review stringlengths 5 16.6k | score stringclasses 5
values | area stringclasses 12
values | text stringlengths 31 5.65k |
|---|---|---|---|
The paper studies the domain adaptation when the target domain is unlabeled. A black-box predictor trained on the source domain is employed to assign noisy/pseudo labels to the unlabeled target domain data. In this way, the problem is transformed to learning with noisy labels. The noisy label problem is further solved ... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
The paper studies the domain adaptation when the target domain is unlabeled. A black-box predictor trained on the source domain is employed to assign noisy/pseudo labels to the unlabeled target domain data. In this way, the problem is transformed to learning with noisy labels. The noisy label problem is further... |
The paper proposes to formulate some algorithmic losses (e.g. sorting) as bi-level optimization problems and solve the inner problem with second-order optimization. It reports performance gains over regular optimization
Strengths:
* The performance improvements are consistent across the experiments.
Weaknesses:
* I fi... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
The paper proposes to formulate some algorithmic losses (e.g. sorting) as bi-level optimization problems and solve the inner problem with second-order optimization. It reports performance gains over regular optimization
Strengths:
* The performance improvements are consistent across the experiments.
Weaknesses... |
This paper aims at avoiding computing radiance in less contributive parts by reparameterizing the sampling algorithm. This can help decrease the number of evaluations to MLPs. This sounds reasonable. But the experiments do not meet the authors’ expectations. First, decreasing the MLP evaluations should indeed improve e... | Recommendation: 5: marginally below the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper aims at avoiding computing radiance in less contributive parts by reparameterizing the sampling algorithm. This can help decrease the number of evaluations to MLPs. This sounds reasonable. But the experiments do not meet the authors’ expectations. First, decreasing the MLP evaluations should indeed i... |
The authors use spiking neural networks for image classification. They use time-to-first-spike (TTFS) coding. After a neuron has fired, any eventual subsequent spike is blocked. Training is done with a surrogate gradient.
STRENGTHS:
TTFS is appealing because it consumes few spikes, therefore little energy
WEAKNESSES:... | Recommendation: 3: reject, not good enough | Area: General Machine Learning | Review:
The authors use spiking neural networks for image classification. They use time-to-first-spike (TTFS) coding. After a neuron has fired, any eventual subsequent spike is blocked. Training is done with a surrogate gradient.
STRENGTHS:
TTFS is appealing because it consumes few spikes, therefore little energy
WEA... |
This work proposes to use monotone and orthogonal operator to build implicit graph neural network. The adopted approach is well build upon monotone operator theory. The new operators allows more stable (via orthogonal operator) or expressive (via monotone operator) implicit GNN models with provable convergence. The dis... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This work proposes to use monotone and orthogonal operator to build implicit graph neural network. The adopted approach is well build upon monotone operator theory. The new operators allows more stable (via orthogonal operator) or expressive (via monotone operator) implicit GNN models with provable convergence.... |
The authors show that across a range of tasks, the performance of Adam improves more as the batch size rises than the performance of SGD. In the full batch limit, Adam continues to significantly outperform SGD on language tasks. Based on this observation, they argue that the benefits of Adam are best studied in the ful... | Recommendation: 6: marginally above the acceptance threshold | Area: Optimization (eg, convex and non-convex optimization) | Review:
The authors show that across a range of tasks, the performance of Adam improves more as the batch size rises than the performance of SGD. In the full batch limit, Adam continues to significantly outperform SGD on language tasks. Based on this observation, they argue that the benefits of Adam are best studied in... |
This paper showed several interesting findings:
1. showed that the scaling laws fits well to the empirical test-cross entropy performance of a model at the end of the training.
2. showed that not all the fitted coefficients of the scaling laws vary that much when we change the sampling rate. Specifically, alpha and L ... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper showed several interesting findings:
1. showed that the scaling laws fits well to the empirical test-cross entropy performance of a model at the end of the training.
2. showed that not all the fitted coefficients of the scaling laws vary that much when we change the sampling rate. Specifically, alph... |
This paper provides a very comprehensive empirical analysis of predicting the test set performance on NLP tasks, and reveals several interesting properties like shape based metrics are generally better than scale based ones, and some fitting strategies (for empirical spectral densities of a weight matric) like E-TPL co... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper provides a very comprehensive empirical analysis of predicting the test set performance on NLP tasks, and reveals several interesting properties like shape based metrics are generally better than scale based ones, and some fitting strategies (for empirical spectral densities of a weight matric) like ... |
The paper proposed a GAN-based video generative model that is based upon StyleGAN-V while producing videos with significantly fewer artifacts. The paper first outlined several common artifacts seen in the videos produced by StyleGAN-V, and then provided an extensive set of targeted solutions:
1. Alias-free techniques f... | Recommendation: 6: marginally above the acceptance threshold | Area: Generative models | Review:
The paper proposed a GAN-based video generative model that is based upon StyleGAN-V while producing videos with significantly fewer artifacts. The paper first outlined several common artifacts seen in the videos produced by StyleGAN-V, and then provided an extensive set of targeted solutions:
1. Alias-free tech... |
The manuscript proposed an adaptive data weighting algorithm for 3D medical image segmentation. The proposed algorithm dynamically adjusts weights between supervised loss and self-supervised consistency loss during model training. The weights are adjusted by the values of loss terms on-the-fly. And the self-supervised ... | Recommendation: 3: reject, not good enough | Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability ) | Review:
The manuscript proposed an adaptive data weighting algorithm for 3D medical image segmentation. The proposed algorithm dynamically adjusts weights between supervised loss and self-supervised consistency loss during model training. The weights are adjusted by the values of loss terms on-the-fly. And the self-sup... |
This paper discusses the fundamental problem for certification using piece-wise linear activations like ReLU. Lipschitz-based certification is mainly investigated and advocated with smooth activations.
### Strength
The authors present an interesting theoretical discussion regarding Lipschitz-based certification with r... | Recommendation: 5: marginally below the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
This paper discusses the fundamental problem for certification using piece-wise linear activations like ReLU. Lipschitz-based certification is mainly investigated and advocated with smooth activations.
### Strength
The authors present an interesting theoretical discussion regarding Lipschitz-based certificatio... |
This paper follows BGRL, and notices that it generalizes poorly due to a lack of negative examples.
They propose a non-contrastive framework for link prediction named T-BGRL that uses cheap “negative” samples to improve generalization.
Experiments show that T-BGRL improves BGRL’s inductive performance in 5/6 datasets ... | Recommendation: 6: marginally above the acceptance threshold | Area: Unsupervised and Self-supervised learning | Review:
This paper follows BGRL, and notices that it generalizes poorly due to a lack of negative examples.
They propose a non-contrastive framework for link prediction named T-BGRL that uses cheap “negative” samples to improve generalization.
