Unnamed: 0.1
int64 0
113k
| Unnamed: 0
float64 0
113k
⌀ | title
stringlengths 7
246
| abstract
stringlengths 6
3.31k
|
---|---|---|---|
9,500 | 9,500 | Synthesizing the preferred inputs for neurons in neural networks via
deep generator networks | Deep neural networks (DNNs) have demonstrated state-of-the-art results on
many pattern recognition tasks, especially vision classification problems.
Understanding the inner workings of such computational brains is both
fascinating basic science that is interesting in its own right - similar to why
we study the human brain - and will enable researchers to further improve DNNs.
One path to understanding how a neural network functions internally is to study
what each of its neurons has learned to detect. One such method is called
activation maximization (AM), which synthesizes an input (e.g. an image) that
highly activates a neuron. Here we dramatically improve the qualitative state
of the art of activation maximization by harnessing a powerful, learned prior:
a deep generator network (DGN). The algorithm (1) generates qualitatively
state-of-the-art synthetic images that look almost real, (2) reveals the
features learned by each neuron in an interpretable way, (3) generalizes well
to new datasets and somewhat well to different network architectures without
requiring the prior to be relearned, and (4) can be considered as a
high-quality generative method (in this case, by generating novel, creative,
interesting, recognizable images).
|
9,501 | 9,501 | Parametric Exponential Linear Unit for Deep Convolutional Neural
Networks | Object recognition is an important task for improving the ability of visual
systems to perform complex scene understanding. Recently, the Exponential
Linear Unit (ELU) has been proposed as a key component for managing bias shift
in Convolutional Neural Networks (CNNs), but defines a parameter that must be
set by hand. In this paper, we propose learning a parameterization of ELU in
order to learn the proper activation shape at each layer in the CNNs. Our
results on the MNIST, CIFAR-10/100 and ImageNet datasets using the NiN,
Overfeat, All-CNN and ResNet networks indicate that our proposed Parametric ELU
(PELU) has better performances than the non-parametric ELU. We have observed as
much as a 7.28% relative error improvement on ImageNet with the NiN network,
with only 0.0003% parameter increase. Our visual examination of the non-linear
behaviors adopted by Vgg using PELU shows that the network took advantage of
the added flexibility by learning different activations at different layers.
|
9,502 | 9,502 | Minding the Gaps for Block Frank-Wolfe Optimization of Structured SVMs | In this paper, we propose several improvements on the block-coordinate
Frank-Wolfe (BCFW) algorithm from Lacoste-Julien et al. (2013) recently used to
optimize the structured support vector machine (SSVM) objective in the context
of structured prediction, though it has wider applications. The key intuition
behind our improvements is that the estimates of block gaps maintained by BCFW
reveal the block suboptimality that can be used as an adaptive criterion.
First, we sample objects at each iteration of BCFW in an adaptive non-uniform
way via gapbased sampling. Second, we incorporate pairwise and away-step
variants of Frank-Wolfe into the block-coordinate setting. Third, we cache
oracle calls with a cache-hit criterion based on the block gaps. Fourth, we
provide the first method to compute an approximate regularization path for
SSVM. Finally, we provide an exhaustive empirical evaluation of all our methods
on four structured prediction datasets.
|
9,503 | 9,503 | Review of Fall Detection Techniques: A Data Availability Perspective | A fall is an abnormal activity that occurs rarely; however, missing to
identify falls can have serious health and safety implications on an
individual. Due to the rarity of occurrence of falls, there may be insufficient
or no training data available for them. Therefore, standard supervised machine
learning methods may not be directly applied to handle this problem. In this
paper, we present a taxonomy for the study of fall detection from the
perspective of availability of fall data. The proposed taxonomy is independent
of the type of sensors used and specific feature extraction/selection methods.
The taxonomy identifies different categories of classification methods for the
study of fall detection based on the availability of their data during training
the classifiers. Then, we present a comprehensive literature review within
those categories and identify the approach of treating a fall as an abnormal
activity to be a plausible research direction. We conclude our paper by
discussing several open research problems in the field and pointers for future
research.
|
9,504 | 9,504 | Unsupervised Discovery of El Nino Using Causal Feature Learning on
Microlevel Climate Data | We show that the climate phenomena of El Nino and La Nina arise naturally as
states of macro-variables when our recent causal feature learning framework
(Chalupka 2015, Chalupka 2016) is applied to micro-level measures of zonal wind
(ZW) and sea surface temperatures (SST) taken over the equatorial band of the
Pacific Ocean. The method identifies these unusual climate states on the basis
of the relation between ZW and SST patterns without any input about past
occurrences of El Nino or La Nina. The simpler alternatives of (i) clustering
the SST fields while disregarding their relationship with ZW patterns, or (ii)
clustering the joint ZW-SST patterns, do not discover El Nino. We discuss the
degree to which our method supports a causal interpretation and use a
low-dimensional toy example to explain its success over other clustering
approaches. Finally, we propose a new robust and scalable alternative to our
original algorithm (Chalupka 2016), which circumvents the need for
high-dimensional density learning.
|
9,505 | 9,505 | End-to-End Instance Segmentation with Recurrent Attention | While convolutional neural networks have gained impressive success recently
in solving structured prediction problems such as semantic segmentation, it
remains a challenge to differentiate individual object instances in the scene.
Instance segmentation is very important in a variety of applications, such as
autonomous driving, image captioning, and visual question answering. Techniques
that combine large graphical models with low-level vision have been proposed to
address this problem; however, we propose an end-to-end recurrent neural
network (RNN) architecture with an attention mechanism to model a human-like
counting process, and produce detailed instance segmentations. The network is
jointly trained to sequentially produce regions of interest as well as a
dominant object segmentation within each region. The proposed model achieves
competitive results on the CVPPP, KITTI, and Cityscapes datasets.
|
9,506 | 9,506 | Evaluating Crowdsourcing Participants in the Absence of Ground-Truth | Given a supervised/semi-supervised learning scenario where multiple
annotators are available, we consider the problem of identification of
adversarial or unreliable annotators.
|
9,507 | 9,507 | A Novel Fault Classification Scheme Based on Least Square SVM | This paper presents a novel approach for fault classification and section
identification in a series compensated transmission line based on least square
support vector machine. The current signal corresponding to one-fourth of the
post fault cycle is used as input to proposed modular LS-SVM classifier. The
proposed scheme uses four binary classifier; three for selection of three
phases and fourth for ground detection. The proposed classification scheme is
found to be accurate and reliable in presence of noise as well. The simulation
results validate the efficacy of proposed scheme for accurate classification of
fault in a series compensated transmission line.
|
9,508 | 9,508 | Training Auto-encoders Effectively via Eliminating Task-irrelevant Input
Variables | Auto-encoders are often used as building blocks of deep network classifier to
learn feature extractors, but task-irrelevant information in the input data may
lead to bad extractors and result in poor generalization performance of the
network. In this paper,via dropping the task-irrelevant input variables the
performance of auto-encoders can be obviously improved .Specifically, an
importance-based variable selection method is proposed to aim at finding the
task-irrelevant input variables and dropping them.It firstly estimates
importance of each variable,and then drops the variables with importance value
lower than a threshold. In order to obtain better performance, the method can
be employed for each layer of stacked auto-encoders. Experimental results show
that when combined with our method the stacked denoising auto-encoders achieves
significantly improved performance on three challenging datasets.
|
9,509 | 9,509 | A Neural Autoregressive Approach to Collaborative Filtering | This paper proposes CF-NADE, a neural autoregressive architecture for
collaborative filtering (CF) tasks, which is inspired by the Restricted
Boltzmann Machine (RBM) based CF model and the Neural Autoregressive
Distribution Estimator (NADE). We first describe the basic CF-NADE model for CF
tasks. Then we propose to improve the model by sharing parameters between
different ratings. A factored version of CF-NADE is also proposed for better
scalability. Furthermore, we take the ordinal nature of the preferences into
consideration and propose an ordinal cost to optimize CF-NADE, which shows
superior performance. Finally, CF-NADE can be extended to a deep model, with
only moderately increased computational complexity. Experimental results show
that CF-NADE with a single hidden layer beats all previous state-of-the-art
methods on MovieLens 1M, MovieLens 10M, and Netflix datasets, and adding more
hidden layers can further improve the performance.
|
9,510 | 9,510 | Deep convolutional neural networks for predominant instrument
recognition in polyphonic music | Identifying musical instruments in polyphonic music recordings is a
challenging but important problem in the field of music information retrieval.
It enables music search by instrument, helps recognize musical genres, or can
make music transcription easier and more accurate. In this paper, we present a
convolutional neural network framework for predominant instrument recognition
in real-world polyphonic music. We train our network from fixed-length music
excerpts with a single-labeled predominant instrument and estimate an arbitrary
number of predominant instruments from an audio signal with a variable length.
To obtain the audio-excerpt-wise result, we aggregate multiple outputs from
sliding windows over the test audio. In doing so, we investigated two different
aggregation methods: one takes the average for each instrument and the other
takes the instrument-wise sum followed by normalization. In addition, we
conducted extensive experiments on several important factors that affect the
performance, including analysis window size, identification threshold, and
activation functions for neural networks to find the optimal set of parameters.
Using a dataset of 10k audio excerpts from 11 instruments for evaluation, we
found that convolutional neural networks are more robust than conventional
methods that exploit spectral features and source separation with support
vector machines. Experimental results showed that the proposed convolutional
network architecture obtained an F1 measure of 0.602 for micro and 0.503 for
macro, respectively, achieving 19.6% and 16.4% in performance improvement
compared with other state-of-the-art algorithms.
|
9,511 | 9,511 | Kernel Mean Embedding of Distributions: A Review and Beyond | A Hilbert space embedding of a distribution---in short, a kernel mean
embedding---has recently emerged as a powerful tool for machine learning and
inference. The basic idea behind this framework is to map distributions into a
reproducing kernel Hilbert space (RKHS) in which the whole arsenal of kernel
methods can be extended to probability measures. It can be viewed as a
generalization of the original "feature map" common to support vector machines
(SVMs) and other kernel methods. While initially closely associated with the
latter, it has meanwhile found application in fields ranging from kernel
machines and probabilistic modeling to statistical inference, causal discovery,
and deep learning. The goal of this survey is to give a comprehensive review of
existing work and recent advances in this research area, and to discuss the
most challenging issues and open problems that could lead to new research
directions. The survey begins with a brief introduction to the RKHS and
positive definite kernels which forms the backbone of this survey, followed by
a thorough discussion of the Hilbert space embedding of marginal distributions,
theoretical guarantees, and a review of its applications. The embedding of
distributions enables us to apply RKHS methods to probability measures which
prompts a wide range of applications such as kernel two-sample testing,
independent testing, and learning on distributional data. Next, we discuss the
Hilbert space embedding for conditional distributions, give theoretical
insights, and review some applications. The conditional mean embedding enables
us to perform sum, product, and Bayes' rules---which are ubiquitous in
graphical model, probabilistic inference, and reinforcement learning---in a
non-parametric way. We then discuss relationships between this framework and
other related areas. Lastly, we give some suggestions on future research
directions.
|
9,512 | 9,512 | Robust Deep-Learning-Based Road-Prediction for Augmented Reality
Navigation Systems | This paper proposes an approach that predicts the road course from camera
sensors leveraging deep learning techniques. Road pixels are identified by
training a multi-scale convolutional neural network on a large number of
full-scene-labeled night-time road images including adverse weather conditions.
