review
stringlengths
5
16.6k
score
stringclasses
5 values
area
stringclasses
12 values
text
stringlengths
31
5.65k
This paper studied the effect of backdoor attacks in the multi-agent attacker scenario, where each attacker constructs backdoor attacks on it's individual dataset. There is a single defender learner who receives poisoned datasets from all attackers, and learn a model on that dataset. The paper discovered a backfire ef...
Recommendation: 3: reject, not good enough
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper studied the effect of backdoor attacks in the multi-agent attacker scenario, where each attacker constructs backdoor attacks on it's individual dataset. There is a single defender learner who receives poisoned datasets from all attackers, and learn a model on that dataset. The paper discovered a bac...
The authors study the effectiveness of an iterative stochastic minimization algorithm for SAM (sharpness aware minimization): at each iteration the batch is further reduced in size using a Top-K rule based on the value of the loss. The goal of this choice is to reduce the computational expense, taking the cost closer t...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: The authors study the effectiveness of an iterative stochastic minimization algorithm for SAM (sharpness aware minimization): at each iteration the batch is further reduced in size using a Top-K rule based on the value of the loss. The goal of this choice is to reduce the computational expense, taking the cost ...
This paper presents a unified framework for vision, language and multi-modal tasks. Instead of directly predicting labels with different formats, a unified task representation is designed to enable joint training of multiple tasks. The method exhibits state-of-the-art performance on the GRIT benchmarks and comparable r...
Recommendation: 8: accept, good paper
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper presents a unified framework for vision, language and multi-modal tasks. Instead of directly predicting labels with different formats, a unified task representation is designed to enable joint training of multiple tasks. The method exhibits state-of-the-art performance on the GRIT benchmarks and comp...
Similar to MIMO in wireless communication, multi-input multi-output training improves network performance by optimizing multiple subnetworks simultaneously. Previous MIMO network architecture uses CNN. This paper proposes MixViT, the first MIMO framework for vision transformers which takes advantage of ViTs’ inherent m...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: Similar to MIMO in wireless communication, multi-input multi-output training improves network performance by optimizing multiple subnetworks simultaneously. Previous MIMO network architecture uses CNN. This paper proposes MixViT, the first MIMO framework for vision transformers which takes advantage of ViTs’ in...
This paper introduces blind training to preserve the data and model privacy via shuffled Transformers. An intriguing finding is proposed that, inputs and the model weights of the Transformer encoder blocks, the backbone of Transformer, can be shuffled without degrading the model performance. strength: This work focuse...
Recommendation: 5: marginally below the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper introduces blind training to preserve the data and model privacy via shuffled Transformers. An intriguing finding is proposed that, inputs and the model weights of the Transformer encoder blocks, the backbone of Transformer, can be shuffled without degrading the model performance. strength: This wor...
In causal discovery, one starts with input variables and then learns a causal graph describing the relationships between the input variables. In recent years, a complementary question, which asks "how to learn causal variables from low-level raw data (e.g., images)?" has gained attention and this task is often termed "...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: In causal discovery, one starts with input variables and then learns a causal graph describing the relationships between the input variables. In recent years, a complementary question, which asks "how to learn causal variables from low-level raw data (e.g., images)?" has gained attention and this task is often ...
This paper contains two main contributions. Firstly, the authors have collected a new dataset for fitness activity recognition in a controlled environment (the setting of the videos is controlled by the authors). The dataset contains 5511 videos with 40 fine-grained activity labels. They then additionally collected a m...
Recommendation: 3: reject, not good enough
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper contains two main contributions. Firstly, the authors have collected a new dataset for fitness activity recognition in a controlled environment (the setting of the videos is controlled by the authors). The dataset contains 5511 videos with 40 fine-grained activity labels. They then additionally colle...
The authors propose a GAN based approach to generate attacks and also claim to enhance the detection of illicit activity in various domains. They use three type of loss functions to train a generator to generate the attacks. The domain they focus on is money laundering and recommendation systems. The authors claim ther...
Recommendation: 3: reject, not good enough
Area: Generative models
Review: The authors propose a GAN based approach to generate attacks and also claim to enhance the detection of illicit activity in various domains. They use three type of loss functions to train a generator to generate the attacks. The domain they focus on is money laundering and recommendation systems. The authors cl...
This paper analyzes the "reliability" of large language models (LLM) with prompt engineering or in-context learning. Authors consider four "facets" of reliability: (1) robustness to domain shift, (2) neutrality w.r.t. social biases (3) uncertainty calibration and (4) ability to update the learned knowledge. For each f...
Recommendation: 6: marginally above the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper analyzes the "reliability" of large language models (LLM) with prompt engineering or in-context learning. Authors consider four "facets" of reliability: (1) robustness to domain shift, (2) neutrality w.r.t. social biases (3) uncertainty calibration and (4) ability to update the learned knowledge. Fo...
This paper focuses on the problem of reliable explanations. The authors find that existing methods can be inconsistent or unstable. Therefore, there is an impending need to quantify the uncertainty of such explanation methods in order to understand when explanations are trustworthy. The authors introduce a novel uncert...
Recommendation: 5: marginally below the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper focuses on the problem of reliable explanations. The authors find that existing methods can be inconsistent or unstable. Therefore, there is an impending need to quantify the uncertainty of such explanation methods in order to understand when explanations are trustworthy. The authors introduce a nove...
This work addresses VLM few-shot learning with prompt tuning. It addressed the overfitting of the learned prompts by regularizing the direction of gradients. The direction is enforced not in the opposite direction of the gradient computed with the human-selected prompt. The paper provides a theoretical justification to...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This work addresses VLM few-shot learning with prompt tuning. It addressed the overfitting of the learned prompts by regularizing the direction of gradients. The direction is enforced not in the opposite direction of the gradient computed with the human-selected prompt. The paper provides a theoretical justific...
The paper introduces a model-based RL approach that learns a transformer-based world model and additional techniques to further improve the sample-efficiency. Specifically, VAE is trained to learn visual information from raw pixels, and autoregressive dynamics model based on Transformer-XL architecture is trained upon ...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The paper introduces a model-based RL approach that learns a transformer-based world model and additional techniques to further improve the sample-efficiency. Specifically, VAE is trained to learn visual information from raw pixels, and autoregressive dynamics model based on Transformer-XL architecture is train...
To tackle the distribution shift and missing data problem of time series, this paper proposes a latent space spectral decomposition method for simultaneous time series forecasting and imputation. The latent vector is optimized individually for unseen data and thus can generalize well to unseen data distribution. Pros:...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: To tackle the distribution shift and missing data problem of time series, this paper proposes a latent space spectral decomposition method for simultaneous time series forecasting and imputation. The latent vector is optimized individually for unseen data and thus can generalize well to unseen data distribution...
