review stringlengths 5 16.6k | score stringclasses 5
values | area stringclasses 12
values | text stringlengths 31 5.65k |
|---|---|---|---|
This paper studies a variant of the stochastic contextual bandits problem, where contextual information is not given but can be collected by asking a finite set of questions. The authors refer to this problem setting as *survey bandit*. The goal is to learn a policy that asks a series of questions that give the maximum... | Recommendation: 3: reject, not good enough | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper studies a variant of the stochastic contextual bandits problem, where contextual information is not given but can be collected by asking a finite set of questions. The authors refer to this problem setting as *survey bandit*. The goal is to learn a policy that asks a series of questions that give the... |
The paper considers gradient descent algorithms for computing a parameter of the optimal policy according to a possibly unstable trajectory of a Markov decision process. It is shown that under technically strong assumptions such as continuity, convexity, and smoothness, the rates of convergence will be linear, assuming... | Recommendation: 3: reject, not good enough | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
The paper considers gradient descent algorithms for computing a parameter of the optimal policy according to a possibly unstable trajectory of a Markov decision process. It is shown that under technically strong assumptions such as continuity, convexity, and smoothness, the rates of convergence will be linear, ... |
This work focuses on the misspecification setting for both linear contextual bandits and linear MDPs.
For the linear bandits, it proposes the DS-OFUL algorithm. It derives an upper bound accordingly and also a lower bound.
For the linear MDPs, it devises the DS-LSVI with a similar design and also provides un upper bou... | Recommendation: 5: marginally below the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This work focuses on the misspecification setting for both linear contextual bandits and linear MDPs.
For the linear bandits, it proposes the DS-OFUL algorithm. It derives an upper bound accordingly and also a lower bound.
For the linear MDPs, it devises the DS-LSVI with a similar design and also provides un u... |
This paper proposed a self-supervised framework for category-level 3D object pose estimation. A novel category surface embedding module is proposed which can help establishing dense correspondences within a single instance, between two different instances of the same category, and instances in different time frames. Ex... | Recommendation: 6: marginally above the acceptance threshold | Area: Unsupervised and Self-supervised learning | Review:
This paper proposed a self-supervised framework for category-level 3D object pose estimation. A novel category surface embedding module is proposed which can help establishing dense correspondences within a single instance, between two different instances of the same category, and instances in different time fr... |
Inducing points have traditionally been heavily relied on to alleviate the cubic computational complexity associated with Gaussian process training and inference. There have been various different ways in which inducing points have been used in the literature, but they have nearly always been limited to either the inpu... | Recommendation: 5: marginally below the acceptance threshold | Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes) | Review:
Inducing points have traditionally been heavily relied on to alleviate the cubic computational complexity associated with Gaussian process training and inference. There have been various different ways in which inducing points have been used in the literature, but they have nearly always been limited to either ... |
This work focuses on the robust reinforcement learning paradigm, whereby an agent is trained to be robust to worst case variations in an environment. The paper proposes an approach called FARR, whereby the adversary (proposing variations) is penalized if the environment proposed is not solvable. The paper sets out with... | Recommendation: 3: reject, not good enough | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This work focuses on the robust reinforcement learning paradigm, whereby an agent is trained to be robust to worst case variations in an environment. The paper proposes an approach called FARR, whereby the adversary (proposing variations) is penalized if the environment proposed is not solvable. The paper sets ... |
This paper studies mean field games (MFG) using a notion of correlated equilibrium and proposes an inverse reinforcement learning (IRL) method. The authors mean field games where a representative agent solves a finite horizon MDP, and globally, we look for a Nash equilibrium. They introduce a notion of correlated equil... | Recommendation: 5: marginally below the acceptance threshold | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
This paper studies mean field games (MFG) using a notion of correlated equilibrium and proposes an inverse reinforcement learning (IRL) method. The authors mean field games where a representative agent solves a finite horizon MDP, and globally, we look for a Nash equilibrium. They introduce a notion of correlat... |
- The paper proposes a zero-shot Knowledge Distillation ("ZSKD") approach (i.e., does not require any samples from teacher's training data).
- Similar to DFME (Truong et al.) and MAZE (Karyiappa et al.), the approach consists of two phases per epoch: (a) training a generator to produce synthetic labels; and (b) trainin... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
- The paper proposes a zero-shot Knowledge Distillation ("ZSKD") approach (i.e., does not require any samples from teacher's training data).
- Similar to DFME (Truong et al.) and MAZE (Karyiappa et al.), the approach consists of two phases per epoch: (a) training a generator to produce synthetic labels; and (b)... |
This work centers around the relationship between sharpness (scaling invariance) and generalization in DNNs under the PAC-Bayesian framework. This work decomposes the scale and connectivity parameters, derive the related connectivity tangent kernel (CTK), and builds the PAC-Bayesian generalization bounds. The trace of ... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This work centers around the relationship between sharpness (scaling invariance) and generalization in DNNs under the PAC-Bayesian framework. This work decomposes the scale and connectivity parameters, derive the related connectivity tangent kernel (CTK), and builds the PAC-Bayesian generalization bounds. The t... |
This paper proposes an early stopping strategy for deep image prior. This is achieved by using an efficient ES strategy that consistently detects near-peak performance across several CI tasks and DIP variants. The paper provides high level intuition, theoretical proof and multiple use cases to demonstrate the proposed... | Recommendation: 6: marginally above the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper proposes an early stopping strategy for deep image prior. This is achieved by using an efficient ES strategy that consistently detects near-peak performance across several CI tasks and DIP variants. The paper provides high level intuition, theoretical proof and multiple use cases to demonstrate the ... |
This paper proposes to use random sampling for samples in clustering classes to avoid inter-class conflict and a random dropout mechanism for features to generate compact features.
The method is easy to understand and implement. The experiments about using VL models for zero-shot/transfer learning tasks are exhaustive.... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper proposes to use random sampling for samples in clustering classes to avoid inter-class conflict and a random dropout mechanism for features to generate compact features.
The method is easy to understand and implement. The experiments about using VL models for zero-shot/transfer learning tasks are exh... |
The paper studies the effect of self-supervised pre-training for Vision Transformer based RL agents. It shows the effect of temporal order verification and VICReg on 10 Atari games. The proposed methods improves final return on Atari games.
[Strengths]
- The paper is easy to follow.
- The proposed method makes intuitiv... | Recommendation: 3: reject, not good enough | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
The paper studies the effect of self-supervised pre-training for Vision Transformer based RL agents. It shows the effect of temporal order verification and VICReg on 10 Atari games. The proposed methods improves final return on Atari games.
[Strengths]
- The paper is easy to follow.