A framework is presented that applies the proposed approach to longer distance
road course estimation, which is the basis for an augmented reality navigation
application. In this framework long range sensor data (radar) and data from a
map database are fused with short range sensor data (camera) to produce a
precise longitudinal and lateral localization and road course estimation. The
proposed approach reliably detects roads with and without lane markings and
thus increases the robustness and availability of road course estimations and
augmented reality navigation. Evaluations on an extensive set of high precision
ground truth data taken from a differential GPS and an inertial measurement
unit show that the proposed approach reaches state-of-the-art performance
without the limitation of requiring existing lane markings.
|
9,513 | 9,513 | Attention Correctness in Neural Image Captioning | Attention mechanisms have recently been introduced in deep learning for
various tasks in natural language processing and computer vision. But despite
their popularity, the "correctness" of the implicitly-learned attention maps
has only been assessed qualitatively by visualization of several examples. In
this paper we focus on evaluating and improving the correctness of attention in
neural image captioning models. Specifically, we propose a quantitative
evaluation metric for the consistency between the generated attention maps and
human annotations, using recently released datasets with alignment between
regions in images and entities in captions. We then propose novel models with
different levels of explicit supervision for learning attention maps during
training. The supervision can be strong when alignment between regions and
caption entities are available, or weak when only object segments and
categories are provided. We show on the popular Flickr30k and COCO datasets
that introducing supervision of attention maps during training solidly improves
both attention correctness and caption quality, showing the promise of making
machine perception more human-like.
|
9,514 | 9,514 | Adaptive Learning Rate via Covariance Matrix Based Preconditioning for
Deep Neural Networks | Adaptive learning rate algorithms such as RMSProp are widely used for
training deep neural networks. RMSProp offers efficient training since it uses
first order gradients to approximate Hessian-based preconditioning. However,
since the first order gradients include noise caused by stochastic
optimization, the approximation may be inaccurate. In this paper, we propose a
novel adaptive learning rate algorithm called SDProp. Its key idea is effective
handling of the noise by preconditioning based on covariance matrix. For
various neural networks, our approach is more efficient and effective than
RMSProp and its variant.
|
9,515 | 9,515 | Horizontally Scalable Submodular Maximization | A variety of large-scale machine learning problems can be cast as instances
of constrained submodular maximization. Existing approaches for distributed
submodular maximization have a critical drawback: The capacity - number of
instances that can fit in memory - must grow with the data set size. In
practice, while one can provision many machines, the capacity of each machine
is limited by physical constraints. We propose a truly scalable approach for
distributed submodular maximization under fixed capacity. The proposed
framework applies to a broad class of algorithms and constraints and provides
theoretical guarantees on the approximation factor for any available capacity.
We empirically evaluate the proposed algorithm on a variety of data sets and
demonstrate that it achieves performance competitive with the centralized
greedy solution.
|
9,516 | 9,516 | Average-case Hardness of RIP Certification | The restricted isometry property (RIP) for design matrices gives guarantees
for optimal recovery in sparse linear models. It is of high interest in
compressed sensing and statistical learning. This property is particularly
important for computationally efficient recovery methods. As a consequence,
even though it is in general NP-hard to check that RIP holds, there have been
substantial efforts to find tractable proxies for it. These would allow the
construction of RIP matrices and the polynomial-time verification of RIP given
an arbitrary matrix. We consider the framework of average-case certifiers, that
never wrongly declare that a matrix is RIP, while being often correct for
random instances. While there are such functions which are tractable in a
suboptimal parameter regime, we show that this is a computationally hard task
in any better regime. Our results are based on a new, weaker assumption on the
problem of detecting dense subgraphs.
|
9,517 | 9,517 | Dynamic Filter Networks | In a traditional convolutional layer, the learned filters stay fixed after
training. In contrast, we introduce a new framework, the Dynamic Filter
Network, where filters are generated dynamically conditioned on an input. We
show that this architecture is a powerful one, with increased flexibility
thanks to its adaptive nature, yet without an excessive increase in the number
of model parameters. A wide variety of filtering operations can be learned this
way, including local spatial transformations, but also others like selective
(de)blurring or adaptive feature extraction. Moreover, multiple such layers can
be combined, e.g. in a recurrent architecture. We demonstrate the effectiveness
of the dynamic filter network on the tasks of video and stereo prediction, and
reach state-of-the-art performance on the moving MNIST dataset with a much
smaller model. By visualizing the learned filters, we illustrate that the
network has picked up flow information by only looking at unlabelled training
data. This suggests that the network can be used to pretrain networks for
various supervised tasks in an unsupervised way, like optical flow and depth
estimation.
|
9,518 | 9,518 | VIME: Variational Information Maximizing Exploration | Scalable and effective exploration remains a key challenge in reinforcement
learning (RL). While there are methods with optimality guarantees in the
setting of discrete state and action spaces, these methods cannot be applied in
high-dimensional deep RL scenarios. As such, most contemporary RL relies on
simple heuristics such as epsilon-greedy exploration or adding Gaussian noise
to the controls. This paper introduces Variational Information Maximizing
Exploration (VIME), an exploration strategy based on maximization of
information gain about the agent's belief of environment dynamics. We propose a
practical implementation, using variational inference in Bayesian neural
networks which efficiently handles continuous state and action spaces. VIME
modifies the MDP reward function, and can be applied with several different
underlying RL algorithms. We demonstrate that VIME achieves significantly
better performance compared to heuristic exploration methods across a variety
of continuous control tasks and algorithms, including tasks with very sparse
rewards.
|
9,519 | 9,519 | Generalized Multi-view Embedding for Visual Recognition and Cross-modal
Retrieval | In this paper, the problem of multi-view embedding from different visual cues
and modalities is considered. We propose a unified solution for subspace
learning methods using the Rayleigh quotient, which is extensible for multiple
views, supervised learning, and non-linear embeddings. Numerous methods
including Canonical Correlation Analysis, Partial Least Sqaure regression and
Linear Discriminant Analysis are studied using specific intrinsic and penalty
graphs within the same framework. Non-linear extensions based on kernels and
(deep) neural networks are derived, achieving better performance than the
linear ones. Moreover, a novel Multi-view Modular Discriminant Analysis (MvMDA)
is proposed by taking the view difference into consideration. We demonstrate
the effectiveness of the proposed multi-view embedding methods on visual object
recognition and cross-modal image retrieval, and obtain superior results in
both applications compared to related methods.
|
9,520 | 9,520 | CYCLADES: Conflict-free Asynchronous Machine Learning | We present CYCLADES, a general framework for parallelizing stochastic
optimization algorithms in a shared memory setting. CYCLADES is asynchronous
during shared model updates, and requires no memory locking mechanisms, similar
to HOGWILD!-type algorithms. Unlike HOGWILD!, CYCLADES introduces no conflicts
during the parallel execution, and offers a black-box analysis for provable
speedups across a large family of algorithms. Due to its inherent conflict-free
nature and cache locality, our multi-core implementation of CYCLADES
consistently outperforms HOGWILD!-type algorithms on sufficiently sparse
datasets, leading to up to 40% speedup gains compared to the HOGWILD!
implementation of SGD, and up to 5x gains over asynchronous implementations of
variance reduction algorithms.
|
9,521 | 9,521 | Asynchrony begets Momentum, with an Application to Deep Learning | Asynchronous methods are widely used in deep learning, but have limited
theoretical justification when applied to non-convex problems. We show that
running stochastic gradient descent (SGD) in an asynchronous manner can be
viewed as adding a momentum-like term to the SGD iteration. Our result does not
assume convexity of the objective function, so it is applicable to deep
learning systems. We observe that a standard queuing model of asynchrony
results in a form of momentum that is commonly used by deep learning
practitioners. This forges a link between queuing theory and asynchrony in deep
learning systems, which could be useful for systems builders. For convolutional
neural networks, we experimentally validate that the degree of asynchrony
directly correlates with the momentum, confirming our main result. An important
implication is that tuning the momentum parameter is important when considering
different levels of asynchrony. We assert that properly tuned momentum reduces
the number of steps required for convergence. Finally, our theory suggests new
ways of counteracting the adverse effects of asynchrony: a simple mechanism
like using negative algorithmic momentum can improve performance under high
asynchrony. Since asynchronous methods have better hardware efficiency, this
result may shed light on when asynchronous execution is more efficient for deep
learning systems.
|
9,522 | 9,522 | Adversarial Feature Learning | The ability of the Generative Adversarial Networks (GANs) framework to learn
generative models mapping from simple latent distributions to arbitrarily
complex data distributions has been demonstrated empirically, with compelling
results showing that the latent space of such generators captures semantic
variation in the data distribution. Intuitively, models trained to predict
these semantic latent representations given data may serve as useful feature
representations for auxiliary problems where semantics are relevant. However,
in their existing form, GANs have no means of learning the inverse mapping --
projecting data back into the latent space. We propose Bidirectional Generative
Adversarial Networks (BiGANs) as a means of learning this inverse mapping, and
demonstrate that the resulting learned feature representation is useful for
auxiliary supervised discrimination tasks, competitive with contemporary
approaches to unsupervised and self-supervised feature learning.
|
9,523 | 9,523 | Quantifying the probable approximation error of probabilistic inference
programs | This paper introduces a new technique for quantifying the approximation error
of a broad class of probabilistic inference programs, including ones based on
both variational and Monte Carlo approaches. The key idea is to derive a
subjective bound on the symmetrized KL divergence between the distribution
achieved by an approximate inference program and its true target distribution.
