review
stringlengths
5
16.6k
score
stringclasses
5 values
area
stringclasses
12 values
text
stringlengths
31
5.65k
This paper studies sample-efficient learning of POMDPs. The paper considers POMDPs with infinite (continuous) state and observation spaces and admitting low-rank latent transitions with features belonging to a certain feature set. The main result is the identification of a sufficient condition called past- and future-s...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper studies sample-efficient learning of POMDPs. The paper considers POMDPs with infinite (continuous) state and observation spaces and admitting low-rank latent transitions with features belonging to a certain feature set. The main result is the identification of a sufficient condition called past- and ...
The authors suggest viewing the problem of predicting the next event for temporal point process models as a meta-learning problem. In particular, they advocate a neural process framework, whereby windows of previous event times act as context and target input sets. A cross-attention architecture is suggested to increas...
Recommendation: 6: marginally above the acceptance threshold
Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes)
Review: The authors suggest viewing the problem of predicting the next event for temporal point process models as a meta-learning problem. In particular, they advocate a neural process framework, whereby windows of previous event times act as context and target input sets. A cross-attention architecture is suggested to...
This paper proposes a multi-channel self supervised learning method to overcome two issues in analyzing brain signals: (1) existing methods are often limited to a particular type of brain signal data, either the invasive data (e.g., SEEG) or non-invasive data (e.g., EEG). (2) correlations amongst different brain areas ...
Recommendation: 8: accept, good paper
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: This paper proposes a multi-channel self supervised learning method to overcome two issues in analyzing brain signals: (1) existing methods are often limited to a particular type of brain signal data, either the invasive data (e.g., SEEG) or non-invasive data (e.g., EEG). (2) correlations amongst different brai...
The authors address a challenging and important problem of feature selection. The new approach is a wrapper-type method that relies on meta-learning to select the best subset of features for supervised learning. The idea is to transform the large discrete search space into a relaxed continuous space and use gradient de...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: The authors address a challenging and important problem of feature selection. The new approach is a wrapper-type method that relies on meta-learning to select the best subset of features for supervised learning. The idea is to transform the large discrete search space into a relaxed continuous space and use gra...
This paper studies zero-shot RL in the sense of "RL that does not require optimization of a policy when presented with a task (reward model)". It covers the literature on successor representations (SR) and forward-backward (FB) representation, proposes an unifying view and improved training losses. Then it empirically ...
Recommendation: 8: accept, good paper
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper studies zero-shot RL in the sense of "RL that does not require optimization of a policy when presented with a task (reward model)". It covers the literature on successor representations (SR) and forward-backward (FB) representation, proposes an unifying view and improved training losses. Then it empi...
This paper proposes a vision-and-language transformer that is multi-tasked to both generate an image completion, given language ("Prefix Image Modeling") and to both generate language given images ("Prefix Language Modeling"). The key claim of this paper is that by multitasking these two settings, the resulting model i...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: This paper proposes a vision-and-language transformer that is multi-tasked to both generate an image completion, given language ("Prefix Image Modeling") and to both generate language given images ("Prefix Language Modeling"). The key claim of this paper is that by multitasking these two settings, the resulting...
This paper studies the zeroth-order optimization where the gradient information is infeasible or very expensive to access, and only function values are available. Different from most one or two-point zeroth-order estimation, this paper assumes the function f is sampled from Gaussian process as in Bayesian optimization ...
Recommendation: 6: marginally above the acceptance threshold
Area: Optimization (eg, convex and non-convex optimization)
Review: This paper studies the zeroth-order optimization where the gradient information is infeasible or very expensive to access, and only function values are available. Different from most one or two-point zeroth-order estimation, this paper assumes the function f is sampled from Gaussian process as in Bayesian optim...
This work explores the relationship between emergent communication informativeness and complexity, hyperparameters of the vector-quantized variational information bottleneck (VA-VIB) method of training EC agents, and downstream metrics like generalizability and translatability with human language. It finds that as the ...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This work explores the relationship between emergent communication informativeness and complexity, hyperparameters of the vector-quantized variational information bottleneck (VA-VIB) method of training EC agents, and downstream metrics like generalizability and translatability with human language. It finds that...
This paper presents a test-time adaptation (TTA) method from probabilistic perspective. Specifically, they analyze first analyze the pseudo labeling, which is a naive approach in TTA, from probabilistic point of view. Based on the analysis, they propose variational pseudo labels, and meta-learning based algorithms. The...
Recommendation: 3: reject, not good enough
Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes)
Review: This paper presents a test-time adaptation (TTA) method from probabilistic perspective. Specifically, they analyze first analyze the pseudo labeling, which is a naive approach in TTA, from probabilistic point of view. Based on the analysis, they propose variational pseudo labels, and meta-learning based algorit...
The paper introduces a new framework to create recourse to algorithms with higher user satisfaction than comparable approaches, using Expected Minimum Risk and a novel optimization algorithm. Recourse here is meant to enable users to make changes in algorithmic classification, altering the result according to their pre...
Recommendation: 6: marginally above the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The paper introduces a new framework to create recourse to algorithms with higher user satisfaction than comparable approaches, using Expected Minimum Risk and a novel optimization algorithm. Recourse here is meant to enable users to make changes in algorithmic classification, altering the result according to t...
The paper provides a novel methodology for identifying significant causal features in spatiotemporal data, with primary applications in biology (e.g. scRNA-Seq data). Its primary novelty lies in the judicious use of a transfer entropy characterisation of feature significance/relevance and the design of a combinatorial ...
Recommendation: 8: accept, good paper
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: The paper provides a novel methodology for identifying significant causal features in spatiotemporal data, with primary applications in biology (e.g. scRNA-Seq data). Its primary novelty lies in the judicious use of a transfer entropy characterisation of feature significance/relevance and the design of a combin...
This paper proposes a novel neural episodic-control based approach with state abstraction, named NECSA. The authors motivate their methods by utilizing latent information from historical behaviors, which has been overlooked by prior work. Specifically, this paper proposes a more comprehensive episodic memory, which con...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper proposes a novel neural episodic-control based approach with state abstraction, named NECSA. The authors motivate their methods by utilizing latent information from historical behaviors, which has been overlooked by prior work. Specifically, this paper proposes a more comprehensive episodic memory, w...
