review stringlengths 5 16.6k | score stringclasses 5
values | area stringclasses 12
values | text stringlengths 31 5.65k |
|---|---|---|---|
This paper studies the implicit emergence of mapping in simple recurrent blind agents. Removing the visual modality allows authors to reduce the possible strategies to reach the specified goal and to thus isolate the construction of an internal map. As mentioned in the paper, no technical novelty is proposed, but a stu... | Recommendation: 8: accept, good paper | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper studies the implicit emergence of mapping in simple recurrent blind agents. Removing the visual modality allows authors to reduce the possible strategies to reach the specified goal and to thus isolate the construction of an internal map. As mentioned in the paper, no technical novelty is proposed, b... |
This paper introduces an auto-encoder with the normalizing flow bottleneck called AE-FLOW for anomaly detection in medical images. The model combines the benefits of normalizing flow methods for computing the anomaly likelihood of extracted features at image level, and the interpretability of reconstruction-based metho... | Recommendation: 6: marginally above the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper introduces an auto-encoder with the normalizing flow bottleneck called AE-FLOW for anomaly detection in medical images. The model combines the benefits of normalizing flow methods for computing the anomaly likelihood of extracted features at image level, and the interpretability of reconstruction-bas... |
This paper proposes to learn multiple parameters (with a cosine distance regularization to emphasize the diversity of the learned parameters). During a testing period, one can use the interpolated parameter to increase model robustness. The authors also prove a couple of important theorems that i) a compressed paramete... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper proposes to learn multiple parameters (with a cosine distance regularization to emphasize the diversity of the learned parameters). During a testing period, one can use the interpolated parameter to increase model robustness. The authors also prove a couple of important theorems that i) a compressed ... |
The paper studies fundamental limits on the Lp robustness of a classifier.
The main result is that under natural assumptions, any classifier on n x n images will be vulnerable to L2 perturbations of size O(sqrt(n)).
The paper further shows that the result depends on the chosen bit-depth of images.
Strengths:
- Interest... | Recommendation: 5: marginally below the acceptance threshold | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
The paper studies fundamental limits on the Lp robustness of a classifier.
The main result is that under natural assumptions, any classifier on n x n images will be vulnerable to L2 perturbations of size O(sqrt(n)).
The paper further shows that the result depends on the chosen bit-depth of images.
Strengths:
- ... |
This work is concerned with vision-language representation learning. Main contribution is a new distillation technique that uses stronger uni-modal encoders as teacher network, to improve the finetuning performance of pre-trained VL models.
In specific, the work proposes Adaptive Distillation for Vision-Language (ADV... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
This work is concerned with vision-language representation learning. Main contribution is a new distillation technique that uses stronger uni-modal encoders as teacher network, to improve the finetuning performance of pre-trained VL models.
In specific, the work proposes Adaptive Distillation for Vision-Langu... |
This paper studies policy optimization for Markov Games to find the Nash equilibrium. The authors parameterize the policy by directly considering the probability for each state and action. The key contribution of this work is to propose a slow-fast framework with a series of conditions, and prove that any pair of slow ... | Recommendation: 8: accept, good paper | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper studies policy optimization for Markov Games to find the Nash equilibrium. The authors parameterize the policy by directly considering the probability for each state and action. The key contribution of this work is to propose a slow-fast framework with a series of conditions, and prove that any pair ... |
This paper presents an analysis of regression's reformulation as a classification problem and proposes an ordinal entropy loss to learn high-entropy feature representations which preserve ordinality based on the analysis.
The proposed method outperforms the previous regression loss, classification loss, and other compa... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
This paper presents an analysis of regression's reformulation as a classification problem and proposes an ordinal entropy loss to learn high-entropy feature representations which preserve ordinality based on the analysis.
The proposed method outperforms the previous regression loss, classification loss, and oth... |
The paper studies the subgraph localization problem -- given a target graph and a source graph, compute the alignment of the target graph in the source graph. The problem of alignment is closely related to that of detecting isomorphic subgraph in a source graph. The goal here is to compute an indicator function that id... | Recommendation: 3: reject, not good enough | Area: Unsupervised and Self-supervised learning | Review:
The paper studies the subgraph localization problem -- given a target graph and a source graph, compute the alignment of the target graph in the source graph. The problem of alignment is closely related to that of detecting isomorphic subgraph in a source graph. The goal here is to compute an indicator function... |
The paper proposes a generic model to learn intrinsic and extrinsic factors from various contexts using a contrastive learning component, and a disentangling component. Experimental results on real-world datasets demonstrate the effectiveness of the method. Additionally, theoretical proofs are provided for the refined ... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
The paper proposes a generic model to learn intrinsic and extrinsic factors from various contexts using a contrastive learning component, and a disentangling component. Experimental results on real-world datasets demonstrate the effectiveness of the method. Additionally, theoretical proofs are provided for the ... |
The paper uses image translation models to generate diverse biased views of images to debias models. For this, the paper observes that generative models find it easier to latch onto biases instead of the signal, which is consistent with the observation made by previous works for classification models. As such, when ask... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
The paper uses image translation models to generate diverse biased views of images to debias models. For this, the paper observes that generative models find it easier to latch onto biases instead of the signal, which is consistent with the observation made by previous works for classification models. As such, ... |
The paper proposes a novel Reinforcement Learning based unsupervised method for the task of goal planning for agent based exploration in a non task-centric paradigm.
# Strengths:
- (1) Readability.
Overall, the readability is fair. The main ideas are well conveyed, justified and articulated while mostly providing suf... | Recommendation: 8: accept, good paper | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
The paper proposes a novel Reinforcement Learning based unsupervised method for the task of goal planning for agent based exploration in a non task-centric paradigm.
# Strengths:
- (1) Readability.
Overall, the readability is fair. The main ideas are well conveyed, justified and articulated while mostly provi... |
The paper presents a structural learning algorithm for concurrently learning the multi-task learning architecture and its parameters. The multitask learning is performed by the creation and removal of neurons based on local similarity. The proposed method is validated on the Cityscapes and NYUv2 datasets for five diffe... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
The paper presents a structural learning algorithm for concurrently learning the multi-task learning architecture and its parameters. The multitask learning is performed by the creation and removal of neurons based on local similarity. The proposed method is validated on the Cityscapes and NYUv2 datasets for fi... |
This paper proposes a new algorithm to solve the problem of recovering, as much as possible, the original graphical causal structure at the causal timescale from the derived graphical structure at a measurement timescale, where measurements are made every u number of time steps for an unknown u. The new algorithm is ba... | Recommendation: 6: marginally above the acceptance threshold | Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes) | Review:
This paper proposes a new algorithm to solve the problem of recovering, as much as possible, the original graphical causal structure at the causal timescale from the derived graphical structure at a measurement timescale, where measurements are made every u number of time steps for an unknown u. The new algorit... |
In this paper, authors propose a new augmentation based on graph neural networks for graph contrastive learning. They decompose the graph neural networks as two parts: the diffusion part and the transformation part. Based on these, they propose weightPrune for the transformation and randMP for the diffusion part. They ... | Recommendation: 5: marginally below the acceptance threshold | Area: Unsupervised and Self-supervised learning | Review:
In this paper, authors propose a new augmentation based on graph neural networks for graph contrastive learning. They decompose the graph neural networks as two parts: the diffusion part and the transformation part. Based on these, they propose weightPrune for the transformation and randMP for the diffusion par... |
The paper proposes a novel algorithm to deal with Byzantine resilient decentralized optimization for data training.