The bound's validity (and subjectivity) rests on the accuracy of two auxiliary
probabilistic programs: (i) a "reference" inference program that defines a gold
standard of accuracy and (ii) a "meta-inference" program that answers the
question "what internal random choices did the original approximate inference
program probably make given that it produced a particular result?" The paper
includes empirical results on inference problems drawn from linear regression,
Dirichlet process mixture modeling, HMMs, and Bayesian networks. The
experiments show that the technique is robust to the quality of the reference
inference program and that it can detect implementation bugs that are not
apparent from predictive performance.
|
9,524 | 9,524 | Contextual Bandits with Latent Confounders: An NMF Approach | Motivated by online recommendation and advertising systems, we consider a
causal model for stochastic contextual bandits with a latent low-dimensional
confounder. In our model, there are $L$ observed contexts and $K$ arms of the
bandit. The observed context influences the reward obtained through a latent
confounder variable with cardinality $m$ ($m \ll L,K$). The arm choice and the
latent confounder causally determines the reward while the observed context is
correlated with the confounder. Under this model, the $L \times K$ mean reward
matrix $\mathbf{U}$ (for each context in $[L]$ and each arm in $[K]$)
factorizes into non-negative factors $\mathbf{A}$ ($L \times m$) and
$\mathbf{W}$ ($m \times K$). This insight enables us to propose an
$\epsilon$-greedy NMF-Bandit algorithm that designs a sequence of interventions
(selecting specific arms), that achieves a balance between learning this
low-dimensional structure and selecting the best arm to minimize regret. Our
algorithm achieves a regret of $\mathcal{O}\left(L\mathrm{poly}(m, \log K) \log
T \right)$ at time $T$, as compared to $\mathcal{O}(LK\log T)$ for conventional
contextual bandits, assuming a constant gap between the best arm and the rest
for each context. These guarantees are obtained under mild sufficiency
conditions on the factors that are weaker versions of the well-known
Statistical RIP condition. We further propose a class of generative models that
satisfy our sufficient conditions, and derive a lower bound of
$\mathcal{O}\left(Km\log T\right)$. These are the first regret guarantees for
online matrix completion with bandit feedback, when the rank is greater than
one. We further compare the performance of our algorithm with the state of the
art, on synthetic and real world data-sets.
|
9,525 | 9,525 | Self-Paced Learning: an Implicit Regularization Perspective | Self-paced learning (SPL) mimics the cognitive mechanism of humans and
animals that gradually learns from easy to hard samples. One key issue in SPL
is to obtain better weighting strategy that is determined by minimizer
function. Existing methods usually pursue this by artificially designing the
explicit form of SPL regularizer. In this paper, we focus on the minimizer
function, and study a group of new regularizer, named self-paced implicit
regularizer that is deduced from robust loss function. Based on the convex
conjugacy theory, the minimizer function for self-paced implicit regularizer
can be directly learned from the latent loss function, while the analytic form
of the regularizer can be even known. A general framework (named SPL-IR) for
SPL is developed accordingly. We demonstrate that the learning procedure of
SPL-IR is associated with latent robust loss functions, thus can provide some
theoretical inspirations for its working mechanism. We further analyze the
relation between SPL-IR and half-quadratic optimization. Finally, we implement
SPL-IR to both supervised and unsupervised tasks, and experimental results
corroborate our ideas and demonstrate the correctness and effectiveness of
implicit regularizers.
|
9,526 | 9,526 | Efficiently Bounding Optimal Solutions after Small Data Modification in
Large-Scale Empirical Risk Minimization | We study large-scale classification problems in changing environments where a
small part of the dataset is modified, and the effect of the data modification
must be quickly incorporated into the classifier. When the entire dataset is
large, even if the amount of the data modification is fairly small, the
computational cost of re-training the classifier would be prohibitively large.
In this paper, we propose a novel method for efficiently incorporating such a
data modification effect into the classifier without actually re-training it.
The proposed method provides bounds on the unknown optimal classifier with the
cost only proportional to the size of the data modification. We demonstrate
through numerical experiments that the proposed method provides sufficiently
tight bounds with negligible computational costs, especially when a small part
of the dataset is modified in a large-scale classification problem.
|
9,527 | 9,527 | On the Troll-Trust Model for Edge Sign Prediction in Social Networks | In the problem of edge sign prediction, we are given a directed graph
(representing a social network), and our task is to predict the binary labels
of the edges (i.e., the positive or negative nature of the social
relationships). Many successful heuristics for this problem are based on the
troll-trust features, estimating at each node the fraction of outgoing and
incoming positive/negative edges. We show that these heuristics can be
understood, and rigorously analyzed, as approximators to the Bayes optimal
classifier for a simple probabilistic model of the edge labels. We then show
that the maximum likelihood estimator for this model approximately corresponds
to the predictions of a Label Propagation algorithm run on a transformed
version of the original social graph. Extensive experiments on a number of
real-world datasets show that this algorithm is competitive against
state-of-the-art classifiers in terms of both accuracy and scalability.
Finally, we show that troll-trust features can also be used to derive online
learning algorithms which have theoretical guarantees even when edges are
adversarially labeled.
|
9,528 | 9,528 | A Minimax Optimal Algorithm for Crowdsourcing | We consider the problem of accurately estimating the reliability of workers
based on noisy labels they provide, which is a fundamental question in
crowdsourcing. We propose a novel lower bound on the minimax estimation error
which applies to any estimation procedure. We further propose Triangular
Estimation (TE), an algorithm for estimating the reliability of workers. TE has
low complexity, may be implemented in a streaming setting when labels are
provided by workers in real time, and does not rely on an iterative procedure.
We further prove that TE is minimax optimal and matches our lower bound. We
conclude by assessing the performance of TE and other state-of-the-art
algorithms on both synthetic and real-world data sets.
|
9,529 | 9,529 | On a Topic Model for Sentences | Probabilistic topic models are generative models that describe the content of
documents by discovering the latent topics underlying them. However, the
structure of the textual input, and for instance the grouping of words in
coherent text spans such as sentences, contains much information which is
generally lost with these models. In this paper, we propose sentenceLDA, an
extension of LDA whose goal is to overcome this limitation by incorporating the
structure of the text in the generative and inference processes. We illustrate
the advantages of sentenceLDA by comparing it with LDA using both intrinsic
(perplexity) and extrinsic (text classification) evaluation tasks on different
text collections.
|
9,530 | 9,530 | Multi-Label Zero-Shot Learning via Concept Embedding | Zero Shot Learning (ZSL) enables a learning model to classify instances of an
unseen class during training. While most research in ZSL focuses on
single-label classification, few studies have been done in multi-label ZSL,
where an instance is associated with a set of labels simultaneously, due to the
difficulty in modeling complex semantics conveyed by a set of labels. In this
paper, we propose a novel approach to multi-label ZSL via concept embedding
learned from collections of public users' annotations of multimedia. Thanks to
concept embedding, multi-label ZSL can be done by efficiently mapping an
instance input features onto the concept embedding space in a similar manner
used in single-label ZSL. Moreover, our semantic learning model is capable of
embedding an out-of-vocabulary label by inferring its meaning from its
co-occurring labels. Thus, our approach allows both seen and unseen labels
during the concept embedding learning to be used in the aforementioned instance
mapping, which makes multi-label ZSL more flexible and suitable for real
applications. Experimental results of multi-label ZSL on images and music
tracks suggest that our approach outperforms a state-of-the-art multi-label ZSL
model and can deal with a scenario involving out-of-vocabulary labels without
re-training the semantics learning model.
|
9,531 | 9,531 | Automatic tagging using deep convolutional neural networks | We present a content-based automatic music tagging algorithm using fully
convolutional neural networks (FCNs). We evaluate different architectures
consisting of 2D convolutional layers and subsampling layers only. In the
experiments, we measure the AUC-ROC scores of the architectures with different
complexities and input types using the MagnaTagATune dataset, where a 4-layer
architecture shows state-of-the-art performance with mel-spectrogram input.
Furthermore, we evaluated the performances of the architectures with varying
the number of layers on a larger dataset (Million Song Dataset), and found that
deeper models outperformed the 4-layer architecture. The experiments show that
mel-spectrogram is an effective time-frequency representation for automatic
tagging and that more complex models benefit from more training data.
|
9,532 | 9,532 | Improved Regret Bounds for Oracle-Based Adversarial Contextual Bandits | We give an oracle-based algorithm for the adversarial contextual bandit
problem, where either contexts are drawn i.i.d. or the sequence of contexts is
known a priori, but where the losses are picked adversarially. Our algorithm is
computationally efficient, assuming access to an offline optimization oracle,
and enjoys a regret of order $O((KT)^{\frac{2}{3}}(\log N)^{\frac{1}{3}})$,
where $K$ is the number of actions, $T$ is the number of iterations and $N$ is
the number of baseline policies. Our result is the first to break the
$O(T^{\frac{3}{4}})$ barrier that is achieved by recently introduced
algorithms. Breaking this barrier was left as a major open problem. Our
analysis is based on the recent relaxation based approach of (Rakhlin and
Sridharan, 2016).
|
9,533 | 9,533 | Decoding Emotional Experience through Physiological Signal Processing | There is an increasing consensus among re- searchers that making a computer
emotionally intelligent with the ability to decode human affective states would
allow a more meaningful and natural way of human-computer interactions (HCIs).
One unobtrusive and non-invasive way of recognizing human affective states
entails the exploration of how physiological signals vary under different
emotional experiences. In particular, this paper explores the correlation
between autonomically-mediated changes in multimodal body signals and discrete
emotional states. In order to fully exploit the information in each modality,
we have provided an innovative classification approach for three specific
physiological signals including Electromyogram (EMG), Blood Volume Pressure
(BVP) and Galvanic Skin Response (GSR). These signals are analyzed as inputs to
an emotion recognition paradigm based on fusion of a series of weak learners.
Our proposed classification approach showed 88.1% recognition accuracy, which
outperformed the conventional Support Vector Machine (SVM) classifier with 17%
accuracy improvement. Furthermore, in order to avoid information redundancy and
the resultant over-fitting, a feature reduction method is proposed based on a
correlation analysis to optimize the number of features required for training
and validating each weak learner. Results showed that despite the feature space
dimensionality reduction from 27 to 18 features, our methodology preserved the
recognition accuracy of about 85.0%. This reduction in complexity will get us
one step closer towards embedding this human emotion encoder in the wireless
and wearable HCI platforms.
|
9,534 | 9,534 | Conversational Contextual Cues: The Case of Personalization and History
for Response Ranking | We investigate the task of modeling open-domain, multi-turn, unstructured,
multi-participant, conversational dialogue. We specifically study the effect of
incorporating different elements of the conversation. Unlike previous efforts,
which focused on modeling messages and responses, we extend the modeling to
long context and participant's history. Our system does not rely on handwritten
rules or engineered features; instead, we train deep neural networks on a large
conversational dataset. In particular, we exploit the structure of Reddit
comments and posts to extract 2.1 billion messages and 133 million
conversations. We evaluate our models on the task of predicting the next
response in a conversation, and we find that modeling both context and
participants improves prediction accuracy.
|
9,535 | 9,535 | Stream Clipper: Scalable Submodular Maximization on Stream | We propose a streaming submodular maximization algorithm "stream clipper"
that performs as well as the offline greedy algorithm on document/video
summarization in practice. It adds elements from a stream either to a solution
set $S$ or to an extra buffer $B$ based on two adaptive thresholds, and
improves $S$ by a final greedy step that starts from $S$ adding elements from
$B$. During this process, swapping elements out of $S$ can occur if doing so
yields improvements. The thresholds adapt based on if current memory
utilization exceeds a budget, e.g., it increases the lower threshold, and
removes from the buffer $B$ elements below the new lower threshold. We show
that, while our approximation factor in the worst case is $1/2$ (like in
previous work, and corresponding to the tight bound), we show that there are
data-dependent conditions where our bound falls within the range $[1/2,
1-1/e]$. In news and video summarization experiments, the algorithm
consistently outperforms other streaming methods, and, while using
significantly less computation and memory, performs similarly to the offline
greedy algorithm.
|
9,536 | 9,536 | Short Communication on QUIST: A Quick Clustering Algorithm | In this short communication we introduce the quick clustering algorithm
(QUIST), an efficient hierarchical clustering algorithm based on sorting. QUIST
is a poly-logarithmic divisive clustering algorithm that does not assume the
number of clusters, and/or the cluster size to be known ahead of time. It is
also insensitive to the original ordering of the input.