- The proposed method makes ... |
This paper proposes a novel, adaptive strategy to drop classes from the dataset during training based on the f1 score of the model. They show that their approach, Progressive Data Dropout (PDD), is able to achieve similar test/val accuracies while using significantly lower data and time to train on image classification... | Recommendation: 3: reject, not good enough | Area: General Machine Learning | Review:
This paper proposes a novel, adaptive strategy to drop classes from the dataset during training based on the f1 score of the model. They show that their approach, Progressive Data Dropout (PDD), is able to achieve similar test/val accuracies while using significantly lower data and time to train on image classi... |
The paper is well motivated, citing the rather broad literature on learning logical and probabilistic rules for KG completion, and proposing a method that can learn non-chain-like rules. The method makes sense. They show good results on several KG completion datasets, comparing against relevant baselines.
Love the exam... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
The paper is well motivated, citing the rather broad literature on learning logical and probabilistic rules for KG completion, and proposing a method that can learn non-chain-like rules. The method makes sense. They show good results on several KG completion datasets, comparing against relevant baselines.
Love ... |
The paper is fundamentally a PDE analysis result involving the regularity of solutions to (nonlinear) variational problems with respect to the Barron norm when the function involved in the variational problem (to within an epsilon approximation in the H^1 seminorm) satisfies a Holder-like condition (with respect to the... | Recommendation: 8: accept, good paper | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
The paper is fundamentally a PDE analysis result involving the regularity of solutions to (nonlinear) variational problems with respect to the Barron norm when the function involved in the variational problem (to within an epsilon approximation in the H^1 seminorm) satisfies a Holder-like condition (with respec... |
The authors prove a new identifiability result that provides conditions under which maximally sparse base-predictors yield disentangled representations. Based on this theoretical result, they propose a practical approach to learn disentangled representations based on a sparsity-promoting bi-level optimization problem. ... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
The authors prove a new identifiability result that provides conditions under which maximally sparse base-predictors yield disentangled representations. Based on this theoretical result, they propose a practical approach to learn disentangled representations based on a sparsity-promoting bi-level optimization p... |
This paper proposes a new masked image modeling method(BEIT v2). A new Vector-Quantized Knowledge Distillation helps the BEIT v2 explore the high-level semantics. Meanwhile, this paper introduces a patch aggregation strategy to enhance global semantic representation. Experiments on image classification and semantic seg... | Recommendation: 6: marginally above the acceptance threshold | Area: Unsupervised and Self-supervised learning | Review:
This paper proposes a new masked image modeling method(BEIT v2). A new Vector-Quantized Knowledge Distillation helps the BEIT v2 explore the high-level semantics. Meanwhile, this paper introduces a patch aggregation strategy to enhance global semantic representation. Experiments on image classification and sema... |
This paper focuses on merging individual models on the parameter space without access to the respective training data. The individual models could come from different domains or even different tasks, their knowledge could be fused by merging without any training, and the resulting merging model could perform relatively... | Recommendation: 8: accept, good paper | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper focuses on merging individual models on the parameter space without access to the respective training data. The individual models could come from different domains or even different tasks, their knowledge could be fused by merging without any training, and the resulting merging model could perform re... |
This paper proposes an approach to uncertainty estimation for image-to-image tasks based on continuous masking. The approach can work with arbitrary networks, and distance metrics between images and is guaranteed to yield distances within a small threshold with high probability. Experiments are conducted on image color... | Recommendation: 6: marginally above the acceptance threshold | Area: General Machine Learning | Review:
This paper proposes an approach to uncertainty estimation for image-to-image tasks based on continuous masking. The approach can work with arbitrary networks, and distance metrics between images and is guaranteed to yield distances within a small threshold with high probability. Experiments are conducted on ima... |
This work discovers a concrete example on the WILDS-Camelyon17 dataset that ID performance is negatively correlated to OOD performance. A theoretical example based on a simple linear model is also presented to show the trade-off between ID and OOD performance. The authors explain why past studies missed such a negative... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
This work discovers a concrete example on the WILDS-Camelyon17 dataset that ID performance is negatively correlated to OOD performance. A theoretical example based on a simple linear model is also presented to show the trade-off between ID and OOD performance. The authors explain why past studies missed such a ... |
The authors study phase transitions in linear regression with permuted labels for both the oracle setting (in which the regression coefficients are assumed to be known) and the non oracle setting (in which both the permutation and the regression vector are considered as unknown). The main result of the paper is an esti... | Recommendation: 3: reject, not good enough | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
The authors study phase transitions in linear regression with permuted labels for both the oracle setting (in which the regression coefficients are assumed to be known) and the non oracle setting (in which both the permutation and the regression vector are considered as unknown). The main result of the paper is... |
The paper investigates the case when deterministic policies are learned in a GAN framework. The authors describe occuring instabilities and attribute them to exploding gradients.
# Strenghts
* The authors try to thorougly understand existing algorithms and investigate their weaknesses, which is an interesting and val... | Recommendation: 3: reject, not good enough | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
The paper investigates the case when deterministic policies are learned in a GAN framework. The authors describe occuring instabilities and attribute them to exploding gradients.
# Strenghts
* The authors try to thorougly understand existing algorithms and investigate their weaknesses, which is an interesting... |
This work fits the single-hidden-layer neural network to data generated by a teacher network with Gaussian parameters. Conclusion is drawn from experimental results that SGD with automated width selection has both sample and query complexity scaling linearly with the input dimension and width, which complies with the i... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
This work fits the single-hidden-layer neural network to data generated by a teacher network with Gaussian parameters. Conclusion is drawn from experimental results that SGD with automated width selection has both sample and query complexity scaling linearly with the input dimension and width, which complies wi... |
This paper considers non-linear causal discovery under the same setting as Rolland et al., (2022). The authors proposed to replace the scoring function in the SCORE method proposed by Rolland et al., (2022) with diffusion probabilistic models (DPMs). This allows them to update the learned Hessian without re-training th... | Recommendation: 5: marginally below the acceptance threshold | Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes) | Review:
This paper considers non-linear causal discovery under the same setting as Rolland et al., (2022). The authors proposed to replace the scoring function in the SCORE method proposed by Rolland et al., (2022) with diffusion probabilistic models (DPMs). This allows them to update the learned Hessian without re-tra... |
This paper proposes an hardware-aware NAS on a superset that preserves the Pareto ranking (accuracy and latency). It demonstrates better accuracy-latency tradeoff when compared to SOTA approaches.
Strength
* Good trade-off between latency and accuracy is achieved using the proposed approach comparing to the SOTA.
