review
stringlengths
5
16.6k
score
stringclasses
5 values
area
stringclasses
12 values
text
stringlengths
31
5.65k
This paper proposes a self-supervised learning approach in the context of low-compute deep-learning models (e.g., DeiT-Tiny). The authors observe that a weaker self-supervised target is beneficial for small networks, and propose to match multiple views in more comparable spatial scales and contexts. Experimental result...
Recommendation: 6: marginally above the acceptance threshold
Area: Unsupervised and Self-supervised learning
Review: This paper proposes a self-supervised learning approach in the context of low-compute deep-learning models (e.g., DeiT-Tiny). The authors observe that a weaker self-supervised target is beneficial for small networks, and propose to match multiple views in more comparable spatial scales and contexts. Experimenta...
This paper examines whether the masking method faithfully removes the information encoded in the input variables. Then the authors propose a method to remove the effect encoded in the input variables by learning optimal baseline values for Shapley values. Experimental results demonstrate the effectiveness of the method...
Recommendation: 6: marginally above the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper examines whether the masking method faithfully removes the information encoded in the input variables. Then the authors propose a method to remove the effect encoded in the input variables by learning optimal baseline values for Shapley values. Experimental results demonstrate the effectiveness of th...
The paper investigates three separated techniques to improve the successful rate and perturbation efficiency of backdoor attacks. Based on the proposed attacking strategy, the authors constructed two backdoored datasets based on CIFAR-10 and CIFAR-100, in which 0.04% and 0.06% of the data are poisoned. Both of them hav...
Recommendation: 3: reject, not good enough
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The paper investigates three separated techniques to improve the successful rate and perturbation efficiency of backdoor attacks. Based on the proposed attacking strategy, the authors constructed two backdoored datasets based on CIFAR-10 and CIFAR-100, in which 0.04% and 0.06% of the data are poisoned. Both of ...
This submission proposed an extension of NeRF called DM-NeRF, which can segment individual objects and manipulate them (translation, rotation, deformation, etc.). To supervise object segmentation, the authors use their algorithm to generate multiple 2D object code predictions and match them with ground truth object lab...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This submission proposed an extension of NeRF called DM-NeRF, which can segment individual objects and manipulate them (translation, rotation, deformation, etc.). To supervise object segmentation, the authors use their algorithm to generate multiple 2D object code predictions and match them with ground truth ob...
This paper proposes a general framework to solve the high dimensional continuum armed bandit problem and high dimensional contextual bandit problem jointly. This research problem is significant and the proposed model is novel. I agree that the proposed problem has broad scope of applications. For this problem, the pape...
Recommendation: 5: marginally below the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: This paper proposes a general framework to solve the high dimensional continuum armed bandit problem and high dimensional contextual bandit problem jointly. This research problem is significant and the proposed model is novel. I agree that the proposed problem has broad scope of applications. For this problem, ...
1. This paper proposed the QuasiConvex shallow neural networks (QCNN) whose optimization is equivalent to a convex feasibility problem, which can be solved efficiently with theoretical guarantees. As the building block, they first proved that the multiplication of ReLU output is quasiconvex. These building blocks can t...
Recommendation: 3: reject, not good enough
Area: Optimization (eg, convex and non-convex optimization)
Review: 1. This paper proposed the QuasiConvex shallow neural networks (QCNN) whose optimization is equivalent to a convex feasibility problem, which can be solved efficiently with theoretical guarantees. As the building block, they first proved that the multiplication of ReLU output is quasiconvex. These building bloc...
This paper presents a method for estimating the gauged stream flow of a watershed from the water flux daily observations at each location of a river basin. A convolutional neural network is used to perform this regression, and it is tested on real data (4 USA basin rivers). Strenghs: - the application is of importance...
Recommendation: 3: reject, not good enough
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: This paper presents a method for estimating the gauged stream flow of a watershed from the water flux daily observations at each location of a river basin. A convolutional neural network is used to perform this regression, and it is tested on real data (4 USA basin rivers). Strenghs: - the application is of im...
This paper proposed a module inserted into a pre-trained model for parameter efficient fine-tuning. The authors empirically combine adapter, adapt pre-fix tuning, and verify the effectiveness of the design through a series of experiments. The proposed method achieves very competitive results and has the potential to ou...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposed a module inserted into a pre-trained model for parameter efficient fine-tuning. The authors empirically combine adapter, adapt pre-fix tuning, and verify the effectiveness of the design through a series of experiments. The proposed method achieves very competitive results and has the potenti...
The authors consider the problem of learning DAG from heterogeneous datasets that share the same DAG. This problem statement is quite restricted. From Eq(4) we can see that the authors not only encourage the DAG to have the same structure, but also to have the same parameter. While in Figure 1, the authors assume that ...
Recommendation: 3: reject, not good enough
Area: General Machine Learning
Review: The authors consider the problem of learning DAG from heterogeneous datasets that share the same DAG. This problem statement is quite restricted. From Eq(4) we can see that the authors not only encourage the DAG to have the same structure, but also to have the same parameter. While in Figure 1, the authors assu...
This paper proposes a workflow for using neural networks to solve optimisation problems while guaranteeing the feasibility of the solution. Strength: 1. The paper tackles an important problem of guaranteeing correctness of DNN-based solution (i.e., does not violate constraints) for the optimization problem, which is ...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposes a workflow for using neural networks to solve optimisation problems while guaranteeing the feasibility of the solution. Strength: 1. The paper tackles an important problem of guaranteeing correctness of DNN-based solution (i.e., does not violate constraints) for the optimization problem, w...
The paper presents two different ways of training a decision tree with fairness criteria and then providing a zero-knowledge proof certifying the fairness without revealing any further information. I think this is in a great application of zero-knowledge proofs. Interesting and well-executed application of zero-knowl...
Recommendation: 8: accept, good paper
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The paper presents two different ways of training a decision tree with fairness criteria and then providing a zero-knowledge proof certifying the fairness without revealing any further information. I think this is in a great application of zero-knowledge proofs. Interesting and well-executed application of ze...
This paper studies reward-free learning in linear MDPs. It proposes a computationally efficient algorithm LSVI-RFE and improves the upper bound to O(H^4d^2/eps^2). An Omega(H^3d^2/eps^2) lower bound is also provided. Strengths: 1. The LSVI-RFE algorithm is computationally efficient and improves the current state of th...
Recommendation: 8: accept, good paper
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: This paper studies reward-free learning in linear MDPs. It proposes a computationally efficient algorithm LSVI-RFE and improves the upper bound to O(H^4d^2/eps^2). An Omega(H^3d^2/eps^2) lower bound is also provided. Strengths: 1. The LSVI-RFE algorithm is computationally efficient and improves the current sta...