|
9,537 | 9,537 | Scaling Submodular Maximization via Pruned Submodularity Graphs | We propose a new random pruning method (called "submodular sparsification
(SS)") to reduce the cost of submodular maximization. The pruning is applied
via a "submodularity graph" over the $n$ ground elements, where each directed
edge is associated with a pairwise dependency defined by the submodular
function. In each step, SS prunes a $1-1/\sqrt{c}$ (for $c>1$) fraction of the
nodes using weights on edges computed based on only a small number ($O(\log
n)$) of randomly sampled nodes. The algorithm requires $\log_{\sqrt{c}}n$ steps
with a small and highly parallelizable per-step computation. An accuracy-speed
tradeoff parameter $c$, set as $c = 8$, leads to a fast shrink rate
$\sqrt{2}/4$ and small iteration complexity $\log_{2\sqrt{2}}n$. Analysis shows
that w.h.p., the greedy algorithm on the pruned set of size $O(\log^2 n)$ can
achieve a guarantee similar to that of processing the original dataset. In news
and video summarization tasks, SS is able to substantially reduce both
computational costs and memory usage, while maintaining (or even slightly
exceeding) the quality of the original (and much more costly) greedy algorithm.
|
9,538 | 9,538 | Distributed Hessian-Free Optimization for Deep Neural Network | Training deep neural network is a high dimensional and a highly non-convex
optimization problem. Stochastic gradient descent (SGD) algorithm and it's
variations are the current state-of-the-art solvers for this task. However, due
to non-covexity nature of the problem, it was observed that SGD slows down near
saddle point. Recent empirical work claim that by detecting and escaping saddle
point efficiently, it's more likely to improve training performance. With this
objective, we revisit Hessian-free optimization method for deep networks. We
also develop its distributed variant and demonstrate superior scaling potential
to SGD, which allows more efficiently utilizing larger computing resources thus
enabling large models and faster time to obtain desired solution. Furthermore,
unlike truncated Newton method (Marten's HF) that ignores negative curvature
information by using na\"ive conjugate gradient method and Gauss-Newton Hessian
approximation information - we propose a novel algorithm to explore negative
curvature direction by solving the sub-problem with stabilized bi-conjugate
method involving possible indefinite stochastic Hessian information. We show
that these techniques accelerate the training process for both the standard
MNIST dataset and also the TIMIT speech recognition problem, demonstrating
robust performance with upto an order of magnitude larger batch sizes. This
increased scaling potential is illustrated with near linear speed-up on upto 16
CPU nodes for a simple 4-layer network.
|
9,539 | 9,539 | Multi-pretrained Deep Neural Network | Pretraining is widely used in deep neutral network and one of the most famous
pretraining models is Deep Belief Network (DBN). The optimization formulas are
different during the pretraining process for different pretraining models. In
this paper, we pretrained deep neutral network by different pretraining models
and hence investigated the difference between DBN and Stacked Denoising
Autoencoder (SDA) when used as pretraining model. The experimental results show
that DBN get a better initial model. However the model converges to a
relatively worse model after the finetuning process. Yet after pretrained by
SDA for the second time the model converges to a better model if finetuned.
|
9,540 | 9,540 | Ensemble-Compression: A New Method for Parallel Training of Deep Neural
Networks | Parallelization framework has become a necessity to speed up the training of
deep neural networks (DNN) recently. Such framework typically employs the Model
Average approach, denoted as MA-DNN, in which parallel workers conduct
respective training based on their own local data while the parameters of local
models are periodically communicated and averaged to obtain a global model
which serves as the new start of local models. However, since DNN is a highly
non-convex model, averaging parameters cannot ensure that such global model can
perform better than those local models. To tackle this problem, we introduce a
new parallel training framework called Ensemble-Compression, denoted as EC-DNN.
In this framework, we propose to aggregate the local models by ensemble, i.e.,
averaging the outputs of local models instead of the parameters. As most of
prevalent loss functions are convex to the output of DNN, the performance of
ensemble-based global model is guaranteed to be at least as good as the average
performance of local models. However, a big challenge lies in the explosion of
model size since each round of ensemble can give rise to multiple times size
increment. Thus, we carry out model compression after each ensemble,
specialized by a distillation based method in this paper, to reduce the size of
the global model to be the same as the local ones. Our experimental results
demonstrate the prominent advantage of EC-DNN over MA-DNN in terms of both
accuracy and speedup.
|
9,541 | 9,541 | Source-LDA: Enhancing probabilistic topic models using prior knowledge
sources | A popular approach to topic modeling involves extracting co-occurring n-grams
of a corpus into semantic themes. The set of n-grams in a theme represents an
underlying topic, but most topic modeling approaches are not able to label
these sets of words with a single n-gram. Such labels are useful for topic
identification in summarization systems. This paper introduces a novel approach
to labeling a group of n-grams comprising an individual topic. The approach
taken is to complement the existing topic distributions over words with a known
distribution based on a predefined set of topics. This is done by integrating
existing labeled knowledge sources representing known potential topics into the
probabilistic topic model. These knowledge sources are translated into a
distribution and used to set the hyperparameters of the Dirichlet generated
distribution over words. In the inference these modified distributions guide
the convergence of the latent topics to conform with the complementary
distributions. This approach ensures that the topic inference process is
consistent with existing knowledge. The label assignment from the complementary
knowledge sources are then transferred to the latent topics of the corpus. The
results show both accurate label assignment to topics as well as improved topic
generation than those obtained using various labeling approaches based off
Latent Dirichlet allocation (LDA).
|
9,542 | 9,542 | Variance-Reduced Proximal Stochastic Gradient Descent for Non-convex
Composite optimization | Here we study non-convex composite optimization: first, a finite-sum of
smooth but non-convex functions, and second, a general function that admits a
simple proximal mapping. Most research on stochastic methods for composite
optimization assumes convexity or strong convexity of each function. In this
paper, we extend this problem into the non-convex setting using variance
reduction techniques, such as prox-SVRG and prox-SAGA. We prove that, with a
constant step size, both prox-SVRG and prox-SAGA are suitable for non-convex
composite optimization, and help the problem converge to a stationary point
within $O(1/\epsilon)$ iterations. That is similar to the convergence rate seen
with the state-of-the-art RSAG method and faster than stochastic gradient
descent. Our analysis is also extended into the min-batch setting, which
linearly accelerates the convergence. To the best of our knowledge, this is the
first analysis of convergence rate of variance-reduced proximal stochastic
gradient for non-convex composite optimization.
|
9,543 | 9,543 | Recursive Autoconvolution for Unsupervised Learning of Convolutional
Neural Networks | In visual recognition tasks, such as image classification, unsupervised
learning exploits cheap unlabeled data and can help to solve these tasks more
efficiently. We show that the recursive autoconvolution operator, adopted from
physics, boosts existing unsupervised methods by learning more discriminative
filters. We take well established convolutional neural networks and train their
filters layer-wise. In addition, based on previous works we design a network
which extracts more than 600k features per sample, but with the total number of
trainable parameters greatly reduced by introducing shared filters in higher
layers. We evaluate our networks on the MNIST, CIFAR-10, CIFAR-100 and STL-10
image classification benchmarks and report several state of the art results
among other unsupervised methods.
|
9,544 | 9,544 | Adversarially Learned Inference | We introduce the adversarially learned inference (ALI) model, which jointly
learns a generation network and an inference network using an adversarial
process. The generation network maps samples from stochastic latent variables
to the data space while the inference network maps training examples in data
space to the space of latent variables. An adversarial game is cast between
these two networks and a discriminative network is trained to distinguish
between joint latent/data-space samples from the generative network and joint
samples from the inference network. We illustrate the ability of the model to
learn mutually coherent inference and generation networks through the
inspections of model samples and reconstructions and confirm the usefulness of
the learned representations by obtaining a performance competitive with
state-of-the-art on the semi-supervised SVHN and CIFAR10 tasks.
|
9,545 | 9,545 | f-GAN: Training Generative Neural Samplers using Variational Divergence
Minimization | Generative neural samplers are probabilistic models that implement sampling
using feedforward neural networks: they take a random input vector and produce
a sample from a probability distribution defined by the network weights. These
models are expressive and allow efficient computation of samples and
derivatives, but cannot be used for computing likelihoods or for
marginalization. The generative-adversarial training method allows to train
such models through the use of an auxiliary discriminative neural network. We
show that the generative-adversarial approach is a special case of an existing
more general variational divergence estimation approach. We show that any
f-divergence can be used for training generative neural samplers. We discuss
the benefits of various choices of divergence functions on training complexity
and the quality of the obtained generative models.
|
9,546 | 9,546 | Differentially Private Gaussian Processes | A major challenge for machine learning is increasing the availability of data
while respecting the privacy of individuals. Here we combine the provable
privacy guarantees of the differential privacy framework with the flexibility
of Gaussian processes (GPs). We propose a method using GPs to provide
differentially private (DP) regression. We then improve this method by crafting
the DP noise covariance structure to efficiently protect the training data,
while minimising the scale of the added noise. We find that this cloaking
method achieves the greatest accuracy, while still providing privacy
guarantees, and offers practical DP for regression over multi-dimensional
inputs. Together these methods provide a starter toolkit for combining
differential privacy and GPs.
|
9,547 | 9,547 | Stochastic Structured Prediction under Bandit Feedback | Stochastic structured prediction under bandit feedback follows a learning
protocol where on each of a sequence of iterations, the learner receives an
input, predicts an output structure, and receives partial feedback in form of a
task loss evaluation of the predicted structure. We present applications of
this learning scenario to convex and non-convex objectives for structured
prediction and analyze them as stochastic first-order methods. We present an
experimental evaluation on problems of natural language processing over
exponential output spaces, and compare convergence speed across different
objectives under the practical criterion of optimal task performance on
development data and the optimization-theoretic criterion of minimal squared
gradient norm. Best results under both criteria are obtained for a non-convex
objective for pairwise preference learning under bandit feedback.
|
9,548 | 9,548 | Multiresolution Recurrent Neural Networks: An Application to Dialogue
Response Generation | We introduce the multiresolution recurrent neural network, which extends the
sequence-to-sequence framework to model natural language generation as two
parallel discrete stochastic processes: a sequence of high-level coarse tokens,
and a sequence of natural language tokens. There are many ways to estimate or
learn the high-level coarse tokens, but we argue that a simple extraction
procedure is sufficient to capture a wealth of high-level discourse semantics.
Such procedure allows training the multiresolution recurrent neural network by
maximizing the exact joint log-likelihood over both sequences. In contrast to
the standard log- likelihood objective w.r.t. natural language tokens (word
perplexity), optimizing the joint log-likelihood biases the model towards
modeling high-level abstractions. We apply the proposed model to the task of
dialogue response generation in two challenging domains: the Ubuntu technical
support domain, and Twitter conversations. On Ubuntu, the model outperforms
competing approaches by a substantial margin, achieving state-of-the-art
results according to both automatic evaluation metrics and a human evaluation
study. On Twitter, the model appears to generate more relevant and on-topic
responses according to automatic evaluation metrics. Finally, our experiments
demonstrate that the proposed model is more adept at overcoming the sparsity of
natural language and is better able to capture long-term structure.
|
9,549 | 9,549 | Post-Inference Prior Swapping | While Bayesian methods are praised for their ability to incorporate useful
prior knowledge, in practice, convenient priors that allow for computationally
cheap or tractable inference are commonly used. In this paper, we investigate
the following question: for a given model, is it possible to compute an
inference result with any convenient false prior, and afterwards, given any
target prior of interest, quickly transform this result into the target
posterior? A potential solution is to use importance sampling (IS). However, we
demonstrate that IS will fail for many choices of the target prior, depending
on its parametric form and similarity to the false prior. Instead, we propose
prior swapping, a method that leverages the pre-inferred false posterior to
efficiently generate accurate posterior samples under arbitrary target priors.
