review stringlengths 5 16.6k | score stringclasses 5
values | area stringclasses 12
values | text stringlengths 31 5.65k |
|---|---|---|---|
This work present NORM, a two-stage feature distillation method. It relies on a linear feature transform module that is inserted after the last convolutional layer of the student network to enable a many-to-one representation matching mechanism conditioned on a single teacher-student layer pair via feature expansion, ... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This work present NORM, a two-stage feature distillation method. It relies on a linear feature transform module that is inserted after the last convolutional layer of the student network to enable a many-to-one representation matching mechanism conditioned on a single teacher-student layer pair via feature exp... |
The paper studies the problem of representation learning of the analog circuit. It propose a two-level GNN model, in which the outer graph is composed with multiple non overlapping subgraphs. The representation can be used to perform different tasks. Then it also present a dataset called Open Circuit Benchmark which co... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
The paper studies the problem of representation learning of the analog circuit. It propose a two-level GNN model, in which the outer graph is composed with multiple non overlapping subgraphs. The representation can be used to perform different tasks. Then it also present a dataset called Open Circuit Benchmark ... |
This work proposes a new exploration objective in meta-reinforcement learning to discover clusters of related tasks. The claim is that tasks may be heterogeneous, where knowledge may only be transferable to other tasks within the same cluster, so exploring to identify these clusters could find the useful transferable i... | Recommendation: 5: marginally below the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This work proposes a new exploration objective in meta-reinforcement learning to discover clusters of related tasks. The claim is that tasks may be heterogeneous, where knowledge may only be transferable to other tasks within the same cluster, so exploring to identify these clusters could find the useful transf... |
Hi, I'm currently on a medical leave and won't be able to perform ICRL review duties. sorry for the late notice.
Hi, I'm currently on a medical leave and won't be able to perform ICRL review duties. sorry for the late notice.
Hi, I'm currently on a medical leave and won't be able to perform ICRL review duties. sorry fo... | Recommendation: 6: marginally above the acceptance threshold | Area: Generative models | Review:
Hi, I'm currently on a medical leave and won't be able to perform ICRL review duties. sorry for the late notice.
Hi, I'm currently on a medical leave and won't be able to perform ICRL review duties. sorry for the late notice.
Hi, I'm currently on a medical leave and won't be able to perform ICRL review duties. ... |
This paper propose a new model architecture and training method to classify digital pathology whole-slide images (WSI). These images are in the giga-pixel range and cannot be classified directly by a model. The paper proposes a multi-instance learning approach with contrastive self-supervised learning for patch level f... | Recommendation: 8: accept, good paper | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper propose a new model architecture and training method to classify digital pathology whole-slide images (WSI). These images are in the giga-pixel range and cannot be classified directly by a model. The paper proposes a multi-instance learning approach with contrastive self-supervised learning for patch... |
While previous work has established that adversarial robust models lead to perceptually-aligned gradients, this paper tries the answer if the reverse condition also holds that if a model has perceptually-aligned gradients, is it robust to adversarial examples? The answer given by this paper is yes. The crux of the appr... | Recommendation: 6: marginally above the acceptance threshold | Area: General Machine Learning | Review:
While previous work has established that adversarial robust models lead to perceptually-aligned gradients, this paper tries the answer if the reverse condition also holds that if a model has perceptually-aligned gradients, is it robust to adversarial examples? The answer given by this paper is yes. The crux of ... |
The paper presents an isometry aware training approach that improves robustness. The main intuition is that if the latent representations (pre final layer in this case), are (locally) Lipschitz, the network will be robust to adversarial perturbations. The algorithm enforces this Lipschitz constraint using a regularizer... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
The paper presents an isometry aware training approach that improves robustness. The main intuition is that if the latent representations (pre final layer in this case), are (locally) Lipschitz, the network will be robust to adversarial perturbations. The algorithm enforces this Lipschitz constraint using a reg... |
The paper explores intrinsic dimension estimation of the data using VAE. They found that this estimation can be made after a few steps of training and proposed a method FONDUE to provide a more principled method for selecting latent dimensions for the VAE.
Strength:
1. A thorough experiments across a lot of settings fo... | Recommendation: 5: marginally below the acceptance threshold | Area: Generative models | Review:
The paper explores intrinsic dimension estimation of the data using VAE. They found that this estimation can be made after a few steps of training and proposed a method FONDUE to provide a more principled method for selecting latent dimensions for the VAE.
Strength:
1. A thorough experiments across a lot of set... |
The paper presents an initialization strategy for Koopman operators and a loss regularization in terms of spectral information for Koopman autoencoders. For initialisations, the paper claims that approximated Koopman operators should be initialized such that their spectral norm should be less than 1. For regularization... | Recommendation: 5: marginally below the acceptance threshold | Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability ) | Review:
The paper presents an initialization strategy for Koopman operators and a loss regularization in terms of spectral information for Koopman autoencoders. For initialisations, the paper claims that approximated Koopman operators should be initialized such that their spectral norm should be less than 1. For regula... |
In this paper, the authors propose to extend the idea of interval bounds from the provably robust training literature to few-shot classification and introduce task-level interval bounds based regularization for the training of few-shot classification models (MAML + protonets).
To further improve the model robustness u... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
In this paper, the authors propose to extend the idea of interval bounds from the provably robust training literature to few-shot classification and introduce task-level interval bounds based regularization for the training of few-shot classification models (MAML + protonets).
