review
stringlengths
5
16.6k
score
stringclasses
5 values
area
stringclasses
12 values
text
stringlengths
31
5.65k
This paper considers community detection with unbalanced communities. Specifically, they consider the hypothesis testing problem on the degree-corrected block model, which is to distinguish whether a graph is generated from a null model with one community or an alternative model with unbalanced communities. They show...
Recommendation: 6: marginally above the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: This paper considers community detection with unbalanced communities. Specifically, they consider the hypothesis testing problem on the degree-corrected block model, which is to distinguish whether a graph is generated from a null model with one community or an alternative model with unbalanced communities. T...
This paper tackles the problem of training 3D generative models for portrait video generation with only 2D videos. In order to enforce temporal consistency and diverse motion, PV3D utilizes disentangled appearance and motion latent space. Extensive experiments demonstrate the effectiveness of the proposed approach. ## ...
Recommendation: 8: accept, good paper
Area: Generative models
Review: This paper tackles the problem of training 3D generative models for portrait video generation with only 2D videos. In order to enforce temporal consistency and diverse motion, PV3D utilizes disentangled appearance and motion latent space. Extensive experiments demonstrate the effectiveness of the proposed appro...
The paper at hand proposes a new inductive bias (in the form of a proxy reward) for MI-based unsupervised skill discovery. The reward is designed so that exploration is improved, in particular in environments with bottleneck states or non-trivial dynamics. This is turn motivated by the observation that MI-based methods...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The paper at hand proposes a new inductive bias (in the form of a proxy reward) for MI-based unsupervised skill discovery. The reward is designed so that exploration is improved, in particular in environments with bottleneck states or non-trivial dynamics. This is turn motivated by the observation that MI-based...
This paper studies the trainability of quantum neural networks (QNNs) with symmetric ansatzes and how to exploit the symmetry to improve the trainability of QNNs. More precisely, it provides a theoretical understanding of the better trainability of symmetric ansatz over asymmetric ansatz by proposing the effective quan...
Recommendation: 8: accept, good paper
Area: General Machine Learning
Review: This paper studies the trainability of quantum neural networks (QNNs) with symmetric ansatzes and how to exploit the symmetry to improve the trainability of QNNs. More precisely, it provides a theoretical understanding of the better trainability of symmetric ansatz over asymmetric ansatz by proposing the effect...
This paper empirically demonstrates that SGD learns single-hidden-layer neural networks with near-optimal sample complexity efficiently which matches the theoretical bound of an optimal learner in JV22, while according to theoretically lower bounds achieving the optimal sample complexity is intractable in the worst cas...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper empirically demonstrates that SGD learns single-hidden-layer neural networks with near-optimal sample complexity efficiently which matches the theoretical bound of an optimal learner in JV22, while according to theoretically lower bounds achieving the optimal sample complexity is intractable in the w...
The paper "WAVEFORMER: LINEAR-TIME ATTENTION WITH FORWARD AND BACKWARD WAVELET TRANSFORM" proposes integrating analysis- and synthesis-wavelet transforms into transformers. The main idea is to move attention computations into the wavelet domain, by framing the attention computation with a forward and backward wavelet ...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The paper "WAVEFORMER: LINEAR-TIME ATTENTION WITH FORWARD AND BACKWARD WAVELET TRANSFORM" proposes integrating analysis- and synthesis-wavelet transforms into transformers. The main idea is to move attention computations into the wavelet domain, by framing the attention computation with a forward and backward ...
This paper presents an MARL algorithm to adpatively handle the entropy regularization in multi-agent RL. In this method, the level of exploration of each agent is controlled by its time-varying target entropy, which severs as a constraint in the optimization problem. To determine a proper target entropy for each agent,...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper presents an MARL algorithm to adpatively handle the entropy regularization in multi-agent RL. In this method, the level of exploration of each agent is controlled by its time-varying target entropy, which severs as a constraint in the optimization problem. To determine a proper target entropy for eac...
The paper presents repeated distributionally robust optimization (RDRO), a theoretical framework that extends the performative prediction with distributionally robust optimization. The authors provide a convergence analysis of RDRO and empirically demonstrate its implications for fair ML. Strengths: 1. The paper is wel...
Recommendation: 5: marginally below the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The paper presents repeated distributionally robust optimization (RDRO), a theoretical framework that extends the performative prediction with distributionally robust optimization. The authors provide a convergence analysis of RDRO and empirically demonstrate its implications for fair ML. Strengths: 1. The pape...
This paper takes a particular view on safe reinforcement learning in the form of model-predictive control. In particular, the authors present an approach, called ‘guided safe shooting (GuSS), that combines model-based planning with RL, towards a minimal violation of safety. Technically, a constrained MDP approach is re...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper takes a particular view on safe reinforcement learning in the form of model-predictive control. In particular, the authors present an approach, called ‘guided safe shooting (GuSS), that combines model-based planning with RL, towards a minimal violation of safety. Technically, a constrained MDP approa...
The authors propose an attack on federated learning where a subset f clients are compromised. The problem is formulated as a game where both players use a no-regret learning algorothm to converge to the NE. The game is simulated, as the defender does not know the true updates of compromised clients. I am surprised that...
Recommendation: 5: marginally below the acceptance threshold
Area: General Machine Learning
Review: The authors propose an attack on federated learning where a subset f clients are compromised. The problem is formulated as a game where both players use a no-regret learning algorothm to converge to the NE. The game is simulated, as the defender does not know the true updates of compromised clients. I am surpri...
This paper presents an analysis of two self-supervised training methods for lightweight vision transformers. The methods are MAE (a masking method) and MoCoV3 (a contrastive method). It shows that although MAE appears stronger when training (w/o labels) and evaluating on ImageNet, the roles reverse on downstream tasks....
Recommendation: 6: marginally above the acceptance threshold
Area: Unsupervised and Self-supervised learning
Review: This paper presents an analysis of two self-supervised training methods for lightweight vision transformers. The methods are MAE (a masking method) and MoCoV3 (a contrastive method). It shows that although MAE appears stronger when training (w/o labels) and evaluating on ImageNet, the roles reverse on downstrea...
The authors proposed a new method (Rotamer Density Estimator): a flow-based generative model to estimate the probability distribution of conformation. The proposed Rotamer Density Estimator was evaluated on mutational effects for ddG (by using entropy of the probability distribution as the measure of flexibility). Str...
Recommendation: 5: marginally below the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: The authors proposed a new method (Rotamer Density Estimator): a flow-based generative model to estimate the probability distribution of conformation. The proposed Rotamer Density Estimator was evaluated on mutational effects for ddG (by using entropy of the probability distribution as the measure of flexibilit...