Prior swapping lets us apply less-costly inference algorithms to certain
models, and incorporate new or updated prior information "post-inference". We
give theoretical guarantees about our method, and demonstrate it empirically on
a number of models and priors.
|
9,550 | 9,550 | Sequential Principal Curves Analysis | This work includes all the technical details of the Sequential Principal
Curves Analysis (SPCA) in a single document. SPCA is an unsupervised nonlinear
and invertible feature extraction technique. The identified curvilinear
features can be interpreted as a set of nonlinear sensors: the response of each
sensor is the projection onto the corresponding feature. Moreover, it can be
easily tuned for different optimization criteria; e.g. infomax, error
minimization, decorrelation; by choosing the right way to measure distances
along each curvilinear feature. Even though proposed in [Laparra et al. Neural
Comp. 12] and shown to work in multiple modalities in [Laparra and Malo
Frontiers Hum. Neuro. 15], the SPCA framework has its original roots in the
nonlinear ICA algorithm in [Malo and Gutierrez Network 06]. Later on, the SPCA
philosophy for nonlinear generalization of PCA originated substantially faster
alternatives at the cost of introducing different constraints in the model.
Namely, the Principal Polynomial Analysis (PPA) [Laparra et al. IJNS 14], and
the Dimensionality Reduction via Regression (DRR) [Laparra et al. IEEE TGRS
15]. This report illustrates the reasons why we developed such family and is
the appropriate technical companion for the missing details in [Laparra et al.,
NeCo 12, Laparra and Malo, Front.Hum.Neuro. 15]. See also the data, code and
examples in the dedicated sites http://isp.uv.es/spca.html and
http://isp.uv.es/after effects.html
|
9,551 | 9,551 | Unified Framework for Quantification | Quantification is the machine learning task of estimating test-data class
proportions that are not necessarily similar to those in training. Apart from
its intrinsic value as an aggregate statistic, quantification output can also
be used to optimize classifier probabilities, thereby increasing classification
accuracy. We unify major quantification approaches under a constrained
multi-variate regression framework, and use mathematical programming to
estimate class proportions for different loss functions. With this modeling
approach, we extend existing binary-only quantification approaches to
multi-class settings as well. We empirically verify our unified framework by
experimenting with several multi-class datasets including the Stanford
Sentiment Treebank and CIFAR-10.
|
9,552 | 9,552 | Multi-Organ Cancer Classification and Survival Analysis | Accurate and robust cell nuclei classification is the cornerstone for a wider
range of tasks in digital and Computational Pathology. However, most machine
learning systems require extensive labeling from expert pathologists for each
individual problem at hand, with no or limited abilities for knowledge transfer
between datasets and organ sites. In this paper we implement and evaluate a
variety of deep neural network models and model ensembles for nuclei
classification in renal cell cancer (RCC) and prostate cancer (PCa). We propose
a convolutional neural network system based on residual learning which
significantly improves over the state-of-the-art in cell nuclei classification.
Finally, we show that the combination of tissue types during training increases
not only classification accuracy but also overall survival analysis.
|
9,553 | 9,553 | Distributed Cooperative Decision-Making in Multiarmed Bandits:
Frequentist and Bayesian Algorithms | We study distributed cooperative decision-making under the explore-exploit
tradeoff in the multiarmed bandit (MAB) problem. We extend the state-of-the-art
frequentist and Bayesian algorithms for single-agent MAB problems to
cooperative distributed algorithms for multi-agent MAB problems in which agents
communicate according to a fixed network graph. We rely on a running consensus
algorithm for each agent's estimation of mean rewards from its own rewards and
the estimated rewards of its neighbors. We prove the performance of these
algorithms and show that they asymptotically recover the performance of a
centralized agent. Further, we rigorously characterize the influence of the
communication graph structure on the decision-making performance of the group.
|
9,554 | 9,554 | Towards a Job Title Classification System | Document classification for text, images and other applicable entities has
long been a focus of research in academia and also finds application in many
industrial settings. Amidst a plethora of approaches to solve such problems,
machine-learning techniques have found success in a variety of scenarios. In
this paper we discuss the design of a machine learning-based semi-supervised
job title classification system for the online job recruitment domain currently
in production at CareerBuilder.com and propose enhancements to it. The system
leverages a varied collection of classification as well clustering algorithms.
These algorithms are encompassed in an architecture that facilitates leveraging
existing off-the-shelf machine learning tools and techniques while keeping into
consideration the challenges of constructing a scalable classification system
for a large taxonomy of categories. As a continuously evolving system that is
still under development we first discuss the existing semi-supervised
classification system which is composed of both clustering and classification
components in a proximity-based classifier setup and results of which are
already used across numerous products at CareerBuilder. We then elucidate our
long-term goals for job title classification and propose enhancements to the
existing system in the form of a two-stage coarse and fine level classifier
augmentation to construct a cascade of hierarchical vertical classifiers.
Preliminary results are presented using experimental evaluation on real world
industrial data.
|
9,555 | 9,555 | Convolutional Imputation of Matrix Networks | A matrix network is a family of matrices, with relatedness modeled by a
weighted graph. We consider the task of completing a partially observed matrix
network. We assume a novel sampling scheme where a fraction of matrices might
be completely unobserved. How can we recover the entire matrix network from
incomplete observations? This mathematical problem arises in many applications
including medical imaging and social networks.
To recover the matrix network, we propose a structural assumption that the
matrices have a graph Fourier transform which is low-rank. We formulate a
convex optimization problem and prove an exact recovery guarantee for the
optimization problem. Furthermore, we numerically characterize the exact
recovery regime for varying rank and sampling rate and discover a new phase
transition phenomenon. Then we give an iterative imputation algorithm to
efficiently solve the optimization problem and complete large scale matrix
networks. We demonstrate the algorithm with a variety of applications such as
MRI and Facebook user network.
|
9,556 | 9,556 | Comparison of 14 different families of classification algorithms on 115
binary datasets | We tested 14 very different classification algorithms (random forest,
gradient boosting machines, SVM - linear, polynomial, and RBF - 1-hidden-layer
neural nets, extreme learning machines, k-nearest neighbors and a bagging of
knn, naive Bayes, learning vector quantization, elastic net logistic
regression, sparse linear discriminant analysis, and a boosting of linear
classifiers) on 115 real life binary datasets. We followed the Demsar analysis
and found that the three best classifiers (random forest, gbm and RBF SVM) are
not significantly different from each other. We also discuss that a change of
less then 0.0112 in the error rate should be considered as an irrelevant
change, and used a Bayesian ANOVA analysis to conclude that with high
probability the differences between these three classifiers is not of practical
consequence. We also verified the execution time of "standard implementations"
of these algorithms and concluded that RBF SVM is the fastest (significantly
so) both in training time and in training plus testing time.
|
9,557 | 9,557 | Smooth Imitation Learning for Online Sequence Prediction | We study the problem of smooth imitation learning for online sequence
prediction, where the goal is to train a policy that can smoothly imitate
demonstrated behavior in a dynamic and continuous environment in response to
online, sequential context input. Since the mapping from context to behavior is
often complex, we take a learning reduction approach to reduce smooth imitation
learning to a regression problem using complex function classes that are
regularized to ensure smoothness. We present a learning meta-algorithm that
achieves fast and stable convergence to a good policy. Our approach enjoys
several attractive properties, including being fully deterministic, employing
an adaptive learning rate that can provably yield larger policy improvements
compared to previous approaches, and the ability to ensure stable convergence.
Our empirical results demonstrate significant performance gains over previous
approaches.
|
9,558 | 9,558 | Synthesizing Dynamic Patterns by Spatial-Temporal Generative ConvNet | Video sequences contain rich dynamic patterns, such as dynamic texture
patterns that exhibit stationarity in the temporal domain, and action patterns
that are non-stationary in either spatial or temporal domain. We show that a
spatial-temporal generative ConvNet can be used to model and synthesize dynamic
patterns. The model defines a probability distribution on the video sequence,
and the log probability is defined by a spatial-temporal ConvNet that consists
of multiple layers of spatial-temporal filters to capture spatial-temporal
patterns of different scales. The model can be learned from the training video
sequences by an "analysis by synthesis" learning algorithm that iterates the
following two steps. Step 1 synthesizes video sequences from the currently
learned model. Step 2 then updates the model parameters based on the difference
between the synthesized video sequences and the observed training sequences. We
show that the learning algorithm can synthesize realistic dynamic patterns.
|
9,559 | 9,559 | A Graph-Based Semi-Supervised k Nearest-Neighbor Method for Nonlinear
Manifold Distributed Data Classification | $k$ Nearest Neighbors ($k$NN) is one of the most widely used supervised
learning algorithms to classify Gaussian distributed data, but it does not
achieve good results when it is applied to nonlinear manifold distributed data,
especially when a very limited amount of labeled samples are available. In this
paper, we propose a new graph-based $k$NN algorithm which can effectively
handle both Gaussian distributed data and nonlinear manifold distributed data.
To achieve this goal, we first propose a constrained Tired Random Walk (TRW) by
constructing an $R$-level nearest-neighbor strengthened tree over the graph,
and then compute a TRW matrix for similarity measurement purposes. After this,
the nearest neighbors are identified according to the TRW matrix and the class
label of a query point is determined by the sum of all the TRW weights of its
nearest neighbors. To deal with online situations, we also propose a new
algorithm to handle sequential samples based a local neighborhood
reconstruction. Comparison experiments are conducted on both synthetic data
sets and real-world data sets to demonstrate the validity of the proposed new
$k$NN algorithm and its improvements to other version of $k$NN algorithms.