+ The algorithm dose not rely on additional graph connectivity
+ The performance is better than some existing algorithms
- The algorithm does not guarantee accuracy of the optimization process
- The ide... | Recommendation: 5: marginally below the acceptance threshold | Area: Optimization (eg, convex and non-convex optimization) | Review:
The paper proposes a novel algorithm to deal with Byzantine resilient decentralized optimization for data training.
+ The algorithm dose not rely on additional graph connectivity
+ The performance is better than some existing algorithms
- The algorithm does not guarantee accuracy of the optimization process
-... |
This paper presents a graph-based method to solve point-cloud instance segmentation. The main idea is to train an attention-based deep network that predicts the probability of each pair of points belonging to the same instance. The first step of the proposed method builds a similarity matrix on the point cloud. Each en... | Recommendation: 3: reject, not good enough | Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability ) | Review:
This paper presents a graph-based method to solve point-cloud instance segmentation. The main idea is to train an attention-based deep network that predicts the probability of each pair of points belonging to the same instance. The first step of the proposed method builds a similarity matrix on the point cloud.... |
The paper studies an interesting problem on how to automatically generate augmented data for learning invairance representations. The paper proposes a MCMC based methods, and then tested the results in some datasets. The paper seems to be on a novel track of goals, but needs further development.
- strength
- the ... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
The paper studies an interesting problem on how to automatically generate augmented data for learning invairance representations. The paper proposes a MCMC based methods, and then tested the results in some datasets. The paper seems to be on a novel track of goals, but needs further development.
- strength
... |
The paper provides a method for meta-learning a preconditioner for gradient descent. The authors motivate the method from the mirror descent perspective, and use a convergence rate bound as a training objective. The authors parameterize the preconditioner in the K-FAC format [1]. Empirically, the method achieves good r... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
The paper provides a method for meta-learning a preconditioner for gradient descent. The authors motivate the method from the mirror descent perspective, and use a convergence rate bound as a training objective. The authors parameterize the preconditioner in the K-FAC format [1]. Empirically, the method achieve... |
The paper presents a hierarchy of latent representations weighted by a series of monotonically increasing hyper-parameters, which compose an information bottleneck. The authors empirically demonstrate their idea on dSprites and Shapes3D to show the proposed method is able to learn disentangled representations while pre... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
The paper presents a hierarchy of latent representations weighted by a series of monotonically increasing hyper-parameters, which compose an information bottleneck. The authors empirically demonstrate their idea on dSprites and Shapes3D to show the proposed method is able to learn disentangled representations w... |
The authors proposed to use the total amount of noise (TAN) to determine the privacy budget in Renyi DP. They observe scaling laws with TAN for DP-SGD which can be used to reduce the computational cost for hyper-parameter tuning. By the hyper-parameter tuning, the authors greatly improve the state-of-the-art on neural ... | Recommendation: 6: marginally above the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
The authors proposed to use the total amount of noise (TAN) to determine the privacy budget in Renyi DP. They observe scaling laws with TAN for DP-SGD which can be used to reduce the computational cost for hyper-parameter tuning. By the hyper-parameter tuning, the authors greatly improve the state-of-the-art on... |
This paper introduces an offline imitation learning algorithm. The proposed algorithm consists of two parts: (1) to train a world model using demonstration of any quality and (2) to train a policy using $\lambda$-TD where the reward function is computed as Equation (7) (i.e. intrinsic reward). Finally, the authors empi... | Recommendation: 5: marginally below the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper introduces an offline imitation learning algorithm. The proposed algorithm consists of two parts: (1) to train a world model using demonstration of any quality and (2) to train a policy using $\lambda$-TD where the reward function is computed as Equation (7) (i.e. intrinsic reward). Finally, the auth... |
The paper proposes a new coded distributed gradient descent approach to mitigate the effect of stragglers in the distributed computation of gradients. The authors combine prior schemes on coded distributed gradient computation with repetition of unfinished tasks from straggling nodes across computation rounds with the ... | Recommendation: 6: marginally above the acceptance threshold | Area: General Machine Learning | Review:
The paper proposes a new coded distributed gradient descent approach to mitigate the effect of stragglers in the distributed computation of gradients. The authors combine prior schemes on coded distributed gradient computation with repetition of unfinished tasks from straggling nodes across computation rounds w... |
This paper addresses the issue with representing (esp. heterophilic, power law) graphs by factorising the adjacency matrix into a combination of homophilic and heterophilic factors that are interpretable. Lower bounds based on logisitic principal components analysis (LPCA) is improved removing assumptions on the max de... | Recommendation: 6: marginally above the acceptance threshold | Area: General Machine Learning | Review:
This paper addresses the issue with representing (esp. heterophilic, power law) graphs by factorising the adjacency matrix into a combination of homophilic and heterophilic factors that are interpretable. Lower bounds based on logisitic principal components analysis (LPCA) is improved removing assumptions on th... |
The paper studies the effect of convolutional neural networks encoding position information due to padding. A new metric for measuring and visualizing the encoded positional information named Position-information Pattern from Padding (PPP) was proposed. The paper then discusses some of the disadvantages of the existing... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
The paper studies the effect of convolutional neural networks encoding position information due to padding. A new metric for measuring and visualizing the encoded positional information named Position-information Pattern from Padding (PPP) was proposed. The paper then discusses some of the disadvantages of the ... |
This work proposes ResGrad to improve the existing TTS models. Specifically, it uses a DFM to learn to generate the residual between an existing TTS model’s output and the groundtruth spectrogram. The residual is then added back to the TTS model’s output to get the refined output. Experiments on three datasets (LJSpeec... | Recommendation: 5: marginally below the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This work proposes ResGrad to improve the existing TTS models. Specifically, it uses a DFM to learn to generate the residual between an existing TTS model’s output and the groundtruth spectrogram. The residual is then added back to the TTS model’s output to get the refined output. Experiments on three datasets ... |
* The authors propose a method for predicting the Remaining Useful Life (RUL) of components. They combine an LSTM-based autoencoder to extract features and a Bi-LSTM network to predict RUL. They validate the approach in one dataset and make an extensive test of hyperparameters and execution setups. In the end, they com... | Recommendation: 3: reject, not good enough | Area: General Machine Learning | Review:
* The authors propose a method for predicting the Remaining Useful Life (RUL) of components. They combine an LSTM-based autoencoder to extract features and a Bi-LSTM network to predict RUL. They validate the approach in one dataset and make an extensive test of hyperparameters and execution setups. In the end, ... |
The paper proposes to learn a domain-invariant representation based on the probabilistic framework by mapping each data point into probabilistic embeddings. For this, a probabilistic MMD and a probabilistic CSA loss are proposed.
