review
stringlengths
5
16.6k
score
stringclasses
5 values
area
stringclasses
12 values
text
stringlengths
31
5.65k
This paper proposed an unsupervised learning framework for denoising, without assuming noise priors. Three stages are designed, i.e., generating noise, psedo supervised learning and recorrupted2recorrupted. The results on synthetic Gaussian noise and real noise datasets show the proposed method is comparable with exist...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposed an unsupervised learning framework for denoising, without assuming noise priors. Three stages are designed, i.e., generating noise, psedo supervised learning and recorrupted2recorrupted. The results on synthetic Gaussian noise and real noise datasets show the proposed method is comparable wi...
Background: DP-SGD gives guarantees for the whole history of gradients. It very difficult to obtain guarantees that would hold only for the final model, so then it is natural to think, how could we use the history of gradients since due to post-processing that will not have any additional privacy cost. The paper propo...
Recommendation: 8: accept, good paper
Area: Optimization (eg, convex and non-convex optimization)
Review: Background: DP-SGD gives guarantees for the whole history of gradients. It very difficult to obtain guarantees that would hold only for the final model, so then it is natural to think, how could we use the history of gradients since due to post-processing that will not have any additional privacy cost. The pap...
This paper proposes a novel supervised learning model in the scenarios of crowdsourcing based on AUM, which is a confidence indicator for each task. The proposed method generalizes the existing AUM indicator to the crowdsourcing setting as WAUM (the Weighted Area Under the Margin), and the WAUM identifies harmful data ...
Recommendation: 5: marginally below the acceptance threshold
Area: General Machine Learning
Review: This paper proposes a novel supervised learning model in the scenarios of crowdsourcing based on AUM, which is a confidence indicator for each task. The proposed method generalizes the existing AUM indicator to the crowdsourcing setting as WAUM (the Weighted Area Under the Margin), and the WAUM identifies harmf...
The paper formulates a third-order accurate fast-marching style algorithm for finding geodesic distances on surfaces embedded in 3D. The local solver is a trained neural network which operates on the 3-ring of the point in question. The algorithm has quasilinear complexity ultimately. For training, a multi-resolution a...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: The paper formulates a third-order accurate fast-marching style algorithm for finding geodesic distances on surfaces embedded in 3D. The local solver is a trained neural network which operates on the 3-ring of the point in question. The algorithm has quasilinear complexity ultimately. For training, a multi-reso...
The paper studies the problem of solving the alleged inconsistencies between the policy evaluation and policy improvement steps of the “policy iteration” algorithm. The paper proposes a method called CASA as a solution which suggests some modifications on the gradient calculations of standard algorithms such as PPO. *S...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The paper studies the problem of solving the alleged inconsistencies between the policy evaluation and policy improvement steps of the “policy iteration” algorithm. The paper proposes a method called CASA as a solution which suggests some modifications on the gradient calculations of standard algorithms such as...
The authors propose a novel variational causal inference model for constructing the gene expression counts in cells after counterfactual perturbations that relies on information from two sources: individual features embedded in the outcome Y, and response distributions of similar individuals that did indeed receive the...
Recommendation: 6: marginally above the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: The authors propose a novel variational causal inference model for constructing the gene expression counts in cells after counterfactual perturbations that relies on information from two sources: individual features embedded in the outcome Y, and response distributions of similar individuals that did indeed rec...
This paper proposes a way to define a metric (called GFMMD) for non-negative graph signals in a way to account for geometric structure. It comes from by mimicing the so-called Integral Probability Metrics, particularly 1-Wasserstein distance for discrete distributions. GFMMD can be computed rapidly (relying on approxim...
Recommendation: 6: marginally above the acceptance threshold
Area: Unsupervised and Self-supervised learning
Review: This paper proposes a way to define a metric (called GFMMD) for non-negative graph signals in a way to account for geometric structure. It comes from by mimicing the so-called Integral Probability Metrics, particularly 1-Wasserstein distance for discrete distributions. GFMMD can be computed rapidly (relying on ...
This paper proposes RTC, an imitation learning approach for stochastic environments that aims to learn policies that avoid mode collapse and cover a wide range of behaviors shown in demonstrations. The paper argues that current methods relying on inferring agent types to explain multi-modal behaviors in stochastic envi...
Recommendation: 8: accept, good paper
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper proposes RTC, an imitation learning approach for stochastic environments that aims to learn policies that avoid mode collapse and cover a wide range of behaviors shown in demonstrations. The paper argues that current methods relying on inferring agent types to explain multi-modal behaviors in stochas...
This paper proposes OTGNet to tackle the problem of continual learning/class-incremental learning on graphs. OTGNet consists of two components. The first component is an open/close triad selection and replay method to avoid catastrophic forgetting of existing knowledge. The second component is an information bottleneck...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposes OTGNet to tackle the problem of continual learning/class-incremental learning on graphs. OTGNet consists of two components. The first component is an open/close triad selection and replay method to avoid catastrophic forgetting of existing knowledge. The second component is an information bo...
This paper studies an interesting layer-grafting technique to promote the combination of CL and MIM for representation learning. Specially, the authors find that directly combining such two paradigms shows the negative influence due to the gradient conflicts, and discovers that the sequential cascade in a certain order...
Recommendation: 8: accept, good paper
Area: Unsupervised and Self-supervised learning
Review: This paper studies an interesting layer-grafting technique to promote the combination of CL and MIM for representation learning. Specially, the authors find that directly combining such two paradigms shows the negative influence due to the gradient conflicts, and discovers that the sequential cascade in a certa...
This paper considers distributionally robust probabilistic supervised learning. The ambiguity set is constructed to include distributions that share the same marginal with the empirical distribution and are no more than ε away from the empirical in terms of first-order feature moment divergence. The strong duality is s...
Recommendation: 5: marginally below the acceptance threshold
Area: General Machine Learning
Review: This paper considers distributionally robust probabilistic supervised learning. The ambiguity set is constructed to include distributions that share the same marginal with the empirical distribution and are no more than ε away from the empirical in terms of first-order feature moment divergence. The strong dual...
This work proposes a new unrolled network architecture for inverse problems. It's main contribution is to replace the large feed-forward architecture (e.g., DnCNN) used in typical unrolled architectures with a small recurrent architecture, known as a Deep Equilibrium (DEQ) model. The DEQ model iterates until it converg...
Recommendation: 6: marginally above the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: This work proposes a new unrolled network architecture for inverse problems. It's main contribution is to replace the large feed-forward architecture (e.g., DnCNN) used in typical unrolled architectures with a small recurrent architecture, known as a Deep Equilibrium (DEQ) model. The DEQ model iterates until it...
