review stringlengths 5 16.6k | score stringclasses 5
values | area stringclasses 12
values | text stringlengths 31 5.65k |
|---|---|---|---|
The paper presents a method where out-of-domain (OOD) data are used to learning better representations via self-supervised learning (SSL) in a setting where we have unlabeled in-domain (ID) data that follow a long-tail distribution. The paper proposed to define an unsupervised "tailness" score, while an online sampling... | Recommendation: 8: accept, good paper | Area: Unsupervised and Self-supervised learning | Review:
The paper presents a method where out-of-domain (OOD) data are used to learning better representations via self-supervised learning (SSL) in a setting where we have unlabeled in-domain (ID) data that follow a long-tail distribution. The paper proposed to define an unsupervised "tailness" score, while an online ... |
The paper investigates neural network representations under multi-task learning based on five binary classifications tasks constructed from MNIST. The authors compare using independent, individual multi-layer perceptrons (MLPs) per task with parallel MLPs that process tasks simultaneously and with task-switching MLPs ... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
The paper investigates neural network representations under multi-task learning based on five binary classifications tasks constructed from MNIST. The authors compare using independent, individual multi-layer perceptrons (MLPs) per task with parallel MLPs that process tasks simultaneously and with task-switchi... |
The paper presents algorithms for computing approximately rationalizable correlated equilibria (CE) and coarse correlated equilibria (CCE) in general games. Although these bounds are not shown to be optimal (except of the case where strategies are rationalizable after a constant number of iterated elimination rounds) t... | Recommendation: 6: marginally above the acceptance threshold | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
The paper presents algorithms for computing approximately rationalizable correlated equilibria (CE) and coarse correlated equilibria (CCE) in general games. Although these bounds are not shown to be optimal (except of the case where strategies are rationalizable after a constant number of iterated elimination r... |
This paper proposes a new initialization method for ConvNets with residual blocks and ReLU activation, called RISOTTO. It enables training deep networks with residual structures without a normalization layer. This is achieved by maintaining a dynamical isometry at the initialization time, which is implemented as initia... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper proposes a new initialization method for ConvNets with residual blocks and ReLU activation, called RISOTTO. It enables training deep networks with residual structures without a normalization layer. This is achieved by maintaining a dynamical isometry at the initialization time, which is implemented a... |
This paper proposes a new method for the problem of distributionally robust optimization. The learning procedure ‘Bitrate-Constrained DRO’ (BR-DRO) provides robustness to distribution shifts along groups realised by simple functions. This procedure is able to match the performance of methods that use group information ... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
This paper proposes a new method for the problem of distributionally robust optimization. The learning procedure ‘Bitrate-Constrained DRO’ (BR-DRO) provides robustness to distribution shifts along groups realised by simple functions. This procedure is able to match the performance of methods that use group info... |
This paper introduces a unified information extraction (UIE) framework based on the token pair classification idea. The UIE solution allows modeling all types of IE tasks such as NER, RE and EE with just one unified model. Also the authors propose a Plusformer on top of the token-pair feature matrix for better feature ... | Recommendation: 3: reject, not good enough | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper introduces a unified information extraction (UIE) framework based on the token pair classification idea. The UIE solution allows modeling all types of IE tasks such as NER, RE and EE with just one unified model. Also the authors propose a Plusformer on top of the token-pair feature matrix for better ... |
This paper proposes a method for self-supervised learning based on adversarial sample generation. The proposed method is based on the probabilistic interpretation of PLS and/or CCA based on graphical models and does not require class labels or classifiers. It performs best among the domain-agnostic methods on tabular, ... | Recommendation: 8: accept, good paper | Area: Unsupervised and Self-supervised learning | Review:
This paper proposes a method for self-supervised learning based on adversarial sample generation. The proposed method is based on the probabilistic interpretation of PLS and/or CCA based on graphical models and does not require class labels or classifiers. It performs best among the domain-agnostic methods on t... |
The paper addresses an interesting problem for RL i.e., sample efficiency. The author proposes a Jump-Start RL (JSRL) algorithm to leverage a prior policy of any form to give a head start for exploration in RL. The proposed algorithm rolls out a pre-existing guided policy, followed by self-improving exploration policy.... | Recommendation: 6: marginally above the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
The paper addresses an interesting problem for RL i.e., sample efficiency. The author proposes a Jump-Start RL (JSRL) algorithm to leverage a prior policy of any form to give a head start for exploration in RL. The proposed algorithm rolls out a pre-existing guided policy, followed by self-improving exploration... |
This manuscript investigates the approximation error of classic deep belief networks (DBNs), in particular DBNs with two hidden layers of size m and m+1, respectively. It is demonstrated that, under both L^q-norm and Kullback-Leibler divergence, DBNs are universal approximators. Moreover, as claimed by the author, sh... | Recommendation: 6: marginally above the acceptance threshold | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
This manuscript investigates the approximation error of classic deep belief networks (DBNs), in particular DBNs with two hidden layers of size m and m+1, respectively. It is demonstrated that, under both L^q-norm and Kullback-Leibler divergence, DBNs are universal approximators. Moreover, as claimed by the au... |
MULTI-LAYERED 3D GARMENTS ANIMATION
This paper presents a novel deep learning-based 3D garments animation method. The method learns to model interactions between 1) cloth-body, 2) multiple cloth layers 3) wind and clothes. Specifically, the algorithm decomposes the clothes into connected patches and evaluates the defo... | Recommendation: 6: marginally above the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
MULTI-LAYERED 3D GARMENTS ANIMATION
This paper presents a novel deep learning-based 3D garments animation method. The method learns to model interactions between 1) cloth-body, 2) multiple cloth layers 3) wind and clothes. Specifically, the algorithm decomposes the clothes into connected patches and evaluates ... |
This paper develops an interpretable anomaly detection framework, DIAD, by combining the NodeGAM structure with the PID objective. The NodeGAM provides an interpretable mechanism, and PID can be trained for anomaly detection. Overall, the framework makes sense to me. The paper includes detailed experimental evaluation... | Recommendation: 5: marginally below the acceptance threshold | Area: Unsupervised and Self-supervised learning | Review:
This paper develops an interpretable anomaly detection framework, DIAD, by combining the NodeGAM structure with the PID objective. The NodeGAM provides an interpretable mechanism, and PID can be trained for anomaly detection. Overall, the framework makes sense to me. The paper includes detailed experimental ev... |
This work focuses on a new problem: collaboration pure exploration with multiple tasks and general reward structures. It explores both fixed-confidence and fixed-budget settings. Nearly-matching upper and lower bounds on sampling and communication complexity are derived.
Strength:
1. The paper is easy to follow and pro... | Recommendation: 8: accept, good paper | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
This work focuses on a new problem: collaboration pure exploration with multiple tasks and general reward structures. It explores both fixed-confidence and fixed-budget settings. Nearly-matching upper and lower bounds on sampling and communication complexity are derived.