The paper proposes some new methodology and shows promising results on medical datasets. B... | Recommendation: 6: marginally above the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
The paper proposes to learn a domain-invariant representation based on the probabilistic framework by mapping each data point into probabilistic embeddings. For this, a probabilistic MMD and a probabilistic CSA loss are proposed.
The paper proposes some new methodology and shows promising results on medical dat... |
This paper studies the VCRed regularization in self-supervised learning algorithms. The authors show that VCReg enforces pairwise independence between the features of the learned representation. Detailed analysis is provided.
Strengths:
1: This paper studies the VCRed regularization in self-supervised learning algori... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper studies the VCRed regularization in self-supervised learning algorithms. The authors show that VCReg enforces pairwise independence between the features of the learned representation. Detailed analysis is provided.
Strengths:
1: This paper studies the VCRed regularization in self-supervised learnin... |
This paper proposes a scalable offline policy pre-training approach based on natural language instructions.
It enables automatic augmentation of pre-training data with large language models to relabel and chain across trajectories.
It empirically shows that the proposed approach outperforms prior pre-training approac... | Recommendation: 5: marginally below the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper proposes a scalable offline policy pre-training approach based on natural language instructions.
It enables automatic augmentation of pre-training data with large language models to relabel and chain across trajectories.
It empirically shows that the proposed approach outperforms prior pre-training... |
The paper makes the following improvements based on Vision Transformer (ViT).
1. The paper adds a Transformer Block to the existing ViT to predict coarse categories.
2. After obtaining the coarse category results, a simple self-attention mechanism is used to obtain the coarse category weights.
3. Finally, the coarse ca... | Recommendation: 5: marginally below the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
The paper makes the following improvements based on Vision Transformer (ViT).
1. The paper adds a Transformer Block to the existing ViT to predict coarse categories.
2. After obtaining the coarse category results, a simple self-attention mechanism is used to obtain the coarse category weights.
3. Finally, the c... |
This paper proposes to introduce two additional parameters – density and size scale in the box embedding for fine-grained entity typing. The experiments on three benchmarks show the proposed approach achieved some marginal improvements over the considered baselines.
Strength:
The authors introduced density and size sc... | Recommendation: 3: reject, not good enough | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper proposes to introduce two additional parameters – density and size scale in the box embedding for fine-grained entity typing. The experiments on three benchmarks show the proposed approach achieved some marginal improvements over the considered baselines.
Strength:
The authors introduced density and... |
Cache-timing Attack (CTA) endangers privacy and security of data. However, traditional detection methods are not extendable. This work tackles CTA and detection from game-theoretic perspective by proposing a deep multi-agent reinforcement learning (MARL) approach with transformer for attackers and detectors.
Strength:
... | Recommendation: 6: marginally above the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
Cache-timing Attack (CTA) endangers privacy and security of data. However, traditional detection methods are not extendable. This work tackles CTA and detection from game-theoretic perspective by proposing a deep multi-agent reinforcement learning (MARL) approach with transformer for attackers and detectors.
St... |
=================================================================
[Summary]
This paper proposes an improved version of ReLIC, dubbed ReLICv2, by including views of varying sizes and saliency masking into the ReLIC's training loss, and presents benchmarking results using ResNet encoders in several experiments.
====... | Recommendation: 5: marginally below the acceptance threshold | Area: Unsupervised and Self-supervised learning | Review:
=================================================================
[Summary]
This paper proposes an improved version of ReLIC, dubbed ReLICv2, by including views of varying sizes and saliency masking into the ReLIC's training loss, and presents benchmarking results using ResNet encoders in several experiment... |
**High level motivation:** The authors are interested in understanding what it takes for machine learning systems to reliable generalize to novel circumstances, especially when those are out-of-distribution.
**Research question:** Do insights from the theory of computation (specifically the Chomsky Hierarchy) inform ... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
**High level motivation:** The authors are interested in understanding what it takes for machine learning systems to reliable generalize to novel circumstances, especially when those are out-of-distribution.
**Research question:** Do insights from the theory of computation (specifically the Chomsky Hierarchy)... |
An approach is proposed for improving performance when corruption types are known in advance, and when one cannot or is not willing to retrain the underlying model. The approach involves 1. training a small corruption-type classifier that operates on carefully-normalized, frequency-domain input images, 2. a table of ba... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
An approach is proposed for improving performance when corruption types are known in advance, and when one cannot or is not willing to retrain the underlying model. The approach involves 1. training a small corruption-type classifier that operates on carefully-normalized, frequency-domain input images, 2. a tab... |
The authors present a multi-task learning framework called prefer-to-classify (P2C), which is based on pair-wise preference learning. Specifically, their work is focused on handling NLP tasks. The paper explains the overall approach, and the process of selecting informative pairs, and how the preferences are collected... | Recommendation: 3: reject, not good enough | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
The authors present a multi-task learning framework called prefer-to-classify (P2C), which is based on pair-wise preference learning. Specifically, their work is focused on handling NLP tasks. The paper explains the overall approach, and the process of selecting informative pairs, and how the preferences are c... |
This paper proposes a privacy-preserving class distribution estimation method for dealing with class-imbalanced FL scenarios.
S1. The paper is easy to follow.
S2. Some theoretical analysis is provided.
W1. The assumption of theorem 1 is unrealistic (i.e., the input distribution of all classes is equivalent). While th... | Recommendation: 3: reject, not good enough | Area: General Machine Learning | Review:
This paper proposes a privacy-preserving class distribution estimation method for dealing with class-imbalanced FL scenarios.
S1. The paper is easy to follow.
S2. Some theoretical analysis is provided.
