review
stringlengths
5
16.6k
score
stringclasses
5 values
area
stringclasses
12 values
text
stringlengths
31
5.65k
This paper introduces M&Ms framework that aims to generate controllable scene generation with given visual descriptions. The proposed framework takes the background scene and set of objects along with the object location and size as conditions and synthesis the photorealistic collages. In addition to realistic image ge...
Recommendation: 5: marginally below the acceptance threshold
Area: Generative models
Review: This paper introduces M&Ms framework that aims to generate controllable scene generation with given visual descriptions. The proposed framework takes the background scene and set of objects along with the object location and size as conditions and synthesis the photorealistic collages. In addition to realistic ...
The paper proposes neural constrain inference (NCI), a dynamics model which predicts future trajectories by inferring interactions between particles represented as sets of energy constraints, and sampling from the resulting energy-based model (EBM) using Langevin dynamics. It is demonstrated on various dynamics task th...
Recommendation: 6: marginally above the acceptance threshold
Area: Unsupervised and Self-supervised learning
Review: The paper proposes neural constrain inference (NCI), a dynamics model which predicts future trajectories by inferring interactions between particles represented as sets of energy constraints, and sampling from the resulting energy-based model (EBM) using Langevin dynamics. It is demonstrated on various dynamics...
This paper proposes a conditional selective inference (SI) approach for obtaining p-values for saliency maps. By leveraging the piecewise linearity of ReLU networks, they develop a method for performing the necessary hypothesis testing in an automated fashion across arbitrary network architectures. In experiments, thei...
Recommendation: 6: marginally above the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper proposes a conditional selective inference (SI) approach for obtaining p-values for saliency maps. By leveraging the piecewise linearity of ReLU networks, they develop a method for performing the necessary hypothesis testing in an automated fashion across arbitrary network architectures. In experimen...
This paper proposes a CroMA framework to incorporate multiple sensor modalities and close the domain gap between training and deployment for self-driving. They utilize LiDAR sensor during the training phase with knowledge distillation paradigm to enhance the camera-only model. Adversarial learning is adopted to address...
Recommendation: 5: marginally below the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper proposes a CroMA framework to incorporate multiple sensor modalities and close the domain gap between training and deployment for self-driving. They utilize LiDAR sensor during the training phase with knowledge distillation paradigm to enhance the camera-only model. Adversarial learning is adopted to...
This paper presents a run-time channel squeezing technique. The proposed technique mainly works on the convolutional block and can serve as a plug and play component to many CNNs. The proposed methods does not keeps all possible parameters but can reduce the number of FLOPs to enable fast inference on low-power devices...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper presents a run-time channel squeezing technique. The proposed technique mainly works on the convolutional block and can serve as a plug and play component to many CNNs. The proposed methods does not keeps all possible parameters but can reduce the number of FLOPs to enable fast inference on low-power...
This manuscript presents a new stochastic embedding method named Maximum Entropy Information Bottleneck (MEIB). Authors show that the well-known VIB is an upper bound of MEIB. Experimental results show that MEIB performs more robustly against adversarial attacks or other types of perturbation than VIB. The proposed met...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This manuscript presents a new stochastic embedding method named Maximum Entropy Information Bottleneck (MEIB). Authors show that the well-known VIB is an upper bound of MEIB. Experimental results show that MEIB performs more robustly against adversarial attacks or other types of perturbation than VIB. The prop...
The authors of this paper introduce a new approach to safe (or constrained) reinforcement learning (RL) that leverages a concept called scenario-based programming. In essence, this programming paradigm is a means to inject domain knowledge to the RL loop, by running such a (set of) program(s) in parallel with the RL ag...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The authors of this paper introduce a new approach to safe (or constrained) reinforcement learning (RL) that leverages a concept called scenario-based programming. In essence, this programming paradigm is a means to inject domain knowledge to the RL loop, by running such a (set of) program(s) in parallel with t...
This paper proposes Physics Augmented Continuum Neural Radiance Fields (PAC-NeRF), to estimate both the unknown geometry and physical parameters of highly dynamic objects from multi-view videos. The core idea of this paper is a hybrid Eulerian-Lagrangian representation of the neural radiance field. The proposed method ...
Recommendation: 8: accept, good paper
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: This paper proposes Physics Augmented Continuum Neural Radiance Fields (PAC-NeRF), to estimate both the unknown geometry and physical parameters of highly dynamic objects from multi-view videos. The core idea of this paper is a hybrid Eulerian-Lagrangian representation of the neural radiance field. The proposed...
This work proposes a graph gating method for advancing the capacity of overcoming over-smoothing problem of GNN models. Theoretical proof and analysis are provided to demonstrate its superiority on dealing with over-smoothing issue with the help of ordinal differential equation (ODE). Experimental results look impressi...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This work proposes a graph gating method for advancing the capacity of overcoming over-smoothing problem of GNN models. Theoretical proof and analysis are provided to demonstrate its superiority on dealing with over-smoothing issue with the help of ordinal differential equation (ODE). Experimental results look ...
This paper proposes a new attack method. Unlike previous methods that perturbs the training data, the proposed method only perturb the label of a selected subset of training data. This essentially finds a small population of data and train the model to misclassify them consistently. The benefit is that at inference sta...
Recommendation: 3: reject, not good enough
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper proposes a new attack method. Unlike previous methods that perturbs the training data, the proposed method only perturb the label of a selected subset of training data. This essentially finds a small population of data and train the model to misclassify them consistently. The benefit is that at infer...
This submission considers neural networks trained with completely random labels with or without data augmentations. The main observation is that when data augmentations are enabled, neural networks learn meaningful representation of data. This is supported by fitting a k-NN classifier on learned representations using g...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This submission considers neural networks trained with completely random labels with or without data augmentations. The main observation is that when data augmentations are enabled, neural networks learn meaningful representation of data. This is supported by fitting a k-NN classifier on learned representations...
This paper studies well-known Adam algorithm. Previous work shows that Adam can converge to a neighborhood of stationary point if the gradients are bounded (functions are smooth). In this paper, the authors show that, Adam can guarantees a even better results under a milder condition, i.e., L_0,L_1 smoothness, under wh...
Recommendation: 5: marginally below the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: This paper studies well-known Adam algorithm. Previous work shows that Adam can converge to a neighborhood of stationary point if the gradients are bounded (functions are smooth). In this paper, the authors show that, Adam can guarantees a even better results under a milder condition, i.e., L_0,L_1 smoothness, ...
The paper provides a differentiable method for learning temporal knowledge graphs in KGs. While differentiable rule-learning in the context of KG’s already exists, and rule-learning in the context of temporal KG’s already exists, this paper is the first to provide a differentiable rule learning method for temporal KGs....
