review
stringlengths
5
16.6k
score
stringclasses
5 values
area
stringclasses
12 values
text
stringlengths
31
5.65k
This paper proposes a novel semantic image synthesis model (semantic segmentation map in, RGB image out) based on adversarial training. The main idea is to use edge maps as a structure to guide the image synthesis process. To this end a special edge-generating branch is used to generate an edge map from the semantic ...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper proposes a novel semantic image synthesis model (semantic segmentation map in, RGB image out) based on adversarial training. The main idea is to use edge maps as a structure to guide the image synthesis process. To this end a special edge-generating branch is used to generate an edge map from the s...
This paper provides one benchmark named BiBench which is desifned to test the efficiency, robustness and generalization of binary algorithms. It mainly contains two parts, one for accuracy and another is for efficiency, and each part has several components. The authors build quantitative indicators to measure the binar...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper provides one benchmark named BiBench which is desifned to test the efficiency, robustness and generalization of binary algorithms. It mainly contains two parts, one for accuracy and another is for efficiency, and each part has several components. The authors build quantitative indicators to measure t...
The work introduces a novel OSLS (One-Shot Ligand Scoring) model for ligand scoring task to an unseen target based on a single context compound and its experimentally known activity to that target. This model is based on a Siamese-inspired neural network with transformer encoders. The OSLS achieves performance improvem...
Recommendation: 5: marginally below the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: The work introduces a novel OSLS (One-Shot Ligand Scoring) model for ligand scoring task to an unseen target based on a single context compound and its experimentally known activity to that target. This model is based on a Siamese-inspired neural network with transformer encoders. The OSLS achieves performance ...
The submission studies combinatorial optimization (CO) with cardinality constraints by neural networks. Different from the methods incorporating the constraints as penalties in to the objective function, the submission incorporates the constraints into the network architecture such that these constraints are guaranteed...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: The submission studies combinatorial optimization (CO) with cardinality constraints by neural networks. Different from the methods incorporating the constraints as penalties in to the objective function, the submission incorporates the constraints into the network architecture such that these constraints are gu...
The paper proposed a novel non-uniform data-free quantization method. The main Idea (which is very interesting) is to find the best non-uniform quantization intervals for both weights and activations by minimizing the reconstruction error using the proposed quantization and de-quantization method. The paper provides e...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: The paper proposed a novel non-uniform data-free quantization method. The main Idea (which is very interesting) is to find the best non-uniform quantization intervals for both weights and activations by minimizing the reconstruction error using the proposed quantization and de-quantization method. The paper pr...
The submission proposes a federated methodology to learn low-dimensional representations from a dataset distributed among several clients. Basically, the idea lacks novelty and is with limited contribution as it is a simple application of the MCR2 objective to a federated learning setting. The optimization is still usi...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: The submission proposes a federated methodology to learn low-dimensional representations from a dataset distributed among several clients. Basically, the idea lacks novelty and is with limited contribution as it is a simple application of the MCR2 objective to a federated learning setting. The optimization is s...
This paper considers the hypothesis that the good empirical generalization of overparameterized models (neural networks in particular) may not be primarily due to an implicit bias of the optimizer (e.g. SGD), as proposed previously. Instead, it argues that the volume in parameter space of good solutions (generalizing ...
Recommendation: 5: marginally below the acceptance threshold
Area: General Machine Learning
Review: This paper considers the hypothesis that the good empirical generalization of overparameterized models (neural networks in particular) may not be primarily due to an implicit bias of the optimizer (e.g. SGD), as proposed previously. Instead, it argues that the volume in parameter space of good solutions (gener...
This paper proposes a new graph transformer architecture based on quantum computation. The main idea is to replace the typical attention matrix by a “quantum computable” attention matrix. The main motivation for such a proposal is easily getting access to graph features (such as maximum probability assignment from an a...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposes a new graph transformer architecture based on quantum computation. The main idea is to replace the typical attention matrix by a “quantum computable” attention matrix. The main motivation for such a proposal is easily getting access to graph features (such as maximum probability assignment f...
This paper investigates the role of position encodings in contrast to contextual encodings in BERT-based models. They illustrate two biases of these encodings: locality (a tendency to focus on nearby tokens) and symmetry (a tendency to focus at a particular distance from the target to the same degree whether the distan...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper investigates the role of position encodings in contrast to contextual encodings in BERT-based models. They illustrate two biases of these encodings: locality (a tendency to focus on nearby tokens) and symmetry (a tendency to focus at a particular distance from the target to the same degree whether th...
This paper studies fine-tuning vs freezing in the context of reinforcement learning. The authors argue that the layers that represent general-purpose features(mainly the early layers) could be frozen while those that represent task-specific features(mainly the last layers) should be fine-tuned to achieve higher perform...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper studies fine-tuning vs freezing in the context of reinforcement learning. The authors argue that the layers that represent general-purpose features(mainly the early layers) could be frozen while those that represent task-specific features(mainly the last layers) should be fine-tuned to achieve higher...
This work proposes to use reinforcement learning to design graph augmentation mechanism used in graph contrastive learning. The benefit of using RL is that the way of graph augmentation can be designed via a markov decision process where a long-term reward and the dependence between different parts of the graph are bet...
Recommendation: 3: reject, not good enough
Area: Unsupervised and Self-supervised learning
Review: This work proposes to use reinforcement learning to design graph augmentation mechanism used in graph contrastive learning. The benefit of using RL is that the way of graph augmentation can be designed via a markov decision process where a long-term reward and the dependence between different parts of the graph...
The paper tries to detect and prevent overfitting by using the training loss and validation loss history. For detecting overfitting, the paper propose a strategy to collect a labelled dataset with binary labels: overfit and no overfit. The paper shows that a time-series classifier can be trained, and empirically showed...
Recommendation: 5: marginally below the acceptance threshold
Area: General Machine Learning
Review: The paper tries to detect and prevent overfitting by using the training loss and validation loss history. For detecting overfitting, the paper propose a strategy to collect a labelled dataset with binary labels: overfit and no overfit. The paper shows that a time-series classifier can be trained, and empiricall...
The paper proposes a joint (mixed) FL strategy that jointly trains using a combination of centralized and federated models without transferring any data across server or client and vice versa. # Pros: - The paper is well-written, easy to understand and follow along, however, I must admit that I did not pay an in dep...
