review stringlengths 5 16.6k | score stringclasses 5
values | area stringclasses 12
values | text stringlengths 31 5.65k |
|---|---|---|---|
This paper focuses on what it refers to as "selection collider bias", using a causal inference framework to discuss spurious correlations in language data. The paper seems largely focused on formalizing notions of selection bias and spurious correlations through the language of causal inference, and presenting reasonin... | Recommendation: 3: reject, not good enough | Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes) | Review:
This paper focuses on what it refers to as "selection collider bias", using a causal inference framework to discuss spurious correlations in language data. The paper seems largely focused on formalizing notions of selection bias and spurious correlations through the language of causal inference, and presenting ... |
This paper proposes a meta-learning-based feature selection framework that aims to select effective features for machine learning tasks. Specifically, this wrapper framework consists of two components, i.e., Feature Subset Sampler (FSS) which optimizes the discrete search space in a continuous way, and Meta Feature Est... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper proposes a meta-learning-based feature selection framework that aims to select effective features for machine learning tasks. Specifically, this wrapper framework consists of two components, i.e., Feature Subset Sampler (FSS) which optimizes the discrete search space in a continuous way, and Meta Fea... |
This paper proposes a self-supervised learning (SSL) framework for tabular data, Masked Encoding for Tabular Data (MET). MET employs masked auto-encoding with Transformer architectures. This paper shows that MET outperforms existing SSL methods for tabular data and classical machine learning approaches. In addition, th... | Recommendation: 6: marginally above the acceptance threshold | Area: Unsupervised and Self-supervised learning | Review:
This paper proposes a self-supervised learning (SSL) framework for tabular data, Masked Encoding for Tabular Data (MET). MET employs masked auto-encoding with Transformer architectures. This paper shows that MET outperforms existing SSL methods for tabular data and classical machine learning approaches. In addi... |
This paper try to show that common state-of-the-art methods in continual learning suffer from substantial forgetting upon starting to
learn new tasks, except that this forgetting is temporary and followed by a phase of performance recovery. The main contributions can be summarized as :
(1) This work defines a framewor... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper try to show that common state-of-the-art methods in continual learning suffer from substantial forgetting upon starting to
learn new tasks, except that this forgetting is temporary and followed by a phase of performance recovery. The main contributions can be summarized as :
(1) This work defines a ... |
This paper proposes new learned state representations that can improve exploration by introducing time predictive semantics into the state representation. The authors propose a new notion of novelty based on time prediction representations and use this to create a new insertion criterion, a new cell count strategy and ... | Recommendation: 3: reject, not good enough | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper proposes new learned state representations that can improve exploration by introducing time predictive semantics into the state representation. The authors propose a new notion of novelty based on time prediction representations and use this to create a new insertion criterion, a new cell count strat... |
In this work a model for sequences with the following properties is proposed:
- Modular description of the transition function
- Handling of interventions, defined as the modification of a target of the transition function
- Learning of the dependency structure
- Use of latent variables
The authors build on top of t... | Recommendation: 6: marginally above the acceptance threshold | Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes) | Review:
In this work a model for sequences with the following properties is proposed:
- Modular description of the transition function
- Handling of interventions, defined as the modification of a target of the transition function
- Learning of the dependency structure
- Use of latent variables
The authors build on ... |
This paper is based on the insight that anomaly detection can be treated as a causal discovery problem, to both improve detection and to facilitate root cause analysis. An anomaly is defined as a datum that does not fit the discovered data-generating process, in short an instance where the process is non-stationary. Th... | Recommendation: 3: reject, not good enough | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper is based on the insight that anomaly detection can be treated as a causal discovery problem, to both improve detection and to facilitate root cause analysis. An anomaly is defined as a datum that does not fit the discovered data-generating process, in short an instance where the process is non-statio... |
This paper studied the problem of learning a Lipschitz continuous function on a manifold. The authors used the Lagrangian dual problem and showed that its empirical version can be an approximation of the primal with statistical consistency. The authors further showed that, by using a weighted point cloud Laplacian, the... | Recommendation: 5: marginally below the acceptance threshold | Area: Optimization (eg, convex and non-convex optimization) | Review:
This paper studied the problem of learning a Lipschitz continuous function on a manifold. The authors used the Lagrangian dual problem and showed that its empirical version can be an approximation of the primal with statistical consistency. The authors further showed that, by using a weighted point cloud Laplac... |
This paper proposes a self-supervised model for video object discovery. It only takes consecutive RGB frames as input instead of optical flows as in previous works. The model is trained to reconstruct the optical flow between any paired frames that generated through an off-the-shelf optical flow estimator. A temporal c... | Recommendation: 5: marginally below the acceptance threshold | Area: Unsupervised and Self-supervised learning | Review:
This paper proposes a self-supervised model for video object discovery. It only takes consecutive RGB frames as input instead of optical flows as in previous works. The model is trained to reconstruct the optical flow between any paired frames that generated through an off-the-shelf optical flow estimator. A te... |
The paper presents a new training methodology, HRAT, for neural networks to be deployed on Memristor (RRAM) based hardware. The presented methodology accounts for non-idealities such as Quantization error for weights and limited output swing of operational amplifier circuits. Additionally, the methodology also covers t... | Recommendation: 5: marginally below the acceptance threshold | Area: General Machine Learning | Review:
The paper presents a new training methodology, HRAT, for neural networks to be deployed on Memristor (RRAM) based hardware. The presented methodology accounts for non-idealities such as Quantization error for weights and limited output swing of operational amplifier circuits. Additionally, the methodology also ... |
This paper address the problem of GNNs being vulnerable to imperceptible adversarial attacks and also has some issues in generalizing out-of-distribution data. The proposed solution, graph predictive coding network (GPCN), uses a novel message-passing scheme developed based on the theory of predictive coding. The autho... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
This paper address the problem of GNNs being vulnerable to imperceptible adversarial attacks and also has some issues in generalizing out-of-distribution data. The proposed solution, graph predictive coding network (GPCN), uses a novel message-passing scheme developed based on the theory of predictive coding. T... |
The paper presents simplified closed-form estimates for the test risk and other generalization
metrics of kernel ridge regression. Compared to prior work, the authors claim their derivations
are greatly simplified and lead to higher interpretability. Test risk and other objects of interest
are expressed in a transpar... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
The paper presents simplified closed-form estimates for the test risk and other generalization
metrics of kernel ridge regression. Compared to prior work, the authors claim their derivations
are greatly simplified and lead to higher interpretability. Test risk and other objects of interest
are expressed in a ... |
A method for posterior inference with a variant of GBDT is proposed. The weak learner used in this paper is a variant of the standard decision tree, where decision rules are oblivious (same split used at all nodes of the tree at the same level), the splitting procedure is randomized by use of the max-Gumbel trick to sa... | Recommendation: 6: marginally above the acceptance threshold | Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes) | Review:
A method for posterior inference with a variant of GBDT is proposed. The weak learner used in this paper is a variant of the standard decision tree, where decision rules are oblivious (same split used at all nodes of the tree at the same level), the splitting procedure is randomized by use of the max-Gumbel tri... |
Similar to as is done in done in diffusion models for U-net layers, this paper applies time-conditioning to FNO layers and demonstrates it applicability on a wide variety of tasks. The paper also proposes a method to normalize the Fourier kernel so that it's more perturbation resistant.