This study gives the solution structure of the label smoothing (LS) loss with positivity constraint, which is an orthogonal variant of the original neural collapse configurations. The paper further explores why LS loss has a better generalization than CE loss when label corruption emerges based on the memorization-dila...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This study gives the solution structure of the label smoothing (LS) loss with positivity constraint, which is an orthogonal variant of the original neural collapse configurations. The paper further explores why LS loss has a better generalization than CE loss when label corruption emerges based on the memorizat...
This paper introduces a new algorithm, Prometheus, for the composite stochastic bilevel optimization problem in the decentralized setting. In particular, the paper considers the setting where we have a distributed optimization problem on $m$ agents, each of which has a loss function of the form $l(x) + h(x)$ where $l(x...
Recommendation: 5: marginally below the acceptance threshold
Area: Optimization (eg, convex and non-convex optimization)
Review: This paper introduces a new algorithm, Prometheus, for the composite stochastic bilevel optimization problem in the decentralized setting. In particular, the paper considers the setting where we have a distributed optimization problem on $m$ agents, each of which has a loss function of the form $l(x) + h(x)$ wh...
The paper proposes a new dimensionality reduction method, named RTD-AE, that attempts to preserve the topological structure of the data when they are compressed to a lower-dimensional space. This is done in a standard autoencoder fashion where the loss function consists of a reconstruction loss and a topology-preservin...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: The paper proposes a new dimensionality reduction method, named RTD-AE, that attempts to preserve the topological structure of the data when they are compressed to a lower-dimensional space. This is done in a standard autoencoder fashion where the loss function consists of a reconstruction loss and a topology-p...
The paper presents a new fairness metric that can measure fairness for multiple sensitive attributes of any type. The author also developed a learning algorithm by using their fairness criteria as a regularization term. The paper aims to solve an important problem which is ensuring fairness for any number and any type ...
Recommendation: 3: reject, not good enough
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The paper presents a new fairness metric that can measure fairness for multiple sensitive attributes of any type. The author also developed a learning algorithm by using their fairness criteria as a regularization term. The paper aims to solve an important problem which is ensuring fairness for any number and a...
The paper considers sim-to-real transfer and approaches this problem from a theoretical perspective. It uses LQG to model the system dynamics and establishes the upper and lower bounds on the sim-to-real gap. A new algorithm is also developed for transfer learning. Strengths: 1. Sim-to-real transfer is an important p...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The paper considers sim-to-real transfer and approaches this problem from a theoretical perspective. It uses LQG to model the system dynamics and establishes the upper and lower bounds on the sim-to-real gap. A new algorithm is also developed for transfer learning. Strengths: 1. Sim-to-real transfer is an imp...
The paper studies how to visualize high sensitivity directions in reinforcement learning. Given a set of states, authors proposed a RADEN algorithm to find the leading eigenvector of certain covariance matrix relevant to the perturbation analysis. The obtained leading eigenvector indicates the directions of vulnerabili...
Recommendation: 3: reject, not good enough
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The paper studies how to visualize high sensitivity directions in reinforcement learning. Given a set of states, authors proposed a RADEN algorithm to find the leading eigenvector of certain covariance matrix relevant to the perturbation analysis. The obtained leading eigenvector indicates the directions of vul...
In this paper, the authors propose a transformer-based method for the temporal action proposal generation task. Compared with existing methods, the main difference lies in the choice of visual features, which are obtained from the Laban Movement Analysis (LMA) method that are originally designed for action analysis. Th...
Recommendation: 3: reject, not good enough
Area: Applications (eg, speech processing, computer vision, NLP)
Review: In this paper, the authors propose a transformer-based method for the temporal action proposal generation task. Compared with existing methods, the main difference lies in the choice of visual features, which are obtained from the Laban Movement Analysis (LMA) method that are originally designed for action anal...
The paper proposes MPCFormer, a novel two-stage approach for private transformer inference with MPC. The first stage replaces bottleneck functions in the pre-trained transformer (ie, functions with high computational/communication complexity under MPC), with MPC-friendly approximations. The second stage uses knowledge ...
Recommendation: 8: accept, good paper
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The paper proposes MPCFormer, a novel two-stage approach for private transformer inference with MPC. The first stage replaces bottleneck functions in the pre-trained transformer (ie, functions with high computational/communication complexity under MPC), with MPC-friendly approximations. The second stage uses kn...
This paper attempted to explain the superiority of row-normalized adjacency matrices as the graph convolution operator for node classification in GNNs from the viewpoint of graph neural tangent kernels (GNTK). This paper derived GNTKs for GNNs with finite and infinite layers (and with an infinite number of units) for v...
Recommendation: 3: reject, not good enough
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: This paper attempted to explain the superiority of row-normalized adjacency matrices as the graph convolution operator for node classification in GNNs from the viewpoint of graph neural tangent kernels (GNTK). This paper derived GNTKs for GNNs with finite and infinite layers (and with an infinite number of unit...
This paper extends the 3D GAN to more diverse and un-aligned datasets (eg., ImageNet). This problem setting change is significant and very challenging, as we have learned from 2D fields (StyleGAN3--> StyleGAN-XL). This paper introduces several new modules to adapt an existing model EpiGRAF to this new setting including...
Recommendation: 8: accept, good paper
Area: Generative models
Review: This paper extends the 3D GAN to more diverse and un-aligned datasets (eg., ImageNet). This problem setting change is significant and very challenging, as we have learned from 2D fields (StyleGAN3--> StyleGAN-XL). This paper introduces several new modules to adapt an existing model EpiGRAF to this new setting i...
Based on heavy-tailed Levy dynamics can produce both large jumps and small roaming to explore the sampling space, resulting in better sampling results than Langevin dynamics with a lacking of large jumps, the authors explore a new class of score-based generative models (SGMs) with sampling based on the Levy dynamics. H...
Recommendation: 3: reject, not good enough
Area: Generative models
Review: Based on heavy-tailed Levy dynamics can produce both large jumps and small roaming to explore the sampling space, resulting in better sampling results than Langevin dynamics with a lacking of large jumps, the authors explore a new class of score-based generative models (SGMs) with sampling based on the Levy dyn...
This paper proposes to discovery causal graphs in term of conditional summary graphs with conditional stationary time series data. Authors first present the framework for learning conditional time series data and then presented a VAE framework to instantiate the framework. Empirical study shows the superior performance...
Recommendation: 6: marginally above the acceptance threshold
Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes)
Review: This paper proposes to discovery causal graphs in term of conditional summary graphs with conditional stationary time series data. Authors first present the framework for learning conditional time series data and then presented a VAE framework to instantiate the framework. Empirical study shows the superior per...