Strength:
1. The paper is easy to follow... |
The paper investigates robust overfitting, an important phenomenon that occurs in the adversarial training. In contrast to previous approach, the paper does not regard the neural network as a black-box model but divide a DNN into a series of layers and investigate the effect of different network layers on robust overfi... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
The paper investigates robust overfitting, an important phenomenon that occurs in the adversarial training. In contrast to previous approach, the paper does not regard the neural network as a black-box model but divide a DNN into a series of layers and investigate the effect of different network layers on robus... |
This paper presents an extension of Diffusion Probabilistic Models using Fields to model data.
The basic idea is to model data as functions (fields) e.g. images are functions from $R^2$ to $R^3$, a map between pixel coordinates and color pixel value.
This approach is motivated by the need to unify the generative model ... | Recommendation: 6: marginally above the acceptance threshold | Area: Generative models | Review:
This paper presents an extension of Diffusion Probabilistic Models using Fields to model data.
The basic idea is to model data as functions (fields) e.g. images are functions from $R^2$ to $R^3$, a map between pixel coordinates and color pixel value.
This approach is motivated by the need to unify the generativ... |
In this work the authors propose an optimal transport framework algorithm called Entire Space Counter-Factual Regression (ESCFR). The method is interesting in itself, with the additions the authors propose (specially the PFOR) add some light on how neural representations could be better used for counterfactual estimati... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
In this work the authors propose an optimal transport framework algorithm called Entire Space Counter-Factual Regression (ESCFR). The method is interesting in itself, with the additions the authors propose (specially the PFOR) add some light on how neural representations could be better used for counterfactual ... |
The paper describes a music generation approach which aims to extend the type of conditioning variables typically used in this area of research. The authors describe this as so-called description-to-sequence learning. Inspired by recent progress in text-conditioned image generation, the authors propose to derive descri... | Recommendation: 6: marginally above the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
The paper describes a music generation approach which aims to extend the type of conditioning variables typically used in this area of research. The authors describe this as so-called description-to-sequence learning. Inspired by recent progress in text-conditioned image generation, the authors propose to deriv... |
The paper analyzes the gradient flow learning of a particular mean-field (MF) network with more than 2 layers and shows that it can learn a radial target function (and a specific data distribution) with width polynomial in the data dimension $d$. This target function was previously shown to be inapproximable by 2-layer... | Recommendation: 6: marginally above the acceptance threshold | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
The paper analyzes the gradient flow learning of a particular mean-field (MF) network with more than 2 layers and shows that it can learn a radial target function (and a specific data distribution) with width polynomial in the data dimension $d$. This target function was previously shown to be inapproximable by... |
The paper studies the effect of overparameterization under the existence of minority groups. The paper provides theoretical characterizations based on existing work, and ran experiments on the fixed point equations to show that the overparamterization does reflect recent empirical findings in this high dimensional setu... | Recommendation: 3: reject, not good enough | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
The paper studies the effect of overparameterization under the existence of minority groups. The paper provides theoretical characterizations based on existing work, and ran experiments on the fixed point equations to show that the overparamterization does reflect recent empirical findings in this high dimensio... |
This paper proposes a new method for out-of-distribution (OOD) generalization on graphs. The authors claim that the existing works mainly focus on the OOD issue of correlation shift, while another type, covariate shift, remains largely unexplored. Then, a graph augmentation strategy called AdvCA is proposed to handle t... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
This paper proposes a new method for out-of-distribution (OOD) generalization on graphs. The authors claim that the existing works mainly focus on the OOD issue of correlation shift, while another type, covariate shift, remains largely unexplored. Then, a graph augmentation strategy called AdvCA is proposed to ... |
The paper focuses on learning graph neural networks (GNN) under the federated (FL) scheme. As for FL under vertically distributed data, "each client holds a subgraph of the global graph, part of the features for nodes in this subgraph, and part of the whole model; all clients collaboratively predict node properties." T... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
The paper focuses on learning graph neural networks (GNN) under the federated (FL) scheme. As for FL under vertically distributed data, "each client holds a subgraph of the global graph, part of the features for nodes in this subgraph, and part of the whole model; all clients collaboratively predict node proper... |
This manuscript studies the instance-level label restoration in mini-batch training under the federated learning structure. The authors proposed a strong method that is capable of restoring labels via gradient inversion attack even when batch size is as large as 4096, which was usually considered a challenging task. Th... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
This manuscript studies the instance-level label restoration in mini-batch training under the federated learning structure. The authors proposed a strong method that is capable of restoring labels via gradient inversion attack even when batch size is as large as 4096, which was usually considered a challenging ... |
The paper presents a method for learning object-centric representations from single 2D images without supervision. Unlike previous work that learns by reconstructing the current frame, the proposed method learns by predicting object movement in future frames. Specifically, the model is trained from triplets of 2D image... | Recommendation: 3: reject, not good enough | Area: Unsupervised and Self-supervised learning | Review:
The paper presents a method for learning object-centric representations from single 2D images without supervision. Unlike previous work that learns by reconstructing the current frame, the proposed method learns by predicting object movement in future frames. Specifically, the model is trained from triplets of ... |
This paper considers the adversarial linear adversarial MDP and proposes the first efficient algorithm that achieves $\sqrt{K}$ bound. Moreover, they also give a lower bound. Their techniques are based on the occupancy measurements which is initially proposed by Jin et al. (2020b). Compared to previous techniques, this... | Recommendation: 6: marginally above the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper considers the adversarial linear adversarial MDP and proposes the first efficient algorithm that achieves $\sqrt{K}$ bound. Moreover, they also give a lower bound. Their techniques are based on the occupancy measurements which is initially proposed by Jin et al. (2020b). Compared to previous techniqu... |
This work proposes a 3D-aware generative model to disentangle 3D shapes, camera poses, object appearance, and background appearance when synthesizing high-quality images, which could realize non-rigid shape variation in an object category exclusively from 2D image supervision. To achieve a clear disentanglement, it pr... | Recommendation: 6: marginally above the acceptance threshold | Area: Generative models | Review:
This work proposes a 3D-aware generative model to disentangle 3D shapes, camera poses, object appearance, and background appearance when synthesizing high-quality images, which could realize non-rigid shape variation in an object category exclusively from 2D image supervision. To achieve a clear disentanglemen... |
This paper studies the learning dynamics of deep neural networks using the quadratic models. Specifically, the "catapult phase" is identified under this model when the learning rate is high, while it is not for linear models. Numerical simulations are provided to support the theoretical analysis.
Strenghths:
1. ... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper studies the learning dynamics of deep neural networks using the quadratic models. Specifically, the "catapult phase" is identified under this model when the learning rate is high, while it is not for linear models. Numerical simulations are provided to support the theoretical analysis.
