review
stringlengths
5
16.6k
score
stringclasses
5 values
area
stringclasses
12 values
text
stringlengths
31
5.65k
The paper tackles the survey bandit setting in which the decision maker has a limited budget of questions to ask a user, observes the answers to these questions (constituting the features of the user), then recommends a treatment and observes the outcome. The questions to ask are chosen with a decision theoretic entrop...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The paper tackles the survey bandit setting in which the decision maker has a limited budget of questions to ask a user, observes the answers to these questions (constituting the features of the user), then recommends a treatment and observes the outcome. The questions to ask are chosen with a decision theoreti...
In this work, the authors present a unification of goal-conditioned behavior cloning/supervised learning and hindsight relabeling methods (e.g., HER) under the framework of divergence minimization. They show that HER is a special case of a divergence minimization when considered under a goal-conditioned Q-learning appr...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: In this work, the authors present a unification of goal-conditioned behavior cloning/supervised learning and hindsight relabeling methods (e.g., HER) under the framework of divergence minimization. They show that HER is a special case of a divergence minimization when considered under a goal-conditioned Q-learn...
This paper focuses on the data poisoning task on multimodal encoders. This paper investigates three types of poisoning attacks first. After that, it studies the effectiveness of attacking visual and linguistic features. In addition, it explores two types of defense mechanisms for defending against the attack on multimo...
Recommendation: 6: marginally above the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper focuses on the data poisoning task on multimodal encoders. This paper investigates three types of poisoning attacks first. After that, it studies the effectiveness of attacking visual and linguistic features. In addition, it explores two types of defense mechanisms for defending against the attack on...
This work improves Random-feature-based attention through the lens of control variates. The paper develops a more flexible form of control variates, which forms a novel attention mechanism that significantly reduces the approximation gap while maintaining linear complexity. The EVA achieves competitive results on sever...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This work improves Random-feature-based attention through the lens of control variates. The paper develops a more flexible form of control variates, which forms a novel attention mechanism that significantly reduces the approximation gap while maintaining linear complexity. The EVA achieves competitive results ...
The paper addresses the task of updating a model by learning a stronger model while ensuring that formerly correctly classified instances will get wrong predictions as seldom as possible, a quantity called a negative flip rate (NFR). The paper starts with a theoretical analysis of using ensembles in this context. It th...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: The paper addresses the task of updating a model by learning a stronger model while ensuring that formerly correctly classified instances will get wrong predictions as seldom as possible, a quantity called a negative flip rate (NFR). The paper starts with a theoretical analysis of using ensembles in this contex...
The authors introduce a simple modification to a metric-learning triplet loss by adding penalty term which encourages the distance between the anchor sample and negative sample to be similar to the distance between the positive sample and the negative sample. Strengths - The authors provide results for interesting ...
Recommendation: 3: reject, not good enough
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: The authors introduce a simple modification to a metric-learning triplet loss by adding penalty term which encourages the distance between the anchor sample and negative sample to be similar to the distance between the positive sample and the negative sample. Strengths - The authors provide results for inte...
The paper proposes ROLLIN, and algorithm to reduce the complexity of learning an optimal policy in a sequence of contextual MDPs, i.e. a set of MDPs sharing everything but the reward function in this work. The main idea of the paper is that if the two contexts are close enough, we can modify the initial state distribut...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The paper proposes ROLLIN, and algorithm to reduce the complexity of learning an optimal policy in a sequence of contextual MDPs, i.e. a set of MDPs sharing everything but the reward function in this work. The main idea of the paper is that if the two contexts are close enough, we can modify the initial state d...
A multi-scale structure-preserving heterologous image transformation method based on conditional adversarial network learning is proposed in this paper. The experimental results show that the proposed algorithm can better suppress the local structural distortion and has significant advantages in evaluation indicators s...
Recommendation: 3: reject, not good enough
Area: General Machine Learning
Review: A multi-scale structure-preserving heterologous image transformation method based on conditional adversarial network learning is proposed in this paper. The experimental results show that the proposed algorithm can better suppress the local structural distortion and has significant advantages in evaluation indi...
This paper extends the Logit Normalization technique by centering and introducing a threshold gamma in the denominator, which is referred to as NormSoftMax. Experimental results indicate that NormSoftMax works well in a number of DNN models with either croess-entropy loss or attention modules. Strength: NormSoftMa...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper extends the Logit Normalization technique by centering and introducing a threshold gamma in the denominator, which is referred to as NormSoftMax. Experimental results indicate that NormSoftMax works well in a number of DNN models with either croess-entropy loss or attention modules. Strength: No...
While graph neural networks (GNNs) and graph transformers (GTs) have been popular for graph representation learning recently, they have their own limitations: * GNNs, especially those based on message passing, are poor at modelling long-range dependencies and * GTs suffer from quadratic computation complexity. This ...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: While graph neural networks (GNNs) and graph transformers (GTs) have been popular for graph representation learning recently, they have their own limitations: * GNNs, especially those based on message passing, are poor at modelling long-range dependencies and * GTs suffer from quadratic computation complexity....
This work propose a simple fine tuning method for unsupervised word alignment based on multilingual contextualized pre-trained language model, e.g., BERT. This method is based on the similarity score of the word representations in two languages and employs fine tuning by 1) iteratively augmenting code-switched training...
Recommendation: 5: marginally below the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This work propose a simple fine tuning method for unsupervised word alignment based on multilingual contextualized pre-trained language model, e.g., BERT. This method is based on the similarity score of the word representations in two languages and employs fine tuning by 1) iteratively augmenting code-switched ...
To address imbalanced label distributions in node classification tasks, the author suggested an over-sampling-based technique. To obtain unlabelled nodes rather than artificial ones, it uses unsupervised approaches in the embedding space. Additionally, new samples are simultaneously chosen using geometric confidence ra...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: To address imbalanced label distributions in node classification tasks, the author suggested an over-sampling-based technique. To obtain unlabelled nodes rather than artificial ones, it uses unsupervised approaches in the embedding space. Additionally, new samples are simultaneously chosen using geometric confi...
During the search, the neural architecture search (NAS) algorithm uses the validation accuracy of the trained candidate model for feedback. As training a candidate every time is expensive, performance predictors, which take the architecture as input and output the validation accuracy, are used. This paper proposes a tr...
Recommendation: 5: marginally below the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: During the search, the neural architecture search (NAS) algorithm uses the validation accuracy of the trained candidate model for feedback. As training a candidate every time is expensive, performance predictors, which take the architecture as input and output the validation accuracy, are used. This paper propo...
