id
large_string | submitter
large_string | authors
large_string | title
large_string | comments
large_string | journal-ref
large_string | doi
large_string | report-no
large_string | categories
large_string | license
large_string | abstract
large_string | versions
large list | update_date
timestamp[ms] | authors_parsed
large list | prompt
large_string | label
string | prob
float64 |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2303.14548 | Dian Chen | Dian Chen, Jie Li, Vitor Guizilini, Rares Ambrus, Adrien Gaidon | Viewpoint Equivariance for Multi-View 3D Object Detection | 11 pages, 4 figures; accepted to CVPR 2023 | null | null | null | cs.CV cs.AI cs.LG cs.RO | http://creativecommons.org/licenses/by/4.0/ | 3D object detection from visual sensors is a cornerstone capability of
robotic systems. State-of-the-art methods focus on reasoning and decoding
object bounding boxes from multi-view camera input. In this work we gain
intuition from the integral role of multi-view consistency in 3D scene
understanding and geometric learning. To this end, we introduce VEDet, a novel
3D object detection framework that exploits 3D multi-view geometry to improve
localization through viewpoint awareness and equivariance. VEDet leverages a
query-based transformer architecture and encodes the 3D scene by augmenting
image features with positional encodings from their 3D perspective geometry. We
design view-conditioned queries at the output level, which enables the
generation of multiple virtual frames during training to learn viewpoint
equivariance by enforcing multi-view consistency. The multi-view geometry
injected at the input level as positional encodings and regularized at the loss
level provides rich geometric cues for 3D object detection, leading to
state-of-the-art performance on the nuScenes benchmark. The code and model are
made available at https://github.com/TRI-ML/VEDet.
| [
{
"version": "v1",
"created": "Sat, 25 Mar 2023 19:56:41 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Apr 2023 04:59:08 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Chen",
"Dian",
""
],
[
"Li",
"Jie",
""
],
[
"Guizilini",
"Vitor",
""
],
[
"Ambrus",
"Rares",
""
],
[
"Gaidon",
"Adrien",
""
]
] | TITLE: Viewpoint Equivariance for Multi-View 3D Object Detection
ABSTRACT: 3D object detection from visual sensors is a cornerstone capability of
robotic systems. State-of-the-art methods focus on reasoning and decoding
object bounding boxes from multi-view camera input. In this work we gain
intuition from the integral role of multi-view consistency in 3D scene
understanding and geometric learning. To this end, we introduce VEDet, a novel
3D object detection framework that exploits 3D multi-view geometry to improve
localization through viewpoint awareness and equivariance. VEDet leverages a
query-based transformer architecture and encodes the 3D scene by augmenting
image features with positional encodings from their 3D perspective geometry. We
design view-conditioned queries at the output level, which enables the
generation of multiple virtual frames during training to learn viewpoint
equivariance by enforcing multi-view consistency. The multi-view geometry
injected at the input level as positional encodings and regularized at the loss
level provides rich geometric cues for 3D object detection, leading to
state-of-the-art performance on the nuScenes benchmark. The code and model are
made available at https://github.com/TRI-ML/VEDet.
| no_new_dataset | 0.941115 |
2304.01598 | Fangfang Zhou | Dan Zhang, Fangfang Zhou, Yuwen Jiang and Zhengming Fu | MM-BSN: Self-Supervised Image Denoising for Real-World with Multi-Mask
based on Blind-Spot Network | Accepted by CVPRW 2023 | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Recent advances in deep learning have been pushing image denoising techniques
to a new level. In self-supervised image denoising, blind-spot network (BSN) is
one of the most common methods. However, most of the existing BSN algorithms
use a dot-based central mask, which is recognized as inefficient for images
with large-scale spatially correlated noise. In this paper, we give the
definition of large-noise and propose a multi-mask strategy using multiple
convolutional kernels masked in different shapes to further break the noise
spatial correlation. Furthermore, we propose a novel self-supervised image
denoising method that combines the multi-mask strategy with BSN (MM-BSN). We
show that different masks can cause significant performance differences, and
the proposed MM-BSN can efficiently fuse the features extracted by multi-masked
layers, while recovering the texture structures destroyed by multi-masking and
information transmission. Our MM-BSN can be used to address the problem of
large-noise denoising, which cannot be efficiently handled by other BSN
methods. Extensive experiments on public real-world datasets demonstrate that
the proposed MM-BSN achieves state-of-the-art performance among self-supervised
and even unpaired image denoising methods for sRGB images denoising, without
any labelling effort or prior knowledge. Code can be found in
https://github.com/dannie125/MM-BSN.
| [
{
"version": "v1",
"created": "Tue, 4 Apr 2023 07:38:14 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2023 07:01:44 GMT"
},
{
"version": "v3",
"created": "Fri, 7 Apr 2023 09:31:51 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Zhang",
"Dan",
""
],
[
"Zhou",
"Fangfang",
""
],
[
"Jiang",
"Yuwen",
""
],
[
"Fu",
"Zhengming",
""
]
] | TITLE: MM-BSN: Self-Supervised Image Denoising for Real-World with Multi-Mask
based on Blind-Spot Network
ABSTRACT: Recent advances in deep learning have been pushing image denoising techniques
to a new level. In self-supervised image denoising, blind-spot network (BSN) is
one of the most common methods. However, most of the existing BSN algorithms
use a dot-based central mask, which is recognized as inefficient for images
with large-scale spatially correlated noise. In this paper, we give the
definition of large-noise and propose a multi-mask strategy using multiple
convolutional kernels masked in different shapes to further break the noise
spatial correlation. Furthermore, we propose a novel self-supervised image
denoising method that combines the multi-mask strategy with BSN (MM-BSN). We
show that different masks can cause significant performance differences, and
the proposed MM-BSN can efficiently fuse the features extracted by multi-masked
layers, while recovering the texture structures destroyed by multi-masking and
information transmission. Our MM-BSN can be used to address the problem of
large-noise denoising, which cannot be efficiently handled by other BSN
methods. Extensive experiments on public real-world datasets demonstrate that
the proposed MM-BSN achieves state-of-the-art performance among self-supervised
and even unpaired image denoising methods for sRGB images denoising, without
any labelling effort or prior knowledge. Code can be found in
https://github.com/dannie125/MM-BSN.
| no_new_dataset | 0.946941 |
2304.02119 | Maarten Schoukens | Rishi Ramkannan, Gerben I. Beintema, Roland T\'oth, Maarten Schoukens | Initialization Approach for Nonlinear State-Space Identification via the
Subspace Encoder Approach | Accepted for presentation at the IFAC World Congress 2023 | null | null | null | eess.SY cs.LG cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The SUBNET neural network architecture has been developed to identify
nonlinear state-space models from input-output data. To achieve this, it
combines the rolled-out nonlinear state-space equations and a state encoder
function, both parameterised as neural networks The encoder function is
introduced to reconstruct the current state from past input-output data. Hence,
it enables the forward simulation of the rolled-out state-space model. While
this approach has shown to provide high-accuracy and consistent model
estimation, its convergence can be significantly improved by efficient
initialization of the training process. This paper focuses on such an
initialisation of the subspace encoder approach using the Best Linear
Approximation (BLA). Using the BLA provided state-space matrices and its
associated reconstructability map, both the state-transition part of the
network and the encoder are initialized. The performance of the improved
initialisation scheme is evaluated on a Wiener-Hammerstein simulation example
and a benchmark dataset. The results show that for a weakly nonlinear system,
the proposed initialisation based on the linear reconstructability map results
in a faster convergence and a better model quality.
| [
{
"version": "v1",
"created": "Tue, 4 Apr 2023 20:57:34 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2023 21:57:48 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Ramkannan",
"Rishi",
""
],
[
"Beintema",
"Gerben I.",
""
],
[
"Tóth",
"Roland",
""
],
[
"Schoukens",
"Maarten",
""
]
] | TITLE: Initialization Approach for Nonlinear State-Space Identification via the
Subspace Encoder Approach
ABSTRACT: The SUBNET neural network architecture has been developed to identify
nonlinear state-space models from input-output data. To achieve this, it
combines the rolled-out nonlinear state-space equations and a state encoder
function, both parameterised as neural networks The encoder function is
introduced to reconstruct the current state from past input-output data. Hence,
it enables the forward simulation of the rolled-out state-space model. While
this approach has shown to provide high-accuracy and consistent model
estimation, its convergence can be significantly improved by efficient
initialization of the training process. This paper focuses on such an
initialisation of the subspace encoder approach using the Best Linear
Approximation (BLA). Using the BLA provided state-space matrices and its
associated reconstructability map, both the state-transition part of the
network and the encoder are initialized. The performance of the improved
initialisation scheme is evaluated on a Wiener-Hammerstein simulation example
and a benchmark dataset. The results show that for a weakly nonlinear system,
the proposed initialisation based on the linear reconstructability map results
in a faster convergence and a better model quality.
| no_new_dataset | 0.948394 |
2304.02891 | Prakash Chourasia | Sarwan Ali, Prakash Chourasia, Zahra Tayebi, Babatunde Bello, Murray
Patterson | ViralVectors: Compact and Scalable Alignment-free Virome Feature
Generation | 24 pages, 5 figures, accepted to Springer Medical & Biological
Engineering & Computing | null | null | null | q-bio.GN cs.LG | http://creativecommons.org/licenses/by/4.0/ | The amount of sequencing data for SARS-CoV-2 is several orders of magnitude
larger than any virus. This will continue to grow geometrically for SARS-CoV-2,
and other viruses, as many countries heavily finance genomic surveillance
efforts. Hence, we need methods for processing large amounts of sequence data
to allow for effective yet timely decision-making. Such data will come from
heterogeneous sources: aligned, unaligned, or even unassembled raw nucleotide
or amino acid sequencing reads pertaining to the whole genome or regions (e.g.,
spike) of interest. In this work, we propose \emph{ViralVectors}, a compact
feature vector generation from virome sequencing data that allows effective
downstream analysis. Such generation is based on \emph{minimizers}, a type of
lightweight "signature" of a sequence, used traditionally in assembly and read
mapping -- to our knowledge, the first use minimizers in this way. We validate
our approach on different types of sequencing data: (a) 2.5M SARS-CoV-2 spike
sequences (to show scalability); (b) 3K Coronaviridae spike sequences (to show
robustness to more genomic variability); and (c) 4K raw WGS reads sets taken
from nasal-swab PCR tests (to show the ability to process unassembled reads).
Our results show that ViralVectors outperforms current benchmarks in most
classification and clustering tasks.
| [
{
"version": "v1",
"created": "Thu, 6 Apr 2023 06:46:17 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Apr 2023 11:58:23 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Ali",
"Sarwan",
""
],
[
"Chourasia",
"Prakash",
""
],
[
"Tayebi",
"Zahra",
""
],
[
"Bello",
"Babatunde",
""
],
[
"Patterson",
"Murray",
""
]
] | TITLE: ViralVectors: Compact and Scalable Alignment-free Virome Feature
Generation
ABSTRACT: The amount of sequencing data for SARS-CoV-2 is several orders of magnitude
larger than any virus. This will continue to grow geometrically for SARS-CoV-2,
and other viruses, as many countries heavily finance genomic surveillance
efforts. Hence, we need methods for processing large amounts of sequence data
to allow for effective yet timely decision-making. Such data will come from
heterogeneous sources: aligned, unaligned, or even unassembled raw nucleotide
or amino acid sequencing reads pertaining to the whole genome or regions (e.g.,
spike) of interest. In this work, we propose \emph{ViralVectors}, a compact
feature vector generation from virome sequencing data that allows effective
downstream analysis. Such generation is based on \emph{minimizers}, a type of
lightweight "signature" of a sequence, used traditionally in assembly and read
mapping -- to our knowledge, the first use minimizers in this way. We validate
our approach on different types of sequencing data: (a) 2.5M SARS-CoV-2 spike
sequences (to show scalability); (b) 3K Coronaviridae spike sequences (to show
robustness to more genomic variability); and (c) 4K raw WGS reads sets taken
from nasal-swab PCR tests (to show the ability to process unassembled reads).
Our results show that ViralVectors outperforms current benchmarks in most
classification and clustering tasks.
| no_new_dataset | 0.951639 |
2304.02906 | Christos Koutlis | Christos Koutlis, Manos Schinas, Symeon Papadopoulos | MemeFier: Dual-stage Modality Fusion for Image Meme Classification | 8 pages, 2 figures, ICMR 2023 | null | null | null | cs.CV | http://creativecommons.org/licenses/by-sa/4.0/ | Hate speech is a societal problem that has significantly grown through the
Internet. New forms of digital content such as image memes have given rise to
spread of hate using multimodal means, being far more difficult to analyse and
detect compared to the unimodal case. Accurate automatic processing, analysis
and understanding of this kind of content will facilitate the endeavor of
hindering hate speech proliferation through the digital world. To this end, we
propose MemeFier, a deep learning-based architecture for fine-grained
classification of Internet image memes, utilizing a dual-stage modality fusion
module. The first fusion stage produces feature vectors containing modality
alignment information that captures non-trivial connections between the text
and image of a meme. The second fusion stage leverages the power of a
Transformer encoder to learn inter-modality correlations at the token level and
yield an informative representation. Additionally, we consider external
knowledge as an additional input, and background image caption supervision as a
regularizing component. Extensive experiments on three widely adopted
benchmarks, i.e., Facebook Hateful Memes, Memotion7k and MultiOFF, indicate
that our approach competes and in some cases surpasses state-of-the-art. Our
code is available on https://github.com/ckoutlis/memefier.
| [
{
"version": "v1",
"created": "Thu, 6 Apr 2023 07:36:52 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Apr 2023 06:57:42 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Koutlis",
"Christos",
""
],
[
"Schinas",
"Manos",
""
],
[
"Papadopoulos",
"Symeon",
""
]
] | TITLE: MemeFier: Dual-stage Modality Fusion for Image Meme Classification
ABSTRACT: Hate speech is a societal problem that has significantly grown through the
Internet. New forms of digital content such as image memes have given rise to
spread of hate using multimodal means, being far more difficult to analyse and
detect compared to the unimodal case. Accurate automatic processing, analysis
and understanding of this kind of content will facilitate the endeavor of
hindering hate speech proliferation through the digital world. To this end, we
propose MemeFier, a deep learning-based architecture for fine-grained
classification of Internet image memes, utilizing a dual-stage modality fusion
module. The first fusion stage produces feature vectors containing modality
alignment information that captures non-trivial connections between the text
and image of a meme. The second fusion stage leverages the power of a
Transformer encoder to learn inter-modality correlations at the token level and
yield an informative representation. Additionally, we consider external
knowledge as an additional input, and background image caption supervision as a
regularizing component. Extensive experiments on three widely adopted
benchmarks, i.e., Facebook Hateful Memes, Memotion7k and MultiOFF, indicate
that our approach competes and in some cases surpasses state-of-the-art. Our
code is available on https://github.com/ckoutlis/memefier.
| no_new_dataset | 0.950549 |
2304.03093 | Chenglong Wang | Cheng-Long Wang, Mengdi Huai, Di Wang | Inductive Graph Unlearning | To appear in the 32nd USENIX Security Symposium, August 2023,
Anaheim, CA, USA | null | null | null | cs.LG cs.CR cs.SI | http://creativecommons.org/licenses/by/4.0/ | As a way to implement the "right to be forgotten" in machine learning,
\textit{machine unlearning} aims to completely remove the contributions and
information of the samples to be deleted from a trained model without affecting
the contributions of other samples. Recently, many frameworks for machine
unlearning have been proposed, and most of them focus on image and text data.
To extend machine unlearning to graph data, \textit{GraphEraser} has been
proposed. However, a critical issue is that \textit{GraphEraser} is
specifically designed for the transductive graph setting, where the graph is
static and attributes and edges of test nodes are visible during training. It
is unsuitable for the inductive setting, where the graph could be dynamic and
the test graph information is invisible in advance. Such inductive capability
is essential for production machine learning systems with evolving graphs like
social media and transaction networks. To fill this gap, we propose the
\underline{{\bf G}}\underline{{\bf U}}ided \underline{{\bf I}}n\underline{{\bf
D}}uctiv\underline{{\bf E}} Graph Unlearning framework (GUIDE). GUIDE consists
of three components: guided graph partitioning with fairness and balance,
efficient subgraph repair, and similarity-based aggregation. Empirically, we
evaluate our method on several inductive benchmarks and evolving transaction
graphs. Generally speaking, GUIDE can be efficiently implemented on the
inductive graph learning tasks for its low graph partition cost, no matter on
computation or structure information. The code will be available here:
https://github.com/Happy2Git/GUIDE.
| [
{
"version": "v1",
"created": "Thu, 6 Apr 2023 14:21:48 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Apr 2023 05:59:48 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Wang",
"Cheng-Long",
""
],
[
"Huai",
"Mengdi",
""
],
[
"Wang",
"Di",
""
]
] | TITLE: Inductive Graph Unlearning
ABSTRACT: As a way to implement the "right to be forgotten" in machine learning,
\textit{machine unlearning} aims to completely remove the contributions and
information of the samples to be deleted from a trained model without affecting
the contributions of other samples. Recently, many frameworks for machine
unlearning have been proposed, and most of them focus on image and text data.
To extend machine unlearning to graph data, \textit{GraphEraser} has been
proposed. However, a critical issue is that \textit{GraphEraser} is
specifically designed for the transductive graph setting, where the graph is
static and attributes and edges of test nodes are visible during training. It
is unsuitable for the inductive setting, where the graph could be dynamic and
the test graph information is invisible in advance. Such inductive capability
is essential for production machine learning systems with evolving graphs like
social media and transaction networks. To fill this gap, we propose the
\underline{{\bf G}}\underline{{\bf U}}ided \underline{{\bf I}}n\underline{{\bf
D}}uctiv\underline{{\bf E}} Graph Unlearning framework (GUIDE). GUIDE consists
of three components: guided graph partitioning with fairness and balance,
efficient subgraph repair, and similarity-based aggregation. Empirically, we
evaluate our method on several inductive benchmarks and evolving transaction
graphs. Generally speaking, GUIDE can be efficiently implemented on the
inductive graph learning tasks for its low graph partition cost, no matter on
computation or structure information. The code will be available here:
https://github.com/Happy2Git/GUIDE.
| no_new_dataset | 0.945951 |
2304.03290 | Neelesh Mungoli | Neelesh Mungoli | Adaptive Feature Fusion: Enhancing Generalization in Deep Learning
Models | null | null | null | null | cs.CV cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In recent years, deep learning models have demonstrated remarkable success in
various domains, such as computer vision, natural language processing, and
speech recognition. However, the generalization capabilities of these models
can be negatively impacted by the limitations of their feature fusion
techniques. This paper introduces an innovative approach, Adaptive Feature
Fusion (AFF), to enhance the generalization of deep learning models by
dynamically adapting the fusion process of feature representations.
The proposed AFF framework is designed to incorporate fusion layers into
existing deep learning architectures, enabling seamless integration and
improved performance. By leveraging a combination of data-driven and
model-based fusion strategies, AFF is able to adaptively fuse features based on
the underlying data characteristics and model requirements. This paper presents
a detailed description of the AFF framework, including the design and
implementation of fusion layers for various architectures.
Extensive experiments are conducted on multiple benchmark datasets, with the
results demonstrating the superiority of the AFF approach in comparison to
traditional feature fusion techniques. The analysis showcases the effectiveness
of AFF in enhancing generalization capabilities, leading to improved
performance across different tasks and applications.
Finally, the paper discusses various real-world use cases where AFF can be
employed, providing insights into its practical applicability. The conclusion
highlights the potential for future research directions, including the
exploration of advanced fusion strategies and the extension of AFF to other
machine learning paradigms.
| [
{
"version": "v1",
"created": "Tue, 4 Apr 2023 21:41:38 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Mungoli",
"Neelesh",
""
]
] | TITLE: Adaptive Feature Fusion: Enhancing Generalization in Deep Learning
Models
ABSTRACT: In recent years, deep learning models have demonstrated remarkable success in
various domains, such as computer vision, natural language processing, and
speech recognition. However, the generalization capabilities of these models
can be negatively impacted by the limitations of their feature fusion
techniques. This paper introduces an innovative approach, Adaptive Feature
Fusion (AFF), to enhance the generalization of deep learning models by
dynamically adapting the fusion process of feature representations.
The proposed AFF framework is designed to incorporate fusion layers into
existing deep learning architectures, enabling seamless integration and
improved performance. By leveraging a combination of data-driven and
model-based fusion strategies, AFF is able to adaptively fuse features based on
the underlying data characteristics and model requirements. This paper presents
a detailed description of the AFF framework, including the design and
implementation of fusion layers for various architectures.
Extensive experiments are conducted on multiple benchmark datasets, with the
results demonstrating the superiority of the AFF approach in comparison to
traditional feature fusion techniques. The analysis showcases the effectiveness
of AFF in enhancing generalization capabilities, leading to improved
performance across different tasks and applications.
Finally, the paper discusses various real-world use cases where AFF can be
employed, providing insights into its practical applicability. The conclusion
highlights the potential for future research directions, including the
exploration of advanced fusion strategies and the extension of AFF to other
machine learning paradigms.
| no_new_dataset | 0.942876 |
2304.03295 | Euihyeok Lee | Euihyoek Lee, Chulhong Min, Jeaseung Lee, Jin Yu, Seungwoo Kang | Automatic Detection of Reactions to Music via Earable Sensing | null | null | null | null | cs.SD cs.HC eess.AS | http://creativecommons.org/licenses/by-nc-nd/4.0/ | We present GrooveMeter, a novel system that automatically detects vocal and
motion reactions to music via earable sensing and supports music
engagement-aware applications. To this end, we use smart earbuds as sensing
devices, which are already widely used for music listening, and devise reaction
detection techniques by leveraging an inertial measurement unit (IMU) and a
microphone on earbuds. To explore reactions in daily music-listening
situations, we collect the first kind of dataset, MusicReactionSet, containing
926-minute-long IMU and audio data with 30 participants. With the dataset, we
discover a set of unique challenges in detecting music listening reactions
accurately and robustly using audio and motion sensing. We devise sophisticated
processing pipelines to make reaction detection accurate and efficient. We
present a comprehensive evaluation to examine the performance of reaction
detection and system cost. It shows that GrooveMeter achieves the macro F1
scores of 0.89 for vocal reaction and 0.81 for motion reaction with
leave-one-subject-out cross-validation. More importantly, GrooveMeter shows
higher accuracy and robustness compared to alternative methods. We also show
that our filtering approach reduces 50% or more of the energy overhead.
Finally, we demonstrate the potential use cases through a case study.
| [
{
"version": "v1",
"created": "Thu, 6 Apr 2023 08:11:03 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Lee",
"Euihyoek",
""
],
[
"Min",
"Chulhong",
""
],
[
"Lee",
"Jeaseung",
""
],
[
"Yu",
"Jin",
""
],
[
"Kang",
"Seungwoo",
""
]
] | TITLE: Automatic Detection of Reactions to Music via Earable Sensing
ABSTRACT: We present GrooveMeter, a novel system that automatically detects vocal and
motion reactions to music via earable sensing and supports music
engagement-aware applications. To this end, we use smart earbuds as sensing
devices, which are already widely used for music listening, and devise reaction
detection techniques by leveraging an inertial measurement unit (IMU) and a
microphone on earbuds. To explore reactions in daily music-listening
situations, we collect the first kind of dataset, MusicReactionSet, containing
926-minute-long IMU and audio data with 30 participants. With the dataset, we
discover a set of unique challenges in detecting music listening reactions
accurately and robustly using audio and motion sensing. We devise sophisticated
processing pipelines to make reaction detection accurate and efficient. We
present a comprehensive evaluation to examine the performance of reaction
detection and system cost. It shows that GrooveMeter achieves the macro F1
scores of 0.89 for vocal reaction and 0.81 for motion reaction with
leave-one-subject-out cross-validation. More importantly, GrooveMeter shows
higher accuracy and robustness compared to alternative methods. We also show
that our filtering approach reduces 50% or more of the energy overhead.
Finally, we demonstrate the potential use cases through a case study.
| new_dataset | 0.958343 |
2304.03369 | Yunxiao Shi | Yunxiao Shi, Hong Cai, Amin Ansari, Fatih Porikli | EGA-Depth: Efficient Guided Attention for Self-Supervised Multi-Camera
Depth Estimation | CVPR 2023 Workshop on Autonomous Driving | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | The ubiquitous multi-camera setup on modern autonomous vehicles provides an
opportunity to construct surround-view depth. Existing methods, however, either
perform independent monocular depth estimations on each camera or rely on
computationally heavy self attention mechanisms. In this paper, we propose a
novel guided attention architecture, EGA-Depth, which can improve both the
efficiency and accuracy of self-supervised multi-camera depth estimation. More
specifically, for each camera, we use its perspective view as the query to
cross-reference its neighboring views to derive informative features for this
camera view. This allows the model to perform attention only across views with
considerable overlaps and avoid the costly computations of standard
self-attention. Given its efficiency, EGA-Depth enables us to exploit
higher-resolution visual features, leading to improved accuracy. Furthermore,
EGA-Depth can incorporate more frames from previous time steps as it scales
linearly w.r.t. the number of views and frames. Extensive experiments on two
challenging autonomous driving benchmarks nuScenes and DDAD demonstrate the
efficacy of our proposed EGA-Depth and show that it achieves the new
state-of-the-art in self-supervised multi-camera depth estimation.
| [
{
"version": "v1",
"created": "Thu, 6 Apr 2023 20:50:28 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Shi",
"Yunxiao",
""
],
[
"Cai",
"Hong",
""
],
[
"Ansari",
"Amin",
""
],
[
"Porikli",
"Fatih",
""
]
] | TITLE: EGA-Depth: Efficient Guided Attention for Self-Supervised Multi-Camera
Depth Estimation
ABSTRACT: The ubiquitous multi-camera setup on modern autonomous vehicles provides an
opportunity to construct surround-view depth. Existing methods, however, either
perform independent monocular depth estimations on each camera or rely on
computationally heavy self attention mechanisms. In this paper, we propose a
novel guided attention architecture, EGA-Depth, which can improve both the
efficiency and accuracy of self-supervised multi-camera depth estimation. More
specifically, for each camera, we use its perspective view as the query to
cross-reference its neighboring views to derive informative features for this
camera view. This allows the model to perform attention only across views with
considerable overlaps and avoid the costly computations of standard
self-attention. Given its efficiency, EGA-Depth enables us to exploit
higher-resolution visual features, leading to improved accuracy. Furthermore,
EGA-Depth can incorporate more frames from previous time steps as it scales
linearly w.r.t. the number of views and frames. Extensive experiments on two
challenging autonomous driving benchmarks nuScenes and DDAD demonstrate the
efficacy of our proposed EGA-Depth and show that it achieves the new
state-of-the-art in self-supervised multi-camera depth estimation.
| no_new_dataset | 0.948537 |
2304.03377 | Jackie Baek | Jackie Baek, Shixin Wang | Leveraging Reusability: Improved Competitive Ratio of Greedy for
Reusable Resources | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study online weighted bipartite matching of reusable resources where an
adversarial sequence of requests for resources arrive over time. A resource
that is matched is 'used' for a random duration, drawn independently from a
resource-dependent distribution, after which it returns and is able to be
matched again. We study the performance of the greedy policy, which matches
requests to the resource that yields the highest reward. Previously, it was
known that the greedy policy is 1/2 competitive against a clairvoyant benchmark
that knows the request sequence in advance. In this work, we improve this
result by introducing a parameter that quantifies the degree of reusability of
the resources. Specifically, if p represents the smallest probability over the
usage distributions that a matched resource returns in one time step, the
greedy policy achieves a competitive ratio of $1/(2-p)$. Furthermore, when the
usage distributions are geometric, we establish a stronger competitive ratio of
$(1+p)/2$, which we demonstrate to be tight. Both of these results align with
the known results in the two extreme scenarios: p = 0 corresponds to
non-reusable resources, where 1/2 is known to be tight, while p = 1 corresponds
to every resource returning immediately, where greedy is the optimal policy and
hence the competitive ratio is 1. Finally, we show that both results are robust
to approximations of the greedy policy. Our work demonstrates that the
reusability of resources can enhance performance compared to the non-reusable
setting, and that a simple greedy policy suffices when the degree of
reusability is high. Our insights contribute to the understanding of how
resource reusability can influence the performance of online algorithms, and
highlight the potential for improved performance as the degree of reusability
increases.
| [
{
"version": "v1",
"created": "Thu, 6 Apr 2023 21:13:53 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Baek",
"Jackie",
""
],
[
"Wang",
"Shixin",
""
]
] | TITLE: Leveraging Reusability: Improved Competitive Ratio of Greedy for
Reusable Resources
ABSTRACT: We study online weighted bipartite matching of reusable resources where an
adversarial sequence of requests for resources arrive over time. A resource
that is matched is 'used' for a random duration, drawn independently from a
resource-dependent distribution, after which it returns and is able to be
matched again. We study the performance of the greedy policy, which matches
requests to the resource that yields the highest reward. Previously, it was
known that the greedy policy is 1/2 competitive against a clairvoyant benchmark
that knows the request sequence in advance. In this work, we improve this
result by introducing a parameter that quantifies the degree of reusability of
the resources. Specifically, if p represents the smallest probability over the
usage distributions that a matched resource returns in one time step, the
greedy policy achieves a competitive ratio of $1/(2-p)$. Furthermore, when the
usage distributions are geometric, we establish a stronger competitive ratio of
$(1+p)/2$, which we demonstrate to be tight. Both of these results align with
the known results in the two extreme scenarios: p = 0 corresponds to
non-reusable resources, where 1/2 is known to be tight, while p = 1 corresponds
to every resource returning immediately, where greedy is the optimal policy and
hence the competitive ratio is 1. Finally, we show that both results are robust
to approximations of the greedy policy. Our work demonstrates that the
reusability of resources can enhance performance compared to the non-reusable
setting, and that a simple greedy policy suffices when the degree of
reusability is high. Our insights contribute to the understanding of how
resource reusability can influence the performance of online algorithms, and
highlight the potential for improved performance as the degree of reusability
increases.
| no_new_dataset | 0.947721 |
2304.03399 | Alaa Shaker | Alaa Shaker, Alaa Aldarf and Igor Bessmertny | Using LSTM and GRU With a New Dataset for Named Entity Recognition in
the Arabic Language | Proceedings of the 13th Majorov International Conference on Software
Engineering and Computer Systems | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Named entity recognition (NER) is a natural language processing task (NLP),
which aims to identify named entities and classify them like person, location,
organization, etc. In the Arabic language, we can find a considerable size of
unstructured data, and it needs to different preprocessing tool than languages
like (English, Russian, German...). From this point, we can note the importance
of building a new structured dataset to solve the lack of structured data. In
this work, we use the BIOES format to tag the word, which allows us to handle
the nested name entity that consists of more than one sentence and define the
start and the end of the name. The dataset consists of more than thirty-six
thousand records. In addition, this work proposes long short term memory (LSTM)
units and Gated Recurrent Units (GRU) for building the named entity recognition
model in the Arabic language. The models give an approximately good result
(80%) because LSTM and GRU models can find the relationships between the words
of the sentence. Also, use a new library from Google, which is Trax and
platform Colab
| [
{
"version": "v1",
"created": "Thu, 6 Apr 2023 22:14:02 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Shaker",
"Alaa",
""
],
[
"Aldarf",
"Alaa",
""
],
[
"Bessmertny",
"Igor",
""
]
] | TITLE: Using LSTM and GRU With a New Dataset for Named Entity Recognition in
the Arabic Language
ABSTRACT: Named entity recognition (NER) is a natural language processing task (NLP),
which aims to identify named entities and classify them like person, location,
organization, etc. In the Arabic language, we can find a considerable size of
unstructured data, and it needs to different preprocessing tool than languages
like (English, Russian, German...). From this point, we can note the importance
of building a new structured dataset to solve the lack of structured data. In
this work, we use the BIOES format to tag the word, which allows us to handle
the nested name entity that consists of more than one sentence and define the
start and the end of the name. The dataset consists of more than thirty-six
thousand records. In addition, this work proposes long short term memory (LSTM)
units and Gated Recurrent Units (GRU) for building the named entity recognition
model in the Arabic language. The models give an approximately good result
(80%) because LSTM and GRU models can find the relationships between the words
of the sentence. Also, use a new library from Google, which is Trax and
platform Colab
| new_dataset | 0.967287 |
2304.03400 | Tu Bui | Tu Bui, Shruti Agarwal, Ning Yu and John Collomosse | RoSteALS: Robust Steganography using Autoencoder Latent Space | accepted to CVPR WMF 2023 | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Data hiding such as steganography and invisible watermarking has important
applications in copyright protection, privacy-preserved communication and
content provenance. Existing works often fall short in either preserving image
quality, or robustness against perturbations or are too complex to train. We
propose RoSteALS, a practical steganography technique leveraging frozen
pretrained autoencoders to free the payload embedding from learning the
distribution of cover images. RoSteALS has a light-weight secret encoder of
just 300k parameters, is easy to train, has perfect secret recovery performance
and comparable image quality on three benchmarks. Additionally, RoSteALS can be
adapted for novel cover-less steganography applications in which the cover
image can be sampled from noise or conditioned on text prompts via a denoising
diffusion process. Our model and code are available at
\url{https://github.com/TuBui/RoSteALS}.
| [
{
"version": "v1",
"created": "Thu, 6 Apr 2023 22:14:26 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Bui",
"Tu",
""
],
[
"Agarwal",
"Shruti",
""
],
[
"Yu",
"Ning",
""
],
[
"Collomosse",
"John",
""
]
] | TITLE: RoSteALS: Robust Steganography using Autoencoder Latent Space
ABSTRACT: Data hiding such as steganography and invisible watermarking has important
applications in copyright protection, privacy-preserved communication and
content provenance. Existing works often fall short in either preserving image
quality, or robustness against perturbations or are too complex to train. We
propose RoSteALS, a practical steganography technique leveraging frozen
pretrained autoencoders to free the payload embedding from learning the
distribution of cover images. RoSteALS has a light-weight secret encoder of
just 300k parameters, is easy to train, has perfect secret recovery performance
and comparable image quality on three benchmarks. Additionally, RoSteALS can be
adapted for novel cover-less steganography applications in which the cover
image can be sampled from noise or conditioned on text prompts via a denoising
diffusion process. Our model and code are available at
\url{https://github.com/TuBui/RoSteALS}.
| no_new_dataset | 0.944434 |
2304.03406 | Xiangyi Yan | Xiangyi Yan, Junayed Naushad, Chenyu You, Hao Tang, Shanlin Sun, Kun
Han, Haoyu Ma, James Duncan, Xiaohui Xie | Localized Region Contrast for Enhancing Self-Supervised Learning in
Medical Image Segmentation | null | null | null | null | cs.CV cs.AI cs.LG | http://creativecommons.org/licenses/by/4.0/ | Recent advancements in self-supervised learning have demonstrated that
effective visual representations can be learned from unlabeled images. This has
led to increased interest in applying self-supervised learning to the medical
domain, where unlabeled images are abundant and labeled images are difficult to
obtain. However, most self-supervised learning approaches are modeled as image
level discriminative or generative proxy tasks, which may not capture the finer
level representations necessary for dense prediction tasks like multi-organ
segmentation. In this paper, we propose a novel contrastive learning framework
that integrates Localized Region Contrast (LRC) to enhance existing
self-supervised pre-training methods for medical image segmentation. Our
approach involves identifying Super-pixels by Felzenszwalb's algorithm and
performing local contrastive learning using a novel contrastive sampling loss.
Through extensive experiments on three multi-organ segmentation datasets, we
demonstrate that integrating LRC to an existing self-supervised method in a
limited annotation setting significantly improves segmentation performance.