Experiments show that T-BGRL improves BGRL’s inductive performance in 5/6 d... |
This paper applies VisionTransformer for Multivariate Time-Series Classification (VitMTSC) model that learns latent features from raw time-series data for classification tasks and is applicable to large-scale time-series data with millions of data samples of variable lengths. Their results show that it's can obtain nea... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper applies VisionTransformer for Multivariate Time-Series Classification (VitMTSC) model that learns latent features from raw time-series data for classification tasks and is applicable to large-scale time-series data with millions of data samples of variable lengths. Their results show that it's can ob... |
This paper introduces a framework for analyzing the regret of risk-aware RL policy with coherent risk measures. The framework is based on an episodic finite-horizon Markov decision process (MDP) instead of the MDP with a discounted factor and infinite horizon. Under this framework, this paper proposes a Risk-Aware Uppe... | Recommendation: 8: accept, good paper | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
This paper introduces a framework for analyzing the regret of risk-aware RL policy with coherent risk measures. The framework is based on an episodic finite-horizon Markov decision process (MDP) instead of the MDP with a discounted factor and infinite horizon. Under this framework, this paper proposes a Risk-Aw... |
This paper investigates an interesting problem, whether text-to-image generation model can help image recognition through synthetic data.
The problem is interesting, and could be potentially useful in real world applications.
The paper conduct different experiments to investigate how do the synthetic data from generat... | Recommendation: 6: marginally above the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper investigates an interesting problem, whether text-to-image generation model can help image recognition through synthetic data.
The problem is interesting, and could be potentially useful in real world applications.
The paper conduct different experiments to investigate how do the synthetic data from... |
Authors propose novel theoretical framework based on Girsanov formula to learn sampler based on reversing diffusion process from non-normalised density function.
Strength: novel theoretical approach to sampling from non-normalised density
Weakness: absent experimental comparison with Langevin Monte-Carlo methods as th... | Recommendation: 6: marginally above the acceptance threshold | Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes) | Review:
Authors propose novel theoretical framework based on Girsanov formula to learn sampler based on reversing diffusion process from non-normalised density function.
Strength: novel theoretical approach to sampling from non-normalised density
Weakness: absent experimental comparison with Langevin Monte-Carlo metho... |
This paper studies how to speed up cross-silo federated learning, in which different silos need to have multiple peer-to-peer communication/synchronization at each round. Following previous works, this paper proposes a new efficient communication topology based on multigraph. Extensive experiments on multiple datasets ... | Recommendation: 5: marginally below the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
This paper studies how to speed up cross-silo federated learning, in which different silos need to have multiple peer-to-peer communication/synchronization at each round. Following previous works, this paper proposes a new efficient communication topology based on multigraph. Extensive experiments on multiple d... |
The paper presents a new architecture for generative modeling that makes use of hyperbolic geometry. Specifically, the builds on Chen et al 2022 to propose a generative framework that combines both Autoencoders and GANs. Additionally, the paper also a presents a new method for splitting and concatenating vectors in the... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
The paper presents a new architecture for generative modeling that makes use of hyperbolic geometry. Specifically, the builds on Chen et al 2022 to propose a generative framework that combines both Autoencoders and GANs. Additionally, the paper also a presents a new method for splitting and concatenating vector... |
This paper focuses on developing a new type of embeddings for texts (sentences or documents, but not words).
The proposed method's basic idea is to consider actual weights in the trained models (seem to assume language models).
Then, the method computes the weight difference between the original and micro-tuned ones (... | Recommendation: 5: marginally below the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper focuses on developing a new type of embeddings for texts (sentences or documents, but not words).
The proposed method's basic idea is to consider actual weights in the trained models (seem to assume language models).
Then, the method computes the weight difference between the original and micro-tune... |
Wav2vec 2.0 is widespread among speech community and used extensively to pre-train speech models for later fin-tuning on the speech recognition task. The downsides of wav2vec 2.0 is necessity of huge resources to get state-of-the-art on Librispeech, hard to tune as there are a lot of hyper-parameters and also contrasti... | Recommendation: 5: marginally below the acceptance threshold | Area: Unsupervised and Self-supervised learning | Review:
Wav2vec 2.0 is widespread among speech community and used extensively to pre-train speech models for later fin-tuning on the speech recognition task. The downsides of wav2vec 2.0 is necessity of huge resources to get state-of-the-art on Librispeech, hard to tune as there are a lot of hyper-parameters and also c... |
This paper presents a decoding algorithm that reduces (racial, gender) bias and toxicity in the generated outputs of language models. The proposed algorithm consists of token-level and context-dependent components that modify the bias terms of selected or all the layers of a language model at decoding time to suppress ... | Recommendation: 8: accept, good paper | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
This paper presents a decoding algorithm that reduces (racial, gender) bias and toxicity in the generated outputs of language models. The proposed algorithm consists of token-level and context-dependent components that modify the bias terms of selected or all the layers of a language model at decoding time to s... |
This paper considers offline reinforcement learning in the presence of unobserved confounding. There are two observations. First, including the "expert recommended" action (from the behavioral policy) as part of the state is helpful, because this action was informed by the unobserved confounder. Second, if there are pr... | Recommendation: 5: marginally below the acceptance threshold | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
This paper considers offline reinforcement learning in the presence of unobserved confounding. There are two observations. First, including the "expert recommended" action (from the behavioral policy) as part of the state is helpful, because this action was informed by the unobserved confounder. Second, if ther... |
This paper analyzes classifier-guided sampling of diffusion models and observes that applying higher-order methods for accelerated sampling from the model does not work well in the guidance scenario. The root cause for that is that the additional guidance term defined by the classifier makes the generative ODE harder t... | Recommendation: 6: marginally above the acceptance threshold | Area: Generative models | Review:
This paper analyzes classifier-guided sampling of diffusion models and observes that applying higher-order methods for accelerated sampling from the model does not work well in the guidance scenario. The root cause for that is that the additional guidance term defined by the classifier makes the generative ODE ... |
This paper presents analysis and empirical findings of distilling knowledge from large image-text foundational models (e.g. CLIP). The key observations are 1) resistance to the capacity gap of the teacher/student models, 2) the image-text models are not overconfident on the wrong labels.
Strength:
* The problem of dis... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
This paper presents analysis and empirical findings of distilling knowledge from large image-text foundational models (e.g. CLIP). The key observations are 1) resistance to the capacity gap of the teacher/student models, 2) the image-text models are not overconfident on the wrong labels.
