further implemented PO4AO and carried out
experiments in a laboratory environment using MagAO-X at the Steward
laboratory. PO4AO provides the desired performance by improving the
coronagraphic contrast in numerical simulations by factors 3-5 within the
control region of DM and Pyramid WFS, in simulation and in the laboratory. The
presented method is also quick to train, i.e., on timescales of typically 5-10
seconds, and the inference time is sufficiently small (< ms) to be used in
real-time control for XAO with currently available hardware even for extremely
large telescopes.
|
108,914 | 108,914 |
Autonomous Open-Ended Learning of Tasks with Non-Stationary
Interdependencies
|
Autonomous open-ended learning is a relevant approach in machine learning and
robotics, allowing the design of artificial agents able to acquire goals and
motor skills without the necessity of user assigned tasks. A crucial issue for
this approach is to develop strategies to ensure that agents can maximise their
competence on as many tasks as possible in the shortest possible time.
Intrinsic motivations have proven to generate a task-agnostic signal to
properly allocate the training time amongst goals. While the majority of works
in the field of intrinsically motivated open-ended learning focus on scenarios
where goals are independent from each other, only few of them studied the
autonomous acquisition of interdependent tasks, and even fewer tackled
scenarios where goals involve non-stationary interdependencies. Building on
previous works, we tackle these crucial issues at the level of decision making
(i.e., building strategies to properly select between goals), and we propose a
hierarchical architecture that treating sub-tasks selection as a Markov
Decision Process is able to properly learn interdependent skills on the basis
of intrinsically generated motivations. In particular, we first deepen the
analysis of a previous system, showing the importance of incorporating
information about the relationships between tasks at a higher level of the
architecture (that of goal selection). Then we introduce H-GRAIL, a new system
that extends the previous one by adding a new learning layer to store the
autonomously acquired sequences of tasks to be able to modify them in case the
interdependencies are non-stationary. All systems are tested in a real robotic
scenario, with a Baxter robot performing multiple interdependent reaching
tasks.
|
108,915 | 108,915 |
Weakly-supervised Biomechanically-constrained CT/MRI Registration of the
Spine
|
CT and MRI are two of the most informative modalities in spinal diagnostics
and treatment planning. CT is useful when analysing bony structures, while MRI
gives information about the soft tissue. Thus, fusing the information of both
modalities can be very beneficial. Registration is the first step for this
fusion. While the soft tissues around the vertebra are deformable, each
vertebral body is constrained to move rigidly. We propose a weakly-supervised
deep learning framework that preserves the rigidity and the volume of each
vertebra while maximizing the accuracy of the registration. To achieve this
goal, we introduce anatomy-aware losses for training the network. We
specifically design these losses to depend only on the CT label maps since
automatic vertebra segmentation in CT gives more accurate results contrary to
MRI. We evaluate our method on an in-house dataset of 167 patients. Our results
show that adding the anatomy-aware losses increases the plausibility of the
inferred transformation while keeping the accuracy untouched.
|
108,916 | 108,916 |
Chemical transformer compression for accelerating both training and
inference of molecular modeling
|
Transformer models have been developed in molecular science with excellent
performance in applications including quantitative structure-activity
relationship (QSAR) and virtual screening (VS). Compared with other types of
models, however, they are large, which results in a high hardware requirement
to abridge time for both training and inference processes. In this work,
cross-layer parameter sharing (CLPS), and knowledge distillation (KD) are used
to reduce the sizes of transformers in molecular science. Both methods not only
have competitive QSAR predictive performance as compared to the original BERT
model, but also are more parameter efficient. Furthermore, by integrating CLPS
and KD into a two-state chemical network, we introduce a new deep lite chemical
transformer model, DeLiCaTe. DeLiCaTe captures general-domains as well as
task-specific knowledge, which lead to a 4x faster rate of both training and
inference due to a 10- and 3-times reduction of the number of parameters and
layers, respectively. Meanwhile, it achieves comparable performance in QSAR and
VS modeling. Moreover, we anticipate that the model compression strategy
provides a pathway to the creation of effective generative transformer models
for organic drug and material design.
|
108,917 | 108,917 |
Fundamental Laws of Binary Classification
|
Finding discriminant functions of minimum risk binary classification systems
is a novel geometric locus problem -- that requires solving a system of
fundamental locus equations of binary classification -- subject to deep-seated
statistical laws. We show that a discriminant function of a minimum risk binary
classification system is the solution of a locus equation that represents the
geometric locus of the decision boundary of the system, wherein the
discriminant function is connected to the decision boundary by an intrinsic
eigen-coordinate system in such a manner that the discriminant function is
represented by a geometric locus of a novel principal eigenaxis -- formed by a
dual locus of likelihood components and principal eigenaxis components. We
demonstrate that a minimum risk binary classification system acts to jointly
minimize its eigenenergy and risk by locating a point of equilibrium wherein
critical minimum eigenenergies exhibited by the system are symmetrically
concentrated in such a manner that the geometric locus of the novel principal
eigenaxis of the system exhibits symmetrical dimensions and densities, such
that counteracting and opposing forces and influences of the system are
symmetrically balanced with each other -- about the geometric center of the
locus of the novel principal eigenaxis -- whereon the statistical fulcrum of
the system is located. Thereby, a minimum risk binary classification system
satisfies a state of statistical equilibrium wherein the total allowed
eigenenergy and the expected risk exhibited by the system are jointly minimized
within the decision space of the system, so that the system exhibits the
minimum probability of classification error.
|
108,918 | 108,918 |
Qualitative Differences Between Evolutionary Strategies and
Reinforcement Learning Methods for Control of Autonomous Agents
|
In this paper we analyze the qualitative differences between evolutionary
strategies and reinforcement learning algorithms by focusing on two popular
state-of-the-art algorithms: the OpenAI-ES evolutionary strategy and the
Proximal Policy Optimization (PPO) reinforcement learning algorithm -- the most
similar methods of the two families. We analyze how the methods differ with
respect to: (i) general efficacy, (ii) ability to cope with sparse rewards,
(iii) propensity/capacity to discover minimal solutions, (iv) dependency on
reward shaping, and (v) ability to cope with variations of the environmental
conditions. The analysis of the performance and of the behavioral strategies
displayed by the agents trained with the two methods on benchmark problems
enable us to demonstrate qualitative differences which were not identified in
previous studies, to identify the relative weakness of the two methods, and to
propose ways to ameliorate some of those weakness. We show that the
characteristics of the reward function has a strong impact which vary
qualitatively not only for the OpenAI-ES and the PPO but also for alternative
reinforcement learning algorithms, thus demonstrating the importance of
optimizing the characteristic of the reward function to the algorithm used.
|
108,919 | 108,919 |
Reduction of detection limit and quantification uncertainty due to
interferent by neural classification with abstention
|
Many measurements in the physical sciences can be cast as counting
experiments, where the number of occurrences of a physical phenomenon informs
the prevalence of the phenomenon's source. Often, detection of the physical
phenomenon (termed signal) is difficult to distinguish from naturally occurring
phenomena (termed background). In this case, the discrimination of signal
events from background can be performed using classifiers, and they may range
from simple, threshold-based classifiers to sophisticated neural networks.
These classifiers are often trained and validated to obtain optimal accuracy,
however we show that the optimal accuracy classifier does not generally
coincide with a classifier that provides the lowest detection limit, nor the
lowest quantification uncertainty. We present a derivation of the detection
limit and quantification uncertainty in the classifier-based counting
experiment case. We also present a novel abstention mechanism to minimize the
detection limit or quantification uncertainty \emph{a posteriori}. We
illustrate the method on two data sets from the physical sciences,
discriminating Ar-37 and Ar-39 radioactive decay from non-radioactive events in
a gas proportional counter, and discriminating neutrons from photons in an
inorganic scintillator and report results therefrom.
|
108,920 | 108,920 |
Rethinking Reinforcement Learning based Logic Synthesis
|
Recently, reinforcement learning has been used to address logic synthesis by
formulating the operator sequence optimization problem as a Markov decision
process. However, through extensive experiments, we find out that the learned
policy makes decisions independent from the circuit features (i.e., states) and
yields an operator sequence that is permutation invariant to some extent in
terms of operators. Based on these findings, we develop a new RL-based method
that can automatically recognize critical operators and generate common
operator sequences generalizable to unseen circuits. Our algorithm is verified
on both the EPFL benchmark, a private dataset and a circuit at industrial
scale. Experimental results demonstrate that it achieves a good balance among
delay, area and runtime, and is practical for industrial usage.
|
108,921 | 108,921 |
Model Agnostic Local Explanations of Reject
|
The application of machine learning based decision making systems in safety
critical areas requires reliable high certainty predictions. Reject options are
a common way of ensuring a sufficiently high certainty of predictions made by
the system. While being able to reject uncertain samples is important, it is
also of importance to be able to explain why a particular sample was rejected.
However, explaining general reject options is still an open problem. We propose
a model agnostic method for locally explaining arbitrary reject options by
means of interpretable models and counterfactual explanations.
|
108,922 | 108,922 |
Attacking and Defending Deep Reinforcement Learning Policies
|
Recent studies have shown that deep reinforcement learning (DRL) policies are
vulnerable to adversarial attacks, which raise concerns about applications of
DRL to safety-critical systems. In this work, we adopt a principled way and
study the robustness of DRL policies to adversarial attacks from the
perspective of robust optimization. Within the framework of robust
optimization, optimal adversarial attacks are given by minimizing the expected
return of the policy, and correspondingly a good defense mechanism should be
realized by improving the worst-case performance of the policy. Considering
that attackers generally have no access to the training environment, we propose
a greedy attack algorithm, which tries to minimize the expected return of the
policy without interacting with the environment, and a defense algorithm, which
performs adversarial training in a max-min form. Experiments on Atari game
environments show that our attack algorithm is more effective and leads to
worse return of the policy than existing attack algorithms, and our defense
algorithm yields policies more robust than existing defense methods to a range
of adversarial attacks (including our proposed attack algorithm).
|
108,923 | 108,923 |
Taming Continuous Posteriors for Latent Variational Dialogue Policies
|
Utilizing amortized variational inference for latent-action reinforcement
learning (RL) has been shown to be an effective approach in Task-oriented
Dialogue (ToD) systems for optimizing dialogue success. Until now, categorical
posteriors have been argued to be one of the main drivers of performance. In
this work we revisit Gaussian variational posteriors for latent-action RL and
show that they can yield even better performance than categoricals. We achieve
this by simplifying the training procedure and propose ways to regularize the
latent dialogue policy to retain good response coherence. Using continuous
latent representations our model achieves state of the art dialogue success
rate on the MultiWOZ benchmark, and also compares well to categorical latent
methods in response coherence.
|
108,924 | 108,924 |
Generalizing to Evolving Domains with Latent Structure-Aware Sequential
Autoencoder
|
Domain generalization aims to improve the generalization capability of
machine learning systems to out-of-distribution (OOD) data. Existing domain
generalization techniques embark upon stationary and discrete environments to
tackle the generalization issue caused by OOD data. However, many real-world
tasks in non-stationary environments (e.g. self-driven car system, sensor
measures) involve more complex and continuously evolving domain drift, which
raises new challenges for the problem of domain generalization. In this paper,
we formulate the aforementioned setting as the problem of evolving domain
generalization. Specifically, we propose to introduce a probabilistic framework
called Latent Structure-aware Sequential Autoencoder (LSSAE) to tackle the
problem of evolving domain generalization via exploring the underlying
continuous structure in the latent space of deep neural networks, where we aim
to identify two major factors namely covariate shift and concept shift
accounting for distribution shift in non-stationary environments. Experimental
results on both synthetic and real-world datasets show that LSSAE can lead to
superior performances based on the evolving domain generalization setting.
