review stringlengths 5 16.6k | score stringclasses 5
values | area stringclasses 12
values | text stringlengths 31 5.65k |
|---|---|---|---|
The paper proposes an approach for self-supervised learning for agents to collect data, which is then relabelled with task reward and used for downstream tasks with offline RL. The approach estimates reachability of states using a contrastive loss where predicted state features and corresponding ground truth features c... | Recommendation: 3: reject, not good enough | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
The paper proposes an approach for self-supervised learning for agents to collect data, which is then relabelled with task reward and used for downstream tasks with offline RL. The approach estimates reachability of states using a contrastive loss where predicted state features and corresponding ground truth fe... |
In this paper, the authors propose a method to dynamically select a subset of features in a neural network. In contrast to standard approaches, this set of features is _global_, and therefore the same subset of features will be ignored for all samples in the dataset.
The proposed method consists of three ingredients:
1... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
In this paper, the authors propose a method to dynamically select a subset of features in a neural network. In contrast to standard approaches, this set of features is _global_, and therefore the same subset of features will be ignored for all samples in the dataset.
The proposed method consists of three ingred... |
This paper proposes a simple method called ranked policy memory (RPM) that can be plugged in any existing MARL algorithms to solve the generalization problem of MARL. The main idea of RPM is maintaining a look-up memory of the history rollout policies which are ranked by the training episode return. At each episode, th... | Recommendation: 5: marginally below the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper proposes a simple method called ranked policy memory (RPM) that can be plugged in any existing MARL algorithms to solve the generalization problem of MARL. The main idea of RPM is maintaining a look-up memory of the history rollout policies which are ranked by the training episode return. At each epi... |
The setting of this paper is few-shot class incremental learning (FSCIL). The key idea is using neural collapse to do FSCIL. This paper use a set of pre-defined classifier prototypes as ETF for the whole label space, and then aligns all classes, including base session's classes and novel classes, to the pre-defined cla... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
The setting of this paper is few-shot class incremental learning (FSCIL). The key idea is using neural collapse to do FSCIL. This paper use a set of pre-defined classifier prototypes as ETF for the whole label space, and then aligns all classes, including base session's classes and novel classes, to the pre-def... |
This paper tries to develop a method called GraphCG for the unsupervised discovery of steerable factors in the latent space of deep graph generative models. The authors observe that the learned representation space of some methods is not perfectly disentangled. Thus, they propose to learn the semantic-rich directions ... | Recommendation: 5: marginally below the acceptance threshold | Area: Generative models | Review:
This paper tries to develop a method called GraphCG for the unsupervised discovery of steerable factors in the latent space of deep graph generative models. The authors observe that the learned representation space of some methods is not perfectly disentangled. Thus, they propose to learn the semantic-rich dir... |
The paper proposes a new method (CIDER) for representation learning and applies it for out-of-distribution detection. Given an $L_2$ normalized embedding (hyperspherical embeddings) from a deep network, the method computes prototypes, as moving averages of the embeddings corresponding to each class. The method is optim... | Recommendation: 6: marginally above the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
The paper proposes a new method (CIDER) for representation learning and applies it for out-of-distribution detection. Given an $L_2$ normalized embedding (hyperspherical embeddings) from a deep network, the method computes prototypes, as moving averages of the embeddings corresponding to each class. The method ... |
The paper proposes a method for generating images from text with an addition of a retrieval component. Authors use pretrained text and image encoders and train diffusion-based generative models that use an image embedding and a set of image embeddings closest to the target one to reconstruct the image. During inference... | Recommendation: 8: accept, good paper | Area: Generative models | Review:
The paper proposes a method for generating images from text with an addition of a retrieval component. Authors use pretrained text and image encoders and train diffusion-based generative models that use an image embedding and a set of image embeddings closest to the target one to reconstruct the image. During i... |
This paper shows that self-attention mechanisms can be derived by finding the support vector expansion of a support vector regression (SVR) problem. The key contribution of this paper is the framework proposed in Section 2, which links attention mechanisms to support vector regression problems, and provides a different... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
This paper shows that self-attention mechanisms can be derived by finding the support vector expansion of a support vector regression (SVR) problem. The key contribution of this paper is the framework proposed in Section 2, which links attention mechanisms to support vector regression problems, and provides a d... |
This paper outlines some desiderata for memory tasks for RL, and proposes/releases a set of three varied benchmark tasks that meet these desiderata. The paper runs a variety of baselines on the tasks and shows that they have nice properties such as strong memory dependence and scalable difficulty. One task, searing spo... | Recommendation: 8: accept, good paper | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper outlines some desiderata for memory tasks for RL, and proposes/releases a set of three varied benchmark tasks that meet these desiderata. The paper runs a variety of baselines on the tasks and shows that they have nice properties such as strong memory dependence and scalable difficulty. One task, sea... |
This paper presents GC-Flow, a generative framework to generate the representation of graphs. The framework is effective for node classification and unravels the inherent structure of data for clustering. More specifically, GC-Flow takes both the advantages of normalizing flows and graph convolutions. For prediction, i... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
This paper presents GC-Flow, a generative framework to generate the representation of graphs. The framework is effective for node classification and unravels the inherent structure of data for clustering. More specifically, GC-Flow takes both the advantages of normalizing flows and graph convolutions. For predi... |
The paper proposes a method to handle the species distribution modeling (SDM) problem at a global scale, which is challenging and important. Traditional models need presence-absence data for training and are unable to take advantage of large-scale data. In contrast, with several scalable loss functions, the method in t... | Recommendation: 3: reject, not good enough | Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability ) | Review:
The paper proposes a method to handle the species distribution modeling (SDM) problem at a global scale, which is challenging and important. Traditional models need presence-absence data for training and are unable to take advantage of large-scale data. In contrast, with several scalable loss functions, the met... |
This work introduces model-based reinforcement learning to the domain of spiking recurrent neural networks. To this end, the authors used two subnetworks – an “agent” one for computing policy and a “model” one for predicting future rewards and states of the environment. The authors then formulated local learning rules ... | Recommendation: 3: reject, not good enough | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This work introduces model-based reinforcement learning to the domain of spiking recurrent neural networks. To this end, the authors used two subnetworks – an “agent” one for computing policy and a “model” one for predicting future rewards and states of the environment. The authors then formulated local learnin... |
This paper studies machine learning in settings where where classes have rare subcategories (potentially as small as one example in the training set).
The paper creates a data model, and shows that while a model that properly learns features can achieve very high performance, models that do not learn these features ha... | Recommendation: 5: marginally below the acceptance threshold | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
This paper studies machine learning in settings where where classes have rare subcategories (potentially as small as one example in the training set).
