review
stringlengths
5
16.6k
score
stringclasses
5 values
area
stringclasses
12 values
text
stringlengths
31
5.65k
The paper proposes Neural-Symbolic Recursive Machine (NSR) as a means for neural networks to learn compositional rules through 3 modules, one for processing perception, syntactic parsing and semantic reasoning. These modules made up the Grounded Symbol System (GSS) and are jointly learned through a deduction-abduction ...
Recommendation: 6: marginally above the acceptance threshold
Area: General Machine Learning
Review: The paper proposes Neural-Symbolic Recursive Machine (NSR) as a means for neural networks to learn compositional rules through 3 modules, one for processing perception, syntactic parsing and semantic reasoning. These modules made up the Grounded Symbol System (GSS) and are jointly learned through a deduction-ab...
The standard GAE estimator uses a lambda weighted average of the k-step returns to estimate the advantage, i.e., it uses $\lambda(r_0 + \gamma V(s_1)) + \lambda^2 (r_0 + \gamma r_1 + \gamma^2 V(s_2) + ...)$ (in a normalized fashion). In this standard method, the sequence continues until the terminal state or until $\in...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The standard GAE estimator uses a lambda weighted average of the k-step returns to estimate the advantage, i.e., it uses $\lambda(r_0 + \gamma V(s_1)) + \lambda^2 (r_0 + \gamma r_1 + \gamma^2 V(s_2) + ...)$ (in a normalized fashion). In this standard method, the sequence continues until the terminal state or un...
The paper shows that randomized smoothing in floating point arithmetic is susceptible to adversarial attacks. * Strength The paper shows that randomized smoothing in floating point arithmetic, which has not been an obvious attack angle. * Weakness The proposed solution requires i.i.d. random numbers, which in pract...
Recommendation: 6: marginally above the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The paper shows that randomized smoothing in floating point arithmetic is susceptible to adversarial attacks. * Strength The paper shows that randomized smoothing in floating point arithmetic, which has not been an obvious attack angle. * Weakness The proposed solution requires i.i.d. random numbers, which ...
The paper presents a novel generative task of generating textual descriptions from music. They focus on a small dataset of classical music recordings paired with expert descriptions and present comparative experiments using various pre-trained language models vs their method with a novel topology-preservation loss. Str...
Recommendation: 3: reject, not good enough
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The paper presents a novel generative task of generating textual descriptions from music. They focus on a small dataset of classical music recordings paired with expert descriptions and present comparative experiments using various pre-trained language models vs their method with a novel topology-preservation l...
This paper proposed a new partical-based variational inference method by minimization the functional gradient of KL with a regularization where preconditioning seems to be crucial for the performance. The efficiency compared to SVGD is illustrated on several standard benchmark data sets. Relations to previous work were...
Recommendation: 6: marginally above the acceptance threshold
Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes)
Review: This paper proposed a new partical-based variational inference method by minimization the functional gradient of KL with a regularization where preconditioning seems to be crucial for the performance. The efficiency compared to SVGD is illustrated on several standard benchmark data sets. Relations to previous w...
To improve the attack-defense gap for robust classifiers, the paper suggests using a sample-specific attack-based flag, Counter-Attack(CA), that tells the user if there are adversarial samples within a $\epsilon$-ball of the given sample. In the case of a perfect attack, the authors show that Counter-Attack also provi...
Recommendation: 6: marginally above the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: To improve the attack-defense gap for robust classifiers, the paper suggests using a sample-specific attack-based flag, Counter-Attack(CA), that tells the user if there are adversarial samples within a $\epsilon$-ball of the given sample. In the case of a perfect attack, the authors show that Counter-Attack al...
This article introduces a vectorization---called PersGril---of $2$-parameter-based persistence, akin to the well-known persistence landscapes routinely used for 1-persistent homology. They prove that their vectorization is stable (1-Lipschitz for the infinite norm) with respect to the inputs functions $\mathcal{X} \to ...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This article introduces a vectorization---called PersGril---of $2$-parameter-based persistence, akin to the well-known persistence landscapes routinely used for 1-persistent homology. They prove that their vectorization is stable (1-Lipschitz for the infinite norm) with respect to the inputs functions $\mathcal...
The author proposed to a new geo-encoding method called GeoVeX. The idea is to train an autoencoder on the OSM data projected to H3. Experiments show that GeoVeX outperforms baselines like Hex2Vec and Space2Vec. Strength - The paper is clearly written and experiments demonstrated GeoVeX's improvement. Weakness - The ...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: The author proposed to a new geo-encoding method called GeoVeX. The idea is to train an autoencoder on the OSM data projected to H3. Experiments show that GeoVeX outperforms baselines like Hex2Vec and Space2Vec. Strength - The paper is clearly written and experiments demonstrated GeoVeX's improvement. Weaknes...
This paper proposes ModelAngelo, a two-step pipeline to predict the protein structure using cryo-EM maps and protein sequences as input. To do this, ModelAngelo first employs a 3D CNN to predict positions of alpha carbons in protein sequences taking cryo-EM maps as input. Apart from this, they train a separate graph ne...
Recommendation: 5: marginally below the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: This paper proposes ModelAngelo, a two-step pipeline to predict the protein structure using cryo-EM maps and protein sequences as input. To do this, ModelAngelo first employs a 3D CNN to predict positions of alpha carbons in protein sequences taking cryo-EM maps as input. Apart from this, they train a separate ...
The paper presents a method to estimate 3D rotations of an object from images using classical physics. The paper is focused on predicting satellite rotations. It uses Hamiltonian representation of rotational motion. With this representation, motion trajectory is differentiable everywhere. This is not true for rotation...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: The paper presents a method to estimate 3D rotations of an object from images using classical physics. The paper is focused on predicting satellite rotations. It uses Hamiltonian representation of rotational motion. With this representation, motion trajectory is differentiable everywhere. This is not true for ...
The authors introduce a novel method for Preference-based Reinforcement Learning, which targets the problem of non-Markovian rewards. Namely, that human trajectory preferences cannot be assumed to be based on a sum of Markovian rewards, as expected in common RL and PbRL settings. The method learns non-Markovian rewards...
Recommendation: 5: marginally below the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The authors introduce a novel method for Preference-based Reinforcement Learning, which targets the problem of non-Markovian rewards. Namely, that human trajectory preferences cannot be assumed to be based on a sum of Markovian rewards, as expected in common RL and PbRL settings. The method learns non-Markovian...
This paper proposes to initialize each linear layer of a deep neural network to be identity so as to accelerate training. Strengths: 1. The experiments are done on many datasets. 2. The code is attached for reproducibility. Weaknesses: 1. It has been shown (Thereom 5 in [1]) that the identity initialization may not l...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This paper proposes to initialize each linear layer of a deep neural network to be identity so as to accelerate training. Strengths: 1. The experiments are done on many datasets. 2. The code is attached for reproducibility. Weaknesses: 1. It has been shown (Thereom 5 in [1]) that the identity initialization m...
