review
stringlengths
5
16.6k
score
stringclasses
5 values
area
stringclasses
12 values
text
stringlengths
31
5.65k
This paper proposes PointDP, an adversarial purification method that leverages a diffusion model as a pre-processing module to defend against 3D adversary attacks for point clouds. PointDP consists of two components (1) an off-the-shelf 3D point cloud diffusion model and (2) a classifier. Given an input point cloud, P...
Recommendation: 6: marginally above the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper proposes PointDP, an adversarial purification method that leverages a diffusion model as a pre-processing module to defend against 3D adversary attacks for point clouds. PointDP consists of two components (1) an off-the-shelf 3D point cloud diffusion model and (2) a classifier. Given an input point ...
This paper proposes MEGA, a method for combining exponential moving average (EMA) with attention. The paper evaluates MEGA on a number of benchmark datasets for sequence modeling and finds positive results. + Improvement over S4 on a number of tasks, including language modeling. + Extensive experiments and hyperparamet...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposes MEGA, a method for combining exponential moving average (EMA) with attention. The paper evaluates MEGA on a number of benchmark datasets for sequence modeling and finds positive results. + Improvement over S4 on a number of tasks, including language modeling. + Extensive experiments and hype...
This paper studies safety in reinforcement learning. The goal is to maximize return while keeping the cost of visiting unsafe state-action pairs below a threshold. The paper proposes learning a classifier $F_\theta(s, a)$ that predicts whether a given state action $(s, a)$ will lead to eventually visiting an unsafe sta...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper studies safety in reinforcement learning. The goal is to maximize return while keeping the cost of visiting unsafe state-action pairs below a threshold. The paper proposes learning a classifier $F_\theta(s, a)$ that predicts whether a given state action $(s, a)$ will lead to eventually visiting an un...
The paper studies the problem of aggregating clusterings of a set of data points. This is a well-studied problem in we are given a collection of clusterings of a given dataset and the goal is to produce a new clustering that is "close" to the given ones. The problem is non-trivial because clusterings remain the same e...
Recommendation: 6: marginally above the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: The paper studies the problem of aggregating clusterings of a set of data points. This is a well-studied problem in we are given a collection of clusterings of a given dataset and the goal is to produce a new clustering that is "close" to the given ones. The problem is non-trivial because clusterings remain th...
This paper proposes a method that evaluates counterfactuals. The method does not focus on the algorithm (or models) for the inference of counterfactuals but on properties the inferred outputs must obey. Based on Pearl’s axiomatic definition of counterfactuals, the authors propose to check three properties: Effectivene...
Recommendation: 8: accept, good paper
Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes)
Review: This paper proposes a method that evaluates counterfactuals. The method does not focus on the algorithm (or models) for the inference of counterfactuals but on properties the inferred outputs must obey. Based on Pearl’s axiomatic definition of counterfactuals, the authors propose to check three properties: Eff...
The paper proposes an optimization-based framework with influence functions for subset selection (or dataset pruning). The authors show in certain cases that the influence based method can be used to prune large datasets with only a small increase in the generalization error. From a practical point of view, this framew...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: The paper proposes an optimization-based framework with influence functions for subset selection (or dataset pruning). The authors show in certain cases that the influence based method can be used to prune large datasets with only a small increase in the generalization error. From a practical point of view, thi...
This paper tackles the problem of 'Unified Open-Set Recognition' (UOSR), a variant of open-set recognition (OSR) which also considers how to deal with misclassified closed-set test samples. Concretely, the closed-set test samples are split into InW and InC (wrongly and correctly classified samples respectively), and th...
Recommendation: 8: accept, good paper
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper tackles the problem of 'Unified Open-Set Recognition' (UOSR), a variant of open-set recognition (OSR) which also considers how to deal with misclassified closed-set test samples. Concretely, the closed-set test samples are split into InW and InC (wrongly and correctly classified samples respectively)...
In this work, the authors take a finite-time analysis approach to quantify the impact of approximation errors on the learning performance ofWarm-Start A-C method with a given prior policy. By delving into the intricate coupling between the updates of the Actor and the Critic, the paper first provides upper bounds on th...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: In this work, the authors take a finite-time analysis approach to quantify the impact of approximation errors on the learning performance ofWarm-Start A-C method with a given prior policy. By delving into the intricate coupling between the updates of the Actor and the Critic, the paper first provides upper boun...
Summary: - Existing large language models (LLMs) require manual exemplars to acquire procedural planning knowledge in the zero-shot setting. - The paper proposed a neuro-symbolic procedural PLANner (PLAN) with commonsense-infused prompts elicited from an external knowledge base (i.e., ConceptNet) to solve the pure-la...
Recommendation: 8: accept, good paper
Area: Applications (eg, speech processing, computer vision, NLP)
Review: Summary: - Existing large language models (LLMs) require manual exemplars to acquire procedural planning knowledge in the zero-shot setting. - The paper proposed a neuro-symbolic procedural PLANner (PLAN) with commonsense-infused prompts elicited from an external knowledge base (i.e., ConceptNet) to solve the...
The authors proposed Graphsensor, a graph attention network that generates signal segments and learns their internal relationships through a multi-head approach. Their model has 56% of the model parameters compared with the best multi-head baseline while producing a 13.8% improvement in accuracy compared with the best ...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: The authors proposed Graphsensor, a graph attention network that generates signal segments and learns their internal relationships through a multi-head approach. Their model has 56% of the model parameters compared with the best multi-head baseline while producing a 13.8% improvement in accuracy compared with t...
Long-tail distribution of items is an important factor which affects the user’s experience in industrial search systems, recommendation systems, and so on. This submission tries to address the training-inference inconsistency due to the long-tail distribution. Concretely, the authors comprise a relatively large-scale o...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: Long-tail distribution of items is an important factor which affects the user’s experience in industrial search systems, recommendation systems, and so on. This submission tries to address the training-inference inconsistency due to the long-tail distribution. Concretely, the authors comprise a relatively large...
In this paper, the authors investigate the problem of self-supervised pre-training on compact networks. They study the impact of view sampling strategy and design a strategy which can boost the SSL pretraining performance without knowledge distillation. The developed method consistently shows improvement on different c...
Recommendation: 5: marginally below the acceptance threshold
Area: Unsupervised and Self-supervised learning
Review: In this paper, the authors investigate the problem of self-supervised pre-training on compact networks. They study the impact of view sampling strategy and design a strategy which can boost the SSL pretraining performance without knowledge distillation. The developed method consistently shows improvement on dif...
This paper proposes a method combining autoencoders and Bi-LSTM layers to predict the remaining useful life of physical equipments. The author argues that besides promising approaches, traditional ML methods cannot extract sufficient information from the equipment data and they need manual specialist inputs to obtain c...