The paper creates a data model, and shows that while a model that properly learns features can achieve very high performance, models that do not learn these fea... |
The paper proposes a method to cast fine-grained visual parsing into analogical inference instead of previous methods that mapping input scenes to part labels. The main idea is to retrieve the new input point cloud feature embedding from memories of labelled feature embeddings. Then the several results with the highest... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
The paper proposes a method to cast fine-grained visual parsing into analogical inference instead of previous methods that mapping input scenes to part labels. The main idea is to retrieve the new input point cloud feature embedding from memories of labelled feature embeddings. Then the several results with the... |
The paper proposed a solution to the practical problem of contextual speech synthesis to address TTS model limitation for highly phonetically contextual languages such as Chinese. The paper employs the use of conformer architecture baseline and introduces 3 main changes to enable paragraph-level expressiveness - segmen... | Recommendation: 8: accept, good paper | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
The paper proposed a solution to the practical problem of contextual speech synthesis to address TTS model limitation for highly phonetically contextual languages such as Chinese. The paper employs the use of conformer architecture baseline and introduces 3 main changes to enable paragraph-level expressiveness ... |
This paper studies the landscape of a 2-layer neural network with $r$ hidden neurons. It adopts a teacher-student network setting where the training data is generated by a 2-layer network (teacher network) with $k$ hidden neurons. This paper establishes the following results:
1) For $r=1$, prove that if the teacher n... | Recommendation: 5: marginally below the acceptance threshold | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
This paper studies the landscape of a 2-layer neural network with $r$ hidden neurons. It adopts a teacher-student network setting where the training data is generated by a 2-layer network (teacher network) with $k$ hidden neurons. This paper establishes the following results:
1) For $r=1$, prove that if the t... |
The paper draws attention to the societal and environmental impacts of machine learning research in chemistry and biology. The paper specifically makes a contribution in the following components such as: environmental considerations, citation inequality, academic brain-drain, and scientific considerations:
The study m... | Recommendation: 8: accept, good paper | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
The paper draws attention to the societal and environmental impacts of machine learning research in chemistry and biology. The paper specifically makes a contribution in the following components such as: environmental considerations, citation inequality, academic brain-drain, and scientific considerations:
The... |
Paper tries to answer: what do skip connections and normalisation layers do? Can we train without them?
The authors attempt to analyze how our dependency on normalization and skip connections can be removed in deep NNs (specifically, in the self-attention operation of transformers). They do this by porting the “Deep K... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
Paper tries to answer: what do skip connections and normalisation layers do? Can we train without them?
The authors attempt to analyze how our dependency on normalization and skip connections can be removed in deep NNs (specifically, in the self-attention operation of transformers). They do this by porting the... |
This paper presents a drop-in differentiable module (DiffRes) that automatically adjusts temporal resolutions of spectrogram input for audio classification. The DiffRes module computes frame-level importance score and calculate a warp matrix to dynamically scale temporal resolution. The guide loss encourages empty fra... | Recommendation: 6: marginally above the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper presents a drop-in differentiable module (DiffRes) that automatically adjusts temporal resolutions of spectrogram input for audio classification. The DiffRes module computes frame-level importance score and calculate a warp matrix to dynamically scale temporal resolution. The guide loss encourages e... |
This paper proposes a NAS method to find robust neural network that can defend adversarial attracks. It combine knowledge distillation with NAS to pursue better performacne. The authors conduct experiments on multiple tiny datasets, such as CIFAR-10, ImageNet-100.
Strength:
-It is interesing to find robust architectur... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper proposes a NAS method to find robust neural network that can defend adversarial attracks. It combine knowledge distillation with NAS to pursue better performacne. The authors conduct experiments on multiple tiny datasets, such as CIFAR-10, ImageNet-100.
Strength:
-It is interesing to find robust arc... |
This paper proposes a new video Transformer architecture, termed UniformerV2, that extends the pre-trained ViTs (on images) to the video action recognition tasks. Specifically, UniformerV2 introduces local temporal aggregation, global temporal modeling and multi-stage fusion to enhance the original image-based ViTs to ... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper proposes a new video Transformer architecture, termed UniformerV2, that extends the pre-trained ViTs (on images) to the video action recognition tasks. Specifically, UniformerV2 introduces local temporal aggregation, global temporal modeling and multi-stage fusion to enhance the original image-based ... |
The authors present a neural network method BFReg-NN for several tasks involving RNA-seq data. This method defines its architecture using biological databases that annotate gene regulatory networks, protein-protein interactions and pathways, represented as graphs/hypergraphs. The neural network uses graph attention to ... | Recommendation: 3: reject, not good enough | Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability ) | Review:
The authors present a neural network method BFReg-NN for several tasks involving RNA-seq data. This method defines its architecture using biological databases that annotate gene regulatory networks, protein-protein interactions and pathways, represented as graphs/hypergraphs. The neural network uses graph atten... |
This paper proposes a bi-level knowledge integration strategy that incorporates the prior knowledge from CLIP for weakly-supervised HOI detection.
This paper also exploits CLIP textual embeddings of HOI labels as a relational knowledge bank, which is adopted to enhance the HOI representation with an image-wise HOI rec... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper proposes a bi-level knowledge integration strategy that incorporates the prior knowledge from CLIP for weakly-supervised HOI detection.
This paper also exploits CLIP textual embeddings of HOI labels as a relational knowledge bank, which is adopted to enhance the HOI representation with an image-wise... |
The paper aims to connect an effective regularization technique used in deep learning for visions with a special kind of measuring independence technique through kernel method. This connection would show that the regularization's goal is to suppress correlation of learned representations. Then the authors proceed to va... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
The paper aims to connect an effective regularization technique used in deep learning for visions with a special kind of measuring independence technique through kernel method. This connection would show that the regularization's goal is to suppress correlation of learned representations. Then the authors proce... |
The authors proposed an algorithm for planning that uses learned components for generating subgoals (states up to k steps away), generating one low-level action between two states (conditional low-level policy, CLLP), verifying whether CLLP can find an action between two states, and predicting the distance between curr... | Recommendation: 8: accept, good paper | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
The authors proposed an algorithm for planning that uses learned components for generating subgoals (states up to k steps away), generating one low-level action between two states (conditional low-level policy, CLLP), verifying whether CLLP can find an action between two states, and predicting the distance betw... |
The paper proposes a variant of an already existing algorithm CMA-ME for Qualty-Diversity (QD) problems by introducing a learning rate based annealing function.
Strength:
1) The paper presents a systematic study with adequate empirical experiments.