In this paper, a method called Normalization Perturbation (NP) is proposed for robust object detection under domain shift. The proposed method perturbs the channel statistics of source domain features to synthesize various latent styles. Extensive analysis and experiments verify the effectiveness of the proposed NP met...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: In this paper, a method called Normalization Perturbation (NP) is proposed for robust object detection under domain shift. The proposed method perturbs the channel statistics of source domain features to synthesize various latent styles. Extensive analysis and experiments verify the effectiveness of the propose...
In this paper, the problem of imitating an expert with access to more information about the state space in a POMDP than a learner is considered -- these are called impossibly good experts. Existing methods for imitation learning like Behavior Cloning and the DAGGER algorithm are shown to fail with concrete counterexamp...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: In this paper, the problem of imitating an expert with access to more information about the state space in a POMDP than a learner is considered -- these are called impossibly good experts. Existing methods for imitation learning like Behavior Cloning and the DAGGER algorithm are shown to fail with concrete coun...
This paper attempts to proposed a new method for so-called adversary-aware partial label learning (but the definition of this setting is not clear in the whole paper). The proposed method is an incremental improvement on a SOTA partial label learning method. Strengths: It is difficult for me to tell the strengths about...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This paper attempts to proposed a new method for so-called adversary-aware partial label learning (but the definition of this setting is not clear in the whole paper). The proposed method is an incremental improvement on a SOTA partial label learning method. Strengths: It is difficult for me to tell the strengt...
This paper aims to improve the communication efficiency in decentralized learning. They propose a novel algorithm, DIGEST, which uses local SGD and random walk to reduce communication costs. The random walk communication can be extended to multi-stream. They provide a standard convergence results and provide empirical...
Recommendation: 5: marginally below the acceptance threshold
Area: Optimization (eg, convex and non-convex optimization)
Review: This paper aims to improve the communication efficiency in decentralized learning. They propose a novel algorithm, DIGEST, which uses local SGD and random walk to reduce communication costs. The random walk communication can be extended to multi-stream. They provide a standard convergence results and provide e...
This paper tries to fix the failure of the direct combination of federated learning (FL) and adversarial training, which is indicated by the deterioration of the adversarial accuracy at the later stage of FL. The authors proposed the so-called "alpha-slack" mechanism that upweights the clients with smaller (local) adve...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper tries to fix the failure of the direct combination of federated learning (FL) and adversarial training, which is indicated by the deterioration of the adversarial accuracy at the later stage of FL. The authors proposed the so-called "alpha-slack" mechanism that upweights the clients with smaller (loc...
This paper proposes a framework for learning provably feasible approximations to optimization problems with linear constraints. This framework entails * Rewriting the original optimization problem, if it has (linear) equality constraints, in a solely inequality-constrained form, by using variable reduction techniques, ...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: This paper proposes a framework for learning provably feasible approximations to optimization problems with linear constraints. This framework entails * Rewriting the original optimization problem, if it has (linear) equality constraints, in a solely inequality-constrained form, by using variable reduction tech...
This submission studies an architecture to learn from data with missing values. The architecture is based on chaining two transformations with an attention module that enables modeling the set of observed values. The model learns by randomly masking the training data to ensure learning from different subsets of the var...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This submission studies an architecture to learn from data with missing values. The architecture is based on chaining two transformations with an attention module that enables modeling the set of observed values. The model learns by randomly masking the training data to ensure learning from different subsets of...
This paper proposes to use an adaptive induction network to rectify the prototype network for few-shot learning. The adaptive induction network is developed to address the noisy samples, while this network has degraded performance with the increase of support samples since it ignores the relative local features. Thus, ...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposes to use an adaptive induction network to rectify the prototype network for few-shot learning. The adaptive induction network is developed to address the noisy samples, while this network has degraded performance with the increase of support samples since it ignores the relative local features...
In this paper, the author provides a comprehensive formulation of the attention flows for different architectures of transformers (encoder, decoder, encoder-decoder). In order to account for the auto-regressive decoder structure, the author adjusted the attention flow to ensure the positional independence of the comput...
Recommendation: 3: reject, not good enough
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: In this paper, the author provides a comprehensive formulation of the attention flows for different architectures of transformers (encoder, decoder, encoder-decoder). In order to account for the auto-regressive decoder structure, the author adjusted the attention flow to ensure the positional independence of th...
This paper proposed a gradient-guided importance sampling method for learning binary energy based models. The idea is to combine ratio matching with scalable gradient of the energy function for more efficient computation. The paper is clearly written. Numerical experiments show the advantage of the proposed method over...
Recommendation: 5: marginally below the acceptance threshold
Area: General Machine Learning
Review: This paper proposed a gradient-guided importance sampling method for learning binary energy based models. The idea is to combine ratio matching with scalable gradient of the energy function for more efficient computation. The paper is clearly written. Numerical experiments show the advantage of the proposed met...
This paper proposes to use implicit neural representations to model and efficiently solve PDE dynamics. This allows to solve dynamics in the latent space instead of the whole parameter space (lower dimension), without discretizing it. The latent space and network are trained on a range of sample PDEs for a given task, ...
Recommendation: 8: accept, good paper
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: This paper proposes to use implicit neural representations to model and efficiently solve PDE dynamics. This allows to solve dynamics in the latent space instead of the whole parameter space (lower dimension), without discretizing it. The latent space and network are trained on a range of sample PDEs for a give...
The paper analyzes the reactive defense against model stealing called dataset inference that was proposed at ICLR 2021. It is shown in this submission that dataset inference suffers from false positives (FP) and false negatives (FN). For FPs - it is presented that dataset inference can incorrectly resolve the model own...
Recommendation: 3: reject, not good enough
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The paper analyzes the reactive defense against model stealing called dataset inference that was proposed at ICLR 2021. It is shown in this submission that dataset inference suffers from false positives (FP) and false negatives (FN). For FPs - it is presented that dataset inference can incorrectly resolve the m...
This paper studies the behavior of the sim-to-real gap for partially observed linear-Gaussian systems with quadratic cost. The authors formalize the sim-to-real gap as the finite-horizon minimax regret of a policy across a set of plausible simulators. The main argument is that the finite-horizon minimax regret can be b...
Recommendation: 8: accept, good paper
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper studies the behavior of the sim-to-real gap for partially observed linear-Gaussian systems with quadratic cost. The authors formalize the sim-to-real gap as the finite-horizon minimax regret of a policy across a set of plausible simulators. The main argument is that the finite-horizon minimax regret ...
In this paper the author address the partial-label learning problem, a typical weakly supervised learning problem, where each training instance is equipped with a set of candidate labels among which only one is the true label. In this scenario, the main challenge lies in candidate label disambiguation. The authors rais...