Strenght... |
This paper proposes a way to make an existing dataset (MBPP), an execution-based code completion benchmark, multilingual: while the original MBPP only contained python code, the new dataset (MBXP) contains a total of 10 programming languages. Problems in function completion datasets consists of *prompt*, *test statemen... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
This paper proposes a way to make an existing dataset (MBPP), an execution-based code completion benchmark, multilingual: while the original MBPP only contained python code, the new dataset (MBXP) contains a total of 10 programming languages. Problems in function completion datasets consists of *prompt*, *test ... |
This paper introduces the method of learning interpretable trees for representing reward functions by following a previously-proposed reward tree model. The paper proposes several updates to the reward tree inference algorithm, including an NLL-based objective for estimating trajectory-level returns, a new criterion fa... | Recommendation: 3: reject, not good enough | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper introduces the method of learning interpretable trees for representing reward functions by following a previously-proposed reward tree model. The paper proposes several updates to the reward tree inference algorithm, including an NLL-based objective for estimating trajectory-level returns, a new crit... |
This paper proposes to leverage the injetced prompt token to capture the coarse class feature to benefit the visual recognition.
With the additive corase class labels the proposed approach can outperform the baseline with less than 2% additional parameters.
Strength:
1. The idea of using additive tokens to extract coa... | Recommendation: 6: marginally above the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper proposes to leverage the injetced prompt token to capture the coarse class feature to benefit the visual recognition.
With the additive corase class labels the proposed approach can outperform the baseline with less than 2% additional parameters.
Strength:
1. The idea of using additive tokens to ext... |
The paper introduces a risk-averse mean-variance equilibrium to multi-agent games, and the authors also showed the existence of such a risk-averse equilibrium. A fictitious play type of learning algorithm is proposed to solve for the equilibrium and a corresponding RL-based approximation algorithm enjoys good empirical... | Recommendation: 5: marginally below the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
The paper introduces a risk-averse mean-variance equilibrium to multi-agent games, and the authors also showed the existence of such a risk-averse equilibrium. A fictitious play type of learning algorithm is proposed to solve for the equilibrium and a corresponding RL-based approximation algorithm enjoys good e... |
The paper proposed a method for Blind Face Restoration (BFR) using pre-trained diffusion models for faces. The main novelty is a design of a transition model from a low quality image that estimates an intermediate state of the diffusion process of a high quality image. This allows the method to use a pre-trained diffus... | Recommendation: 8: accept, good paper | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
The paper proposed a method for Blind Face Restoration (BFR) using pre-trained diffusion models for faces. The main novelty is a design of a transition model from a low quality image that estimates an intermediate state of the diffusion process of a high quality image. This allows the method to use a pre-traine... |
This paper proposes an adversarial example detection mechanism for residual networks, as well as a regularization method to improve the detection performance. The detection mechanism is based upon viewing the deep network as a dynamical system. The regularization method is an existing method based on optimal transport ... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper proposes an adversarial example detection mechanism for residual networks, as well as a regularization method to improve the detection performance. The detection mechanism is based upon viewing the deep network as a dynamical system. The regularization method is an existing method based on optimal tr... |
The authors propose DyDecNet, a new network architecture for counting sounds in highly polyphonic environments. The method contains a series of T-F band-pass filters which double in each layer to provide a learnable alternative to other frequency representation methods. It then contains a backbone and regresses the fin... | Recommendation: 6: marginally above the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
The authors propose DyDecNet, a new network architecture for counting sounds in highly polyphonic environments. The method contains a series of T-F band-pass filters which double in each layer to provide a learnable alternative to other frequency representation methods. It then contains a backbone and regresses... |
The paper is a contribution to the understanding the capabilities of transformers to model languages. The first part of the paper provides results on the capabilities of (shallow) transformers to simulate computations of semiautomata at length T. The second part of the paper is an experimental study on whether learning... | Recommendation: 6: marginally above the acceptance threshold | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
The paper is a contribution to the understanding the capabilities of transformers to model languages. The first part of the paper provides results on the capabilities of (shallow) transformers to simulate computations of semiautomata at length T. The second part of the paper is an experimental study on whether ... |
The paper provides a primal-dual formulation to derive self-attention as a solution to the support vector regression problem having the primal formulation in the form of a neural network layer. The formulation allows the authors to derive various types of attention: linear, softmax, sparse, and multi-head attention usi... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
The paper provides a primal-dual formulation to derive self-attention as a solution to the support vector regression problem having the primal formulation in the form of a neural network layer. The formulation allows the authors to derive various types of attention: linear, softmax, sparse, and multi-head atten... |
The paper proposes to deal with the data heterogeneity in federated learning by local-global feature alignment and weighted combination of local classifiers. The whole model is decomposed into two parts, a feature extractor $f$ and a linear classifier $g$ built on $f$. The feature alignment is achieved by extracting fe... | Recommendation: 8: accept, good paper | Area: General Machine Learning | Review:
The paper proposes to deal with the data heterogeneity in federated learning by local-global feature alignment and weighted combination of local classifiers. The whole model is decomposed into two parts, a feature extractor $f$ and a linear classifier $g$ built on $f$. The feature alignment is achieved by extra... |
This work proposes an HPO method that learns to select the best HP from the rankings of HPs. The main insight comes from the authors that the optimal strategy for training surrogates is to preserve the ranks of the performances of HPO as an L2R problem. More specifically, the method meta-learns neural network surrogate... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This work proposes an HPO method that learns to select the best HP from the rankings of HPs. The main insight comes from the authors that the optimal strategy for training surrogates is to preserve the ranks of the performances of HPO as an L2R problem. More specifically, the method meta-learns neural network s... |
This paper builds on the PESNet model of NN-based wave functions for small polyatomic molecules [this reviewers recommends avoiding re-using names for model architectures to avoid compromising anonymity). The works proposes two innovations. One is learning a surrogate model of the VMC energies to avoid O(N^4) scaling i... | Recommendation: 5: marginally below the acceptance threshold | Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability ) | Review:
This paper builds on the PESNet model of NN-based wave functions for small polyatomic molecules [this reviewers recommends avoiding re-using names for model architectures to avoid compromising anonymity). The works proposes two innovations. One is learning a surrogate model of the VMC energies to avoid O(N^4) s... |