This paper studies how fixed-length Transformer networks can approximate anisotropic Besov and mixed smooth Besov spaces. They show that the expected approximation error of fixed-length Transformer networks is mildly dependent on feature dimension $d$ and input length $l$, and is independent of $d$ and $l$ for anisotr...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper studies how fixed-length Transformer networks can approximate anisotropic Besov and mixed smooth Besov spaces. They show that the expected approximation error of fixed-length Transformer networks is mildly dependent on feature dimension $d$ and input length $l$, and is independent of $d$ and $l$ for...
This paper proposes a variational expectation maximization framework to jointly train the language model and the graph neural network for representation learning for text-attributed graphs. The approach is clearly motivated, mathematically principled, and empirically effective and efficient. I believe this paper makes ...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: This paper proposes a variational expectation maximization framework to jointly train the language model and the graph neural network for representation learning for text-attributed graphs. The approach is clearly motivated, mathematically principled, and empirically effective and efficient. I believe this pape...
This paper proposes a greedy-based approach for online feature selection. This paper defines greedy online feature selection and also provides an iterative procedure to implement the greedy approach with a deep learning approach. Strengths: + The problem is interesting and meaningful. Feature selection, especially o...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposes a greedy-based approach for online feature selection. This paper defines greedy online feature selection and also provides an iterative procedure to implement the greedy approach with a deep learning approach. Strengths: + The problem is interesting and meaningful. Feature selection, espe...
* The paper adds better inductive bias to Transformer attention by using a linear recurrence in the form of exponential moving average to contextualize the queries and keys. * The paper improves simple damped EMA into a multidimensional damped EMA turning it effectively in a simplified form of S4 where a diagonal bou...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: * The paper adds better inductive bias to Transformer attention by using a linear recurrence in the form of exponential moving average to contextualize the queries and keys. * The paper improves simple damped EMA into a multidimensional damped EMA turning it effectively in a simplified form of S4 where a diag...
This submission is considering if multiple federated learning tasks on a single device can be coordinated and consolidated to ease resource constrain and energy consumption. A multi-tenant FL system called MuFL is proposed that 1) Initially merges "similar" training activities into one activity with a multi-task archit...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This submission is considering if multiple federated learning tasks on a single device can be coordinated and consolidated to ease resource constrain and energy consumption. A multi-tenant FL system called MuFL is proposed that 1) Initially merges "similar" training activities into one activity with a multi-tas...
This paper provides a new regularization perspective on analyzing why the distribution RL methods perform better than the expectation-based RL methods empirically. By leveraging the decomposition assumption of the action-value distributions, this paper proposes to express the objective function of NeuralFZI as the expe...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper provides a new regularization perspective on analyzing why the distribution RL methods perform better than the expectation-based RL methods empirically. By leveraging the decomposition assumption of the action-value distributions, this paper proposes to express the objective function of NeuralFZI as ...
In this paper, the authors propose an accelerated first-order method for the optimization of the Hadamard manifold. They theoretically show that the proposed algorithm enjoys the same convergence rate as Nesterov's accelerated gradient descent method in Euclidian space, under the assumption that the objective function ...
Recommendation: 5: marginally below the acceptance threshold
Area: Optimization (eg, convex and non-convex optimization)
Review: In this paper, the authors propose an accelerated first-order method for the optimization of the Hadamard manifold. They theoretically show that the proposed algorithm enjoys the same convergence rate as Nesterov's accelerated gradient descent method in Euclidian space, under the assumption that the objective f...
This paper proposes a solution to “embodied reference understanding”, which aims to locate so-called “referents” which are objects referred to by text and gestures. The core observation of this work is that referents do not lie on the elbow-wrist line but rather on the eye-wrist line, which they call the “virtual touch...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper proposes a solution to “embodied reference understanding”, which aims to locate so-called “referents” which are objects referred to by text and gestures. The core observation of this work is that referents do not lie on the elbow-wrist line but rather on the eye-wrist line, which they call the “virtu...
This paper analyses representations learned by neural network. The analysis is done via isometric mapping of the probabilistic model into a lower dimensional maniforld such that it preserves the pairwise distance between models. They propose a distance metric to compare different learning trajectories. They also use I...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper analyses representations learned by neural network. The analysis is done via isometric mapping of the probabilistic model into a lower dimensional maniforld such that it preserves the pairwise distance between models. They propose a distance metric to compare different learning trajectories. They al...
In (Safran et al. 2019), the authors describe a function which is $ReLU(1-\lVert x\rVert)$, which can be well approximated by a depth 3-network, while a depth 2-network requires $\Omega(\exp(d\log d))$ width for the same. In this paper the authors show that, this separation is also, algorithmic, in the sense that one c...
Recommendation: 6: marginally above the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: In (Safran et al. 2019), the authors describe a function which is $ReLU(1-\lVert x\rVert)$, which can be well approximated by a depth 3-network, while a depth 2-network requires $\Omega(\exp(d\log d))$ width for the same. In this paper the authors show that, this separation is also, algorithmic, in the sense th...
The paper hypothesise that function sharing is one of the reasons why deep learning models can’t perform systematic generalization. The paper demonstrate that as the degree of parameter sharing increases, the systematic generalization drops. From the practical stand point, the papers argues for sparsity in models that ...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: The paper hypothesise that function sharing is one of the reasons why deep learning models can’t perform systematic generalization. The paper demonstrate that as the degree of parameter sharing increases, the systematic generalization drops. From the practical stand point, the papers argues for sparsity in mode...
In this work, the authors propose a new method for federated semi-supervised learning relying on a coarse grained regulator and fine grained regulator. This work handles scenarios where the labeled data and unlabeled data share different distribution. Empirical results show that the proposed method is able to outperfor...
Recommendation: 6: marginally above the acceptance threshold
Area: Unsupervised and Self-supervised learning
Review: In this work, the authors propose a new method for federated semi-supervised learning relying on a coarse grained regulator and fine grained regulator. This work handles scenarios where the labeled data and unlabeled data share different distribution. Empirical results show that the proposed method is able to o...
This paper puts forth a fully-cooperative multi-agent/task algorithm, MATTAR, that can be used to transfer knowledge learned from source tasks to improve learning unseen tasks at test time. MATTAR learns a high-level mapping from task representations to state, observation, and reward function parameters and combines th...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper puts forth a fully-cooperative multi-agent/task algorithm, MATTAR, that can be used to transfer knowledge learned from source tasks to improve learning unseen tasks at test time. MATTAR learns a high-level mapping from task representations to state, observation, and reward function parameters and com...