This paper proposes a decentralized asynchronous stochastic first-order algorithm DADAO to minimize the sum of strongly convex functions over time-varying decentralized networks. This paper develops the theoretical performance guarantee of a related ODE system and tests the empirical performance by numerical simulation...
Recommendation: 5: marginally below the acceptance threshold
Area: Optimization (eg, convex and non-convex optimization)
Review: This paper proposes a decentralized asynchronous stochastic first-order algorithm DADAO to minimize the sum of strongly convex functions over time-varying decentralized networks. This paper develops the theoretical performance guarantee of a related ODE system and tests the empirical performance by numerical si...
The authors proposed to leverage Doob's h-transform to learn diffusion models within a constraint domain, including product spaces of any type, such as discrete, categorical, and their mix. Various experiments are conducted to demonstrate the interesting applications of such an algorithm. **Pros:** 1. The use of Doob'...
Recommendation: 6: marginally above the acceptance threshold
Area: Generative models
Review: The authors proposed to leverage Doob's h-transform to learn diffusion models within a constraint domain, including product spaces of any type, such as discrete, categorical, and their mix. Various experiments are conducted to demonstrate the interesting applications of such an algorithm. **Pros:** 1. The use ...
This paper introduces a method for representation learning of multivariate time-series, which consists in the combination of Contrastive learning (for encoding the data in a compact latent space) and Self Organizing Maps (for better interpretability of the latent space). The use of interpretable unsupervised techniques...
Recommendation: 6: marginally above the acceptance threshold
Area: General Machine Learning
Review: This paper introduces a method for representation learning of multivariate time-series, which consists in the combination of Contrastive learning (for encoding the data in a compact latent space) and Self Organizing Maps (for better interpretability of the latent space). The use of interpretable unsupervised te...
This paper studies preserving differential privacy in when releasing information of streaming models. The authors propose a new DP mechanism that can release a set of sufficient statistics which can be used to estimate any symmetric norm of the data. This paper studies a very important problem, i.e., releasing the nor...
Recommendation: 6: marginally above the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper studies preserving differential privacy in when releasing information of streaming models. The authors propose a new DP mechanism that can release a set of sufficient statistics which can be used to estimate any symmetric norm of the data. This paper studies a very important problem, i.e., releasing...
The current research piece introduce combines existing pretrained language models as DeBERTa and ELECTRA into a single model. In addition, authors introduce GDES, a technique that the shared embeddings from the generator and discriminative models interfere with each other by avoiding propagating the gradients due to th...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: The current research piece introduce combines existing pretrained language models as DeBERTa and ELECTRA into a single model. In addition, authors introduce GDES, a technique that the shared embeddings from the generator and discriminative models interfere with each other by avoiding propagating the gradients d...
This paper investigates applying knowledge distillation to federated learning. It summarizes many related works to give a set of common building blocks and experiments with different choices for each block on ResNet20/56 + Cifar10/100 to see their impact on the accuracy. Strength: - There is a good effort to summarize ...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This paper investigates applying knowledge distillation to federated learning. It summarizes many related works to give a set of common building blocks and experiments with different choices for each block on ResNet20/56 + Cifar10/100 to see their impact on the accuracy. Strength: - There is a good effort to su...
This paper proposes a miniGPT-like transformer architecture for learning the world model of RL agents in POMDP environments. This World Model's training data is derived from the present policy model's interplay with the real world. The input and output images are then represented in the VQGAN-style and utilized to trai...
Recommendation: 8: accept, good paper
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper proposes a miniGPT-like transformer architecture for learning the world model of RL agents in POMDP environments. This World Model's training data is derived from the present policy model's interplay with the real world. The input and output images are then represented in the VQGAN-style and utilized...
This paper targets at few-shot classification. Motivated by Label Smooth, it designs LP-FT-FB to impose equivariance on the feature extractor to address the over-fitting problem. It first train a randomly initialized linear classifier on novel samples with FBR. Then the pretrained feature extractor and the classifier a...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper targets at few-shot classification. Motivated by Label Smooth, it designs LP-FT-FB to impose equivariance on the feature extractor to address the over-fitting problem. It first train a randomly initialized linear classifier on novel samples with FBR. Then the pretrained feature extractor and the clas...
In this paper the authors address the problem of graph representation learning where edges are associated with text. In doing so the authors propose to combine pretrained networks with GNN with local network aggregation to inject text representation of nodes to its neighbors. The authors conduct experiments on various ...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: In this paper the authors address the problem of graph representation learning where edges are associated with text. In doing so the authors propose to combine pretrained networks with GNN with local network aggregation to inject text representation of nodes to its neighbors. The authors conduct experiments on ...
This paper proposes to learn a multi-step inverse model [Lamb et al.] to learn a representation that ignores exogenous information (i.e., uncontrollable information) for offline RL. In addition, this paper introduces several temporally-correlated and diverse visual distractors on top of the v-d4rl dataset to investigat...
Recommendation: 5: marginally below the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper proposes to learn a multi-step inverse model [Lamb et al.] to learn a representation that ignores exogenous information (i.e., uncontrollable information) for offline RL. In addition, this paper introduces several temporally-correlated and diverse visual distractors on top of the v-d4rl dataset to in...
This work studies the impact of various sub-tokenization methods for neural language models trained on source code. Across a range of tasks and datasets, it demonstrates a number of actionable insights, such as that UnigramLM trained models perform better than BPE ones, and that certain types of tokenization (especiall...
Recommendation: 8: accept, good paper
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This work studies the impact of various sub-tokenization methods for neural language models trained on source code. Across a range of tasks and datasets, it demonstrates a number of actionable insights, such as that UnigramLM trained models perform better than BPE ones, and that certain types of tokenization (e...
In this paper, the authors devise a two-step conversion framework for ANN-SNN conversion. Unlike previous methods which consider the ANN-SNN conversion error, this work considers the error between source ANN and altered ANN as well as altered ANN with SNN. The idea is generally sound and simple to understand. Yet in my...
Recommendation: 6: marginally above the acceptance threshold
Area: General Machine Learning
Review: In this paper, the authors devise a two-step conversion framework for ANN-SNN conversion. Unlike previous methods which consider the ANN-SNN conversion error, this work considers the error between source ANN and altered ANN as well as altered ANN with SNN. The idea is generally sound and simple to understand. Y...
This paper studies the problem of optimizing for aggregation weights assigned to client model updates along with weight decay so as to aid generalization. In particular, the authors take the viewpoint of seeing the aggregation and server side update analogous to that of mini-batch SGD in centralized training and propos...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper studies the problem of optimizing for aggregation weights assigned to client model updates along with weight decay so as to aid generalization. In particular, the authors take the viewpoint of seeing the aggregation and server side update analogous to that of mini-batch SGD in centralized training an...