Weak... | Recommendation: 5: marginally below the acceptance threshold | Area: Optimization (eg, convex and non-convex optimization) | Review:
This paper proposes an hardware-aware NAS on a superset that preserves the Pareto ranking (accuracy and latency). It demonstrates better accuracy-latency tradeoff when compared to SOTA approaches.
Strength
* Good trade-off between latency and accuracy is achieved using the proposed approach comparing to the SOT... |
The paper proposes a learning framework that aims to address the change in the number of agents in an environment as a student agent is trained through a curriculum of tasks as proposed by a separate teacher agent. The teacher agent is modeled as a contextual bandit that aims to resolve the inherent non-stationarity in... | Recommendation: 6: marginally above the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
The paper proposes a learning framework that aims to address the change in the number of agents in an environment as a student agent is trained through a curriculum of tasks as proposed by a separate teacher agent. The teacher agent is modeled as a contextual bandit that aims to resolve the inherent non-station... |
This paper proposes a new asynchronous decentralized training algorithm with local updates, named SWIFT. Compared to previous works in this direction, the authors removed the bounded delay assumption in analysis, and hence, obtained better theoretical results. In order to ensure the convergence, a new technique is intr... | Recommendation: 6: marginally above the acceptance threshold | Area: Optimization (eg, convex and non-convex optimization) | Review:
This paper proposes a new asynchronous decentralized training algorithm with local updates, named SWIFT. Compared to previous works in this direction, the authors removed the bounded delay assumption in analysis, and hence, obtained better theoretical results. In order to ensure the convergence, a new technique... |
This paper proposes a progressive distillation strategy for object detection and instance segmentation models, i.e., multiple teacher models transfer knowledge to a student model in a sequential manner. A heuristic method is also given to choose the order of teacher models and its efficacy is demonstrated by experiment... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
This paper proposes a progressive distillation strategy for object detection and instance segmentation models, i.e., multiple teacher models transfer knowledge to a student model in a sequential manner. A heuristic method is also given to choose the order of teacher models and its efficacy is demonstrated by ex... |
The paper introduces a method for offline reinforcement learning that involves fitting a more expressive density model and an episodic planning technique. The method demonstrates decent results on D4RL, a standard benchmark for offline reinforcement learning.
# Strength
* The approach is simple and produces strong res... | Recommendation: 6: marginally above the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
The paper introduces a method for offline reinforcement learning that involves fitting a more expressive density model and an episodic planning technique. The method demonstrates decent results on D4RL, a standard benchmark for offline reinforcement learning.
# Strength
* The approach is simple and produces st... |
This work proposes zeroth-order perturbed gradient descent algorithm which is the first zeroth order algorithm to the authors' knowledge that finds second-order stationary point with only $2m$ function evaluations per iteration for any $m\in [1,d]$ ($d$ is the dimensionality), in contrast to $\Omega(d)$ per iteration i... | Recommendation: 6: marginally above the acceptance threshold | Area: Optimization (eg, convex and non-convex optimization) | Review:
This work proposes zeroth-order perturbed gradient descent algorithm which is the first zeroth order algorithm to the authors' knowledge that finds second-order stationary point with only $2m$ function evaluations per iteration for any $m\in [1,d]$ ($d$ is the dimensionality), in contrast to $\Omega(d)$ per ite... |
***Paper Summary*** The authors suggest a structural representation model for the task of phylogenetic inference by the utilization of graph neural networks architectures. For the initial node attributes, they propose the construction of raw features based on the Dirichlet energy minimization. Using message passing ste... | Recommendation: 8: accept, good paper | Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability ) | Review:
***Paper Summary*** The authors suggest a structural representation model for the task of phylogenetic inference by the utilization of graph neural networks architectures. For the initial node attributes, they propose the construction of raw features based on the Dirichlet energy minimization. Using message pas... |
The paper considers studies dynamics of mini-batch SGD using Kolmogorov complexity. They define a notion of accuracy discrepancy as a KL-divergence between accuracy of the model on previous batches in the current epoch and on the last batch. Using the fact that the random strings used for generating the epoch’s permuta... | Recommendation: 8: accept, good paper | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
The paper considers studies dynamics of mini-batch SGD using Kolmogorov complexity. They define a notion of accuracy discrepancy as a KL-divergence between accuracy of the model on previous batches in the current epoch and on the last batch. Using the fact that the random strings used for generating the epoch’s... |
The paper proposes a
1. A new learning setup called Cascade in which the agent is provided a semantic goal and a failed trajectory and the goal of the agent is to predict an intervention for the initial state of a pivot object so that the semantic goal is achieved counterfactually.
2. A new dynamics model based on sem... | Recommendation: 3: reject, not good enough | Area: General Machine Learning | Review:
The paper proposes a
1. A new learning setup called Cascade in which the agent is provided a semantic goal and a failed trajectory and the goal of the agent is to predict an intervention for the initial state of a pivot object so that the semantic goal is achieved counterfactually.