This paper considers the problem of OOD generalization in L2O, i.e. meta-learning an optimizer that is effective on objectives not seen during training. It proposes an algorithm based on MAML (Finn et al. 2017) and analyzes its generalization ability, measured by the loss at testing time. Unsurprisingly, generalization...
Recommendation: 5: marginally below the acceptance threshold
Area: General Machine Learning
Review: This paper considers the problem of OOD generalization in L2O, i.e. meta-learning an optimizer that is effective on objectives not seen during training. It proposes an algorithm based on MAML (Finn et al. 2017) and analyzes its generalization ability, measured by the loss at testing time. Unsurprisingly, genera...
This paper studies Federated Long-tailed Data, which is a highly challenging task. To address this task, this paper proposes to use a privacy-preserving proxy to guide model training and develops a label-distribution-agnostic ensemble learning framework. Both theoretical analysis and empirical verification are provided...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper studies Federated Long-tailed Data, which is a highly challenging task. To address this task, this paper proposes to use a privacy-preserving proxy to guide model training and develops a label-distribution-agnostic ensemble learning framework. Both theoretical analysis and empirical verification are ...
This paper focuses on the edge noisy scenario in the link prediction task and proposes a method named Robust Graph Information Bottleneck. The self-supervised learning technique and data reparametrization mechanism are utilized to instantiate RGIB. Strength: 1. The coupled edge noise in the link prediction task is a g...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper focuses on the edge noisy scenario in the link prediction task and proposes a method named Robust Graph Information Bottleneck. The self-supervised learning technique and data reparametrization mechanism are utilized to instantiate RGIB. Strength: 1. The coupled edge noise in the link prediction tas...
This work revisits the GRBM to improve its learning and sampling process. One key innovation is introducing Langevin sampling to GRBMs. Two variants are proposed: sampling the visible marginal potential, and hybrid Gibbs-Langevin sampling that trades off between Gibbs updates of hidden units and Langevin updates of vis...
Recommendation: 3: reject, not good enough
Area: Generative models
Review: This work revisits the GRBM to improve its learning and sampling process. One key innovation is introducing Langevin sampling to GRBMs. Two variants are proposed: sampling the visible marginal potential, and hybrid Gibbs-Langevin sampling that trades off between Gibbs updates of hidden units and Langevin update...
The paper attempts to investigate the problem of why object detection models fail with adversarial attacks. The authors tried to look into the classification and localization branch independently to locate the issue. Also, different types of object detection networks were investigated for this issue. According to exper...
Recommendation: 1: strong reject
Area: Deep Learning and representational learning
Review: The paper attempts to investigate the problem of why object detection models fail with adversarial attacks. The authors tried to look into the classification and localization branch independently to locate the issue. Also, different types of object detection networks were investigated for this issue. According ...
Authors propose a method for learning with high label noise that is based on learning a predictor and a selector function. They introduce a loss function that weights the abstained points by the predictor’s correctness. They present a theoretical analysis in the noisy setting for picking the best selector function giv...
Recommendation: 5: marginally below the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: Authors propose a method for learning with high label noise that is based on learning a predictor and a selector function. They introduce a loss function that weights the abstained points by the predictor’s correctness. They present a theoretical analysis in the noisy setting for picking the best selector func...
This paper extends MAE from single modality to audio and visual modalities by combining contrastive learning and masked prediction pretext tasks. Experiments show the improvements on VGGSound dataset and better retrieval score. Strength: With the advent of MAE and audioMAE, it is natural to extend such framework to m...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper extends MAE from single modality to audio and visual modalities by combining contrastive learning and masked prediction pretext tasks. Experiments show the improvements on VGGSound dataset and better retrieval score. Strength: With the advent of MAE and audioMAE, it is natural to extend such framew...
The paper proposes a solution for selecting models for time-series anomaly detection. Starting from the assumption that no single model performs best across all datasets, the paper argues for the importance of AutoML solutions in that area. As a result, the paper first studies surrogate measures that correlate with the...
Recommendation: 3: reject, not good enough
Area: General Machine Learning
Review: The paper proposes a solution for selecting models for time-series anomaly detection. Starting from the assumption that no single model performs best across all datasets, the paper argues for the importance of AutoML solutions in that area. As a result, the paper first studies surrogate measures that correlate ...
The authors present a method for learning a model that outputs probabilities wherein the output probability is the output of an optimization over an uncertainty set rather than, say the result of a softmax. They show how to learn a model using this approach and compare the method to simple alternatives on several datas...
Recommendation: 5: marginally below the acceptance threshold
Area: General Machine Learning
Review: The authors present a method for learning a model that outputs probabilities wherein the output probability is the output of an optimization over an uncertainty set rather than, say the result of a softmax. They show how to learn a model using this approach and compare the method to simple alternatives on sever...
The paper presents an overall pretraining approach for object detection with a fixed pretrained backbone. A transformer-based detector is used. The main contribution of the paper is the approach to selecting positive examples in a contrastive learning method. Strength: - The overall paper is well-written and defined. ...
Recommendation: 6: marginally above the acceptance threshold
Area: Unsupervised and Self-supervised learning
Review: The paper presents an overall pretraining approach for object detection with a fixed pretrained backbone. A transformer-based detector is used. The main contribution of the paper is the approach to selecting positive examples in a contrastive learning method. Strength: - The overall paper is well-written and d...
The paper proposes a general framework which unifies problem complexity measures with function approximation in the model-based and model-free lens for reinforcement learning. In particular, the authors propose Admissible Bellman Characterization (ABC) class that subsumes many prior models for problem complexity in th...
Recommendation: 8: accept, good paper
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: The paper proposes a general framework which unifies problem complexity measures with function approximation in the model-based and model-free lens for reinforcement learning. In particular, the authors propose Admissible Bellman Characterization (ABC) class that subsumes many prior models for problem complexi...
This paper introduces an approach to train a neural network for a multiclass image classification task. The main contribution is to add an auxiliary task, where Binary Labels are used as supervision. The Binary Labels can be carefully constructed or generated randomly based on the number of classes. The proposed approa...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This paper introduces an approach to train a neural network for a multiclass image classification task. The main contribution is to add an auxiliary task, where Binary Labels are used as supervision. The Binary Labels can be carefully constructed or generated randomly based on the number of classes. The propose...
The paper studies identifiability of label noise transition matrix T(X), which plays a crucial role in learning with noisy labels. Most of the works assume access to it or rely on some methods to estimate it. Understanding when such a noise matrix is identifiable is an important aspect of the problem. The paper conside...