The paper has considered non-uniformly sampled graphs from a metric-probability space and developed methods to estimate the unknown sampling density from those graphs. Also, the authors have experimentally tested the model and approach on synthetic and real-world graphs. Strength: The topic seems quite interesting and ...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: The paper has considered non-uniformly sampled graphs from a metric-probability space and developed methods to estimate the unknown sampling density from those graphs. Also, the authors have experimentally tested the model and approach on synthetic and real-world graphs. Strength: The topic seems quite interest...
The authors consider the problem of learning to solve constraint satisfaction problems. This entails finding values of a set of variables that satisfy given constraints. The authors propose using a transformer model, extended with recurrence, to perform this variable assignment. Existing work has shown that transforme...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: The authors consider the problem of learning to solve constraint satisfaction problems. This entails finding values of a set of variables that satisfy given constraints. The authors propose using a transformer model, extended with recurrence, to perform this variable assignment. Existing work has shown that tr...
The paper proposes a trainable objective less ESD as the extra calibration loss jointly optimized with the NLL loss during training. It is claimed as a binning-free objective lease without need to tune any additional parameters. The experiments were extensively conducted across three architectures (MLPs, CNNs, and Tran...
Recommendation: 6: marginally above the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The paper proposes a trainable objective less ESD as the extra calibration loss jointly optimized with the NLL loss during training. It is claimed as a binning-free objective lease without need to tune any additional parameters. The experiments were extensively conducted across three architectures (MLPs, CNNs, ...
This paper proposes a preconditioned update to stochastic gradient methods, based upon Hutchinson’s approach to approximating the diagonal of the Hessian. Strength: introducing a new method to improve the convergence of the stochastic method Weaknesses: (1) The theoretical complexity is only for the smooth objective...
Recommendation: 5: marginally below the acceptance threshold
Area: Optimization (eg, convex and non-convex optimization)
Review: This paper proposes a preconditioned update to stochastic gradient methods, based upon Hutchinson’s approach to approximating the diagonal of the Hessian. Strength: introducing a new method to improve the convergence of the stochastic method Weaknesses: (1) The theoretical complexity is only for the smooth o...
In the paper, authors analyze the gradients of a maxout network with respect to inputs and parameters. In consequence, the authors improve the training of deep maxout networks in the case of fully-connected and convolutional networks. 1. The introduction paragraph, "Maxout networks," is not clear. 2. The introduction s...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: In the paper, authors analyze the gradients of a maxout network with respect to inputs and parameters. In consequence, the authors improve the training of deep maxout networks in the case of fully-connected and convolutional networks. 1. The introduction paragraph, "Maxout networks," is not clear. 2. The introd...
The authors provide the first provably convergent algorithm for bilevel optimization with non-smooth non-Lipschitz lower-level function to their knowledge, via smoothing and penalty techniques. The proposed algorithm is empirically more accurate and efficient than existing state of the arts. Pros: The authors provide t...
Recommendation: 5: marginally below the acceptance threshold
Area: Optimization (eg, convex and non-convex optimization)
Review: The authors provide the first provably convergent algorithm for bilevel optimization with non-smooth non-Lipschitz lower-level function to their knowledge, via smoothing and penalty techniques. The proposed algorithm is empirically more accurate and efficient than existing state of the arts. Pros: The authors p...
This paper proposes an approach to domain generalisation whereby they use Fourier to generate synthetic images which are then used as a worst-case target domain to improve the model's robustness and therefore its generalisation. This is reminiscent of a domain adaptation approach. The amplitude-based generator that cre...
Recommendation: 6: marginally above the acceptance threshold
Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes)
Review: This paper proposes an approach to domain generalisation whereby they use Fourier to generate synthetic images which are then used as a worst-case target domain to improve the model's robustness and therefore its generalisation. This is reminiscent of a domain adaptation approach. The amplitude-based generator ...
The submission considers a sample-efficient learning for PSRs. The nature of the problem is similar to (Liu et al. 2022), and previous algorithmic framework is extended from POMDPs to PSRs. This generalization to PSR seems relatively easy since the core test-set is provided a priori, and the construction of confidence ...
Recommendation: 8: accept, good paper
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The submission considers a sample-efficient learning for PSRs. The nature of the problem is similar to (Liu et al. 2022), and previous algorithmic framework is extended from POMDPs to PSRs. This generalization to PSR seems relatively easy since the core test-set is provided a priori, and the construction of con...
This paper aims to show that using deterministic policy in a generative adversarial imitation learning algorithm is not proper, and results in a significant instability. This paper does the following: - empirical comparisons between SD3-GAIL, TD3-GAIL, TSSG - show a toy domain and prove that PLR approaches 0 as the siz...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper aims to show that using deterministic policy in a generative adversarial imitation learning algorithm is not proper, and results in a significant instability. This paper does the following: - empirical comparisons between SD3-GAIL, TD3-GAIL, TSSG - show a toy domain and prove that PLR approaches 0 as...
This paper introduces Mega, a gated, single-headed attention mechanism that incorporates a (damped, multi-dimensional) moving average. Instead of being computed directly on the hidden state, the query and keys are computed on a EMA-transformed version of it. The gating mechanism is akin to GRUs (with different inputs)....
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: This paper introduces Mega, a gated, single-headed attention mechanism that incorporates a (damped, multi-dimensional) moving average. Instead of being computed directly on the hidden state, the query and keys are computed on a EMA-transformed version of it. The gating mechanism is akin to GRUs (with different ...
The authors propose a theoretical and empirical study on the problem of dimensional collapse due to over-smoothing in graph-regularized MLPs. Then, they propose to regularize the cross-correlation between node features and pooled features to alleviate this problem. The resulting model "Ortho-Reg" surpasses the performa...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: The authors propose a theoretical and empirical study on the problem of dimensional collapse due to over-smoothing in graph-regularized MLPs. Then, they propose to regularize the cross-correlation between node features and pooled features to alleviate this problem. The resulting model "Ortho-Reg" surpasses the ...
The paper describes sampling (MCMC parlance) as a diffusion problem. In the forward direction, the target distribution diffuses to Gaussian noise, while the reverse direction of interest allows diffusing from noise to the target distribution. As can be seen and is highlighted by the authors, this problem is classical i...