This paper proposes a debiasing framework using low-rank regularization and self-supervised learning techinque. Specifically, Authors find that rank regularization may force deep networks to focus on spurious attributes and the biased models with strong regularization can effectively probe out the bias-conflicting samp... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper proposes a debiasing framework using low-rank regularization and self-supervised learning techinque. Specifically, Authors find that rank regularization may force deep networks to focus on spurious attributes and the biased models with strong regularization can effectively probe out the bias-conflict... |
This paper proposes to combine the slot-based model with the gaussian mixture model (GMM) to improve the object-centric model. It explicitly represents the slot as the clustering center and uses the distance between slots to learn the mixture model. The experiments show certain improvements compared with some previous ... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
This paper proposes to combine the slot-based model with the gaussian mixture model (GMM) to improve the object-centric model. It explicitly represents the slot as the clustering center and uses the distance between slots to learn the mixture model. The experiments show certain improvements compared with some p... |
This paper proposes a new method of multiple-instance learning from high resolution images, which uses a patch selection scheme that processes available patches in mini-batches, scores them, then aggregates the top-M highest-scoring patches’ embeddings to reach a bag/image-level prediction. The proposed IPS Transformer... | Recommendation: 8: accept, good paper | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper proposes a new method of multiple-instance learning from high resolution images, which uses a patch selection scheme that processes available patches in mini-batches, scores them, then aggregates the top-M highest-scoring patches’ embeddings to reach a bag/image-level prediction. The proposed IPS Tra... |
The paper proposes a framework for general Bayesian noisy inverse problems using diffusion probabilistic models. The unknown data distribution is expressed as a posterior distribution. The updated reverse diffusion process now involves a generally intractable likelihood term. The authors propose the use of Laplace appr... | Recommendation: 6: marginally above the acceptance threshold | Area: Generative models | Review:
The paper proposes a framework for general Bayesian noisy inverse problems using diffusion probabilistic models. The unknown data distribution is expressed as a posterior distribution. The updated reverse diffusion process now involves a generally intractable likelihood term. The authors propose the use of Lapl... |
The authors present a method to perform human activity recognition using a novel multimodal temporal segment attention network leveraging a combination of RGB videos and IMU sensor (accelerometer and gyroscope) data from wearable sensors. To bring the IMU sensor data closer to the RGB data, the authors convert them to ... | Recommendation: 5: marginally below the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
The authors present a method to perform human activity recognition using a novel multimodal temporal segment attention network leveraging a combination of RGB videos and IMU sensor (accelerometer and gyroscope) data from wearable sensors. To bring the IMU sensor data closer to the RGB data, the authors convert ... |
This submission presents a data poisoning attack against continual learning. Specifically, continual learning systems that utilize generative algorithms to remember and replay data from previous tasks, are attacked in this work. The attack inserts poisoned data (containing backdoored data and flipped labels) that later... | Recommendation: 5: marginally below the acceptance threshold | Area: General Machine Learning | Review:
This submission presents a data poisoning attack against continual learning. Specifically, continual learning systems that utilize generative algorithms to remember and replay data from previous tasks, are attacked in this work. The attack inserts poisoned data (containing backdoored data and flipped labels) th... |
This work empirically showed that the geometry of SSL models can be efficiently captured by leveraging graph-based metrics. The work demonstrated that the proposed geometrical metrics are able to capture the transfer learning capability of many different SSL models. The analysis provides insights into the landscape of ... | Recommendation: 6: marginally above the acceptance threshold | Area: Unsupervised and Self-supervised learning | Review:
This work empirically showed that the geometry of SSL models can be efficiently captured by leveraging graph-based metrics. The work demonstrated that the proposed geometrical metrics are able to capture the transfer learning capability of many different SSL models. The analysis provides insights into the lands... |
This paper focuses on improving the performance of deep reinforcement learning. The authors proposed Wasserstein auto-encoded Markov Decision Processes (WAE-MDPs) for solving this problem. Experimental results show that WAE-MDPs outperform VAE-MDPs.
Strengths
The authors proposed a novel method called WAE-MDP.
The au... | Recommendation: 8: accept, good paper | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper focuses on improving the performance of deep reinforcement learning. The authors proposed Wasserstein auto-encoded Markov Decision Processes (WAE-MDPs) for solving this problem. Experimental results show that WAE-MDPs outperform VAE-MDPs.
Strengths
The authors proposed a novel method called WAE-MDP... |
This paper proposes the offset spike to measure the deviation of expected spikes and actual spikes of SNNs in ANN2SNN conversion, so as to avoid evaluating different conversion errors and then eliminating these errors. The authors find that the case of firing one more (or less) spike is the main reason for the degradat... | Recommendation: 8: accept, good paper | Area: Neuroscience and Cognitive Science (e.g., neural coding, brain-computer interfaces) | Review:
This paper proposes the offset spike to measure the deviation of expected spikes and actual spikes of SNNs in ANN2SNN conversion, so as to avoid evaluating different conversion errors and then eliminating these errors. The authors find that the case of firing one more (or less) spike is the main reason for the ... |
This paper unravelled the complex effects that dataset imbalance can have on the model bias for face identification systems.
This paper separately considered imbalance in terms of identities and images per identity in both the train set and the test set.
This paper thoroughly explored the effects of each kind of imb... | Recommendation: 5: marginally below the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
This paper unravelled the complex effects that dataset imbalance can have on the model bias for face identification systems.
This paper separately considered imbalance in terms of identities and images per identity in both the train set and the test set.
This paper thoroughly explored the effects of each kin... |
The paper studied the problem of how to take advantage of auxiliary loss functions in continuously adapting a pretrained language model. The author proposed to automatically pick auxiliary loss functions from a search space. The loss functions are reweighted during the learning process based on how they can help the do... | Recommendation: 5: marginally below the acceptance threshold | Area: Unsupervised and Self-supervised learning | Review:
The paper studied the problem of how to take advantage of auxiliary loss functions in continuously adapting a pretrained language model. The author proposed to automatically pick auxiliary loss functions from a search space. The loss functions are reweighted during the learning process based on how they can hel... |
This paper proposes a conditional VAE that uses total correlation to form their loss function. It builds off the CorEx work. They show many experimental results, some of which are promising.
Strengths:
- The overall idea seems interesting
- The results of Figure 3 and Table 1 look good
Major Weaknesses:
- It seems ... | Recommendation: 3: reject, not good enough | Area: Unsupervised and Self-supervised learning | Review:
This paper proposes a conditional VAE that uses total correlation to form their loss function. It builds off the CorEx work. They show many experimental results, some of which are promising.