Weakness:
1) Significance and relevance of QD problem in machine lea... | Recommendation: 5: marginally below the acceptance threshold | Area: Optimization (eg, convex and non-convex optimization) | Review:
The paper proposes a variant of an already existing algorithm CMA-ME for Qualty-Diversity (QD) problems by introducing a learning rate based annealing function.
Strength:
1) The paper presents a systematic study with adequate empirical experiments.
Weakness:
1) Significance and relevance of QD problem in mac... |
The paper describes INSPIRE, a methodology to provide recourse sets to users from which they can select a counterfactual instance which can overturn a potentially bad decision taken by a machine learning model. The authors show a method to efficiently sample counterfactuals tailored to the personal user’s cost function... | Recommendation: 5: marginally below the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
The paper describes INSPIRE, a methodology to provide recourse sets to users from which they can select a counterfactual instance which can overturn a potentially bad decision taken by a machine learning model. The authors show a method to efficiently sample counterfactuals tailored to the personal user’s cost ... |
This paper introduces a feasible way to perform curriculum learning in multi-agent reinforcement learning (MARL). It describes well why curriculum learning cannot be applied to MARL seamlessly and proposes sound solutions to these problems. The experimental evaluation is conducted in a satisfactory way, although the re... | Recommendation: 6: marginally above the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper introduces a feasible way to perform curriculum learning in multi-agent reinforcement learning (MARL). It describes well why curriculum learning cannot be applied to MARL seamlessly and proposes sound solutions to these problems. The experimental evaluation is conducted in a satisfactory way, althoug... |
This paper studies the problem of alleviating convergence issues in FL in the face of non-iid data. In particular, the authors propose methods which align the gradient and the direction of update with the past update at the server, and align the server update with the aggregated client model update. The alignment is do... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
This paper studies the problem of alleviating convergence issues in FL in the face of non-iid data. In particular, the authors propose methods which align the gradient and the direction of update with the past update at the server, and align the server update with the aggregated client model update. The alignme... |
This paper introduces DINo, a continuous time and space solver for partial differential equations. The authors proposed to model the solution of the PDE as an implicit neural representation conditioned on the initial condition through an hyper-network. The dynamics is modeled as a learned latent ordinary differential e... | Recommendation: 8: accept, good paper | Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability ) | Review:
This paper introduces DINo, a continuous time and space solver for partial differential equations. The authors proposed to model the solution of the PDE as an implicit neural representation conditioned on the initial condition through an hyper-network. The dynamics is modeled as a learned latent ordinary differ... |
This paper studied the problem of learning agent polices with datasets that have limited labeled actions. Action Limited PreTraining (ALPT) is presented, which pretrain an inverse dynamics model (IDM) on multiple environments to provide accurate action labels for decision transformer (DT) agent on an action limited tar... | Recommendation: 3: reject, not good enough | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper studied the problem of learning agent polices with datasets that have limited labeled actions. Action Limited PreTraining (ALPT) is presented, which pretrain an inverse dynamics model (IDM) on multiple environments to provide accurate action labels for decision transformer (DT) agent on an action lim... |
The paper proposes an instance-dependent PLL approach by decomposing the generation process of candidate labels into two processes and explicitly modeling the processes using different probability distributions, which the risk estimator is built upon. The MAP technique is employed to create the final empirical risk est... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
The paper proposes an instance-dependent PLL approach by decomposing the generation process of candidate labels into two processes and explicitly modeling the processes using different probability distributions, which the risk estimator is built upon. The MAP technique is employed to create the final empirical ... |
This work proposes a novel data representation framework, namely, the spacetime graph. Both theoretical and experimental analyses are provided to show the effectiveness and superiority of the proposed framework.
- Strengths:
1. The authors present the definition of basic concepts in spacetime differential geometry ... | Recommendation: 6: marginally above the acceptance threshold | Area: General Machine Learning | Review:
This work proposes a novel data representation framework, namely, the spacetime graph. Both theoretical and experimental analyses are provided to show the effectiveness and superiority of the proposed framework.
- Strengths:
1. The authors present the definition of basic concepts in spacetime differential g... |
The paper studies the template inversion attack against face recognition (FR) systems. It uses results in the literature to train an encoder that generates the latent representation of StyleGAN and, using StyleGAN decoder, produces a realistic face, that is subsequently used to attack a FR system.
Strength.
The paper... | Recommendation: 6: marginally above the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
The paper studies the template inversion attack against face recognition (FR) systems. It uses results in the literature to train an encoder that generates the latent representation of StyleGAN and, using StyleGAN decoder, produces a realistic face, that is subsequently used to attack a FR system.
Strength.
T... |
The paper considers the problem of provably efficient reinforcement learning on predictive state representations (PSRs) with function approximation. The main contribution of the paper is a PAC algorithm for PSRs with polynomial sample complexity when competing with the globally optimal policy. Although sharing similar ... | Recommendation: 6: marginally above the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
The paper considers the problem of provably efficient reinforcement learning on predictive state representations (PSRs) with function approximation. The main contribution of the paper is a PAC algorithm for PSRs with polynomial sample complexity when competing with the globally optimal policy. Although sharing ... |
This paper addressed test-time adaptation by incorporating uncertainty. This is inspired by the fact that pseudo labels could be confidently wrong, thus pseudo labels are treated as a distribution and test-time training is carried out on the pseudo labels sampled from the distribution. A meta-learning approach is furth... | Recommendation: 5: marginally below the acceptance threshold | Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes) | Review:
This paper addressed test-time adaptation by incorporating uncertainty. This is inspired by the fact that pseudo labels could be confidently wrong, thus pseudo labels are treated as a distribution and test-time training is carried out on the pseudo labels sampled from the distribution. A meta-learning approach ... |
The paper proposes an automatic method to look for hard subpopulations and spurious correlations in datasets, by training SVMs in CLIP space to predict whether the original model will predict the data point correctly. Experiments show their method identified hard examples.
Strengths:
The paper proposes an automatic m... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
The paper proposes an automatic method to look for hard subpopulations and spurious correlations in datasets, by training SVMs in CLIP space to predict whether the original model will predict the data point correctly. Experiments show their method identified hard examples.