Recommendation: 6: marginally above the acceptance threshold
Area: General Machine Learning
Review: The paper studies identifiability of label noise transition matrix T(X), which plays a crucial role in learning with noisy labels. Most of the works assume access to it or rely on some methods to estimate it. Understanding when such a noise matrix is identifiable is an important aspect of the problem. The paper...
The paper studies the problem of task continual learning wherein new tasks are continuously learned in an incremental fashion. Specifically, the paper aims to achieve two key objectives for a successful continual learning system: preventing catastrophic forgetting of the previous tasks and enabling knowledge transfer t...
Recommendation: 5: marginally below the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The paper studies the problem of task continual learning wherein new tasks are continuously learned in an incremental fashion. Specifically, the paper aims to achieve two key objectives for a successful continual learning system: preventing catastrophic forgetting of the previous tasks and enabling knowledge tr...
Through multiple iteration of rebuttal, the authors have provided empirical evidence to address my concern. I am willing to raise my score to 6, conditioned on polishing the method section. The following are my original review: This paper proposes to sample rows and columns of key and query matrices to approximate att...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: Through multiple iteration of rebuttal, the authors have provided empirical evidence to address my concern. I am willing to raise my score to 6, conditioned on polishing the method section. The following are my original review: This paper proposes to sample rows and columns of key and query matrices to approxi...
This paper proposes MARVEL, a method for parameter-efficient fine-tuning on big pre-trained language models. MARVEL is largely based on LoRA, a method that fine-tunes low-rank decomposition on parameter matrices. MARVEL uses SVD and dynamically allocate rank to each layer as resources, and it outperforms LoRA consisten...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: This paper proposes MARVEL, a method for parameter-efficient fine-tuning on big pre-trained language models. MARVEL is largely based on LoRA, a method that fine-tunes low-rank decomposition on parameter matrices. MARVEL uses SVD and dynamically allocate rank to each layer as resources, and it outperforms LoRA c...
This paper is interesting. It summarizes varios image processing tasks as image transformation trained on adversersial networks. Strength: 1. SOTAs on the KASIT-MPD dataset Weaknesses: 1. Only one dataset and infrared-rgb task is evaluated. This paper can be accepted if more experiments are evaluated.
Recommendation: 3: reject, not good enough
Area: General Machine Learning
Review: This paper is interesting. It summarizes varios image processing tasks as image transformation trained on adversersial networks. Strength: 1. SOTAs on the KASIT-MPD dataset Weaknesses: 1. Only one dataset and infrared-rgb task is evaluated. This paper can be accepted if more experiments are evaluated. Recommen...
This paper utilizes the scaling laws as the tool to try to show the gap between the infinite and empirical NTKs, and the neural networks. The author compares the scaling of real networks to the scaling of NTKs in 4 ways using some experiments. - Data scaling of initial kernel - Width scaling of initial kernel - Data ...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This paper utilizes the scaling laws as the tool to try to show the gap between the infinite and empirical NTKs, and the neural networks. The author compares the scaling of real networks to the scaling of NTKs in 4 ways using some experiments. - Data scaling of initial kernel - Width scaling of initial kernel...
Towards the ensemble-based KD, this paper first presents a label prior shift to induce evident diversity among the same teachers. Then the authors propose an aggregation strategy that uses post-compensation in specialist outputs and conventional model averaging. Experiments on several datasets validate its effectivenes...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: Towards the ensemble-based KD, this paper first presents a label prior shift to induce evident diversity among the same teachers. Then the authors propose an aggregation strategy that uses post-compensation in specialist outputs and conventional model averaging. Experiments on several datasets validate its effe...
This paper has three main contributions. Firstly, under quasar convexity (an assumption weaker than convexity that still guarantees local minima are global minima) and smoothness, authors develop an optimization algorithm using the continuized framework of Even et al 2021 and obtain optimal rates with high probability...
Recommendation: 8: accept, good paper
Area: Optimization (eg, convex and non-convex optimization)
Review: This paper has three main contributions. Firstly, under quasar convexity (an assumption weaker than convexity that still guarantees local minima are global minima) and smoothness, authors develop an optimization algorithm using the continuized framework of Even et al 2021 and obtain optimal rates with high pro...
The authors do research on pseudo-label training that is also known as knowledge distillation or teacher-student training, which transfers task knowledge learned from a larger model to a smaller model by letting the smaller model mimic the teacher's outputs rather the gold labels during the training. They study "model ...
Recommendation: 5: marginally below the acceptance threshold
Area: Generative models
Review: The authors do research on pseudo-label training that is also known as knowledge distillation or teacher-student training, which transfers task knowledge learned from a larger model to a smaller model by letting the smaller model mimic the teacher's outputs rather the gold labels during the training. They study...
This work outlines a model-based approach for off-policy evaluation. It revolves around learning (from a static, offline dataset) a recurrent variational latent model of the environment. They outline two "tricks" to improve the approach. One is termed "recurrent state alignment", an additional loss is used to encourage...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This work outlines a model-based approach for off-policy evaluation. It revolves around learning (from a static, offline dataset) a recurrent variational latent model of the environment. They outline two "tricks" to improve the approach. One is termed "recurrent state alignment", an additional loss is used to e...
This paper proposes CCVL (confidence conditioned value learning), an offline RL method that learns value functions parameterized by the "confidence level". The main algorithm is adapted from CQL and anti-exploration bonus, with explicit modifications (supported by theory) to guarantee that the learned Q-values are lowe...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper proposes CCVL (confidence conditioned value learning), an offline RL method that learns value functions parameterized by the "confidence level". The main algorithm is adapted from CQL and anti-exploration bonus, with explicit modifications (supported by theory) to guarantee that the learned Q-values ...
This paper presents an approach for extracting the blood volume pulse signal via photoplethysmography from a video. This use case of computer vision has several positive applications, that could help make scalable physiological sensing possible. The authors do a thorough job summarizing the existing literature, inclu...
Recommendation: 6: marginally above the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: This paper presents an approach for extracting the blood volume pulse signal via photoplethysmography from a video. This use case of computer vision has several positive applications, that could help make scalable physiological sensing possible. The authors do a thorough job summarizing the existing literatur...
This paper presents a method named DECAF for Question answering over knowledge bases. DECAF first retrieves relevant facts in KBs and then leverages multiple prompts to generate logical forms and direct answers using a Fushion-in-Decoder architecture. The final answer entity is produced by combining these two types of ...
Recommendation: 5: marginally below the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper presents a method named DECAF for Question answering over knowledge bases. DECAF first retrieves relevant facts in KBs and then leverages multiple prompts to generate logical forms and direct answers using a Fushion-in-Decoder architecture. The final answer entity is produced by combining these two t...