Strengths:
- The overall idea seems interesting
- The results of Figure 3 and Table 1 look good
Major Weaknesses:
- I... |
This paper uses several ideas to improve on the privacy-utility trade-off of DP-SGD using public data, beyond the traditional approach of pre-training on public data:
1) use data augmentation to pre-train on augmented data (setting called "warm" in paper)
2) include public data in training data (setting "warm-aug")
3) ... | Recommendation: 5: marginally below the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
This paper uses several ideas to improve on the privacy-utility trade-off of DP-SGD using public data, beyond the traditional approach of pre-training on public data:
1) use data augmentation to pre-train on augmented data (setting called "warm" in paper)
2) include public data in training data (setting "warm-a... |
The paper proposes a new contrastive token (CT) learning objective to teach a LM to generate high probabilities for label tokens and low probabilities for negative candidates (repetitive tokens). The idea of this paper is very similar to "unlikelihood training", however, as the authors showed in section 3.3, in unlikel... | Recommendation: 3: reject, not good enough | Area: Generative models | Review:
The paper proposes a new contrastive token (CT) learning objective to teach a LM to generate high probabilities for label tokens and low probabilities for negative candidates (repetitive tokens). The idea of this paper is very similar to "unlikelihood training", however, as the authors showed in section 3.3, in... |
This paper proposes to represent neural architectures as algebraic terms and the design space (i.e. neural architecture search space) as context-free grammars (CFGs). The authors then develop a Bayesian optimization algorithm building on top of the work by Ru et al., 2021 called BANAT, that exploits the CFG representa... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
This paper proposes to represent neural architectures as algebraic terms and the design space (i.e. neural architecture search space) as context-free grammars (CFGs). The authors then develop a Bayesian optimization algorithm building on top of the work by Ru et al., 2021 called BANAT, that exploits the CFG re... |
The authors propose to learn a "control barrier critic" (CBC) on top of PACT, an autoregressive world model and policy trained through imitation learning. The CBC is loosely inspired by control barrier functions (CBFs), a scalar function of state which if can be found for a system and policy guarantees that if the poli... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
The authors propose to learn a "control barrier critic" (CBC) on top of PACT, an autoregressive world model and policy trained through imitation learning. The CBC is loosely inspired by control barrier functions (CBFs), a scalar function of state which if can be found for a system and policy guarantees that if ... |
This paper addresses the problem of designing a reinforcement learning (RL) policy that lets the agents to adapt to changes in the form of rotation and movement drifts.
The manuscript describes a novel approach which includes an state encoder and an action impact encoder. The former is a standard state encoder where a ... | Recommendation: 8: accept, good paper | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper addresses the problem of designing a reinforcement learning (RL) policy that lets the agents to adapt to changes in the form of rotation and movement drifts.
The manuscript describes a novel approach which includes an state encoder and an action impact encoder. The former is a standard state encoder ... |
This work formulates and targets the setting of distributional robust recourse action to deal with model perturbation and changes in recourse action problems. It proposes the formulation of distributional robust recourse action as a min-max problem with a Gelbrich distance as the distance metric of the uncertainty set.... | Recommendation: 6: marginally above the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
This work formulates and targets the setting of distributional robust recourse action to deal with model perturbation and changes in recourse action problems. It proposes the formulation of distributional robust recourse action as a min-max problem with a Gelbrich distance as the distance metric of the uncertai... |
This paper looks to improve on the piKL method for producing good policies for human-AI collaboration. The proposed method, piKL3, uses piKL in three ways to produce a final collaborative policy. The first part, piKL-IL, is an iterative imitation learning algorithm which takes as initial input a behavior-cloned policy ... | Recommendation: 5: marginally below the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper looks to improve on the piKL method for producing good policies for human-AI collaboration. The proposed method, piKL3, uses piKL in three ways to produce a final collaborative policy. The first part, piKL-IL, is an iterative imitation learning algorithm which takes as initial input a behavior-cloned... |
This paper proposes to learn a visual dynamics prediction model in the 3D space. The 3D point cloud representation is learned only from a few images from multiple views (with known camera pose). After that, they use instance segmentation to parse individual objects from the point cloud. Then it trains a graph-based pre... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper proposes to learn a visual dynamics prediction model in the 3D space. The 3D point cloud representation is learned only from a few images from multiple views (with known camera pose). After that, they use instance segmentation to parse individual objects from the point cloud. Then it trains a graph-b... |
This paper analyzes previously proposed contrastive learning methods for image representation learning in the context of learning sentence representations. They consider the standard InfoNCE loss and two "decoupled" contrastive losses "A&U" (Wang and Isola 2020) and "DCL" (Yeh et al 2021) whose losses contain separate ... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper analyzes previously proposed contrastive learning methods for image representation learning in the context of learning sentence representations. They consider the standard InfoNCE loss and two "decoupled" contrastive losses "A&U" (Wang and Isola 2020) and "DCL" (Yeh et al 2021) whose losses contain s... |
This paper proposes an algorithm to use tree-based algorithm for the purpose of clustering. The tree-based approach first partite the data into different chuncks hierarchically and merges smaller pieces into clusters via efficient algorithms. Compare to conventional clustering algorithms, the authors claim that the met... | Recommendation: 3: reject, not good enough | Area: Unsupervised and Self-supervised learning | Review:
This paper proposes an algorithm to use tree-based algorithm for the purpose of clustering. The tree-based approach first partite the data into different chuncks hierarchically and merges smaller pieces into clusters via efficient algorithms. Compare to conventional clustering algorithms, the authors claim that... |
The paper proposes a new module, termed Dense Correlation Fields (DCF), to model motion information at feature level within neural networks. DCF involves a short-term module (i.e., correlation between adjacent frames), a long-term module (i.e., correlation between bidirectional and consecutive frames) and a spatial pyr... | Recommendation: 3: reject, not good enough | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
The paper proposes a new module, termed Dense Correlation Fields (DCF), to model motion information at feature level within neural networks. DCF involves a short-term module (i.e., correlation between adjacent frames), a long-term module (i.e., correlation between bidirectional and consecutive frames) and a spa... |
The authors propose BlochNet, an approach to reconstructing magnetic resonance fingerprinting (MRF) data. The approach takes the input images, solves for the parameter maps through an inverse problem, and then re-encodes the parameters into multi-contrast images. The encoder is implemented using a neural network and th... | Recommendation: 3: reject, not good enough | Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability ) | Review:
The authors propose BlochNet, an approach to reconstructing magnetic resonance fingerprinting (MRF) data. The approach takes the input images, solves for the parameter maps through an inverse problem, and then re-encodes the parameters into multi-contrast images. The encoder is implemented using a neural networ... |
In this paper, the authors throw out a question about the usefulness of Perceptually Aligned Gradients (PAG) and give a positive answer by numerical evaluation.
strength:
+ it is interesting to see several attempt to design several approaches for the ground truth gradients for alignment.
weakness:
- PAG provides addi... | Recommendation: 3: reject, not good enough | Area: General Machine Learning | Review:
In this paper, the authors throw out a question about the usefulness of Perceptually Aligned Gradients (PAG) and give a positive answer by numerical evaluation.
strength:
+ it is interesting to see several attempt to design several approaches for the ground truth gradients for alignment.
weakness:
- PAG provi... |
This paper proposed a novel approach (LEAP) for modelling RL trajectories and planning with the model. Unlike GPT-2/Trajectory Transformer style of autoregressive model, it applies BERT style modelling where the actions can be masked in any position of the trajectory. With such a model, planning does not have to follow... | Recommendation: 6: marginally above the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper proposed a novel approach (LEAP) for modelling RL trajectories and planning with the model. Unlike GPT-2/Trajectory Transformer style of autoregressive model, it applies BERT style modelling where the actions can be masked in any position of the trajectory. With such a model, planning does not have t... |
This paper proposes a framework for federated learning with non-iid data. The authors tackle this problem by optimizing Gradient Signal to Noise Ratio (GSNR). They decompose local gradients calculated on the non-iid training data into the signal and noise components and then speed up the model convergence by maximizing... | Recommendation: 6: marginally above the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
This paper proposes a framework for federated learning with non-iid data. The authors tackle this problem by optimizing Gradient Signal to Noise Ratio (GSNR). They decompose local gradients calculated on the non-iid training data into the signal and noise components and then speed up the model convergence by ma... |
This paper studies fair graph representation learning via graph augmentation. Different from other literatures, this work proposed an automated augmentation methodology. Some theories on fairness and informativeness are provided, followed by experiments and ablation studies.
