review
stringlengths
5
16.6k
score
stringclasses
5 values
area
stringclasses
12 values
text
stringlengths
31
5.65k
This paper proposes a way to learn gauge transformer for neural fields applications (especially modeling neural radiance field for novel view synthesis). The main contribution of the work is to propose a unified framework to reason about different NeRF paradigms in the language of gauge transformation and proposes a re...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposes a way to learn gauge transformer for neural fields applications (especially modeling neural radiance field for novel view synthesis). The main contribution of the work is to propose a unified framework to reason about different NeRF paradigms in the language of gauge transformation and propo...
This paper proposes a method of semi-supervised crowd counting which only leverages a subset of labeled data and learn from the unlabeled data. This method relies on pixel-wise distribution matching and leverage optimal transport in the optimzation process. Strength: Based on Table 1, it seems that this approach achie...
Recommendation: 5: marginally below the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper proposes a method of semi-supervised crowd counting which only leverages a subset of labeled data and learn from the unlabeled data. This method relies on pixel-wise distribution matching and leverage optimal transport in the optimzation process. Strength: Based on Table 1, it seems that this approa...
This paper studies the problem of estimating the covariance function for a random process. The random process functional data is sampled on a finite set of knots. Four algorithms are proposed, namely, RANDOM-KNOTS, RANDOM-KNOTS-SPATIAL, B-SPLINE, and B-SPLINE-SPATIAL. These four algorithms are proposed with the main mo...
Recommendation: 3: reject, not good enough
Area: General Machine Learning
Review: This paper studies the problem of estimating the covariance function for a random process. The random process functional data is sampled on a finite set of knots. Four algorithms are proposed, namely, RANDOM-KNOTS, RANDOM-KNOTS-SPATIAL, B-SPLINE, and B-SPLINE-SPATIAL. These four algorithms are proposed with the...
The authors propose a new prompting method, called "Least To Most" prompting. Building upon the success of the "chain-of-thought" prompting method, the authors propose to split the prompting process into two stages: problem reduction, and problem solving. The former focusing on decomposing the task at hand into its con...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The authors propose a new prompting method, called "Least To Most" prompting. Building upon the success of the "chain-of-thought" prompting method, the authors propose to split the prompting process into two stages: problem reduction, and problem solving. The former focusing on decomposing the task at hand into...
* Offers an alternative differentiable monotonic alignment generator over EfficientTTS, VITS, FastSpeech 2, non-attentive Tacotron, Parallel Tacotron 2, etc. * Using variational inference, learns a 2-level hierarchical latent representation, which can be used to influence the diversity of speech samples. * Joint-trains...
Recommendation: 5: marginally below the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: * Offers an alternative differentiable monotonic alignment generator over EfficientTTS, VITS, FastSpeech 2, non-attentive Tacotron, Parallel Tacotron 2, etc. * Using variational inference, learns a 2-level hierarchical latent representation, which can be used to influence the diversity of speech samples. * Join...
This work builds a pipeline for closed-loop planning via behavior cloning. Their propose to use only past local context (as opposed to SDV state and context in prior work), and use a transformer to predict future states, which is then turned to actions via LQR controller. They show significant improvements over prior m...
Recommendation: 3: reject, not good enough
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This work builds a pipeline for closed-loop planning via behavior cloning. Their propose to use only past local context (as opposed to SDV state and context in prior work), and use a transformer to predict future states, which is then turned to actions via LQR controller. They show significant improvements over...
This paper empirically investigates the phenomena of double descent and offline-online correspondence (the gap between test errors of offline and online learners, as far as I understood) for similarity learning. The authors introduce two types of dataset conversion procedures from data points to pairs and two types of ...
Recommendation: 5: marginally below the acceptance threshold
Area: General Machine Learning
Review: This paper empirically investigates the phenomena of double descent and offline-online correspondence (the gap between test errors of offline and online learners, as far as I understood) for similarity learning. The authors introduce two types of dataset conversion procedures from data points to pairs and two t...
The paper proposes a a data collection strategy combined with human preference capture and a joint objecting learning method to boost the performance of pre-trained dialogue models. The paper is very well-written, contains descriptions of the collected dataset alongwith data analysis, as well as a learning strategy th...
Recommendation: 5: marginally below the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The paper proposes a a data collection strategy combined with human preference capture and a joint objecting learning method to boost the performance of pre-trained dialogue models. The paper is very well-written, contains descriptions of the collected dataset alongwith data analysis, as well as a learning str...
This paper proposes a novel graph convolutional network to address the over-smoothing and heterophily issue. The proposed model is equipped with a trainable depth parameter $d$ and a selection of the spectrum of the graph signal. Based on such modeling, this paper discovers a connection between negative GCN depth and g...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposes a novel graph convolutional network to address the over-smoothing and heterophily issue. The proposed model is equipped with a trainable depth parameter $d$ and a selection of the spectrum of the graph signal. Based on such modeling, this paper discovers a connection between negative GCN dep...
This work points out an interesting connection between Lovasz theta function and contrastive learning. More concretely, the negative term in the InfoNCE loss corresponds to the Lovasz theta problem, with zero weights. From this connection, the authors are able to extend the InfoNCE loss to a broader class and the exper...
Recommendation: 5: marginally below the acceptance threshold
Area: Unsupervised and Self-supervised learning
Review: This work points out an interesting connection between Lovasz theta function and contrastive learning. More concretely, the negative term in the InfoNCE loss corresponds to the Lovasz theta problem, with zero weights. From this connection, the authors are able to extend the InfoNCE loss to a broader class and t...
This paper propose BINDER, a training-free neural-symbolic framework that (1) maps the task input to a program using a pre-trained language model, where the model has to decide which part in the input can be converted to a target programming language and corresponding tasks API calls for further extension; (2) adopts a...
Recommendation: 8: accept, good paper
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper propose BINDER, a training-free neural-symbolic framework that (1) maps the task input to a program using a pre-trained language model, where the model has to decide which part in the input can be converted to a target programming language and corresponding tasks API calls for further extension; (2) ...
The paper studies the benefits of ensembling for self-supervised learning methods. The paper proposes to ensemble the “non-representation” part of the SSL models, and proposes different weighting schemes. Extensive experiments are conducted to analyze and evaluate the proposed ensemble method and weighting schemes, whi...
Recommendation: 8: accept, good paper
Area: Unsupervised and Self-supervised learning
Review: The paper studies the benefits of ensembling for self-supervised learning methods. The paper proposes to ensemble the “non-representation” part of the SSL models, and proposes different weighting schemes. Extensive experiments are conducted to analyze and evaluate the proposed ensemble method and weighting sche...