|
108,925 | 108,925 |
Hyperdimensional computing encoding for feature selection on the use
case of epileptic seizure detection
|
The healthcare landscape is moving from the reactive interventions focused on
symptoms treatment to a more proactive prevention, from one-size-fits-all to
personalized medicine, and from centralized to distributed paradigms. Wearable
IoT devices and novel algorithms for continuous monitoring are essential
components of this transition. Hyperdimensional (HD) computing is an emerging
ML paradigm inspired by neuroscience research with various aspects interesting
for IoT devices and biomedical applications. Here we explore the not yet
addressed topic of optimal encoding of spatio-temporal data, such as
electroencephalogram (EEG) signals, and all information it entails to the HD
vectors. Further, we demonstrate how the HD computing framework can be used to
perform feature selection by choosing an adequate encoding. To the best of our
knowledge, this is the first approach to performing feature selection using HD
computing in the literature. As a result, we believe it can support the ML
community to further foster the research in multiple directions related to
feature and channel selection, as well as model interpretability.
|
108,926 | 108,926 |
Conditional Born machine for Monte Carlo events generation
|
Generative modeling is a promising task for near-term quantum devices, which
can use the stochastic nature of quantum measurements as random source. So
called Born machines are purely quantum models and promise to generate
probability distributions in a quantum way, inaccessible to classical
computers. This paper presents an application of Born machines to Monte Carlo
simulations and extends their reach to multivariate and conditional
distributions. Models are run on (noisy) simulators and IBM Quantum
superconducting quantum hardware. More specifically, Born machines are used to
generate muonic force carriers (MFC) events resulting from scattering processes
between muons and the detector material in high-energy-physics colliders
experiments. MFCs are bosons appearing in beyond the standard model theoretical
frameworks, which are candidates for dark matter. Empirical evidences suggest
that Born machines can reproduce the underlying distribution of datasets coming
from Monte Carlo simulations, and are competitive with classical machine
learning-based generative models of similar complexity.
|
108,927 | 108,927 |
L3-Net Deep Audio Embeddings to Improve COVID-19 Detection from
Smartphone Data
|
Smartphones and wearable devices, along with Artificial Intelligence, can
represent a game-changer in the pandemic control, by implementing low-cost and
pervasive solutions to recognize the development of new diseases at their early
stages and by potentially avoiding the rise of new outbreaks. Some recent works
show promise in detecting diagnostic signals of COVID-19 from voice and coughs
by using machine learning and hand-crafted acoustic features. In this paper, we
decided to investigate the capabilities of the recently proposed deep embedding
model L3-Net to automatically extract meaningful features from raw respiratory
audio recordings in order to improve the performances of standard machine
learning classifiers in discriminating between COVID-19 positive and negative
subjects from smartphone data. We evaluated the proposed model on 3 datasets,
comparing the obtained results with those of two reference works. Results show
that the combination of L3-Net with hand-crafted features overcomes the
performance of the other works of 28.57% in terms of AUC in a set of
subject-independent experiments. This result paves the way to further
investigation on different deep audio embeddings, also for the automatic
detection of different diseases.
|
108,928 | 108,928 |
Real-time semantic segmentation on FPGAs for autonomous vehicles with
hls4ml
|
In this paper, we investigate how field programmable gate arrays can serve as
hardware accelerators for real-time semantic segmentation tasks relevant for
autonomous driving. Considering compressed versions of the ENet convolutional
neural network architecture, we demonstrate a fully-on-chip deployment with a
latency of 4.9 ms per image, using less than 30% of the available resources on
a Xilinx ZCU102 evaluation board. The latency is reduced to 3 ms per image when
increasing the batch size to ten, corresponding to the use case where the
autonomous vehicle receives inputs from multiple cameras simultaneously. We
show, through aggressive filter reduction and heterogeneous quantization-aware
training, and an optimized implementation of convolutional layers, that the
power consumption and resource utilization can be significantly reduced while
maintaining accuracy on the Cityscapes dataset.
|
108,929 | 108,929 |
From Dirichlet to Rubin: Optimistic Exploration in RL without Bonuses
|
We propose the Bayes-UCBVI algorithm for reinforcement learning in tabular,
stage-dependent, episodic Markov decision process: a natural extension of the
Bayes-UCB algorithm by Kaufmann et al. (2012) for multi-armed bandits. Our
method uses the quantile of a Q-value function posterior as upper confidence
bound on the optimal Q-value function. For Bayes-UCBVI, we prove a regret bound
of order $\widetilde{O}(\sqrt{H^3SAT})$ where $H$ is the length of one episode,
$S$ is the number of states, $A$ the number of actions, $T$ the number of
episodes, that matches the lower-bound of $\Omega(\sqrt{H^3SAT})$ up to
poly-$\log$ terms in $H,S,A,T$ for a large enough $T$. To the best of our
knowledge, this is the first algorithm that obtains an optimal dependence on
the horizon $H$ (and $S$) without the need for an involved Bernstein-like bonus
or noise. Crucial to our analysis is a new fine-grained anti-concentration
bound for a weighted Dirichlet sum that can be of independent interest. We then
explain how Bayes-UCBVI can be easily extended beyond the tabular setting,
exhibiting a strong link between our algorithm and Bayesian bootstrap (Rubin,
1981).
|
108,930 | 108,930 |
Generalizing to New Tasks via One-Shot Compositional Subgoals
|
The ability to generalize to previously unseen tasks with little to no
supervision is a key challenge in modern machine learning research. It is also
a cornerstone of a future "General AI". Any artificially intelligent agent
deployed in a real world application, must adapt on the fly to unknown
environments. Researchers often rely on reinforcement and imitation learning to
provide online adaptation to new tasks, through trial and error learning.
However, this can be challenging for complex tasks which require many timesteps
or large numbers of subtasks to complete. These "long horizon" tasks suffer
from sample inefficiency and can require extremely long training times before
the agent can learn to perform the necessary longterm planning. In this work,
we introduce CASE which attempts to address these issues by training an
Imitation Learning agent using adaptive "near future" subgoals. These subgoals
are recalculated at each step using compositional arithmetic in a learned
latent representation space. In addition to improving learning efficiency for
standard long-term tasks, this approach also makes it possible to perform
one-shot generalization to previously unseen tasks, given only a single
reference trajectory for the task in a different environment. Our experiments
show that the proposed approach consistently outperforms the previous
state-of-the-art compositional Imitation Learning approach by 30%.
|
108,931 | 108,931 |
Towards Space-to-Ground Data Availability for Agriculture Monitoring
|
The recent advances in machine learning and the availability of free and open
big Earth data (e.g., Sentinel missions), which cover large areas with high
spatial and temporal resolution, have enabled many agriculture monitoring
applications. One example is the control of subsidy allocations of the Common
Agricultural Policy (CAP). Advanced remote sensing systems have been developed
towards the large-scale evidence-based monitoring of the CAP. Nevertheless, the
spatial resolution of satellite images is not always adequate to make accurate
decisions for all fields. In this work, we introduce the notion of
space-to-ground data availability, i.e., from the satellite to the field, in an
attempt to make the best out of the complementary characteristics of the
different sources. We present a space-to-ground dataset that contains
Sentinel-1 radar and Sentinel-2 optical image time-series, as well as
street-level images from the crowdsourcing platform Mapillary, for grassland
fields in the area of Utrecht for 2017. The multifaceted utility of our dataset
is showcased through the downstream task of grassland classification. We train
machine and deep learning algorithms on these different data domains and
highlight the potential of fusion techniques towards increasing the reliability
of decisions.
|
108,932 | 108,932 |
Pest presence prediction using interpretable machine learning
|
Helicoverpa Armigera, or cotton bollworm, is a serious insect pest of cotton
crops that threatens the yield and the quality of lint. The timely knowledge of
the presence of the insects in the field is crucial for effective farm
interventions. Meteo-climatic and vegetation conditions have been identified as
key drivers of crop pest abundance. In this work, we applied an interpretable
classifier, i.e., Explainable Boosting Machine, which uses earth observation
vegetation indices, numerical weather predictions and insect trap catches to
predict the onset of bollworm harmfulness in cotton fields in Greece. The
glass-box nature of our approach provides significant insight on the main
drivers of the model and the interactions among them. Model interpretability
adds to the trustworthiness of our approach and therefore its potential for
rapid uptake and context-based implementation in operational farm management
scenarios. Our results are satisfactory and the importance of drivers, through
our analysis on global and local explainability, is in accordance with the
literature.
|
108,933 | 108,933 |
Prioritizing Corners in OoD Detectors via Symbolic String Manipulation
|
For safety assurance of deep neural networks (DNNs), out-of-distribution
(OoD) monitoring techniques are essential as they filter spurious input that is
distant from the training dataset. This paper studies the problem of
systematically testing OoD monitors to avoid cases where an input data point is
tested as in-distribution by the monitor, but the DNN produces spurious output
predictions. We consider the definition of "in-distribution" characterized in
the feature space by a union of hyperrectangles learned from the training
dataset. Thus the testing is reduced to finding corners in hyperrectangles
distant from the available training data in the feature space. Concretely, we
encode the abstract location of every data point as a finite-length binary
string, and the union of all binary strings is stored compactly using binary
decision diagrams (BDDs). We demonstrate how to use BDDs to symbolically
extract corners distant from all data points within the training set. Apart
from test case generation, we explain how to use the proposed corners to
fine-tune the DNN to ensure that it does not predict overly confidently. The
result is evaluated over examples such as number and traffic sign recognition.
|
108,934 | 108,934 |
Sharp Asymptotics of Self-training with Linear Classifier
|
Self-training (ST) is a straightforward and standard approach in
semi-supervised learning, successfully applied to many machine learning
problems. The performance of ST strongly depends on the supervised learning
method used in the refinement step and the nature of the given data; hence, a
general performance guarantee from a concise theory may become loose in a
concrete setup. However, the theoretical methods that sharply predict how the
performance of ST depends on various details for each learning scenario are
limited. This study develops a novel theoretical framework for sharply
characterizing the generalization abilities of the models trained by ST using
the non-rigorous replica method of statistical physics. We consider the ST of
the linear model that minimizes the ridge-regularized cross-entropy loss when
the data are generated from a two-component Gaussian mixture. Consequently, we
show that the generalization performance of ST in each iteration is sharply
characterized by a small finite number of variables, which satisfy a set of
deterministic self-consistent equations. By numerically solving these
self-consistent equations, we find that ST's generalization performance
approaches to the supervised learning method with a very simple regularization
schedule when the label bias is small and a moderately large number of
iterations are used.
|
108,935 | 108,935 |
On the inability of Gaussian process regression to optimally learn
compositional functions
|
We rigorously prove that deep Gaussian process priors can outperform Gaussian
process priors if the target function has a compositional structure. To this
end, we study information-theoretic lower bounds for posterior contraction
rates for Gaussian process regression in a continuous regression model. We show
that if the true function is a generalized additive function, then the
posterior based on any mean-zero Gaussian process can only recover the truth at
a rate that is strictly slower than the minimax rate by a factor that is
polynomially suboptimal in the sample size $n$.