Recommendation: 3: reject, not good enough
Area: General Machine Learning
Review: This paper proposes a method combining autoencoders and Bi-LSTM layers to predict the remaining useful life of physical equipments. The author argues that besides promising approaches, traditional ML methods cannot extract sufficient information from the equipment data and they need manual specialist inputs to ...
This paper aims to design a rationalization method based on causal inference. To achieve this goal, the authors first analyze the potential confounder underlined the input and output. Such latent confounder may influence the relation between the input and the rational as well as the rational and the output. To alleviat...
Recommendation: 3: reject, not good enough
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper aims to design a rationalization method based on causal inference. To achieve this goal, the authors first analyze the potential confounder underlined the input and output. Such latent confounder may influence the relation between the input and the rational as well as the rational and the output. To ...
This paper presents a method named Debiased Fully Test-time Adaptation (DELTA) to address the biased issue in test-time adaptation. Specifically, the authors conduct experiments to verify the claims that 1) the normalization statistics tend to fit the current test mini-batch, and 2) the test-time adaptation optimizatio...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper presents a method named Debiased Fully Test-time Adaptation (DELTA) to address the biased issue in test-time adaptation. Specifically, the authors conduct experiments to verify the claims that 1) the normalization statistics tend to fit the current test mini-batch, and 2) the test-time adaptation opt...
This paper proposes a method MaskFusion that can be incorporated into existing deep CTR models for enhancing prediction performance. This idea is to multiply input feature embeddings with mask vectors, and then concatenate them with each DNN layer in deep CTR models. The mask vectors are dependent on the input featu...
Recommendation: 8: accept, good paper
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper proposes a method MaskFusion that can be incorporated into existing deep CTR models for enhancing prediction performance. This idea is to multiply input feature embeddings with mask vectors, and then concatenate them with each DNN layer in deep CTR models. The mask vectors are dependent on the inp...
This paper introduces a scalable and privacy-enhanced graph generative model to learn and reproduce the distribution of real-world graphs with node attributes/labels. The proposed model satisfies benchmark effectiveness, scalability and privacy guarantee. **Strength** - The proposed graph generative model fills the g...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper introduces a scalable and privacy-enhanced graph generative model to learn and reproduce the distribution of real-world graphs with node attributes/labels. The proposed model satisfies benchmark effectiveness, scalability and privacy guarantee. **Strength** - The proposed graph generative model fil...
This paper proposes a benchmarking framework for class-out-of-distribution detection with various levels of detection difficulty. This work benchmarks this technique's application to ImageNet with 525 publicly available pre-trained ImageNet-1K classifiers. Based on this benchmark, the authors identify several trends in...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: This paper proposes a benchmarking framework for class-out-of-distribution detection with various levels of detection difficulty. This work benchmarks this technique's application to ImageNet with 525 publicly available pre-trained ImageNet-1K classifiers. Based on this benchmark, the authors identify several t...
In this work, the authors propose to forecast irregular time series using state-space model whose dynamics is specified by a linear ODE. The proposed method meets several desirable properties to time series forecast such as self-consistency, forward stability and allowing for missing values. The experiments show the pr...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: In this work, the authors propose to forecast irregular time series using state-space model whose dynamics is specified by a linear ODE. The proposed method meets several desirable properties to time series forecast such as self-consistency, forward stability and allowing for missing values. The experiments sho...
This paper studies constrained decentralized bilevel optimization where the inner-loop problem is finite-sum, smooth and strongly convex, and the outer-loop problem is finite-sum, smooth and nonconvex. By combing (a) gradient tracking, (b) variance reduction and (c) a pseudo-gradient trick based on proximal operator, ...
Recommendation: 6: marginally above the acceptance threshold
Area: Optimization (eg, convex and non-convex optimization)
Review: This paper studies constrained decentralized bilevel optimization where the inner-loop problem is finite-sum, smooth and strongly convex, and the outer-loop problem is finite-sum, smooth and nonconvex. By combing (a) gradient tracking, (b) variance reduction and (c) a pseudo-gradient trick based on proximal op...
This paper proposes a method to learn predictors that are invariant under counterfactual changes of certain covariates. The proposed method adds a model-agnostic regularization term based on the notion of conditional independence and kernel mean embeddings, to enforce the so called "counterfactual invariance" during tr...
Recommendation: 5: marginally below the acceptance threshold
Area: General Machine Learning
Review: This paper proposes a method to learn predictors that are invariant under counterfactual changes of certain covariates. The proposed method adds a model-agnostic regularization term based on the notion of conditional independence and kernel mean embeddings, to enforce the so called "counterfactual invariance" d...
This paper considers the problem of fair classification by post-processing the decisions of an existing (possibly unfair) classifier. The authors focus on two metrics — equality of opportunity and equalized odds. The main idea is to set the decision threshold appropriately based on the protected group and true outcome...
Recommendation: 3: reject, not good enough
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper considers the problem of fair classification by post-processing the decisions of an existing (possibly unfair) classifier. The authors focus on two metrics — equality of opportunity and equalized odds. The main idea is to set the decision threshold appropriately based on the protected group and true...
This paper extends existing transformer-based autoregressive indoor scene synthesis method by introducing a new conditioning mechanism that allow the input sequence to contain, at any location, an arbitrary number of masked tokens, whose values are to be predicted. Three set of positional encodings are introduced to en...
Recommendation: 6: marginally above the acceptance threshold
Area: Generative models
Review: This paper extends existing transformer-based autoregressive indoor scene synthesis method by introducing a new conditioning mechanism that allow the input sequence to contain, at any location, an arbitrary number of masked tokens, whose values are to be predicted. Three set of positional encodings are introduc...
This paper proposed a novel hybrid design where an edge-device selectively queries the cloud only on those hard instances that the cloud can classify correctly to optimize accuracy under latency and edge-device constraints. An end-to-end method to train neural architectures, base predictors, and routing models is also ...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposed a novel hybrid design where an edge-device selectively queries the cloud only on those hard instances that the cloud can classify correctly to optimize accuracy under latency and edge-device constraints. An end-to-end method to train neural architectures, base predictors, and routing models ...
This paper proposes a framework based on some existing works to incorporate gene regulatory networks (Garcia-Alonso et al., 2019), protein-protein interaction (Chereda et al., 2021) networks, protein-pathway networks (Elmarakeby et al., 2021), and relations among genes, proteins, and pathways for biological discoveries...