Strengths:
The paper proposes an aut... |
The paper proposes a deep learning model for time series forecasting that reflects the irregularity in time series. Irregularity is based on Fourier series and and the authors employ it to design the Irregularity Representation Block that captures, preserves, and learns the irregularity representation of time series d... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
The paper proposes a deep learning model for time series forecasting that reflects the irregularity in time series. Irregularity is based on Fourier series and and the authors employ it to design the Irregularity Representation Block that captures, preserves, and learns the irregularity representation of time ... |
This work presents a straightforward, but impressive extension of prior work on “Behavior Transformers” for learning policies from offline, reward-free data, by introducing the ability to learn goal-conditioned policies from undirected play data. Crucially, the play data used to learn policies in this work in inherentl... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
This work presents a straightforward, but impressive extension of prior work on “Behavior Transformers” for learning policies from offline, reward-free data, by introducing the ability to learn goal-conditioned policies from undirected play data. Crucially, the play data used to learn policies in this work in i... |
This paper provides a theoretical analysis of contrastive learning in the setting where the hypothesis class has significantly smaller dimension than the data distribution (as measured by the number of clusters). They instantiate their framework on a few example settings and show that their results provide theoretical ... | Recommendation: 6: marginally above the acceptance threshold | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
This paper provides a theoretical analysis of contrastive learning in the setting where the hypothesis class has significantly smaller dimension than the data distribution (as measured by the number of clusters). They instantiate their framework on a few example settings and show that their results provide theo... |
This paper proposes a latent variable model that parses dynamic scenes into independent laws represented as neural random functions. The model is trained to reconstruct the image sequence while keeping the distribution of concepts and random functions not changing over time and concepts. The evaluation on various datas... | Recommendation: 6: marginally above the acceptance threshold | Area: Generative models | Review:
This paper proposes a latent variable model that parses dynamic scenes into independent laws represented as neural random functions. The model is trained to reconstruct the image sequence while keeping the distribution of concepts and random functions not changing over time and concepts. The evaluation on vario... |
This paper proposes a new method for being able to train high-quality policies on Atari benchmarks while having an experienced memory that is two orders of magnitude smaller. the motivation is that storing large amounts of data and experience memory, especially for image-based environments, can be very memory intensive... | Recommendation: 5: marginally below the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper proposes a new method for being able to train high-quality policies on Atari benchmarks while having an experienced memory that is two orders of magnitude smaller. the motivation is that storing large amounts of data and experience memory, especially for image-based environments, can be very memory i... |
The authors propose SignNet and BasisNet which are invariant to the sign and rotation symmetries that exist in eigenspaces, particularly in the Laplacian context for graphs. They demonstrate a universal approximation theorem with the approach under some conditions. They evaluated SignNet and BasisNet with various exper... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
The authors propose SignNet and BasisNet which are invariant to the sign and rotation symmetries that exist in eigenspaces, particularly in the Laplacian context for graphs. They demonstrate a universal approximation theorem with the approach under some conditions. They evaluated SignNet and BasisNet with vario... |
This paper proposed to leverage the gating structure in gated attention unit (GAU) in state space models, named Gated State Space (GSS). By reducing the dimension of the state space module in GSS which requires FFT to compute the output, GSS is faster than the diagonal state space (DSS) model.
Experiments were conduct... | Recommendation: 6: marginally above the acceptance threshold | Area: Generative models | Review:
This paper proposed to leverage the gating structure in gated attention unit (GAU) in state space models, named Gated State Space (GSS). By reducing the dimension of the state space module in GSS which requires FFT to compute the output, GSS is faster than the diagonal state space (DSS) model.
Experiments were... |
The paper aims to analyze the convergence of gradient flow of multi-layer linear models. The paper deposit that in general, the convergence rate depends on two trajectory-specific quantities: the imbalance matrices (which measure the difference between the weights of adjacent layers) and on the least singular values of... | Recommendation: 6: marginally above the acceptance threshold | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
The paper aims to analyze the convergence of gradient flow of multi-layer linear models. The paper deposit that in general, the convergence rate depends on two trajectory-specific quantities: the imbalance matrices (which measure the difference between the weights of adjacent layers) and on the least singular v... |
The authors present a Neural-Symbolic Ordinary Differential Equation (NSODE) that generates models straight out of the data. It is reported in the paper that once trained, the pipeline can produce models much faster than other techniques.
Strengths:
1. The generation of symbolic models that use expressions commonly use... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
The authors present a Neural-Symbolic Ordinary Differential Equation (NSODE) that generates models straight out of the data. It is reported in the paper that once trained, the pipeline can produce models much faster than other techniques.
Strengths:
1. The generation of symbolic models that use expressions comm... |
This paper proposes a way to run targeted adversarial attacks against Reinforcement Learning agents. The threat model consist in modifying the state perceived by the agent in order to trigger specific actions. The method is to both find an optimal "intention policy" that achieves the target behavior, then try to match ... | Recommendation: 6: marginally above the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper proposes a way to run targeted adversarial attacks against Reinforcement Learning agents. The threat model consist in modifying the state perceived by the agent in order to trigger specific actions. The method is to both find an optimal "intention policy" that achieves the target behavior, then try t... |
This paper proposes two practical regularization techniques for MAE training and the related quantitative results verify their efficacy. One is to exert different weights to the reconstruction loss of different patches based on how difficult it is to reconstruct these masked ones with visible ones. Another is to employ... | Recommendation: 5: marginally below the acceptance threshold | Area: Unsupervised and Self-supervised learning | Review:
This paper proposes two practical regularization techniques for MAE training and the related quantitative results verify their efficacy. One is to exert different weights to the reconstruction loss of different patches based on how difficult it is to reconstruct these masked ones with visible ones. Another is t... |
This work presents two techniques to solve the exposure bias. The first one, dynamic scheduled sampling, is to sample the generated token conditioned on the accuracy. The second one, imitation loss, is to regularize the training. The authors conduct experiments on machine translation and robust text generation to evalu... | Recommendation: 5: marginally below the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This work presents two techniques to solve the exposure bias. The first one, dynamic scheduled sampling, is to sample the generated token conditioned on the accuracy. The second one, imitation loss, is to regularize the training. The authors conduct experiments on machine translation and robust text generation ... |
The paper proposes novel methods for few-shot KG completion. They identify two issues with existing methods for this task -- (a) They learn entity-level information from local nbr aggregators. (the paper jointly takes into account the nbr of head and tail entity for triple context) (b) They learn relation-level informa... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
The paper proposes novel methods for few-shot KG completion. They identify two issues with existing methods for this task -- (a) They learn entity-level information from local nbr aggregators. (the paper jointly takes into account the nbr of head and tail entity for triple context) (b) They learn relation-level... |
This paper focuses on token pruning for Transformer models. The authors observe that previous token pruning approaches do not consider the impact of a token on later layers’ attentions. Therefore, they propose an attention back-tracking method that tracks the importance of each attention from the outputs to the inputs,... | Recommendation: 6: marginally above the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper focuses on token pruning for Transformer models. The authors observe that previous token pruning approaches do not consider the impact of a token on later layers’ attentions. Therefore, they propose an attention back-tracking method that tracks the importance of each attention from the outputs to the... |
This paper is an extension of the existing paper by Nagarajan & Kolter.