|
108,936 | 108,936 |
Efficient Algorithms for Planning with Participation Constraints
|
We consider the problem of planning with participation constraints introduced
in [Zhang et al., 2022]. In this problem, a principal chooses actions in a
Markov decision process, resulting in separate utilities for the principal and
the agent. However, the agent can and will choose to end the process whenever
his expected onward utility becomes negative. The principal seeks to compute
and commit to a policy that maximizes her expected utility, under the
constraint that the agent should always want to continue participating. We
provide the first polynomial-time exact algorithm for this problem for
finite-horizon settings, where previously only an additive
$\varepsilon$-approximation algorithm was known. Our approach can also be
extended to the (discounted) infinite-horizon case, for which we give an
algorithm that runs in time polynomial in the size of the input and
$\log(1/\varepsilon)$, and returns a policy that is optimal up to an additive
error of $\varepsilon$.
|
108,937 | 108,937 |
JR2net: A Joint Non-Linear Representation and Recovery Network for
Compressive Spectral Imaging
|
Deep learning models are state-of-the-art in compressive spectral imaging
(CSI) recovery. These methods use a deep neural network (DNN) as an image
generator to learn non-linear mapping from compressed measurements to the
spectral image. For instance, the deep spectral prior approach uses a
convolutional autoencoder network (CAE) in the optimization algorithm to
recover the spectral image by using a non-linear representation. However, the
CAE training is detached from the recovery problem, which does not guarantee
optimal representation of the spectral images for the CSI problem. This work
proposes a joint non-linear representation and recovery network (JR2net),
linking the representation and recovery task into a single optimization
problem. JR2net consists of an optimization-inspired network following an ADMM
formulation that learns a non-linear low-dimensional representation and
simultaneously performs the spectral image recovery, trained via the end-to-end
approach. Experimental results show the superiority of the proposed method with
improvements up to 2.57 dB in PSNR and performance around 2000 times faster
than state-of-the-art methods.
|
108,938 | 108,938 |
Gradient-based Counterfactual Explanations using Tractable Probabilistic
Models
|
Counterfactual examples are an appealing class of post-hoc explanations for
machine learning models. Given input $x$ of class $y_1$, its counterfactual is
a contrastive example $x^\prime$ of another class $y_0$. Current approaches
primarily solve this task by a complex optimization: define an objective
function based on the loss of the counterfactual outcome $y_0$ with hard or
soft constraints, then optimize this function as a black-box. This "deep
learning" approach, however, is rather slow, sometimes tricky, and may result
in unrealistic counterfactual examples. In this work, we propose a novel
approach to deal with these problems using only two gradient computations based
on tractable probabilistic models. First, we compute an unconstrained
counterfactual $u$ of $x$ to induce the counterfactual outcome $y_0$. Then, we
adapt $u$ to higher density regions, resulting in $x^{\prime}$. Empirical
evidence demonstrates the dominant advantages of our approach.
|
108,939 | 108,939 |
The Primacy Bias in Deep Reinforcement Learning
|
This work identifies a common flaw of deep reinforcement learning (RL)
algorithms: a tendency to rely on early interactions and ignore useful evidence
encountered later. Because of training on progressively growing datasets, deep
RL agents incur a risk of overfitting to earlier experiences, negatively
affecting the rest of the learning process. Inspired by cognitive science, we
refer to this effect as the primacy bias. Through a series of experiments, we
dissect the algorithmic aspects of deep RL that exacerbate this bias. We then
propose a simple yet generally-applicable mechanism that tackles the primacy
bias by periodically resetting a part of the agent. We apply this mechanism to
algorithms in both discrete (Atari 100k) and continuous action (DeepMind
Control Suite) domains, consistently improving their performance.
|
108,940 | 108,940 |
CurFi: An automated tool to find the best regression analysis model
using curve fitting
|
Regression analysis is a well known quantitative research method that
primarily explores the relationship between one or more independent variables
and a dependent variable. Conducting regression analysis manually on large
datasets with multiple independent variables can be tedious. An automated
system for regression analysis will be of great help for researchers as well as
non-expert users. Thus, the objective of this research is to design and develop
an automated curve fitting system. As outcome, a curve fitting system named
"CurFi" was developed that uses linear regression models to fit a curve to a
dataset and to find out the best fit model. The system facilitates to upload a
dataset, split the dataset into training set and test set, select relevant
features and label from the dataset; and the system will return the best fit
linear regression model after training is completed. The developed tool would
be a great resource for the users having limited technical knowledge who will
also be able to find the best fit regression model for a dataset using the
developed "CurFi" system.
|
108,941 | 108,941 |
GraphHD: Efficient graph classification using hyperdimensional computing
|
Hyperdimensional Computing (HDC) developed by Kanerva is a computational
model for machine learning inspired by neuroscience. HDC exploits
characteristics of biological neural systems such as high-dimensionality,
randomness and a holographic representation of information to achieve a good
balance between accuracy, efficiency and robustness. HDC models have already
been proven to be useful in different learning applications, especially in
resource-limited settings such as the increasingly popular Internet of Things
(IoT). One class of learning tasks that is missing from the current body of
work on HDC is graph classification. Graphs are among the most important forms
of information representation, yet, to this day, HDC algorithms have not been
applied to the graph learning problem in a general sense. Moreover, graph
learning in IoT and sensor networks, with limited compute capabilities,
introduce challenges to the overall design methodology. In this paper, we
present GraphHD$-$a baseline approach for graph classification with HDC. We
evaluate GraphHD on real-world graph classification problems. Our results show
that when compared to the state-of-the-art Graph Neural Networks (GNNs) the
proposed model achieves comparable accuracy, while training and inference times
are on average 14.6$\times$ and 2.0$\times$ faster, respectively.
|
108,942 | 108,942 |
Federated Anomaly Detection over Distributed Data Streams
|
Sharing of telecommunication network data, for example, even at high
aggregation levels, is nowadays highly restricted due to privacy legislation
and regulations and other important ethical concerns. It leads to scattering
data across institutions, regions, and states, inhibiting the usage of AI
methods that could otherwise take advantage of data at scale. It creates the
need to build a platform to control such data, build models or perform
calculations. In this work, we propose an approach to building the bridge among
anomaly detection, federated learning, and data streams. The overarching goal
of the work is to detect anomalies in a federated environment over distributed
data streams. This work complements the state-of-the-art by adapting the data
stream algorithms in a federated learning setting for anomaly detection and by
delivering a robust framework and demonstrating the practical feasibility in a
real-world distributed deployment scenario.
|
108,943 | 108,943 |
FactPEGASUS: Factuality-Aware Pre-training and Fine-tuning for
Abstractive Summarization
|
We present FactPEGASUS, an abstractive summarization model that addresses the
problem of factuality during pre-training and fine-tuning: (1) We augment the
sentence selection strategy of PEGASUS's (Zhang et al., 2020) pre-training
objective to create pseudo-summaries that are both important and factual; (2)
We introduce three complementary components for fine-tuning. The corrector
removes hallucinations present in the reference summary, the contrastor uses
contrastive learning to better differentiate nonfactual summaries from factual
ones, and the connector bridges the gap between the pre-training and
fine-tuning for better transfer of knowledge. Experiments on three downstream
tasks demonstrate that FactPEGASUS substantially improves factuality evaluated
by multiple automatic metrics and humans. Our thorough analysis suggests that
FactPEGASUS is more factual than using the original pre-training objective in
zero-shot and few-shot settings, retains factual behavior more robustly than
strong baselines, and does not rely entirely on becoming more extractive to
improve factuality. Our code and data are publicly available at:
https://github.com/meetdavidwan/factpegasus
|
108,944 | 108,944 |
Expected Frequency Matrices of Elections: Computation, Geometry, and
Preference Learning
|
We use the "map of elections" approach of Szufa et al. (AAMAS 2020) to
analyze several well-known vote distributions. For each of them, we give an
explicit formula or an efficient algorithm for computing its frequency matrix,
which captures the probability that a given candidate appears in a given
position in a sampled vote. We use these matrices to draw the "skeleton map" of
distributions, evaluate its robustness, and analyze its properties. We further
use them to identify the nature of several real-world elections.
|
108,945 | 108,945 |
Decision Making for Hierarchical Multi-label Classification with
Multidimensional Local Precision Rate
|
Hierarchical multi-label classification (HMC) has drawn increasing attention
in the past few decades. It is applicable when hierarchical relationships among
classes are available and need to be incorporated along with the multi-label
classification whereby each object is assigned to one or more classes. There
are two key challenges in HMC: i) optimizing the classification accuracy, and
meanwhile ii) ensuring the given class hierarchy. To address these challenges,
in this article, we introduce a new statistic called the multidimensional local
precision rate (mLPR) for each object in each class. We show that
classification decisions made by simply sorting objects across classes in
descending order of their true mLPRs can, in theory, ensure the class hierarchy
and lead to the maximization of CATCH, an objective function we introduce that
is related to the area under a hit curve. This approach is the first of its
kind that handles both challenges in one objective function without additional
constraints, thanks to the desirable statistical properties of CATCH and mLPR.
In practice, however, true mLPRs are not available. In response, we introduce
HierRank, a new algorithm that maximizes an empirical version of CATCH using
estimated mLPRs while respecting the hierarchy. The performance of this
approach was evaluated on a synthetic data set and two real data sets; ours was
found to be superior to several comparison methods on evaluation criteria based
on metrics such as precision, recall, and $F_1$ score.
|
108,946 | 108,946 |
Physics-informed machine learning techniques for edge plasma turbulence
modelling in computational theory and experiment
|
Edge plasma turbulence is critical to the performance of magnetic confinement
fusion devices. Towards better understanding edge turbulence in both theory and
experiment, a custom-built physics-informed deep learning framework constrained
by partial differential equations is developed to accurately learn turbulent
fields consistent with the two-fluid theory from partial observations of
electron pressure. This calculation is not otherwise possible using
conventional equilibrium models. With this technique, the first direct
quantitative comparisons of turbulent fields between electrostatic two-fluid
theory and electromagnetic gyrokinetic modelling are demonstrated with good
overall agreement found in magnetized helical plasmas at low normalized
pressure.