Recommendation: 6: marginally above the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: This paper proposes a framework based on some existing works to incorporate gene regulatory networks (Garcia-Alonso et al., 2019), protein-protein interaction (Chereda et al., 2021) networks, protein-pathway networks (Elmarakeby et al., 2021), and relations among genes, proteins, and pathways for biological dis...
In this paper, the authors proposed to use relaxed attention in both self attention and cross attention part of transformer models. In details, the authors proposed to add a smoothing term on the cross attention module with a fuzzy realaxation coefficient drawn from a Gaussian distribution. Extensive experiments were d...
Recommendation: 5: marginally below the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: In this paper, the authors proposed to use relaxed attention in both self attention and cross attention part of transformer models. In details, the authors proposed to add a smoothing term on the cross attention module with a fuzzy realaxation coefficient drawn from a Gaussian distribution. Extensive experiment...
This paper raises a gap in current OOD detection approaches that rely too heavily on the training examples, and falsely mark images out of the train set but with similar semantic meaning. The authors coin the term "intended distribution" to capture both the training set, but also the rest of the "semantically similar...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper raises a gap in current OOD detection approaches that rely too heavily on the training examples, and falsely mark images out of the train set but with similar semantic meaning. The authors coin the term "intended distribution" to capture both the training set, but also the rest of the "semantically...
Studies link prediction for hyper-relational knowledge graphs (in which edges are associated with have attribute/entity pairs). Transforms the hyper-relational KG into a standard KG using reification, then runs a relational GNN for link prediction. Strengths: S1. Simple approach (but see W1). S2. Good experimental r...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: Studies link prediction for hyper-relational knowledge graphs (in which edges are associated with have attribute/entity pairs). Transforms the hyper-relational KG into a standard KG using reification, then runs a relational GNN for link prediction. Strengths: S1. Simple approach (but see W1). S2. Good experi...
This paper studies the problem of how overparametrization affects the ERM's performance on minority groups theoretically. To be more specific, this paper theoretically shows that under the overparametrazation condition and ERM algorithm, the minority groups will tend to have worse performance on the regression tasks, a...
Recommendation: 3: reject, not good enough
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: This paper studies the problem of how overparametrization affects the ERM's performance on minority groups theoretically. To be more specific, this paper theoretically shows that under the overparametrazation condition and ERM algorithm, the minority groups will tend to have worse performance on the regression ...
This paper proposes to model the evolution of latent variables in continuous time models as the solution of first-order partial differential equations. The authors builds upon the method of characteristics for solving PDEs and show that their approach provides both theoretical and practical advantages. In particular, t...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposes to model the evolution of latent variables in continuous time models as the solution of first-order partial differential equations. The authors builds upon the method of characteristics for solving PDEs and show that their approach provides both theoretical and practical advantages. In parti...
This paper proposes instance-reweighted adversarial training (IRAT) which weighs the instances based on the suggested standard in the adversarial loss term. This paper suggests the margin-based standard which weighs more when the instance is near the decision boundary. While the previous margin-based instance-reweighte...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This paper proposes instance-reweighted adversarial training (IRAT) which weighs the instances based on the suggested standard in the adversarial loss term. This paper suggests the margin-based standard which weighs more when the instance is near the decision boundary. While the previous margin-based instance-r...
In this paper, the authors propose a new approach for solving PDEs using non-equispaced Fourier Neural Operators. The authors draw some analogs between vision mixer models and FNO and then build over it to obtain the non-equispaced FNO. For the non-equispaced FNO, the authors use a non-equispaced interpolation function...
Recommendation: 5: marginally below the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: In this paper, the authors propose a new approach for solving PDEs using non-equispaced Fourier Neural Operators. The authors draw some analogs between vision mixer models and FNO and then build over it to obtain the non-equispaced FNO. For the non-equispaced FNO, the authors use a non-equispaced interpolation ...
Aiming at the problems of the aggregations of target deviated neighbors on dynamic graphs (the authors call it topology-task discordance), this paper revisits node-wise relationships based on a dynamic homophily theory from the spatial-temporal perspectives, and proposes a model GReTo consisting of two stages, signed t...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: Aiming at the problems of the aggregations of target deviated neighbors on dynamic graphs (the authors call it topology-task discordance), this paper revisits node-wise relationships based on a dynamic homophily theory from the spatial-temporal perspectives, and proposes a model GReTo consisting of two stages, ...
When the distribution gap between the source domain and the target domain is very large, some intermediate domains are usually used to make the model gradually adapt to the target domain. The author proposes the GOTA method to generate intermediate domains based on Wasserstein geodesic. Empirically, this GOAT framework...
Recommendation: 3: reject, not good enough
Area: General Machine Learning
Review: When the distribution gap between the source domain and the target domain is very large, some intermediate domains are usually used to make the model gradually adapt to the target domain. The author proposes the GOTA method to generate intermediate domains based on Wasserstein geodesic. Empirically, this GOAT f...
This work propose a simple and novel self-supervised learning framework for time series representation learning. Instead of using contrastive representation learning, this work directly follow the masked data modeling and optimize the reconstruction loss of the randomly masked data points. Empirical studies on real-wor...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This work propose a simple and novel self-supervised learning framework for time series representation learning. Instead of using contrastive representation learning, this work directly follow the masked data modeling and optimize the reconstruction loss of the randomly masked data points. Empirical studies on ...
The paper proposes a method to model dynamical systems in a latent space in a smooth way. To go back and forth from the latent space, a decoder (called "ansatz") and an encoder network are used, that are task dependent. One first trick proposed in the paper is to propose some cyclic consistency for this encoder decoder...
Recommendation: 8: accept, good paper
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: The paper proposes a method to model dynamical systems in a latent space in a smooth way. To go back and forth from the latent space, a decoder (called "ansatz") and an encoder network are used, that are task dependent. One first trick proposed in the paper is to propose some cyclic consistency for this encoder...
This paper proposed two improvements over the baseline model PESNet. The first one, PlaNet, use the local energy computed in each PESNET training step to train a surrogate model, which takes in the geometry of nucleus and output final energy, namely no dependence on electrons. At inference time, only the surrogate mode...
Recommendation: 8: accept, good paper
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: This paper proposed two improvements over the baseline model PESNet. The first one, PlaNet, use the local energy computed in each PESNET training step to train a surrogate model, which takes in the geometry of nucleus and output final energy, namely no dependence on electrons. At inference time, only the surrog...
The paper studies transfer learning in multi-agent setting, where existing works based on graph neural networks or attention mechanisms achieves generalization across tasks implicitly through the generalization of neural network function approximations. The authors propose to explicitly model the task relationships by ...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The paper studies transfer learning in multi-agent setting, where existing works based on graph neural networks or attention mechanisms achieves generalization across tasks implicitly through the generalization of neural network function approximations. The authors propose to explicitly model the task relations...