Recommendation: 8: accept, good paper
Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes)
Review: The paper provides a differentiable method for learning temporal knowledge graphs in KGs. While differentiable rule-learning in the context of KG’s already exists, and rule-learning in the context of temporal KG’s already exists, this paper is the first to provide a differentiable rule learning method for tempo...
This paper presents a novel way to evaluate the quality of a pre-trained representation. It requires no real data and downstream tasks for the evaluation. In the evaluation, it utilizes synthetic data generated from the mixture of two Gaussian distributions. The authors prove the soundness of the method using the assum...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper presents a novel way to evaluate the quality of a pre-trained representation. It requires no real data and downstream tasks for the evaluation. In the evaluation, it utilizes synthetic data generated from the mixture of two Gaussian distributions. The authors prove the soundness of the method using t...
In this paper, a new quantum enhanced GNN is proposed from the perspective of quantum mechanics. The paper regards the graph as a quantum system, transforms the graph topology into the interaction of a group of qubits, and uses the long-range correlation of the quantum system to calculate the relationship between diffe...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: In this paper, a new quantum enhanced GNN is proposed from the perspective of quantum mechanics. The paper regards the graph as a quantum system, transforms the graph topology into the interaction of a group of qubits, and uses the long-range correlation of the quantum system to calculate the relationship betwe...
This paper focuses on the problem of training dual encoding models on decentralized datasets, which has few existing works. Moreover, the authors consider a challenging scenario that each client possesses a small and non-IID dataset, where directly utilizing the existing centralized methods decreases efficacy. Hence, t...
Recommendation: 6: marginally above the acceptance threshold
Area: Unsupervised and Self-supervised learning
Review: This paper focuses on the problem of training dual encoding models on decentralized datasets, which has few existing works. Moreover, the authors consider a challenging scenario that each client possesses a small and non-IID dataset, where directly utilizing the existing centralized methods decreases efficacy. ...
This paper proposed a multi-agent interactive game that provides formal interpretability for classification problem. In particular, the interactive game is inspired by interactive proof systems. In addition, the authors connected information measures such as conditional entropy and average precision to completeness and...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This paper proposed a multi-agent interactive game that provides formal interpretability for classification problem. In particular, the interactive game is inspired by interactive proof systems. In addition, the authors connected information measures such as conditional entropy and average precision to complete...
For the possible repetition in Continual Learning, the paper makes contributes in the following three areas: (1) The author proposes two stochastic scenario generators that produce a wide range of CIR scenarios starting from a single dataset and a few control parameters. (2) The author conducts a comprehensive evaluati...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: For the possible repetition in Continual Learning, the paper makes contributes in the following three areas: (1) The author proposes two stochastic scenario generators that produce a wide range of CIR scenarios starting from a single dataset and a few control parameters. (2) The author conducts a comprehensive ...
This paper proposes a new deep learning model for long-term time series forecasting with distribution shifts based on Koopman operator theory. In comparison to existing work, the authors utilize measurement functions (e.g. sine functions) in latent space, and they formulate forecasting using global and temporally local...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: This paper proposes a new deep learning model for long-term time series forecasting with distribution shifts based on Koopman operator theory. In comparison to existing work, the authors utilize measurement functions (e.g. sine functions) in latent space, and they formulate forecasting using global and temporal...
In this paper the authors propose an empirical analysis of neural kernel bandits, proposed as a UCB based alternative to Bayesian neural networks. Bayesian NNs have a high computational requirement as often an ensemble must be maintained in order to bootstrap a sample from the posterior, as in the case of Thompson samp...
Recommendation: 3: reject, not good enough
Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes)
Review: In this paper the authors propose an empirical analysis of neural kernel bandits, proposed as a UCB based alternative to Bayesian neural networks. Bayesian NNs have a high computational requirement as often an ensemble must be maintained in order to bootstrap a sample from the posterior, as in the case of Thomp...
The authors propose a contrastive learning scheme where not the feature representations of individual samples, but an aggregated feature representation of multiple samples (a set) is considered. The authors claim improvements over a SimCLR baseline on CIFAR, STL, ImageNet-100 and full ImageNet. **Major Weaknesses** -...
Recommendation: 5: marginally below the acceptance threshold
Area: Unsupervised and Self-supervised learning
Review: The authors propose a contrastive learning scheme where not the feature representations of individual samples, but an aggregated feature representation of multiple samples (a set) is considered. The authors claim improvements over a SimCLR baseline on CIFAR, STL, ImageNet-100 and full ImageNet. **Major Weaknes...
This paper introduces two variants of covariance-robust minimax probability machines (MPM) which the authors term as Bures MPM and Cramer-Rao MPM based on different statistical divergences between Gaussian distributions. The authors discuss how to estimate the parameter for these new variants of MPM and discuss the pot...
Recommendation: 3: reject, not good enough
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper introduces two variants of covariance-robust minimax probability machines (MPM) which the authors term as Bures MPM and Cramer-Rao MPM based on different statistical divergences between Gaussian distributions. The authors discuss how to estimate the parameter for these new variants of MPM and discuss...
Motivated by membership inference attacks against differentially private stochastic gradient descent (DP-SGD), the paper bounds the total variation (TV) distance between two runs of DP-SGD on two neighboring data sets. DP-SGD amounts to subsampling and adding Gaussian noise to adaptively chosen vectors. The main result...
Recommendation: 3: reject, not good enough
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: Motivated by membership inference attacks against differentially private stochastic gradient descent (DP-SGD), the paper bounds the total variation (TV) distance between two runs of DP-SGD on two neighboring data sets. DP-SGD amounts to subsampling and adding Gaussian noise to adaptively chosen vectors. The mai...
This work studies the how the accuracy of a fixed point changes when multiple models with increasing sizes are used for predictions which it defines as the learning profile of a point. They show that there can be points which are positively correlated with the average accuracy of models and there are certain points whi...
Recommendation: 8: accept, good paper
Area: General Machine Learning
Review: This work studies the how the accuracy of a fixed point changes when multiple models with increasing sizes are used for predictions which it defines as the learning profile of a point. They show that there can be points which are positively correlated with the average accuracy of models and there are certain po...
The paper studies learning with graphs under the covariate shift assumption. The predictor is decomposed into two functions; one is the feature extractor of the graph, f, and the other is the discriminator, g. The generalization performance of the predictor h(G)=g(f(G)) for a graph G is governed by the Lipschitz consta...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: The paper studies learning with graphs under the covariate shift assumption. The predictor is decomposed into two functions; one is the feature extractor of the graph, f, and the other is the discriminator, g. The generalization performance of the predictor h(G)=g(f(G)) for a graph G is governed by the Lipschit...