I like this paper. Overall I see a well writ... | Recommendation: 8: accept, good paper | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
This paper studies fair graph representation learning via graph augmentation. Different from other literatures, this work proposed an automated augmentation methodology. Some theories on fairness and informativeness are provided, followed by experiments and ablation studies.
I like this paper. Overall I see a w... |
The paper proposes a new class of interpretable models, instead of limiting model complexity (like using simple interpretable models) or limiting the feature interaction (like in GAM), the paper constrains the amount of information in the model by using Distributed Information Bottleneck IB. IB introduces a constraint ... | Recommendation: 6: marginally above the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
The paper proposes a new class of interpretable models, instead of limiting model complexity (like using simple interpretable models) or limiting the feature interaction (like in GAM), the paper constrains the amount of information in the model by using Distributed Information Bottleneck IB. IB introduces a con... |
This paper proposes a novel active learning (AL) algorithm for deep Bayesian neural networks (BNN).
Towards this goal, the paper proposes a novel acquisition function that is aimed at selecting data points that can improve the differentiation of models that belong to different equivalence classes.
By defining a decisio... | Recommendation: 8: accept, good paper | Area: General Machine Learning | Review:
This paper proposes a novel active learning (AL) algorithm for deep Bayesian neural networks (BNN).
Towards this goal, the paper proposes a novel acquisition function that is aimed at selecting data points that can improve the differentiation of models that belong to different equivalence classes.
By defining a... |
The paper studies the problem of task generalization through the use of the successor features framework. It proposes using a modular architecture with the universal successor features method (USFA; introduced in prior work). The modular architecture enforces disentanglement by conditioning each module's predictions on... | Recommendation: 8: accept, good paper | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
The paper studies the problem of task generalization through the use of the successor features framework. It proposes using a modular architecture with the universal successor features method (USFA; introduced in prior work). The modular architecture enforces disentanglement by conditioning each module's predic... |
This work designs a novel mathematical model that effectively allows the clients to aggregate distributed data with heterogeneous, and possibly overlapping features and samples.
The major concern of the reviewer is missing references and discussion with existing works on hybrid federated learning.
https://openrev... | Recommendation: 5: marginally below the acceptance threshold | Area: Optimization (eg, convex and non-convex optimization) | Review:
This work designs a novel mathematical model that effectively allows the clients to aggregate distributed data with heterogeneous, and possibly overlapping features and samples.
The major concern of the reviewer is missing references and discussion with existing works on hybrid federated learning.
https:/... |
In this paper, the authors proposed multi-scale sinusoidal embeddings for spectral library search. Then the proposed sinusoidal m/z peak embeddings are fed into a transformer to get a single embedding vector as an output, which is then fed into a feedforward neural network to predict chemical properties.
Strength: The... | Recommendation: 5: marginally below the acceptance threshold | Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability ) | Review:
In this paper, the authors proposed multi-scale sinusoidal embeddings for spectral library search. Then the proposed sinusoidal m/z peak embeddings are fed into a transformer to get a single embedding vector as an output, which is then fed into a feedforward neural network to predict chemical properties.
Stren... |
This paper gives some new insight into the multi-modal knowledge distillation community. Specifically, teacher accuracy does not necessarily indicate student performance, while modality-general features are the key in crossmodal KD. With the explanation of the modality Venn diagram, such a claim is straightforward and ... | Recommendation: 8: accept, good paper | Area: General Machine Learning | Review:
This paper gives some new insight into the multi-modal knowledge distillation community. Specifically, teacher accuracy does not necessarily indicate student performance, while modality-general features are the key in crossmodal KD. With the explanation of the modality Venn diagram, such a claim is straightforw... |
This paper tackles the robust training problem of neural networks. In usual scenarios, the adversary chooses a single data point and perturbs it to be misclassified. On the other hand, the adversary in this study chooses a subset of data points and perturbs them to be misclassified. The goal is to minimize the average ... | Recommendation: 6: marginally above the acceptance threshold | Area: General Machine Learning | Review:
This paper tackles the robust training problem of neural networks. In usual scenarios, the adversary chooses a single data point and perturbs it to be misclassified. On the other hand, the adversary in this study chooses a subset of data points and perturbs them to be misclassified. The goal is to minimize the ... |
In this paper, the authors proposed a new network architecture, called a SchemaNet, that turns an image classification problem into a graph matching problem. In particular, a SchemaNet consists of: (1) a pre-trained visual transformer backbone, that extracts image features from an input image; (2) a Feat2Graph module, ... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
In this paper, the authors proposed a new network architecture, called a SchemaNet, that turns an image classification problem into a graph matching problem. In particular, a SchemaNet consists of: (1) a pre-trained visual transformer backbone, that extracts image features from an input image; (2) a Feat2Graph ... |
The paper proposes a distributed implementation of Cross Correlation Optimization (DCCO) loss for contrastive learning, experiments shows the proposed implementation of loss function outperforms some baseline algorithms in the federated learning setting.
Strengths is the proposed method outperforms the baseline methods... | Recommendation: 5: marginally below the acceptance threshold | Area: Unsupervised and Self-supervised learning | Review:
The paper proposes a distributed implementation of Cross Correlation Optimization (DCCO) loss for contrastive learning, experiments shows the proposed implementation of loss function outperforms some baseline algorithms in the federated learning setting.
Strengths is the proposed method outperforms the baseline... |
The paper proposes a method to learn the optimal architecture via back propagation.
Strenghts:
1. Interesting Idea and compelling problem statement
Weaknesses:
1. I do not think the quality of the paper is upto ICLR standards. The writing is shabby at places with multiple typos and is difficult to follow. The way i... | Recommendation: 3: reject, not good enough | Area: Optimization (eg, convex and non-convex optimization) | Review:
The paper proposes a method to learn the optimal architecture via back propagation.
