review
stringlengths
5
16.6k
score
stringclasses
5 values
area
stringclasses
12 values
text
stringlengths
31
5.65k
This paper introduces a the adversary-aware partial label learning problem to protect the data privacy. The novel adversary-aware loss function, together with an immature teacher within momentum disambiguation algorithm, has achieved state of-the-art performance and proven to be a provable classifier. Pros: * This pape...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper introduces a the adversary-aware partial label learning problem to protect the data privacy. The novel adversary-aware loss function, together with an immature teacher within momentum disambiguation algorithm, has achieved state of-the-art performance and proven to be a provable classifier. Pros: * T...
The authors exploit the properties of adversarial examples to design weighted augmented CE loss to improve transferability. Then, they add two parameters, i.e., fuzzy scaling and fuzzy domain to eliminate some fuzzy region in the searching. Thus, adversarial example with higher transferability is more likely to be foun...
Recommendation: 5: marginally below the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The authors exploit the properties of adversarial examples to design weighted augmented CE loss to improve transferability. Then, they add two parameters, i.e., fuzzy scaling and fuzzy domain to eliminate some fuzzy region in the searching. Thus, adversarial example with higher transferability is more likely to...
This paper proposed an adapt scheme for sharpness-aware minimization (SAM), in which the algorithm simply perform ERM when landscape is flat and perform SAM which landscape is sharp. This method is based on couple of approximation strategies. The author also establish the theoretical guarantee for their proposed algori...
Recommendation: 6: marginally above the acceptance threshold
Area: Optimization (eg, convex and non-convex optimization)
Review: This paper proposed an adapt scheme for sharpness-aware minimization (SAM), in which the algorithm simply perform ERM when landscape is flat and perform SAM which landscape is sharp. This method is based on couple of approximation strategies. The author also establish the theoretical guarantee for their propose...
This work shows new results on convex formulations of neural networks. The goal is to formulate the nonconvex optimization problem as minimum norm problems, derive the convex dual problem and study whether the duality gap is zero. If it is zero, then the dual can be solved via convex optimization tools with theoretical...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: This work shows new results on convex formulations of neural networks. The goal is to formulate the nonconvex optimization problem as minimum norm problems, derive the convex dual problem and study whether the duality gap is zero. If it is zero, then the dual can be solved via convex optimization tools with the...
The authors analyze an approach to improve the playing strength of human-imitating chess engines, while trying to maintain the human-like play. The basic method is to use transfer learning (one-step curriculum learning) by retraining an existing human-like model with data from better players or a conventional chess eng...
Recommendation: 3: reject, not good enough
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The authors analyze an approach to improve the playing strength of human-imitating chess engines, while trying to maintain the human-like play. The basic method is to use transfer learning (one-step curriculum learning) by retraining an existing human-like model with data from better players or a conventional c...
This paper introduces a geometric regularization technique for nerf training under a sparse view setting. The regularization is based on cross-view warping between seen/unseen views using rendered depth, where the warped image is utilized for supervision in feature space. Pros: 1. The overall idea is tidy and easy t...
Recommendation: 5: marginally below the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper introduces a geometric regularization technique for nerf training under a sparse view setting. The regularization is based on cross-view warping between seen/unseen views using rendered depth, where the warped image is utilized for supervision in feature space. Pros: 1. The overall idea is tidy an...
Positional embedding is an important component in transformers. Moreover, generalization ability to longer sequences with proper positional embedding is also hot topic. Current paper proposes a new positional embedding conditioned on the input (PEG) and not only position itself. This is done vie convolutional layer and...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: Positional embedding is an important component in transformers. Moreover, generalization ability to longer sequences with proper positional embedding is also hot topic. Current paper proposes a new positional embedding conditioned on the input (PEG) and not only position itself. This is done vie convolutional l...
The authors examine in depth the learning-sticking problem in early training of DNNs from the perspective of learning dynamics. They offer a novel explanation for what often happens to network weights and inner activations during the problem - which they call "the temporary feature collapse" (TFC) phenomenon They prov...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: The authors examine in depth the learning-sticking problem in early training of DNNs from the perspective of learning dynamics. They offer a novel explanation for what often happens to network weights and inner activations during the problem - which they call "the temporary feature collapse" (TFC) phenomenon T...
The authors proposed a rendering method for a neural radiance field. When marching on each light ray, the authors chose the sampling points using the idea of importance sampling; the samples are drawn in accordance with the contributions to the final rendered color. The method was designed so as to reduce the number of...
Recommendation: 3: reject, not good enough
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The authors proposed a rendering method for a neural radiance field. When marching on each light ray, the authors chose the sampling points using the idea of importance sampling; the samples are drawn in accordance with the contributions to the final rendered color. The method was designed so as to reduce the n...
This paper provides experiments suggesting that there is only a very small correlation between performance of a neural classifier on ImageNet and its performance (after fine-tuning) on datasets that are not web-scraped. The numerical experiment seem to be well conducted. Yet, the results of the paper are not very surp...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This paper provides experiments suggesting that there is only a very small correlation between performance of a neural classifier on ImageNet and its performance (after fine-tuning) on datasets that are not web-scraped. The numerical experiment seem to be well conducted. Yet, the results of the paper are not v...
Main concern. A catalog of experiments to find the best combination of positional encoders for any explored type of graphs. The most successful encoding (powers of adjacency matrices) is not scalable unless large graphs are previously sampled. The argument that the powers of adjacencies for small r=1,2 beats full atten...
Recommendation: 3: reject, not good enough
Area: Applications (eg, speech processing, computer vision, NLP)
Review: Main concern. A catalog of experiments to find the best combination of positional encoders for any explored type of graphs. The most successful encoding (powers of adjacency matrices) is not scalable unless large graphs are previously sampled. The argument that the powers of adjacencies for small r=1,2 beats fu...
The paper combines data replay and EWC into a single objective to tackle continual learning of tasks. Results confirm the benefit of combining an experience replay buffer to replay data from old tasks, and functional priors such as EWC. Authors perform several ablations on split CIFAR100, split mini imagenet and imag...
Recommendation: 3: reject, not good enough
Area: General Machine Learning
Review: The paper combines data replay and EWC into a single objective to tackle continual learning of tasks. Results confirm the benefit of combining an experience replay buffer to replay data from old tasks, and functional priors such as EWC. Authors perform several ablations on split CIFAR100, split mini imagenet ...
The paper proposes to enhance the transferability of adversarial examples by doing adversarial attacks using multiple data augmentation parallelly. Pros: 1. The paper study a novel problem of how data augmentation affects adversarial attacks' effectiveness. 2. The work considers multiple model architectures to test...