2. A new dynamics model base... |
This paper studies the problem of multi-objective online learning. In the classic online convex optimization problem, there is a single objective function, and the goal is to find the best action that leads to the best value of the objective function in a sequential decision-making setting. This paper extends the probl... | Recommendation: 8: accept, good paper | Area: Optimization (eg, convex and non-convex optimization) | Review:
This paper studies the problem of multi-objective online learning. In the classic online convex optimization problem, there is a single objective function, and the goal is to find the best action that leads to the best value of the objective function in a sequential decision-making setting. This paper extends t... |
The paper tackle the problem of efficient transfer by leveraging both hierarchy and KL-regularisation. The authors claim that fine-tuning, hierarchical methods and imitation based approaches can all fail and therefore propose a method that combines elements from all of them. The authors perform experiments on robotic o... | Recommendation: 5: marginally below the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
The paper tackle the problem of efficient transfer by leveraging both hierarchy and KL-regularisation. The authors claim that fine-tuning, hierarchical methods and imitation based approaches can all fail and therefore propose a method that combines elements from all of them. The authors perform experiments on r... |
This paper studies the capability limits of data poisoning, i.e., the minimum amount of data required to successfully inject backdoor behavior into DNN. In particular, the authors craft a universal adversarial patch as the trigger, use FUS to select samples, and exploit individual consistency to stabilize the performan... | Recommendation: 5: marginally below the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
This paper studies the capability limits of data poisoning, i.e., the minimum amount of data required to successfully inject backdoor behavior into DNN. In particular, the authors craft a universal adversarial patch as the trigger, use FUS to select samples, and exploit individual consistency to stabilize the p... |
The paper aims at modeling adversarial attacks which can perturb the input graph sequence on discrete-time dynamic graph models meanwhile preserving the temporal dynamics of the graph.Then they propose a constraint named Temporal Dynamics-Aware Perturbation (TDAP) to make imperceptible perturbations in discrete-time. T... | Recommendation: 5: marginally below the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
The paper aims at modeling adversarial attacks which can perturb the input graph sequence on discrete-time dynamic graph models meanwhile preserving the temporal dynamics of the graph.Then they propose a constraint named Temporal Dynamics-Aware Perturbation (TDAP) to make imperceptible perturbations in discrete... |
This paper introduces an Evolving Graph Contrastive Memory (EGCM) framework which effectively models the multiple behaviors in the recommendation. EGCM is comprised of (1) a multi-behavior graph encoder to model the behavior-aware short-term interests of users, (2) a dynamic cross-relational memory network to model cro... | Recommendation: 6: marginally above the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper introduces an Evolving Graph Contrastive Memory (EGCM) framework which effectively models the multiple behaviors in the recommendation. EGCM is comprised of (1) a multi-behavior graph encoder to model the behavior-aware short-term interests of users, (2) a dynamic cross-relational memory network to m... |
The paper discussed a few similarity metrics and conducted layer-wise comparisons of VAEs using the similarity metric with different datasets, models and parameters. And conclusions are drawn on the model's disentanglement and posterior collapse based on the results. The authors found that encoder representations are l... | Recommendation: 3: reject, not good enough | Area: Generative models | Review:
The paper discussed a few similarity metrics and conducted layer-wise comparisons of VAEs using the similarity metric with different datasets, models and parameters. And conclusions are drawn on the model's disentanglement and posterior collapse based on the results. The authors found that encoder representatio... |
The paper proposes a new variant performing supervised contrastive learning with continuous labels. Improvements on four image-based and one EEG regression tasks are demonstrated when using the learned feature space instead of training various baseline algorithms from scratch. The paper also shows improvements in terms... | Recommendation: 6: marginally above the acceptance threshold | Area: General Machine Learning | Review:
The paper proposes a new variant performing supervised contrastive learning with continuous labels. Improvements on four image-based and one EEG regression tasks are demonstrated when using the learned feature space instead of training various baseline algorithms from scratch. The paper also shows improvements ... |
This paper tackles the problem of zero-shot task generalization to unseen tasks using a semi-parametric approach. In order to achieve this, they construct 6 different knowledge-rich external memory consisting of Dictionary, Commonsense, Entity, Event, Script, and Causality. Like previous work, they perform multitask pr... | Recommendation: 8: accept, good paper | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper tackles the problem of zero-shot task generalization to unseen tasks using a semi-parametric approach. In order to achieve this, they construct 6 different knowledge-rich external memory consisting of Dictionary, Commonsense, Entity, Event, Script, and Causality. Like previous work, they perform mult... |
The paper considers the problem of sparse vector recovery with unknown dictionary and time varying sensing matrix, and proposes a data-driven approach using variational learning. The signal recovery performance of the proposed method as well as the possibility of out of distribution detection are demonstrated via numer... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
The paper considers the problem of sparse vector recovery with unknown dictionary and time varying sensing matrix, and proposes a data-driven approach using variational learning. The signal recovery performance of the proposed method as well as the possibility of out of distribution detection are demonstrated v... |
This paper considers the problem of predicting density maps for counting given semi-supervised datasets.
It proposes a novel transformer-based architecture, a distribution-matching loss function for quantized density prediction, the use of two overlapping discretisations and a consistency loss for the two discretisatio... | Recommendation: 6: marginally above the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper considers the problem of predicting density maps for counting given semi-supervised datasets.
It proposes a novel transformer-based architecture, a distribution-matching loss function for quantized density prediction, the use of two overlapping discretisations and a consistency loss for the two discr... |
This work proposes to replace the encoder and decoder with standard convolutional sparse coding and decoding layers in an autoencoder. The proposed approach can be trained on high-resolution images and can be used to reconstruct images and capture interpretable representations.
**Strength:**
This paper has many experi... | Recommendation: 3: reject, not good enough | Area: General Machine Learning | Review:
This work proposes to replace the encoder and decoder with standard convolutional sparse coding and decoding layers in an autoencoder. The proposed approach can be trained on high-resolution images and can be used to reconstruct images and capture interpretable representations.
**Strength:**
This paper has man... |
This work tries to tackle negative sampling in embedding model training for retrieval. Consistent Data Distribution Sampling is proposed by combining large-scale uniform training negatives with batch negatives. High divergence negatives are employed to improve the learning convergence. The sampled negatives are fused i... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
This work tries to tackle negative sampling in embedding model training for retrieval. Consistent Data Distribution Sampling is proposed by combining large-scale uniform training negatives with batch negatives. High divergence negatives are employed to improve the learning convergence. The sampled negatives are... |
This paper presents a new particle based probabilistic approximate inference method that (similar to Stein Variational Gradient Descent algorithm) is based on an optimisation task involving attractive and repulsive forces. In the present work, these forces are defined differently and via a function called mollified int... | Recommendation: 6: marginally above the acceptance threshold | Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes) | Review:
This paper presents a new particle based probabilistic approximate inference method that (similar to Stein Variational Gradient Descent algorithm) is based on an optimisation task involving attractive and repulsive forces. In the present work, these forces are defined differently and via a function called molli... |
The paper proposes to use Lipschitz constraints to train certifiable robust transformers. With some modifications to the Transformers models, they bound the Lipschitz constant for each layer, which is related to the robustness of the model. Compared to previous work, their proposed model, named one-Lipschitz self-atten... | Recommendation: 6: marginally above the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
The paper proposes to use Lipschitz constraints to train certifiable robust transformers. With some modifications to the Transformers models, they bound the Lipschitz constant for each layer, which is related to the robustness of the model. Compared to previous work, their proposed model, named one-Lipschitz se... |
The paper addresses the problem of robustness for self-supervised MDE (monocular depth estimation). The focus is on physical world attacks that place an image on a board in front of the camera in order to create an incorrect depth estimation.
The proposed approach follows the adversarial training setting, by including... | Recommendation: 8: accept, good paper | Area: Unsupervised and Self-supervised learning | Review:
The paper addresses the problem of robustness for self-supervised MDE (monocular depth estimation). The focus is on physical world attacks that place an image on a board in front of the camera in order to create an incorrect depth estimation.