Moreover, we show that LRC can also be applied to fully-supervised pre-training
methods to further boost performance.
| [
{
"version": "v1",
"created": "Thu, 6 Apr 2023 22:43:13 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Yan",
"Xiangyi",
""
],
[
"Naushad",
"Junayed",
""
],
[
"You",
"Chenyu",
""
],
[
"Tang",
"Hao",
""
],
[
"Sun",
"Shanlin",
""
],
[
"Han",
"Kun",
""
],
[
"Ma",
"Haoyu",
""
],
[
"Duncan",
"James",
""
],
[
"Xie",
"Xiaohui",
""
]
] | TITLE: Localized Region Contrast for Enhancing Self-Supervised Learning in
Medical Image Segmentation
ABSTRACT: Recent advancements in self-supervised learning have demonstrated that
effective visual representations can be learned from unlabeled images. This has
led to increased interest in applying self-supervised learning to the medical
domain, where unlabeled images are abundant and labeled images are difficult to
obtain. However, most self-supervised learning approaches are modeled as image
level discriminative or generative proxy tasks, which may not capture the finer
level representations necessary for dense prediction tasks like multi-organ
segmentation. In this paper, we propose a novel contrastive learning framework
that integrates Localized Region Contrast (LRC) to enhance existing
self-supervised pre-training methods for medical image segmentation. Our
approach involves identifying Super-pixels by Felzenszwalb's algorithm and
performing local contrastive learning using a novel contrastive sampling loss.
Through extensive experiments on three multi-organ segmentation datasets, we
demonstrate that integrating LRC to an existing self-supervised method in a
limited annotation setting significantly improves segmentation performance.
Moreover, we show that LRC can also be applied to fully-supervised pre-training
methods to further boost performance.
| no_new_dataset | 0.950411 |
2304.03410 | Sijie Zhu | Sijie Zhu, Linjie Yang, Chen Chen, Mubarak Shah, Xiaohui Shen, Heng
Wang | $R^{2}$Former: Unified $R$etrieval and $R$eranking Transformer for Place
Recognition | CVPR | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Visual Place Recognition (VPR) estimates the location of query images by
matching them with images in a reference database. Conventional methods
generally adopt aggregated CNN features for global retrieval and RANSAC-based
geometric verification for reranking. However, RANSAC only employs geometric
information but ignores other possible information that could be useful for
reranking, e.g. local feature correlations, and attention values. In this
paper, we propose a unified place recognition framework that handles both
retrieval and reranking with a novel transformer model, named $R^{2}$Former.
The proposed reranking module takes feature correlation, attention value, and
xy coordinates into account, and learns to determine whether the image pair is
from the same location. The whole pipeline is end-to-end trainable and the
reranking module alone can also be adopted on other CNN or transformer
backbones as a generic component. Remarkably, $R^{2}$Former significantly
outperforms state-of-the-art methods on major VPR datasets with much less
inference time and memory consumption. It also achieves the state-of-the-art on
the hold-out MSLS challenge set and could serve as a simple yet strong solution
for real-world large-scale applications. Experiments also show vision
transformer tokens are comparable and sometimes better than CNN local features
on local matching. The code is released at
https://github.com/Jeff-Zilence/R2Former.
| [
{
"version": "v1",
"created": "Thu, 6 Apr 2023 23:19:32 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Zhu",
"Sijie",
""
],
[
"Yang",
"Linjie",
""
],
[
"Chen",
"Chen",
""
],
[
"Shah",
"Mubarak",
""
],
[
"Shen",
"Xiaohui",
""
],
[
"Wang",
"Heng",
""
]
] | TITLE: $R^{2}$Former: Unified $R$etrieval and $R$eranking Transformer for Place
Recognition
ABSTRACT: Visual Place Recognition (VPR) estimates the location of query images by
matching them with images in a reference database. Conventional methods
generally adopt aggregated CNN features for global retrieval and RANSAC-based
geometric verification for reranking. However, RANSAC only employs geometric
information but ignores other possible information that could be useful for
reranking, e.g. local feature correlations, and attention values. In this
paper, we propose a unified place recognition framework that handles both
retrieval and reranking with a novel transformer model, named $R^{2}$Former.
The proposed reranking module takes feature correlation, attention value, and
xy coordinates into account, and learns to determine whether the image pair is
from the same location. The whole pipeline is end-to-end trainable and the
reranking module alone can also be adopted on other CNN or transformer
backbones as a generic component. Remarkably, $R^{2}$Former significantly
outperforms state-of-the-art methods on major VPR datasets with much less
inference time and memory consumption. It also achieves the state-of-the-art on
the hold-out MSLS challenge set and could serve as a simple yet strong solution
for real-world large-scale applications. Experiments also show vision
transformer tokens are comparable and sometimes better than CNN local features
on local matching. The code is released at
https://github.com/Jeff-Zilence/R2Former.
| no_new_dataset | 0.951097 |
2304.03420 | Mana Masuda | Mana Masuda, Ryo Hachiuma, Ryo Fujii, Hideo Saito, Yusuke Sekikawa | Toward Unsupervised 3D Point Cloud Anomaly Detection using Variational
Autoencoder | ICIP2021 | null | null | null | cs.CV | http://creativecommons.org/licenses/by-sa/4.0/ | In this paper, we present an end-to-end unsupervised anomaly detection
framework for 3D point clouds. To the best of our knowledge, this is the first
work to tackle the anomaly detection task on a general object represented by a
3D point cloud. We propose a deep variational autoencoder-based unsupervised
anomaly detection network adapted to the 3D point cloud and an anomaly score
specifically for 3D point clouds. To verify the effectiveness of the model, we
conducted extensive experiments on the ShapeNet dataset. Through quantitative
and qualitative evaluation, we demonstrate that the proposed method outperforms
the baseline method. Our code is available at
https://github.com/llien30/point_cloud_anomaly_detection.
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2023 00:02:37 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Masuda",
"Mana",
""
],
[
"Hachiuma",
"Ryo",
""
],
[
"Fujii",
"Ryo",
""
],
[
"Saito",
"Hideo",
""
],
[
"Sekikawa",
"Yusuke",
""
]
] | TITLE: Toward Unsupervised 3D Point Cloud Anomaly Detection using Variational
Autoencoder
ABSTRACT: In this paper, we present an end-to-end unsupervised anomaly detection
framework for 3D point clouds. To the best of our knowledge, this is the first
work to tackle the anomaly detection task on a general object represented by a
3D point cloud. We propose a deep variational autoencoder-based unsupervised
anomaly detection network adapted to the 3D point cloud and an anomaly score
specifically for 3D point clouds. To verify the effectiveness of the model, we
conducted extensive experiments on the ShapeNet dataset. Through quantitative
and qualitative evaluation, we demonstrate that the proposed method outperforms
the baseline method. Our code is available at
https://github.com/llien30/point_cloud_anomaly_detection.
| no_new_dataset | 0.952486 |
2304.03428 | Shaoyu Chen | Shaoyu Chen, Tianheng Cheng, Jiemin Fang, Qian Zhang, Yuan Li, Wenyu
Liu, Xinggang Wang | TinyDet: Accurate Small Object Detection in Lightweight Generic
Detectors | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Small object detection requires the detection head to scan a large number of
positions on image feature maps, which is extremely hard for computation- and
energy-efficient lightweight generic detectors. To accurately detect small
objects with limited computation, we propose a two-stage lightweight detection
framework with extremely low computation complexity, termed as TinyDet. It
enables high-resolution feature maps for dense anchoring to better cover small
objects, proposes a sparsely-connected convolution for computation reduction,
enhances the early stage features in the backbone, and addresses the feature
misalignment problem for accurate small object detection. On the COCO
benchmark, our TinyDet-M achieves 30.3 AP and 13.5 AP^s with only 991 MFLOPs,
which is the first detector that has an AP over 30 with less than 1 GFLOPs;
besides, TinyDet-S and TinyDet-L achieve promising performance under different
computation limitation.
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2023 00:45:50 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Chen",
"Shaoyu",
""
],
[
"Cheng",
"Tianheng",
""
],
[
"Fang",
"Jiemin",
""
],
[
"Zhang",
"Qian",
""
],
[
"Li",
"Yuan",
""
],
[
"Liu",
"Wenyu",
""
],
[
"Wang",
"Xinggang",
""
]
] | TITLE: TinyDet: Accurate Small Object Detection in Lightweight Generic
Detectors
ABSTRACT: Small object detection requires the detection head to scan a large number of
positions on image feature maps, which is extremely hard for computation- and
energy-efficient lightweight generic detectors. To accurately detect small
objects with limited computation, we propose a two-stage lightweight detection
framework with extremely low computation complexity, termed as TinyDet. It
enables high-resolution feature maps for dense anchoring to better cover small
objects, proposes a sparsely-connected convolution for computation reduction,
enhances the early stage features in the backbone, and addresses the feature
misalignment problem for accurate small object detection. On the COCO
benchmark, our TinyDet-M achieves 30.3 AP and 13.5 AP^s with only 991 MFLOPs,
which is the first detector that has an AP over 30 with less than 1 GFLOPs;
besides, TinyDet-S and TinyDet-L achieve promising performance under different
computation limitation.
| no_new_dataset | 0.945701 |
2304.03440 | Takuro Kutsuna | Takuro Kutsuna | Supervised Contrastive Learning with Heterogeneous Similarity for
Distribution Shifts | 23 pages, 11 figures, under review | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Distribution shifts are problems where the distribution of data changes
between training and testing, which can significantly degrade the performance
of a model deployed in the real world. Recent studies suggest that one reason
for the degradation is a type of overfitting, and that proper regularization
can mitigate the degradation, especially when using highly representative
models such as neural networks. In this paper, we propose a new regularization
using the supervised contrastive learning to prevent such overfitting and to
train models that do not degrade their performance under the distribution
shifts. We extend the cosine similarity in contrastive loss to a more general
similarity measure and propose to use different parameters in the measure when
comparing a sample to a positive or negative example, which is analytically
shown to act as a kind of margin in contrastive loss. Experiments on benchmark
datasets that emulate distribution shifts, including subpopulation shift and
domain generalization, demonstrate the advantage of the proposed method over
existing regularization methods.
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2023 01:45:09 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Kutsuna",
"Takuro",
""
]
] | TITLE: Supervised Contrastive Learning with Heterogeneous Similarity for
Distribution Shifts
ABSTRACT: Distribution shifts are problems where the distribution of data changes
between training and testing, which can significantly degrade the performance
of a model deployed in the real world. Recent studies suggest that one reason
for the degradation is a type of overfitting, and that proper regularization
can mitigate the degradation, especially when using highly representative
models such as neural networks. In this paper, we propose a new regularization
using the supervised contrastive learning to prevent such overfitting and to
train models that do not degrade their performance under the distribution
shifts. We extend the cosine similarity in contrastive loss to a more general
similarity measure and propose to use different parameters in the measure when
comparing a sample to a positive or negative example, which is analytically
shown to act as a kind of margin in contrastive loss. Experiments on benchmark
datasets that emulate distribution shifts, including subpopulation shift and
domain generalization, demonstrate the advantage of the proposed method over
existing regularization methods.
| no_new_dataset | 0.950134 |
2304.03441 | Yulin Yu | Yulin Yu, Longqi Yang, Si\^an Lindley, Mengting Wan | Large-Scale Analysis of New Employee Network Dynamics | Accepted at the International World Wide Web Conference (WWW,2023) | null | 10.1145/3543507.3583400 | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The COVID-19 pandemic has accelerated digital transformations across
industries, but also introduced new challenges into workplaces, including the
difficulties of effectively socializing with colleagues when working remotely.
This challenge is exacerbated for new employees who need to develop workplace
networks from the outset. In this paper, by analyzing a large-scale telemetry
dataset of more than 10,000 Microsoft employees who joined the company in the
first three months of 2022, we describe how new employees interact and
telecommute with their colleagues during their ``onboarding'' period. Our
results reveal that although new hires are gradually expanding networks over
time, there still exists significant gaps between their network statistics and
those of tenured employees even after the six-month onboarding phase. We also
observe that heterogeneity exists among new employees in how their networks
change over time, where employees whose job tasks do not necessarily require
extensive and diverse connections could be at a disadvantaged position in this
onboarding process. By investigating how web-based people recommendations in
organizational knowledge base facilitate new employees naturally expand their
networks, we also demonstrate the potential of web-based applications for
addressing the aforementioned socialization challenges. Altogether, our
findings provide insights on new employee network dynamics in remote and hybrid
work environments, which may help guide organizational leaders and web
application developers on quantifying and improving the socialization
experiences of new employees in digital workplaces.
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2023 01:51:50 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Yu",
"Yulin",
""
],
[
"Yang",
"Longqi",
""
],
[
"Lindley",
"Siân",
""
],
[
"Wan",
"Mengting",
""
]
] | TITLE: Large-Scale Analysis of New Employee Network Dynamics
ABSTRACT: The COVID-19 pandemic has accelerated digital transformations across
industries, but also introduced new challenges into workplaces, including the
difficulties of effectively socializing with colleagues when working remotely.
This challenge is exacerbated for new employees who need to develop workplace
networks from the outset. In this paper, by analyzing a large-scale telemetry
dataset of more than 10,000 Microsoft employees who joined the company in the
first three months of 2022, we describe how new employees interact and
telecommute with their colleagues during their ``onboarding'' period. Our
results reveal that although new hires are gradually expanding networks over
time, there still exists significant gaps between their network statistics and
those of tenured employees even after the six-month onboarding phase. We also
observe that heterogeneity exists among new employees in how their networks
change over time, where employees whose job tasks do not necessarily require
extensive and diverse connections could be at a disadvantaged position in this
onboarding process. By investigating how web-based people recommendations in
organizational knowledge base facilitate new employees naturally expand their
networks, we also demonstrate the potential of web-based applications for
addressing the aforementioned socialization challenges. Altogether, our
findings provide insights on new employee network dynamics in remote and hybrid
work environments, which may help guide organizational leaders and web
application developers on quantifying and improving the socialization
experiences of new employees in digital workplaces.
| no_new_dataset | 0.940079 |
2304.03454 | Yongjun Zhang | Yongjun Zhang, Sijia Liu, Yi Wang, Xinguang Fan | Detecting Chinese Fake News on Twitter during the COVID-19 Pandemic | null | null | null | null | cs.CY cs.SI | http://creativecommons.org/licenses/by-nc-sa/4.0/ | The outbreak of COVID-19 has led to a global surge of Sinophobia partly
because of the spread of misinformation, disinformation, and fake news on
China. In this paper, we report on the creation of a novel classifier that
detects whether Chinese-language social media posts from Twitter are related to
fake news about China. The classifier achieves an F1 score of 0.64 and an
accuracy rate of 93%. We provide the final model and a new training dataset
with 18,425 tweets for researchers to study fake news in the Chinese language
during the COVID-19 pandemic. We also introduce a new dataset generated by our
classifier that tracks the dynamics of fake news in the Chinese language during
the early pandemic.
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2023 03:03:11 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Zhang",
"Yongjun",
""
],
[
"Liu",
"Sijia",
""
],
[
"Wang",
"Yi",
""
],
[
"Fan",
"Xinguang",
""
]
] | TITLE: Detecting Chinese Fake News on Twitter during the COVID-19 Pandemic
ABSTRACT: The outbreak of COVID-19 has led to a global surge of Sinophobia partly
because of the spread of misinformation, disinformation, and fake news on
China. In this paper, we report on the creation of a novel classifier that
detects whether Chinese-language social media posts from Twitter are related to
fake news about China. The classifier achieves an F1 score of 0.64 and an
accuracy rate of 93%. We provide the final model and a new training dataset
with 18,425 tweets for researchers to study fake news in the Chinese language
during the COVID-19 pandemic. We also introduce a new dataset generated by our
classifier that tracks the dynamics of fake news in the Chinese language during
the early pandemic.
| new_dataset | 0.955152 |
2304.03456 | Kyungyul Kim | Jae-Hun Lee, Doyoung Yoon, ByeongMoon Ji, Kyungyul Kim, Sangheum Hwang | Rethinking Evaluation Protocols of Visual Representations Learned via
Self-supervised Learning | null | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Linear probing (LP) (and $k$-NN) on the upstream dataset with labels (e.g.,
ImageNet) and transfer learning (TL) to various downstream datasets are
commonly employed to evaluate the quality of visual representations learned via
self-supervised learning (SSL). Although existing SSL methods have shown good
performances under those evaluation protocols, we observe that the performances
are very sensitive to the hyperparameters involved in LP and TL. We argue that
this is an undesirable behavior since truly generic representations should be
easily adapted to any other visual recognition task, i.e., the learned
representations should be robust to the settings of LP and TL hyperparameters.
In this work, we try to figure out the cause of performance sensitivity by
conducting extensive experiments with state-of-the-art SSL methods. First, we
find that input normalization for LP is crucial to eliminate performance
variations according to the hyperparameters. Specifically, batch normalization
before feeding inputs to a linear classifier considerably improves the
stability of evaluation, and also resolves inconsistency of $k$-NN and LP
metrics. Second, for TL, we demonstrate that a weight decay parameter in SSL
significantly affects the transferability of learned representations, which
cannot be identified by LP or $k$-NN evaluations on the upstream dataset. We
believe that the findings of this study will be beneficial for the community by
drawing attention to the shortcomings in the current SSL evaluation schemes and
underscoring the need to reconsider them.
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2023 03:03:19 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Lee",
"Jae-Hun",
""
],
[
"Yoon",
"Doyoung",
""
],
[
"Ji",
"ByeongMoon",
""
],
[
"Kim",
"Kyungyul",
""
],
[
"Hwang",
"Sangheum",
""
]
] | TITLE: Rethinking Evaluation Protocols of Visual Representations Learned via
Self-supervised Learning
ABSTRACT: Linear probing (LP) (and $k$-NN) on the upstream dataset with labels (e.g.,
ImageNet) and transfer learning (TL) to various downstream datasets are
commonly employed to evaluate the quality of visual representations learned via
self-supervised learning (SSL). Although existing SSL methods have shown good
performances under those evaluation protocols, we observe that the performances
are very sensitive to the hyperparameters involved in LP and TL. We argue that
this is an undesirable behavior since truly generic representations should be
easily adapted to any other visual recognition task, i.e., the learned
representations should be robust to the settings of LP and TL hyperparameters.
In this work, we try to figure out the cause of performance sensitivity by
conducting extensive experiments with state-of-the-art SSL methods. First, we
find that input normalization for LP is crucial to eliminate performance
variations according to the hyperparameters. Specifically, batch normalization
before feeding inputs to a linear classifier considerably improves the
stability of evaluation, and also resolves inconsistency of $k$-NN and LP
metrics. Second, for TL, we demonstrate that a weight decay parameter in SSL
significantly affects the transferability of learned representations, which
cannot be identified by LP or $k$-NN evaluations on the upstream dataset. We
believe that the findings of this study will be beneficial for the community by
drawing attention to the shortcomings in the current SSL evaluation schemes and
underscoring the need to reconsider them.
| no_new_dataset | 0.943815 |
2304.03481 | Gaojie Wu | Gaojie Wu, Wei-Shi Zheng, Yutong Lu, Qi Tian | PSLT: A Light-weight Vision Transformer with Ladder Self-Attention and
Progressive Shift | Accepted to IEEE Transaction on Pattern Analysis and Machine
Intelligence, 2023 (Submission date: 08-Jul-202) | IEEE Transaction on Pattern Analysis and Machine Intelligence,
2023 | 10.1109/TPAMI.2023.3265499 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Vision Transformer (ViT) has shown great potential for various visual tasks
due to its ability to model long-range dependency. However, ViT requires a
large amount of computing resource to compute the global self-attention. In
this work, we propose a ladder self-attention block with multiple branches and
a progressive shift mechanism to develop a light-weight transformer backbone
that requires less computing resources (e.g. a relatively small number of
parameters and FLOPs), termed Progressive Shift Ladder Transformer (PSLT).
First, the ladder self-attention block reduces the computational cost by
modelling local self-attention in each branch. In the meanwhile, the
progressive shift mechanism is proposed to enlarge the receptive field in the
ladder self-attention block by modelling diverse local self-attention for each
branch and interacting among these branches. Second, the input feature of the
ladder self-attention block is split equally along the channel dimension for
each branch, which considerably reduces the computational cost in the ladder
self-attention block (with nearly 1/3 the amount of parameters and FLOPs), and
the outputs of these branches are then collaborated by a pixel-adaptive fusion.
Therefore, the ladder self-attention block with a relatively small number of
parameters and FLOPs is capable of modelling long-range interactions. Based on
the ladder self-attention block, PSLT performs well on several vision tasks,
including image classification, objection detection and person
re-identification. On the ImageNet-1k dataset, PSLT achieves a top-1 accuracy
of 79.9% with 9.2M parameters and 1.9G FLOPs, which is comparable to several
existing models with more than 20M parameters and 4G FLOPs. Code is available
at https://isee-ai.cn/wugaojie/PSLT.html.
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2023 05:21:37 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Wu",
"Gaojie",
""
],
[
"Zheng",
"Wei-Shi",
""
],
[
"Lu",
"Yutong",
""
],
[
"Tian",
"Qi",
""
]
] | TITLE: PSLT: A Light-weight Vision Transformer with Ladder Self-Attention and
Progressive Shift
ABSTRACT: Vision Transformer (ViT) has shown great potential for various visual tasks
due to its ability to model long-range dependency. However, ViT requires a
large amount of computing resource to compute the global self-attention. In
this work, we propose a ladder self-attention block with multiple branches and
a progressive shift mechanism to develop a light-weight transformer backbone
that requires less computing resources (e.g. a relatively small number of
parameters and FLOPs), termed Progressive Shift Ladder Transformer (PSLT).
First, the ladder self-attention block reduces the computational cost by
modelling local self-attention in each branch. In the meanwhile, the
progressive shift mechanism is proposed to enlarge the receptive field in the
ladder self-attention block by modelling diverse local self-attention for each
branch and interacting among these branches. Second, the input feature of the
ladder self-attention block is split equally along the channel dimension for
each branch, which considerably reduces the computational cost in the ladder
self-attention block (with nearly 1/3 the amount of parameters and FLOPs), and
the outputs of these branches are then collaborated by a pixel-adaptive fusion.
Therefore, the ladder self-attention block with a relatively small number of
parameters and FLOPs is capable of modelling long-range interactions. Based on
the ladder self-attention block, PSLT performs well on several vision tasks,
including image classification, objection detection and person
re-identification. On the ImageNet-1k dataset, PSLT achieves a top-1 accuracy
of 79.9% with 9.2M parameters and 1.9G FLOPs, which is comparable to several
existing models with more than 20M parameters and 4G FLOPs. Code is available
at https://isee-ai.cn/wugaojie/PSLT.html.
| no_new_dataset | 0.947624 |
2304.03486 | Subin Sahayam | Subin Sahayam, John Zakkam, Umarani Jayaraman | Can we learn better with hard samples? | null | null | null | null | cs.CV cs.AI | http://creativecommons.org/licenses/by/4.0/ | In deep learning, mini-batch training is commonly used to optimize network
parameters. However, the traditional mini-batch method may not learn the
under-represented samples and complex patterns in the data, leading to a longer
time for generalization. To address this problem, a variant of the traditional
algorithm has been proposed, which trains the network focusing on mini-batches
with high loss. The study evaluates the effectiveness of the proposed training
using various deep neural networks trained on three benchmark datasets
(CIFAR-10, CIFAR-100, and STL-10). The deep neural networks used in the study
are ResNet-18, ResNet-50, Efficient Net B4, EfficientNetV2-S, and
MobilenetV3-S. The experimental results showed that the proposed method can
significantly improve the test accuracy and speed up the convergence compared
to the traditional mini-batch training method. Furthermore, we introduce a
hyper-parameter delta ({\delta}) that decides how many mini-batches are
considered for training. Experiments on various values of {\delta} found that
the performance of the proposed method for smaller {\delta} values generally
results in similar test accuracy and faster generalization. We show that the
proposed method generalizes in 26.47% less number of epochs than the
traditional mini-batch method in EfficientNet-B4 on STL-10. The proposed method
also improves the test top-1 accuracy by 7.26% in ResNet-18 on CIFAR-100.
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2023 05:45:26 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Sahayam",
"Subin",
""
],
[
"Zakkam",
"John",
""
],
[
"Jayaraman",
"Umarani",
""
]
] | TITLE: Can we learn better with hard samples?
ABSTRACT: In deep learning, mini-batch training is commonly used to optimize network
parameters. However, the traditional mini-batch method may not learn the
under-represented samples and complex patterns in the data, leading to a longer
time for generalization. To address this problem, a variant of the traditional
algorithm has been proposed, which trains the network focusing on mini-batches
with high loss. The study evaluates the effectiveness of the proposed training
using various deep neural networks trained on three benchmark datasets
(CIFAR-10, CIFAR-100, and STL-10). The deep neural networks used in the study
are ResNet-18, ResNet-50, Efficient Net B4, EfficientNetV2-S, and
MobilenetV3-S. The experimental results showed that the proposed method can
significantly improve the test accuracy and speed up the convergence compared
to the traditional mini-batch training method. Furthermore, we introduce a
hyper-parameter delta ({\delta}) that decides how many mini-batches are
considered for training. Experiments on various values of {\delta} found that
the performance of the proposed method for smaller {\delta} values generally
results in similar test accuracy and faster generalization. We show that the
proposed method generalizes in 26.47% less number of epochs than the
traditional mini-batch method in EfficientNet-B4 on STL-10. The proposed method
also improves the test top-1 accuracy by 7.26% in ResNet-18 on CIFAR-100.
| no_new_dataset | 0.948822 |
2304.03487 | Ali Tehrani | Ali TehraniJamsaz, Alok Mishra, Akash Dutta, Abid M. Malik, Barbara
Chapman, Ali Jannesari | ParaGraph: Weighted Graph Representation for Performance Optimization of
HPC Kernels | null | null | null | null | cs.DC cs.LG cs.PF | http://creativecommons.org/licenses/by/4.0/ | GPU-based HPC clusters are attracting more scientific application developers
due to their extensive parallelism and energy efficiency. In order to achieve
portability among a variety of multi/many core architectures, a popular choice
for an application developer is to utilize directive-based parallel programming
models, such as OpenMP. However, even with OpenMP, the developer must choose
from among many strategies for exploiting a GPU or a CPU. Recently, Machine
Learning (ML) approaches have brought significant advances in the optimizations
of HPC applications. To this end, several ways have been proposed to represent
application characteristics for ML models. However, the available techniques
fail to capture features that are crucial for exposing parallelism. In this
paper, we introduce a new graph-based program representation for parallel
applications that extends the Abstract Syntax Tree to represent control and
data flow information. The originality of this work lies in the addition of new
edges exploiting the implicit ordering and parent-child relationships in ASTs,
as well as the introduction of edge weights to account for loop and condition
information. We evaluate our proposed representation by training a Graph Neural
Network (GNN) to predict the runtime of an OpenMP code region across CPUs and
GPUs. Various transformations utilizing collapse and data transfer between the
CPU and GPU are used to construct the dataset. The predicted runtime of the
model is used to determine which transformation provides the best performance.
Results show that our approach is indeed effective and has normalized RMSE as
low as 0.004 to at most 0.01 in its runtime predictions.
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2023 05:52:59 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"TehraniJamsaz",
"Ali",
""
],
[
"Mishra",
"Alok",
""
],
[
"Dutta",
"Akash",
""
],
[
"Malik",
"Abid M.",
""
],
[
"Chapman",
"Barbara",
""
],
[
"Jannesari",
"Ali",
""
]
] | TITLE: ParaGraph: Weighted Graph Representation for Performance Optimization of
HPC Kernels
ABSTRACT: GPU-based HPC clusters are attracting more scientific application developers
due to their extensive parallelism and energy efficiency. In order to achieve
portability among a variety of multi/many core architectures, a popular choice
for an application developer is to utilize directive-based parallel programming
models, such as OpenMP. However, even with OpenMP, the developer must choose
from among many strategies for exploiting a GPU or a CPU. Recently, Machine
Learning (ML) approaches have brought significant advances in the optimizations
of HPC applications. To this end, several ways have been proposed to represent
application characteristics for ML models. However, the available techniques
fail to capture features that are crucial for exposing parallelism. In this
paper, we introduce a new graph-based program representation for parallel
applications that extends the Abstract Syntax Tree to represent control and
data flow information. The originality of this work lies in the addition of new
edges exploiting the implicit ordering and parent-child relationships in ASTs,
as well as the introduction of edge weights to account for loop and condition
information. We evaluate our proposed representation by training a Graph Neural
Network (GNN) to predict the runtime of an OpenMP code region across CPUs and
GPUs. Various transformations utilizing collapse and data transfer between the
CPU and GPU are used to construct the dataset. The predicted runtime of the
model is used to determine which transformation provides the best performance.
Results show that our approach is indeed effective and has normalized RMSE as
low as 0.004 to at most 0.01 in its runtime predictions.
| no_new_dataset | 0.942612 |
2304.03493 | Yiwen Ye | Yiwen Ye, Yutong Xie, Jianpeng Zhang, Ziyang Chen, Yong Xia | UniSeg: A Prompt-driven Universal Segmentation Model as well as A Strong
Representation Learner | 13 pages, 4 figures | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The universal model emerges as a promising trend for medical image
segmentation, paving up the way to build medical imaging large model (MILM).
One popular strategy to build universal models is to encode each task as a
one-hot vector and generate dynamic convolutional layers at the end of the
decoder to extract the interested target. Although successful, it ignores the
correlations among tasks and meanwhile is too late to make the model 'aware' of
the ongoing task. To address both issues, we propose a prompt-driven Universal
Segmentation model (UniSeg) for multi-task medical image segmentation using
diverse modalities and domains. We first devise a learnable universal prompt to
describe the correlations among all tasks and then convert this prompt and
image features into a task-specific prompt, which is fed to the decoder as a
part of its input. Thus, we make the model 'aware' of the ongoing task early
and boost the task-specific training of the whole decoder. Our results indicate
that the proposed UniSeg outperforms other universal models and single-task
models on 11 upstream tasks. Moreover, UniSeg also beats other pre-trained
models on two downstream datasets, providing the community with a high-quality
pre-trained model for 3D medical image segmentation. Code and model are
available at https://github.com/yeerwen/UniSeg.
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2023 06:28:51 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Ye",
"Yiwen",
""
],
[
"Xie",
"Yutong",
""
],
[
"Zhang",
"Jianpeng",
""
],
[
"Chen",
"Ziyang",
""
],
[
"Xia",
"Yong",
""
]
] | TITLE: UniSeg: A Prompt-driven Universal Segmentation Model as well as A Strong
Representation Learner
ABSTRACT: The universal model emerges as a promising trend for medical image
segmentation, paving up the way to build medical imaging large model (MILM).
One popular strategy to build universal models is to encode each task as a
one-hot vector and generate dynamic convolutional layers at the end of the
decoder to extract the interested target. Although successful, it ignores the
correlations among tasks and meanwhile is too late to make the model 'aware' of
the ongoing task. To address both issues, we propose a prompt-driven Universal
Segmentation model (UniSeg) for multi-task medical image segmentation using
diverse modalities and domains. We first devise a learnable universal prompt to
describe the correlations among all tasks and then convert this prompt and
image features into a task-specific prompt, which is fed to the decoder as a
part of its input. Thus, we make the model 'aware' of the ongoing task early
and boost the task-specific training of the whole decoder. Our results indicate
that the proposed UniSeg outperforms other universal models and single-task
models on 11 upstream tasks. Moreover, UniSeg also beats other pre-trained
models on two downstream datasets, providing the community with a high-quality
pre-trained model for 3D medical image segmentation. Code and model are
available at https://github.com/yeerwen/UniSeg.
| no_new_dataset | 0.945045 |
2304.03495 | Deunsol Jung | Deunsol Jung, Sanghyun Kim, Won Hwa Kim, Minsu Cho | Devil's on the Edges: Selective Quad Attention for Scene Graph
Generation | Accepted at CVPR 2023; Project page at
https://cvlab.postech.ac.kr/research/SQUAT/ | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Scene graph generation aims to construct a semantic graph structure from an
image such that its nodes and edges respectively represent objects and their
relationships. One of the major challenges for the task lies in the presence of
distracting objects and relationships in images; contextual reasoning is
strongly distracted by irrelevant objects or backgrounds and, more importantly,
a vast number of irrelevant candidate relations. To tackle the issue, we
propose the Selective Quad Attention Network (SQUAT) that learns to select
relevant object pairs and disambiguate them via diverse contextual
interactions. SQUAT consists of two main components: edge selection and quad
attention. The edge selection module selects relevant object pairs, i.e., edges
in the scene graph, which helps contextual reasoning, and the quad attention
module then updates the edge features using both edge-to-node and edge-to-edge
cross-attentions to capture contextual information between objects and object
pairs. Experiments demonstrate the strong performance and robustness of SQUAT,
achieving the state of the art on the Visual Genome and Open Images v6
benchmarks.
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2023 06:33:46 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Jung",
"Deunsol",
""
],
[
"Kim",
"Sanghyun",
""
],
[
"Kim",
"Won Hwa",
""
],
[
"Cho",
"Minsu",
""
]
] | TITLE: Devil's on the Edges: Selective Quad Attention for Scene Graph
Generation
ABSTRACT: Scene graph generation aims to construct a semantic graph structure from an
image such that its nodes and edges respectively represent objects and their
relationships. One of the major challenges for the task lies in the presence of
distracting objects and relationships in images; contextual reasoning is
strongly distracted by irrelevant objects or backgrounds and, more importantly,
a vast number of irrelevant candidate relations. To tackle the issue, we
propose the Selective Quad Attention Network (SQUAT) that learns to select
relevant object pairs and disambiguate them via diverse contextual
interactions. SQUAT consists of two main components: edge selection and quad
attention. The edge selection module selects relevant object pairs, i.e., edges
in the scene graph, which helps contextual reasoning, and the quad attention
module then updates the edge features using both edge-to-node and edge-to-edge
cross-attentions to capture contextual information between objects and object
pairs. Experiments demonstrate the strong performance and robustness of SQUAT,
achieving the state of the art on the Visual Genome and Open Images v6
benchmarks.
| no_new_dataset | 0.950041 |
2304.03509 | Md. Azizul Hakim | Amena Begum Farha, Md. Azizul Hakim, Mst. Eshita Khatun | Local Rose Breeds Detection System Using Transfer Learning Techniques | 6 pages, 11 figures, conference | null | 10.1109/ICCCNT54827.2022.9984329 | null | cs.CV cs.AI | http://creativecommons.org/licenses/by/4.0/ | Flower breed detection and giving details of that breed with the suggestion
of cultivation processes and the way of taking care is important for flower
cultivation, breed invention, and the flower business. Among all the local
flowers in Bangladesh, the rose is one of the most popular and demanded
flowers. Roses are the most desirable flower not only in Bangladesh but also
throughout the world. Roses can be used for many other purposes apart from
decoration. As roses have a great demand in the flower business so rose breed
detection will be very essential. However, there is no remarkable work for
breed detection of a particular flower unlike the classification of different
flowers. In this research, we have proposed a model to detect rose breeds from
images using transfer learning techniques. For such work in flowers, resources
are not enough in image processing and classification, so we needed a large
dataset of the massive number of images to train our model. we have used 1939
raw images of five different breeds and we have generated 9306 images for the
training dataset and 388 images for the testing dataset to validate the model
using augmentation. We have applied four transfer learning models in this
research, which are Inception V3, ResNet50, Xception, and VGG16. Among these
four models, VGG16 achieved the highest accuracy of 99%, which is an excellent
outcome. Breed detection of a rose by using transfer learning methods is the
first work on breed detection of a particular flower that is publicly available
according to the study.