**Strengths**
Time-conditioning... | Recommendation: 5: marginally below the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
Similar to as is done in done in diffusion models for U-net layers, this paper applies time-conditioning to FNO layers and demonstrates it applicability on a wide variety of tasks. The paper also proposes a method to normalize the Fourier kernel so that it's more perturbation resistant.
**Strengths**
Time-cond... |
This paper proposes a distribution-dependent stage-aware ranking score (DDSAR-Score) for efficient face detection (FD), which can explicitly characterize the stage-level expressivity and identify the individual importance of each stage, thus satisfying the model structure design criterion of the FD backbone. As an accu... | Recommendation: 8: accept, good paper | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper proposes a distribution-dependent stage-aware ranking score (DDSAR-Score) for efficient face detection (FD), which can explicitly characterize the stage-level expressivity and identify the individual importance of each stage, thus satisfying the model structure design criterion of the FD backbone. As... |
This paper proposes to integrate an SSL auxiliary objective with standard model-free MARL methods (specifically MAT in this paper) to reap the same benefits as CV and single-agent RL has seen with these types of approaches. Because each agent in a typical MARL setup receives a partial observation of the world, in order... | Recommendation: 6: marginally above the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper proposes to integrate an SSL auxiliary objective with standard model-free MARL methods (specifically MAT in this paper) to reap the same benefits as CV and single-agent RL has seen with these types of approaches. Because each agent in a typical MARL setup receives a partial observation of the world, ... |
This work aims to improve the efficiency and robustness of knowledge augmented LM.
The intuition is for LM to decide when an external knowledge source is needed.
A metric Thrust is developed for this decision, based on the relationship between the query embedding and the clusters of instance embeddings.
1) representa... | Recommendation: 3: reject, not good enough | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This work aims to improve the efficiency and robustness of knowledge augmented LM.
The intuition is for LM to decide when an external knowledge source is needed.
A metric Thrust is developed for this decision, based on the relationship between the query embedding and the clusters of instance embeddings.
1) re... |
The paper studies phase transition for detecting communities under the degree-corrected block model (DCBM). The motivation is that chi-square test is not good for DCBM because of artifacts, so they use the the Signed-Quadrilateral (SgnQ) instead. The authors provide the SgnQ efficient regime, the computationally infeas... | Recommendation: 6: marginally above the acceptance threshold | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
The paper studies phase transition for detecting communities under the degree-corrected block model (DCBM). The motivation is that chi-square test is not good for DCBM because of artifacts, so they use the the Signed-Quadrilateral (SgnQ) instead. The authors provide the SgnQ efficient regime, the computationall... |
Paper proposes a method, MUST, for unsupervised adaptation of a zero shot classifier. A pre-trained open world model CLIP is taken to produce classification embeddings for a vocabulary of words. These are then use to kick-start a training method that adapts a zero-shot classification model by a combination of three obj... | Recommendation: 8: accept, good paper | Area: Unsupervised and Self-supervised learning | Review:
Paper proposes a method, MUST, for unsupervised adaptation of a zero shot classifier. A pre-trained open world model CLIP is taken to produce classification embeddings for a vocabulary of words. These are then use to kick-start a training method that adapts a zero-shot classification model by a combination of t... |
The authors propose a zero-cost evaluation metric to improve zero-shot neural architecture search efficiency in this work. This work uses gradient distribution and network information at initialization for scoring candidate models and achieves a strong rank consistency with the performance of candidate models. Extensiv... | Recommendation: 5: marginally below the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
The authors propose a zero-cost evaluation metric to improve zero-shot neural architecture search efficiency in this work. This work uses gradient distribution and network information at initialization for scoring candidate models and achieves a strong rank consistency with the performance of candidate models. ... |
The paper under consideration proposes a “Boomerang” approach for image variability-related applications. The idea is quite simple. Given a standard diffusion model:
- run forward diffusion for several times resulting in noised image
- run backward diffusion for several times resulting in an image which is controllably... | Recommendation: 3: reject, not good enough | Area: Generative models | Review:
The paper under consideration proposes a “Boomerang” approach for image variability-related applications. The idea is quite simple. Given a standard diffusion model:
- run forward diffusion for several times resulting in noised image
- run backward diffusion for several times resulting in an image which is cont... |
This paper proposes a new lossy image compression paradigm based on unconditional diffusion models. The noise corrupted image is compressed and sent to the decoder via reverse channel coding, and the reconstruction of the input image is done through the denoising process applied to the received noise corrupted image. E... | Recommendation: 5: marginally below the acceptance threshold | Area: Generative models | Review:
This paper proposes a new lossy image compression paradigm based on unconditional diffusion models. The noise corrupted image is compressed and sent to the decoder via reverse channel coding, and the reconstruction of the input image is done through the denoising process applied to the received noise corrupted ... |
First, the authors built a dataset consisting of neural network checkpoints that perform specific tasks, such as MNIST classification, including its loss and error. The proposed data-driven optimizer, G.pt, is a neural network model trained using this dataset. Specifically, if the parameters of the initial checkpoint, ... | Recommendation: 5: marginally below the acceptance threshold | Area: Generative models | Review:
First, the authors built a dataset consisting of neural network checkpoints that perform specific tasks, such as MNIST classification, including its loss and error. The proposed data-driven optimizer, G.pt, is a neural network model trained using this dataset. Specifically, if the parameters of the initial chec... |
Training deep learning models is becoming increasingly challenging: there is simply not enough memory to store the activations generated by the forward pass until the corresponding gradients are computed. The paper proposes to split each activations in two tensors, $o$ and $a$. The $o$ tensor can be discarded quickly, ... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
Training deep learning models is becoming increasingly challenging: there is simply not enough memory to store the activations generated by the forward pass until the corresponding gradients are computed. The paper proposes to split each activations in two tensors, $o$ and $a$. The $o$ tensor can be discarded q... |
This paper aims at achieving robustness in uncertain environments. The proposed approach, a mean-standard deviation formulation, seemingly reduces the desired level of robustness to one parameter tuning. Experiments are conducted on discrete and continuous control domains.
The idea of relating distributional RL for th... | Recommendation: 3: reject, not good enough | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper aims at achieving robustness in uncertain environments. The proposed approach, a mean-standard deviation formulation, seemingly reduces the desired level of robustness to one parameter tuning. Experiments are conducted on discrete and continuous control domains.