This paper proposes a test-time adaptation method based visual prompt tuning. After training the deep model along with a set of prompts to convergence, the proposed DePT fixes the backbone parameters and only fine tunes the prompts on the target domain. Based on this learning scheme, DePT integrates multiple self-train...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposes a test-time adaptation method based visual prompt tuning. After training the deep model along with a set of prompts to convergence, the proposed DePT fixes the backbone parameters and only fine tunes the prompts on the target domain. Based on this learning scheme, DePT integrates multiple se...
Learning decision trees from data is a simple and rich problem. The classic decision tree learning algorithms use a greedy strategy to select the best feature to evenly split the dataset. In this work, the authors look at k features and select an attribute that achieves maximal accuracy. This recovers the classic strat...
Recommendation: 8: accept, good paper
Area: General Machine Learning
Review: Learning decision trees from data is a simple and rich problem. The classic decision tree learning algorithms use a greedy strategy to select the best feature to evenly split the dataset. In this work, the authors look at k features and select an attribute that achieves maximal accuracy. This recovers the class...
This paper firstly analyzes the properties of mean teacher in a masked data modeling task with a simplified linear model. The mean teacher contributes to the training by gradient correction, and it is similar to the memory queue. Several empirical findings about the mean teacher are introduced based on the experimental...
Recommendation: 6: marginally above the acceptance threshold
Area: Unsupervised and Self-supervised learning
Review: This paper firstly analyzes the properties of mean teacher in a masked data modeling task with a simplified linear model. The mean teacher contributes to the training by gradient correction, and it is similar to the memory queue. Several empirical findings about the mean teacher are introduced based on the expe...
The paper tackles the global class imbalance problem in Federated Learning and proposes a novel class distribution estimation method. The estimation method is motivated by the observation that the averaged output probability vector from a classifier at the beginning of training is numerically close to the class ratio. ...
Recommendation: 5: marginally below the acceptance threshold
Area: General Machine Learning
Review: The paper tackles the global class imbalance problem in Federated Learning and proposes a novel class distribution estimation method. The estimation method is motivated by the observation that the averaged output probability vector from a classifier at the beginning of training is numerically close to the class...
The paper presents autograph, a GNN-based approach to automatic loop vectorization. Autograph represents the program as a graph, computes an embedding for each node using a standard GNN forward pass, then trains a RL agent to predict vectorization factors based on node embeddings. The paper evaluates on a set of standa...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The paper presents autograph, a GNN-based approach to automatic loop vectorization. Autograph represents the program as a graph, computes an embedding for each node using a standard GNN forward pass, then trains a RL agent to predict vectorization factors based on node embeddings. The paper evaluates on a set o...
The paper tackles the problem of detection of adversarial examples targeting (deep) neural networks. Specifically, the paper models the underlying operations of neural networks as a “dynamic process”, wherein information is propagated “over time” (i.e., goes through layers of neurons). By acting upon such intuition, th...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: The paper tackles the problem of detection of adversarial examples targeting (deep) neural networks. Specifically, the paper models the underlying operations of neural networks as a “dynamic process”, wherein information is propagated “over time” (i.e., goes through layers of neurons). By acting upon such intui...
This paper focuses on recognizing actions based on the motion information in the videos. The proposed idea (Dense Correlation Fields, DCF) which can be applied to different CNN backbones, computes frame to frame similarity to find spatial-temporal correlation fields. - DCF is a simple and novel idea that outperforms S...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper focuses on recognizing actions based on the motion information in the videos. The proposed idea (Dense Correlation Fields, DCF) which can be applied to different CNN backbones, computes frame to frame similarity to find spatial-temporal correlation fields. - DCF is a simple and novel idea that outpe...
This paper proposes a hyperparameter optimization algorithm that leverages the power law phenomenon of the learning curves. In particular, the proposed method DPL assumes the surrogate $\hat f(\lambda)$ of the true learning curve $f(\lambda)$ obeys a power law function, which can be parameterized by a neural network. ...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposes a hyperparameter optimization algorithm that leverages the power law phenomenon of the learning curves. In particular, the proposed method DPL assumes the surrogate $\hat f(\lambda)$ of the true learning curve $f(\lambda)$ obeys a power law function, which can be parameterized by a neural n...
This paper introduces deep metric learning for generalized zero-shot learning, and proposes a novel framework named MLIS to avoid overfitting to seen classes. MLIS disentangles the effect of semantics on feature learning and classification, making the training of the two tasks more effective. Moreover, this paper conca...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This paper introduces deep metric learning for generalized zero-shot learning, and proposes a novel framework named MLIS to avoid overfitting to seen classes. MLIS disentangles the effect of semantics on feature learning and classification, making the training of the two tasks more effective. Moreover, this pap...
This paper proposes a dynamic scheduling strategy for the value of the weight decay hyperparameter. During the training procedure, the authors keep the ratio of the value of weight decay value to the gradient of cross-entropy loss (dubbed as DoG) at a constant. Empirically, this adaptive weight decay strategy can help ...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposes a dynamic scheduling strategy for the value of the weight decay hyperparameter. During the training procedure, the authors keep the ratio of the value of weight decay value to the gradient of cross-entropy loss (dubbed as DoG) at a constant. Empirically, this adaptive weight decay strategy c...
The paper studies representation learning for Markov games with low-rank structures. Under the low-rank assumption, the authors develop two representation learning methods to learn the underlying transitions: model-based and model-free representation learning and add the UCB bonus into the estimated Q-value functions f...
Recommendation: 6: marginally above the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: The paper studies representation learning for Markov games with low-rank structures. Under the low-rank assumption, the authors develop two representation learning methods to learn the underlying transitions: model-based and model-free representation learning and add the UCB bonus into the estimated Q-value fun...
The proposed method is a offline language-based goal-conditioned reinforcement learning. It needs human annotator for labeling basic tasks with languages. It implements large languages models for relabeling and cross-trajectory chaining, in order to increase the diversity of the task set. Experiments are conducted to s...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The proposed method is a offline language-based goal-conditioned reinforcement learning. It needs human annotator for labeling basic tasks with languages. It implements large languages models for relabeling and cross-trajectory chaining, in order to increase the diversity of the task set. Experiments are conduc...
This work addresses the problem of using large language models for understanding HTML. Unlike prior work which attempt to solve this problem using dedicated architectures and training procedures and/or large HTML corpora, this work employs large language models pretrained on natural language text and evaluates their pe...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This work addresses the problem of using large language models for understanding HTML. Unlike prior work which attempt to solve this problem using dedicated architectures and training procedures and/or large HTML corpora, this work employs large language models pretrained on natural language text and evaluates ...