The proposed approach follows the adversarial training setting, by i... |
The paper introduces a new backdoor attack that exploits neural tangent kernels to optimize the perturbations of the poisons introduced in the training set in a more efficient way. The attack comprises of three elements: modeling the training dynamics with the neural tangent kernel, a greedy initialization strategy to ... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
The paper introduces a new backdoor attack that exploits neural tangent kernels to optimize the perturbations of the poisons introduced in the training set in a more efficient way. The attack comprises of three elements: modeling the training dynamics with the neural tangent kernel, a greedy initialization stra... |
The authors find that the MCQA ability of LLMs has been underestimated, and they propose multiple choice prompting (MCP), in which a question and its symbol-enumerated candidate answers are all passed to an LLM as a single prompt. Surprisingly, the performance of LLMs equipped with MCP dramatically improves, approachin... | Recommendation: 5: marginally below the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
The authors find that the MCQA ability of LLMs has been underestimated, and they propose multiple choice prompting (MCP), in which a question and its symbol-enumerated candidate answers are all passed to an LLM as a single prompt. Surprisingly, the performance of LLMs equipped with MCP dramatically improves, ap... |
This paper treats the problem of constrained deep reinforcement learning, where constraints are given in the form of signal temporal logic (STL). The paper proposes a (to my knowledge) novel technique for using Lagrangian methods with STL. They evaluate on several domains and illustrate the efficacy of their approach.
... | Recommendation: 5: marginally below the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper treats the problem of constrained deep reinforcement learning, where constraints are given in the form of signal temporal logic (STL). The paper proposes a (to my knowledge) novel technique for using Lagrangian methods with STL. They evaluate on several domains and illustrate the efficacy of their ap... |
This paper proposes a new solution to the generalization problem of image de-raining, that is, focusing on learning the image background can improve the generalization ability. Based on the above conclusions, the author conducts experiments by modifying the objective function and training samples to verify the effecti... | Recommendation: 6: marginally above the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper proposes a new solution to the generalization problem of image de-raining, that is, focusing on learning the image background can improve the generalization ability. Based on the above conclusions, the author conducts experiments by modifying the objective function and training samples to verify the... |
This paper proposes an interpretable representation learning method to extract features from time series and use them for the classification task. The authors borrow the idea from unsupervised autoencoder, vector quantization, multi-level encoding and interpretable probing tasks. Joint learning with decoding recovery l... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper proposes an interpretable representation learning method to extract features from time series and use them for the classification task. The authors borrow the idea from unsupervised autoencoder, vector quantization, multi-level encoding and interpretable probing tasks. Joint learning with decoding re... |
This paper proposes markup-to-image generation as a task to measure the quality of image generation models, and examines the quality of the images generated by diffusion-based models for the task. They considered four domains, math, table, sheet music, molecules. As an improvement to the diffusion-based models for the ... | Recommendation: 6: marginally above the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper proposes markup-to-image generation as a task to measure the quality of image generation models, and examines the quality of the images generated by diffusion-based models for the task. They considered four domains, math, table, sheet music, molecules. As an improvement to the diffusion-based models ... |
This paper studied offline policy evaluation and learning in POMDP setting with confounders. In this setting, the dataset is generated by a state depending policy, while the learner can only get access to observation. Based on some additional assumptions about negative control, bridge functions and concentrability coef... | Recommendation: 6: marginally above the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper studied offline policy evaluation and learning in POMDP setting with confounders. In this setting, the dataset is generated by a state depending policy, while the learner can only get access to observation. Based on some additional assumptions about negative control, bridge functions and concentrabil... |
The paper proposes a variational inference method based on sampling model parameters from a generator neural network. It calculates the entropy of resulting implicit variational distribution by linearizing the network, resulting in a Gaussian entropy. Further, the paper proposes to bound the costly log determinant calc... | Recommendation: 3: reject, not good enough | Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes) | Review:
The paper proposes a variational inference method based on sampling model parameters from a generator neural network. It calculates the entropy of resulting implicit variational distribution by linearizing the network, resulting in a Gaussian entropy. Further, the paper proposes to bound the costly log determin... |
This paper explores approaches to iterative batch reinforcement learning, whereby relatively low-dimensional data is collected from physical systems and relatively simple actions/decisions must be made in response to these observations. This includes consideration of how the agent may only be given limited real-world d... | Recommendation: 3: reject, not good enough | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper explores approaches to iterative batch reinforcement learning, whereby relatively low-dimensional data is collected from physical systems and relatively simple actions/decisions must be made in response to these observations. This includes consideration of how the agent may only be given limited real... |
The paper presents a benchmark for out-of-distribution detection for ImageNet(-1K) models, using data from ImageNet-21k as out-of-distribution samples. The work presents a strategy for evaluating OOD detection, avoiding pitfalls encountered in prior work. Additionally, the authors evaluate a wide array of ImageNet mode... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
The paper presents a benchmark for out-of-distribution detection for ImageNet(-1K) models, using data from ImageNet-21k as out-of-distribution samples. The work presents a strategy for evaluating OOD detection, avoiding pitfalls encountered in prior work. Additionally, the authors evaluate a wide array of Image... |
This paper presents a new optimizer called Bort to improve model explainability (comprehensibility and transparency) with Boundedness and orthogonality constraints on model parameters.
Strengths
+ Explainability is a critical and challenging field in ML, and the mathematical attempt proposed in this paper is encouragin... | Recommendation: 6: marginally above the acceptance threshold | Area: Optimization (eg, convex and non-convex optimization) | Review:
This paper presents a new optimizer called Bort to improve model explainability (comprehensibility and transparency) with Boundedness and orthogonality constraints on model parameters.
Strengths
+ Explainability is a critical and challenging field in ML, and the mathematical attempt proposed in this paper is en... |
This work aims to provide insights into Batch Normalisation (BN).
This is done by formulating Neural Networks as piece-wise affine splines.
It is shown that the mean shift in BN moves the spline boundaries closer to the training data.
Furthermore, two benefits of BN are highlighted.
The first benefit is that the mean s... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
This work aims to provide insights into Batch Normalisation (BN).
This is done by formulating Neural Networks as piece-wise affine splines.
It is shown that the mean shift in BN moves the spline boundaries closer to the training data.
Furthermore, two benefits of BN are highlighted.