Strenghts:
1. Interesting Idea and compelling problem statement
Weaknesses:
1. I do not think the quality of the paper is upto ICLR standards. The writing is shabby at places with multiple typos and is difficult to follow. T... |
The paper proposes an alternative approach to Gossip and Random-Walk decentralized algorithms. Synchronous Gossip algorithms require agents to communicate their models to their neighbors and then wait for all of their neighbors' updates before aggregating the updates. This setup has two significant flaws. The first is ... | Recommendation: 3: reject, not good enough | Area: Optimization (eg, convex and non-convex optimization) | Review:
The paper proposes an alternative approach to Gossip and Random-Walk decentralized algorithms. Synchronous Gossip algorithms require agents to communicate their models to their neighbors and then wait for all of their neighbors' updates before aggregating the updates. This setup has two significant flaws. The f... |
This paper proposes a model disguising method. The key motivation is that: when the model architecture is obtained by the attacker, they can rebuild the weight parameters through a transfer learning attack. Then the attacker will generate adversarial examples exploiting the rebuilt model.
By smartly adding some redun... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper proposes a model disguising method. The key motivation is that: when the model architecture is obtained by the attacker, they can rebuild the weight parameters through a transfer learning attack. Then the attacker will generate adversarial examples exploiting the rebuilt model.
By smartly adding so... |
This paper uses a recent mathematical result -- about the form of Gaussian-isoperimetric partitionings of Euclidean space -- to conjecture that successfully learned GANs learn such "optimal" partitionings of the space. This is used to try to quantify the precision of such learned GANs in terms of other parameters of th... | Recommendation: 5: marginally below the acceptance threshold | Area: Generative models | Review:
This paper uses a recent mathematical result -- about the form of Gaussian-isoperimetric partitionings of Euclidean space -- to conjecture that successfully learned GANs learn such "optimal" partitionings of the space. This is used to try to quantify the precision of such learned GANs in terms of other paramete... |
The paper proposed a LLM-based method to improve accuracy in factual knowledge generation. Instead of retrieving from external resources, the proposal trains a model to recite relevant knowledge given a query and subsequently answer the query conditioned on the recitation. The proposal is empirically shown to be effect... | Recommendation: 6: marginally above the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
The paper proposed a LLM-based method to improve accuracy in factual knowledge generation. Instead of retrieving from external resources, the proposal trains a model to recite relevant knowledge given a query and subsequently answer the query conditioned on the recitation. The proposal is empirically shown to b... |
The authors propose an identification mechanism that understands which model has been tested with adversarial examples, by leveraging a random-based watermarking technique that is kept inside the malicious points.
The methodology is tested in a black-box scenario, where the attacker can only retrive the score of a targ... | Recommendation: 3: reject, not good enough | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
The authors propose an identification mechanism that understands which model has been tested with adversarial examples, by leveraging a random-based watermarking technique that is kept inside the malicious points.
The methodology is tested in a black-box scenario, where the attacker can only retrive the score o... |
The authors present a predictive coding approach to graph representation learning. The authors show that this approach yields performance that is often worse than GCN and other variants like GAT, but that robustness to structural attacks are better.
Overall, I have seen the use of predictive coding as an alternative t... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
The authors present a predictive coding approach to graph representation learning. The authors show that this approach yields performance that is often worse than GCN and other variants like GAT, but that robustness to structural attacks are better.
Overall, I have seen the use of predictive coding as an alter... |
This paper proposes to search for neural architectures whose layers have equivariance that can exploit symmetries in the data. They propose two methods—network morphisms combined with evolutionary search and mixture relaxations combined with differentiable NAS—to search the space of symmetries. The methods are evaluate... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper proposes to search for neural architectures whose layers have equivariance that can exploit symmetries in the data. They propose two methods—network morphisms combined with evolutionary search and mixture relaxations combined with differentiable NAS—to search the space of symmetries. The methods are ... |
This paper proposes the AdaWAC as an adaptive weighting algorithm
that assigns label-dense samples to supervised cross-entropy loss and label-sparse
samples to unsupervised consistency regularization.
This paper also proposes a WAC regularization that uses the consistency of encoder layer outputs as a natural reference... | Recommendation: 5: marginally below the acceptance threshold | Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability ) | Review:
This paper proposes the AdaWAC as an adaptive weighting algorithm
that assigns label-dense samples to supervised cross-entropy loss and label-sparse
samples to unsupervised consistency regularization.
This paper also proposes a WAC regularization that uses the consistency of encoder layer outputs as a natural r... |
This paper presents a variational inference method with fisher divergence as the objective function to enable very flexible implicit variational posterior. The implicit variational posterior is defined as a hierarchical model that can be viewed as an infinite mixture (i.e., the semi-implicit variational posterior). The... | Recommendation: 6: marginally above the acceptance threshold | Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes) | Review:
This paper presents a variational inference method with fisher divergence as the objective function to enable very flexible implicit variational posterior. The implicit variational posterior is defined as a hierarchical model that can be viewed as an infinite mixture (i.e., the semi-implicit variational posteri... |
The paper "From t-SNE to UMAP with contrastive learning" presents a new insight into the connection of two contrastive learning methods: noise contrastive estimation (NCE) and negative sampling (NEG). This insight allows to connect t-SNE and UMAP, and span a spectrum of methods along their connection. Finally, connecti... | Recommendation: 8: accept, good paper | Area: Unsupervised and Self-supervised learning | Review:
The paper "From t-SNE to UMAP with contrastive learning" presents a new insight into the connection of two contrastive learning methods: noise contrastive estimation (NCE) and negative sampling (NEG). This insight allows to connect t-SNE and UMAP, and span a spectrum of methods along their connection. Finally, ... |
This paper proposes a new layer named Gated State Space (GSS) that combines the gate design in Gated Attention Unit (GAU) with a simplified version of Diagonal State Space (DSS) layer. Authors further propose a hybrid model that combines GSS with sparingly interleaved Transformer blocks. The resulted model trains signi... | Recommendation: 6: marginally above the acceptance threshold | Area: Generative models | Review:
This paper proposes a new layer named Gated State Space (GSS) that combines the gate design in Gated Attention Unit (GAU) with a simplified version of Diagonal State Space (DSS) layer. Authors further propose a hybrid model that combines GSS with sparingly interleaved Transformer blocks. The resulted model trai... |
1. The paper attempts to introduce domain generalization to solve query-based video segmentation.
2. The paper proposes QFA and AM-AdaIN modules to process query and video information, respectively.
3. The authors conduct experiments on the A2D Sentences, Refer-Youtube-VOS (RVOS), and J-HMDB Sentences datasets.
Strengt... | Recommendation: 3: reject, not good enough | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
1. The paper attempts to introduce domain generalization to solve query-based video segmentation.
2. The paper proposes QFA and AM-AdaIN modules to process query and video information, respectively.
3. The authors conduct experiments on the A2D Sentences, Refer-Youtube-VOS (RVOS), and J-HMDB Sentences datasets.... |
The paper considers the problem of the probabilistic robustness of graph-matching (GM) algorithms against norm-based adversarial perturbations. The authors develop new algorithms for randomized smoothing for GM by exploiting the structure of the problem. They start by decomposing the robust matching problem defined ove... | Recommendation: 5: marginally below the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
The paper considers the problem of the probabilistic robustness of graph-matching (GM) algorithms against norm-based adversarial perturbations. The authors develop new algorithms for randomized smoothing for GM by exploiting the structure of the problem. They start by decomposing the robust matching problem def... |
This paper introduces a GAN-Inversion method to solve the image restoration problems. From the results shown in this paper, this author emphazie a lot on the image inpainting problem, and also show the potential in solving the anomaly detection problems.