This paper focuses on convergence analysis of adversarial training for finite-width two-layer Leaky ReLU networks. Convergence guarantees are given for both inner-loop PGD-style adversarial attack (in deterministic form) and end-to-end adversarial training with imperfect attack (in expectation form). To ease the analys...
Recommendation: 6: marginally above the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper focuses on convergence analysis of adversarial training for finite-width two-layer Leaky ReLU networks. Convergence guarantees are given for both inner-loop PGD-style adversarial attack (in deterministic form) and end-to-end adversarial training with imperfect attack (in expectation form). To ease th...
This paper introduces cyclophobic reinforcement learning, a negative intrinsic reward for exploration that incentivizes the agent not to revisit previously visited states. This intrinsic reward is computed over different cropped views of the environment by the agent and these are combined to compute the final reward. T...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper introduces cyclophobic reinforcement learning, a negative intrinsic reward for exploration that incentivizes the agent not to revisit previously visited states. This intrinsic reward is computed over different cropped views of the environment by the agent and these are combined to compute the final r...
The current paper under submission studies linear regression and gives an algorithm that is "more practical" than the previous approaches. It is based on the approach of Alabi et al. to a large degree and uses known techniques in DP literature to achieve its objective. The algorithm is more efficient, does not require ...
Recommendation: 5: marginally below the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The current paper under submission studies linear regression and gives an algorithm that is "more practical" than the previous approaches. It is based on the approach of Alabi et al. to a large degree and uses known techniques in DP literature to achieve its objective. The algorithm is more efficient, does not ...
This paper proposes incorporating model-specific prior knowledge into optimizers by modifying the gradients according to a set of model-specific hyper-parameters. The proposed methods are employed on VGG architectures using SGD and AdamW optimizers for image classification and segmentation datasets. The paper introduce...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This paper proposes incorporating model-specific prior knowledge into optimizers by modifying the gradients according to a set of model-specific hyper-parameters. The proposed methods are employed on VGG architectures using SGD and AdamW optimizers for image classification and segmentation datasets. The paper i...
This paper proposes a deep reinforcement learning method for partially observable environments named Deep Transformer Q-Networks (DTQN). The key feature of DTQN is that, for a given chunk of history sampled from the replay buffer, a loss is taken over predicted Q-values for *all* timesteps in the history (rather than j...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper proposes a deep reinforcement learning method for partially observable environments named Deep Transformer Q-Networks (DTQN). The key feature of DTQN is that, for a given chunk of history sampled from the replay buffer, a loss is taken over predicted Q-values for *all* timesteps in the history (rathe...
The paper tackles the problem of statistical inferences from differential private synthetic datasets. The authors use the tools of measurement error models to derive an estimator that is bias-corrected. Experiments are performed that compare the proposed estimator to SSP (sufficient statistic perturbation), which show ...
Recommendation: 5: marginally below the acceptance threshold
Area: General Machine Learning
Review: The paper tackles the problem of statistical inferences from differential private synthetic datasets. The authors use the tools of measurement error models to derive an estimator that is bias-corrected. Experiments are performed that compare the proposed estimator to SSP (sufficient statistic perturbation), whi...
In this work the authors present a data poisoning attack that inserts class-conditional triggers in the data augmentation stage. The threat model the authors consider is: * The defender is oblivious and uses the attacker's malicious data augmentation pipeline * The attacker has arbitrary access to the data augmentati...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: In this work the authors present a data poisoning attack that inserts class-conditional triggers in the data augmentation stage. The threat model the authors consider is: * The defender is oblivious and uses the attacker's malicious data augmentation pipeline * The attacker has arbitrary access to the data au...
This paper provides new insight to understand GANs based on log density ratios as a gradient flow in the Wasserstein space. Specifically, the bi-level step of adversarial training in GANs is regarded as it first estimates the vector field of the gradient flow (by discriminator), and next the generator is updated to lea...
Recommendation: 6: marginally above the acceptance threshold
Area: Generative models
Review: This paper provides new insight to understand GANs based on log density ratios as a gradient flow in the Wasserstein space. Specifically, the bi-level step of adversarial training in GANs is regarded as it first estimates the vector field of the gradient flow (by discriminator), and next the generator is update...
This paper presents a new offline-to-online finetuning approach that proposes to maintain both the policy learned offline and the new online policy during online-finetuning. The authors first train the offline policy and Q-function, select the policy from a categorical distribution with the learned Q-values during onli...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper presents a new offline-to-online finetuning approach that proposes to maintain both the policy learned offline and the new online policy during online-finetuning. The authors first train the offline policy and Q-function, select the policy from a categorical distribution with the learned Q-values dur...
This paper addresses the problem of image copy detection through image retrieval and proposes a method that optimizes jointly both representation learning and approximate similarity search. Large databases rely on indexes for approximate and efficient search, but the challenge comes when copies are significantly modifi...
Recommendation: 8: accept, good paper
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper addresses the problem of image copy detection through image retrieval and proposes a method that optimizes jointly both representation learning and approximate similarity search. Large databases rely on indexes for approximate and efficient search, but the challenge comes when copies are significantl...
This work introduces a new continual learning method TST. TST considers both preventing catastrophic forgetting (CF) and encouraging knowledge transfer (KT). To prevent CF, TST directly use one existing CL method called SupSup. To encourage KT, TST borrows the idea of gradient-based importance score and applies this sc...
Recommendation: 3: reject, not good enough
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This work introduces a new continual learning method TST. TST considers both preventing catastrophic forgetting (CF) and encouraging knowledge transfer (KT). To prevent CF, TST directly use one existing CL method called SupSup. To encourage KT, TST borrows the idea of gradient-based importance score and applies...
The authors consider the problem of reducing the size of hidden layers in convolutional neural networks (CNN). Size reduction is usually achieved by setting an appropriate stride for the convolutional layers. The stride is a hyperparameter and is usually fine-tuned using cross-validation. An alternative approach is Dif...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: The authors consider the problem of reducing the size of hidden layers in convolutional neural networks (CNN). Size reduction is usually achieved by setting an appropriate stride for the convolutional layers. The stride is a hyperparameter and is usually fine-tuned using cross-validation. An alternative approac...
This paper introduces a new benchmark (SciRepEval) for scientific representation learning consisting of 25 tasks in 4 formats (classification, regression, ranking, and search). It shows that learning a separate document representation for each task format would improve the task performance compared to learning a single...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper introduces a new benchmark (SciRepEval) for scientific representation learning consisting of 25 tasks in 4 formats (classification, regression, ranking, and search). It shows that learning a separate document representation for each task format would improve the task performance compared to learning ...