The idea of relating distributional R... |
The paper uses the NTK to discuss the effect of momentum on the training success of PINNs. It is shown that momentum (or adaptive momentum) can improve the convergence speed compared to standard SGD-based training, using both theoretical and empirical arguments.
The paper is well-written and covers an interesting and t... | Recommendation: 6: marginally above the acceptance threshold | Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability ) | Review:
The paper uses the NTK to discuss the effect of momentum on the training success of PINNs. It is shown that momentum (or adaptive momentum) can improve the convergence speed compared to standard SGD-based training, using both theoretical and empirical arguments.
The paper is well-written and covers an interesti... |
This paper introduces zero-label prompt selection (ZPS), which selects the optimal prompt for an unseen task without any labeled data or gradient update. ZPS obtains pseudo labels of an unseen task through prompt ensemble, calculates pseudo accuracy by comparing pseudo labels with the prediction of each prompt, and sel... | Recommendation: 3: reject, not good enough | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper introduces zero-label prompt selection (ZPS), which selects the optimal prompt for an unseen task without any labeled data or gradient update. ZPS obtains pseudo labels of an unseen task through prompt ensemble, calculates pseudo accuracy by comparing pseudo labels with the prediction of each prompt,... |
In this paper, the authors proposed a mixture-of-memory augmentation framework for a zero-shot dense retrieval (MoMA-DR). The key idea is to enrich the query representation with external resources such as wiki, knowledge graphs, etc. The framework consists of two components: a retrieval model and an augmentation model.... | Recommendation: 5: marginally below the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
In this paper, the authors proposed a mixture-of-memory augmentation framework for a zero-shot dense retrieval (MoMA-DR). The key idea is to enrich the query representation with external resources such as wiki, knowledge graphs, etc. The framework consists of two components: a retrieval model and an augmentatio... |
Extreme classification (or deep information retrieval) has been a popular research field that matches an input text (query) to a label that often is also a text. This paper focuses on a sub-field where both the input text and the label text are short. The proposed training algorithm is a data augmentation algorithm tha... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
Extreme classification (or deep information retrieval) has been a popular research field that matches an input text (query) to a label that often is also a text. This paper focuses on a sub-field where both the input text and the label text are short. The proposed training algorithm is a data augmentation algor... |
This paper discovers an interesting phenomenon that the SR network is powerful in discriminating the image degradations instead of image contents, especially for well-trained deep networks with global residual and generative adversarial training. To validate the claim, the authors give some empirical evidence by visual... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper discovers an interesting phenomenon that the SR network is powerful in discriminating the image degradations instead of image contents, especially for well-trained deep networks with global residual and generative adversarial training. To validate the claim, the authors give some empirical evidence b... |
This paper proposes multi-agent alternate Q-learning (MA2QL) to tackle the non-stationarity problem in decentralized MARL. The main difference between MA2QL and existing method IQL is that MA2QL agents take turns to update their Q-functions while IQL agents simultaneously update their Q-functions. The authors prove tha... | Recommendation: 3: reject, not good enough | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper proposes multi-agent alternate Q-learning (MA2QL) to tackle the non-stationarity problem in decentralized MARL. The main difference between MA2QL and existing method IQL is that MA2QL agents take turns to update their Q-functions while IQL agents simultaneously update their Q-functions. The authors p... |
The authors introduce the notion of **proportional multicalibration** (PMC): a criteria that measures whether a model is both multicalibrated (MC) and fair (in the sense of differentiable calibration (DC) which is an extension of sufficiency). As a reminder, multicalibration refers to a notion of calibration by group a... | Recommendation: 3: reject, not good enough | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
The authors introduce the notion of **proportional multicalibration** (PMC): a criteria that measures whether a model is both multicalibrated (MC) and fair (in the sense of differentiable calibration (DC) which is an extension of sufficiency). As a reminder, multicalibration refers to a notion of calibration by... |
This work proposes a differentiable logic programming framework that aims to learn first-order logic structures and weights. This framework further supports probabilistic reasoning by performing probabilistic forward chaining. Some theoretical guarantees on error rate and solution optimality are shown. Empirical evalua... | Recommendation: 5: marginally below the acceptance threshold | Area: General Machine Learning | Review:
This work proposes a differentiable logic programming framework that aims to learn first-order logic structures and weights. This framework further supports probabilistic reasoning by performing probabilistic forward chaining. Some theoretical guarantees on error rate and solution optimality are shown. Empirica... |
This paper studies the adversarial robustness of MARL, with a focus on observation attacks. The proposed attacker can decide both which agent to attack and how to perturb its observation, via a hybrid-action attacker. Then the paper proposes a robust training approach by alternately training the attacker and the agents... | Recommendation: 5: marginally below the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper studies the adversarial robustness of MARL, with a focus on observation attacks. The proposed attacker can decide both which agent to attack and how to perturb its observation, via a hybrid-action attacker. Then the paper proposes a robust training approach by alternately training the attacker and th... |
This paper proposes a network dissection method without using any labelled image data. This is achieved by utilizing a pretrained CLIP model to compute an image-concept similarity matrix. With the help of the matrix, the concept label for a neuron unit will be the one that maximizes the similarity between the neuron qu... | Recommendation: 6: marginally above the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
This paper proposes a network dissection method without using any labelled image data. This is achieved by utilizing a pretrained CLIP model to compute an image-concept similarity matrix. With the help of the matrix, the concept label for a neuron unit will be the one that maximizes the similarity between the n... |
The paper introduces ROSMO, a simpler and better version of Muzero Unplugged for offline policy optimization. In the offline setting, Muzero Unplugged can suffer from limited data-coverage, inaccurate models and an expensive compute budget. Instead of relying on an expensive MCTS and suffering from out of distribution ... | Recommendation: 8: accept, good paper | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
The paper introduces ROSMO, a simpler and better version of Muzero Unplugged for offline policy optimization. In the offline setting, Muzero Unplugged can suffer from limited data-coverage, inaccurate models and an expensive compute budget. Instead of relying on an expensive MCTS and suffering from out of distr... |
This paper proposes a new prompting method called algorithmic prompting that aims to teach algorithms to LLMs via in-context learning. Specifically, the method focuses on using very details execution traces and explanations as part of the in-context demonstration to remove any ambiguity. Using this prompting method, in... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper proposes a new prompting method called algorithmic prompting that aims to teach algorithms to LLMs via in-context learning. Specifically, the method focuses on using very details execution traces and explanations as part of the in-context demonstration to remove any ambiguity. Using this prompting me... |
This paper studies the problem of zero-shot adversarial robustness: adapting pretrained large-scale vision-language models to unseen target tasks with high robust accuracies. With the conjecture that language encoder plays an important role in achieving good zero-shot generalization ability, a contrastive based adversa... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper studies the problem of zero-shot adversarial robustness: adapting pretrained large-scale vision-language models to unseen target tasks with high robust accuracies. With the conjecture that language encoder plays an important role in achieving good zero-shot generalization ability, a contrastive based... |
The paper tries to shed light on the cause and nature of simplicity bias and proposes a regularization strategy to mitigate the same.