To further improve the model robu... |
## The problem
The paper introduces an asynchronous aggregation scheme to address the straggler problem and also taking in the effect of non-iid. The paper focuses on "heavyweight" learning task such as video action recognition that are out of reach for mobile devices processing power. Overall, the paper aims to addre... | Recommendation: 5: marginally below the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
## The problem
The paper introduces an asynchronous aggregation scheme to address the straggler problem and also taking in the effect of non-iid. The paper focuses on "heavyweight" learning task such as video action recognition that are out of reach for mobile devices processing power. Overall, the paper aims ... |
This paper describes a tranformer-based architecture for policies for multi-agent (video) games, that tokenises image-based inputs plus entity-component-system-based inputs (representing data of entities in video games), allowing the architecture to process inputs from various different games in a single and consistent... | Recommendation: 6: marginally above the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper describes a tranformer-based architecture for policies for multi-agent (video) games, that tokenises image-based inputs plus entity-component-system-based inputs (representing data of entities in video games), allowing the architecture to process inputs from various different games in a single and co... |
This paper investigates learning a task representation space for use in unsupervised environment design (UED), with an algorithm called PAIRED. PAIRED trains an RL agent, the adversary, to configure the environment parameters throughout training, in tandem with two RL agents that learn to solve these configurations (ea... | Recommendation: 3: reject, not good enough | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper investigates learning a task representation space for use in unsupervised environment design (UED), with an algorithm called PAIRED. PAIRED trains an RL agent, the adversary, to configure the environment parameters throughout training, in tandem with two RL agents that learn to solve these configurat... |
This proposes to solve online combinatorial optimization problems using reinforcement learning composed of latent MDPs and curriculum learning. The paper presents formal formulations and theoretical results regarding the performance bound based on the relative condition number. In addition, the paper also presents theo... | Recommendation: 6: marginally above the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This proposes to solve online combinatorial optimization problems using reinforcement learning composed of latent MDPs and curriculum learning. The paper presents formal formulations and theoretical results regarding the performance bound based on the relative condition number. In addition, the paper also prese... |
This paper explores how CLIP can be used effectively for multi-source domain adaptation. In this problem setting there is a single labeled source domain dataset and multiple target domain datasets that are not labeled. Several methods have been proposed in past to address this problem, but they all have limited accurac... | Recommendation: 8: accept, good paper | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper explores how CLIP can be used effectively for multi-source domain adaptation. In this problem setting there is a single labeled source domain dataset and multiple target domain datasets that are not labeled. Several methods have been proposed in past to address this problem, but they all have limited... |
The submission explores information-theoretically motivated objectives for self-supervised learning (SSL).
The submission derives a bound on an objective to maximize the mutual information between neural network inputs and outputs using assumptions about Gaussianity of the input distribution and a spline framing of ne... | Recommendation: 5: marginally below the acceptance threshold | Area: Unsupervised and Self-supervised learning | Review:
The submission explores information-theoretically motivated objectives for self-supervised learning (SSL).
The submission derives a bound on an objective to maximize the mutual information between neural network inputs and outputs using assumptions about Gaussianity of the input distribution and a spline frami... |
This paper studies coresets for robust clustering. A coreset is a small proxy of the dataset, which is yet sufficient to perform the task at hand while not significantly compromising the quality of the solution. The goal of the robust clustering task is to cluster a set of data points that contains a number of adversar... | Recommendation: 8: accept, good paper | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
This paper studies coresets for robust clustering. A coreset is a small proxy of the dataset, which is yet sufficient to perform the task at hand while not significantly compromising the quality of the solution. The goal of the robust clustering task is to cluster a set of data points that contains a number of ... |
This paper identifies an issue they call "over-conservatism" with adversarial training methods, which causes more conservative behavior than is desirable. This is adressed by instead optimizing for a mixture of average case and worst case performance.
Strengths:
* The conservatism (If I've understood it) that they id... | Recommendation: 5: marginally below the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper identifies an issue they call "over-conservatism" with adversarial training methods, which causes more conservative behavior than is desirable. This is adressed by instead optimizing for a mixture of average case and worst case performance.
Strengths:
* The conservatism (If I've understood it) that... |
The paper considers training dynamics of simple neural networks on contrastive learning tasks, and studies the effect of non-linearities such as the ReLU on the resulting optima. In the setting considered, the authors find that linear activations lead to simple solutions involving leading eigenvectors of some fixed cov... | Recommendation: 8: accept, good paper | Area: Unsupervised and Self-supervised learning | Review:
The paper considers training dynamics of simple neural networks on contrastive learning tasks, and studies the effect of non-linearities such as the ReLU on the resulting optima. In the setting considered, the authors find that linear activations lead to simple solutions involving leading eigenvectors of some f... |
This paper considers statistical inference in linear Fisher markets. In their framework, a market formed by a finite number of items sampled from an underlying distribution is observed and their goal is to infer several important equilibrium quantities (individual utilities, pacing multipliers, and social welfare) of t... | Recommendation: 8: accept, good paper | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
This paper considers statistical inference in linear Fisher markets. In their framework, a market formed by a finite number of items sampled from an underlying distribution is observed and their goal is to infer several important equilibrium quantities (individual utilities, pacing multipliers, and social welfa... |
This paper presents a recurrent convolutional architecture (LocRNN) to improve extrapolation in visual tasks. The novelty of the architecture is presented as being long-range lateral connections between neurons from the same layer. The architecture is tested on two tasks: Mazes (route segmentation) and PathFinder (curv... | Recommendation: 6: marginally above the acceptance threshold | Area: Neuroscience and Cognitive Science (e.g., neural coding, brain-computer interfaces) | Review:
This paper presents a recurrent convolutional architecture (LocRNN) to improve extrapolation in visual tasks. The novelty of the architecture is presented as being long-range lateral connections between neurons from the same layer. The architecture is tested on two tasks: Mazes (route segmentation) and PathFind... |
- a benchmark for retrosynthesis is proposed
- a model for retrosynthesis is presented
- the authors claim state of the art
there are only limited novel contributions in this paper
### strengths
- clear description
- interesting memory model
### weaknesses:
- the paper has several incorrect definitions
- the paper ye... | Recommendation: 3: reject, not good enough | Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability ) | Review:
- a benchmark for retrosynthesis is proposed
- a model for retrosynthesis is presented
- the authors claim state of the art
there are only limited novel contributions in this paper
### strengths
- clear description
- interesting memory model
### weaknesses:
- the paper has several incorrect definitions
- the ... |
This paper describes a learning and inference algorithm for deep Gaussian processes based on operator variational inference (OVI).
Particularly, OVI (Ranganath et al., 2016, Hu et al. 2018, Grathwohl et al. 2020) generalizes Kernelized Stein Discrepancy (KSD) to situations where the RKHS space the smooth function (of... | Recommendation: 3: reject, not good enough | Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes) | Review:
This paper describes a learning and inference algorithm for deep Gaussian processes based on operator variational inference (OVI).
Particularly, OVI (Ranganath et al., 2016, Hu et al. 2018, Grathwohl et al. 2020) generalizes Kernelized Stein Discrepancy (KSD) to situations where the RKHS space the smooth func... |
This paper tackles the vertical Federated Learning (FL) scenario for graph-structured data. In particular, the authors first propose to update the node features calculated from every layer of Graph Neural Network (GNNs), distributed to multiple clients, simultaneously (i.e., at l-th layer, all clients share their node ... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper tackles the vertical Federated Learning (FL) scenario for graph-structured data. In particular, the authors first propose to update the node features calculated from every layer of Graph Neural Network (GNNs), distributed to multiple clients, simultaneously (i.e., at l-th layer, all clients share the... |
This is primarily a theoretical paper addressing the problem of solving differential equations with neural networks. Existing approaches do not provide any guarantees about their error relative to the true solution. Specifically, optimising the loss function doesn’t bound the error of the solution.