This paper proposes AIM (Adapting Image Models) for video classification with the focus on reducing tunable parameter and training (fine-tuning) time. The main contributions are: 1) using Adapter (Houlsby et al. 2019) to adapt image models (pretrained on large datasets such as ImageNet-21k or CLIP); 2) designing variou...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: This paper proposes AIM (Adapting Image Models) for video classification with the focus on reducing tunable parameter and training (fine-tuning) time. The main contributions are: 1) using Adapter (Houlsby et al. 2019) to adapt image models (pretrained on large datasets such as ImageNet-21k or CLIP); 2) designin...
This paper proposes a new training strategy to improve the performance of DETR-based object detectors. The authors indicate the main reason for the low convergence rate of DETR-based object detectors is in the one-to-one matching and propose a simple strategy of group-wise one-to-many assignment to address. It is a sim...
Recommendation: 5: marginally below the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper proposes a new training strategy to improve the performance of DETR-based object detectors. The authors indicate the main reason for the low convergence rate of DETR-based object detectors is in the one-to-one matching and propose a simple strategy of group-wise one-to-many assignment to address. It ...
Multi-vector retrieval models can fetch improved results on certain retrieval tasks, while at the same time the approach leads to large search indexes and expensive computation. Thus, this paper proposes ALIGNER, a novel multi-vector retrieval model that learns sparse pairwise alignments between query and document toke...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: Multi-vector retrieval models can fetch improved results on certain retrieval tasks, while at the same time the approach leads to large search indexes and expensive computation. Thus, this paper proposes ALIGNER, a novel multi-vector retrieval model that learns sparse pairwise alignments between query and docum...
This paper mainly addresses the following two problems: 1. It introduces an objective function for training generative autoencoders (encoder-decoder networks). The training objective consists of two functions: one represents the reconstruction error, and the other indicates the discrepancy of the latent code distribut...
Recommendation: 5: marginally below the acceptance threshold
Area: Generative models
Review: This paper mainly addresses the following two problems: 1. It introduces an objective function for training generative autoencoders (encoder-decoder networks). The training objective consists of two functions: one represents the reconstruction error, and the other indicates the discrepancy of the latent code d...
This paper can be regarded as a follow-up of (Ergun et al. 2021) which is published in ICLR2022. The main contribution of this submission is to answer the question: "Is it possible to design a $k$-means and a $k$-medians algorithm that achieve (1 + $\alpha$)-approximate clustering when the predictor is not very accurat...
Recommendation: 6: marginally above the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: This paper can be regarded as a follow-up of (Ergun et al. 2021) which is published in ICLR2022. The main contribution of this submission is to answer the question: "Is it possible to design a $k$-means and a $k$-medians algorithm that achieve (1 + $\alpha$)-approximate clustering when the predictor is not very...
The paper introduces a differentiable rendering algoithm that converts 3D meshes into a collection of 3D gaussians and ray traces the resulting scene. The conversions to volumetric gaussians smoothes the visibility function of the scene, similar to the smooth visibility and blending functions of soft differentiable ras...
Recommendation: 3: reject, not good enough
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The paper introduces a differentiable rendering algoithm that converts 3D meshes into a collection of 3D gaussians and ray traces the resulting scene. The conversions to volumetric gaussians smoothes the visibility function of the scene, similar to the smooth visibility and blending functions of soft differenti...
This paper considers the robustness of deep classification models, noting that out-of-the-box models can yield arbitrarily high-confidence predictions on out-of-distribution data. As a proposed remedy, “total activation classifiers” (TAC) are introduced to capture “class-dependent patterns” which are claimed to offer a...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper considers the robustness of deep classification models, noting that out-of-the-box models can yield arbitrarily high-confidence predictions on out-of-distribution data. As a proposed remedy, “total activation classifiers” (TAC) are introduced to capture “class-dependent patterns” which are claimed to...
Message-passing neural networks (MPNNs) and their extensions (Subgraph MPNNs) have inspired state-of-the-art models for graph data; however, their counting power is still limited and it is known that Subgraph GNNs cannot count cycles with more than $4$ nodes. To boost the counting power, this paper extends the idea of...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: Message-passing neural networks (MPNNs) and their extensions (Subgraph MPNNs) have inspired state-of-the-art models for graph data; however, their counting power is still limited and it is known that Subgraph GNNs cannot count cycles with more than $4$ nodes. To boost the counting power, this paper extends the...
Tasks: Automatic speech recognition (ASR, measure WER), language modeling (measure PPL) Two new models are proposed, which are based on state space models (SSMs). The newly proposed models are: MSSM and Stateformer. The MSSM purely uses the SSM, with residual connections and some layer norm. The Stateformer is like a...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: Tasks: Automatic speech recognition (ASR, measure WER), language modeling (measure PPL) Two new models are proposed, which are based on state space models (SSMs). The newly proposed models are: MSSM and Stateformer. The MSSM purely uses the SSM, with residual connections and some layer norm. The Stateformer i...
This paper proposed an energy-based out-of-distribution detection for graph neural network. The contributions include introducing energy-based method to graph out-of-distribution detection, providing some theoretical analysis, presenting energy propagation, and conducting a lot of experiments. Strength: 1. The paper is...
Recommendation: 5: marginally below the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper proposed an energy-based out-of-distribution detection for graph neural network. The contributions include introducing energy-based method to graph out-of-distribution detection, providing some theoretical analysis, presenting energy propagation, and conducting a lot of experiments. Strength: 1. The ...
The authors propose a method for learning when there is high amount of label noise present, using an iterative bi-level optimization. Their method in an iterative fashion first trains a classifier (predictor), then defines a pseudo-labels for the selector (abstain) classifier using confidence of the trained predictor o...
Recommendation: 5: marginally below the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: The authors propose a method for learning when there is high amount of label noise present, using an iterative bi-level optimization. Their method in an iterative fashion first trains a classifier (predictor), then defines a pseudo-labels for the selector (abstain) classifier using confidence of the trained pre...
The paper provides a reinforcement learning method for subgraph matching problem. Given a query graph, they attempt to find the subgraph from a large graph that matches a query graph. Then the paper compare the underlying method against several baselines on real world datasets. Strengths: + Important problem + Intuitiv...
Recommendation: 5: marginally below the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The paper provides a reinforcement learning method for subgraph matching problem. Given a query graph, they attempt to find the subgraph from a large graph that matches a query graph. Then the paper compare the underlying method against several baselines on real world datasets. Strengths: + Important problem + ...