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2023 07:02:25 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Farha",
"Amena Begum",
""
],
[
"Hakim",
"Md. Azizul",
""
],
[
"Khatun",
"Mst. Eshita",
""
]
] | TITLE: Local Rose Breeds Detection System Using Transfer Learning Techniques
ABSTRACT: Flower breed detection and giving details of that breed with the suggestion
of cultivation processes and the way of taking care is important for flower
cultivation, breed invention, and the flower business. Among all the local
flowers in Bangladesh, the rose is one of the most popular and demanded
flowers. Roses are the most desirable flower not only in Bangladesh but also
throughout the world. Roses can be used for many other purposes apart from
decoration. As roses have a great demand in the flower business so rose breed
detection will be very essential. However, there is no remarkable work for
breed detection of a particular flower unlike the classification of different
flowers. In this research, we have proposed a model to detect rose breeds from
images using transfer learning techniques. For such work in flowers, resources
are not enough in image processing and classification, so we needed a large
dataset of the massive number of images to train our model. we have used 1939
raw images of five different breeds and we have generated 9306 images for the
training dataset and 388 images for the testing dataset to validate the model
using augmentation. We have applied four transfer learning models in this
research, which are Inception V3, ResNet50, Xception, and VGG16. Among these
four models, VGG16 achieved the highest accuracy of 99%, which is an excellent
outcome. Breed detection of a rose by using transfer learning methods is the
first work on breed detection of a particular flower that is publicly available
according to the study.
| new_dataset | 0.944434 |
2304.03522 | Wonjun Yi | Wonjun Yi, Jung-Woo Choi | On-site Noise Exposure technique for noise-robust machine fault
classification | Presented at 24th International Congress on Acoustics (ICA) 2022 | null | null | null | cs.SD eess.AS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In-situ classification of faulty sounds is an important issue in machine
health monitoring and diagnosis. However, in a noisy environment such as a
factory, machine sound is always mixed up with environmental noises, and
noise-only periods can exist when a machine is not in operation. Therefore, a
deep neural network (DNN)-based fault classifier has to be able to distinguish
noise from machine sound and be robust to mixed noises. To deal with these
problems, we investigate on-site noise exposure (ONE) that exposes a DNN model
to the noises recorded in the same environment where the machine operates. Like
the outlier exposure technique, noise exposure trains a DNN classifier to
produce a uniform predicted probability distribution against noise-only data.
During inference, the DNN classifier trained by ONE outputs the maximum softmax
probability as the noise score and determines the noise-only period. We mix
machine sound and noises of the ToyADMOS2 dataset to simulate highly noisy
data. A ResNet-based classifier trained by ONE is evaluated and compared with
those trained by other out-of-distribution detection techniques. The test
results show that exposing a model to on-site noises can make a model more
robust than using other noises or detection techniques.
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2023 07:35:52 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Yi",
"Wonjun",
""
],
[
"Choi",
"Jung-Woo",
""
]
] | TITLE: On-site Noise Exposure technique for noise-robust machine fault
classification
ABSTRACT: In-situ classification of faulty sounds is an important issue in machine
health monitoring and diagnosis. However, in a noisy environment such as a
factory, machine sound is always mixed up with environmental noises, and
noise-only periods can exist when a machine is not in operation. Therefore, a
deep neural network (DNN)-based fault classifier has to be able to distinguish
noise from machine sound and be robust to mixed noises. To deal with these
problems, we investigate on-site noise exposure (ONE) that exposes a DNN model
to the noises recorded in the same environment where the machine operates. Like
the outlier exposure technique, noise exposure trains a DNN classifier to
produce a uniform predicted probability distribution against noise-only data.
During inference, the DNN classifier trained by ONE outputs the maximum softmax
probability as the noise score and determines the noise-only period. We mix
machine sound and noises of the ToyADMOS2 dataset to simulate highly noisy
data. A ResNet-based classifier trained by ONE is evaluated and compared with
those trained by other out-of-distribution detection techniques. The test
results show that exposing a model to on-site noises can make a model more
robust than using other noises or detection techniques.
| no_new_dataset | 0.955068 |
2304.03526 | Li Leheng | Leheng Li, Qing Lian, Luozhou Wang, Ningning Ma, Ying-Cong Chen | Lift3D: Synthesize 3D Training Data by Lifting 2D GAN to 3D Generative
Radiance Field | CVPR 2023 | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | This work explores the use of 3D generative models to synthesize training
data for 3D vision tasks. The key requirements of the generative models are
that the generated data should be photorealistic to match the real-world
scenarios, and the corresponding 3D attributes should be aligned with given
sampling labels. However, we find that the recent NeRF-based 3D GANs hardly
meet the above requirements due to their designed generation pipeline and the
lack of explicit 3D supervision. In this work, we propose Lift3D, an inverted
2D-to-3D generation framework to achieve the data generation objectives. Lift3D
has several merits compared to prior methods: (1) Unlike previous 3D GANs that
the output resolution is fixed after training, Lift3D can generalize to any
camera intrinsic with higher resolution and photorealistic output. (2) By
lifting well-disentangled 2D GAN to 3D object NeRF, Lift3D provides explicit 3D
information of generated objects, thus offering accurate 3D annotations for
downstream tasks. We evaluate the effectiveness of our framework by augmenting
autonomous driving datasets. Experimental results demonstrate that our data
generation framework can effectively improve the performance of 3D object
detectors. Project page: https://len-li.github.io/lift3d-web.
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2023 07:43:02 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Li",
"Leheng",
""
],
[
"Lian",
"Qing",
""
],
[
"Wang",
"Luozhou",
""
],
[
"Ma",
"Ningning",
""
],
[
"Chen",
"Ying-Cong",
""
]
] | TITLE: Lift3D: Synthesize 3D Training Data by Lifting 2D GAN to 3D Generative
Radiance Field
ABSTRACT: This work explores the use of 3D generative models to synthesize training
data for 3D vision tasks. The key requirements of the generative models are
that the generated data should be photorealistic to match the real-world
scenarios, and the corresponding 3D attributes should be aligned with given
sampling labels. However, we find that the recent NeRF-based 3D GANs hardly
meet the above requirements due to their designed generation pipeline and the
lack of explicit 3D supervision. In this work, we propose Lift3D, an inverted
2D-to-3D generation framework to achieve the data generation objectives. Lift3D
has several merits compared to prior methods: (1) Unlike previous 3D GANs that
the output resolution is fixed after training, Lift3D can generalize to any
camera intrinsic with higher resolution and photorealistic output. (2) By
lifting well-disentangled 2D GAN to 3D object NeRF, Lift3D provides explicit 3D
information of generated objects, thus offering accurate 3D annotations for
downstream tasks. We evaluate the effectiveness of our framework by augmenting
autonomous driving datasets. Experimental results demonstrate that our data
generation framework can effectively improve the performance of 3D object
detectors. Project page: https://len-li.github.io/lift3d-web.
| no_new_dataset | 0.948442 |
2304.03537 | Shusuke Takahama | Shusuke Takahama, Yusuke Kurose, Yusuke Mukuta, Hiroyuki Abe, Akihiko
Yoshizawa, Tetsuo Ushiku, Masashi Fukayama, Masanobu Kitagawa, Masaru
Kitsuregawa, Tatsuya Harada | Domain Adaptive Multiple Instance Learning for Instance-level Prediction
of Pathological Images | Accepted to ISBI 2023 (Oral). ISBI paper version | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Pathological image analysis is an important process for detecting
abnormalities such as cancer from cell images. However, since the image size is
generally very large, the cost of providing detailed annotations is high, which
makes it difficult to apply machine learning techniques. One way to improve the
performance of identifying abnormalities while keeping the annotation cost low
is to use only labels for each slide, or to use information from another
dataset that has already been labeled. However, such weak supervisory
information often does not provide sufficient performance. In this paper, we
proposed a new task setting to improve the classification performance of the
target dataset without increasing annotation costs. And to solve this problem,
we propose a pipeline that uses multiple instance learning (MIL) and domain
adaptation (DA) methods. Furthermore, in order to combine the supervisory
information of both methods effectively, we propose a method to create
pseudo-labels with high confidence. We conducted experiments on the
pathological image dataset we created for this study and showed that the
proposed method significantly improves the classification performance compared
to existing methods.
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2023 08:31:06 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Takahama",
"Shusuke",
""
],
[
"Kurose",
"Yusuke",
""
],
[
"Mukuta",
"Yusuke",
""
],
[
"Abe",
"Hiroyuki",
""
],
[
"Yoshizawa",
"Akihiko",
""
],
[
"Ushiku",
"Tetsuo",
""
],
[
"Fukayama",
"Masashi",
""
],
[
"Kitagawa",
"Masanobu",
""
],
[
"Kitsuregawa",
"Masaru",
""
],
[
"Harada",
"Tatsuya",
""
]
] | TITLE: Domain Adaptive Multiple Instance Learning for Instance-level Prediction
of Pathological Images
ABSTRACT: Pathological image analysis is an important process for detecting
abnormalities such as cancer from cell images. However, since the image size is
generally very large, the cost of providing detailed annotations is high, which
makes it difficult to apply machine learning techniques. One way to improve the
performance of identifying abnormalities while keeping the annotation cost low
is to use only labels for each slide, or to use information from another
dataset that has already been labeled. However, such weak supervisory
information often does not provide sufficient performance. In this paper, we
proposed a new task setting to improve the classification performance of the
target dataset without increasing annotation costs. And to solve this problem,
we propose a pipeline that uses multiple instance learning (MIL) and domain
adaptation (DA) methods. Furthermore, in order to combine the supervisory
information of both methods effectively, we propose a method to create
pseudo-labels with high confidence. We conducted experiments on the
pathological image dataset we created for this study and showed that the
proposed method significantly improves the classification performance compared
to existing methods.
| new_dataset | 0.965964 |
2304.03538 | Mohammad Ali Jamshidi | Mohammad Ali Jamshidi, Hadi Veisi, Mohammad Mahdi Mojahedian, Mohammad
Reza Aref | Adjustable Privacy using Autoencoder-based Learning Structure | null | null | null | null | cs.LG cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Inference centers need more data to have a more comprehensive and beneficial
learning model, and for this purpose, they need to collect data from data
providers. On the other hand, data providers are cautious about delivering
their datasets to inference centers in terms of privacy considerations. In this
paper, by modifying the structure of the autoencoder, we present a method that
manages the utility-privacy trade-off well. To be more precise, the data is
first compressed using the encoder, then confidential and non-confidential
features are separated and uncorrelated using the classifier. The confidential
feature is appropriately combined with noise, and the non-confidential feature
is enhanced, and at the end, data with the original data format is produced by
the decoder. The proposed architecture also allows data providers to set the
level of privacy required for confidential features. The proposed method has
been examined for both image and categorical databases, and the results show a
significant performance improvement compared to previous methods.
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2023 08:32:44 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Jamshidi",
"Mohammad Ali",
""
],
[
"Veisi",
"Hadi",
""
],
[
"Mojahedian",
"Mohammad Mahdi",
""
],
[
"Aref",
"Mohammad Reza",
""
]
] | TITLE: Adjustable Privacy using Autoencoder-based Learning Structure
ABSTRACT: Inference centers need more data to have a more comprehensive and beneficial
learning model, and for this purpose, they need to collect data from data
providers. On the other hand, data providers are cautious about delivering
their datasets to inference centers in terms of privacy considerations. In this
paper, by modifying the structure of the autoencoder, we present a method that
manages the utility-privacy trade-off well. To be more precise, the data is
first compressed using the encoder, then confidential and non-confidential
features are separated and uncorrelated using the classifier. The confidential
feature is appropriately combined with noise, and the non-confidential feature
is enhanced, and at the end, data with the original data format is produced by
the decoder. The proposed architecture also allows data providers to set the
level of privacy required for confidential features. The proposed method has
been examined for both image and categorical databases, and the results show a
significant performance improvement compared to previous methods.
| no_new_dataset | 0.952042 |
2304.03540 | Sibei Chen | Sibei Chen, Hanbing Liu, Weiting Jin, Xiangyu Sun, Xiaoyao Feng, Ju
Fan, Xiaoyong Du, Nan Tang | ChatPipe: Orchestrating Data Preparation Program by Optimizing
Human-ChatGPT Interactions | null | null | null | null | cs.DB cs.AI cs.HC cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Orchestrating a high-quality data preparation program is essential for
successful machine learning (ML), but it is known to be time and effort
consuming. Despite the impressive capabilities of large language models like
ChatGPT in generating programs by interacting with users through natural
language prompts, there are still limitations. Specifically, a user must
provide specific prompts to iteratively guide ChatGPT in improving data
preparation programs, which requires a certain level of expertise in
programming, the dataset used and the ML task. Moreover, once a program has
been generated, it is non-trivial to revisit a previous version or make changes
to the program without starting the process over again. In this paper, we
present ChatPipe, a novel system designed to facilitate seamless interaction
between users and ChatGPT. ChatPipe provides users with effective
recommendation on next data preparation operations, and guides ChatGPT to
generate program for the operations. Also, ChatPipe enables users to easily
roll back to previous versions of the program, which facilitates more efficient
experimentation and testing. We have developed a web application for ChatPipe
and prepared several real-world ML tasks from Kaggle. These tasks can showcase
the capabilities of ChatPipe and enable VLDB attendees to easily experiment
with our novel features to rapidly orchestrate a high-quality data preparation
program.
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2023 08:33:08 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Chen",
"Sibei",
""
],
[
"Liu",
"Hanbing",
""
],
[
"Jin",
"Weiting",
""
],
[
"Sun",
"Xiangyu",
""
],
[
"Feng",
"Xiaoyao",
""
],
[
"Fan",
"Ju",
""
],
[
"Du",
"Xiaoyong",
""
],
[
"Tang",
"Nan",
""
]
] | TITLE: ChatPipe: Orchestrating Data Preparation Program by Optimizing
Human-ChatGPT Interactions
ABSTRACT: Orchestrating a high-quality data preparation program is essential for
successful machine learning (ML), but it is known to be time and effort
consuming. Despite the impressive capabilities of large language models like
ChatGPT in generating programs by interacting with users through natural
language prompts, there are still limitations. Specifically, a user must
provide specific prompts to iteratively guide ChatGPT in improving data
preparation programs, which requires a certain level of expertise in
programming, the dataset used and the ML task. Moreover, once a program has
been generated, it is non-trivial to revisit a previous version or make changes
to the program without starting the process over again. In this paper, we
present ChatPipe, a novel system designed to facilitate seamless interaction
between users and ChatGPT. ChatPipe provides users with effective
recommendation on next data preparation operations, and guides ChatGPT to
generate program for the operations. Also, ChatPipe enables users to easily
roll back to previous versions of the program, which facilitates more efficient
experimentation and testing. We have developed a web application for ChatPipe
and prepared several real-world ML tasks from Kaggle. These tasks can showcase
the capabilities of ChatPipe and enable VLDB attendees to easily experiment
with our novel features to rapidly orchestrate a high-quality data preparation
program.
| no_new_dataset | 0.940844 |
2304.03542 | Xuhai Chen | Xuhai Chen, Jiangning Zhang, Chao Xu, Yabiao Wang, Chengjie Wang, Yong
Liu | Better "CMOS" Produces Clearer Images: Learning Space-Variant Blur
Estimation for Blind Image Super-Resolution | Accepted by CVPR 2023 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Most of the existing blind image Super-Resolution (SR) methods assume that
the blur kernels are space-invariant. However, the blur involved in real
applications are usually space-variant due to object motion, out-of-focus,
etc., resulting in severe performance drop of the advanced SR methods. To
address this problem, we firstly introduce two new datasets with out-of-focus
blur, i.e., NYUv2-BSR and Cityscapes-BSR, to support further researches of
blind SR with space-variant blur. Based on the datasets, we design a novel
Cross-MOdal fuSion network (CMOS) that estimate both blur and semantics
simultaneously, which leads to improved SR results. It involves a feature
Grouping Interactive Attention (GIA) module to make the two modalities interact
more effectively and avoid inconsistency. GIA can also be used for the
interaction of other features because of the universality of its structure.
Qualitative and quantitative experiments compared with state-of-the-art methods
on above datasets and real-world images demonstrate the superiority of our
method, e.g., obtaining PSNR/SSIM by +1.91/+0.0048 on NYUv2-BSR than MANet.
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2023 08:40:31 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Chen",
"Xuhai",
""
],
[
"Zhang",
"Jiangning",
""
],
[
"Xu",
"Chao",
""
],
[
"Wang",
"Yabiao",
""
],
[
"Wang",
"Chengjie",
""
],
[
"Liu",
"Yong",
""
]
] | TITLE: Better "CMOS" Produces Clearer Images: Learning Space-Variant Blur
Estimation for Blind Image Super-Resolution
ABSTRACT: Most of the existing blind image Super-Resolution (SR) methods assume that
the blur kernels are space-invariant. However, the blur involved in real
applications are usually space-variant due to object motion, out-of-focus,
etc., resulting in severe performance drop of the advanced SR methods. To
address this problem, we firstly introduce two new datasets with out-of-focus
blur, i.e., NYUv2-BSR and Cityscapes-BSR, to support further researches of
blind SR with space-variant blur. Based on the datasets, we design a novel
Cross-MOdal fuSion network (CMOS) that estimate both blur and semantics
simultaneously, which leads to improved SR results. It involves a feature
Grouping Interactive Attention (GIA) module to make the two modalities interact
more effectively and avoid inconsistency. GIA can also be used for the
interaction of other features because of the universality of its structure.
Qualitative and quantitative experiments compared with state-of-the-art methods
on above datasets and real-world images demonstrate the superiority of our
method, e.g., obtaining PSNR/SSIM by +1.91/+0.0048 on NYUv2-BSR than MANet.
| new_dataset | 0.855791 |
2304.03545 | Alessandro Achille | Alessandro Achille, Michael Kearns, Carson Klingenberg, Stefano Soatto | AI Model Disgorgement: Methods and Choices | null | null | null | null | cs.LG cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Responsible use of data is an indispensable part of any machine learning (ML)
implementation. ML developers must carefully collect and curate their datasets,
and document their provenance. They must also make sure to respect intellectual
property rights, preserve individual privacy, and use data in an ethical way.
Over the past few years, ML models have significantly increased in size and
complexity. These models require a very large amount of data and compute
capacity to train, to the extent that any defects in the training corpus cannot
be trivially remedied by retraining the model from scratch. Despite
sophisticated controls on training data and a significant amount of effort
dedicated to ensuring that training corpora are properly composed, the sheer
volume of data required for the models makes it challenging to manually inspect
each datum comprising a training corpus. One potential fix for training corpus
data defects is model disgorgement -- the elimination of not just the
improperly used data, but also the effects of improperly used data on any
component of an ML model. Model disgorgement techniques can be used to address
a wide range of issues, such as reducing bias or toxicity, increasing fidelity,
and ensuring responsible usage of intellectual property. In this paper, we
introduce a taxonomy of possible disgorgement methods that are applicable to
modern ML systems. In particular, we investigate the meaning of "removing the
effects" of data in the trained model in a way that does not require retraining
from scratch.
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2023 08:50:18 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Achille",
"Alessandro",
""
],
[
"Kearns",
"Michael",
""
],
[
"Klingenberg",
"Carson",
""
],
[
"Soatto",
"Stefano",
""
]
] | TITLE: AI Model Disgorgement: Methods and Choices
ABSTRACT: Responsible use of data is an indispensable part of any machine learning (ML)
implementation. ML developers must carefully collect and curate their datasets,
and document their provenance. They must also make sure to respect intellectual
property rights, preserve individual privacy, and use data in an ethical way.
Over the past few years, ML models have significantly increased in size and
complexity. These models require a very large amount of data and compute
capacity to train, to the extent that any defects in the training corpus cannot
be trivially remedied by retraining the model from scratch. Despite
sophisticated controls on training data and a significant amount of effort
dedicated to ensuring that training corpora are properly composed, the sheer
volume of data required for the models makes it challenging to manually inspect
each datum comprising a training corpus. One potential fix for training corpus
data defects is model disgorgement -- the elimination of not just the
improperly used data, but also the effects of improperly used data on any
component of an ML model. Model disgorgement techniques can be used to address
a wide range of issues, such as reducing bias or toxicity, increasing fidelity,
and ensuring responsible usage of intellectual property. In this paper, we
introduce a taxonomy of possible disgorgement methods that are applicable to
modern ML systems. In particular, we investigate the meaning of "removing the
effects" of data in the trained model in a way that does not require retraining
from scratch.
| no_new_dataset | 0.948775 |
2304.03572 | Hongrun Zhang | Hongrun Zhang, Liam Burrows, Yanda Meng, Declan Sculthorpe, Abhik
Mukherjee, Sarah E Coupland, Ke Chen, Yalin Zheng | Weakly supervised segmentation with point annotations for histopathology
images via contrast-based variational model | Accepted to CVPR2023 | null | null | null | eess.IV cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Image segmentation is a fundamental task in the field of imaging and vision.
Supervised deep learning for segmentation has achieved unparalleled success
when sufficient training data with annotated labels are available. However,
annotation is known to be expensive to obtain, especially for histopathology
images where the target regions are usually with high morphology variations and
irregular shapes. Thus, weakly supervised learning with sparse annotations of
points is promising to reduce the annotation workload. In this work, we propose
a contrast-based variational model to generate segmentation results, which
serve as reliable complementary supervision to train a deep segmentation model
for histopathology images. The proposed method considers the common
characteristics of target regions in histopathology images and can be trained
in an end-to-end manner. It can generate more regionally consistent and
smoother boundary segmentation, and is more robust to unlabeled `novel'
regions. Experiments on two different histology datasets demonstrate its
effectiveness and efficiency in comparison to previous models.
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2023 10:12:21 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Zhang",
"Hongrun",
""
],
[
"Burrows",
"Liam",
""
],
[
"Meng",
"Yanda",
""
],
[
"Sculthorpe",
"Declan",
""
],
[
"Mukherjee",
"Abhik",
""
],
[
"Coupland",
"Sarah E",
""
],
[
"Chen",
"Ke",
""
],
[
"Zheng",
"Yalin",
""
]
] | TITLE: Weakly supervised segmentation with point annotations for histopathology
images via contrast-based variational model
ABSTRACT: Image segmentation is a fundamental task in the field of imaging and vision.
Supervised deep learning for segmentation has achieved unparalleled success
when sufficient training data with annotated labels are available. However,
annotation is known to be expensive to obtain, especially for histopathology
images where the target regions are usually with high morphology variations and
irregular shapes. Thus, weakly supervised learning with sparse annotations of
points is promising to reduce the annotation workload. In this work, we propose
a contrast-based variational model to generate segmentation results, which
serve as reliable complementary supervision to train a deep segmentation model
for histopathology images. The proposed method considers the common
characteristics of target regions in histopathology images and can be trained
in an end-to-end manner. It can generate more regionally consistent and
smoother boundary segmentation, and is more robust to unlabeled `novel'
regions. Experiments on two different histology datasets demonstrate its
effectiveness and efficiency in comparison to previous models.
| no_new_dataset | 0.954563 |
2304.03580 | Jing Hao | Jing Hao, Song Chen, Xiaodi Wang, Shumin Han | Language-aware Multiple Datasets Detection Pretraining for DETRs | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Pretraining on large-scale datasets can boost the performance of object
detectors while the annotated datasets for object detection are hard to scale
up due to the high labor cost. What we possess are numerous isolated
filed-specific datasets, thus, it is appealing to jointly pretrain models
across aggregation of datasets to enhance data volume and diversity. In this
paper, we propose a strong framework for utilizing Multiple datasets to
pretrain DETR-like detectors, termed METR, without the need for manual label
spaces integration. It converts the typical multi-classification in object
detection into binary classification by introducing a pre-trained language
model. Specifically, we design a category extraction module for extracting
potential categories involved in an image and assign these categories into
different queries by language embeddings. Each query is only responsible for
predicting a class-specific object. Besides, to adapt our novel detection
paradigm, we propose a group bipartite matching strategy that limits the ground
truths to match queries assigned to the same category. Extensive experiments
demonstrate that METR achieves extraordinary results on either multi-task joint
training or the pretrain & finetune paradigm. Notably, our pre-trained models
have high flexible transferability and increase the performance upon various
DETR-like detectors on COCO val2017 benchmark. Codes will be available after
this paper is published.
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2023 10:34:04 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Hao",
"Jing",
""
],
[
"Chen",
"Song",
""
],
[
"Wang",
"Xiaodi",
""
],
[
"Han",
"Shumin",
""
]
] | TITLE: Language-aware Multiple Datasets Detection Pretraining for DETRs
ABSTRACT: Pretraining on large-scale datasets can boost the performance of object
detectors while the annotated datasets for object detection are hard to scale
up due to the high labor cost. What we possess are numerous isolated
filed-specific datasets, thus, it is appealing to jointly pretrain models
across aggregation of datasets to enhance data volume and diversity. In this
paper, we propose a strong framework for utilizing Multiple datasets to
pretrain DETR-like detectors, termed METR, without the need for manual label
spaces integration. It converts the typical multi-classification in object
detection into binary classification by introducing a pre-trained language
model. Specifically, we design a category extraction module for extracting
potential categories involved in an image and assign these categories into
different queries by language embeddings. Each query is only responsible for
predicting a class-specific object. Besides, to adapt our novel detection
paradigm, we propose a group bipartite matching strategy that limits the ground
truths to match queries assigned to the same category. Extensive experiments
demonstrate that METR achieves extraordinary results on either multi-task joint
training or the pretrain & finetune paradigm. Notably, our pre-trained models
have high flexible transferability and increase the performance upon various
DETR-like detectors on COCO val2017 benchmark. Codes will be available after
this paper is published.
| no_new_dataset | 0.949669 |
2304.03585 | Javad Peymanfard | Mohammd Hasan Shamgholi, Vahid Saeedi, Javad Peymanfard, Leila
Alhabib, Hossein Zeinali | ArmanTTS single-speaker Persian dataset | null | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | TTS, or text-to-speech, is a complicated process that can be accomplished
through appropriate modeling using deep learning methods. In order to implement
deep learning models, a suitable dataset is required. Since there is a scarce
amount of work done in this field for the Persian language, this paper will
introduce the single speaker dataset: ArmanTTS. We compared the characteristics
of this dataset with those of various prevalent datasets to prove that ArmanTTS
meets the necessary standards for teaching a Persian text-to-speech conversion
model. We also combined the Tacotron 2 and HiFi GAN to design a model that can
receive phonemes as input, with the output being the corresponding speech. 4.0
value of MOS was obtained from real speech, 3.87 value was obtained by the
vocoder prediction and 2.98 value was reached with the synthetic speech
generated by the TTS model.
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2023 10:52:55 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Shamgholi",
"Mohammd Hasan",
""
],
[
"Saeedi",
"Vahid",
""
],
[
"Peymanfard",
"Javad",
""
],
[
"Alhabib",
"Leila",
""
],
[
"Zeinali",
"Hossein",
""
]
] | TITLE: ArmanTTS single-speaker Persian dataset
ABSTRACT: TTS, or text-to-speech, is a complicated process that can be accomplished
through appropriate modeling using deep learning methods. In order to implement
deep learning models, a suitable dataset is required. Since there is a scarce
amount of work done in this field for the Persian language, this paper will
introduce the single speaker dataset: ArmanTTS. We compared the characteristics
of this dataset with those of various prevalent datasets to prove that ArmanTTS
meets the necessary standards for teaching a Persian text-to-speech conversion
model. We also combined the Tacotron 2 and HiFi GAN to design a model that can
receive phonemes as input, with the output being the corresponding speech. 4.0
value of MOS was obtained from real speech, 3.87 value was obtained by the
vocoder prediction and 2.98 value was reached with the synthetic speech
generated by the TTS model.
| new_dataset | 0.966283 |
2304.03589 | Li Shen | Li Shen, Yan Sun, Zhiyuan Yu, Liang Ding, Xinmei Tian, Dacheng Tao | On Efficient Training of Large-Scale Deep Learning Models: A Literature
Review | 60 pages | null | null | null | cs.LG cs.AI cs.DC | http://creativecommons.org/licenses/by/4.0/ | The field of deep learning has witnessed significant progress, particularly
in computer vision (CV), natural language processing (NLP), and speech. The use
of large-scale models trained on vast amounts of data holds immense promise for
practical applications, enhancing industrial productivity and facilitating
social development. With the increasing demands on computational capacity,
though numerous studies have explored the efficient training, a comprehensive
summarization on acceleration techniques of training deep learning models is
still much anticipated. In this survey, we present a detailed review for
training acceleration. We consider the fundamental update formulation and split
its basic components into five main perspectives: (1) data-centric: including
dataset regularization, data sampling, and data-centric curriculum learning
techniques, which can significantly reduce the computational complexity of the
data samples; (2) model-centric, including acceleration of basic modules,
compression training, model initialization and model-centric curriculum
learning techniques, which focus on accelerating the training via reducing the
calculations on parameters; (3) optimization-centric, including the selection
of learning rate, the employment of large batchsize, the designs of efficient
objectives, and model average techniques, which pay attention to the training
policy and improving the generality for the large-scale models; (4) budgeted
training, including some distinctive acceleration methods on source-constrained
situations; (5) system-centric, including some efficient open-source
distributed libraries/systems which provide adequate hardware support for the
implementation of acceleration algorithms. By presenting this comprehensive
taxonomy, our survey presents a comprehensive review to understand the general
mechanisms within each component and their joint interaction.
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2023 11:13:23 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Shen",
"Li",
""
],
[
"Sun",
"Yan",
""
],
[
"Yu",
"Zhiyuan",
""
],
[
"Ding",
"Liang",
""
],
[
"Tian",
"Xinmei",
""
],
[
"Tao",
"Dacheng",
""
]
] | TITLE: On Efficient Training of Large-Scale Deep Learning Models: A Literature
Review
ABSTRACT: The field of deep learning has witnessed significant progress, particularly
in computer vision (CV), natural language processing (NLP), and speech. The use
of large-scale models trained on vast amounts of data holds immense promise for
practical applications, enhancing industrial productivity and facilitating
social development. With the increasing demands on computational capacity,
though numerous studies have explored the efficient training, a comprehensive
summarization on acceleration techniques of training deep learning models is
still much anticipated. In this survey, we present a detailed review for
training acceleration. We consider the fundamental update formulation and split
its basic components into five main perspectives: (1) data-centric: including
dataset regularization, data sampling, and data-centric curriculum learning
techniques, which can significantly reduce the computational complexity of the
data samples; (2) model-centric, including acceleration of basic modules,
compression training, model initialization and model-centric curriculum
learning techniques, which focus on accelerating the training via reducing the
calculations on parameters; (3) optimization-centric, including the selection
of learning rate, the employment of large batchsize, the designs of efficient
objectives, and model average techniques, which pay attention to the training
policy and improving the generality for the large-scale models; (4) budgeted
training, including some distinctive acceleration methods on source-constrained
situations; (5) system-centric, including some efficient open-source
distributed libraries/systems which provide adequate hardware support for the
implementation of acceleration algorithms. By presenting this comprehensive
taxonomy, our survey presents a comprehensive review to understand the general
mechanisms within each component and their joint interaction.
| no_new_dataset | 0.943556 |
2304.03610 | Mahla Nejati | Yuning Xing, Dexter Pham, Henry Williams, David Smith, Ho Seok Ahn,
JongYoon Lim, Bruce A. MacDonald, Mahla Nejati | Look how they have grown: Non-destructive Leaf Detection and Size
Estimation of Tomato Plants for 3D Growth Monitoring | 10 Pages, 10 Figures | Proceedings of the Australasian conference on robotics and
automation (ACRA 2022) | null | null | cs.CV cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Smart farming is a growing field as technology advances. Plant
characteristics are crucial indicators for monitoring plant growth. Research
has been done to estimate characteristics like leaf area index, leaf disease,
and plant height. However, few methods have been applied to non-destructive
measurements of leaf size. In this paper, an automated non-destructive
imaged-based measuring system is presented, which uses 2D and 3D data obtained
using a Zivid 3D camera, creating 3D virtual representations (digital twins) of
the tomato plants. Leaves are detected from corresponding 2D RGB images and
mapped to their 3D point cloud using the detected leaf masks, which then pass
the leaf point cloud to the plane fitting algorithm to extract the leaf size to
provide data for growth monitoring. The performance of the measurement platform
has been measured through a comprehensive trial on real-world tomato plants
with quantified performance metrics compared to ground truth measurements.
Three tomato leaf and height datasets (including 50+ 3D point cloud files of
tomato plants) were collected and open-sourced in this project. The proposed
leaf size estimation method demonstrates an RMSE value of 4.47mm and an R^2
value of 0.87. The overall measurement system (leaf detection and size
estimation algorithms combine) delivers an RMSE value of 8.13mm and an R^2
value of 0.899.
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2023 12:16:10 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Xing",
"Yuning",
""
],
[
"Pham",
"Dexter",
""
],
[
"Williams",
"Henry",
""
],
[
"Smith",
"David",
""
],
[
"Ahn",
"Ho Seok",
""
],
[
"Lim",
"JongYoon",
""
],
[
"MacDonald",
"Bruce A.",
""
],
[
"Nejati",
"Mahla",
""
]
] | TITLE: Look how they have grown: Non-destructive Leaf Detection and Size
Estimation of Tomato Plants for 3D Growth Monitoring
ABSTRACT: Smart farming is a growing field as technology advances. Plant
characteristics are crucial indicators for monitoring plant growth. Research
has been done to estimate characteristics like leaf area index, leaf disease,
and plant height. However, few methods have been applied to non-destructive
measurements of leaf size. In this paper, an automated non-destructive
imaged-based measuring system is presented, which uses 2D and 3D data obtained
using a Zivid 3D camera, creating 3D virtual representations (digital twins) of
the tomato plants. Leaves are detected from corresponding 2D RGB images and
mapped to their 3D point cloud using the detected leaf masks, which then pass
the leaf point cloud to the plane fitting algorithm to extract the leaf size to
provide data for growth monitoring. The performance of the measurement platform
has been measured through a comprehensive trial on real-world tomato plants
with quantified performance metrics compared to ground truth measurements.
Three tomato leaf and height datasets (including 50+ 3D point cloud files of
tomato plants) were collected and open-sourced in this project. The proposed
leaf size estimation method demonstrates an RMSE value of 4.47mm and an R^2
value of 0.87. The overall measurement system (leaf detection and size
estimation algorithms combine) delivers an RMSE value of 8.13mm and an R^2
value of 0.899.
| new_dataset | 0.78316 |
2304.03626 | Donald Shenaj | Donald Shenaj, Marco Toldo, Alberto Rigon, Pietro Zanuttigh | Asynchronous Federated Continual Learning | CVPR 2023 FedVision Workshop (CVPRW) | null | null | null | cs.LG cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The standard class-incremental continual learning setting assumes a set of
tasks seen one after the other in a fixed and predefined order. This is not
very realistic in federated learning environments where each client works
independently in an asynchronous manner getting data for the different tasks in
time-frames and orders totally uncorrelated with the other ones. We introduce a
novel federated learning setting (AFCL) where the continual learning of
multiple tasks happens at each client with different orderings and in
asynchronous time slots. We tackle this novel task using prototype-based
learning, a representation loss, fractal pre-training, and a modified
aggregation policy. Our approach, called FedSpace, effectively tackles this
task as shown by the results on the CIFAR-100 dataset using 3 different
federated splits with 50, 100, and 500 clients, respectively. The code and
federated splits are available at https://github.com/LTTM/FedSpace.