This paper proposes a curriculum learning approach for reinforcement learning (RL) that changes the morphology of the agent as well as the environment for training agents that are robust to test-time environments. The authors provide thorough experimental results and ablation studies in three domains and demonstrate th...
Recommendation: 5: marginally below the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper proposes a curriculum learning approach for reinforcement learning (RL) that changes the morphology of the agent as well as the environment for training agents that are robust to test-time environments. The authors provide thorough experimental results and ablation studies in three domains and demons...
This paper focuses on the setting of unsupervised domain generalization, where the multiple source domains do not have label supervision and the target domain is unseen. Based on the previous work (i.e., DiMAE) that applies the masked-reconstruction-modeling as a self-supervised task, this paper further proposes two mo...
Recommendation: 6: marginally above the acceptance threshold
Area: Unsupervised and Self-supervised learning
Review: This paper focuses on the setting of unsupervised domain generalization, where the multiple source domains do not have label supervision and the target domain is unseen. Based on the previous work (i.e., DiMAE) that applies the masked-reconstruction-modeling as a self-supervised task, this paper further propose...
The authors have introduced the concept of coverability, and related it to the sample efficiency in the online reinforcement learning. This idea is very interesting and the paper is well written with detailed description of everything. *Strengths* - The paper is well written. - The authors have addressed a crucial ch...
Recommendation: 8: accept, good paper
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: The authors have introduced the concept of coverability, and related it to the sample efficiency in the online reinforcement learning. This idea is very interesting and the paper is well written with detailed description of everything. *Strengths* - The paper is well written. - The authors have addressed a cr...
This paper points out that the overlooked uniform class prior would harm the learning of semantic representation for SSL methods, especially those with collapse prevention techniques, on class-imbalanced real-world datasets. The paper formulates and proves the objectives of the recent representative SSL methods to be e...
Recommendation: 6: marginally above the acceptance threshold
Area: Unsupervised and Self-supervised learning
Review: This paper points out that the overlooked uniform class prior would harm the learning of semantic representation for SSL methods, especially those with collapse prevention techniques, on class-imbalanced real-world datasets. The paper formulates and proves the objectives of the recent representative SSL methods...
This paper seems only adding a $\lambda \cdot I$ to the KFAC. The theory in this paper seems only an easy extension of the work of KFAC. The most useful part of this paper is the case $\lambda_g \to \infty$. This paper gives a descent direction without the expensive cost of computing $\bar{g}$. The experiments show ...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper seems only adding a $\lambda \cdot I$ to the KFAC. The theory in this paper seems only an easy extension of the work of KFAC. The most useful part of this paper is the case $\lambda_g \to \infty$. This paper gives a descent direction without the expensive cost of computing $\bar{g}$. The experimen...
The authors focus on cross-modality person re-identification tasks. They build a new benchmark named NPU-ReID, and propose a dual-path fusion network. Besides, they also propose a modality data augmentation strategy and a cross modality triplet loss for optimizations. The experiments are conducted on NPU-ReID, RegDB an...
Recommendation: 3: reject, not good enough
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The authors focus on cross-modality person re-identification tasks. They build a new benchmark named NPU-ReID, and propose a dual-path fusion network. Besides, they also propose a modality data augmentation strategy and a cross modality triplet loss for optimizations. The experiments are conducted on NPU-ReID, ...
The paper describes a method which helps improve scalability of the local-in-time ODE solvers. Strengths: - The reviewer really enjoyed the problem statement in sections 1-3; it gives a good grasp on what the problem is and why the current (ML and non-ML based) solvers struggle to achieve good quality solutions for hi...
Recommendation: 8: accept, good paper
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: The paper describes a method which helps improve scalability of the local-in-time ODE solvers. Strengths: - The reviewer really enjoyed the problem statement in sections 1-3; it gives a good grasp on what the problem is and why the current (ML and non-ML based) solvers struggle to achieve good quality solution...
This paper tackles the challenge of exploration in multi agent reinforcement learning. The paper highlights the difficulty that in the multi-agent setting the value of intrinsic rewards can fluctuate and may sometimes increase, making previously visited states appear attractive again. As a solution the authors present ...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper tackles the challenge of exploration in multi agent reinforcement learning. The paper highlights the difficulty that in the multi-agent setting the value of intrinsic rewards can fluctuate and may sometimes increase, making previously visited states appear attractive again. As a solution the authors ...
This paper proposed a new graph condensation method (HCDC) for fast hyperparameter/architecture search by aligning the hyperparameter gradients. As in the paper, the proposed method is theoretically and experimentally proven to be effective on preserving the validation performance rankings of GNNs. Strength: The task ...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This paper proposed a new graph condensation method (HCDC) for fast hyperparameter/architecture search by aligning the hyperparameter gradients. As in the paper, the proposed method is theoretically and experimentally proven to be effective on preserving the validation performance rankings of GNNs. Strength: T...
The paper involves the study of constraint min-max optimization problems in the nonconvex-nonconcave setting with structure. Specifically, the more general framework of inclusion problems. Regarding the methods presented, they exclusively require single calls to the oracle and to the resolvent of an operator A; that is...
Recommendation: 8: accept, good paper
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: The paper involves the study of constraint min-max optimization problems in the nonconvex-nonconcave setting with structure. Specifically, the more general framework of inclusion problems. Regarding the methods presented, they exclusively require single calls to the oracle and to the resolvent of an operator A;...
This paper introduces a denoising diffusion model for both conditional and unconditional human motion (pose sequence) generation. Except for a couple of concurrent arXiv papers, this is the first time diffusion models have been applied to full-body human motion. The paper proposes a transformer-based model that can be ...
Recommendation: 8: accept, good paper
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper introduces a denoising diffusion model for both conditional and unconditional human motion (pose sequence) generation. Except for a couple of concurrent arXiv papers, this is the first time diffusion models have been applied to full-body human motion. The paper proposes a transformer-based model that...
The authors aim to answer two questions in this paper, "How and to what extent do humans exhibit bias in their accuracy in facial recognition tasks?" and "How does this compare to machine learningbased models?" To address these questions the authors present improvements to the LFW and CelebA dataets as well as present...
Recommendation: 3: reject, not good enough
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The authors aim to answer two questions in this paper, "How and to what extent do humans exhibit bias in their accuracy in facial recognition tasks?" and "How does this compare to machine learningbased models?" To address these questions the authors present improvements to the LFW and CelebA dataets as well as...
The paper presents a diffusion model for synthesizing human motion parameters. The proposed model consists of a diffusion model adapted to the human motion data format, plus task-specific geometric losses. The proposed model is applied to multiple scenarios such as text-to-motion, action-to-motion, motion editing, and ...