The paper introduces a new set of benchmarks dubbed "SMC-Bench" (Sparsity May Cry). The authors correctly remark that the ever-growing research in sparsifying neural networks is often (if not always) evaluated on limited set of benchmarks which are often one of the very well understood, and "relatively easy" datasets. ...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: The paper introduces a new set of benchmarks dubbed "SMC-Bench" (Sparsity May Cry). The authors correctly remark that the ever-growing research in sparsifying neural networks is often (if not always) evaluated on limited set of benchmarks which are often one of the very well understood, and "relatively easy" da...
The paper utilizes a method called Adversarial Representation Learning (ARL) as a base. ARL learns a privacy-preserving encoding of sensitive user data before it is shared, but lacks formal guarantees. The authors link the local Lipschitz constant of a neural network in ARL (obfuscation layer) with its local sensitivi...
Recommendation: 6: marginally above the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The paper utilizes a method called Adversarial Representation Learning (ARL) as a base. ARL learns a privacy-preserving encoding of sensitive user data before it is shared, but lacks formal guarantees. The authors link the local Lipschitz constant of a neural network in ARL (obfuscation layer) with its local s...
This paper proposes a novel approach to pessimism-based offline RL. Instead of the standard practice of explicitly constructing a lower confidence bound for value functions, this new approach uses perturbed rewards to implicitly quantify the training uncertainty and construct lower confidence bounds for the ground trut...
Recommendation: 8: accept, good paper
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper proposes a novel approach to pessimism-based offline RL. Instead of the standard practice of explicitly constructing a lower confidence bound for value functions, this new approach uses perturbed rewards to implicitly quantify the training uncertainty and construct lower confidence bounds for the gro...
The paper proposes 'federated feature fusion' for application in the vertical federated learning paradigm using a combination of feature alignment and consensus graph. The technique aligns feature representations from pre-trained client models using a learnable alignment function and aggregates using a graph convolutio...
Recommendation: 8: accept, good paper
Area: General Machine Learning
Review: The paper proposes 'federated feature fusion' for application in the vertical federated learning paradigm using a combination of feature alignment and consensus graph. The technique aligns feature representations from pre-trained client models using a learnable alignment function and aggregates using a graph co...
This paper focuses on the problem of adversarial attacks against deep RL policies. They propose a defense that uses an ensemble policy based on policies for various auxiliary tasks and logical relations between those auxiliary tasks and the main task. A graph neural network is used to combine action distributions from ...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This paper focuses on the problem of adversarial attacks against deep RL policies. They propose a defense that uses an ensemble policy based on policies for various auxiliary tasks and logical relations between those auxiliary tasks and the main task. A graph neural network is used to combine action distributio...
This paper focuses on Byzantine-robust learning when the data is heterogeneous. The authors propose a novel Linear Scalarization (LS). LS first uses RAGG to split gradients into honest gradients and suspected malicious gradients. Then, LS uses a selection criterion to compute weights for all gradients. In particular, L...
Recommendation: 3: reject, not good enough
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper focuses on Byzantine-robust learning when the data is heterogeneous. The authors propose a novel Linear Scalarization (LS). LS first uses RAGG to split gradients into honest gradients and suspected malicious gradients. Then, LS uses a selection criterion to compute weights for all gradients. In parti...
Current GNN models rely on strong features for good performance. However, they struggle in the absence of features and when only the topology is present. This is true particularly in the case of making network resilient to all forms of attack. The paper proposes to make network resilient even in the absence of availabi...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: Current GNN models rely on strong features for good performance. However, they struggle in the absence of features and when only the topology is present. This is true particularly in the case of making network resilient to all forms of attack. The paper proposes to make network resilient even in the absence of ...
This paper proposes a method to model chirographic data using diffusion models. Continuous-time geometric data (i.e., chirographic data) is typically modeled via autoregressive methods which fail to capture holistic information of the temporal data. On the contrary, the proposed ChiroDiff is capable of capturing holist...
Recommendation: 6: marginally above the acceptance threshold
Area: Generative models
Review: This paper proposes a method to model chirographic data using diffusion models. Continuous-time geometric data (i.e., chirographic data) is typically modeled via autoregressive methods which fail to capture holistic information of the temporal data. On the contrary, the proposed ChiroDiff is capable of capturin...
The paper proposes sparse upcycling -- copy the model into a sparse model for faster and more efficient training. They conduct experiments on JFT-300M and English C4 dataset. The empirical results show its superiority. The paper proposes a training strategy to make MoE training faster. The proposed sparse upcycling is ...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: The paper proposes sparse upcycling -- copy the model into a sparse model for faster and more efficient training. They conduct experiments on JFT-300M and English C4 dataset. The empirical results show its superiority. The paper proposes a training strategy to make MoE training faster. The proposed sparse upcyc...
This paper evaluates previous work on biologically plausible DNNs in the setting of continual learning (CL). Namely, they evaluate ideas around Dale’s principle, Active Dendrites, heterogenous dropout, Hebbian learning, synaptic consolidation and experience replay. They present experimental evidence that these ideas ca...
Recommendation: 3: reject, not good enough
Area: Neuroscience and Cognitive Science (e.g., neural coding, brain-computer interfaces)
Review: This paper evaluates previous work on biologically plausible DNNs in the setting of continual learning (CL). Namely, they evaluate ideas around Dale’s principle, Active Dendrites, heterogenous dropout, Hebbian learning, synaptic consolidation and experience replay. They present experimental evidence that these ...
The paper proposed DISSECT, a regularization-based deep learning approach for bulk RNA-seq deconvolution that decomposes the bulk RNA-seq matrix into a cell type fraction matrix $X$ and an expression profile $S$. The authors introduced consistency regularization which utilizes a mixture of the true bulk RNA-seq and sim...
Recommendation: 3: reject, not good enough
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: The paper proposed DISSECT, a regularization-based deep learning approach for bulk RNA-seq deconvolution that decomposes the bulk RNA-seq matrix into a cell type fraction matrix $X$ and an expression profile $S$. The authors introduced consistency regularization which utilizes a mixture of the true bulk RNA-seq...
The authors propose an algorithm to improve the adversarial robustness of neural networks based on kernel averaging and noise. They show that their method is competitive with adversarial training in some cases. However, the algorithm description is not clear enough and there are also not sufficient investigations on wh...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: The authors propose an algorithm to improve the adversarial robustness of neural networks based on kernel averaging and noise. They show that their method is competitive with adversarial training in some cases. However, the algorithm description is not clear enough and there are also not sufficient investigatio...
This paper proposed a new scheme of deep Q-learning by introducing final layer regularization and then updates it along faster time-scale than that of the non-linear features. Moreover, it provably converges even when the features are non-stationary. A bound is also derived on the error introduced by regularization. ...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper proposed a new scheme of deep Q-learning by introducing final layer regularization and then updates it along faster time-scale than that of the non-linear features. Moreover, it provably converges even when the features are non-stationary. A bound is also derived on the error introduced by regulariz...