This work proves regret bounds for multi-arm bandit under distributed pure DP and RDP only using discrete noise. The theoretical results are verified by experiments. Strength - This work fills in the gap for distributed pure DP in previous works and the result is tight (matches the central DP lower bound) - The RDP upp...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This work proves regret bounds for multi-arm bandit under distributed pure DP and RDP only using discrete noise. The theoretical results are verified by experiments. Strength - This work fills in the gap for distributed pure DP in previous works and the result is tight (matches the central DP lower bound) - The...
The authors study how to learn an effective global model on private and decentralized datasets. Toward this end, the authors propose to use consensus graph to fuse feature representations for a final prediction. The experimental results on four real-life datasets are used to validate the effectiveness of the proposed f...
Recommendation: 5: marginally below the acceptance threshold
Area: General Machine Learning
Review: The authors study how to learn an effective global model on private and decentralized datasets. Toward this end, the authors propose to use consensus graph to fuse feature representations for a final prediction. The experimental results on four real-life datasets are used to validate the effectiveness of the pr...
This paper is concerned with gradient descent beyond the so-called Edge of Stability (EoS). That is, the step size is large than what standard theory would suggest (using the Lipschitz constant of the loss function). The EoS is interesting to the (theoretical) deep learning community because very often neural networks...
Recommendation: 5: marginally below the acceptance threshold
Area: Optimization (eg, convex and non-convex optimization)
Review: This paper is concerned with gradient descent beyond the so-called Edge of Stability (EoS). That is, the step size is large than what standard theory would suggest (using the Lipschitz constant of the loss function). The EoS is interesting to the (theoretical) deep learning community because very often neural ...
This paper focuses on exploration of transfer learning in diffusion models, technically, they propose an Attention-NonLinear (ANL) module to facilitate the conditioning process of CLIP embedding. To avoid the diffusion model overfits into the clip embedding of the images, they also generated an approximate clip embeddi...
Recommendation: 5: marginally below the acceptance threshold
Area: Generative models
Review: This paper focuses on exploration of transfer learning in diffusion models, technically, they propose an Attention-NonLinear (ANL) module to facilitate the conditioning process of CLIP embedding. To avoid the diffusion model overfits into the clip embedding of the images, they also generated an approximate clip...
The paper proposes a new algorithm over a baseline like SAC with 2 main modifications: a) adaptively learn a weight that balances between 2 critics and controls how the Q target value is computed b) adaptively learn a temperature for max entropy exploration. The authors claim the proposed method can better balance th...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The paper proposes a new algorithm over a baseline like SAC with 2 main modifications: a) adaptively learn a weight that balances between 2 critics and controls how the Q target value is computed b) adaptively learn a temperature for max entropy exploration. The authors claim the proposed method can better ba...
This paper proposes to select some graph data to improve the pre-training of GNNs. Existing works use all data to conduct pre-training, and it is observed that more data does not necessarily leads to better accuracy. The authors propose to use prediction uncertainty and graph properties to select data for training. Emp...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This paper proposes to select some graph data to improve the pre-training of GNNs. Existing works use all data to conduct pre-training, and it is observed that more data does not necessarily leads to better accuracy. The authors propose to use prediction uncertainty and graph properties to select data for train...
The application of plain ViT on dense prediction tasks suffers from unacceptable complexity. The paper proposes an injection adapter with multi-scale features to use a well-pretrained ViT model and transfer it to downstream task. The experiments are conducted on object detection, instance segmentation, and semantic seg...
Recommendation: 8: accept, good paper
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The application of plain ViT on dense prediction tasks suffers from unacceptable complexity. The paper proposes an injection adapter with multi-scale features to use a well-pretrained ViT model and transfer it to downstream task. The experiments are conducted on object detection, instance segmentation, and sema...
This paper investigates multiple hypotheses regarding the use of object-centric representations (OCRs) for reinforcement learning. Specifically, they consider object-centric representations that are pre-trained using unlabeled interaction data in the environment before being frozen for use in RL. The hypotheses are tha...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper investigates multiple hypotheses regarding the use of object-centric representations (OCRs) for reinforcement learning. Specifically, they consider object-centric representations that are pre-trained using unlabeled interaction data in the environment before being frozen for use in RL. The hypotheses...
This paper investigates curriculum learning for graph neural networks (GNNs), aiming at selecting the most important edges in a graph for GNN training. The authors formalize the task as an optimization problem, which has a node-level predictive loss and a structural-penalty loss. A proximal algorithm is proposed for op...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper investigates curriculum learning for graph neural networks (GNNs), aiming at selecting the most important edges in a graph for GNN training. The authors formalize the task as an optimization problem, which has a node-level predictive loss and a structural-penalty loss. A proximal algorithm is propose...
This paper presents an approach to improve the training performance and overall quality of the recently introduced text-to-image generative framework. By leveraging a kNN-based retrieval method, the proposed method 1) adds more flexibility to the training data, 2) greatly reduces the computational cost. Extensive exper...
Recommendation: 5: marginally below the acceptance threshold
Area: Generative models
Review: This paper presents an approach to improve the training performance and overall quality of the recently introduced text-to-image generative framework. By leveraging a kNN-based retrieval method, the proposed method 1) adds more flexibility to the training data, 2) greatly reduces the computational cost. Extensi...
This paper proposes a new perspective of looking at backdoor attacks as features rather than outliers. It states that backdoor attacks are impossible to detect from natural features without structural information on training data distribution. It also assumes that a backdoor attack is the strongest feature and designs ...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This paper proposes a new perspective of looking at backdoor attacks as features rather than outliers. It states that backdoor attacks are impossible to detect from natural features without structural information on training data distribution. It also assumes that a backdoor attack is the strongest feature and ...
The paper studies adversarial attacks in RL. Unlike previous work, the paper considers adversarial attacks that append messages to the victim state observation. In the attack model, the attacker has very limited knowledge and the attacks don't intervene the the system dynamics, rewards, and remain deterministic during ...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The paper studies adversarial attacks in RL. Unlike previous work, the paper considers adversarial attacks that append messages to the victim state observation. In the attack model, the attacker has very limited knowledge and the attacks don't intervene the the system dynamics, rewards, and remain deterministic...
This paper proposes using a neural network to iteratively repair sequential circuits represented as And Inverter Graphs (AIGs) against temporal logic specifications. The architecture is a variation of a transformed that separately takes as input the circuit and the specification. The specification is also separated int...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper proposes using a neural network to iteratively repair sequential circuits represented as And Inverter Graphs (AIGs) against temporal logic specifications. The architecture is a variation of a transformed that separately takes as input the circuit and the specification. The specification is also separ...