The first benefit is that th... |
This paper studies two-team zero-sum multiplayer games, where there are two teams of players, and team members in each team share the same payoff function. This paper focuses on computing a Nash equilibrium in these games, and they show that finding a Nash equilibrium in these two-team zero-sum games is CLS-hard based ... | Recommendation: 3: reject, not good enough | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
This paper studies two-team zero-sum multiplayer games, where there are two teams of players, and team members in each team share the same payoff function. This paper focuses on computing a Nash equilibrium in these games, and they show that finding a Nash equilibrium in these two-team zero-sum games is CLS-har... |
This paper provides an in-depth study of estimating the joint distribution of multi-domain image generation and unpaired image-to-image translation. To mitigate the highly ill-posed issues of mapping from marginal distributions to joint distribution, the authors provide an in-depth analysis for the distribution modelin... | Recommendation: 8: accept, good paper | Area: Generative models | Review:
This paper provides an in-depth study of estimating the joint distribution of multi-domain image generation and unpaired image-to-image translation. To mitigate the highly ill-posed issues of mapping from marginal distributions to joint distribution, the authors provide an in-depth analysis for the distribution... |
This submission presents a methodology for treatment effect estimation by synthesizing causal programs from data. They go on to prove that synthesized programs in the DSL are expressive enough to approximate any continuous function with a small epsilon bound. Finally, they show that the neurosymbolic program synthesis ... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
This submission presents a methodology for treatment effect estimation by synthesizing causal programs from data. They go on to prove that synthesized programs in the DSL are expressive enough to approximate any continuous function with a small epsilon bound. Finally, they show that the neurosymbolic program sy... |
Combining traditional numerical methods for solving the Monge equation with deep learning, thus compensating for the limitations of numerical methods for high-dimensional data and the need for deep learning networks based on Kantorovich duality and complex network structures.
Strength:
(1) The article has sufficient th... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
Combining traditional numerical methods for solving the Monge equation with deep learning, thus compensating for the limitations of numerical methods for high-dimensional data and the need for deep learning networks based on Kantorovich duality and complex network structures.
Strength:
(1) The article has suffi... |
This paper develops an arbitrary virtual try on network by preserving characteristics representation and trade-off between body and clothes. In general, this work is an 2d virtual try-on task, which aims to handle three challengeable issues in GAN based try-on task. How to solve cross-category try-on task, how to well ... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
This paper develops an arbitrary virtual try on network by preserving characteristics representation and trade-off between body and clothes. In general, this work is an 2d virtual try-on task, which aims to handle three challengeable issues in GAN based try-on task. How to solve cross-category try-on task, how ... |
This paper studies the relation between Transformer depth and its ability to solve algorithmic reasoning tasks. The authors formulate reasoning processes in terms of automata, and particularly focus on the question of why and if shallow Transformers are able to simulate automata with much longer horizons. A number of r... | Recommendation: 8: accept, good paper | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
This paper studies the relation between Transformer depth and its ability to solve algorithmic reasoning tasks. The authors formulate reasoning processes in terms of automata, and particularly focus on the question of why and if shallow Transformers are able to simulate automata with much longer horizons. A num... |
In this paper, the authors propose a principled framework, namely PerturbGCL, for augmentation-free graph contrastive learning. Considering that GNN can be divided into the two parts of message propagation and feature transformation operations, the authors develop two tailored perturbation strategies, namely randMP and... | Recommendation: 3: reject, not good enough | Area: Unsupervised and Self-supervised learning | Review:
In this paper, the authors propose a principled framework, namely PerturbGCL, for augmentation-free graph contrastive learning. Considering that GNN can be divided into the two parts of message propagation and feature transformation operations, the authors develop two tailored perturbation strategies, namely ra... |
This paper propose an easy-to-implement fine-tuning for machine translation via reinforcement learning.
The major issue for reinforcement fine-tuning is described as variance reducing, both in rewards and updates.
The main contributions are listed as the following:
- A conditional reward normalization to reduce varian... | Recommendation: 5: marginally below the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper propose an easy-to-implement fine-tuning for machine translation via reinforcement learning.
The major issue for reinforcement fine-tuning is described as variance reducing, both in rewards and updates.
The main contributions are listed as the following:
- A conditional reward normalization to reduc... |
This paper proposes to randomly mask past tokens in casual language models.
*Strength*:
This paper is well written and easy to understand.
*Weaknesses*:
The biggest weakness of this paper is ignoring related research papers and lack of comparison.
[1] presents comprehensive study about different training objective... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
This paper proposes to randomly mask past tokens in casual language models.
*Strength*:
This paper is well written and easy to understand.
*Weaknesses*:
The biggest weakness of this paper is ignoring related research papers and lack of comparison.
[1] presents comprehensive study about different training o... |
This paper analyzed the results of optimal transport regularized GANs, and claimed that the optimal transport map for optimal transport regularized GANs are biased. The authors proposed to use the method in Rout et al. 2022 (OTM) for the image Super Resolution (SR) problem. Experiments are conducted on a face dataset (... | Recommendation: 3: reject, not good enough | Area: Generative models | Review:
This paper analyzed the results of optimal transport regularized GANs, and claimed that the optimal transport map for optimal transport regularized GANs are biased. The authors proposed to use the method in Rout et al. 2022 (OTM) for the image Super Resolution (SR) problem. Experiments are conducted on a face d... |
This paper presents a novel method to perform zero-shot cross-domain transfer by learning a domain-agnostic policy in the source domain that can be directly applied to the target domain. To this end, specific training methods (technical contritions) include:
1. Align representations of states and actions from differen... | Recommendation: 5: marginally below the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper presents a novel method to perform zero-shot cross-domain transfer by learning a domain-agnostic policy in the source domain that can be directly applied to the target domain. To this end, specific training methods (technical contritions) include:
1. Align representations of states and actions from ... |
This paper addresses the problem ligand scoring and identification of leads by screening libraries, tackling the specific problem of requiring an actual activity value or other numeric score (rather than classification) in the context of having only one labelled molecule. It approaches this problem by using an architec... | Recommendation: 3: reject, not good enough | Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability ) | Review:
This paper addresses the problem ligand scoring and identification of leads by screening libraries, tackling the specific problem of requiring an actual activity value or other numeric score (rather than classification) in the context of having only one labelled molecule. It approaches this problem by using an ... |
This paper aims to directly model the edges in temporal networks instead of indirectly inferring edge embeddings by computations from nodes. To achieve so, the paper constructs Time-Decayed Line Graphs (TDLGs) to use each node to represent the edges, and weigh the edges between resultant nodes based on differences in t... | Recommendation: 5: marginally below the acceptance threshold | Area: General Machine Learning | Review:
This paper aims to directly model the edges in temporal networks instead of indirectly inferring edge embeddings by computations from nodes. To achieve so, the paper constructs Time-Decayed Line Graphs (TDLGs) to use each node to represent the edges, and weigh the edges between resultant nodes based on differen... |
The author proposed a test-time adaptation via a self-training method (TAST). Introducing an adaptation module to generate pseudo-labels through the nearest neighbor approach. Based on the T3A method, the author incorporated a support set created using previous data and a prediction from a classifier. The support set o... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
The author proposed a test-time adaptation via a self-training method (TAST). Introducing an adaptation module to generate pseudo-labels through the nearest neighbor approach. Based on the T3A method, the author incorporated a support set created using previous data and a prediction from a classifier. The suppo... |
The authoor leverage the robust kernel density estimation (RKDE) in the self-attention mechanism, to alleviate the issue of the contamination of data by down-weighting the weight of bad samples in the estimation process. Empirical results on language modeling and image classification tasks have demonstrated the effect... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
The authoor leverage the robust kernel density estimation (RKDE) in the self-attention mechanism, to alleviate the issue of the contamination of data by down-weighting the weight of bad samples in the estimation process. Empirical results on language modeling and image classification tasks have demonstrated th... |
The authors define GCN’s depth as a trainable continuous parameter within (−∞,+∞) and propose RED-GCN which can automatically search for the optimal depth without the prior knowledge regarding whether the input graph is homophilic or heterophilic.