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2023 12:59:57 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Shenaj",
"Donald",
""
],
[
"Toldo",
"Marco",
""
],
[
"Rigon",
"Alberto",
""
],
[
"Zanuttigh",
"Pietro",
""
]
] | TITLE: Asynchronous Federated Continual Learning
ABSTRACT: The standard class-incremental continual learning setting assumes a set of
tasks seen one after the other in a fixed and predefined order. This is not
very realistic in federated learning environments where each client works
independently in an asynchronous manner getting data for the different tasks in
time-frames and orders totally uncorrelated with the other ones. We introduce a
novel federated learning setting (AFCL) where the continual learning of
multiple tasks happens at each client with different orderings and in
asynchronous time slots. We tackle this novel task using prototype-based
learning, a representation loss, fractal pre-training, and a modified
aggregation policy. Our approach, called FedSpace, effectively tackles this
task as shown by the results on the CIFAR-100 dataset using 3 different
federated splits with 50, 100, and 500 clients, respectively. The code and
federated splits are available at https://github.com/LTTM/FedSpace.
| no_new_dataset | 0.940953 |
2304.03631 | Eadom Dessalene | Eadom Dessalene, Michael Maynord, Cornelia Fermuller, Yiannis
Aloimonos | Therbligs in Action: Video Understanding through Motion Primitives | 8 pages | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we introduce a rule-based, compositional, and hierarchical
modeling of action using Therbligs as our atoms. Introducing these atoms
provides us with a consistent, expressive, contact-centered representation of
action. Over the atoms we introduce a differentiable method of rule-based
reasoning to regularize for logical consistency. Our approach is complementary
to other approaches in that the Therblig-based representations produced by our
architecture augment rather than replace existing architectures'
representations. We release the first Therblig-centered annotations over two
popular video datasets - EPIC Kitchens 100 and 50-Salads. We also broadly
demonstrate benefits to adopting Therblig representations through evaluation on
the following tasks: action segmentation, action anticipation, and action
recognition - observing an average 10.5\%/7.53\%/6.5\% relative improvement,
respectively, over EPIC Kitchens and an average 8.9\%/6.63\%/4.8\% relative
improvement, respectively, over 50 Salads. Code and data will be made publicly
available.
| [
{
"version": "v1",
"created": "Thu, 6 Apr 2023 17:27:39 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Dessalene",
"Eadom",
""
],
[
"Maynord",
"Michael",
""
],
[
"Fermuller",
"Cornelia",
""
],
[
"Aloimonos",
"Yiannis",
""
]
] | TITLE: Therbligs in Action: Video Understanding through Motion Primitives
ABSTRACT: In this paper we introduce a rule-based, compositional, and hierarchical
modeling of action using Therbligs as our atoms. Introducing these atoms
provides us with a consistent, expressive, contact-centered representation of
action. Over the atoms we introduce a differentiable method of rule-based
reasoning to regularize for logical consistency. Our approach is complementary
to other approaches in that the Therblig-based representations produced by our
architecture augment rather than replace existing architectures'
representations. We release the first Therblig-centered annotations over two
popular video datasets - EPIC Kitchens 100 and 50-Salads. We also broadly
demonstrate benefits to adopting Therblig representations through evaluation on
the following tasks: action segmentation, action anticipation, and action
recognition - observing an average 10.5\%/7.53\%/6.5\% relative improvement,
respectively, over EPIC Kitchens and an average 8.9\%/6.63\%/4.8\% relative
improvement, respectively, over 50 Salads. Code and data will be made publicly
available.
| no_new_dataset | 0.949529 |
2304.03640 | Muhammad Akbar Husnoo | Muhammad Akbar Husnoo, Adnan Anwar, Haftu Tasew Reda, Nasser
Hosseinzadeh, Shama Naz Islam, Abdun Naser Mahmood, Robin Doss | FedDiSC: A Computation-efficient Federated Learning Framework for Power
Systems Disturbance and Cyber Attack Discrimination | null | null | null | null | cs.CR cs.DC cs.LG | http://creativecommons.org/licenses/by/4.0/ | With the growing concern about the security and privacy of smart grid
systems, cyberattacks on critical power grid components, such as state
estimation, have proven to be one of the top-priority cyber-related issues and
have received significant attention in recent years. However, cyberattack
detection in smart grids now faces new challenges, including privacy
preservation and decentralized power zones with strategic data owners. To
address these technical bottlenecks, this paper proposes a novel Federated
Learning-based privacy-preserving and communication-efficient attack detection
framework, known as FedDiSC, that enables Discrimination between power System
disturbances and Cyberattacks. Specifically, we first propose a Federated
Learning approach to enable Supervisory Control and Data Acquisition subsystems
of decentralized power grid zones to collaboratively train an attack detection
model without sharing sensitive power related data. Secondly, we put forward a
representation learning-based Deep Auto-Encoder network to accurately detect
power system and cybersecurity anomalies. Lastly, to adapt our proposed
framework to the timeliness of real-world cyberattack detection in SGs, we
leverage the use of a gradient privacy-preserving quantization scheme known as
DP-SIGNSGD to improve its communication efficiency. Extensive simulations of
the proposed framework on publicly available Industrial Control Systems
datasets demonstrate that the proposed framework can achieve superior detection
accuracy while preserving the privacy of sensitive power grid related
information. Furthermore, we find that the gradient quantization scheme
utilized improves communication efficiency by 40% when compared to a
traditional federated learning approach without gradient quantization which
suggests suitability in a real-world scenario.
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2023 13:43:57 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Husnoo",
"Muhammad Akbar",
""
],
[
"Anwar",
"Adnan",
""
],
[
"Reda",
"Haftu Tasew",
""
],
[
"Hosseinzadeh",
"Nasser",
""
],
[
"Islam",
"Shama Naz",
""
],
[
"Mahmood",
"Abdun Naser",
""
],
[
"Doss",
"Robin",
""
]
] | TITLE: FedDiSC: A Computation-efficient Federated Learning Framework for Power
Systems Disturbance and Cyber Attack Discrimination
ABSTRACT: With the growing concern about the security and privacy of smart grid
systems, cyberattacks on critical power grid components, such as state
estimation, have proven to be one of the top-priority cyber-related issues and
have received significant attention in recent years. However, cyberattack
detection in smart grids now faces new challenges, including privacy
preservation and decentralized power zones with strategic data owners. To
address these technical bottlenecks, this paper proposes a novel Federated
Learning-based privacy-preserving and communication-efficient attack detection
framework, known as FedDiSC, that enables Discrimination between power System
disturbances and Cyberattacks. Specifically, we first propose a Federated
Learning approach to enable Supervisory Control and Data Acquisition subsystems
of decentralized power grid zones to collaboratively train an attack detection
model without sharing sensitive power related data. Secondly, we put forward a
representation learning-based Deep Auto-Encoder network to accurately detect
power system and cybersecurity anomalies. Lastly, to adapt our proposed
framework to the timeliness of real-world cyberattack detection in SGs, we
leverage the use of a gradient privacy-preserving quantization scheme known as
DP-SIGNSGD to improve its communication efficiency. Extensive simulations of
the proposed framework on publicly available Industrial Control Systems
datasets demonstrate that the proposed framework can achieve superior detection
accuracy while preserving the privacy of sensitive power grid related
information. Furthermore, we find that the gradient quantization scheme
utilized improves communication efficiency by 40% when compared to a
traditional federated learning approach without gradient quantization which
suggests suitability in a real-world scenario.
| no_new_dataset | 0.949623 |
2304.03649 | Jesus Silva Rodriguez | Jesus Silva-Rodriguez, Xingpeng Li | Privacy-Preserving Decentralized Energy Management for Networked
Microgrids via Objective-Based ADMM | 10 Pages | null | null | null | eess.SY cs.SY | http://creativecommons.org/licenses/by/4.0/ | This paper proposes a decentralized energy management (DEM) strategy for a
network of local microgrids, providing economically balanced energy schedules
for all participating microgrids. The proposed DEM strategy can preserve the
privacy of each microgrid by only requiring them to share network power
exchange information. The proposed DEM strategy enhances the traditional
alternating direction method of multipliers (ADMM) formulation for networks of
microgrids by examining the global objective value as well as the solution
quality. A novel stopping decision combining these two metrics is proposed for
the enhanced objective-based ADMM (OB-ADMM) method. This paper also presents a
centralized energy management (CEM) model as a benchmark, and a post-processing
proportional exchange algorithm (PEA) to balance the economic benefit of each
microgrid. The resulting proposed OB-ADMM model combined with the PEA delivers
the final high-fidelity optimal solution for multiple microgrids in a
grid-connected collaborative power exchange network. Moreover, the proposed
decentralized operational strategy preserves the economic and privacy interests
of individual microgrid participants. Different network cases are simulated to
test the algorithm's performance, and the results validate the aforementioned
claims.
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2023 13:52:09 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Silva-Rodriguez",
"Jesus",
""
],
[
"Li",
"Xingpeng",
""
]
] | TITLE: Privacy-Preserving Decentralized Energy Management for Networked
Microgrids via Objective-Based ADMM
ABSTRACT: This paper proposes a decentralized energy management (DEM) strategy for a
network of local microgrids, providing economically balanced energy schedules
for all participating microgrids. The proposed DEM strategy can preserve the
privacy of each microgrid by only requiring them to share network power
exchange information. The proposed DEM strategy enhances the traditional
alternating direction method of multipliers (ADMM) formulation for networks of
microgrids by examining the global objective value as well as the solution
quality. A novel stopping decision combining these two metrics is proposed for
the enhanced objective-based ADMM (OB-ADMM) method. This paper also presents a
centralized energy management (CEM) model as a benchmark, and a post-processing
proportional exchange algorithm (PEA) to balance the economic benefit of each
microgrid. The resulting proposed OB-ADMM model combined with the PEA delivers
the final high-fidelity optimal solution for multiple microgrids in a
grid-connected collaborative power exchange network. Moreover, the proposed
decentralized operational strategy preserves the economic and privacy interests
of individual microgrid participants. Different network cases are simulated to
test the algorithm's performance, and the results validate the aforementioned
claims.
| no_new_dataset | 0.951097 |
2304.03669 | Haoyuan Li | Haoyuan Li, Hao Jiang, Tao Jin, Mengyan Li, Yan Chen, Zhijie Lin, Yang
Zhao, Zhou Zhao | DATE: Domain Adaptive Product Seeker for E-commerce | This paper was accepted by CVPR 2023 | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Product Retrieval (PR) and Grounding (PG), aiming to seek image and
object-level products respectively according to a textual query, have attracted
great interest recently for better shopping experience. Owing to the lack of
relevant datasets, we collect two large-scale benchmark datasets from Taobao
Mall and Live domains with about 474k and 101k image-query pairs for PR, and
manually annotate the object bounding boxes in each image for PG. As annotating
boxes is expensive and time-consuming, we attempt to transfer knowledge from
annotated domain to unannotated for PG to achieve un-supervised Domain
Adaptation (PG-DA). We propose a {\bf D}omain {\bf A}daptive Produc{\bf t}
S{\bf e}eker ({\bf DATE}) framework, regarding PR and PG as Product Seeking
problem at different levels, to assist the query {\bf date} the product.
Concretely, we first design a semantics-aggregated feature extractor for each
modality to obtain concentrated and comprehensive features for following
efficient retrieval and fine-grained grounding tasks. Then, we present two
cooperative seekers to simultaneously search the image for PR and localize the
product for PG. Besides, we devise a domain aligner for PG-DA to alleviate
uni-modal marginal and multi-modal conditional distribution shift between
source and target domains, and design a pseudo box generator to dynamically
select reliable instances and generate bounding boxes for further knowledge
transfer. Extensive experiments show that our DATE achieves satisfactory
performance in fully-supervised PR, PG and un-supervised PG-DA. Our
desensitized datasets will be publicly available
here\footnote{\url{https://github.com/Taobao-live/Product-Seeking}}.
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2023 14:40:16 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Li",
"Haoyuan",
""
],
[
"Jiang",
"Hao",
""
],
[
"Jin",
"Tao",
""
],
[
"Li",
"Mengyan",
""
],
[
"Chen",
"Yan",
""
],
[
"Lin",
"Zhijie",
""
],
[
"Zhao",
"Yang",
""
],
[
"Zhao",
"Zhou",
""
]
] | TITLE: DATE: Domain Adaptive Product Seeker for E-commerce
ABSTRACT: Product Retrieval (PR) and Grounding (PG), aiming to seek image and
object-level products respectively according to a textual query, have attracted
great interest recently for better shopping experience. Owing to the lack of
relevant datasets, we collect two large-scale benchmark datasets from Taobao
Mall and Live domains with about 474k and 101k image-query pairs for PR, and
manually annotate the object bounding boxes in each image for PG. As annotating
boxes is expensive and time-consuming, we attempt to transfer knowledge from
annotated domain to unannotated for PG to achieve un-supervised Domain
Adaptation (PG-DA). We propose a {\bf D}omain {\bf A}daptive Produc{\bf t}
S{\bf e}eker ({\bf DATE}) framework, regarding PR and PG as Product Seeking
problem at different levels, to assist the query {\bf date} the product.
Concretely, we first design a semantics-aggregated feature extractor for each
modality to obtain concentrated and comprehensive features for following
efficient retrieval and fine-grained grounding tasks. Then, we present two
cooperative seekers to simultaneously search the image for PR and localize the
product for PG. Besides, we devise a domain aligner for PG-DA to alleviate
uni-modal marginal and multi-modal conditional distribution shift between
source and target domains, and design a pseudo box generator to dynamically
select reliable instances and generate bounding boxes for further knowledge
transfer. Extensive experiments show that our DATE achieves satisfactory
performance in fully-supervised PR, PG and un-supervised PG-DA. Our
desensitized datasets will be publicly available
here\footnote{\url{https://github.com/Taobao-live/Product-Seeking}}.
| no_new_dataset | 0.949669 |
2304.03679 | Xiaohui Xie | Xiaohui Xie, Qian Dong, Bingning Wang, Feiyang Lv, Ting Yao, Weinan
Gan, Zhijing Wu, Xiangsheng Li, Haitao Li, Yiqun Liu, Jin Ma | T2Ranking: A large-scale Chinese Benchmark for Passage Ranking | This Resource paper has been accepted by the 46th International ACM
SIGIR Conference on Research and Development in Information Retrieval (SIGIR
2023) | null | null | null | cs.IR | http://creativecommons.org/licenses/by/4.0/ | Passage ranking involves two stages: passage retrieval and passage
re-ranking, which are important and challenging topics for both academics and
industries in the area of Information Retrieval (IR). However, the
commonly-used datasets for passage ranking usually focus on the English
language. For non-English scenarios, such as Chinese, the existing datasets are
limited in terms of data scale, fine-grained relevance annotation and false
negative issues. To address this problem, we introduce T2Ranking, a large-scale
Chinese benchmark for passage ranking. T2Ranking comprises more than 300K
queries and over 2M unique passages from real-world search engines. Expert
annotators are recruited to provide 4-level graded relevance scores
(fine-grained) for query-passage pairs instead of binary relevance judgments
(coarse-grained). To ease the false negative issues, more passages with higher
diversities are considered when performing relevance annotations, especially in
the test set, to ensure a more accurate evaluation. Apart from the textual
query and passage data, other auxiliary resources are also provided, such as
query types and XML files of documents which passages are generated from, to
facilitate further studies. To evaluate the dataset, commonly used ranking
models are implemented and tested on T2Ranking as baselines. The experimental
results show that T2Ranking is challenging and there is still scope for
improvement. The full data and all codes are available at
https://github.com/THUIR/T2Ranking/
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2023 15:02:33 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Xie",
"Xiaohui",
""
],
[
"Dong",
"Qian",
""
],
[
"Wang",
"Bingning",
""
],
[
"Lv",
"Feiyang",
""
],
[
"Yao",
"Ting",
""
],
[
"Gan",
"Weinan",
""
],
[
"Wu",
"Zhijing",
""
],
[
"Li",
"Xiangsheng",
""
],
[
"Li",
"Haitao",
""
],
[
"Liu",
"Yiqun",
""
],
[
"Ma",
"Jin",
""
]
] | TITLE: T2Ranking: A large-scale Chinese Benchmark for Passage Ranking
ABSTRACT: Passage ranking involves two stages: passage retrieval and passage
re-ranking, which are important and challenging topics for both academics and
industries in the area of Information Retrieval (IR). However, the
commonly-used datasets for passage ranking usually focus on the English
language. For non-English scenarios, such as Chinese, the existing datasets are
limited in terms of data scale, fine-grained relevance annotation and false
negative issues. To address this problem, we introduce T2Ranking, a large-scale
Chinese benchmark for passage ranking. T2Ranking comprises more than 300K
queries and over 2M unique passages from real-world search engines. Expert
annotators are recruited to provide 4-level graded relevance scores
(fine-grained) for query-passage pairs instead of binary relevance judgments
(coarse-grained). To ease the false negative issues, more passages with higher
diversities are considered when performing relevance annotations, especially in
the test set, to ensure a more accurate evaluation. Apart from the textual
query and passage data, other auxiliary resources are also provided, such as
query types and XML files of documents which passages are generated from, to
facilitate further studies. To evaluate the dataset, commonly used ranking
models are implemented and tested on T2Ranking as baselines. The experimental
results show that T2Ranking is challenging and there is still scope for
improvement. The full data and all codes are available at
https://github.com/THUIR/T2Ranking/
| new_dataset | 0.69246 |
2304.03691 | Vrizlynn L. L. Thing | Zihao Wang, Vrizlynn L. L. Thing | Feature Mining for Encrypted Malicious Traffic Detection with Deep
Learning and Other Machine Learning Algorithms | Computers & Security, Volume 128, No. 103143, 2023 | Computers & Security, Volume 128, No. 103143, 2023 | 10.1016/j.cose.2023.103143 | null | cs.CR cs.AI cs.LG | http://creativecommons.org/licenses/by-nc-nd/4.0/ | The popularity of encryption mechanisms poses a great challenge to malicious
traffic detection. The reason is traditional detection techniques cannot work
without the decryption of encrypted traffic. Currently, research on encrypted
malicious traffic detection without decryption has focused on feature
extraction and the choice of machine learning or deep learning algorithms. In
this paper, we first provide an in-depth analysis of traffic features and
compare different state-of-the-art traffic feature creation approaches, while
proposing a novel concept for encrypted traffic feature which is specifically
designed for encrypted malicious traffic analysis. In addition, we propose a
framework for encrypted malicious traffic detection. The framework is a
two-layer detection framework which consists of both deep learning and
traditional machine learning algorithms. Through comparative experiments, it
outperforms classical deep learning and traditional machine learning
algorithms, such as ResNet and Random Forest. Moreover, to provide sufficient
training data for the deep learning model, we also curate a dataset composed
entirely of public datasets. The composed dataset is more comprehensive than
using any public dataset alone. Lastly, we discuss the future directions of
this research.
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2023 15:25:36 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Wang",
"Zihao",
""
],
[
"Thing",
"Vrizlynn L. L.",
""
]
] | TITLE: Feature Mining for Encrypted Malicious Traffic Detection with Deep
Learning and Other Machine Learning Algorithms
ABSTRACT: The popularity of encryption mechanisms poses a great challenge to malicious
traffic detection. The reason is traditional detection techniques cannot work
without the decryption of encrypted traffic. Currently, research on encrypted
malicious traffic detection without decryption has focused on feature
extraction and the choice of machine learning or deep learning algorithms. In
this paper, we first provide an in-depth analysis of traffic features and
compare different state-of-the-art traffic feature creation approaches, while
proposing a novel concept for encrypted traffic feature which is specifically
designed for encrypted malicious traffic analysis. In addition, we propose a
framework for encrypted malicious traffic detection. The framework is a
two-layer detection framework which consists of both deep learning and
traditional machine learning algorithms. Through comparative experiments, it
outperforms classical deep learning and traditional machine learning
algorithms, such as ResNet and Random Forest. Moreover, to provide sufficient
training data for the deep learning model, we also curate a dataset composed
entirely of public datasets. The composed dataset is more comprehensive than
using any public dataset alone. Lastly, we discuss the future directions of
this research.
| new_dataset | 0.949248 |
2304.03698 | Vrizlynn L. L. Thing | Vrizlynn L. L. Thing | Deepfake Detection with Deep Learning: Convolutional Neural Networks
versus Transformers | IEEE Cyber Security and Resilience Conference 2023 | null | null | null | cs.CR cs.CV cs.LG | http://creativecommons.org/licenses/by-nc-nd/4.0/ | The rapid evolvement of deepfake creation technologies is seriously threating
media information trustworthiness. The consequences impacting targeted
individuals and institutions can be dire. In this work, we study the evolutions
of deep learning architectures, particularly CNNs and Transformers. We
identified eight promising deep learning architectures, designed and developed
our deepfake detection models and conducted experiments over well-established
deepfake datasets. These datasets included the latest second and third
generation deepfake datasets. We evaluated the effectiveness of our developed
single model detectors in deepfake detection and cross datasets evaluations. We
achieved 88.74%, 99.53%, 97.68%, 99.73% and 92.02% accuracy and 99.95%, 100%,
99.88%, 99.99% and 97.61% AUC, in the detection of FF++ 2020, Google DFD,
Celeb-DF, Deeper Forensics and DFDC deepfakes, respectively. We also identified
and showed the unique strengths of CNNs and Transformers models and analysed
the observed relationships among the different deepfake datasets, to aid future
developments in this area.
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2023 15:33:09 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Thing",
"Vrizlynn L. L.",
""
]
] | TITLE: Deepfake Detection with Deep Learning: Convolutional Neural Networks
versus Transformers
ABSTRACT: The rapid evolvement of deepfake creation technologies is seriously threating
media information trustworthiness. The consequences impacting targeted
individuals and institutions can be dire. In this work, we study the evolutions
of deep learning architectures, particularly CNNs and Transformers. We
identified eight promising deep learning architectures, designed and developed
our deepfake detection models and conducted experiments over well-established
deepfake datasets. These datasets included the latest second and third
generation deepfake datasets. We evaluated the effectiveness of our developed
single model detectors in deepfake detection and cross datasets evaluations. We
achieved 88.74%, 99.53%, 97.68%, 99.73% and 92.02% accuracy and 99.95%, 100%,
99.88%, 99.99% and 97.61% AUC, in the detection of FF++ 2020, Google DFD,
Celeb-DF, Deeper Forensics and DFDC deepfakes, respectively. We also identified
and showed the unique strengths of CNNs and Transformers models and analysed
the observed relationships among the different deepfake datasets, to aid future
developments in this area.
| no_new_dataset | 0.954308 |
2304.03709 | Zhi Gao | Jin Chen, Zhi Gao, Xinxiao Wu, Jiebo Luo | Meta-causal Learning for Single Domain Generalization | Accepted by CVPR 2023 | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Single domain generalization aims to learn a model from a single training
domain (source domain) and apply it to multiple unseen test domains (target
domains). Existing methods focus on expanding the distribution of the training
domain to cover the target domains, but without estimating the domain shift
between the source and target domains. In this paper, we propose a new learning
paradigm, namely simulate-analyze-reduce, which first simulates the domain
shift by building an auxiliary domain as the target domain, then learns to
analyze the causes of domain shift, and finally learns to reduce the domain
shift for model adaptation. Under this paradigm, we propose a meta-causal
learning method to learn meta-knowledge, that is, how to infer the causes of
domain shift between the auxiliary and source domains during training. We use
the meta-knowledge to analyze the shift between the target and source domains
during testing. Specifically, we perform multiple transformations on source
data to generate the auxiliary domain, perform counterfactual inference to
learn to discover the causal factors of the shift between the auxiliary and
source domains, and incorporate the inferred causality into factor-aware domain
alignments. Extensive experiments on several benchmarks of image classification
show the effectiveness of our method.
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2023 15:46:38 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Chen",
"Jin",
""
],
[
"Gao",
"Zhi",
""
],
[
"Wu",
"Xinxiao",
""
],
[
"Luo",
"Jiebo",
""
]
] | TITLE: Meta-causal Learning for Single Domain Generalization
ABSTRACT: Single domain generalization aims to learn a model from a single training
domain (source domain) and apply it to multiple unseen test domains (target
domains). Existing methods focus on expanding the distribution of the training
domain to cover the target domains, but without estimating the domain shift
between the source and target domains. In this paper, we propose a new learning
paradigm, namely simulate-analyze-reduce, which first simulates the domain
shift by building an auxiliary domain as the target domain, then learns to
analyze the causes of domain shift, and finally learns to reduce the domain
shift for model adaptation. Under this paradigm, we propose a meta-causal
learning method to learn meta-knowledge, that is, how to infer the causes of
domain shift between the auxiliary and source domains during training. We use
the meta-knowledge to analyze the shift between the target and source domains
during testing. Specifically, we perform multiple transformations on source
data to generate the auxiliary domain, perform counterfactual inference to
learn to discover the causal factors of the shift between the auxiliary and
source domains, and incorporate the inferred causality into factor-aware domain
alignments. Extensive experiments on several benchmarks of image classification
show the effectiveness of our method.
| no_new_dataset | 0.947381 |
2304.03722 | Boris van Breugel | Boris van Breugel and Mihaela van der Schaar | Beyond Privacy: Navigating the Opportunities and Challenges of Synthetic
Data | null | null | null | null | cs.LG | http://creativecommons.org/licenses/by/4.0/ | Generating synthetic data through generative models is gaining interest in
the ML community and beyond. In the past, synthetic data was often regarded as
a means to private data release, but a surge of recent papers explore how its
potential reaches much further than this -- from creating more fair data to
data augmentation, and from simulation to text generated by ChatGPT. In this
perspective we explore whether, and how, synthetic data may become a dominant
force in the machine learning world, promising a future where datasets can be
tailored to individual needs. Just as importantly, we discuss which fundamental
challenges the community needs to overcome for wider relevance and application
of synthetic data -- the most important of which is quantifying how much we can
trust any finding or prediction drawn from synthetic data.
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2023 16:38:40 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"van Breugel",
"Boris",
""
],
[
"van der Schaar",
"Mihaela",
""
]
] | TITLE: Beyond Privacy: Navigating the Opportunities and Challenges of Synthetic
Data
ABSTRACT: Generating synthetic data through generative models is gaining interest in
the ML community and beyond. In the past, synthetic data was often regarded as
a means to private data release, but a surge of recent papers explore how its
potential reaches much further than this -- from creating more fair data to
data augmentation, and from simulation to text generated by ChatGPT. In this
perspective we explore whether, and how, synthetic data may become a dominant
force in the machine learning world, promising a future where datasets can be
tailored to individual needs. Just as importantly, we discuss which fundamental
challenges the community needs to overcome for wider relevance and application
of synthetic data -- the most important of which is quantifying how much we can
trust any finding or prediction drawn from synthetic data.
| no_new_dataset | 0.94801 |
2304.03730 | Zhuoxuan Jiang | Ziming Huang and Zhuoxuan Jiang and Ke Wang and Juntao Li and Shanshan
Feng and Xian-Ling Mao | Gated Mechanism Enhanced Multi-Task Learning for Dialog Routing | Accepted by COLING'22(Oral) | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Currently, human-bot symbiosis dialog systems, e.g., pre- and after-sales in
E-commerce, are ubiquitous, and the dialog routing component is essential to
improve the overall efficiency, reduce human resource cost, and enhance user
experience. Although most existing methods can fulfil this requirement, they
can only model single-source dialog data and cannot effectively capture the
underlying knowledge of relations among data and subtasks. In this paper, we
investigate this important problem by thoroughly mining both the data-to-task
and task-to-task knowledge among various kinds of dialog data. To achieve the
above targets, we propose a Gated Mechanism enhanced Multi-task Model (G3M),
specifically including a novel dialog encoder and two tailored gated mechanism
modules. The proposed method can play the role of hierarchical information
filtering and is non-invasive to existing dialog systems. Based on two datasets
collected from real world applications, extensive experimental results
demonstrate the effectiveness of our method, which achieves the
state-of-the-art performance by improving 8.7\%/11.8\% on RMSE metric and
2.2\%/4.4\% on F1 metric.
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2023 16:51:46 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Huang",
"Ziming",
""
],
[
"Jiang",
"Zhuoxuan",
""
],
[
"Wang",
"Ke",
""
],
[
"Li",
"Juntao",
""
],
[
"Feng",
"Shanshan",
""
],
[
"Mao",
"Xian-Ling",
""
]
] | TITLE: Gated Mechanism Enhanced Multi-Task Learning for Dialog Routing
ABSTRACT: Currently, human-bot symbiosis dialog systems, e.g., pre- and after-sales in
E-commerce, are ubiquitous, and the dialog routing component is essential to
improve the overall efficiency, reduce human resource cost, and enhance user
experience. Although most existing methods can fulfil this requirement, they
can only model single-source dialog data and cannot effectively capture the
underlying knowledge of relations among data and subtasks. In this paper, we
investigate this important problem by thoroughly mining both the data-to-task
and task-to-task knowledge among various kinds of dialog data. To achieve the
above targets, we propose a Gated Mechanism enhanced Multi-task Model (G3M),
specifically including a novel dialog encoder and two tailored gated mechanism
modules. The proposed method can play the role of hierarchical information
filtering and is non-invasive to existing dialog systems. Based on two datasets
collected from real world applications, extensive experimental results
demonstrate the effectiveness of our method, which achieves the
state-of-the-art performance by improving 8.7\%/11.8\% on RMSE metric and
2.2\%/4.4\% on F1 metric.
| no_new_dataset | 0.945045 |
2304.03739 | Prithvi Akella | Prithvi Akella and Aaron D. Ames | Bounding Optimality Gaps for Non-Convex Optimization Problems:
Applications to Nonlinear Safety-Critical Systems | null | null | null | null | math.OC cs.IT cs.RO cs.SY eess.SY math.IT | http://creativecommons.org/licenses/by/4.0/ | Efficient methods to provide sub-optimal solutions to non-convex optimization
problems with knowledge of the solution's sub-optimality would facilitate the
widespread application of nonlinear optimal control algorithms. To that end,
leveraging recent work in risk-aware verification, we provide two algorithms to
(1) probabilistically bound the optimality gaps of solutions reported by novel
percentile optimization techniques, and (2) probabilistically bound the maximum
optimality gap reported by percentile approaches for repetitive applications,
e.g. Model Predictive Control (MPC). Notably, our results work for a large
class of optimization problems. We showcase the efficacy and repeatability of
our results on a few, benchmark non-convex optimization problems and the
utility of our results for controls in a Nonlinear MPC setting.
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2023 17:22:12 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Akella",
"Prithvi",
""
],
[
"Ames",
"Aaron D.",
""
]
] | TITLE: Bounding Optimality Gaps for Non-Convex Optimization Problems:
Applications to Nonlinear Safety-Critical Systems
ABSTRACT: Efficient methods to provide sub-optimal solutions to non-convex optimization
problems with knowledge of the solution's sub-optimality would facilitate the
widespread application of nonlinear optimal control algorithms. To that end,
leveraging recent work in risk-aware verification, we provide two algorithms to
(1) probabilistically bound the optimality gaps of solutions reported by novel
percentile optimization techniques, and (2) probabilistically bound the maximum
optimality gap reported by percentile approaches for repetitive applications,
e.g. Model Predictive Control (MPC). Notably, our results work for a large
class of optimization problems. We showcase the efficacy and repeatability of
our results on a few, benchmark non-convex optimization problems and the
utility of our results for controls in a Nonlinear MPC setting.
| no_new_dataset | 0.9455 |
2304.03754 | Hung-Ting Su | Hung-Ting Su, Yulei Niu, Xudong Lin, Winston H. Hsu, Shih-Fu Chang | Language Models are Causal Knowledge Extractors for Zero-shot Video
Question Answering | CVPR 2023 Workshop L3D-IVU | null | null | null | cs.CL cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Causal Video Question Answering (CVidQA) queries not only association or
temporal relations but also causal relations in a video. Existing question
synthesis methods pre-trained question generation (QG) systems on reading
comprehension datasets with text descriptions as inputs. However, QG models
only learn to ask association questions (e.g., ``what is someone doing...'')
and result in inferior performance due to the poor transfer of association
knowledge to CVidQA, which focuses on causal questions like ``why is someone
doing ...''. Observing this, we proposed to exploit causal knowledge to
generate question-answer pairs, and proposed a novel framework, Causal
Knowledge Extraction from Language Models (CaKE-LM), leveraging causal
commonsense knowledge from language models to tackle CVidQA. To extract
knowledge from LMs, CaKE-LM generates causal questions containing two events
with one triggering another (e.g., ``score a goal'' triggers ``soccer player
kicking ball'') by prompting LM with the action (soccer player kicking ball) to
retrieve the intention (to score a goal). CaKE-LM significantly outperforms
conventional methods by 4% to 6% of zero-shot CVidQA accuracy on NExT-QA and
Causal-VidQA datasets. We also conduct comprehensive analyses and provide key
findings for future research.
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2023 17:45:49 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Su",
"Hung-Ting",
""
],
[
"Niu",
"Yulei",
""
],
[
"Lin",
"Xudong",
""
],
[
"Hsu",
"Winston H.",
""
],
[
"Chang",
"Shih-Fu",
""
]
] | TITLE: Language Models are Causal Knowledge Extractors for Zero-shot Video
Question Answering
ABSTRACT: Causal Video Question Answering (CVidQA) queries not only association or
temporal relations but also causal relations in a video. Existing question
synthesis methods pre-trained question generation (QG) systems on reading
comprehension datasets with text descriptions as inputs. However, QG models
only learn to ask association questions (e.g., ``what is someone doing...'')
and result in inferior performance due to the poor transfer of association
knowledge to CVidQA, which focuses on causal questions like ``why is someone
doing ...''. Observing this, we proposed to exploit causal knowledge to
generate question-answer pairs, and proposed a novel framework, Causal
Knowledge Extraction from Language Models (CaKE-LM), leveraging causal
commonsense knowledge from language models to tackle CVidQA. To extract
knowledge from LMs, CaKE-LM generates causal questions containing two events
with one triggering another (e.g., ``score a goal'' triggers ``soccer player
kicking ball'') by prompting LM with the action (soccer player kicking ball) to
retrieve the intention (to score a goal). CaKE-LM significantly outperforms
conventional methods by 4% to 6% of zero-shot CVidQA accuracy on NExT-QA and
Causal-VidQA datasets. We also conduct comprehensive analyses and provide key
findings for future research.
| no_new_dataset | 0.942771 |
2304.03755 | Antonia Chmiela | Antonia Chmiela, Ambros Gleixner, Pawel Lichocki, Sebastian Pokutta | Online Learning for Scheduling MIP Heuristics | Published in the Proceedings of CPAIOR 2023 | null | null | null | math.OC cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Mixed Integer Programming (MIP) is NP-hard, and yet modern solvers often
solve large real-world problems within minutes. This success can partially be
attributed to heuristics. Since their behavior is highly instance-dependent,
relying on hard-coded rules derived from empirical testing on a large
heterogeneous corpora of benchmark instances might lead to sub-optimal
performance. In this work, we propose an online learning approach that adapts
the application of heuristics towards the single instance at hand. We replace
the commonly used static heuristic handling with an adaptive framework
exploiting past observations about the heuristic's behavior to make future
decisions. In particular, we model the problem of controlling Large
Neighborhood Search and Diving - two broad and complex classes of heuristics -
as a multi-armed bandit problem. Going beyond existing work in the literature,
we control two different classes of heuristics simultaneously by a single
learning agent. We verify our approach numerically and show consistent node
reductions over the MIPLIB 2017 Benchmark set. For harder instances that take
at least 1000 seconds to solve, we observe a speedup of 4%.
| [
{
"version": "v1",
"created": "Tue, 4 Apr 2023 14:55:15 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Chmiela",
"Antonia",
""
],
[
"Gleixner",
"Ambros",
""
],
[
"Lichocki",
"Pawel",
""
],
[
"Pokutta",
"Sebastian",
""
]
] | TITLE: Online Learning for Scheduling MIP Heuristics
ABSTRACT: Mixed Integer Programming (MIP) is NP-hard, and yet modern solvers often
solve large real-world problems within minutes. This success can partially be
attributed to heuristics. Since their behavior is highly instance-dependent,
relying on hard-coded rules derived from empirical testing on a large
heterogeneous corpora of benchmark instances might lead to sub-optimal
performance. In this work, we propose an online learning approach that adapts
the application of heuristics towards the single instance at hand. We replace
the commonly used static heuristic handling with an adaptive framework
exploiting past observations about the heuristic's behavior to make future
decisions. In particular, we model the problem of controlling Large
Neighborhood Search and Diving - two broad and complex classes of heuristics -
as a multi-armed bandit problem. Going beyond existing work in the literature,
we control two different classes of heuristics simultaneously by a single
learning agent. We verify our approach numerically and show consistent node
reductions over the MIPLIB 2017 Benchmark set. For harder instances that take
at least 1000 seconds to solve, we observe a speedup of 4%.
| no_new_dataset | 0.943295 |
2304.03767 | Mingyu Ding | Mingyu Ding, Yan Xu, Zhenfang Chen, David Daniel Cox, Ping Luo, Joshua
B. Tenenbaum, Chuang Gan | Embodied Concept Learner: Self-supervised Learning of Concepts and
Mapping through Instruction Following | CoRL 2022 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Humans, even at a very early age, can learn visual concepts and understand
geometry and layout through active interaction with the environment, and
generalize their compositions to complete tasks described by natural languages
in novel scenes. To mimic such capability, we propose Embodied Concept Learner
(ECL) in an interactive 3D environment. Specifically, a robot agent can ground
visual concepts, build semantic maps and plan actions to complete tasks by
learning purely from human demonstrations and language instructions, without
access to ground-truth semantic and depth supervisions from simulations. ECL
consists of: (i) an instruction parser that translates the natural languages
into executable programs; (ii) an embodied concept learner that grounds visual
concepts based on language descriptions; (iii) a map constructor that estimates
depth and constructs semantic maps by leveraging the learned concepts; and (iv)
a program executor with deterministic policies to execute each program. ECL has
several appealing benefits thanks to its modularized design. Firstly, it
enables the robotic agent to learn semantics and depth unsupervisedly acting
like babies, e.g., ground concepts through active interaction and perceive
depth by disparities when moving forward. Secondly, ECL is fully transparent
and step-by-step interpretable in long-term planning. Thirdly, ECL could be
beneficial for the embodied instruction following (EIF), outperforming previous
works on the ALFRED benchmark when the semantic label is not provided. Also,
the learned concept can be reused for other downstream tasks, such as reasoning
of object states. Project page: http://ecl.csail.mit.edu/
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2023 17:59:34 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Ding",
"Mingyu",
""
],
[
"Xu",
"Yan",
""
],
[
"Chen",
"Zhenfang",
""
],
[
"Cox",
"David Daniel",
""
],
[
"Luo",
"Ping",
""
],
[
"Tenenbaum",
"Joshua B.",
""
],
[
"Gan",
"Chuang",
""
]
] | TITLE: Embodied Concept Learner: Self-supervised Learning of Concepts and
Mapping through Instruction Following
ABSTRACT: Humans, even at a very early age, can learn visual concepts and understand
geometry and layout through active interaction with the environment, and
generalize their compositions to complete tasks described by natural languages
in novel scenes. To mimic such capability, we propose Embodied Concept Learner
(ECL) in an interactive 3D environment. Specifically, a robot agent can ground
visual concepts, build semantic maps and plan actions to complete tasks by
learning purely from human demonstrations and language instructions, without
access to ground-truth semantic and depth supervisions from simulations. ECL
consists of: (i) an instruction parser that translates the natural languages
into executable programs; (ii) an embodied concept learner that grounds visual
concepts based on language descriptions; (iii) a map constructor that estimates
depth and constructs semantic maps by leveraging the learned concepts; and (iv)
a program executor with deterministic policies to execute each program. ECL has
several appealing benefits thanks to its modularized design. Firstly, it
enables the robotic agent to learn semantics and depth unsupervisedly acting
like babies, e.g., ground concepts through active interaction and perceive
depth by disparities when moving forward. Secondly, ECL is fully transparent
and step-by-step interpretable in long-term planning. Thirdly, ECL could be
beneficial for the embodied instruction following (EIF), outperforming previous
works on the ALFRED benchmark when the semantic label is not provided. Also,
the learned concept can be reused for other downstream tasks, such as reasoning
of object states. Project page: http://ecl.csail.mit.edu/
| no_new_dataset | 0.946597 |
2304.03768 | Ziteng Gao | Ziteng Gao, Zhan Tong, Limin Wang, Mike Zheng Shou | SparseFormer: Sparse Visual Recognition via Limited Latent Tokens | Technical report | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Human visual recognition is a sparse process, where only a few salient visual
cues are attended to rather than traversing every detail uniformly. However,
most current vision networks follow a dense paradigm, processing every single
visual unit (e.g,, pixel or patch) in a uniform manner. In this paper, we
challenge this dense paradigm and present a new method, coined SparseFormer, to
imitate human's sparse visual recognition in an end-to-end manner. SparseFormer
learns to represent images using a highly limited number of tokens (down to 49)
in the latent space with sparse feature sampling procedure instead of
processing dense units in the original pixel space. Therefore, SparseFormer
circumvents most of dense operations on the image space and has much lower
computational costs. Experiments on the ImageNet classification benchmark
dataset show that SparseFormer achieves performance on par with canonical or
well-established models while offering better accuracy-throughput tradeoff.