The paper considers classification problems with small tabular datasets (a few thousand samples, and up to ten classes and 100 features). It presents a pre-trained model that solves such problems within a second, outperforming tree-ensembles and AutoML methods that run for an hour. The pre-trained model is a 12-layer t...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: The paper considers classification problems with small tabular datasets (a few thousand samples, and up to ten classes and 100 features). It presents a pre-trained model that solves such problems within a second, outperforming tree-ensembles and AutoML methods that run for an hour. The pre-trained model is a 12...
The authors propose a way to manipulate intermediate latent features of pre-trained generative models to edit local parts of the image. Specifically, they decompose a tensor of sampled latent features into two tensors, in which one could be interpreted as the set of appearance features and the other as the set of salie...
Recommendation: 6: marginally above the acceptance threshold
Area: Generative models
Review: The authors propose a way to manipulate intermediate latent features of pre-trained generative models to edit local parts of the image. Specifically, they decompose a tensor of sampled latent features into two tensors, in which one could be interpreted as the set of appearance features and the other as the set ...
The paper defines a notion of risk-averse equilibrium, develops some theory surrounding the notion, and runs some experiments illustrating that their notion achieves a better trade-off between utility and variance than other notions. Broadly speaking, risk aversion is usually implemented by passing the utility function...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The paper defines a notion of risk-averse equilibrium, develops some theory surrounding the notion, and runs some experiments illustrating that their notion achieves a better trade-off between utility and variance than other notions. Broadly speaking, risk aversion is usually implemented by passing the utility ...
The paper proposed a new hyper parameter optimization method using tensor completion algorithm. The new algorithm consider a N dimensional tensor with its dimension representing tunable parameters and values representing feedbacks (e.g. validation loss). A Tucker factorization is used to for tensor completion in this p...
Recommendation: 3: reject, not good enough
Area: General Machine Learning
Review: The paper proposed a new hyper parameter optimization method using tensor completion algorithm. The new algorithm consider a N dimensional tensor with its dimension representing tunable parameters and values representing feedbacks (e.g. validation loss). A Tucker factorization is used to for tensor completion i...
I have reviewed this paper in another conference. This paper introduces a technique called Recursive Interpolation Method (RIM) for time series augmentation. The augmented samples preserve the original inherent time-series dynamics. Theoretical analysis is given to guarantee the test performance. Experiments are conduc...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: I have reviewed this paper in another conference. This paper introduces a technique called Recursive Interpolation Method (RIM) for time series augmentation. The augmented samples preserve the original inherent time-series dynamics. Theoretical analysis is given to guarantee the test performance. Experiments ar...
The paper addresses the problem of modelling a PDE in the means of neural networks. The main motivation stems from the fact that Clifford algebras is a very popular tool in modelling physical relationships. As a consequence, the paper proposes to use the product of the algebra (instead of the products of a scalar field...
Recommendation: 6: marginally above the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: The paper addresses the problem of modelling a PDE in the means of neural networks. The main motivation stems from the fact that Clifford algebras is a very popular tool in modelling physical relationships. As a consequence, the paper proposes to use the product of the algebra (instead of the products of a scal...
This paper proposes an efficient and general component GrafT for Transformer-based vision architectures. The GrafT can introduce multi-scale features for early-stage layers, thus achieving better results. The authors demonstrate the effectiveness of the proposed GrafT on several tasks and datasets. Strengths * The des...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposes an efficient and general component GrafT for Transformer-based vision architectures. The GrafT can introduce multi-scale features for early-stage layers, thus achieving better results. The authors demonstrate the effectiveness of the proposed GrafT on several tasks and datasets. Strengths *...
One existing problem in information extraction is that it consists of a wide range of tasks. Previous attempts to unify all IE tasks with one architecture are either complex or time-consuming to decode. To this end, this paper proposes a simple yet effective paradigm for unified IE by interpreting all IE tasks as span ...
Recommendation: 8: accept, good paper
Area: Applications (eg, speech processing, computer vision, NLP)
Review: One existing problem in information extraction is that it consists of a wide range of tasks. Previous attempts to unify all IE tasks with one architecture are either complex or time-consuming to decode. To this end, this paper proposes a simple yet effective paradigm for unified IE by interpreting all IE tasks ...
This paper proposes a very neat idea of embedding contrastive learning into energy-based model learning. On top of the normal latent-variable energy-based models, the authors introduce augmentation and contrastive representation learning to regularize the latent space. The general idea is to still keep the empirical KL...
Recommendation: 6: marginally above the acceptance threshold
Area: Generative models
Review: This paper proposes a very neat idea of embedding contrastive learning into energy-based model learning. On top of the normal latent-variable energy-based models, the authors introduce augmentation and contrastive representation learning to regularize the latent space. The general idea is to still keep the empi...
The paper aims to solve both graph data imbalance and unnecessary model-level computation burden in a unified framework. Specifically, the authors first examine the challenges from theoretical and empirical perspectives. Then, the authors propose GraphDec, a novel data-model dynamic sparsity framework to address the ch...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: The paper aims to solve both graph data imbalance and unnecessary model-level computation burden in a unified framework. Specifically, the authors first examine the challenges from theoretical and empirical perspectives. Then, the authors propose GraphDec, a novel data-model dynamic sparsity framework to addres...
The paper presents an algorithm to estimate conditional quantiles for time-series predictions, and proposes a new parameterized Elliot activation function in LSTM gates. The conditional quantiles in predictions are used to identify anomalies. 1. There should be a set of experiments that compare the anomaly detection pe...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: The paper presents an algorithm to estimate conditional quantiles for time-series predictions, and proposes a new parameterized Elliot activation function in LSTM gates. The conditional quantiles in predictions are used to identify anomalies. 1. There should be a set of experiments that compare the anomaly dete...
The paper introduces an agent architecture intended to facilitate the reuse of existing knowledge, called ‘knowledge grounded RL’. The knowledge grounding consists of a dictionary with randomly initialized learnable keys paired with hard-coded policies (these could possibly also be pre-trained, in principle) which is a...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The paper introduces an agent architecture intended to facilitate the reuse of existing knowledge, called ‘knowledge grounded RL’. The knowledge grounding consists of a dictionary with randomly initialized learnable keys paired with hard-coded policies (these could possibly also be pre-trained, in principle) wh...
This paper studies computing Nash equilibria in two-player zero-sum Markov games, by proposing a single-loop and symmetric algorithm with last-iterate convergence guarantee. The derived iteration complexity improves over previous works by a factor of $H$. # Strength - The iteration complexity improves over the best pr...