Recommendation: 5: marginally below the acceptance threshold
Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes)
Review: The paper describes sampling (MCMC parlance) as a diffusion problem. In the forward direction, the target distribution diffuses to Gaussian noise, while the reverse direction of interest allows diffusing from noise to the target distribution. As can be seen and is highlighted by the authors, this problem is cla...
In this manuscript, the authors proposed a method named comfort zone which utilize the SVD to augment data for regression problems. To demonstrate the effectiveness of proposed approach, experiments across different datasets and network architecture are conducted. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: In this manuscript, the authors proposed a method named comfort zone which utilize the SVD to augment data for regression problems. To demonstrate the effectiveness of proposed approach, experiments across different datasets and network architecture are conducted. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~...
The paper addresses the robustness vs accuracy trade-off that is often observed in adversarial training of neural networks. It proposes the following ensembling technique to overcome this trade-off. The ensemble is made up of two models. The first model is trained using standard adversarial robustness techniques with o...
Recommendation: 3: reject, not good enough
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The paper addresses the robustness vs accuracy trade-off that is often observed in adversarial training of neural networks. It proposes the following ensembling technique to overcome this trade-off. The ensemble is made up of two models. The first model is trained using standard adversarial robustness technique...
Similar to refs [A,B], the paper proposes a new version of Hyperbolic Graph Convolutional Network (HGCN). The main difference with refs [A,B] is that, instead of learning a linear map in the tangent space of the manifold, the paper proposes to learn linear operators directly in the extrinsic geometry of the Lorentzian ...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: Similar to refs [A,B], the paper proposes a new version of Hyperbolic Graph Convolutional Network (HGCN). The main difference with refs [A,B] is that, instead of learning a linear map in the tangent space of the manifold, the paper proposes to learn linear operators directly in the extrinsic geometry of the Lor...
This paper proposes a new graph deep learning method, PotNet, with several innovations in the field of crystal material modeling. The proposed method models interatomic potentials directly as edge features instead of only using distances and models the complete set of potentials among all atoms with approximations of i...
Recommendation: 6: marginally above the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: This paper proposes a new graph deep learning method, PotNet, with several innovations in the field of crystal material modeling. The proposed method models interatomic potentials directly as edge features instead of only using distances and models the complete set of potentials among all atoms with approximati...
This paper focuses on providing a theory and methodology on policy abstraction and representation to reduce the high complexity of policy space in the Markov Decision Process. To achieve this, they first proposed a unified policy abstraction theory and discussed three types of policy abstraction. Then they generalize t...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper focuses on providing a theory and methodology on policy abstraction and representation to reduce the high complexity of policy space in the Markov Decision Process. To achieve this, they first proposed a unified policy abstraction theory and discussed three types of policy abstraction. Then they gene...
This paper studied asynchronous decentralized SGD for strongly convex problems. The authors provide theoretical analysis for the convergence rate and conduct experiments to verify its performance. But the writing is not very clear. It is not easy to follow. Strength: 1. Theoretical convergence rate is established. 2. S...
Recommendation: 3: reject, not good enough
Area: Optimization (eg, convex and non-convex optimization)
Review: This paper studied asynchronous decentralized SGD for strongly convex problems. The authors provide theoretical analysis for the convergence rate and conduct experiments to verify its performance. But the writing is not very clear. It is not easy to follow. Strength: 1. Theoretical convergence rate is establish...
[NOTE: the citations I make below can all be found in the bibliography of the paper under review.] This paper studies methods for doing lossy compression using a diffusion model, under the constraint of 'perfect realism'. 'Perfect realism' is defined in the introduction to the paper as the requirement that the margina...
Recommendation: 5: marginally below the acceptance threshold
Area: Generative models
Review: [NOTE: the citations I make below can all be found in the bibliography of the paper under review.] This paper studies methods for doing lossy compression using a diffusion model, under the constraint of 'perfect realism'. 'Perfect realism' is defined in the introduction to the paper as the requirement that the...
This paper proposes to use diffusion models to imitate human behaviors. To make text-to-image model suitable for observation-to-action prediction, the authors introduce several modifications, including designing different architectures (MLP with embedding + skip connection, and Transformer-based), removing Classifier-...
Recommendation: 8: accept, good paper
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper proposes to use diffusion models to imitate human behaviors. To make text-to-image model suitable for observation-to-action prediction, the authors introduce several modifications, including designing different architectures (MLP with embedding + skip connection, and Transformer-based), removing Cla...
This paper studies the reward free exploration problem in the linear MDP setting. It proposes a sample-efficient and computational-efficient algorithm LSVI-RFE, which returns an $\epsilon$-optimal policy given any reward function using $\tilde{O}(d^2H^4/\epsilon^2)$ exploration trajectories, which is tighter than previ...
Recommendation: 6: marginally above the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: This paper studies the reward free exploration problem in the linear MDP setting. It proposes a sample-efficient and computational-efficient algorithm LSVI-RFE, which returns an $\epsilon$-optimal policy given any reward function using $\tilde{O}(d^2H^4/\epsilon^2)$ exploration trajectories, which is tighter th...
This paper develops some attack strategies for adversarial bandits. They design two attack policies that need a sublinear cost of corrupting the original loss of arms and resulting in a linear regret for the bandit algorithm. On the lower bound side, the authors show their attack policy is optimal in the sense that the...
Recommendation: 6: marginally above the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper develops some attack strategies for adversarial bandits. They design two attack policies that need a sublinear cost of corrupting the original loss of arms and resulting in a linear regret for the bandit algorithm. On the lower bound side, the authors show their attack policy is optimal in the sense ...
This paper presents Powderworld, a fast simulated environment capable of producing diverse tasks for either supervised learning or an RL agent. The paper demonstrates that Powderworld can be used for both learning world models and training RL agents in a sandpushing task. ### Strengths - The paper is well-written and ...
Recommendation: 8: accept, good paper
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper presents Powderworld, a fast simulated environment capable of producing diverse tasks for either supervised learning or an RL agent. The paper demonstrates that Powderworld can be used for both learning world models and training RL agents in a sandpushing task. ### Strengths - The paper is well-writ...
This paper presents a comprehensive method to model the hyper-relational knowledge graph. The authors transform a HKG into a KG by introducing extra entities and relations which constructing a one-to-one mapping between the constructed KG and the previous HKG. The transformation is information preserving which is intui...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper presents a comprehensive method to model the hyper-relational knowledge graph. The authors transform a HKG into a KG by introducing extra entities and relations which constructing a one-to-one mapping between the constructed KG and the previous HKG. The transformation is information preserving which ...