To translate these computational techniques to experimental fusion plasmas, a
novel method to translate brightness measurements of HeI line radiation into
local plasma fluctuations is demonstrated via a newly created deep learning
framework that integrates neutral transport physics and collisional radiative
theory for the $3^3 D - 2^3 P$ transition in atomic helium. Using fast camera
data on the Alcator C-Mod tokamak, this thesis presents the first 2-dimensional
time-dependent experimental measurements of the turbulent electron density,
electron temperature, and neutral density in a fusion plasma using a single
spectral line. With this experimentally inferred data, initial estimates of the
2-dimensional turbulent electric field consistent with drift-reduced Braginskii
theory under the framework of an axisymmetric fusion plasma with purely
toroidal field are calculated. The inclusion of atomic helium effects on
particle and energy sources are found to strengthen correlations between the
electric field and electron pressure while broadening turbulent field
amplitudes which impact ${\bf E \times B}$ flows and shearing rates.
|
108,947 | 108,947 |
Loss Landscape Engineering via Data Regulation on PINNs
|
Physics-Informed Neural Networks have shown unique utility in parameterising
the solution of a well-defined partial differential equation using automatic
differentiation and residual losses. Though they provide theoretical guarantees
of convergence, in practice the required training regimes tend to be exacting
and demanding. Through the course of this paper, we take a deep dive into
understanding the loss landscapes associated with a PINN and how that offers
some insight as to why PINNs are fundamentally hard to optimise for. We
demonstrate how PINNs can be forced to converge better towards the solution, by
way of feeding in sparse or coarse data as a regulator. The data regulates and
morphs the topology of the loss landscape associated with the PINN to make it
easily traversable for the minimiser. Data regulation of PINNs helps ease the
optimisation required for convergence by invoking a hybrid
unsupervised-supervised training approach, where the labelled data pushes the
network towards the vicinity of the solution, and the unlabelled regime
fine-tunes it to the solution.
|
108,948 | 108,948 |
Power and limitations of single-qubit native quantum neural networks
|
Quantum neural networks (QNNs) have emerged as a leading strategy to
establish applications in machine learning, chemistry, and optimization. While
the applications of QNN have been widely investigated, its theoretical
foundation remains less understood. In this paper, we formulate a theoretical
framework for the expressive ability of data re-uploading quantum neural
networks that consist of interleaved encoding circuit blocks and trainable
circuit blocks. First, we prove that single-qubit quantum neural networks can
approximate any univariate function by mapping the model to a partial Fourier
series. Beyond previous works' understanding of existence, we in particular
establish the exact correlations between the parameters of the trainable gates
and the working Fourier coefficients, by exploring connections to quantum
signal processing. Second, we discuss the limitations of single-qubit native
QNNs on approximating multivariate functions by analyzing the frequency
spectrum and the flexibility of Fourier coefficients. We further demonstrate
the expressivity and limitations of single-qubit native QNNs via numerical
experiments. As applications, we introduce natural extensions to multi-qubit
quantum neural networks, which exhibit the capability of classifying real-world
multi-dimensional data. We believe these results would improve our
understanding of QNNs and provide a helpful guideline for designing powerful
QNNs for machine learning tasks.
|
108,949 | 108,949 |
ST-ExpertNet: A Deep Expert Framework for Traffic Prediction
|
Recently, forecasting the crowd flows has become an important research topic,
and plentiful technologies have achieved good performances. As we all know, the
flow at a citywide level is in a mixed state with several basic patterns (e.g.,
commuting, working, and commercial) caused by the city area functional
distributions (e.g., developed commercial areas, educational areas and parks).
However, existing technologies have been criticized for their lack of
considering the differences in the flow patterns among regions since they want
to build only one comprehensive model to learn the mixed flow tensors.
Recognizing this limitation, we present a new perspective on flow prediction
and propose an explainable framework named ST-ExpertNet, which can adopt every
spatial-temporal model and train a set of functional experts devoted to
specific flow patterns. Technically, we train a bunch of experts based on the
Mixture of Experts (MoE), which guides each expert to specialize in different
kinds of flow patterns in sample spaces by using the gating network. We define
several criteria, including comprehensiveness, sparsity, and preciseness, to
construct the experts for better interpretability and performances. We conduct
experiments on a wide range of real-world taxi and bike datasets in Beijing and
NYC. The visualizations of the expert's intermediate results demonstrate that
our ST-ExpertNet successfully disentangles the city's mixed flow tensors along
with the city layout, e.g., the urban ring road structure. Different network
architectures, such as ST-ResNet, ConvLSTM, and CNN, have been adopted into our
ST-ExpertNet framework for experiments and the results demonstrates the
superiority of our framework in both interpretability and performances.
|
108,950 | 108,950 |
REMuS-GNN: A Rotation-Equivariant Model for Simulating Continuum
Dynamics
|
Numerical simulation is an essential tool in many areas of science and
engineering, but its performance often limits application in practice or when
used to explore large parameter spaces. On the other hand, surrogate deep
learning models, while accelerating simulations, often exhibit poor accuracy
and ability to generalise. In order to improve these two factors, we introduce
REMuS-GNN, a rotation-equivariant multi-scale model for simulating continuum
dynamical systems encompassing a range of length scales. REMuS-GNN is designed
to predict an output vector field from an input vector field on a physical
domain discretised into an unstructured set of nodes. Equivariance to rotations
of the domain is a desirable inductive bias that allows the network to learn
the underlying physics more efficiently, leading to improved accuracy and
generalisation compared with similar architectures that lack such symmetry. We
demonstrate and evaluate this method on the incompressible flow around
elliptical cylinders.
|
108,951 | 108,951 |
Heterogeneous Domain Adaptation with Adversarial Neural Representation
Learning: Experiments on E-Commerce and Cybersecurity
|
Learning predictive models in new domains with scarce training data is a
growing challenge in modern supervised learning scenarios. This incentivizes
developing domain adaptation methods that leverage the knowledge in known
domains (source) and adapt to new domains (target) with a different probability
distribution. This becomes more challenging when the source and target domains
are in heterogeneous feature spaces, known as heterogeneous domain adaptation
(HDA). While most HDA methods utilize mathematical optimization to map source
and target data to a common space, they suffer from low transferability. Neural
representations have proven to be more transferable; however, they are mainly
designed for homogeneous environments. Drawing on the theory of domain
adaptation, we propose a novel framework, Heterogeneous Adversarial Neural
Domain Adaptation (HANDA), to effectively maximize the transferability in
heterogeneous environments. HANDA conducts feature and distribution alignment
in a unified neural network architecture and achieves domain invariance through
adversarial kernel learning. Three experiments were conducted to evaluate the
performance against the state-of-the-art HDA methods on major image and text
e-commerce benchmarks. HANDA shows statistically significant improvement in
predictive performance. The practical utility of HANDA was shown in real-world
dark web online markets. HANDA is an important step towards successful domain
adaptation in e-commerce applications.
|
108,952 | 108,952 |
Functional2Structural: Cross-Modality Brain Networks Representation
Learning
|
MRI-based modeling of brain networks has been widely used to understand
functional and structural interactions and connections among brain regions, and
factors that affect them, such as brain development and disease. Graph mining
on brain networks may facilitate the discovery of novel biomarkers for clinical
phenotypes and neurodegenerative diseases. Since brain networks derived from
functional and structural MRI describe the brain topology from different
perspectives, exploring a representation that combines these cross-modality
brain networks is non-trivial. Most current studies aim to extract a fused
representation of the two types of brain network by projecting the structural
network to the functional counterpart. Since the functional network is dynamic
and the structural network is static, mapping a static object to a dynamic
object is suboptimal. However, mapping in the opposite direction is not
feasible due to the non-negativity requirement of current graph learning
techniques. Here, we propose a novel graph learning framework, known as Deep
Signed Brain Networks (DSBN), with a signed graph encoder that, from an
opposite perspective, learns the cross-modality representations by projecting
the functional network to the structural counterpart. We validate our framework
on clinical phenotype and neurodegenerative disease prediction tasks using two
independent, publicly available datasets (HCP and OASIS). The experimental
results clearly demonstrate the advantages of our model compared to several
state-of-the-art methods.
|
108,953 | 108,953 |
Decentral and Incentivized Federated Learning Frameworks: A Systematic
Literature Review
|
The advent of Federated Learning (FL) has ignited a new paradigm for parallel
and confidential decentralized Machine Learning (ML) with the potential of
utilizing the computational power of a vast number of IoT, mobile and edge
devices without data leaving the respective device, ensuring privacy by design.
Yet, in order to scale this new paradigm beyond small groups of already
entrusted entities towards mass adoption, the Federated Learning Framework
(FLF) has to become (i) truly decentralized and (ii) participants have to be
incentivized. This is the first systematic literature review analyzing holistic
FLFs in the domain of both, decentralized and incentivized federated learning.
422 publications were retrieved, by querying 12 major scientific databases.
Finally, 40 articles remained after a systematic review and filtering process
for in-depth examination. Although having massive potential to direct the
future of a more distributed and secure AI, none of the analyzed FLF is
production-ready. The approaches vary heavily in terms of use-cases, system
design, solved issues and thoroughness. We are the first to provide a
systematic approach to classify and quantify differences between FLF, exposing
limitations of current works and derive future directions for research in this
novel domain.
|
108,954 | 108,954 |
Impact of Learning Rate on Noise Resistant Property of Deep Learning
Models
|
The interest in analog computation has grown tremendously in recent years due
to its fast computation speed and excellent energy efficiency, which is very
important for edge and IoT devices in the sub-watt power envelope for deep
learning inferencing. However, significant performance degradation suffered by
deep learning models due to the inherent noise present in the analog
computation can limit their use in mission-critical applications. Hence, there
is a need to understand the impact of critical model hyperparameters choice on
the resulting model noise-resistant property. This need is critical as the
insight obtained can be used to design deep learning models that are robust to
analog noise. In this paper, the impact of the learning rate, a critical design
choice, on the noise-resistant property is investigated. The study is achieved
by first training deep learning models using different learning rates.
Thereafter, the models are injected with analog noise and the noise-resistant
property of the resulting models is examined by measuring the performance
degradation due to the analog noise. The results showed there exists a sweet
spot of learning rate values that achieves a good balance between model
prediction performance and model noise-resistant property. Furthermore, the
theoretical justification of the observed phenomenon is provided.
|
108,955 | 108,955 |
Neural Program Synthesis with Query
|
Aiming to find a program satisfying the user intent given input-output
examples, program synthesis has attracted increasing interest in the area of
machine learning. Despite the promising performance of existing methods, most
of their success comes from the privileged information of well-designed
input-output examples. However, providing such input-output examples is
unrealistic because it requires the users to have the ability to describe the
underlying program with a few input-output examples under the training
distribution. In this work, we propose a query-based framework that trains a
query neural network to generate informative input-output examples
automatically and interactively from a large query space. The quality of the
query depends on the amount of the mutual information between the query and the
corresponding program, which can guide the optimization of the query framework.
To estimate the mutual information more accurately, we introduce the functional
space (F-space) which models the relevance between the input-output examples
and the programs in a differentiable way. We evaluate the effectiveness and
generalization of the proposed query-based framework on the Karel task and the
list processing task. Experimental results show that the query-based framework
can generate informative input-output examples which achieve and even
outperform well-designed input-output examples.
|
108,956 | 108,956 |
Predicting tacrolimus exposure in kidney transplanted patients using
machine learning
|
Tacrolimus is one of the cornerstone immunosuppressive drugs in most
transplantation centers worldwide following solid organ transplantation.
Therapeutic drug monitoring of tacrolimus is necessary in order to avoid
rejection of the transplanted organ or severe side effects. However, finding
the right dose for a given patient is challenging, even for experienced
clinicians. Consequently, a tool that can accurately estimate the drug exposure
for individual dose adaptions would be of high clinical value. In this work, we
propose a new technique using machine learning to estimate the tacrolimus
exposure in kidney transplant recipients. Our models achieve predictive errors
that are at the same level as an established population pharmacokinetic model,
but are faster to develop and require less knowledge about the pharmacokinetic
properties of the drug.
|
108,957 | 108,957 |
Btech thesis report on adversarial attack detection and purification of
adverserially attacked images
|
This is Btech thesis report on detection and purification of adverserially
attacked images. A deep learning model is trained on certain training examples
for various tasks such as classification, regression etc. By training, weights
are adjusted such that the model performs the task well not only on training
examples judged by a certain metric but has an excellent ability to generalize
on other unseen examples as well which are typically called the test data.