Recommendation: 8: accept, good paper
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The paper presents a diffusion model for synthesizing human motion parameters. The proposed model consists of a diffusion model adapted to the human motion data format, plus task-specific geometric losses. The proposed model is applied to multiple scenarios such as text-to-motion, action-to-motion, motion editi...
This paper proposes to optimize for diversity in substitute models and advocate attacking a Bayesian model for improving the transferability of adversarial examples. The author also developed a Bayesian formulation for performing attacks and advocated possible finetuning for improving the Bayesian model. Extensive ex...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: This paper proposes to optimize for diversity in substitute models and advocate attacking a Bayesian model for improving the transferability of adversarial examples. The author also developed a Bayesian formulation for performing attacks and advocated possible finetuning for improving the Bayesian model. Exte...
This paper proposes a novel contrastive pre-training strategy for object detection. The method uses object proposals generated by Selective Search for contrastive learning, which avoids large batch requirement in the existing work. And the localization of the proposals are considered during sampling stage, to further i...
Recommendation: 8: accept, good paper
Area: Unsupervised and Self-supervised learning
Review: This paper proposes a novel contrastive pre-training strategy for object detection. The method uses object proposals generated by Selective Search for contrastive learning, which avoids large batch requirement in the existing work. And the localization of the proposals are considered during sampling stage, to f...
The paper focuses on building robust models using counterfactual data. The main idea is to modify the cycle-GAN architecture to use group-annotations in the training data as additional supervision to learn to modify specific features. This method seems to yield useful improvements to the task of robust modeling when us...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: The paper focuses on building robust models using counterfactual data. The main idea is to modify the cycle-GAN architecture to use group-annotations in the training data as additional supervision to learn to modify specific features. This method seems to yield useful improvements to the task of robust modeling...
In this paper, the authors propose a PINN-style network where the physical quantities are computed on a manifold. The manifold geometry of the data is represented via a positional encoding based on the eigenfunctions of the Laplace-Beltrami operator of the manifold, propose to represent the coordinates of the input ge...
Recommendation: 3: reject, not good enough
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: In this paper, the authors propose a PINN-style network where the physical quantities are computed on a manifold. The manifold geometry of the data is represented via a positional encoding based on the eigenfunctions of the Laplace-Beltrami operator of the manifold, propose to represent the coordinates of the ...
The paper introduces (adapts) ML training of EBMs for SBI problems. The main problem in SBI is that one cares about sampling from posterior $q(\theta|x)$, and in the case of using EBMs, sampling from posterior results in doubly intractable inference since the partition function depends on $\theta$ as well. The paper s...
Recommendation: 5: marginally below the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: The paper introduces (adapts) ML training of EBMs for SBI problems. The main problem in SBI is that one cares about sampling from posterior $q(\theta|x)$, and in the case of using EBMs, sampling from posterior results in doubly intractable inference since the partition function depends on $\theta$ as well. The...
This paper studies why ensembles of dynamics models are useful for model-based RL. The main result is that ensembles effectively regularize the value function to be more smooth, and explicitly regularizing the value function can achieve similar performance without requiring an (expensive) ensemble. Strengths * I think ...
Recommendation: 8: accept, good paper
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper studies why ensembles of dynamics models are useful for model-based RL. The main result is that ensembles effectively regularize the value function to be more smooth, and explicitly regularizing the value function can achieve similar performance without requiring an (expensive) ensemble. Strengths * ...
This paper studies the RL problem with a CVAR objective, which concerns the tail of rewards instead of the expectation in standard RL. In the standard setting, the paper proposes two methods. The first method, named ICVaR-RM, focuses on regret minimization, and the paper also provides a matching lower bound. The second...
Recommendation: 8: accept, good paper
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper studies the RL problem with a CVAR objective, which concerns the tail of rewards instead of the expectation in standard RL. In the standard setting, the paper proposes two methods. The first method, named ICVaR-RM, focuses on regret minimization, and the paper also provides a matching lower bound. Th...
The paper considers two-layer networks with one output dimension in the mean-field parametrization. In the limit of infinite hidden-layer width, these can be described in the infinite dimensional space of parameter distributions (across hidden unit weights) by a nonlinear Fokker-Plank equation, which has been done in t...
Recommendation: 8: accept, good paper
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: The paper considers two-layer networks with one output dimension in the mean-field parametrization. In the limit of infinite hidden-layer width, these can be described in the infinite dimensional space of parameter distributions (across hidden unit weights) by a nonlinear Fokker-Plank equation, which has been d...
The paper proposes a multi-agent navigation framework as a new benchmark to assess the emergent language that is thus evolved between the agents. The paper is not clearly written and some sections are hard to understand. The related works do capture how the framework proposes new challenges that are not already captur...
Recommendation: 1: strong reject
Area: Deep Learning and representational learning
Review: The paper proposes a multi-agent navigation framework as a new benchmark to assess the emergent language that is thus evolved between the agents. The paper is not clearly written and some sections are hard to understand. The related works do capture how the framework proposes new challenges that are not alread...
This paper proposes a patch-based framework for solving inverse problems. The proposed approach is able to achieve reasonable performance on several tasks. Strength: 1. The paper is well-written. The proposed approach is simple and easy to follow. 2. The empirical results are good. The model is able to achieve comparab...
Recommendation: 6: marginally above the acceptance threshold
Area: Generative models
Review: This paper proposes a patch-based framework for solving inverse problems. The proposed approach is able to achieve reasonable performance on several tasks. Strength: 1. The paper is well-written. The proposed approach is simple and easy to follow. 2. The empirical results are good. The model is able to achieve ...
This paper proposes a method to improve representation learning for dynamic graphs using self-supervised learning (SSL) approach. Named DyG2Vec, the method is equipped with a SSL pre-training component that uses a non-contrastive loss objective, a window-based architecture as well as fine-tuning component that can tune...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposes a method to improve representation learning for dynamic graphs using self-supervised learning (SSL) approach. Named DyG2Vec, the method is equipped with a SSL pre-training component that uses a non-contrastive loss objective, a window-based architecture as well as fine-tuning component that ...
The paper presents a novel solution to effectively handle the sparsity of data in EHR using a combination of techniques including self-supervision and aggregation based normalization of sparse inputs. The authors compared their model on two real world datasets for three different tasks. They claim that the scheme effec...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: The paper presents a novel solution to effectively handle the sparsity of data in EHR using a combination of techniques including self-supervision and aggregation based normalization of sparse inputs. The authors compared their model on two real world datasets for three different tasks. They claim that the sche...