While we know that deep neural networks (DNNs) are prone to learning simple features (simplicity bias), recent work provides evidence
that the penultimate features in the DNNs contain ... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
The paper tries to shed light on the cause and nature of simplicity bias and proposes a regularization strategy to mitigate the same.
While we know that deep neural networks (DNNs) are prone to learning simple features (simplicity bias), recent work provides evidence
that the penultimate features in the DNNs ... |
The authors propose training feature extractor for Few show segmentation. To suppress the sample level, region levle and patch level heterogeneity between samples, the author propose Multi-level Heterogeneity Suppressing extractor (MuHS). MuHS uses attention to suppress the heterogeneities by reinforcing the attention... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
The authors propose training feature extractor for Few show segmentation. To suppress the sample level, region levle and patch level heterogeneity between samples, the author propose Multi-level Heterogeneity Suppressing extractor (MuHS). MuHS uses attention to suppress the heterogeneities by reinforcing the a... |
This paper studies transferable targeted adversarial attack on self-supervised ASR models. Target attack adds a small perturbation to a model such that the model makes the targeted prediction desired by the attacker instead of the correct one corresponding to the original input. Transferability refers to generalizing t... | Recommendation: 6: marginally above the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper studies transferable targeted adversarial attack on self-supervised ASR models. Target attack adds a small perturbation to a model such that the model makes the targeted prediction desired by the attacker instead of the correct one corresponding to the original input. Transferability refers to genera... |
This paper proposes a framework based on linear bound propagation that takes advantage of a new class of ODE solvers to enable training and verification of Neural Ordinary Differential Equations. Specifically, the proposed new class of adaptive ODE solvers, CAS, is based on variable but discrete time steps such that th... | Recommendation: 8: accept, good paper | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
This paper proposes a framework based on linear bound propagation that takes advantage of a new class of ODE solvers to enable training and verification of Neural Ordinary Differential Equations. Specifically, the proposed new class of adaptive ODE solvers, CAS, is based on variable but discrete time steps such... |
This paper concerns safe (deep) reinforcement learning. In particular, the authors present an approach that take the constrained MDP setting, where on top of a reward function, a cost function is given that conveniently reflects safety concerns. The learning goal is then to maximize the reward, while the cost needs to ... | Recommendation: 5: marginally below the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper concerns safe (deep) reinforcement learning. In particular, the authors present an approach that take the constrained MDP setting, where on top of a reward function, a cost function is given that conveniently reflects safety concerns. The learning goal is then to maximize the reward, while the cost n... |
The paper argues for invariant representations to enable continual learning. It proposes representations that generalize across environments to achieve invariance and shows that this helps reduce catastrophic forgetting.
**Strengths**
[S1] The proposed method of learning invariant features is important for continual ... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
The paper argues for invariant representations to enable continual learning. It proposes representations that generalize across environments to achieve invariance and shows that this helps reduce catastrophic forgetting.
**Strengths**
[S1] The proposed method of learning invariant features is important for co... |
This paper attempts to combine the neural architecture search (NAS) process with self-supervised learning (SSL) so as to learn structures suitable for pre-trained datasets (e.g. ImageNet-1K, iNat-2021) in a self-supervised task like SimCLR. Extensive analysis and experiments are included to demonstrate its arguments.
S... | Recommendation: 3: reject, not good enough | Area: Unsupervised and Self-supervised learning | Review:
This paper attempts to combine the neural architecture search (NAS) process with self-supervised learning (SSL) so as to learn structures suitable for pre-trained datasets (e.g. ImageNet-1K, iNat-2021) in a self-supervised task like SimCLR. Extensive analysis and experiments are included to demonstrate its argu... |
This paper proposes Dynamic Scheduled Sampling with Imitation Loss (DySI), which combines knowledge distillation and scheduled sampling for text generation.
## Strengths
1. This paper proposes a new decoding training method that combines scheduled sampling with knowledge distillation.
1. The performance looks good and... | Recommendation: 3: reject, not good enough | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper proposes Dynamic Scheduled Sampling with Imitation Loss (DySI), which combines knowledge distillation and scheduled sampling for text generation.
## Strengths
1. This paper proposes a new decoding training method that combines scheduled sampling with knowledge distillation.
1. The performance looks ... |
The paper attempts to address the shortcomings in GNNs by modifying the propagation operator and thus propose an approach called $\omega$GNN, as two instances, $\omega$GCN and $\omega$GAT. It is justified that $\omega$GNN can prevent over-smoothing issue, and the parameterized propagation operator in $\omega$GNN enable... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
The paper attempts to address the shortcomings in GNNs by modifying the propagation operator and thus propose an approach called $\omega$GNN, as two instances, $\omega$GCN and $\omega$GAT. It is justified that $\omega$GNN can prevent over-smoothing issue, and the parameterized propagation operator in $\omega$GN... |
The paper presents an online backfilling method, FastFill, for backward-compatible retrieval systems. FastFill introduces a new feature alignment loss, L_{disc}, that maps the old feature descriptor to the corresponding cluster in the new feature space. For faster deployment, FastFill proposes to backfill the gallery i... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
The paper presents an online backfilling method, FastFill, for backward-compatible retrieval systems. FastFill introduces a new feature alignment loss, L_{disc}, that maps the old feature descriptor to the corresponding cluster in the new feature space. For faster deployment, FastFill proposes to backfill the g... |
The paper explores the simplicity bias (SB) for 1-hidden layer neural networks (NNs). The paper formulates SB as a concept (the NN learns a simpler feature than those available and informative for classification) and then prove that this might happen in 1-hidden layer NNs. Lastly, the paper proposes a heuristic way to ... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
The paper explores the simplicity bias (SB) for 1-hidden layer neural networks (NNs). The paper formulates SB as a concept (the NN learns a simpler feature than those available and informative for classification) and then prove that this might happen in 1-hidden layer NNs. Lastly, the paper proposes a heuristic... |
The paper revisits the implicit and optimization perspective of designing graph neural networks. Based on this perspective, the paper adopts two existing algorithms such as stochastic proximal gradient descent and its variance-reduced version to accelerate the forward computation with sampling. The backward computation... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
The paper revisits the implicit and optimization perspective of designing graph neural networks. Based on this perspective, the paper adopts two existing algorithms such as stochastic proximal gradient descent and its variance-reduced version to accelerate the forward computation with sampling. The backward com... |
This paper introduces a method for interactively editing 3D shapes defined as the level sets of neural implicit functions. Specifically, the approach quantifies the distribution of changes to this level set (the shape boundary) w.r.t. the parameters governing the neural implicits (either the network weights for a model... | Recommendation: 6: marginally above the acceptance threshold | Area: Generative models | Review:
This paper introduces a method for interactively editing 3D shapes defined as the level sets of neural implicit functions. Specifically, the approach quantifies the distribution of changes to this level set (the shape boundary) w.r.t. the parameters governing the neural implicits (either the network weights for... |