Given the widespread appearance of manifold structures in real-world problems
and the popularity of the traditional $k$NN algorithm, the proposed manifold
version $k$NN shows promising potential for classifying manifold-distributed
data.
|
9,560 | 9,560 | Machine Learning for E-mail Spam Filtering: Review,Techniques and Trends | We present a comprehensive review of the most effective content-based e-mail
spam filtering techniques. We focus primarily on Machine Learning-based spam
filters and their variants, and report on a broad review ranging from surveying
the relevant ideas, efforts, effectiveness, and the current progress. The
initial exposition of the background examines the basics of e-mail spam
filtering, the evolving nature of spam, spammers playing cat-and-mouse with
e-mail service providers (ESPs), and the Machine Learning front in fighting
spam. We conclude by measuring the impact of Machine Learning-based filters and
explore the promising offshoots of latest developments.
|
9,561 | 9,561 | Difference of Convex Functions Programming Applied to Control with
Expert Data | This paper reports applications of Difference of Convex functions (DC)
programming to Learning from Demonstrations (LfD) and Reinforcement Learning
(RL) with expert data. This is made possible because the norm of the Optimal
Bellman Residual (OBR), which is at the heart of many RL and LfD algorithms, is
DC. Improvement in performance is demonstrated on two specific algorithms,
namely Reward-regularized Classification for Apprenticeship Learning (RCAL) and
Reinforcement Learning with Expert Demonstrations (RLED), through experiments
on generic Markov Decision Processes (MDP), called Garnets.
|
9,562 | 9,562 | On Valid Optimal Assignment Kernels and Applications to Graph
Classification | The success of kernel methods has initiated the design of novel positive
semidefinite functions, in particular for structured data. A leading design
paradigm for this is the convolution kernel, which decomposes structured
objects into their parts and sums over all pairs of parts. Assignment kernels,
in contrast, are obtained from an optimal bijection between parts, which can
provide a more valid notion of similarity. In general however, optimal
assignments yield indefinite functions, which complicates their use in kernel
methods. We characterize a class of base kernels used to compare parts that
guarantees positive semidefinite optimal assignment kernels. These base kernels
give rise to hierarchies from which the optimal assignment kernels are computed
in linear time by histogram intersection. We apply these results by developing
the Weisfeiler-Lehman optimal assignment kernel for graphs. It provides high
classification accuracy on widely-used benchmark data sets improving over the
original Weisfeiler-Lehman kernel.
|
9,563 | 9,563 | Robust Ensemble Clustering Using Probability Trajectories | Although many successful ensemble clustering approaches have been developed
in recent years, there are still two limitations to most of the existing
approaches. First, they mostly overlook the issue of uncertain links, which may
mislead the overall consensus process. Second, they generally lack the ability
to incorporate global information to refine the local links. To address these
two limitations, in this paper, we propose a novel ensemble clustering approach
based on sparse graph representation and probability trajectory analysis. In
particular, we present the elite neighbor selection strategy to identify the
uncertain links by locally adaptive thresholds and build a sparse graph with a
small number of probably reliable links. We argue that a small number of
probably reliable links can lead to significantly better consensus results than
using all graph links regardless of their reliability. The random walk process
driven by a new transition probability matrix is utilized to explore the global
information in the graph. We derive a novel and dense similarity measure from
the sparse graph by analyzing the probability trajectories of the random
walkers, based on which two consensus functions are further proposed.
Experimental results on multiple real-world datasets demonstrate the
effectiveness and efficiency of our approach.
|
9,564 | 9,564 | Dense Associative Memory for Pattern Recognition | A model of associative memory is studied, which stores and reliably retrieves
many more patterns than the number of neurons in the network. We propose a
simple duality between this dense associative memory and neural networks
commonly used in deep learning. On the associative memory side of this duality,
a family of models that smoothly interpolates between two limiting cases can be
constructed. One limit is referred to as the feature-matching mode of pattern
recognition, and the other one as the prototype regime. On the deep learning
side of the duality, this family corresponds to feedforward neural networks
with one hidden layer and various activation functions, which transmit the
activities of the visible neurons to the hidden layer. This family of
activation functions includes logistics, rectified linear units, and rectified
polynomials of higher degrees. The proposed duality makes it possible to apply
energy-based intuition from associative memory to analyze computational
properties of neural networks with unusual activation functions - the higher
rectified polynomials which until now have not been used in deep learning. The
utility of the dense memories is illustrated for two test cases: the logical
gate XOR and the recognition of handwritten digits from the MNIST data set.
|
9,565 | 9,565 | Generalizing the Convolution Operator to extend CNNs to Irregular
Domains | Convolutional Neural Networks (CNNs) have become the state-of-the-art in
supervised learning vision tasks. Their convolutional filters are of paramount
importance for they allow to learn patterns while disregarding their locations
in input images. When facing highly irregular domains, generalized
convolutional operators based on an underlying graph structure have been
proposed. However, these operators do not exactly match standard ones on grid
graphs, and introduce unwanted additional invariance (e.g. with regards to
rotations). We propose a novel approach to generalize CNNs to irregular domains
using weight sharing and graph-based operators. Using experiments, we show that
these models resemble CNNs on regular domains and offer better performance than
multilayer perceptrons on distorded ones.
|
9,566 | 9,566 | Infant directed speech is consistent with teaching | Infant-directed speech (IDS) has distinctive properties that differ from
adult-directed speech (ADS). Why it has these properties -- and whether they
are intended to facilitate language learning -- is matter of contention. We
argue that much of this disagreement stems from lack of a formal, guiding
theory of how phonetic categories should best be taught to infant-like
learners. In the absence of such a theory, researchers have relied on
intuitions about learning to guide the argument. We use a formal theory of
teaching, validated through experiments in other domains, as the basis for a
detailed analysis of whether IDS is well-designed for teaching phonetic
categories. Using the theory, we generate ideal data for teaching phonetic
categories in English. We qualitatively compare the simulated teaching data
with human IDS, finding that the teaching data exhibit many features of IDS,
including some that have been taken as evidence IDS is not for teaching. The
simulated data reveal potential pitfalls for experimentalists exploring the
role of IDS in language learning. Focusing on different formants and phoneme
sets leads to different conclusions, and the benefit of the teaching data to
learners is not apparent until a sufficient number of examples have been
provided. Finally, we investigate transfer of IDS to learning ADS. The teaching
data improves classification of ADS data, but only for the learner they were
generated to teach; not universally across all classes of learner. This
research offers a theoretically-grounded framework that empowers
experimentalists to systematically evaluate whether IDS is for teaching.
|
9,567 | 9,567 | Distributed stochastic optimization via matrix exponential learning | In this paper, we investigate a distributed learning scheme for a broad class
of stochastic optimization problems and games that arise in signal processing
and wireless communications. The proposed algorithm relies on the method of
matrix exponential learning (MXL) and only requires locally computable gradient
observations that are possibly imperfect and/or obsolete. To analyze it, we
introduce the notion of a stable Nash equilibrium and we show that the
algorithm is globally convergent to such equilibria - or locally convergent
when an equilibrium is only locally stable. We also derive an explicit linear
bound for the algorithm's convergence speed, which remains valid under
measurement errors and uncertainty of arbitrarily high variance. To validate
our theoretical analysis, we test the algorithm in realistic
multi-carrier/multiple-antenna wireless scenarios where several users seek to
maximize their energy efficiency. Our results show that learning allows users
to attain a net increase between 100% and 500% in energy efficiency, even under
very high uncertainty.
|
9,568 | 9,568 | Minimizing Regret on Reflexive Banach Spaces and Learning Nash
Equilibria in Continuous Zero-Sum Games | We study a general version of the adversarial online learning problem. We are
given a decision set $\mathcal{X}$ in a reflexive Banach space $X$ and a
sequence of reward vectors in the dual space of $X$. At each iteration, we
choose an action from $\mathcal{X}$, based on the observed sequence of previous
rewards. Our goal is to minimize regret, defined as the gap between the
realized reward and the reward of the best fixed action in hindsight. Using
results from infinite dimensional convex analysis, we generalize the method of
Dual Averaging (or Follow the Regularized Leader) to our setting and obtain
general upper bounds on the worst-case regret that subsume a wide range of
results from the literature. Under the assumption of uniformly continuous
rewards, we obtain explicit anytime regret bounds in a setting where the
decision set is the set of probability distributions on a compact metric space
$S$ whose Radon-Nikodym derivatives are elements of $L^p(S)$ for some $p > 1$.
Importantly, we make no convexity assumptions on either the set $S$ or the
reward functions. We also prove a general lower bound on the worst-case regret
for any online algorithm. We then apply these results to the problem of
learning in repeated continuous two-player zero-sum games, in which players'
strategy sets are compact metric spaces. In doing so, we first prove that if
both players play a Hannan-consistent strategy, then with probability 1 the
empirical distributions of play weakly converge to the set of Nash equilibria
of the game. We then show that, under mild assumptions, Dual Averaging on the
(infinite-dimensional) space of probability distributions indeed achieves
Hannan-consistency. Finally, we illustrate our results through numerical
examples.
|
9,569 | 9,569 | End-to-end LSTM-based dialog control optimized with supervised and
reinforcement learning | This paper presents a model for end-to-end learning of task-oriented dialog
systems. The main component of the model is a recurrent neural network (an
LSTM), which maps from raw dialog history directly to a distribution over
system actions. The LSTM automatically infers a representation of dialog
history, which relieves the system developer of much of the manual feature
engineering of dialog state. In addition, the developer can provide software
that expresses business rules and provides access to programmatic APIs,
enabling the LSTM to take actions in the real world on behalf of the user. The
LSTM can be optimized using supervised learning (SL), where a domain expert
provides example dialogs which the LSTM should imitate; or using reinforcement
learning (RL), where the system improves by interacting directly with end
users. Experiments show that SL and RL are complementary: SL alone can derive a
reasonable initial policy from a small number of training dialogs; and starting
RL optimization with a policy trained with SL substantially accelerates the
learning rate of RL.
|
9,570 | 9,570 | Predicting with Distributions | We consider a new learning model in which a joint distribution over vector
pairs $(x,y)$ is determined by an unknown function $c(x)$ that maps input
vectors $x$ not to individual outputs, but to entire {\em distributions\/} over
output vectors $y$. Our main results take the form of rather general reductions
from our model to algorithms for PAC learning the function class and the
distribution class separately, and show that virtually every such combination
yields an efficient algorithm in our model. Our methods include a randomized
reduction to classification noise and an application of Le Cam's method to
obtain robust learning algorithms.
|
9,571 | 9,571 | Dependency Parsing as Head Selection | Conventional graph-based dependency parsers guarantee a tree structure both
during training and inference. Instead, we formalize dependency parsing as the
problem of independently selecting the head of each word in a sentence. Our
model which we call \textsc{DeNSe} (as shorthand for {\bf De}pendency {\bf
N}eural {\bf Se}lection) produces a distribution over possible heads for each
word using features obtained from a bidirectional recurrent neural network.
Without enforcing structural constraints during training, \textsc{DeNSe}
generates (at inference time) trees for the overwhelming majority of sentences,
while non-tree outputs can be adjusted with a maximum spanning tree algorithm.
We evaluate \textsc{DeNSe} on four languages (English, Chinese, Czech, and
German) with varying degrees of non-projectivity. Despite the simplicity of the
approach, our parsers are on par with the state of the art.
|
9,572 | 9,572 | Zoneout: Regularizing RNNs by Randomly Preserving Hidden Activations | We propose zoneout, a novel method for regularizing RNNs. At each timestep,
zoneout stochastically forces some hidden units to maintain their previous
values. Like dropout, zoneout uses random noise to train a pseudo-ensemble,
improving generalization. But by preserving instead of dropping hidden units,
gradient information and state information are more readily propagated through
time, as in feedforward stochastic depth networks. We perform an empirical
investigation of various RNN regularizers, and find that zoneout gives
significant performance improvements across tasks. We achieve competitive
results with relatively simple models in character- and word-level language
modelling on the Penn Treebank and Text8 datasets, and combining with recurrent
batch normalization yields state-of-the-art results on permuted sequential
MNIST.
|
9,573 | 9,573 | Distance Metric Ensemble Learning and the Andrews-Curtis Conjecture | Motivated by the search for a counterexample to the Poincar\'e conjecture in
three and four dimensions, the Andrews-Curtis conjecture was proposed in 1965.