Recommendation: 6: marginally above the acceptance threshold
Area: General Machine Learning
Review: In this paper the author address the partial-label learning problem, a typical weakly supervised learning problem, where each training instance is equipped with a set of candidate labels among which only one is the true label. In this scenario, the main challenge lies in candidate label disambiguation. The auth...
This paper proposes a privacy-preserving framework (SNFL) in federated learning by incorporating the conversion from artificial neural networks to spiking neural networks. SNFL is validated to robust to gradient inversion attack and backdoor attack and it guarantees privacy while improving accuracy. Strength: This pap...
Recommendation: 3: reject, not good enough
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper proposes a privacy-preserving framework (SNFL) in federated learning by incorporating the conversion from artificial neural networks to spiking neural networks. SNFL is validated to robust to gradient inversion attack and backdoor attack and it guarantees privacy while improving accuracy. Strength: ...
This paper tackles a challenging problem of translating sign language to natural language. The problem's challenging nature arises from the data scarcity and the modality gap between video and text. The authors approach the problem from the perspective of learning a joint latent space for video and text, guided by mult...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper tackles a challenging problem of translating sign language to natural language. The problem's challenging nature arises from the data scarcity and the modality gap between video and text. The authors approach the problem from the perspective of learning a joint latent space for video and text, guided...
The manuscript proposes to bridge the gap between post-hoc explanation methods and interpretable-by-design methods. This is achieved by a pipeline where given a black-box model, an interpretable component iteratively distills parts of the representation from the blackbox with uncovered (undistilled) parts forwarded to...
Recommendation: 8: accept, good paper
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The manuscript proposes to bridge the gap between post-hoc explanation methods and interpretable-by-design methods. This is achieved by a pipeline where given a black-box model, an interpretable component iteratively distills parts of the representation from the blackbox with uncovered (undistilled) parts forw...
This paper proposes a probabilistic model to learn disentangled object representation in an unsupervised fashion. The generative model is expressed through an observation module and a dynamic module, where the representations of entities are factorized into interaction-relevant relational features and interaction-irrel...
Recommendation: 5: marginally below the acceptance threshold
Area: Generative models
Review: This paper proposes a probabilistic model to learn disentangled object representation in an unsupervised fashion. The generative model is expressed through an observation module and a dynamic module, where the representations of entities are factorized into interaction-relevant relational features and interacti...
This paper targets the problem that the edges in a graph may have different levels of difficulty to learn and proposes a curriculum learning-based model to gradually incorporate edges during learning according to their difficulties. The difficulty level is obtained by self-supervised learning. Experiments are conducted...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper targets the problem that the edges in a graph may have different levels of difficulty to learn and proposes a curriculum learning-based model to gradually incorporate edges during learning according to their difficulties. The difficulty level is obtained by self-supervised learning. Experiments are c...
This paper focuses on multi-morphology and multi-task generalization in robotics. There are three main contributions to this paper. First, a comprehensive benchmark called MxT-Bench is developed for training and evaluating morphology-task generalization. This benchmark also supports the scalable procedural generation o...
Recommendation: 8: accept, good paper
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper focuses on multi-morphology and multi-task generalization in robotics. There are three main contributions to this paper. First, a comprehensive benchmark called MxT-Bench is developed for training and evaluating morphology-task generalization. This benchmark also supports the scalable procedural gene...
In this paper authors study wide stochastic networks, where the weights are sampled from a Gaussian with diagonal covariance. Authors aim to give a convergence analysis when the means and variances are obtained via gradient descent trained on the PAC-Bayesian bound objective. Authors obtain these results by introduc...
Recommendation: 3: reject, not good enough
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: In this paper authors study wide stochastic networks, where the weights are sampled from a Gaussian with diagonal covariance. Authors aim to give a convergence analysis when the means and variances are obtained via gradient descent trained on the PAC-Bayesian bound objective. Authors obtain these results by ...
The authors propose a neural network pruning method which perserves trainability after pruning. The authors argue that the proposed approach will make the network easier to train after pruning therefore lead to a better finetuned model. First, the proposed method use L1 norm to select important and unimportant filters....
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: The authors propose a neural network pruning method which perserves trainability after pruning. The authors argue that the proposed approach will make the network easier to train after pruning therefore lead to a better finetuned model. First, the proposed method use L1 norm to select important and unimportant ...
This paper proposed the H3 architecture to narrow the gap between state space models and attention models on language modeling. Basically, H3 uses a shift SSM and a diagonal SSM to replace the non-linear function in linear attention. The shift SSM is designed to remember tokens in the input sequence while the multiplic...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposed the H3 architecture to narrow the gap between state space models and attention models on language modeling. Basically, H3 uses a shift SSM and a diagonal SSM to replace the non-linear function in linear attention. The shift SSM is designed to remember tokens in the input sequence while the m...
the paper proposes the modification of AdaSAM to SAM (sharpness-aware minimization) that records running averages of first and second moment (based on the "SAM gradient"), and adjusts the parameter updated based on these estimates a la Adam and AdaGrad. authors show improved results with AdaSAM on GLUE benchmarks. str...
Recommendation: 5: marginally below the acceptance threshold
Area: Optimization (eg, convex and non-convex optimization)
Review: the paper proposes the modification of AdaSAM to SAM (sharpness-aware minimization) that records running averages of first and second moment (based on the "SAM gradient"), and adjusts the parameter updated based on these estimates a la Adam and AdaGrad. authors show improved results with AdaSAM on GLUE benchmar...
This paper presents a simple and effective Self-attentive Rationale guided Graph Contrastive Learning for graph network learning. The code idea is to learn both node- and edge-wise rationale-aware views. Extensive experimental results show the effectiveness of the proposed method. Strength: 1. The writing is good. ...
Recommendation: 6: marginally above the acceptance threshold
Area: Unsupervised and Self-supervised learning
Review: This paper presents a simple and effective Self-attentive Rationale guided Graph Contrastive Learning for graph network learning. The code idea is to learn both node- and edge-wise rationale-aware views. Extensive experimental results show the effectiveness of the proposed method. Strength: 1. The writing is...
This paper proposes to directly model feature embeddings from a line graph. The line graph is comprised of nodes as the original temporal edges, and new set of edges between the line graph nodes are captured by interactions between the original temporal edges. The paper addresses critical ML application in the context...