Recommendation: 3: reject, not good enough
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The paper proposes to enhance the transferability of adversarial examples by doing adversarial attacks using multiple data augmentation parallelly. Pros: 1. The paper study a novel problem of how data augmentation affects adversarial attacks' effectiveness. 2. The work considers multiple model architectures...
This paper proposes a hyper-graph neural network model, ED-HNN, that can model hypergraph diffusion process. They claimed that ED-HNN shows superiority in processing heterophilic hypergraphs and constructing deep models. **Strength:** - 1. The presentation is clear. - 2. The overall experiments show the superiorit...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposes a hyper-graph neural network model, ED-HNN, that can model hypergraph diffusion process. They claimed that ED-HNN shows superiority in processing heterophilic hypergraphs and constructing deep models. **Strength:** - 1. The presentation is clear. - 2. The overall experiments show the su...
This paper introduces two sources of noise applied during training to flatten the loss landscape and make weight more resilient to device variability: Hardware-simulated variation (HSA, gaussian noise which scales with the width of the weight distribution of each layer) and Gradient-ascent variation (GAV, added noise i...
Recommendation: 5: marginally below the acceptance threshold
Area: General Machine Learning
Review: This paper introduces two sources of noise applied during training to flatten the loss landscape and make weight more resilient to device variability: Hardware-simulated variation (HSA, gaussian noise which scales with the width of the weight distribution of each layer) and Gradient-ascent variation (GAV, added...
This work derives a new lower bound for the class of first-order methods applied to minimize $L$-smooth functions satisfying the Polyak-Łojasiewicz condition with parameter $\mu$. In particular, the authors derive $\Omega\left(\left(\frac{L}{\mu}\right)^{1 - \alpha}\right)$ lower bound for finding $\varepsilon$-solutio...
Recommendation: 3: reject, not good enough
Area: Optimization (eg, convex and non-convex optimization)
Review: This work derives a new lower bound for the class of first-order methods applied to minimize $L$-smooth functions satisfying the Polyak-Łojasiewicz condition with parameter $\mu$. In particular, the authors derive $\Omega\left(\left(\frac{L}{\mu}\right)^{1 - \alpha}\right)$ lower bound for finding $\varepsilon$...
This paper proposes a general framework Functional Risk Minimization (FRM), a general framework for scalable training objectives which results in better performance in small experiments in regression and reinforcement learning. FRM model each data point (x_i, y_i) as coming from its own function f_\theta_i. The authors...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposes a general framework Functional Risk Minimization (FRM), a general framework for scalable training objectives which results in better performance in small experiments in regression and reinforcement learning. FRM model each data point (x_i, y_i) as coming from its own function f_\theta_i. The...
This paper proposes a new backup operator that exploits potential graph structure in the observed transitions. The purpose of this backup operator is to increase data efficiency by allowing information to be backed-up further along state transitions and providing better value estimates. Their results demonstrate, rathe...
Recommendation: 5: marginally below the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper proposes a new backup operator that exploits potential graph structure in the observed transitions. The purpose of this backup operator is to increase data efficiency by allowing information to be backed-up further along state transitions and providing better value estimates. Their results demonstrat...
In this work, the authors propose a pretraining diffusion model for defending against 3D adversarial point clouds. They also shows the limitation of robust training for defense due to gradient obfuscation. The results have shown better qualitative performance than SOTA methods. Pros: +) The idea is clear and easy to ...
Recommendation: 5: marginally below the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: In this work, the authors propose a pretraining diffusion model for defending against 3D adversarial point clouds. They also shows the limitation of robust training for defense due to gradient obfuscation. The results have shown better qualitative performance than SOTA methods. Pros: +) The idea is clear and ...
This paper tackles the problem of quantity-quality trade-off in pseudo-labeling based semi-supervised learning. Specifically, the authors develop a truncated Gaussian function to weight samples based on their confidence, which can be viewed as a soft version of the confidence threshold. They also enhance the utilizatio...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: This paper tackles the problem of quantity-quality trade-off in pseudo-labeling based semi-supervised learning. Specifically, the authors develop a truncated Gaussian function to weight samples based on their confidence, which can be viewed as a soft version of the confidence threshold. They also enhance the ut...
The submission titled "Effective passive membership inference attacks in federated learning against overparameterized models" describes a well-motivated black-box membership inference attack that can be instantiated in a federated learning setting, i.e. this is an inference from user update/gradient to dataset membersh...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: The submission titled "Effective passive membership inference attacks in federated learning against overparameterized models" describes a well-motivated black-box membership inference attack that can be instantiated in a federated learning setting, i.e. this is an inference from user update/gradient to dataset ...
In this work, the authors theoretically quantify the maximization bias in generalized linear models with Gaussian distributions. In practice, the maximization bias often manifests itself in the calibration of online advertising recommendation system. The authors propose a variance-adjusting de-biasing meta-algorithm th...
Recommendation: 8: accept, good paper
Area: Applications (eg, speech processing, computer vision, NLP)
Review: In this work, the authors theoretically quantify the maximization bias in generalized linear models with Gaussian distributions. In practice, the maximization bias often manifests itself in the calibration of online advertising recommendation system. The authors propose a variance-adjusting de-biasing meta-algo...
This paper proposed a joint training framework of three components - instrument recognition, transcription and source separation. The instrument recognition module is optional and can be replaced by human inputs. The joint training of the transcription and source separation module was shown to be beneficial. The author...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper proposed a joint training framework of three components - instrument recognition, transcription and source separation. The instrument recognition module is optional and can be replaced by human inputs. The joint training of the transcription and source separation module was shown to be beneficial. Th...
This paper proposed a self-supervised visual backbone pretraining method for reward learning in control. The key idea is to formulate representation learning from egocentric videos as an offline goal-conditioned reinforcement learning problem, whose dual-form indicated a way to implement Value-Implicit Pre-training (VI...
Recommendation: 8: accept, good paper
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper proposed a self-supervised visual backbone pretraining method for reward learning in control. The key idea is to formulate representation learning from egocentric videos as an offline goal-conditioned reinforcement learning problem, whose dual-form indicated a way to implement Value-Implicit Pre-trai...
This paper studies preference-based offline reinforcement learning where we only have access to the preferences over offline trajectories. Compared to the standard offline RL setting, PbRL doesn't assume the reward function is available, which is more realistic. To solve the problem, the authors propose an iterative al...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper studies preference-based offline reinforcement learning where we only have access to the preferences over offline trajectories. Compared to the standard offline RL setting, PbRL doesn't assume the reward function is available, which is more realistic. To solve the problem, the authors propose an iter...