This paper presents a novel method for decoding images from FMRI, using a hierarchical VAE. First, a VAE is trained on images from imagenet. Then the encoder is removed, and a mapping is learned from the images to the latent variables of the VAE. The VAE is divided into lower and higher level areas (i.e., it's hierarch...
Recommendation: 8: accept, good paper
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper presents a novel method for decoding images from FMRI, using a hierarchical VAE. First, a VAE is trained on images from imagenet. Then the encoder is removed, and a mapping is learned from the images to the latent variables of the VAE. The VAE is divided into lower and higher level areas (i.e., it's ...
The paper proposes a way of defining the constraints in constrained RL via Scenario-based Programming. They demonstrate the approach on the problem of mapless navigation in simulation as well as on a real Turtlebot. Strengths: - The problem is interesting as defining the reward function and constraints can be difficul...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The paper proposes a way of defining the constraints in constrained RL via Scenario-based Programming. They demonstrate the approach on the problem of mapless navigation in simulation as well as on a real Turtlebot. Strengths: - The problem is interesting as defining the reward function and constraints can be ...
This paper presents an imitation learning-based task and motion planning (TAMP) method for active exploration and topological mapping of unknown indoor environments. Being metric-free, topological mapping allows for greater computational efficiency with respect to metric-based approaches. The method is composed of two ...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper presents an imitation learning-based task and motion planning (TAMP) method for active exploration and topological mapping of unknown indoor environments. Being metric-free, topological mapping allows for greater computational efficiency with respect to metric-based approaches. The method is composed...
Authors proposed GeoVEX as a framework for global representation learning in gespatial settings. The apprach leverages the H3 geospatial indexing system and data from Open Street Maps to create an embedding for each location on earth. An autoencoder like network architecture was introduced for the embedding generation ...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: Authors proposed GeoVEX as a framework for global representation learning in gespatial settings. The apprach leverages the H3 geospatial indexing system and data from Open Street Maps to create an embedding for each location on earth. An autoencoder like network architecture was introduced for the embedding gen...
The paper considers dynamics of stochastic gradient descent (SGD) and relates accuracy with a notion of "accuracy discrepancy". The paper shows that if the "accuracy discrepancy" is large enough, then SGD can find a model with perfect accuracy, while on the other hand if the "accuracy discrepancy" is small, there exist...
Recommendation: 5: marginally below the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: The paper considers dynamics of stochastic gradient descent (SGD) and relates accuracy with a notion of "accuracy discrepancy". The paper shows that if the "accuracy discrepancy" is large enough, then SGD can find a model with perfect accuracy, while on the other hand if the "accuracy discrepancy" is small, the...
This work find that the inherent edge noise can perturb the graph topology and labels, which may reduce link prediction performance. Thus, the authors propose an information bottleneck guided method, namely RGIB. RGIB achieves robustness representation of graphs. The experiments show effectiveness of RGIB. This paper i...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This work find that the inherent edge noise can perturb the graph topology and labels, which may reduce link prediction performance. Thus, the authors propose an information bottleneck guided method, namely RGIB. RGIB achieves robustness representation of graphs. The experiments show effectiveness of RGIB. This...
The paper presents a method for answering questions about scenarios -- questions for which there isn’t a fixed answer but is varied depending on additional conditions that are unstated in the text. Method: Given a scenario, a question, and a set of conditions (extracted from an input text) that are to be considered w...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The paper presents a method for answering questions about scenarios -- questions for which there isn’t a fixed answer but is varied depending on additional conditions that are unstated in the text. Method: Given a scenario, a question, and a set of conditions (extracted from an input text) that are to be cons...
This paper studies the problem of observationally robust reinforcement learning. In this setting, an agent learns via interacting with an MDP, but is evaluated in a version of this MDP where noise is added to the observed states by applying an (unknown) “noise kernel” $T: X \rightarrow \Delta(X)$; this evaluation envi...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper studies the problem of observationally robust reinforcement learning. In this setting, an agent learns via interacting with an MDP, but is evaluated in a version of this MDP where noise is added to the observed states by applying an (unknown) “noise kernel” $T: X \rightarrow \Delta(X)$; this evaluat...
This paper proposes a defensive mechanism, Cognitive Distillation (CD), that extracts potential trigger patterns (and a mask) responsible for the model's prediction. The paper starts with the observation that, even if the trigger pattern consists of multiple pixels and/or is complex, a few pixel values correspond to ac...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This paper proposes a defensive mechanism, Cognitive Distillation (CD), that extracts potential trigger patterns (and a mask) responsible for the model's prediction. The paper starts with the observation that, even if the trigger pattern consists of multiple pixels and/or is complex, a few pixel values correspo...
This paper incorporates the lateral inhibition of neuron into the Deep network for image classification. Results show the effectiveness of the proposed mechanism. The lateral inhibition is not novel but the idea to explore the usability of the lateral inhibition into artificial neural network is interesting. The key w...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper incorporates the lateral inhibition of neuron into the Deep network for image classification. Results show the effectiveness of the proposed mechanism. The lateral inhibition is not novel but the idea to explore the usability of the lateral inhibition into artificial neural network is interesting. T...
A contrastive learning based self-supervised visual representation learning method is proposed in this paper. Upon observing the positive and negative assignments of training samples, this paper proposes to construct a candidate neighbor set where top candidate neighbors are selected as positive samples. When contribut...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: A contrastive learning based self-supervised visual representation learning method is proposed in this paper. Upon observing the positive and negative assignments of training samples, this paper proposes to construct a candidate neighbor set where top candidate neighbors are selected as positive samples. When c...
This paper studies the exploration problem for MDPs with transition kernel captured by general function classes with bounded covering number. The transition dynamics is assumed to be a low-rank Gaussian RBF kernel with unknown features of states and actions, which captures both linear MDPs and a number of neural nets a...
Recommendation: 8: accept, good paper
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper studies the exploration problem for MDPs with transition kernel captured by general function classes with bounded covering number. The transition dynamics is assumed to be a low-rank Gaussian RBF kernel with unknown features of states and actions, which captures both linear MDPs and a number of neura...
The paper proposes a method for solving the quantum many body problem using neural networks as variational ansatz. In contrast to more standard approaches which model the wave function directly, authors use a score-based model (hence modeling the gradient of the underlying probability distribution associated with the w...
Recommendation: 5: marginally below the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: The paper proposes a method for solving the quantum many body problem using neural networks as variational ansatz. In contrast to more standard approaches which model the wave function directly, authors use a score-based model (hence modeling the gradient of the underlying probability distribution associated wi...