Recommendation: 6: marginally above the acceptance threshold
Area: General Machine Learning
Review: The paper proposes a joint (mixed) FL strategy that jointly trains using a combination of centralized and federated models without transferring any data across server or client and vice versa. # Pros: - The paper is well-written, easy to understand and follow along, however, I must admit that I did not pay a...
This paper provides certification guarantees on robustness of gradient based explainers by providing upper bounds on the largest adversarial change that can be made to the explanation from these explainers given bounded manipulation of either the input features or model parameters. Additionally, these bounds are differ...
Recommendation: 8: accept, good paper
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper provides certification guarantees on robustness of gradient based explainers by providing upper bounds on the largest adversarial change that can be made to the explanation from these explainers given bounded manipulation of either the input features or model parameters. Additionally, these bounds ar...
The authors propose an approach to the problem of transferring learned behaviors between tasks in a sequential setting, called Attentive Priors for Expressive and Transferable Skills (APES). They first present two theorems: a) with more input variables, the shift of the input distributions in terms of KL divergence get...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The authors propose an approach to the problem of transferring learned behaviors between tasks in a sequential setting, called Attentive Priors for Expressive and Transferable Skills (APES). They first present two theorems: a) with more input variables, the shift of the input distributions in terms of KL diverg...
This work introduces a new model for agents to perform vision and language task. The method, named InstructRL relies on a vision and language transformer (ViLT) trained on passive datasets with language and images aligned with description. This ViLT is used to convert observations and descriptions into tokens, which ar...
Recommendation: 5: marginally below the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This work introduces a new model for agents to perform vision and language task. The method, named InstructRL relies on a vision and language transformer (ViLT) trained on passive datasets with language and images aligned with description. This ViLT is used to convert observations and descriptions into tokens, ...
The authors tackle the problem of model uncertainty estimation as the acquisition function in Active Learning for object detection. To this end, they first adapt Evidential Deep Learning (EDL) to predict the epistemic uncertainty estimate for each bounding box separately. They modify EDL in three ways: (a) replace the...
Recommendation: 6: marginally above the acceptance threshold
Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes)
Review: The authors tackle the problem of model uncertainty estimation as the acquisition function in Active Learning for object detection. To this end, they first adapt Evidential Deep Learning (EDL) to predict the epistemic uncertainty estimate for each bounding box separately. They modify EDL in three ways: (a) rep...
This paper presents Hetero-SSFL, a framework for SSL in FL that enables diverse clients (heterogeneous in terms of their compute capabilities and/or data distribution) to collaboratively learn a good SSL model. At the end of N rounds, the SSL model gets personalised (via linear evaluation protocol) to each client's dat...
Recommendation: 6: marginally above the acceptance threshold
Area: General Machine Learning
Review: This paper presents Hetero-SSFL, a framework for SSL in FL that enables diverse clients (heterogeneous in terms of their compute capabilities and/or data distribution) to collaboratively learn a good SSL model. At the end of N rounds, the SSL model gets personalised (via linear evaluation protocol) to each clie...
The authors of this submission proposed a deep non-stationary kernel (DNSK) modeling Spatio-Temporal Point Processes (STPP) for potentially non-stationary events in continuous time and space. The authors focused on Hawkes process assuming that the influences from the past events are linearly additive and in turn mode...
Recommendation: 8: accept, good paper
Area: General Machine Learning
Review: The authors of this submission proposed a deep non-stationary kernel (DNSK) modeling Spatio-Temporal Point Processes (STPP) for potentially non-stationary events in continuous time and space. The authors focused on Hawkes process assuming that the influences from the past events are linearly additive and in t...
To answer a pre-posed question about the contrastive views of graph representation learning, this paper studies task-oriented contrastive learning from a counterfactual perspective in node property prediction tasks. A model-agnostic framework, G-Censor was proposed to generate both positive and negative views in graph ...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: To answer a pre-posed question about the contrastive views of graph representation learning, this paper studies task-oriented contrastive learning from a counterfactual perspective in node property prediction tasks. A model-agnostic framework, G-Censor was proposed to generate both positive and negative views i...
The paper studies the problem of agnostically learning a ReLU function via gradient descent using samples drawn from Gaussian (or even a more general class of) distributions. The main result states that under a suitable random initialization, if gradient descent is run for sufficiently many iterations on the populatio...
Recommendation: 6: marginally above the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: The paper studies the problem of agnostically learning a ReLU function via gradient descent using samples drawn from Gaussian (or even a more general class of) distributions. The main result states that under a suitable random initialization, if gradient descent is run for sufficiently many iterations on the p...
The paper proposes to treat clean and adversarial samples as different domains and co-train them by separate classification tokens of a VIT, which produces adversarial model soup to trade off between clean and robust accuracy by simple interpolation. The authors present a good alternative for advprop with fewer paramet...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: The paper proposes to treat clean and adversarial samples as different domains and co-train them by separate classification tokens of a VIT, which produces adversarial model soup to trade off between clean and robust accuracy by simple interpolation. The authors present a good alternative for advprop with fewer...
Overall, the paper provides a novel and intuitive understanding about adversarial trained models. The paper identifies a new phenomenon and points out its unrealized threats which will inspire new related research. Corresponding index (Gini coeffiencient) is designed to illustrate such phenomenon. Strength: 1. The str...
Recommendation: 8: accept, good paper
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: Overall, the paper provides a novel and intuitive understanding about adversarial trained models. The paper identifies a new phenomenon and points out its unrealized threats which will inspire new related research. Corresponding index (Gini coeffiencient) is designed to illustrate such phenomenon. Strength: 1....
This paper proves under some particular situation, e.g. the input vector is the concatenation of a 1-sparse feature vector and a noise vector, under certain assumptions, the two layer CNN (whose second layer is assumed to be fixed as all 1’s), converges to “bad” local optima with high probability when trained using ADA...
Recommendation: 6: marginally above the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: This paper proves under some particular situation, e.g. the input vector is the concatenation of a 1-sparse feature vector and a noise vector, under certain assumptions, the two layer CNN (whose second layer is assumed to be fixed as all 1’s), converges to “bad” local optima with high probability when trained u...
This work introduces a framework for the acoustic modeling of musical instruments. The authors present an open-source and open-access framework for the generation of numerical muscial acoustics. I am not a person in acoustic areas. Thus, everything in this area should be new and exciting to me. However, from this desc...