This work proposes a new method to improve the inference efficiency of a family of parameter-efficient fine-tuning methods. The authors propose to add input-dependent biases to the transformer's weight matrices (Q, K, V) instead of concatenating prefixes which results in decreasing the dimensions of matrices needed to ...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This work proposes a new method to improve the inference efficiency of a family of parameter-efficient fine-tuning methods. The authors propose to add input-dependent biases to the transformer's weight matrices (Q, K, V) instead of concatenating prefixes which results in decreasing the dimensions of matrices ne...
This paper proposes highway RL, which adaptively selects the policy and look-ahead steps for the Bellman operator. The proposed algorithm doesn't need off-policy corrections and hence doesn't suffer from the large variance. In addition, it can also achieve an improved convergence rate than the conventional one-step Bel...
Recommendation: 5: marginally below the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper proposes highway RL, which adaptively selects the policy and look-ahead steps for the Bellman operator. The proposed algorithm doesn't need off-policy corrections and hence doesn't suffer from the large variance. In addition, it can also achieve an improved convergence rate than the conventional one-...
This paper presents Edgeworth Accountant (EA), an analytical approach to account the privacy loss of differentially private algorithms of multiple iterations (composition). The authors show that EA is more computationally efficient than the Fast Fourier Transform approach and is more accurate than Renyi-DP accountant....
Recommendation: 5: marginally below the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper presents Edgeworth Accountant (EA), an analytical approach to account the privacy loss of differentially private algorithms of multiple iterations (composition). The authors show that EA is more computationally efficient than the Fast Fourier Transform approach and is more accurate than Renyi-DP acc...
This paper proposes to accelerate the training of GNNs. This is done by defining an MLP limited to just the node features with a matching parameter count/shapes, training that MLP, and then using the resulting weights to initialize the GNN. Surprisingly, this proves to be very effective, as the MLP weights are close to...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: This paper proposes to accelerate the training of GNNs. This is done by defining an MLP limited to just the node features with a matching parameter count/shapes, training that MLP, and then using the resulting weights to initialize the GNN. Surprisingly, this proves to be very effective, as the MLP weights are ...
The paper builds a NN to match (a) image reconstruction and (b) neural similarity of the inner layers of the CNN to neural representations (NR) in a mouse visual cortex. The loss function minimizes image error and NR error. The results assert that the NN does much better than a convolutional autoencoder (CAE) on imag...
Recommendation: 5: marginally below the acceptance threshold
Area: Neuroscience and Cognitive Science (e.g., neural coding, brain-computer interfaces)
Review: The paper builds a NN to match (a) image reconstruction and (b) neural similarity of the inner layers of the CNN to neural representations (NR) in a mouse visual cortex. The loss function minimizes image error and NR error. The results assert that the NN does much better than a convolutional autoencoder (CAE)...
This paper proposes the notion of disentangled equivariance for systems of interactive systems, as well as a framework that disentangles the effects of underlying global field from the local system dynamics that are equivariant to transformations in SE(3). They are also able to learn a neural field to predict underlyin...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposes the notion of disentangled equivariance for systems of interactive systems, as well as a framework that disentangles the effects of underlying global field from the local system dynamics that are equivariant to transformations in SE(3). They are also able to learn a neural field to predict u...
This paper study the collaborative MAB, where agents can communicate together to handle the same MAB problem. The authors propose a new notion of regret: the individual regret is the maximum regret over the players. This notion of regret is given in addition to the usual notion of regret. This regret could be related t...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper study the collaborative MAB, where agents can communicate together to handle the same MAB problem. The authors propose a new notion of regret: the individual regret is the maximum regret over the players. This notion of regret is given in addition to the usual notion of regret. This regret could be r...
The paper proposes to use context free grammars (CFGs) to represent hierarchical search spaces for neural architecture search, towards the goal of discovering new architectures, rather than refining existing ones (an example of designing Transformers over CNNs is given in the introduction). Architectures are represente...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: The paper proposes to use context free grammars (CFGs) to represent hierarchical search spaces for neural architecture search, towards the goal of discovering new architectures, rather than refining existing ones (an example of designing Transformers over CNNs is given in the introduction). Architectures are re...
The authors propose DocPrompting for the problem of generating code from natural language instructions. DocPrompting supplies the model with in-context documentation and uses retrieval to find relevant documentation for a given input. The authors experiment with using BM25 and training dense encoders for retrieving doc...
Recommendation: 8: accept, good paper
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The authors propose DocPrompting for the problem of generating code from natural language instructions. DocPrompting supplies the model with in-context documentation and uses retrieval to find relevant documentation for a given input. The authors experiment with using BM25 and training dense encoders for retrie...
This paper proposed an efficient model translation network (MTN) for text-image generation (T2I) by leveraging off-the-shelf pretrained language models with a pre-trained T2I diffusion model, such as T5 and XLM-R. The experiments demonstrate the superiority of this method. Strength: 1.Good performance. 2.This paper i...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposed an efficient model translation network (MTN) for text-image generation (T2I) by leveraging off-the-shelf pretrained language models with a pre-trained T2I diffusion model, such as T5 and XLM-R. The experiments demonstrate the superiority of this method. Strength: 1.Good performance. 2.This...
This paper investigates training an agent that's own learning algorithm attempts to "shape" how its' co-players learn. This shaping ideally should cause it so that the co-players' play an equilibrium that is favorable to the agent employing the shaping. This technique was previously studied in the Model-Free Opponent S...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper investigates training an agent that's own learning algorithm attempts to "shape" how its' co-players learn. This shaping ideally should cause it so that the co-players' play an equilibrium that is favorable to the agent employing the shaping. This technique was previously studied in the Model-Free Op...
This paper introduces a new parameter-efficient method for fine-tuning a transformer model, called AoT P-tuning. Experiments show that it performs at least as well as P-tuning v2 while being 1.3x faster. As P-tuning, AoT P-tuning enables efficient multi-task inference. This paper introduces a new variant of P-tuning an...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper introduces a new parameter-efficient method for fine-tuning a transformer model, called AoT P-tuning. Experiments show that it performs at least as well as P-tuning v2 while being 1.3x faster. As P-tuning, AoT P-tuning enables efficient multi-task inference. This paper introduces a new variant of P-t...
This paper proposes a method to produce watermarks on the content of generative models for the purpose of source tracking. The watermarks are added to the latent representations to produce outputs that are identifiable while preserving the quality of the distribution when compared to the original generative model. S...
Recommendation: 3: reject, not good enough
Area: Generative models
Review: This paper proposes a method to produce watermarks on the content of generative models for the purpose of source tracking. The watermarks are added to the latent representations to produce outputs that are identifiable while preserving the quality of the distribution when compared to the original generative mod...