## Strength
The idea of setting the depth as trainable continuous value ... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
The authors define GCN’s depth as a trainable continuous parameter within (−∞,+∞) and propose RED-GCN which can automatically search for the optimal depth without the prior knowledge regarding whether the input graph is homophilic or heterophilic.
## Strength
The idea of setting the depth as trainable continuou... |
The authors propose a general method to approximate natural gradient updates in a deep-learning context. The natural gradient is a way of second-order optimization. They apply the Legendre-Fenchel duality to learn a direct and efficiently evaluated model for the product of the inverse Fisher with any vector. Under some... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
The authors propose a general method to approximate natural gradient updates in a deep-learning context. The natural gradient is a way of second-order optimization. They apply the Legendre-Fenchel duality to learn a direct and efficiently evaluated model for the product of the inverse Fisher with any vector. Un... |
In this paper, the authors propose to leverage the predictive uncertainty to build an identification model, thereby discovering SCF samples and further improving the group robustness under the noisy label environment. They first demonstrate some theoretical justifications about how SCF samples can be obtained through c... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
In this paper, the authors propose to leverage the predictive uncertainty to build an identification model, thereby discovering SCF samples and further improving the group robustness under the noisy label environment. They first demonstrate some theoretical justifications about how SCF samples can be obtained t... |
The paper tackles unsupervised domain adaptation for the video recognition task. The paper raises concerns with the use of contrastive methods for aligning source and target domain features. Those concerns involve intra-domain positives, false positives in a cross-domain matches that hinder the contrastive learning pro... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
The paper tackles unsupervised domain adaptation for the video recognition task. The paper raises concerns with the use of contrastive methods for aligning source and target domain features. Those concerns involve intra-domain positives, false positives in a cross-domain matches that hinder the contrastive lear... |
This paper proposes DINO, a model that generalizes to arbitrary spatial and temporal resolutions, beyond the spatial and temporal samples in training. This is achieved via a combination of autodecoding, dynamics model, and hypernetwork with amplitude modulation. It shows in experiment that DINO achieves in general supe... | Recommendation: 6: marginally above the acceptance threshold | Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability ) | Review:
This paper proposes DINO, a model that generalizes to arbitrary spatial and temporal resolutions, beyond the spatial and temporal samples in training. This is achieved via a combination of autodecoding, dynamics model, and hypernetwork with amplitude modulation. It shows in experiment that DINO achieves in gene... |
This study starts from the view that neural collapse is a phenomenon only concerned with the explicit labels of the dataset. This study suggests that intrinsic structure of input distribution should also play a role in the last-layer representation structure. The authors construct two experimental settings where the in... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
This study starts from the view that neural collapse is a phenomenon only concerned with the explicit labels of the dataset. This study suggests that intrinsic structure of input distribution should also play a role in the last-layer representation structure. The authors construct two experimental settings wher... |
This paper proposes a data-driven method called comfort-zone for data augmentation of regression tasks. By producing new samples from the given ones by scaling their small singular values by random values, it incorporates the assumption that dominant components of the train set can also be viewed as true samples. Autho... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper proposes a data-driven method called comfort-zone for data augmentation of regression tasks. By producing new samples from the given ones by scaling their small singular values by random values, it incorporates the assumption that dominant components of the train set can also be viewed as true sample... |
This paper addresses the problem of representation learning for counterfactual estimation under non-binary treatments. The authors observe that counterfactual error can be reduced by ensuring independence between treatments and covariates. Using this observation the authors propose a loss and show improved empirical re... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper addresses the problem of representation learning for counterfactual estimation under non-binary treatments. The authors observe that counterfactual error can be reduced by ensuring independence between treatments and covariates. Using this observation the authors propose a loss and show improved empi... |
The authors propose the dataset, PRONTOQA, a reasoning dataset to evaluation Language model's reasoning capabilities. The authors provide an in-depth analysis of reasoning traces.
Strengths:
1. It’s great that the authors evaluate both validity, atomicity and wether a step is misleading. These are very important metric... | Recommendation: 8: accept, good paper | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
The authors propose the dataset, PRONTOQA, a reasoning dataset to evaluation Language model's reasoning capabilities. The authors provide an in-depth analysis of reasoning traces.
Strengths:
1. It’s great that the authors evaluate both validity, atomicity and wether a step is misleading. These are very importan... |
The authors propose a distillation approach that supports both retrieval and re-ranking stages and crucially leverages the relative geometry among queries and documents learned by the large teacher model.
## Strength
1. This paper provides a theoretical justification of the proposed method.
1. This paper includes a go... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
The authors propose a distillation approach that supports both retrieval and re-ranking stages and crucially leverages the relative geometry among queries and documents learned by the large teacher model.
## Strength
1. This paper provides a theoretical justification of the proposed method.
1. This paper inclu... |
This paper deals with the verification of Neural Ordinary Differential Equations (NODEs), which some papers have claimed to have more inherent robustness than standard neural networks.
Evaluating a NODE is based on solving the ODE defined by an initial condition (the input to the model) and a dynamics model, given by a... | Recommendation: 6: marginally above the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
This paper deals with the verification of Neural Ordinary Differential Equations (NODEs), which some papers have claimed to have more inherent robustness than standard neural networks.
Evaluating a NODE is based on solving the ODE defined by an initial condition (the input to the model) and a dynamics model, gi... |
The paper studies the multi-agent policy evaluation problem for a set of networked agents that can communicate through the network. In the linear function approximation regime, the authors apply the standard temporal difference (TD) learning method with no batch samples but multiple local TD updates per communication, ... | Recommendation: 5: marginally below the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
The paper studies the multi-agent policy evaluation problem for a set of networked agents that can communicate through the network. In the linear function approximation regime, the authors apply the standard temporal difference (TD) learning method with no batch samples but multiple local TD updates per communi... |
This paper shows that the default batch-size of 32 is not optimal for typical RL algorithms (DQN, Rainbow, QR-DQN, IQN) and that decreasing the batch-size, or also increasing the batch-size, can give better human-normalized returns for some algorithms.