W1. The assumption of theorem 1 is unrealistic (i.e., the input distribution of all classes is equivalent). ... |
This paper analyzes classes of online games for which classes of algorithms will always converge to a Nash equilibrium. The main result is: for m-strongly monotone games, any no-regret algorithm will converge to a Nash equilibrium, if m satisfies certain conditions. The paper also considers other types of algorithms: f... | Recommendation: 6: marginally above the acceptance threshold | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
This paper analyzes classes of online games for which classes of algorithms will always converge to a Nash equilibrium. The main result is: for m-strongly monotone games, any no-regret algorithm will converge to a Nash equilibrium, if m satisfies certain conditions. The paper also considers other types of algor... |
This paper introduces a method for explicit task clustering as an inductive bias for Meta-RL algorithms operating on a task distribution. The key assumption is heterogeneity within that task distribution, i.e. that the i.i.d. assumption of draws from the task distribution is unrealistic in real Meta-RL setting and that... | Recommendation: 6: marginally above the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper introduces a method for explicit task clustering as an inductive bias for Meta-RL algorithms operating on a task distribution. The key assumption is heterogeneity within that task distribution, i.e. that the i.i.d. assumption of draws from the task distribution is unrealistic in real Meta-RL setting ... |
This paper tackles the problem of OoD detection in the case where the distribution of training classes is not-uniform. In other words, the authors tackle OoD detection in the case of long-tail image recognition. The authors first make the observation that a number of existing OoD methods (either implicitly or explicitl... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
This paper tackles the problem of OoD detection in the case where the distribution of training classes is not-uniform. In other words, the authors tackle OoD detection in the case of long-tail image recognition. The authors first make the observation that a number of existing OoD methods (either implicitly or e... |
This paper proposes to identify semantic concepts that are not explicitly represented in the given image for caption generation by incorporating knowledge from an external knowledge graph (e.g., ConceptNet). Specifically, a ViT is trained to extract multimodal representations from image-text pairs with multiple pre-tra... | Recommendation: 3: reject, not good enough | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper proposes to identify semantic concepts that are not explicitly represented in the given image for caption generation by incorporating knowledge from an external knowledge graph (e.g., ConceptNet). Specifically, a ViT is trained to extract multimodal representations from image-text pairs with multiple... |
This paper deals with a specific setting of Federated Learning where the goal is to find an optimal weight between all the local objectives so that the learned parameter can be optimal for some different global task. To do so, this paper first formulates the above setting as a bi-level optimization problem over the wei... | Recommendation: 3: reject, not good enough | Area: Optimization (eg, convex and non-convex optimization) | Review:
This paper deals with a specific setting of Federated Learning where the goal is to find an optimal weight between all the local objectives so that the learned parameter can be optimal for some different global task. To do so, this paper first formulates the above setting as a bi-level optimization problem over... |
The paper proposes to seed Lloyd's iteration for computing k-means clustering, in the context of finite metric spaces, using the approximation the underlying metric by a convex combination of hierarchically separated tree metrics. This is claimed to achieve better approximation guarantees (for the seeding step) than cu... | Recommendation: 3: reject, not good enough | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
The paper proposes to seed Lloyd's iteration for computing k-means clustering, in the context of finite metric spaces, using the approximation the underlying metric by a convex combination of hierarchically separated tree metrics. This is claimed to achieve better approximation guarantees (for the seeding step)... |
A variants of GFlowNets with continuous state and action spaces is proposed, based the flow-matching conditions and importance sampling to approximate the sums over children and parents of each state. Low-dimenional control experiments are performed showing that a greater diversity of trajectories are obtained compared... | Recommendation: 8: accept, good paper | Area: Generative models | Review:
A variants of GFlowNets with continuous state and action spaces is proposed, based the flow-matching conditions and importance sampling to approximate the sums over children and parents of each state. Low-dimenional control experiments are performed showing that a greater diversity of trajectories are obtained ... |
The paper proposes a method for explaining black-box RL models called CrystalBox, developed primarily for Systems Environments (such as adaptive bitrate streaming and congestion control). CrystalBox involves using a simulator and trained policy to rollout different actions and predict reward-component values and produc... | Recommendation: 5: marginally below the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
The paper proposes a method for explaining black-box RL models called CrystalBox, developed primarily for Systems Environments (such as adaptive bitrate streaming and congestion control). CrystalBox involves using a simulator and trained policy to rollout different actions and predict reward-component values an... |
The paper studies experience replay mechanisms in a deep reinforcement learning (DRL) setting. Notably, it proposes a modification to the existing reverse experience replay method. The paper claims that purely prioritizing experiences according to TD errors and a naive (uniform) ER method may suffer from sub-optimal co... | Recommendation: 6: marginally above the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
The paper studies experience replay mechanisms in a deep reinforcement learning (DRL) setting. Notably, it proposes a modification to the existing reverse experience replay method. The paper claims that purely prioritizing experiences according to TD errors and a naive (uniform) ER method may suffer from sub-op... |
This paper studies the OOD generalization problem in the FL setting. Specifically, the author presents to use a test-time-training based strategy to ensemble the global and local prediction heads. The object function use in the TTT phase consists of two parts (1) the entropy of the predictive distribution. (2) feature ... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper studies the OOD generalization problem in the FL setting. Specifically, the author presents to use a test-time-training based strategy to ensemble the global and local prediction heads. The object function use in the TTT phase consists of two parts (1) the entropy of the predictive distribution. (2) ... |
The paper proposes a neural architecture GNT that uses transformers for novel view synthesis from multi-view images. Specifically, a view transformer aggregates feature from feature maps of input images to obtain features of sampled 3D points in the scene. Then a ray transformer learns to aggregate features of points a... | Recommendation: 6: marginally above the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
The paper proposes a neural architecture GNT that uses transformers for novel view synthesis from multi-view images. Specifically, a view transformer aggregates feature from feature maps of input images to obtain features of sampled 3D points in the scene. Then a ray transformer learns to aggregate features of ... |
This paper proposes CASR: a framework that generates complex sequences by iteratively editing previously generated sequences. The problem is well-motivated: in complex scenarios, we might need multiple rounds of editing to generate correct sequences. CASR achieves this goal by feeding a transformer model with input X a... | Recommendation: 6: marginally above the acceptance threshold | Area: Generative models | Review:
This paper proposes CASR: a framework that generates complex sequences by iteratively editing previously generated sequences. The problem is well-motivated: in complex scenarios, we might need multiple rounds of editing to generate correct sequences. CASR achieves this goal by feeding a transformer model with i... |
This manuscript proposes NIML to investigate the node importance in node classification meta-learning tasks. Specifically, it theoretically demonstrates the node importance between neighbors can increase the lower bound of the model accuracy. Then it proposes the node importance meta-learning architecture to learn the ... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
This manuscript proposes NIML to investigate the node importance in node classification meta-learning tasks. Specifically, it theoretically demonstrates the node importance between neighbors can increase the lower bound of the model accuracy. Then it proposes the node importance meta-learning architecture to le... |
This research examines contextual bandits in a federated learning environment. This is the first study applying federated learning to neural contextual bandits. The author(s) proposed the FN-UCB algorithm, which is shown to suffer from sub-linear regret and communication rounds. Both synthetic and real-world experiment... | Recommendation: 8: accept, good paper | Area: General Machine Learning | Review:
This research examines contextual bandits in a federated learning environment. This is the first study applying federated learning to neural contextual bandits. The author(s) proposed the FN-UCB algorithm, which is shown to suffer from sub-linear regret and communication rounds. Both synthetic and real-world ex... |
This paper proposes a new pooling technique named generalized sum pooling. It is claimed as a strict generalization of global average pooling. The experiments are conducted on four different datasets and achieve a SOTA performance.