The paper studies the problem of privately releasing prefix sums in the adaptive continual release model via matrix factorization techniques. Their main results are 1.extension of prior work which was limited to single participation to general participation patterns and 2. a more efficient method based on fast Fourier ...
Recommendation: 5: marginally below the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The paper studies the problem of privately releasing prefix sums in the adaptive continual release model via matrix factorization techniques. Their main results are 1.extension of prior work which was limited to single participation to general participation patterns and 2. a more efficient method based on fast ...
This paper proposes a single-loop adaptive gradient-based algorithm for solving nonconvex-strongly-concave problem with provably efficiency. Previous works only consider directly applying adaptive update scheme to x and y separately thus break the time-scale separation rule which is vital for guaranteeing the convergen...
Recommendation: 8: accept, good paper
Area: Optimization (eg, convex and non-convex optimization)
Review: This paper proposes a single-loop adaptive gradient-based algorithm for solving nonconvex-strongly-concave problem with provably efficiency. Previous works only consider directly applying adaptive update scheme to x and y separately thus break the time-scale separation rule which is vital for guaranteeing the c...
The paper uses theoretical tools from harmonic analysis and noise stability to explain the effectiveness of data-models introduced by Ilyas et. al (2022). In addition, the same theoretical components are used to analyze group influence and identify conditions when first-order influence (linear in terms of training data...
Recommendation: 6: marginally above the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: The paper uses theoretical tools from harmonic analysis and noise stability to explain the effectiveness of data-models introduced by Ilyas et. al (2022). In addition, the same theoretical components are used to analyze group influence and identify conditions when first-order influence (linear in terms of train...
The paper proposes a new heuristic to estimate the accuracy of a given model for OOD test observations without labels. It uses the nuclear norm (i.e., the normalized sum of singular values) of the prediction matrix (i.e., a matrix of softmax outputs for the test data) of a given model. The measure is motivated by resul...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: The paper proposes a new heuristic to estimate the accuracy of a given model for OOD test observations without labels. It uses the nuclear norm (i.e., the normalized sum of singular values) of the prediction matrix (i.e., a matrix of softmax outputs for the test data) of a given model. The measure is motivated ...
In this paper, the authors introduce TabPFN. A transformer-based neural network for classification. Unlike traditional supervised approaches, the network is pre-trained to run classification on unseen datasets. This transformer approach, runs inference on input data to produce a classification result. However, this inp...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: In this paper, the authors introduce TabPFN. A transformer-based neural network for classification. Unlike traditional supervised approaches, the network is pre-trained to run classification on unseen datasets. This transformer approach, runs inference on input data to produce a classification result. However, ...
The paper proposes a context aware variational auto encoder which modified the structure of previous C-VAE. The evaluation is on synthetic data only. Strength: - the work touches a fundamental problem. Weakness: - Only synthetic experiments are conducted. - The VAE only tested with MLP. - The data generated is ...
Recommendation: 5: marginally below the acceptance threshold
Area: Unsupervised and Self-supervised learning
Review: The paper proposes a context aware variational auto encoder which modified the structure of previous C-VAE. The evaluation is on synthetic data only. Strength: - the work touches a fundamental problem. Weakness: - Only synthetic experiments are conducted. - The VAE only tested with MLP. - The data gener...
Combining the interests to of two separate fields of inquiry the authors of this work tackle the problem of Anytime inference for Domain Adaptation through the use of a recursive knowledge distillation. Being able to perform inference over multiple computational budgets is a beneficial strategy for deployed machine lea...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: Combining the interests to of two separate fields of inquiry the authors of this work tackle the problem of Anytime inference for Domain Adaptation through the use of a recursive knowledge distillation. Being able to perform inference over multiple computational budgets is a beneficial strategy for deployed mac...
The paper studies robust fair clustering and motivates the issue of robustness under attack. The authors conduct numerical experiments to show that state-of-the-art models are highly susceptible to the attack they design. The authors then propose a Consensus Fair Clustering and numerically show its robustness. Strength...
Recommendation: 6: marginally above the acceptance threshold
Area: Unsupervised and Self-supervised learning
Review: The paper studies robust fair clustering and motivates the issue of robustness under attack. The authors conduct numerical experiments to show that state-of-the-art models are highly susceptible to the attack they design. The authors then propose a Consensus Fair Clustering and numerically show its robustness. ...
The paper aims to evaluate the fairness of the model without accessing sensitive group attributes. The main idea is to utilize auxiliary models of estimating group attributes by calibrating their outputs. The paper first theoretically explains why we need calibration on the auxiliary models. Then, the paper suggests a ...
Recommendation: 6: marginally above the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The paper aims to evaluate the fairness of the model without accessing sensitive group attributes. The main idea is to utilize auxiliary models of estimating group attributes by calibrating their outputs. The paper first theoretically explains why we need calibration on the auxiliary models. Then, the paper sug...
The paper proposes a new model-based RL framework for continuous control in deterministic environments. The authors propose Policy Optimization with Model Planning (POMP) an algorithm that uses Differential Dynamic Programming (DDP) as the planner module. A specific instantiation of DDP is introduced which uses (D3P) w...
Recommendation: 8: accept, good paper
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The paper proposes a new model-based RL framework for continuous control in deterministic environments. The authors propose Policy Optimization with Model Planning (POMP) an algorithm that uses Differential Dynamic Programming (DDP) as the planner module. A specific instantiation of DDP is introduced which uses...
The paper performs an analysis of fairness training methods on multiple medical imaging tasks. They conclude that no method is significantly better than basic ERM training. The paper is well written and articulates existing methods of fairness very well. Details about the experiments are not clear. Such as how the a...
Recommendation: 5: marginally below the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The paper performs an analysis of fairness training methods on multiple medical imaging tasks. They conclude that no method is significantly better than basic ERM training. The paper is well written and articulates existing methods of fairness very well. Details about the experiments are not clear. Such as h...
The paper studies the implicit bias of gradient descent on diagonal linear networks. It has been lately shown that parametrizing $x$ as $u \odot v$ in $y \approx A (u \odot v)$ induces sparsity in the gradient flow iterates on the least squares loss. In the paper a special architecture is proposed so that gradient desc...
Recommendation: 8: accept, good paper
Area: Optimization (eg, convex and non-convex optimization)
Review: The paper studies the implicit bias of gradient descent on diagonal linear networks. It has been lately shown that parametrizing $x$ as $u \odot v$ in $y \approx A (u \odot v)$ induces sparsity in the gradient flow iterates on the least squares loss. In the paper a special architecture is proposed so that gradi...