Recommendation: 5: marginally below the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: This paper studies computing Nash equilibria in two-player zero-sum Markov games, by proposing a single-loop and symmetric algorithm with last-iterate convergence guarantee. The derived iteration complexity improves over previous works by a factor of $H$. # Strength - The iteration complexity improves over the...
This work reconsiders the problem of finding stationary points of finite-sum of $n$ smooth functions, where the optimal complexity for stochastic first-order methods is already known to be $\mathcal{O}(n + n^{1/2} \epsilon^{-1})$. The authors proposed to do a refined analysis since the $\mathcal{O}$ could hide dependen...
Recommendation: 5: marginally below the acceptance threshold
Area: Optimization (eg, convex and non-convex optimization)
Review: This work reconsiders the problem of finding stationary points of finite-sum of $n$ smooth functions, where the optimal complexity for stochastic first-order methods is already known to be $\mathcal{O}(n + n^{1/2} \epsilon^{-1})$. The authors proposed to do a refined analysis since the $\mathcal{O}$ could hide ...
The paper proposes a mechanism to keep long-tail events in episodic memory to improve RL performance in Zipfian-like environments. Through contrastive learning, observations' rarity score is estimated and stored in a familiarity buffer. After certain training epochs, only the top rarest events from the buffer transit t...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The paper proposes a mechanism to keep long-tail events in episodic memory to improve RL performance in Zipfian-like environments. Through contrastive learning, observations' rarity score is estimated and stored in a familiarity buffer. After certain training epochs, only the top rarest events from the buffer t...
This paper studied bandits with general function class and heteroscedastic noise. A variance-dependent regret bound is derived. Extending linear model to nonlinear model with provable guarantee is an important topic in bandits problems. However, the approach of using eluder dimension is a bit incremental. There is no m...
Recommendation: 5: marginally below the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: This paper studied bandits with general function class and heteroscedastic noise. A variance-dependent regret bound is derived. Extending linear model to nonlinear model with provable guarantee is an important topic in bandits problems. However, the approach of using eluder dimension is a bit incremental. There...
This paper found a simple (but effective) variant of the continuized Nesterov acceleration (Even et al., 2021) that achieves the optimal complexity (with high probability) under the quasar convex condition for the first time. (Quasar convexity is a non-convex condition that some gradient methods are known to find a glo...
Recommendation: 8: accept, good paper
Area: Optimization (eg, convex and non-convex optimization)
Review: This paper found a simple (but effective) variant of the continuized Nesterov acceleration (Even et al., 2021) that achieves the optimal complexity (with high probability) under the quasar convex condition for the first time. (Quasar convexity is a non-convex condition that some gradient methods are known to fi...
The paper studies defenses against federated learning backdoor attacks. The paper proposes to force the model optimization trajectory to focus on the invariant directions that are generally useful for utility and avoid selecting directions that favor malicious clients. Particularly, the authors consider the consistency...
Recommendation: 5: marginally below the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The paper studies defenses against federated learning backdoor attacks. The paper proposes to force the model optimization trajectory to focus on the invariant directions that are generally useful for utility and avoid selecting directions that favor malicious clients. Particularly, the authors consider the con...
This paper aims to address the compounded natural language problems required by introducing sub-task decomposition and concatenating intermediate supervision to the input and training the sequence-to-sequence model on this modified input. The contribution of this paper can be concluded as: * proving a positive theoret...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper aims to address the compounded natural language problems required by introducing sub-task decomposition and concatenating intermediate supervision to the input and training the sequence-to-sequence model on this modified input. The contribution of this paper can be concluded as: * proving a positive...
The paper shows that the quality of the generated images from text-to-image models such as DALLE-2 and Stable Diffusion can be greatly impacted by single homoglyph replacements. A malicious user can replace a character with a homoglyph that looks the same to the human eye and the text-to-image system produces images wi...
Recommendation: 6: marginally above the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: The paper shows that the quality of the generated images from text-to-image models such as DALLE-2 and Stable Diffusion can be greatly impacted by single homoglyph replacements. A malicious user can replace a character with a homoglyph that looks the same to the human eye and the text-to-image system produces i...
This paper proposes “relay-evaluation” a method to asses the generalization capabilities of RL agents when being forced to start from a state that is out of the distribution defined by the agent’s policy. The paper also introduces “Self-Trajectory Augmentation” (STA) a training method to improve generalization in which...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper proposes “relay-evaluation” a method to asses the generalization capabilities of RL agents when being forced to start from a state that is out of the distribution defined by the agent’s policy. The paper also introduces “Self-Trajectory Augmentation” (STA) a training method to improve generalization ...
The paper proposes to formulate the mult-head attention operation used in transformer models as a sparse gaussian process. The work shows how the computation of such a GP attention mechanism can be sped up by relying on inducing points and standard approaches for increasing Gaussian process scalability. Multiple such a...
Recommendation: 3: reject, not good enough
Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes)
Review: The paper proposes to formulate the mult-head attention operation used in transformer models as a sparse gaussian process. The work shows how the computation of such a GP attention mechanism can be sped up by relying on inducing points and standard approaches for increasing Gaussian process scalability. Multipl...
A paper on operator learning that does not require a specific mesh structure, but allows for querying points. Presentation a bit on the heavy side and experiments could be more demonstrative. *Strengths* 1. The problem is topical and has received recent attention also beyond purely theoretical work. The topic area it...
Recommendation: 5: marginally below the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: A paper on operator learning that does not require a specific mesh structure, but allows for querying points. Presentation a bit on the heavy side and experiments could be more demonstrative. *Strengths* 1. The problem is topical and has received recent attention also beyond purely theoretical work. The topic...
This paper presents a new real-time explainer framework called COntrastive Real-Time eXplanation (CoRTX). The main goal of the algorithm is to limit the dependence of real-time explainers on predefined labels and to improve the throughput (number of samples/time) of the algorithm. CoRTX designs a positive and negative ...
Recommendation: 6: marginally above the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper presents a new real-time explainer framework called COntrastive Real-Time eXplanation (CoRTX). The main goal of the algorithm is to limit the dependence of real-time explainers on predefined labels and to improve the throughput (number of samples/time) of the algorithm. CoRTX designs a positive and n...
The main premise of the paper is that for hyperbolic conservation laws PDEs, operator learning frameworks like DeepOnets are inefficient as compared to counterparts like Neural Fourier Operators. This is because DeepOnets (and PCA-Nets) are linear reconstruction methodologies (i.e, the trunk and branch net outputs are ...
Recommendation: 8: accept, good paper
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: The main premise of the paper is that for hyperbolic conservation laws PDEs, operator learning frameworks like DeepOnets are inefficient as compared to counterparts like Neural Fourier Operators. This is because DeepOnets (and PCA-Nets) are linear reconstruction methodologies (i.e, the trunk and branch net outp...