Previously, Nagarajan & Kolter show that there exist cases such that the true generalization gap is non-vacuous while uniform convergence fails, using an overparameterized linear regression case.
In this paper, the authors show that such a phenom... | Recommendation: 8: accept, good paper | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
This paper is an extension of the existing paper by Nagarajan & Kolter.
Previously, Nagarajan & Kolter show that there exist cases such that the true generalization gap is non-vacuous while uniform convergence fails, using an overparameterized linear regression case.
In this paper, the authors show that such ... |
This paper proposed a unified learner for various vision and language tasks that involve dense and sparse prediction. To be able to represent languages and various vision tasks in a homogeneous way, the authors employed the tokenized representation where the discrete codebooks for words and visual patches are learned b... | Recommendation: 8: accept, good paper | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper proposed a unified learner for various vision and language tasks that involve dense and sparse prediction. To be able to represent languages and various vision tasks in a homogeneous way, the authors employed the tokenized representation where the discrete codebooks for words and visual patches are l... |
The authors present theoretical results on the robustness of image classifiers. Namely they demonstrate that for all image classifiers, the set of images robust to Lp-bounded adversarial perturbations becomes vanishingly small. The main technique used in the proofs is a novel approach leveraging Hamming graphs. The bou... | Recommendation: 6: marginally above the acceptance threshold | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
The authors present theoretical results on the robustness of image classifiers. Namely they demonstrate that for all image classifiers, the set of images robust to Lp-bounded adversarial perturbations becomes vanishingly small. The main technique used in the proofs is a novel approach leveraging Hamming graphs.... |
This paper studies the variance reduction technique for nonconvex optimization, along the research line of STORM and STORM+. The proposed META-STORM extends STORM+ by relaxing the assumption of bounded function value STORM+ while achieving the optimal convergence rate.
Strengths:
1: This paper is somewhat novel.
2: T... | Recommendation: 5: marginally below the acceptance threshold | Area: Optimization (eg, convex and non-convex optimization) | Review:
This paper studies the variance reduction technique for nonconvex optimization, along the research line of STORM and STORM+. The proposed META-STORM extends STORM+ by relaxing the assumption of bounded function value STORM+ while achieving the optimal convergence rate.
Strengths:
1: This paper is somewhat nove... |
The paper tackles the question of straightening of natural movies in deep neural networks. It starts from previous observations both in visual psychophysics and neurophysiology that the curvature of the internal representations (abstract perception, V1 neural activity) is lower than the one of the initial movie represe... | Recommendation: 8: accept, good paper | Area: Neuroscience and Cognitive Science (e.g., neural coding, brain-computer interfaces) | Review:
The paper tackles the question of straightening of natural movies in deep neural networks. It starts from previous observations both in visual psychophysics and neurophysiology that the curvature of the internal representations (abstract perception, V1 neural activity) is lower than the one of the initial movie... |
This paper considers the problem of monotonic linear interpolation (MLI) in deep neural networks. That is, one connects the initialization of the neural network with the fully trained neural network through a line. Then one considers how the loss function behaves when one is interpolation between the weights at initial... | Recommendation: 8: accept, good paper | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
This paper considers the problem of monotonic linear interpolation (MLI) in deep neural networks. That is, one connects the initialization of the neural network with the fully trained neural network through a line. Then one considers how the loss function behaves when one is interpolation between the weights at... |
In this paper the authors address the selective classification problem with the goal of reducing the selective risk (a non-convex function of the model prediction). A selective classifier is a pair (f, g), where f is a classifier, and g: X -> {0, 1} is a selection function, that allows to abstain {= 0} on some difficul... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
In this paper the authors address the selective classification problem with the goal of reducing the selective risk (a non-convex function of the model prediction). A selective classifier is a pair (f, g), where f is a classifier, and g: X -> {0, 1} is a selection function, that allows to abstain {= 0} on some ... |
This paper proposed a simple technique to adaptively choose the weight decay parameter over the course of training, instead of having a fixed $\lambda$ which is currently the common practice, and call it adaptive weight decay (AWD). The motivation for AWD comes from the need to avoid a full expensive grid search of lea... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper proposed a simple technique to adaptively choose the weight decay parameter over the course of training, instead of having a fixed $\lambda$ which is currently the common practice, and call it adaptive weight decay (AWD). The motivation for AWD comes from the need to avoid a full expensive grid searc... |
the submission conducted experiments to study the impact of configurations on the transferability of a pre-trained model through the lens of Hessian matrices, and the studied configurations include the number of training iterations, the training objectives, and the size of a model. Unsurprisingly, the conclusion is tha... | Recommendation: 3: reject, not good enough | Area: Unsupervised and Self-supervised learning | Review:
the submission conducted experiments to study the impact of configurations on the transferability of a pre-trained model through the lens of Hessian matrices, and the studied configurations include the number of training iterations, the training objectives, and the size of a model. Unsurprisingly, the conclusio... |
The vulnerability of DNNs to adversarial examples is related to local non-smoothness and the steepness of loss landscapes. To solve the above problem, the main contribution of this paper is that they explore the existence of collaborative examples by simply adapting the PGD method by gradient descent rather than gradie... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
The vulnerability of DNNs to adversarial examples is related to local non-smoothness and the steepness of loss landscapes. To solve the above problem, the main contribution of this paper is that they explore the existence of collaborative examples by simply adapting the PGD method by gradient descent rather tha... |
This paper studies the canonical correlation analysis under an adversarial learning framework. They propose an effective adCCA that can learn better representations. The experiments show the proposed method is competitive compared to many recent deep CCA.
The proposed method seems interesting. The experiments are suff... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper studies the canonical correlation analysis under an adversarial learning framework. They propose an effective adCCA that can learn better representations. The experiments show the proposed method is competitive compared to many recent deep CCA.
The proposed method seems interesting. The experiments ... |
The authors propose to use relational inference for the generative model in a tabular setting. The proposed method jointly learns the relation between features in tabular data and parameters of generative models.
The paper is fairly well structured, apart from missing some of the related works and weak experiments.
M... | Recommendation: 3: reject, not good enough | Area: Generative models | Review:
The authors propose to use relational inference for the generative model in a tabular setting. The proposed method jointly learns the relation between features in tabular data and parameters of generative models.