This paper studies monotonic policy improvement in offline RL, aiming at demonstrating the effectiveness of online monotonic policy improvement algorithm in solving offline RL. Following the vein of TRPO and PPO, this work proposes Behavior Proximal Policy Optimization (BPPO) by adjusting the policy improvement lower b... | Recommendation: 5: marginally below the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper studies monotonic policy improvement in offline RL, aiming at demonstrating the effectiveness of online monotonic policy improvement algorithm in solving offline RL. Following the vein of TRPO and PPO, this work proposes Behavior Proximal Policy Optimization (BPPO) by adjusting the policy improvement... |
This paper introduces a new approach to combine both Contrastive learning (CL) and Mask Image Modeling (MIM) to take advantage of the best of both worlds. An analysis shows that a simple combination of the losses does not work well because there are some conflicts between the losses. To solve this problem, the paper in... | Recommendation: 6: marginally above the acceptance threshold | Area: Unsupervised and Self-supervised learning | Review:
This paper introduces a new approach to combine both Contrastive learning (CL) and Mask Image Modeling (MIM) to take advantage of the best of both worlds. An analysis shows that a simple combination of the losses does not work well because there are some conflicts between the losses. To solve this problem, the ... |
This paper proposes a framework inspired by energy-based models for self-supervised pretraining. An image is first degraded by a randomly selected image corruption, and the training objective is defined as the MSE between the original image and the restored image derived by one-step gradient descent along the energy di... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper proposes a framework inspired by energy-based models for self-supervised pretraining. An image is first degraded by a randomly selected image corruption, and the training objective is defined as the MSE between the original image and the restored image derived by one-step gradient descent along the e... |
The authors proposed a new quantized distributed stochastic gradient algorithm which resembles Adam.
They prove the new algorithm BinSGDM bears the same convergence rate as Adam, and BinSGDM is more communication efficient than Adam. They also compare the new algorithm with other algorithms, including ADAMW, 1-bit Ada... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
The authors proposed a new quantized distributed stochastic gradient algorithm which resembles Adam.
They prove the new algorithm BinSGDM bears the same convergence rate as Adam, and BinSGDM is more communication efficient than Adam. They also compare the new algorithm with other algorithms, including ADAMW, 1... |
Motivated by the power of score-based generative models (SGM), this work studies quantized compressed sensing with score-based generative models and proposed an unsupervised data-driven approach that is denoted by QCS-SGM. One key to QCS-SGM is proposing an annealed likelihood score (noise-perturbed likelihood score), ... | Recommendation: 6: marginally above the acceptance threshold | Area: Generative models | Review:
Motivated by the power of score-based generative models (SGM), this work studies quantized compressed sensing with score-based generative models and proposed an unsupervised data-driven approach that is denoted by QCS-SGM. One key to QCS-SGM is proposing an annealed likelihood score (noise-perturbed likelihood ... |
This paper proposes an approach to learning action embeddings from state changes. For embedded agents who use these learned action embeddings, they do not rely on action semantics that overfits to the action labels. This paper also shows that an order-invariant (OI) transformer head can help choose actions rather than ... | Recommendation: 6: marginally above the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper proposes an approach to learning action embeddings from state changes. For embedded agents who use these learned action embeddings, they do not rely on action semantics that overfits to the action labels. This paper also shows that an order-invariant (OI) transformer head can help choose actions rath... |
The paper is concerned with near-optimal policy identification in the generative model setting. The contributions of this paper includes:
(1) The development of the AE-LSVI algorithm for $\epsilon$-optimal identification;
(2) A concrete proposal of the algorithm based on the RKHS model;
(3) Establishment of the theore... | Recommendation: 8: accept, good paper | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
The paper is concerned with near-optimal policy identification in the generative model setting. The contributions of this paper includes:
(1) The development of the AE-LSVI algorithm for $\epsilon$-optimal identification;
(2) A concrete proposal of the algorithm based on the RKHS model;
(3) Establishment of th... |
In this paper, the authors proposed a technique to improve zero-shot and few-shot capabilities for Large language models (LLM). Specifically, when performing the next token prediction task, the proposed method will randomly select past tokens masked out to fine-tune the LLMs. Experimental results show that the proposed... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
In this paper, the authors proposed a technique to improve zero-shot and few-shot capabilities for Large language models (LLM). Specifically, when performing the next token prediction task, the proposed method will randomly select past tokens masked out to fine-tune the LLMs. Experimental results show that the ... |
The paper is an extension of variational auto-encoders that uses a different type of metric for performing training. The suggested metric directly matches the latent and data distributions using the variational autoencoding scheme; this is based on the Gromov-Wasserstein (GW) metric between the trainable prior and give... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
The paper is an extension of variational auto-encoders that uses a different type of metric for performing training. The suggested metric directly matches the latent and data distributions using the variational autoencoding scheme; this is based on the Gromov-Wasserstein (GW) metric between the trainable prior ... |
The paper presents a new method called NBD to learn Bregman divergences between data points using a deep neural network. The proposed method is tested on some synthetic and small machine learning benchmark data sets. The results show that NBD outperforms several other metric learning approaches for some tasks.
Strength... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
The paper presents a new method called NBD to learn Bregman divergences between data points using a deep neural network. The proposed method is tested on some synthetic and small machine learning benchmark data sets. The results show that NBD outperforms several other metric learning approaches for some tasks.
... |
This paper proposes a method for animal pose estimation able to generalize to different species. The method approaches the problem from the domain generalization point of view. It is based on the observation that some relations among joints remain consistent among different species, while others change drastically. Acc... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper proposes a method for animal pose estimation able to generalize to different species. The method approaches the problem from the domain generalization point of view. It is based on the observation that some relations among joints remain consistent among different species, while others change drastica... |
Given a predefined teacher team, the paper aims at finding an optimal categorical distribution of these teacher models for student network distillation. Rather than simple ensemble learning (uniform weight), the paper proposes a two-stage selection and optimization strategy. In the first stage, ineffective teachers are... | Recommendation: 5: marginally below the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
Given a predefined teacher team, the paper aims at finding an optimal categorical distribution of these teacher models for student network distillation. Rather than simple ensemble learning (uniform weight), the paper proposes a two-stage selection and optimization strategy. In the first stage, ineffective teac... |
This paper provides an meta-learning styled transfer learning method that essentially applies meta-learning to the case where supervised learning tasks vary w.r.t. their underlying functions. Experiments are performed over different problems (including regression, learning dynamics, and imitation learning).