This paper proposes a variant of masked autoencoders (MAE), which is specifically designed for certified robustness tasks. Specifically, they add Gaussian noise in the pretaining process and use the consistency regularization method for finetuning. With a much smaller computational complexity, they obtain better result...
Recommendation: 6: marginally above the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper proposes a variant of masked autoencoders (MAE), which is specifically designed for certified robustness tasks. Specifically, they add Gaussian noise in the pretaining process and use the consistency regularization method for finetuning. With a much smaller computational complexity, they obtain bette...
The authors propose a simple modification of scheduled sampling for transformers that allows them to get better performance on a variety of tasks, including NMT and text generation. Importantly, they analyze why exactly their method does better and produce pretty conclusive quantitative results of this. This paper does...
Recommendation: 3: reject, not good enough
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The authors propose a simple modification of scheduled sampling for transformers that allows them to get better performance on a variety of tasks, including NMT and text generation. Importantly, they analyze why exactly their method does better and produce pretty conclusive quantitative results of this. This pa...
The paper proposes an unsupervised network (graph) embedding technique. Rather than using unstructured vectors to represent nodes, the embedding framework uses sums of Kronecker products of learnable vectors to represent the nodes. This is inspired by entanglement in quantum physics where similar representations are us...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: The paper proposes an unsupervised network (graph) embedding technique. Rather than using unstructured vectors to represent nodes, the embedding framework uses sums of Kronecker products of learnable vectors to represent the nodes. This is inspired by entanglement in quantum physics where similar representation...
The paper proposes a curriculum learning (CL) method to train BERT, which is treated as blackbox (no need to modify the original implementation). The CL method consists of several stages, each of which is to replace rare words / phrases with syntactical tags (e.g. 1000 with CD). By doing that, BERT will only need to le...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The paper proposes a curriculum learning (CL) method to train BERT, which is treated as blackbox (no need to modify the original implementation). The CL method consists of several stages, each of which is to replace rare words / phrases with syntactical tags (e.g. 1000 with CD). By doing that, BERT will only ne...
The paper proposed to utilize intermediate checkpoints from a single training process to protect data from unauthorized use. It also proposed a novel feature alignment (FA) technique that improves the accuracy of its proposed self-ensemble protection (SEP) method. FA uses an existing theory called neural collapse to al...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: The paper proposed to utilize intermediate checkpoints from a single training process to protect data from unauthorized use. It also proposed a novel feature alignment (FA) technique that improves the accuracy of its proposed self-ensemble protection (SEP) method. FA uses an existing theory called neural collap...
Deep learning models often exhibit consistent error patterns, where these errors often correspond to hard subpopulations in the data they are deployed on. This paper introduces a framework for automatic distillation and surfacing of a model’s error patterns. In detail, this framework uses SVM to predict the error of th...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: Deep learning models often exhibit consistent error patterns, where these errors often correspond to hard subpopulations in the data they are deployed on. This paper introduces a framework for automatic distillation and surfacing of a model’s error patterns. In detail, this framework uses SVM to predict the err...
Paper tackles the task of Class Agnostic Counting (CAC) in a few-shot setting, which involves predicting the overall count for the object of interest in an image, given few exemplars of object of interest from the same image. Previous works on CAC such as Ranjan et al, FamNet, rely on correlation between the exemplar f...
Recommendation: 5: marginally below the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: Paper tackles the task of Class Agnostic Counting (CAC) in a few-shot setting, which involves predicting the overall count for the object of interest in an image, given few exemplars of object of interest from the same image. Previous works on CAC such as Ranjan et al, FamNet, rely on correlation between the ex...
This submission proposes a new imputation algorithm called Markov-Blanket Miss-Forest (MBMF), which involves two phases: Markov Blanket-based Feature Selection (MBFS), and MissForest (MF) imputation (Stekhoven & Buhlmann, 2012). For each partially observed variable V_i, MBFS finds its Markov Blanket within some m-gra...
Recommendation: 8: accept, good paper
Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes)
Review: This submission proposes a new imputation algorithm called Markov-Blanket Miss-Forest (MBMF), which involves two phases: Markov Blanket-based Feature Selection (MBFS), and MissForest (MF) imputation (Stekhoven & Buhlmann, 2012). For each partially observed variable V_i, MBFS finds its Markov Blanket within so...
This paper provides an interesting approach for generating link embeddings in temporal graphs, which is converting the graph into a line graph and connecting edges (now nodes), based on the temporal difference they have in the initial graph. They show that with this representation, the adjacency matrix representation i...
Recommendation: 5: marginally below the acceptance threshold
Area: General Machine Learning
Review: This paper provides an interesting approach for generating link embeddings in temporal graphs, which is converting the graph into a line graph and connecting edges (now nodes), based on the temporal difference they have in the initial graph. They show that with this representation, the adjacency matrix represen...
This paper proposes a type of neural networks that uses lateral inhibition inspired layers. Lateral inhibition in this paper refers to the effect where the contrast of nearby neuron excitation in the lateral direction is increased for recognition. Inspired by this, the paper proposes to use a Gaussian low-pass filter w...
Recommendation: 1: strong reject
Area: Deep Learning and representational learning
Review: This paper proposes a type of neural networks that uses lateral inhibition inspired layers. Lateral inhibition in this paper refers to the effect where the contrast of nearby neuron excitation in the lateral direction is increased for recognition. Inspired by this, the paper proposes to use a Gaussian low-pass ...
This paper considers the semi-supervised community detection problem. In particular, they consider the degree-corrected block model (DCBM) where each node belongs to one of K communities and has a degree parameter. Then, the edges are generated between nodes according to the degree parameter of the two nodes and commun...
Recommendation: 8: accept, good paper
Area: General Machine Learning
Review: This paper considers the semi-supervised community detection problem. In particular, they consider the degree-corrected block model (DCBM) where each node belongs to one of K communities and has a degree parameter. Then, the edges are generated between nodes according to the degree parameter of the two nodes an...
This paper proposes a novel deep learning framework named Cross-Protein Wasserstein Transformer (CPWT) to predict PPI sites through fine-grained cross-graph structural modeling, which promotes the PPI prediction from the perspective of sophisticated cross-protein structural modeling based on Wasserstein affinities. The...
Recommendation: 5: marginally below the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: This paper proposes a novel deep learning framework named Cross-Protein Wasserstein Transformer (CPWT) to predict PPI sites through fine-grained cross-graph structural modeling, which promotes the PPI prediction from the perspective of sophisticated cross-protein structural modeling based on Wasserstein affinit...