The authors propose a Monte Carlo tree search (MCTS) algorithm to generate optimal expression trees based on measurement data. The method is validated using Nguyen’s symbolic regression benchmark task (Uy et al., 2011), along with several other benchmarks. Strengths: This is a strong paper, and has clear novelty i...
Recommendation: 8: accept, good paper
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: The authors propose a Monte Carlo tree search (MCTS) algorithm to generate optimal expression trees based on measurement data. The method is validated using Nguyen’s symbolic regression benchmark task (Uy et al., 2011), along with several other benchmarks. Strengths: This is a strong paper, and has clear n...
The paper extends the Masked Auto-Encoders (MAE) with Vision Transformers by incorporating a Teacher-Student setup (asymmetric siamese model with exponential moving average update for one of the streams). The proposal uses a reconstruction loss over the masked patches and adds a consistency loss over the reconstructio...
Recommendation: 5: marginally below the acceptance threshold
Area: Unsupervised and Self-supervised learning
Review: The paper extends the Masked Auto-Encoders (MAE) with Vision Transformers by incorporating a Teacher-Student setup (asymmetric siamese model with exponential moving average update for one of the streams). The proposal uses a reconstruction loss over the masked patches and adds a consistency loss over the recon...
The work proposes a novel method for network pruning by co-training a network to predict filter importance given model weights. This allows the model learn hidden correlations between the model weights and channel importance. They achieve strong empirical results on pruning resnet networks on CIFAR-10 and Imagenet. The...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: The work proposes a novel method for network pruning by co-training a network to predict filter importance given model weights. This allows the model learn hidden correlations between the model weights and channel importance. They achieve strong empirical results on pruning resnet networks on CIFAR-10 and Image...
The paper proposes a method to improve predictions of the CLIP model by utilizing a potential structure/hierarchy among classes. Instead of generating predictions on the target classes only, the authors propose to generate predictions on a set of all target labels’ subclasses (which are more granular) and use predictio...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: The paper proposes a method to improve predictions of the CLIP model by utilizing a potential structure/hierarchy among classes. Instead of generating predictions on the target classes only, the authors propose to generate predictions on a set of all target labels’ subclasses (which are more granular) and use p...
The paper studies the generalization performance of learning algorithms in a non iid setting, via the lens of algorithmic stability. The assumption made on the data is that it is generated by a mixing process ($\phi$ mixing or $\psi$ mixing) which formally quantifies how the level of dependency between two observations...
Recommendation: 6: marginally above the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: The paper studies the generalization performance of learning algorithms in a non iid setting, via the lens of algorithmic stability. The assumption made on the data is that it is generated by a mixing process ($\phi$ mixing or $\psi$ mixing) which formally quantifies how the level of dependency between two obse...
This work proposes policy training that combines two commonly used types of human feedback — demonstrations and preferences, each of which has its own strengths and weaknesses. Specifically, the authors propose a method for incorporating preferences into adversarial imitation learning as a unified framework, by reformu...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This work proposes policy training that combines two commonly used types of human feedback — demonstrations and preferences, each of which has its own strengths and weaknesses. Specifically, the authors propose a method for incorporating preferences into adversarial imitation learning as a unified framework, by...
This paper proposes the Greedy Actor-Critic approach, which uses two policies, and a new CCEM approach: a conditional (on states) varianta of CEM. The critic is trained using Sarsa updates (with a replay buffer). A *proposal policy* (one of the two policies) is used to sample a distribution of actions, which are then e...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper proposes the Greedy Actor-Critic approach, which uses two policies, and a new CCEM approach: a conditional (on states) varianta of CEM. The critic is trained using Sarsa updates (with a replay buffer). A *proposal policy* (one of the two policies) is used to sample a distribution of actions, which ar...
The paper proposes an SSL framework for EEG and evaluate for seizure detection. Strengths: - Nicely written - Baselines are chosen well - Outperforms all baselines for both F1 and F2 (weaknesses highlight why this is not really valid) - Evaluated on both SEEG and EEG datasets - Includes clinical collaboration further s...
Recommendation: 5: marginally below the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: The paper proposes an SSL framework for EEG and evaluate for seizure detection. Strengths: - Nicely written - Baselines are chosen well - Outperforms all baselines for both F1 and F2 (weaknesses highlight why this is not really valid) - Evaluated on both SEEG and EEG datasets - Includes clinical collaboration f...
In this paper, the authors rigorously study the effects of varying N (number of samples) and d (dimensionality of the dataset) for 4 separate private generative modeling approaches (belonging to two different classes of algorithms). This is done at different privacy levels (epsilon) and the evaluation is based on both ...
Recommendation: 3: reject, not good enough
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: In this paper, the authors rigorously study the effects of varying N (number of samples) and d (dimensionality of the dataset) for 4 separate private generative modeling approaches (belonging to two different classes of algorithms). This is done at different privacy levels (epsilon) and the evaluation is based ...
The paper proposes to replace the standard rectangular patch based tokens in transformers with superpixel based regions. Features for each superpixel are pooled to a token and these are used in a hierarchical transformer architecture. When reducing the number of tokens (GraphPool), furthest point sampling is used to se...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: The paper proposes to replace the standard rectangular patch based tokens in transformers with superpixel based regions. Features for each superpixel are pooled to a token and these are used in a hierarchical transformer architecture. When reducing the number of tokens (GraphPool), furthest point sampling is us...
This paper proposes an efficient hierarchical molecular grammar learning algorithm for molecular property prediction. The similar property of same production rule motivates the study of data-efficient grammar-induced geometry. Specifically, the authors describes the process of building hierarchical molecular grammar by...
Recommendation: 5: marginally below the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper proposes an efficient hierarchical molecular grammar learning algorithm for molecular property prediction. The similar property of same production rule motivates the study of data-efficient grammar-induced geometry. Specifically, the authors describes the process of building hierarchical molecular gr...
The authors introduce a behavioral approach for identifying challenging images in large image datasets. They use their method to find thousands of challenging images in ImageNet and ObjectNet, and find that CLIP has to a great extent matched humans on these images. Through further analyses they elaborate on the failure...
Recommendation: 5: marginally below the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The authors introduce a behavioral approach for identifying challenging images in large image datasets. They use their method to find thousands of challenging images in ImageNet and ObjectNet, and find that CLIP has to a great extent matched humans on these images. Through further analyses they elaborate on the...
The paper proposes a deep learning framework for data assimilation technique for physics and earth science, such as meteorological dynamical processes. The framework is based on an estimation of a coarse state of the system from noisy and sparse observations, associated to a refinement using dynamical priors. Do do so...