The paper is fairly well structured, apart from missing some of the related works and weak experim... |
This paper presents the annealed fisher implicit sampler which trains an implicit sampler (i.e GAN style model) to sample from an unnormalized probability distribution. The model is trained to minimize the Fisher divergence (i.e the score matching objective) between the model samples and the unnormalized distribution. ... | Recommendation: 3: reject, not good enough | Area: Generative models | Review:
This paper presents the annealed fisher implicit sampler which trains an implicit sampler (i.e GAN style model) to sample from an unnormalized probability distribution. The model is trained to minimize the Fisher divergence (i.e the score matching objective) between the model samples and the unnormalized distri... |
The paper focuses on unsupervised inverse problems, and studies under what conditions recovery is possible. Their contribution involves a series of characterization and analyses of the problem, explained below.
- They focus on the compressive dictionary learning problem and provide the conditions under which dictionar... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
The paper focuses on unsupervised inverse problems, and studies under what conditions recovery is possible. Their contribution involves a series of characterization and analyses of the problem, explained below.
- They focus on the compressive dictionary learning problem and provide the conditions under which d... |
Problem: Vehicle Trajectory Prediction as commonly defined and evaluated.
Key insight: agents usually follow lanes, so explicitly use lane graph structure to find likely future agent-agent interactions.
Novel contributions: Future Relationship Module that consumes waypoint occupancy estimates + lane graph and produce... | Recommendation: 8: accept, good paper | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
Problem: Vehicle Trajectory Prediction as commonly defined and evaluated.
Key insight: agents usually follow lanes, so explicitly use lane graph structure to find likely future agent-agent interactions.
Novel contributions: Future Relationship Module that consumes waypoint occupancy estimates + lane graph and... |
This paper proposes an additional module that performs data-specific augmentation. Specifically, location-related parametrization taking account of spatial location has been proposed. Experimental results show the effectiveness of the proposed method on image datasets in supervised and self-supervised representation le... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper proposes an additional module that performs data-specific augmentation. Specifically, location-related parametrization taking account of spatial location has been proposed. Experimental results show the effectiveness of the proposed method on image datasets in supervised and self-supervised represent... |
This paper addresses the problem of representational harms in pretrained models. The paper proposes a metric, safety score, to measure the harms. Then, the paper shows a study of this metric on 13 marginalized demographics using 24 pretrained models, and discuss the findings.
Strengths
- The paper is easy to follow
- ... | Recommendation: 6: marginally above the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
This paper addresses the problem of representational harms in pretrained models. The paper proposes a metric, safety score, to measure the harms. Then, the paper shows a study of this metric on 13 marginalized demographics using 24 pretrained models, and discuss the findings.
Strengths
- The paper is easy to f... |
This paper proposes a method to obtain a robust and efficient neural architecture by searching the best teacher layers and the number of filters for student network. Experiments are conducted on CIFAR and ImageNet-100, which show good performance over prior methods.
Strength:
1. It make senses to automatically search f... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper proposes a method to obtain a robust and efficient neural architecture by searching the best teacher layers and the number of filters for student network. Experiments are conducted on CIFAR and ImageNet-100, which show good performance over prior methods.
Strength:
1. It make senses to automatically ... |
This paper proposes a technique to improve inter-domain migration after investigating how pre-trained models can improve the general offline RL problem, using reinforcement learning as a paradigm for sequence modeling, and investigating the transferability of pre-trained sequence models on other domains (vision, langua... | Recommendation: 6: marginally above the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper proposes a technique to improve inter-domain migration after investigating how pre-trained models can improve the general offline RL problem, using reinforcement learning as a paradigm for sequence modeling, and investigating the transferability of pre-trained sequence models on other domains (vision... |
The paper investigates the effect of noise injection in the form of additive noise during training and inference of a specific class of neural network models energy based generative models, which are roughly variational encoders whose output is interpreted as energy: smaller energy corresponds to the correct class pred... | Recommendation: 3: reject, not good enough | Area: Generative models | Review:
The paper investigates the effect of noise injection in the form of additive noise during training and inference of a specific class of neural network models energy based generative models, which are roughly variational encoders whose output is interpreted as energy: smaller energy corresponds to the correct cl... |
This paper proposes a simple but well-performing technique of reparameterizing each weight matrix of implicit neural representations (INRs) as a product of diagonal matrix (with diagonal elements being equal to the exponential of a single parameter) and another matrix. Empirically, it turns out that the reparameterized... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper proposes a simple but well-performing technique of reparameterizing each weight matrix of implicit neural representations (INRs) as a product of diagonal matrix (with diagonal elements being equal to the exponential of a single parameter) and another matrix. Empirically, it turns out that the reparam... |
The paper proposes an E(n) equivariant network acting on pointclouds with edges. The method is simple to compute and shows competitive performance on various tasks.
The authors claim that their attention method is universal, and that it is more expressive than "dot product scalarization" attention used in prior wok.
#... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
The paper proposes an E(n) equivariant network acting on pointclouds with edges. The method is simple to compute and shows competitive performance on various tasks.
The authors claim that their attention method is universal, and that it is more expressive than "dot product scalarization" attention used in prio... |
Authors propose an offline imitation learning algorithm that annotates rewards by using Optimal Transport (w.r.t. expert trajectories) solver and uses those reward with the offline RL to mimic expert behavior without environment interactions. The algorithm is evaluated on D4RL benchmarks (which is a widely adopted benc... | Recommendation: 5: marginally below the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
Authors propose an offline imitation learning algorithm that annotates rewards by using Optimal Transport (w.r.t. expert trajectories) solver and uses those reward with the offline RL to mimic expert behavior without environment interactions. The algorithm is evaluated on D4RL benchmarks (which is a widely adop... |
The authors consider the task of unsupervised learning of protein structures. They do so by maximizing the mutual information between two diffusion trajectories that start with a protein and a perturbed copy of the protein. The authors prove a lower bound of the mutual information which resembles an ELBO and specifical... | Recommendation: 5: marginally below the acceptance threshold | Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability ) | Review:
The authors consider the task of unsupervised learning of protein structures. They do so by maximizing the mutual information between two diffusion trajectories that start with a protein and a perturbed copy of the protein. The authors prove a lower bound of the mutual information which resembles an ELBO and sp... |
This work proposes a Graph Neural Network (CktGNN) to automate the design for both the device parameters (device sizing) and the circuit topology.
Furthermore, the paper also proposes an open source dataset, Open Circuit Benchmark (OCB), which consists of 10k operational amplifiers with detailed circuit specifications.... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This work proposes a Graph Neural Network (CktGNN) to automate the design for both the device parameters (device sizing) and the circuit topology.