This work presents a modified Transformer (Renamer) which is invariant under renaming of variables. The design is tested on a task to predict CPU clock cycles to execute blocks of assembly language. The proposed model is compared against an unmodified Transformer which is optionally also trained on inputs with renamed ...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This work presents a modified Transformer (Renamer) which is invariant under renaming of variables. The design is tested on a task to predict CPU clock cycles to execute blocks of assembly language. The proposed model is compared against an unmodified Transformer which is optionally also trained on inputs with ...
This paper proposes a strategy, named DropIT, for activation compression during training. The proposed method can be applied with random dropping or min-k based dropping. The authors show that DropIT can also reduce the gradient noise during training, and provided empirical evidence that the proposed method can drop up...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper proposes a strategy, named DropIT, for activation compression during training. The proposed method can be applied with random dropping or min-k based dropping. The authors show that DropIT can also reduce the gradient noise during training, and provided empirical evidence that the proposed method can...
The work demonstrates that data augmentation alone can alleviate robust overfitting. The authors investigate what factors contribute to the robustness and point out that the hardness and diversity of the augmentation significantly influence the robustness and accuracy. They propose a new image transformation method Cro...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: The work demonstrates that data augmentation alone can alleviate robust overfitting. The authors investigate what factors contribute to the robustness and point out that the hardness and diversity of the augmentation significantly influence the robustness and accuracy. They propose a new image transformation me...
In this paper, the authors study a largely overlooked problem: OOD detection in FL. To turn the curse of heterogeneity in FL into a blessing that facilitates OOD detection, the authors propose a novel OOD synthesizer without relying on any real external samples, allowing a client class knowledge from other non-iid fede...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: In this paper, the authors study a largely overlooked problem: OOD detection in FL. To turn the curse of heterogeneity in FL into a blessing that facilitates OOD detection, the authors propose a novel OOD synthesizer without relying on any real external samples, allowing a client class knowledge from other non-...
- As one key challenge of existing vector quantization methods comes from codebook collapse, this work proposes OT-VAE, which regularizes the quantization by explicitly assigning equal number of samples to each code. - The proposed method enforces the full utilization of the codebook while not requiring any heurist...
Recommendation: 6: marginally above the acceptance threshold
Area: Generative models
Review: - As one key challenge of existing vector quantization methods comes from codebook collapse, this work proposes OT-VAE, which regularizes the quantization by explicitly assigning equal number of samples to each code. - The proposed method enforces the full utilization of the codebook while not requiring any...
**Summary** The paper proposed a method ALT to convert any graph neural network to be effective for non-homophily graphs. The key idea is to use two backbone GNNs and an additional MLP to shift (or adapt) the frequency response function of the diffusion filter. The authors also propose a more complicated version of ALT...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: **Summary** The paper proposed a method ALT to convert any graph neural network to be effective for non-homophily graphs. The key idea is to use two backbone GNNs and an additional MLP to shift (or adapt) the frequency response function of the diffusion filter. The authors also propose a more complicated versio...
This work presents a text2video method, which builds on image2video model with spatial-temporal modules. The method is straight-forward and the results are appealing. **Strength** 1) This paper is well-written and easy to follow. 2) The method is simple but effective. 3) The results are compelling. 4) This work use...
Recommendation: 6: marginally above the acceptance threshold
Area: Generative models
Review: This work presents a text2video method, which builds on image2video model with spatial-temporal modules. The method is straight-forward and the results are appealing. **Strength** 1) This paper is well-written and easy to follow. 2) The method is simple but effective. 3) The results are compelling. 4) This ...
This paper proposes an algorithm for strongly-adaptive full-matrix regret of the form $R_I\le \tilde O(\min_{H\succ 0}\sqrt{\sum_{t\in I} \|\|\nabla\ell_t(w_t)\|\|^2_{\star,H}})$ for any interval $I\subseteq[1,T]$. The core idea is to apply the geometric covering intervals of Daniely 2015 with instances of full-matrix ...
Recommendation: 5: marginally below the acceptance threshold
Area: Optimization (eg, convex and non-convex optimization)
Review: This paper proposes an algorithm for strongly-adaptive full-matrix regret of the form $R_I\le \tilde O(\min_{H\succ 0}\sqrt{\sum_{t\in I} \|\|\nabla\ell_t(w_t)\|\|^2_{\star,H}})$ for any interval $I\subseteq[1,T]$. The core idea is to apply the geometric covering intervals of Daniely 2015 with instances of full...
This paper presents a class of SO(3)-equivariant neural networks called Orientation-Aware Graph Neural Networks (OAGNNs). The model is based on specific layers acting on scalar and vector features, designed to ensure better expressive power (compared to previous works) while maintaining SO(3) equivariance. Compared ...
Recommendation: 6: marginally above the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: This paper presents a class of SO(3)-equivariant neural networks called Orientation-Aware Graph Neural Networks (OAGNNs). The model is based on specific layers acting on scalar and vector features, designed to ensure better expressive power (compared to previous works) while maintaining SO(3) equivariance. C...
The authors adapt existing contrastive learning approaches for self-supervised image representation learning to learning from video frames instead of static images. In particular, they first adapt the data augmentation steps, which are key to contrastive learning, to the video domain. Two main adaptations are proposed:...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: The authors adapt existing contrastive learning approaches for self-supervised image representation learning to learning from video frames instead of static images. In particular, they first adapt the data augmentation steps, which are key to contrastive learning, to the video domain. Two main adaptations are p...
The paper considers the offline Reinforcement Learning setting, and more precisely the problem of computing Q-Values from transitions in the dataset, where bootstrapping from out-of-distribution actions (actions not in the dataset) may lead to over-estimation and poor learning. The proposed solution builds on sampling ...
Recommendation: 8: accept, good paper
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The paper considers the offline Reinforcement Learning setting, and more precisely the problem of computing Q-Values from transitions in the dataset, where bootstrapping from out-of-distribution actions (actions not in the dataset) may lead to over-estimation and poor learning. The proposed solution builds on s...
The authors study the loss landscape of multilayer convolutional neural networks, and in particular consider the construction of spurious minimizers of networks trained on regression/classification tasks. They consider networks with fully connected, convolutional, max-pooling, and average pooling layers, as well as Re...
Recommendation: 5: marginally below the acceptance threshold
Area: Optimization (eg, convex and non-convex optimization)
Review: The authors study the loss landscape of multilayer convolutional neural networks, and in particular consider the construction of spurious minimizers of networks trained on regression/classification tasks. They consider networks with fully connected, convolutional, max-pooling, and average pooling layers, as we...