This paper proposes a new method for dynamic large-scale multitask learning and conducts some experiments to study its effectiveness. Strength 1. This paper aims to provide a new and automatic method for dynamic large-scale multitask learning. Weaknesses 1. The main contribution of this paper is unclear. Although it c...
Recommendation: 1: strong reject
Area: Deep Learning and representational learning
Review: This paper proposes a new method for dynamic large-scale multitask learning and conducts some experiments to study its effectiveness. Strength 1. This paper aims to provide a new and automatic method for dynamic large-scale multitask learning. Weaknesses 1. The main contribution of this paper is unclear. Altho...
The paper aims to understand the training dynamics of the Attention mechanism through lexical prob $\beta$ and its learning proxy model. Strength: 1. The paper did some rigorous analysis of the attention training mechanism and drew a connection to the word alignment of the classical models. 2. There is a connection to...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: The paper aims to understand the training dynamics of the Attention mechanism through lexical prob $\beta$ and its learning proxy model. Strength: 1. The paper did some rigorous analysis of the attention training mechanism and drew a connection to the word alignment of the classical models. 2. There is a conne...
This paper proposes an explainable abstractive summarization framework by exploring the two research questions: RQ1 and RQ2. Experiment results on CNN/DailyMail dataset are given to demonstrate the effectiveness of the proposed SP framework. It is nice to propose a novel framework to explore the interpretability of abs...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper proposes an explainable abstractive summarization framework by exploring the two research questions: RQ1 and RQ2. Experiment results on CNN/DailyMail dataset are given to demonstrate the effectiveness of the proposed SP framework. It is nice to propose a novel framework to explore the interpretabilit...
This paper presents a dataset containing synthetic models of power grids combined with the statistical results of dynamic simulations (quantifying single-node basin stability and survivability - abbreviated SNBS and SURV). The authors train a baseline GNN to show initial efficacy of the task of predicting SNBS and SURV...
Recommendation: 6: marginally above the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: This paper presents a dataset containing synthetic models of power grids combined with the statistical results of dynamic simulations (quantifying single-node basin stability and survivability - abbreviated SNBS and SURV). The authors train a baseline GNN to show initial efficacy of the task of predicting SNBS ...
This paper presents an algorithm to accurately account for individual differential privacy guarantees in DPSGD. Strength: Compared with worst-case DP guarantees, the individual DP guarantee of a sample allows us to better understand the privacy guarantee of a specific data sample, and its impact over model parameters....
Recommendation: 3: reject, not good enough
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper presents an algorithm to accurately account for individual differential privacy guarantees in DPSGD. Strength: Compared with worst-case DP guarantees, the individual DP guarantee of a sample allows us to better understand the privacy guarantee of a specific data sample, and its impact over model par...
While many techniques for model fairness have been proposed, the majority of them assume that the distributions of training and deployment data are identical, which is often not the case in practice. In particular, the bias between labels and sensitive groups changes, which may impair the performance of machine learnin...
Recommendation: 8: accept, good paper
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: While many techniques for model fairness have been proposed, the majority of them assume that the distributions of training and deployment data are identical, which is often not the case in practice. In particular, the bias between labels and sensitive groups changes, which may impair the performance of machine...
The authors consider the problem of learning the intensity function of an inhomogeneous Poisson process (PP) over higher dimensional spaces: 1. The authors propose a certain family of generalized additive models (GAM) to model the log-intensity function of the PP and call their method the additive Poisson process (APP...
Recommendation: 3: reject, not good enough
Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes)
Review: The authors consider the problem of learning the intensity function of an inhomogeneous Poisson process (PP) over higher dimensional spaces: 1. The authors propose a certain family of generalized additive models (GAM) to model the log-intensity function of the PP and call their method the additive Poisson proc...
This work tries to explain the asymptotic behaviors of two well-known approximate RL algorithms, Q-learning and SARSA, with $\epsilon$-greedy exploration. The theoretical analysis presented in this work uses Differential Inclusion (DI) theory to analyze value-based RL methods with discontinuous behavior policy changes....
Recommendation: 5: marginally below the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: This work tries to explain the asymptotic behaviors of two well-known approximate RL algorithms, Q-learning and SARSA, with $\epsilon$-greedy exploration. The theoretical analysis presented in this work uses Differential Inclusion (DI) theory to analyze value-based RL methods with discontinuous behavior policy ...
In this paper, the authors introduced a framework for explaining distribution shift using a transport map T between a source and target distribution. They constrained a relaxed form of optimal transport to theoretically define an interpretable mapping TIT and introduced two interpretable transport methods: k-sparse and...
Recommendation: 5: marginally below the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: In this paper, the authors introduced a framework for explaining distribution shift using a transport map T between a source and target distribution. They constrained a relaxed form of optimal transport to theoretically define an interpretable mapping TIT and introduced two interpretable transport methods: k-sp...
This paper observes that AT [1] focuses on the low-frequency area to achieving adversarial robustness. It empirically shows that white-box attack corrupts the high frequency domain. Authors propose Frequency Regularization (FR) which applies a regularization in the frequency domain with AT. Strength - This paper des...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This paper observes that AT [1] focuses on the low-frequency area to achieving adversarial robustness. It empirically shows that white-box attack corrupts the high frequency domain. Authors propose Frequency Regularization (FR) which applies a regularization in the frequency domain with AT. Strength - This p...
This paper attempts to propose an evaluation protocol for lightweight probing of unsupervised representations and investigates the correlation between RL performance and linear probing from a pretrained representation. Authors are testing this on a very specific class of self-predictive (recurrent) representation model...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This paper attempts to propose an evaluation protocol for lightweight probing of unsupervised representations and investigates the correlation between RL performance and linear probing from a pretrained representation. Authors are testing this on a very specific class of self-predictive (recurrent) representati...
This paper focuses on the self-supervised learning. Based on masked image modeling, the authors introduce a new algorithm which uses corrupted as training sources instead of masked ones. They utilize a new trainable module including a pretrained transformer decoder to generate such corrupted images. The models are trai...
Recommendation: 6: marginally above the acceptance threshold
Area: Unsupervised and Self-supervised learning
Review: This paper focuses on the self-supervised learning. Based on masked image modeling, the authors introduce a new algorithm which uses corrupted as training sources instead of masked ones. They utilize a new trainable module including a pretrained transformer decoder to generate such corrupted images. The models ...