This paper proposes a method for learning from data following a mixture of distributions whose input-output relationships are different. The proposed method maintains multiple hypothesis functions accounting for those different distributions and minimizes the loss between the label and the closest output among those gi...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposes a method for learning from data following a mixture of distributions whose input-output relationships are different. The proposed method maintains multiple hypothesis functions accounting for those different distributions and minimizes the loss between the label and the closest output among ...
In this paper, the authors propose a new loss and evaluation metric based on persistence theory for matching different image segmentations. The proposed loss can be quite different from the usual Wasserstein distance between persistence diagrams, and is rather based on the algebraic foundations of persistence theory, w...
Recommendation: 6: marginally above the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: In this paper, the authors propose a new loss and evaluation metric based on persistence theory for matching different image segmentations. The proposed loss can be quite different from the usual Wasserstein distance between persistence diagrams, and is rather based on the algebraic foundations of persistence t...
The paper suggests a novel approach to extend neural networks during training using the functional gradient. The approach starts with an impoverished network and iteratively adds neurons to the network making sure to follow the true gradient direction. The authors mathematically derive an optimal technique to grow the ...
Recommendation: 3: reject, not good enough
Area: Optimization (eg, convex and non-convex optimization)
Review: The paper suggests a novel approach to extend neural networks during training using the functional gradient. The approach starts with an impoverished network and iteratively adds neurons to the network making sure to follow the true gradient direction. The authors mathematically derive an optimal technique to g...
This paper generalizes the recently proposed S4 model with an input dependent time constant used in state transition matrix and conduct thorough experiments to illustrate its benefits. Strengths: - Input dependent transition mechanism in state space models is a novel, important and natural extention of the original S4 ...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper generalizes the recently proposed S4 model with an input dependent time constant used in state transition matrix and conduct thorough experiments to illustrate its benefits. Strengths: - Input dependent transition mechanism in state space models is a novel, important and natural extention of the orig...
The authors proposes a new framework that tries to combine neural perception and symbolic reasoning. In general, this framework consists of three components: (1) Neural Solver (NS) (2) Mask Predictor (MP) and (3) Logical Solver (LS). The NS computes an initial solution for the input tasks, then the MP predicts the in...
Recommendation: 6: marginally above the acceptance threshold
Area: General Machine Learning
Review: The authors proposes a new framework that tries to combine neural perception and symbolic reasoning. In general, this framework consists of three components: (1) Neural Solver (NS) (2) Mask Predictor (MP) and (3) Logical Solver (LS). The NS computes an initial solution for the input tasks, then the MP predict...
The paper assumes limited label availability and propose a weighted multi-source distillation method, in practice that means distill multiple (diverse) source models trained on different domains, weighing them by their relevance for the target task, assuming such target task is available Strengths: - The paper shows th...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: The paper assumes limited label availability and propose a weighted multi-source distillation method, in practice that means distill multiple (diverse) source models trained on different domains, weighing them by their relevance for the target task, assuming such target task is available Strengths: - The paper ...
This paper considers a stochastic bandit model where the reward function belongs to a class of uniformly bounded functions and the additive noise can be heteroscedastic. A multi-level learning framework is proposed to tackle this general bandit model where this paper designs an algorithm to construct the variance-aware...
Recommendation: 6: marginally above the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: This paper considers a stochastic bandit model where the reward function belongs to a class of uniformly bounded functions and the additive noise can be heteroscedastic. A multi-level learning framework is proposed to tackle this general bandit model where this paper designs an algorithm to construct the varian...
This paper focuses on CNN compression using low-rank factorizations. In particular, the authors propose a new tensor decomposition called SeKron, which generalizes traditional TT, TR, CP and Tucker decomposition. The authors establish a SVD-based algorithm to decompose a given tensor into the SeKron format. Due to the ...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper focuses on CNN compression using low-rank factorizations. In particular, the authors propose a new tensor decomposition called SeKron, which generalizes traditional TT, TR, CP and Tucker decomposition. The authors establish a SVD-based algorithm to decompose a given tensor into the SeKron format. Due...
This paper addresses the problem of novel view synthesis from a set of input images. The authors presented a point-based method which is build on top of exsiting works on differentiable point-based rendering. They introduced point sculpting for pruning and adding points to improve the photo-consistency and completness ...
Recommendation: 8: accept, good paper
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper addresses the problem of novel view synthesis from a set of input images. The authors presented a point-based method which is build on top of exsiting works on differentiable point-based rendering. They introduced point sculpting for pruning and adding points to improve the photo-consistency and comp...
The paper presents oblivious sketches for logistic regression with significantly improved sketching sizes both in terms of $d$- the dimension of the data and $\mu$ the measure of complexity of compressing the data. The paper also gives sketches for the $\ell_1$ regression and variance regularized logistic regression. T...
Recommendation: 8: accept, good paper
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: The paper presents oblivious sketches for logistic regression with significantly improved sketching sizes both in terms of $d$- the dimension of the data and $\mu$ the measure of complexity of compressing the data. The paper also gives sketches for the $\ell_1$ regression and variance regularized logistic regre...
the submission compared convolution neural networks of the same building block and the transformer models on the impact of masked pre-training on downstream tasks including secondary structure predictions and protein design tasks. Results show that there isn't a significant difference between convolutional neural netwo...
Recommendation: 6: marginally above the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: the submission compared convolution neural networks of the same building block and the transformer models on the impact of masked pre-training on downstream tasks including secondary structure predictions and protein design tasks. Results show that there isn't a significant difference between convolutional neur...
The paper studied shape-conditioned 3D molecule generation, which aims to generate molecules with a desirable shape. The author proposed an encoder-decoder architecture, where the encoder can encode both molecular graph representation and molecular shape representation by point clouds. Specifically, the main difference...
Recommendation: 6: marginally above the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: The paper studied shape-conditioned 3D molecule generation, which aims to generate molecules with a desirable shape. The author proposed an encoder-decoder architecture, where the encoder can encode both molecular graph representation and molecular shape representation by point clouds. Specifically, the main di...
This paper studies ‘clone structured cognitive graphs’ (CSCG), a particular type of action-conditioned Hidden Markov Model (HMM) with specific assumptions on the emission function (deterministic emissions and partial observability, where multiple hidden states can generate the same observation). They investigate the ab...