Recommendation: 5: marginally below the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: This work introduces a framework for the acoustic modeling of musical instruments. The authors present an open-source and open-access framework for the generation of numerical muscial acoustics. I am not a person in acoustic areas. Thus, everything in this area should be new and exciting to me. However, from t...
This paper focuses on continual image-text embedding, reducing the computation and storage resources using all data in the training phase. For the first time, the paper identifies the important role of direct parameter transfer (between the historical and main models) in continual learning and the proposed DHA outperfo...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: This paper focuses on continual image-text embedding, reducing the computation and storage resources using all data in the training phase. For the first time, the paper identifies the important role of direct parameter transfer (between the historical and main models) in continual learning and the proposed DHA ...
The authors empirically study how combining replay ratio increases with network parameter resets can greatly improve sample efficiency of off-policy methods. Their experiments demonstrate superior performance on existing benchmarks with simple modifications to existing methods. ## Strengths **Clarity:** The paper is w...
Recommendation: 8: accept, good paper
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The authors empirically study how combining replay ratio increases with network parameter resets can greatly improve sample efficiency of off-policy methods. Their experiments demonstrate superior performance on existing benchmarks with simple modifications to existing methods. ## Strengths **Clarity:** The pa...
This paper studies the question of whether pre-trained model-based RL can be effectively fine-tuned to solve downstream tasks. To answer this question, during pre-training, this paper proposed to deploy a teacher-student framework: learn several sing-task teacher models via offline RL and distill these single-task poli...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper studies the question of whether pre-trained model-based RL can be effectively fine-tuned to solve downstream tasks. To answer this question, during pre-training, this paper proposed to deploy a teacher-student framework: learn several sing-task teacher models via offline RL and distill these single-t...
This paper proposes to combine graph structure with transformer to model multivariate time series, and use probabilistic modeling method and variational inference to remove random noise in time series. The experiments on the task of anomaly detection and time series forecasting show the effectiveness of the proposed me...
Recommendation: 3: reject, not good enough
Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes)
Review: This paper proposes to combine graph structure with transformer to model multivariate time series, and use probabilistic modeling method and variational inference to remove random noise in time series. The experiments on the task of anomaly detection and time series forecasting show the effectiveness of the pro...
This paper proposes to regard the system identification problem as a reinforcement learning problem. Compared with traditional supervised solutions, the proposed reinforcement method has advantages over delayed effects, high non-linearity, non-stationarity, partial observability, and error accumulation when using boots...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper proposes to regard the system identification problem as a reinforcement learning problem. Compared with traditional supervised solutions, the proposed reinforcement method has advantages over delayed effects, high non-linearity, non-stationarity, partial observability, and error accumulation when usi...
The paper proposes a method that learns deep prototype representations, by revisiting the nearest centroids clustering in the setting of deep network training. The authors construct a framework to combine the gradient descent kind of learning of neural networks with the distance-based learning of cluster centroids. In ...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: The paper proposes a method that learns deep prototype representations, by revisiting the nearest centroids clustering in the setting of deep network training. The authors construct a framework to combine the gradient descent kind of learning of neural networks with the distance-based learning of cluster centro...
This paper proposes a transformer model for generating repair for software vulnerabilities. It trains a separate token-level classifier model to generate masks called vulnerability queries and incorporates these masks in both the encoder and decoder parts. Through experimental evaluation on Big-Vul and CVEFixes, it sho...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposes a transformer model for generating repair for software vulnerabilities. It trains a separate token-level classifier model to generate masks called vulnerability queries and incorporates these masks in both the encoder and decoder parts. Through experimental evaluation on Big-Vul and CVEFixes...
In this paper, the authors consider the problem of finding dynamics that not only converge to Nash Equilibria but also converge to "good" equilibria according to some objective function, e.g., the social-welfare. The main results are the following: 1. The social welfare of the 0-replicator dynamics is higher than the...
Recommendation: 8: accept, good paper
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: In this paper, the authors consider the problem of finding dynamics that not only converge to Nash Equilibria but also converge to "good" equilibria according to some objective function, e.g., the social-welfare. The main results are the following: 1. The social welfare of the 0-replicator dynamics is higher ...
This paper tries to tackle the problem of data heterogeneity in federated learning with differential privacy by attempting to divide the features into private and generalizable features. They ask the question of what is necessary to share to learn global models and can the remaining data stay on the client as local mod...
Recommendation: 3: reject, not good enough
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper tries to tackle the problem of data heterogeneity in federated learning with differential privacy by attempting to divide the features into private and generalizable features. They ask the question of what is necessary to share to learn global models and can the remaining data stay on the client as l...
This paper addresses the class-imbalance problem in graph learning. The authors propose Graph Decantation (GraphDec) framework for learning balanced graph representation in a self-supervised manner. The key procedure of GraphDec is to select some informative samples from unbalanced node data or graph data during traini...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: This paper addresses the class-imbalance problem in graph learning. The authors propose Graph Decantation (GraphDec) framework for learning balanced graph representation in a self-supervised manner. The key procedure of GraphDec is to select some informative samples from unbalanced node data or graph data durin...
The paper explores methods for discovering diverse policies for RL problems, specifically focusing on MARL. This is well-motivated, as these types of methods have become increasingly prominent in recent years and played a part of large scale successes such as AlphaStar. The paper then disappointingly focuses on a new a...
Recommendation: 5: marginally below the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The paper explores methods for discovering diverse policies for RL problems, specifically focusing on MARL. This is well-motivated, as these types of methods have become increasingly prominent in recent years and played a part of large scale successes such as AlphaStar. The paper then disappointingly focuses on...
This paper proposed a new method for *model editing* in pre-trained language models, which has received growing attention from the deep learning community in the past few years. The authors point out that the setting of sequential model editing (in which the model must be edited with a stream of edits, rather than a sm...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposed a new method for *model editing* in pre-trained language models, which has received growing attention from the deep learning community in the past few years. The authors point out that the setting of sequential model editing (in which the model must be edited with a stream of edits, rather t...
The paper studies the learning-based low-rank approximation problem and proposes a new algorithm, which is based on the tucker tensor decomposition. The new optimization problem based on tensor decomposition can be seen as a relaxation of the original LRA problem. The experimental result suggests that the proposed algo...
Recommendation: 5: marginally below the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The paper studies the learning-based low-rank approximation problem and proposes a new algorithm, which is based on the tucker tensor decomposition. The new optimization problem based on tensor decomposition can be seen as a relaxation of the original LRA problem. The experimental result suggests that the propo...