This paper proposed a simple joint Gaussian mixture model to generate post-hoc model explanations for DCNN. Essentially the authors use two GMMs to model the higher and lower features Y and X, with a projection matrix Q connecting the component probabilities from these two GMMs. Experiments demonstrated the proposed me...
Recommendation: 3: reject, not good enough
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper proposed a simple joint Gaussian mixture model to generate post-hoc model explanations for DCNN. Essentially the authors use two GMMs to model the higher and lower features Y and X, with a projection matrix Q connecting the component probabilities from these two GMMs. Experiments demonstrated the pro...
This paper aims to improve existing automated vulnerability repair problem by considering the prediction of precise parts of vulnerable code. By making an analogy to object detection problem in computer vision, they introduce the concept of vulnerability query counter to object query and adopt cross-attention mechanism...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This paper aims to improve existing automated vulnerability repair problem by considering the prediction of precise parts of vulnerable code. By making an analogy to object detection problem in computer vision, they introduce the concept of vulnerability query counter to object query and adopt cross-attention m...
This paper focuses on multitasking ability in reinforcement learning (RL). To do so, a multi-task learning framework, Neural Pathway Framework (NPF), is proposed by simultaneously training multiple specialized pathways where each pathway corresponds to a task. Finally, experiments were conducted on several continuous c...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper focuses on multitasking ability in reinforcement learning (RL). To do so, a multi-task learning framework, Neural Pathway Framework (NPF), is proposed by simultaneously training multiple specialized pathways where each pathway corresponds to a task. Finally, experiments were conducted on several cont...
The paper extends the Fourier neural operator to non-equispaced setting. It adds interpolation layers at the beginning and the end of FNO. Numerically, the proposed NFS model is more flexible than FNO, while more efficient than graph-based method. Strength: the work is well-motivated and clearly written. It has a compl...
Recommendation: 6: marginally above the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: The paper extends the Fourier neural operator to non-equispaced setting. It adds interpolation layers at the beginning and the end of FNO. Numerically, the proposed NFS model is more flexible than FNO, while more efficient than graph-based method. Strength: the work is well-motivated and clearly written. It has...
The paper studies how modern LLMs perform when given ambiguous task examples. The model must learn to infer the task from the examples, vs having a clear task with ambiguous inputs. The paper introduces a dataset, AmbiBench, designed to measure how well models use the instrutions/few-shot examples to infer underlying ...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The paper studies how modern LLMs perform when given ambiguous task examples. The model must learn to infer the task from the examples, vs having a clear task with ambiguous inputs. The paper introduces a dataset, AmbiBench, designed to measure how well models use the instrutions/few-shot examples to infer und...
The authors propose a sign-based metric for comparing the structure of two sparse subnetworks, in order to understand the importance of signs in Winning Tickets (Lottery Tickets). Using two different metrics, one that is "sign-aware", they compare the distances between Winning Tickets and "random tickets", which are in...
Recommendation: 1: strong reject
Area: Deep Learning and representational learning
Review: The authors propose a sign-based metric for comparing the structure of two sparse subnetworks, in order to understand the importance of signs in Winning Tickets (Lottery Tickets). Using two different metrics, one that is "sign-aware", they compare the distances between Winning Tickets and "random tickets", whic...
This paper addresses the single positive labels problem in multi-label learning. A new loss function called leveraged asymmetric loss with disambiguation (LASD) is proposed, which is an improved version of the existing leveraged asymmetric loss (ASL) with an explicit pseudo label disambiguation. The proposed algorithm ...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper addresses the single positive labels problem in multi-label learning. A new loss function called leveraged asymmetric loss with disambiguation (LASD) is proposed, which is an improved version of the existing leveraged asymmetric loss (ASL) with an explicit pseudo label disambiguation. The proposed al...
The paper proposes a "drop-in" module and a loss function to compress the information codified in spectrograms for Audio classification tasks. The proposed module is based on standard 1D convolution layers, batch normalization, and residual connections. It can be used as an intermediate module between the input (Spectr...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The paper proposes a "drop-in" module and a loss function to compress the information codified in spectrograms for Audio classification tasks. The proposed module is based on standard 1D convolution layers, batch normalization, and residual connections. It can be used as an intermediate module between the input...
The paper proposes a new deep learning architecture for multi-horizon forecasting, which aims to improve temporal representation learning using a bespoke Irregularity Representation Block. Strengths --- Time series forecasting is a crucial problem across many application domains – with many datasets exhibiting level-t...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: The paper proposes a new deep learning architecture for multi-horizon forecasting, which aims to improve temporal representation learning using a bespoke Irregularity Representation Block. Strengths --- Time series forecasting is a crucial problem across many application domains – with many datasets exhibiting...
This paper investigates whether large language models can make causal judgments and reason about moral permissibility in text scenarios. Two new datasets are collected by aggregating stories from 24 cognitive science papers and standardizing the human annotations from the datasets accompanying these papers into ML-read...
Recommendation: 8: accept, good paper
Area: Neuroscience and Cognitive Science (e.g., neural coding, brain-computer interfaces)
Review: This paper investigates whether large language models can make causal judgments and reason about moral permissibility in text scenarios. Two new datasets are collected by aggregating stories from 24 cognitive science papers and standardizing the human annotations from the datasets accompanying these papers into...
This paper connects the DCI framework [1] for disentanglement to identifiability and proposes an extension of the framework that incorporates two new measures of representation quality which are explicitness (E) and size (S). ### Strengths 1) Overall, the writing of the paper is good ### Weaknesses 1) The novelty and...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper connects the DCI framework [1] for disentanglement to identifiability and proposes an extension of the framework that incorporates two new measures of representation quality which are explicitness (E) and size (S). ### Strengths 1) Overall, the writing of the paper is good ### Weaknesses 1) The nov...
This paper focuses on a practical aspect of diffusion-based generative models, i.e., training-free fast guided sampling of DDPM. It is a direct extension of the recently proposed fast unconditional sampler namely DPM-Solver. The authors identify the unstable sampling trajectory of DPM-Solver for guided sampling, and p...
Recommendation: 5: marginally below the acceptance threshold
Area: Generative models
Review: This paper focuses on a practical aspect of diffusion-based generative models, i.e., training-free fast guided sampling of DDPM. It is a direct extension of the recently proposed fast unconditional sampler namely DPM-Solver. The authors identify the unstable sampling trajectory of DPM-Solver for guided samplin...