This paper proposes a contrastive learning method to balance the learning of positive and negative tokens in text generation tasks (e.g., language modeling and open-domain dialogue generation tasks). **Strength** 1. The paper is easy to follow and the idea is intuitive. 2. Several case studies are given which are enc...
Recommendation: 3: reject, not good enough
Area: Generative models
Review: This paper proposes a contrastive learning method to balance the learning of positive and negative tokens in text generation tasks (e.g., language modeling and open-domain dialogue generation tasks). **Strength** 1. The paper is easy to follow and the idea is intuitive. 2. Several case studies are given which...
This paper proposes a new data-augmentation strategy based on curriculum learning for long-tail problems. The key idea is to estimate the appropriate strength of data augmentation needed for each class during training. The proposed method was evaluated on widely used datasets and achieved favorable performance. ## Stre...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposes a new data-augmentation strategy based on curriculum learning for long-tail problems. The key idea is to estimate the appropriate strength of data augmentation needed for each class during training. The proposed method was evaluated on widely used datasets and achieved favorable performance....
This work provides a formal definition for robustness based on learning theoretical terms. Specifically, holomorphicity enables complexity analysis tool to investigate the phenomenon of adversarial examples. In addition, the analysis provides a geometrical interpretation for these phenomena. Strength: It is novel to s...
Recommendation: 5: marginally below the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: This work provides a formal definition for robustness based on learning theoretical terms. Specifically, holomorphicity enables complexity analysis tool to investigate the phenomenon of adversarial examples. In addition, the analysis provides a geometrical interpretation for these phenomena. Strength: It is no...
An RL algorithm, TAM, is proposed to solve large-scale VRP problems. TAM learns how to split the problem into smaller problems and then solve the smaller problems which are instances of TSP by well-performed heuristic algorithms like LKH3. The splitting problem is defined as an RL problem in which the state of the sys...
Recommendation: 6: marginally above the acceptance threshold
Area: General Machine Learning
Review: An RL algorithm, TAM, is proposed to solve large-scale VRP problems. TAM learns how to split the problem into smaller problems and then solve the smaller problems which are instances of TSP by well-performed heuristic algorithms like LKH3. The splitting problem is defined as an RL problem in which the state of...
This work provides a convergence guarantee for using a score-based diffusion model to sample from an arbitrary distribution. The method has significantly looser assumptions than previous work, and accounts for three sources of error: (1) L2 score estimation error, (2) discretization of the reverse SDE sampling algorith...
Recommendation: 8: accept, good paper
Area: Generative models
Review: This work provides a convergence guarantee for using a score-based diffusion model to sample from an arbitrary distribution. The method has significantly looser assumptions than previous work, and accounts for three sources of error: (1) L2 score estimation error, (2) discretization of the reverse SDE sampling ...
The paper aims to analyze the Denoising effect provided by GNNs (on corrupted graph data, typically with noisy labels). It recalls the Neumann Graph Convolution (NGC) perspective and how it connects with Graph Signal Denoising (GSD). It defines the High-order Graph Connectivity Factor, \tau, which is a measure of the...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: The paper aims to analyze the Denoising effect provided by GNNs (on corrupted graph data, typically with noisy labels). It recalls the Neumann Graph Convolution (NGC) perspective and how it connects with Graph Signal Denoising (GSD). It defines the High-order Graph Connectivity Factor, \tau, which is a measur...
This paper introduces a new paradigm to cluster incomplete vectors using subspaces as proxies to exploit the geometry of the Grassmannian. The authors leverage this new perspective to develop an algorithm to cluster and complete data in a union of subspaces via a fusion penalty formulation. The analysis with synthetic ...
Recommendation: 5: marginally below the acceptance threshold
Area: Unsupervised and Self-supervised learning
Review: This paper introduces a new paradigm to cluster incomplete vectors using subspaces as proxies to exploit the geometry of the Grassmannian. The authors leverage this new perspective to develop an algorithm to cluster and complete data in a union of subspaces via a fusion penalty formulation. The analysis with sy...
This paper aims to guarantee the performance fairness among different clients in federated learning, while protecting the overall average performance from being sacrificed. The authors propose two algorithms based on variance reduction (in terms of all clients) and semi-variance reduction (in terms of the worst-off cli...
Recommendation: 5: marginally below the acceptance threshold
Area: General Machine Learning
Review: This paper aims to guarantee the performance fairness among different clients in federated learning, while protecting the overall average performance from being sacrificed. The authors propose two algorithms based on variance reduction (in terms of all clients) and semi-variance reduction (in terms of the worst...
This paper aims to investigate the role of regularization used in existing GNN explainers. The paper analyzes the interpretable GNN model proposed by Miao et al. 2022 by rewriting the training objective function and mapping it into two parts, the feature attribution objective and the feature selection objective. And th...
Recommendation: 1: strong reject
Area: Deep Learning and representational learning
Review: This paper aims to investigate the role of regularization used in existing GNN explainers. The paper analyzes the interpretable GNN model proposed by Miao et al. 2022 by rewriting the training objective function and mapping it into two parts, the feature attribution objective and the feature selection objective...
This paper proposes an algorithm that solves bilevel optimization problem in an asynchronous distributed manner. The iteration complexity for the algorithm to obtain $\epsilon$-stationary point is upper bounded by $\mathcal{O}(\frac{1}{\epsilon^2})$. Empirical results show that under asynchronous setting, the proposed ...
Recommendation: 5: marginally below the acceptance threshold
Area: Optimization (eg, convex and non-convex optimization)
Review: This paper proposes an algorithm that solves bilevel optimization problem in an asynchronous distributed manner. The iteration complexity for the algorithm to obtain $\epsilon$-stationary point is upper bounded by $\mathcal{O}(\frac{1}{\epsilon^2})$. Empirical results show that under asynchronous setting, the p...
This paper proposes a new method to deal with backdoor attacks problems. Existing backdoor attack algorithms could not deal with high corruption ratio well, the proposed method, however, leverage on the noisy label defense algorithm to develop a robust version of backdoor defense. By applying adversarial learning on se...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposes a new method to deal with backdoor attacks problems. Existing backdoor attack algorithms could not deal with high corruption ratio well, the proposed method, however, leverage on the noisy label defense algorithm to develop a robust version of backdoor defense. By applying adversarial learni...
The paper introduces a novel face interaction mechanism for GNN-based rigid body simulators to solve the penetration issue existing when the contact point is far from nodes. The new framework significantly increases the accuracy of contact resolution and enables the simulation of complex shapes. The framework is even m...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: The paper introduces a novel face interaction mechanism for GNN-based rigid body simulators to solve the penetration issue existing when the contact point is far from nodes. The new framework significantly increases the accuracy of contact resolution and enables the simulation of complex shapes. The framework i...