I'm not an expert in this area, please correct me if I get it wrong.
Strength:
1. The ... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper proposes a new pooling technique named generalized sum pooling. It is claimed as a strict generalization of global average pooling. The experiments are conducted on four different datasets and achieve a SOTA performance.
I'm not an expert in this area, please correct me if I get it wrong.
Strength:... |
The authors focus on measuring bias in federated learning on tabular (US Census) and image (Celeb A) datasets. They measure fairness using demographic parity and equalized odds. They find that:
1. Some federated averaging may increase the disparity in some datasets (Table 1)
2. FL improves fairness for stand-alone mo... | Recommendation: 8: accept, good paper | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
The authors focus on measuring bias in federated learning on tabular (US Census) and image (Celeb A) datasets. They measure fairness using demographic parity and equalized odds. They find that:
1. Some federated averaging may increase the disparity in some datasets (Table 1)
2. FL improves fairness for stand-... |
This paper describes a variant of predictive coding, named incremental predictive coding (iPC), based on incremental EM, which it is argued should be considered a biologically plausible approach to learning in the brain. The complexity of iPC is considered in relation to back-propagation (BP), and a CPU implementation... | Recommendation: 5: marginally below the acceptance threshold | Area: Neuroscience and Cognitive Science (e.g., neural coding, brain-computer interfaces) | Review:
This paper describes a variant of predictive coding, named incremental predictive coding (iPC), based on incremental EM, which it is argued should be considered a biologically plausible approach to learning in the brain. The complexity of iPC is considered in relation to back-propagation (BP), and a CPU implem... |
The paper aims at using "Energy-based Predictive Representation (EPR)" to create a "unified approach to practical reinforcement learning algorithm design for both the MDP and POMDP settings, which enables learning, exploration, and planning to be handled in a coherent way".
Strengths:
- The claims are very ambitious
W... | Recommendation: 3: reject, not good enough | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
The paper aims at using "Energy-based Predictive Representation (EPR)" to create a "unified approach to practical reinforcement learning algorithm design for both the MDP and POMDP settings, which enables learning, exploration, and planning to be handled in a coherent way".
Strengths:
- The claims are very ambi... |
This paper investigates the impact of different DNN layers impact the performance of adversarial training (AT). The ablation experiments reveal that the latter (deeper) layers are more influential to the robust generalization gap and the final performance. Two techniques were then proposed to improve the performance of... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper investigates the impact of different DNN layers impact the performance of adversarial training (AT). The ablation experiments reveal that the latter (deeper) layers are more influential to the robust generalization gap and the final performance. Two techniques were then proposed to improve the perfor... |
The work studies the relationship between label noise and adversarial risk for interpolating classifiers (i.e., classifiers with zero training error). The authors prove that interpolating label noise induces high adversarial risk for any data distribution when the sample size is very large. To better align the undesirab... | Recommendation: 6: marginally above the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
The work studies the relationship between label noise and adversarial risk for interpolating classifiers (i.e., classifiers with zero training error). The authors prove that interpolating label noise induces high adversarial risk for any data distribution when the sample size is very large. To better align the u... |
This paper studies the problem of providing algorithmic recourses -- that is, providing users who were rejected by a model (e.g. denied a loan) a way to change themselves so that they will not be rejected in the future. The paper is specifically concerned with the setting where the model may change over time (e.g. by g... | Recommendation: 3: reject, not good enough | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
This paper studies the problem of providing algorithmic recourses -- that is, providing users who were rejected by a model (e.g. denied a loan) a way to change themselves so that they will not be rejected in the future. The paper is specifically concerned with the setting where the model may change over time (e... |
The authors construct a framework for assessing generalization performance of models for learning dynamical systems. For this they collect a variety of simulated benchmark data sets and introduce different tasks (forecasting, generalization, classification), and different evaluation measures and procedures. They exempl... | Recommendation: 3: reject, not good enough | Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability ) | Review:
The authors construct a framework for assessing generalization performance of models for learning dynamical systems. For this they collect a variety of simulated benchmark data sets and introduce different tasks (forecasting, generalization, classification), and different evaluation measures and procedures. The... |
This paper proposed a robustified transformer model motivated by the robust kernel density estimation. The proposed model alleviates the influence of bad data (e.g., outliers). The empirical studies on NLP and CV tasks demonstrate the effectiveness of the proposed methods.
Strength:
The proposed method enjoys promising... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
This paper proposed a robustified transformer model motivated by the robust kernel density estimation. The proposed model alleviates the influence of bad data (e.g., outliers). The empirical studies on NLP and CV tasks demonstrate the effectiveness of the proposed methods.
Strength:
The proposed method enjoys p... |
This paper studies the problem of learning with noisy labels. They broadly categorize the methods into two groups 1) that model the label noise 2) semi-supervised methods. The paper focuses on the problem that in practice it is hard to figure out which group of methods should be employed on the problem at hand. They of... | Recommendation: 3: reject, not good enough | Area: Unsupervised and Self-supervised learning | Review:
This paper studies the problem of learning with noisy labels. They broadly categorize the methods into two groups 1) that model the label noise 2) semi-supervised methods. The paper focuses on the problem that in practice it is hard to figure out which group of methods should be employed on the problem at hand.... |
The paper proposes a novel backdoor defense method (called WIPER) that includes: i) a new metric, called benign salience, to identify backdoored neurons; and ii) a new adaptive regularization mechanism to assist in purifying the identified bad neurons.
Strengths:
- empirical evaluation and effectiveness, i.e. the pro... | Recommendation: 5: marginally below the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
The paper proposes a novel backdoor defense method (called WIPER) that includes: i) a new metric, called benign salience, to identify backdoored neurons; and ii) a new adaptive regularization mechanism to assist in purifying the identified bad neurons.
Strengths:
- empirical evaluation and effectiveness, i.e.... |
The paper proposes a continuous control benchmark for multitask reinforcement learning supporting three axes of change: creature morphology (supporting state and action spaces of different dimensions), task (e.g. reach some place or touch some point), and goal.
The paper further develops the graph-based representation ... | Recommendation: 8: accept, good paper | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
The paper proposes a continuous control benchmark for multitask reinforcement learning supporting three axes of change: creature morphology (supporting state and action spaces of different dimensions), task (e.g. reach some place or touch some point), and goal.