Recommendation: 5: marginally below the acceptance threshold
Area: Neuroscience and Cognitive Science (e.g., neural coding, brain-computer interfaces)
Review: This paper studies ‘clone structured cognitive graphs’ (CSCG), a particular type of action-conditioned Hidden Markov Model (HMM) with specific assumptions on the emission function (deterministic emissions and partial observability, where multiple hidden states can generate the same observation). They investigat...
This paper proposes to use data programming to address the semi-supervised continuous learning, achieving the performance close to the fully supervised continual learning. Pros: * They consider a more realistic continual learning with only a few labeled data, and adopt a novel technique, data programming, to annotate t...
Recommendation: 5: marginally below the acceptance threshold
Area: General Machine Learning
Review: This paper proposes to use data programming to address the semi-supervised continuous learning, achieving the performance close to the fully supervised continual learning. Pros: * They consider a more realistic continual learning with only a few labeled data, and adopt a novel technique, data programming, to an...
A new a probabilistic model, named joint Gaussian mixture model(JGMM), is proposed for post-hoc explanations of deep neural networks. By jointly modeling the latent features of lower and higher layers with a joint GMM, JGMM, trained with a post-hoc EM algorithm, is capable of delivering both global explanations (like P...
Recommendation: 8: accept, good paper
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: A new a probabilistic model, named joint Gaussian mixture model(JGMM), is proposed for post-hoc explanations of deep neural networks. By jointly modeling the latent features of lower and higher layers with a joint GMM, JGMM, trained with a post-hoc EM algorithm, is capable of delivering both global explanations...
This paper tackles **unsupervised fair clustering**. The authors first propose **a black-box adversarial attack** on state-of-the-art fair clustering algorithms, effective on a toy dataset they propose as well as real datasets (MNIST, USPS, Office-31). In their threat model, an adversary can modify *the protected attri...
Recommendation: 8: accept, good paper
Area: Unsupervised and Self-supervised learning
Review: This paper tackles **unsupervised fair clustering**. The authors first propose **a black-box adversarial attack** on state-of-the-art fair clustering algorithms, effective on a toy dataset they propose as well as real datasets (MNIST, USPS, Office-31). In their threat model, an adversary can modify *the protect...
This paper proposes a neural architecture, combining the transformer model and normalizing flows, for multi-event forecasting of the time and location of discrete events. A variety of real spatio-temporal datasets are used to validate the state-of-the-art performance of the proposed method. Strength: - A new archite...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposes a neural architecture, combining the transformer model and normalizing flows, for multi-event forecasting of the time and location of discrete events. A variety of real spatio-temporal datasets are used to validate the state-of-the-art performance of the proposed method. Strength: - A new...
This paper proposed to iteratively optimize a system of one generator and multiple classifiers(scorers) for zero-shot generation tasks. It unified four multimodal generation tasks under the same framework. And experiments show that it can have a satisfactory generation ability on those tasks. Strengths: 1. This framewo...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposed to iteratively optimize a system of one generator and multiple classifiers(scorers) for zero-shot generation tasks. It unified four multimodal generation tasks under the same framework. And experiments show that it can have a satisfactory generation ability on those tasks. Strengths: 1. This...
This paper presents an improved design of spatial encoding for neural surface reconstruction methods, e.g. NeuS and VolSDF. Instead of using frequency positional encoding as in NeRF, the authors propose to explicitly encode the spatial information with multi-scale voxels storing feature vectors. In particular, the enco...
Recommendation: 5: marginally below the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper presents an improved design of spatial encoding for neural surface reconstruction methods, e.g. NeuS and VolSDF. Instead of using frequency positional encoding as in NeRF, the authors propose to explicitly encode the spatial information with multi-scale voxels storing feature vectors. In particular, ...
In this paper, the author proposed a new perspective for learning disentangled representation. The Euler encoding is introduced to force the latent space to achieve a linear disentangled representation. What's more, the author adopts the PCA, normalization layer, and Gaussian interpolation to address the issues caused ...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: In this paper, the author proposed a new perspective for learning disentangled representation. The Euler encoding is introduced to force the latent space to achieve a linear disentangled representation. What's more, the author adopts the PCA, normalization layer, and Gaussian interpolation to address the issues...
This paper introduces a method of decomposing games in low dimensional feature spaces called PTA. This method allows some characterization of game structure and allows for a general technique for visualizing data arising from competitive tasks or pairwise choice tasks. The relationships between embedding coordinates re...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper introduces a method of decomposing games in low dimensional feature spaces called PTA. This method allows some characterization of game structure and allows for a general technique for visualizing data arising from competitive tasks or pairwise choice tasks. The relationships between embedding coordi...
This paper proposes a bi-level optimization method to solve constrained PDE. The key is to compute a hyper-gradient with a high-efficiency and accuracy. The paper has some unclear notations, making it hard for me to understand the main results. The proposed method uses an interesting way to compute the hyper-gradients...
Recommendation: 6: marginally above the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: This paper proposes a bi-level optimization method to solve constrained PDE. The key is to compute a hyper-gradient with a high-efficiency and accuracy. The paper has some unclear notations, making it hard for me to understand the main results. The proposed method uses an interesting way to compute the hyper-g...
In this study an online feed-forward adaptation approach is proposed to address distribution shift in upcoming test data with respect to the training data. The core idea in feed-forward adaptation is finding a critical example from the memory, that is the most related to the current example, and adjust the model to pr...
Recommendation: 6: marginally above the acceptance threshold
Area: Optimization (eg, convex and non-convex optimization)
Review: In this study an online feed-forward adaptation approach is proposed to address distribution shift in upcoming test data with respect to the training data. The core idea in feed-forward adaptation is finding a critical example from the memory, that is the most related to the current example, and adjust the mod...
The paper extends targeted adversarial attacks to time series forecasting, and performs a statistical evaluation to demonstrate the effectiveness of the methods. The paper is clear and the experiments appear sound. The use of proper statistical tests is appreciated. However, I have serious concerns about the originalit...
Recommendation: 3: reject, not good enough
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The paper extends targeted adversarial attacks to time series forecasting, and performs a statistical evaluation to demonstrate the effectiveness of the methods. The paper is clear and the experiments appear sound. The use of proper statistical tests is appreciated. However, I have serious concerns about the or...
This paper introduces FLGAME, a defense against adaptive backdoor attacks. It formulates the compromised client attack and server defense as a form of minimax optimization where the clients want to maximize their contribution to the model update and the server wants to minimize malicious contribution. This optimization...
Recommendation: 5: marginally below the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper introduces FLGAME, a defense against adaptive backdoor attacks. It formulates the compromised client attack and server defense as a form of minimax optimization where the clients want to maximize their contribution to the model update and the server wants to minimize malicious contribution. This opti...