The authors propose an uncertainty aware active learning domain adaptation based on imposing a dirichlet prior over model predictions. This allows them to get a distribution over model predictions, which in turn enables them to compute 2 kinds of uncertainty measures for each target datapoint. 1) target distribution un...
Recommendation: 6: marginally above the acceptance threshold
Area: General Machine Learning
Review: The authors propose an uncertainty aware active learning domain adaptation based on imposing a dirichlet prior over model predictions. This allows them to get a distribution over model predictions, which in turn enables them to compute 2 kinds of uncertainty measures for each target datapoint. 1) target distrib...
This paper proposes a training-free two-stage method based on Codex model for QA tasks. The first stage uses few-shot learning to prompt Codex and converts a natural language question to a SQL or Python program, where difficult-to-resolve parts are represented as API calls. In the second stage, Codex is prompted again ...
Recommendation: 8: accept, good paper
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper proposes a training-free two-stage method based on Codex model for QA tasks. The first stage uses few-shot learning to prompt Codex and converts a natural language question to a SQL or Python program, where difficult-to-resolve parts are represented as API calls. In the second stage, Codex is prompte...
In this paper, the authors claim that existing distance metric learning methods update the distance metric based on local relationships and ignore the more global ones (however, this claim is not right). The authors argue that updating distance metric based on the closest class centers has some drawbacks and they claim...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: In this paper, the authors claim that existing distance metric learning methods update the distance metric based on local relationships and ignore the more global ones (however, this claim is not right). The authors argue that updating distance metric based on the closest class centers has some drawbacks and th...
This paper considers training a global model on the server using updates receive from clients. The paper proposes that clients and the server collaborate to solve a bi-level optimization problem. This enables the server to learn the global model using the optimal parameter and combination of the local objectives. Stren...
Recommendation: 6: marginally above the acceptance threshold
Area: Optimization (eg, convex and non-convex optimization)
Review: This paper considers training a global model on the server using updates receive from clients. The paper proposes that clients and the server collaborate to solve a bi-level optimization problem. This enables the server to learn the global model using the optimal parameter and combination of the local objective...
This paper focuses on the problem of optimising multivariate Gaussian likelihoods, specifically wrt to its mean and covariance matrix. They identify the root causes of various failure modes in Gaussian likelihood optimisation through the lens of spectral analysis. Specifically, they characterise these modes based on th...
Recommendation: 3: reject, not good enough
Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes)
Review: This paper focuses on the problem of optimising multivariate Gaussian likelihoods, specifically wrt to its mean and covariance matrix. They identify the root causes of various failure modes in Gaussian likelihood optimisation through the lens of spectral analysis. Specifically, they characterise these modes bas...
This work discovers interesting phenomena about benign overfitting: 1) even training on random labels, early layers can still learn meaningful representations; 2) deep layers are prone to fit noises in data and cannot learn useful features. Strength: 1. The paper is well-written and easy to follow. The idea is well-mot...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This work discovers interesting phenomena about benign overfitting: 1) even training on random labels, early layers can still learn meaningful representations; 2) deep layers are prone to fit noises in data and cannot learn useful features. Strength: 1. The paper is well-written and easy to follow. The idea is ...
This paper focuses on generating counterfactual explanations for model predictions, and then proposes an end-to-end learning framework that learns an explanation generator while training the predictive model. They also analyze the challenges in jointly training the predictor and the explanation generator and propose an...
Recommendation: 3: reject, not good enough
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper focuses on generating counterfactual explanations for model predictions, and then proposes an end-to-end learning framework that learns an explanation generator while training the predictive model. They also analyze the challenges in jointly training the predictor and the explanation generator and pr...
A network architecture and the corresponding training strategy for solving data assimilation problems are proposed. ### Strengths - Method is simple. - Improvement is clearly shown, compared to at least one baseline. ### Weaknesses 1. The motivation behind the design choice of the proposed method is not overly clear...
Recommendation: 6: marginally above the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: A network architecture and the corresponding training strategy for solving data assimilation problems are proposed. ### Strengths - Method is simple. - Improvement is clearly shown, compared to at least one baseline. ### Weaknesses 1. The motivation behind the design choice of the proposed method is not over...
This paper investigates the behavior of contrastive learning (CL) and supervised learning (SL) frameworks in response to changes in data distribution. To achieve this, they develop a variety of data corruption strategies, including patch, pixel, and dataset-level corruption. For experiments, they conduct a comprehensiv...
Recommendation: 5: marginally below the acceptance threshold
Area: Unsupervised and Self-supervised learning
Review: This paper investigates the behavior of contrastive learning (CL) and supervised learning (SL) frameworks in response to changes in data distribution. To achieve this, they develop a variety of data corruption strategies, including patch, pixel, and dataset-level corruption. For experiments, they conduct a comp...
This paper proposed Knowledge Distillation (KD) method for Graph Neural Networks. The proposed method is motivated by a recent study that shows that GNNs can be compressed to inference-friendly multi-layer perceptrons (MLPs) by training MLPs using the soft labels of labeled and unlabeled nodes from the teacher. Howe...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposed Knowledge Distillation (KD) method for Graph Neural Networks. The proposed method is motivated by a recent study that shows that GNNs can be compressed to inference-friendly multi-layer perceptrons (MLPs) by training MLPs using the soft labels of labeled and unlabeled nodes from the teache...
The paper discusses the problem of learning from multiple MDPs, each corresponding to a different value for hidden factors such as physical properties (friction, gravity etc.) The authors propose estimating an embedding based on a similarity matrix of trajectories, and then use a contrastive loss to learn a $z$ that ma...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The paper discusses the problem of learning from multiple MDPs, each corresponding to a different value for hidden factors such as physical properties (friction, gravity etc.) The authors propose estimating an embedding based on a similarity matrix of trajectories, and then use a contrastive loss to learn a $z$...
The paper proposes a reinforcement learning framework for active learning for deep learning where the examples to be annotated are selected by a policy. The policy is learned by a DQN to maximize (discounted) reward. The paper seems to be built upon works of Konyushkova et al. 2017b, 2018. A principled framework, that ...
Recommendation: 3: reject, not good enough
Area: General Machine Learning
Review: The paper proposes a reinforcement learning framework for active learning for deep learning where the examples to be annotated are selected by a policy. The policy is learned by a DQN to maximize (discounted) reward. The paper seems to be built upon works of Konyushkova et al. 2017b, 2018. A principled framewor...