Recommendation: 3: reject, not good enough
Area: General Machine Learning
Review: This paper proposes to directly model feature embeddings from a line graph. The line graph is comprised of nodes as the original temporal edges, and new set of edges between the line graph nodes are captured by interactions between the original temporal edges. The paper addresses critical ML application in the...
This paper proposes two methods for equivariance-aware neural architectural search (NAS). The motivation for this work stems from the fact that symmetries present in a data set might often be imperfect or non-explicitly known. The first method is based on the proposed equivariance relaxation morphism, a procedure that ...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposes two methods for equivariance-aware neural architectural search (NAS). The motivation for this work stems from the fact that symmetries present in a data set might often be imperfect or non-explicitly known. The first method is based on the proposed equivariance relaxation morphism, a procedu...
This paper introduces a new measure of conditional independence for multivariate continuous variables, based on the equations of Daudin, 1980. Although previous tests have also used other equivalent forms of equations from (Daudin, 1980), the proposed CI measure and statistic seem to enjoy the advantage of avoiding m...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper introduces a new measure of conditional independence for multivariate continuous variables, based on the equations of Daudin, 1980. Although previous tests have also used other equivalent forms of equations from (Daudin, 1980), the proposed CI measure and statistic seem to enjoy the advantage of av...
The paper studies the problem of estimating causal effect with overlap violations. The authors focus on a specific application---causal estimation for text data. The authors start with writing down the model in terms of a DAG and discuss identification results based on the DAG. The authors then proceed with discussing ...
Recommendation: 6: marginally above the acceptance threshold
Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes)
Review: The paper studies the problem of estimating causal effect with overlap violations. The authors focus on a specific application---causal estimation for text data. The authors start with writing down the model in terms of a DAG and discuss identification results based on the DAG. The authors then proceed with dis...
This paper considers the technique of sampling from a Gibbs distribution via the Ideal Hamiltonian Monte-Carlo (HMC) method. Specifically, the ideal HMC method is derived by iterative running the HMC from the current spatial position, but with a resampled velocity for a certain period of integration time. The integrati...
Recommendation: 8: accept, good paper
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: This paper considers the technique of sampling from a Gibbs distribution via the Ideal Hamiltonian Monte-Carlo (HMC) method. Specifically, the ideal HMC method is derived by iterative running the HMC from the current spatial position, but with a resampled velocity for a certain period of integration time. The i...
This research develops a novel multimodal , multitask architecture for robot manipulation. Also introduces a multimodal and multitask benchmark for robot manipulation. Finally introduce a carefully thought methodology in 4 steps to quantify the capability of the developed architecture. The results section provide rele...
Recommendation: 8: accept, good paper
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This research develops a novel multimodal , multitask architecture for robot manipulation. Also introduces a multimodal and multitask benchmark for robot manipulation. Finally introduce a carefully thought methodology in 4 steps to quantify the capability of the developed architecture. The results section prov...
The paper proposes a novel method to model temporal logical rules for knowledge graph completion. In specific, the authors first define constrained random walk for rule learning. Then, based on learned rules, the authors design a module to model various temporal features and apply rules for prediction. ===============...
Recommendation: 6: marginally above the acceptance threshold
Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes)
Review: The paper proposes a novel method to model temporal logical rules for knowledge graph completion. In specific, the authors first define constrained random walk for rule learning. Then, based on learned rules, the authors design a module to model various temporal features and apply rules for prediction. =======...
Summary The authors consider the problem of domain generalization (DG). In specific, they are addressing the issues of scalability and objective. Scalability: The state-of-the-art DG methods involve computational complexity of 𝒪 (n2) corresponding to pairwise domain operations with n domains. In addition, each domai...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: Summary The authors consider the problem of domain generalization (DG). In specific, they are addressing the issues of scalability and objective. Scalability: The state-of-the-art DG methods involve computational complexity of 𝒪 (n2) corresponding to pairwise domain operations with n domains. In addition, ea...
This paper studies how to launch the value-based membership inference attack on actor-critic reinforcement learning. Such attacks may make inferences about the training environments—whether a particular environment has been used in training—by observing the outcomes of a reinforcement learning algorithm. They develop C...
Recommendation: 6: marginally above the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper studies how to launch the value-based membership inference attack on actor-critic reinforcement learning. Such attacks may make inferences about the training environments—whether a particular environment has been used in training—by observing the outcomes of a reinforcement learning algorithm. They d...
This paper proposes an evaluation method to estimate the clustering quality with a small number of labeled samples. The samples are selected by two novel acquisition functions. Strength 1. This paper studies an interesting and important problem, which is the efficient evaluation for unsupervised methods. 2. The paper ...
Recommendation: 3: reject, not good enough
Area: General Machine Learning
Review: This paper proposes an evaluation method to estimate the clustering quality with a small number of labeled samples. The samples are selected by two novel acquisition functions. Strength 1. This paper studies an interesting and important problem, which is the efficient evaluation for unsupervised methods. 2. Th...
This paper proposes taking leverage of graph filters to directly generate augmented graph views for graph contrastive learning. The model tries to maximize the agreement between a low- and high-pass encoder of the same graph. The experiments show that this approach improves the graph CL results in heterophily graphs. ...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This paper proposes taking leverage of graph filters to directly generate augmented graph views for graph contrastive learning. The model tries to maximize the agreement between a low- and high-pass encoder of the same graph. The experiments show that this approach improves the graph CL results in heterophily g...
This paper introduces the first 3D generator that works on 3D datasets without alignment. To this end, conditioning on an off-the-shelf monocular depth estimation approach, the proposed method incorporates generic depth priors to facilitate 3D generation. Moreover, richer camera models are taken into account, ensuring ...
Recommendation: 6: marginally above the acceptance threshold
Area: Generative models
Review: This paper introduces the first 3D generator that works on 3D datasets without alignment. To this end, conditioning on an off-the-shelf monocular depth estimation approach, the proposed method incorporates generic depth priors to facilitate 3D generation. Moreover, richer camera models are taken into account, e...
In this paper the authors study the collaborative effects among users in order to improve recommendations. This line of works is known as collaborative filtering bandits. The authors propose an interesting approach for this problem. Rather than assuming a linear model between the arm features and the expected reward, ...
Recommendation: 8: accept, good paper
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: In this paper the authors study the collaborative effects among users in order to improve recommendations. This line of works is known as collaborative filtering bandits. The authors propose an interesting approach for this problem. Rather than assuming a linear model between the arm features and the expected ...