In this paper, the authors propose the Deep Graph Neural Diffusion method, which ensures the over-smoothing issue and guarantees stability of the model in theoretical. The experimental results also show the improvement of the proposed method compared with the baseline methods. Strength: 1. Convincible theoretical anal...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: In this paper, the authors propose the Deep Graph Neural Diffusion method, which ensures the over-smoothing issue and guarantees stability of the model in theoretical. The experimental results also show the improvement of the proposed method compared with the baseline methods. Strength: 1. Convincible theoreti...
This paper presents an unsupervised GNN pre-training technique for brain networks. The authors first designed a two-level contrastive learning method and then propose a data-driven atlas mapping technique for mapping different ROI systems. The method was evaluated in three brain network datasets. The results showed the...
Recommendation: 3: reject, not good enough
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: This paper presents an unsupervised GNN pre-training technique for brain networks. The authors first designed a two-level contrastive learning method and then propose a data-driven atlas mapping technique for mapping different ROI systems. The method was evaluated in three brain network datasets. The results sh...
The paper introduces a novel method to generate triangular meshes for the the input 3D point cloud. The authors introduce multiple anchors to divide the neighborhood space of each input 3D point. A deep neural network is then used to predict the presence and the locations of cirumcenters in the point local neighborhoo...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The paper introduces a novel method to generate triangular meshes for the the input 3D point cloud. The authors introduce multiple anchors to divide the neighborhood space of each input 3D point. A deep neural network is then used to predict the presence and the locations of cirumcenters in the point local nei...
The authors pose and attempt to answer a new question if the perceptual gradients of the model imply the robustness of the model to adversarial attacks. To answer that, they proposed a new method that trains the model to have input gradients that align with ground-truth input gradients. They introduced several methods ...
Recommendation: 6: marginally above the acceptance threshold
Area: General Machine Learning
Review: The authors pose and attempt to answer a new question if the perceptual gradients of the model imply the robustness of the model to adversarial attacks. To answer that, they proposed a new method that trains the model to have input gradients that align with ground-truth input gradients. They introduced several ...
This work presents a graph structure refinement layer named GLAM based on a neighborhood attention schema slightly different from the Softmax attention, which disentangles the optimization of node embeddings and graph structures. The proposed GLAM layer learns more sparse subgraphs than prior arts by giving the known a...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This work presents a graph structure refinement layer named GLAM based on a neighborhood attention schema slightly different from the Softmax attention, which disentangles the optimization of node embeddings and graph structures. The proposed GLAM layer learns more sparse subgraphs than prior arts by giving the...
The paper presents a model of hippocampal / entorhinal representation that handles both physical and conceptual space with a common mathematical formulation, drawing on successor representations from RL, and building on dimensionality reduction accounts of grid cells such as the work of Dordek et al. The authors propos...
Recommendation: 8: accept, good paper
Area: Neuroscience and Cognitive Science (e.g., neural coding, brain-computer interfaces)
Review: The paper presents a model of hippocampal / entorhinal representation that handles both physical and conceptual space with a common mathematical formulation, drawing on successor representations from RL, and building on dimensionality reduction accounts of grid cells such as the work of Dordek et al. The author...
This mostly theoretical work presents a framework of GNNs in the context of Dirichlet energy minimization/maximization. GNNs are framed as estimators for gradients of energy functionals that point to either of those two directions. It shows that for certain classes of graphs and GNNs, attractive or repulsive forces bet...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This mostly theoretical work presents a framework of GNNs in the context of Dirichlet energy minimization/maximization. GNNs are framed as estimators for gradients of energy functionals that point to either of those two directions. It shows that for certain classes of graphs and GNNs, attractive or repulsive fo...
The paper proposed to decompose video data (3D, space 2D + time 1D) into 3 data planes. Each of the data plane is only 2D. This allows the T2D model to create tokens in 3 2D planes separately. ViT 3D self-attention is decomposed along each plane. Compared with a single 3D self-attention, using the three 2D self-atten...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: The paper proposed to decompose video data (3D, space 2D + time 1D) into 3 data planes. Each of the data plane is only 2D. This allows the T2D model to create tokens in 3 2D planes separately. ViT 3D self-attention is decomposed along each plane. Compared with a single 3D self-attention, using the three 2D se...
This paper adaptively learns a supra-graph, representing non-static correlations between any two variables at any two timestamps, to capture high-resolution spatial-temporal dependencies, and define FGSO that has the capacity of scale-free learning parameters in the Fourier space. Accordingly, authors construct a compl...
Recommendation: 5: marginally below the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper adaptively learns a supra-graph, representing non-static correlations between any two variables at any two timestamps, to capture high-resolution spatial-temporal dependencies, and define FGSO that has the capacity of scale-free learning parameters in the Fourier space. Accordingly, authors construct...
The paper proposes a new automatic metric called SMART for evaluating model-generated text. Here, sentences are used as basic units of matching instead of tokens, in order to support long and multi-sentence texts. For this, the authors use a sentence-level soft matching function, and experiment with both string-based a...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The paper proposes a new automatic metric called SMART for evaluating model-generated text. Here, sentences are used as basic units of matching instead of tokens, in order to support long and multi-sentence texts. For this, the authors use a sentence-level soft matching function, and experiment with both string...
The paper provides an analysis of the denoising effect of GNNs and reveals the impact of graph size, connectivity, and GNN architectures. It also proposes a robust Neumann graph convolution (RNGC) model based on the defined adversarial graph signal denoising problem. # Strength: 1. The paper is clearly written and ea...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: The paper provides an analysis of the denoising effect of GNNs and reveals the impact of graph size, connectivity, and GNN architectures. It also proposes a robust Neumann graph convolution (RNGC) model based on the defined adversarial graph signal denoising problem. # Strength: 1. The paper is clearly writte...
The paper provides an algorithm to improve zero-shot open-vocabulary classifiers by better prompting them. The authors propose to (1) create sub-classes for each parent classification category using existing (human-created) or inferred (GPT-3 generated) label hierarchies, (2) perform standard zero-shot classification o...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: The paper provides an algorithm to improve zero-shot open-vocabulary classifiers by better prompting them. The authors propose to (1) create sub-classes for each parent classification category using existing (human-created) or inferred (GPT-3 generated) label hierarchies, (2) perform standard zero-shot classifi...
This work introduces a new class of Q-learning-based algorithm for both online and offline RL for continuous control tasks based on extreme value theory. By using the insight that the maximum of i.i.d. random variables with exponential tails has a Gumbel distribution, the authors derived a new set of update rules which...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This work introduces a new class of Q-learning-based algorithm for both online and offline RL for continuous control tasks based on extreme value theory. By using the insight that the maximum of i.i.d. random variables with exponential tails has a Gumbel distribution, the authors derived a new set of update rul...