This paper presents a novel training method for Spiking Neural Networks. Typically, the non-differentiability of the spiking neuron was by-passed with a differentiable approximation (e.g. the triangle function). However, each spike depends on two variables: the previous neuron's voltage, and a voltage threshold above w...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper presents a novel training method for Spiking Neural Networks. Typically, the non-differentiability of the spiking neuron was by-passed with a differentiable approximation (e.g. the triangle function). However, each spike depends on two variables: the previous neuron's voltage, and a voltage threshold...
This paper studies the problem of differentially private linear regression with potentially corrupted labels. To handle the corrupted labels, the authors proposed a new private adaptive clipping technique. The proposed method can deal with both privacy concerns and corrupted labels. The experiment results validate the ...
Recommendation: 5: marginally below the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper studies the problem of differentially private linear regression with potentially corrupted labels. To handle the corrupted labels, the authors proposed a new private adaptive clipping technique. The proposed method can deal with both privacy concerns and corrupted labels. The experiment results valid...
The authors frame the task of LM "detoxification" as an RL problem. They propose "rectification," which requires only access only to token probabilities from an LM API, rather than internal states. The method down-weights tokens that are likely to cause eventual toxic discourse, treating toxic generations probabilisti...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The authors frame the task of LM "detoxification" as an RL problem. They propose "rectification," which requires only access only to token probabilities from an LM API, rather than internal states. The method down-weights tokens that are likely to cause eventual toxic discourse, treating toxic generations prob...
This paper studies planning with language models (LM) using iterative energy minimization. The authors utilize a bidirectional LM with the masked language model (MLM) objective. The model is trained by optimizing for MLM using expert trajectories. For inference, they iteratively mask actions in a trajectory, including ...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper studies planning with language models (LM) using iterative energy minimization. The authors utilize a bidirectional LM with the masked language model (MLM) objective. The model is trained by optimizing for MLM using expert trajectories. For inference, they iteratively mask actions in a trajectory, in...
This paper identifies an issue in the Information Gain (IG) evaluation metric for neuronal population response prediction, whereby the upper bound 'oracle' likelihood estimate using a Point Estimate (PE) approach (i.e. using a point estimate for the parameters of some simple parameterised distribution like a zero-infla...
Recommendation: 6: marginally above the acceptance threshold
Area: Neuroscience and Cognitive Science (e.g., neural coding, brain-computer interfaces)
Review: This paper identifies an issue in the Information Gain (IG) evaluation metric for neuronal population response prediction, whereby the upper bound 'oracle' likelihood estimate using a Point Estimate (PE) approach (i.e. using a point estimate for the parameters of some simple parameterised distribution like a ze...
This paper uses existing theoretical results on the boundary measure of dimensional Voronoi cells of m<d+1 equal distance modes to show a bound of the precision of a m-mode GAN. Some empirical study is carried out to study the geometry of the latent space. However, the empirical result is not particularly well-connecte...
Recommendation: 6: marginally above the acceptance threshold
Area: Generative models
Review: This paper uses existing theoretical results on the boundary measure of dimensional Voronoi cells of m<d+1 equal distance modes to show a bound of the precision of a m-mode GAN. Some empirical study is carried out to study the geometry of the latent space. However, the empirical result is not particularly well-...
This paper considers the problem of semi-supervised binary classification of imbalanced data. It proposes a training method inspired by the GAN and evalutes using two text datasets. Strength - This paper considers a practically important problem setting for real-world applications. - This paper trying to take advantage...
Recommendation: 3: reject, not good enough
Area: General Machine Learning
Review: This paper considers the problem of semi-supervised binary classification of imbalanced data. It proposes a training method inspired by the GAN and evalutes using two text datasets. Strength - This paper considers a practically important problem setting for real-world applications. - This paper trying to take a...
In traditional causal inference, one often assumes access to the structured variables and the task is to discover causal relationships between them. In recent years, there has been a growing amount of interest to tackle the question when these variables themselves are unknown and this task is termed as "causal represen...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: In traditional causal inference, one often assumes access to the structured variables and the task is to discover causal relationships between them. In recent years, there has been a growing amount of interest to tackle the question when these variables themselves are unknown and this task is termed as "causal ...
The paper propose using Koopman operator to speed up the optimization of hybrid quantum computing algorithm. The motivation is gradient step in quantum computer takes many forward evaluations (linear in number of parameters). Using Koopman operator I the classical computing sense, to predict future optimal quantum mach...
Recommendation: 6: marginally above the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: The paper propose using Koopman operator to speed up the optimization of hybrid quantum computing algorithm. The motivation is gradient step in quantum computer takes many forward evaluations (linear in number of parameters). Using Koopman operator I the classical computing sense, to predict future optimal quan...
This paper proposes a new text-guided Diffusion-based style transfer method. The proposed method uses the CLIP loss for style guidance and the CUT loss for content guidance. The proposed method also uses the fine-tuning strategy according to the abstract and introduction (but I didn't find any words about it in the met...
Recommendation: 5: marginally below the acceptance threshold
Area: Generative models
Review: This paper proposes a new text-guided Diffusion-based style transfer method. The proposed method uses the CLIP loss for style guidance and the CUT loss for content guidance. The proposed method also uses the fine-tuning strategy according to the abstract and introduction (but I didn't find any words about it in...
# Summary At a high level, the paper in order can be summarized as: 1. Operations (e.g. crossover) in evolutionary algorithms over continuous search spaces, can be seen as specific matrix multiplications over a population of suggestions $X$. 2. This implies a form of learnability over these matrix multiplications, an...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: # Summary At a high level, the paper in order can be summarized as: 1. Operations (e.g. crossover) in evolutionary algorithms over continuous search spaces, can be seen as specific matrix multiplications over a population of suggestions $X$. 2. This implies a form of learnability over these matrix multiplicat...
This paper focuses on how to solve the generalization problem of realistic talking face video generation tasks with a landmark refinement module. They proposed GeneFace, a model that introduces additional 3DMM landmark refinement for a target person, thus transferring knowledge learned from a large corpus to out-of-dom...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper focuses on how to solve the generalization problem of realistic talking face video generation tasks with a landmark refinement module. They proposed GeneFace, a model that introduces additional 3DMM landmark refinement for a target person, thus transferring knowledge learned from a large corpus to ou...
This paper proposes a computationally efficient exact unlearning approach called GraphEditor on graph neural networks. The main challenge of unlearning on graph data is the interconnection between neighboring nodes makes elimination of influence from a given deleted node nontrivial. This paper considers a linearized GN...
Recommendation: 6: marginally above the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper proposes a computationally efficient exact unlearning approach called GraphEditor on graph neural networks. The main challenge of unlearning on graph data is the interconnection between neighboring nodes makes elimination of influence from a given deleted node nontrivial. This paper considers a linea...