The paper further develops the graph-based represe... |
This paper aims to address the issues existing in current collaborative self-supervised learning (SSL) schemes and proposes MocoSFL, a collaborative SSL framework based on Split Federated Learning (SFL) and Momentum Contrast (MoCo). In MocoSFL, the large backbone model is split into a small client-side model and a larg... | Recommendation: 8: accept, good paper | Area: Unsupervised and Self-supervised learning | Review:
This paper aims to address the issues existing in current collaborative self-supervised learning (SSL) schemes and proposes MocoSFL, a collaborative SSL framework based on Split Federated Learning (SFL) and Momentum Contrast (MoCo). In MocoSFL, the large backbone model is split into a small client-side model an... |
The paper proposes an approach of vectorization of 2-parameter persistence modules, based on the generalized rank invariant, computed over so-called worm-shaped 2-intervals. The authors show that this construction is stable w.r.t. the interleaving distance, and that this construction can be differentiated w.r.t. the bi... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
The paper proposes an approach of vectorization of 2-parameter persistence modules, based on the generalized rank invariant, computed over so-called worm-shaped 2-intervals. The authors show that this construction is stable w.r.t. the interleaving distance, and that this construction can be differentiated w.r.t... |
This paper presents a new reusable self-supervised learning framework by distilling knowledge from existing pretrained SSL models. Specifically, authors first introduce patch-relation enhanced targets to encourage the new model to learn semantic-relation knowledge and then introduce a conditional adapter that adaptivel... | Recommendation: 6: marginally above the acceptance threshold | Area: Unsupervised and Self-supervised learning | Review:
This paper presents a new reusable self-supervised learning framework by distilling knowledge from existing pretrained SSL models. Specifically, authors first introduce patch-relation enhanced targets to encourage the new model to learn semantic-relation knowledge and then introduce a conditional adapter that a... |
This submission deals with designing diffusion models by using progressive signal transformation. It proposes a generalized formulation of diffusion models, termed f-DM, with a modified sampling that is applied to image generation tasks with a range of signal transformations such as down-sampling, blurring, and learn c... | Recommendation: 6: marginally above the acceptance threshold | Area: Generative models | Review:
This submission deals with designing diffusion models by using progressive signal transformation. It proposes a generalized formulation of diffusion models, termed f-DM, with a modified sampling that is applied to image generation tasks with a range of signal transformations such as down-sampling, blurring, and... |
Block floating point format is a HW implementation technique for deep neural networks (DNNs), wherein floating point (FP) matrix multiply (Matmul) operations are simplified to fixed point multiply operations by sharing the exponent bits for a block of input values. Further, the mantissa bits for the fixed-point format ... | Recommendation: 3: reject, not good enough | Area: General Machine Learning | Review:
Block floating point format is a HW implementation technique for deep neural networks (DNNs), wherein floating point (FP) matrix multiply (Matmul) operations are simplified to fixed point multiply operations by sharing the exponent bits for a block of input values. Further, the mantissa bits for the fixed-point... |
To tackle the issue of uncalibrated sequence likelihood, this paper proposes a new sequence likelihood calibration(SLiC) stage, which extends the common paradigm of pretraining and finetuning. The specific method is to calibrate with KL divergence and low rank after selecting the checkpoint of finetuned model by perple... | Recommendation: 6: marginally above the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
To tackle the issue of uncalibrated sequence likelihood, this paper proposes a new sequence likelihood calibration(SLiC) stage, which extends the common paradigm of pretraining and finetuning. The specific method is to calibrate with KL divergence and low rank after selecting the checkpoint of finetuned model b... |
This paper proposes two tricks to improve GNN performance at large depths: WDG-ResNet (weighted residual connections) and TGCL (additional loss term). Through experiments and ablations they show that a GNN enhanced with both modifications is better-behaved when scaling up depth.
=== Strengths ===
(S1): This work expl... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper proposes two tricks to improve GNN performance at large depths: WDG-ResNet (weighted residual connections) and TGCL (additional loss term). Through experiments and ablations they show that a GNN enhanced with both modifications is better-behaved when scaling up depth.
=== Strengths ===
(S1): This w... |
The authors proposed an approach for class incremental learning by leveraging the conditional of the labels given the data (covariates), which they decompose in terms of the labels given the task (consistent with task incremental learning) and the task given the data (task predictor), this without the need of a replay ... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
The authors proposed an approach for class incremental learning by leveraging the conditional of the labels given the data (covariates), which they decompose in terms of the labels given the task (consistent with task incremental learning) and the task given the data (task predictor), this without the need of a... |
The paper proposes an approach to automated feature generation which is split into two subroutines. After new candidate features are generated, in the first subroutine the set of newly generated features is pruned via an adaptation of successive halving which is dubbed successive pruning. In the second stage a boosting... | Recommendation: 8: accept, good paper | Area: General Machine Learning | Review:
The paper proposes an approach to automated feature generation which is split into two subroutines. After new candidate features are generated, in the first subroutine the set of newly generated features is pruned via an adaptation of successive halving which is dubbed successive pruning. In the second stage a ... |
The authors present an empirical investigation to look for patterns in the connections of the output layer of neural networks that may hint at a behavior akin to decision trees.
The evaluation is performed on 3 simple datasets and 2 network architectures (an MLP + an MLP preceded by 3 convolution+pooling layers). The e... | Recommendation: 3: reject, not good enough | Area: General Machine Learning | Review:
The authors present an empirical investigation to look for patterns in the connections of the output layer of neural networks that may hint at a behavior akin to decision trees.
The evaluation is performed on 3 simple datasets and 2 network architectures (an MLP + an MLP preceded by 3 convolution+pooling layers... |
This paper studies the problem of designing no-regret learning algorithms that provably converge to Coarse Correlated Equilibria (CCEs) and Correlated Equilibria (CEs) that avoid playing actions that are non-rationalizable, i.e., they do not survive iterative elimination od dominated actions. The paper focuses on norma... | Recommendation: 8: accept, good paper | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
This paper studies the problem of designing no-regret learning algorithms that provably converge to Coarse Correlated Equilibria (CCEs) and Correlated Equilibria (CEs) that avoid playing actions that are non-rationalizable, i.e., they do not survive iterative elimination od dominated actions. The paper focuses ... |
The paper explores domain generalization by estimating gradients of unobserved domains using large-scale pretrained models. The method learns task-specific knowledge for the pretrained model while preserving its generalization ability with the estimated gradients by EMA. Results on several benchmarks on DomainBed show ... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
The paper explores domain generalization by estimating gradients of unobserved domains using large-scale pretrained models. The method learns task-specific knowledge for the pretrained model while preserving its generalization ability with the estimated gradients by EMA. Results on several benchmarks on DomainB... |
This work investigates the Adam optimizer for GAN training. The authors analyze the optimization steps by separating the magnitude and the direction of weight updates. They consider nSGDA, a normalized version of the standard stochastic gradient descent ascent (SGDA), and Ada-nSGDA, a combination of the magnitude of Ad... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
This work investigates the Adam optimizer for GAN training. The authors analyze the optimization steps by separating the magnitude and the direction of weight updates. They consider nSGDA, a normalized version of the standard stochastic gradient descent ascent (SGDA), and Ada-nSGDA, a combination of the magnitu... |
TaskPrompter presents a new framework for multi-task dense scene understanding. The framework assigns each task a learnable token which allows task-specific and task-generic learning in both the encoder and decoder. The task tokens and image tokens interact through the attention layers in transformers.