It is now generally suspected that the Andrews-Curtis conjecture is false, but
small potential counterexamples are not so numerous, and previous work has
attempted to eliminate some via combinatorial search. Progress has however been
limited, with the most successful approach (breadth-first-search using
secondary storage) being neither scalable nor heuristically-informed. A
previous empirical analysis of problem structure examined several heuristic
measures of search progress and determined that none of them provided any
useful guidance for search. In this article, we induce new quality measures
directly from the problem structure and combine them to produce a more
effective search driver via ensemble machine learning. By this means, we
eliminate 19 potential counterexamples, the status of which had been unknown
for some years.
|
9,574 | 9,574 | Deep Q-Networks for Accelerating the Training of Deep Neural Networks | In this paper, we propose a principled deep reinforcement learning (RL)
approach that is able to accelerate the convergence rate of general deep neural
networks (DNNs). With our approach, a deep RL agent (synonym for optimizer in
this work) is used to automatically learn policies about how to schedule
learning rates during the optimization of a DNN. The state features of the
agent are learned from the weight statistics of the optimizee during training.
The reward function of this agent is designed to learn policies that minimize
the optimizee's training time given a certain performance goal. The actions of
the agent correspond to changing the learning rate for the optimizee during
training. As far as we know, this is the first attempt to use deep RL to learn
how to optimize a large-sized DNN. We perform extensive experiments on a
standard benchmark dataset and demonstrate the effectiveness of the policies
learned by our approach.
|
9,575 | 9,575 | Bounds for Vector-Valued Function Estimation | We present a framework to derive risk bounds for vector-valued learning with
a broad class of feature maps and loss functions. Multi-task learning and
one-vs-all multi-category learning are treated as examples. We discuss in
detail vector-valued functions with one hidden layer, and demonstrate that the
conditions under which shared representations are beneficial for multi- task
learning are equally applicable to multi-category learning.
|
9,576 | 9,576 | Adaptive Submodular Ranking and Routing | We study a general stochastic ranking problem where an algorithm needs to
adaptively select a sequence of elements so as to "cover" a random scenario
(drawn from a known distribution) at minimum expected cost. The coverage of
each scenario is captured by an individual submodular function, where the
scenario is said to be covered when its function value goes above a given
threshold. We obtain a logarithmic factor approximation algorithm for this
adaptive ranking problem, which is the best possible (unless P=NP). This
problem unifies and generalizes many previously studied problems with
applications in search ranking and active learning. The approximation ratio of
our algorithm either matches or improves the best result known in each of these
special cases. Furthermore, we extend our results to an adaptive vehicle
routing problem, where costs are determined by an underlying metric. This
routing problem is a significant generalization of the previously-studied
adaptive traveling salesman and traveling repairman problems. Our approximation
ratio nearly matches the best bound known for these special cases. Finally, we
present experimental results for some applications of adaptive ranking.
|
9,577 | 9,577 | OpenAI Gym | OpenAI Gym is a toolkit for reinforcement learning research. It includes a
growing collection of benchmark problems that expose a common interface, and a
website where people can share their results and compare the performance of
algorithms. This whitepaper discusses the components of OpenAI Gym and the
design decisions that went into the software.
|
9,578 | 9,578 | Gated-Attention Readers for Text Comprehension | In this paper we study the problem of answering cloze-style questions over
documents. Our model, the Gated-Attention (GA) Reader, integrates a multi-hop
architecture with a novel attention mechanism, which is based on multiplicative
interactions between the query embedding and the intermediate states of a
recurrent neural network document reader. This enables the reader to build
query-specific representations of tokens in the document for accurate answer
selection. The GA Reader obtains state-of-the-art results on three benchmarks
for this task--the CNN \& Daily Mail news stories and the Who Did What dataset.
The effectiveness of multiplicative interaction is demonstrated by an ablation
study, and by comparing to alternative compositional operators for implementing
the gated-attention. The code is available at
https://github.com/bdhingra/ga-reader.
|
9,579 | 9,579 | Active Regression with Adaptive Huber Loss | This paper addresses the scalar regression problem through a novel solution
to exactly optimize the Huber loss in a general semi-supervised setting, which
combines multi-view learning and manifold regularization. We propose a
principled algorithm to 1) avoid computationally expensive iterative schemes
while 2) adapting the Huber loss threshold in a data-driven fashion and 3)
actively balancing the use of labelled data to remove noisy or inconsistent
annotations at the training stage. In a wide experimental evaluation, dealing
with diverse applications, we assess the superiority of our paradigm which is
able to combine robustness towards noise with both strong performance and low
computational cost.
|
9,580 | 9,580 | Semi-Supervised Learning with Generative Adversarial Networks | We extend Generative Adversarial Networks (GANs) to the semi-supervised
context by forcing the discriminator network to output class labels. We train a
generative model G and a discriminator D on a dataset with inputs belonging to
one of N classes. At training time, D is made to predict which of N+1 classes
the input belongs to, where an extra class is added to correspond to the
outputs of G. We show that this method can be used to create a more
data-efficient classifier and that it allows for generating higher quality
samples than a regular GAN.
|
9,581 | 9,581 | Curie: A method for protecting SVM Classifier from Poisoning Attack | Machine learning is used in a number of security related applications such as
biometric user authentication, speaker identification etc. A type of causative
integrity attack against machine learning called Poisoning attack works by
injecting specially crafted data points in the training data so as to increase
the false positive rate of the classifier. In the context of the biometric
authentication, this means that more intruders will be classified as valid
user, and in case of speaker identification system, user A will be classified
user B. In this paper, we examine poisoning attack against SVM and introduce -
Curie - a method to protect the SVM classifier from the poisoning attack. The
basic idea of our method is to identify the poisoned data points injected by
the adversary and filter them out. Our method is light weight and can be easily
integrated into existing systems. Experimental results show that it works very
well in filtering out the poisoned data.
|
9,582 | 9,582 | A Deep-Learning Approach for Operation of an Automated Realtime Flare
Forecast | Automated forecasts serve important role in space weather science, by
providing statistical insights to flare-trigger mechanisms, and by enabling
tailor-made forecasts and high-frequency forecasts. Only by realtime forecast
we can experimentally measure the performance of flare-forecasting methods
while confidently avoiding overlearning.
We have been operating unmanned flare forecast service since August, 2015
that provides 24-hour-ahead forecast of solar flares, every 12 minutes. We
report the method and prediction results of the system.
|
9,583 | 9,583 | Feedforward Initialization for Fast Inference of Deep Generative
Networks is biologically plausible | We consider deep multi-layered generative models such as Boltzmann machines
or Hopfield nets in which computation (which implements inference) is both
recurrent and stochastic, but where the recurrence is not to model sequential
structure, only to perform computation. We find conditions under which a simple
feedforward computation is a very good initialization for inference, after the
input units are clamped to observed values. It means that after the feedforward
initialization, the recurrent network is very close to a fixed point of the
network dynamics, where the energy gradient is 0. The main condition is that
consecutive layers form a good auto-encoder, or more generally that different
groups of inputs into the unit (in particular, bottom-up inputs on one hand,
top-down inputs on the other hand) are consistent with each other, producing
the same contribution into the total weighted sum of inputs. In biological
terms, this would correspond to having each dendritic branch correctly
predicting the aggregate input from all the dendritic branches, i.e., the soma
potential. This is consistent with the prediction that the synaptic weights
into dendritic branches such as those of the apical and basal dendrites of
pyramidal cells are trained to minimize the prediction error made by the
dendritic branch when the target is the somatic activity. Whereas previous work
has shown how to achieve fast negative phase inference (when the model is
unclamped) in a predictive recurrent model, this contribution helps to achieve
fast positive phase inference (when the target output is clamped) in such
recurrent neural models.
|
9,584 | 9,584 | Integrated perception with recurrent multi-task neural networks | Modern discriminative predictors have been shown to match natural
intelligences in specific perceptual tasks in image classification, object and
part detection, boundary extraction, etc. However, a major advantage that
natural intelligences still have is that they work well for "all" perceptual
problems together, solving them efficiently and coherently in an "integrated
manner". In order to capture some of these advantages in machine perception, we
ask two questions: whether deep neural networks can learn universal image
representations, useful not only for a single task but for all of them, and how
the solutions to the different tasks can be integrated in this framework. We
answer by proposing a new architecture, which we call "MultiNet", in which not
only deep image features are shared between tasks, but where tasks can interact
in a recurrent manner by encoding the results of their analysis in a common
shared representation of the data. In this manner, we show that the performance
of individual tasks in standard benchmarks can be improved first by sharing
features between them and then, more significantly, by integrating their
solutions in the common representation.
|
9,585 | 9,585 | Very Deep Convolutional Networks for Text Classification | The dominant approach for many NLP tasks are recurrent neural networks, in
particular LSTMs, and convolutional neural networks. However, these
architectures are rather shallow in comparison to the deep convolutional
networks which have pushed the state-of-the-art in computer vision. We present
a new architecture (VDCNN) for text processing which operates directly at the
character level and uses only small convolutions and pooling operations. We are
able to show that the performance of this model increases with depth: using up
to 29 convolutional layers, we report improvements over the state-of-the-art on
several public text classification tasks. To the best of our knowledge, this is
the first time that very deep convolutional nets have been applied to text
processing.
|
9,586 | 9,586 | Low-rank Optimization with Convex Constraints | The problem of low-rank approximation with convex constraints, which appears
in data analysis, system identification, model order reduction, low-order
controller design and low-complexity modelling is considered. Given a matrix,
the objective is to find a low-rank approximation that meets rank and convex
constraints, while minimizing the distance to the matrix in the squared
Frobenius norm. In many situations, this non-convex problem is convexified by
nuclear norm regularization. However, we will see that the approximations
obtained by this method may be far from optimal. In this paper, we propose an
alternative convex relaxation that uses the convex envelope of the squared
Frobenius norm and the rank constraint. With this approach, easily verifiable
conditions are obtained under which the solutions to the convex relaxation and
the original non-convex problem coincide. An SDP representation of the convex
envelope is derived, which allows us to apply this approach to several known
problems. Our example on optimal low-rank Hankel approximation/model reduction
illustrates that the proposed convex relaxation performs consistently better
than nuclear norm regularization and may outperform balanced truncation.
|
9,587 | 9,587 | Bayesian Poisson Tucker Decomposition for Learning the Structure of
International Relations | We introduce Bayesian Poisson Tucker decomposition (BPTD) for modeling
country--country interaction event data. These data consist of interaction
events of the form "country $i$ took action $a$ toward country $j$ at time
$t$." BPTD discovers overlapping country--community memberships, including the
number of latent communities. In addition, it discovers directed
community--community interaction networks that are specific to "topics" of
action types and temporal "regimes." We show that BPTD yields an efficient MCMC
inference algorithm and achieves better predictive performance than related
models. We also demonstrate that it discovers interpretable latent structure
that agrees with our knowledge of international relations.
|
9,588 | 9,588 | Recurrent Neural Networks for Multivariate Time Series with Missing
Values | Multivariate time series data in practical applications, such as health care,
geoscience, and biology, are characterized by a variety of missing values. In
time series prediction and other related tasks, it has been noted that missing
values and their missing patterns are often correlated with the target labels,
a.k.a., informative missingness. There is very limited work on exploiting the
missing patterns for effective imputation and improving prediction performance.