Furthermore, the paper also proposes an open source dataset, Open Circuit Benchmark (OCB), which consists of 10k operational amplifiers with detailed circuit specifi... |
This paper proposes a plug-and-play method for robust estimation of perturbed data in time series identification and prediction. The proposed method assumes perturbations in a part of time series data and performs estimation by aggregating multiple masked and imputed time series data outputs. Experimental results with ... | Recommendation: 5: marginally below the acceptance threshold | Area: General Machine Learning | Review:
This paper proposes a plug-and-play method for robust estimation of perturbed data in time series identification and prediction. The proposed method assumes perturbations in a part of time series data and performs estimation by aggregating multiple masked and imputed time series data outputs. Experimental resul... |
The paper presents a contrastive learning approach by maximizing manifold capacity via a nuclear norm for self-supervised representation learning. Experiments show that the proposed approach is able to yield better linear evaluation performance, extract sementically relevant features, and be more robust to adversarial ... | Recommendation: 5: marginally below the acceptance threshold | Area: Unsupervised and Self-supervised learning | Review:
The paper presents a contrastive learning approach by maximizing manifold capacity via a nuclear norm for self-supervised representation learning. Experiments show that the proposed approach is able to yield better linear evaluation performance, extract sementically relevant features, and be more robust to adve... |
This works presents a memory based method to deal with learning in Zipfian distributions, i.e., when some of the training data is rarely visited. To do so, authors start from an existing IMPALA + an Episodic Memory (MEM) method, and introduce a "familiarity buffer" that acts as a long-term memory and selects the top k ... | Recommendation: 5: marginally below the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This works presents a memory based method to deal with learning in Zipfian distributions, i.e., when some of the training data is rarely visited. To do so, authors start from an existing IMPALA + an Episodic Memory (MEM) method, and introduce a "familiarity buffer" that acts as a long-term memory and selects th... |
This paper investigates the reason why data augmentation is effective in learning models. They look into different hypotheses: how augmentation encourages invariance, variance regularization, providing an additional source of stochasticity. They also look into the scaling laws of augmentation. The findings of this pape... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
This paper investigates the reason why data augmentation is effective in learning models. They look into different hypotheses: how augmentation encourages invariance, variance regularization, providing an additional source of stochasticity. They also look into the scaling laws of augmentation. The findings of t... |
This work proposes FedDure, a method for semi-supervised learning (SSL) in federated learning. FedDure employs two “regulators” in order to improve performance in SSL scenarios. The first regulator is the C(oarse) reg(ulator); its job is to regularise the local model training by taking into account the pseudo-labels th... | Recommendation: 5: marginally below the acceptance threshold | Area: Unsupervised and Self-supervised learning | Review:
This work proposes FedDure, a method for semi-supervised learning (SSL) in federated learning. FedDure employs two “regulators” in order to improve performance in SSL scenarios. The first regulator is the C(oarse) reg(ulator); its job is to regularise the local model training by taking into account the pseudo-l... |
This paper proposes CLUTR, a curriculum learning algorithm based on PAIRED, which decouples
task representation and curriculum learning. The task representation is learned
using a LSTM-based recurrent VAE, after which the teacher updates the curriculum and
the protagonist and antagonist policies are updated according... | Recommendation: 5: marginally below the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper proposes CLUTR, a curriculum learning algorithm based on PAIRED, which decouples
task representation and curriculum learning. The task representation is learned
using a LSTM-based recurrent VAE, after which the teacher updates the curriculum and
the protagonist and antagonist policies are updated a... |
This paper proposed a model to turn one or more entities into a natural language sentence that describes their relationship (or define the entity when there's just one). The model is a modified BART model trained with entity->sentence samples from Wikipedia. By doing a single seq2seq training, the model is able to perf... | Recommendation: 3: reject, not good enough | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper proposed a model to turn one or more entities into a natural language sentence that describes their relationship (or define the entity when there's just one). The model is a modified BART model trained with entity->sentence samples from Wikipedia. By doing a single seq2seq training, the model is able... |
The paper proposes a method based on saliency maps to guide a classifier in tasks where only part of the image is relevant. The saliency maps are generated using an adversarial gradient descent on a fixed classifier and autoencoder. They are then combined with the classifier at several scales to finetune it. The method... | Recommendation: 5: marginally below the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
The paper proposes a method based on saliency maps to guide a classifier in tasks where only part of the image is relevant. The saliency maps are generated using an adversarial gradient descent on a fixed classifier and autoencoder. They are then combined with the classifier at several scales to finetune it. Th... |
Federated domain generalization aims to learn a global model from various distributed source domains and generalize the learned model in completely unseen domains, while keeping the privacy of the source domains. This paper proposes client-agnostic learning with mixed instance-global statistics and zero-shot adaptation... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
Federated domain generalization aims to learn a global model from various distributed source domains and generalize the learned model in completely unseen domains, while keeping the privacy of the source domains. This paper proposes client-agnostic learning with mixed instance-global statistics and zero-shot ad... |
This paper studies the problem of training a few-shot dense retriever, i.e., a dual encoder model that can operate well in on a new distribution with only a small number of question-paragraph pairs. To do so, they train a large LM to generate questions given unlabeled paragraphs as input. This LM is trained in a instru... | Recommendation: 8: accept, good paper | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper studies the problem of training a few-shot dense retriever, i.e., a dual encoder model that can operate well in on a new distribution with only a small number of question-paragraph pairs. To do so, they train a large LM to generate questions given unlabeled paragraphs as input. This LM is trained in ... |
This paper investigates the problem setting of off-policy hierarchical reinforcement learning, focusing on automatic-curriculum generation (via the proposed PIP) and bootstrapping from a handful of expert demonstrations using imitation-based regularization. The paper’s contributions include an adaptive parsing method ... | Recommendation: 5: marginally below the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper investigates the problem setting of off-policy hierarchical reinforcement learning, focusing on automatic-curriculum generation (via the proposed PIP) and bootstrapping from a handful of expert demonstrations using imitation-based regularization. The paper’s contributions include an adaptive parsing... |
The paper proposed a new large human-centric action recogntiion dataset. From empirical results testing all the SOTA models on this dataset, the paper shows that end-to-end learning is more effective and it can support temporally fine-grained tasks such as real-time repetition counting.
[Strength]
A new large human-cen... | Recommendation: 3: reject, not good enough | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
The paper proposed a new large human-centric action recogntiion dataset. From empirical results testing all the SOTA models on this dataset, the paper shows that end-to-end learning is more effective and it can support temporally fine-grained tasks such as real-time repetition counting.