Section 2 of the pa... | Recommendation: 6: marginally above the acceptance threshold | Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability ) | Review:
This is primarily a theoretical paper addressing the problem of solving differential equations with neural networks. Existing approaches do not provide any guarantees about their error relative to the true solution. Specifically, optimising the loss function doesn’t bound the error of the solution.
Section 2 o... |
The paper studies offline RL problems with perturbed rewards. In particular, the Q function will be parametrized as the minimum of $M$ neural networks, trained on $M$ perturbed datasets. The benefit of the proposed algorithm, compared to the UCB-based method is reducing the time complexity of action selection. On a tec... | Recommendation: 6: marginally above the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
The paper studies offline RL problems with perturbed rewards. In particular, the Q function will be parametrized as the minimum of $M$ neural networks, trained on $M$ perturbed datasets. The benefit of the proposed algorithm, compared to the UCB-based method is reducing the time complexity of action selection. ... |
To address the problem of the anisotropy issue (i.e., hidden representations of transformer models are squeezed into a tiny cone), this paper proposes to use contrastive learning for language generation (henceforth, ContraGen). The model was evaluated on both text generation and code generation. It was also assessed on... | Recommendation: 3: reject, not good enough | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
To address the problem of the anisotropy issue (i.e., hidden representations of transformer models are squeezed into a tiny cone), this paper proposes to use contrastive learning for language generation (henceforth, ContraGen). The model was evaluated on both text generation and code generation. It was also ass... |
This paper refines the study of linear regions in neural networks by analyzing how each linear region can be decomposed into simplices. The authors argue through theoretical results and experiments that most linear regions can be decomposed into very few simplices; hence implying in yet another form that neural network... | Recommendation: 3: reject, not good enough | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
This paper refines the study of linear regions in neural networks by analyzing how each linear region can be decomposed into simplices. The authors argue through theoretical results and experiments that most linear regions can be decomposed into very few simplices; hence implying in yet another form that neural... |
This work considers the crowdsourcing problems where there exist ambiguous tasks. To address this problem, a new framework that used a similar technique in AUM method to identify ambiguous tasks has been proposed. To show the effectiveness of the proposed method, evaluations on both the synthetic datasets and the CIFAR... | Recommendation: 6: marginally above the acceptance threshold | Area: General Machine Learning | Review:
This work considers the crowdsourcing problems where there exist ambiguous tasks. To address this problem, a new framework that used a similar technique in AUM method to identify ambiguous tasks has been proposed. To show the effectiveness of the proposed method, evaluations on both the synthetic datasets and t... |
In this paper, the authors investigate whether or not pretrained language models like BERT have the ability to maintain previously learned knowledge in the long term. To do this, they track the encoding ability of BERT for specific tasks before, during, and after learning new tasks. They find that BERT can actually ref... | Recommendation: 8: accept, good paper | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
In this paper, the authors investigate whether or not pretrained language models like BERT have the ability to maintain previously learned knowledge in the long term. To do this, they track the encoding ability of BERT for specific tasks before, during, and after learning new tasks. They find that BERT can actu... |
The authors propose a method based on the Past Motion Dropout hyperparameter from ChaufferNet, the behavioral cloning approach to autonomous vehicle motion planning. With the same motivation as ChaufferNet authors, they suggest to set the dropout parameter to 100%, such that neural network policy does not have access t... | Recommendation: 5: marginally below the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
The authors propose a method based on the Past Motion Dropout hyperparameter from ChaufferNet, the behavioral cloning approach to autonomous vehicle motion planning. With the same motivation as ChaufferNet authors, they suggest to set the dropout parameter to 100%, such that neural network policy does not have ... |
This paper proposes a universal vision-language dense retrieval with two techniques, using modality-balanced hard negatives for optimization and bridging the modality gap by the image verbalization method. Experiments are conducted on the built open-domain dataset from WebQA and compared to existing models for single-... | Recommendation: 6: marginally above the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper proposes a universal vision-language dense retrieval with two techniques, using modality-balanced hard negatives for optimization and bridging the modality gap by the image verbalization method. Experiments are conducted on the built open-domain dataset from WebQA and compared to existing models for... |
This paper proposed `CrossFormer`, a Transformer based neural network for multivariate time series (MTS) forecasting. The author(s) claimed that cross-dimension dependency was not well utilized and developed a method to explicitly explore and utilize cross-dimension dependency for MTS forecasting. In order to achieve t... | Recommendation: 8: accept, good paper | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper proposed `CrossFormer`, a Transformer based neural network for multivariate time series (MTS) forecasting. The author(s) claimed that cross-dimension dependency was not well utilized and developed a method to explicitly explore and utilize cross-dimension dependency for MTS forecasting. In order to a... |
This manuscript proposes a binary classifier that determines if an environment is used in the training of an agent, by inspecting $n$ trajectories that are generated from that environment. The manuscript claims this to be an attack toward a value function of an RL agent. The manuscript subsequently proposes to perturb ... | Recommendation: 3: reject, not good enough | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
This manuscript proposes a binary classifier that determines if an environment is used in the training of an agent, by inspecting $n$ trajectories that are generated from that environment. The manuscript claims this to be an attack toward a value function of an RL agent. The manuscript subsequently proposes to ... |
This paper offers a straightforward extension of the exploration options framework (Bagot et al., 2020)—which was initially introduced as a prototype for tabular environments—to a deep-learning, function approximation setting. The method is empirically evaluated in the Atari Learning Environment, following a standardiz... | Recommendation: 3: reject, not good enough | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper offers a straightforward extension of the exploration options framework (Bagot et al., 2020)—which was initially introduced as a prototype for tabular environments—to a deep-learning, function approximation setting. The method is empirically evaluated in the Atari Learning Environment, following a st... |
This paper proposes Multi-Agent Joint-Predictive Representations (MAJOR), which applys the self-supervised learning (SSL) technique to MARL, trying to improve the learning efficiency. Specifically, MAJOR builds a transformer-based transition model, which takes all agents observations and actions as inputs and predicts ... | Recommendation: 5: marginally below the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper proposes Multi-Agent Joint-Predictive Representations (MAJOR), which applys the self-supervised learning (SSL) technique to MARL, trying to improve the learning efficiency. Specifically, MAJOR builds a transformer-based transition model, which takes all agents observations and actions as inputs and p... |
The paper studies communication in multiagent reinforcement learning that preserves privacy. It adopts the concept of differential privacy to approach the problem and proposes an algorithm that is able to protect individual agents' information privacy. The authors also use a stochastic message sender for each agent to ... | Recommendation: 5: marginally below the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
The paper studies communication in multiagent reinforcement learning that preserves privacy. It adopts the concept of differential privacy to approach the problem and proposes an algorithm that is able to protect individual agents' information privacy. The authors also use a stochastic message sender for each a... |
A major bottleneck in large-scale distributed deep learning is the communication bottleneck. The computational cost of the majority of existing compression algorithms to reduce the communication cost is too high. The authors proposed a new distributed optimization algorithm, Binary SGD-Momentum which 1- compresses the ... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