This work proposes Robust Exploration via a Clustering-based Online Density Estimation (RECODE) algorithm. RECODE calculates an exploration bonus that any RL agent can use as an intrinsic reward signal to explore unknown environment areas. To compute intrinsic reward signal the visitation counts of observations is cons...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This work proposes Robust Exploration via a Clustering-based Online Density Estimation (RECODE) algorithm. RECODE calculates an exploration bonus that any RL agent can use as an intrinsic reward signal to explore unknown environment areas. To compute intrinsic reward signal the visitation counts of observations...
The authors of the paper have examined a selection of Large Language Models to determine whether their output can be assigned to various personality traits that have been internalized by the training data, and whether this assignment is also consistent within a model. For this purpose, they introduce the "OCEAN“-score,...
Recommendation: 6: marginally above the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The authors of the paper have examined a selection of Large Language Models to determine whether their output can be assigned to various personality traits that have been internalized by the training data, and whether this assignment is also consistent within a model. For this purpose, they introduce the "OCEAN...
This paper attempts to measure the conceptual consistency of the current large language models (LLMs) in question answering tasks of the sort exemplified in the CommonsenseQA (CSQA) dataset. Specifically, the authors focused on the consistency between an LLM's answers to binary (yes/no) questions regarding the existenc...
Recommendation: 3: reject, not good enough
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper attempts to measure the conceptual consistency of the current large language models (LLMs) in question answering tasks of the sort exemplified in the CommonsenseQA (CSQA) dataset. Specifically, the authors focused on the consistency between an LLM's answers to binary (yes/no) questions regarding the ...
The paper proposes a new dataset and knowledge graph for multimodal analogical reasoning. The knowledge graph (MarKG) is based on E-KAR and BATs, augmented by Wikidata and image search results from Google and Laion-5B. The dataset (MARS) is based on analogy relations in E-KAR and BATs; the task is that given two entit...
Recommendation: 5: marginally below the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The paper proposes a new dataset and knowledge graph for multimodal analogical reasoning. The knowledge graph (MarKG) is based on E-KAR and BATs, augmented by Wikidata and image search results from Google and Laion-5B. The dataset (MARS) is based on analogy relations in E-KAR and BATs; the task is that given t...
This paper presents an entity typing technique that uses geometric embeddings, and evaluates it on several data sets, achieving strong performance. Strengths The results in this paper are strong, over a number of data sets, and better handling of hierarchically-organized types in NER is an important task. Weaknesses ...
Recommendation: 3: reject, not good enough
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper presents an entity typing technique that uses geometric embeddings, and evaluates it on several data sets, achieving strong performance. Strengths The results in this paper are strong, over a number of data sets, and better handling of hierarchically-organized types in NER is an important task. Wea...
This paper targets a new setting of domain-free reverse engineering the attributes of black-box models (DREAM) and casts it as an out of distribution (OOD) generalization problem. In particular, a multi-discriminator generative adversarial network (MDGAN) is proposed to learn domain invariant features on the training d...
Recommendation: 3: reject, not good enough
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper targets a new setting of domain-free reverse engineering the attributes of black-box models (DREAM) and casts it as an out of distribution (OOD) generalization problem. In particular, a multi-discriminator generative adversarial network (MDGAN) is proposed to learn domain invariant features on the tr...
This work presents an interesting study of the effectiveness of existing object-hiding attack in autonomous driving from a system-level effects perspective. The authors proposed that the limitation of previous attacks is that they can only achieve successful attack for a particular targeted model such as object detecto...
Recommendation: 6: marginally above the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This work presents an interesting study of the effectiveness of existing object-hiding attack in autonomous driving from a system-level effects perspective. The authors proposed that the limitation of previous attacks is that they can only achieve successful attack for a particular targeted model such as object...
This manuscript proposes a novel symbolic physical learner (SPL) that extracts analytical formulas governing nonlinear dynamics from limited data. The SPL uses a Monte Carlo tree search (MCTS) agent to search for optimal expression trees based on data. The specific differences of the SPL with respect to previous studie...
Recommendation: 8: accept, good paper
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: This manuscript proposes a novel symbolic physical learner (SPL) that extracts analytical formulas governing nonlinear dynamics from limited data. The SPL uses a Monte Carlo tree search (MCTS) agent to search for optimal expression trees based on data. The specific differences of the SPL with respect to previou...
Authors propose a contrastive learning approach to learn conserved quantities of a dynamical system using an auxiliary neural network. The neural network learns through positive samples from the same trajectory of the dynamical system and negative samples from different trajectories. The conservation is enforced during...
Recommendation: 3: reject, not good enough
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: Authors propose a contrastive learning approach to learn conserved quantities of a dynamical system using an auxiliary neural network. The neural network learns through positive samples from the same trajectory of the dynamical system and negative samples from different trajectories. The conservation is enforce...
The paper presents a novel technique for the discovery and characterization of latent Gaussian linear structural causal models. It employs a Bayesian formulation of the problem and solve it in variational form. Finally it provides performance examples using synthetic data in a purely ideal case and a case of imaging fo...
Recommendation: 8: accept, good paper
Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes)
Review: The paper presents a novel technique for the discovery and characterization of latent Gaussian linear structural causal models. It employs a Bayesian formulation of the problem and solve it in variational form. Finally it provides performance examples using synthetic data in a purely ideal case and a case of im...
This paper combines Slot Attention with VQ-VAE (although in a stepwise training fashion) and shows results on CLEVR and on set prediction tasks. 1. The presentation of the model as 2 independent tasks and entirely different methods is not very helpful. I would have expected the model to be trained on image reconstruct...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This paper combines Slot Attention with VQ-VAE (although in a stepwise training fashion) and shows results on CLEVR and on set prediction tasks. 1. The presentation of the model as 2 independent tasks and entirely different methods is not very helpful. I would have expected the model to be trained on image rec...
This paper sheds light on discrepancies in results when using tf32: depending on the batch size used for inference (and training?), the same instance will give different results (as measured as logits, pixel values or loss depending on the setup). Strengths: - It seems like an interesting problem and I don’t think peop...
Recommendation: 1: strong reject
Area: Deep Learning and representational learning
Review: This paper sheds light on discrepancies in results when using tf32: depending on the batch size used for inference (and training?), the same instance will give different results (as measured as logits, pixel values or loss depending on the setup). Strengths: - It seems like an interesting problem and I don’t th...
This paper studies distribution-free multi-valid coverage in the batch setting. They provide two algorithms to achieve multi-valid coverage, which is a stronger notion than regular marginal coverage. In a brief summary, they design their algorithm based on a theoretical argument that patch operation such that a postpro...