The paper studies federated semi-supervised learning and introduces the FedProp method. FedProp allows the computation of label propagation along an estimate of the data manifold to which the data of all participating clients contribute and use efficient cryptographic primitives to avoid accessing the data from differe...
Recommendation: 3: reject, not good enough
Area: Unsupervised and Self-supervised learning
Review: The paper studies federated semi-supervised learning and introduces the FedProp method. FedProp allows the computation of label propagation along an estimate of the data manifold to which the data of all participating clients contribute and use efficient cryptographic primitives to avoid accessing the data from...
This work proposes Learned Iterative Steganography Optimization (LISO), a steganography approach that leverages deep neural networks and iterative optimization to hide a secret message in an image. LISO is faster than previous optimization-based approaches and has low message recovery error. ## Strengths (+) Deep-lea...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This work proposes Learned Iterative Steganography Optimization (LISO), a steganography approach that leverages deep neural networks and iterative optimization to hide a secret message in an image. LISO is faster than previous optimization-based approaches and has low message recovery error. ## Strengths (+) ...
The authors propose a graph rewiring method, which aims to tackle the oversquashing problem in GNN literature. The proposed method greedily adds edges for maximizing the spectral gap of the graph sequentially. The authors also propose the use of relational GNNs to preserve the original graph topological information. Th...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: The authors propose a graph rewiring method, which aims to tackle the oversquashing problem in GNN literature. The proposed method greedily adds edges for maximizing the spectral gap of the graph sequentially. The authors also propose the use of relational GNNs to preserve the original graph topological informa...
Reinforcement learning can be used in many industrial decision-making problems due to its potential to outperform heuristics. To avoid issues around scale, current state-of-the-art practical algorithms are simple rule-based strategies which are tuned for improved performance. In contrast, reinforcement learning is a ...
Recommendation: 5: marginally below the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: Reinforcement learning can be used in many industrial decision-making problems due to its potential to outperform heuristics. To avoid issues around scale, current state-of-the-art practical algorithms are simple rule-based strategies which are tuned for improved performance. In contrast, reinforcement learni...
This paper proposes to learn a successor representation and use it to cluster the states. The clusters are then treated as nodes of a graph and an (option) policy is trained to navigate the graph. The graph can be used in either a goal-oriented setting by searching; or a reward maximization setting with a lazy random w...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper proposes to learn a successor representation and use it to cluster the states. The clusters are then treated as nodes of a graph and an (option) policy is trained to navigate the graph. The graph can be used in either a goal-oriented setting by searching; or a reward maximization setting with a lazy ...
Authors present efficient integrator for diffusion models based on polynomial interpolation of the noise during trajectory estimation. Strengths: 1. Idea somewhat interesting from theoretical stand point 2. Detailed motivation for ODE case why this should work Weakness: 1. It's not clear why you mention application t...
Recommendation: 5: marginally below the acceptance threshold
Area: Generative models
Review: Authors present efficient integrator for diffusion models based on polynomial interpolation of the noise during trajectory estimation. Strengths: 1. Idea somewhat interesting from theoretical stand point 2. Detailed motivation for ODE case why this should work Weakness: 1. It's not clear why you mention appli...
Authors introduced the framework of Constraint Augmented Multi-Agent (CAMA) for solving constrained multi-agent reinforcement learning problems. Earlier Sootla et al. [2022] augmented the safety constrains into the cost function by defining a safety budget and panelizing the agent when crossing that budget. CAMA brings...
Recommendation: 5: marginally below the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: Authors introduced the framework of Constraint Augmented Multi-Agent (CAMA) for solving constrained multi-agent reinforcement learning problems. Earlier Sootla et al. [2022] augmented the safety constrains into the cost function by defining a safety budget and panelizing the agent when crossing that budget. CAM...
This paper demonstrates a method called graph transformer on better integrating graph structures. The paper conducts a brief description on how there techniques is composed of and propose various of analysis on the effectiveness of graph diffuser on established benchmark. Strength: 1. The paper presents two novel desig...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This paper demonstrates a method called graph transformer on better integrating graph structures. The paper conducts a brief description on how there techniques is composed of and propose various of analysis on the effectiveness of graph diffuser on established benchmark. Strength: 1. The paper presents two nov...
This paper focused on coupling the data flow to outputs and inputs, allowing for interconnections between outputs of multiple layers. This led into the concept to prune CC without data to obtain aster latencies. The algorithms and parameters were well outlined in this paper. In total, the contributions made in the pape...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper focused on coupling the data flow to outputs and inputs, allowing for interconnections between outputs of multiple layers. This led into the concept to prune CC without data to obtain aster latencies. The algorithms and parameters were well outlined in this paper. In total, the contributions made in ...
This work demonstrates the natural emergence of sparsity in commonly used Transformer models. This paper proposed Top-k thresholding to enforce sparsity, which brings robustness of training with erroneous annotations, less sensitivity to input noise/perturbation, and better confidence calibration of the predictions....
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: This work demonstrates the natural emergence of sparsity in commonly used Transformer models. This paper proposed Top-k thresholding to enforce sparsity, which brings robustness of training with erroneous annotations, less sensitivity to input noise/perturbation, and better confidence calibration of the pred...
This work studies distributed kernelized contextual bandits problem, where the reward function lies in a reproducing kernel Hilbert space. New asynchronous approach that does not require all clients to participate and wait for data exchange was proposed by the author(s). The suggested approach is shown to have near-opt...
Recommendation: 6: marginally above the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: This work studies distributed kernelized contextual bandits problem, where the reward function lies in a reproducing kernel Hilbert space. New asynchronous approach that does not require all clients to participate and wait for data exchange was proposed by the author(s). The suggested approach is shown to have ...
This paper proposed one method NAC to automatically design GNNs. With randomly initialized model weights, NAC designs the GNNs by learning the sparse encodings on top of the search space. The empirical and theoretical results demonstrate its effectiveness. ### Strength: This paper shows the feasibility of no-update GN...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposed one method NAC to automatically design GNNs. With randomly initialized model weights, NAC designs the GNNs by learning the sparse encodings on top of the search space. The empirical and theoretical results demonstrate its effectiveness. ### Strength: This paper shows the feasibility of no-u...
This paper develops a novel molecular generation method called MiCaM that simultaneously selects motifs from a motif library and determines how they are connected (or terminate the generation). The key feature of MiCaM is that the motif library (motif vocabulary), the collection of frequent substructural fragments, is ...