Strength:
* The proble... |
This paper presents PONET to fuse multi-modal data for making survival predictions. Specifically, a spare biological pathway-informed embedding network (Han et al., 2018; Elmarakeby et al., 2021) is used to deal with genomic data to reveal meaningful biological interpretations. To capture modality-specific information,... | Recommendation: 5: marginally below the acceptance threshold | Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability ) | Review:
This paper presents PONET to fuse multi-modal data for making survival predictions. Specifically, a spare biological pathway-informed embedding network (Han et al., 2018; Elmarakeby et al., 2021) is used to deal with genomic data to reveal meaningful biological interpretations. To capture modality-specific info... |
The paper finds a "circuit" (in this case, a subset of attention heads), C, that is meant to explain how GPT-2 small solves a particular synthetic task named Indirect Object Identification (IOI).
This task composes 15 templates of forms like "Then, [B] and [A] went to the [PLACE]. [B] gave a [OBJECT] to [A]".
The goal ... | Recommendation: 3: reject, not good enough | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
The paper finds a "circuit" (in this case, a subset of attention heads), C, that is meant to explain how GPT-2 small solves a particular synthetic task named Indirect Object Identification (IOI).
This task composes 15 templates of forms like "Then, [B] and [A] went to the [PLACE]. [B] gave a [OBJECT] to [A]".
T... |
The adaptive version of the online adaptive topic-aware influence maximization problem is considered in this work, where its primary objective is the spreading of specific content in social networks. The problem is formulated as an infinite-horizon discounted MDP, and a model-based reinforcement algorithmic scheme, cal... | Recommendation: 3: reject, not good enough | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
The adaptive version of the online adaptive topic-aware influence maximization problem is considered in this work, where its primary objective is the spreading of specific content in social networks. The problem is formulated as an infinite-horizon discounted MDP, and a model-based reinforcement algorithmic sch... |
This paper proposes a new approach to message classification. Specifically:
* It is based on SOTA NLP building blocks.
* It has a novel technique to infuse metadata.
This paper shows that:
* Adding metadata increase the performance of their model.
* Their ulti-modality building block outperforms other methods.
Stre... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
This paper proposes a new approach to message classification. Specifically:
* It is based on SOTA NLP building blocks.
* It has a novel technique to infuse metadata.
This paper shows that:
* Adding metadata increase the performance of their model.
* Their ulti-modality building block outperforms other method... |
The focus of this paper is deep machine unlearning. This problem refers to removing the influence of a subset of data from the weights of a trained deep model. For instance, an application of this kind of method is to remove user data to guarantee their "right to be forgotten." Other applications include removing noisy... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
The focus of this paper is deep machine unlearning. This problem refers to removing the influence of a subset of data from the weights of a trained deep model. For instance, an application of this kind of method is to remove user data to guarantee their "right to be forgotten." Other applications include removi... |
This paper proposes a model for coarse-to-fine point cloud completion. The model first extracts global features from a partial input, then produces a coarse point cloud which is fed to several blocks in a sequential manner, each increasing the number of output points and modifying them. Overall, architecture heavily re... | Recommendation: 6: marginally above the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper proposes a model for coarse-to-fine point cloud completion. The model first extracts global features from a partial input, then produces a coarse point cloud which is fed to several blocks in a sequential manner, each increasing the number of output points and modifying them. Overall, architecture he... |
This paper proposes a novel method to generate realistic images on the target sparse domain by transferring a large-scale generator from the source domain without retraining the generator. Also, the proposed method can generate diverse target samples. The key idea is to solve an optimization problem on the latent domai... | Recommendation: 8: accept, good paper | Area: Generative models | Review:
This paper proposes a novel method to generate realistic images on the target sparse domain by transferring a large-scale generator from the source domain without retraining the generator. Also, the proposed method can generate diverse target samples. The key idea is to solve an optimization problem on the late... |
This paper proposes a new distributional RL algorithm named SinkhornDRL, which proposes to solve the distribution matching problem in distributional RL with Sinkhorn divergence.
Sinkhorn divergence in formulation is equivalent to an entropy-regularized version of MMD, and it could be featured as an interpolation betw... | Recommendation: 3: reject, not good enough | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper proposes a new distributional RL algorithm named SinkhornDRL, which proposes to solve the distribution matching problem in distributional RL with Sinkhorn divergence.
Sinkhorn divergence in formulation is equivalent to an entropy-regularized version of MMD, and it could be featured as an interpolat... |
This work proposes a contrastive learning method for self-supervised node-level tasks in graph domain. It involves (1) sampling positive samples from the first order neighbourhoods and (2) kernelizing negative loss to reduce the training time and memory overheads.
The main contribution of this paper is presenting a sim... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This work proposes a contrastive learning method for self-supervised node-level tasks in graph domain. It involves (1) sampling positive samples from the first order neighbourhoods and (2) kernelizing negative loss to reduce the training time and memory overheads.
The main contribution of this paper is presenti... |
The paper studies federated optimization under strong convexity and second-order similarity assumptions. Using the idea of trading off local computational cost for less communication, the paper proposes a new algorithm SVRP based on proximal point methods and variance reduction (SVRG). With client sampling, SVRP can ac... | Recommendation: 6: marginally above the acceptance threshold | Area: Optimization (eg, convex and non-convex optimization) | Review:
The paper studies federated optimization under strong convexity and second-order similarity assumptions. Using the idea of trading off local computational cost for less communication, the paper proposes a new algorithm SVRP based on proximal point methods and variance reduction (SVRG). With client sampling, SVR... |
The paper "Localized Graph Contrastive Learning" suggests a contrastive learning method (Local-GCL) for graph data, based on the InfoNCE loss. In this setting, each graph node is associated with a feature vector, and the goal is to learn a meaningful representation of the graph nodes (representation quality can be meas... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
The paper "Localized Graph Contrastive Learning" suggests a contrastive learning method (Local-GCL) for graph data, based on the InfoNCE loss. In this setting, each graph node is associated with a feature vector, and the goal is to learn a meaningful representation of the graph nodes (representation quality can... |
The paper analyses tree architectures for neural trees ensembles via NTK. Authors provide important insights on how the structure of trees affects NTK and consider depth limit of NTK. Experimental results are based on kernel regression with arising NTK.
Strength:
-- rigorous theoretical analysis
-- comparison of differ... | Recommendation: 6: marginally above the acceptance threshold | Area: General Machine Learning | Review:
The paper analyses tree architectures for neural trees ensembles via NTK. Authors provide important insights on how the structure of trees affects NTK and consider depth limit of NTK. Experimental results are based on kernel regression with arising NTK.