This paper formulates the problem of training neural networks with threshold activation functions to a convex optimization problem. As a result, global minima can be obtained with standard convex optimizers. Strengths: 1. The paper is well-written and easy to follow. The notations are clear. 2. Equivalenting neural ne...
Recommendation: 6: marginally above the acceptance threshold
Area: Optimization (eg, convex and non-convex optimization)
Review: This paper formulates the problem of training neural networks with threshold activation functions to a convex optimization problem. As a result, global minima can be obtained with standard convex optimizers. Strengths: 1. The paper is well-written and easy to follow. The notations are clear. 2. Equivalenting n...
There are two successful directions in DL nowadays to build models based on both labeled and large amount of unlabeled data: pseudo-labeling (semi-supervised) and SSL (self-supervised learning) with further fine-tuning. There are few papers which try to properly combine both SSL and supervised loss right from the begin...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: There are two successful directions in DL nowadays to build models based on both labeled and large amount of unlabeled data: pseudo-labeling (semi-supervised) and SSL (self-supervised learning) with further fine-tuning. There are few papers which try to properly combine both SSL and supervised loss right from t...
This paper studied the convergence of gradient descent algorithm in training the DeepONet in the overparameterized regime. Specifically, the authors proved a spectral norm bound for the Hessian of DeepONets with smooth activation functions; this bound implies convergence of GD using the RSC property. For ReLU activate...
Recommendation: 3: reject, not good enough
Area: Optimization (eg, convex and non-convex optimization)
Review: This paper studied the convergence of gradient descent algorithm in training the DeepONet in the overparameterized regime. Specifically, the authors proved a spectral norm bound for the Hessian of DeepONets with smooth activation functions; this bound implies convergence of GD using the RSC property. For ReLU ...
The authors propose a method for finetuning pretrained vision models for robotic manipulation tasks that aims to reduce disruption to the original pretrained visual representation and loss of original representation expressivity. The proposed method injects learned lightweight ‘adapters’ throughout the pretrained archi...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: The authors propose a method for finetuning pretrained vision models for robotic manipulation tasks that aims to reduce disruption to the original pretrained visual representation and loss of original representation expressivity. The proposed method injects learned lightweight ‘adapters’ throughout the pretrain...
This paper aims to learn predictors that are invariant under counterfactual changes of certain covariates. To achieve this goal, the authors design a counterfactual invariant predictor. The implementation is highly based on the Kernel mean embeddings and conditional measures. By deriving the sufficient condition of the...
Recommendation: 6: marginally above the acceptance threshold
Area: General Machine Learning
Review: This paper aims to learn predictors that are invariant under counterfactual changes of certain covariates. To achieve this goal, the authors design a counterfactual invariant predictor. The implementation is highly based on the Kernel mean embeddings and conditional measures. By deriving the sufficient conditio...
This paper presents kaBEDONN, a method for post hoc explaining neural network classifiers by identifying relevant data. It is inspired by existing sample importance-based explanations, such as the influence function and representer point. **Strengths** The paper tackles an important problem: the interpretability of n...
Recommendation: 1: strong reject
Area: Deep Learning and representational learning
Review: This paper presents kaBEDONN, a method for post hoc explaining neural network classifiers by identifying relevant data. It is inspired by existing sample importance-based explanations, such as the influence function and representer point. **Strengths** The paper tackles an important problem: the interpretabil...
The authors present a quantum neural network architecture for 3D graph learning. the main idea of the paper is to encode the spatial information into a qubit before training the neural network. This idea is quite straightforward and the evidence that this outperforms classical or other quantum architectures is really m...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: The authors present a quantum neural network architecture for 3D graph learning. the main idea of the paper is to encode the spatial information into a qubit before training the neural network. This idea is quite straightforward and the evidence that this outperforms classical or other quantum architectures is ...
The paper presents a method for segmenting point clouds by predicting an adjacency graph between the points using a transformer that refines the edge weights of an initial graph. The final segmentation is obtained by graph cuts on the predicted adjacency graph. The method shows good promise in obtaining accurate segmen...
Recommendation: 8: accept, good paper
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: The paper presents a method for segmenting point clouds by predicting an adjacency graph between the points using a transformer that refines the edge weights of an initial graph. The final segmentation is obtained by graph cuts on the predicted adjacency graph. The method shows good promise in obtaining accurat...
The paper proposes a new approach to reduce the number of ReLU activation functions in a given model. In private inference applications, latency plays a crucial role and is highly dependent on the number of ReLUs. The proposed approach is based on the insight that parameter pruning sensitivity and ReLU importance are n...
Recommendation: 6: marginally above the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The paper proposes a new approach to reduce the number of ReLU activation functions in a given model. In private inference applications, latency plays a crucial role and is highly dependent on the number of ReLUs. The proposed approach is based on the insight that parameter pruning sensitivity and ReLU importan...
The authors propose a tail averaging method for stochastic optimization that maintains two averages of different lengths in order to adaptively choose tail averging length. The average produced by the longer of the two averages is provably close to optimal in length every once in a while. The advantage of the proposed ...
Recommendation: 8: accept, good paper
Area: Optimization (eg, convex and non-convex optimization)
Review: The authors propose a tail averaging method for stochastic optimization that maintains two averages of different lengths in order to adaptively choose tail averging length. The average produced by the longer of the two averages is provably close to optimal in length every once in a while. The advantage of the p...
This submission proposes a new iterative averaging scheme for stochastic gradient methods. The scheme, which works by maintaining two iterate averages at any given time, manages to be parameter free by setting the average length parameters dynamically based on the validation loss. As such, it is parameter-free unlike...
Recommendation: 3: reject, not good enough
Area: Optimization (eg, convex and non-convex optimization)
Review: This submission proposes a new iterative averaging scheme for stochastic gradient methods. The scheme, which works by maintaining two iterate averages at any given time, manages to be parameter free by setting the average length parameters dynamically based on the validation loss. As such, it is parameter-fre...
This paper proposes a method for attention-bases multi-instance-learning (MIL) on digital pathology whole slides (WSI) for tumor classification. The method improves upon SOTA MIL methods on WSI by approaching the problem using a probabilistic framework. A drawback of current attention-based WSI MIL methods is that atte...
Recommendation: 8: accept, good paper
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper proposes a method for attention-bases multi-instance-learning (MIL) on digital pathology whole slides (WSI) for tumor classification. The method improves upon SOTA MIL methods on WSI by approaching the problem using a probabilistic framework. A drawback of current attention-based WSI MIL methods is t...