The overall goal of the submission is a learning formulation that simultaneously models inter-class discrimination while promoting intra class variation in classification. To this end, it considers a linear subspace approach that is scaleless and thus in theory more suitable for long tail classification than the vector...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: The overall goal of the submission is a learning formulation that simultaneously models inter-class discrimination while promoting intra class variation in classification. To this end, it considers a linear subspace approach that is scaleless and thus in theory more suitable for long tail classification than th...
This work focuses on graph model selection without training by matching the meta-feature and model representations. Extensive experiments are conducted to demonstrate the effective and efficiency of the proposed method. Basically, the overall idea has close relation to pioneering work MetaOD. By comparison, this work a...
Recommendation: 5: marginally below the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This work focuses on graph model selection without training by matching the meta-feature and model representations. Extensive experiments are conducted to demonstrate the effective and efficiency of the proposed method. Basically, the overall idea has close relation to pioneering work MetaOD. By comparison, thi...
This work theoretically analyzes the applicability of feature/representation transfer from source tasks to a target task in RL, under the low-rank MDP setting (Def.3.1). It proposes an algorithm, RepTransfer (Algo.1), that learns the representations from cross-task samples, assuming one can sample from the transition k...
Recommendation: 6: marginally above the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: This work theoretically analyzes the applicability of feature/representation transfer from source tasks to a target task in RL, under the low-rank MDP setting (Def.3.1). It proposes an algorithm, RepTransfer (Algo.1), that learns the representations from cross-task samples, assuming one can sample from the tran...
This paper proposes a fully decentralized policy optimization (DPO) algorithm in cooperative multi-agent reinforcement learning (MARL). Based on the surrogate loss of the trust-region policy optimization for the joint policy, the authors derive a lower bound of the joint policy improvement under the assumption that eac...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper proposes a fully decentralized policy optimization (DPO) algorithm in cooperative multi-agent reinforcement learning (MARL). Based on the surrogate loss of the trust-region policy optimization for the joint policy, the authors derive a lower bound of the joint policy improvement under the assumption ...
This paper proposes a privacy protection method against training data extraction attacks from language model based on Rényi differential privacy. The authors point out the effect of sample length on privacy leakage and derive privacy bound based on Rényi differential privacy, and then propose an improved method based o...
Recommendation: 5: marginally below the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper proposes a privacy protection method against training data extraction attacks from language model based on Rényi differential privacy. The authors point out the effect of sample length on privacy leakage and derive privacy bound based on Rényi differential privacy, and then propose an improved method...
This paper proposes a benchmark to test the robustness of text-to-SQL models. Specifically, the benchmark is created to test whether such models work well (i) when names of particular columns in a table are replaced with synonymous strings (DB perturbations), (ii) when natural language questions are replaced by its par...
Recommendation: 8: accept, good paper
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper proposes a benchmark to test the robustness of text-to-SQL models. Specifically, the benchmark is created to test whether such models work well (i) when names of particular columns in a table are replaced with synonymous strings (DB perturbations), (ii) when natural language questions are replaced by...
Starting from the limitation that unnecessary information could be introduced into the pretext task learning in contrastive learning, this work proposed a method to learn shared features by maximizing set mutual information and circumventing instance discrimination. The set pooling model $g(\phi( ))$ process multiple o...
Recommendation: 5: marginally below the acceptance threshold
Area: Unsupervised and Self-supervised learning
Review: Starting from the limitation that unnecessary information could be introduced into the pretext task learning in contrastive learning, this work proposed a method to learn shared features by maximizing set mutual information and circumventing instance discrimination. The set pooling model $g(\phi( ))$ process mu...
In this paper, the authors proposed differentially private optimization algorithms for empirical risk minimization. To improve the speed and practicality of the algorithm, the authors proposed to use several simple yet effective strategies such as line search and mini-batching. The effectiveness of the proposed approac...
Recommendation: 6: marginally above the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: In this paper, the authors proposed differentially private optimization algorithms for empirical risk minimization. To improve the speed and practicality of the algorithm, the authors proposed to use several simple yet effective strategies such as line search and mini-batching. The effectiveness of the proposed...
This work combines two existing approaches: representing a policy based on its behavior in a set of probing states and finding a successful policy via a critic that estimates the return of any input policy. The ability to automatically learn probing states is shown via MNIST. The performance on a few continuous contro...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This work combines two existing approaches: representing a policy based on its behavior in a set of probing states and finding a successful policy via a critic that estimates the return of any input policy. The ability to automatically learn probing states is shown via MNIST. The performance on a few continuou...
This paper studies the problem of improving the expressiveness of graph neural networks. In particular, the paper proposes NC-GNN, a GNN training method that incorporates edges among neighbors as additional information for improving the accuracy of GNN. The work also provides some theoretical justification on why the p...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper studies the problem of improving the expressiveness of graph neural networks. In particular, the paper proposes NC-GNN, a GNN training method that incorporates edges among neighbors as additional information for improving the accuracy of GNN. The work also provides some theoretical justification on w...
This paper proposes FedDS to improve the performance of the global model with distillation-based model aggregation. The key idea is to suppress the contributions of unreliable clients when performing multi-teacher ensemble distillation. Compared to FedDF, the authors added two additional components, the entropy-weighte...
Recommendation: 3: reject, not good enough
Area: General Machine Learning
Review: This paper proposes FedDS to improve the performance of the global model with distillation-based model aggregation. The key idea is to suppress the contributions of unreliable clients when performing multi-teacher ensemble distillation. Compared to FedDF, the authors added two additional components, the entropy...
This paper develops the concept of semirobustness, which indicates the adversarial robustness of a part of the network. The authors prove that if a subnetwork is robust and highly correlated with the rest of the network, then the remaining layers are also guaranteed to be robust. Empirical evaluations are done on CIFAR...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This paper develops the concept of semirobustness, which indicates the adversarial robustness of a part of the network. The authors prove that if a subnetwork is robust and highly correlated with the rest of the network, then the remaining layers are also guaranteed to be robust. Empirical evaluations are done ...
The authors propose a theoretical framework to categorize policy abstractions based on what properties are preserved. The main contribution is the proposal of irrelevance-based definitions based on policy action distribution, state transition distribution and state values. The authors then propose corresponding pseudo-...