Strength:
-- rigorous theoretical analysis
-- comparison o... |
This paper proposes to use the "linear probing then fine-tuning" strategy (LP-FT) introduced in [1], as well as the firth bias reduction (FBR) introduced in [2], to learn the adaptation to novel-classes step in few-shot learning. The proposed method is evaluated on a variety of FSL tasks and demonstrate good results in... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper proposes to use the "linear probing then fine-tuning" strategy (LP-FT) introduced in [1], as well as the firth bias reduction (FBR) introduced in [2], to learn the adaptation to novel-classes step in few-shot learning. The proposed method is evaluated on a variety of FSL tasks and demonstrate good re... |
The Author's investigation reveals critical insights into the gap of uniform convergence for analyzing pre-trained representations, their stochastic nature under gradient descent optimization, what model convergence means to them, and how they might interact with downstream tasks. Authors propose a simple approach whic... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
The Author's investigation reveals critical insights into the gap of uniform convergence for analyzing pre-trained representations, their stochastic nature under gradient descent optimization, what model convergence means to them, and how they might interact with downstream tasks. Authors propose a simple appro... |
The authors propose a technique to learn a globally Lipschitz function when the data lie near a manifold. They derive a suitable constrained optimization problem together with the associated optimization scheme. Theoretical results are provided which show that under some conditions it is sensible to solve the empirical... | Recommendation: 6: marginally above the acceptance threshold | Area: Optimization (eg, convex and non-convex optimization) | Review:
The authors propose a technique to learn a globally Lipschitz function when the data lie near a manifold. They derive a suitable constrained optimization problem together with the associated optimization scheme. Theoretical results are provided which show that under some conditions it is sensible to solve the e... |
In this paper, the authors present a formulation to create a trainable activation function based on a convex combination of other activations.
This new mixture approach is intended to work on physics-informed neural networks (PINNd) where higher order derivatives play a role, thus causing problems for some of the piece... | Recommendation: 8: accept, good paper | Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability ) | Review:
In this paper, the authors present a formulation to create a trainable activation function based on a convex combination of other activations.
This new mixture approach is intended to work on physics-informed neural networks (PINNd) where higher order derivatives play a role, thus causing problems for some of t... |
This paper propose TECO (Temporal Consistent Video Transformer) for long-term video prediction. To make video prediction on long videos feasible, TECO trains on pretrained VQ-GAN codes, using transformer for temporal modeling, and on the top is a decoder (with an expressive prior). Experiments are done on various bench... | Recommendation: 5: marginally below the acceptance threshold | Area: Generative models | Review:
This paper propose TECO (Temporal Consistent Video Transformer) for long-term video prediction. To make video prediction on long videos feasible, TECO trains on pretrained VQ-GAN codes, using transformer for temporal modeling, and on the top is a decoder (with an expressive prior). Experiments are done on vario... |
This paper introduces a unified framework for a group of well-known Lipschitz regularization methods in deep learning. Theorem 1 presents the algebraic condition on normalizing matrix $T$ which requires $WW^\top - T\preceq \mathbf{0}$. As a result, the framework includes spectral normalization, orthogonal regularizatio... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
This paper introduces a unified framework for a group of well-known Lipschitz regularization methods in deep learning. Theorem 1 presents the algebraic condition on normalizing matrix $T$ which requires $WW^\top - T\preceq \mathbf{0}$. As a result, the framework includes spectral normalization, orthogonal regul... |
This paper aims to provide a non-constant lower bound on the depth of ReLU neural networks without any restriction on the width. Mostly, the authors prove that the conjecture by Hertrich et al. (2021) is true for all n ∈ N with an additional assumption on the weighs of the network to be integer numbers.
This general to... | Recommendation: 6: marginally above the acceptance threshold | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
This paper aims to provide a non-constant lower bound on the depth of ReLU neural networks without any restriction on the width. Mostly, the authors prove that the conjecture by Hertrich et al. (2021) is true for all n ∈ N with an additional assumption on the weighs of the network to be integer numbers.
This ge... |
This paper proposes an antibody folding model based on existing architectures, including a protein language model (AntiBERTy), the EvoFormer and structure module from alphafold. The authors searched for templates from PDBs using Foldseek and extracted features using a similar workflow to AlphaFold. The method outperfor... | Recommendation: 3: reject, not good enough | Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability ) | Review:
This paper proposes an antibody folding model based on existing architectures, including a protein language model (AntiBERTy), the EvoFormer and structure module from alphafold. The authors searched for templates from PDBs using Foldseek and extracted features using a similar workflow to AlphaFold. The method o... |
This paper proposes extending influence functions-- a method from statistics that approximates the change of parameters or loss functions, with respect to removing or modifying training instances -- for using them in GNNs. As typical GNNs usually involve non-linear activation functions that make derivations of formulas... | Recommendation: 6: marginally above the acceptance threshold | Area: General Machine Learning | Review:
This paper proposes extending influence functions-- a method from statistics that approximates the change of parameters or loss functions, with respect to removing or modifying training instances -- for using them in GNNs. As typical GNNs usually involve non-linear activation functions that make derivations of ... |
This paper presents results on stealing a transformer based encoder model (past work has mostly focused on stealing CNN based models). The authors show that both vision and language encoders can easily be stolen with 40x fewer train queries than used to train the model. The authors also present DataSeed Inference (DSI)... | Recommendation: 5: marginally below the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
This paper presents results on stealing a transformer based encoder model (past work has mostly focused on stealing CNN based models). The authors show that both vision and language encoders can easily be stolen with 40x fewer train queries than used to train the model. The authors also present DataSeed Inferen... |
This paper proposes a method to mitigate catastrophic forgetting in class-incremental few-shot learning (CIFSL). The key observation is that there may be many directions in the weight space that are flat with respect to the loss. If these directions can be identified, then updates may be freely made in these directions... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
This paper proposes a method to mitigate catastrophic forgetting in class-incremental few-shot learning (CIFSL). The key observation is that there may be many directions in the weight space that are flat with respect to the loss. If these directions can be identified, then updates may be freely made in these di... |
This paper studies the use of self-supervised learning (SSL) techniques for decentralized learning, with the emphasis on the understanding of how and why it is effective. It focuses particularly on the task of decentralized SSL that enables representation learning from unlabeled data that are owned separately by multip... | Recommendation: 8: accept, good paper | Area: General Machine Learning | Review:
This paper studies the use of self-supervised learning (SSL) techniques for decentralized learning, with the emphasis on the understanding of how and why it is effective. It focuses particularly on the task of decentralized SSL that enables representation learning from unlabeled data that are owned separately b... |
In "DoE2Vec: Representation Learning for Exploratory Landscape Analysis" the authors propose a variational auto encoder (VAE) to learn a latent feature representation of black-box optimization problems. In the experimental section, the authors show that this VAE approach is best combined with exporatory landscape analy... | Recommendation: 3: reject, not good enough | Area: Optimization (eg, convex and non-convex optimization) | Review:
In "DoE2Vec: Representation Learning for Exploratory Landscape Analysis" the authors propose a variational auto encoder (VAE) to learn a latent feature representation of black-box optimization problems. In the experimental section, the authors show that this VAE approach is best combined with exporatory landsca... |
The focus of this paper is on finding smaller-sized low-rank submatrices within a larger matrix. The main contribution of the paper is an algorithm that uses random projections along with a few other steps to find the low-rank submatrices. There is also a minor theoretical result in the paper that is asymptotic in natu... | Recommendation: 3: reject, not good enough | Area: General Machine Learning | Review:
The focus of this paper is on finding smaller-sized low-rank submatrices within a larger matrix. The main contribution of the paper is an algorithm that uses random projections along with a few other steps to find the low-rank submatrices. There is also a minor theoretical result in the paper that is asymptotic... |
This paper presents a simple and well-motivated technique for merging different models in a "dataless" way, and evaluates the method in comparison to simple averaging and Fisher-weighted averaging.