### Streng... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
This paper provides an meta-learning styled transfer learning method that essentially applies meta-learning to the case where supervised learning tasks vary w.r.t. their underlying functions. Experiments are performed over different problems (including regression, learning dynamics, and imitation learning).
##... |
The authors propose to use snapshot ensemble (SE) to replace deep ensemble (DE) for modeling uncertainty in active learning. SE takes predictions from different epochs of training of a single model and thus is more efficient than DE. The authors compare SE with DE and MC-dropout on several basic AL acquisition function... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
The authors propose to use snapshot ensemble (SE) to replace deep ensemble (DE) for modeling uncertainty in active learning. SE takes predictions from different epochs of training of a single model and thus is more efficient than DE. The authors compare SE with DE and MC-dropout on several basic AL acquisition ... |
The paper focuses on the problem of offline reinforcement learning, where the authors consider the limitation of the conservative Q learning (CQL) method and propose a new way of applying a fine-grained control of the conservatism level. The authors argue that setting the level of conservatism to be a global constant a... | Recommendation: 3: reject, not good enough | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
The paper focuses on the problem of offline reinforcement learning, where the authors consider the limitation of the conservative Q learning (CQL) method and propose a new way of applying a fine-grained control of the conservatism level. The authors argue that setting the level of conservatism to be a global co... |
This paper proposes a new approach for feature selection, which composes of two components: (1) A feature subset sampler, which learns the distribution of important feature subsets; and (2) a meta-learning based weight generator that quickly constructs a fully connected deep layer for any sampled subset. The method is ... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
This paper proposes a new approach for feature selection, which composes of two components: (1) A feature subset sampler, which learns the distribution of important feature subsets; and (2) a meta-learning based weight generator that quickly constructs a fully connected deep layer for any sampled subset. The me... |
A self-supervised speech enhancement method that uses both audio and IMU data is presented. The method is self-supervised in the sense that the audio does not need to be a clean audio signal. The method is targeted towards earphone recorded audio data.
The self-supervision is handled with an alternating minimization l... | Recommendation: 5: marginally below the acceptance threshold | Area: Unsupervised and Self-supervised learning | Review:
A self-supervised speech enhancement method that uses both audio and IMU data is presented. The method is self-supervised in the sense that the audio does not need to be a clean audio signal. The method is targeted towards earphone recorded audio data.
The self-supervision is handled with an alternating minimi... |
This work proposes a novel benchmark dataset for language grounding on user interfaces, notably exploring the ability to handle *sequences* or multiple turns of instructions/actions between a human user and virtual assistant. This dataset is of remarkable size, consisting of 77K unique language utterances, grounded in ... | Recommendation: 5: marginally below the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This work proposes a novel benchmark dataset for language grounding on user interfaces, notably exploring the ability to handle *sequences* or multiple turns of instructions/actions between a human user and virtual assistant. This dataset is of remarkable size, consisting of 77K unique language utterances, grou... |
This submission proposes a method for inverting samples in diffusion generative models. The proposed approached simply applies the forward diffusion process for a given number of steps and then samples from the resulting latent. The approach is evaluated on 3 different problems: privacy-preserving reconstruction, data ... | Recommendation: 3: reject, not good enough | Area: Generative models | Review:
This submission proposes a method for inverting samples in diffusion generative models. The proposed approached simply applies the forward diffusion process for a given number of steps and then samples from the resulting latent. The approach is evaluated on 3 different problems: privacy-preserving reconstructio... |
The paper studied NAS algorithm for GNN. The author proposed to transfer the prior architectural design knowledge to the novel task of interest. The author first extracts scale-invariant measures based on Fisher Information Matrix (FIM). The scale-invariant measures are used to form the task feature, which are further ... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
The paper studied NAS algorithm for GNN. The author proposed to transfer the prior architectural design knowledge to the novel task of interest. The author first extracts scale-invariant measures based on Fisher Information Matrix (FIM). The scale-invariant measures are used to form the task feature, which are ... |
This paper presents a new prompt engineering algorithm for few-shot open-domain question answering with pretrained language models. The key idea is that instead of asking language models to directly generate answers to factoid questions, ask it to first generate a paragraph of text which will contain the answer ("recit... | Recommendation: 6: marginally above the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper presents a new prompt engineering algorithm for few-shot open-domain question answering with pretrained language models. The key idea is that instead of asking language models to directly generate answers to factoid questions, ask it to first generate a paragraph of text which will contain the answer... |
In this paper, the problem of adversarial self-supervised learning is studied, where the goal is to improve the robustness of the self-supervised model. While adversarial example can be created under the supervised scenario, creating adversarial example is not trivial for self-supervised training because no label is av... | Recommendation: 6: marginally above the acceptance threshold | Area: Unsupervised and Self-supervised learning | Review:
In this paper, the problem of adversarial self-supervised learning is studied, where the goal is to improve the robustness of the self-supervised model. While adversarial example can be created under the supervised scenario, creating adversarial example is not trivial for self-supervised training because no lab... |
The paper proposes an algorithm, magnetic mirror descent (MMD), for RL problem and 2p0s games. Sound theoretical results are obtained for the algorithm. Empirically, MMD exhibits desirable properties as a tabular equilibrium solver, as a single-agent deep RL algorithm, and as a multi-agent deep RL algorithm.
Strength: ... | Recommendation: 5: marginally below the acceptance threshold | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
The paper proposes an algorithm, magnetic mirror descent (MMD), for RL problem and 2p0s games. Sound theoretical results are obtained for the algorithm. Empirically, MMD exhibits desirable properties as a tabular equilibrium solver, as a single-agent deep RL algorithm, and as a multi-agent deep RL algorithm.