This paper defines 4 different ways to fine-tune language models with intermediate reasoning steps for multi-step mathematical reasoning datasets. After being asked a question requiring multiple symbol manipulations, a model can: - Baseline: output the answer directly - A : output the chain of numerical expressions b...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper defines 4 different ways to fine-tune language models with intermediate reasoning steps for multi-step mathematical reasoning datasets. After being asked a question requiring multiple symbol manipulations, a model can: - Baseline: output the answer directly - A : output the chain of numerical expre...
This paper studies the geometric convergence of NPG and Q-NPG parametrized by log linear function. The authors assume that approximation of Q-functions by linear function, and approximation of policy with log-linear function has some error bound, and they show that employing NPG or Q-NPG with a geometrically increasing...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper studies the geometric convergence of NPG and Q-NPG parametrized by log linear function. The authors assume that approximation of Q-functions by linear function, and approximation of policy with log-linear function has some error bound, and they show that employing NPG or Q-NPG with a geometrically in...
The authors propose a simple but effective model, named PointDP, which leverages diffusion models to defend against 3D adversarial attacks. The experimental results show that PointDP achieves significantly better adversarial robustness than state-of-the-art methods. **Strengths** - The paper is clearly written. - The p...
Recommendation: 5: marginally below the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The authors propose a simple but effective model, named PointDP, which leverages diffusion models to defend against 3D adversarial attacks. The experimental results show that PointDP achieves significantly better adversarial robustness than state-of-the-art methods. **Strengths** - The paper is clearly written....
An important problem in RL is to compute a diverse set of strategies that optimize the (total) reward. One strategy is to simultaneously optimize over all strategies, as with population-based training (PBT), but this can be computationally challenging. An alternative is to use a greedy algorithm, as with iterative lear...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: An important problem in RL is to compute a diverse set of strategies that optimize the (total) reward. One strategy is to simultaneously optimize over all strategies, as with population-based training (PBT), but this can be computationally challenging. An alternative is to use a greedy algorithm, as with iterat...
This paper proposes the new task of part-level affordance discovery: it is a joint task of decomposing 3D shapes into their parts and predicting how each part corresponds to affordances. A learning framework has been proposed for this task. It learns to segment 3D shapes into parts from weak shape-level labels. It also...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: This paper proposes the new task of part-level affordance discovery: it is a joint task of decomposing 3D shapes into their parts and predicting how each part corresponds to affordances. A learning framework has been proposed for this task. It learns to segment 3D shapes into parts from weak shape-level labels....
This paper is about defining long-term fairness in dynamic settings and characterizing whether it can be achieved with myopic decisions. A specific dynamic model is proposed, where tiers (representing social status) are a root cause of labels (representing social outcomes), and which in turn can be affected by decision...
Recommendation: 5: marginally below the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper is about defining long-term fairness in dynamic settings and characterizing whether it can be achieved with myopic decisions. A specific dynamic model is proposed, where tiers (representing social status) are a root cause of labels (representing social outcomes), and which in turn can be affected by ...
This paper proposes an optimization algorithm for mixed-precision weight quantization. This algorithm decides the bit-width of each layer in forward order. The optimization target is the amount of quantization errors. Their method can make mixed-precision quantized networks (weight only) using various bit-widths with h...
Recommendation: 1: strong reject
Area: Deep Learning and representational learning
Review: This paper proposes an optimization algorithm for mixed-precision weight quantization. This algorithm decides the bit-width of each layer in forward order. The optimization target is the amount of quantization errors. Their method can make mixed-precision quantized networks (weight only) using various bit-width...
The paper showed that structures similar to self-attention are natural to learn many sequence-to-sequence problems from the perspective of symmetry. It studied the representations of sequence-to-sequence functions with certain symmetries, and showed that such functions have forms similar to the self-attention. Hence, s...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: The paper showed that structures similar to self-attention are natural to learn many sequence-to-sequence problems from the perspective of symmetry. It studied the representations of sequence-to-sequence functions with certain symmetries, and showed that such functions have forms similar to the self-attention. ...
This paper introduces a new domain generalization (DG) method by synthesizing the virtual target domain samples in Fourier domain and exploiting the maximum classifier discrepancy (MCD) principle in source domain and generated target domain. It also gives a modified MCD loss, which is suitable for DG task. The experime...
Recommendation: 6: marginally above the acceptance threshold
Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes)
Review: This paper introduces a new domain generalization (DG) method by synthesizing the virtual target domain samples in Fourier domain and exploiting the maximum classifier discrepancy (MCD) principle in source domain and generated target domain. It also gives a modified MCD loss, which is suitable for DG task. The ...
The paper identifies the distribution shift between the offline dataset and online rollouts as the core problem for offline meta-RL and adopts a Bayesian inference procedure to handle it. Strength - Empirical performance is strong compared to the baselines. - The proposed method is intuitive. Weakness - The authors in...
Recommendation: 5: marginally below the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The paper identifies the distribution shift between the offline dataset and online rollouts as the core problem for offline meta-RL and adopts a Bayesian inference procedure to handle it. Strength - Empirical performance is strong compared to the baselines. - The proposed method is intuitive. Weakness - The au...
The paper aims to accelerate training by pruning the calculated gradients. More specifically, the authors propose 1:2 and 2:4 minimum-variance unbiased estimators and show their effectiveness on a number of tasks, where accuracy is not severely affected by the proposed pruning scheme. The paper is well written and prop...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: The paper aims to accelerate training by pruning the calculated gradients. More specifically, the authors propose 1:2 and 2:4 minimum-variance unbiased estimators and show their effectiveness on a number of tasks, where accuracy is not severely affected by the proposed pruning scheme. The paper is well written ...
The paper presents a multi-resolution face recognition algorithm. It is based on a CNN encoder backbone (e.g. ResNet50), denoted trunk Net, and multiple lateral resolution-specific nets, denoted BTNets. Each BTNet receives as input an image with a specific resolution producing a representation of the same resolution. T...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: The paper presents a multi-resolution face recognition algorithm. It is based on a CNN encoder backbone (e.g. ResNet50), denoted trunk Net, and multiple lateral resolution-specific nets, denoted BTNets. Each BTNet receives as input an image with a specific resolution producing a representation of the same resol...
The authors introduce a new model-based meta-algorithm called E2D-TA under the framework of E2D(Forster et al.,2021), which updates the model estimator by Tempered Aggregation. Under this main algorithm, the authors further introduced two complexity parameters, EDEC and RFDEC, and correspondingly designed two algorithm...