Strengths
This paper presents an elegant technique and presents it clearly. It includes a number of helpful experiments ... | Recommendation: 6: marginally above the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper presents a simple and well-motivated technique for merging different models in a "dataless" way, and evaluates the method in comparison to simple averaging and Fisher-weighted averaging.
Strengths
This paper presents an elegant technique and presents it clearly. It includes a number of helpful expe... |
The paper deals with tasks where left-to-right generation is not the best strategy. The authors propose a refinement framework named CASR – which models p(i-th-timestep output token at t-th refinement step | input to task, output of model at the (t-1)-th refinement step, the prefix/history of output tokens at t-th refi... | Recommendation: 6: marginally above the acceptance threshold | Area: Generative models | Review:
The paper deals with tasks where left-to-right generation is not the best strategy. The authors propose a refinement framework named CASR – which models p(i-th-timestep output token at t-th refinement step | input to task, output of model at the (t-1)-th refinement step, the prefix/history of output tokens at t... |
The paper studies methods to explain what happens when training neural networks and draw parallels to decision tree behavior through increasing rank stability in the nodes. They study the patterns that emerge during training in a hope to enable future research improving training methods.
The paper has a clearly defined... | Recommendation: 5: marginally below the acceptance threshold | Area: General Machine Learning | Review:
The paper studies methods to explain what happens when training neural networks and draw parallels to decision tree behavior through increasing rank stability in the nodes. They study the patterns that emerge during training in a hope to enable future research improving training methods.
The paper has a clearly... |
This paper focuses on in-context learning where the model performs a classification task without gradient updates by reading a few labeled examples as part of the input (demonstrations). Specifically, the paper consists of three parts: (1) false demonstrations, where each label in the demonstrations is re-assigned base... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper focuses on in-context learning where the model performs a classification task without gradient updates by reading a few labeled examples as part of the input (demonstrations). Specifically, the paper consists of three parts: (1) false demonstrations, where each label in the demonstrations is re-assig... |
The authors propose an approach to the training of neural networks where, instead of adjusting weights between neurons, they adjust nonlinearities on the output of each neuron. The nonlinearities are applied via a product between a learnable matrix and a vector consisting of the neuronal input, an updateable memory ter... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
The authors propose an approach to the training of neural networks where, instead of adjusting weights between neurons, they adjust nonlinearities on the output of each neuron. The nonlinearities are applied via a product between a learnable matrix and a vector consisting of the neuronal input, an updateable me... |
This paper points out a potential issue with the linear-probing framework many SoTA methods are based on. Freezing a pre-trained feature encoder could get away with the feature inconsistency problem when one fine-tunes the feature extractor on the limited novel samples. However, the effectiveness of the frozen feature ... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper points out a potential issue with the linear-probing framework many SoTA methods are based on. Freezing a pre-trained feature encoder could get away with the feature inconsistency problem when one fine-tunes the feature extractor on the limited novel samples. However, the effectiveness of the frozen ... |
The authors propose a model perturbation strategy PERTURBGCL to perform graph contrastive learning without data augmentation. It consists of two key components: message propagation and transformation. They design weightPrune on transformation weight according to magnitudes, which create a dynamic perturbed model to con... | Recommendation: 5: marginally below the acceptance threshold | Area: Unsupervised and Self-supervised learning | Review:
The authors propose a model perturbation strategy PERTURBGCL to perform graph contrastive learning without data augmentation. It consists of two key components: message propagation and transformation. They design weightPrune on transformation weight according to magnitudes, which create a dynamic perturbed mode... |
Update: I raised my score to 5 after reading the authors' rebuttal.
--------
The paper studies gradient regularization, a technique that is often associated with improved generalization in deep learning. The authors consider a finite-difference approximation of gradient regularization that not only decreases the c... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
Update: I raised my score to 5 after reading the authors' rebuttal.
--------
The paper studies gradient regularization, a technique that is often associated with improved generalization in deep learning. The authors consider a finite-difference approximation of gradient regularization that not only decreas... |
This paper introduces a Conditional Discrete Contrastive Diffusion (CDCD) loss to enhance input-output connections by maximizing their mutual information. The author also designs two contrastive diffusion mechanisms to incorporate $L_{CDCD}$ into the denoising process. Diverse multimodal conditional synthesis tasks... | Recommendation: 6: marginally above the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper introduces a Conditional Discrete Contrastive Diffusion (CDCD) loss to enhance input-output connections by maximizing their mutual information. The author also designs two contrastive diffusion mechanisms to incorporate $L_{CDCD}$ into the denoising process. Diverse multimodal conditional synthes... |
This paper tackles the problem of offline learning from play data and presents a goal-conditioned version of behavior transformer (BeT) and demonstrates it outperforms several existing algorithms in selected simulation environments and a real robot setup.
Strength:
- Goal-conditioned learning is a clean and simple form... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper tackles the problem of offline learning from play data and presents a goal-conditioned version of behavior transformer (BeT) and demonstrates it outperforms several existing algorithms in selected simulation environments and a real robot setup.
Strength:
- Goal-conditioned learning is a clean and sim... |
This paper proposed a method for wireless channel modelling inspired from NeRF-based neural scene representation. Different from previous works which explicitly model the ray surface interaction, it tries to learn and map the environment configuration to a wireless channel directly through a neural network. The propose... | Recommendation: 6: marginally above the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper proposed a method for wireless channel modelling inspired from NeRF-based neural scene representation. Different from previous works which explicitly model the ray surface interaction, it tries to learn and map the environment configuration to a wireless channel directly through a neural network. The... |
This paper describes a simple non-convex function in four dimensions (a four-layer scalar network):
1. which empirically demonstrates the *"edge-of-stability"* phenomenon while training with gradient descent,
2. is qualitatively more similar to deeper neural networks than previously proposed model functions in terms ... | Recommendation: 8: accept, good paper | Area: Optimization (eg, convex and non-convex optimization) | Review:
This paper describes a simple non-convex function in four dimensions (a four-layer scalar network):
1. which empirically demonstrates the *"edge-of-stability"* phenomenon while training with gradient descent,
2. is qualitatively more similar to deeper neural networks than previously proposed model functions i... |
This paper tries to use a large batch size to benefit Offline RL training. The authors try to scale up batch size and square root scaling for the learning rate to accelerate the Offline RL training. The experimental results illustrate that Large-Batch Training can efficiently accelerate offline rl training and achieve ... | Recommendation: 5: marginally below the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper tries to use a large batch size to benefit Offline RL training. The authors try to scale up batch size and square root scaling for the learning rate to accelerate the Offline RL training. The experimental results illustrate that Large-Batch Training can efficiently accelerate offline rl training and ... |
The paper considers state space estimation by optimal filtering for latent partial differential equations (PDE). For this, a reinforcement-learning-based estimator is proposed.