This paper proposes a supervised learning algorithm called Supervised Learning with Data Augmentation and Bidirectional Loss (SL-DABL) for traveling salesman problems (TSP). There are two components in the approach. The data augmentation method leverages several equivalence properties of traveling TSP, e.g., the optima...
Recommendation: 5: marginally below the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper proposes a supervised learning algorithm called Supervised Learning with Data Augmentation and Bidirectional Loss (SL-DABL) for traveling salesman problems (TSP). There are two components in the approach. The data augmentation method leverages several equivalence properties of traveling TSP, e.g., th...
The authors present trainability prerseving pruning (TPP), considering to maintain trainability for the pruned networks. The authors construct two regularization terms to achieve this goal. TTP decorrelates the pruned weights from the kept weights, thus achieves non-trivial improvement in pruning process. Strength: 1....
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: The authors present trainability prerseving pruning (TPP), considering to maintain trainability for the pruned networks. The authors construct two regularization terms to achieve this goal. TTP decorrelates the pruned weights from the kept weights, thus achieves non-trivial improvement in pruning process. Stre...
This work proposes Aggregation-Aware mixed-precision Quantization (A2Q) method to enable an adaptive learning of quantization parameters, which are innovatively linked to the topology of the graph, thus making more use of the graph information. A Local Gradient method is proposed to train the quantization parameters in...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This work proposes Aggregation-Aware mixed-precision Quantization (A2Q) method to enable an adaptive learning of quantization parameters, which are innovatively linked to the topology of the graph, thus making more use of the graph information. A Local Gradient method is proposed to train the quantization param...
This paper investigates the robustness of dynamic neural networks, focusing specifically on early exit networks. It does so by exploring how attacks generated using static networks transfer to dynamic networks and how the structure of dynamic networks provides another attack surface. In their majority most works appear...
Recommendation: 8: accept, good paper
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper investigates the robustness of dynamic neural networks, focusing specifically on early exit networks. It does so by exploring how attacks generated using static networks transfer to dynamic networks and how the structure of dynamic networks provides another attack surface. In their majority most work...
This paper concerns hierarchical reinforcement learning (RL) in safety critical scenarios. The critical aspect is captured via the inclusion of temporal logic constraints, in fact (a variant of) LTL. The key feature of this paper is that a quantitative notion of LTL is defined and used, to get a differentiable logic as...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper concerns hierarchical reinforcement learning (RL) in safety critical scenarios. The critical aspect is captured via the inclusion of temporal logic constraints, in fact (a variant of) LTL. The key feature of this paper is that a quantitative notion of LTL is defined and used, to get a differentiable ...
This paper proposed a method to mitigate backdoor attacks in federated learning by focusing on invariant directions of gradients and avoiding selecting directions that favor malicious clients. Strength: 1. This paper proposed a simple yet effective approach to mitigate backdoor attacks in FL. compared with previous rob...
Recommendation: 5: marginally below the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper proposed a method to mitigate backdoor attacks in federated learning by focusing on invariant directions of gradients and avoiding selecting directions that favor malicious clients. Strength: 1. This paper proposed a simple yet effective approach to mitigate backdoor attacks in FL. compared with prev...
The paper created a dataset to evaluate text-to-SQL systems on their robustness. The dataset, DR.SPIDER, is an extension of the openly available SPIDER dataset. It added perturbation to the natural language questions, SQL statements and example database (schema and values), so more robust text-to-SQL systems would have...
Recommendation: 8: accept, good paper
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The paper created a dataset to evaluate text-to-SQL systems on their robustness. The dataset, DR.SPIDER, is an extension of the openly available SPIDER dataset. It added perturbation to the natural language questions, SQL statements and example database (schema and values), so more robust text-to-SQL systems wo...
The authors propose a novel training strategy for neural ordinary differential equations (NODEs) by introducing a coupling term between the true dynamics and NODEs. They formulate the coupling-based training framework by using the homotopy optimization, which optimizes a homotopy between the simple coupled loss landsca...
Recommendation: 6: marginally above the acceptance threshold
Area: Optimization (eg, convex and non-convex optimization)
Review: The authors propose a novel training strategy for neural ordinary differential equations (NODEs) by introducing a coupling term between the true dynamics and NODEs. They formulate the coupling-based training framework by using the homotopy optimization, which optimizes a homotopy between the simple coupled loss...
This paper studies the knowledge graph-based recommendation problem. The authors firstly study the relationship between different SOTA methods. The authors also develop a model-agnostic cross-layer fusion mechanism to improve the performance of GNN. To demonstrate the effectiveness of the proposed method, the authors h...
Recommendation: 3: reject, not good enough
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper studies the knowledge graph-based recommendation problem. The authors firstly study the relationship between different SOTA methods. The authors also develop a model-agnostic cross-layer fusion mechanism to improve the performance of GNN. To demonstrate the effectiveness of the proposed method, the a...
The paper proposes a new setting of distributed kerneled contextual bandits: an asynchronous environment. For this setting, they propose an algorithm and show both theoretical and practical results. For the empirical results, they show the results on both synthetic and real-world data. The paper presents a new setting ...
Recommendation: 6: marginally above the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: The paper proposes a new setting of distributed kerneled contextual bandits: an asynchronous environment. For this setting, they propose an algorithm and show both theoretical and practical results. For the empirical results, they show the results on both synthetic and real-world data. The paper presents a new ...
The paper introduces a multi-scale conditional probability model to reconstruct and denoise images. Specifically, the scales come from wavelet transform, and they generalize Markov conditional models by parametrizing the conditional gradients with a CNN with a local receptive field. They show how their method performs ...
Recommendation: 8: accept, good paper
Area: Generative models
Review: The paper introduces a multi-scale conditional probability model to reconstruct and denoise images. Specifically, the scales come from wavelet transform, and they generalize Markov conditional models by parametrizing the conditional gradients with a CNN with a local receptive field. They show how their method p...
This paper introduces a novel bandit / active learning method tailored to the problem of single-gene interventions in cell biology experiments, where we can have batches of parallel interventions and only a few rounds of active learning are feasible. The new bandit method (Optimistic Arm Elimination or OAE) is based on...
Recommendation: 8: accept, good paper
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: This paper introduces a novel bandit / active learning method tailored to the problem of single-gene interventions in cell biology experiments, where we can have batches of parallel interventions and only a few rounds of active learning are feasible. The new bandit method (Optimistic Arm Elimination or OAE) is ...
This paper proves that SGD fits the training data whenever the average accuracy discrepancy over epoches, defined as the sum of accuracy improvement over batches, is large enough. Using a similar idea, this paper also proves GD needs a certain amount of randomness to escape local minimas efficiently. Strength: The ide...