Recommendation: 6: marginally above the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: This paper develops a novel molecular generation method called MiCaM that simultaneously selects motifs from a motif library and determines how they are connected (or terminate the generation). The key feature of MiCaM is that the motif library (motif vocabulary), the collection of frequent substructural fragme...
This paper performs a comparison of different active learning strategies on tabular data sets when trained with deep learning models that are pre-trained with self-supervised learning. The key result is that margin sampling, which is also one of the easiest active learning strategies, consistently outperforms other str...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper performs a comparison of different active learning strategies on tabular data sets when trained with deep learning models that are pre-trained with self-supervised learning. The key result is that margin sampling, which is also one of the easiest active learning strategies, consistently outperforms o...
This paper presents a self supervised method for object segmentation in NeRF. The major idea is applying collaborative contrastive training in both appearance (radiance field) and geometry (density field) level in NeRF. It uses DINO (Amir et al., 2021) as the basic backbone architecture to extract appearance correlati...
Recommendation: 6: marginally above the acceptance threshold
Area: Unsupervised and Self-supervised learning
Review: This paper presents a self supervised method for object segmentation in NeRF. The major idea is applying collaborative contrastive training in both appearance (radiance field) and geometry (density field) level in NeRF. It uses DINO (Amir et al., 2021) as the basic backbone architecture to extract appearance c...
This paper focuses on the trade-off between the error rate of the classifier and the number of examples that need to be processed manually because the system was not confident enough to process them automatically. This trade-off is at the heart of all uses of automatic classifiers for industrial tasks with maximum erro...
Recommendation: 3: reject, not good enough
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper focuses on the trade-off between the error rate of the classifier and the number of examples that need to be processed manually because the system was not confident enough to process them automatically. This trade-off is at the heart of all uses of automatic classifiers for industrial tasks with maxi...
This paper studies the excess risk of two-layer ReLU neural networks in a teacher-student regression model. In particular, they showed that the student network could learn the teacher network under certain conditions in two phases: first by noisy gradient descent and then by vanilla gradient descent. Strength: 1. The ...
Recommendation: 8: accept, good paper
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: This paper studies the excess risk of two-layer ReLU neural networks in a teacher-student regression model. In particular, they showed that the student network could learn the teacher network under certain conditions in two phases: first by noisy gradient descent and then by vanilla gradient descent. Strength:...
This paper theoretically studied the joint-embedding training dynamics in a linear setting - which may be suitable for a multimodal environment. They studied both contrastive and non-contrastive cases and showed that contrastive negative pairs are essential for preventing representations from becoming a rank-one soluti...
Recommendation: 5: marginally below the acceptance threshold
Area: Unsupervised and Self-supervised learning
Review: This paper theoretically studied the joint-embedding training dynamics in a linear setting - which may be suitable for a multimodal environment. They studied both contrastive and non-contrastive cases and showed that contrastive negative pairs are essential for preventing representations from becoming a rank-on...
This paper identifies lackluster exploration as a standing problem in model-based deep RL algorithm involving tree search. Hence, the authors propose to estimate epistemic uncertainty in order to drive exploration. Instead of directly integrating uncertainty bonuses in the value function, their method directly propaga...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper identifies lackluster exploration as a standing problem in model-based deep RL algorithm involving tree search. Hence, the authors propose to estimate epistemic uncertainty in order to drive exploration. Instead of directly integrating uncertainty bonuses in the value function, their method directly...
The paper studies a zero-sum team Markov game. In the game, a team of agents compete with an adversary. Agents in the team have the same reward function, and the sum of the team and the adversary's rewards is zero. The paper in particualr looks at a class of potential games. The main contribution of the paper is to pro...
Recommendation: 5: marginally below the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: The paper studies a zero-sum team Markov game. In the game, a team of agents compete with an adversary. Agents in the team have the same reward function, and the sum of the team and the adversary's rewards is zero. The paper in particualr looks at a class of potential games. The main contribution of the paper i...
This work proposes a unified coding framework for MARL based on RLlib and Ray. The frame support a relatively large number of different algorithms (of different types), and a relatively large number of MARL environments. **Strength** - This work implements a relatively large number of MARL algorithms on multiple enviro...
Recommendation: 5: marginally below the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This work proposes a unified coding framework for MARL based on RLlib and Ray. The frame support a relatively large number of different algorithms (of different types), and a relatively large number of MARL environments. **Strength** - This work implements a relatively large number of MARL algorithms on multipl...
This paper considers the sample efficiency and single-agent monotonic improvement guarantees in sequential (agent-by-agent) policy updates in cooperative multi-agent tasks. To retain the guarantees of monotonic improvement for single agent, the authors propose the PreOPC, which approximate the true advantage of an agen...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper considers the sample efficiency and single-agent monotonic improvement guarantees in sequential (agent-by-agent) policy updates in cooperative multi-agent tasks. To retain the guarantees of monotonic improvement for single agent, the authors propose the PreOPC, which approximate the true advantage of...
The paper improves upon the unsupervised speech synthesis. The motivation of such work is to serve to low resource languages where the supervised approach might not be feasible due to lack of annotated data. The paper proposes and implements several modifications (bag of tricks) to the existing methods to improve the ...
Recommendation: 8: accept, good paper
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The paper improves upon the unsupervised speech synthesis. The motivation of such work is to serve to low resource languages where the supervised approach might not be feasible due to lack of annotated data. The paper proposes and implements several modifications (bag of tricks) to the existing methods to impr...
## Paper Summary This paper considers decentralized (i.e. control over a single agent) learning in Markov games with adversarial multiple opponents. At a high level, the fundamental goal is to design a no-regret learning policy, i.e. sublinear regret to converge towards the best fixed policy in hindsight. This is co...
Recommendation: 8: accept, good paper
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: ## Paper Summary This paper considers decentralized (i.e. control over a single agent) learning in Markov games with adversarial multiple opponents. At a high level, the fundamental goal is to design a no-regret learning policy, i.e. sublinear regret to converge towards the best fixed policy in hindsight. Th...
This paper proposes a probabilistic generative method leveraging learned 2d-to-3d mappings from SurfEMB and depth (3DP3) that generates and optimizes (MCMC) 6d pose hypotheses based on RGB-D images. The method is purely trained on synthetic images and evaluated on real data showing significant improvements to the basel...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper proposes a probabilistic generative method leveraging learned 2d-to-3d mappings from SurfEMB and depth (3DP3) that generates and optimizes (MCMC) 6d pose hypotheses based on RGB-D images. The method is purely trained on synthetic images and evaluated on real data showing significant improvements to t...
The paper describes a solution for learning how to "draw" spatial networks of roads on top of satellite images. The solution is based on MCTS and MuZero. There are limited details in terms of the dataset used for training and how the system is actually deployed after training. The system is evaluated with synthetic da...