St... |
This paper explores conditioning on image annotation labelling style, to reduce aleatoric uncertainty relating to the segmentation of objects in medical images. In particular, the general problem of uncertainty estimation for segmentation assumes that the annotation is drawn from an unknown annotator distribution, p(a|... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper explores conditioning on image annotation labelling style, to reduce aleatoric uncertainty relating to the segmentation of objects in medical images. In particular, the general problem of uncertainty estimation for segmentation assumes that the annotation is drawn from an unknown annotator distributi... |
This paper proposes a universal 3D Molecular representation learning (MRL) framework, called Uni-Mol, that significantly enlarges the representation ability and application scope of MRL schemes. Uni-Mol contains two pretrained models with the same SE(3)-equivariant transformer architecture: a molecular model pretrained... | Recommendation: 8: accept, good paper | Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability ) | Review:
This paper proposes a universal 3D Molecular representation learning (MRL) framework, called Uni-Mol, that significantly enlarges the representation ability and application scope of MRL schemes. Uni-Mol contains two pretrained models with the same SE(3)-equivariant transformer architecture: a molecular model pr... |
The paper presents a new approach for computing interpretable, axis-aligned decision trees using gradient descent by applying backpropagation with adjusted gradient flow on dense representation of decision trees. Experimental evaluation finds improvement over two baselines (CART, GeneticTree) in binary classification d... | Recommendation: 5: marginally below the acceptance threshold | Area: General Machine Learning | Review:
The paper presents a new approach for computing interpretable, axis-aligned decision trees using gradient descent by applying backpropagation with adjusted gradient flow on dense representation of decision trees. Experimental evaluation finds improvement over two baselines (CART, GeneticTree) in binary classifi... |
This paper aims to explain why stochastic weight averaging (SWA, Izmailov et al., 2018) helps generalization. The paper adopts the framework of Kleinberg et al., 2018 and shows that SGD implicitly minimizes a regularized objective, where the regularizer depends on both Hessian of the loss and the covariance matrix of t... | Recommendation: 5: marginally below the acceptance threshold | Area: Optimization (eg, convex and non-convex optimization) | Review:
This paper aims to explain why stochastic weight averaging (SWA, Izmailov et al., 2018) helps generalization. The paper adopts the framework of Kleinberg et al., 2018 and shows that SGD implicitly minimizes a regularized objective, where the regularizer depends on both Hessian of the loss and the covariance mat... |
This paper introduces a set-matching approach for open-vocabulary object detection by jointly training on detection and image caption dataset. The approach achieves good results on the existing COCO and LVIS open-vocabulary detection benchmark.
Strengths:
* The idea of joint training with caption data is promising as c... | Recommendation: 6: marginally above the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper introduces a set-matching approach for open-vocabulary object detection by jointly training on detection and image caption dataset. The approach achieves good results on the existing COCO and LVIS open-vocabulary detection benchmark.
Strengths:
* The idea of joint training with caption data is promis... |
This work addresses the challenge of creating an unbiased evaluation dataset for text de-duplication. It presents one such dataset with 27,210 documents and 122,876 positive duplicate pairs. This dataset was created from news wire data by leveraging the timeliness of news events. It discusses the systematic approach th... | Recommendation: 6: marginally above the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This work addresses the challenge of creating an unbiased evaluation dataset for text de-duplication. It presents one such dataset with 27,210 documents and 122,876 positive duplicate pairs. This dataset was created from news wire data by leveraging the timeliness of news events. It discusses the systematic app... |
This paper studies the gap between random-feature-based attention (RFA) and standard attention. The paper characterizes the gap using control variates and proposes a novel efficient attention mechanism based on the analysis. The authors evaluate their method EVA in terms of model quality, efficiency, and runtime.
+ A n... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
This paper studies the gap between random-feature-based attention (RFA) and standard attention. The paper characterizes the gap using control variates and proposes a novel efficient attention mechanism based on the analysis. The authors evaluate their method EVA in terms of model quality, efficiency, and runtim... |
Authors proposed the use of a siamese variational autoencoder (SVAE) for change detection over bi-temporal imagery. The model receives as input to scenes of the same spatial location but collected during different times. The SVAE is optimized using a crossentropy classification loss computed using an image classifier o... | Recommendation: 3: reject, not good enough | Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability ) | Review:
Authors proposed the use of a siamese variational autoencoder (SVAE) for change detection over bi-temporal imagery. The model receives as input to scenes of the same spatial location but collected during different times. The SVAE is optimized using a crossentropy classification loss computed using an image clas... |
The paper studies maximum entropy reinforcement learning in an actor-critic setting. Two improvements are proposed. First, a learnable state-dependent weighting between two critics is intended to balance over- and underestimation bias of the value estimates provided by the critic. Second, the temperature parameter of t... | Recommendation: 3: reject, not good enough | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
The paper studies maximum entropy reinforcement learning in an actor-critic setting. Two improvements are proposed. First, a learnable state-dependent weighting between two critics is intended to balance over- and underestimation bias of the value estimates provided by the critic. Second, the temperature parame... |
Authors study linear regression from a differential privacy perspective. They propose a variant of the differentially private stochastic gradient descent (DP-SGD) algorithm with two innovations: a full-batch gradient descent to improve sample complexity and an adaptive clipping to guarantee robustness. Some theoretical... | Recommendation: 5: marginally below the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
Authors study linear regression from a differential privacy perspective. They propose a variant of the differentially private stochastic gradient descent (DP-SGD) algorithm with two innovations: a full-batch gradient descent to improve sample complexity and an adaptive clipping to guarantee robustness. Some the... |
The authors propose a method to generate prompts that solve textual tasks defined by Input/Output pairs through a Large Language Model.
This paradigm was introduced by Hononovic et al. (2022), as well as the 24 tasks used for evaluation. The main element of novelty here is the algorithm based on search and validation o... | Recommendation: 6: marginally above the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
The authors propose a method to generate prompts that solve textual tasks defined by Input/Output pairs through a Large Language Model.
This paradigm was introduced by Hononovic et al. (2022), as well as the 24 tasks used for evaluation. The main element of novelty here is the algorithm based on search and vali... |
This paper proposes Neural Ordered Clusters (NOC), a supervised approach for set-to-sequence prediction. The resulting model learns to cluster data *and* sort elements within each resulting cluster. NOC was evaluated on two synthetic datasets and a real-world dataset (PROCAT, Jurewickz and Derczynski 2021).
Strengths:
... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
This paper proposes Neural Ordered Clusters (NOC), a supervised approach for set-to-sequence prediction. The resulting model learns to cluster data *and* sort elements within each resulting cluster. NOC was evaluated on two synthetic datasets and a real-world dataset (PROCAT, Jurewickz and Derczynski 2021).
Str... |
This paper makes the interesting observation that the disentangled affine transformation is what really matters in the Mixture BN, instead of the disentangled BN statistics as previously believed by the community.
Overall, I think the message conveyed by this paper is simple yet important: The disentangled affine trans... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper makes the interesting observation that the disentangled affine transformation is what really matters in the Mixture BN, instead of the disentangled BN statistics as previously believed by the community.