The paper presents a regularizer that enforces that the condition embedding and the latent embedding of the input datum share the maximal mutual information between them. This regularizer then helps the diffusion process because the condition is rich with information about the latent embeddings, and thus helping the de...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The paper presents a regularizer that enforces that the condition embedding and the latent embedding of the input datum share the maximal mutual information between them. This regularizer then helps the diffusion process because the condition is rich with information about the latent embeddings, and thus helpin...
This paper proposes a new ensembling framework to reduce inference cost and boost the performance. The proposed method build additional light-weight head as bridges to ensemble different runs. The experiments show the effectiveness of the proposed method on CIFAR-10, CIFAR-100, and tiny-ImageNet. Strengths: (1) The ide...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposes a new ensembling framework to reduce inference cost and boost the performance. The proposed method build additional light-weight head as bridges to ensemble different runs. The experiments show the effectiveness of the proposed method on CIFAR-10, CIFAR-100, and tiny-ImageNet. Strengths: (1)...
This paper focuses on zero-shot setting and looks into generating prompts that will improve zero shot performance. It has been known that LLMs behave very differently given even slightly different prompts, and a lot of effort can be spent finding the perfect prompt. Authors propose to, given the input, generate several...
Recommendation: 8: accept, good paper
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper focuses on zero-shot setting and looks into generating prompts that will improve zero shot performance. It has been known that LLMs behave very differently given even slightly different prompts, and a lot of effort can be spent finding the perfect prompt. Authors propose to, given the input, generate...
This paper studies an online control setting where the online controller is encouraged to stay away from the obstacles. The authors consider a linear time-invariant system with time-invariant quadratic costs and the class of disturbance-action controllers. Despite the control costs that penalizes the state and control ...
Recommendation: 6: marginally above the acceptance threshold
Area: Optimization (eg, convex and non-convex optimization)
Review: This paper studies an online control setting where the online controller is encouraged to stay away from the obstacles. The authors consider a linear time-invariant system with time-invariant quadratic costs and the class of disturbance-action controllers. Despite the control costs that penalizes the state and ...
The authors propose the problem of progressive distillation: approximating a large model with an ensemble of smaller models. They seek a solution that \emph{decomposes} the large model, such that the quality of the approximation improves monotonically with the size of the ensemble. They formulate progressive distillati...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: The authors propose the problem of progressive distillation: approximating a large model with an ensemble of smaller models. They seek a solution that \emph{decomposes} the large model, such that the quality of the approximation improves monotonically with the size of the ensemble. They formulate progressive di...
This paper explored fine-tuning extremely large models with DP-SGD and proposed methods to reduce the memory and improve the efficiency of the per-example gradient clipping. The authors demonstrated that per-layer gradient clipping with adaptively tuned clipping bounds can be as efficient as non-private training and ac...
Recommendation: 8: accept, good paper
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper explored fine-tuning extremely large models with DP-SGD and proposed methods to reduce the memory and improve the efficiency of the per-example gradient clipping. The authors demonstrated that per-layer gradient clipping with adaptively tuned clipping bounds can be as efficient as non-private trainin...
The paper proposes a new interpretable method for unsupervised or semi-supervised anomaly detection on tabular data, in the presence of noisy or unlabeled data. Strengths: - Innovative approach based on generative additive models. - The model is explainable. - There is a little technical contribution (Prop 1) creating...
Recommendation: 6: marginally above the acceptance threshold
Area: Unsupervised and Self-supervised learning
Review: The paper proposes a new interpretable method for unsupervised or semi-supervised anomaly detection on tabular data, in the presence of noisy or unlabeled data. Strengths: - Innovative approach based on generative additive models. - The model is explainable. - There is a little technical contribution (Prop 1) ...
In the continual federated learning, the stream input data usually is provided non__iid which affects adversely on the learning performance. The authors used generative replay idea for continual learning, in which there is no need to transfer data among the clients and servers (in federated learning framework), rather...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: In the continual federated learning, the stream input data usually is provided non__iid which affects adversely on the learning performance. The authors used generative replay idea for continual learning, in which there is no need to transfer data among the clients and servers (in federated learning framework)...
This paper presents a method to train text based diffusion models which can generate text non-autoregressively modeling bidirectional context. Since diffusion models work in continuous domains only, the authors propose the following changes to the standard setup (1) represent a sequence of tokens as a sequence of pretr...
Recommendation: 6: marginally above the acceptance threshold
Area: Generative models
Review: This paper presents a method to train text based diffusion models which can generate text non-autoregressively modeling bidirectional context. Since diffusion models work in continuous domains only, the authors propose the following changes to the standard setup (1) represent a sequence of tokens as a sequence ...
This paper focuses on the problem that graph convolutional networks are limited to the undirected graph due to theoretically needing the symmetric matrix for the Laplacian transform. To tackle the problem, this paper generalizes the spectral convolution operator to directed graphs by field extension, overcoming the sym...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This paper focuses on the problem that graph convolutional networks are limited to the undirected graph due to theoretically needing the symmetric matrix for the Laplacian transform. To tackle the problem, this paper generalizes the spectral convolution operator to directed graphs by field extension, overcoming...
Sharpness-aware minimization (SAM) is a learning objective that improves upon maximum likelihood in terms of generalization, calibration and robustness of the resulting models. Intuitively, SAM drives the optimizer toward flatter minima, which are known to be desirable from the Bayes-optimal learning perspective. Howev...
Recommendation: 8: accept, good paper
Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes)
Review: Sharpness-aware minimization (SAM) is a learning objective that improves upon maximum likelihood in terms of generalization, calibration and robustness of the resulting models. Intuitively, SAM drives the optimizer toward flatter minima, which are known to be desirable from the Bayes-optimal learning perspectiv...
The paper proposed a weakly supervised setting where single-frame ground truth annotation is provided among many video frames; and the single ground truth annotation only provides an unlocalized scene graph. To tackle this problem, a new Psuedo Label Assignment (PLA) method is proposed. [advantages] 1. The paper is we...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The paper proposed a weakly supervised setting where single-frame ground truth annotation is provided among many video frames; and the single ground truth annotation only provides an unlocalized scene graph. To tackle this problem, a new Psuedo Label Assignment (PLA) method is proposed. [advantages] 1. The pap...
This work conducts extensive experiments, showing that the ability of common neural network architectures to learn formal languages can roughly be characterized by the Chomsky hierarchy. Another contribution of this paper is that, the results empirically confirmed that augmenting neural network architectures with aux...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: This work conducts extensive experiments, showing that the ability of common neural network architectures to learn formal languages can roughly be characterized by the Chomsky hierarchy. Another contribution of this paper is that, the results empirically confirmed that augmenting neural network architectures ...
This paper students the theoretical properties of two variants of retrieval-based models, a popular topic in improving large models. The two variants are formulated as a local empirical risk minimization problem and a classification problem in an extended feature space. Theoretical analysis are given in terms of the ex...