This paper provides analysis of out-of-domain detection for different tasks in document understanding domain, including document classification and information extraction. Authors create a benchmark dataset for out-of-domain detection and study the performance a 4 main categories of models for document based on text, i...
Recommendation: 5: marginally below the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper provides analysis of out-of-domain detection for different tasks in document understanding domain, including document classification and information extraction. Authors create a benchmark dataset for out-of-domain detection and study the performance a 4 main categories of models for document based on...
This paper proposes a collaborative symmetricity exploitation framework to train a solver for the decoupling capacity placement problem benchmark. Since hardware design is multi-level and sequential and performance simulation is costly, data-efficient offline learning with good generalization becomes critical. This pap...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This paper proposes a collaborative symmetricity exploitation framework to train a solver for the decoupling capacity placement problem benchmark. Since hardware design is multi-level and sequential and performance simulation is costly, data-efficient offline learning with good generalization becomes critical. ...
This paper proposes a conformal prediction algorithm that obtains multivalid converge on exchangeable data in the batch setting. Multivalid coverge guarantees mean that the target coverage level holds conditionally on membership in each group or/and the threshold value. They provide theoretical analysis to clarify the ...
Recommendation: 8: accept, good paper
Area: General Machine Learning
Review: This paper proposes a conformal prediction algorithm that obtains multivalid converge on exchangeable data in the batch setting. Multivalid coverge guarantees mean that the target coverage level holds conditionally on membership in each group or/and the threshold value. They provide theoretical analysis to clar...
This paper proposed a data-driven modification of the CG algorithm for the solution of SPD linear systems. The proposed algorithm updates the approximate solution using a forward pass of a neural network which is trained with some of the lowest eigenmodes of a discretization of the elliptic operator without internal b...
Recommendation: 3: reject, not good enough
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: This paper proposed a data-driven modification of the CG algorithm for the solution of SPD linear systems. The proposed algorithm updates the approximate solution using a forward pass of a neural network which is trained with some of the lowest eigenmodes of a discretization of the elliptic operator without in...
The authors propose an approach for computing edge embeddings in temporal networks evolving in continuous time. By considering direct embeddings of edges rather than nodes, the authors claim that they can achieve better accuracy on downstream tasks such as edge classification. The proposed edge embedding uses a time-de...
Recommendation: 8: accept, good paper
Area: General Machine Learning
Review: The authors propose an approach for computing edge embeddings in temporal networks evolving in continuous time. By considering direct embeddings of edges rather than nodes, the authors claim that they can achieve better accuracy on downstream tasks such as edge classification. The proposed edge embedding uses a...
The paper investigates word boundaries in the context of emergent languages. The hypothesis is that if we want emergent languages to follow properties of natural languages like compositionality, they should have meaningful word boundaries as defined by Harris Articulation Scheme. The authors propose derived tests to ch...
Recommendation: 5: marginally below the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: The paper investigates word boundaries in the context of emergent languages. The hypothesis is that if we want emergent languages to follow properties of natural languages like compositionality, they should have meaningful word boundaries as defined by Harris Articulation Scheme. The authors propose derived tes...
The authors in this paper provide an algorithm which is a stochastic variant of OMD, that converges in the expected sense to a weak and strong $\varepsilon$-CCE. This is done by bounding the expected regret of the algorithm by, extending the theoretical framework of analyzing regret bounds of stochastic OMD in (Alacaog...
Recommendation: 8: accept, good paper
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: The authors in this paper provide an algorithm which is a stochastic variant of OMD, that converges in the expected sense to a weak and strong $\varepsilon$-CCE. This is done by bounding the expected regret of the algorithm by, extending the theoretical framework of analyzing regret bounds of stochastic OMD in ...
The paper proposes TT-NF, a low-rank representation for learning neural fields, along with a sampling method for improve the training efficiency. It applies TT-NF to a synthetic tensor denoising task and a neural radiance field rendering task, which demonstrate the performance of the approach. Strength: - The idea of...
Recommendation: 3: reject, not good enough
Area: General Machine Learning
Review: The paper proposes TT-NF, a low-rank representation for learning neural fields, along with a sampling method for improve the training efficiency. It applies TT-NF to a synthetic tensor denoising task and a neural radiance field rendering task, which demonstrate the performance of the approach. Strength: - The...
The paper offers a method for reinforcement learning under partial observability by offering a new form of representing the environment model. Specifically, this representation takes advantage of the structure of the environment and linear approximation of value/Q functions. The authors showed the superiority of their ...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The paper offers a method for reinforcement learning under partial observability by offering a new form of representing the environment model. Specifically, this representation takes advantage of the structure of the environment and linear approximation of value/Q functions. The authors showed the superiority o...
The paper proposes a Bayesian Neural Network approach for ransomware attack detection. The authors enumerate the challenges of ransomware detection: temporal, high-dimensional sparse signals with limited records and very imbalanced classes. They then propose using Bayesian Neural Networks is appropriate for these cha...
Recommendation: 5: marginally below the acceptance threshold
Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes)
Review: The paper proposes a Bayesian Neural Network approach for ransomware attack detection. The authors enumerate the challenges of ransomware detection: temporal, high-dimensional sparse signals with limited records and very imbalanced classes. They then propose using Bayesian Neural Networks is appropriate for t...
Detecting OOD data is critical to build reliable machine learning systems, where the models should make reliable predictions for ID data meanwhile detecting OOD data without further predictions. It motivates the recent studies in OOD detection, which has attracted significant attentions recently. The authors propose a ...
Recommendation: 5: marginally below the acceptance threshold
Area: General Machine Learning
Review: Detecting OOD data is critical to build reliable machine learning systems, where the models should make reliable predictions for ID data meanwhile detecting OOD data without further predictions. It motivates the recent studies in OOD detection, which has attracted significant attentions recently. The authors pr...
This paper proposes a regularization method for mitigating artifacts. Their method (SimReg+) is simple: take a model that is known to be artifact-free, and train another model to be similar to that model. The idea is somewhat counter-intuitive, but works reasonably well on some datasets, and is also shown to have fewer...
Recommendation: 5: marginally below the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper proposes a regularization method for mitigating artifacts. Their method (SimReg+) is simple: take a model that is known to be artifact-free, and train another model to be similar to that model. The idea is somewhat counter-intuitive, but works reasonably well on some datasets, and is also shown to ha...
This paper proposes Complete Latent Likelihood (CoLLike) which utilizes permutation for matching in the latent domain. The authors argues that permuting the latents and then matching to inputs leads to expressive models with exact likelihood and no posterior collapsing, compared to MaL. Also, the suggested CoLLike can ...