Recommendation: 5: marginally below the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: The authors introduce a new model-based meta-algorithm called E2D-TA under the framework of E2D(Forster et al.,2021), which updates the model estimator by Tempered Aggregation. Under this main algorithm, the authors further introduced two complexity parameters, EDEC and RFDEC, and correspondingly designed two a...
This paper addresses the problem of safe reinforcement learning with hard constraints in an unknown stochastic environment. The key idea (and the contribution) is the proposed generative model based soft barrier functions that relax the hard safety constraints adapting to the unknown environment. This is further incorp...
Recommendation: 5: marginally below the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper addresses the problem of safe reinforcement learning with hard constraints in an unknown stochastic environment. The key idea (and the contribution) is the proposed generative model based soft barrier functions that relax the hard safety constraints adapting to the unknown environment. This is furthe...
This paper studies episodic learning algorithms for a variant of POMDP, called LMDP. In such a setting, there are M different MDPs and a new MDP (say m) is drawn at the beginning of each episode. The learner only observes m at the end of the episode and uses to learn. The authors derive both an upper bound and a lower ...
Recommendation: 3: reject, not good enough
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: This paper studies episodic learning algorithms for a variant of POMDP, called LMDP. In such a setting, there are M different MDPs and a new MDP (say m) is drawn at the beginning of each episode. The learner only observes m at the end of the episode and uses to learn. The authors derive both an upper bound and ...
The lexicon-weighting paradigm in large-scale retrieval has achieved certain results. However, the language modeling prefers certain or low-entropy words whereas the lexicon-weighting retrieval favors pivot or high-entropy words. In view of the above problems, a lexicon-bottlenecked masked autoencoder (LexMAE) is propo...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The lexicon-weighting paradigm in large-scale retrieval has achieved certain results. However, the language modeling prefers certain or low-entropy words whereas the lexicon-weighting retrieval favors pivot or high-entropy words. In view of the above problems, a lexicon-bottlenecked masked autoencoder (LexMAE) ...
This work explores the relationship among excess risk, widely used epistemic uncertainty and generalization error with convergence analysis in the setting of approximate Bayesian inference. Empirical evaluations on synthetic datasets are carried out to confirm the theoretical results. Further evaluations on UCI dataset...
Recommendation: 6: marginally above the acceptance threshold
Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes)
Review: This work explores the relationship among excess risk, widely used epistemic uncertainty and generalization error with convergence analysis in the setting of approximate Bayesian inference. Empirical evaluations on synthetic datasets are carried out to confirm the theoretical results. Further evaluations on UCI...
This paper proposes a new approach to exploration in RL for recommender systems. The authors propose using the concept of vacuity to model uncertainty about an item's rating, and include it as an exploration bonus into the reward function. Offline results through multiple datasets show that the proposed method, DERL, n...
Recommendation: 8: accept, good paper
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper proposes a new approach to exploration in RL for recommender systems. The authors propose using the concept of vacuity to model uncertainty about an item's rating, and include it as an exploration bonus into the reward function. Offline results through multiple datasets show that the proposed method,...
The paper proposes a new simulation environment (Powderworld) to facilitate the study of generalization across tasks which share rules. The environment is extensible and designed for speed and modern GPU hardware. Experiments demonstrate how Powderworld can be used to study generalization in world modeling and RL. Str...
Recommendation: 8: accept, good paper
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The paper proposes a new simulation environment (Powderworld) to facilitate the study of generalization across tasks which share rules. The environment is extensible and designed for speed and modern GPU hardware. Experiments demonstrate how Powderworld can be used to study generalization in world modeling and ...
The paper systematically studied the task of structured pruning of generative language models. It tests the performance of several different pruning methods on GPT-2 and GPT-Neo. The author also proposes two redundancy measures for each neuron in the MLP layer and shows that there is a strong correlation between these ...
Recommendation: 5: marginally below the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The paper systematically studied the task of structured pruning of generative language models. It tests the performance of several different pruning methods on GPT-2 and GPT-Neo. The author also proposes two redundancy measures for each neuron in the MLP layer and shows that there is a strong correlation betwee...
The paper presents a formal way to capture obfuscation of an image using adversarial representation. The paper does so by using a metric-based differential privacy notion. Since the metric is difficult to compute, the paper proposes a way to estimate Lipschitz constant using an estimation technique from DP. The paper t...
Recommendation: 3: reject, not good enough
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The paper presents a formal way to capture obfuscation of an image using adversarial representation. The paper does so by using a metric-based differential privacy notion. Since the metric is difficult to compute, the paper proposes a way to estimate Lipschitz constant using an estimation technique from DP. The...
This work proposes to view the task of steganography as a minimum entropy coupling problem. The authors show that (1) coupling algorithms yield steganography procedures with perfect security; (2) the approach induced by minimum entropy coupling maximizes information throughput; (3) apply the gained insights to steganog...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This work proposes to view the task of steganography as a minimum entropy coupling problem. The authors show that (1) coupling algorithms yield steganography procedures with perfect security; (2) the approach induced by minimum entropy coupling maximizes information throughput; (3) apply the gained insights to ...
The paper expands the Meta-Sequence-to-Sequence learning approach proposed by B. Lake in 2019, adapting it to be used with a modern transformer architecture and applying it to the gSCAN benchmark, utilizing the idea of random symbol/token permutation as a remedy against overfitting to specific sequences in the training...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The paper expands the Meta-Sequence-to-Sequence learning approach proposed by B. Lake in 2019, adapting it to be used with a modern transformer architecture and applying it to the gSCAN benchmark, utilizing the idea of random symbol/token permutation as a remedy against overfitting to specific sequences in the ...
The authors address the problem of an unreliable policy caused by using a Gaussian distribution to represent it in a continuous control setting. They create a new quasi-optimal learning algorithm that uses the q-Gaussian distribution and show that it has provable convergence in off-policy settings. They also analyze ot...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The authors address the problem of an unreliable policy caused by using a Gaussian distribution to represent it in a continuous control setting. They create a new quasi-optimal learning algorithm that uses the q-Gaussian distribution and show that it has provable convergence in off-policy settings. They also an...
This paper explores the new way to measure the distance between the teacher and student features, for better feature distillation (FD) performance. Specifically, the authors first point out the commonly used L2-norm feature distance is not good in semantic function, and then present a new FD method called function-cons...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper explores the new way to measure the distance between the teacher and student features, for better feature distillation (FD) performance. Specifically, the authors first point out the commonly used L2-norm feature distance is not good in semantic function, and then present a new FD method called funct...
This work proposes new methods for Simulation Based Inference. The goal is to perform Bayesian inference on model parameters given data for situations where the likelihood function is not known in closed form and can only be accessed through a simulation mechanism. The central challenge of SBI learning is "doubly intra...