Recommendation: 6: marginally above the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: This paper proves that SGD fits the training data whenever the average accuracy discrepancy over epoches, defined as the sum of accuracy improvement over batches, is large enough. Using a similar idea, this paper also proves GD needs a certain amount of randomness to escape local minimas efficiently. Strength: ...
This work proposes a novel modeling approach within the Bayesian optimization (BO) framework. More concretely, it proposes to use a (truncated) Poisson process to model the ranking induced by the underlying objective function over a feasible domain. It is argued that such an approach is more robust to noise in the obje...
Recommendation: 3: reject, not good enough
Area: General Machine Learning
Review: This work proposes a novel modeling approach within the Bayesian optimization (BO) framework. More concretely, it proposes to use a (truncated) Poisson process to model the ranking induced by the underlying objective function over a feasible domain. It is argued that such an approach is more robust to noise in ...
This paper aims to develop new stochastic algorithms for solving the popular KL-divergence-constrained distributionally robust optimization (DRO) problem for both non-convex and convex losses. The proposed method, SCDRO or its variants, establishes (near-)optimal oracle complexities for both convex and non-convex losse...
Recommendation: 6: marginally above the acceptance threshold
Area: Optimization (eg, convex and non-convex optimization)
Review: This paper aims to develop new stochastic algorithms for solving the popular KL-divergence-constrained distributionally robust optimization (DRO) problem for both non-convex and convex losses. The proposed method, SCDRO or its variants, establishes (near-)optimal oracle complexities for both convex and non-conv...
The paper tackles the model-based optimization problem for biological sequences. They extend the NTK-based bidirectional learning approach from previous work which essentially attempts to regularize according to features that transfer between low-fitness and high-fitness sequences. Their main contribution is twofold (1...
Recommendation: 5: marginally below the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: The paper tackles the model-based optimization problem for biological sequences. They extend the NTK-based bidirectional learning approach from previous work which essentially attempts to regularize according to features that transfer between low-fitness and high-fitness sequences. Their main contribution is tw...
The authors investigate multi-objective RL with thresholded lexicographic ordered objectives. The authors start by investigating the shortcomings of the existing TLQ algorithm. While some of these shortcomings are already known (for example Vamplew et. al.) the authors also show that TLQ does not work under certain cir...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The authors investigate multi-objective RL with thresholded lexicographic ordered objectives. The authors start by investigating the shortcomings of the existing TLQ algorithm. While some of these shortcomings are already known (for example Vamplew et. al.) the authors also show that TLQ does not work under cer...
The paper studies a neural operator-based surrogate model, called multi-scale neural operator. It keeps the known physics knowledge, but injects machine learning to learn the closure term. The paper studies the Lorenz 96 system. Strength: the paper raises a good point to only learn the closure using machine learning. T...
Recommendation: 5: marginally below the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: The paper studies a neural operator-based surrogate model, called multi-scale neural operator. It keeps the known physics knowledge, but injects machine learning to learn the closure term. The paper studies the Lorenz 96 system. Strength: the paper raises a good point to only learn the closure using machine lea...
Prompting has been an important strategy lately to query large language models (LLMs). Chain of thought (CoT) prompting has demonstrated state-of-the-art on many datasets by forcing the models to generate intermediate steps while solving a problem. Some other manual designs of prompts (for example, appending “let's sol...
Recommendation: 3: reject, not good enough
Area: Applications (eg, speech processing, computer vision, NLP)
Review: Prompting has been an important strategy lately to query large language models (LLMs). Chain of thought (CoT) prompting has demonstrated state-of-the-art on many datasets by forcing the models to generate intermediate steps while solving a problem. Some other manual designs of prompts (for example, appending “l...
The paper targets at improving the sampling efficiency of diffusion model via a semi-linear ODE methods, termed as Diffusion Exponential Integrator Sampler (DEIS). The paper is well motivated with experiment observations that the changes of noise predicted by the neural network is small for most of the sampling steps ...
Recommendation: 6: marginally above the acceptance threshold
Area: Generative models
Review: The paper targets at improving the sampling efficiency of diffusion model via a semi-linear ODE methods, termed as Diffusion Exponential Integrator Sampler (DEIS). The paper is well motivated with experiment observations that the changes of noise predicted by the neural network is small for most of the samplin...
This paper proposed a novel Decision Tree GNN architecture, which is fully explainable. DT+GNN firstly trains a fully differentiable layer that is restricted to categorical state spaces for nodes and messages. Secondly, they distill these layers into decision trees. Finally, pruned these trees to ensure they are small ...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposed a novel Decision Tree GNN architecture, which is fully explainable. DT+GNN firstly trains a fully differentiable layer that is restricted to categorical state spaces for nodes and messages. Secondly, they distill these layers into decision trees. Finally, pruned these trees to ensure they ar...
The authors address the problem of large solution spaces by decomposing problems into smaller subproblems and training agents to consider all feasible actions for the subproblems, hopefully enhancing transferability of solutions to new problems. They develop a generative model to produce all feasible actions and evalu...
Recommendation: 8: accept, good paper
Area: General Machine Learning
Review: The authors address the problem of large solution spaces by decomposing problems into smaller subproblems and training agents to consider all feasible actions for the subproblems, hopefully enhancing transferability of solutions to new problems. They develop a generative model to produce all feasible actions a...
The authors propose a novel method for reducing the dataset size by selecting the data that is close to the median error of the projection of each sample against the mean projection of all samples that belongs to the same class. The authors evaluate their results in three datasets, obtaining state-of-the-art results in...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: The authors propose a novel method for reducing the dataset size by selecting the data that is close to the median error of the projection of each sample against the mean projection of all samples that belongs to the same class. The authors evaluate their results in three datasets, obtaining state-of-the-art re...
In this paper, the authors get the parameter-based state-value function (PSVF) Faccio et al., 2021 to work. The motivation is simple, if there's a value function $V:\mathcal S\times\Theta\to\mathbb R$ which maps both a state and the parameters of a policy to an accurate cumulative discounted reward estimate, then the p...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: In this paper, the authors get the parameter-based state-value function (PSVF) Faccio et al., 2021 to work. The motivation is simple, if there's a value function $V:\mathcal S\times\Theta\to\mathbb R$ which maps both a state and the parameters of a policy to an accurate cumulative discounted reward estimate, th...