Recommendation: 8: accept, good paper
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: The paper proposes a deep learning framework for data assimilation technique for physics and earth science, such as meteorological dynamical processes. The framework is based on an estimation of a coarse state of the system from noisy and sparse observations, associated to a refinement using dynamical priors. ...
This paper aims to analyze the feature representations and explore the "semantics" in SR networks, namely, deep degradation representations. And authors reveal two factors, i.e., adversarial learning and global residual, which influence the extraction of "semantics". [Strength] 1. The paper is well-written and easy to ...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This paper aims to analyze the feature representations and explore the "semantics" in SR networks, namely, deep degradation representations. And authors reveal two factors, i.e., adversarial learning and global residual, which influence the extraction of "semantics". [Strength] 1. The paper is well-written and ...
The authors propose the progressive prompts that add a new prompt for each task and fix all other parameters from both feature extractor e.g. BERT, T5 and the prompt from previous tasks. The new method should be able to both transfer knowledge from the previous task to new task, as well as reduce the forgetting as the...
Recommendation: 8: accept, good paper
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The authors propose the progressive prompts that add a new prompt for each task and fix all other parameters from both feature extractor e.g. BERT, T5 and the prompt from previous tasks. The new method should be able to both transfer knowledge from the previous task to new task, as well as reduce the forgettin...
The authors propose In-Context Policy Iteration, a Q-learning like algorithm that iteratively prompts large language models (LLM) with trajectories that have yielded better rewards and taps into the in-context learning abilities of LLMS to simulate policy rollouts. The proposed algorithm can self-improve without weight...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The authors propose In-Context Policy Iteration, a Q-learning like algorithm that iteratively prompts large language models (LLM) with trajectories that have yielded better rewards and taps into the in-context learning abilities of LLMS to simulate policy rollouts. The proposed algorithm can self-improve withou...
This paper considers the problem of approximating the joint posterior -- p( parameters, hidden state variables | data) -- for a hidden Markov model with continuous-valued states (not discrete ones). The assumed context is that the generative process can be sampled from, but is not available analytically (e.g. PDFs of t...
Recommendation: 6: marginally above the acceptance threshold
Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes)
Review: This paper considers the problem of approximating the joint posterior -- p( parameters, hidden state variables | data) -- for a hidden Markov model with continuous-valued states (not discrete ones). The assumed context is that the generative process can be sampled from, but is not available analytically (e.g. P...
The present paper is concerned about a generative model of molecules. The authors consider that the existing generative models are limited in that i) the generated molecules are similar to those in the training dataset, while what we want are very novel molecules, and ii) the target properties used in common benchmark ...
Recommendation: 5: marginally below the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The present paper is concerned about a generative model of molecules. The authors consider that the existing generative models are limited in that i) the generated molecules are similar to those in the training dataset, while what we want are very novel molecules, and ii) the target properties used in common be...
This paper addresses the problem of learning in the offline RL scenario. While existing approaches need to regularize objectives in order to learn a policy in proximity to the one used to collect data, the authors explore the use of online on-policy algorithms in order to solve such tasks. Their focus is on the policy ...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper addresses the problem of learning in the offline RL scenario. While existing approaches need to regularize objectives in order to learn a policy in proximity to the one used to collect data, the authors explore the use of online on-policy algorithms in order to solve such tasks. Their focus is on the...
The paper proposes a new video-driven talking head generation method based on memory band learning and implicit scale representation learning. The proposed model, named as MCNet, consists of: 1) a keypoint detector and the dense motion network that predicts keypoints from source and driving frame and then estimates opt...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The paper proposes a new video-driven talking head generation method based on memory band learning and implicit scale representation learning. The proposed model, named as MCNet, consists of: 1) a keypoint detector and the dense motion network that predicts keypoints from source and driving frame and then estim...
The authors extend the Masked Auto-Encoder (MAE) model from a single modality to audio-visual multi-modalities and combine it with contrastive learning for self-supervised audio-visual learning. Although the two self-supervised learning (SSL) strategies are not new, the proposed Contrastive Audio-Visual Masked Auto-Enc...
Recommendation: 8: accept, good paper
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The authors extend the Masked Auto-Encoder (MAE) model from a single modality to audio-visual multi-modalities and combine it with contrastive learning for self-supervised audio-visual learning. Although the two self-supervised learning (SSL) strategies are not new, the proposed Contrastive Audio-Visual Masked ...
Consider the problem of minimizing the sum of a convex smooth and Lipschitz function and a separable piecewise-convex Lipschitz regularizer. This paper proposes an algorithm, based on Nesterov's accelerated gradient method and a "negative curvature exploitation" procedure, that converges at a $O ( 1 / k^2 )$ rate. The ...
Recommendation: 8: accept, good paper
Area: Optimization (eg, convex and non-convex optimization)
Review: Consider the problem of minimizing the sum of a convex smooth and Lipschitz function and a separable piecewise-convex Lipschitz regularizer. This paper proposes an algorithm, based on Nesterov's accelerated gradient method and a "negative curvature exploitation" procedure, that converges at a $O ( 1 / k^2 )$ ra...
The paper proposes a new deep learning approach for solving constrained optimization with the help of homotopy heuristics. The key idea is to create a continuous transformation of objective and constraint with gradually increasing complexity. While there is no theoretical analysis provide, the experimental results sho...
Recommendation: 5: marginally below the acceptance threshold
Area: Optimization (eg, convex and non-convex optimization)
Review: The paper proposes a new deep learning approach for solving constrained optimization with the help of homotopy heuristics. The key idea is to create a continuous transformation of objective and constraint with gradually increasing complexity. While there is no theoretical analysis provide, the experimental res...
This paper extends UGS in order to improve its performance when the graph sparsity is high. The authors observe that the performance of UGS drops when the graph sparsity goes beyond a certain extent. The authors explain that this is due to the fact that only a small portion of the elements in the adjacency matrix are i...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: This paper extends UGS in order to improve its performance when the graph sparsity is high. The authors observe that the performance of UGS drops when the graph sparsity goes beyond a certain extent. The authors explain that this is due to the fact that only a small portion of the elements in the adjacency matr...
This paper proposes a framework to learn Riemannian manifold representation using harmonic message passing. To this end, the authors (1) pre-process molecules (or macromolecules like proteins) as a surface function using triangulation, (2) decompose the surface function into components with LB eigenfunctions and coeffi...
Recommendation: 8: accept, good paper
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: This paper proposes a framework to learn Riemannian manifold representation using harmonic message passing. To this end, the authors (1) pre-process molecules (or macromolecules like proteins) as a surface function using triangulation, (2) decompose the surface function into components with LB eigenfunctions an...