This paper proposes a new approach to multitask learning by retrieving relevant training examples from P3 and train the model on it. ### Strength 1. This paper proposes a simple yet effective idea on how to use existing resources (i.e., P3) to facilitate unseen tasks. 2. The paper is well-written and easy to follow. 3...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper proposes a new approach to multitask learning by retrieving relevant training examples from P3 and train the model on it. ### Strength 1. This paper proposes a simple yet effective idea on how to use existing resources (i.e., P3) to facilitate unseen tasks. 2. The paper is well-written and easy to f...
Most of the paper is clearly written. A new dataset for incremental learning is provided. The fixed and dynamic modes of Global Prototype Encoding is proposed and outperform the state-of-arts. Strength: Most parts are explained clearly for the equations.Most of the procedures seems reasonable. Weakness: 1) How to le...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: Most of the paper is clearly written. A new dataset for incremental learning is provided. The fixed and dynamic modes of Global Prototype Encoding is proposed and outperform the state-of-arts. Strength: Most parts are explained clearly for the equations.Most of the procedures seems reasonable. Weakness: 1) H...
In this paper, the authors focus on the multi-modal representation learning and cross-modal similarity estimation topic and propose the Chimera framework. The proposed framework uses the hyperbolic space to better represent complex multi-modal relationships. The topic model is also utilized. The proposed Chimera method...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: In this paper, the authors focus on the multi-modal representation learning and cross-modal similarity estimation topic and propose the Chimera framework. The proposed framework uses the hyperbolic space to better represent complex multi-modal relationships. The topic model is also utilized. The proposed Chimer...
The paper proposes a general algorithmic framework for differentially privately releasing a number of sufficient statistics on a data stream. With the released statistics, all symmetric norms can be approximated simultaneously, which makes the algorithm especially suitable for a large number of queries. I found the ide...
Recommendation: 8: accept, good paper
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The paper proposes a general algorithmic framework for differentially privately releasing a number of sufficient statistics on a data stream. With the released statistics, all symmetric norms can be approximated simultaneously, which makes the algorithm especially suitable for a large number of queries. I found...
The paper aims to improve the robustness of adversarial self-supervised learning (SSL) by leveraging the proposed targeted adversarial data for adversarial SSL. The targeted adversarial data is generated by updating the natural data towards a targeted sample selected by K-mean or similarity. The paper empirically valid...
Recommendation: 3: reject, not good enough
Area: Unsupervised and Self-supervised learning
Review: The paper aims to improve the robustness of adversarial self-supervised learning (SSL) by leveraging the proposed targeted adversarial data for adversarial SSL. The targeted adversarial data is generated by updating the natural data towards a targeted sample selected by K-mean or similarity. The paper empirical...
This paper provides theoretical results for the asymptotic convergence of SGD algorithm under an over-parameterized setting. It shows a set of assumptions that can guarantee the global convergence of SGD almost surely in some non-convex setting. The strengths of this paper are the theoretical results for the global co...
Recommendation: 5: marginally below the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: This paper provides theoretical results for the asymptotic convergence of SGD algorithm under an over-parameterized setting. It shows a set of assumptions that can guarantee the global convergence of SGD almost surely in some non-convex setting. The strengths of this paper are the theoretical results for the g...
This paper presents a method for graph contrastive learning, specifically optimized for heterophily graphs. The idea of HLCL is simple: to generate contrastive pairs, HLCL uses two branches of encoders. One encoder is the vanilla GCN which performs low-pass filtering (smoothing); the other encoder is uses the Laplacian...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper presents a method for graph contrastive learning, specifically optimized for heterophily graphs. The idea of HLCL is simple: to generate contrastive pairs, HLCL uses two branches of encoders. One encoder is the vanilla GCN which performs low-pass filtering (smoothing); the other encoder is uses the L...
This paper addresses the problem of probabilistic forecasting and proposes new loss functions that are supposed to reduce the probability of catastrophic errors. STRENGTHS - Very interesting research topic - Paper is well-written and easy to follow WEAKNESSES - Empirical results do not support the claims in a convinci...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This paper addresses the problem of probabilistic forecasting and proposes new loss functions that are supposed to reduce the probability of catastrophic errors. STRENGTHS - Very interesting research topic - Paper is well-written and easy to follow WEAKNESSES - Empirical results do not support the claims in a ...
This paper proposed a new framework for training sequence labeling models to optimize reward metrics, and a CML loss to help the model better understand the reward space. The experimental results show superiority compared with recent baselines. ### Pros 1. The proposed GROOT is simple, effective, and easy to implement...
Recommendation: 5: marginally below the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper proposed a new framework for training sequence labeling models to optimize reward metrics, and a CML loss to help the model better understand the reward space. The experimental results show superiority compared with recent baselines. ### Pros 1. The proposed GROOT is simple, effective, and easy to i...
Authors define PLATO, a model for underserved scenario of short and fat datasets (d>>n). PLATO works when we have an auxiliary knowledge graph describing the d features and the relations between them. Tabular datasets with d>>n are common in physical sciences and biology where data is collected through expensive experi...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: Authors define PLATO, a model for underserved scenario of short and fat datasets (d>>n). PLATO works when we have an auxiliary knowledge graph describing the d features and the relations between them. Tabular datasets with d>>n are common in physical sciences and biology where data is collected through expensiv...
This paper is very technical and I'll first say I am not familiar with the literature. However, as somewhat an "outsider" to this problem, hopefully I can contribute by asking the right questions, which can help the author make this work more accessible. My naive understanding of this paper is that it's basically doin...
Recommendation: 6: marginally above the acceptance threshold
Area: General Machine Learning
Review: This paper is very technical and I'll first say I am not familiar with the literature. However, as somewhat an "outsider" to this problem, hopefully I can contribute by asking the right questions, which can help the author make this work more accessible. My naive understanding of this paper is that it's basica...
The paper introduces several consistency losses that help improve the performance of behavior prediction models. * The main innovation is the temporal consistency constraint, which enforces that predictions from adjacent time steps are similar. This is simple, but effective and -- to the best of my knowledge -- novel....
Recommendation: 5: marginally below the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The paper introduces several consistency losses that help improve the performance of behavior prediction models. * The main innovation is the temporal consistency constraint, which enforces that predictions from adjacent time steps are similar. This is simple, but effective and -- to the best of my knowledge -...
This paper presents a new idea on hyperparameter optimization (HPO) by formulating it as a weighted learning to rank problem. By using a novel loss function, coupled with existing work on neural ensembles and transfer learning, the proposed method is shown to achieve state-of-the-art results in HPO. Strength: - The ide...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: This paper presents a new idea on hyperparameter optimization (HPO) by formulating it as a weighted learning to rank problem. By using a novel loss function, coupled with existing work on neural ensembles and transfer learning, the proposed method is shown to achieve state-of-the-art results in HPO. Strength: -...