Recommendation: 5: marginally below the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: This paper students the theoretical properties of two variants of retrieval-based models, a popular topic in improving large models. The two variants are formulated as a local empirical risk minimization problem and a classification problem in an extended feature space. Theoretical analysis are given in terms o...
The paper is dedicated to a theoretical analysis of the saturation effect, that is the gap between information theoretical lower bound on the generalization error of KRR and the actual error. This effect has been widely observed in practices. The main result of the paper is given in Theorem 3.1, that deduces a lower bo...
Recommendation: 6: marginally above the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: The paper is dedicated to a theoretical analysis of the saturation effect, that is the gap between information theoretical lower bound on the generalization error of KRR and the actual error. This effect has been widely observed in practices. The main result of the paper is given in Theorem 3.1, that deduces a ...
This paper presents a self-supervise learning method using an entropy loss across multi-segments embedding vectors (MUSIC). This method automatically learn different types of attributes in each of multi segments. Unlike the contrastive learning and its variants, it does not require negative samples in a large batch me...
Recommendation: 5: marginally below the acceptance threshold
Area: Unsupervised and Self-supervised learning
Review: This paper presents a self-supervise learning method using an entropy loss across multi-segments embedding vectors (MUSIC). This method automatically learn different types of attributes in each of multi segments. Unlike the contrastive learning and its variants, it does not require negative samples in a large ...
The paper proposes a new efficient transformer model for time series forecasting – which mitigates the typical O(N^2) forecast time using a approximation based on vector quantisation. The model demonstrates outperformance over other O(N) RNN methods across a variety of datasets. Strengths --- While transformer models ...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: The paper proposes a new efficient transformer model for time series forecasting – which mitigates the typical O(N^2) forecast time using a approximation based on vector quantisation. The model demonstrates outperformance over other O(N) RNN methods across a variety of datasets. Strengths --- While transformer...
The paper analyses the computation of mutual information in DNN with dropout. It shows that mutual information for discrete dropout is infinite, but for continuous drop it is a well defined finite quantity. The paper shows how this can be estimated using Monte Carlo techniques and empirically shows that this quantity...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: The paper analyses the computation of mutual information in DNN with dropout. It shows that mutual information for discrete dropout is infinite, but for continuous drop it is a well defined finite quantity. The paper shows how this can be estimated using Monte Carlo techniques and empirically shows that this ...
The authors investigated the alignment between DNNs' representations of objects in the THINGS dataset and humans' judgments of those same images. They found that the newest and largest-scale models trained on larger-than-imagenet datasets like the JIT-300 or trained with caption embeddings (e.g., CLIP) performed the be...
Recommendation: 8: accept, good paper
Area: Neuroscience and Cognitive Science (e.g., neural coding, brain-computer interfaces)
Review: The authors investigated the alignment between DNNs' representations of objects in the THINGS dataset and humans' judgments of those same images. They found that the newest and largest-scale models trained on larger-than-imagenet datasets like the JIT-300 or trained with caption embeddings (e.g., CLIP) performe...
This paper proposes a hierarchical graph neural network for protein property prediction. It models a protein at three levels -- amino acids, its backbone atoms, and its side chain atoms. Each level is modeled by a ComENet layer that learns a complete representation of the geometric structure. The method is evaluated on...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposes a hierarchical graph neural network for protein property prediction. It models a protein at three levels -- amino acids, its backbone atoms, and its side chain atoms. Each level is modeled by a ComENet layer that learns a complete representation of the geometric structure. The method is eval...
This paper proposes a method for single-stage open-world instance segmentation. It is the first to uses the SOTA Mask2Former architecture for this task. Additionally, to tackle the problem of "missing annotations" while training for open-world segmentations with the limited category labels in the training dataset, the ...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper proposes a method for single-stage open-world instance segmentation. It is the first to uses the SOTA Mask2Former architecture for this task. Additionally, to tackle the problem of "missing annotations" while training for open-world segmentations with the limited category labels in the training datas...
This paper makes the first step to combine personalized federated hypernetworks (PFH) with reinforcement learning (RL) and applies their method in the specific field of price-setting for energy demand response. The proposed method can work when the common centralized training with decentralized execution (CTDE) framewo...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper makes the first step to combine personalized federated hypernetworks (PFH) with reinforcement learning (RL) and applies their method in the specific field of price-setting for energy demand response. The proposed method can work when the common centralized training with decentralized execution (CTDE)...
This paper proposes a new diffusion model for generating 3D molecules using the guidance energy function. In order to incorporate various energy functions into the proposed framework, the authors theoretically demonstrate that those functions are invariant to transformations, which is an essential feature for 3D molecu...
Recommendation: 6: marginally above the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: This paper proposes a new diffusion model for generating 3D molecules using the guidance energy function. In order to incorporate various energy functions into the proposed framework, the authors theoretically demonstrate that those functions are invariant to transformations, which is an essential feature for 3...
This paper considers a class of accelerated algorithms and provides some analysis for noisy inputs to the algorithm. It is shown that the algorithms will converge even when presented with gradients corrupted with gaussian noise on quadratic losses. Experimental results on deep learning benchmarks show competitive perfo...
Recommendation: 3: reject, not good enough
Area: Optimization (eg, convex and non-convex optimization)
Review: This paper considers a class of accelerated algorithms and provides some analysis for noisy inputs to the algorithm. It is shown that the algorithms will converge even when presented with gradients corrupted with gaussian noise on quadratic losses. Experimental results on deep learning benchmarks show competiti...
This paper investigates whether models trained on ImageNet with increased accuracy transfer their improved accuracy to multiple datasets. Many models are investigated on a benchmark of six publicly available datasets that try to capture the characteristics practical classification applications. The main finding is that...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: This paper investigates whether models trained on ImageNet with increased accuracy transfer their improved accuracy to multiple datasets. Many models are investigated on a benchmark of six publicly available datasets that try to capture the characteristics practical classification applications. The main finding...
The authors propose a new statistic, called Expected Perturbation Score (EPS), for adversarial detection. Based on EPS, the authors develop a Maximum Mean Difference (MMD) metric to measure the difference between test samples and natural samples, and further propose an EPS-based adversarial detection method (EPS-AD). S...
Recommendation: 8: accept, good paper
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The authors propose a new statistic, called Expected Perturbation Score (EPS), for adversarial detection. Based on EPS, the authors develop a Maximum Mean Difference (MMD) metric to measure the difference between test samples and natural samples, and further propose an EPS-based adversarial detection method (EP...