The paper proposes a method for efficient exploration in discrete-action MDP environments. The intuition is to incentivize the agent to take actions that maximize “novelty”, which is measured in terms of the temporal difference (TD) error from the transition. The authors show that under certain assumptions, the expecte...
Recommendation: 5: marginally below the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The paper proposes a method for efficient exploration in discrete-action MDP environments. The intuition is to incentivize the agent to take actions that maximize “novelty”, which is measured in terms of the temporal difference (TD) error from the transition. The authors show that under certain assumptions, the...
This paper proposes and experiments with the idea of time-based augmentations: Human infants manipulate and move objects in front of themselves, move their eyes, making multiple fixations on an object, and carry objects into different rooms, providing independence of object appearance from background. All of these mani...
Recommendation: 8: accept, good paper
Area: Unsupervised and Self-supervised learning
Review: This paper proposes and experiments with the idea of time-based augmentations: Human infants manipulate and move objects in front of themselves, move their eyes, making multiple fixations on an object, and carry objects into different rooms, providing independence of object appearance from background. All of th...
This is an interesting study that proposes novel ideas on how to incorporate contextual cues in the form of category-specific feedback signals into visual recognition algorithms. The proposed algorithm (mid-vision feedback, MVF) outperforms several baseline models in several relevant benchmark object recognition tasks....
Recommendation: 8: accept, good paper
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This is an interesting study that proposes novel ideas on how to incorporate contextual cues in the form of category-specific feedback signals into visual recognition algorithms. The proposed algorithm (mid-vision feedback, MVF) outperforms several baseline models in several relevant benchmark object recognitio...
The paper proposed a novel few-shot learning approach (Hopfield-based molecular context enrichment for few-shot drug discovery or MHNfs) that exploits a context of other compounds outside the support and query set to improve the performance of the model. The model relies on the proposed context-module, made up of Hopfi...
Recommendation: 6: marginally above the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: The paper proposed a novel few-shot learning approach (Hopfield-based molecular context enrichment for few-shot drug discovery or MHNfs) that exploits a context of other compounds outside the support and query set to improve the performance of the model. The model relies on the proposed context-module, made up ...
The paper proposes to marginalize (or rather, draw multiple samples from) latent variable policies as a means of improving estimates of policy entropy and Q-value estimates. The authors point out that a naïve ELBO estimate can result in a loose bound (i.e., a biased estimate), so they suggest using a nested estimator a...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The paper proposes to marginalize (or rather, draw multiple samples from) latent variable policies as a means of improving estimates of policy entropy and Q-value estimates. The authors point out that a naïve ELBO estimate can result in a loose bound (i.e., a biased estimate), so they suggest using a nested est...
This paper proposes an SDF transformer network to improve monocular scene reconstruction. Firstly, the 3D transformer is introduced to aggregate the 3D features at different levels in a coarse-to-fine pattern. Secondly, a sparse window multi-head attention module is adopted to save computation costs. Thirdly, the dilat...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper proposes an SDF transformer network to improve monocular scene reconstruction. Firstly, the 3D transformer is introduced to aggregate the 3D features at different levels in a coarse-to-fine pattern. Secondly, a sparse window multi-head attention module is adopted to save computation costs. Thirdly, t...
The paper proposes a data condensation algorithm that guarantees differential privacy, and demonstrated empirically that the proposed algorithm works better than existing data condensation algorithms. Strength: The idea seems interesting and the empirical results seem good. Weakness: I'm quite confused about how the a...
Recommendation: 6: marginally above the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The paper proposes a data condensation algorithm that guarantees differential privacy, and demonstrated empirically that the proposed algorithm works better than existing data condensation algorithms. Strength: The idea seems interesting and the empirical results seem good. Weakness: I'm quite confused about h...
The paper shows that decentralized self-supervised learning (Dec-SSL) can be used on unlabeled data and is robust to the heterogeneity of data aggregated over several data sources. It combines FedAvg, a decentralized learning algorithm, and SimCLR, a self-supervised representation learning algorithm, to create a Dec-SS...
Recommendation: 6: marginally above the acceptance threshold
Area: General Machine Learning
Review: The paper shows that decentralized self-supervised learning (Dec-SSL) can be used on unlabeled data and is robust to the heterogeneity of data aggregated over several data sources. It combines FedAvg, a decentralized learning algorithm, and SimCLR, a self-supervised representation learning algorithm, to create ...
The paper presents an approach for learning to solve task from offline data using preference feedback and no reward function. Instead of learning a reward function, a latent embedding is learned that encode information about what it means to complete the target task. The latent embedding, z, is learned from preferences...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The paper presents an approach for learning to solve task from offline data using preference feedback and no reward function. Instead of learning a reward function, a latent embedding is learned that encode information about what it means to complete the target task. The latent embedding, z, is learned from pre...
This paper proposes a framework for assessing the explanation robustness of neural network (NN) models in the context of both classification and regression tasks. This proposed framework is claimed to solve a number of issues pertaining to the recent heuristic explanation approaches that suffer from a wide range of rel...
Recommendation: 8: accept, good paper
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper proposes a framework for assessing the explanation robustness of neural network (NN) models in the context of both classification and regression tasks. This proposed framework is claimed to solve a number of issues pertaining to the recent heuristic explanation approaches that suffer from a wide rang...
This work proposes a novel differentiable model for the ILP problem, i.e., mining logic from KGs. To do this, the authors introduce a compositional view of the chain-like rules and design a learning schema where the model learns to reduce a path into a single edge. The proposed model, namely NCRL, is an RNN-transformer...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This work proposes a novel differentiable model for the ILP problem, i.e., mining logic from KGs. To do this, the authors introduce a compositional view of the chain-like rules and design a learning schema where the model learns to reduce a path into a single edge. The proposed model, namely NCRL, is an RNN-tra...
In this paper, the authors adapt the formalism of denoising diffusion models to learn physics trajectories. In particular, they consider a forward diffusion given by a differentiable physics operator. The noise of the forward diffusion is assumed to be inherent noise or measurement error. Once this is done, the authors...
Recommendation: 6: marginally above the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: In this paper, the authors adapt the formalism of denoising diffusion models to learn physics trajectories. In particular, they consider a forward diffusion given by a differentiable physics operator. The noise of the forward diffusion is assumed to be inherent noise or measurement error. Once this is done, the...
This paper introduces a PrOntoQA dataset and uses it to study the performance of chain-of-thought prompting of large language models. PrOntoQA is a synthetic reasoning dataset where each example is generated from an ontology along with the proof steps. The questions are answerable from repeated applications of the modu...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper introduces a PrOntoQA dataset and uses it to study the performance of chain-of-thought prompting of large language models. PrOntoQA is a synthetic reasoning dataset where each example is generated from an ontology along with the proof steps. The questions are answerable from repeated applications of ...