This paper shows that transformers can be represented by FO(M) formula (i.e. first-order logic with majority quantifiers), by showing that transformers can be compiled into a circuit in log-uniform $TC^0$, and then using the equivalence between log-uniform $TC^0$ and FO(M) provided in Barrington et al.1990. While the ...
Recommendation: 8: accept, good paper
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: This paper shows that transformers can be represented by FO(M) formula (i.e. first-order logic with majority quantifiers), by showing that transformers can be compiled into a circuit in log-uniform $TC^0$, and then using the equivalence between log-uniform $TC^0$ and FO(M) provided in Barrington et al.1990. Wh...
The reviewed work proposes a novel approach for representing solution operators of linear partial differentials as neural networks without the need for training data provided by solution pairs. Given an input function (right-hand side, initial conditions, boundary conditions, etc.) the proposed work uses a Fourier neur...
Recommendation: 5: marginally below the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: The reviewed work proposes a novel approach for representing solution operators of linear partial differentials as neural networks without the need for training data provided by solution pairs. Given an input function (right-hand side, initial conditions, boundary conditions, etc.) the proposed work uses a Four...
The authors propose a general framework for machine unlearning via (structured) adaptive algorithms. In machine unlearning, given a model trained via dataset S, one attempts to build algorithms which can efficiently remove any point z from the dataset post-training in such a way that the altered model is indistinguisha...
Recommendation: 6: marginally above the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The authors propose a general framework for machine unlearning via (structured) adaptive algorithms. In machine unlearning, given a model trained via dataset S, one attempts to build algorithms which can efficiently remove any point z from the dataset post-training in such a way that the altered model is indist...
The authors propose TCSR; they perform experiments to show that it improves upon EfficientZero and achieves SOTA performance on the Atari100K benchmark. This is an interesting and well-motivated paper studying an important topic. However, the contribution is entirely empirical (the contribution boils down to the prop...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The authors propose TCSR; they perform experiments to show that it improves upon EfficientZero and achieves SOTA performance on the Atari100K benchmark. This is an interesting and well-motivated paper studying an important topic. However, the contribution is entirely empirical (the contribution boils down to ...
This paper aims to utilize the retrieval image(s) for extending the model's ability for generating images. In this way, the model takes the text prompt as the input, by fusing with the noisy predicted by the retrieval images, it can generate the images that the dataset seldom contains. To balance the generation ability...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper aims to utilize the retrieval image(s) for extending the model's ability for generating images. In this way, the model takes the text prompt as the input, by fusing with the noisy predicted by the retrieval images, it can generate the images that the dataset seldom contains. To balance the generation...
> After the rebuttal: Some of my concerns have been resolved. However, the optimization theory still does not explain why $c_t = 0$ is not the optimal one. Since no theory shows that the generalization error of SA-FL is better than centralized learning. The whole story does not explain the empirical results. In this p...
Recommendation: 5: marginally below the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: > After the rebuttal: Some of my concerns have been resolved. However, the optimization theory still does not explain why $c_t = 0$ is not the optimal one. Since no theory shows that the generalization error of SA-FL is better than centralized learning. The whole story does not explain the empirical results. I...
This paper focuses on reducing the inference complexity of semi-Markov CRF and thus achieving better performance on NER by introducing a filtering step before forward algorithm and Viterbi decoding. More specifically, segments that are predicted to be null and whose label does not achieve the highest predicted score ac...
Recommendation: 5: marginally below the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper focuses on reducing the inference complexity of semi-Markov CRF and thus achieving better performance on NER by introducing a filtering step before forward algorithm and Viterbi decoding. More specifically, segments that are predicted to be null and whose label does not achieve the highest predicted ...
This paper introduced a new time series generative model called `Time-Transformer AAE` that consists of an adversarial autoencoder and a newly designed architecture called `Time-Transformer`, where temporal properties are learnt by both a TCN layer and a Transformer block. This model was proposed to better learn local ...
Recommendation: 5: marginally below the acceptance threshold
Area: Generative models
Review: This paper introduced a new time series generative model called `Time-Transformer AAE` that consists of an adversarial autoencoder and a newly designed architecture called `Time-Transformer`, where temporal properties are learnt by both a TCN layer and a Transformer block. This model was proposed to better lear...
In this paper the authors proposed to model clients in a federated learning (FL) setup as downstream tasks for large pre-trained models. The main component introduced by the authors is an accumulator module which is shared across the layers of a transformer and is learned based on a client token, CLS token and position...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: In this paper the authors proposed to model clients in a federated learning (FL) setup as downstream tasks for large pre-trained models. The main component introduced by the authors is an accumulator module which is shared across the layers of a transformer and is learned based on a client token, CLS token and ...
The authors present two algorithms for quantum optimization and machine learning based on the Koopman operator. They test their algorithm with simulations and a small hardware experiment. + the Koopam operator optimization method may turn out to be interesting for learning - there is hardly any strong evidence in this ...
Recommendation: 3: reject, not good enough
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: The authors present two algorithms for quantum optimization and machine learning based on the Koopman operator. They test their algorithm with simulations and a small hardware experiment. + the Koopam operator optimization method may turn out to be interesting for learning - there is hardly any strong evidence ...
This paper introduces a new setting which utilizes resetting to previously visited states in the trajectory and continuing on from there. The objective is then defined as the max return over the resulting trajectory tree. The paper shows that directly optimizing for this objective results in stochastic, exploratory pol...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper introduces a new setting which utilizes resetting to previously visited states in the trajectory and continuing on from there. The objective is then defined as the max return over the resulting trajectory tree. The paper shows that directly optimizing for this objective results in stochastic, explora...
This paper studies the constrained robust MDP problem where the goal is to learn a policy that maximizes the expected rewards, subject to the safety constraint that the expected cost exceeds certain thresholds. Moreover, the transition model is chosen from an ambiguity set. As a result, the goal is to maximize the rewa...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper studies the constrained robust MDP problem where the goal is to learn a policy that maximizes the expected rewards, subject to the safety constraint that the expected cost exceeds certain thresholds. Moreover, the transition model is chosen from an ambiguity set. As a result, the goal is to maximize ...
The paper tackles a key problem in disentanglement - the independence assumption made by most methods does not hold in practice. Instead, the paper suggests requiring independent supports between factors which can be satisfied even when correlation exists. The paper proposes to measure support independence by the empir...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: The paper tackles a key problem in disentanglement - the independence assumption made by most methods does not hold in practice. Instead, the paper suggests requiring independent supports between factors which can be satisfied even when correlation exists. The paper proposes to measure support independence by t...
This work builds a new convergence analysis framework for SGD algorithm (with momentum). It proposes a special family functions of ”Spectrally Expressible” approximations, which provides a new perspective to understand the behavior of classical SGD. A specific senario where a negative momenta can be the optimal choice ...