This paper studies the problem of (in-distribution) subpopulation generalization when facing potential subgroups shift in the training data, without knowing the group annotations. The paper proposes a bias amplification scheme, which consists of two training stages. In the first stage, auxiliary variables are introduce...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper studies the problem of (in-distribution) subpopulation generalization when facing potential subgroups shift in the training data, without knowing the group annotations. The paper proposes a bias amplification scheme, which consists of two training stages. In the first stage, auxiliary variables are i...
The authors propose a method that deal with input domain shifts in videos during test time (I.e., it deals with corruptions not observed in training data, like different weather conditions). They propose two self-supervised objectives that are applied to the test-data: one minimizes the entropy of predictions across f...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The authors propose a method that deal with input domain shifts in videos during test time (I.e., it deals with corruptions not observed in training data, like different weather conditions). They propose two self-supervised objectives that are applied to the test-data: one minimizes the entropy of predictions ...
The paper proposes an efficient method of transferring image pre-trained weights to video processing. In summary, the paper proposes to freeze most of the pre-trained model parameters with only a small portion of parameters in the newly inserted Adapter module learnable. The authors have show the effectiveness of the p...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: The paper proposes an efficient method of transferring image pre-trained weights to video processing. In summary, the paper proposes to freeze most of the pre-trained model parameters with only a small portion of parameters in the newly inserted Adapter module learnable. The authors have show the effectiveness ...
This paper: * solves the domain generalization problem * presents several observations that diversity helps mitigate serious correlations * proposes a sampling method that helps train robust models * conducts experiment on Rotated MNIST and Rotated Fashion MNIST to show the effectiveness of the proposed algorithm The p...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This paper: * solves the domain generalization problem * presents several observations that diversity helps mitigate serious correlations * proposes a sampling method that helps train robust models * conducts experiment on Rotated MNIST and Rotated Fashion MNIST to show the effectiveness of the proposed algorit...
This paper proposes a new adversarial imitation learning method, where a discriminator is trained to learn a representation such that the distance between expert trajectories are shorter than the distance between agent-expert trajectories. This representation is then used to calculate an imitation reward for the agent ...
Recommendation: 8: accept, good paper
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper proposes a new adversarial imitation learning method, where a discriminator is trained to learn a representation such that the distance between expert trajectories are shorter than the distance between agent-expert trajectories. This representation is then used to calculate an imitation reward for th...
This paper proposes an O(n) self-attention layer based on the sparse transformer that is permutation equivariant. The paper shows that their proposed architecture is a universal approximator, and present experiments on set-input datasets. The sparse transformer requires only O(n) computation but is not permutation inva...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposes an O(n) self-attention layer based on the sparse transformer that is permutation equivariant. The paper shows that their proposed architecture is a universal approximator, and present experiments on set-input datasets. The sparse transformer requires only O(n) computation but is not permutat...
This paper introduces a new, practically motivated semi-supervised setting, where the agent can access both labeled trajectories and unlabelled trajectories that do not include the actions of the trajectories. A model is trained to give actions for unlabeled data and then the offline RL method is trained by the whole d...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper introduces a new, practically motivated semi-supervised setting, where the agent can access both labeled trajectories and unlabelled trajectories that do not include the actions of the trajectories. A model is trained to give actions for unlabeled data and then the offline RL method is trained by the...
The paper studies domain generalization, but not in its standard setting, in a new "combination shift" setting instead. The paper also proposes an algebraic formulation for the combination shift problem and proposes some augmentation methods. The paper also has some empirical results. - strength - the setting "com...
Recommendation: 3: reject, not good enough
Area: General Machine Learning
Review: The paper studies domain generalization, but not in its standard setting, in a new "combination shift" setting instead. The paper also proposes an algebraic formulation for the combination shift problem and proposes some augmentation methods. The paper also has some empirical results. - strength - the sett...
After the success of S4 on long range classification and generation tasks, there has been a series of works towards building equally performant but simpler models. In this work, authors propose a novel, simpler and faster parameterization of the convolutional kernels used by S4-like models. For a hyperparameter $d$, a ...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: After the success of S4 on long range classification and generation tasks, there has been a series of works towards building equally performant but simpler models. In this work, authors propose a novel, simpler and faster parameterization of the convolutional kernels used by S4-like models. For a hyperparameter...
This paper aims at establishing a comprehensive definition of counterfactuals explanations. After reviewing related work, it establishes the foundations for establishing their process: data generation, counterfactual generation, classifiers, and evaluation. Their approach is compared to a number of baselines on one par...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper aims at establishing a comprehensive definition of counterfactuals explanations. After reviewing related work, it establishes the foundations for establishing their process: data generation, counterfactual generation, classifiers, and evaluation. Their approach is compared to a number of baselines on...
This paper proposes a simple idea to improve zero-shot image classification using CLIP-like models. It uses a pre-trained LLM (GPT-3) to automatically generate text descriptors for visual categories. The text descriptors are then used by CLIP to compute image-text similarities as prediction scores for each category. Th...
Recommendation: 8: accept, good paper
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper proposes a simple idea to improve zero-shot image classification using CLIP-like models. It uses a pre-trained LLM (GPT-3) to automatically generate text descriptors for visual categories. The text descriptors are then used by CLIP to compute image-text similarities as prediction scores for each cate...
Applications of Wasserstein distance to large-scale machine learning problems have been limited by its enormous computational cost. The Sliced Wasserstein (SW) distance and its variants increase computational efficiency using random projections but suffer from low accuracy if the number of projections is not large enou...
Recommendation: 6: marginally above the acceptance threshold
Area: General Machine Learning
Review: Applications of Wasserstein distance to large-scale machine learning problems have been limited by its enormous computational cost. The Sliced Wasserstein (SW) distance and its variants increase computational efficiency using random projections but suffer from low accuracy if the number of projections is not la...
The paper studies the problem of learning to improve network resilience and unity with reinforcement learning on graphs, which is a important combinatorial optimization problem giving its application in power system and other robust networks. The author designs a reinforcement learning framework with modeling the decis...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: The paper studies the problem of learning to improve network resilience and unity with reinforcement learning on graphs, which is a important combinatorial optimization problem giving its application in power system and other robust networks. The author designs a reinforcement learning framework with modeling t...
This work suggests a Bayesian optimization strategy with deep kernel learning and a feature-tokenizer Transformer, where we are given multiple heterogeneous datasets. By utilizing deep kernel learning and the feature-tokenizer Transformer, it initializes a set of parameters for the feature-tokenizer Transformer in orde...