Authors propose a novel technique to compute weak optimal transport plan between two distributions, given in possibly two different spaces. Based on an earlier work of Gozlan et al, the computation of OT plan is formulated as a certain minimax task. The major issue that the paper addresses is that some saddle points of...
Recommendation: 8: accept, good paper
Area: Generative models
Review: Authors propose a novel technique to compute weak optimal transport plan between two distributions, given in possibly two different spaces. Based on an earlier work of Gozlan et al, the computation of OT plan is formulated as a certain minimax task. The major issue that the paper addresses is that some saddle p...
The paper provides an intensive mathematical characterization of the S4 model introduced at the last ICLR conference. The paper contains a detailed explanation of the HiPPO initialization schema used in the S4 model and as the main result provides a proof that the seemingly ad-hoc approach of the original S4 is a time-...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: The paper provides an intensive mathematical characterization of the S4 model introduced at the last ICLR conference. The paper contains a detailed explanation of the HiPPO initialization schema used in the S4 model and as the main result provides a proof that the seemingly ad-hoc approach of the original S4 is...
This paper presents a framework of topological mapping, which is implemented as a pipeline of two main components including a planner to generate robot navigational actions and a visual place recognition (VPR) method to construct a topological map. Strength: + Topological mapping is an important problem for agent nav...
Recommendation: 3: reject, not good enough
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper presents a framework of topological mapping, which is implemented as a pipeline of two main components including a planner to generate robot navigational actions and a visual place recognition (VPR) method to construct a topological map. Strength: + Topological mapping is an important problem for a...
This paper aims to draw a connection between the 'one-step' offline RL algorithms and the critic regularization-based ones. With some modification in actor or critic objective, the authors prove the same convergence results for the both methods in tabular settings. And the numerical simulations and empirical results on...
Recommendation: 5: marginally below the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper aims to draw a connection between the 'one-step' offline RL algorithms and the critic regularization-based ones. With some modification in actor or critic objective, the authors prove the same convergence results for the both methods in tabular settings. And the numerical simulations and empirical re...
This paper is about a new method named MNO (Multiscale Neural Operator), which is related to the Fourier Neural Operator. It is used to learn a closure term for a chaotic system, a parameterization for the small-scale dynamics of the multi-scale Lorenz system. The dynamics can then be propagated forward by using the so...
Recommendation: 6: marginally above the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: This paper is about a new method named MNO (Multiscale Neural Operator), which is related to the Fourier Neural Operator. It is used to learn a closure term for a chaotic system, a parameterization for the small-scale dynamics of the multi-scale Lorenz system. The dynamics can then be propagated forward by usin...
The paper essentially reframes NMT models’ stability to model updates and input perturbations as *model inertia* and conduct various analysis experiments on it in the pseudo-label training setups, aka forward-translation distillation. The paper shows that quality gains in different methods are due to the use of pseudo...
Recommendation: 5: marginally below the acceptance threshold
Area: Generative models
Review: The paper essentially reframes NMT models’ stability to model updates and input perturbations as *model inertia* and conduct various analysis experiments on it in the pseudo-label training setups, aka forward-translation distillation. The paper shows that quality gains in different methods are due to the use o...
The paper focuses on dynamical system prediction in the case where the initial conditions of test trajectories are sampled differently from that of training. Metaphysica is introduced, a model based on the identification of causal models which are then finetuned on the new test trajectories to maintain good performance...
Recommendation: 6: marginally above the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: The paper focuses on dynamical system prediction in the case where the initial conditions of test trajectories are sampled differently from that of training. Metaphysica is introduced, a model based on the identification of causal models which are then finetuned on the new test trajectories to maintain good per...
This work conducted experiments on privately fine-tuning GPT-3 using group-wise gradient clipping and successfully trained a model performing well with relatively small privacy budget. The main strength is the successful training of GPT-3 to reasonable performance with relatively small privacy budget, which is achieved...
Recommendation: 6: marginally above the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This work conducted experiments on privately fine-tuning GPT-3 using group-wise gradient clipping and successfully trained a model performing well with relatively small privacy budget. The main strength is the successful training of GPT-3 to reasonable performance with relatively small privacy budget, which is ...
This paper proposes using the policy evaluation networks architecture (policy fingerprinting) with the algorithm structure of parameter-based value functions to learn a single value of the start state that conditions on the policy representation. This value function is learned through online interaction, like paramete...
Recommendation: 5: marginally below the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper proposes using the policy evaluation networks architecture (policy fingerprinting) with the algorithm structure of parameter-based value functions to learn a single value of the start state that conditions on the policy representation. This value function is learned through online interaction, like ...
This paper evaluated some essential design choices of existing binary neural networks for image restoration tasks. The authors further propose a network design and evaluate it on three different tasks. Experimental results show that the proposed binary network outperforms all the reference methods. **Strength** - The ...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper evaluated some essential design choices of existing binary neural networks for image restoration tasks. The authors further propose a network design and evaluate it on three different tasks. Experimental results show that the proposed binary network outperforms all the reference methods. **Strength**...
This work establishes rigorous, novel and widely applicable stability guarantees and transferability bounds for general graph convolutional networks – without reference to any underlying limit object or statistical distribution. Theoretical results are supported by corresponding numerical investigations. Strength: The ...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This work establishes rigorous, novel and widely applicable stability guarantees and transferability bounds for general graph convolutional networks – without reference to any underlying limit object or statistical distribution. Theoretical results are supported by corresponding numerical investigations. Streng...
This paper raises an important question about reproducibility of results for partial domain adaptation. The authors show that the stopping criterion is key to the success of partial domain adaptation algorithms in the literature, and there can be massive variations for various stopping criterions commonly used in the l...
Recommendation: 6: marginally above the acceptance threshold
Area: Unsupervised and Self-supervised learning
Review: This paper raises an important question about reproducibility of results for partial domain adaptation. The authors show that the stopping criterion is key to the success of partial domain adaptation algorithms in the literature, and there can be massive variations for various stopping criterions commonly used ...
In this paper, the authors propose an interpretation of the first-order gradient model based on the dynamic evolution of synapse. Overall, it is interesting but the explanation itself seems to be not based on the ground truth of neuroscience thus appears to be a bit post-hoc given the establishment of ADAM and RMSProp....
Recommendation: 5: marginally below the acceptance threshold
Area: Neuroscience and Cognitive Science (e.g., neural coding, brain-computer interfaces)
Review: In this paper, the authors propose an interpretation of the first-order gradient model based on the dynamic evolution of synapse. Overall, it is interesting but the explanation itself seems to be not based on the ground truth of neuroscience thus appears to be a bit post-hoc given the establishment of ADAM and ...