A major bottleneck in large-scale distributed deep learning is the communication bottleneck. The computational cost of the majority of existing compression algorithms to reduce the communication cost is too high. The authors proposed a new distributed optimization algorithm, Binary SGD-Momentum which 1- compres... |
This work tackles the challenges of lifelong reinforcement learning. In particular, authors propose an algorithm (UCBvld) for solving sequential contextual Markov decision processes with linear representation which (1) guarantees sublinear regret with (2) a sublinear number of planning calls, even when the sequence of ... | Recommendation: 6: marginally above the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This work tackles the challenges of lifelong reinforcement learning. In particular, authors propose an algorithm (UCBvld) for solving sequential contextual Markov decision processes with linear representation which (1) guarantees sublinear regret with (2) a sublinear number of planning calls, even when the sequ... |
This work cautions the application of CKA similarity measure in comparing neural representations in practice and points out a few issues including 1) its sensitivity to the family of the subset translations where certain transformations do not change the functional behaviors of the model; 2) its value can be directly m... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This work cautions the application of CKA similarity measure in comparing neural representations in practice and points out a few issues including 1) its sensitivity to the family of the subset translations where certain transformations do not change the functional behaviors of the model; 2) its value can be di... |
This paper proposes a new message passing method for GNN. It orders the message passing into the node representation with specific blocks of neurons targeted for message passing within specific hops. Extensive experiments show the effectiveness of the proposed method on homophily and heterophily data. It also alleviate... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper proposes a new message passing method for GNN. It orders the message passing into the node representation with specific blocks of neurons targeted for message passing within specific hops. Extensive experiments show the effectiveness of the proposed method on homophily and heterophily data. It also a... |
In this paper, the authors proposed a differentiable NAS approach that searches for efficient CNN models on GPUs. The key idea is similar to existing differentiable NAS methods: modeling NAS as a bi-level optimization problem where both weight and architectural parameters are updated during SuperNet training. The paper... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
In this paper, the authors proposed a differentiable NAS approach that searches for efficient CNN models on GPUs. The key idea is similar to existing differentiable NAS methods: modeling NAS as a bi-level optimization problem where both weight and architectural parameters are updated during SuperNet training. T... |
This paper proposes a certification defense against universal adversarial
examples and backdoor attacks. The proposed method is based on the combination
of linear relaxation-based perturbation analysis and Mixed Integer Linear
Programming. It also provides a theoretical framework for analyzing the
generalizability of t... | Recommendation: 5: marginally below the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
This paper proposes a certification defense against universal adversarial
examples and backdoor attacks. The proposed method is based on the combination
of linear relaxation-based perturbation analysis and Mixed Integer Linear
Programming. It also provides a theoretical framework for analyzing the
generalizabil... |
The paper presents a diffusion model approach for predicting molecular linkers between disconnected fragments. This is a two stage process: a model first predicts linker size, and then a diffusion model produces the linker results. Empirical results demonstrates the effectiveness of the proposed method compared with ba... | Recommendation: 8: accept, good paper | Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability ) | Review:
The paper presents a diffusion model approach for predicting molecular linkers between disconnected fragments. This is a two stage process: a model first predicts linker size, and then a diffusion model produces the linker results. Empirical results demonstrates the effectiveness of the proposed method compared... |
The paper proposes an advanced two-stage inference strategy to reduce resource usage and communication cost. The key idea is that 1) use different edge and cloud models, 2) jointly train the router module, and 3) control the cost during training, dependent on the target environment. As a result, the proposed method ach... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
The paper proposes an advanced two-stage inference strategy to reduce resource usage and communication cost. The key idea is that 1) use different edge and cloud models, 2) jointly train the router module, and 3) control the cost during training, dependent on the target environment. As a result, the proposed me... |
This paper provides an analytical framework to understand adversarial example problems in a more formal way. Several hypothesis classes are discussed, especially $L^2$ (square-integrable functions) and $A^2$ (Bergman space, a subspace of holomorphic square-integrable functions). For their framework, the authors extende... | Recommendation: 8: accept, good paper | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
This paper provides an analytical framework to understand adversarial example problems in a more formal way. Several hypothesis classes are discussed, especially $L^2$ (square-integrable functions) and $A^2$ (Bergman space, a subspace of holomorphic square-integrable functions). For their framework, the authors... |
The paper considers OOD generalization problem. In four benchmark datasets, authors observe that ERM may already learn sufficient features and then conclude that the current bottleneck is robust regression rather than feature learning. A method called domain-adjusted regression (DARE) is then proposed, which is easy to... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
The paper considers OOD generalization problem. In four benchmark datasets, authors observe that ERM may already learn sufficient features and then conclude that the current bottleneck is robust regression rather than feature learning. A method called domain-adjusted regression (DARE) is then proposed, which is... |
The paper proposes a simple scheme for machine unlearning: learning to minimizing DL divergence with original model on the retain set (can also minimize test error), while maximizing DL divergence with original model on the forget set. It is shown to be effective across many task setups versus many baselines.
The metho... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
The paper proposes a simple scheme for machine unlearning: learning to minimizing DL divergence with original model on the retain set (can also minimize test error), while maximizing DL divergence with original model on the forget set. It is shown to be effective across many task setups versus many baselines.
T... |
This paper proposes an explanation for when grokking happens---that it occurs when the initialization norm is too large so the model takes longer to get to the correct norm magnitude—and illustrates their thesis with results on synthetic and natural data. Defining grokking as a delay in generalization until after train... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
This paper proposes an explanation for when grokking happens---that it occurs when the initialization norm is too large so the model takes longer to get to the correct norm magnitude—and illustrates their thesis with results on synthetic and natural data. Defining grokking as a delay in generalization until aft... |
As I understand: For learning an agent across multiple RL tasks that can quickly adapt to new tasks, the authors combine several established paradigmas:
- decision transformers as the base archictecture for the learning agent, trained from offline RL data across tasks;
- adding additional "adaption" parameters (layer... | Recommendation: 6: marginally above the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
As I understand: For learning an agent across multiple RL tasks that can quickly adapt to new tasks, the authors combine several established paradigmas:
- decision transformers as the base archictecture for the learning agent, trained from offline RL data across tasks;
- adding additional "adaption" parameter... |
This paper proposes membership inference attacks in federated learning for overparameterized models. The main observation is that in later stages of training an overparameterized model, the gradients of different examples will become orthogonal and thus from the dot product between gradients, the attacker can infer the... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper proposes membership inference attacks in federated learning for overparameterized models. The main observation is that in later stages of training an overparameterized model, the gradients of different examples will become orthogonal and thus from the dot product between gradients, the attacker can i... |
This paper introduces a new self-supervised training method for tabular learning, which leads to good performance improvements in the empirical analysis.