Recommendation: 6: marginally above the acceptance threshold
Area: General Machine Learning
Review: This paper studies distribution-free multi-valid coverage in the batch setting. They provide two algorithms to achieve multi-valid coverage, which is a stronger notion than regular marginal coverage. In a brief summary, they design their algorithm based on a theoretical argument that patch operation such that a...
This work proposes Exphormer, a framework to improve the performance and scalability of graph transformers. Exphormer consists of three components, including expander graph attention, local neighborhood attention and global attention. The key innovation of this work is that Exphormer introduces expander graphs on graph...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This work proposes Exphormer, a framework to improve the performance and scalability of graph transformers. Exphormer consists of three components, including expander graph attention, local neighborhood attention and global attention. The key innovation of this work is that Exphormer introduces expander graphs ...
The paper proposes a federated domain translation approach that can mitigate conditional shift issues in federated learning tasks. The proposed translation model is empirically shown that it performs better than the state of the art FedStarGAN. The paper also shows that by combining FedINB with DIRT, regularization fro...
Recommendation: 6: marginally above the acceptance threshold
Area: Generative models
Review: The paper proposes a federated domain translation approach that can mitigate conditional shift issues in federated learning tasks. The proposed translation model is empirically shown that it performs better than the state of the art FedStarGAN. The paper also shows that by combining FedINB with DIRT, regulariza...
This paper studies the setting where supplemental synthetic data is used to augment the training sample and improve generalization. Specifically, authors focus on the adversarial setting where prediction errors consider worst case perturbations within a neighbourhood of test points. In particular, in a simplified setti...
Recommendation: 3: reject, not good enough
Area: Generative models
Review: This paper studies the setting where supplemental synthetic data is used to augment the training sample and improve generalization. Specifically, authors focus on the adversarial setting where prediction errors consider worst case perturbations within a neighbourhood of test points. In particular, in a simplifi...
This paper proposes to mitigate two limitations in the existing graph contrastive learning (GCL) frameworks: i) The lack of view diversity in data augmentation approaches degenerates the effectiveness of self-discriminative contrastive learning. ii) Existing methods utilize separated automated view generator and encode...
Recommendation: 3: reject, not good enough
Area: Unsupervised and Self-supervised learning
Review: This paper proposes to mitigate two limitations in the existing graph contrastive learning (GCL) frameworks: i) The lack of view diversity in data augmentation approaches degenerates the effectiveness of self-discriminative contrastive learning. ii) Existing methods utilize separated automated view generator an...
This paper suggests dynamic adversarial contrastive learning which gradually anneals from a strong augmentation to a weak augmentation. Further, the authors propose fast post-processing stage for adapting it to classification tasks which boost the robustness. From this simple and effective strategy, DynACL reduces the ...
Recommendation: 8: accept, good paper
Area: Unsupervised and Self-supervised learning
Review: This paper suggests dynamic adversarial contrastive learning which gradually anneals from a strong augmentation to a weak augmentation. Further, the authors propose fast post-processing stage for adapting it to classification tasks which boost the robustness. From this simple and effective strategy, DynACL redu...
This work studies video-text contrastive learning with the focus on learning the global temporal context over long videos. The authors propose a new contrastive learning method, TempCLR, which poses the pairwise distance as matching cost between text (sentences) and visual (clip) sequences, computed by dynamic time war...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This work studies video-text contrastive learning with the focus on learning the global temporal context over long videos. The authors propose a new contrastive learning method, TempCLR, which poses the pairwise distance as matching cost between text (sentences) and visual (clip) sequences, computed by dynamic ...
This paper proposes to enforce $\pi(a|s)$ close $\beta(a|s)$ to incorporate uncertainty at each state-action pair $(s,a)$ in enforcing $\pi(a|s)$ close the estimated behavior $\hat{\beta}(a|s)$ where the enforcement weight is controlled the uncertainty estimate $\hat{u}(s,a)$ (eq. 7). To compute uncertainty estimate $\...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper proposes to enforce $\pi(a|s)$ close $\beta(a|s)$ to incorporate uncertainty at each state-action pair $(s,a)$ in enforcing $\pi(a|s)$ close the estimated behavior $\hat{\beta}(a|s)$ where the enforcement weight is controlled the uncertainty estimate $\hat{u}(s,a)$ (eq. 7). To compute uncertainty est...
This work proposed a new Boundary Connectivity (BCXN) loss function to improve the accuracy and convergence speed of PINN. Specifically, it developed two variants of BCXN loss, namely: 1) a soft forcing method which imposes a linear approximation constraint via an additional loss term, and ii) a direct forcing approach...
Recommendation: 6: marginally above the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: This work proposed a new Boundary Connectivity (BCXN) loss function to improve the accuracy and convergence speed of PINN. Specifically, it developed two variants of BCXN loss, namely: 1) a soft forcing method which imposes a linear approximation constraint via an additional loss term, and ii) a direct forcing ...
This paper aims to construct approximate conditional coverage models using KNN (which approximates a transformer model). By firstly partitioning the data and then applying CP conditioned on the label and the partition they derive an algorithm which allows them to obtain approximate conditional coverage guarantees. Stre...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This paper aims to construct approximate conditional coverage models using KNN (which approximates a transformer model). By firstly partitioning the data and then applying CP conditioned on the label and the partition they derive an algorithm which allows them to obtain approximate conditional coverage guarante...
The authors deal with outlier detection on graphs. They start with the paper on InfoGraph "INFOGRAPH: UNSUPERVISED AND SEMI-SUPERVISED GRAPH-LEVEL REPRESENTATION LEARNING VIA MUTUAL INFORMATION MAXIMIZATION" by Sun et al , combined with SVDD, and propose two modifications. 1. DOHSC adds on top of infograph+SVDD a sing...
Recommendation: 6: marginally above the acceptance threshold
Area: General Machine Learning
Review: The authors deal with outlier detection on graphs. They start with the paper on InfoGraph "INFOGRAPH: UNSUPERVISED AND SEMI-SUPERVISED GRAPH-LEVEL REPRESENTATION LEARNING VIA MUTUAL INFORMATION MAXIMIZATION" by Sun et al , combined with SVDD, and propose two modifications. 1. DOHSC adds on top of infograph+SVD...
This paper considers node/operation scheduling within DAGs, which is previously solved using heuristics but more recently approached with ML-based solutions. ML techniques are typically more costly, but the authors employ a “one-shot” encoder networks to sample node priorities in a single forward pass of the network. T...
Recommendation: 8: accept, good paper
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper considers node/operation scheduling within DAGs, which is previously solved using heuristics but more recently approached with ML-based solutions. ML techniques are typically more costly, but the authors employ a “one-shot” encoder networks to sample node priorities in a single forward pass of the ne...