In this paper, we develop novel deep learning models, namely GRU-D, as one of
the early attempts. GRU-D is based on Gated Recurrent Unit (GRU), a
state-of-the-art recurrent neural network. It takes two representations of
missing patterns, i.e., masking and time interval, and effectively incorporates
them into a deep model architecture so that it not only captures the long-term
temporal dependencies in time series, but also utilizes the missing patterns to
achieve better prediction results. Experiments of time series classification
tasks on real-world clinical datasets (MIMIC-III, PhysioNet) and synthetic
datasets demonstrate that our models achieve state-of-the-art performance and
provides useful insights for better understanding and utilization of missing
values in time series analysis.
|
9,589 | 9,589 | Unifying Count-Based Exploration and Intrinsic Motivation | We consider an agent's uncertainty about its environment and the problem of
generalizing this uncertainty across observations. Specifically, we focus on
the problem of exploration in non-tabular reinforcement learning. Drawing
inspiration from the intrinsic motivation literature, we use density models to
measure uncertainty, and propose a novel algorithm for deriving a pseudo-count
from an arbitrary density model. This technique enables us to generalize
count-based exploration algorithms to the non-tabular case. We apply our ideas
to Atari 2600 games, providing sensible pseudo-counts from raw pixels. We
transform these pseudo-counts into intrinsic rewards and obtain significantly
improved exploration in a number of hard games, including the infamously
difficult Montezuma's Revenge.
|
9,590 | 9,590 | Learning to Optimize | Algorithm design is a laborious process and often requires many iterations of
ideation and validation. In this paper, we explore automating algorithm design
and present a method to learn an optimization algorithm, which we believe to be
the first method that can automatically discover a better algorithm. We
approach this problem from a reinforcement learning perspective and represent
any particular optimization algorithm as a policy. We learn an optimization
algorithm using guided policy search and demonstrate that the resulting
algorithm outperforms existing hand-engineered algorithms in terms of
convergence speed and/or the final objective value.
|
9,591 | 9,591 | Deep neural networks are robust to weight binarization and other
non-linear distortions | Recent results show that deep neural networks achieve excellent performance
even when, during training, weights are quantized and projected to a binary
representation. Here, we show that this is just the tip of the iceberg: these
same networks, during testing, also exhibit a remarkable robustness to
distortions beyond quantization, including additive and multiplicative noise,
and a class of non-linear projections where binarization is just a special
case. To quantify this robustness, we show that one such network achieves 11%
test error on CIFAR-10 even with 0.68 effective bits per weight. Furthermore,
we find that a common training heuristic--namely, projecting quantized weights
during backpropagation--can be altered (or even removed) and networks still
achieve a base level of robustness during testing. Specifically, training with
weight projections other than quantization also works, as does simply clipping
the weights, both of which have never been reported before. We confirm our
results for CIFAR-10 and ImageNet datasets. Finally, drawing from these ideas,
we propose a stochastic projection rule that leads to a new state of the art
network with 7.64% test error on CIFAR-10 using no data augmentation.
|
9,592 | 9,592 | Regret Bounds for Non-decomposable Metrics with Missing Labels | We consider the problem of recommending relevant labels (items) for a given
data point (user). In particular, we are interested in the practically
important setting where the evaluation is with respect to non-decomposable
(over labels) performance metrics like the $F_1$ measure, and the training data
has missing labels. To this end, we propose a generic framework that given a
performance metric $\Psi$, can devise a regularized objective function and a
threshold such that all the values in the predicted score vector above and only
above the threshold are selected to be positive. We show that the regret or
generalization error in the given metric $\Psi$ is bounded ultimately by
estimation error of certain underlying parameters. In particular, we derive
regret bounds under three popular settings: a) collaborative filtering, b)
multilabel classification, and c) PU (positive-unlabeled) learning. For each of
the above problems, we can obtain precise non-asymptotic regret bound which is
small even when a large fraction of labels is missing. Our empirical results on
synthetic and benchmark datasets demonstrate that by explicitly modeling for
missing labels and optimizing the desired performance metric, our algorithm
indeed achieves significantly better performance (like $F_1$ score) when
compared to methods that do not model missing label information carefully.
|
9,593 | 9,593 | Efficient differentially private learning improves drug sensitivity
prediction | Users of a personalised recommendation system face a dilemma: recommendations
can be improved by learning from data, but only if the other users are willing
to share their private information. Good personalised predictions are vitally
important in precision medicine, but genomic information on which the
predictions are based is also particularly sensitive, as it directly identifies
the patients and hence cannot easily be anonymised. Differential privacy has
emerged as a potentially promising solution: privacy is considered sufficient
if presence of individual patients cannot be distinguished. However,
differentially private learning with current methods does not improve
predictions with feasible data sizes and dimensionalities. Here we show that
useful predictors can be learned under powerful differential privacy
guarantees, and even from moderately-sized data sets, by demonstrating
significant improvements with a new robust private regression method in the
accuracy of private drug sensitivity prediction. The method combines two key
properties not present even in recent proposals, which can be generalised to
other predictors: we prove it is asymptotically consistently and efficiently
private, and demonstrate that it performs well on finite data. Good finite data
performance is achieved by limiting the sharing of private information by
decreasing the dimensionality and by projecting outliers to fit tighter bounds,
therefore needing to add less noise for equal privacy. As already the
simple-to-implement method shows promise on the challenging genomic data, we
anticipate rapid progress towards practical applications in many fields, such
as mobile sensing and social media, in addition to the badly needed precision
medicine solutions.
|
9,594 | 9,594 | Towards a Neural Statistician | An efficient learner is one who reuses what they already know to tackle a new
problem. For a machine learner, this means understanding the similarities
amongst datasets. In order to do this, one must take seriously the idea of
working with datasets, rather than datapoints, as the key objects to model.
Towards this goal, we demonstrate an extension of a variational autoencoder
that can learn a method for computing representations, or statistics, of
datasets in an unsupervised fashion. The network is trained to produce
statistics that encapsulate a generative model for each dataset. Hence the
network enables efficient learning from new datasets for both unsupervised and
supervised tasks. We show that we are able to learn statistics that can be used
for: clustering datasets, transferring generative models to new datasets,
selecting representative samples of datasets and classifying previously unseen
classes. We refer to our model as a neural statistician, and by this we mean a
neural network that can learn to compute summary statistics of datasets without
supervision.
|
9,595 | 9,595 | Adapting Sampling Interval of Sensor Networks Using On-Line
Reinforcement Learning | Monitoring Wireless Sensor Networks (WSNs) are composed of sensor nodes that
report temperature, relative humidity, and other environmental parameters. The
time between two successive measurements is a critical parameter to set during
the WSN configuration because it can impact the WSN's lifetime, the wireless
medium contention and the quality of the reported data. As trends in monitored
parameters can significantly vary between scenarios and within time,
identifying a sampling interval suitable for several cases is also challenging.
In this work, we propose a dynamic sampling rate adaptation scheme based on
reinforcement learning, able to tune sensors' sampling interval on-the-fly,
according to environmental conditions and application requirements. The primary
goal is to set the sampling interval to the best value possible so as to avoid
oversampling and save energy, while not missing environmental changes that can
be relevant for the application. In simulations, our mechanism could reduce up
to 73% the total number of transmissions compared to a fixed strategy and,
simultaneously, keep the average quality of information provided by the WSN.
The inherent flexibility of the reinforcement learning algorithm facilitates
its use in several scenarios, so as to exploit the broad scope of the Internet
of Things.
|
9,596 | 9,596 | A Minimax Approach to Supervised Learning | Given a task of predicting $Y$ from $X$, a loss function $L$, and a set of
probability distributions $\Gamma$ on $(X,Y)$, what is the optimal decision
rule minimizing the worst-case expected loss over $\Gamma$? In this paper, we
address this question by introducing a generalization of the principle of
maximum entropy. Applying this principle to sets of distributions with marginal
on $X$ constrained to be the empirical marginal from the data, we develop a
general minimax approach for supervised learning problems. While for some loss
functions such as squared-error and log loss, the minimax approach rederives
well-knwon regression models, for the 0-1 loss it results in a new linear
classifier which we call the maximum entropy machine. The maximum entropy
machine minimizes the worst-case 0-1 loss over the structured set of
distribution, and by our numerical experiments can outperform other well-known
linear classifiers such as SVM. We also prove a bound on the generalization
worst-case error in the minimax approach.
|
9,597 | 9,597 | Systematic evaluation of CNN advances on the ImageNet | The paper systematically studies the impact of a range of recent advances in
CNN architectures and learning methods on the object categorization (ILSVRC)
problem. The evalution tests the influence of the following choices of the
architecture: non-linearity (ReLU, ELU, maxout, compatibility with batch
normalization), pooling variants (stochastic, max, average, mixed), network
width, classifier design (convolutional, fully-connected, SPP), image
pre-processing, and of learning parameters: learning rate, batch size,
cleanliness of the data, etc.
The performance gains of the proposed modifications are first tested
individually and then in combination. The sum of individual gains is bigger
than the observed improvement when all modifications are introduced, but the
"deficit" is small suggesting independence of their benefits. We show that the
use of 128x128 pixel images is sufficient to make qualitative conclusions about
optimal network structure that hold for the full size Caffe and VGG nets. The
results are obtained an order of magnitude faster than with the standard 224
pixel images.
|
9,598 | 9,598 | Measuring the reliability of MCMC inference with bidirectional Monte
Carlo | Markov chain Monte Carlo (MCMC) is one of the main workhorses of
probabilistic inference, but it is notoriously hard to measure the quality of
approximate posterior samples. This challenge is particularly salient in black
box inference methods, which can hide details and obscure inference failures.
In this work, we extend the recently introduced bidirectional Monte Carlo
technique to evaluate MCMC-based posterior inference algorithms. By running
annealed importance sampling (AIS) chains both from prior to posterior and vice
versa on simulated data, we upper bound in expectation the symmetrized KL
divergence between the true posterior distribution and the distribution of
approximate samples. We present Bounding Divergences with REverse Annealing
(BREAD), a protocol for validating the relevance of simulated data experiments
to real datasets, and integrate it into two probabilistic programming
languages: WebPPL and Stan. As an example of how BREAD can be used to guide the
design of inference algorithms, we apply it to study the effectiveness of
different model representations in both WebPPL and Stan.
|
9,599 | 9,599 | Semi-supervised structured output prediction by local linear regression
and sub-gradient descent | We propose a novel semi-supervised structured output prediction method based
on local linear regression in this paper. The existing semi-supervise
structured output prediction methods learn a global predictor for all the data
points in a data set, which ignores the differences of local distributions of
the data set, and the effects to the structured output prediction. To solve
this problem, we propose to learn the missing structured outputs and local
predictors for neighborhoods of different data points jointly. Using the local
linear regression strategy, in the neighborhood of each data point, we propose
to learn a local linear predictor by minimizing both the complexity of the
predictor and the upper bound of the structured prediction loss. The
minimization problem is solved by sub-gradient descent algorithms. We conduct
experiments over two benchmark data sets, and the results show the advantages
of the proposed method.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.