Moreover, the design of our network can be easily extended to the video
classification with promising performance at lower computational costs. We hope
that our work can provide an alternative way for visual modeling and inspire
further research on sparse neural architectures. The code will be publicly
available at https://github.com/showlab/sparseformer
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2023 17:59:58 GMT"
}
] | 2023-04-10T00:00:00 | [
[
"Gao",
"Ziteng",
""
],
[
"Tong",
"Zhan",
""
],
[
"Wang",
"Limin",
""
],
[
"Shou",
"Mike Zheng",
""
]
] | TITLE: SparseFormer: Sparse Visual Recognition via Limited Latent Tokens
ABSTRACT: Human visual recognition is a sparse process, where only a few salient visual
cues are attended to rather than traversing every detail uniformly. However,
most current vision networks follow a dense paradigm, processing every single
visual unit (e.g,, pixel or patch) in a uniform manner. In this paper, we
challenge this dense paradigm and present a new method, coined SparseFormer, to
imitate human's sparse visual recognition in an end-to-end manner. SparseFormer
learns to represent images using a highly limited number of tokens (down to 49)
in the latent space with sparse feature sampling procedure instead of
processing dense units in the original pixel space. Therefore, SparseFormer
circumvents most of dense operations on the image space and has much lower
computational costs. Experiments on the ImageNet classification benchmark
dataset show that SparseFormer achieves performance on par with canonical or
well-established models while offering better accuracy-throughput tradeoff.
Moreover, the design of our network can be easily extended to the video
classification with promising performance at lower computational costs. We hope
that our work can provide an alternative way for visual modeling and inspire
further research on sparse neural architectures. The code will be publicly
available at https://github.com/showlab/sparseformer
| no_new_dataset | 0.947235 |
1910.09161 | Shixiang Zhu | Shixiang Zhu, Henry Shaowu Yuchi, Minghe Zhang, Yao Xie | Sequential Adversarial Anomaly Detection for One-Class Event Data | null | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the sequential anomaly detection problem in the one-class setting
when only the anomalous sequences are available and propose an adversarial
sequential detector by solving a minimax problem to find an optimal detector
against the worst-case sequences from a generator. The generator captures the
dependence in sequential events using the marked point process model. The
detector sequentially evaluates the likelihood of a test sequence and compares
it with a time-varying threshold, also learned from data through the minimax
problem. We demonstrate our proposed method's good performance using numerical
experiments on simulations and proprietary large-scale credit card fraud
datasets. The proposed method can generally apply to detecting anomalous
sequences.
| [
{
"version": "v1",
"created": "Mon, 21 Oct 2019 06:12:47 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Apr 2020 19:25:55 GMT"
},
{
"version": "v3",
"created": "Sat, 1 Aug 2020 23:23:18 GMT"
},
{
"version": "v4",
"created": "Sun, 21 Feb 2021 23:46:36 GMT"
},
{
"version": "v5",
"created": "Thu, 6 Apr 2023 02:06:52 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Zhu",
"Shixiang",
""
],
[
"Yuchi",
"Henry Shaowu",
""
],
[
"Zhang",
"Minghe",
""
],
[
"Xie",
"Yao",
""
]
] | TITLE: Sequential Adversarial Anomaly Detection for One-Class Event Data
ABSTRACT: We consider the sequential anomaly detection problem in the one-class setting
when only the anomalous sequences are available and propose an adversarial
sequential detector by solving a minimax problem to find an optimal detector
against the worst-case sequences from a generator. The generator captures the
dependence in sequential events using the marked point process model. The
detector sequentially evaluates the likelihood of a test sequence and compares
it with a time-varying threshold, also learned from data through the minimax
problem. We demonstrate our proposed method's good performance using numerical
experiments on simulations and proprietary large-scale credit card fraud
datasets. The proposed method can generally apply to detecting anomalous
sequences.
| no_new_dataset | 0.943504 |
2003.02144 | Adam Polak | Antonios Antoniadis and Christian Coester and Marek Elias and Adam
Polak and Bertrand Simon | Online metric algorithms with untrusted predictions | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Machine-learned predictors, although achieving very good results for inputs
resembling training data, cannot possibly provide perfect predictions in all
situations. Still, decision-making systems that are based on such predictors
need not only to benefit from good predictions but also to achieve a decent
performance when the predictions are inadequate. In this paper, we propose a
prediction setup for arbitrary metrical task systems (MTS) (e.g., caching,
k-server and convex body chasing) and online matching on the line. We utilize
results from the theory of online algorithms to show how to make the setup
robust. Specifically for caching, we present an algorithm whose performance, as
a function of the prediction error, is exponentially better than what is
achievable for general MTS. Finally, we present an empirical evaluation of our
methods on real world datasets, which suggests practicality.
| [
{
"version": "v1",
"created": "Wed, 4 Mar 2020 15:48:37 GMT"
},
{
"version": "v2",
"created": "Fri, 26 Jun 2020 13:10:29 GMT"
},
{
"version": "v3",
"created": "Thu, 6 Apr 2023 09:30:19 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Antoniadis",
"Antonios",
""
],
[
"Coester",
"Christian",
""
],
[
"Elias",
"Marek",
""
],
[
"Polak",
"Adam",
""
],
[
"Simon",
"Bertrand",
""
]
] | TITLE: Online metric algorithms with untrusted predictions
ABSTRACT: Machine-learned predictors, although achieving very good results for inputs
resembling training data, cannot possibly provide perfect predictions in all
situations. Still, decision-making systems that are based on such predictors
need not only to benefit from good predictions but also to achieve a decent
performance when the predictions are inadequate. In this paper, we propose a
prediction setup for arbitrary metrical task systems (MTS) (e.g., caching,
k-server and convex body chasing) and online matching on the line. We utilize
results from the theory of online algorithms to show how to make the setup
robust. Specifically for caching, we present an algorithm whose performance, as
a function of the prediction error, is exponentially better than what is
achievable for general MTS. Finally, we present an empirical evaluation of our
methods on real world datasets, which suggests practicality.
| no_new_dataset | 0.948775 |
2008.12328 | Radu Tudor Ionescu | Mariana-Iuliana Georgescu, Radu Tudor Ionescu, Fahad Shahbaz Khan,
Marius Popescu and Mubarak Shah | A Background-Agnostic Framework with Adversarial Training for Abnormal
Event Detection in Video | Accepted in IEEE Transactions on Pattern Analysis and Machine
Intelligence | null | 10.1109/TPAMI.2021.3074805 | null | cs.CV eess.IV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Abnormal event detection in video is a complex computer vision problem that
has attracted significant attention in recent years. The complexity of the task
arises from the commonly-adopted definition of an abnormal event, that is, a
rarely occurring event that typically depends on the surrounding context.
Following the standard formulation of abnormal event detection as outlier
detection, we propose a background-agnostic framework that learns from training
videos containing only normal events. Our framework is composed of an object
detector, a set of appearance and motion auto-encoders, and a set of
classifiers. Since our framework only looks at object detections, it can be
applied to different scenes, provided that normal events are defined
identically across scenes and that the single main factor of variation is the
background. To overcome the lack of abnormal data during training, we propose
an adversarial learning strategy for the auto-encoders. We create a
scene-agnostic set of out-of-domain pseudo-abnormal examples, which are
correctly reconstructed by the auto-encoders before applying gradient ascent on
the pseudo-abnormal examples. We further utilize the pseudo-abnormal examples
to serve as abnormal examples when training appearance-based and motion-based
binary classifiers to discriminate between normal and abnormal latent features
and reconstructions. We compare our framework with the state-of-the-art methods
on four benchmark data sets, using various evaluation metrics. Compared to
existing methods, the empirical results indicate that our approach achieves
favorable performance on all data sets. In addition, we provide region-based
and track-based annotations for two large-scale abnormal event detection data
sets from the literature, namely ShanghaiTech and Subway.
| [
{
"version": "v1",
"created": "Thu, 27 Aug 2020 18:39:24 GMT"
},
{
"version": "v2",
"created": "Fri, 16 Apr 2021 14:38:12 GMT"
},
{
"version": "v3",
"created": "Mon, 19 Apr 2021 20:40:37 GMT"
},
{
"version": "v4",
"created": "Mon, 10 May 2021 14:47:29 GMT"
},
{
"version": "v5",
"created": "Thu, 6 Apr 2023 15:49:54 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Georgescu",
"Mariana-Iuliana",
""
],
[
"Ionescu",
"Radu Tudor",
""
],
[
"Khan",
"Fahad Shahbaz",
""
],
[
"Popescu",
"Marius",
""
],
[
"Shah",
"Mubarak",
""
]
] | TITLE: A Background-Agnostic Framework with Adversarial Training for Abnormal
Event Detection in Video
ABSTRACT: Abnormal event detection in video is a complex computer vision problem that
has attracted significant attention in recent years. The complexity of the task
arises from the commonly-adopted definition of an abnormal event, that is, a
rarely occurring event that typically depends on the surrounding context.
Following the standard formulation of abnormal event detection as outlier
detection, we propose a background-agnostic framework that learns from training
videos containing only normal events. Our framework is composed of an object
detector, a set of appearance and motion auto-encoders, and a set of
classifiers. Since our framework only looks at object detections, it can be
applied to different scenes, provided that normal events are defined
identically across scenes and that the single main factor of variation is the
background. To overcome the lack of abnormal data during training, we propose
an adversarial learning strategy for the auto-encoders. We create a
scene-agnostic set of out-of-domain pseudo-abnormal examples, which are
correctly reconstructed by the auto-encoders before applying gradient ascent on
the pseudo-abnormal examples. We further utilize the pseudo-abnormal examples
to serve as abnormal examples when training appearance-based and motion-based
binary classifiers to discriminate between normal and abnormal latent features
and reconstructions. We compare our framework with the state-of-the-art methods
on four benchmark data sets, using various evaluation metrics. Compared to
existing methods, the empirical results indicate that our approach achieves
favorable performance on all data sets. In addition, we provide region-based
and track-based annotations for two large-scale abnormal event detection data
sets from the literature, namely ShanghaiTech and Subway.
| no_new_dataset | 0.926437 |
2011.15028 | G\'abor Sz\'arnyas | Alexandru Iosup, Ahmed Musaafir, Alexandru Uta, Arnau Prat P\'erez,
G\'abor Sz\'arnyas, Hassan Chafi, Ilie Gabriel T\u{a}nase, Lifeng Nai,
Michael Anderson, Mihai Capot\u{a}, Narayanan Sundaram, Peter Boncz,
Siegfried Depner, Stijn Heldens, Thomas Manhardt, Tim Hegeman, Wing Lung
Ngai, Yinglong Xia | The LDBC Graphalytics Benchmark | null | null | null | null | cs.DC cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this document, we describe LDBC Graphalytics, an industrial-grade
benchmark for graph analysis platforms. The main goal of Graphalytics is to
enable the fair and objective comparison of graph analysis platforms. Due to
the diversity of bottlenecks and performance issues such platforms need to
address, Graphalytics consists of a set of selected deterministic algorithms
for full-graph analysis, standard graph datasets, synthetic dataset generators,
and reference output for validation purposes. Its test harness produces deep
metrics that quantify multiple kinds of systems scalability, weak and strong,
and robustness, such as failures and performance variability. The benchmark
also balances comprehensiveness with runtime necessary to obtain the deep
metrics. The benchmark comes with open-source software for generating
performance data, for validating algorithm results, for monitoring and sharing
performance data, and for obtaining the final benchmark result as a standard
performance report.
| [
{
"version": "v1",
"created": "Mon, 30 Nov 2020 17:34:37 GMT"
},
{
"version": "v2",
"created": "Sun, 31 Jan 2021 13:59:29 GMT"
},
{
"version": "v3",
"created": "Tue, 13 Apr 2021 18:37:57 GMT"
},
{
"version": "v4",
"created": "Thu, 31 Mar 2022 09:47:08 GMT"
},
{
"version": "v5",
"created": "Wed, 15 Feb 2023 09:58:57 GMT"
},
{
"version": "v6",
"created": "Thu, 6 Apr 2023 07:24:03 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Iosup",
"Alexandru",
""
],
[
"Musaafir",
"Ahmed",
""
],
[
"Uta",
"Alexandru",
""
],
[
"Pérez",
"Arnau Prat",
""
],
[
"Szárnyas",
"Gábor",
""
],
[
"Chafi",
"Hassan",
""
],
[
"Tănase",
"Ilie Gabriel",
""
],
[
"Nai",
"Lifeng",
""
],
[
"Anderson",
"Michael",
""
],
[
"Capotă",
"Mihai",
""
],
[
"Sundaram",
"Narayanan",
""
],
[
"Boncz",
"Peter",
""
],
[
"Depner",
"Siegfried",
""
],
[
"Heldens",
"Stijn",
""
],
[
"Manhardt",
"Thomas",
""
],
[
"Hegeman",
"Tim",
""
],
[
"Ngai",
"Wing Lung",
""
],
[
"Xia",
"Yinglong",
""
]
] | TITLE: The LDBC Graphalytics Benchmark
ABSTRACT: In this document, we describe LDBC Graphalytics, an industrial-grade
benchmark for graph analysis platforms. The main goal of Graphalytics is to
enable the fair and objective comparison of graph analysis platforms. Due to
the diversity of bottlenecks and performance issues such platforms need to
address, Graphalytics consists of a set of selected deterministic algorithms
for full-graph analysis, standard graph datasets, synthetic dataset generators,
and reference output for validation purposes. Its test harness produces deep
metrics that quantify multiple kinds of systems scalability, weak and strong,
and robustness, such as failures and performance variability. The benchmark
also balances comprehensiveness with runtime necessary to obtain the deep
metrics. The benchmark comes with open-source software for generating
performance data, for validating algorithm results, for monitoring and sharing
performance data, and for obtaining the final benchmark result as a standard
performance report.
| new_dataset | 0.741112 |
2104.09304 | Kohei Watabe | Shohei Nakazawa, Yoshiki Sato, Kenji Nakagawa, Sho Tsugawa, Kohei
Watabe | A Tunable Model for Graph Generation Using LSTM and Conditional VAE | Accepted in Proceedings of the 41st IEEE International Conference on
Distributed Computing Systems (ICDCS 2021) Poster Track, Online , 2021. 2
pages, 3 pdf figures | null | 10.1109/ICDCS51616.2021.00119 | null | cs.LG cs.NI cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the development of graph applications, generative models for graphs have
been more crucial. Classically, stochastic models that generate graphs with a
pre-defined probability of edges and nodes have been studied. Recently, some
models that reproduce the structural features of graphs by learning from actual
graph data using machine learning have been studied. However, in these
conventional studies based on machine learning, structural features of graphs
can be learned from data, but it is not possible to tune features and generate
graphs with specific features. In this paper, we propose a generative model
that can tune specific features, while learning structural features of a graph
from data. With a dataset of graphs with various features generated by a
stochastic model, we confirm that our model can generate a graph with specific
features.
| [
{
"version": "v1",
"created": "Thu, 15 Apr 2021 06:47:14 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Nakazawa",
"Shohei",
""
],
[
"Sato",
"Yoshiki",
""
],
[
"Nakagawa",
"Kenji",
""
],
[
"Tsugawa",
"Sho",
""
],
[
"Watabe",
"Kohei",
""
]
] | TITLE: A Tunable Model for Graph Generation Using LSTM and Conditional VAE
ABSTRACT: With the development of graph applications, generative models for graphs have
been more crucial. Classically, stochastic models that generate graphs with a
pre-defined probability of edges and nodes have been studied. Recently, some
models that reproduce the structural features of graphs by learning from actual
graph data using machine learning have been studied. However, in these
conventional studies based on machine learning, structural features of graphs
can be learned from data, but it is not possible to tune features and generate
graphs with specific features. In this paper, we propose a generative model
that can tune specific features, while learning structural features of a graph
from data. With a dataset of graphs with various features generated by a
stochastic model, we confirm that our model can generate a graph with specific
features.
| no_new_dataset | 0.944177 |
2105.03725 | Geraldo Francisco De Oliveira Junior | Geraldo F. Oliveira and Juan G\'omez-Luna and Lois Orosa and Saugata
Ghose and Nandita Vijaykumar and Ivan Fernandez and Mohammad Sadrosadati and
Onur Mutlu | DAMOV: A New Methodology and Benchmark Suite for Evaluating Data
Movement Bottlenecks | Our open source software is available at
https://github.com/CMU-SAFARI/DAMOV | null | null | null | cs.AR cs.DC cs.PF | http://creativecommons.org/licenses/by/4.0/ | Data movement between the CPU and main memory is a first-order obstacle
against improving performance, scalability, and energy efficiency in modern
systems. Computer systems employ a range of techniques to reduce overheads tied
to data movement, spanning from traditional mechanisms (e.g., deep multi-level
cache hierarchies, aggressive hardware prefetchers) to emerging techniques such
as Near-Data Processing (NDP), where some computation is moved close to memory.
Our goal is to methodically identify potential sources of data movement over a
broad set of applications and to comprehensively compare traditional
compute-centric data movement mitigation techniques to more memory-centric
techniques, thereby developing a rigorous understanding of the best techniques
to mitigate each source of data movement.
With this goal in mind, we perform the first large-scale characterization of
a wide variety of applications, across a wide range of application domains, to
identify fundamental program properties that lead to data movement to/from main
memory. We develop the first systematic methodology to classify applications
based on the sources contributing to data movement bottlenecks. From our
large-scale characterization of 77K functions across 345 applications, we
select 144 functions to form the first open-source benchmark suite (DAMOV) for
main memory data movement studies. We select a diverse range of functions that
(1) represent different types of data movement bottlenecks, and (2) come from a
wide range of application domains. Using NDP as a case study, we identify new
insights about the different data movement bottlenecks and use these insights
to determine the most suitable data movement mitigation mechanism for a
particular application. We open-source DAMOV and the complete source code for
our new characterization methodology at https://github.com/CMU-SAFARI/DAMOV.
| [
{
"version": "v1",
"created": "Sat, 8 May 2021 16:02:53 GMT"
},
{
"version": "v2",
"created": "Fri, 14 May 2021 17:03:34 GMT"
},
{
"version": "v3",
"created": "Thu, 20 May 2021 15:57:09 GMT"
},
{
"version": "v4",
"created": "Tue, 6 Jul 2021 17:05:36 GMT"
},
{
"version": "v5",
"created": "Tue, 15 Feb 2022 14:26:45 GMT"
},
{
"version": "v6",
"created": "Thu, 6 Apr 2023 14:33:03 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Oliveira",
"Geraldo F.",
""
],
[
"Gómez-Luna",
"Juan",
""
],
[
"Orosa",
"Lois",
""
],
[
"Ghose",
"Saugata",
""
],
[
"Vijaykumar",
"Nandita",
""
],
[
"Fernandez",
"Ivan",
""
],
[
"Sadrosadati",
"Mohammad",
""
],
[
"Mutlu",
"Onur",
""
]
] | TITLE: DAMOV: A New Methodology and Benchmark Suite for Evaluating Data
Movement Bottlenecks
ABSTRACT: Data movement between the CPU and main memory is a first-order obstacle
against improving performance, scalability, and energy efficiency in modern
systems. Computer systems employ a range of techniques to reduce overheads tied
to data movement, spanning from traditional mechanisms (e.g., deep multi-level
cache hierarchies, aggressive hardware prefetchers) to emerging techniques such
as Near-Data Processing (NDP), where some computation is moved close to memory.
Our goal is to methodically identify potential sources of data movement over a
broad set of applications and to comprehensively compare traditional
compute-centric data movement mitigation techniques to more memory-centric
techniques, thereby developing a rigorous understanding of the best techniques
to mitigate each source of data movement.
With this goal in mind, we perform the first large-scale characterization of
a wide variety of applications, across a wide range of application domains, to
identify fundamental program properties that lead to data movement to/from main
memory. We develop the first systematic methodology to classify applications
based on the sources contributing to data movement bottlenecks. From our
large-scale characterization of 77K functions across 345 applications, we
select 144 functions to form the first open-source benchmark suite (DAMOV) for
main memory data movement studies. We select a diverse range of functions that
(1) represent different types of data movement bottlenecks, and (2) come from a
wide range of application domains. Using NDP as a case study, we identify new
insights about the different data movement bottlenecks and use these insights
to determine the most suitable data movement mitigation mechanism for a
particular application. We open-source DAMOV and the complete source code for
our new characterization methodology at https://github.com/CMU-SAFARI/DAMOV.
| no_new_dataset | 0.944893 |
2106.13952 | Di Wang | Di Wang, Bo Du, Liangpei Zhang | Spectral-Spatial Global Graph Reasoning for Hyperspectral Image
Classification | Accepted by IEEE TNNLS | null | null | null | cs.CV cs.LG eess.IV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Convolutional neural networks have been widely applied to hyperspectral image
classification. However, traditional convolutions can not effectively extract
features for objects with irregular distributions. Recent methods attempt to
address this issue by performing graph convolutions on spatial topologies, but
fixed graph structures and local perceptions limit their performances. To
tackle these problems, in this paper, different from previous approaches, we
perform the superpixel generation on intermediate features during network
training to adaptively produce homogeneous regions, obtain graph structures,
and further generate spatial descriptors, which are served as graph nodes.
Besides spatial objects, we also explore the graph relationships between
channels by reasonably aggregating channels to generate spectral descriptors.
The adjacent matrices in these graph convolutions are obtained by considering
the relationships among all descriptors to realize global perceptions. By
combining the extracted spatial and spectral graph features, we finally obtain
a spectral-spatial graph reasoning network (SSGRN). The spatial and spectral
parts of SSGRN are separately called spatial and spectral graph reasoning
subnetworks. Comprehensive experiments on four public datasets demonstrate the
competitiveness of the proposed methods compared with other state-of-the-art
graph convolution-based approaches.
| [
{
"version": "v1",
"created": "Sat, 26 Jun 2021 06:24:51 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2023 16:50:23 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Wang",
"Di",
""
],
[
"Du",
"Bo",
""
],
[
"Zhang",
"Liangpei",
""
]
] | TITLE: Spectral-Spatial Global Graph Reasoning for Hyperspectral Image
Classification
ABSTRACT: Convolutional neural networks have been widely applied to hyperspectral image
classification. However, traditional convolutions can not effectively extract
features for objects with irregular distributions. Recent methods attempt to
address this issue by performing graph convolutions on spatial topologies, but
fixed graph structures and local perceptions limit their performances. To
tackle these problems, in this paper, different from previous approaches, we
perform the superpixel generation on intermediate features during network
training to adaptively produce homogeneous regions, obtain graph structures,
and further generate spatial descriptors, which are served as graph nodes.
Besides spatial objects, we also explore the graph relationships between
channels by reasonably aggregating channels to generate spectral descriptors.
The adjacent matrices in these graph convolutions are obtained by considering
the relationships among all descriptors to realize global perceptions. By
combining the extracted spatial and spectral graph features, we finally obtain
a spectral-spatial graph reasoning network (SSGRN). The spatial and spectral
parts of SSGRN are separately called spatial and spectral graph reasoning
subnetworks. Comprehensive experiments on four public datasets demonstrate the
competitiveness of the proposed methods compared with other state-of-the-art
graph convolution-based approaches.
| no_new_dataset | 0.949435 |
2108.02566 | Min Yang | Yufeng Wang, Dan Li, Cong Xu, Min Yang | Missingness Augmentation: A General Approach for Improving Generative
Imputation Models | 20 pages | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Missing data imputation is a fundamental problem in data analysis, and many
studies have been conducted to improve its performance by exploring model
structures and learning procedures. However, data augmentation, as a simple yet
effective method, has not received enough attention in this area. In this
paper, we propose a novel data augmentation method called Missingness
Augmentation (MisA) for generative imputation models. Our approach dynamically
produces incomplete samples at each epoch by utilizing the generator's output,
constraining the augmented samples using a simple reconstruction loss, and
combining this loss with the original loss to form the final optimization
objective. As a general augmentation technique, MisA can be easily integrated
into generative imputation frameworks, providing a simple yet effective way to
enhance their performance. Experimental results demonstrate that MisA
significantly improves the performance of many recently proposed generative
imputation models on a variety of tabular and image datasets. The code is
available at \url{https://github.com/WYu-Feng/Missingness-Augmentation}.
| [
{
"version": "v1",
"created": "Sat, 31 Jul 2021 08:51:46 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2023 06:05:14 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Wang",
"Yufeng",
""
],
[
"Li",
"Dan",
""
],
[
"Xu",
"Cong",
""
],
[
"Yang",
"Min",
""
]
] | TITLE: Missingness Augmentation: A General Approach for Improving Generative
Imputation Models
ABSTRACT: Missing data imputation is a fundamental problem in data analysis, and many
studies have been conducted to improve its performance by exploring model
structures and learning procedures. However, data augmentation, as a simple yet
effective method, has not received enough attention in this area. In this
paper, we propose a novel data augmentation method called Missingness
Augmentation (MisA) for generative imputation models. Our approach dynamically
produces incomplete samples at each epoch by utilizing the generator's output,
constraining the augmented samples using a simple reconstruction loss, and
combining this loss with the original loss to form the final optimization
objective. As a general augmentation technique, MisA can be easily integrated
into generative imputation frameworks, providing a simple yet effective way to
enhance their performance. Experimental results demonstrate that MisA
significantly improves the performance of many recently proposed generative
imputation models on a variety of tabular and image datasets. The code is
available at \url{https://github.com/WYu-Feng/Missingness-Augmentation}.
| no_new_dataset | 0.946843 |
2110.11084 | Haokui Zhang | Xizhe Xue, Haokui Zhang, Bei Fang, Zongwen Bai, Ying Li | Grafting Transformer on Automatically Designed Convolutional Neural
Network for Hyperspectral Image Classification | 15 pages, 10 figures | null | 10.1109/TGRS.2022.3180685 | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Hyperspectral image (HSI) classification has been a hot topic for decides, as
hyperspectral images have rich spatial and spectral information and provide
strong basis for distinguishing different land-cover objects. Benefiting from
the development of deep learning technologies, deep learning based HSI
classification methods have achieved promising performance. Recently, several
neural architecture search (NAS) algorithms have been proposed for HSI
classification, which further improve the accuracy of HSI classification to a
new level. In this paper, NAS and Transformer are combined for handling HSI
classification task for the first time. Compared with previous work, the
proposed method has two main differences. First, we revisit the search spaces
designed in previous HSI classification NAS methods and propose a novel hybrid
search space, consisting of the space dominated cell and the spectrum dominated
cell. Compared with search spaces proposed in previous works, the proposed
hybrid search space is more aligned with the characteristic of HSI data, that
is, HSIs have a relatively low spatial resolution and an extremely high
spectral resolution. Second, to further improve the classification accuracy, we
attempt to graft the emerging transformer module on the automatically designed
convolutional neural network (CNN) to add global information to local region
focused features learned by CNN. Experimental results on three public HSI
datasets show that the proposed method achieves much better performance than
comparison approaches, including manually designed network and NAS based HSI
classification methods. Especially on the most recently captured dataset
Houston University, overall accuracy is improved by nearly 6 percentage points.
Code is available at: https://github.com/Cecilia-xue/HyT-NAS.
| [
{
"version": "v1",
"created": "Thu, 21 Oct 2021 11:51:51 GMT"
},
{
"version": "v2",
"created": "Fri, 10 Jun 2022 12:44:51 GMT"
},
{
"version": "v3",
"created": "Thu, 6 Apr 2023 12:30:49 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Xue",
"Xizhe",
""
],
[
"Zhang",
"Haokui",
""
],
[
"Fang",
"Bei",
""
],
[
"Bai",
"Zongwen",
""
],
[
"Li",
"Ying",
""
]
] | TITLE: Grafting Transformer on Automatically Designed Convolutional Neural
Network for Hyperspectral Image Classification
ABSTRACT: Hyperspectral image (HSI) classification has been a hot topic for decides, as
hyperspectral images have rich spatial and spectral information and provide
strong basis for distinguishing different land-cover objects. Benefiting from
the development of deep learning technologies, deep learning based HSI
classification methods have achieved promising performance. Recently, several
neural architecture search (NAS) algorithms have been proposed for HSI
classification, which further improve the accuracy of HSI classification to a
new level. In this paper, NAS and Transformer are combined for handling HSI
classification task for the first time. Compared with previous work, the
proposed method has two main differences. First, we revisit the search spaces
designed in previous HSI classification NAS methods and propose a novel hybrid
search space, consisting of the space dominated cell and the spectrum dominated
cell. Compared with search spaces proposed in previous works, the proposed
hybrid search space is more aligned with the characteristic of HSI data, that
is, HSIs have a relatively low spatial resolution and an extremely high
spectral resolution. Second, to further improve the classification accuracy, we
attempt to graft the emerging transformer module on the automatically designed
convolutional neural network (CNN) to add global information to local region
focused features learned by CNN. Experimental results on three public HSI
datasets show that the proposed method achieves much better performance than
comparison approaches, including manually designed network and NAS based HSI
classification methods. Especially on the most recently captured dataset
Houston University, overall accuracy is improved by nearly 6 percentage points.
Code is available at: https://github.com/Cecilia-xue/HyT-NAS.
| no_new_dataset | 0.955152 |
2201.11494 | Kohei Watabe | Kohei Watabe, Shohei Nakazawa, Yoshiki Sato, Sho Tsugawa, Kenji
Nakagawa | GraphTune: A Learning-based Graph Generative Model with Tunable
Structural Features | The paper was published in IEEE Transactions on Network Science and
Engineering (2023). An earlier and short version of this paper was presented
at the 41st IEEE International Conference on Distributed Computing Systems
(ICDCS 2021) Poster Track | null | 10.1109/TNSE.2023.3244590 | null | cs.LG cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Generative models for graphs have been actively studied for decades, and they
have a wide range of applications. Recently, learning-based graph generation
that reproduces real-world graphs has been attracting the attention of many
researchers. Although several generative models that utilize modern machine
learning technologies have been proposed, conditional generation of general
graphs has been less explored in the field. In this paper, we propose a
generative model that allows us to tune the value of a global-level structural
feature as a condition. Our model, called GraphTune, makes it possible to tune
the value of any structural feature of generated graphs using Long Short Term
Memory (LSTM) and a Conditional Variational AutoEncoder (CVAE). We performed
comparative evaluations of GraphTune and conventional models on a real graph
dataset. The evaluations show that GraphTune makes it possible to more clearly
tune the value of a global-level structural feature better than conventional
models.
| [
{
"version": "v1",
"created": "Thu, 27 Jan 2022 13:14:53 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Feb 2022 10:20:47 GMT"
},
{
"version": "v3",
"created": "Wed, 5 Apr 2023 10:39:46 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Watabe",
"Kohei",
""
],
[
"Nakazawa",
"Shohei",
""
],
[
"Sato",
"Yoshiki",
""
],
[
"Tsugawa",
"Sho",
""
],
[
"Nakagawa",
"Kenji",
""
]
] | TITLE: GraphTune: A Learning-based Graph Generative Model with Tunable
Structural Features
ABSTRACT: Generative models for graphs have been actively studied for decades, and they
have a wide range of applications. Recently, learning-based graph generation
that reproduces real-world graphs has been attracting the attention of many
researchers. Although several generative models that utilize modern machine
learning technologies have been proposed, conditional generation of general
graphs has been less explored in the field. In this paper, we propose a
generative model that allows us to tune the value of a global-level structural
feature as a condition. Our model, called GraphTune, makes it possible to tune
the value of any structural feature of generated graphs using Long Short Term
Memory (LSTM) and a Conditional Variational AutoEncoder (CVAE). We performed
comparative evaluations of GraphTune and conventional models on a real graph
dataset. The evaluations show that GraphTune makes it possible to more clearly
tune the value of a global-level structural feature better than conventional
models.
| no_new_dataset | 0.946794 |
2202.00582 | Shaymaa Abdulla Al-Delayel | Shaymaa Abdulla Al-Delayel | Security Analysis of Mobile Banking Application in Qatar | 8 pages, 1 figure | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper discusses the security posture of Android m-banking applications
in Qatar. Since technology has developed over the years and more security
methods are provided, banking is now heavily reliant on mobile applications for
prompt service delivery to clients, thus enabling a seamless and remote
transaction. However, such mobile banking applications have access to sensitive
data for each bank customer which presents a potential attack vector for
clients, and the banks. The banks, therefore, have the responsibility to
protect the information of the client by providing a high-security layer to
their mobile application. This research discusses m-banking applications for
Android OS, its security, vulnerability, threats, and solutions. Two m-banking
applications were analyzed and benchmarked against standardized best practices,
using the combination of two mobile testing frameworks. The security weaknesses
observed during the experimental evaluation suggest the need for a more robust
security evaluation of a mobile banking application in the state of Qatar. Such
an approach would further ensure the confidence of the end-users. Consequently,
understanding the security posture would provide a veritable measure towards
mbanking security and user awareness.
| [
{
"version": "v1",
"created": "Mon, 31 Jan 2022 17:52:30 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2023 09:25:37 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Al-Delayel",
"Shaymaa Abdulla",
""
]
] | TITLE: Security Analysis of Mobile Banking Application in Qatar
ABSTRACT: This paper discusses the security posture of Android m-banking applications
in Qatar. Since technology has developed over the years and more security
methods are provided, banking is now heavily reliant on mobile applications for
prompt service delivery to clients, thus enabling a seamless and remote
transaction. However, such mobile banking applications have access to sensitive
data for each bank customer which presents a potential attack vector for
clients, and the banks. The banks, therefore, have the responsibility to
protect the information of the client by providing a high-security layer to
their mobile application. This research discusses m-banking applications for
Android OS, its security, vulnerability, threats, and solutions. Two m-banking
applications were analyzed and benchmarked against standardized best practices,
using the combination of two mobile testing frameworks. The security weaknesses
observed during the experimental evaluation suggest the need for a more robust
security evaluation of a mobile banking application in the state of Qatar. Such
an approach would further ensure the confidence of the end-users. Consequently,
understanding the security posture would provide a veritable measure towards
mbanking security and user awareness.
| no_new_dataset | 0.94545 |
2202.01470 | Chunhua Shen | Guangkai Xu, Wei Yin, Hao Chen, Chunhua Shen, Kai Cheng, Feng Wu, Feng
Zhao | Towards 3D Scene Reconstruction from Locally Scale-Aligned Monocular
Video Depth | Technical error | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Existing monocular depth estimation methods have achieved excellent
robustness in diverse scenes, but they can only retrieve affine-invariant
depth, up to an unknown scale and shift. However, in some video-based scenarios
such as video depth estimation and 3D scene reconstruction from a video, the
unknown scale and shift residing in per-frame prediction may cause the depth
inconsistency. To solve this problem, we propose a locally weighted linear
regression method to recover the scale and shift with very sparse anchor
points, which ensures the scale consistency along consecutive frames. Extensive
experiments show that our method can boost the performance of existing
state-of-the-art approaches by 50% at most over several zero-shot benchmarks.