Recommendation: 3: reject, not good enough
Area: Optimization (eg, convex and non-convex optimization)
Review: This work suggests a Bayesian optimization strategy with deep kernel learning and a feature-tokenizer Transformer, where we are given multiple heterogeneous datasets. By utilizing deep kernel learning and the feature-tokenizer Transformer, it initializes a set of parameters for the feature-tokenizer Transformer...
This paper addresses the problem of continual learning with a novel exemplar selecting algorithm. The authors claim that selecting the exemplars based on PCA-based direction well addresses the catastrophic forgetting problem of the datasets with high intra-class variance. The experimental results on various benchmarks ...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This paper addresses the problem of continual learning with a novel exemplar selecting algorithm. The authors claim that selecting the exemplars based on PCA-based direction well addresses the catastrophic forgetting problem of the datasets with high intra-class variance. The experimental results on various ben...
The paper proposes a multi-turn, bidirectional emergent communication setting implemented as a vision-language navigation task. Experiments show that the trained agent achieves high accuracy in localization and navigation tasks. The proposed model outperforms a VAE baseline. Strengths: * The proposed setting is novel....
Recommendation: 1: strong reject
Area: Deep Learning and representational learning
Review: The paper proposes a multi-turn, bidirectional emergent communication setting implemented as a vision-language navigation task. Experiments show that the trained agent achieves high accuracy in localization and navigation tasks. The proposed model outperforms a VAE baseline. Strengths: * The proposed setting i...
The paper proposes a knowledge distillation approach for continual object detection. The paper introduces two contributions: an image-level hybrid knowledge representation method, named HKR, that distill knowledge from the teacher by combining soft and hard pseudo-labels. Secondly, it proposes task regularized distilli...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: The paper proposes a knowledge distillation approach for continual object detection. The paper introduces two contributions: an image-level hybrid knowledge representation method, named HKR, that distill knowledge from the teacher by combining soft and hard pseudo-labels. Secondly, it proposes task regularized ...
The paper proposes to learn a set of temporal logic rules to build a probabilistic model that maximizes the likelihood of the observed data that come in the form of temporal event sequences. Compared to brute-force search in the space of logic rules that are enormous, the proposed approach leverages a neural policy to ...
Recommendation: 3: reject, not good enough
Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes)
Review: The paper proposes to learn a set of temporal logic rules to build a probabilistic model that maximizes the likelihood of the observed data that come in the form of temporal event sequences. Compared to brute-force search in the space of logic rules that are enormous, the proposed approach leverages a neural po...
The paper introduces a mechanism to describe and quantify the interpretability of neurons in the training process and the experiments are mainly devoted to demonstrating how the concepts shift as the training progresses. For this purpose, the authors utilize the description of neuron representations in the literature t...
Recommendation: 5: marginally below the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The paper introduces a mechanism to describe and quantify the interpretability of neurons in the training process and the experiments are mainly devoted to demonstrating how the concepts shift as the training progresses. For this purpose, the authors utilize the description of neuron representations in the lite...
- This paper proposes generative models that predicts (or generates) high-performing task-specific weights conditioned on text description of the task. - Specifically, three "Hyper"-components are proposed: 1) Hyper-"decoder": a decoder of VAE trained with (unconditional) auto-encoding of weight vector, 2) Hyper-"CLIP...
Recommendation: 6: marginally above the acceptance threshold
Area: Generative models
Review: - This paper proposes generative models that predicts (or generates) high-performing task-specific weights conditioned on text description of the task. - Specifically, three "Hyper"-components are proposed: 1) Hyper-"decoder": a decoder of VAE trained with (unconditional) auto-encoding of weight vector, 2) Hyp...
The work used news media dataset to detect character, testimonial, and framing injustices. The models employed are fine-tuned BERT model, CO-STAR model and Social-Bias Frames model. The framework is able to automatically detect epistemological bias using a fine-tuned tagger and a lexicon lookup. The result demonstrate...
Recommendation: 8: accept, good paper
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The work used news media dataset to detect character, testimonial, and framing injustices. The models employed are fine-tuned BERT model, CO-STAR model and Social-Bias Frames model. The framework is able to automatically detect epistemological bias using a fine-tuned tagger and a lexicon lookup. The result dem...
This paper propose moving average equipped gated attention mechanism (MEGA) to address transformer’s weakness in long-range modeling such as weak inductive bias and quadratic computational complexity based on the idea of EMA (more specifically, multi-dimensional damped EMA). MEGA (and its efficient variant, MEGA-chunk...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: This paper propose moving average equipped gated attention mechanism (MEGA) to address transformer’s weakness in long-range modeling such as weak inductive bias and quadratic computational complexity based on the idea of EMA (more specifically, multi-dimensional damped EMA). MEGA (and its efficient variant, ME...
In this paper, the authors explore how to balance the memory budget usage between exemplars and model parameters in class-incremental learning. Based on their findings, the authors propose a simple yet effective class-incremental learning method named Memory-efficient Expandable Model (MEMO). MEMO extends specialized l...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: In this paper, the authors explore how to balance the memory budget usage between exemplars and model parameters in class-incremental learning. Based on their findings, the authors propose a simple yet effective class-incremental learning method named Memory-efficient Expandable Model (MEMO). MEMO extends speci...
This paper investigates the capacity of summarization models to synthesize (potentially conflicting) information from multiple documents. It defines a model-based metric for the aggregate latent aspect of interest, in this case, the sentiment of movie reviews (Rotten Tomatoes dataset) and the treatment efficacy of medi...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper investigates the capacity of summarization models to synthesize (potentially conflicting) information from multiple documents. It defines a model-based metric for the aggregate latent aspect of interest, in this case, the sentiment of movie reviews (Rotten Tomatoes dataset) and the treatment efficacy...
The paper proposes a new augmentation strategy to augment few-shot samples during fine-tuning. The core idea of the paper is to use a pre-trained language model (PLM) to generate texts which can be leveraged towards fine-tuning. The authors propose two methods in the paper to achieve this: (i) a method to fine-tune th...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The paper proposes a new augmentation strategy to augment few-shot samples during fine-tuning. The core idea of the paper is to use a pre-trained language model (PLM) to generate texts which can be leveraged towards fine-tuning. The authors propose two methods in the paper to achieve this: (i) a method to fine...
This paper deals with the problem of Few Shot learning were too few samples are available to perform heavy training of the model. To alleviate this problem authors proposed to use semi-supervised learning. An additional set of unlabelled samples is thus introduced. This additional set of samples is exploited with GMM c...