Recommendation: 5: marginally below the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: This work proposes new methods for Simulation Based Inference. The goal is to perform Bayesian inference on model parameters given data for situations where the likelihood function is not known in closed form and can only be accessed through a simulation mechanism. The central challenge of SBI learning is "doub...
In this paper, the authors proposed an overall evaluation system to investigate the gap between humans and machines in dynamic vision tasks. In particular, they chose single object tracking as the representative task, and design an overall evaluation system from three aspects (Experimental environment construction, Exp...
Recommendation: 3: reject, not good enough
Area: Neuroscience and Cognitive Science (e.g., neural coding, brain-computer interfaces)
Review: In this paper, the authors proposed an overall evaluation system to investigate the gap between humans and machines in dynamic vision tasks. In particular, they chose single object tracking as the representative task, and design an overall evaluation system from three aspects (Experimental environment construct...
Authors discuss the evaluation of indirect bias/stereotypes in word embeddings and propose a methodology to mitigate them. They do this by modifying the relationships between words before the embeddings are learned. They compare their results with CDS method (Counterfactual Data Substitution) and find that their propos...
Recommendation: 5: marginally below the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: Authors discuss the evaluation of indirect bias/stereotypes in word embeddings and propose a methodology to mitigate them. They do this by modifying the relationships between words before the embeddings are learned. They compare their results with CDS method (Counterfactual Data Substitution) and find that thei...
The paper aims to formulate the low-density separation term in SSL as a log-likelihood term from a generation model of data curation. Based on which, a Bayesian modeling is possible, and some new insight on why SSL works for curated data set. Strength: The likelihood for curated/uncurated data set seems interesting, an...
Recommendation: 3: reject, not good enough
Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes)
Review: The paper aims to formulate the low-density separation term in SSL as a log-likelihood term from a generation model of data curation. Based on which, a Bayesian modeling is possible, and some new insight on why SSL works for curated data set. Strength: The likelihood for curated/uncurated data set seems interes...
Established in deep learning literature that Neural Network (NN) is related to Neural Kernels (NK), especially between the optimization dynamic of infinitely wide NN has shown to be mostly captured by the NTK at initialization. Motivated by the correspondence, this paper proposed to guide bandit policy with NK-GP (or N...
Recommendation: 5: marginally below the acceptance threshold
Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes)
Review: Established in deep learning literature that Neural Network (NN) is related to Neural Kernels (NK), especially between the optimization dynamic of infinitely wide NN has shown to be mostly captured by the NTK at initialization. Motivated by the correspondence, this paper proposed to guide bandit policy with NK-...
This paper proposes Image2Sphere a rotation distribution estimation method by mapping 2D image features to the 3D rotation manifold and applying SO(3) equivariant convolution on the 3D rotation manifold. This is done by first mapping the image features onto a sphere using orthographic projection, and then a learned fil...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: This paper proposes Image2Sphere a rotation distribution estimation method by mapping 2D image features to the 3D rotation manifold and applying SO(3) equivariant convolution on the 3D rotation manifold. This is done by first mapping the image features onto a sphere using orthographic projection, and then a lea...
The paper studies a new formulation of the LTH problem on graphs. Instead of searching for a sparse subnetwork with good performance, it poses the question of how to transform a randomly selected ticket into a lottery one. Although this problem has been studied before in DNNs, the paper proposes a solution for GNNs. Sp...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: The paper studies a new formulation of the LTH problem on graphs. Instead of searching for a sparse subnetwork with good performance, it poses the question of how to transform a randomly selected ticket into a lottery one. Although this problem has been studied before in DNNs, the paper proposes a solution for ...
This paper presents a new explanation device, i.e. LINEX, that requires only black-box access to the target model, motivated by Invariant Risk Minimization (IRM). To compute the feature attribution score locally at an input x, LINEX iterates over different environments until the overall approximation error is less than...
Recommendation: 5: marginally below the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper presents a new explanation device, i.e. LINEX, that requires only black-box access to the target model, motivated by Invariant Risk Minimization (IRM). To compute the feature attribution score locally at an input x, LINEX iterates over different environments until the overall approximation error is l...
This paper studies how the strength of inductive biases affect harmless interpolation or benign overfitting, where models can generalize well despite interpolating a (possibly noisy) test set. To study this question, the authors adjust the filter size in convolutional kernels. Smaller filter sizes encode for functions ...
Recommendation: 8: accept, good paper
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: This paper studies how the strength of inductive biases affect harmless interpolation or benign overfitting, where models can generalize well despite interpolating a (possibly noisy) test set. To study this question, the authors adjust the filter size in convolutional kernels. Smaller filter sizes encode for fu...
This paper presents GMM-based robot policy optimization formulated as a Wasserstein gradient flow, resulting in constraining policy updates for a stable optimization process. The proposed method is compared against two baselines PPO-based GMM update and SAC-GMM. The evaluations are performed in three tasks with a toy r...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper presents GMM-based robot policy optimization formulated as a Wasserstein gradient flow, resulting in constraining policy updates for a stable optimization process. The proposed method is compared against two baselines PPO-based GMM update and SAC-GMM. The evaluations are performed in three tasks with...
Takes the idea of polar codes (and polar coding) to develop an approximate nearest neighbour scheme with some efficiency. Investigates the application of that to search in three databases - all three containing SIFT visual descriptors but one containing text as well. The claims and results tend to show that the method ...
Recommendation: 8: accept, good paper
Area: General Machine Learning
Review: Takes the idea of polar codes (and polar coding) to develop an approximate nearest neighbour scheme with some efficiency. Investigates the application of that to search in three databases - all three containing SIFT visual descriptors but one containing text as well. The claims and results tend to show that the...
Consider the problem of finding the ground-state of the Hamiltonian $H = -\frac{1}{2} \nabla^2 + V$, i.e. its lowest eigenfunction $\psi$. This corresponds to minimising the loss function $\mathcal{L}(\theta) = \mathbb{E}_{|\psi|^2}\left[ E(x,\psi) \right]$ where $E(x, \psi) = \frac{H \psi(x)}{\psi(x)}$ and the wave-fu...
Recommendation: 8: accept, good paper
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: Consider the problem of finding the ground-state of the Hamiltonian $H = -\frac{1}{2} \nabla^2 + V$, i.e. its lowest eigenfunction $\psi$. This corresponds to minimising the loss function $\mathcal{L}(\theta) = \mathbb{E}_{|\psi|^2}\left[ E(x,\psi) \right]$ where $E(x, \psi) = \frac{H \psi(x)}{\psi(x)}$ and the...