Besides, we merge over 6.3 million RGBD images to train strong and robust depth
models. Our produced ResNet50-backbone model even outperforms the
state-of-the-art DPT ViT-Large model. Combining with geometry-based
reconstruction methods, we formulate a new dense 3D scene reconstruction
pipeline, which benefits from both the scale consistency of sparse points and
the robustness of monocular methods. By performing the simple per-frame
prediction over a video, the accurate 3D scene shape can be recovered.
| [
{
"version": "v1",
"created": "Thu, 3 Feb 2022 08:52:54 GMT"
},
{
"version": "v2",
"created": "Fri, 22 Apr 2022 12:30:42 GMT"
},
{
"version": "v3",
"created": "Mon, 5 Sep 2022 02:20:58 GMT"
},
{
"version": "v4",
"created": "Thu, 6 Apr 2023 03:08:03 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Xu",
"Guangkai",
""
],
[
"Yin",
"Wei",
""
],
[
"Chen",
"Hao",
""
],
[
"Shen",
"Chunhua",
""
],
[
"Cheng",
"Kai",
""
],
[
"Wu",
"Feng",
""
],
[
"Zhao",
"Feng",
""
]
] | TITLE: Towards 3D Scene Reconstruction from Locally Scale-Aligned Monocular
Video Depth
ABSTRACT: Existing monocular depth estimation methods have achieved excellent
robustness in diverse scenes, but they can only retrieve affine-invariant
depth, up to an unknown scale and shift. However, in some video-based scenarios
such as video depth estimation and 3D scene reconstruction from a video, the
unknown scale and shift residing in per-frame prediction may cause the depth
inconsistency. To solve this problem, we propose a locally weighted linear
regression method to recover the scale and shift with very sparse anchor
points, which ensures the scale consistency along consecutive frames. Extensive
experiments show that our method can boost the performance of existing
state-of-the-art approaches by 50% at most over several zero-shot benchmarks.
Besides, we merge over 6.3 million RGBD images to train strong and robust depth
models. Our produced ResNet50-backbone model even outperforms the
state-of-the-art DPT ViT-Large model. Combining with geometry-based
reconstruction methods, we formulate a new dense 3D scene reconstruction
pipeline, which benefits from both the scale consistency of sparse points and
the robustness of monocular methods. By performing the simple per-frame
prediction over a video, the accurate 3D scene shape can be recovered.
| no_new_dataset | 0.941115 |
2202.10400 | Nika Mansouri Ghiasi | Nika Mansouri Ghiasi, Jisung Park, Harun Mustafa, Jeremie Kim, Ataberk
Olgun, Arvid Gollwitzer, Damla Senol Cali, Can Firtina, Haiyu Mao, Nour
Almadhoun Alserr, Rachata Ausavarungnirun, Nandita Vijaykumar, Mohammed
Alser, and Onur Mutlu | GenStore: A High-Performance and Energy-Efficient In-Storage Computing
System for Genome Sequence Analysis | Published at ASPLOS 2022 | null | null | null | cs.AR cs.DC cs.OS q-bio.GN | http://creativecommons.org/licenses/by/4.0/ | Read mapping is a fundamental, yet computationally-expensive step in many
genomics applications. It is used to identify potential matches and differences
between fragments (called reads) of a sequenced genome and an already known
genome (called a reference genome). To address the computational challenges in
genome analysis, many prior works propose various approaches such as filters
that select the reads that must undergo expensive computation, efficient
heuristics, and hardware acceleration. While effective at reducing the
computation overhead, all such approaches still require the costly movement of
a large amount of data from storage to the rest of the system, which can
significantly lower the end-to-end performance of read mapping in conventional
and emerging genomics systems.
We propose GenStore, the first in-storage processing system designed for
genome sequence analysis that greatly reduces both data movement and
computational overheads of genome sequence analysis by exploiting low-cost and
accurate in-storage filters. GenStore leverages hardware/software co-design to
address the challenges of in-storage processing, supporting reads with 1)
different read lengths and error rates, and 2) different degrees of genetic
variation. Through rigorous analysis of read mapping processes, we meticulously
design low-cost hardware accelerators and data/computation flows inside a NAND
flash-based SSD. Our evaluation using a wide range of real genomic datasets
shows that GenStore, when implemented in three modern SSDs, significantly
improves the read mapping performance of state-of-the-art software (hardware)
baselines by 2.07-6.05$\times$ (1.52-3.32$\times$) for read sets with high
similarity to the reference genome and 1.45-33.63$\times$ (2.70-19.2$\times$)
for read sets with low similarity to the reference genome.
| [
{
"version": "v1",
"created": "Mon, 21 Feb 2022 17:53:01 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2023 16:56:04 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Ghiasi",
"Nika Mansouri",
""
],
[
"Park",
"Jisung",
""
],
[
"Mustafa",
"Harun",
""
],
[
"Kim",
"Jeremie",
""
],
[
"Olgun",
"Ataberk",
""
],
[
"Gollwitzer",
"Arvid",
""
],
[
"Cali",
"Damla Senol",
""
],
[
"Firtina",
"Can",
""
],
[
"Mao",
"Haiyu",
""
],
[
"Alserr",
"Nour Almadhoun",
""
],
[
"Ausavarungnirun",
"Rachata",
""
],
[
"Vijaykumar",
"Nandita",
""
],
[
"Alser",
"Mohammed",
""
],
[
"Mutlu",
"Onur",
""
]
] | TITLE: GenStore: A High-Performance and Energy-Efficient In-Storage Computing
System for Genome Sequence Analysis
ABSTRACT: Read mapping is a fundamental, yet computationally-expensive step in many
genomics applications. It is used to identify potential matches and differences
between fragments (called reads) of a sequenced genome and an already known
genome (called a reference genome). To address the computational challenges in
genome analysis, many prior works propose various approaches such as filters
that select the reads that must undergo expensive computation, efficient
heuristics, and hardware acceleration. While effective at reducing the
computation overhead, all such approaches still require the costly movement of
a large amount of data from storage to the rest of the system, which can
significantly lower the end-to-end performance of read mapping in conventional
and emerging genomics systems.
We propose GenStore, the first in-storage processing system designed for
genome sequence analysis that greatly reduces both data movement and
computational overheads of genome sequence analysis by exploiting low-cost and
accurate in-storage filters. GenStore leverages hardware/software co-design to
address the challenges of in-storage processing, supporting reads with 1)
different read lengths and error rates, and 2) different degrees of genetic
variation. Through rigorous analysis of read mapping processes, we meticulously
design low-cost hardware accelerators and data/computation flows inside a NAND
flash-based SSD. Our evaluation using a wide range of real genomic datasets
shows that GenStore, when implemented in three modern SSDs, significantly
improves the read mapping performance of state-of-the-art software (hardware)
baselines by 2.07-6.05$\times$ (1.52-3.32$\times$) for read sets with high
similarity to the reference genome and 1.45-33.63$\times$ (2.70-19.2$\times$)
for read sets with low similarity to the reference genome.
| no_new_dataset | 0.947527 |
2203.09978 | Jean-Christophe Gagnon-Audet | Jean-Christophe Gagnon-Audet, Kartik Ahuja, Mohammad-Javad
Darvishi-Bayazi, Pooneh Mousavi, Guillaume Dumas, Irina Rish | WOODS: Benchmarks for Out-of-Distribution Generalization in Time Series | 47 pages, 21 figures | null | null | null | cs.LG stat.ML | http://creativecommons.org/licenses/by/4.0/ | Machine learning models often fail to generalize well under distributional
shifts. Understanding and overcoming these failures have led to a research
field of Out-of-Distribution (OOD) generalization. Despite being extensively
studied for static computer vision tasks, OOD generalization has been
underexplored for time series tasks. To shine light on this gap, we present
WOODS: eight challenging open-source time series benchmarks covering a diverse
range of data modalities, such as videos, brain recordings, and sensor signals.
We revise the existing OOD generalization algorithms for time series tasks and
evaluate them using our systematic framework. Our experiments show a large room
for improvement for empirical risk minimization and OOD generalization
algorithms on our datasets, thus underscoring the new challenges posed by time
series tasks. Code and documentation are available at
https://woods-benchmarks.github.io .
| [
{
"version": "v1",
"created": "Fri, 18 Mar 2022 14:12:54 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2023 14:21:18 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Gagnon-Audet",
"Jean-Christophe",
""
],
[
"Ahuja",
"Kartik",
""
],
[
"Darvishi-Bayazi",
"Mohammad-Javad",
""
],
[
"Mousavi",
"Pooneh",
""
],
[
"Dumas",
"Guillaume",
""
],
[
"Rish",
"Irina",
""
]
] | TITLE: WOODS: Benchmarks for Out-of-Distribution Generalization in Time Series
ABSTRACT: Machine learning models often fail to generalize well under distributional
shifts. Understanding and overcoming these failures have led to a research
field of Out-of-Distribution (OOD) generalization. Despite being extensively
studied for static computer vision tasks, OOD generalization has been
underexplored for time series tasks. To shine light on this gap, we present
WOODS: eight challenging open-source time series benchmarks covering a diverse
range of data modalities, such as videos, brain recordings, and sensor signals.
We revise the existing OOD generalization algorithms for time series tasks and
evaluate them using our systematic framework. Our experiments show a large room
for improvement for empirical risk minimization and OOD generalization
algorithms on our datasets, thus underscoring the new challenges posed by time
series tasks. Code and documentation are available at
https://woods-benchmarks.github.io .
| no_new_dataset | 0.550351 |
2205.05345 | Michael Baur | Michael Baur, Benedikt Fesl, Michael Koller, Wolfgang Utschick | Variational Autoencoder Leveraged MMSE Channel Estimation | Accepted for publication at Asilomar 2022 | null | 10.1109/IEEECONF56349.2022.10051858 | null | eess.SP cs.IT math.IT stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose to utilize a variational autoencoder (VAE) for data-driven channel
estimation. The underlying true and unknown channel distribution is modeled by
the VAE as a conditional Gaussian distribution in a novel way, parameterized by
the respective first and second order conditional moments. As a result, it can
be observed that the linear minimum mean square error (LMMSE) estimator in its
variant conditioned on the latent sample of the VAE approximates an optimal MSE
estimator. Furthermore, we argue how a VAE-based channel estimator can
approximate the MMSE channel estimator. We propose three variants of VAE
estimators that differ in the data used during training and estimation. First,
we show that given perfectly known channel state information at the input of
the VAE during estimation, which is impractical, we obtain an estimator that
can serve as a benchmark result for an estimation scenario. We then propose
practically feasible approaches, where perfectly known channel state
information is only necessary in the training phase or is not needed at all.
Simulation results on 3GPP and QuaDRiGa channel data attest a small performance
loss of the practical approaches and the superiority of our VAE approaches in
comparison to other related channel estimation methods.
| [
{
"version": "v1",
"created": "Wed, 11 May 2022 08:45:54 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Nov 2022 14:32:20 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Baur",
"Michael",
""
],
[
"Fesl",
"Benedikt",
""
],
[
"Koller",
"Michael",
""
],
[
"Utschick",
"Wolfgang",
""
]
] | TITLE: Variational Autoencoder Leveraged MMSE Channel Estimation
ABSTRACT: We propose to utilize a variational autoencoder (VAE) for data-driven channel
estimation. The underlying true and unknown channel distribution is modeled by
the VAE as a conditional Gaussian distribution in a novel way, parameterized by
the respective first and second order conditional moments. As a result, it can
be observed that the linear minimum mean square error (LMMSE) estimator in its
variant conditioned on the latent sample of the VAE approximates an optimal MSE
estimator. Furthermore, we argue how a VAE-based channel estimator can
approximate the MMSE channel estimator. We propose three variants of VAE
estimators that differ in the data used during training and estimation. First,
we show that given perfectly known channel state information at the input of
the VAE during estimation, which is impractical, we obtain an estimator that
can serve as a benchmark result for an estimation scenario. We then propose
practically feasible approaches, where perfectly known channel state
information is only necessary in the training phase or is not needed at all.
Simulation results on 3GPP and QuaDRiGa channel data attest a small performance
loss of the practical approaches and the superiority of our VAE approaches in
comparison to other related channel estimation methods.
| no_new_dataset | 0.944331 |
2205.05398 | Francesca Cairoli | Luca Bortolussi, Francesca Cairoli, Ginevra Carbone, Paolo Pulcini | Scalable Stochastic Parametric Verification with Stochastic Variational
Smoothed Model Checking | null | null | null | null | cs.LG stat.ML | http://creativecommons.org/licenses/by/4.0/ | Parametric verification of linear temporal properties for stochastic models
can be expressed as computing the satisfaction probability of a certain
property as a function of the parameters of the model. Smoothed model checking
(smMC) aims at inferring the satisfaction function over the entire parameter
space from a limited set of observations obtained via simulation. As
observations are costly and noisy, smMC is framed as a Bayesian inference
problem so that the estimates have an additional quantification of the
uncertainty. In smMC the authors use Gaussian Processes (GP), inferred by means
of the Expectation Propagation algorithm. This approach provides accurate
reconstructions with statistically sound quantification of the uncertainty.
However, it inherits the well-known scalability issues of GP. In this paper, we
exploit recent advances in probabilistic machine learning to push this
limitation forward, making Bayesian inference of smMC scalable to larger
datasets and enabling its application to models with high dimensional parameter
spaces. We propose Stochastic Variational Smoothed Model Checking (SV-smMC), a
solution that exploits stochastic variational inference (SVI) to approximate
the posterior distribution of the smMC problem. The strength and flexibility of
SVI make SV-smMC applicable to two alternative probabilistic models: Gaussian
Processes (GP) and Bayesian Neural Networks (BNN). The core ingredient of SVI
is a stochastic gradient-based optimization that makes inference easily
parallelizable and that enables GPU acceleration. In this paper, we compare the
performances of smMC against those of SV-smMC by looking at the scalability,
the computational efficiency and the accuracy of the reconstructed satisfaction
function.
| [
{
"version": "v1",
"created": "Wed, 11 May 2022 10:43:23 GMT"
},
{
"version": "v2",
"created": "Fri, 14 Oct 2022 12:38:45 GMT"
},
{
"version": "v3",
"created": "Thu, 6 Apr 2023 10:53:49 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Bortolussi",
"Luca",
""
],
[
"Cairoli",
"Francesca",
""
],
[
"Carbone",
"Ginevra",
""
],
[
"Pulcini",
"Paolo",
""
]
] | TITLE: Scalable Stochastic Parametric Verification with Stochastic Variational
Smoothed Model Checking
ABSTRACT: Parametric verification of linear temporal properties for stochastic models
can be expressed as computing the satisfaction probability of a certain
property as a function of the parameters of the model. Smoothed model checking
(smMC) aims at inferring the satisfaction function over the entire parameter
space from a limited set of observations obtained via simulation. As
observations are costly and noisy, smMC is framed as a Bayesian inference
problem so that the estimates have an additional quantification of the
uncertainty. In smMC the authors use Gaussian Processes (GP), inferred by means
of the Expectation Propagation algorithm. This approach provides accurate
reconstructions with statistically sound quantification of the uncertainty.
However, it inherits the well-known scalability issues of GP. In this paper, we
exploit recent advances in probabilistic machine learning to push this
limitation forward, making Bayesian inference of smMC scalable to larger
datasets and enabling its application to models with high dimensional parameter
spaces. We propose Stochastic Variational Smoothed Model Checking (SV-smMC), a
solution that exploits stochastic variational inference (SVI) to approximate
the posterior distribution of the smMC problem. The strength and flexibility of
SVI make SV-smMC applicable to two alternative probabilistic models: Gaussian
Processes (GP) and Bayesian Neural Networks (BNN). The core ingredient of SVI
is a stochastic gradient-based optimization that makes inference easily
parallelizable and that enables GPU acceleration. In this paper, we compare the
performances of smMC against those of SV-smMC by looking at the scalability,
the computational efficiency and the accuracy of the reconstructed satisfaction
function.
| no_new_dataset | 0.941331 |
2205.08076 | Jaeyoun You | Jaeyoun You, Daemin Park, Joo-yeong Song, Bongwon Suh | A Labeling Task Design for Supporting Algorithmic Needs: Facilitating
Worker Diversity and Reducing AI Bias | 45 pages, 4 figures | null | 10.1109/BigData55660.2022.10020415 | null | cs.HC | http://creativecommons.org/licenses/by/4.0/ | Studies on supervised machine learning (ML) recommend involving workers from
various backgrounds in training dataset labeling to reduce algorithmic bias.
Moreover, sophisticated tasks for categorizing objects in images are necessary
to improve ML performance, further complicating micro-tasks. This study aims to
develop a task design incorporating the fair participation of people,
regardless of their specific backgrounds or task's difficulty. By collaborating
with 75 labelers from diverse backgrounds for 3 months, we analyzed workers'
log-data and relevant narratives to identify the task's hurdles and helpers.
The findings revealed that workers' decision-making tendencies varied depending
on their backgrounds. We found that the community that positively helps workers
and the machine's feedback perceived by workers could make people easily
engaged in works. Hence, ML's bias could be expectedly mitigated. Based on
these findings, we suggest an extended human-in-the-loop approach that connects
labelers, machines, and communities rather than isolating individual workers.
| [
{
"version": "v1",
"created": "Tue, 17 May 2022 03:41:09 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"You",
"Jaeyoun",
""
],
[
"Park",
"Daemin",
""
],
[
"Song",
"Joo-yeong",
""
],
[
"Suh",
"Bongwon",
""
]
] | TITLE: A Labeling Task Design for Supporting Algorithmic Needs: Facilitating
Worker Diversity and Reducing AI Bias
ABSTRACT: Studies on supervised machine learning (ML) recommend involving workers from
various backgrounds in training dataset labeling to reduce algorithmic bias.
Moreover, sophisticated tasks for categorizing objects in images are necessary
to improve ML performance, further complicating micro-tasks. This study aims to
develop a task design incorporating the fair participation of people,
regardless of their specific backgrounds or task's difficulty. By collaborating
with 75 labelers from diverse backgrounds for 3 months, we analyzed workers'
log-data and relevant narratives to identify the task's hurdles and helpers.
The findings revealed that workers' decision-making tendencies varied depending
on their backgrounds. We found that the community that positively helps workers
and the machine's feedback perceived by workers could make people easily
engaged in works. Hence, ML's bias could be expectedly mitigated. Based on
these findings, we suggest an extended human-in-the-loop approach that connects
labelers, machines, and communities rather than isolating individual workers.
| no_new_dataset | 0.953057 |
2206.04516 | Jaemin Yoo | Jaemin Yoo, Hyunsik Jeon, Jinhong Jung, and U Kang | Accurate Node Feature Estimation with Structured Variational Graph
Autoencoder | Fixed Table 4 from the KDD 2022 version | null | null | null | cs.LG | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Given a graph with partial observations of node features, how can we estimate
the missing features accurately? Feature estimation is a crucial problem for
analyzing real-world graphs whose features are commonly missing during the data
collection process. Accurate estimation not only provides diverse information
of nodes but also supports the inference of graph neural networks that require
the full observation of node features. However, designing an effective approach
for estimating high-dimensional features is challenging, since it requires an
estimator to have large representation power, increasing the risk of
overfitting. In this work, we propose SVGA (Structured Variational Graph
Autoencoder), an accurate method for feature estimation. SVGA applies strong
regularization to the distribution of latent variables by structured
variational inference, which models the prior of variables as Gaussian Markov
random field based on the graph structure. As a result, SVGA combines the
advantages of probabilistic inference and graph neural networks, achieving
state-of-the-art performance in real datasets.
| [
{
"version": "v1",
"created": "Thu, 9 Jun 2022 14:07:45 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2023 00:55:18 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Yoo",
"Jaemin",
""
],
[
"Jeon",
"Hyunsik",
""
],
[
"Jung",
"Jinhong",
""
],
[
"Kang",
"U",
""
]
] | TITLE: Accurate Node Feature Estimation with Structured Variational Graph
Autoencoder
ABSTRACT: Given a graph with partial observations of node features, how can we estimate
the missing features accurately? Feature estimation is a crucial problem for
analyzing real-world graphs whose features are commonly missing during the data
collection process. Accurate estimation not only provides diverse information
of nodes but also supports the inference of graph neural networks that require
the full observation of node features. However, designing an effective approach
for estimating high-dimensional features is challenging, since it requires an
estimator to have large representation power, increasing the risk of
overfitting. In this work, we propose SVGA (Structured Variational Graph
Autoencoder), an accurate method for feature estimation. SVGA applies strong
regularization to the distribution of latent variables by structured
variational inference, which models the prior of variables as Gaussian Markov
random field based on the graph structure. As a result, SVGA combines the
advantages of probabilistic inference and graph neural networks, achieving
state-of-the-art performance in real datasets.
| no_new_dataset | 0.945045 |
2207.00422 | An Yan | An Yan, Zhankui He, Jiacheng Li, Tianyang Zhang, Julian McAuley | Personalized Showcases: Generating Multi-Modal Explanations for
Recommendations | Accepted to SIGIR-23, with additional dataset details. Code and data:
https://github.com/zzxslp/Gest | null | null | null | cs.IR cs.AI cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Existing explanation models generate only text for recommendations but still
struggle to produce diverse contents. In this paper, to further enrich
explanations, we propose a new task named personalized showcases, in which we
provide both textual and visual information to explain our recommendations.
Specifically, we first select a personalized image set that is the most
relevant to a user's interest toward a recommended item. Then, natural language
explanations are generated accordingly given our selected images. For this new
task, we collect a large-scale dataset from Google Local (i.e.,~maps) and
construct a high-quality subset for generating multi-modal explanations. We
propose a personalized multi-modal framework which can generate diverse and
visually-aligned explanations via contrastive learning. Experiments show that
our framework benefits from different modalities as inputs, and is able to
produce more diverse and expressive explanations compared to previous methods
on a variety of evaluation metrics.
| [
{
"version": "v1",
"created": "Thu, 30 Jun 2022 01:43:58 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2023 17:59:43 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Yan",
"An",
""
],
[
"He",
"Zhankui",
""
],
[
"Li",
"Jiacheng",
""
],
[
"Zhang",
"Tianyang",
""
],
[
"McAuley",
"Julian",
""
]
] | TITLE: Personalized Showcases: Generating Multi-Modal Explanations for
Recommendations
ABSTRACT: Existing explanation models generate only text for recommendations but still
struggle to produce diverse contents. In this paper, to further enrich
explanations, we propose a new task named personalized showcases, in which we
provide both textual and visual information to explain our recommendations.
Specifically, we first select a personalized image set that is the most
relevant to a user's interest toward a recommended item. Then, natural language
explanations are generated accordingly given our selected images. For this new
task, we collect a large-scale dataset from Google Local (i.e.,~maps) and
construct a high-quality subset for generating multi-modal explanations. We
propose a personalized multi-modal framework which can generate diverse and
visually-aligned explanations via contrastive learning. Experiments show that
our framework benefits from different modalities as inputs, and is able to
produce more diverse and expressive explanations compared to previous methods
on a variety of evaluation metrics.
| no_new_dataset | 0.926901 |
2207.07278 | Mengyin Liu | Mengyin Liu, Chao Zhu, Hongyu Gao, Weibo Gu, Hongfa Wang, Wei Liu,
Xu-cheng Yin | Boosting Multi-Modal E-commerce Attribute Value Extraction via Unified
Learning Scheme and Dynamic Range Minimization | null | null | null | null | cs.CV cs.CL cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the prosperity of e-commerce industry, various modalities, e.g., vision
and language, are utilized to describe product items. It is an enormous
challenge to understand such diversified data, especially via extracting the
attribute-value pairs in text sequences with the aid of helpful image regions.
Although a series of previous works have been dedicated to this task, there
remain seldomly investigated obstacles that hinder further improvements: 1)
Parameters from up-stream single-modal pretraining are inadequately applied,
without proper jointly fine-tuning in a down-stream multi-modal task. 2) To
select descriptive parts of images, a simple late fusion is widely applied,
regardless of priori knowledge that language-related information should be
encoded into a common linguistic embedding space by stronger encoders. 3) Due
to diversity across products, their attribute sets tend to vary greatly, but
current approaches predict with an unnecessary maximal range and lead to more
potential false positives. To address these issues, we propose in this paper a
novel approach to boost multi-modal e-commerce attribute value extraction via
unified learning scheme and dynamic range minimization: 1) Firstly, a unified
scheme is designed to jointly train a multi-modal task with pretrained
single-modal parameters. 2) Secondly, a text-guided information range
minimization method is proposed to adaptively encode descriptive parts of each
modality into an identical space with a powerful pretrained linguistic model.
3) Moreover, a prototype-guided attribute range minimization method is proposed
to first determine the proper attribute set of the current product, and then
select prototypes to guide the prediction of the chosen attributes. Experiments
on the popular multi-modal e-commerce benchmarks show that our approach
achieves superior performance over the other state-of-the-art techniques.
| [
{
"version": "v1",
"created": "Fri, 15 Jul 2022 03:58:04 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2023 15:16:59 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Liu",
"Mengyin",
""
],
[
"Zhu",
"Chao",
""
],
[
"Gao",
"Hongyu",
""
],
[
"Gu",
"Weibo",
""
],
[
"Wang",
"Hongfa",
""
],
[
"Liu",
"Wei",
""
],
[
"Yin",
"Xu-cheng",
""
]
] | TITLE: Boosting Multi-Modal E-commerce Attribute Value Extraction via Unified
Learning Scheme and Dynamic Range Minimization
ABSTRACT: With the prosperity of e-commerce industry, various modalities, e.g., vision
and language, are utilized to describe product items. It is an enormous
challenge to understand such diversified data, especially via extracting the
attribute-value pairs in text sequences with the aid of helpful image regions.
Although a series of previous works have been dedicated to this task, there
remain seldomly investigated obstacles that hinder further improvements: 1)
Parameters from up-stream single-modal pretraining are inadequately applied,
without proper jointly fine-tuning in a down-stream multi-modal task. 2) To
select descriptive parts of images, a simple late fusion is widely applied,
regardless of priori knowledge that language-related information should be
encoded into a common linguistic embedding space by stronger encoders. 3) Due
to diversity across products, their attribute sets tend to vary greatly, but
current approaches predict with an unnecessary maximal range and lead to more
potential false positives. To address these issues, we propose in this paper a
novel approach to boost multi-modal e-commerce attribute value extraction via
unified learning scheme and dynamic range minimization: 1) Firstly, a unified
scheme is designed to jointly train a multi-modal task with pretrained
single-modal parameters. 2) Secondly, a text-guided information range
minimization method is proposed to adaptively encode descriptive parts of each
modality into an identical space with a powerful pretrained linguistic model.
3) Moreover, a prototype-guided attribute range minimization method is proposed
to first determine the proper attribute set of the current product, and then
select prototypes to guide the prediction of the chosen attributes. Experiments
on the popular multi-modal e-commerce benchmarks show that our approach
achieves superior performance over the other state-of-the-art techniques.
| no_new_dataset | 0.948537 |
2207.10909 | Jinrong Yang | Jinrong Yang, Lin Song, Songtao Liu, Weixin Mao, Zeming Li, Xiaoping
Li, Hongbin Sun, Jian Sun, Nanning Zheng | DBQ-SSD: Dynamic Ball Query for Efficient 3D Object Detection | ICLR 2023. Code at https://github.com/yancie-yjr/DBQ-SSD | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many point-based 3D detectors adopt point-feature sampling strategies to drop
some points for efficient inference. These strategies are typically based on
fixed and handcrafted rules, making it difficult to handle complicated scenes.
Different from them, we propose a Dynamic Ball Query (DBQ) network to
adaptively select a subset of input points according to the input features, and
assign the feature transform with a suitable receptive field for each selected
point. It can be embedded into some state-of-the-art 3D detectors and trained
in an end-to-end manner, which significantly reduces the computational cost.
Extensive experiments demonstrate that our method can increase the inference
speed by 30%-100% on KITTI, Waymo, and ONCE datasets. Specifically, the
inference speed of our detector can reach 162 FPS on KITTI scene, and 30 FPS on
Waymo and ONCE scenes without performance degradation. Due to skipping the
redundant points, some evaluation metrics show significant improvements. Codes
will be released at https://github.com/yancie-yjr/DBQ-SSD.
| [
{
"version": "v1",
"created": "Fri, 22 Jul 2022 07:08:42 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2023 13:19:37 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Yang",
"Jinrong",
""
],
[
"Song",
"Lin",
""
],
[
"Liu",
"Songtao",
""
],
[
"Mao",
"Weixin",
""
],
[
"Li",
"Zeming",
""
],
[
"Li",
"Xiaoping",
""
],
[
"Sun",
"Hongbin",
""
],
[
"Sun",
"Jian",
""
],
[
"Zheng",
"Nanning",
""
]
] | TITLE: DBQ-SSD: Dynamic Ball Query for Efficient 3D Object Detection
ABSTRACT: Many point-based 3D detectors adopt point-feature sampling strategies to drop
some points for efficient inference. These strategies are typically based on
fixed and handcrafted rules, making it difficult to handle complicated scenes.
Different from them, we propose a Dynamic Ball Query (DBQ) network to
adaptively select a subset of input points according to the input features, and
assign the feature transform with a suitable receptive field for each selected
point. It can be embedded into some state-of-the-art 3D detectors and trained
in an end-to-end manner, which significantly reduces the computational cost.
Extensive experiments demonstrate that our method can increase the inference
speed by 30%-100% on KITTI, Waymo, and ONCE datasets. Specifically, the
inference speed of our detector can reach 162 FPS on KITTI scene, and 30 FPS on
Waymo and ONCE scenes without performance degradation. Due to skipping the
redundant points, some evaluation metrics show significant improvements. Codes
will be released at https://github.com/yancie-yjr/DBQ-SSD.
| no_new_dataset | 0.952131 |
2207.13253 | Yuntong Li | Yuntong Li, Shaowei Wang, Yingying Wang, Jin Li, Yuqiu Qian, Bangzhou
Xin, Wei Yang | Fine-grained Private Knowledge Distillation | null | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Knowledge distillation has emerged as a scalable and effective way for
privacy-preserving machine learning. One remaining drawback is that it consumes
privacy in a model-level (i.e., client-level) manner, every distillation query
incurs privacy loss of one client's all records. In order to attain
fine-grained privacy accountant and improve utility, this work proposes a
model-free reverse $k$-NN labeling method towards record-level private
knowledge distillation, where each record is employed for labeling at most $k$
queries. Theoretically, we provide bounds of labeling error rate under the
centralized/local/shuffle model of differential privacy (w.r.t. the number of
records per query, privacy budgets). Experimentally, we demonstrate that it
achieves new state-of-the-art accuracy with one order of magnitude lower of
privacy loss. Specifically, on the CIFAR-$10$ dataset, it reaches $82.1\%$ test
accuracy with centralized privacy budget $1.0$; on the MNIST/SVHN dataset, it
reaches $99.1\%$/$95.6\%$ accuracy respectively with budget $0.1$. It is the
first time deep learning with differential privacy achieve comparable accuracy
with reasonable data privacy protection (i.e., $\exp(\epsilon)\leq 1.5$). Our
code is available at https://github.com/liyuntong9/rknn.
| [
{
"version": "v1",
"created": "Wed, 27 Jul 2022 02:32:32 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2023 13:16:15 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Li",
"Yuntong",
""
],
[
"Wang",
"Shaowei",
""
],
[
"Wang",
"Yingying",
""
],
[
"Li",
"Jin",
""
],
[
"Qian",
"Yuqiu",
""
],
[
"Xin",
"Bangzhou",
""
],
[
"Yang",
"Wei",
""
]
] | TITLE: Fine-grained Private Knowledge Distillation
ABSTRACT: Knowledge distillation has emerged as a scalable and effective way for
privacy-preserving machine learning. One remaining drawback is that it consumes
privacy in a model-level (i.e., client-level) manner, every distillation query
incurs privacy loss of one client's all records. In order to attain
fine-grained privacy accountant and improve utility, this work proposes a
model-free reverse $k$-NN labeling method towards record-level private
knowledge distillation, where each record is employed for labeling at most $k$
queries. Theoretically, we provide bounds of labeling error rate under the
centralized/local/shuffle model of differential privacy (w.r.t. the number of
records per query, privacy budgets). Experimentally, we demonstrate that it
achieves new state-of-the-art accuracy with one order of magnitude lower of
privacy loss. Specifically, on the CIFAR-$10$ dataset, it reaches $82.1\%$ test
accuracy with centralized privacy budget $1.0$; on the MNIST/SVHN dataset, it
reaches $99.1\%$/$95.6\%$ accuracy respectively with budget $0.1$. It is the
first time deep learning with differential privacy achieve comparable accuracy
with reasonable data privacy protection (i.e., $\exp(\epsilon)\leq 1.5$). Our
code is available at https://github.com/liyuntong9/rknn.
| no_new_dataset | 0.944893 |
2209.06185 | Joseph DiPalma | Joseph DiPalma, Lorenzo Torresani, Saeed Hassanpour | HistoPerm: A Permutation-Based View Generation Approach for Improving
Histopathologic Feature Representation Learning | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Deep learning has been effective for histology image analysis in digital
pathology. However, many current deep learning approaches require large,
strongly- or weakly-labeled images and regions of interest, which can be
time-consuming and resource-intensive to obtain. To address this challenge, we
present HistoPerm, a view generation method for representation learning using
joint embedding architectures that enhances representation learning for
histology images. HistoPerm permutes augmented views of patches extracted from
whole-slide histology images to improve classification performance. We
evaluated the effectiveness of HistoPerm on two histology image datasets for
Celiac disease and Renal Cell Carcinoma, using three widely used joint
embedding architecture-based representation learning methods: BYOL, SimCLR, and
VICReg. Our results show that HistoPerm consistently improves patch- and
slide-level classification performance in terms of accuracy, F1-score, and AUC.