This paper proposes to improve prediction of human behavior in normal form games using two contributions - A meta learning-based approach - An architecture based on a mixture of experts ## Meta-learning I do not understand the motivation for meta learning in this particular case where the whole dataset is known a prio...
Recommendation: 3: reject, not good enough
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: This paper proposes to improve prediction of human behavior in normal form games using two contributions - A meta learning-based approach - An architecture based on a mixture of experts ## Meta-learning I do not understand the motivation for meta learning in this particular case where the whole dataset is know...
The paper presents an attack on federated learning of Transformers which allows recovering the training sequences, based on a threat model in which the server is corrupt and submits a specially designed weight set which, once applied to the gradient computation of training sequences, will store all information necessar...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: The paper presents an attack on federated learning of Transformers which allows recovering the training sequences, based on a threat model in which the server is corrupt and submits a specially designed weight set which, once applied to the gradient computation of training sequences, will store all information ...
This paper provides ideas for observational robustness when learning control policies via Reinforcement learning. The setting of the paper is an observationally distributed MDP (DOMDP) -- one in which the agent can access the true state during learning but stochastic noise is introduced at deployment. i.e. when acting ...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper provides ideas for observational robustness when learning control policies via Reinforcement learning. The setting of the paper is an observationally distributed MDP (DOMDP) -- one in which the agent can access the true state during learning but stochastic noise is introduced at deployment. i.e. when...
This work studies broad linear algebraic and graph processing applications using the kernel density estimation (KDE) framework which provides sublinear-time algorithms in the number of vertices. A core approach is to sample vertices and edges with respect to the (kernel-based) weights using the KDE in sublinear time an...
Recommendation: 8: accept, good paper
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: This work studies broad linear algebraic and graph processing applications using the kernel density estimation (KDE) framework which provides sublinear-time algorithms in the number of vertices. A core approach is to sample vertices and edges with respect to the (kernel-based) weights using the KDE in sublinear...
A. Paper summary - This paper proposes an easy-to-understand blackbox trojan detection method. By leveraging the phenomenon called "scaled prediction consistency", the author suggests scaling up the input images and checking the confidence score. If the confidence drops, the input should be a benign sample; otherwise,...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: A. Paper summary - This paper proposes an easy-to-understand blackbox trojan detection method. By leveraging the phenomenon called "scaled prediction consistency", the author suggests scaling up the input images and checking the confidence score. If the confidence drops, the input should be a benign sample; ot...
This paper introduces a fair learning algorithm with DP guarantees. The algorithm owns a provable “convergence” guarantee and can deal with multi-class, multi-sensitive attributes classification tasks. The problem studied in this paper (i.e., fair learning algorithm with DP guarantees) is important and significant. Ove...
Recommendation: 3: reject, not good enough
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper introduces a fair learning algorithm with DP guarantees. The algorithm owns a provable “convergence” guarantee and can deal with multi-class, multi-sensitive attributes classification tasks. The problem studied in this paper (i.e., fair learning algorithm with DP guarantees) is important and signific...
The authors propose a novel solver of the Probability Flow ODE for diffusion models introduced in [1]. By taking a Taylor expansion of the ODE and including higher-order terms, the solver can take larger steps. This speeds up sampling, which is a well-known computational bottleneck in diffusion models. However, the hig...
Recommendation: 3: reject, not good enough
Area: Generative models
Review: The authors propose a novel solver of the Probability Flow ODE for diffusion models introduced in [1]. By taking a Taylor expansion of the ODE and including higher-order terms, the solver can take larger steps. This speeds up sampling, which is a well-known computational bottleneck in diffusion models. However,...
In this work, the authors propose a strategy to include scalar and vector features reliant on random walks to message passing GNNs. The authors the show that these features can be computed/ approximated efficiently and provide results of augmenting MPNNs with their affinity metrics on multiple graph datasets. **Strengt...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: In this work, the authors propose a strategy to include scalar and vector features reliant on random walks to message passing GNNs. The authors the show that these features can be computed/ approximated efficiently and provide results of augmenting MPNNs with their affinity metrics on multiple graph datasets. *...
This paper first reveals a dilemma about the augmentation strength that either strong or weak data augmentations are harmful to self-supervised adversarial training (self-AT). To resolve the dilemma, the paper proposes a simple remedy named DynACL (Dynamic Adversarial Contrastive Learning). DynACL adopts a dynamic aug...
Recommendation: 6: marginally above the acceptance threshold
Area: Unsupervised and Self-supervised learning
Review: This paper first reveals a dilemma about the augmentation strength that either strong or weak data augmentations are harmful to self-supervised adversarial training (self-AT). To resolve the dilemma, the paper proposes a simple remedy named DynACL (Dynamic Adversarial Contrastive Learning). DynACL adopts a dyn...
In this work, the authors propose an implicit neural representations method for time-series data, namely iSIREN. The key different from the original SIREN is that iSIREN has modelled the trend and seasonality explicitly. Then authors show that the parameters of iSIREN can be produced by a hypernetwork (HyperTime or iHy...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: In this work, the authors propose an implicit neural representations method for time-series data, namely iSIREN. The key different from the original SIREN is that iSIREN has modelled the trend and seasonality explicitly. Then authors show that the parameters of iSIREN can be produced by a hypernetwork (HyperTim...
This paper provides some temporal-difference (TD) learning algorithms based on the celebrated backstepping technique from control theory for addressing a family of nonlinear systems. The proposed TD algorithms are claimed to be stable and convergent in contrast with the divergent behavior of standard TD algorithms. Sev...
Recommendation: 8: accept, good paper
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper provides some temporal-difference (TD) learning algorithms based on the celebrated backstepping technique from control theory for addressing a family of nonlinear systems. The proposed TD algorithms are claimed to be stable and convergent in contrast with the divergent behavior of standard TD algorit...
This paper proposes a new surrogate objective in joint policy optimization for coordination tasks in MARL, following single roll-out and sequential update schemes. The new surrogate depends on a new off-policy correction method similar to the one in (Munos et al., 2016), and retains the monotonic improvement guarantees...
Recommendation: 8: accept, good paper
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper proposes a new surrogate objective in joint policy optimization for coordination tasks in MARL, following single roll-out and sequential update schemes. The new surrogate depends on a new off-policy correction method similar to the one in (Munos et al., 2016), and retains the monotonic improvement gu...