Recommendation: 3: reject, not good enough
Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes)
Review: This paper proposes Complete Latent Likelihood (CoLLike) which utilizes permutation for matching in the latent domain. The authors argues that permuting the latents and then matching to inputs leads to expressive models with exact likelihood and no posterior collapsing, compared to MaL. Also, the suggested CoLL...
This work identifies two critical challenges in multimodal data augmentation: First, Non-trivial augmentation for certain modalities such as numerical or categorical, and preservation of labels when the different modalities are augmented in isolation. This work proposes an easy-to-adapt learnable multimodal augmentatio...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: This work identifies two critical challenges in multimodal data augmentation: First, Non-trivial augmentation for certain modalities such as numerical or categorical, and preservation of labels when the different modalities are augmented in isolation. This work proposes an easy-to-adapt learnable multimodal aug...
This paper proposed a new framework called Knowledge-based Policy Fusion (KPR), which leverages domain knowledge to defend against adversarial attacks in RL. KPR incorporates domain knowledge from auxiliary policies and specified logical relations between tasks, then learns flexible relations from interaction data via ...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposed a new framework called Knowledge-based Policy Fusion (KPR), which leverages domain knowledge to defend against adversarial attacks in RL. KPR incorporates domain knowledge from auxiliary policies and specified logical relations between tasks, then learns flexible relations from interaction d...
This paper explores multimodal prompt engineering for zero-shot multimodal reasoning. Using language as the intermediate representation, the authors propose Socratic Models (SM) where outputs from different modalities are composed into textual prompts to provide zero-shot results on image captioning, description genera...
Recommendation: 8: accept, good paper
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper explores multimodal prompt engineering for zero-shot multimodal reasoning. Using language as the intermediate representation, the authors propose Socratic Models (SM) where outputs from different modalities are composed into textual prompts to provide zero-shot results on image captioning, descriptio...
Recent learned indexes leverage the machine learning models to replace the traditional index structures to achieve a superior performance. However, existing learned indexes adopt a fixed prediction error threshold to build the index. This paper focus on the diverse characteristics of different data localities and propo...
Recommendation: 6: marginally above the acceptance threshold
Area: General Machine Learning
Review: Recent learned indexes leverage the machine learning models to replace the traditional index structures to achieve a superior performance. However, existing learned indexes adopt a fixed prediction error threshold to build the index. This paper focus on the diverse characteristics of different data localities a...
This paper focuses on Domain Adaptation (DA) in the context of learning to rank. The authors follow the invariant representation learning approach, which they extend to the listwise learning to rank scenario. The final objective consists of a listwise ranking loss and an adversarial loss encouraging invariance across d...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper focuses on Domain Adaptation (DA) in the context of learning to rank. The authors follow the invariant representation learning approach, which they extend to the listwise learning to rank scenario. The final objective consists of a listwise ranking loss and an adversarial loss encouraging invariance ...
The paper proposes a new task called “WebBrain”. The objective of the task is to learn to generate a fluent, informative and factually correct short article from a query given some search results. The task is essentially a combination of 2 components: 1. retrieval of evidence passages given a wikipedia page title, ...
Recommendation: 8: accept, good paper
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The paper proposes a new task called “WebBrain”. The objective of the task is to learn to generate a fluent, informative and factually correct short article from a query given some search results. The task is essentially a combination of 2 components: 1. retrieval of evidence passages given a wikipedia page t...
The paper studies the infinite horizon average reward constrained Markov Decision Process (CMDP) for the model-free linear CMDP setup. The paper proposes 3 different algorithms under different assumptions or computation efficiency. The first algorithm is based on fixed-point optimization with optimism, which is to solv...
Recommendation: 3: reject, not good enough
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: The paper studies the infinite horizon average reward constrained Markov Decision Process (CMDP) for the model-free linear CMDP setup. The paper proposes 3 different algorithms under different assumptions or computation efficiency. The first algorithm is based on fixed-point optimization with optimism, which is...
This paper proposes a novel embedding-based knowledge distillation method for Transformer in QA, including DE2DE and CE2DE. Moreover, they give a theory that proves the effectiveness of the distillation method on the generalization of student networks. Strength: -- The theory proof makes the method more convinci...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposes a novel embedding-based knowledge distillation method for Transformer in QA, including DE2DE and CE2DE. Moreover, they give a theory that proves the effectiveness of the distillation method on the generalization of student networks. Strength: -- The theory proof makes the method more ...
This paper introduces many new insights that ease the training of and push the capabilities of Gaussian-Bernoulli Restricted Boltzmann Machines (GRBMs). In particular, they propose a hybrid Gibbs-Langevin sampling algorithm for inference, as well as a modified CD algorithm using two Markov chains (paired with gradient ...
Recommendation: 6: marginally above the acceptance threshold
Area: Generative models
Review: This paper introduces many new insights that ease the training of and push the capabilities of Gaussian-Bernoulli Restricted Boltzmann Machines (GRBMs). In particular, they propose a hybrid Gibbs-Langevin sampling algorithm for inference, as well as a modified CD algorithm using two Markov chains (paired with g...
This paper proposes a mixture of encoder-decoder transformers, called CodeT5Mix, for code understanding and generation. It also proposes a number of pretraining tasks including denoising, causal LM, constrastive loss, matching to pretrain the CodeT5Mix. Extensive experiments on various tasks have been well performed. S...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposes a mixture of encoder-decoder transformers, called CodeT5Mix, for code understanding and generation. It also proposes a number of pretraining tasks including denoising, causal LM, constrastive loss, matching to pretrain the CodeT5Mix. Extensive experiments on various tasks have been well perf...
The paper extends the framework of unsupervised environment design to multi-agent setting and demonstrate its effectiveness on two 2-player competitive games. Strengths: - Extending the UED to multi-agent setting is an important problem to tackle; and for the chosen environments, the performance of the proposed algori...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The paper extends the framework of unsupervised environment design to multi-agent setting and demonstrate its effectiveness on two 2-player competitive games. Strengths: - Extending the UED to multi-agent setting is an important problem to tackle; and for the chosen environments, the performance of the propose...
- Real-world KGs are incomplete and suffer from the long-tail distribution over the relations. - Thus the performance (on completion tasks) on the low-frequency relations is poor. - Prediction of the tail entity given the (head, relation, ?), is considered a few-shot completion problem, in which one could try to learn ...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: - Real-world KGs are incomplete and suffer from the long-tail distribution over the relations. - Thus the performance (on completion tasks) on the low-frequency relations is poor. - Prediction of the tail entity given the (head, relation, ?), is considered a few-shot completion problem, in which one could try t...