Recommendation: 5: marginally below the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The authors propose a theoretical framework to categorize policy abstractions based on what properties are preserved. The main contribution is the proposal of irrelevance-based definitions based on policy action distribution, state transition distribution and state values. The authors then propose corresponding...
This paper investigates the setting of training under a gradual distribution shift over time. To mitigate the effect of distribution shift on the performance on future data, they propose applying importance weighting to simulate training under the most recent data distribution. They motivate this by arguing that the la...
Recommendation: 6: marginally above the acceptance threshold
Area: General Machine Learning
Review: This paper investigates the setting of training under a gradual distribution shift over time. To mitigate the effect of distribution shift on the performance on future data, they propose applying importance weighting to simulate training under the most recent data distribution. They motivate this by arguing tha...
This paper summarizes the traditional distance metric learning algorithms and classification-based distance metric learning algorithms together and solves the Lipschitz constant problem on distance metric learning. The authors design a deep neural network structure that allows us to minimize the Lipschitz constant of t...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper summarizes the traditional distance metric learning algorithms and classification-based distance metric learning algorithms together and solves the Lipschitz constant problem on distance metric learning. The authors design a deep neural network structure that allows us to minimize the Lipschitz const...
This paper presents a meta learning framework Meta-EGN that produces a good initialization for a neural CO solver. The authors build upon the work of Karalias & Loukas, (2020) and extend it to provide a performance guarantee for Meta-EGN as well. As demonstrated in the experiments section, Meta-EGN works well compared ...
Recommendation: 8: accept, good paper
Area: Unsupervised and Self-supervised learning
Review: This paper presents a meta learning framework Meta-EGN that produces a good initialization for a neural CO solver. The authors build upon the work of Karalias & Loukas, (2020) and extend it to provide a performance guarantee for Meta-EGN as well. As demonstrated in the experiments section, Meta-EGN works well c...
The paper studies trust region multi-agent policy gradients. The core contribution is a normalization term when calculating the advantage function. The authors compute the partial derivatives of global Q functions with respect to local utility functions to identify actions subject to the IGM condition. Only those "IGM ...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The paper studies trust region multi-agent policy gradients. The core contribution is a normalization term when calculating the advantage function. The authors compute the partial derivatives of global Q functions with respect to local utility functions to identify actions subject to the IGM condition. Only tho...
The authors present research on the intersection of outlier detection using MMD on two sets of samples and self-supervied pretraining. First of all they use self-supervision to pretrain a similarity function which is then to be used for outlier detection using MMD and derived statistics. They present two improvements...
Recommendation: 6: marginally above the acceptance threshold
Area: Unsupervised and Self-supervised learning
Review: The authors present research on the intersection of outlier detection using MMD on two sets of samples and self-supervied pretraining. First of all they use self-supervision to pretrain a similarity function which is then to be used for outlier detection using MMD and derived statistics. They present two impr...
This submission proposes a mathematical framework for editing 3D represented as deep implicit surfaces. Given a target displacement on the shape, the corresponding modifications of network parameters is computed and applied. This can either be applied to a network representing a single shape (shape editing) or to the l...
Recommendation: 6: marginally above the acceptance threshold
Area: Generative models
Review: This submission proposes a mathematical framework for editing 3D represented as deep implicit surfaces. Given a target displacement on the shape, the corresponding modifications of network parameters is computed and applied. This can either be applied to a network representing a single shape (shape editing) or ...
The paper studies the optimal transport (OT) profile. That is, the dependence of the OT cost on the amount of mass being transported from the source measure. The main result gives a characterization of the OT profile as a piecewise-linear function. This characterization gives rise to an approximation algorithm that all...
Recommendation: 8: accept, good paper
Area: Optimization (eg, convex and non-convex optimization)
Review: The paper studies the optimal transport (OT) profile. That is, the dependence of the OT cost on the amount of mass being transported from the source measure. The main result gives a characterization of the OT profile as a piecewise-linear function. This characterization gives rise to an approximation algorithm ...
In this paper, inspired by the “what” and “where” parallel pathways of the visual system, the authors present a novel architecture for object segmentation and tracking with disentangled representations of objects and their position. The proposed slot-based object representation architecture excels on the position track...
Recommendation: 8: accept, good paper
Area: Unsupervised and Self-supervised learning
Review: In this paper, inspired by the “what” and “where” parallel pathways of the visual system, the authors present a novel architecture for object segmentation and tracking with disentangled representations of objects and their position. The proposed slot-based object representation architecture excels on the positi...
The paper proposes learning a network for action classification by gathering the target data with external datasets in a multi-task scenario. The method consists of a video transformer architecture (ViViT) that produces spatio-temporal features which are then “ROI-aligned” and fed into a single classifier. For the task...
Recommendation: 3: reject, not good enough
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The paper proposes learning a network for action classification by gathering the target data with external datasets in a multi-task scenario. The method consists of a video transformer architecture (ViViT) that produces spatio-temporal features which are then “ROI-aligned” and fed into a single classifier. For ...
This paper presents a unified framework of iterative soft threshold pruning (ISTA). The framework reveals that previous studies with threshold pruning can be casted as adding regularization terms (i.e., L1-regularization) for training. The authors further connect the learning rate with pruning threshold, and propose th...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper presents a unified framework of iterative soft threshold pruning (ISTA). The framework reveals that previous studies with threshold pruning can be casted as adding regularization terms (i.e., L1-regularization) for training. The authors further connect the learning rate with pruning threshold, and pr...
In this paper, the authors provide a feasible implementation of SNN-oriented self-attention mechanism and Vision Transformer, obtaining superior results on both static and neuromorphic benchmarks. Strength: 1. The first time to implement self-attention and transformer in large-scale model and dataset. 2. The novel modu...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: In this paper, the authors provide a feasible implementation of SNN-oriented self-attention mechanism and Vision Transformer, obtaining superior results on both static and neuromorphic benchmarks. Strength: 1. The first time to implement self-attention and transformer in large-scale model and dataset. 2. The no...
This work investigates the function invariance w.r.t. eigenvectors of graph Laplacian to reduce the learning complexity, including sign invariance and basis invariance. Then it proposes corresponding SignNet and BasisNet to incorporate these two invariances where many popular models can be directly plugged in as basic ...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: This work investigates the function invariance w.r.t. eigenvectors of graph Laplacian to reduce the learning complexity, including sign invariance and basis invariance. Then it proposes corresponding SignNet and BasisNet to incorporate these two invariances where many popular models can be directly plugged in a...