The paper learns a discrete abstraction of the state-action space of the MDP underlying an RL setup. This abstraction has smaller latent space and the distilled RL policy is more tractable for formal verification approaches such as model checking of bisimulation guarantees. The paper uses Waserstien autoencoders to ove...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The paper learns a discrete abstraction of the state-action space of the MDP underlying an RL setup. This abstraction has smaller latent space and the distilled RL policy is more tractable for formal verification approaches such as model checking of bisimulation guarantees. The paper uses Waserstien autoencoder...
In this work authors discovered specific transformer circuits for a natural language task called the indirect object identification, This task requires the LM to identify the indirect object and needs simple logical reasoning. The significance of this paper is that authors identified a large circuit in GPT-2 small that...
Recommendation: 8: accept, good paper
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: In this work authors discovered specific transformer circuits for a natural language task called the indirect object identification, This task requires the LM to identify the indirect object and needs simple logical reasoning. The significance of this paper is that authors identified a large circuit in GPT-2 sm...
This work associates the notion of linear mode connectivity of two models with the functional similarity (mechanistic similarity) of the two models. They argue that the linear mode connectivity of the two models indicates they both have inherited potentially spurious/undesirable representations. Furthermore, they argue...
Recommendation: 6: marginally above the acceptance threshold
Area: General Machine Learning
Review: This work associates the notion of linear mode connectivity of two models with the functional similarity (mechanistic similarity) of the two models. They argue that the linear mode connectivity of the two models indicates they both have inherited potentially spurious/undesirable representations. Furthermore, th...
This paper proposes a new backdoor attack. Under the proposed threat model, the attacker aims to use semantically similar images to the target class to activate the backdoor. For instance, green cars can be used as semantically similar images to frogs in CIFAR-10. As such, one may re-label those green car images into f...
Recommendation: 3: reject, not good enough
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper proposes a new backdoor attack. Under the proposed threat model, the attacker aims to use semantically similar images to the target class to activate the backdoor. For instance, green cars can be used as semantically similar images to frogs in CIFAR-10. As such, one may re-label those green car image...
This work proposes a medical image difference VQA problem and constructs a MIMIC-Diff-VQA dataset from the existing MIMIC-CXR dataset. To perform the task, this work proposes a knowledge-aware graph and a multi-relationship graph, where the former takes each anatomical structure as a node in the graph and compares the ...
Recommendation: 5: marginally below the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This work proposes a medical image difference VQA problem and constructs a MIMIC-Diff-VQA dataset from the existing MIMIC-CXR dataset. To perform the task, this work proposes a knowledge-aware graph and a multi-relationship graph, where the former takes each anatomical structure as a node in the graph and compa...
The paper proposes a new algorithm DFedSAM within the decentralized federated learning framework, where communications between servers are only performed within local neighborhood. To tackle the sharper landscape generated by the decentralization, the algorithm adapts a sharpness aware minimization strategy (SAM) by ad...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: The paper proposes a new algorithm DFedSAM within the decentralized federated learning framework, where communications between servers are only performed within local neighborhood. To tackle the sharper landscape generated by the decentralization, the algorithm adapts a sharpness aware minimization strategy (SA...
The paper proposes ‘binary labels’, where each dimension of the embedding space is assigned a 0 or 1 for each class, which is decided randomly at label construction time, before the start of training). Intuitively, at each embedding dimension, this leads to a grouping of classes (those that have a 0 in that dimension, ...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: The paper proposes ‘binary labels’, where each dimension of the embedding space is assigned a 0 or 1 for each class, which is decided randomly at label construction time, before the start of training). Intuitively, at each embedding dimension, this leads to a grouping of classes (those that have a 0 in that dim...
The paper presents a model for generating molecules (represented as a 3D structure) that bind to a specific protein site (also represented in 3D). The authors propose a fragment-by-fragment sequential approach, which is summarized in the following steps: - substructure (or motif) vocabulary creation - context encodin...
Recommendation: 8: accept, good paper
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: The paper presents a model for generating molecules (represented as a 3D structure) that bind to a specific protein site (also represented in 3D). The authors propose a fragment-by-fragment sequential approach, which is summarized in the following steps: - substructure (or motif) vocabulary creation - context...
This paper introduces a hypernetwork that generates the adapted weights for each task and runs the experiment on a adapted dataset called “meta VQA” for testing zero-shot and few-shot performance. The results suggest that the added benefit of the proposed module is tiny. Strengths: - The authors made a huge effort desi...
Recommendation: 3: reject, not good enough
Area: Generative models
Review: This paper introduces a hypernetwork that generates the adapted weights for each task and runs the experiment on a adapted dataset called “meta VQA” for testing zero-shot and few-shot performance. The results suggest that the added benefit of the proposed module is tiny. Strengths: - The authors made a huge eff...
This paper presents a method to improve upon binary neural network for image restoration (IR). It shows that batch normalization can help to obtain a good accuracy performance when binarizing IR models. Based on this observation, the authors introduce a basic binary convolution unit that benefits from batch norm proper...
Recommendation: 8: accept, good paper
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper presents a method to improve upon binary neural network for image restoration (IR). It shows that batch normalization can help to obtain a good accuracy performance when binarizing IR models. Based on this observation, the authors introduce a basic binary convolution unit that benefits from batch nor...
The paper proposes a new compression-aware minimizer dubbed CrAM that modifies the optimization step in a principled way, which results in dense models trained via CrAM can be compressible post-training, in a single step, without significant accuracy loss. Experimental analysis on image classification and language mode...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: The paper proposes a new compression-aware minimizer dubbed CrAM that modifies the optimization step in a principled way, which results in dense models trained via CrAM can be compressible post-training, in a single step, without significant accuracy loss. Experimental analysis on image classification and langu...
With the increasing use of complex black-box Graph Neural Networks (GNNs) in high-stakes applications, it is critical to developing explanation algorithms to understand their decisions. To this end, several methods have been proposed to generate instance-level explanations for GNN predictors. However, most works focus ...
Recommendation: 8: accept, good paper
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: With the increasing use of complex black-box Graph Neural Networks (GNNs) in high-stakes applications, it is critical to developing explanation algorithms to understand their decisions. To this end, several methods have been proposed to generate instance-level explanations for GNN predictors. However, most work...
This paper proposed an entity-award article generation framework that incoperates image information. By using external tools such SpaCy and CLIP, this framework can extract named entity candidates to supervise text generation. This paper is well-written and easy to follow. The idea is simple but intuitive. Incorporatin...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper proposed an entity-award article generation framework that incoperates image information. By using external tools such SpaCy and CLIP, this framework can extract named entity candidates to supervise text generation. This paper is well-written and easy to follow. The idea is simple but intuitive. Inco...