The authors propose a way to encode patient's data such that domain and personalized (or label) information are separated. This is achieved through domain generalization that assumes each patient as a domain. The method has multiple components, the first component to embed patients data into a different representation ...
Recommendation: 8: accept, good paper
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: The authors propose a way to encode patient's data such that domain and personalized (or label) information are separated. This is achieved through domain generalization that assumes each patient as a domain. The method has multiple components, the first component to embed patients data into a different represe...
This paper proposes a new approach to semi-implicit variational inference (SIVI). SIVI-type formulations greatly increase the expressiveness of variational posteriors but introduce intractabilities to their inference. Existing methods rely on additional lower bounds on the evidence lower bound (ELBO), or require an exp...
Recommendation: 6: marginally above the acceptance threshold
Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes)
Review: This paper proposes a new approach to semi-implicit variational inference (SIVI). SIVI-type formulations greatly increase the expressiveness of variational posteriors but introduce intractabilities to their inference. Existing methods rely on additional lower bounds on the evidence lower bound (ELBO), or requir...
This paper proposes two techniques, trajectory weighting and conservative regularization, to overcome two challenges, the bias-variance tradeoff and out-of-distribution return condition, respectively. Empirical study is conducted on top of two conditional BC offline RL algorithms, Reinforcement Learning via Supervised ...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper proposes two techniques, trajectory weighting and conservative regularization, to overcome two challenges, the bias-variance tradeoff and out-of-distribution return condition, respectively. Empirical study is conducted on top of two conditional BC offline RL algorithms, Reinforcement Learning via Sup...
The paper introduces the Edgeworth accountant, an accountant for composing DP mechanisms that obtains tighter guarantees and/or is faster to evaluate than existing accountants. The Edgeworth accountant of the paper is the first accountant to provide both finite-sample (i.e., non asymptotic in m) lower and upper bounds,...
Recommendation: 6: marginally above the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The paper introduces the Edgeworth accountant, an accountant for composing DP mechanisms that obtains tighter guarantees and/or is faster to evaluate than existing accountants. The Edgeworth accountant of the paper is the first accountant to provide both finite-sample (i.e., non asymptotic in m) lower and upper...
The authors propose a set of methods for inducing group sparsity in DNN architecture. Their contributions build on an existing system Only-Train-Once (OTO) by automating the identification of groups that must be pruned together (referred to as zero-invariant groups) and improving on the optimization method, half-space ...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: The authors propose a set of methods for inducing group sparsity in DNN architecture. Their contributions build on an existing system Only-Train-Once (OTO) by automating the identification of groups that must be pruned together (referred to as zero-invariant groups) and improving on the optimization method, hal...
The submission shows that simple randomization-based learning of deep ensembles improves on training a single model when performing selective classification, regardless of the selective classification method that is employed. Given some assumptions that seem to hold in most of the classification scenarios considered in...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: The submission shows that simple randomization-based learning of deep ensembles improves on training a single model when performing selective classification, regardless of the selective classification method that is employed. Given some assumptions that seem to hold in most of the classification scenarios consi...
In this paper, TargetDiff, a new 3D diffusion model, is introduced. The model generates molecules in a non-autoregressive fashion. The generated molecules are conditioned on the binding pocket, and the generation is equivariant to rotations and translations thanks to the equivariant GNNs used. Additionally, an unsuperv...
Recommendation: 6: marginally above the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: In this paper, TargetDiff, a new 3D diffusion model, is introduced. The model generates molecules in a non-autoregressive fashion. The generated molecules are conditioned on the binding pocket, and the generation is equivariant to rotations and translations thanks to the equivariant GNNs used. Additionally, an ...
The paper presents a framework for defining construction heuristic MDPs for combinatorial optimization problems and proposes a technique for exploiting symmetries in state representation in such MDPs based on a mapping to a different state representation. They design a transformer-based architecture for solving TSP and...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: The paper presents a framework for defining construction heuristic MDPs for combinatorial optimization problems and proposes a technique for exploiting symmetries in state representation in such MDPs based on a mapping to a different state representation. They design a transformer-based architecture for solving...
This paper considers the problem of spurious correlations in deep learning, using image classification as a case study. This problem arises when some attribute can be observed in the training set that is correlated with the class label, however the correlation does not hold in general. The formulation assumes that ther...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper considers the problem of spurious correlations in deep learning, using image classification as a case study. This problem arises when some attribute can be observed in the training set that is correlated with the class label, however the correlation does not hold in general. The formulation assumes t...
This paper investigates the problem of finding out whether an implementation of DP-SGD is subject to silent bugs affecting the privacy protection, focusing on (i) gradient clipping and (ii) noise scaling. For each case, it proposes simple tests that relying on varying DP hyperparameters (batch size, noise level, clippi...
Recommendation: 6: marginally above the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper investigates the problem of finding out whether an implementation of DP-SGD is subject to silent bugs affecting the privacy protection, focusing on (i) gradient clipping and (ii) noise scaling. For each case, it proposes simple tests that relying on varying DP hyperparameters (batch size, noise level...
This paper provides a theoretical analysis of AdaGradNorm which is a variant of AdaGrad in the unconstrained domain. As much as it is known this is the first analysis that extends the convergence analysis of Adagrad to the unconstrained domain. They analyze both deterministic and stochastic settings. The analysis is pr...
Recommendation: 8: accept, good paper
Area: Optimization (eg, convex and non-convex optimization)
Review: This paper provides a theoretical analysis of AdaGradNorm which is a variant of AdaGrad in the unconstrained domain. As much as it is known this is the first analysis that extends the convergence analysis of Adagrad to the unconstrained domain. They analyze both deterministic and stochastic settings. The analys...
What is the goal of the paper? * Test-time invisible textual trojan insertion What has been done before? * Current Trojan attacks with syntactic-structure triggers are highly dependent on a large corpus of training data which significantly limits the feasibility of these attacks in real-world NLP tasks. The Trojan w...
Recommendation: 6: marginally above the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: What is the goal of the paper? * Test-time invisible textual trojan insertion What has been done before? * Current Trojan attacks with syntactic-structure triggers are highly dependent on a large corpus of training data which significantly limits the feasibility of these attacks in real-world NLP tasks. The ...
The authors propose a poisoning attack on the generative model that is used to generate past data in the continual setting. I found that the problem setting is very narrow and has limited applicability. My major concerns are as follows: 1. It seems like one can easily defend the proposed attack simply by not solely ...