**Summary** This paper investigates why conjugated pseudo label in test-time adaptation (TTA), which is recently proposed approach, perform better than hard pseudo-labeling. Specifically, they show that under Gaussian model, GD with hard pseudo-labels fails to find optimal solution while GD with conjugated pseudo label...
Recommendation: 5: marginally below the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: **Summary** This paper investigates why conjugated pseudo label in test-time adaptation (TTA), which is recently proposed approach, perform better than hard pseudo-labeling. Specifically, they show that under Gaussian model, GD with hard pseudo-labels fails to find optimal solution while GD with conjugated pseu...
The authors propose a semantic class embedding refinement mechanism by introducing two networks, (1) V2SM to enable the generator to synthesize semantically rich visual features and (2) VOPE to iteratively evolve the quality of semantic class embeddings throughout the training phase in generative zero-shot learning set...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: The authors propose a semantic class embedding refinement mechanism by introducing two networks, (1) V2SM to enable the generator to synthesize semantically rich visual features and (2) VOPE to iteratively evolve the quality of semantic class embeddings throughout the training phase in generative zero-shot lear...
The paper proposes a pipelined method for reasoning tasks with language models. The proposed pipeline has two parts: a rational generation module and a reasoning module. The proposed method has two major novelties: 1) the rationale generation uses a frozen LM with few-shot prompts. 2) The reasoning module uses regulari...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The paper proposes a pipelined method for reasoning tasks with language models. The proposed pipeline has two parts: a rational generation module and a reasoning module. The proposed method has two major novelties: 1) the rationale generation uses a frozen LM with few-shot prompts. 2) The reasoning module uses ...
This paper proposes to combine the slimmable networks with BYOL to get multiple pre-trained networks in one go during training. Pros: The method is rather straightforward. Cons: 1. Limited novelty. This paper is just a straightforward application of slimmable networks with BYOL, namely, a combination of existing wor...
Recommendation: 3: reject, not good enough
Area: Unsupervised and Self-supervised learning
Review: This paper proposes to combine the slimmable networks with BYOL to get multiple pre-trained networks in one go during training. Pros: The method is rather straightforward. Cons: 1. Limited novelty. This paper is just a straightforward application of slimmable networks with BYOL, namely, a combination of exis...
This paper studies distributed compositional pair risk optimization. The authors develop two algorithms to handle two different scenarios where the outer function $f$ is linear or nonlinear, and established their convergence rates. For linear $f$, they develop a FedX1 algorithm that achieves $O(1/N\epsilon^4)$ sample c...
Recommendation: 3: reject, not good enough
Area: General Machine Learning
Review: This paper studies distributed compositional pair risk optimization. The authors develop two algorithms to handle two different scenarios where the outer function $f$ is linear or nonlinear, and established their convergence rates. For linear $f$, they develop a FedX1 algorithm that achieves $O(1/N\epsilon^4)$ ...
In this paper, the authors proposed to learn a linear mapping from vision embedding space to text embedding space of a pretrained language model. The authors provided in-depth analysis and comparison between vision-only pretrained models and (text-)supervised vision pretrained models. The effectiveness is shown through...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: In this paper, the authors proposed to learn a linear mapping from vision embedding space to text embedding space of a pretrained language model. The authors provided in-depth analysis and comparison between vision-only pretrained models and (text-)supervised vision pretrained models. The effectiveness is shown...
The authors show that with a careful initialization of parameters, we can train skipless attention-only models without skip connections or normalization layers when trained longer. The major idea is to maintain the signal propagation at initialization in an attention-only model. The authors corroborate their claims wit...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: The authors show that with a careful initialization of parameters, we can train skipless attention-only models without skip connections or normalization layers when trained longer. The major idea is to maintain the signal propagation at initialization in an attention-only model. The authors corroborate their cl...
The authors have proposed a deep learning-based framework for speech separation. The main claim is the effectiveness of the top-down attention mechanism that works across multiple scales to recover the signal. Overall the paper is easy to follow, and the topic addressed is interesting. - The proposed attention mechani...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The authors have proposed a deep learning-based framework for speech separation. The main claim is the effectiveness of the top-down attention mechanism that works across multiple scales to recover the signal. Overall the paper is easy to follow, and the topic addressed is interesting. - The proposed attention...
This paper proposes a method with the automatic mask scaling which can gradually temper this sparsity. The proposed SLM maximize a quadratic relaxation (with the help of Taylor approximation) of the mutual information between the selected features and the labels. ### Strength - The quadratic relaxation of MI is interes...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This paper proposes a method with the automatic mask scaling which can gradually temper this sparsity. The proposed SLM maximize a quadratic relaxation (with the help of Taylor approximation) of the mutual information between the selected features and the labels. ### Strength - The quadratic relaxation of MI is...
This paper introduces a Multilingual Grade School Math (MGSM) which can be used to evaluate the reasoning abilities of large language models by predicting the chain of thought. The authors compare the results of different prompting strategies on two large-scale language models, and further conduct ablation studies to a...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper introduces a Multilingual Grade School Math (MGSM) which can be used to evaluate the reasoning abilities of large language models by predicting the chain of thought. The authors compare the results of different prompting strategies on two large-scale language models, and further conduct ablation stud...
Tasks: speech recognition, translation Models: CTC for speech, attention-based encoder-decoder (AED) for translation The paper proposes a new training method to improve the quality of the latent variable and thus the overall quality of the model. Or in the case of AED, it acts as a sort of regularization. The method...
Recommendation: 5: marginally below the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: Tasks: speech recognition, translation Models: CTC for speech, attention-based encoder-decoder (AED) for translation The paper proposes a new training method to improve the quality of the latent variable and thus the overall quality of the model. Or in the case of AED, it acts as a sort of regularization. Th...
The manuscript studies the optimization and generalization trade-off caused by stochastic noise, step size, implicit bias, and sharpness of the minimum; and more importantly, why an averaged SGD with a large step size can improve the trade-offs and converge to a flat region more stably than SGD. ## Strength * The paper...
Recommendation: 5: marginally below the acceptance threshold
Area: Optimization (eg, convex and non-convex optimization)
Review: The manuscript studies the optimization and generalization trade-off caused by stochastic noise, step size, implicit bias, and sharpness of the minimum; and more importantly, why an averaged SGD with a large step size can improve the trade-offs and converge to a flat region more stably than SGD. ## Strength * T...
The authors proposed PEER, a language model that includes four skills: plan, edit, explain, and repeat. To better use the Wikipedia edit history with missing parts, the author proposed four infilling operations to overcome this issue: PEER-edit, PEER-undo, PEER-explain, PEER-document. The authors utilize the pretrained...