[Strength]
A new large h... |
This paper studies several aspects of RL with non-markovian observations under the assumption there is no exploration issue (assumption 3.1) while focusing on asymptotic guarantees. The authors establish several results which are its key contributions:
1. Under several (quite harsh) assumptions, Q learning and policy g... | Recommendation: 3: reject, not good enough | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper studies several aspects of RL with non-markovian observations under the assumption there is no exploration issue (assumption 3.1) while focusing on asymptotic guarantees. The authors establish several results which are its key contributions:
1. Under several (quite harsh) assumptions, Q learning and ... |
This paper develops an adversarially robust anomaly detection through the diffusion model, called FreeRAD. This paper makes an interesting finding that leveraging the diffusion model for anomaly detection can achieve adversarial robustness for free. Experimental results show that the model can still achieve good perfor... | Recommendation: 5: marginally below the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper develops an adversarially robust anomaly detection through the diffusion model, called FreeRAD. This paper makes an interesting finding that leveraging the diffusion model for anomaly detection can achieve adversarial robustness for free. Experimental results show that the model can still achieve goo... |
This paper proposes a way to transfer (or align ) a trained method from offline learning to online learning. This method has three steps: (modified) offline learning, actor-critic alignment, and online training. In modified offline learning, they use a modified version of TD3-BC where they use soft-actor-critic inste... | Recommendation: 3: reject, not good enough | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper proposes a way to transfer (or align ) a trained method from offline learning to online learning. This method has three steps: (modified) offline learning, actor-critic alignment, and online training. In modified offline learning, they use a modified version of TD3-BC where they use soft-actor-crit... |
This work introduces masked visual token modeling (MVTM) for video generation by extending ViT-VQGAN and MaskGIT into the video domain. The modified ViT-VQGAN tokenizer for video has two blocks with spatial- and temporal attention. To mitigate the nature of fixed code resolution in image (or video) tokenizer, it modifi... | Recommendation: 6: marginally above the acceptance threshold | Area: Generative models | Review:
This work introduces masked visual token modeling (MVTM) for video generation by extending ViT-VQGAN and MaskGIT into the video domain. The modified ViT-VQGAN tokenizer for video has two blocks with spatial- and temporal attention. To mitigate the nature of fixed code resolution in image (or video) tokenizer, i... |
In this paper, the authors try to unravel why domain generalization is much more difficult in the adversarial scenario. Since the generalization bound is with respect to the adversarial Rademacher complexity term, they propose to analyze this key measure and show that adversarial Rademacher complexity is always greater... | Recommendation: 3: reject, not good enough | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
In this paper, the authors try to unravel why domain generalization is much more difficult in the adversarial scenario. Since the generalization bound is with respect to the adversarial Rademacher complexity term, they propose to analyze this key measure and show that adversarial Rademacher complexity is always... |
The paper suggests using a function that lower-bounds the optimal Q function (such as Monte-Carlo returns) as target values in Q-learning methods for faster convergence. The authors provide a theoretical justification for this technique and propose several variants for episodic/goal-reaching/non-episodic settings. They... | Recommendation: 5: marginally below the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
The paper suggests using a function that lower-bounds the optimal Q function (such as Monte-Carlo returns) as target values in Q-learning methods for faster convergence. The authors provide a theoretical justification for this technique and propose several variants for episodic/goal-reaching/non-episodic settin... |
The authors propose an approach for self-supervised representation learning of brain signal, as recorded by EEG and SEEG. The representations are trained to optimize a loss with three components. The first component is a multi-channel version of the InfoNCE loss, used in contrastive predictive coding. The channels are ... | Recommendation: 8: accept, good paper | Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability ) | Review:
The authors propose an approach for self-supervised representation learning of brain signal, as recorded by EEG and SEEG. The representations are trained to optimize a loss with three components. The first component is a multi-channel version of the InfoNCE loss, used in contrastive predictive coding. The chann... |
The paper proposes a new regularization for Graph Neural Networks. Signal smoothness in cases if discrete node classification task is hard to define. Instead, the paper proposes to look at the distribution of the class labels at per node level and define smoothness on the distributional graph signals. The proposed regu... | Recommendation: 5: marginally below the acceptance threshold | Area: General Machine Learning | Review:
The paper proposes a new regularization for Graph Neural Networks. Signal smoothness in cases if discrete node classification task is hard to define. Instead, the paper proposes to look at the distribution of the class labels at per node level and define smoothness on the distributional graph signals. The propo... |
The paper aims to force the latent distribution to be close to a normal distribution in AE, similar to the goal of $\beta$-VAE. To do this the paper applies a good-of-fitness test, and optimize the reconstruction error with the test statistics as a regularization term. The paper then proposes a manifold SGD to solve th... | Recommendation: 6: marginally above the acceptance threshold | Area: Generative models | Review:
The paper aims to force the latent distribution to be close to a normal distribution in AE, similar to the goal of $\beta$-VAE. To do this the paper applies a good-of-fitness test, and optimize the reconstruction error with the test statistics as a regularization term. The paper then proposes a manifold SGD to ... |
This paper proposes a novel random and layer-wise token dropping method (random-LTD), which skips the computation of a subset of the input tokens at all middle layers. The new random-LTD method does not require any importance score-based metrics but just random selection, and hence saves computational cost. In addition... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper proposes a novel random and layer-wise token dropping method (random-LTD), which skips the computation of a subset of the input tokens at all middle layers. The new random-LTD method does not require any importance score-based metrics but just random selection, and hence saves computational cost. In ... |
This paper proposes a new method for deep learning with noisy labels. The method is based on the independent noise transition assumption, i.e., the label noise is independent of the input data. Existing methods, either with or without anchors, attempt to find a minimum enclosing convex hull for the noise transition mat... | Recommendation: 8: accept, good paper | Area: General Machine Learning | Review:
This paper proposes a new method for deep learning with noisy labels. The method is based on the independent noise transition assumption, i.e., the label noise is independent of the input data. Existing methods, either with or without anchors, attempt to find a minimum enclosing convex hull for the noise transi... |
This paper proposes a new method to learn discrete EBMs based on ratio-matching. Specifically, they consider the “discrete extension of generalised score matching”. The main disadvantage of this approach is that it is inefficient in time and memory complexity since you need to compute d + 1 energies (d perturbations an... | Recommendation: 8: accept, good paper | Area: General Machine Learning | Review:
This paper proposes a new method to learn discrete EBMs based on ratio-matching. Specifically, they consider the “discrete extension of generalised score matching”. The main disadvantage of this approach is that it is inefficient in time and memory complexity since you need to compute d + 1 energies (d perturba... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.