The paper considers a given space-time discretization method of the PDE in question, resulting in a high-dimensional system of time-discretiz... | Recommendation: 5: marginally below the acceptance threshold | Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability ) | Review:
The paper considers state space estimation by optimal filtering for latent partial differential equations (PDE). For this, a reinforcement-learning-based estimator is proposed.
The paper considers a given space-time discretization method of the PDE in question, resulting in a high-dimensional system of time-d... |
As neural networks get deeper, end-to-end backpropagation requires computing the gradients along longer paths, thus making gradient computations more prone to numerical instabilities and vanishing/exploding gradients. This paper proposes a new approach which divides the network into different submodules that are indepe... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
As neural networks get deeper, end-to-end backpropagation requires computing the gradients along longer paths, thus making gradient computations more prone to numerical instabilities and vanishing/exploding gradients. This paper proposes a new approach which divides the network into different submodules that ar... |
This paper proposes a method for synthesizing high-quality tetrahedral meshes. The method starts with a voxel grid generator and then produces a regualarized tet mesh from it. For the voxel grid, the authors use an existing diffusion-based model. For tet-meshing, the authors first employ a neural network trained to pre... | Recommendation: 5: marginally below the acceptance threshold | Area: Generative models | Review:
This paper proposes a method for synthesizing high-quality tetrahedral meshes. The method starts with a voxel grid generator and then produces a regualarized tet mesh from it. For the voxel grid, the authors use an existing diffusion-based model. For tet-meshing, the authors first employ a neural network traine... |
This paper targets the problem of skill-transfer in reinforcement learning by focusing on learning information asymmetry from data. The key contribution is formalizing the notion of information asymmetry as a unifying perspective on development of skills autonomously, and providing a neat knob that can be turned to tra... | Recommendation: 8: accept, good paper | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper targets the problem of skill-transfer in reinforcement learning by focusing on learning information asymmetry from data. The key contribution is formalizing the notion of information asymmetry as a unifying perspective on development of skills autonomously, and providing a neat knob that can be turne... |
This paper presents a study that compares disparities and bias between humans and machines in performing face verification and recognition in challenging conditions. The authors use two datasets named LFW and CelebA for these studies. Human experiment consists of randomly sampled subjects answering verification/identif... | Recommendation: 3: reject, not good enough | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
This paper presents a study that compares disparities and bias between humans and machines in performing face verification and recognition in challenging conditions. The authors use two datasets named LFW and CelebA for these studies. Human experiment consists of randomly sampled subjects answering verification... |
This paper proposed PromptBoosting, which works on black box setting for text classification with LLM and prompt. The idea is to build a set of weak learners and each of them is associated with a prompt (raw text) and the final model is trained with adaboost over these weak learners. The resulting weak learners achieve... | Recommendation: 6: marginally above the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper proposed PromptBoosting, which works on black box setting for text classification with LLM and prompt. The idea is to build a set of weak learners and each of them is associated with a prompt (raw text) and the final model is trained with adaboost over these weak learners. The resulting weak learners... |
This paper presents an adversarial approach that overcomes this limitation, called competitive PINNs (CPINNs). CPINNs train a discriminator that is rewarded for predicting mistakes the PINN makes. The discriminator and PINN participate in a zero-sum game with the exact PDE solution as an optimal strategy. This approach... | Recommendation: 6: marginally above the acceptance threshold | Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability ) | Review:
This paper presents an adversarial approach that overcomes this limitation, called competitive PINNs (CPINNs). CPINNs train a discriminator that is rewarded for predicting mistakes the PINN makes. The discriminator and PINN participate in a zero-sum game with the exact PDE solution as an optimal strategy. This ... |
While wav2vec-style contrastive learning has shown to be very successful for ASR, it requires a lot of resources and time for training. In the vision domain, Barlow Twins, a solution that naturally avoids collapse, has shown to be able to achieve better (or competitive) performance compared with contrastive learning (e... | Recommendation: 6: marginally above the acceptance threshold | Area: Unsupervised and Self-supervised learning | Review:
While wav2vec-style contrastive learning has shown to be very successful for ASR, it requires a lot of resources and time for training. In the vision domain, Barlow Twins, a solution that naturally avoids collapse, has shown to be able to achieve better (or competitive) performance compared with contrastive lea... |
This paper proposes a new Q-learning framework by formulating the TD-error as a Gumbel distribution rather than a Gaussian. This new formulation leads to MaxEnt-RL style RL algorithms, but without the need to sample from out-of-distribution examples. The proposed method shows fairly well performance on standard D4RL be... | Recommendation: 6: marginally above the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper proposes a new Q-learning framework by formulating the TD-error as a Gumbel distribution rather than a Gaussian. This new formulation leads to MaxEnt-RL style RL algorithms, but without the need to sample from out-of-distribution examples. The proposed method shows fairly well performance on standard... |
This work proposes a new explanation algorithm called G-SHAP that computes attributions of feature subsets and attributions of individual features within each subset. The motivation to do so is to overcome the problem of interactions between features, thereby grouping features that interact together into the same group... | Recommendation: 6: marginally above the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
This work proposes a new explanation algorithm called G-SHAP that computes attributions of feature subsets and attributions of individual features within each subset. The motivation to do so is to overcome the problem of interactions between features, thereby grouping features that interact together into the sa... |
The paper studies the problem of one-bit matrix completion. The paper claims to propose a unified graph signal sampling framework that enjoys the benefits of graph signal analysis and processing. The authors provide some theorems related to the quality of reconstruction.
Due to either: the lack of my knowledge in this ... | Recommendation: 3: reject, not good enough | Area: General Machine Learning | Review:
The paper studies the problem of one-bit matrix completion. The paper claims to propose a unified graph signal sampling framework that enjoys the benefits of graph signal analysis and processing. The authors provide some theorems related to the quality of reconstruction.