The strength and weakness of this problem are all very obvious. ... | Recommendation: 5: marginally below the acceptance threshold | Area: Unsupervised and Self-supervised learning | Review:
This paper introduces a GAN-Inversion method to solve the image restoration problems. From the results shown in this paper, this author emphazie a lot on the image inpainting problem, and also show the potential in solving the anomaly detection problems.
The strength and weakness of this problem are all very o... |
This paper analyses a method for learning transition and reward dynamics in MDPs. They show that a more generally parameterised MDP can be solved efficiently. No empirical results are presented, but extensive theoretical analyses are.
This is an **intensely** theoretical paper, in a domain that I am not overly fam... | Recommendation: 6: marginally above the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper analyses a method for learning transition and reward dynamics in MDPs. They show that a more generally parameterised MDP can be solved efficiently. No empirical results are presented, but extensive theoretical analyses are.
This is an **intensely** theoretical paper, in a domain that I am not ov... |
The authors present Keypoint Interaction Network (KINet) - an unsupervised learning method to associate keypoints with objects and uses a forward motion model to estimate future keypoint states. As an unsupervised method, the authors make no assumptions about access to ground truth semantic keypoint locations, but rath... | Recommendation: 8: accept, good paper | Area: Unsupervised and Self-supervised learning | Review:
The authors present Keypoint Interaction Network (KINet) - an unsupervised learning method to associate keypoints with objects and uses a forward motion model to estimate future keypoint states. As an unsupervised method, the authors make no assumptions about access to ground truth semantic keypoint locations, ... |
In this paper, the authors propose VoLTA, a unified Vision Language Pre-training paradigm for image-level and region-level applications, in which only image-caption pairs are used. They use graph optimal transport for weakly-supervised feature-level and region-level alignment. They conduct a wide range of vision- and v... | Recommendation: 5: marginally below the acceptance threshold | Area: Unsupervised and Self-supervised learning | Review:
In this paper, the authors propose VoLTA, a unified Vision Language Pre-training paradigm for image-level and region-level applications, in which only image-caption pairs are used. They use graph optimal transport for weakly-supervised feature-level and region-level alignment. They conduct a wide range of visio... |
The authors address the problem of long-term fairness in the setting where the result of predicting impact the data distribution in a feedback loop. The authors extend the concept of performative prediction Perdomo et al. (2020) from purely empirical risk minimization settings to distributionally robust settings. The r... | Recommendation: 8: accept, good paper | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
The authors address the problem of long-term fairness in the setting where the result of predicting impact the data distribution in a feedback loop. The authors extend the concept of performative prediction Perdomo et al. (2020) from purely empirical risk minimization settings to distributionally robust setting... |
The authors have considered the problem of designing weights for federated learning problem via bilevel optimization. The problem is interesting and analyzed theoretically with extensive experiments. But there are certain limitations as provided next.
*Strength*
The problem is interesting, paper is well written withe ... | Recommendation: 3: reject, not good enough | Area: General Machine Learning | Review:
The authors have considered the problem of designing weights for federated learning problem via bilevel optimization. The problem is interesting and analyzed theoretically with extensive experiments. But there are certain limitations as provided next.
*Strength*
The problem is interesting, paper is well writte... |
This paper proposes a stochastic controller to stabilize the training process of GANs. It shows in a simple Dirac-GANs case, the proposed method converges theoretically to a unique optimal equilibrium. For general GANs, a modification of the controller is proposed and numerical results are given to show the improved st... | Recommendation: 5: marginally below the acceptance threshold | Area: Generative models | Review:
This paper proposes a stochastic controller to stabilize the training process of GANs. It shows in a simple Dirac-GANs case, the proposed method converges theoretically to a unique optimal equilibrium. For general GANs, a modification of the controller is proposed and numerical results are given to show the imp... |
This paper proposes a theoretically grounded and practically effective approach to deal with the instance-dependent partial label learning problem. This paper updates the learning model while purifying each PL for the next epoch of the model training by progressively moving out false candidate labels. Theoretically, th... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
This paper proposes a theoretically grounded and practically effective approach to deal with the instance-dependent partial label learning problem. This paper updates the learning model while purifying each PL for the next epoch of the model training by progressively moving out false candidate labels. Theoretic... |
In this work, the authors summarized previous algorithms to recover column/row spaces of a set of matrices fast and introduced Tucker decomposition of tensor into them, which can give a good choice of hyperparameter in those algorithms.
Strength: in those previous algorithms, they require the approximation for matrice... | Recommendation: 6: marginally above the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
In this work, the authors summarized previous algorithms to recover column/row spaces of a set of matrices fast and introduced Tucker decomposition of tensor into them, which can give a good choice of hyperparameter in those algorithms.
Strength: in those previous algorithms, they require the approximation for... |
This paper explores the instance segmentation via actor-critic reinforcement learning. Instead of large amount of object-level supervision, the author formulate the instance segmentation as graph partitioning and predict the edge weights driven by the reward from object shape, position and size. Experiments on toy and ... | Recommendation: 5: marginally below the acceptance threshold | Area: Unsupervised and Self-supervised learning | Review:
This paper explores the instance segmentation via actor-critic reinforcement learning. Instead of large amount of object-level supervision, the author formulate the instance segmentation as graph partitioning and predict the edge weights driven by the reward from object shape, position and size. Experiments on ... |
The proposed method uses the martingale posterior technique in place of Bayesian inference for the first time to construct neural processes, i.e. stochastic processes generated using neural networks. Martingale posterior approach models the predictive distribution straight ahead, by passing the need for an interim appr... | Recommendation: 8: accept, good paper | Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes) | Review:
The proposed method uses the martingale posterior technique in place of Bayesian inference for the first time to construct neural processes, i.e. stochastic processes generated using neural networks. Martingale posterior approach models the predictive distribution straight ahead, by passing the need for an inte... |
This is an empirical paper that proposes a new way to examine the predictions of machine learning models. In particular, it proposes to compare how well a variety of models predict a single, fixed test point. The authors note that models have a few surprising features with respect to this measure: in commonly used data... | Recommendation: 8: accept, good paper | Area: General Machine Learning | Review:
This is an empirical paper that proposes a new way to examine the predictions of machine learning models. In particular, it proposes to compare how well a variety of models predict a single, fixed test point. The authors note that models have a few surprising features with respect to this measure: in commonly u... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.