Despite the huge success of machine learning models on a wide range of tasks,
security has received a lot less attention along the years. Robustness along
various potential cyber attacks also should be a metric for the accuracy of the
machine learning models. These cyber attacks can potentially lead to a variety
of negative impacts in the real world sensitive applications for which machine
learning is used such as medical and transportation systems. Hence, it is a
necessity to secure the system from such attacks. Int this report, I focus on a
class of these cyber attacks called the adversarial attacks in which the
original input sample is modified by small perturbations such that they still
look visually the same to human beings but the machine learning models are
fooled by such inputs. In this report I discuss 2 novel ways to counter the
adversarial attack using AutoEncoders, 1) by detecting the presence of
adversaries and 2) purifying these adversaries to make target classification
models robust against such attacks.
|
108,958 | 108,958 |
AdaCap: Adaptive Capacity control for Feed-Forward Neural Networks
|
The capacity of a ML model refers to the range of functions this model can
approximate. It impacts both the complexity of the patterns a model can learn
but also memorization, the ability of a model to fit arbitrary labels. We
propose Adaptive Capacity (AdaCap), a training scheme for Feed-Forward Neural
Networks (FFNN). AdaCap optimizes the capacity of FFNN so it can capture the
high-level abstract representations underlying the problem at hand without
memorizing the training dataset. AdaCap is the combination of two novel
ingredients, the Muddling labels for Regularization (MLR) loss and the Tikhonov
operator training scheme. The MLR loss leverages randomly generated labels to
quantify the propensity of a model to memorize. We prove that the MLR loss is
an accurate in-sample estimator for out-of-sample generalization performance
and that it can be used to perform Hyper-Parameter Optimization provided a
Signal-to-Noise Ratio condition is met. The Tikhonov operator training scheme
modulates the capacity of a FFNN in an adaptive, differentiable and
data-dependent manner. We assess the effectiveness of AdaCap in a setting where
DNN are typically prone to memorization, small tabular datasets, and benchmark
its performance against popular machine learning methods.
|
108,959 | 108,959 |
Depression Diagnosis and Forecast based on Mobile Phone Sensor Data
|
Previous studies have shown the correlation between sensor data collected
from mobile phones and human depression states. Compared to the traditional
self-assessment questionnaires, the passive data collected from mobile phones
is easier to access and less time-consuming. In particular, passive mobile
phone data can be collected on a flexible time interval, thus detecting
moment-by-moment psychological changes and helping achieve earlier
interventions. Moreover, while previous studies mainly focused on depression
diagnosis using mobile phone data, depression forecasting has not received
sufficient attention. In this work, we extract four types of passive features
from mobile phone data, including phone call, phone usage, user activity, and
GPS features. We implement a long short-term memory (LSTM) network in a
subject-independent 10-fold cross-validation setup to model both a diagnostic
and a forecasting tasks. Experimental results show that the forecasting task
achieves comparable results with the diagnostic task, which indicates the
possibility of forecasting depression from mobile phone sensor data. Our model
achieves an accuracy of 77.0 % for major depression forecasting (binary), an
accuracy of 53.7 % for depression severity forecasting (5 classes), and a best
RMSE score of 4.094 (PHQ-9, range from 0 to 27).
|
108,960 | 108,960 |
A Safety Assurable Human-Inspired Perception Architecture
|
Although artificial intelligence-based perception (AIP) using deep neural
networks (DNN) has achieved near human level performance, its well-known
limitations are obstacles to the safety assurance needed in autonomous
applications. These include vulnerability to adversarial inputs, inability to
handle novel inputs and non-interpretability. While research in addressing
these limitations is active, in this paper, we argue that a fundamentally
different approach is needed to address them. Inspired by dual process models
of human cognition, where Type 1 thinking is fast and non-conscious while Type
2 thinking is slow and based on conscious reasoning, we propose a dual process
architecture for safe AIP. We review research on how humans address the
simplest non-trivial perception problem, image classification, and sketch a
corresponding AIP architecture for this task. We argue that this architecture
can provide a systematic way of addressing the limitations of AIP using DNNs
and an approach to assurance of human-level performance and beyond. We conclude
by discussing what components of the architecture may already be addressed by
existing work and what remains future work.
|
108,961 | 108,961 |
Quality versus speed in energy demand prediction for district heating
systems
|
In this paper, we consider energy demand prediction in district heating
systems. Effective energy demand prediction is essential in combined heat power
systems when offering electrical energy in competitive electricity markets. To
address this problem, we propose two sets of algorithms: (1) a novel extension
to the algorithm proposed by E. Dotzauer and (2) an autoregressive predictor
based on hour-of-week adjusted linear regression on moving averages of energy
consumption. These two methods are compared against state-of-the-art artificial
neural networks. Energy demand predictor algorithms have various computational
costs and prediction quality. While prediction quality is a widely used measure
of predictor superiority, computational costs are less frequently analyzed and
their impact is not so extensively studied. When predictor algorithms are
constantly updated using new data, some computationally expensive forecasting
methods may become inapplicable. The computational costs can be split into
training and execution parts. The execution part is the cost paid when the
already trained algorithm is applied to predict something. In this paper, we
evaluate the above methods with respect to the quality and computational costs,
both in the training and in the execution. The comparison is conducted on a
real-world dataset from a district heating system in the northwest part of
Poland.
|
108,962 | 108,962 |
Privacy Enhancement for Cloud-Based Few-Shot Learning
|
Requiring less data for accurate models, few-shot learning has shown
robustness and generality in many application domains. However, deploying
few-shot models in untrusted environments may inflict privacy concerns, e.g.,
attacks or adversaries that may breach the privacy of user-supplied data. This
paper studies the privacy enhancement for the few-shot learning in an untrusted
environment, e.g., the cloud, by establishing a novel privacy-preserved
embedding space that preserves the privacy of data and maintains the accuracy
of the model. We examine the impact of various image privacy methods such as
blurring, pixelization, Gaussian noise, and differentially private pixelization
(DP-Pix) on few-shot image classification and propose a method that learns
privacy-preserved representation through the joint loss. The empirical results
show how privacy-performance trade-off can be negotiated for privacy-enhanced
few-shot learning.
|
108,963 | 108,963 |
Simple Contrastive Graph Clustering
|
Contrastive learning has recently attracted plenty of attention in deep graph
clustering for its promising performance. However, complicated data
augmentations and time-consuming graph convolutional operation undermine the
efficiency of these methods. To solve this problem, we propose a Simple
Contrastive Graph Clustering (SCGC) algorithm to improve the existing methods
from the perspectives of network architecture, data augmentation, and objective
function. As to the architecture, our network includes two main parts, i.e.,
pre-processing and network backbone. A simple low-pass denoising operation
conducts neighbor information aggregation as an independent pre-processing, and
only two multilayer perceptrons (MLPs) are included as the backbone. For data
augmentation, instead of introducing complex operations over graphs, we
construct two augmented views of the same vertex by designing parameter
un-shared siamese encoders and corrupting the node embeddings directly.
Finally, as to the objective function, to further improve the clustering
performance, a novel cross-view structural consistency objective function is
designed to enhance the discriminative capability of the learned network.
Extensive experimental results on seven benchmark datasets validate our
proposed algorithm's effectiveness and superiority. Significantly, our
algorithm outperforms the recent contrastive deep clustering competitors with
at least seven times speedup on average.
|
108,964 | 108,964 |
Primal-Dual UNet for Sparse View Cone Beam Computed Tomography Volume
Reconstruction
|
In this paper, the Primal-Dual UNet for sparse view CT reconstruction is
modified to be applicable to cone beam projections and perform reconstructions
of entire volumes instead of slices. Experiments show that the PSNR of the
proposed method is increased by 10dB compared to the direct FDK reconstruction
and almost 3dB compared to the modified original Primal-Dual Network when using
only 23 projections. The presented network is not optimized wrt. memory
consumption or hyperparameters but merely serves as a proof of concept and is
limited to low resolution projections and volumes.
|
108,965 | 108,965 |
Feature and Instance Joint Selection: A Reinforcement Learning
Perspective
|
Feature selection and instance selection are two important techniques of data
processing. However, such selections have mostly been studied separately, while
existing work towards the joint selection conducts feature/instance selection
coarsely; thus neglecting the latent fine-grained interaction between feature
space and instance space. To address this challenge, we propose a reinforcement
learning solution to accomplish the joint selection task and simultaneously
capture the interaction between the selection of each feature and each
instance. In particular, a sequential-scanning mechanism is designed as action
strategy of agents, and a collaborative-changing environment is used to enhance
agent collaboration. In addition, an interactive paradigm introduces prior
selection knowledge to help agents for more efficient exploration. Finally,
extensive experiments on real-world datasets have demonstrated improved
performances.
|
108,966 | 108,966 |
Minimal Neural Network Models for Permutation Invariant Agents
|
Organisms in nature have evolved to exhibit flexibility in face of changes to
the environment and/or to themselves. Artificial neural networks (ANNs) have
proven useful for controlling of artificial agents acting in environments.
However, most ANN models used for reinforcement learning-type tasks have a
rigid structure that does not allow for varying input sizes. Further, they fail
catastrophically if inputs are presented in an ordering unseen during
optimization. We find that these two ANN inflexibilities can be mitigated and
their solutions are simple and highly related. For permutation invariance, no
optimized parameters can be tied to a specific index of the input elements. For
size invariance, inputs must be projected onto a common space that does not
grow with the number of projections. Based on these restrictions, we construct
a conceptually simple model that exhibit flexibility most ANNs lack. We
demonstrate the model's properties on multiple control problems, and show that
it can cope with even very rapid permutations of input indices, as well as
changes in input size. Ablation studies show that is possible to achieve these
properties with simple feedforward structures, but that it is much easier to
optimize recurrent structures.
|
108,967 | 108,967 |
Near out-of-distribution detection for low-resolution radar
micro-Doppler signatures
|
Near out-of-distribution detection (OOD) aims at discriminating semantically
similar data points without the supervision required for classification. This
paper puts forward an OOD use case for radar targets detection extensible to
other kinds of sensors and detection scenarios. We emphasize the relevance of
OOD and its specific supervision requirements for the detection of a
multimodal, diverse targets class among other similar radar targets and clutter
in real-life critical systems. We propose a comparison of deep and non-deep OOD
methods on simulated low-resolution pulse radar micro-Doppler signatures,
considering both a spectral and a covariance matrix input representation. The
covariance representation aims at estimating whether dedicated second-order
processing is appropriate to discriminate signatures. The potential
contributions of labeled anomalies in training, self-supervised learning,
contrastive learning insights and innovative training losses are discussed, and
the impact of training set contamination caused by mislabelling is
investigated.
|
108,968 | 108,968 |
Unsupervised Driving Behavior Analysis using Representation Learning and
Exploiting Group-based Training
|
Driving behavior monitoring plays a crucial role in managing road safety and
decreasing the risk of traffic accidents. Driving behavior is affected by
multiple factors like vehicle characteristics, types of roads, traffic, but,
most importantly, the pattern of driving of individuals. Current work performs
a robust driving pattern analysis by capturing variations in driving patterns.