Strength:
- This paper is well-written and easy to follow. One can understand the proposed method by simply looking at figure 1.
- The proposed method is simple... | Recommendation: 6: marginally above the acceptance threshold | Area: Unsupervised and Self-supervised learning | Review:
This paper introduces a new self-supervised training method for tabular learning, which leads to good performance improvements in the empirical analysis.
Strength:
- This paper is well-written and easy to follow. One can understand the proposed method by simply looking at figure 1.
- The proposed method i... |
This paper addresses issues of GNN sensitivity to graph structures. Specifically how noisy edges degrade performance which cannot be mitigated without complete removal. This paper proposed a novel layer Graph Learning Attention Mechanism (GLAM) which isolates structure learning from node embeddings. This technique does... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper addresses issues of GNN sensitivity to graph structures. Specifically how noisy edges degrade performance which cannot be mitigated without complete removal. This paper proposed a novel layer Graph Learning Attention Mechanism (GLAM) which isolates structure learning from node embeddings. This techni... |
The paper focuses on the situation where the training data are corrupted by noise, which often happens in practice, and evaluates to what extent these nuisances affect the uncertainty quantification based on the conformal prediction. The main conclusion is that one should not worry in practical cases.
The topic of the... | Recommendation: 6: marginally above the acceptance threshold | Area: General Machine Learning | Review:
The paper focuses on the situation where the training data are corrupted by noise, which often happens in practice, and evaluates to what extent these nuisances affect the uncertainty quantification based on the conformal prediction. The main conclusion is that one should not worry in practical cases.
The topi... |
In this work, the authors analyze the critical points of networks with a small number of neurons. They use a teacher-student setup where the student (initially) starts with a small number of neurons. The student network can then be grown one neuron at a time, and by careful selection of the weights in the larger networ... | Recommendation: 3: reject, not good enough | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
In this work, the authors analyze the critical points of networks with a small number of neurons. They use a teacher-student setup where the student (initially) starts with a small number of neurons. The student network can then be grown one neuron at a time, and by careful selection of the weights in the large... |
The paper proposes a new method for computation of the Gromov-Wasserstein distance over graphs. The GW distance is a measure distance between two distributions defined over different metric spaces. The authors give a list of existing algorithms for this problem which are either expensive computationally or do not have... | Recommendation: 8: accept, good paper | Area: Optimization (eg, convex and non-convex optimization) | Review:
The paper proposes a new method for computation of the Gromov-Wasserstein distance over graphs. The GW distance is a measure distance between two distributions defined over different metric spaces. The authors give a list of existing algorithms for this problem which are either expensive computationally or do ... |
The paper theoretically studies offline RL in the setting where the offline dataset is collected from multiple related but heterogeneous environments. The authors start by studying tabular setting. The paper presents the HetPEVI algorithm that combines the pessimistic value iteration (PEVI) algorithm with penalty terms... | Recommendation: 5: marginally below the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
The paper theoretically studies offline RL in the setting where the offline dataset is collected from multiple related but heterogeneous environments. The authors start by studying tabular setting. The paper presents the HetPEVI algorithm that combines the pessimistic value iteration (PEVI) algorithm with penal... |
This paper studies the PAC-Bayes generalization bound for both IID and OOD generalization on graphs, with a focus on homophilic graphs and graph size shifts. In particular, the authors reduce an exponential dependency on the node degree to a linear dependency for the IID generalization bound. Then they further apply th... | Recommendation: 3: reject, not good enough | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
This paper studies the PAC-Bayes generalization bound for both IID and OOD generalization on graphs, with a focus on homophilic graphs and graph size shifts. In particular, the authors reduce an exponential dependency on the node degree to a linear dependency for the IID generalization bound. Then they further ... |
This paper proposes a few tricks that can be added on top of ReLIC for self-supervised learning. First, saliency masking is used to explicitly reduce spurious correlations in the model. Second, augmentations of small sizes are used. This has the effect of occluding some regions of the image. Using these two tricks, the... | Recommendation: 6: marginally above the acceptance threshold | Area: Unsupervised and Self-supervised learning | Review:
This paper proposes a few tricks that can be added on top of ReLIC for self-supervised learning. First, saliency masking is used to explicitly reduce spurious correlations in the model. Second, augmentations of small sizes are used. This has the effect of occluding some regions of the image. Using these two tri... |
This work provides a thorough evaluation of various backbone pre-training methods such as SSL, with human datasets, and semi-supervised setting.
1. An in-depth investigation is presented in the paper to cover various pre-training methods.
2. A wide variety of base models have also been tested.
Weaknesses:
1. Altho... | Recommendation: 6: marginally above the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This work provides a thorough evaluation of various backbone pre-training methods such as SSL, with human datasets, and semi-supervised setting.
1. An in-depth investigation is presented in the paper to cover various pre-training methods.
2. A wide variety of base models have also been tested.
Weaknesses:
... |
This paper proposes to use self-distillation as a regularization method to improve transfer learning performance on image classification tasks. The paper first observes that further fine-tuning on a pre-trained model on unlabelled target dataset would result overfitting. And then it proposes the self-distillation metho... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper proposes to use self-distillation as a regularization method to improve transfer learning performance on image classification tasks. The paper first observes that further fine-tuning on a pre-trained model on unlabelled target dataset would result overfitting. And then it proposes the self-distillati... |
This paper exploit vector quantization and latent shifting to improve the performance of neural codec. For vector quantization, the author first explans why vector quantization is not often used in neural codec while being theoretically better than scalar quantization. The author then proposes proposed uniform vector q... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
This paper exploit vector quantization and latent shifting to improve the performance of neural codec. For vector quantization, the author first explans why vector quantization is not often used in neural codec while being theoretically better than scalar quantization. The author then proposes proposed uniform ... |
This work introduces a unifying framework to prove the strong lottery ticket hypothesis for general equivariant networks. Firstly, the authors prove that any fixed width and depth G-equivariant network that uses a point-wise ReLU activation function can be approximated with high probability to a pre-specified tolerance... | Recommendation: 6: marginally above the acceptance threshold | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
This work introduces a unifying framework to prove the strong lottery ticket hypothesis for general equivariant networks. Firstly, the authors prove that any fixed width and depth G-equivariant network that uses a point-wise ReLU activation function can be approximated with high probability to a pre-specified t... |
This paper presents two methods for two relevant tasks. One is an attack detection method inspired by guided backpropagation. The other is adversarial training using pre-training and adaptive ensemble techniques. The two methods are evaluated on CIFAR-10, CIFAR-100, and Tiny-Imagenet datasets. Experimental results demo... | Recommendation: 3: reject, not good enough | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
This paper presents two methods for two relevant tasks. One is an attack detection method inspired by guided backpropagation. The other is adversarial training using pre-training and adaptive ensemble techniques. The two methods are evaluated on CIFAR-10, CIFAR-100, and Tiny-Imagenet datasets. Experimental resu... |
The paper propose a novel way of doing prompt engineering in large language models.