Overall, I think the message conveyed by this paper is simple yet important: The disentangled affi... |
The authors present an study in order to check whether an standard CNN (Resnet-50) or an standard CNN in which both a foveated rendering from the retina and a log-polar representation have benn added behaves as humans in the image inversion effects. In order to do that they perform a variaty of experiments on different... | Recommendation: 3: reject, not good enough | Area: Neuroscience and Cognitive Science (e.g., neural coding, brain-computer interfaces) | Review:
The authors present an study in order to check whether an standard CNN (Resnet-50) or an standard CNN in which both a foveated rendering from the retina and a log-polar representation have benn added behaves as humans in the image inversion effects. In order to do that they perform a variaty of experiments on d... |
This work proposes a method to induce meaningful text units from character sequences. The method is based on Slot Attention for unsupervised object discovery in computer vision. To adapt it to texts, a modification is introduced by using separate trainable parameters for each slot rather than shared. The full model con... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
This work proposes a method to induce meaningful text units from character sequences. The method is based on Slot Attention for unsupervised object discovery in computer vision. To adapt it to texts, a modification is introduced by using separate trainable parameters for each slot rather than shared. The full m... |
This paper interprets Spare Distributed Memory (SDM) as a continual learner. Analogous to a one-hidden-layer MLP, the SDM is modified to support continual learning. There are several training tricks, such as the choice of optimizer and the training procedure. The most notable change is to replace the binarization activ... | Recommendation: 6: marginally above the acceptance threshold | Area: Neuroscience and Cognitive Science (e.g., neural coding, brain-computer interfaces) | Review:
This paper interprets Spare Distributed Memory (SDM) as a continual learner. Analogous to a one-hidden-layer MLP, the SDM is modified to support continual learning. There are several training tricks, such as the choice of optimizer and the training procedure. The most notable change is to replace the binarizati... |
This paper studies the two-phase phenomena in training deep neural networks both empirically and theoretically. The work discovers and explains the reason for the feature collapse phenomenon in the first phase, i.e., the diversity of features over different samples keeps decreasing in the first phase, until samples of ... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper studies the two-phase phenomena in training deep neural networks both empirically and theoretically. The work discovers and explains the reason for the feature collapse phenomenon in the first phase, i.e., the diversity of features over different samples keeps decreasing in the first phase, until sam... |
This paper proposes Knowledge-grounded RL (KGRL) for the purpose of incorporating, reusing, recomposing and generalizing external knowledge in RL tasks. Taking a unified form of external knowledge as an external knowledge policy, this work proposes an actor model that adaptively weighs or activates different external k... | Recommendation: 3: reject, not good enough | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper proposes Knowledge-grounded RL (KGRL) for the purpose of incorporating, reusing, recomposing and generalizing external knowledge in RL tasks. Taking a unified form of external knowledge as an external knowledge policy, this work proposes an actor model that adaptively weighs or activates different ex... |
This paper attempts to resolve the scaling issues of MobileViTv1-blocks which hinder the learning. Specifically, the authors propose MobileViTv3-block which has a more simplified architecture. The proposed blocks have been added to both MobileViTv1 (with transformer blocks) and MobileViTv2 (with linear transformer bloc... | Recommendation: 3: reject, not good enough | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper attempts to resolve the scaling issues of MobileViTv1-blocks which hinder the learning. Specifically, the authors propose MobileViTv3-block which has a more simplified architecture. The proposed blocks have been added to both MobileViTv1 (with transformer blocks) and MobileViTv2 (with linear transfor... |
This paper proposes some theoretical insights about quantization and entropy gradient, and show that this can improve the performances of many off-the-shelf codecs. The proposed method is able to save 2-4% of the bit-rate for various pre-trained methods.
The proposed method is novel and technically sound. The experimen... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper proposes some theoretical insights about quantization and entropy gradient, and show that this can improve the performances of many off-the-shelf codecs. The proposed method is able to save 2-4% of the bit-rate for various pre-trained methods.
The proposed method is novel and technically sound. The e... |
This paper proposes to recover training data from gradient updates in federated learning. Specifically, it leverages an auxiliary dataset to obtain the gradients for these samples. A neural network model is then trained on them by mapping the gradient to the input. This paper also utilizes existing feature hashing meth... | Recommendation: 3: reject, not good enough | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
This paper proposes to recover training data from gradient updates in federated learning. Specifically, it leverages an auxiliary dataset to obtain the gradients for these samples. A neural network model is then trained on them by mapping the gradient to the input. This paper also utilizes existing feature hash... |
The paper proposes a more expressive policy for offline reinforcement learning. In particular, the paper proposes to use a mixture of deterministic policies.
# Strength
* More expressive policies are an interesting direction of offline reinforcement learning research.
# Weaknesses
* The approach lacks novelty. A VAE-s... | Recommendation: 3: reject, not good enough | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
The paper proposes a more expressive policy for offline reinforcement learning. In particular, the paper proposes to use a mixture of deterministic policies.
# Strength
* More expressive policies are an interesting direction of offline reinforcement learning research.
# Weaknesses
* The approach lacks novelty.... |
In machine learning it is relatively common to have multiple objectives, typically arranged in some loose descending order of importance - for example we typically care most about accuracy, but feature counts, fairness, robustness etc are also important. Multiobjective optimisation is the obvious way to approach such ... | Recommendation: 8: accept, good paper | Area: General Machine Learning | Review:
In machine learning it is relatively common to have multiple objectives, typically arranged in some loose descending order of importance - for example we typically care most about accuracy, but feature counts, fairness, robustness etc are also important. Multiobjective optimisation is the obvious way to approa... |
This manuscript proposes to introduce deep supervision into masked image modelling. Technically, there are two loss functions: the first one is to reconstruct pixel densities using tokens produced by intermediate transformer encoders; the second one seems to be enforcing the transformer encoder outputs to mimick those ... | Recommendation: 6: marginally above the acceptance threshold | Area: Unsupervised and Self-supervised learning | Review:
This manuscript proposes to introduce deep supervision into masked image modelling. Technically, there are two loss functions: the first one is to reconstruct pixel densities using tokens produced by intermediate transformer encoders; the second one seems to be enforcing the transformer encoder outputs to mimic... |
This work proposes cross-instance positive relations that introduce a selective neighbor clustering module to help generate pseudo labels for contrastive learning. It can promote using both the labeled and unlabelled data to help more representative representation. It presents experiments on several benchmarks to demon... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This work proposes cross-instance positive relations that introduce a selective neighbor clustering module to help generate pseudo labels for contrastive learning. It can promote using both the labeled and unlabelled data to help more representative representation. It presents experiments on several benchmarks ... |
This work extends the analysis framework of (Blanc et al., 2020) and (Li et al., 2022) to study the dynamic of heavy ball momentum along a manifold of minimizers. The authors proposed a momentum scaling rule $\beta = 1 - C\eta^\gamma$ and discovered the optimal scaling power as $\gamma=2/3$ under the analysis framework... | Recommendation: 6: marginally above the acceptance threshold | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
This work extends the analysis framework of (Blanc et al., 2020) and (Li et al., 2022) to study the dynamic of heavy ball momentum along a manifold of minimizers. The authors proposed a momentum scaling rule $\beta = 1 - C\eta^\gamma$ and discovered the optimal scaling power as $\gamma=2/3$ under the analysis f... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.