Recommendation: 5: marginally below the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The paper describes a solution for learning how to "draw" spatial networks of roads on top of satellite images. The solution is based on MCTS and MuZero. There are limited details in terms of the dataset used for training and how the system is actually deployed after training. The system is evaluated with synt...
This paper provides a method to evaluate the representations of deep learning models by combining predictions of readout models. The readout models are selected based on a switching policy according to the Minimum Description Length, which is an evaluation metric for probing models that consider both model accuracy and...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper provides a method to evaluate the representations of deep learning models by combining predictions of readout models. The readout models are selected based on a switching policy according to the Minimum Description Length, which is an evaluation metric for probing models that consider both model accu...
This work proposes FedPM, a scheme for communication (and as a byproduct, computation) efficient federated learning. Instead of training the neural network weights with, e.g., FedAvg, the authors propose to freeze the network at its random initialisation and then only train a *binary* mask over the weights, to prune so...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This work proposes FedPM, a scheme for communication (and as a byproduct, computation) efficient federated learning. Instead of training the neural network weights with, e.g., FedAvg, the authors propose to freeze the network at its random initialisation and then only train a *binary* mask over the weights, to ...
The authors propose a Deep Variational Implicit Process (DVIP) which is an extension of the existing VIP model in the same way that a Deep GP (DGP) is an extension of the GP. They show how to perform approximate inference in this model (combining ideas from DGP and VIP inference) and present the empirical performance o...
Recommendation: 6: marginally above the acceptance threshold
Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes)
Review: The authors propose a Deep Variational Implicit Process (DVIP) which is an extension of the existing VIP model in the same way that a Deep GP (DGP) is an extension of the GP. They show how to perform approximate inference in this model (combining ideas from DGP and VIP inference) and present the empirical perfo...
This paper studies the problem of how to leverage pre-trained visual representations for control. They show that simply freezing the visual encoder and training a policy head leads to poor performance. Performance can be improved by fine-tuning the visual encoder but this leads to catestrophic forgetting and thus a sep...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper studies the problem of how to leverage pre-trained visual representations for control. They show that simply freezing the visual encoder and training a policy head leads to poor performance. Performance can be improved by fine-tuning the visual encoder but this leads to catestrophic forgetting and th...
This paper proposes to train representations equivariant to data augmentations by optimizing two additional regularizers together with the standard cross-entropy loss. Specifically, equivariance is promoted by minimizing the L2 loss between the embedding transformed by $M_a$ and embedding obtained by feeding augmented ...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposes to train representations equivariant to data augmentations by optimizing two additional regularizers together with the standard cross-entropy loss. Specifically, equivariance is promoted by minimizing the L2 loss between the embedding transformed by $M_a$ and embedding obtained by feeding au...
The paper tackles the problem of detection of “illicit” activities. The main proposal is “The Ganfather”, a Generative Adversarial Network (GAN) that automatically crafts samples conforming to a given “illicit activity” which – if not detected – will cause harm to the owners of an information system. By training a dete...
Recommendation: 6: marginally above the acceptance threshold
Area: Generative models
Review: The paper tackles the problem of detection of “illicit” activities. The main proposal is “The Ganfather”, a Generative Adversarial Network (GAN) that automatically crafts samples conforming to a given “illicit activity” which – if not detected – will cause harm to the owners of an information system. By trainin...
In this work, an equivariant graph contrastive learning method is proposed to perform cross-graph augmentation, which is reasonable and effective for GCL. Experiments are performed both unsupervised learning and transfer learning tasks to show the model effectiveness. Pros: 1. The studied problem with equivariant graph...
Recommendation: 8: accept, good paper
Area: Unsupervised and Self-supervised learning
Review: In this work, an equivariant graph contrastive learning method is proposed to perform cross-graph augmentation, which is reasonable and effective for GCL. Experiments are performed both unsupervised learning and transfer learning tasks to show the model effectiveness. Pros: 1. The studied problem with equivaria...
The authors propose a new random initialization scheme Risotto that achieves dynamical isometry for residual networks with Relu activation functions. The key difference from the previous work is that they achieve the dynamical isometry by balancing the signals from both residual and skip branches, unlike the previous w...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: The authors propose a new random initialization scheme Risotto that achieves dynamical isometry for residual networks with Relu activation functions. The key difference from the previous work is that they achieve the dynamical isometry by balancing the signals from both residual and skip branches, unlike the pr...
The paper proposed an accurate pipeline for constructing a domain specific database (fine). The constructed database is adapted from a coarse domain. The construction process is distantly (self) supervised without any manually annotated data. The proposed system, if works, will serve as a powerful tool to construct dom...
Recommendation: 3: reject, not good enough
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The paper proposed an accurate pipeline for constructing a domain specific database (fine). The constructed database is adapted from a coarse domain. The construction process is distantly (self) supervised without any manually annotated data. The proposed system, if works, will serve as a powerful tool to const...
This paper aims to improve sampling speed of diffusion-based generative models by minimizing the number of reverse steps. Instead of using a distillation technique, this paper truncates the diffusion process, stopping adding noise to samples before the samples become pure white noise. Then, an implicit generative model...
Recommendation: 5: marginally below the acceptance threshold
Area: Generative models
Review: This paper aims to improve sampling speed of diffusion-based generative models by minimizing the number of reverse steps. Instead of using a distillation technique, this paper truncates the diffusion process, stopping adding noise to samples before the samples become pure white noise. Then, an implicit generati...
**Overview of this paper** This paper studies why adaptive methods perform better than SGD in terms of convergence. Specifically, this paper aims to explore the hypothesis proposed by (Zhang et al., 2019): Adaptive methods including Adam converge faster than SGD due to the more robust gradient estimate of adaptive met...
Recommendation: 6: marginally above the acceptance threshold
Area: Optimization (eg, convex and non-convex optimization)
Review: **Overview of this paper** This paper studies why adaptive methods perform better than SGD in terms of convergence. Specifically, this paper aims to explore the hypothesis proposed by (Zhang et al., 2019): Adaptive methods including Adam converge faster than SGD due to the more robust gradient estimate of adap...
The paper proposes offline RL algorithms with DP guarantees for tabular case and linear MDP. The key components are the private estimates of the visitation counts/conditional variance based on the Gaussian Mechanism, with some modifications to allow the use of existing pessimism-based value iteration algorithms. The pa...
Recommendation: 5: marginally below the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: The paper proposes offline RL algorithms with DP guarantees for tabular case and linear MDP. The key components are the private estimates of the visitation counts/conditional variance based on the Gaussian Mechanism, with some modifications to allow the use of existing pessimism-based value iteration algorithms...