It forms consistent groups by learning compressed representation of time series
(Auto Encoded Compact Sequence) using a multi-layer seq-2-seq autoencoder and
exploiting hierarchical clustering along with recommending the choice of best
distance measure. Consistent groups aid in identifying variations in driving
patterns of individuals captured in the dataset. These groups are generated for
both train and hidden test data. The consistent groups formed using train data,
are exploited for training multiple instances of the classifier. Obtained
choice of best distance measure is used to select the best train-test pair of
consistent groups. We have experimented on the publicly available UAH-DriveSet
dataset considering the signals captured from IMU sensors (accelerometer and
gyroscope) for classifying driving behavior. We observe proposed method,
significantly outperforms the benchmark performance.
|
108,969 | 108,969 |
Mondrian Forest for Data Stream Classification Under Memory Constraints
|
Supervised learning algorithms generally assume the availability of enough
memory to store their data model during the training and test phases. However,
in the Internet of Things, this assumption is unrealistic when data comes in
the form of infinite data streams, or when learning algorithms are deployed on
devices with reduced amounts of memory. In this paper, we adapt the online
Mondrian forest classification algorithm to work with memory constraints on
data streams. In particular, we design five out-of-memory strategies to update
Mondrian trees with new data points when the memory limit is reached. Moreover,
we design trimming mechanisms to make Mondrian trees more robust to concept
drifts under memory constraints. We evaluate our algorithms on a variety of
real and simulated datasets, and we conclude with recommendations on their use
in different situations: the Extend Node strategy appears as the best
out-of-memory strategy in all configurations, whereas different trimming
mechanisms should be adopted depending on whether a concept drift is expected.
All our methods are implemented in the OrpailleCC open-source library and are
ready to be used on embedded systems and connected objects.
|
108,970 | 108,970 |
ScAN: Suicide Attempt and Ideation Events Dataset
|
Suicide is an important public health concern and one of the leading causes
of death worldwide. Suicidal behaviors, including suicide attempts (SA) and
suicide ideations (SI), are leading risk factors for death by suicide.
Information related to patients' previous and current SA and SI are frequently
documented in the electronic health record (EHR) notes. Accurate detection of
such documentation may help improve surveillance and predictions of patients'
suicidal behaviors and alert medical professionals for suicide prevention
efforts. In this study, we first built Suicide Attempt and Ideation Events
(ScAN) dataset, a subset of the publicly available MIMIC III dataset spanning
over 12k+ EHR notes with 19k+ annotated SA and SI events information. The
annotations also contain attributes such as method of suicide attempt. We also
provide a strong baseline model ScANER (Suicide Attempt and Ideation Events
Retriever), a multi-task RoBERTa-based model with a retrieval module to extract
all the relevant suicidal behavioral evidences from EHR notes of an
hospital-stay and, and a prediction module to identify the type of suicidal
behavior (SA and SI) concluded during the patient's stay at the hospital.
ScANER achieved a macro-weighted F1-score of 0.83 for identifying suicidal
behavioral evidences and a macro F1-score of 0.78 and 0.60 for classification
of SA and SI for the patient's hospital-stay, respectively. ScAN and ScANER are
publicly available.
|
108,971 | 108,971 |
Revisiting the Updates of a Pre-trained Model for Few-shot Learning
|
Most of the recent few-shot learning algorithms are based on transfer
learning, where a model is pre-trained using a large amount of source data, and
the pre-trained model is updated using a small amount of target data afterward.
In transfer-based few-shot learning, sophisticated pre-training methods have
been widely studied for universal and improved representation. However, there
is little study on updating pre-trained models for few-shot learning. In this
paper, we compare the two popular updating methods, fine-tuning (i.e., updating
the entire network) and linear probing (i.e., updating only the linear
classifier), considering the distribution shift between the source and target
data. We find that fine-tuning is better than linear probing as the number of
samples increases, regardless of distribution shift. Next, we investigate the
effectiveness and ineffectiveness of data augmentation when pre-trained models
are fine-tuned. Our fundamental analyses demonstrate that careful
considerations of the details about updating pre-trained models are required
for better few-shot performance.
|
108,972 | 108,972 |
A Comprehensive Survey on Model Quantization for Deep Neural Networks
|
Recent advances in machine learning by deep neural networks are significant.
But using these networks has been accompanied by a huge number of parameters
for storage and computations that leads to an increase in the hardware cost and
posing challenges. Therefore, compression approaches have been proposed to
design efficient accelerators. One important approach for deep neural network
compression is quantization that full-precision values are stored in low
bit-width. In this way, in addition to memory saving, the operations will be
replaced by simple ones with low cost. Many methods are suggested for DNNs
Quantization in recent years, because of flexibility and influence in designing
efficient hardware. Therefore, an integrated report is essential for better
understanding, analysis, and comparison. In this paper, we provide a
comprehensive survey. We describe the quantization concepts and categorize the
methods from different perspectives. We discuss using the scale factor to match
the quantization levels with the distribution of the full-precision values and
describe the clustering-based methods. For the first time, we review the
training of a quantized deep neural network and using Straight-Through
Estimator comprehensively. Also, we describe the simplicity of operations in
quantized deep convolutional neural networks and explain the sensitivity of the
different layers in quantization. Finally, we discuss the evaluation of the
quantization methods and compare the accuracy of previous methods with various
bit-width for weights and activations on CIFAR-10 and the large-scale dataset,
ImageNet.
|
108,973 | 108,973 |
A Note on the Chernoff Bound for Random Variables in the Unit Interval
|
The Chernoff bound is a well-known tool for obtaining a high probability
bound on the expectation of a Bernoulli random variable in terms of its sample
average. This bound is commonly used in statistical learning theory to upper
bound the generalisation risk of a hypothesis in terms of its empirical risk on
held-out data, for the case of a binary-valued loss function. However, the
extension of this bound to the case of random variables taking values in the
unit interval is less well known in the community. In this note we provide a
proof of this extension for convenience and future reference.
|
108,974 | 108,974 |
Developing patient-driven artificial intelligence based on personal
rankings of care decision making steps
|
We propose and experimentally motivate a new methodology to support
decision-making processes in healthcare with artificial intelligence based on
personal rankings of care decision making steps that can be identified with our
methodology, questionnaire data and its statistical patterns. Our longitudinal
quantitative cross-sectional three-stage study gathered self-ratings for 437
expression statements concerning healthcare situations on Likert scales in
respect to "the need for help", "the advancement of health", "the hopefulness",
"the indication of compassion" and "the health condition", and 45 answers about
the person's demographics, health and wellbeing, also the duration of giving
answers. Online respondents between 1 June 2020 and 29 June 2021 were recruited
from Finnish patient and disabled people's organizations, other health-related
organizations and professionals, and educational institutions (n=1075). With
Kruskal-Wallis test, Wilcoxon rank-sum test (i.e., Mann-Whitney U test),
Wilcoxon rank-sum pairwise test, Welch's t test and one-way analysis of
variance (ANOVA) between groups test we identified statistically significant
differences of ratings and their durations for each expression statement in
respect to respondent groupings based on the answer values of each background
question. Frequencies of the later reordering of rating rankings showed
dependencies with ratings given earlier in respect to various interpretation
task entities, interpretation dimensions and respondent groupings. Our
methodology, questionnaire data and its statistical patterns enable analyzing
with self-rated expression statements the representations of decision making
steps in healthcare situations and their chaining, agglomeration and branching
in knowledge entities of personalized care paths. Our results support building
artificial intelligence solutions to address the patient's needs concerning
care.
|
108,975 | 108,975 |
Learning Car Speed Using Inertial Sensors
|
A deep neural network (DNN) is trained to estimate the speed of a car driving
in an urban area using as input a stream of measurements from a low-cost
six-axis inertial measurement unit (IMU). Three hours of data was collected by
driving through the city of Ashdod, Israel in a car equipped with a global
navigation satellite system (GNSS) real time kinematic (RTK) positioning device
and a synchronized IMU. Ground truth labels for the car speed were calculated
using the position measurements obtained at the high rate of 50 [Hz]. A DNN
architecture with long short-term memory layers is proposed to enable
high-frequency speed estimation that accounts for previous inputs history and
the nonlinear relation between speed, acceleration, and angular velocity. A
simplified aided dead reckoning localization scheme is formulated to assess the
trained model which provides the speed pseudo-measurement. The trained model is
shown to substantially improve the position accuracy during a 4 minutes drive
without the use of GNSS position updates.
|
108,976 | 108,976 |
Enforcing KL Regularization in General Tsallis Entropy Reinforcement
Learning via Advantage Learning
|
Maximum Tsallis entropy (MTE) framework in reinforcement learning has gained
popularity recently by virtue of its flexible modeling choices including the
widely used Shannon entropy and sparse entropy. However, non-Shannon entropies
suffer from approximation error and subsequent underperformance either due to
its sensitivity or the lack of closed-form policy expression. To improve the
tradeoff between flexibility and empirical performance, we propose to
strengthen their error-robustness by enforcing implicit Kullback-Leibler (KL)
regularization in MTE motivated by Munchausen DQN (MDQN). We do so by drawing
connection between MDQN and advantage learning, by which MDQN is shown to fail
on generalizing to the MTE framework. The proposed method Tsallis Advantage
Learning (TAL) is verified on extensive experiments to not only significantly
improve upon Tsallis-DQN for various non-closed-form Tsallis entropies, but
also exhibits comparable performance to state-of-the-art maximum Shannon
entropy algorithms.
|
108,977 | 108,977 |
An Empirical Investigation of Representation Learning for Imitation
|
Imitation learning often needs a large demonstration set in order to handle
the full range of situations that an agent might find itself in during
deployment. However, collecting expert demonstrations can be expensive. Recent
work in vision, reinforcement learning, and NLP has shown that auxiliary
representation learning objectives can reduce the need for large amounts of
expensive, task-specific data. Our Empirical Investigation of Representation
Learning for Imitation (EIRLI) investigates whether similar benefits apply to
imitation learning. We propose a modular framework for constructing
representation learning algorithms, then use our framework to evaluate the
utility of representation learning for imitation across several environment
suites. In the settings we evaluate, we find that existing algorithms for
image-based representation learning provide limited value relative to a
well-tuned baseline with image augmentations. To explain this result, we
investigate differences between imitation learning and other settings where
representation learning has provided significant benefit, such as image
classification. Finally, we release a well-documented codebase which both
replicates our findings and provides a modular framework for creating new
representation learning algorithms out of reusable components.
|
108,978 | 108,978 |
Data-Driven Interpolation for Super-Scarce X-Ray Computed Tomography
|
We address the problem of reconstructing X-Ray tomographic images from scarce
measurements by interpolating missing acquisitions using a self-supervised
approach. To do so, we train shallow neural networks to combine two
neighbouring acquisitions into an estimated measurement at an intermediate
angle. This procedure yields an enhanced sequence of measurements that can be
reconstructed using standard methods, or further enhanced using regularisation
approaches.
Unlike methods that improve the sequence of acquisitions using an initial
deterministic interpolation followed by machine-learning enhancement, we focus
on inferring one measurement at once. This allows the method to scale to 3D,
the computation to be faster and crucially, the interpolation to be
significantly better than the current methods, when they exist. We also
establish that a sequence of measurements must be processed as such, rather
than as an image or a volume. We do so by comparing interpolation and
up-sampling methods, and find that the latter significantly under-perform.