In this paper, the authors investigate noise reduction techniques for weak supervision based on the principle of k-fold cross-validation. More specifically, the authors propose a new algorithm ULF for denoising weakly annotated data which uses models trained on all but some LFs to detect and correct biases specific to...
Recommendation: 5: marginally below the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: In this paper, the authors investigate noise reduction techniques for weak supervision based on the principle of k-fold cross-validation. More specifically, the authors propose a new algorithm ULF for denoising weakly annotated data which uses models trained on all but some LFs to detect and correct biases spe...
The authors propose to, for a specific robot, learn to recognize possible intermediary goals for motion tasks which generalize to new previously unseen maps with static obstacles. These possible intermediary motion goals (options) are either centroids (one per region) and interfaces (one per pair of connected regions)....
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The authors propose to, for a specific robot, learn to recognize possible intermediary goals for motion tasks which generalize to new previously unseen maps with static obstacles. These possible intermediary motion goals (options) are either centroids (one per region) and interfaces (one per pair of connected r...
The paper proposes a new model called Hidden Markov Transformer (HMT) to tackle the problem of simultaneous machine translation (simt), which tries to translate source to target live as the source is being receive. The model has to decide when to read the source buffer and when to generate or write target token that ac...
Recommendation: 8: accept, good paper
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The paper proposes a new model called Hidden Markov Transformer (HMT) to tackle the problem of simultaneous machine translation (simt), which tries to translate source to target live as the source is being receive. The model has to decide when to read the source buffer and when to generate or write target token...
In this paper, the succinct data structures, which supports fast queries without decompressing the compressed representations, is utilized to do deep neural network inference. Also they propose a scheme to enable mixed-formulation inference for different layers. The experimental results show that the proposed method...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: In this paper, the succinct data structures, which supports fast queries without decompressing the compressed representations, is utilized to do deep neural network inference. Also they propose a scheme to enable mixed-formulation inference for different layers. The experimental results show that the propose...
The paper studied a notion of variance-reduced stochastic OMD for multi-agent general-sum standard games with an improved convergence speed over prior stochastic methods. The methods show improved convergence complexity over deterministic algorithms, especially when computing the full loss vector for each player is exp...
Recommendation: 8: accept, good paper
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: The paper studied a notion of variance-reduced stochastic OMD for multi-agent general-sum standard games with an improved convergence speed over prior stochastic methods. The methods show improved convergence complexity over deterministic algorithms, especially when computing the full loss vector for each playe...
This work proposes a particle flow algorithm that approximates a target empirical distribution with particles. The suggested algorithm updates the particles using the Wasserstein gradient of Lipschitz-regularized $f$-divergences, which is shown to exhibit a variational formulation as a supremum over Lipschitz continuou...
Recommendation: 3: reject, not good enough
Area: Generative models
Review: This work proposes a particle flow algorithm that approximates a target empirical distribution with particles. The suggested algorithm updates the particles using the Wasserstein gradient of Lipschitz-regularized $f$-divergences, which is shown to exhibit a variational formulation as a supremum over Lipschitz c...
This work proposes two very simple methods to improve the efficiency and effectiveness of k-nearest neighbor machine translation by 1) dynamically creating a datastore of bilingual sentences given an input sentence using BM25, and 2) dynamically adjusting a coefficient to scale the contribution from the similarity scor...
Recommendation: 8: accept, good paper
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This work proposes two very simple methods to improve the efficiency and effectiveness of k-nearest neighbor machine translation by 1) dynamically creating a datastore of bilingual sentences given an input sentence using BM25, and 2) dynamically adjusting a coefficient to scale the contribution from the similar...
This paper first studies the relationship of the decision regions induced by the penultimate layer of a deep net to adversarial robustness and then relies on empirical findings to propose strengthening adversarial robustness without adversarial training. Strength - Some empirical findings are quite interesting. - If a...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper first studies the relationship of the decision regions induced by the penultimate layer of a deep net to adversarial robustness and then relies on empirical findings to propose strengthening adversarial robustness without adversarial training. Strength - Some empirical findings are quite interesting...
This paper considers Bayesian optimization over objective functions defined via a causal graph, where the nodes correspond to functions defining the relationships between nodes in the graph (including the action variables). Within this framework, a UCB-based acquisition function is proposed. This acquisition function i...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper considers Bayesian optimization over objective functions defined via a causal graph, where the nodes correspond to functions defining the relationships between nodes in the graph (including the action variables). Within this framework, a UCB-based acquisition function is proposed. This acquisition fu...
This paper proposes using Wasserstein gradient flow of KL dviergence to construct the flow model. First of all, the paper has a bad definition of notations. For example, the definition of V (is the potential of the equilibrium density) appears in the preliminaries. I think the paper should organize a problem-setting ...
Recommendation: 3: reject, not good enough
Area: Generative models
Review: This paper proposes using Wasserstein gradient flow of KL dviergence to construct the flow model. First of all, the paper has a bad definition of notations. For example, the definition of V (is the potential of the equilibrium density) appears in the preliminaries. I think the paper should organize a problem-...
This paper focuses on the problem of multi-person 3D motion forecasting. The proposed framework uses a dual-level transformer-based generative model, encoding the local (per person) and global (multi-person) motion histories to decode each individual future body motion. The framework has been comprehensively evaluated ...
Recommendation: 8: accept, good paper
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper focuses on the problem of multi-person 3D motion forecasting. The proposed framework uses a dual-level transformer-based generative model, encoding the local (per person) and global (multi-person) motion histories to decode each individual future body motion. The framework has been comprehensively ev...
The authors approach SR via deep, permutation-invariant, generative models, a framework they call DGSR. They evaluate their framework on numerous problem sets, and have good empirical performance. Strengths: - The approach appears novel. - Numerous datasets tested - Empirical results are solid Weaknesses...
Recommendation: 6: marginally above the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: The authors approach SR via deep, permutation-invariant, generative models, a framework they call DGSR. They evaluate their framework on numerous problem sets, and have good empirical performance. Strengths: - The approach appears novel. - Numerous datasets tested - Empirical results are solid We...
The authors propose using an functional form of smoothly broken power law namely broken neural scaling laws (BNSL) for extrapolating and generalizing to model scaling behaviors across diverse set of upstream and downstream tasks such zero-shot, prompted, and fine-tuned settings of unsupervised language, vision, reinfor...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: The authors propose using an functional form of smoothly broken power law namely broken neural scaling laws (BNSL) for extrapolating and generalizing to model scaling behaviors across diverse set of upstream and downstream tasks such zero-shot, prompted, and fine-tuned settings of unsupervised language, vision,...