Recommendation: 8: accept, good paper
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The authors proposed PEER, a language model that includes four skills: plan, edit, explain, and repeat. To better use the Wikipedia edit history with missing parts, the author proposed four infilling operations to overcome this issue: PEER-edit, PEER-undo, PEER-explain, PEER-document. The authors utilize the pr...
This paper looks at a different way to perform conformal prediction by proposing a new score function as well as guarantees that their proposed method achieves smaller interval lengths. They prove that under some conditions (not very well explained) their proposed method can achieve smaller interval lengths compared to...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper looks at a different way to perform conformal prediction by proposing a new score function as well as guarantees that their proposed method achieves smaller interval lengths. They prove that under some conditions (not very well explained) their proposed method can achieve smaller interval lengths com...
This paper proposes MotiFiesta, a novel deep-learning model to mine (approximate) motifs. The proposed method combines graph representation learning (via GNNs) and a graph coarsening (pooling) strategy to identify approximate motifs and estimate its frequency by comparison with random graphs (through local randomizatio...
Recommendation: 5: marginally below the acceptance threshold
Area: General Machine Learning
Review: This paper proposes MotiFiesta, a novel deep-learning model to mine (approximate) motifs. The proposed method combines graph representation learning (via GNNs) and a graph coarsening (pooling) strategy to identify approximate motifs and estimate its frequency by comparison with random graphs (through local rand...
The authors propose the use of a learnable hierarchical molecular grammar that can be used for property prediction tasks in the context of drug/materials discovery. This is done by extending the work of Guo et al. (2022) on molecular grammars and adapting it for the supervised learning setting via the usage of a neural...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The authors propose the use of a learnable hierarchical molecular grammar that can be used for property prediction tasks in the context of drug/materials discovery. This is done by extending the work of Guo et al. (2022) on molecular grammars and adapting it for the supervised learning setting via the usage of ...
This paper proposes a large-scale 3D object affordance learning and part discovery dataset, paired with a baseline method. The proposed task is important for 3D object understanding and would be impactful in many fields. The dataset consists of more than 25,000 objects and each object has a set of affordance labels. Th...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposes a large-scale 3D object affordance learning and part discovery dataset, paired with a baseline method. The proposed task is important for 3D object understanding and would be impactful in many fields. The dataset consists of more than 25,000 objects and each object has a set of affordance la...
This paper proposes application of structured dropout methods (e.g. drop block) to transformers. It also proposes an enhancement to drop block which utilizes activation values to assign dropout probability to nodes in feature maps as opposed to random selection of blocks. Empirical results on language and vision task...
Recommendation: 6: marginally above the acceptance threshold
Area: General Machine Learning
Review: This paper proposes application of structured dropout methods (e.g. drop block) to transformers. It also proposes an enhancement to drop block which utilizes activation values to assign dropout probability to nodes in feature maps as opposed to random selection of blocks. Empirical results on language and vis...
The authors propose a new algorithm--CSVE--that learns conservative estimates of state value functions by penalizing values of OOD states. The authors prove that the estimated state value functions are lower-bounds of the true value in expectation over any state distribution. Finally, the authors evaluate their algorit...
Recommendation: 5: marginally below the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The authors propose a new algorithm--CSVE--that learns conservative estimates of state value functions by penalizing values of OOD states. The authors prove that the estimated state value functions are lower-bounds of the true value in expectation over any state distribution. Finally, the authors evaluate their...
The author works on the vertical federated learning for graph data. The author proposes a model splitting method to split the model to server and clients, and communication-efficient techniques such as lazy aggregation and stale updates for efficient training. Empirical results show similar performance to centralized t...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: The author works on the vertical federated learning for graph data. The author proposes a model splitting method to split the model to server and clients, and communication-efficient techniques such as lazy aggregation and stale updates for efficient training. Empirical results show similar performance to centr...
The paper describes the effect of malicious nodes in P2PL environment. It proposes a defense mechanism P2PRISM for reviving the nodes from the attack. Experiments are detailed and extensive and showcase the advantage of the proposed work. strengths -the paper proposes P2PRISM, a defense against malicious attacks in P2P...
Recommendation: 6: marginally above the acceptance threshold
Area: General Machine Learning
Review: The paper describes the effect of malicious nodes in P2PL environment. It proposes a defense mechanism P2PRISM for reviving the nodes from the attack. Experiments are detailed and extensive and showcase the advantage of the proposed work. strengths -the paper proposes P2PRISM, a defense against malicious attack...
This paper introduces in-context policy iteration (ICPI) an algorithm that can perform model-based policy iteration by leveraging a pre-trained large language model (LLM). ICPI uses prompts to create both a world model and a rollout policy out of the same LM. Specifically, the world model prompt uses examples from a bu...
Recommendation: 5: marginally below the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper introduces in-context policy iteration (ICPI) an algorithm that can perform model-based policy iteration by leveraging a pre-trained large language model (LLM). ICPI uses prompts to create both a world model and a rollout policy out of the same LM. Specifically, the world model prompt uses examples f...
This paper initiates a theoretical study of dynamic benchmarking. It is proved that model performance could stall with alternative data collection and model fitting. Therefore, a new model where data collection and model fitting have a hierarchical dependency structure is proposed and proved a better progress but with ...
Recommendation: 6: marginally above the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: This paper initiates a theoretical study of dynamic benchmarking. It is proved that model performance could stall with alternative data collection and model fitting. Therefore, a new model where data collection and model fitting have a hierarchical dependency structure is proposed and proved a better progress b...
This paper proposed Denoising Masked AutoEncoders (DMAE), a vision-transformer based neural network model, and showed that the certified robustness using randomized smoothing can be either comparable or better than state-of-the-art denoised randomized smoothing methods, such as Carlini et al., 2022. Strength: Paper is ...
Recommendation: 5: marginally below the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper proposed Denoising Masked AutoEncoders (DMAE), a vision-transformer based neural network model, and showed that the certified robustness using randomized smoothing can be either comparable or better than state-of-the-art denoised randomized smoothing methods, such as Carlini et al., 2022. Strength: P...
This work proposes a method called neural attention memory. It constructs the attention output leveraging a memory matrix. The computational cost is linear to the sequence length (vs. quadratic in the conventional attention mechanism). The method is evaluated for long-range sequence tasks. It is also used to derived va...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This work proposes a method called neural attention memory. It constructs the attention output leveraging a memory matrix. The computational cost is linear to the sequence length (vs. quadratic in the conventional attention mechanism). The method is evaluated for long-range sequence tasks. It is also used to de...
This paper presents a language model that can autoregressively choose tokens from a fixed vocabulary, or multi-token phrases from a pre-encoded corpus. The paper builds on previous work on phrase encoding for question answering, but extends this work to freeform text generation. The model (Copy-generator) is evaluated ...