The authors propose an Active Learning method for AL in a streaming context for an application of AL on edge (sensor) devices such as a fleet of cars or robots. Additionally, they define two contexts with different configurations of pool-based batching and streaming of data. Then, they introduce and evaluate variants o...
Recommendation: 5: marginally below the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The authors propose an Active Learning method for AL in a streaming context for an application of AL on edge (sensor) devices such as a fleet of cars or robots. Additionally, they define two contexts with different configurations of pool-based batching and streaming of data. Then, they introduce and evaluate va...
The authors focus on providing an approach to interpret distributions shifts. To this end, they build on Optimal Transport by considering a relaxation of the problem. They propose two general ways to approach interpretability of distribution shifts that trade off complexity for interpretability. Results on real-world d...
Recommendation: 5: marginally below the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The authors focus on providing an approach to interpret distributions shifts. To this end, they build on Optimal Transport by considering a relaxation of the problem. They propose two general ways to approach interpretability of distribution shifts that trade off complexity for interpretability. Results on real...
This paper introduces an equivariant neural network architecture based on partial differential operators (PDOs) in the layers. These operators are constrained to be translation and rotation equivariant. Relative to previous work, PDO-eConv (Shen et al, 2020) and Steerable PDO (Jenner & Weiler , 2021), this work adds ...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: This paper introduces an equivariant neural network architecture based on partial differential operators (PDOs) in the layers. These operators are constrained to be translation and rotation equivariant. Relative to previous work, PDO-eConv (Shen et al, 2020) and Steerable PDO (Jenner & Weiler , 2021), this wo...
In this paper, the authors showed that place cells emerge in the feedforward layer of the Transformer that uses 1) NMDA-$\alpha$ nonlinearity and 2) recurrent positional encoding when trained on the sensory observation prediction task. Moreover, they showed that bigger $\alpha$ in the nonlinearity is simultaneously cor...
Recommendation: 3: reject, not good enough
Area: Neuroscience and Cognitive Science (e.g., neural coding, brain-computer interfaces)
Review: In this paper, the authors showed that place cells emerge in the feedforward layer of the Transformer that uses 1) NMDA-$\alpha$ nonlinearity and 2) recurrent positional encoding when trained on the sensory observation prediction task. Moreover, they showed that bigger $\alpha$ in the nonlinearity is simultaneo...
This paper looks at the problem of reinforcement learning from offline data. They authors introduce PERVI, which uses "randomized value functions" to generate an approximate posterior distribution over value functions, and then acts pessimistically with respect to those estimates for safety. The authors support their n...
Recommendation: 8: accept, good paper
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper looks at the problem of reinforcement learning from offline data. They authors introduce PERVI, which uses "randomized value functions" to generate an approximate posterior distribution over value functions, and then acts pessimistically with respect to those estimates for safety. The authors support...
The authors propose a federated learning model for learning deep GNNs to solve node-level prediction tasks. Their idea is based on reconstructing the neighborhood information of nodes that accounts for neighborhood graph structure as well as their features in a principled manner. For aggregating neighborhood structure ...
Recommendation: 6: marginally above the acceptance threshold
Area: General Machine Learning
Review: The authors propose a federated learning model for learning deep GNNs to solve node-level prediction tasks. Their idea is based on reconstructing the neighborhood information of nodes that accounts for neighborhood graph structure as well as their features in a principled manner. For aggregating neighborhood st...
The paper studies class incremental learning and proposes several approaches based on Voronoi Diagrams called iVoro. In particular, the paper contributes four approaches: iVoro, iVoro-D, iVoro-AC/AI, and iVoro-L. The introduced approaches are validated on three datasets (CIFAR-100, Tiny ImageNet and ImageNet-Subset) re...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: The paper studies class incremental learning and proposes several approaches based on Voronoi Diagrams called iVoro. In particular, the paper contributes four approaches: iVoro, iVoro-D, iVoro-AC/AI, and iVoro-L. The introduced approaches are validated on three datasets (CIFAR-100, Tiny ImageNet and ImageNet-Su...
This paper shows that explicitly controlling the trade-off between complexity, informativeness, and game utility in the emergent communication setup allows agents to discover languages with better generalization to harder/OOD tasks and better alignment with natural language. In order to demonstrate that, the authors st...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: This paper shows that explicitly controlling the trade-off between complexity, informativeness, and game utility in the emergent communication setup allows agents to discover languages with better generalization to harder/OOD tasks and better alignment with natural language. In order to demonstrate that, the au...
The paper studies the problem of training a huge deep neural network on a cluster with low interconnect bandwidth, unstable network, and preemptible nodes. The paper first shows that the computation-to-communication ratio goes up with larger models, indicating that using low-bandwidth clusters to train a huge model-par...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: The paper studies the problem of training a huge deep neural network on a cluster with low interconnect bandwidth, unstable network, and preemptible nodes. The paper first shows that the computation-to-communication ratio goes up with larger models, indicating that using low-bandwidth clusters to train a huge m...
The paper tackles the problem of learning reusable option policies to achieve cross-task generalization using reinforcement learning. It describes a method for learning feature spaces that can be reused by an option-like policy for (1) determine the next action to take (2) whether it is executable and (3) whether it sh...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The paper tackles the problem of learning reusable option policies to achieve cross-task generalization using reinforcement learning. It describes a method for learning feature spaces that can be reused by an option-like policy for (1) determine the next action to take (2) whether it is executable and (3) wheth...
This paper makes two contributions: First, it presents a large-scale 2D fluid simulation dataset called EAGLE. The dataset consists of 2D scenes with (dynamically changing) rigid boundaries and Reynold-Averaged Navier-Stokes (RANS) fluids. Second, it proposes a neural network model (mesh transformer) for solving fluid ...
Recommendation: 5: marginally below the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: This paper makes two contributions: First, it presents a large-scale 2D fluid simulation dataset called EAGLE. The dataset consists of 2D scenes with (dynamically changing) rigid boundaries and Reynold-Averaged Navier-Stokes (RANS) fluids. Second, it proposes a neural network model (mesh transformer) for solvin...
The paper provides a convergence analysis of DP-SGD and proposes a certain value-clipping method as an alternative to gradient clipping of DP-SGD. The convergence analysis leads to the same or better asymptotics than state-of-the-art results with slightly weaker assumptions, and the value-clipping leads to faster compu...
Recommendation: 6: marginally above the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The paper provides a convergence analysis of DP-SGD and proposes a certain value-clipping method as an alternative to gradient clipping of DP-SGD. The convergence analysis leads to the same or better asymptotics than state-of-the-art results with slightly weaker assumptions, and the value-clipping leads to fast...