Due to either: the lack of my knowledge ... |
This paper proposes an algorithm for cut selection in a mixed-integer linear programming (MILP) solver. The algorithm aims to determine which subset of a collection of proposed cuts to add at the root node, and in what order they should be added. To accomplish this, the authors propose a hierarchical reinforcement lear... | Recommendation: 8: accept, good paper | Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability ) | Review:
This paper proposes an algorithm for cut selection in a mixed-integer linear programming (MILP) solver. The algorithm aims to determine which subset of a collection of proposed cuts to add at the root node, and in what order they should be added. To accomplish this, the authors propose a hierarchical reinforcem... |
This paper presents the convergence analysis for SGD and averaged SGD with fixed step size, showing that iterates converge to the vicinity of the optimizer of a smoothed loss function. Compared to prior work, the author improved existing results with a less strict assumption on the step size, and provide a convergence ... | Recommendation: 8: accept, good paper | Area: Optimization (eg, convex and non-convex optimization) | Review:
This paper presents the convergence analysis for SGD and averaged SGD with fixed step size, showing that iterates converge to the vicinity of the optimizer of a smoothed loss function. Compared to prior work, the author improved existing results with a less strict assumption on the step size, and provide a conv... |
The paper tackles the problem of __near__ novelty detection (near ND), with __near__ referring to
the case in which the novelty (OOD) classes derive are semantically similar to those classes
contained in the in-distribution (ID) set used for training (a novelty class under this regime, for
example, being 'fox' when the... | Recommendation: 6: marginally above the acceptance threshold | Area: Unsupervised and Self-supervised learning | Review:
The paper tackles the problem of __near__ novelty detection (near ND), with __near__ referring to
the case in which the novelty (OOD) classes derive are semantically similar to those classes
contained in the in-distribution (ID) set used for training (a novelty class under this regime, for
example, being 'fox' ... |
This paper proposes the use of diffusion models (DM), more specifically the Denoising Diffusion Probabilistic Models (DDPMs), for modeling chirographic data such as digital handwriting, sketching, and drawings. In contrast to the mainstream autoregressive approaches on sequential chirographic data, the proposed method,... | Recommendation: 6: marginally above the acceptance threshold | Area: Generative models | Review:
This paper proposes the use of diffusion models (DM), more specifically the Denoising Diffusion Probabilistic Models (DDPMs), for modeling chirographic data such as digital handwriting, sketching, and drawings. In contrast to the mainstream autoregressive approaches on sequential chirographic data, the proposed... |
This paper considers a model stealing problem through remote access such as Rest API, returning the prediction given an input by an attacker. While the scenario is generally similar to many existing works, this paper aims at stealing the robustness of the victim model while maintaining the stolen model accuracy. The ma... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper considers a model stealing problem through remote access such as Rest API, returning the prediction given an input by an attacker. While the scenario is generally similar to many existing works, this paper aims at stealing the robustness of the victim model while maintaining the stolen model accuracy... |
This paper is about structured representation learning for image classification at different semantic level of granularity. The author proposed to leverage class hierarchy and relationships by introducing a regularization function using the CPCC in addition to the cross-entropy loss. They introduced a measurement of di... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
This paper is about structured representation learning for image classification at different semantic level of granularity. The author proposed to leverage class hierarchy and relationships by introducing a regularization function using the CPCC in addition to the cross-entropy loss. They introduced a measureme... |
The article describes a black box perturbation based explainability approach. It introduces an evolution of the LIME algorithm where the linear local predictor used to identify feature attribution is estimated using an extra $l_\infty$ constraint. The algorithm is justified by a Game Theory interpretation and inspired ... | Recommendation: 6: marginally above the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
The article describes a black box perturbation based explainability approach. It introduces an evolution of the LIME algorithm where the linear local predictor used to identify feature attribution is estimated using an extra $l_\infty$ constraint. The algorithm is justified by a Game Theory interpretation and i... |
This paper studies multi-player Markov games. The authors propose a concept of decomposable Markov game and factorized value function. For the indecomposable Markov games, the authors propose a new method to approximate the global value function by combining the decomposable components and some parameterized module $M$... | Recommendation: 6: marginally above the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper studies multi-player Markov games. The authors propose a concept of decomposable Markov game and factorized value function. For the indecomposable Markov games, the authors propose a new method to approximate the global value function by combining the decomposable components and some parameterized mo... |
The paper proposes a two-stage attention-based method (TAM) to solve large-scale routing problems.
Although existing learning-based solvers suffer from their scalability (e.g., # of nodes is typically less than a thousand), TAM is trained to split the large input instance into small sub-problems with keeping global co... | Recommendation: 6: marginally above the acceptance threshold | Area: General Machine Learning | Review:
The paper proposes a two-stage attention-based method (TAM) to solve large-scale routing problems.
Although existing learning-based solvers suffer from their scalability (e.g., # of nodes is typically less than a thousand), TAM is trained to split the large input instance into small sub-problems with keeping g... |
This work proposes a novel approach to compute Shapley value explanations for vision transformers. To evaluate shapley values for any model we need model's predictions on masked feature inputs. Authors propose a novel way to approximate these by training a ViT model using a loss function designed specifically for Shapl... | Recommendation: 8: accept, good paper | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
This work proposes a novel approach to compute Shapley value explanations for vision transformers. To evaluate shapley values for any model we need model's predictions on masked feature inputs. Authors propose a novel way to approximate these by training a ViT model using a loss function designed specifically f... |
This paper adapts the Fixmatch method [Sohn et al., 2020] from semi-supervised to self-supervised learning, and significantly improves the results compared with the benchmarks in experiments.
Strength:
1. The paper is relatively well-written and easy to follow.
2. The paper conducts extensive experiments to validate ... | Recommendation: 3: reject, not good enough | Area: Unsupervised and Self-supervised learning | Review:
This paper adapts the Fixmatch method [Sohn et al., 2020] from semi-supervised to self-supervised learning, and significantly improves the results compared with the benchmarks in experiments.
Strength:
1. The paper is relatively well-written and easy to follow.
2. The paper conducts extensive experiments to v... |
This paper proposes an interesting observation: when learning to solve routing problems, the distance-based input is better than the coordination based (which is currently the most used one) input. The basic intuition behind it is that distance is an essential property of the routing problems. To validate this observa... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper proposes an interesting observation: when learning to solve routing problems, the distance-based input is better than the coordination based (which is currently the most used one) input. The basic intuition behind it is that distance is an essential property of the routing problems. To validate this... |
The paper deals with offline RL problems, i.e. learning an optimal policy given some data sampled from a behavior policy.
Here, while the behavior policy itself is assumed known, its state-action occupancy distribution is available only through samples. The offline RL approach considered is "marginal importance sampl... | Recommendation: 8: accept, good paper | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
The paper deals with offline RL problems, i.e. learning an optimal policy given some data sampled from a behavior policy.