Specifically, for patch-level classification accuracy on the Celiac disease
dataset, HistoPerm boosts BYOL and VICReg by 8% and SimCLR by 3%. On the Renal
Cell Carcinoma dataset, patch-level classification accuracy is increased by 2%
for BYOL and VICReg, and by 1% for SimCLR. In addition, on the Celiac disease
dataset, models with HistoPerm outperform the fully-supervised baseline model
by 6%, 5%, and 2% for BYOL, SimCLR, and VICReg, respectively. For the Renal
Cell Carcinoma dataset, HistoPerm lowers the classification accuracy gap for
the models up to 10% relative to the fully-supervised baseline. These findings
suggest that HistoPerm can be a valuable tool for improving representation
learning of histopathology features when access to labeled data is limited and
can lead to whole-slide classification results that are comparable to or
superior to fully-supervised methods.
| [
{
"version": "v1",
"created": "Tue, 13 Sep 2022 17:35:08 GMT"
},
{
"version": "v2",
"created": "Wed, 5 Apr 2023 21:33:36 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"DiPalma",
"Joseph",
""
],
[
"Torresani",
"Lorenzo",
""
],
[
"Hassanpour",
"Saeed",
""
]
] | TITLE: HistoPerm: A Permutation-Based View Generation Approach for Improving
Histopathologic Feature Representation Learning
ABSTRACT: Deep learning has been effective for histology image analysis in digital
pathology. However, many current deep learning approaches require large,
strongly- or weakly-labeled images and regions of interest, which can be
time-consuming and resource-intensive to obtain. To address this challenge, we
present HistoPerm, a view generation method for representation learning using
joint embedding architectures that enhances representation learning for
histology images. HistoPerm permutes augmented views of patches extracted from
whole-slide histology images to improve classification performance. We
evaluated the effectiveness of HistoPerm on two histology image datasets for
Celiac disease and Renal Cell Carcinoma, using three widely used joint
embedding architecture-based representation learning methods: BYOL, SimCLR, and
VICReg. Our results show that HistoPerm consistently improves patch- and
slide-level classification performance in terms of accuracy, F1-score, and AUC.
Specifically, for patch-level classification accuracy on the Celiac disease
dataset, HistoPerm boosts BYOL and VICReg by 8% and SimCLR by 3%. On the Renal
Cell Carcinoma dataset, patch-level classification accuracy is increased by 2%
for BYOL and VICReg, and by 1% for SimCLR. In addition, on the Celiac disease
dataset, models with HistoPerm outperform the fully-supervised baseline model
by 6%, 5%, and 2% for BYOL, SimCLR, and VICReg, respectively. For the Renal
Cell Carcinoma dataset, HistoPerm lowers the classification accuracy gap for
the models up to 10% relative to the fully-supervised baseline. These findings
suggest that HistoPerm can be a valuable tool for improving representation
learning of histopathology features when access to labeled data is limited and
can lead to whole-slide classification results that are comparable to or
superior to fully-supervised methods.
| no_new_dataset | 0.951233 |
2209.07034 | Zhanpeng Shao Dr. | Zhanpeng Shao, Wen Zhou, Wuzhen Wang, Jianyu Yang, Youfu Li | A Temporal Densely Connected Recurrent Network for Event-based Human
Pose Estimation | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Event camera is an emerging bio-inspired vision sensors that report per-pixel
brightness changes asynchronously. It holds noticeable advantage of high
dynamic range, high speed response, and low power budget that enable it to best
capture local motions in uncontrolled environments. This motivates us to unlock
the potential of event cameras for human pose estimation, as the human pose
estimation with event cameras is rarely explored. Due to the novel paradigm
shift from conventional frame-based cameras, however, event signals in a time
interval contain very limited information, as event cameras can only capture
the moving body parts and ignores those static body parts, resulting in some
parts to be incomplete or even disappeared in the time interval. This paper
proposes a novel densely connected recurrent architecture to address the
problem of incomplete information. By this recurrent architecture, we can
explicitly model not only the sequential but also non-sequential geometric
consistency across time steps to accumulate information from previous frames to
recover the entire human bodies, achieving a stable and accurate human pose
estimation from event data. Moreover, to better evaluate our model, we collect
a large scale multimodal event-based dataset that comes with human pose
annotations, which is by far the most challenging one to the best of our
knowledge. The experimental results on two public datasets and our own dataset
demonstrate the effectiveness and strength of our approach. Code can be
available online for facilitating the future research.
| [
{
"version": "v1",
"created": "Thu, 15 Sep 2022 04:08:18 GMT"
},
{
"version": "v2",
"created": "Wed, 5 Apr 2023 09:36:18 GMT"
},
{
"version": "v3",
"created": "Thu, 6 Apr 2023 02:24:10 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Shao",
"Zhanpeng",
""
],
[
"Zhou",
"Wen",
""
],
[
"Wang",
"Wuzhen",
""
],
[
"Yang",
"Jianyu",
""
],
[
"Li",
"Youfu",
""
]
] | TITLE: A Temporal Densely Connected Recurrent Network for Event-based Human
Pose Estimation
ABSTRACT: Event camera is an emerging bio-inspired vision sensors that report per-pixel
brightness changes asynchronously. It holds noticeable advantage of high
dynamic range, high speed response, and low power budget that enable it to best
capture local motions in uncontrolled environments. This motivates us to unlock
the potential of event cameras for human pose estimation, as the human pose
estimation with event cameras is rarely explored. Due to the novel paradigm
shift from conventional frame-based cameras, however, event signals in a time
interval contain very limited information, as event cameras can only capture
the moving body parts and ignores those static body parts, resulting in some
parts to be incomplete or even disappeared in the time interval. This paper
proposes a novel densely connected recurrent architecture to address the
problem of incomplete information. By this recurrent architecture, we can
explicitly model not only the sequential but also non-sequential geometric
consistency across time steps to accumulate information from previous frames to
recover the entire human bodies, achieving a stable and accurate human pose
estimation from event data. Moreover, to better evaluate our model, we collect
a large scale multimodal event-based dataset that comes with human pose
annotations, which is by far the most challenging one to the best of our
knowledge. The experimental results on two public datasets and our own dataset
demonstrate the effectiveness and strength of our approach. Code can be
available online for facilitating the future research.
| new_dataset | 0.741768 |
2209.15154 | Markelle Kelly | Markelle Kelly and Padhraic Smyth | Variable-Based Calibration for Machine Learning Classifiers | null | null | null | null | cs.LG | http://creativecommons.org/licenses/by/4.0/ | The deployment of machine learning classifiers in high-stakes domains
requires well-calibrated confidence scores for model predictions. In this paper
we introduce the notion of variable-based calibration to characterize
calibration properties of a model with respect to a variable of interest,
generalizing traditional score-based metrics such as expected calibration error
(ECE). In particular, we find that models with near-perfect ECE can exhibit
significant miscalibration as a function of features of the data. We
demonstrate this phenomenon both theoretically and in practice on multiple
well-known datasets, and show that it can persist after the application of
existing calibration methods. To mitigate this issue, we propose strategies for
detection, visualization, and quantification of variable-based calibration
error. We then examine the limitations of current score-based calibration
methods and explore potential modifications. Finally, we discuss the
implications of these findings, emphasizing that an understanding of
calibration beyond simple aggregate measures is crucial for endeavors such as
fairness and model interpretability.
| [
{
"version": "v1",
"created": "Fri, 30 Sep 2022 00:49:31 GMT"
},
{
"version": "v2",
"created": "Fri, 16 Dec 2022 15:01:34 GMT"
},
{
"version": "v3",
"created": "Wed, 5 Apr 2023 21:15:41 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Kelly",
"Markelle",
""
],
[
"Smyth",
"Padhraic",
""
]
] | TITLE: Variable-Based Calibration for Machine Learning Classifiers
ABSTRACT: The deployment of machine learning classifiers in high-stakes domains
requires well-calibrated confidence scores for model predictions. In this paper
we introduce the notion of variable-based calibration to characterize
calibration properties of a model with respect to a variable of interest,
generalizing traditional score-based metrics such as expected calibration error
(ECE). In particular, we find that models with near-perfect ECE can exhibit
significant miscalibration as a function of features of the data. We
demonstrate this phenomenon both theoretically and in practice on multiple
well-known datasets, and show that it can persist after the application of
existing calibration methods. To mitigate this issue, we propose strategies for
detection, visualization, and quantification of variable-based calibration
error. We then examine the limitations of current score-based calibration
methods and explore potential modifications. Finally, we discuss the
implications of these findings, emphasizing that an understanding of
calibration beyond simple aggregate measures is crucial for endeavors such as
fairness and model interpretability.
| no_new_dataset | 0.945951 |
2210.03070 | Marta R. Costa-Juss\`a | Marta R. Costa-juss\`a, Eric Smith, Christophe Ropers, Daniel Licht,
Jean Maillard, Javier Ferrando, Carlos Escolano | Toxicity in Multilingual Machine Translation at Scale | null | null | null | null | cs.CL | http://creativecommons.org/licenses/by-sa/4.0/ | Machine Translation systems can produce different types of errors, some of
which are characterized as critical or catastrophic due to the specific
negative impact that they can have on users. In this paper we focus on one type
of critical error: added toxicity. We evaluate and analyze added toxicity when
translating a large evaluation dataset (HOLISTICBIAS, over 472k sentences,
covering 13 demographic axes) from English into 164 languages. An automatic
toxicity evaluation shows that added toxicity across languages varies from 0%
to 5%. The output languages with the most added toxicity tend to be
low-resource ones, and the demographic axes with the most added toxicity
include sexual orientation, gender and sex, and ability. We also perform human
evaluation on a subset of 8 translation directions, confirming the prevalence
of true added toxicity. We use a measurement of the amount of source
contribution to the translation, where a low source contribution implies
hallucination, to interpret what causes toxicity. Making use of the input
attributions allows us to explain toxicity, because the source contributions
significantly correlate with toxicity for 84% of languages studied. Given our
findings, our recommendations to reduce added toxicity are to curate training
data to avoid mistranslations, mitigate hallucination and check unstable
translations.
| [
{
"version": "v1",
"created": "Thu, 6 Oct 2022 17:26:27 GMT"
},
{
"version": "v2",
"created": "Wed, 5 Apr 2023 20:06:42 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Costa-jussà",
"Marta R.",
""
],
[
"Smith",
"Eric",
""
],
[
"Ropers",
"Christophe",
""
],
[
"Licht",
"Daniel",
""
],
[
"Maillard",
"Jean",
""
],
[
"Ferrando",
"Javier",
""
],
[
"Escolano",
"Carlos",
""
]
] | TITLE: Toxicity in Multilingual Machine Translation at Scale
ABSTRACT: Machine Translation systems can produce different types of errors, some of
which are characterized as critical or catastrophic due to the specific
negative impact that they can have on users. In this paper we focus on one type
of critical error: added toxicity. We evaluate and analyze added toxicity when
translating a large evaluation dataset (HOLISTICBIAS, over 472k sentences,
covering 13 demographic axes) from English into 164 languages. An automatic
toxicity evaluation shows that added toxicity across languages varies from 0%
to 5%. The output languages with the most added toxicity tend to be
low-resource ones, and the demographic axes with the most added toxicity
include sexual orientation, gender and sex, and ability. We also perform human
evaluation on a subset of 8 translation directions, confirming the prevalence
of true added toxicity. We use a measurement of the amount of source
contribution to the translation, where a low source contribution implies
hallucination, to interpret what causes toxicity. Making use of the input
attributions allows us to explain toxicity, because the source contributions
significantly correlate with toxicity for 84% of languages studied. Given our
findings, our recommendations to reduce added toxicity are to curate training
data to avoid mistranslations, mitigate hallucination and check unstable
translations.
| no_new_dataset | 0.885532 |
2210.04787 | Junhong Lin | Junhong Lin, Nanfeng Jiang, Zhentao Zhang, Weiling Chen and Tiesong
Zhao | LMQFormer: A Laplace-Prior-Guided Mask Query Transformer for Lightweight
Snow Removal | 11 pages, 13 figures | null | 10.1109/TCSVT.2023.3264824 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Snow removal aims to locate snow areas and recover clean images without
repairing traces. Unlike the regularity and semitransparency of rain, snow with
various patterns and degradations seriously occludes the background. As a
result, the state-of-the-art snow removal methods usually retains a large
parameter size. In this paper, we propose a lightweight but high-efficient snow
removal network called Laplace Mask Query Transformer (LMQFormer). Firstly, we
present a Laplace-VQVAE to generate a coarse mask as prior knowledge of snow.
Instead of using the mask in dataset, we aim at reducing both the information
entropy of snow and the computational cost of recovery. Secondly, we design a
Mask Query Transformer (MQFormer) to remove snow with the coarse mask, where we
use two parallel encoders and a hybrid decoder to learn extensive snow features
under lightweight requirements. Thirdly, we develop a Duplicated Mask Query
Attention (DMQA) that converts the coarse mask into a specific number of
queries, which constraint the attention areas of MQFormer with reduced
parameters. Experimental results in popular datasets have demonstrated the
efficiency of our proposed model, which achieves the state-of-the-art snow
removal quality with significantly reduced parameters and the lowest running
time.
| [
{
"version": "v1",
"created": "Mon, 10 Oct 2022 15:44:06 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Oct 2022 06:48:37 GMT"
},
{
"version": "v3",
"created": "Wed, 12 Oct 2022 07:45:45 GMT"
},
{
"version": "v4",
"created": "Thu, 6 Apr 2023 03:39:27 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Lin",
"Junhong",
""
],
[
"Jiang",
"Nanfeng",
""
],
[
"Zhang",
"Zhentao",
""
],
[
"Chen",
"Weiling",
""
],
[
"Zhao",
"Tiesong",
""
]
] | TITLE: LMQFormer: A Laplace-Prior-Guided Mask Query Transformer for Lightweight
Snow Removal
ABSTRACT: Snow removal aims to locate snow areas and recover clean images without
repairing traces. Unlike the regularity and semitransparency of rain, snow with
various patterns and degradations seriously occludes the background. As a
result, the state-of-the-art snow removal methods usually retains a large
parameter size. In this paper, we propose a lightweight but high-efficient snow
removal network called Laplace Mask Query Transformer (LMQFormer). Firstly, we
present a Laplace-VQVAE to generate a coarse mask as prior knowledge of snow.
Instead of using the mask in dataset, we aim at reducing both the information
entropy of snow and the computational cost of recovery. Secondly, we design a
Mask Query Transformer (MQFormer) to remove snow with the coarse mask, where we
use two parallel encoders and a hybrid decoder to learn extensive snow features
under lightweight requirements. Thirdly, we develop a Duplicated Mask Query
Attention (DMQA) that converts the coarse mask into a specific number of
queries, which constraint the attention areas of MQFormer with reduced
parameters. Experimental results in popular datasets have demonstrated the
efficiency of our proposed model, which achieves the state-of-the-art snow
removal quality with significantly reduced parameters and the lowest running
time.
| no_new_dataset | 0.946646 |
2211.02375 | Francesca Cairoli | Francesca Cairoli, Nicola Paoletti, Luca Bortolussi | Conformal Quantitative Predictive Monitoring of STL Requirements for
Stochastic Processes | null | null | null | null | eess.SY cs.LG cs.LO cs.RO cs.SY | http://creativecommons.org/licenses/by/4.0/ | We consider the problem of predictive monitoring (PM), i.e., predicting at
runtime the satisfaction of a desired property from the current system's state.
Due to its relevance for runtime safety assurance and online control, PM
methods need to be efficient to enable timely interventions against predicted
violations, while providing correctness guarantees. We introduce
\textit{quantitative predictive monitoring (QPM)}, the first PM method to
support stochastic processes and rich specifications given in Signal Temporal
Logic (STL). Unlike most of the existing PM techniques that predict whether or
not some property $\phi$ is satisfied, QPM provides a quantitative measure of
satisfaction by predicting the quantitative (aka robust) STL semantics of
$\phi$. QPM derives prediction intervals that are highly efficient to compute
and with probabilistic guarantees, in that the intervals cover with arbitrary
probability the STL robustness values relative to the stochastic evolution of
the system. To do so, we take a machine-learning approach and leverage recent
advances in conformal inference for quantile regression, thereby avoiding
expensive Monte-Carlo simulations at runtime to estimate the intervals. We also
show how our monitors can be combined in a compositional manner to handle
composite formulas, without retraining the predictors nor sacrificing the
guarantees. We demonstrate the effectiveness and scalability of QPM over a
benchmark of four discrete-time stochastic processes with varying degrees of
complexity.
| [
{
"version": "v1",
"created": "Fri, 4 Nov 2022 11:08:29 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2023 09:22:28 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Cairoli",
"Francesca",
""
],
[
"Paoletti",
"Nicola",
""
],
[
"Bortolussi",
"Luca",
""
]
] | TITLE: Conformal Quantitative Predictive Monitoring of STL Requirements for
Stochastic Processes
ABSTRACT: We consider the problem of predictive monitoring (PM), i.e., predicting at
runtime the satisfaction of a desired property from the current system's state.
Due to its relevance for runtime safety assurance and online control, PM
methods need to be efficient to enable timely interventions against predicted
violations, while providing correctness guarantees. We introduce
\textit{quantitative predictive monitoring (QPM)}, the first PM method to
support stochastic processes and rich specifications given in Signal Temporal
Logic (STL). Unlike most of the existing PM techniques that predict whether or
not some property $\phi$ is satisfied, QPM provides a quantitative measure of
satisfaction by predicting the quantitative (aka robust) STL semantics of
$\phi$. QPM derives prediction intervals that are highly efficient to compute
and with probabilistic guarantees, in that the intervals cover with arbitrary
probability the STL robustness values relative to the stochastic evolution of
the system. To do so, we take a machine-learning approach and leverage recent
advances in conformal inference for quantile regression, thereby avoiding
expensive Monte-Carlo simulations at runtime to estimate the intervals. We also
show how our monitors can be combined in a compositional manner to handle
composite formulas, without retraining the predictors nor sacrificing the
guarantees. We demonstrate the effectiveness and scalability of QPM over a
benchmark of four discrete-time stochastic processes with varying degrees of
complexity.
| no_new_dataset | 0.938801 |
2211.05992 | Debdipta Goswami | Debdipta Goswami | Delay Embedded Echo-State Network: A Predictor for Partially Observed
Systems | 7 pages, 10 figures | null | null | null | eess.SY cs.LG cs.SY | http://creativecommons.org/licenses/by-nc-sa/4.0/ | This paper considers the problem of data-driven prediction of partially
observed systems using a recurrent neural network. While neural network based
dynamic predictors perform well with full-state training data, prediction with
partial observation during training phase poses a significant challenge. Here a
predictor for partial observations is developed using an echo-state network
(ESN) and time delay embedding of the partially observed state. The proposed
method is theoretically justified with Taken's embedding theorem and strong
observability of a nonlinear system. The efficacy of the proposed method is
demonstrated on three systems: two synthetic datasets from chaotic dynamical
systems and a set of real-time traffic data.
| [
{
"version": "v1",
"created": "Fri, 11 Nov 2022 04:13:55 GMT"
},
{
"version": "v2",
"created": "Wed, 5 Apr 2023 22:40:17 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Goswami",
"Debdipta",
""
]
] | TITLE: Delay Embedded Echo-State Network: A Predictor for Partially Observed
Systems
ABSTRACT: This paper considers the problem of data-driven prediction of partially
observed systems using a recurrent neural network. While neural network based
dynamic predictors perform well with full-state training data, prediction with
partial observation during training phase poses a significant challenge. Here a
predictor for partial observations is developed using an echo-state network
(ESN) and time delay embedding of the partially observed state. The proposed
method is theoretically justified with Taken's embedding theorem and strong
observability of a nonlinear system. The efficacy of the proposed method is
demonstrated on three systems: two synthetic datasets from chaotic dynamical
systems and a set of real-time traffic data.
| no_new_dataset | 0.946498 |
2211.09324 | Jeongwhan Choi | Jeongwhan Choi, Seoyoung Hong, Noseong Park, Sung-Bae Cho | Blurring-Sharpening Process Models for Collaborative Filtering | Accepted by SIGIR 2023 | null | null | null | cs.IR cs.LG | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Collaborative filtering is one of the most fundamental topics for recommender
systems. Various methods have been proposed for collaborative filtering,
ranging from matrix factorization to graph convolutional methods. Being
inspired by recent successes of graph filtering-based methods and score-based
generative models (SGMs), we present a novel concept of blurring-sharpening
process model (BSPM). SGMs and BSPMs share the same processing philosophy that
new information can be discovered (e.g., new images are generated in the case
of SGMs) while original information is first perturbed and then recovered to
its original form. However, SGMs and our BSPMs deal with different types of
information, and their optimal perturbation and recovery processes have
fundamental discrepancies. Therefore, our BSPMs have different forms from SGMs.
In addition, our concept not only theoretically subsumes many existing
collaborative filtering models but also outperforms them in terms of Recall and
NDCG in the three benchmark datasets, Gowalla, Yelp2018, and Amazon-book. In
addition, the processing time of our method is comparable to other fast
baselines. Our proposed concept has much potential in the future to be enhanced
by designing better blurring (i.e., perturbation) and sharpening (i.e.,
recovery) processes than what we use in this paper.
| [
{
"version": "v1",
"created": "Thu, 17 Nov 2022 03:59:54 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2023 13:57:54 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Choi",
"Jeongwhan",
""
],
[
"Hong",
"Seoyoung",
""
],
[
"Park",
"Noseong",
""
],
[
"Cho",
"Sung-Bae",
""
]
] | TITLE: Blurring-Sharpening Process Models for Collaborative Filtering
ABSTRACT: Collaborative filtering is one of the most fundamental topics for recommender
systems. Various methods have been proposed for collaborative filtering,
ranging from matrix factorization to graph convolutional methods. Being
inspired by recent successes of graph filtering-based methods and score-based
generative models (SGMs), we present a novel concept of blurring-sharpening
process model (BSPM). SGMs and BSPMs share the same processing philosophy that
new information can be discovered (e.g., new images are generated in the case
of SGMs) while original information is first perturbed and then recovered to
its original form. However, SGMs and our BSPMs deal with different types of
information, and their optimal perturbation and recovery processes have
fundamental discrepancies. Therefore, our BSPMs have different forms from SGMs.
In addition, our concept not only theoretically subsumes many existing
collaborative filtering models but also outperforms them in terms of Recall and
NDCG in the three benchmark datasets, Gowalla, Yelp2018, and Amazon-book. In
addition, the processing time of our method is comparable to other fast
baselines. Our proposed concept has much potential in the future to be enhanced
by designing better blurring (i.e., perturbation) and sharpening (i.e.,
recovery) processes than what we use in this paper.
| no_new_dataset | 0.94545 |
2211.10528 | Mengmeng Xu | Mengmeng Xu, Yanghao Li, Cheng-Yang Fu, Bernard Ghanem, Tao Xiang,
Juan-Manuel Perez-Rua | Where is my Wallet? Modeling Object Proposal Sets for Egocentric Visual
Query Localization | We ranked first and second in the VQ2D and VQ3D tasks in the 2nd
Ego4D challenge | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper deals with the problem of localizing objects in image and video
datasets from visual exemplars. In particular, we focus on the challenging
problem of egocentric visual query localization. We first identify grave
implicit biases in current query-conditioned model design and visual query
datasets. Then, we directly tackle such biases at both frame and object set
levels. Concretely, our method solves these issues by expanding limited
annotations and dynamically dropping object proposals during training.
Additionally, we propose a novel transformer-based module that allows for
object-proposal set context to be considered while incorporating query
information. We name our module Conditioned Contextual Transformer or
CocoFormer. Our experiments show the proposed adaptations improve egocentric
query detection, leading to a better visual query localization system in both
2D and 3D configurations. Thus, we are able to improve frame-level detection
performance from 26.28% to 31.26 in AP, which correspondingly improves the VQ2D
and VQ3D localization scores by significant margins. Our improved context-aware
query object detector ranked first and second in the VQ2D and VQ3D tasks in the
2nd Ego4D challenge. In addition to this, we showcase the relevance of our
proposed model in the Few-Shot Detection (FSD) task, where we also achieve SOTA
results. Our code is available at
https://github.com/facebookresearch/vq2d_cvpr.
| [
{
"version": "v1",
"created": "Fri, 18 Nov 2022 22:50:50 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2023 09:21:18 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Xu",
"Mengmeng",
""
],
[
"Li",
"Yanghao",
""
],
[
"Fu",
"Cheng-Yang",
""
],
[
"Ghanem",
"Bernard",
""
],
[
"Xiang",
"Tao",
""
],
[
"Perez-Rua",
"Juan-Manuel",
""
]
] | TITLE: Where is my Wallet? Modeling Object Proposal Sets for Egocentric Visual
Query Localization
ABSTRACT: This paper deals with the problem of localizing objects in image and video
datasets from visual exemplars. In particular, we focus on the challenging
problem of egocentric visual query localization. We first identify grave
implicit biases in current query-conditioned model design and visual query
datasets. Then, we directly tackle such biases at both frame and object set
levels. Concretely, our method solves these issues by expanding limited
annotations and dynamically dropping object proposals during training.
Additionally, we propose a novel transformer-based module that allows for
object-proposal set context to be considered while incorporating query
information. We name our module Conditioned Contextual Transformer or
CocoFormer. Our experiments show the proposed adaptations improve egocentric
query detection, leading to a better visual query localization system in both
2D and 3D configurations. Thus, we are able to improve frame-level detection
performance from 26.28% to 31.26 in AP, which correspondingly improves the VQ2D
and VQ3D localization scores by significant margins. Our improved context-aware
query object detector ranked first and second in the VQ2D and VQ3D tasks in the
2nd Ego4D challenge. In addition to this, we showcase the relevance of our
proposed model in the Few-Shot Detection (FSD) task, where we also achieve SOTA
results. Our code is available at
https://github.com/facebookresearch/vq2d_cvpr.
| no_new_dataset | 0.944177 |
2211.13222 | Zhen Xing | Zhen Xing and Qi Dai and Han Hu and Jingjing Chen and Zuxuan Wu and
Yu-Gang Jiang | SVFormer: Semi-supervised Video Transformer for Action Recognition | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Semi-supervised action recognition is a challenging but critical task due to
the high cost of video annotations. Existing approaches mainly use
convolutional neural networks, yet current revolutionary vision transformer
models have been less explored. In this paper, we investigate the use of
transformer models under the SSL setting for action recognition. To this end,
we introduce SVFormer, which adopts a steady pseudo-labeling framework (ie,
EMA-Teacher) to cope with unlabeled video samples. While a wide range of data
augmentations have been shown effective for semi-supervised image
classification, they generally produce limited results for video recognition.
We therefore introduce a novel augmentation strategy, Tube TokenMix, tailored
for video data where video clips are mixed via a mask with consistent masked
tokens over the temporal axis. In addition, we propose a temporal warping
augmentation to cover the complex temporal variation in videos, which stretches
selected frames to various temporal durations in the clip. Extensive
experiments on three datasets Kinetics-400, UCF-101, and HMDB-51 verify the
advantage of SVFormer. In particular, SVFormer outperforms the state-of-the-art
by 31.5% with fewer training epochs under the 1% labeling rate of Kinetics-400.
Our method can hopefully serve as a strong benchmark and encourage future
search on semi-supervised action recognition with Transformer networks.
| [
{
"version": "v1",
"created": "Wed, 23 Nov 2022 18:58:42 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2023 12:48:30 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Xing",
"Zhen",
""
],
[
"Dai",
"Qi",
""
],
[
"Hu",
"Han",
""
],
[
"Chen",
"Jingjing",
""
],
[
"Wu",
"Zuxuan",
""
],
[
"Jiang",
"Yu-Gang",
""
]
] | TITLE: SVFormer: Semi-supervised Video Transformer for Action Recognition
ABSTRACT: Semi-supervised action recognition is a challenging but critical task due to
the high cost of video annotations. Existing approaches mainly use
convolutional neural networks, yet current revolutionary vision transformer
models have been less explored. In this paper, we investigate the use of
transformer models under the SSL setting for action recognition. To this end,
we introduce SVFormer, which adopts a steady pseudo-labeling framework (ie,
EMA-Teacher) to cope with unlabeled video samples. While a wide range of data
augmentations have been shown effective for semi-supervised image
classification, they generally produce limited results for video recognition.
We therefore introduce a novel augmentation strategy, Tube TokenMix, tailored
for video data where video clips are mixed via a mask with consistent masked
tokens over the temporal axis. In addition, we propose a temporal warping
augmentation to cover the complex temporal variation in videos, which stretches
selected frames to various temporal durations in the clip. Extensive
experiments on three datasets Kinetics-400, UCF-101, and HMDB-51 verify the
advantage of SVFormer. In particular, SVFormer outperforms the state-of-the-art
by 31.5% with fewer training epochs under the 1% labeling rate of Kinetics-400.
Our method can hopefully serve as a strong benchmark and encourage future
search on semi-supervised action recognition with Transformer networks.
| no_new_dataset | 0.942981 |
2211.15654 | Songyou Peng | Songyou Peng, Kyle Genova, Chiyu "Max" Jiang, Andrea Tagliasacchi,
Marc Pollefeys, Thomas Funkhouser | OpenScene: 3D Scene Understanding with Open Vocabularies | CVPR 2023. Project page: https://pengsongyou.github.io/openscene | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Traditional 3D scene understanding approaches rely on labeled 3D datasets to
train a model for a single task with supervision. We propose OpenScene, an
alternative approach where a model predicts dense features for 3D scene points
that are co-embedded with text and image pixels in CLIP feature space. This
zero-shot approach enables task-agnostic training and open-vocabulary queries.
For example, to perform SOTA zero-shot 3D semantic segmentation it first infers
CLIP features for every 3D point and later classifies them based on
similarities to embeddings of arbitrary class labels. More interestingly, it
enables a suite of open-vocabulary scene understanding applications that have
never been done before. For example, it allows a user to enter an arbitrary
text query and then see a heat map indicating which parts of a scene match. Our
approach is effective at identifying objects, materials, affordances,
activities, and room types in complex 3D scenes, all using a single model
trained without any labeled 3D data.
| [
{
"version": "v1",
"created": "Mon, 28 Nov 2022 18:58:36 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2023 15:35:13 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Peng",
"Songyou",
""
],
[
"Genova",
"Kyle",
""
],
[
"Jiang",
"Chiyu \"Max\"",
""
],
[
"Tagliasacchi",
"Andrea",
""
],
[
"Pollefeys",
"Marc",
""
],
[
"Funkhouser",
"Thomas",
""
]
] | TITLE: OpenScene: 3D Scene Understanding with Open Vocabularies
ABSTRACT: Traditional 3D scene understanding approaches rely on labeled 3D datasets to
train a model for a single task with supervision. We propose OpenScene, an
alternative approach where a model predicts dense features for 3D scene points
that are co-embedded with text and image pixels in CLIP feature space. This
zero-shot approach enables task-agnostic training and open-vocabulary queries.
For example, to perform SOTA zero-shot 3D semantic segmentation it first infers
CLIP features for every 3D point and later classifies them based on
similarities to embeddings of arbitrary class labels. More interestingly, it
enables a suite of open-vocabulary scene understanding applications that have
never been done before. For example, it allows a user to enter an arbitrary
text query and then see a heat map indicating which parts of a scene match. Our
approach is effective at identifying objects, materials, affordances,
activities, and room types in complex 3D scenes, all using a single model
trained without any labeled 3D data.
| no_new_dataset | 0.95222 |
2212.14310 | Yan Wang | Duowen Chen, Yunhao Bai, Wei Shen, Qingli Li, Lequan Yu, Yan Wang | MagicNet: Semi-Supervised Multi-Organ Segmentation via Magic-Cube
Partition and Recovery | Accepted by CVPR 2023 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a novel teacher-student model for semi-supervised multi-organ
segmentation. In teacher-student model, data augmentation is usually adopted on
unlabeled data to regularize the consistent training between teacher and
student. We start from a key perspective that fixed relative locations and
variable sizes of different organs can provide distribution information where a
multi-organ CT scan is drawn. Thus, we treat the prior anatomy as a strong tool
to guide the data augmentation and reduce the mismatch between labeled and
unlabeled images for semi-supervised learning. More specifically, we propose a
data augmentation strategy based on partition-and-recovery N$^3$ cubes cross-
and within- labeled and unlabeled images. Our strategy encourages unlabeled
images to learn organ semantics in relative locations from the labeled images
(cross-branch) and enhances the learning ability for small organs
(within-branch). For within-branch, we further propose to refine the quality of
pseudo labels by blending the learned representations from small cubes to
incorporate local attributes. Our method is termed as MagicNet, since it treats
the CT volume as a magic-cube and N$^3$-cube partition-and-recovery process
matches with the rule of playing a magic-cube. Extensive experiments on two
public CT multi-organ datasets demonstrate the effectiveness of MagicNet, and
noticeably outperforms state-of-the-art semi-supervised medical image
segmentation approaches, with +7% DSC improvement on MACT dataset with 10%
labeled images. Code is available at
https://github.com/DeepMed-Lab-ECNU/MagicNet.
| [
{
"version": "v1",
"created": "Thu, 29 Dec 2022 13:59:38 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2023 06:16:07 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Chen",
"Duowen",
""
],
[
"Bai",
"Yunhao",
""
],
[
"Shen",
"Wei",
""
],
[
"Li",
"Qingli",
""
],
[
"Yu",
"Lequan",
""
],
[
"Wang",
"Yan",
""
]
] | TITLE: MagicNet: Semi-Supervised Multi-Organ Segmentation via Magic-Cube
Partition and Recovery
ABSTRACT: We propose a novel teacher-student model for semi-supervised multi-organ
segmentation. In teacher-student model, data augmentation is usually adopted on
unlabeled data to regularize the consistent training between teacher and
student. We start from a key perspective that fixed relative locations and
variable sizes of different organs can provide distribution information where a
multi-organ CT scan is drawn. Thus, we treat the prior anatomy as a strong tool
to guide the data augmentation and reduce the mismatch between labeled and
unlabeled images for semi-supervised learning. More specifically, we propose a
data augmentation strategy based on partition-and-recovery N$^3$ cubes cross-
and within- labeled and unlabeled images. Our strategy encourages unlabeled
images to learn organ semantics in relative locations from the labeled images
(cross-branch) and enhances the learning ability for small organs
(within-branch). For within-branch, we further propose to refine the quality of
pseudo labels by blending the learned representations from small cubes to
incorporate local attributes. Our method is termed as MagicNet, since it treats
the CT volume as a magic-cube and N$^3$-cube partition-and-recovery process
matches with the rule of playing a magic-cube. Extensive experiments on two
public CT multi-organ datasets demonstrate the effectiveness of MagicNet, and
noticeably outperforms state-of-the-art semi-supervised medical image
segmentation approaches, with +7% DSC improvement on MACT dataset with 10%
labeled images. Code is available at
https://github.com/DeepMed-Lab-ECNU/MagicNet.
| no_new_dataset | 0.951953 |
2301.00508 | Fred Buhl | Fred W. Buhl | EmoGator: A New Open Source Vocal Burst Dataset with Baseline Machine
Learning Classification Methodologies | 12 pages, 4 tables, 2 figures | null | null | null | cs.SD cs.LG eess.AS | http://creativecommons.org/licenses/by/4.0/ | Vocal Bursts -- short, non-speech vocalizations that convey emotions, such as
laughter, cries, sighs, moans, and groans -- are an often-overlooked aspect of
speech emotion recognition, but an important aspect of human vocal
communication. One barrier to study of these interesting vocalizations is a
lack of large datasets. I am pleased to introduce the EmoGator dataset, which
consists of 32,130 samples from 357 speakers, 16.9654 hours of audio; each
sample classified into one of 30 distinct emotion categories by the speaker.