We compare the performance of the proposed method against deterministic
interpolation and up-sampling procedures and find that it outperforms them,
even when used jointly with a state-of-the-art projection-data enhancement
approach using machine-learning. These results are obtained for 2D and 3D
imaging, on large biomedical datasets, in both projection space and image
space.
|
108,979 | 108,979 |
On the Difficulty of Defending Self-Supervised Learning against Model
Extraction
|
Self-Supervised Learning (SSL) is an increasingly popular ML paradigm that
trains models to transform complex inputs into representations without relying
on explicit labels. These representations encode similarity structures that
enable efficient learning of multiple downstream tasks. Recently,
ML-as-a-Service providers have commenced offering trained SSL models over
inference APIs, which transform user inputs into useful representations for a
fee. However, the high cost involved to train these models and their exposure
over APIs both make black-box extraction a realistic security threat. We thus
explore model stealing attacks against SSL. Unlike traditional model extraction
on classifiers that output labels, the victim models here output
representations; these representations are of significantly higher
dimensionality compared to the low-dimensional prediction scores output by
classifiers. We construct several novel attacks and find that approaches that
train directly on a victim's stolen representations are query efficient and
enable high accuracy for downstream models. We then show that existing defenses
against model extraction are inadequate and not easily retrofitted to the
specificities of SSL.
|
108,980 | 108,980 |
Fast and realistic large-scale structure from machine-learning-augmented
random field simulations
|
Producing thousands of simulations of the dark matter distribution in the
Universe with increasing precision is a challenging but critical task to
facilitate the exploitation of current and forthcoming cosmological surveys.
Many inexpensive substitutes to full $N$-body simulations have been proposed,
even though they often fail to reproduce the statistics of the smaller,
non-linear scales. Among these alternatives, a common approximation is
represented by the lognormal distribution, which comes with its own limitations
as well, while being extremely fast to compute even for high-resolution density
fields. In this work, we train a machine learning model to transform projected
lognormal dark matter density fields to more realistic dark matter maps, as
obtained from full $N$-body simulations. We detail the procedure that we follow
to generate highly correlated pairs of lognormal and simulated maps, which we
use as our training data, exploiting the information of the Fourier phases. We
demonstrate the performance of our model comparing various statistical tests
with different field resolutions, redshifts and cosmological parameters,
proving its robustness and explaining its current limitations. The augmented
lognormal random fields reproduce the power spectrum up to wavenumbers of $1 \
h \ \rm{Mpc}^{-1}$, the bispectrum and the peak counts within 10%, and always
within the error bars, of the fiducial target simulations. Finally, we describe
how we plan to integrate our proposed model with existing tools to yield more
accurate spherical random fields for weak lensing analysis, going beyond the
lognormal approximation.
|
108,981 | 108,981 |
Fat-Tailed Variational Inference with Anisotropic Tail Adaptive Flows
|
While fat-tailed densities commonly arise as posterior and marginal
distributions in robust models and scale mixtures, they present challenges when
Gaussian-based variational inference fails to capture tail decay accurately. We
first improve previous theory on tails of Lipschitz flows by quantifying how
the tails affect the rate of tail decay and by expanding the theory to
non-Lipschitz polynomial flows. Then, we develop an alternative theory for
multivariate tail parameters which is sensitive to tail-anisotropy. In doing
so, we unveil a fundamental problem which plagues many existing flow-based
methods: they can only model tail-isotropic distributions (i.e., distributions
having the same tail parameter in every direction). To mitigate this and enable
modeling of tail-anisotropic targets, we propose anisotropic tail-adaptive
flows (ATAF). Experimental results on both synthetic and real-world targets
confirm that ATAF is competitive with prior work while also exhibiting
appropriate tail-anisotropy.
|
108,982 | 108,982 |
An Extension to Basis-Hypervectors for Learning from Circular Data in
Hyperdimensional Computing
|
Hyperdimensional Computing (HDC) is a computation framework based on
properties of high-dimensional random spaces. It is particularly useful for
machine learning in resource-constrained environments, such as embedded systems
and IoT, as it achieves a good balance between accuracy, efficiency and
robustness. The mapping of information to the hyperspace, named encoding, is
the most important stage in HDC. At its heart are basis-hypervectors,
responsible for representing the smallest units of meaningful information. In
this work we present a detailed study on basis-hypervector sets, which leads to
practical contributions to HDC in general: 1) we propose an improvement for
level-hypervectors, used to encode real numbers; 2) we introduce a method to
learn from circular data, an important type of information never before
addressed in machine learning with HDC. Empirical results indicate that these
contributions lead to considerably more accurate models for both classification
and regression with circular data.
|
108,983 | 108,983 |
Distributed Feature Selection for High-dimensional Additive Models
|
Distributed statistical learning is a common strategy for handling massive
data where we divide the learning task into multiple local machines and
aggregate the results afterward. However, most existing work considers the case
where the samples are divided. In this work, we propose a new algorithm,
DDAC-SpAM, that divides features under the high-dimensional sparse additive
model. The new algorithm contains three steps: divide, decorrelate, and
conquer. We show that after the decorrelation operation, every local estimator
can recover the sparsity pattern for each additive component consistently
without imposing strict constraints to the correlation structure among
variables. Theoretical analysis of the aggregated estimator and empirical
results on synthetic and real data illustrate that the DDAC-SpAM algorithm is
effective and competitive in fitting sparse additive models.
|
108,984 | 108,984 |
Constructing Trajectory and Predicting Estimated Time of Arrival for
Long Distance Travelling Vessels: A Probability Density-based Scanning
Approach
|
In this study, a probability density-based approach for constructing
trajectories is proposed and validated through an typical use-case application:
Estimated Time of Arrival (ETA) prediction given origin-destination pairs. The
ETA prediction is based on physics and mathematical laws given by the extracted
information of probability density-based trajectories constructed. The overall
ETA prediction errors are about 0.106 days (i.e. 2.544 hours) on average with
0.549 days (i.e. 13.176 hours) standard deviation, and the proposed approach
has an accuracy of 92.08% with 0.959 R-Squared value for overall trajectories
between Singapore and Australia ports selected.
|
108,985 | 108,985 |
Application of multilayer perceptron with data augmentation in nuclear
physics
|
Neural networks have become popular in many fields of science since they
serve as reliable and powerful tools. Application of the neural networks to the
nuclear physics studies has also become popular in recent years because of
their success in the prediction of nuclear properties. In this work, we study
the effect of the data augmentation on the predictive power of the neural
network models. Even though there are various data augmentation techniques used
for classification tasks in the literature, this area is still very limited for
regression problems. As predicting the binding energies is statistically
defined as a regression problem, in addition to using data augmentation for
nuclear physics, this study contributes to this field for regression in
general. Using the experimental uncertainties for data augmentation, the size
of training data set is artificially boosted and the changes in the
root-mean-square error between the model predictions on test set and the
experimental data are investigated. As far as we know, this is the first time
that data augmentation techniques have been implemented for nuclear physics
research. Our results show that the data augmentation decreases the prediction
errors, stabilizes the model and prevents overfitting. The extrapolation
capabilities of the MLP models with different depths are also tested for newly
measured nuclei in AME2020 mass table.
|
108,986 | 108,986 |
Deep Apprenticeship Learning for Playing Games
|
In the last decade, deep learning has achieved great success in machine
learning tasks where the input data is represented with different levels of
abstractions. Driven by the recent research in reinforcement learning using
deep neural networks, we explore the feasibility of designing a learning model
based on expert behaviour for complex, multidimensional tasks where reward
function is not available. We propose a novel method for apprenticeship
learning based on the previous research on supervised learning techniques in
reinforcement learning. Our method is applied to video frames from Atari games
in order to teach an artificial agent to play those games. Even though the
reported results are not comparable with the state-of-the-art results in
reinforcement learning, we demonstrate that such an approach has the potential
to achieve strong performance in the future and is worthwhile for further
research.
|
108,987 | 108,987 |
An Exponentially Increasing Step-size for Parameter Estimation in
Statistical Models
|
Using gradient descent (GD) with fixed or decaying step-size is standard
practice in unconstrained optimization problems. However, when the loss
function is only locally convex, such a step-size schedule artificially slows
GD down as it cannot explore the flat curvature of the loss function. To
overcome that issue, we propose to exponentially increase the step-size of the
GD algorithm. Under homogeneous assumptions on the loss function, we
demonstrate that the iterates of the proposed \emph{exponential step size
gradient descent} (EGD) algorithm converge linearly to the optimal solution.
Leveraging that optimization insight, we then consider using the EGD algorithm
for solving parameter estimation under non-regular statistical models whose the
loss function becomes locally convex when the sample size goes to infinity. We
demonstrate that the EGD iterates reach the final statistical radius within the
true parameter after a logarithmic number of iterations, which is in stark
contrast to a \emph{polynomial} number of iterations of the GD algorithm.
Therefore, the total computational complexity of the EGD algorithm is
\emph{optimal} and exponentially cheaper than that of the GD for solving
parameter estimation in non-regular statistical models. To the best of our
knowledge, it resolves a long-standing gap between statistical and algorithmic
computational complexities of parameter estimation in non-regular statistical
models. Finally, we provide targeted applications of the general theory to
several classes of statistical models, including generalized linear models with
polynomial link functions and location Gaussian mixture models.
|
108,988 | 108,988 |
CascadER: Cross-Modal Cascading for Knowledge Graph Link Prediction
|
Knowledge graph (KG) link prediction is a fundamental task in artificial
intelligence, with applications in natural language processing, information
retrieval, and biomedicine. Recently, promising results have been achieved by
leveraging cross-modal information in KGs, using ensembles that combine
knowledge graph embeddings (KGEs) and contextual language models (LMs).
However, existing ensembles are either (1) not consistently effective in terms
of ranking accuracy gains or (2) impractically inefficient on larger datasets
due to the combinatorial explosion problem of pairwise ranking with deep
language models. In this paper, we propose a novel tiered ranking architecture
CascadER to maintain the ranking accuracy of full ensembling while improving
efficiency considerably. CascadER uses LMs to rerank the outputs of more
efficient base KGEs, relying on an adaptive subset selection scheme aimed at
invoking the LMs minimally while maximizing accuracy gain over the KGE.