The proposed paper aims to introduce a framework for validating neural networks with synthetic data. Specifically, the discussed method proposes to train a generative model trained on the commonly used test data to generate a larger and more diverse synthetic dataset. The generated synthetic data is then used to more c...
Recommendation: 6: marginally above the acceptance threshold
Area: General Machine Learning
Review: The proposed paper aims to introduce a framework for validating neural networks with synthetic data. Specifically, the discussed method proposes to train a generative model trained on the commonly used test data to generate a larger and more diverse synthetic dataset. The generated synthetic data is then used t...
- The authors proposed an interpretable model that combines the additive and instance-wise feature selection approaches. - More specifically, the proposed methods jointly train three components (explainer, selector, and approximators) to identify important instance-wise features and provide corresponding explanations p...
Recommendation: 6: marginally above the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: - The authors proposed an interpretable model that combines the additive and instance-wise feature selection approaches. - More specifically, the proposed methods jointly train three components (explainer, selector, and approximators) to identify important instance-wise features and provide corresponding explan...
The paper studies the effect of freezing parameters after certain iterations of differentially private training, both theoretically and empirically. Theory shows the convergence could be improved under certain situations and experiments show freezing layers closer to input (bottom layers) after training for a while cou...
Recommendation: 6: marginally above the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The paper studies the effect of freezing parameters after certain iterations of differentially private training, both theoretically and empirically. Theory shows the convergence could be improved under certain situations and experiments show freezing layers closer to input (bottom layers) after training for a w...
This paper aims to learn general-purpose location embeddings which are useful for downstream geospatial prediction tasks. The idea is to learn this representation by binning geographic entity occurrence data from OpenStreetMap (OSM) and applying a convolutional autoencoder with a special custom decoder head. The binnin...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This paper aims to learn general-purpose location embeddings which are useful for downstream geospatial prediction tasks. The idea is to learn this representation by binning geographic entity occurrence data from OpenStreetMap (OSM) and applying a convolutional autoencoder with a special custom decoder head. Th...
This manuscript combines two reasonable augmentation strategies to improve topic classification and sentiment analysis. The first is replacement based augmentation and TMix style feature space augmentation. The findings suggest that using Part of speech (POS) to drive replacement augmentation matters, and its impact ...
Recommendation: 3: reject, not good enough
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This manuscript combines two reasonable augmentation strategies to improve topic classification and sentiment analysis. The first is replacement based augmentation and TMix style feature space augmentation. The findings suggest that using Part of speech (POS) to drive replacement augmentation matters, and its...
The paper aims to present a unifying account of different methods for domain-invariant (supervised) representation learning, that is, given data from multiple joint distributions over inputs X and labels Y, learning structure that is stable across them and discarding "spurious" parts that vary. Specifically, three fami...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: The paper aims to present a unifying account of different methods for domain-invariant (supervised) representation learning, that is, given data from multiple joint distributions over inputs X and labels Y, learning structure that is stable across them and discarding "spurious" parts that vary. Specifically, th...
The paper proposes a curriculum learning framework which generates training goals and demonstrates empirical sample efficiency compared to existing method, on a range of navigation and manipulation tasks. Strengths * The method is well-motivated to obtain three desired properties: temporal- and uncertainty-awareness, ...
Recommendation: 8: accept, good paper
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The paper proposes a curriculum learning framework which generates training goals and demonstrates empirical sample efficiency compared to existing method, on a range of navigation and manipulation tasks. Strengths * The method is well-motivated to obtain three desired properties: temporal- and uncertainty-awa...
In this paper the authors propose to use energy-based model to improve the performance of Class-incremental learning. They try to make their model to be bi-directional compatible, i.e. forward compatible, which aims to enable old modules to sensitively capture the input distribution shift and backward compatible, which...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: In this paper the authors propose to use energy-based model to improve the performance of Class-incremental learning. They try to make their model to be bi-directional compatible, i.e. forward compatible, which aims to enable old modules to sensitively capture the input distribution shift and backward compatibl...
By probing pre-trained language models with prompts, the paper presents a novel and practical framework for automatically constructing knowledge graphs. The framework's input consists of relation definitions and a small set of seed entity pairs. For each relation, the framework generates and then paraphrases prompts. T...
Recommendation: 5: marginally below the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: By probing pre-trained language models with prompts, the paper presents a novel and practical framework for automatically constructing knowledge graphs. The framework's input consists of relation definitions and a small set of seed entity pairs. For each relation, the framework generates and then paraphrases pr...
The paper questions the benefits of variational quantum circuits (VQC) for machine learning by demonstrating simple classical algorithms for approximating them. Specifically, VQC can be thought of as a multidimensional fourier series and so makes it a natural target for approximation via Random Fourier Features (RFF). ...
Recommendation: 8: accept, good paper
Area: General Machine Learning
Review: The paper questions the benefits of variational quantum circuits (VQC) for machine learning by demonstrating simple classical algorithms for approximating them. Specifically, VQC can be thought of as a multidimensional fourier series and so makes it a natural target for approximation via Random Fourier Features...
This work introduces a new conformal prediction-based approach for constructing calibrated predictive intervals. The improvements are from the reliability of KNN-based approximation and a novel Venn predictor. The proposed approach is evaluated on large scale sequence modeling tasks. 1. I am confused why the proposed m...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This work introduces a new conformal prediction-based approach for constructing calibrated predictive intervals. The improvements are from the reliability of KNN-based approximation and a novel Venn predictor. The proposed approach is evaluated on large scale sequence modeling tasks. 1. I am confused why the pr...
This paper constructs an efficient first-order method, named PPGD, that solves a nonconvex and nonsmooth problem, especially with a nonsmooth (separable) _piecewise convex_ regularization term, such as an indicator penalty, a capped-$\ell_1$ penalty and a leaky capped-$\ell_1$ penalty. One notable contribution is that ...
Recommendation: 3: reject, not good enough
Area: Optimization (eg, convex and non-convex optimization)
Review: This paper constructs an efficient first-order method, named PPGD, that solves a nonconvex and nonsmooth problem, especially with a nonsmooth (separable) _piecewise convex_ regularization term, such as an indicator penalty, a capped-$\ell_1$ penalty and a leaky capped-$\ell_1$ penalty. One notable contribution ...
This work developed light-weighted ts modeling, time-index meta learning scheme for time series forecasting. ## Strength - enhanced deep-time class of method via INR and - extensive multivariate real data experiments and ablation study ## Weakness - clearly define what class of non-stationrity thei work target. It...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This work developed light-weighted ts modeling, time-index meta learning scheme for time series forecasting. ## Strength - enhanced deep-time class of method via INR and - extensive multivariate real data experiments and ablation study ## Weakness - clearly define what class of non-stationrity thei work ta...