The model scores a pool of instructions generated using small set of demonstrations by a large language model.
For each input output pair (x,y), the goal is to find an instruction z so that f(z,x)=y, where f is a large language model.
z... | Recommendation: 8: accept, good paper | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
The paper propose a novel way of doing prompt engineering in large language models.
The model scores a pool of instructions generated using small set of demonstrations by a large language model.
For each input output pair (x,y), the goal is to find an instruction z so that f(z,x)=y, where f is a large language ... |
This work proposes a new attack for categorical data by probabilistic distribution of non-adversarial samples, named Probabilistic Categorical Adversarial Attack (PCAA). Unlike conventionally expensive attack by greedy search, PCAA can convert the discrete optimization into continuous optimization and apply gradient ba... | Recommendation: 8: accept, good paper | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
This work proposes a new attack for categorical data by probabilistic distribution of non-adversarial samples, named Probabilistic Categorical Adversarial Attack (PCAA). Unlike conventionally expensive attack by greedy search, PCAA can convert the discrete optimization into continuous optimization and apply gra... |
In-context Learning (ICL) is one of the most prevailing paradigms for inference with large language models (LLM) without parameter update. However, as the sizes of context windows are limited for LLMs, only a small number of training examples can be used for prompting, preventing ICL from scaling to larger training set... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
In-context Learning (ICL) is one of the most prevailing paradigms for inference with large language models (LLM) without parameter update. However, as the sizes of context windows are limited for LLMs, only a small number of training examples can be used for prompting, preventing ICL from scaling to larger trai... |
This paper proposes an action representation learning method ( AD-VAE) to learn compact latent action spaces to discretize the action spaces for reinforcement learning training. Furthermore, the paper proposes a few techniques (latent action remapping, ensemble) to mitigate the instability of AD-VAE while training wit... | Recommendation: 5: marginally below the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper proposes an action representation learning method ( AD-VAE) to learn compact latent action spaces to discretize the action spaces for reinforcement learning training. Furthermore, the paper proposes a few techniques (latent action remapping, ensemble) to mitigate the instability of AD-VAE while trai... |
This paper investigates whether or not light-weight probings to the action between continuous states and reward can measure the pretrained encoder performance on RL tasks. To do this, they pretrained the encoders through self-supervised learning loss with a transition model implemented through recurrent module or recur... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper investigates whether or not light-weight probings to the action between continuous states and reward can measure the pretrained encoder performance on RL tasks. To do this, they pretrained the encoders through self-supervised learning loss with a transition model implemented through recurrent module ... |
A complexity measure called the local effective dimension is proposed for bounding the generalization error of a supervised learning model. Local effective dimension is related to the Fisher information matrix constrained to a particular region of parameter space, with that parameter region intended to capture the fact... | Recommendation: 3: reject, not good enough | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
A complexity measure called the local effective dimension is proposed for bounding the generalization error of a supervised learning model. Local effective dimension is related to the Fisher information matrix constrained to a particular region of parameter space, with that parameter region intended to capture ... |
This paper tackles the problem of quantifying and improving the robustness of representation models in a task-agnostic fashion. Being one of the first papers to approach the problem, the authors also motivate and provide a mathematical definition for unsupervised robustness. To evaluate the unsupervised robustness of t... | Recommendation: 6: marginally above the acceptance threshold | Area: Unsupervised and Self-supervised learning | Review:
This paper tackles the problem of quantifying and improving the robustness of representation models in a task-agnostic fashion. Being one of the first papers to approach the problem, the authors also motivate and provide a mathematical definition for unsupervised robustness. To evaluate the unsupervised robustn... |
This paper studies the problem of federated optimization. It shows a connection between FedAvg and Projection Onto Convex Sets algorithm (under overparametrized convex setting) and based on this proposes a method (FedExP) with adaptive server step-size strategy by using the gradient diversity measure. The authors perfo... | Recommendation: 8: accept, good paper | Area: Optimization (eg, convex and non-convex optimization) | Review:
This paper studies the problem of federated optimization. It shows a connection between FedAvg and Projection Onto Convex Sets algorithm (under overparametrized convex setting) and based on this proposes a method (FedExP) with adaptive server step-size strategy by using the gradient diversity measure. The autho... |
The paper introduces two methodological components: (1) BORT, a regularization for feed-forward neural networks term that encourages the various layers to implement a bounded orthogonal projection, (2) SAT, a saliency algorithm specifically designed for BORT-regularized networks. The empirical evaluation highlights ho... | Recommendation: 6: marginally above the acceptance threshold | Area: Optimization (eg, convex and non-convex optimization) | Review:
The paper introduces two methodological components: (1) BORT, a regularization for feed-forward neural networks term that encourages the various layers to implement a bounded orthogonal projection, (2) SAT, a saliency algorithm specifically designed for BORT-regularized networks. The empirical evaluation highl... |
The authors extend Lattimore 2016 to obtain a gap-dependent bound (not regret since they operate in the pure exploration setting) bandit for parallel bandit graph, and also extend it to arbitrary graphs, so long as there is an admissable set. For example, if there is a valid back-door adjustment for the actions.
They ... | Recommendation: 8: accept, good paper | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
The authors extend Lattimore 2016 to obtain a gap-dependent bound (not regret since they operate in the pure exploration setting) bandit for parallel bandit graph, and also extend it to arbitrary graphs, so long as there is an admissable set. For example, if there is a valid back-door adjustment for the actions... |
This paper introduces a 3D position embedding module to a state-of-the-art feature matcher, LoFTR.
Specifically, the authors develop a 3D position embedding generator that encodes 3D point clouds for each pixel instead of encoding 2D pixel coordinates.
The proposed 3D position embedding generator requires a known rel... | Recommendation: 3: reject, not good enough | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper introduces a 3D position embedding module to a state-of-the-art feature matcher, LoFTR.
Specifically, the authors develop a 3D position embedding generator that encodes 3D point clouds for each pixel instead of encoding 2D pixel coordinates.