Extensive experiments demonstrate that CascadER improves MRR by up to 9 points
over KGE baselines, setting new state-of-the-art performance on four benchmarks
while improving efficiency by one or more orders of magnitude over competitive
cross-modal baselines. Our empirical analyses reveal that diversity of models
across modalities and preservation of individual models' confidence signals
help explain the effectiveness of CascadER, and suggest promising directions
for cross-modal cascaded architectures. Code and pretrained models are
available at https://github.com/tsafavi/cascader.
|
108,989 | 108,989 |
Continual learning on 3D point clouds with random compressed rehearsal
|
Contemporary deep neural networks offer state-of-the-art results when applied
to visual reasoning, e.g., in the context of 3D point cloud data. Point clouds
are important datatype for precise modeling of three-dimensional environments,
but effective processing of this type of data proves to be challenging. In the
world of large, heavily-parameterized network architectures and
continuously-streamed data, there is an increasing need for machine learning
models that can be trained on additional data. Unfortunately, currently
available models cannot fully leverage training on additional data without
losing their past knowledge. Combating this phenomenon, called catastrophic
forgetting, is one of the main objectives of continual learning. Continual
learning for deep neural networks has been an active field of research,
primarily in 2D computer vision, natural language processing, reinforcement
learning, and robotics. However, in 3D computer vision, there are hardly any
continual learning solutions specifically designed to take advantage of point
cloud structure. This work proposes a novel neural network architecture capable
of continual learning on 3D point cloud data. We utilize point cloud structure
properties for preserving a heavily compressed set of past data. By using
rehearsal and reconstruction as regularization methods of the learning process,
our approach achieves a significant decrease of catastrophic forgetting
compared to the existing solutions on several most popular point cloud datasets
considering two continual learning settings: when a task is known beforehand,
and in the challenging scenario of when task information is unknown to the
model.
|
108,990 | 108,990 |
$\mathscr{H}$-Consistency Estimation Error of Surrogate Loss Minimizers
|
We present a detailed study of estimation errors in terms of surrogate loss
estimation errors. We refer to such guarantees as $\mathscr{H}$-consistency
estimation error bounds, since they account for the hypothesis set
$\mathscr{H}$ adopted. These guarantees are significantly stronger than
$\mathscr{H}$-calibration or $\mathscr{H}$-consistency. They are also more
informative than similar excess error bounds derived in the literature, when
$\mathscr{H}$ is the family of all measurable functions. We prove general
theorems providing such guarantees, for both the distribution-dependent and
distribution-independent settings. We show that our bounds are tight, modulo a
convexity assumption. We also show that previous excess error bounds can be
recovered as special cases of our general results.
We then present a series of explicit bounds in the case of the zero-one loss,
with multiple choices of the surrogate loss and for both the family of linear
functions and neural networks with one hidden-layer. We further prove more
favorable distribution-dependent guarantees in that case. We also present a
series of explicit bounds in the case of the adversarial loss, with surrogate
losses based on the supremum of the $\rho$-margin, hinge or sigmoid loss and
for the same two general hypothesis sets. Here too, we prove several
enhancements of these guarantees under natural distributional assumptions.
Finally, we report the results of simulations illustrating our bounds and their
tightness.
|
108,991 | 108,991 |
Partial Product Aware Machine Learning on DNA-Encoded Libraries
|
DNA encoded libraries (DELs) are used for rapid large-scale screening of
small molecules against a protein target. These combinatorial libraries are
built through several cycles of chemistry and DNA ligation, producing large
sets of DNA-tagged molecules. Training machine learning models on DEL data has
been shown to be effective at predicting molecules of interest dissimilar from
those in the original DEL. Machine learning chemical property prediction
approaches rely on the assumption that the property of interest is linked to a
single chemical structure. In the context of DNA-encoded libraries, this is
equivalent to assuming that every chemical reaction fully yields the desired
product. However, in practice, multi-step chemical synthesis sometimes
generates partial molecules. Each unique DNA tag in a DEL therefore corresponds
to a set of possible molecules. Here, we leverage reaction yield data to
enumerate the set of possible molecules corresponding to a given DNA tag. This
paper demonstrates that training a custom GNN on this richer dataset improves
accuracy and generalization performance.
|
108,992 | 108,992 |
Automatic Error Classification and Root Cause Determination while
Replaying Recorded Workload Data at SAP HANA
|
Capturing customer workloads of database systems to replay these workloads
during internal testing can be beneficial for software quality assurance.
However, we experienced that such replays can produce a large amount of false
positive alerts that make the results unreliable or time consuming to analyze.
Therefore, we design a machine learning based approach that attributes root
causes to the alerts. This provides several benefits for quality assurance and
allows for example to classify whether an alert is true positive or false
positive. Our approach considerably reduces manual effort and improves the
overall quality assurance for the database system SAP HANA. We discuss the
problem, the design and result of our approach, and we present practical
limitations that may require further research.
|
108,993 | 108,993 |
On Algebraic Constructions of Neural Networks with Small Weights
|
Neural gates compute functions based on weighted sums of the input variables.
The expressive power of neural gates (number of distinct functions it can
compute) depends on the weight sizes and, in general, large weights
(exponential in the number of inputs) are required. Studying the trade-offs
among the weight sizes, circuit size and depth is a well-studied topic both in
circuit complexity theory and the practice of neural computation. We propose a
new approach for studying these complexity trade-offs by considering a related
algebraic framework. Specifically, given a single linear equation with
arbitrary coefficients, we would like to express it using a system of linear
equations with smaller (even constant) coefficients. The techniques we
developed are based on Siegel's Lemma for the bounds, anti-concentration
inequalities for the existential results and extensions of Sylvester-type
Hadamard matrices for the constructions.
We explicitly construct a constant weight, optimal size matrix to compute the
EQUALITY function (checking if two integers expressed in binary are equal).
Computing EQUALITY with a single linear equation requires exponentially large
weights. In addition, we prove the existence of the best-known weight size
(linear) matrices to compute the COMPARISON function (comparing between two
integers expressed in binary). In the context of the circuit complexity theory,
our results improve the upper bounds on the weight sizes for the best-known
circuit sizes for EQUALITY and COMPARISON.
|
108,994 | 108,994 |
Using Embeddings for Causal Estimation of Peer Influence in Social
Networks
|
We address the problem of using observational data to estimate peer contagion
effects, the influence of treatments applied to individuals in a network on the
outcomes of their neighbors. A main challenge to such estimation is that
homophily - the tendency of connected units to share similar latent traits -
acts as an unobserved confounder for contagion effects. Informally, it's hard
to tell whether your friends have similar outcomes because they were influenced
by your treatment, or whether it's due to some common trait that caused you to
be friends in the first place. Because these common causes are not usually
directly observed, they cannot be simply adjusted for. We describe an approach
to perform the required adjustment using node embeddings learned from the
network itself. The main aim is to perform this adjustment nonparametrically,
without functional form assumptions on either the process that generated the
network or the treatment assignment and outcome processes. The key
contributions are to nonparametrically formalize the causal effect in a way
that accounts for homophily, and to show how embedding methods can be used to
identify and estimate this effect. Code is available at
https://github.com/IrinaCristali/Peer-Contagion-on-Networks.
|
108,995 | 108,995 |
DeepSim: A Reinforcement Learning Environment Build Toolkit for ROS and
Gazebo
|
We propose DeepSim, a reinforcement learning environment build toolkit for
ROS and Gazebo. It allows machine learning or reinforcement learning
researchers to access the robotics domain and create complex and challenging
custom tasks in ROS and Gazebo simulation environments. This toolkit provides
building blocks of advanced features such as collision detection, behaviour
control, domain randomization, spawner, and many more. DeepSim is designed to
reduce the boundary between robotics and machine learning communities by
providing Python interface. In this paper, we discuss the components and design
decisions of DeepSim Toolkit.
|
108,996 | 108,996 |
Explainable and Optimally Configured Artificial Neural Networks for
Attack Detection in Smart Homes
|
In recent years cybersecurity has become a major concern in adaptation of
smart applications. Specially, in smart homes where a large number of IoT
devices are used having a secure and trusted mechanisms can provide peace of
mind for users. Accurate detection of cyber attacks is crucial, however precise
identification of the type of attacks plays a huge role if devising the
countermeasure for protecting the system. Artificial Neural Networks (ANN) have
provided promising results for detecting any security attacks for smart
applications. However, due to complex nature of the model used for this
technique it is not easy for normal users to trust ANN based security
solutions. Also, selection of right hyperparameters for ANN architecture plays
a crucial role in the accurate detection of security attacks, especially when
it come to identifying the subcategories of attacks. In this paper, we propose
a model that considers both the issues of explainability of ANN model and the
hyperparameter selection for this approach to be easily trusted and adapted by
users of smart home applications. Also, our approach considers a subset of the
dataset for optimal selection of hyperparamters to reduce the overhead of the
process of ANN architecture design. Distinctively this paper focuses on
configuration, performance and evaluation of ANN architecture for
identification of five categorical attacks and nine subcategorical attacks.
Using a very recent IoT dataset our approach showed high performance for
intrusion detection with 99.9%, 99.7%, and 97.7% accuracy for Binary, Category,
and Subcategory level classification of attacks.
|
108,997 | 108,997 |
Shape complexity in cluster analysis
|
In cluster analysis, a common first step is to scale the data aiming to
better partition them into clusters. Even though many different techniques have
throughout many years been introduced to this end, it is probably fair to say
that the workhorse in this preprocessing phase has been to divide the data by
the standard deviation along each dimension. Like division by the standard
deviation, the great majority of scaling techniques can be said to have roots
in some sort of statistical take on the data. Here we explore the use of
multidimensional shapes of data, aiming to obtain scaling factors for use prior
to clustering by some method, like k-means, that makes explicit use of
distances between samples. We borrow from the field of cosmology and related
areas the recently introduced notion of shape complexity, which in the variant
we use is a relatively simple, data-dependent nonlinear function that we show
can be used to help with the determination of appropriate scaling factors.
Focusing on what might be called "midrange" distances, we formulate a
constrained nonlinear programming problem and use it to produce candidate
scaling-factor sets that can be sifted on the basis of further considerations
of the data, say via expert knowledge. We give results on some iconic data
sets, highlighting the strengths and potential weaknesses of the new approach.
These results are generally positive across all the data sets used.
|
108,998 | 108,998 |
Perfect Spectral Clustering with Discrete Covariates
|
Among community detection methods, spectral clustering enjoys two desirable
properties: computational efficiency and theoretical guarantees of consistency.
Most studies of spectral clustering consider only the edges of a network as
input to the algorithm. Here we consider the problem of performing community
detection in the presence of discrete node covariates, where network structure
is determined by a combination of a latent block model structure and homophily
on the observed covariates. We propose a spectral algorithm that we prove
achieves perfect clustering with high probability on a class of large, sparse
networks with discrete covariates, effectively separating latent network
structure from homophily on observed covariates. To our knowledge, our method
is the first to offer a guarantee of consistent latent structure recovery using
spectral clustering in the setting where edge formation is dependent on both
latent and observed factors.
|
108,999 | 108,999 |
HelixADMET: a robust and endpoint extensible ADMET system incorporating
self-supervised knowledge transfer
|
Accurate ADMET (an abbreviation for "absorption, distribution, metabolism,
excretion, and toxicity") predictions can efficiently screen out undesirable
drug candidates in the early stage of drug discovery. In recent years, multiple
comprehensive ADMET systems that adopt advanced machine learning models have
been developed, providing services to estimate multiple endpoints. However,
those ADMET systems usually suffer from weak extrapolation ability. First, due
to the lack of labelled data for each endpoint, typical machine learning models
perform frail for the molecules with unobserved scaffolds. Second, most systems
only provide fixed built-in endpoints and cannot be customised to satisfy
various research requirements. To this end, we develop a robust and endpoint
extensible ADMET system, HelixADMET (H-ADMET). H-ADMET incorporates the concept
of self-supervised learning to produce a robust pre-trained model. The model is
then fine-tuned with a multi-task and multi-stage framework to transfer
knowledge between ADMET endpoints, auxiliary tasks, and self-supervised tasks.
Our results demonstrate that H-ADMET achieves an overall improvement of 4%,
compared with existing ADMET systems on comparable endpoints. Additionally, the
pre-trained model provided by H-ADMET can be fine-tuned to generate new and
customised ADMET endpoints, meeting various demands of drug research and
development requirements.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.