Recommendation: 1: strong reject
Area: Deep Learning and representational learning
Review: This paper deals with the problem of Few Shot learning were too few samples are available to perform heavy training of the model. To alleviate this problem authors proposed to use semi-supervised learning. An additional set of unlabelled samples is thus introduced. This additional set of samples is exploited wi...
The paper proposes discretizing and limiting kernel support for efficiently learning kernel parameters of a Hawkes process via gradient descent. Additionally, the paper provides theoretical insights measuring the discretization bias. Experimental results on synthetic and electrophysiology datasets show improved estimat...
Recommendation: 5: marginally below the acceptance threshold
Area: Neuroscience and Cognitive Science (e.g., neural coding, brain-computer interfaces)
Review: The paper proposes discretizing and limiting kernel support for efficiently learning kernel parameters of a Hawkes process via gradient descent. Additionally, the paper provides theoretical insights measuring the discretization bias. Experimental results on synthetic and electrophysiology datasets show improved...
This paper proposes that images will be better processed if the context is known. Figure 1 provides excellent motivation for this idea. The images are very similar in appearance, but correspond to very different classes (food vs. animals). Inspired by the well-known fact that there are as many or more feedback connecti...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper proposes that images will be better processed if the context is known. Figure 1 provides excellent motivation for this idea. The images are very similar in appearance, but correspond to very different classes (food vs. animals). Inspired by the well-known fact that there are as many or more feedback ...
The authors created a semi-supervised approach for the crucial and challenging subject of community detection. To solve the problem, they are facing the following challenges: (1) Non-assortative communities exist in real networks; (2) Degree heterogeneity exists in the network; (3) Optimization-based techniques may ob...
Recommendation: 6: marginally above the acceptance threshold
Area: General Machine Learning
Review: The authors created a semi-supervised approach for the crucial and challenging subject of community detection. To solve the problem, they are facing the following challenges: (1) Non-assortative communities exist in real networks; (2) Degree heterogeneity exists in the network; (3) Optimization-based technique...
The paper establishes a connection between the Lovasz theta function and contrastive learning. Specifically, with InfoNCE - a type of contrastive loss function used for self-supervised learning. They define a novel loss function - Lovasz theta contrastive loss based on a weighted graph representation of the similaritie...
Recommendation: 6: marginally above the acceptance threshold
Area: Unsupervised and Self-supervised learning
Review: The paper establishes a connection between the Lovasz theta function and contrastive learning. Specifically, with InfoNCE - a type of contrastive loss function used for self-supervised learning. They define a novel loss function - Lovasz theta contrastive loss based on a weighted graph representation of the sim...
This paper proposes to train a distributional actor-critic algorithm in a latent space for high-dimensional data in offline reinforcement learning. Risk measure instead of the classic expected return is optimized under the risk-sensitive RL framework. Strengths: 1. This paper combines the methods from prior methods. ...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper proposes to train a distributional actor-critic algorithm in a latent space for high-dimensional data in offline reinforcement learning. Risk measure instead of the classic expected return is optimized under the risk-sensitive RL framework. Strengths: 1. This paper combines the methods from prior m...
The paper proposes a learning framework (Figure 1) for action abstraction in the scheme of multi-task reinforcement learning (RL). A latent action representation is assigned to each task, and the model tried to learn the tasks with state representation (shared among tasks) and action representations (specific to each t...
Recommendation: 5: marginally below the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The paper proposes a learning framework (Figure 1) for action abstraction in the scheme of multi-task reinforcement learning (RL). A latent action representation is assigned to each task, and the model tried to learn the tasks with state representation (shared among tasks) and action representations (specific t...
This explores training MARL under heterogeneous environments with different coordination difficulties. The authors first define heterogeneous environments and different levels of coordination. Then three Grid environments are designed to support different levels of coordination. Then the author proposed an attention-ba...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This explores training MARL under heterogeneous environments with different coordination difficulties. The authors first define heterogeneous environments and different levels of coordination. Then three Grid environments are designed to support different levels of coordination. Then the author proposed an atte...
this paper suggests to simultaneously learn state representation from images and to fit the LQR solution in this state representation (and linear latent dynamics) to the externally provided optimal control signal. 1. I do not understand the rational of this work. If you have optimal control, u, you have a solution. W...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: this paper suggests to simultaneously learn state representation from images and to fit the LQR solution in this state representation (and linear latent dynamics) to the externally provided optimal control signal. 1. I do not understand the rational of this work. If you have optimal control, u, you have a sol...
This work proposes a novel notion called "inductive bias complexity". Just as sample complexity captures the number of samples required for learning a problem (upto a desired error) given a fixed inductive bias, the "inductive bias complexity" refers to the minimum amount of "inductive bias" required for learning a pro...
Recommendation: 8: accept, good paper
Area: General Machine Learning
Review: This work proposes a novel notion called "inductive bias complexity". Just as sample complexity captures the number of samples required for learning a problem (upto a desired error) given a fixed inductive bias, the "inductive bias complexity" refers to the minimum amount of "inductive bias" required for learni...
This paper proposes a new image compression model based on the paradigm of neural image compression. The main novelty is to introduce a diffusion based decoder, instead of the traditional Gaussian or Laplacian decoders. Some experiments are conducted to verify the effectiveness. Strengths: 1. The idea is very intuitive...
Recommendation: 6: marginally above the acceptance threshold
Area: Generative models
Review: This paper proposes a new image compression model based on the paradigm of neural image compression. The main novelty is to introduce a diffusion based decoder, instead of the traditional Gaussian or Laplacian decoders. Some experiments are conducted to verify the effectiveness. Strengths: 1. The idea is very i...
The paper designs a generative model for effective cooperative adversarial learning through closed-loop transcription. In the training, both the encoder and decoder are trained simultaneously for cooperative adversarial learning. The experimental results show effectiveness of the proposed strategy. Pros: + The idea of...
Recommendation: 3: reject, not good enough
Area: Generative models
Review: The paper designs a generative model for effective cooperative adversarial learning through closed-loop transcription. In the training, both the encoder and decoder are trained simultaneously for cooperative adversarial learning. The experimental results show effectiveness of the proposed strategy. Pros: + The...
See summary of the review below. See summary of the review below. I think this is an interesting paper, but I found the motivation for the approach lacking. The paper describes various issues in going from MLM parameter estimation objectives, to density estimation over sequences. The paper first describes a number of...