Recommendation: 8: accept, good paper
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: This work builds a new convergence analysis framework for SGD algorithm (with momentum). It proposes a special family functions of ”Spectrally Expressible” approximations, which provides a new perspective to understand the behavior of classical SGD. A specific senario where a negative momenta can be the optimal...
This paper proposed an end-to-end implicit symbolic representation learning framework for visual reasoning tasks. It wisely adopts slot tokens for its bottleneck information properties, masked autoencoding objective, and transformers to learn implicit representations in a self-supervised way. The learned implicit repre...
Recommendation: 6: marginally above the acceptance threshold
Area: Unsupervised and Self-supervised learning
Review: This paper proposed an end-to-end implicit symbolic representation learning framework for visual reasoning tasks. It wisely adopts slot tokens for its bottleneck information properties, masked autoencoding objective, and transformers to learn implicit representations in a self-supervised way. The learned implic...
In this paper, the authors propose a new sparse neural network training method. The key component in the proposed method is called Gradient Annealing (GA). GA can automatically find a sparse subnetwork in the end of training. The authors also propose some tricks to sparsify the computation in training. A series of expe...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: In this paper, the authors propose a new sparse neural network training method. The key component in the proposed method is called Gradient Annealing (GA). GA can automatically find a sparse subnetwork in the end of training. The authors also propose some tricks to sparsify the computation in training. A series...
The paper proposes a new convex relaxation for the high-dimensional group-sparse recovery problem. It builds on the boolean relaxation from element-wise sparsity from previous work. In experiments the method is shown to improve individual feature and group-recovery upon existing sparse-group-lasso family of methods i...
Recommendation: 6: marginally above the acceptance threshold
Area: General Machine Learning
Review: The paper proposes a new convex relaxation for the high-dimensional group-sparse recovery problem. It builds on the boolean relaxation from element-wise sparsity from previous work. In experiments the method is shown to improve individual feature and group-recovery upon existing sparse-group-lasso family of m...
The other suggest to extend the multi-objective optimization (MOO) method. Their new proposed method is called Task Oriented MOO. They claim that naive MOO invest useless effort in trying to maximize already achieved goals, their method let the optimizer spend more effort on improving the goal-unachieved tasks. They fo...
Recommendation: 8: accept, good paper
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The other suggest to extend the multi-objective optimization (MOO) method. Their new proposed method is called Task Oriented MOO. They claim that naive MOO invest useless effort in trying to maximize already achieved goals, their method let the optimizer spend more effort on improving the goal-unachieved tasks....
Reinforcement learning has led to empirical success in complex tasks with continuous state-action spaces in the contexts of game-based and robotics simulations. Theoretically current tools seem to suggest poor performance - due to the "exponential" scale of the state space representation, even when using strong functi...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: Reinforcement learning has led to empirical success in complex tasks with continuous state-action spaces in the contexts of game-based and robotics simulations. Theoretically current tools seem to suggest poor performance - due to the "exponential" scale of the state space representation, even when using stron...
This paper proposes a retriever+reader model for knowledge-base question answering (KBQA) where the retriever and readers are models that are usually used for open-domain textual question answering - e.g. BM25/DPR models for retriever and FiD model as the reader. The KB triples are first linearized into text. Each trip...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper proposes a retriever+reader model for knowledge-base question answering (KBQA) where the retriever and readers are models that are usually used for open-domain textual question answering - e.g. BM25/DPR models for retriever and FiD model as the reader. The KB triples are first linearized into text. E...
This paper provides extensive experimentation on how state of the art deepfake detectors behave on diffusion model generated images. They also propose an analysis in the frequency domain of diffusion model generated images compared to GAN and real images. Strength: - extensive experimentation on said state of the art ...
Recommendation: 6: marginally above the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper provides extensive experimentation on how state of the art deepfake detectors behave on diffusion model generated images. They also propose an analysis in the frequency domain of diffusion model generated images compared to GAN and real images. Strength: - extensive experimentation on said state of ...
This work deals with the knowledge distillation between the GNNs and MLPs from the perspectives of effectiveness and the robustness, and proposes a method NOSMOG to learn structure aware and noise robust MLP. For effectiveness, NOSMOG uses position encoding to capture graph structure information and combines it with or...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: This work deals with the knowledge distillation between the GNNs and MLPs from the perspectives of effectiveness and the robustness, and proposes a method NOSMOG to learn structure aware and noise robust MLP. For effectiveness, NOSMOG uses position encoding to capture graph structure information and combines it...
Positional embedding is an important component of transformer to give position information and also provide better generalization and usage of longer context. Recently several papers attempted to resolve the problem of generalization to longer sequences as well as better designing relative positional embedding. The mai...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: Positional embedding is an important component of transformer to give position information and also provide better generalization and usage of longer context. Recently several papers attempted to resolve the problem of generalization to longer sequences as well as better designing relative positional embedding....
The paper proposes a novel approach to detect adversarial state manipulations in deep Reinforcement Learning (RL). It provides a theoretical analysis that motivates that second-order gradient information w.r.t. a cost function contains information that allows to identifiy non-robust directions (SO-INRD) and, thus, adve...
Recommendation: 8: accept, good paper
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The paper proposes a novel approach to detect adversarial state manipulations in deep Reinforcement Learning (RL). It provides a theoretical analysis that motivates that second-order gradient information w.r.t. a cost function contains information that allows to identifiy non-robust directions (SO-INRD) and, th...
The paper investigates 'class interference', i.e. how does update on one class affect the others. The work looks into the flatness of the minima for the converged models of two architectures (VGG and ResNet) trained with three different hyper parameter settings (smaller lr, larger lr and annealed lr). Finally, the auth...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: The paper investigates 'class interference', i.e. how does update on one class affect the others. The work looks into the flatness of the minima for the converged models of two architectures (VGG and ResNet) trained with three different hyper parameter settings (smaller lr, larger lr and annealed lr). Finally, ...
This paper proposes a continuous formulation of GFlowNet, for both the action and state spaces, by converting those spaces into continuous spaces and converting the sums of flow-matching into integrals. This yields a continuous flow matching objective which in practice is estimated by Monte Carlo integration. The autho...
Recommendation: 8: accept, good paper
Area: Generative models
Review: This paper proposes a continuous formulation of GFlowNet, for both the action and state spaces, by converting those spaces into continuous spaces and converting the sums of flow-matching into integrals. This yields a continuous flow matching objective which in practice is estimated by Monte Carlo integration. T...