Strength
- The... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
TaskPrompter presents a new framework for multi-task dense scene understanding. The framework assigns each task a learnable token which allows task-specific and task-generic learning in both the encoder and decoder. The task tokens and image tokens interact through the attention layers in transformers.
Streng... |
For weakly-supervised HOI identification, this paper provides a bi-level knowledge integration technique that integrates the prior information from CLIP. To augment the HOI representation using an image-wise HOI recognition network and a pairwise knowledge transfer network, the authors specifically use CLIP textual em... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
For weakly-supervised HOI identification, this paper provides a bi-level knowledge integration technique that integrates the prior information from CLIP. To augment the HOI representation using an image-wise HOI recognition network and a pairwise knowledge transfer network, the authors specifically use CLIP te... |
This paper proposed a novel approach to address a fundamental problem in supervised machine learning: misalignments exist between a training objective and the truth. Instead of telling the model "what is true" by human annotations, they proposed to learn the truth by the model itself in a purely unsupervised way. Speci... | Recommendation: 6: marginally above the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
This paper proposed a novel approach to address a fundamental problem in supervised machine learning: misalignments exist between a training objective and the truth. Instead of telling the model "what is true" by human annotations, they proposed to learn the truth by the model itself in a purely unsupervised wa... |
Considering recent success of GFlowNets, the paper aim to extend the GFlowNet framework to the multi-agent setting, which focuses on using the flow matching constraint. The authors propose three variants of multi-agent GFlowNets, including centralized flow network, independent flow network, and flow conservation networ... | Recommendation: 3: reject, not good enough | Area: Generative models | Review:
Considering recent success of GFlowNets, the paper aim to extend the GFlowNet framework to the multi-agent setting, which focuses on using the flow matching constraint. The authors propose three variants of multi-agent GFlowNets, including centralized flow network, independent flow network, and flow conservatio... |
This paper relates mixup to ensemble and conjectures that mixup works as an implicit ensemble, which could potentially explain the benefits of mixup, e.g., improving generalization, robustness, etc. Based on this conjecture, the authors proposed two variants of mixup: TT-mixup which improves training and test efficienc... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
This paper relates mixup to ensemble and conjectures that mixup works as an implicit ensemble, which could potentially explain the benefits of mixup, e.g., improving generalization, robustness, etc. Based on this conjecture, the authors proposed two variants of mixup: TT-mixup which improves training and test e... |
The authors present the iSIREN pipeline, designed to accurately reconstruct signals. To do it, they use latent representations of the data set. They also work with metrics in the FFT domain to enforce an even better reconstruction.
Strengths:
1. I think that enforcing accuracy in the Fourier domain adds powerful constr... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
The authors present the iSIREN pipeline, designed to accurately reconstruct signals. To do it, they use latent representations of the data set. They also work with metrics in the FFT domain to enforce an even better reconstruction.
Strengths:
1. I think that enforcing accuracy in the Fourier domain adds powerfu... |
Summary of the paper
OntoProtein is prior art that integrates additional information from Gene Ontology into protein presentation. OntoProtein chooses the MLM and TransE as two training objectives when learning protein representation on the Gene Ontology knowledge graphs.
The authors claim that the TransE objective has... | Recommendation: 6: marginally above the acceptance threshold | Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability ) | Review:
Summary of the paper
OntoProtein is prior art that integrates additional information from Gene Ontology into protein presentation. OntoProtein chooses the MLM and TransE as two training objectives when learning protein representation on the Gene Ontology knowledge graphs.
The authors claim that the TransE objec... |
This submission proposes an image completion method to restore the missing semantic instance while preserving the relationship with the original context. To this end, three steps are proposed to complete the inpainting process, including predicting the semantic instance, generating the instance mask, and completing the... | Recommendation: 5: marginally below the acceptance threshold | Area: Generative models | Review:
This submission proposes an image completion method to restore the missing semantic instance while preserving the relationship with the original context. To this end, three steps are proposed to complete the inpainting process, including predicting the semantic instance, generating the instance mask, and comple... |
The authors introduce a new scenario-based programming approach where one can include rule-based constraints to safe-RL problems. By observing the suboptimality of trained PPO agents in a mapless navigation task, they come up with three rules that when implemented as additional constraints during the policy optimizatio... | Recommendation: 3: reject, not good enough | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
The authors introduce a new scenario-based programming approach where one can include rule-based constraints to safe-RL problems. By observing the suboptimality of trained PPO agents in a mapless navigation task, they come up with three rules that when implemented as additional constraints during the policy opt... |
This paper proposes a defense against neural architecture extraction attacks, which would effectively hurt the model through transfer attacks. The presented method seeks a replacement architecture that has the same operation results as the original model but with low adversarial transferability, which is estimated by a... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper proposes a defense against neural architecture extraction attacks, which would effectively hurt the model through transfer attacks. The presented method seeks a replacement architecture that has the same operation results as the original model but with low adversarial transferability, which is estima... |
This paper focuses on the Ultra-High-Definition (UHD) low-light image enhancement, which is a new task. Different from previous low-light image enhancement, the task presented in the paper faces more challenging and practical issues such as dealing with the intricate issue of joint luminance enhancement and noise remov... | Recommendation: 8: accept, good paper | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper focuses on the Ultra-High-Definition (UHD) low-light image enhancement, which is a new task. Different from previous low-light image enhancement, the task presented in the paper faces more challenging and practical issues such as dealing with the intricate issue of joint luminance enhancement and noi... |
This paper considers the problem of generalized category discovery (GCD). To solve this problem, the authors propose a positive-pair mining approach for facilitating the contrastive learning, which encourages the network learn more discriminative representation. Extensive experiments on several GCD datasets show the be... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper considers the problem of generalized category discovery (GCD). To solve this problem, the authors propose a positive-pair mining approach for facilitating the contrastive learning, which encourages the network learn more discriminative representation. Extensive experiments on several GCD datasets sho... |
This paper studies a federated version of stochastic gradient Langevin dynamics (SGLD) that the authors dub FA-LD. Motivated by the shortcoming of existing federated optimization research which do not allow for uncertainty quantification, they consider a Bayesian version of the federated optimization problem where one ... | Recommendation: 5: marginally below the acceptance threshold | Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes) | Review:
This paper studies a federated version of stochastic gradient Langevin dynamics (SGLD) that the authors dub FA-LD. Motivated by the shortcoming of existing federated optimization research which do not allow for uncertainty quantification, they consider a Bayesian version of the federated optimization problem wh... |
This paper proposes TransEQ: a method for hyper-relational knowledge graph embedding. The motivation behind TransEQ is considering both semantic and structural information in a hyper-relational knowledge graph. The proposed method achieves state-of-the-art results on established datasets and strong theoretical properti... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
This paper proposes TransEQ: a method for hyper-relational knowledge graph embedding. The motivation behind TransEQ is considering both semantic and structural information in a hyper-relational knowledge graph. The proposed method achieves state-of-the-art results on established datasets and strong theoretical ... |
The paper tackles an interesting problem. The basic idea is to use "privileged" feedback by the humans in the loop to improve adaptation of RL agents. The paper imposes a "constraint" on the agent's representations which helps the human user to diagnose the agent’s failure mode. The paper tackles two kinds of "failure... | Recommendation: 6: marginally above the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
The paper tackles an interesting problem. The basic idea is to use "privileged" feedback by the humans in the loop to improve adaptation of RL agents. The paper imposes a "constraint" on the agent's representations which helps the human user to diagnose the agent’s failure mode. The paper tackles two kinds of ... |
The paper presents iterative inversion, an approach for learning control from video demonstrations (without actions) and online interaction. The approach works as follows:
- Start with a random exploration policy
- Train an inverse dynamics model on the online data mapping a sequence of states to a sequence of actions
... | Recommendation: 6: marginally above the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
The paper presents iterative inversion, an approach for learning control from video demonstrations (without actions) and online interaction. The approach works as follows:
- Start with a random exploration policy
- Train an inverse dynamics model on the online data mapping a sequence of states to a sequence of ... |
This paper proposed efficient adaptive bilevel optimization methods based on the momentum techniques for the nonconvex-strongly-convex bilevel optimization. It provided the solid convergence analysis for the proposed methods, and proved that these methods obtain the best-known complexity. The experimental results on da... | Recommendation: 8: accept, good paper | Area: Optimization (eg, convex and non-convex optimization) | Review:
This paper proposed efficient adaptive bilevel optimization methods based on the momentum techniques for the nonconvex-strongly-convex bilevel optimization. It provided the solid convergence analysis for the proposed methods, and proved that these methods obtain the best-known complexity. The experimental resul... |
This paper proposes an autoregressive diffusion model (ARM) that leverages the absorbing discrete diffusion as the diffusion process on graphs. Since node ordering is involved in the diffusion process, the generative process needs to learn the reversed node ordering for the graph generation. The paper exploits the obje... | Recommendation: 6: marginally above the acceptance threshold | Area: Generative models | Review:
This paper proposes an autoregressive diffusion model (ARM) that leverages the absorbing discrete diffusion as the diffusion process on graphs. Since node ordering is involved in the diffusion process, the generative process needs to learn the reversed node ordering for the graph generation. The paper exploits ... |
The authors of the presented paper try to present why SGD + weight decay tend to converge towards low rank solutions.
The authors of the paper show that, due to the weight decay, SGD **cannot**, in parameter space, converge towards a point. This is done in Section 3.2 and I totally agree with this result. It is also sa... | Recommendation: 1: strong reject | Area: Deep Learning and representational learning | Review:
The authors of the presented paper try to present why SGD + weight decay tend to converge towards low rank solutions.
The authors of the paper show that, due to the weight decay, SGD **cannot**, in parameter space, converge towards a point. This is done in Section 3.2 and I totally agree with this result. It is... |
This paper aims to solve two problems of multi-dataset segmentation: (1), inconsistent taxonomy. (2), inflexible of one-hot taxonomy. They map the taxonomy into embedding space with pre-trained pre-trained text encoder. Then they proposed a category-guided decoding module is designed to dynamically guide predictions to... | Recommendation: 5: marginally below the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper aims to solve two problems of multi-dataset segmentation: (1), inconsistent taxonomy. (2), inflexible of one-hot taxonomy. They map the taxonomy into embedding space with pre-trained pre-trained text encoder. Then they proposed a category-guided decoding module is designed to dynamically guide predic... |
This paper proposes a dynamic semantic prototype learning method, which jointly refines the semantic prototypes and visual features enabling the generator to synthesize reliable visual features. The authors design a visual-oriented semantic prototype evolving network to update the semantic prototypes iteratively. Exper... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper proposes a dynamic semantic prototype learning method, which jointly refines the semantic prototypes and visual features enabling the generator to synthesize reliable visual features. The authors design a visual-oriented semantic prototype evolving network to update the semantic prototypes iterativel... |
In this paper, the author extended using domain knowledge to improve adversarial attacks from supervised learning to reinforcement learning and makes learned main policy universally resistant to adversarial attacks without prior knowledge of the attack.
The main contributions consist of 1. It generalizes previous wor... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
In this paper, the author extended using domain knowledge to improve adversarial attacks from supervised learning to reinforcement learning and makes learned main policy universally resistant to adversarial attacks without prior knowledge of the attack.
The main contributions consist of 1. It generalizes prev... |
This paper proposes a benchmark for offline policy comparison with confidence (OPCC). The benchmark builds on top of datasets from D4RL by specifying both sets of policy comparison queries (PCQs) that compare a variety of policies at a variety of states and a set of metrics to evaluate the performance of different eval... | Recommendation: 6: marginally above the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper proposes a benchmark for offline policy comparison with confidence (OPCC). The benchmark builds on top of datasets from D4RL by specifying both sets of policy comparison queries (PCQs) that compare a variety of policies at a variety of states and a set of metrics to evaluate the performance of differ... |
The paper studies the learned index problem and proposes a new approach. Unlike the previous approaches that fix the prediction error guarantee $\epsilon$, the proposed approach dynamically adjusts the $\\epsilon$. The paper also gives the corresponding theoretical analysis. Experiments also demonstrate the advantage ... | Recommendation: 6: marginally above the acceptance threshold | Area: General Machine Learning | Review:
The paper studies the learned index problem and proposes a new approach. Unlike the previous approaches that fix the prediction error guarantee $\epsilon$, the proposed approach dynamically adjusts the $\\epsilon$. The paper also gives the corresponding theoretical analysis. Experiments also demonstrate the ad... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.