Here, while the behavior policy itself is assumed known, its state-action occupancy distribution is available only through samples. The offline RL approach considered is "marginal importan... |
The authors propose a model that estimates the confidence of an explanation model of a classification model. The proposed model takes into account the variance in explanations of the explanation model, as well as the brittleness of the decision boundary around the sample that is to be explained. Samples that lie around... | Recommendation: 5: marginally below the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
The authors propose a model that estimates the confidence of an explanation model of a classification model. The proposed model takes into account the variance in explanations of the explanation model, as well as the brittleness of the decision boundary around the sample that is to be explained. Samples that li... |
The paper proposes the task of identifying motif occurrences as a machine learning problem. Then, it proposes a new model called MotiFiesta. MotiFiesta is separated into two parts, a subgraph embedder, and a subgraph density estimator. Unfortunately, the results are inconclusive, given that the model is not compared ag... | Recommendation: 5: marginally below the acceptance threshold | Area: General Machine Learning | Review:
The paper proposes the task of identifying motif occurrences as a machine learning problem. Then, it proposes a new model called MotiFiesta. MotiFiesta is separated into two parts, a subgraph embedder, and a subgraph density estimator. Unfortunately, the results are inconclusive, given that the model is not com... |
This work proposes a learning framework, MAGENTA, that can tackle multiple multi-agent environments with one transformer agent. The authors focused on real-time strategy games in this work, including Honor of Kings (HoK), Starcraft II micromanagement (SMAC), and Neural MMO (NMMO). They treat agent entities as tokens an... | Recommendation: 3: reject, not good enough | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This work proposes a learning framework, MAGENTA, that can tackle multiple multi-agent environments with one transformer agent. The authors focused on real-time strategy games in this work, including Honor of Kings (HoK), Starcraft II micromanagement (SMAC), and Neural MMO (NMMO). They treat agent entities as t... |
A new decoding strategy for language models for code is presented, based on the intuition of selecting tokens that lookahead search deems to be more likely to lead to correct sequence outputs. Additional ideas on managing the performance overhead of this strategy are presented. Finally, experimental results indicate th... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
A new decoding strategy for language models for code is presented, based on the intuition of selecting tokens that lookahead search deems to be more likely to lead to correct sequence outputs. Additional ideas on managing the performance overhead of this strategy are presented. Finally, experimental results ind... |
The authors aim at learning a generic motion prior, to ease different video-related tasks (motion prediction, video labeling). They argue that learning the linear combination of temporal embeddings of a Transformer from videos enables to encode the dynamic of an observed moving object. The approach is validated on mot... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
The authors aim at learning a generic motion prior, to ease different video-related tasks (motion prediction, video labeling). They argue that learning the linear combination of temporal embeddings of a Transformer from videos enables to encode the dynamic of an observed moving object. The approach is validate... |
In this paper, the authors propose a domain-aware representation learning method (FedDAR) for the non-iid FL problem. The FedDAR assumes data on clients are from multiple domains and learns a classifier head for each domain. A representation module is shared for all classifier heads and updated by the vanilla FedAvg. T... | Recommendation: 3: reject, not good enough | Area: Unsupervised and Self-supervised learning | Review:
In this paper, the authors propose a domain-aware representation learning method (FedDAR) for the non-iid FL problem. The FedDAR assumes data on clients are from multiple domains and learns a classifier head for each domain. A representation module is shared for all classifier heads and updated by the vanilla F... |
This paper provides an Answer Set Programming based algorithm for determining a true directed causal structure from an under-sampled version of it. The original problem is NP-complete, and previous methods have not been successful with even moderate-sized graphs, but the new method (sRASL) can deal with up to 100 node... | Recommendation: 6: marginally above the acceptance threshold | Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes) | Review:
This paper provides an Answer Set Programming based algorithm for determining a true directed causal structure from an under-sampled version of it. The original problem is NP-complete, and previous methods have not been successful with even moderate-sized graphs, but the new method (sRASL) can deal with up to ... |
This paper explores the use of the filter subspace distance as a measure of similarity between two neural networks. They provide theoretical and empirical justifications for this measure of similarity and validate their atom-based similarity on continual learning and federated learning tasks.
Most measures of represen... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
This paper explores the use of the filter subspace distance as a measure of similarity between two neural networks. They provide theoretical and empirical justifications for this measure of similarity and validate their atom-based similarity on continual learning and federated learning tasks.
Most measures of ... |
The authors first the important limitations in how GNN-based link prediction methods handle the intrinsic class imbalance of the problem—due to the graph sparsity—in their training and evaluation. Moreover, the authors propose Gelato, a novel topology-centric framework that
applies a topological heuristic to a graph en... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
The authors first the important limitations in how GNN-based link prediction methods handle the intrinsic class imbalance of the problem—due to the graph sparsity—in their training and evaluation. Moreover, the authors propose Gelato, a novel topology-centric framework that
applies a topological heuristic to a ... |
The paper propose a graph convolutional network-based framework which construct graph representations )time-, dimension-, and cross-segments-based view. The authors provides substantial motivations for long-term time-series forecasting problem: 1) lack of structural relationships between variables, 2) difficulty of cap... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
The paper propose a graph convolutional network-based framework which construct graph representations )time-, dimension-, and cross-segments-based view. The authors provides substantial motivations for long-term time-series forecasting problem: 1) lack of structural relationships between variables, 2) difficult... |
This paper focuses on the understanding of neural collapse (NC) phenomena of the learned last-layer features and classifiers observed in deep learning classifiers. Most of the existing work provides analysis under the so-called unconstrained features model where the features are viewed as free optimization variables. M... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper focuses on the understanding of neural collapse (NC) phenomena of the learned last-layer features and classifiers observed in deep learning classifiers. Most of the existing work provides analysis under the so-called unconstrained features model where the features are viewed as free optimization vari... |
The paper study considers the question of whether zero-shot large pre-trained language models (LLMs) can generate plans by studying performance in symbolic planning problem domains. For each sample, the model receives the goal, the initial state and the available actions. The model used for fine-tuning is popular for c... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
The paper study considers the question of whether zero-shot large pre-trained language models (LLMs) can generate plans by studying performance in symbolic planning problem domains. For each sample, the model receives the goal, the initial state and the available actions. The model used for fine-tuning is popul... |
The goal of the paper is to obtain a sufficiently accurate estimate of MI (between input and representation) for dropout neural networks and to use it to confirm the information bottleneck hypothesis for this NN model.
Contributions:
- The authors propose a monte-carlo based estimate of MI in Gaussian dropout network... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
The goal of the paper is to obtain a sufficiently accurate estimate of MI (between input and representation) for dropout neural networks and to use it to confirm the information bottleneck hypothesis for this NN model.
Contributions:
- The authors propose a monte-carlo based estimate of MI in Gaussian dropout... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.