The paper improves upon the conversion error of two step ANN to SNN conversion based technique to yield sota accuracy. In particular, it presents an efficient ANN-SNN conversion mechanism based on the SlipReLU and shifted SlipReLU activation function replacing the traditional ReLU to improve the accuracy of the conver...
Recommendation: 8: accept, good paper
Area: General Machine Learning
Review: The paper improves upon the conversion error of two step ANN to SNN conversion based technique to yield sota accuracy. In particular, it presents an efficient ANN-SNN conversion mechanism based on the SlipReLU and shifted SlipReLU activation function replacing the traditional ReLU to improve the accuracy of th...
This paper proposes a datapoint valuation method, LAVA, that does not require a pre-defined learning algorithm, which is a common assumption in the existing literature. It utilizes the Wasserstein distance between the training set and the validation set with respect to a hybrid cost that considers both feature and labe...
Recommendation: 8: accept, good paper
Area: General Machine Learning
Review: This paper proposes a datapoint valuation method, LAVA, that does not require a pre-defined learning algorithm, which is a common assumption in the existing literature. It utilizes the Wasserstein distance between the training set and the validation set with respect to a hybrid cost that considers both feature ...
The paper proposes to apply theory of differential inclusion to understand and explain the behavior of epsilon-greedy based value-learning algorithms with function approximation, such as Q-learning and SARSA(0) with epsilon-greedy exploration. The main result (Thm 2.1) characterizes the asymptotic behavior of aforement...
Recommendation: 5: marginally below the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: The paper proposes to apply theory of differential inclusion to understand and explain the behavior of epsilon-greedy based value-learning algorithms with function approximation, such as Q-learning and SARSA(0) with epsilon-greedy exploration. The main result (Thm 2.1) characterizes the asymptotic behavior of a...
This paper studies multi-agent exploration, which is an important problem for more efficient multi-agent reinforcement learning. The authors first pointed out that the issue of ‘revisition’ hurts the exploration and learning efficiency of existing intrinsic exploration methods. To address the issue, the author ​​propo...
Recommendation: 5: marginally below the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper studies multi-agent exploration, which is an important problem for more efficient multi-agent reinforcement learning. The authors first pointed out that the issue of ‘revisition’ hurts the exploration and learning efficiency of existing intrinsic exploration methods. To address the issue, the author...
The paper addresses the question, what role does data augmentation play in (contrastive) self-supervised learning? As the authors write they complicate the simplistic view that data augmentation implements invariances: "We complicate this picture by showing that label-destroying augmentations are often crucial in the f...
Recommendation: 8: accept, good paper
Area: Unsupervised and Self-supervised learning
Review: The paper addresses the question, what role does data augmentation play in (contrastive) self-supervised learning? As the authors write they complicate the simplistic view that data augmentation implements invariances: "We complicate this picture by showing that label-destroying augmentations are often crucial ...
This paper studies adversarial training for pretrained NLP models. In adversarial training for NLP, perturbations are applied to the input word embeddings -- such that the prediction changes. The authors investigate this and find that while it sometimes helps, it hurts many tasks, most notably a 3.4 points drop on Hell...
Recommendation: 8: accept, good paper
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper studies adversarial training for pretrained NLP models. In adversarial training for NLP, perturbations are applied to the input word embeddings -- such that the prediction changes. The authors investigate this and find that while it sometimes helps, it hurts many tasks, most notably a 3.4 points drop...
This paper proposes an empirical study of different masking-noise strategies for an image auto-encoder model. In contrast to the recent masked auto-encoded, authors propose to mask the inputs in the frequency domain by randomly dropping high or low frequency components. Their approach learns a representation in a self-...
Recommendation: 5: marginally below the acceptance threshold
Area: Unsupervised and Self-supervised learning
Review: This paper proposes an empirical study of different masking-noise strategies for an image auto-encoder model. In contrast to the recent masked auto-encoded, authors propose to mask the inputs in the frequency domain by randomly dropping high or low frequency components. Their approach learns a representation in...
This paper applied a motifnorm to introduce the graph structure into the node presentation and increased the expressive power over 1-WL test. It is well written and with extensive experiments. Strength: The paper is well written. And the theoretical analysis is also quite clear, which I truly appreciated. The propose...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper applied a motifnorm to introduce the graph structure into the node presentation and increased the expressive power over 1-WL test. It is well written and with extensive experiments. Strength: The paper is well written. And the theoretical analysis is also quite clear, which I truly appreciated. The...
This submission contributes a learning method for high-dimensional data that uses an associated knowledge graph between the features to create a lower-dimension representation. The methods pretrains a data-transformation mechanism on the knowledge graph, creates attention weights, and used message passing on the corres...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This submission contributes a learning method for high-dimensional data that uses an associated knowledge graph between the features to create a lower-dimension representation. The methods pretrains a data-transformation mechanism on the knowledge graph, creates attention weights, and used message passing on th...
This paper draws inspiration from the cognitive science literature to design a multi-module architecture for continual learning from images. More specifically, the proposed “Cognitive Continual Learning” consists of a working model (which processes images in the typical way), an inductive bias learner (which receives p...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper draws inspiration from the cognitive science literature to design a multi-module architecture for continual learning from images. More specifically, the proposed “Cognitive Continual Learning” consists of a working model (which processes images in the typical way), an inductive bias learner (which re...
This paper proposes a novel approach to pipeline optimization for machine learning models. The proposed method encodes the hyperparameters of every algorithm into a latent space and then aggregates the hyperparameters of the algorithms from all stages into a single latent representation. Based on this learned latent re...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposes a novel approach to pipeline optimization for machine learning models. The proposed method encodes the hyperparameters of every algorithm into a latent space and then aggregates the hyperparameters of the algorithms from all stages into a single latent representation. Based on this learned l...
The paper trains a new 130B parameter model with the GLM architecture/objective, with contributions in automatically stabilizing spikes with existing techniques, focussing on keeping inference costs and requirements low and therefore the model accessible to a large number of people. It is an achievement to beat GPT3 nu...