Recommendation: 3: reject, not good enough
Area: General Machine Learning
Review: The authors propose a poisoning attack on the generative model that is used to generate past data in the continual setting. I found that the problem setting is very narrow and has limited applicability. My major concerns are as follows: 1. It seems like one can easily defend the proposed attack simply by not...
The paper proposes a new method for safe model-based RL that minimizes safety constraint violations during planning. Three variants of the method are proposed (S-RS, S-ME, PS-ME) and experiments are performed to show their effectiveness in terms of safety, state space exploration, and rewards earned. The use of quality...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The paper proposes a new method for safe model-based RL that minimizes safety constraint violations during planning. Three variants of the method are proposed (S-RS, S-ME, PS-ME) and experiments are performed to show their effectiveness in terms of safety, state space exploration, and rewards earned. The use of...
This paper presents a method of white-box adversarial attacks against text classification systems. Given a classification model, the algorithm involves taking an input example and transforming it to construct an adversarial example by (1) selecting a subset of positions to replace, (2) for each selection position, sele...
Recommendation: 5: marginally below the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper presents a method of white-box adversarial attacks against text classification systems. Given a classification model, the algorithm involves taking an input example and transforming it to construct an adversarial example by (1) selecting a subset of positions to replace, (2) for each selection positi...
This paper shed some light on the underlying principles that allow IMP to find winning tickets. In particular, the authors focus on four fundamental questions regarding the information provided by the mask, the need of an iterative procedure for pruning, and the differences between retraining, learning rate rewinding a...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: This paper shed some light on the underlying principles that allow IMP to find winning tickets. In particular, the authors focus on four fundamental questions regarding the information provided by the mask, the need of an iterative procedure for pruning, and the differences between retraining, learning rate rew...
The authors propose a new family of regularized Renyi divergences by infimal-convolution with integral probability metric (IPM). The authors derive its dual variational representation and provide several theoretical results about limits, interpolations, regularized worse-case regret. The authors evaluate the proposed d...
Recommendation: 6: marginally above the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: The authors propose a new family of regularized Renyi divergences by infimal-convolution with integral probability metric (IPM). The authors derive its dual variational representation and provide several theoretical results about limits, interpolations, regularized worse-case regret. The authors evaluate the pr...
This paper provides gradient descent-based for solving bi-level optimization problems where the lower-level problem has a strongly convex objective and linear inequality constraints, using implicit gradients. The authors derive conditions under which the implicit objective is differentiable, and propose a perturbation-...
Recommendation: 8: accept, good paper
Area: Optimization (eg, convex and non-convex optimization)
Review: This paper provides gradient descent-based for solving bi-level optimization problems where the lower-level problem has a strongly convex objective and linear inequality constraints, using implicit gradients. The authors derive conditions under which the implicit objective is differentiable, and propose a pertu...
The paper introduces Amos, a first-order DL optimizer with adaptive learning rate and decay. The proposed contributions are: * Outperforming AdamW for pre-training language models * Providing guidance for hyperparameter tuning * Reducing memory usage * Allowing continuous training and resuming from checkpoints The pr...
Recommendation: 5: marginally below the acceptance threshold
Area: Optimization (eg, convex and non-convex optimization)
Review: The paper introduces Amos, a first-order DL optimizer with adaptive learning rate and decay. The proposed contributions are: * Outperforming AdamW for pre-training language models * Providing guidance for hyperparameter tuning * Reducing memory usage * Allowing continuous training and resuming from checkpoints...
This paper introduces a neural network architecture, called Scaled Neural Multiplicative Model (SNMM). This architecture was designed with two main objectives in mind: first, the model can be fitted properly to reflect actual sales data, even though this data tends to be scarce and sparse. Second, the model is concave,...
Recommendation: 3: reject, not good enough
Area: Optimization (eg, convex and non-convex optimization)
Review: This paper introduces a neural network architecture, called Scaled Neural Multiplicative Model (SNMM). This architecture was designed with two main objectives in mind: first, the model can be fitted properly to reflect actual sales data, even though this data tends to be scarce and sparse. Second, the model is ...
In order to solve the issue of generic responses generated by the neural dialogue systems because of one-to-many mapping phenomenon, the authors of the paper studied the state-of-the-art methods including the methods for training time and reference time, the application of the standard EM, Soft-EM, Hard EM and etc. In ...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: In order to solve the issue of generic responses generated by the neural dialogue systems because of one-to-many mapping phenomenon, the authors of the paper studied the state-of-the-art methods including the methods for training time and reference time, the application of the standard EM, Soft-EM, Hard EM and ...
Well known problem by now is the non-iidness of the client data causes degradations in FL trained models. The paper proposes FedFA, federated feature augmentation to address feature shift in clients data. FedFA exploits instance based statistics to augment local features to curb the introduction of novel domains becaus...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: Well known problem by now is the non-iidness of the client data causes degradations in FL trained models. The paper proposes FedFA, federated feature augmentation to address feature shift in clients data. FedFA exploits instance based statistics to augment local features to curb the introduction of novel domain...
This paper edits images with the guidance of a modified scene graph. Building on image deep prior, this paper takes the foreground and background separation into account for better synthesis quality. Experiments on CLEVR and visual genome illustrate the performance of the proposed method. **Strength** - This paper make...
Recommendation: 3: reject, not good enough
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper edits images with the guidance of a modified scene graph. Building on image deep prior, this paper takes the foreground and background separation into account for better synthesis quality. Experiments on CLEVR and visual genome illustrate the performance of the proposed method. **Strength** - This pa...
This paper presents a careful evaluation of on of the widely used metrics in the generative models literature; Fréchet Inception Distance (FID). The experiments demonstrates and equivalence between the feature of Inception V3 module space in which FID is computed and the logits. That is, FID is mainly sensitive towards...
Recommendation: 5: marginally below the acceptance threshold
Area: Generative models
Review: This paper presents a careful evaluation of on of the widely used metrics in the generative models literature; Fréchet Inception Distance (FID). The experiments demonstrates and equivalence between the feature of Inception V3 module space in which FID is computed and the logits. That is, FID is mainly sensitive...
This paper studies whether adversarially robust models will provide algorithmic recourses with higher costs than normal models. Evidently, the prediction of adversarially robust models is more robust than normal models under input perturbations, so changing the prediction will take a higher cost. The authors present a ...
Recommendation: 3: reject, not good enough
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper studies whether adversarially robust models will provide algorithmic recourses with higher costs than normal models. Evidently, the prediction of adversarially robust models is more robust than normal models under input perturbations, so changing the prediction will take a higher cost. The authors pr...