This paper studies the discrete symmetries of robotics systems. The authors present a set of results: (1) the identification of the system’s morphological symmetry Group G, (2) the characterization of how the group acts upon the system state variables and any relevant measurement living in the Euclidean space, and (3) ...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper studies the discrete symmetries of robotics systems. The authors present a set of results: (1) the identification of the system’s morphological symmetry Group G, (2) the characterization of how the group acts upon the system state variables and any relevant measurement living in the Euclidean space, ...
This paper presents a image demoireing method that focus on its use on mobile phones. This is important as current methods are extremely costly, and cannot therefore be embedded in current devices. The authors propose to first, divide the image into patches, second, given a proposed Moire prior, classify the patches ac...
Recommendation: 8: accept, good paper
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper presents a image demoireing method that focus on its use on mobile phones. This is important as current methods are extremely costly, and cannot therefore be embedded in current devices. The authors propose to first, divide the image into patches, second, given a proposed Moire prior, classify the pa...
This paper proposes a deep neural network to predict poses in SO(3) from 2-D images. The proposed method first maps 2-D images onto a hemi-sphere by projection, and then convolve it with a filter on $S^2$ in the basis of spherical harmonics, and then apply rotation-equivariant layers that convolves the signals in the b...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposes a deep neural network to predict poses in SO(3) from 2-D images. The proposed method first maps 2-D images onto a hemi-sphere by projection, and then convolve it with a filter on $S^2$ in the basis of spherical harmonics, and then apply rotation-equivariant layers that convolves the signals ...
This paper proposes an approach to automatically discover the failure cases of vision models under real-world settings. Off-the-shelf image-to-text and text-to-image models are leveraged to find such failures. Firstly, a conditional text-to-image synthesis model generates synthetic data based on the ground-truth label....
Recommendation: 3: reject, not good enough
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper proposes an approach to automatically discover the failure cases of vision models under real-world settings. Off-the-shelf image-to-text and text-to-image models are leveraged to find such failures. Firstly, a conditional text-to-image synthesis model generates synthetic data based on the ground-trut...
The manuscript describes the construction of an Hierarchical Reinforcement Learning (HRL) policy for solving the navigation in a maze task. Technically, the paper proposes the epsilon-Invariant HRL to leverage task-agnostic abstract subgoals. This approach tries to mitigate the transition mismatch problem ((Zhang et a...
Recommendation: 5: marginally below the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The manuscript describes the construction of an Hierarchical Reinforcement Learning (HRL) policy for solving the navigation in a maze task. Technically, the paper proposes the epsilon-Invariant HRL to leverage task-agnostic abstract subgoals. This approach tries to mitigate the transition mismatch problem ((Zh...
In this work, the authors introduce the Constraint Augmented Multi-Agent framework — CAMA, which can serve as a plug-and-play module to the popular MARL algorithms. They propose an approach that represents the safety constraint as discounted safety costs, known as the safety budget and demonstrate in experiments that C...
Recommendation: 5: marginally below the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: In this work, the authors introduce the Constraint Augmented Multi-Agent framework — CAMA, which can serve as a plug-and-play module to the popular MARL algorithms. They propose an approach that represents the safety constraint as discounted safety costs, known as the safety budget and demonstrate in experiment...
This work proposes a framework for learning combinatorial problems over graphs in which the solution can be expressed in terms of an ordered labeling of the nodes. Then, the authors propose GAT-CNL, a neural architecture leveraging the framework to learn to solve such class of problems in a greedy fashion. Empirically,...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This work proposes a framework for learning combinatorial problems over graphs in which the solution can be expressed in terms of an ordered labeling of the nodes. Then, the authors propose GAT-CNL, a neural architecture leveraging the framework to learn to solve such class of problems in a greedy fashion. Empi...
The paper proposed neural household transforms (NHT) for learning a low-dimensional action representation for RL problem. Prior work in this area usually learns an autoencoder-style action representation using neural networks. In this work, the authors propose to learn a network that maps to an orthogonal matrix instea...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: The paper proposed neural household transforms (NHT) for learning a low-dimensional action representation for RL problem. Prior work in this area usually learns an autoencoder-style action representation using neural networks. In this work, the authors propose to learn a network that maps to an orthogonal matri...
The paper presents a definition of the in distribution data (and by extension OOD), where the authors decompose the definition of the ID into texture and semantics. This decompostion provides the flexibility to different scenarios by determining which view of the ID more suited for a given scenario. The texture pipelin...
Recommendation: 5: marginally below the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The paper presents a definition of the in distribution data (and by extension OOD), where the authors decompose the definition of the ID into texture and semantics. This decompostion provides the flexibility to different scenarios by determining which view of the ID more suited for a given scenario. The texture...
This paper presents an approach for subset selection for training models in a batch setting. The proposed approach, called IWeS, uses importance sampling to select examples for inclusion in the subset, where the sampling probability is based on the model’s entropy. Experimental results show that IWeS provides moderat...
Recommendation: 8: accept, good paper
Area: General Machine Learning
Review: This paper presents an approach for subset selection for training models in a batch setting. The proposed approach, called IWeS, uses importance sampling to select examples for inclusion in the subset, where the sampling probability is based on the model’s entropy. Experimental results show that IWeS provides...
This paper discusses how to embed the edges of temporal networks. It proposes to create line graphs weighed by Gaussian weight decay and to use the row vectors of the adjacency matrix of the line graph as the embeddings of the edges. The experimental results show that the proposed method performs better in edge classif...
Recommendation: 6: marginally above the acceptance threshold
Area: General Machine Learning
Review: This paper discusses how to embed the edges of temporal networks. It proposes to create line graphs weighed by Gaussian weight decay and to use the row vectors of the adjacency matrix of the line graph as the embeddings of the edges. The experimental results show that the proposed method performs better in edge...
This paper proposes the Self-generated Tasks from UNlabeled Tables (STUNT) for few-shot tabular learning, where there are only a limited number of labeled training examples. STUNT applies unsupervised meta-learning to learn generalized knowledge, and an unsupervised validation strategy is also proposed. Experiments on ...
Recommendation: 5: marginally below the acceptance threshold
Area: Unsupervised and Self-supervised learning
Review: This paper proposes the Self-generated Tasks from UNlabeled Tables (STUNT) for few-shot tabular learning, where there are only a limited number of labeled training examples. STUNT applies unsupervised meta-learning to learn generalized knowledge, and an unsupervised validation strategy is also proposed. Experim...