Several different approaches to construct classifiers to identify emotion
categories will be discussed, and directions for future research will be
suggested. Data set is available for download from
https://github.com/fredbuhl/EmoGator.
| [
{
"version": "v1",
"created": "Mon, 2 Jan 2023 03:02:10 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2023 15:25:44 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Buhl",
"Fred W.",
""
]
] | TITLE: EmoGator: A New Open Source Vocal Burst Dataset with Baseline Machine
Learning Classification Methodologies
ABSTRACT: Vocal Bursts -- short, non-speech vocalizations that convey emotions, such as
laughter, cries, sighs, moans, and groans -- are an often-overlooked aspect of
speech emotion recognition, but an important aspect of human vocal
communication. One barrier to study of these interesting vocalizations is a
lack of large datasets. I am pleased to introduce the EmoGator dataset, which
consists of 32,130 samples from 357 speakers, 16.9654 hours of audio; each
sample classified into one of 30 distinct emotion categories by the speaker.
Several different approaches to construct classifiers to identify emotion
categories will be discussed, and directions for future research will be
suggested. Data set is available for download from
https://github.com/fredbuhl/EmoGator.
| new_dataset | 0.959078 |
2301.04926 | Runnan Chen Dr. | Runnan Chen, Youquan Liu, Lingdong Kong, Xinge Zhu, Yuexin Ma, Yikang
Li, Yuenan Hou, Yu Qiao, Wenping Wang | CLIP2Scene: Towards Label-efficient 3D Scene Understanding by CLIP | CVPR 2023 | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Contrastive Language-Image Pre-training (CLIP) achieves promising results in
2D zero-shot and few-shot learning. Despite the impressive performance in 2D,
applying CLIP to help the learning in 3D scene understanding has yet to be
explored. In this paper, we make the first attempt to investigate how CLIP
knowledge benefits 3D scene understanding. We propose CLIP2Scene, a simple yet
effective framework that transfers CLIP knowledge from 2D image-text
pre-trained models to a 3D point cloud network. We show that the pre-trained 3D
network yields impressive performance on various downstream tasks, i.e.,
annotation-free and fine-tuning with labelled data for semantic segmentation.
Specifically, built upon CLIP, we design a Semantic-driven Cross-modal
Contrastive Learning framework that pre-trains a 3D network via semantic and
spatial-temporal consistency regularization. For the former, we first leverage
CLIP's text semantics to select the positive and negative point samples and
then employ the contrastive loss to train the 3D network. In terms of the
latter, we force the consistency between the temporally coherent point cloud
features and their corresponding image features. We conduct experiments on
SemanticKITTI, nuScenes, and ScanNet. For the first time, our pre-trained
network achieves annotation-free 3D semantic segmentation with 20.8% and 25.08%
mIoU on nuScenes and ScanNet, respectively. When fine-tuned with 1% or 100%
labelled data, our method significantly outperforms other self-supervised
methods, with improvements of 8% and 1% mIoU, respectively. Furthermore, we
demonstrate the generalizability for handling cross-domain datasets. Code is
publicly available https://github.com/runnanchen/CLIP2Scene.
| [
{
"version": "v1",
"created": "Thu, 12 Jan 2023 10:42:39 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2023 09:56:10 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Chen",
"Runnan",
""
],
[
"Liu",
"Youquan",
""
],
[
"Kong",
"Lingdong",
""
],
[
"Zhu",
"Xinge",
""
],
[
"Ma",
"Yuexin",
""
],
[
"Li",
"Yikang",
""
],
[
"Hou",
"Yuenan",
""
],
[
"Qiao",
"Yu",
""
],
[
"Wang",
"Wenping",
""
]
] | TITLE: CLIP2Scene: Towards Label-efficient 3D Scene Understanding by CLIP
ABSTRACT: Contrastive Language-Image Pre-training (CLIP) achieves promising results in
2D zero-shot and few-shot learning. Despite the impressive performance in 2D,
applying CLIP to help the learning in 3D scene understanding has yet to be
explored. In this paper, we make the first attempt to investigate how CLIP
knowledge benefits 3D scene understanding. We propose CLIP2Scene, a simple yet
effective framework that transfers CLIP knowledge from 2D image-text
pre-trained models to a 3D point cloud network. We show that the pre-trained 3D
network yields impressive performance on various downstream tasks, i.e.,
annotation-free and fine-tuning with labelled data for semantic segmentation.
Specifically, built upon CLIP, we design a Semantic-driven Cross-modal
Contrastive Learning framework that pre-trains a 3D network via semantic and
spatial-temporal consistency regularization. For the former, we first leverage
CLIP's text semantics to select the positive and negative point samples and
then employ the contrastive loss to train the 3D network. In terms of the
latter, we force the consistency between the temporally coherent point cloud
features and their corresponding image features. We conduct experiments on
SemanticKITTI, nuScenes, and ScanNet. For the first time, our pre-trained
network achieves annotation-free 3D semantic segmentation with 20.8% and 25.08%
mIoU on nuScenes and ScanNet, respectively. When fine-tuned with 1% or 100%
labelled data, our method significantly outperforms other self-supervised
methods, with improvements of 8% and 1% mIoU, respectively. Furthermore, we
demonstrate the generalizability for handling cross-domain datasets. Code is
publicly available https://github.com/runnanchen/CLIP2Scene.
| no_new_dataset | 0.951459 |
2301.08843 | Zhidi Lin | Zhid Lin, Feng Yin and Juan Maro\~nas | Towards Flexibility and Interpretability of Gaussian Process State-Space
Model | preprint | null | null | null | cs.LG eess.SP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Gaussian process state-space model (GPSSM) has garnered considerable
attention over the past decade. However, the standard GP with a preliminary
kernel, such as the squared exponential kernel or Mat\'{e}rn kernel, that is
commonly used in GPSSM studies, limits the model's representation power and
substantially restricts its applicability to complex scenarios. To address this
issue, we propose a new class of probabilistic state-space models called
TGPSSMs, which leverage a parametric normalizing flow to enrich the GP priors
in the standard GPSSM, enabling greater flexibility and expressivity.
Additionally, we present a scalable variational inference algorithm that offers
a flexible and optimal structure for the variational distribution of latent
states. The proposed algorithm is interpretable and computationally efficient
due to the sparse GP representation and the bijective nature of normalizing
flow. Moreover, we incorporate a constrained optimization framework into the
algorithm to enhance the state-space representation capabilities and optimize
the hyperparameters, leading to superior learning and inference performance.
Experimental results on synthetic and real datasets corroborate that the
proposed TGPSSM outperforms several state-of-the-art methods. The accompanying
source code is available at \url{https://github.com/zhidilin/TGPSSM}.
| [
{
"version": "v1",
"created": "Sat, 21 Jan 2023 01:26:26 GMT"
},
{
"version": "v2",
"created": "Fri, 31 Mar 2023 03:00:34 GMT"
},
{
"version": "v3",
"created": "Thu, 6 Apr 2023 15:07:11 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Lin",
"Zhid",
""
],
[
"Yin",
"Feng",
""
],
[
"Maroñas",
"Juan",
""
]
] | TITLE: Towards Flexibility and Interpretability of Gaussian Process State-Space
Model
ABSTRACT: The Gaussian process state-space model (GPSSM) has garnered considerable
attention over the past decade. However, the standard GP with a preliminary
kernel, such as the squared exponential kernel or Mat\'{e}rn kernel, that is
commonly used in GPSSM studies, limits the model's representation power and
substantially restricts its applicability to complex scenarios. To address this
issue, we propose a new class of probabilistic state-space models called
TGPSSMs, which leverage a parametric normalizing flow to enrich the GP priors
in the standard GPSSM, enabling greater flexibility and expressivity.
Additionally, we present a scalable variational inference algorithm that offers
a flexible and optimal structure for the variational distribution of latent
states. The proposed algorithm is interpretable and computationally efficient
due to the sparse GP representation and the bijective nature of normalizing
flow. Moreover, we incorporate a constrained optimization framework into the
algorithm to enhance the state-space representation capabilities and optimize
the hyperparameters, leading to superior learning and inference performance.
Experimental results on synthetic and real datasets corroborate that the
proposed TGPSSM outperforms several state-of-the-art methods. The accompanying
source code is available at \url{https://github.com/zhidilin/TGPSSM}.
| no_new_dataset | 0.945399 |
2301.11417 | Mert Kilickaya | Mert Kilickaya and Joaquin Vanschoren | Are Labels Needed for Incremental Instance Learning? | Accepted at CVPRW on CLVISION (Oral) | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | In this paper, we learn to classify visual object instances, incrementally
and via self-supervision (self-incremental). Our learner observes a single
instance at a time, which is then discarded from the dataset. Incremental
instance learning is challenging, since longer learning sessions exacerbate
forgetfulness, and labeling instances is cumbersome. We overcome these
challenges via three contributions: i. We propose VINIL, a self-incremental
learner that can learn object instances sequentially, ii. We equip VINIL with
self-supervision to by-pass the need for instance labelling, iii. We compare
VINIL to label-supervised variants on two large-scale benchmarks, and show that
VINIL significantly improves accuracy while reducing forgetfulness.
| [
{
"version": "v1",
"created": "Thu, 26 Jan 2023 21:07:12 GMT"
},
{
"version": "v2",
"created": "Thu, 2 Feb 2023 08:54:56 GMT"
},
{
"version": "v3",
"created": "Sat, 18 Feb 2023 21:27:29 GMT"
},
{
"version": "v4",
"created": "Thu, 6 Apr 2023 10:14:14 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Kilickaya",
"Mert",
""
],
[
"Vanschoren",
"Joaquin",
""
]
] | TITLE: Are Labels Needed for Incremental Instance Learning?
ABSTRACT: In this paper, we learn to classify visual object instances, incrementally
and via self-supervision (self-incremental). Our learner observes a single
instance at a time, which is then discarded from the dataset. Incremental
instance learning is challenging, since longer learning sessions exacerbate
forgetfulness, and labeling instances is cumbersome. We overcome these
challenges via three contributions: i. We propose VINIL, a self-incremental
learner that can learn object instances sequentially, ii. We equip VINIL with
self-supervision to by-pass the need for instance labelling, iii. We compare
VINIL to label-supervised variants on two large-scale benchmarks, and show that
VINIL significantly improves accuracy while reducing forgetfulness.
| no_new_dataset | 0.945551 |
2302.11328 | Deqiang Li | Deqiang Li, Shicheng Cui, Yun Li, Jia Xu, Fu Xiao and Shouhuai Xu | PAD: Towards Principled Adversarial Malware Detection Against Evasion
Attacks | Accepted by IEEE Transactions on Dependable and Secure Computing; To
appear | null | 10.1109/TDSC.2023.3265665 | null | cs.CR cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Machine Learning (ML) techniques can facilitate the automation of malicious
software (malware for short) detection, but suffer from evasion attacks. Many
studies counter such attacks in heuristic manners, lacking theoretical
guarantees and defense effectiveness. In this paper, we propose a new
adversarial training framework, termed Principled Adversarial Malware Detection
(PAD), which offers convergence guarantees for robust optimization methods. PAD
lays on a learnable convex measurement that quantifies distribution-wise
discrete perturbations to protect malware detectors from adversaries, whereby
for smooth detectors, adversarial training can be performed with theoretical
treatments. To promote defense effectiveness, we propose a new mixture of
attacks to instantiate PAD to enhance deep neural network-based measurements
and malware detectors. Experimental results on two Android malware datasets
demonstrate: (i) the proposed method significantly outperforms the
state-of-the-art defenses; (ii) it can harden ML-based malware detection
against 27 evasion attacks with detection accuracies greater than 83.45%, at
the price of suffering an accuracy decrease smaller than 2.16% in the absence
of attacks; (iii) it matches or outperforms many anti-malware scanners in
VirusTotal against realistic adversarial malware.
| [
{
"version": "v1",
"created": "Wed, 22 Feb 2023 12:24:49 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2023 07:25:14 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Li",
"Deqiang",
""
],
[
"Cui",
"Shicheng",
""
],
[
"Li",
"Yun",
""
],
[
"Xu",
"Jia",
""
],
[
"Xiao",
"Fu",
""
],
[
"Xu",
"Shouhuai",
""
]
] | TITLE: PAD: Towards Principled Adversarial Malware Detection Against Evasion
Attacks
ABSTRACT: Machine Learning (ML) techniques can facilitate the automation of malicious
software (malware for short) detection, but suffer from evasion attacks. Many
studies counter such attacks in heuristic manners, lacking theoretical
guarantees and defense effectiveness. In this paper, we propose a new
adversarial training framework, termed Principled Adversarial Malware Detection
(PAD), which offers convergence guarantees for robust optimization methods. PAD
lays on a learnable convex measurement that quantifies distribution-wise
discrete perturbations to protect malware detectors from adversaries, whereby
for smooth detectors, adversarial training can be performed with theoretical
treatments. To promote defense effectiveness, we propose a new mixture of
attacks to instantiate PAD to enhance deep neural network-based measurements
and malware detectors. Experimental results on two Android malware datasets
demonstrate: (i) the proposed method significantly outperforms the
state-of-the-art defenses; (ii) it can harden ML-based malware detection
against 27 evasion attacks with detection accuracies greater than 83.45%, at
the price of suffering an accuracy decrease smaller than 2.16% in the absence
of attacks; (iii) it matches or outperforms many anti-malware scanners in
VirusTotal against realistic adversarial malware.
| no_new_dataset | 0.945701 |
2304.00202 | Xiaojun Jia | Xiaojun Jia, Yong Zhang, Xingxing Wei, Baoyuan Wu, Ke Ma, Jue Wang,
and Xiaochun Cao | Improving Fast Adversarial Training with Prior-Guided Knowledge | null | null | null | null | cs.LG cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Fast adversarial training (FAT) is an efficient method to improve robustness.
However, the original FAT suffers from catastrophic overfitting, which
dramatically and suddenly reduces robustness after a few training epochs.
Although various FAT variants have been proposed to prevent overfitting, they
require high training costs. In this paper, we investigate the relationship
between adversarial example quality and catastrophic overfitting by comparing
the training processes of standard adversarial training and FAT. We find that
catastrophic overfitting occurs when the attack success rate of adversarial
examples becomes worse. Based on this observation, we propose a positive
prior-guided adversarial initialization to prevent overfitting by improving
adversarial example quality without extra training costs. This initialization
is generated by using high-quality adversarial perturbations from the
historical training process. We provide theoretical analysis for the proposed
initialization and propose a prior-guided regularization method that boosts the
smoothness of the loss function. Additionally, we design a prior-guided
ensemble FAT method that averages the different model weights of historical
models using different decay rates. Our proposed method, called FGSM-PGK,
assembles the prior-guided knowledge, i.e., the prior-guided initialization and
model weights, acquired during the historical training process. Evaluations of
four datasets demonstrate the superiority of the proposed method.
| [
{
"version": "v1",
"created": "Sat, 1 Apr 2023 02:18:12 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2023 01:06:55 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Jia",
"Xiaojun",
""
],
[
"Zhang",
"Yong",
""
],
[
"Wei",
"Xingxing",
""
],
[
"Wu",
"Baoyuan",
""
],
[
"Ma",
"Ke",
""
],
[
"Wang",
"Jue",
""
],
[
"Cao",
"Xiaochun",
""
]
] | TITLE: Improving Fast Adversarial Training with Prior-Guided Knowledge
ABSTRACT: Fast adversarial training (FAT) is an efficient method to improve robustness.
However, the original FAT suffers from catastrophic overfitting, which
dramatically and suddenly reduces robustness after a few training epochs.
Although various FAT variants have been proposed to prevent overfitting, they
require high training costs. In this paper, we investigate the relationship
between adversarial example quality and catastrophic overfitting by comparing
the training processes of standard adversarial training and FAT. We find that
catastrophic overfitting occurs when the attack success rate of adversarial
examples becomes worse. Based on this observation, we propose a positive
prior-guided adversarial initialization to prevent overfitting by improving
adversarial example quality without extra training costs. This initialization
is generated by using high-quality adversarial perturbations from the
historical training process. We provide theoretical analysis for the proposed
initialization and propose a prior-guided regularization method that boosts the
smoothness of the loss function. Additionally, we design a prior-guided
ensemble FAT method that averages the different model weights of historical
models using different decay rates. Our proposed method, called FGSM-PGK,
assembles the prior-guided knowledge, i.e., the prior-guided initialization and
model weights, acquired during the historical training process. Evaluations of
four datasets demonstrate the superiority of the proposed method.
| no_new_dataset | 0.945248 |
2304.00971 | Hanrong Ye | Hanrong Ye, Dan Xu | Joint 2D-3D Multi-Task Learning on Cityscapes-3D: 3D Detection,
Segmentation, and Depth Estimation | A supplementary document for "TaskPrompter: Spatial-Channel
Multi-Task Prompting for Dense Scene Understanding" accepted by ICLR 2023.
Project page:
https://github.com/prismformore/Multi-Task-Transformer/tree/main/TaskPrompter | ICLR 2023 | null | null | cs.CV cs.LG | http://creativecommons.org/licenses/by-nc-sa/4.0/ | This report serves as a supplementary document for TaskPrompter, detailing
its implementation on a new joint 2D-3D multi-task learning benchmark based on
Cityscapes-3D. TaskPrompter presents an innovative multi-task prompting
framework that unifies the learning of (i) task-generic representations, (ii)
task-specific representations, and (iii) cross-task interactions, as opposed to
previous approaches that separate these learning objectives into different
network modules. This unified approach not only reduces the need for meticulous
empirical structure design but also significantly enhances the multi-task
network's representation learning capability, as the entire model capacity is
devoted to optimizing the three objectives simultaneously. TaskPrompter
introduces a new multi-task benchmark based on Cityscapes-3D dataset, which
requires the multi-task model to concurrently generate predictions for
monocular 3D vehicle detection, semantic segmentation, and monocular depth
estimation. These tasks are essential for achieving a joint 2D-3D understanding
of visual scenes, particularly in the development of autonomous driving
systems. On this challenging benchmark, our multi-task model demonstrates
strong performance compared to single-task state-of-the-art methods and
establishes new state-of-the-art results on the challenging 3D detection and
depth estimation tasks.
| [
{
"version": "v1",
"created": "Mon, 3 Apr 2023 13:41:35 GMT"
},
{
"version": "v2",
"created": "Wed, 5 Apr 2023 13:27:21 GMT"
},
{
"version": "v3",
"created": "Thu, 6 Apr 2023 12:58:28 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Ye",
"Hanrong",
""
],
[
"Xu",
"Dan",
""
]
] | TITLE: Joint 2D-3D Multi-Task Learning on Cityscapes-3D: 3D Detection,
Segmentation, and Depth Estimation
ABSTRACT: This report serves as a supplementary document for TaskPrompter, detailing
its implementation on a new joint 2D-3D multi-task learning benchmark based on
Cityscapes-3D. TaskPrompter presents an innovative multi-task prompting
framework that unifies the learning of (i) task-generic representations, (ii)
task-specific representations, and (iii) cross-task interactions, as opposed to
previous approaches that separate these learning objectives into different
network modules. This unified approach not only reduces the need for meticulous
empirical structure design but also significantly enhances the multi-task
network's representation learning capability, as the entire model capacity is
devoted to optimizing the three objectives simultaneously. TaskPrompter
introduces a new multi-task benchmark based on Cityscapes-3D dataset, which
requires the multi-task model to concurrently generate predictions for
monocular 3D vehicle detection, semantic segmentation, and monocular depth
estimation. These tasks are essential for achieving a joint 2D-3D understanding
of visual scenes, particularly in the development of autonomous driving
systems. On this challenging benchmark, our multi-task model demonstrates
strong performance compared to single-task state-of-the-art methods and
establishes new state-of-the-art results on the challenging 3D detection and
depth estimation tasks.
| new_dataset | 0.969091 |
2304.01218 | Weichao Zhou | Yixuan Wang, Weichao Zhou, Jiameng Fan, Zhilu Wang, Jiajun Li, Xin
Chen, Chao Huang, Wenchao Li, Qi Zhu | POLAR-Express: Efficient and Precise Formal Reachability Analysis of
Neural-Network Controlled Systems | null | null | null | null | eess.SY cs.AI cs.LG cs.SY | http://creativecommons.org/licenses/by/4.0/ | Neural networks (NNs) playing the role of controllers have demonstrated
impressive empirical performances on challenging control problems. However, the
potential adoption of NN controllers in real-life applications also gives rise
to a growing concern over the safety of these neural-network controlled systems
(NNCSs), especially when used in safety-critical applications. In this work, we
present POLAR-Express, an efficient and precise formal reachability analysis
tool for verifying the safety of NNCSs. POLAR-Express uses Taylor model
arithmetic to propagate Taylor models (TMs) across a neural network
layer-by-layer to compute an overapproximation of the neural-network function.
It can be applied to analyze any feed-forward neural network with continuous
activation functions. We also present a novel approach to propagate TMs more
efficiently and precisely across ReLU activation functions. In addition,
POLAR-Express provides parallel computation support for the layer-by-layer
propagation of TMs, thus significantly improving the efficiency and scalability
over its earlier prototype POLAR. Across the comparison with six other
state-of-the-art tools on a diverse set of benchmarks, POLAR-Express achieves
the best verification efficiency and tightness in the reachable set analysis.
| [
{
"version": "v1",
"created": "Fri, 31 Mar 2023 06:51:36 GMT"
},
{
"version": "v2",
"created": "Wed, 5 Apr 2023 00:30:50 GMT"
},
{
"version": "v3",
"created": "Thu, 6 Apr 2023 02:12:41 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Wang",
"Yixuan",
""
],
[
"Zhou",
"Weichao",
""
],
[
"Fan",
"Jiameng",
""
],
[
"Wang",
"Zhilu",
""
],
[
"Li",
"Jiajun",
""
],
[
"Chen",
"Xin",
""
],
[
"Huang",
"Chao",
""
],
[
"Li",
"Wenchao",
""
],
[
"Zhu",
"Qi",
""
]
] | TITLE: POLAR-Express: Efficient and Precise Formal Reachability Analysis of
Neural-Network Controlled Systems
ABSTRACT: Neural networks (NNs) playing the role of controllers have demonstrated
impressive empirical performances on challenging control problems. However, the
potential adoption of NN controllers in real-life applications also gives rise
to a growing concern over the safety of these neural-network controlled systems
(NNCSs), especially when used in safety-critical applications. In this work, we
present POLAR-Express, an efficient and precise formal reachability analysis
tool for verifying the safety of NNCSs. POLAR-Express uses Taylor model
arithmetic to propagate Taylor models (TMs) across a neural network
layer-by-layer to compute an overapproximation of the neural-network function.
It can be applied to analyze any feed-forward neural network with continuous
activation functions. We also present a novel approach to propagate TMs more
efficiently and precisely across ReLU activation functions. In addition,
POLAR-Express provides parallel computation support for the layer-by-layer
propagation of TMs, thus significantly improving the efficiency and scalability
over its earlier prototype POLAR. Across the comparison with six other
state-of-the-art tools on a diverse set of benchmarks, POLAR-Express achieves
the best verification efficiency and tightness in the reachable set analysis.
| no_new_dataset | 0.945751 |
2304.01371 | Valerio La Gatta | Valerio La Gatta, Luca Luceri, Francesco Fabbri, Emilio Ferrara | The Interconnected Nature of Online Harm and Moderation: Investigating
the Cross-Platform Spread of Harmful Content between YouTube and Twitter | 14 pages, 8 figures | null | null | null | cs.SI | http://creativecommons.org/licenses/by-nc-nd/4.0/ | The proliferation of harmful content shared online poses a threat to online
information integrity and the integrity of discussion across platforms. Despite
various moderation interventions adopted by social media platforms, researchers
and policymakers are calling for holistic solutions. This study explores how a
target platform could leverage content that has been deemed harmful on a source
platform by investigating the behavior and characteristics of Twitter users
responsible for sharing moderated YouTube videos. Using a large-scale dataset
of 600M tweets related to the 2020 U.S. election, we find that moderated
Youtube videos are extensively shared on Twitter and that users who share these
videos also endorse extreme and conspiratorial ideologies. A fraction of these
users are eventually suspended by Twitter, but they do not appear to be
involved in state-backed information operations. The findings of this study
highlight the complex and interconnected nature of harmful cross-platform
information diffusion, raising the need for cross-platform moderation
strategies.
| [
{
"version": "v1",
"created": "Mon, 3 Apr 2023 20:56:47 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2023 09:19:11 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"La Gatta",
"Valerio",
""
],
[
"Luceri",
"Luca",
""
],
[
"Fabbri",
"Francesco",
""
],
[
"Ferrara",
"Emilio",
""
]
] | TITLE: The Interconnected Nature of Online Harm and Moderation: Investigating
the Cross-Platform Spread of Harmful Content between YouTube and Twitter
ABSTRACT: The proliferation of harmful content shared online poses a threat to online
information integrity and the integrity of discussion across platforms. Despite
various moderation interventions adopted by social media platforms, researchers
and policymakers are calling for holistic solutions. This study explores how a
target platform could leverage content that has been deemed harmful on a source
platform by investigating the behavior and characteristics of Twitter users
responsible for sharing moderated YouTube videos. Using a large-scale dataset
of 600M tweets related to the 2020 U.S. election, we find that moderated
Youtube videos are extensively shared on Twitter and that users who share these
videos also endorse extreme and conspiratorial ideologies. A fraction of these
users are eventually suspended by Twitter, but they do not appear to be
involved in state-backed information operations. The findings of this study
highlight the complex and interconnected nature of harmful cross-platform
information diffusion, raising the need for cross-platform moderation
strategies.
| no_new_dataset | 0.636042 |
2304.01507 | Wenxuan Tu | Wenxuan Tu, Qing Liao, Sihang Zhou, Xin Peng, Chuan Ma, Zhe Liu,
Xinwang Liu, Zhiping Cai | RARE: Robust Masked Graph Autoencoder | null | null | null | null | cs.LG cs.AI | http://creativecommons.org/licenses/by/4.0/ | Masked graph autoencoder (MGAE) has emerged as a promising self-supervised
graph pre-training (SGP) paradigm due to its simplicity and effectiveness.
However, existing efforts perform the mask-then-reconstruct operation in the
raw data space as is done in computer vision (CV) and natural language
processing (NLP) areas, while neglecting the important non-Euclidean property
of graph data. As a result, the highly unstable local connection structures
largely increase the uncertainty in inferring masked data and decrease the
reliability of the exploited self-supervision signals, leading to inferior
representations for downstream evaluations. To address this issue, we propose a
novel SGP method termed Robust mAsked gRaph autoEncoder (RARE) to improve the
certainty in inferring masked data and the reliability of the self-supervision
mechanism by further masking and reconstructing node samples in the high-order
latent feature space. Through both theoretical and empirical analyses, we have
discovered that performing a joint mask-then-reconstruct strategy in both
latent feature and raw data spaces could yield improved stability and
performance. To this end, we elaborately design a masked latent feature
completion scheme, which predicts latent features of masked nodes under the
guidance of high-order sample correlations that are hard to be observed from
the raw data perspective. Specifically, we first adopt a latent feature
predictor to predict the masked latent features from the visible ones. Next, we
encode the raw data of masked samples with a momentum graph encoder and
subsequently employ the resulting representations to improve predicted results
through latent feature matching. Extensive experiments on seventeen datasets
have demonstrated the effectiveness and robustness of RARE against
state-of-the-art (SOTA) competitors across three downstream tasks.
| [
{
"version": "v1",
"created": "Tue, 4 Apr 2023 03:35:29 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2023 15:37:21 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Tu",
"Wenxuan",
""
],
[
"Liao",
"Qing",
""
],
[
"Zhou",
"Sihang",
""
],
[
"Peng",
"Xin",
""
],
[
"Ma",
"Chuan",
""
],
[
"Liu",
"Zhe",
""
],
[
"Liu",
"Xinwang",
""
],
[
"Cai",
"Zhiping",
""
]
] | TITLE: RARE: Robust Masked Graph Autoencoder
ABSTRACT: Masked graph autoencoder (MGAE) has emerged as a promising self-supervised
graph pre-training (SGP) paradigm due to its simplicity and effectiveness.
However, existing efforts perform the mask-then-reconstruct operation in the
raw data space as is done in computer vision (CV) and natural language
processing (NLP) areas, while neglecting the important non-Euclidean property
of graph data. As a result, the highly unstable local connection structures
largely increase the uncertainty in inferring masked data and decrease the
reliability of the exploited self-supervision signals, leading to inferior
representations for downstream evaluations. To address this issue, we propose a
novel SGP method termed Robust mAsked gRaph autoEncoder (RARE) to improve the
certainty in inferring masked data and the reliability of the self-supervision
mechanism by further masking and reconstructing node samples in the high-order
latent feature space. Through both theoretical and empirical analyses, we have
discovered that performing a joint mask-then-reconstruct strategy in both
latent feature and raw data spaces could yield improved stability and
performance. To this end, we elaborately design a masked latent feature
completion scheme, which predicts latent features of masked nodes under the
guidance of high-order sample correlations that are hard to be observed from
the raw data perspective. Specifically, we first adopt a latent feature
predictor to predict the masked latent features from the visible ones. Next, we
encode the raw data of masked samples with a momentum graph encoder and
subsequently employ the resulting representations to improve predicted results
through latent feature matching. Extensive experiments on seventeen datasets
have demonstrated the effectiveness and robustness of RARE against
state-of-the-art (SOTA) competitors across three downstream tasks.
| no_new_dataset | 0.950365 |
2304.01554 | Ashish Sinha | Ashish Sinha, Jonghyun Choi | MEnsA: Mix-up Ensemble Average for Unsupervised Multi Target Domain
Adaptation on 3D Point Clouds | Accepted at Workshop on Learning with Limited Labelled Data (CVPR
2023) | null | null | null | cs.CV cs.AI | http://creativecommons.org/licenses/by/4.0/ | Unsupervised domain adaptation (UDA) addresses the problem of distribution
shift between the unlabelled target domain and labelled source domain. While
the single target domain adaptation (STDA) is well studied in the literature
for both 2D and 3D vision tasks, multi-target domain adaptation (MTDA) is
barely explored for 3D data despite its wide real-world applications such as
autonomous driving systems for various geographical and climatic conditions. We
establish an MTDA baseline for 3D point cloud data by proposing to mix the
feature representations from all domains together to achieve better domain
adaptation performance by an ensemble average, which we call Mixup Ensemble
Average or MEnsA. With the mixed representation, we use a domain classifier to
improve at distinguishing the feature representations of source domain from
those of target domains in a shared latent space. In empirical validations on
the challenging PointDA-10 dataset, we showcase a clear benefit of our simple
method over previous unsupervised STDA and MTDA methods by large margins (up to
17.10% and 4.76% on averaged over all domain shifts).
| [
{
"version": "v1",
"created": "Tue, 4 Apr 2023 06:13:33 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2023 00:14:29 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Sinha",
"Ashish",
""
],
[
"Choi",
"Jonghyun",
""
]
] | TITLE: MEnsA: Mix-up Ensemble Average for Unsupervised Multi Target Domain
Adaptation on 3D Point Clouds
ABSTRACT: Unsupervised domain adaptation (UDA) addresses the problem of distribution
shift between the unlabelled target domain and labelled source domain. While
the single target domain adaptation (STDA) is well studied in the literature
for both 2D and 3D vision tasks, multi-target domain adaptation (MTDA) is
barely explored for 3D data despite its wide real-world applications such as
autonomous driving systems for various geographical and climatic conditions. We
establish an MTDA baseline for 3D point cloud data by proposing to mix the
feature representations from all domains together to achieve better domain
adaptation performance by an ensemble average, which we call Mixup Ensemble
Average or MEnsA. With the mixed representation, we use a domain classifier to
improve at distinguishing the feature representations of source domain from
those of target domains in a shared latent space. In empirical validations on
the challenging PointDA-10 dataset, we showcase a clear benefit of our simple
method over previous unsupervised STDA and MTDA methods by large margins (up to
17.10% and 4.76% on averaged over all domain shifts).
| no_new_dataset | 0.950319 |
2304.02413 | Shuanghong Shen | Shuanghong Shen, Enhong Chen, Bihan Xu, Qi Liu, Zhenya Huang, Linbo
Zhu, Yu Su | Quiz-based Knowledge Tracing | 12 pages | null | null | null | cs.AI cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Knowledge tracing (KT) aims to assess individuals' evolving knowledge states
according to their learning interactions with different exercises in online
learning systems (OIS), which is critical in supporting decision-making for
subsequent intelligent services, such as personalized learning source
recommendation. Existing researchers have broadly studied KT and developed many
effective methods. However, most of them assume that students' historical
interactions are uniformly distributed in a continuous sequence, ignoring the
fact that actual interaction sequences are organized based on a series of
quizzes with clear boundaries, where interactions within a quiz are
consecutively completed, but interactions across different quizzes are discrete
and may be spaced over days. In this paper, we present the Quiz-based Knowledge
Tracing (QKT) model to monitor students' knowledge states according to their
quiz-based learning interactions. Specifically, as students' interactions
within a quiz are continuous and have the same or similar knowledge concepts,
we design the adjacent gate followed by a global average pooling layer to
capture the intra-quiz short-term knowledge influence. Then, as various quizzes
tend to focus on different knowledge concepts, we respectively measure the
inter-quiz knowledge substitution by the gated recurrent unit and the
inter-quiz knowledge complementarity by the self-attentive encoder with a novel
recency-aware attention mechanism. Finally, we integrate the inter-quiz
long-term knowledge substitution and complementarity across different quizzes
to output students' evolving knowledge states. Extensive experimental results
on three public real-world datasets demonstrate that QKT achieves
state-of-the-art performance compared to existing methods. Further analyses
confirm that QKT is promising in designing more effective quizzes.
| [
{
"version": "v1",
"created": "Wed, 5 Apr 2023 12:48:42 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2023 12:15:41 GMT"
}
] | 2023-04-07T00:00:00 | [
[
"Shen",
"Shuanghong",
""
],
[
"Chen",
"Enhong",
""
],
[
"Xu",
"Bihan",
""
],
[
"Liu",
"Qi",
""
],
[
"Huang",
"Zhenya",
""
],
[
"Zhu",
"Linbo",
""
],
[
"Su",
"Yu",
""
]
] | TITLE: Quiz-based Knowledge Tracing
ABSTRACT: Knowledge tracing (KT) aims to assess individuals' evolving knowledge states
according to their learning interactions with different exercises in online
learning systems (OIS), which is critical in supporting decision-making for
subsequent intelligent services, such as personalized learning source
recommendation. Existing researchers have broadly studied KT and developed many
effective methods. However, most of them assume that students' historical
interactions are uniformly distributed in a continuous sequence, ignoring the
fact that actual interaction sequences are organized based on a series of
quizzes with clear boundaries, where interactions within a quiz are
consecutively completed, but interactions across different quizzes are discrete
and may be spaced over days. In this paper, we present the Quiz-based Knowledge
Tracing (QKT) model to monitor students' knowledge states according to their
quiz-based learning interactions. Specifically, as students' interactions
within a quiz are continuous and have the same or similar knowledge concepts,
we design the adjacent gate followed by a global average pooling layer to
capture the intra-quiz short-term knowledge influence. Then, as various quizzes
tend to focus on different knowledge concepts, we respectively measure the
inter-quiz knowledge substitution by the gated recurrent unit and the
inter-quiz knowledge complementarity by the self-attentive encoder with a novel
recency-aware attention mechanism. Finally, we integrate the inter-quiz
long-term knowledge substitution and complementarity across different quizzes
to output students' evolving knowledge states. Extensive experimental results
on three public real-world datasets demonstrate that QKT achieves
state-of-the-art performance compared to existing methods. Further analyses
confirm that QKT is promising in designing more effective quizzes.
| no_new_dataset | 0.945399 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.