Recommendation: 8: accept, good paper
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper presents a language model that can autoregressively choose tokens from a fixed vocabulary, or multi-token phrases from a pre-encoded corpus. The paper builds on previous work on phrase encoding for question answering, but extends this work to freeform text generation. The model (Copy-generator) is ev...
The paper provides a seeding technique for the local search algorithm for k-median clustering in general metric spaces. Their algorithm is based on a tree embedding of the data. They also provide a version of their algorithm which can be used for differentially private $k$-median clustering. Strength: The paper is over...
Recommendation: 6: marginally above the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The paper provides a seeding technique for the local search algorithm for k-median clustering in general metric spaces. Their algorithm is based on a tree embedding of the data. They also provide a version of their algorithm which can be used for differentially private $k$-median clustering. Strength: The paper...
This paper proposes an approach, called ProtoVAE, that learns disentangled representations from unsupervised data. The overarching goal is to incorporate two inductive biases into the learned generative model: unique and consistent changes to the latent representations, and local isometry. ProtoVAE is based on a variat...
Recommendation: 3: reject, not good enough
Area: Unsupervised and Self-supervised learning
Review: This paper proposes an approach, called ProtoVAE, that learns disentangled representations from unsupervised data. The overarching goal is to incorporate two inductive biases into the learned generative model: unique and consistent changes to the latent representations, and local isometry. ProtoVAE is based on ...
The authors propose a revision of the existing approach to Centralised Training Decentralised Executation (CTDE) for the Cooperative AI problems. They propose a transformation from the MMDP to a MDP problem, thus allowing them to use Single Agent RL algorithms. This is motivated by observations (with theoretical justi...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The authors propose a revision of the existing approach to Centralised Training Decentralised Executation (CTDE) for the Cooperative AI problems. They propose a transformation from the MMDP to a MDP problem, thus allowing them to use Single Agent RL algorithms. This is motivated by observations (with theoretic...
This paper focuses on improving the accuracy of differentially private learning accuracy by public self-supervised pre-training. Specifically, the authors propose to perform self-supervised pre-training based on different assumptions regarding the availability of public data: (1) one public image pretraining can outper...
Recommendation: 5: marginally below the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper focuses on improving the accuracy of differentially private learning accuracy by public self-supervised pre-training. Specifically, the authors propose to perform self-supervised pre-training based on different assumptions regarding the availability of public data: (1) one public image pretraining ca...
It is unclear what concrete contributions of this paper are. The paper does have quite a lot of equations, but it is hard to say that the derivations are upon a good problem. Experiments are severely lacking. Strength: lots of derivations. Weakness: lack of experiments and competing results. One fundamental issue: it...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: It is unclear what concrete contributions of this paper are. The paper does have quite a lot of equations, but it is hard to say that the derivations are upon a good problem. Experiments are severely lacking. Strength: lots of derivations. Weakness: lack of experiments and competing results. One fundamental i...
This paper concerns how to select/learn a predictive model from causal relations between variables in the distributional robustness setting. Specifically, the paper argues that given a DAG, a predictive model should be learned from a subset of the variables which are stable across a group of learning environments, whil...
Recommendation: 5: marginally below the acceptance threshold
Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes)
Review: This paper concerns how to select/learn a predictive model from causal relations between variables in the distributional robustness setting. Specifically, the paper argues that given a DAG, a predictive model should be learned from a subset of the variables which are stable across a group of learning environmen...
This paper studies how to perform model stealing in the data-free setting. The authors first identify two weaknesses of existing data-free model stealing methods: (1) the generated query data are not informative enough, and (2) the estimation of black-box gradients is not stable for optimization. To address these two ...
Recommendation: 5: marginally below the acceptance threshold
Area: General Machine Learning
Review: This paper studies how to perform model stealing in the data-free setting. The authors first identify two weaknesses of existing data-free model stealing methods: (1) the generated query data are not informative enough, and (2) the estimation of black-box gradients is not stable for optimization. To address th...
This paper proposes a novel domain adaptation active learning scheme building upon evidential deep learning. Namely, it computes distributional (or epistemic) uncertainty as mutual information and data (or epistemic) uncertainty as the expected entropy. Then it uses a two stage approach that selects to label the larg...
Recommendation: 8: accept, good paper
Area: General Machine Learning
Review: This paper proposes a novel domain adaptation active learning scheme building upon evidential deep learning. Namely, it computes distributional (or epistemic) uncertainty as mutual information and data (or epistemic) uncertainty as the expected entropy. Then it uses a two stage approach that selects to label ...
They proposed two methods with different aspects for debiased learning of multimodal learning tasks, e.g., VCR. One is counterfactual vision-language data synthesis (CDS) with linguistic prior knowledge, pretrained lanugage model, and adversarial filtering for textual CDS. And coarse-to-fine In-painting Generative Adve...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: They proposed two methods with different aspects for debiased learning of multimodal learning tasks, e.g., VCR. One is counterfactual vision-language data synthesis (CDS) with linguistic prior knowledge, pretrained lanugage model, and adversarial filtering for textual CDS. And coarse-to-fine In-painting Generat...
This paper presents a contrasting-aided contextual masked image modeling framework, termed ccMIM. The main motivation behind this paper is to use CLS tokens to mask semantic patches so that the reconstruction target could be more difficult. To make the CLS token contains more semantic context, ccMIM introduces a global...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper presents a contrasting-aided contextual masked image modeling framework, termed ccMIM. The main motivation behind this paper is to use CLS tokens to mask semantic patches so that the reconstruction target could be more difficult. To make the CLS token contains more semantic context, ccMIM introduces ...
This work propose a training pipeline to help defend against adversarial robustness. Specifically, an input image is partitioned into a number of non-overlapping sub-rectangles. Then each sub-rectangle is process by a shared branch of base neural network and further merged together to make a prediction. They show that ...
Recommendation: 3: reject, not good enough
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This work propose a training pipeline to help defend against adversarial robustness. Specifically, an input image is partitioned into a number of non-overlapping sub-rectangles. Then each sub-rectangle is process by a shared branch of base neural network and further merged together to make a prediction. They sh...
The paper proposes a method based on prompt learning for multi-source domain adaptation. By adopting a pre-trained CLIP based text and image encoders, the authors design prompts that are learnable to adapt them for source and target domains. Specifically, there are two stages. First, prompts are designed with class-spe...
Recommendation: 5: marginally below the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The paper proposes a method based on prompt learning for multi-source domain adaptation. By adopting a pre-trained CLIP based text and image encoders, the authors design prompts that are learnable to adapt them for source and target domains. Specifically, there are two stages. First, prompts are designed with c...