This paper proposes a method named LEGO to efficiently train a transformer model by initializing it with a pretrained smaller transformer. The method expands the pretrained transformer model on width and depth by learning linear maps on the parameters. Experiments on various language and vision tasks show that LEGO can...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper proposes a method named LEGO to efficiently train a transformer model by initializing it with a pretrained smaller transformer. The method expands the pretrained transformer model on width and depth by learning linear maps on the parameters. Experiments on various language and vision tasks show that ...
The paper focuses on designing a graph-based algorithm for multi-variate long-term forecasting STRENGTHS - Interesting and relevant topic WEAKNESSES - The paper is presenting a very complex approach, however it is failing to beat simple baselines [1,2]. Therefore, results are not convincing. Comparing results of thi...
Recommendation: 1: strong reject
Area: Deep Learning and representational learning
Review: The paper focuses on designing a graph-based algorithm for multi-variate long-term forecasting STRENGTHS - Interesting and relevant topic WEAKNESSES - The paper is presenting a very complex approach, however it is failing to beat simple baselines [1,2]. Therefore, results are not convincing. Comparing result...
The paper proposes a gradient-based learning scheme that deals with changing parameters during learning. For this, the authors give a context of their algorithm to the classical momentum learning strategy and a multi-timescale model from neuroscience. The algorithm is derived using a Bayesian inference framework, where...
Recommendation: 6: marginally above the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: The paper proposes a gradient-based learning scheme that deals with changing parameters during learning. For this, the authors give a context of their algorithm to the classical momentum learning strategy and a multi-timescale model from neuroscience. The algorithm is derived using a Bayesian inference framewor...
This paper proposes a transformer-based architecture for molecular property prediction. The proposed method represents a molecule at two different levels: substructure-level and atom-level. The substructures of a molecule are extracted through MACCS fingerprint. Each substructure is embedded as a token and encoded by a...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposes a transformer-based architecture for molecular property prediction. The proposed method represents a molecule at two different levels: substructure-level and atom-level. The substructures of a molecule are extracted through MACCS fingerprint. Each substructure is embedded as a token and enco...
The paper proposes Graph Schemas, a particular type of action-conditioned HMM with deterministic emissions. The uncertainty comes from the transition matrix, as well as observation "clones", i.e. multiple nodes that output the same observation. These schemas can then be transferred by keeping T fixed while changing E, ...
Recommendation: 3: reject, not good enough
Area: Neuroscience and Cognitive Science (e.g., neural coding, brain-computer interfaces)
Review: The paper proposes Graph Schemas, a particular type of action-conditioned HMM with deterministic emissions. The uncertainty comes from the transition matrix, as well as observation "clones", i.e. multiple nodes that output the same observation. These schemas can then be transferred by keeping T fixed while chan...
The paper studies approximation algorithms for k-means and k-median clustering in the presence of "advice" in the form of an oracle that approximately provides the optimal clustering. The main assumption is that the algorithm has access to a clustering that agrees with an optimal clustering with parameter "\alpha". The...
Recommendation: 6: marginally above the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: The paper studies approximation algorithms for k-means and k-median clustering in the presence of "advice" in the form of an oracle that approximately provides the optimal clustering. The main assumption is that the algorithm has access to a clustering that agrees with an optimal clustering with parameter "\alp...
This paper focuses on conditional image generation and image-to-image translation. Although current methods enable both tasks work well, they fail to formulate suitable constraints for the joint distribution, since there can be infinitely many joint distributions that can derive the same marginals. Inspired by Indepen...
Recommendation: 6: marginally above the acceptance threshold
Area: Generative models
Review: This paper focuses on conditional image generation and image-to-image translation. Although current methods enable both tasks work well, they fail to formulate suitable constraints for the joint distribution, since there can be infinitely many joint distributions that can derive the same marginals. Inspired by...
The authors formulate a new min-max multi-objective bilevel optimization problem and applied it in robust ML and HPO. They also proposed a new algorithm to find a solution to the proposed new problem and establish its convergence rate and computational complexity. Strength 1. The authors did a thorough literature revie...
Recommendation: 5: marginally below the acceptance threshold
Area: Optimization (eg, convex and non-convex optimization)
Review: The authors formulate a new min-max multi-objective bilevel optimization problem and applied it in robust ML and HPO. They also proposed a new algorithm to find a solution to the proposed new problem and establish its convergence rate and computational complexity. Strength 1. The authors did a thorough literatu...
This paper presents a python package and an approach called fairgrad. The goal of fairgrad is to learn model parameters that satisfy accuracy parity or its approximate equivalent across groups of a dataset. Fairgrad does this by formulating a constrained optimization problem, which is to minimize a model perfomance met...
Recommendation: 6: marginally above the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper presents a python package and an approach called fairgrad. The goal of fairgrad is to learn model parameters that satisfy accuracy parity or its approximate equivalent across groups of a dataset. Fairgrad does this by formulating a constrained optimization problem, which is to minimize a model perfom...
In this paper, the authors propose a passive filter pruning method worked on scene classification and image classification tasks. In detail, the authors aim to compute filter importance with the norm of each convolution layer and leverage singular value decomposition to compute a rank-1 approximation of the target chan...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: In this paper, the authors propose a passive filter pruning method worked on scene classification and image classification tasks. In detail, the authors aim to compute filter importance with the norm of each convolution layer and leverage singular value decomposition to compute a rank-1 approximation of the tar...
This paper proposes a method for optimal training set selection with the goal of maximizing generalization to multiple unknown target domains for NLP tasks. One of the goals of the method is to perform data selection on the training set only without knowledge of any target domain. To achieve this, the paper proposes a ...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper proposes a method for optimal training set selection with the goal of maximizing generalization to multiple unknown target domains for NLP tasks. One of the goals of the method is to perform data selection on the training set only without knowledge of any target domain. To achieve this, the paper pro...
It has been shown by Ergen and Pilanci (2020) that 2 layer relu neural networks with squared L2 regularization are equivalent to regularized convex problems. The latter convex problems are in extremely high dimension and thus not tractable. The regularization in the equivalent convex problems encourages low rank. hence...
Recommendation: 6: marginally above the acceptance threshold
Area: Optimization (eg, convex and non-convex optimization)
Review: It has been shown by Ergen and Pilanci (2020) that 2 layer relu neural networks with squared L2 regularization are equivalent to regularized convex problems. The latter convex problems are in extremely high dimension and thus not tractable. The regularization in the equivalent convex problems encourages low ran...
The authors provided a general minimax framework to tackle the unknown similarity between the target and source in transfer learning problems. Some specific f-divergences were considered as the similarity measure and population-level best minimax estimators were derived. The best minimax estimators turned out to be a w...
Recommendation: 5: marginally below the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: The authors provided a general minimax framework to tackle the unknown similarity between the target and source in transfer learning problems. Some specific f-divergences were considered as the similarity measure and population-level best minimax estimators were derived. The best minimax estimators turned out t...