In this paper, authors develop a statistical framework for personalized federated learning, in which they study different choices of population distribution. They provide theoretical bounds and novel algorithms for private personalized estimation, design, and conduct privacy analysis of new private personalized learnin...
Recommendation: 6: marginally above the acceptance threshold
Area: General Machine Learning
Review: In this paper, authors develop a statistical framework for personalized federated learning, in which they study different choices of population distribution. They provide theoretical bounds and novel algorithms for private personalized estimation, design, and conduct privacy analysis of new private personalized...
This paper is about testing properties of stochastic block models. In particular, the framework presented in the paper is applicable to symmetric properties. A property is defined to be a set of assignments of the $n$ nodes into $K$ communities and it can be described by a subset of $[K]^n$. A symmetric property is a p...
Recommendation: 8: accept, good paper
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: This paper is about testing properties of stochastic block models. In particular, the framework presented in the paper is applicable to symmetric properties. A property is defined to be a set of assignments of the $n$ nodes into $K$ communities and it can be described by a subset of $[K]^n$. A symmetric propert...
This paper proposes a method to perform approximate Bayesian inference in function spaces with an emphasis on applications to Bayesian neural networks and gradient boosting. The proposed approach extends Stein variational gradient descent (Liu & Wang, 2016) to function spaces by applying it to minimise the KL divergenc...
Recommendation: 5: marginally below the acceptance threshold
Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes)
Review: This paper proposes a method to perform approximate Bayesian inference in function spaces with an emphasis on applications to Bayesian neural networks and gradient boosting. The proposed approach extends Stein variational gradient descent (Liu & Wang, 2016) to function spaces by applying it to minimise the KL d...
This paper proposes POEM, a generalization of prototypical networks designed to handle few-shot learning when each support or query example is only a partial view/observation of the underlying concept. The derivation follows from modeling the joint distribution of support representations as the product of conditionally...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposes POEM, a generalization of prototypical networks designed to handle few-shot learning when each support or query example is only a partial view/observation of the underlying concept. The derivation follows from modeling the joint distribution of support representations as the product of condi...
This paper extends contrastive learning to semi-supervised settings. To do so, it estimates pseudo-labels for the unlabeled data during the training process of contrastive learning and adds a supervised contrastive loss according to the labels of the labeled data as well as the pseudo-labels of the unlabelled data to t...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper extends contrastive learning to semi-supervised settings. To do so, it estimates pseudo-labels for the unlabeled data during the training process of contrastive learning and adds a supervised contrastive loss according to the labels of the labeled data as well as the pseudo-labels of the unlabelled d...
Detailed considerations: Main concern. How to access curvature without knowing the full graph? It is not clear how to compute the LINEAR SINKHORN ALGORITHM. Should we compute the Wasserstein distance between any node in the graphs as stated in Algorithm-1? Please clarify this: Please see "Sinkhorn Distances: Lights...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: Detailed considerations: Main concern. How to access curvature without knowing the full graph? It is not clear how to compute the LINEAR SINKHORN ALGORITHM. Should we compute the Wasserstein distance between any node in the graphs as stated in Algorithm-1? Please clarify this: Please see "Sinkhorn Distances...
The paper presents an approach to detoxifying and debiasing the outputs for language models at inference time with per-sample-based parameter-efficient fine-tuning. The paper takes two slightly different approaches to debiasing and detoxification but motivates them as being part of a unified Mutual Information Minimiza...
Recommendation: 5: marginally below the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The paper presents an approach to detoxifying and debiasing the outputs for language models at inference time with per-sample-based parameter-efficient fine-tuning. The paper takes two slightly different approaches to debiasing and detoxification but motivates them as being part of a unified Mutual Information ...
This paper proposes a self-training method based on graduated non-convexity in order to be robust to outliers with wrong pseudo labels and over-confident training samples. Intuitively the core idea of the method is to penalize these two kinds of samples by assigning low loss weights to them. Experimental results show t...
Recommendation: 6: marginally above the acceptance threshold
Area: Unsupervised and Self-supervised learning
Review: This paper proposes a self-training method based on graduated non-convexity in order to be robust to outliers with wrong pseudo labels and over-confident training samples. Intuitively the core idea of the method is to penalize these two kinds of samples by assigning low loss weights to them. Experimental result...
The submission proposes a new CTDE algorithm called UTS. UTS is designed to have two properties that the submission calls policy invariance and full representational capacity. The submission benchmarks UTS in matrix games, predator prey, and SMAC. ### Clarity I personally found the description of the problems that UTS...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The submission proposes a new CTDE algorithm called UTS. UTS is designed to have two properties that the submission calls policy invariance and full representational capacity. The submission benchmarks UTS in matrix games, predator prey, and SMAC. ### Clarity I personally found the description of the problems ...
This paper proposes an evaluation suite, which generates synthetic test set that helps to better evaluate the performance of supervised learning models for small subgroups (minority groups) and distributional shifts. Augmenting and creating synthetic data enable us to increase the number of data in small subgroups whic...
Recommendation: 6: marginally above the acceptance threshold
Area: General Machine Learning
Review: This paper proposes an evaluation suite, which generates synthetic test set that helps to better evaluate the performance of supervised learning models for small subgroups (minority groups) and distributional shifts. Augmenting and creating synthetic data enable us to increase the number of data in small subgro...
The authors propose a method for containing multiple distinct behaviours (or policies) in a single agent. To do this they store a dictionary of policies observed during training, where the key relates to returns observed during training (this is discretised to keep the buffer size reasonable). This is actually very s...
Recommendation: 5: marginally below the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The authors propose a method for containing multiple distinct behaviours (or policies) in a single agent. To do this they store a dictionary of policies observed during training, where the key relates to returns observed during training (this is discretised to keep the buffer size reasonable). This is actuall...
The results in this paper apply to the computation of optimal transport maps for the Wasserstein-2 distance in Euclidean space. Under weak assumptions, these maps are given by gradients of convex functions. Moreover, the convex function and its Fenchel-Légendre conjungation are a solution to the dual problem. The paper...
Recommendation: 6: marginally above the acceptance threshold
Area: Optimization (eg, convex and non-convex optimization)
Review: The results in this paper apply to the computation of optimal transport maps for the Wasserstein-2 distance in Euclidean space. Under weak assumptions, these maps are given by gradients of convex functions. Moreover, the convex function and its Fenchel-Légendre conjungation are a solution to the dual problem. T...