+ The paper observes that a larger variance caused by using a small... | Recommendation: 3: reject, not good enough | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper shows that the default batch-size of 32 is not optimal for typical RL algorithms (DQN, Rainbow, QR-DQN, IQN) and that decreasing the batch-size, or also increasing the batch-size, can give better human-normalized returns for some algorithms.
+ The paper observes that a larger variance caused by using... |
The authors propose to pretrain a vision language transformer with external commonsense knowledge to improve on downstream tasks where external knowledge is relevant. They validate their approach on the downstream task of image captioning and image retrieval and show improvement when the model is trained with commonsen... | Recommendation: 5: marginally below the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
The authors propose to pretrain a vision language transformer with external commonsense knowledge to improve on downstream tasks where external knowledge is relevant. They validate their approach on the downstream task of image captioning and image retrieval and show improvement when the model is trained with c... |
The paper studies the synthesis of privacy-preserving datasets from an interesting angle: It claims knowledge about the causal relationship of the data attributes can simultaneously amplify privacy and improve accuracy.
To shed light on this surprising result, the paper analyzes in which condition a generative model e... | Recommendation: 5: marginally below the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
The paper studies the synthesis of privacy-preserving datasets from an interesting angle: It claims knowledge about the causal relationship of the data attributes can simultaneously amplify privacy and improve accuracy.
To shed light on this surprising result, the paper analyzes in which condition a generative... |
The paper presents a principled algorithm for incorporating symbolic information related to text generation using an LLM. The idea is justified using a causal analysis, so the algorithm is motivated by the front door criteria. The external information is extracted by entity extraction and extracting related information... | Recommendation: 8: accept, good paper | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
The paper presents a principled algorithm for incorporating symbolic information related to text generation using an LLM. The idea is justified using a causal analysis, so the algorithm is motivated by the front door criteria. The external information is extracted by entity extraction and extracting related inf... |
This paper investigates the phenomenon that the predictive performance of a prediction function degrades when overtraining under mixup data augmentation. The authors refer to the loss landscape as the U-shaped curve, where the prediction performance on the test data degrades when the number of epochs is increased. Afte... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper investigates the phenomenon that the predictive performance of a prediction function degrades when overtraining under mixup data augmentation. The authors refer to the loss landscape as the U-shaped curve, where the prediction performance on the test data degrades when the number of epochs is increas... |
This paper studies the fine-grained causes of unfairness in DPSGD and identifies gradient misalignment due to inequitable gradient clipping as the most significant source. They show that excess risk, the notion of fairness, can be decomposed into both non-private terms, clipping bias, noising bias according to previous... | Recommendation: 6: marginally above the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
This paper studies the fine-grained causes of unfairness in DPSGD and identifies gradient misalignment due to inequitable gradient clipping as the most significant source. They show that excess risk, the notion of fairness, can be decomposed into both non-private terms, clipping bias, noising bias according to ... |
GR is a method that penalizes the gradient norm of the training loss during training. However, computing the gradient of GR objectives leads to Hessian evaluation, which is computationally expensive. The paper attempts to accelerate the gradient regularized (GR) training by finite-difference approximations. In particul... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
GR is a method that penalizes the gradient norm of the training loss during training. However, computing the gradient of GR objectives leads to Hessian evaluation, which is computationally expensive. The paper attempts to accelerate the gradient regularized (GR) training by finite-difference approximations. In ... |
This paper re-define the problem of graph generation with concerns from three aspects: scalability, benchmarking, and privacy-preservation. In response, the authors proposes an interesting minibatch-based problem formulation and accordingly apply transformer to encode the computation graphs. Many tailored details about... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper re-define the problem of graph generation with concerns from three aspects: scalability, benchmarking, and privacy-preservation. In response, the authors proposes an interesting minibatch-based problem formulation and accordingly apply transformer to encode the computation graphs. Many tailored detai... |
The paper proposes to integrate visual information into pre-trained language models during fine-tuning when applied to pure-language tasks. Different from previous work that either uses retrieved or generated images, they propose to leverage the CLIP text encoder to obtain the image-aligned text representations of cert... | Recommendation: 5: marginally below the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
The paper proposes to integrate visual information into pre-trained language models during fine-tuning when applied to pure-language tasks. Different from previous work that either uses retrieved or generated images, they propose to leverage the CLIP text encoder to obtain the image-aligned text representations... |
This paper studies observation perturbation attacks in cooperative multi-agent reinforcement learning (MARL), where the attacker can choose one agent to attack and inject noise with a bounded norm into its observations to minimize the long-term return of the system. The paper considers a test stage attack where a MARL ... | Recommendation: 3: reject, not good enough | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper studies observation perturbation attacks in cooperative multi-agent reinforcement learning (MARL), where the attacker can choose one agent to attack and inject noise with a bounded norm into its observations to minimize the long-term return of the system. The paper considers a test stage attack where... |
This paper is concerned about generation of molecules by connecting motifs extracted from the dataset. The main idea of the proposed method is to mine motifs from the dataset. The algorithm, illustrated in Figure 2, first contracts molecular graphs by contracting the most frequent edge, iteratively. Then, motifs are ex... | Recommendation: 6: marginally above the acceptance threshold | Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability ) | Review:
This paper is concerned about generation of molecules by connecting motifs extracted from the dataset. The main idea of the proposed method is to mine motifs from the dataset. The algorithm, illustrated in Figure 2, first contracts molecular graphs by contracting the most frequent edge, iteratively. Then, motif... |
The paper proposed a new multi-head self-attention variant -- OLSA. The proposed method can satisfy the 1-Lipschitz constraint under certain conditions. Thus, the author further proposes a Lipschitz constrained Transformer model. The model achieves a strong certified radius and robust accuracy while maintaining a reaso... | Recommendation: 6: marginally above the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
The paper proposed a new multi-head self-attention variant -- OLSA. The proposed method can satisfy the 1-Lipschitz constraint under certain conditions. Thus, the author further proposes a Lipschitz constrained Transformer model. The model achieves a strong certified radius and robust accuracy while maintaining... |
This paper considers the data leakage attack in federated learning and focuses on the tabular data. A new method called TabLeak is proposed, which consists of three ingradients: (Section 3.1) softmax structural prios; (Section 3.2) pooled ensembling; and (Section 3.3) entropy-based uncertainty estimation. The combined ... | Recommendation: 3: reject, not good enough | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
This paper considers the data leakage attack in federated learning and focuses on the tabular data. A new method called TabLeak is proposed, which consists of three ingradients: (Section 3.1) softmax structural prios; (Section 3.2) pooled ensembling; and (Section 3.3) entropy-based uncertainty estimation. The c... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.