The authors tackle the problem of motion planning for robotics. Given a motion planning problem, the authors first simplify the problem to an "abstract" MDP that classical planning algorithms can solve. The authors then use a policy parameterized by a transformer that conditions on the solution to the "abstract" proble...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The authors tackle the problem of motion planning for robotics. Given a motion planning problem, the authors first simplify the problem to an "abstract" MDP that classical planning algorithms can solve. The authors then use a policy parameterized by a transformer that conditions on the solution to the "abstract...
The paper propose a method to learn dynamics and make predictions from sequences of images of 3D rigid bodies. The method incorporates physics priors by using SO(3) as the latent space, and by translating the problem of learning the dynamics to that of learning a (reduced) Hamiltonian. Predictions are then made by and ...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: The paper propose a method to learn dynamics and make predictions from sequences of images of 3D rigid bodies. The method incorporates physics priors by using SO(3) as the latent space, and by translating the problem of learning the dynamics to that of learning a (reduced) Hamiltonian. Predictions are then made...
This paper tries to unify Q-learning and Decision Transformer (imitation learning), which hopes to allow DT to obtain some level of trajectory stitching capabilities. Strength: - This is a very timely paper. Augmenting Decision Transformer is a very trendy area at this moment -- using $V(s)$ to relabel RTG is a very st...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper tries to unify Q-learning and Decision Transformer (imitation learning), which hopes to allow DT to obtain some level of trajectory stitching capabilities. Strength: - This is a very timely paper. Augmenting Decision Transformer is a very trendy area at this moment -- using $V(s)$ to relabel RTG is a...
This work does a deep dive into dataset inference, an up-and-coming ownership verification technique for machine learning models. The authors show how DI suffers from a nontrivial FPR in both theoretical and practical settings and FNRs in practical settings with simple adversarial modifications. These analyses highligh...
Recommendation: 8: accept, good paper
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This work does a deep dive into dataset inference, an up-and-coming ownership verification technique for machine learning models. The authors show how DI suffers from a nontrivial FPR in both theoretical and practical settings and FNRs in practical settings with simple adversarial modifications. These analyses ...
Authors use energy based models (EBMs) and object graph minimization to perform instruction-guided spatial rearrangement. Authors use EBMs to represent each spatial predicate (binary or n-ary). Objects are represented using the 3D or 2D overhead box coordinates. Authors train the EBMs using gradient descent on the sum ...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: Authors use energy based models (EBMs) and object graph minimization to perform instruction-guided spatial rearrangement. Authors use EBMs to represent each spatial predicate (binary or n-ary). Objects are represented using the 3D or 2D overhead box coordinates. Authors train the EBMs using gradient descent on ...
This paper tackles the problem of scene generation, generating consistent images of scenes from multiple viewpoints conditioned on few images. The main technical contribution of the work is proposing a set-valued latent representation using normalizing flows, built on top of NeRF-VAE. The proposed model is tested on sy...
Recommendation: 6: marginally above the acceptance threshold
Area: Generative models
Review: This paper tackles the problem of scene generation, generating consistent images of scenes from multiple viewpoints conditioned on few images. The main technical contribution of the work is proposing a set-valued latent representation using normalizing flows, built on top of NeRF-VAE. The proposed model is test...
This paper introduces a method of dealing with covariate shift in graph learning. To this end, the authors define "causal" and "environmental" features (i.e. features that influence label prediction and ones that are conditionally independent of the labels given the former). Subsequently, desiderata of "environmental d...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper introduces a method of dealing with covariate shift in graph learning. To this end, the authors define "causal" and "environmental" features (i.e. features that influence label prediction and ones that are conditionally independent of the labels given the former). Subsequently, desiderata of "environ...
The authors propose a unified pre-training model framework for the problems of existing pre-training models, which are usually targeted at specific categories of problems and have poor performance in cross-task domains. First, the authors use R-Denoiser, S-Denoiser and X-Denoiser to define multiple pre-training tasks u...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: The authors propose a unified pre-training model framework for the problems of existing pre-training models, which are usually targeted at specific categories of problems and have poor performance in cross-task domains. First, the authors use R-Denoiser, S-Denoiser and X-Denoiser to define multiple pre-training...
The authors have introduced a dynamical method to infer the hierarchical structure from temporal sequences. Inputs are encoded into temporal sequences of exponentially-decaying spikes that then determine the temporal evolution of weight variables associated with the inputs. Clustering is then performed to determine the...
Recommendation: 5: marginally below the acceptance threshold
Area: General Machine Learning
Review: The authors have introduced a dynamical method to infer the hierarchical structure from temporal sequences. Inputs are encoded into temporal sequences of exponentially-decaying spikes that then determine the temporal evolution of weight variables associated with the inputs. Clustering is then performed to deter...
The paper proposes D-BAT, a method for training diverse predictions by maximizing disagreement between the models on an OOD dataset. The authors provide a theoretical motivation for the method, and demonstrate improved performance on some OOD generalization and uncertainty estimation benchmarks. ## Strengths **S1**: T...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: The paper proposes D-BAT, a method for training diverse predictions by maximizing disagreement between the models on an OOD dataset. The authors provide a theoretical motivation for the method, and demonstrate improved performance on some OOD generalization and uncertainty estimation benchmarks. ## Strengths *...
This paper studies an efficient way to use the transformer-based model in time-series forecasting tasks. The proposed model, PatchTST, first folds the sequence into several patches which significantly reduces the total sequence length and then splits the multi-channel forecasting signal into independent tasks. In numer...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper studies an efficient way to use the transformer-based model in time-series forecasting tasks. The proposed model, PatchTST, first folds the sequence into several patches which significantly reduces the total sequence length and then splits the multi-channel forecasting signal into independent tasks. ...
It is known that no credible, sealed-bid, and incentive compatible exists, assuming no communication between the bidders. In this work, the authors relax this assumption and propose a framework to run efficient, credible, and revenue-optimal repeated auctions with cryptographic tools. Their main contributions are as fo...
Recommendation: 8: accept, good paper
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: It is known that no credible, sealed-bid, and incentive compatible exists, assuming no communication between the bidders. In this work, the authors relax this assumption and propose a framework to run efficient, credible, and revenue-optimal repeated auctions with cryptographic tools. Their main contributions a...
The paper proposes an improved GAN training method that involves a diffusion chain that generates Gaussian mixture distributed instance noise. The diffusion level is dependent on timestep, and the discrimination task is made increasingly difficult for the discriminator over the course of training. The approach improves...
Recommendation: 6: marginally above the acceptance threshold
Area: Generative models
Review: The paper proposes an improved GAN training method that involves a diffusion chain that generates Gaussian mixture distributed instance noise. The diffusion level is dependent on timestep, and the discrimination task is made increasingly difficult for the discriminator over the course of training. The approach ...