The paper introduces "accuracy boosters" that aim to train DNNs using HBFP4 for most of the epochs while switching to HBFP6 for the last few epochs. Thy show that mixed precision training is applicable under HBFP setting and achieve similar accuracy with better hardware utilization. Strengths: * Good background secti...
Recommendation: 8: accept, good paper
Area: General Machine Learning
Review: The paper introduces "accuracy boosters" that aim to train DNNs using HBFP4 for most of the epochs while switching to HBFP6 for the last few epochs. Thy show that mixed precision training is applicable under HBFP setting and achieve similar accuracy with better hardware utilization. Strengths: * Good backgrou...
The authors empirically study hybrid block floating-point (HBFP). HBFP uses a single shared exponent with a block of multiple mantissas. The authors run training experiments on CIFAR-10/100 using ResNets and DeseNet40 with HBFP. Mantissa bits of 6, 5, and 4 are tested with block size ranging from 16 to 576. Both forwar...
Recommendation: 3: reject, not good enough
Area: General Machine Learning
Review: The authors empirically study hybrid block floating-point (HBFP). HBFP uses a single shared exponent with a block of multiple mantissas. The authors run training experiments on CIFAR-10/100 using ResNets and DeseNet40 with HBFP. Mantissa bits of 6, 5, and 4 are tested with block size ranging from 16 to 576. Bot...
This paper focuses on neural machine translation and develops a new NAS approach. Specifically, the authors propose a transformer-based search space by incorporating the MoE module into it. Nevertheless, the novelty seems very limited since the proposed method can be regarded as a direct application of HAT on MoE archi...
Recommendation: 3: reject, not good enough
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper focuses on neural machine translation and develops a new NAS approach. Specifically, the authors propose a transformer-based search space by incorporating the MoE module into it. Nevertheless, the novelty seems very limited since the proposed method can be regarded as a direct application of HAT on M...
This paper proposes a new tensor decomposition method for neural network compression. The main idea is to devise a decomposition structure that is composed of a sequence of Kronecker products, which generalizes most of the well-known tensor decompositions. Existing decompositions mostly rely on specific structures (of ...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: This paper proposes a new tensor decomposition method for neural network compression. The main idea is to devise a decomposition structure that is composed of a sequence of Kronecker products, which generalizes most of the well-known tensor decompositions. Existing decompositions mostly rely on specific structu...
This paper proposes deformable graph transformer (DGT) to efficiently perform attention on graphs. The deformable graph transformer mainly consists of two components: deformable graph attention and Katz positional encoding. Experiments on eight datasets show better performance. Strengths 1. The research problem is a f...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposes deformable graph transformer (DGT) to efficiently perform attention on graphs. The deformable graph transformer mainly consists of two components: deformable graph attention and Katz positional encoding. Experiments on eight datasets show better performance. Strengths 1. The research proble...
The paper presents two key ideas: periodic activation function and anti-aliased activation. Both of these choices enable the generation of raw audio from mel-spectrogram with unprecedented quality for unseen speakers and recording conditions. Strengths: * Addresses some of the key challenges in raw audio synthesis * S...
Recommendation: 8: accept, good paper
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The paper presents two key ideas: periodic activation function and anti-aliased activation. Both of these choices enable the generation of raw audio from mel-spectrogram with unprecedented quality for unseen speakers and recording conditions. Strengths: * Addresses some of the key challenges in raw audio synth...
This paper proposes a method for the problem of 2D to 3D pose lifting. The authors propose to divide the all joints of a pose into several groups, and then use separate networks to lift each group of joints independently. A recombining network then takes as input the features of lifting networks and estimates the full ...
Recommendation: 3: reject, not good enough
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper proposes a method for the problem of 2D to 3D pose lifting. The authors propose to divide the all joints of a pose into several groups, and then use separate networks to lift each group of joints independently. A recombining network then takes as input the features of lifting networks and estimates t...
Given Joint policy optimization encourages knowledge sharing and social behaviors, this paper connects the dots between policy gradient formulation of joint policy optimization and MI maximization. Authors have proposed a minimax formulation of MI (M&M) that enables agents specialization with stable regularization. It’...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: Given Joint policy optimization encourages knowledge sharing and social behaviors, this paper connects the dots between policy gradient formulation of joint policy optimization and MI maximization. Authors have proposed a minimax formulation of MI (M&M) that enables agents specialization with stable regularizat...
This paper considers a realistic DP notion called Inter-silo Record-level DP (ISRL-DP) which can address the shortcoming of central DP and LDP. An algorithm satisfying ISRL-DP requires that the output of this algorithm cannot be distinguished between two adjacent dataset of any agent, given all other agents’ dataset be...
Recommendation: 6: marginally above the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper considers a realistic DP notion called Inter-silo Record-level DP (ISRL-DP) which can address the shortcoming of central DP and LDP. An algorithm satisfying ISRL-DP requires that the output of this algorithm cannot be distinguished between two adjacent dataset of any agent, given all other agents’ da...
This paper proposes a pair of robust metric for the evaluation of generative models, dubbed Topological Precision and Recall (TopP&R). The proposed metric is proved to achieve consistency with robustness. The effectiveness is validated through experiments on both synthetic and real data. Strength: S1: A new pair of...
Recommendation: 5: marginally below the acceptance threshold
Area: Generative models
Review: This paper proposes a pair of robust metric for the evaluation of generative models, dubbed Topological Precision and Recall (TopP&R). The proposed metric is proved to achieve consistency with robustness. The effectiveness is validated through experiments on both synthetic and real data. Strength: S1: A new...
The paper provides algorithms for estimating stability of OLS to dropping a small fraction of samples. The theoretical results focus on low-dimensional regime and give algorithms with run-time exponential in $d$. The paper is clearly strong at a technical level. The results are sound and complete. The upper bound for ...
Recommendation: 8: accept, good paper
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: The paper provides algorithms for estimating stability of OLS to dropping a small fraction of samples. The theoretical results focus on low-dimensional regime and give algorithms with run-time exponential in $d$. The paper is clearly strong at a technical level. The results are sound and complete. The upper bo...
This paper introduces visual prompt tuning (VPT) methods in long-tailed recognition and proposes a modification to VPT to adapt to long-tailed scenarios with so-called long-tailed prompt tuning (LPT). The method is simple and effective. The results of compared benchmarks show improvements from the proposed LPT method. ...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: This paper introduces visual prompt tuning (VPT) methods in long-tailed recognition and proposes a modification to VPT to adapt to long-tailed scenarios with so-called long-tailed prompt tuning (LPT). The method is simple and effective. The results of compared benchmarks show improvements from the proposed LPT ...