The proposed 3D position embedding generator requires a k... |
This paper investigates the presence bias introduced by text summarization models. The authors propose to measure bias in two dimensions: content and structure. They define content bias as tendency to mention a specific group (e.g., gender, religion, etc) in a text, whereas structural bias refers to bias as a result of... | Recommendation: 3: reject, not good enough | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
This paper investigates the presence bias introduced by text summarization models. The authors propose to measure bias in two dimensions: content and structure. They define content bias as tendency to mention a specific group (e.g., gender, religion, etc) in a text, whereas structural bias refers to bias as a r... |
The paper discovers that there may exist heteroskedasticity in realistic offline RL datasets, making current offline RL methods with distributional constraints suffer from performance degeneration. To address the problem, the paper proposes a novel method ReDS to convert distributional constraints into support-based co... | Recommendation: 6: marginally above the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
The paper discovers that there may exist heteroskedasticity in realistic offline RL datasets, making current offline RL methods with distributional constraints suffer from performance degeneration. To address the problem, the paper proposes a novel method ReDS to convert distributional constraints into support-... |
This paper aims to provide a causal view of the domain invariant learning. To achieve this goal, the authors have analyzed three types of methods. For all these methods, the authors believe that the invariant parts are different. By taking from the causal view, the authors have presented detail analysis on how to build... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper aims to provide a causal view of the domain invariant learning. To achieve this goal, the authors have analyzed three types of methods. For all these methods, the authors believe that the invariant parts are different. By taking from the causal view, the authors have presented detail analysis on how ... |
The paper aims at deploying a deep learning approach in combination with partial differential equations (PDEs) with known yet incomplete physical information.
For example, a deep learning model can be employed when the information on the system to be solved is limited but additional data are available. A common benchm... | Recommendation: 8: accept, good paper | Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability ) | Review:
The paper aims at deploying a deep learning approach in combination with partial differential equations (PDEs) with known yet incomplete physical information.
For example, a deep learning model can be employed when the information on the system to be solved is limited but additional data are available. A commo... |
This paper proposes a population-based self-play RL approach (with PPO for training in the inner loop, and an evolutionary approach in the outer loop) that trains a population of agents for games that are high-skill but also diverse in terms of playing style. First, it summarises "playing style" as a single scalar, whi... | Recommendation: 6: marginally above the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper proposes a population-based self-play RL approach (with PPO for training in the inner loop, and an evolutionary approach in the outer loop) that trains a population of agents for games that are high-skill but also diverse in terms of playing style. First, it summarises "playing style" as a single sca... |
The paper introduces FiD-light, a more efficient variant of the fusion-in-decoder model that maintains/outperforms state-of-the-art performances on the KILT dataset, while drastically increasing the model's efficiency. To achieve this, FiD light compresses the length of input vectors and uses re-ranking to improve the ... | Recommendation: 6: marginally above the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
The paper introduces FiD-light, a more efficient variant of the fusion-in-decoder model that maintains/outperforms state-of-the-art performances on the KILT dataset, while drastically increasing the model's efficiency. To achieve this, FiD light compresses the length of input vectors and uses re-ranking to impr... |
This paper proposes new stochastic algorithms to solve both nonconvex and convex KL divergence constrained Distributionally Robust Optimization (DRO) problems. The proposed methods are dual-free, which means the per-iteration computational complexity is independent of sample size. By utilizing the recursive variance-re... | Recommendation: 3: reject, not good enough | Area: Optimization (eg, convex and non-convex optimization) | Review:
This paper proposes new stochastic algorithms to solve both nonconvex and convex KL divergence constrained Distributionally Robust Optimization (DRO) problems. The proposed methods are dual-free, which means the per-iteration computational complexity is independent of sample size. By utilizing the recursive var... |
In this work, the authors improve the time efficiency of EfficientZero by dividing various computational elements across asynchronous nodes. Concretely, by splitting compute tasks (i.e., PER refreshing, Reanalyze/Rollouts, Gradient calcs) across different nodes which communicate asynchronously, the authors are able to ... | Recommendation: 5: marginally below the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
In this work, the authors improve the time efficiency of EfficientZero by dividing various computational elements across asynchronous nodes. Concretely, by splitting compute tasks (i.e., PER refreshing, Reanalyze/Rollouts, Gradient calcs) across different nodes which communicate asynchronously, the authors are ... |
This paper proposes Graphair, a new framework for learning fair graph representations. Graphair consists of three major components: (1) automated graph augmentation, (2) adversarial training, (3) contrastive training. Experiments are conducted to show that the proposed framework achieves a better fairness-accuracy trad... | Recommendation: 8: accept, good paper | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
This paper proposes Graphair, a new framework for learning fair graph representations. Graphair consists of three major components: (1) automated graph augmentation, (2) adversarial training, (3) contrastive training. Experiments are conducted to show that the proposed framework achieves a better fairness-accur... |
This paper proposed to inject visual information into pre-trained language models without retrieved or generated images. Instead, it detects visually-hungry words and generates their visual representation by CLIP text encoder, and injects them back into a pre-trained language model. Experiments are done in various data... | Recommendation: 6: marginally above the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper proposed to inject visual information into pre-trained language models without retrieved or generated images. Instead, it detects visually-hungry words and generates their visual representation by CLIP text encoder, and injects them back into a pre-trained language model. Experiments are done in vari... |
This paper studied how to use CLIP model for zero-shot captioning, i.e., no human-annotated image-text pairs. Previous works use large language models or pretrain the encoder-decoder network, which may not generate task-specific descriptions or data/computation consuming. This paper proposed a visual-aware language dec... | Recommendation: 6: marginally above the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper studied how to use CLIP model for zero-shot captioning, i.e., no human-annotated image-text pairs. Previous works use large language models or pretrain the encoder-decoder network, which may not generate task-specific descriptions or data/computation consuming. This paper proposed a visual-aware lang... |
The paper considers several smooth relaxations of ReLU. The smoothness of these networks is controlled by a parameter called “temperature”. The authors theoretically analyze fully-connected networks with these activations and derive temperature-dependent critical initialization schemes. Namely, initializations such tha... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
The paper considers several smooth relaxations of ReLU. The smoothness of these networks is controlled by a parameter called “temperature”. The authors theoretically analyze fully-connected networks with these activations and derive temperature-dependent critical initialization schemes. Namely, initializations ... |
The paper introduces a new formulation of GNNs based on ODEs. The main goal of the method is to ensure stability and non-dissipation properties, thus allowing the model to preserve long-range dependencies with deep architectures that also avoid vanishing gradient problems. The paper provides theoretical arguments about... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
The paper introduces a new formulation of GNNs based on ODEs. The main goal of the method is to ensure stability and non-dissipation properties, thus allowing the model to preserve long-range dependencies with deep architectures that also avoid vanishing gradient problems. The paper provides theoretical argumen... |
The authors propose a method for image super-resolution that resembles an implicit function, but has strong inductive biases in the underlying architecture. To predict the super-resolved value for a particular coordinate, they interpolate a small 2D patch centered at that coordinate from the original image (reminiscent... | Recommendation: 6: marginally above the acceptance threshold | Area: Generative models | Review:
The authors propose a method for image super-resolution that resembles an implicit function, but has strong inductive biases in the underlying architecture. To predict the super-resolved value for a particular coordinate, they interpolate a small 2D patch centered at that coordinate from the original image (rem... |
This paper proposes LERP (Logical Entity RePresentation), a model that
uses logical rule learning, but which embeds information about the
objects represented by the logical variables in the form of a vector
of logical functions.