Recommendation: 5: marginally below the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: See summary of the review below. See summary of the review below. I think this is an interesting paper, but I found the motivation for the approach lacking. The paper describes various issues in going from MLM parameter estimation objectives, to density estimation over sequences. The paper first describes a n...
The author proposes a new backdoor attack-DLP, which only needs to modify the training set labels to threaten the model. And this backdoor attack method uses a data-driven backdoor scoring mechanism, which can take effect within any backdoor sample size. Finally, the effectiveness of the method is proved by theory and ...
Recommendation: 5: marginally below the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The author proposes a new backdoor attack-DLP, which only needs to modify the training set labels to threaten the model. And this backdoor attack method uses a data-driven backdoor scoring mechanism, which can take effect within any backdoor sample size. Finally, the effectiveness of the method is proved by the...
This paper proposes a novel steerable convolution for 2D path planning, where the convolution operation benefits from incorporating symmetric constraints to reduce overall search space and improve planning performance. Specifically, by manipulating the input signal in a symmetric setting (e.g. rotation and flipping for...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper proposes a novel steerable convolution for 2D path planning, where the convolution operation benefits from incorporating symmetric constraints to reduce overall search space and improve planning performance. Specifically, by manipulating the input signal in a symmetric setting (e.g. rotation and flip...
This paper studies generalization bounds for neural networks based on the algorithmic stability. To this aim, the paper first introduces a new stability called almost sure support stability, which relaxes the uniform stability by allowing the stability to be violated with some probability. The first result is an expone...
Recommendation: 5: marginally below the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: This paper studies generalization bounds for neural networks based on the algorithmic stability. To this aim, the paper first introduces a new stability called almost sure support stability, which relaxes the uniform stability by allowing the stability to be violated with some probability. The first result is a...
This paper proposes a novel DTW layer that combines non-linear programing based generalized DTW (Deriso & Boyd) with declarative network (Gould et al.), to not only output the DTW discrepancy value, but also the alignment. More importantly, the output alignment could be compared against ground truth alignment and the d...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposes a novel DTW layer that combines non-linear programing based generalized DTW (Deriso & Boyd) with declarative network (Gould et al.), to not only output the DTW discrepancy value, but also the alignment. More importantly, the output alignment could be compared against ground truth alignment a...
The paper presents a multiscale method for operator learning based on a transformer architecture. Inspired by hierarchical methods for solving PDEs, the key idea is to add self-attention layers to a architecture with multiple downscaling and upscaling layers (i.e., reduce and decompose operations). The authors also use...
Recommendation: 6: marginally above the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: The paper presents a multiscale method for operator learning based on a transformer architecture. Inspired by hierarchical methods for solving PDEs, the key idea is to add self-attention layers to a architecture with multiple downscaling and upscaling layers (i.e., reduce and decompose operations). The authors ...
The paper focuses on the problem that the existing large language models fail to learn the dialogue-specific features. The paper tries to solve the locality and isotropy problem for dialogue generation modes by encouraging the model to aggregate the representation of tokens within an utterance and push away the represe...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The paper focuses on the problem that the existing large language models fail to learn the dialogue-specific features. The paper tries to solve the locality and isotropy problem for dialogue generation modes by encouraging the model to aggregate the representation of tokens within an utterance and push away the...
This paper is concerned with the iterative selection of an optimal set of targets for genetic interventions based on a scalar readout. The methods section described a particular instance of BAX, that models the singularity of the biological problem that is considered. A few aspects that makes it different from the exis...
Recommendation: 5: marginally below the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: This paper is concerned with the iterative selection of an optimal set of targets for genetic interventions based on a scalar readout. The methods section described a particular instance of BAX, that models the singularity of the biological problem that is considered. A few aspects that makes it different from ...
The paper considers the possibility of accelerating Hamiltonian Monte Carlo (HMC) methods for sampling from distributions $\pi$. For a $L$-smooth and $m$-convex $f$, the complexity of sampling from $\pi \;\alpha\; e^{-f}$ (via an "ideal method" that does not discretize time) is of the order $\kappa \log(1/\delta)$, whe...
Recommendation: 5: marginally below the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: The paper considers the possibility of accelerating Hamiltonian Monte Carlo (HMC) methods for sampling from distributions $\pi$. For a $L$-smooth and $m$-convex $f$, the complexity of sampling from $\pi \;\alpha\; e^{-f}$ (via an "ideal method" that does not discretize time) is of the order $\kappa \log(1/\delt...
The paper proposes a new offline RL algorithm--ARQ--that explicitly models the behavior policy and uses it in a support-constraint in the Bellman backup of the algorithm. The authors make the following contributions: (1) Relate many existing offline RL algorithms as using different penalty functions in the Bellman bac...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The paper proposes a new offline RL algorithm--ARQ--that explicitly models the behavior policy and uses it in a support-constraint in the Bellman backup of the algorithm. The authors make the following contributions: (1) Relate many existing offline RL algorithms as using different penalty functions in the Bel...
This paper introduces Knowledge-in-Context (KiC), a semi-parametric LM consisting of a parametric text-to-text LM with a knowledge-rich external memory and a knowledge selector. During inference, the knowledge selector determines the sequence-to-expert assignment and a retriever retrieves the most relevant sequence fro...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper introduces Knowledge-in-Context (KiC), a semi-parametric LM consisting of a parametric text-to-text LM with a knowledge-rich external memory and a knowledge selector. During inference, the knowledge selector determines the sequence-to-expert assignment and a retriever retrieves the most relevant sequ...
This paper studies decentralized bandits on a DAG. In this model, the players perform actions consecutively and observe the actions of the preceding players. The paper proposes a novel algorithm for this model and achieves sublinear regret for both stochastic and adversarial rewards. Strength: The studied model is no...
Recommendation: 3: reject, not good enough
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: This paper studies decentralized bandits on a DAG. In this model, the players perform actions consecutively and observe the actions of the preceding players. The paper proposes a novel algorithm for this model and achieves sublinear regret for both stochastic and adversarial rewards. Strength: The studied mod...
The paper studies the $k$-means and $k$-median problem in the learning-augmented setting, where we assumed to access a predictor that provides information about the label of each point with a $(1 - \alpha)$-precision, and the approximation factor of the algorithm is measured in terms of $\alpha$. For both problems, the...
Recommendation: 6: marginally above the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: The paper studies the $k$-means and $k$-median problem in the learning-augmented setting, where we assumed to access a predictor that provides information about the label of each point with a $(1 - \alpha)$-precision, and the approximation factor of the algorithm is measured in terms of $\alpha$. For both probl...