Recommendation: 8: accept, good paper
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The paper trains a new 130B parameter model with the GLM architecture/objective, with contributions in automatically stabilizing spikes with existing techniques, focussing on keeping inference costs and requirements low and therefore the model accessible to a large number of people. It is an achievement to beat...
This paper studies multi-source domain adaptation. Instead of learning domain-invariant features to address the conditional shift, this paper assmes latent covariate shift and proposes latent causal model to formulate the data and label generating process. The identifiability of the proposed model is analyzed. By integ...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This paper studies multi-source domain adaptation. Instead of learning domain-invariant features to address the conditional shift, this paper assmes latent covariate shift and proposes latent causal model to formulate the data and label generating process. The identifiability of the proposed model is analyzed. ...
The paper uses SVRG to reduce variance in TD learning. The resulting algorithm is analyzed using the gradient splitting perspective on TD learning to prove finite sample convergence rates that match those of SVRG in the setting of convex optimization. The analysis is done for several settings, and the findings are illu...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The paper uses SVRG to reduce variance in TD learning. The resulting algorithm is analyzed using the gradient splitting perspective on TD learning to prove finite sample convergence rates that match those of SVRG in the setting of convex optimization. The analysis is done for several settings, and the findings ...
This paper studies the Temporal difference (TD) learning method for policy evaluation in reinforcement learning. The proposed approach TD-SVRG method is a variant of the TD method by introducing the well-known SVRG technique. Theoretically, their analysis can lead to better convergence bounds for previous methods. Nume...
Recommendation: 5: marginally below the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper studies the Temporal difference (TD) learning method for policy evaluation in reinforcement learning. The proposed approach TD-SVRG method is a variant of the TD method by introducing the well-known SVRG technique. Theoretically, their analysis can lead to better convergence bounds for previous metho...
This paper presents new diversity and quality evaluation mechanisms for natural language generation models, especially multiple candidates and multiple reference items. The main idea of the methods is making triangles; those nodes are sentences in the candidate set, and the reference set and edges are existing semantic...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper presents new diversity and quality evaluation mechanisms for natural language generation models, especially multiple candidates and multiple reference items. The main idea of the methods is making triangles; those nodes are sentences in the candidate set, and the reference set and edges are existing ...
This work proposes a new distillation method that is more fine-grained than the previous bounding box distillation methods. It achieves performance improvement in both object detection and semantic segmentation. Pros: 1. Figure 2 clearly illustrates the framework of the proposed method. 2. This paper is overall well...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: This work proposes a new distillation method that is more fine-grained than the previous bounding box distillation methods. It achieves performance improvement in both object detection and semantic segmentation. Pros: 1. Figure 2 clearly illustrates the framework of the proposed method. 2. This paper is over...
This paper proposes first integral-preserving neural differential equation (FINDE) that can learn a dynamical system and its invariant quantities (i.e., first integrals) from observed data *without* prior knowledge (e.g., conservations of energy and momentum) or assumed geometric structures (e.g., Hamiltonian or Lagran...
Recommendation: 8: accept, good paper
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: This paper proposes first integral-preserving neural differential equation (FINDE) that can learn a dynamical system and its invariant quantities (i.e., first integrals) from observed data *without* prior knowledge (e.g., conservations of energy and momentum) or assumed geometric structures (e.g., Hamiltonian o...
For modeling long sequences, as an alternative to the attention+softmax based weights that are typically utilized in the transformer models, this paper proposes to use relative position dependent weights that are generated by a ‘relative position encoder’ network, together with an exponential decay bias on the weights....
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: For modeling long sequences, as an alternative to the attention+softmax based weights that are typically utilized in the transformer models, this paper proposes to use relative position dependent weights that are generated by a ‘relative position encoder’ network, together with an exponential decay bias on the ...
This paper an adaptive down-sampling method, AdaStride. The aim of AdaStride is to learn to deploy adaptive strides in a sequential data instance, i.e., preserving more information from task-relevant parts by using smaller strides while using larger strides for less-relevant parts. This idea is implemented by the cumul...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper an adaptive down-sampling method, AdaStride. The aim of AdaStride is to learn to deploy adaptive strides in a sequential data instance, i.e., preserving more information from task-relevant parts by using smaller strides while using larger strides for less-relevant parts. This idea is implemented by t...
The paper theoretically studies optimization and generalization of self-supervised learning with pseudo labelers setting. The pseudo label and true label are correlated. It considers linear data setting (signal/noise ratio = $O(d^{0.01})$) and two-layer neural networks with ReLU^3 activation function. Comparing two set...
Recommendation: 8: accept, good paper
Area: Unsupervised and Self-supervised learning
Review: The paper theoretically studies optimization and generalization of self-supervised learning with pseudo labelers setting. The pseudo label and true label are correlated. It considers linear data setting (signal/noise ratio = $O(d^{0.01})$) and two-layer neural networks with ReLU^3 activation function. Comparing...
This paper proposes a new metric, namely IDA-RD, to evaluate image downscaling algorithms quantitatively. To this end, the authors employ the idea that a downscaling algorithm that preserves more details in the resulting low-resolution images should lead to less distorted high-resolution images constructed by state-of-...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper proposes a new metric, namely IDA-RD, to evaluate image downscaling algorithms quantitatively. To this end, the authors employ the idea that a downscaling algorithm that preserves more details in the resulting low-resolution images should lead to less distorted high-resolution images constructed by s...
The paper describes a large number of experiments relating the AlphaHat measure to generalization performance of DNNs. Strengths: understanding generalization is of great importance, the authors have some novel ideas here. Weaknesses: the arguments made in the paper are extremely hard to follow. A serious round of edi...
Recommendation: 1: strong reject
Area: Deep Learning and representational learning
Review: The paper describes a large number of experiments relating the AlphaHat measure to generalization performance of DNNs. Strengths: understanding generalization is of great importance, the authors have some novel ideas here. Weaknesses: the arguments made in the paper are extremely hard to follow. A serious roun...
Authors propose a method of accelerating cross exchange (CE) heuristic by approximating the associated "value" function with a neural network. Authors adapt standard GNN architectures to approximate the value function. The method applies to a general class of min-max flexibile multi-depot vehicle routing planning (FMDV...
Recommendation: 8: accept, good paper
Area: General Machine Learning
Review: Authors propose a method of accelerating cross exchange (CE) heuristic by approximating the associated "value" function with a neural network. Authors adapt standard GNN architectures to approximate the value function. The method applies to a general class of min-max flexibile multi-depot vehicle routing planni...