Pros:
+ It explores a new alternative to learn probabilistic logical rules
+ Paper is well ... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper proposes LERP (Logical Entity RePresentation), a model that
uses logical rule learning, but which embeds information about the
objects represented by the logical variables in the form of a vector
of logical functions.
Pros:
+ It explores a new alternative to learn probabilistic logical rules
+ Paper ... |
This paper introduces a method of learning, performing inference in, and simulating from graphical models (undirected, directed, or a combination) using neural networks. The authors claim that this greatly increases the flexibility while keeping computational complexity relatively low.
I have some expertise in graphi... | Recommendation: 3: reject, not good enough | Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes) | Review:
This paper introduces a method of learning, performing inference in, and simulating from graphical models (undirected, directed, or a combination) using neural networks. The authors claim that this greatly increases the flexibility while keeping computational complexity relatively low.
I have some expertise i... |
This work presents a biologically plausible model-based RL approach that uses dreaming and planning to to efficiently use the learnt world model. The model comprises two recurrent spiking network modules, (i) to compute the policy to behave in an environment, and (ii) to learn to predict the next state of the environme... | Recommendation: 6: marginally above the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This work presents a biologically plausible model-based RL approach that uses dreaming and planning to to efficiently use the learnt world model. The model comprises two recurrent spiking network modules, (i) to compute the policy to behave in an environment, and (ii) to learn to predict the next state of the e... |
This paper proposed to improve the quality of optimal transport via simultaneously encouraging the mutual information (MI). This is justified by establishing the equivalence between the MI and the standard entropy regularization used in the Sinkhorn algorithm. Empirical results showed that when implemented with kernel ... | Recommendation: 5: marginally below the acceptance threshold | Area: General Machine Learning | Review:
This paper proposed to improve the quality of optimal transport via simultaneously encouraging the mutual information (MI). This is justified by establishing the equivalence between the MI and the standard entropy regularization used in the Sinkhorn algorithm. Empirical results showed that when implemented with... |
The paper targets the problem of algorithmic recourse, which is to suggest how an input instance should be modified to alter the outcome of a predictive model. In particular, the paper proposes a pipeline to generate a model-agnostic recourse that is robust to model shifts. The main idea is to estimate a linear surroga... | Recommendation: 8: accept, good paper | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
The paper targets the problem of algorithmic recourse, which is to suggest how an input instance should be modified to alter the outcome of a predictive model. In particular, the paper proposes a pipeline to generate a model-agnostic recourse that is robust to model shifts. The main idea is to estimate a linear... |
This paper proposes a benchmark for offline Reinforcement Learning algorithms, which includes simulated data, real-world data and the possibility to execute the learned policies on a real-world robotic system. The robot application is dexterous manipulation, the specific tasks are Push and Lift, and the robotic platfor... | Recommendation: 8: accept, good paper | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper proposes a benchmark for offline Reinforcement Learning algorithms, which includes simulated data, real-world data and the possibility to execute the learned policies on a real-world robotic system. The robot application is dexterous manipulation, the specific tasks are Push and Lift, and the robotic... |
This paper proposed MPCFORMER to enable fast inference under the privacy constraint of mutlit-party computation for transformer based models. Some speed-up is achieved as a result of the relaxation of the proposed method in the experiments.
Strength:
+ This paper proposes an interesting question for privacy-preserve ... | Recommendation: 6: marginally above the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
This paper proposed MPCFORMER to enable fast inference under the privacy constraint of mutlit-party computation for transformer based models. Some speed-up is achieved as a result of the relaxation of the proposed method in the experiments.
Strength:
+ This paper proposes an interesting question for privacy-p... |
This paper conducts a fine-grained analysis of DP-SGD to show that gradient misalignment is a principal cause of the disparate impact that occurs when DP-SGD is applied to a dataset. This analysis compares two key components of the DP-SGD: clipping and noise addition. Ultimately, this paper shows that clipping further... | Recommendation: 8: accept, good paper | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
This paper conducts a fine-grained analysis of DP-SGD to show that gradient misalignment is a principal cause of the disparate impact that occurs when DP-SGD is applied to a dataset. This analysis compares two key components of the DP-SGD: clipping and noise addition. Ultimately, this paper shows that clipping... |
This paper presents an approach for "debiasing" word vectors (and sentence vectors). Because it is rotation-based, this method does not destroy information the way projection-based methods do. The main approach is to extend the OSCaR subspace correction by applying it iteratively.
STRENGTHS
- Unlike most other debiasi... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper presents an approach for "debiasing" word vectors (and sentence vectors). Because it is rotation-based, this method does not destroy information the way projection-based methods do. The main approach is to extend the OSCaR subspace correction by applying it iteratively.
STRENGTHS
- Unlike most other... |
This paper proposes to leverage multiple upstream datasets to co-finetuning for spatio-temporal action localization. The main contribution of this work is a transfer learning model that involves multiple classification heads for downstream detection tasks.
Strength:
The observation that involving multiple upstream task... | Recommendation: 3: reject, not good enough | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper proposes to leverage multiple upstream datasets to co-finetuning for spatio-temporal action localization. The main contribution of this work is a transfer learning model that involves multiple classification heads for downstream detection tasks.
Strength:
The observation that involving multiple upstr... |
This paper provides a method for model editing, how to locally update the output of the model to exhibit desirable properties.
It builds on SERAC, which consists of three parts: cache edits, an edit scope classifier, and a counterfactual model that overrides the base language model. A scope classifier determines when ... | Recommendation: 3: reject, not good enough | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper provides a method for model editing, how to locally update the output of the model to exhibit desirable properties.
It builds on SERAC, which consists of three parts: cache edits, an edit scope classifier, and a counterfactual model that overrides the base language model. A scope classifier determin... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.