This paper investigates the multi-interest for user embeddings in recommender retrievers. The authors consider the different weights of interests as well as time-varying interests and integrate a multi-head attention module and a cluster strategy with their weights. The proposed MIP model is then validated using public...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This paper investigates the multi-interest for user embeddings in recommender retrievers. The authors consider the different weights of interests as well as time-varying interests and integrate a multi-head attention module and a cluster strategy with their weights. The proposed MIP model is then validated usin...
The authors train spiking neural networks (SNNs) for image classification using the surrogate gradient method. They propose a MLP architecture, where (strided) convolutions are only found in the patch encoding stages. The rest of the network uses linear layers only (no attention either). They report results on CIFAR10,...
Recommendation: 6: marginally above the acceptance threshold
Area: Neuroscience and Cognitive Science (e.g., neural coding, brain-computer interfaces)
Review: The authors train spiking neural networks (SNNs) for image classification using the surrogate gradient method. They propose a MLP architecture, where (strided) convolutions are only found in the patch encoding stages. The rest of the network uses linear layers only (no attention either). They report results on ...
The paper proposes four additional task for validating whether current large VL models trained with contrastive losses are sensitive to detailed attributes and relationships of the objects. The tasks include genome attributes and relations and COCO and Flickr captions. The paper found that most large VL models can not ...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: The paper proposes four additional task for validating whether current large VL models trained with contrastive losses are sensitive to detailed attributes and relationships of the objects. The tasks include genome attributes and relations and COCO and Flickr captions. The paper found that most large VL models ...
Given the research progress on logit adjustment for supervised long-tailed learning, this paper presents a new method S^2LA to conduct self-supervised long-tailed learning from the geometric perspective. In fact, without knowing the class distribution, S^2LA uses a constant simplex ETF to measure the geometric charact...
Recommendation: 5: marginally below the acceptance threshold
Area: Unsupervised and Self-supervised learning
Review: Given the research progress on logit adjustment for supervised long-tailed learning, this paper presents a new method S^2LA to conduct self-supervised long-tailed learning from the geometric perspective. In fact, without knowing the class distribution, S^2LA uses a constant simplex ETF to measure the geometric...
This paper proposed a 4-bit quantization method (LUQ) for matrix multiplication in training deep learning models. This method uses 4-bit integer quantization for weight and activation quantization, and use the proposed logarithmic unbiased quantization (LUQ) for gradient back propagation. The major contributions are t...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposed a 4-bit quantization method (LUQ) for matrix multiplication in training deep learning models. This method uses 4-bit integer quantization for weight and activation quantization, and use the proposed logarithmic unbiased quantization (LUQ) for gradient back propagation. The major contributio...
The paper is in the field of "Future- or return-conditioned supervised learning". Here the main idea is to learn, from a batch of data, a policy that is conditioned on a latent variable z, which is often the return of a given trajectory. However, in stochastic environments, the return is often not driven by the perfor...
Recommendation: 8: accept, good paper
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The paper is in the field of "Future- or return-conditioned supervised learning". Here the main idea is to learn, from a batch of data, a policy that is conditioned on a latent variable z, which is often the return of a given trajectory. However, in stochastic environments, the return is often not driven by th...
This paper proposes a diffusion based motion modeling method that uses transformers a backbone for the diffusion process. The authors train a general conditional motion generation method using classifier free guidance which allows them to use the same model for conditioned and unconditioned generation. In experiments, ...
Recommendation: 8: accept, good paper
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper proposes a diffusion based motion modeling method that uses transformers a backbone for the diffusion process. The authors train a general conditional motion generation method using classifier free guidance which allows them to use the same model for conditioned and unconditioned generation. In exper...
The paper looks at graph hyperbolic neural networks to learn maps from $\mathbb{L}^n \to \mathbb{L}^d$ (where $\mathbb{L}^d$ is $d-1$ dimensional Lorentz manifold. In particular, given a graph $G$ we learn features for each node using such a map and then use this for node classification and link prediction. The novelt...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: The paper looks at graph hyperbolic neural networks to learn maps from $\mathbb{L}^n \to \mathbb{L}^d$ (where $\mathbb{L}^d$ is $d-1$ dimensional Lorentz manifold. In particular, given a graph $G$ we learn features for each node using such a map and then use this for node classification and link prediction. Th...
This paper proposes an encoding method that replaces the standard positional encoding in transformers. The label-based order encoding method achieves strong generalization to sequences longer than training ones. This paper also analyzes two-layer causal transformers to learn multiple algorithmic operations. It finds t...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposes an encoding method that replaces the standard positional encoding in transformers. The label-based order encoding method achieves strong generalization to sequences longer than training ones. This paper also analyzes two-layer causal transformers to learn multiple algorithmic operations. It...
The paper presents a model and sampling method for de novo drug design. The model consists of - multi-layer perceptron that outputs an 'energy' as a function of a latent vector - LSTM that generates SELFIES strings conditional on the latent vector - multi-layer perceptrons to predict molecule properties given latent v...
Recommendation: 5: marginally below the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: The paper presents a model and sampling method for de novo drug design. The model consists of - multi-layer perceptron that outputs an 'energy' as a function of a latent vector - LSTM that generates SELFIES strings conditional on the latent vector - multi-layer perceptrons to predict molecule properties given ...
The paper proposes a novel deep neural network architecture for multi-horizon time series forecasting, ETSformer, via improved representation learning of level-growth-seasonality relationships commonly found in time series datasets. While the paper refers to these as attention mechanisms, it in fact models features in ...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: The paper proposes a novel deep neural network architecture for multi-horizon time series forecasting, ETSformer, via improved representation learning of level-growth-seasonality relationships commonly found in time series datasets. While the paper refers to these as attention mechanisms, it in fact models feat...
This work attempts to establish general geometric statistics of deep learning representations (Manifold graph metrics---MGMs) that can be useful for quantifying various properties of deep learning models. According to the paper, these can be viewed as measurements of desirable qualitative features of the resulting mode...
Recommendation: 3: reject, not good enough
Area: Unsupervised and Self-supervised learning
Review: This work attempts to establish general geometric statistics of deep learning representations (Manifold graph metrics---MGMs) that can be useful for quantifying various properties of deep learning models. According to the paper, these can be viewed as measurements of desirable qualitative features of the result...
In this paper, the authors consider the problem of bilevel optimization when the lower level optimization (LL) problem is strongly convex and has to satisfy some linear constraints. The main issue with the constraints in the lower level optimization problem is that the solution of the LL problem might not be differenti...
Recommendation: 5: marginally below the acceptance threshold
Area: Optimization (eg, convex and non-convex optimization)
Review: In this paper, the authors consider the problem of bilevel optimization when the lower level optimization (LL) problem is strongly convex and has to satisfy some linear constraints. The main issue with the constraints in the lower level optimization problem is that the solution of the LL problem might not be di...