review
stringlengths
5
16.6k
score
stringclasses
5 values
area
stringclasses
12 values
text
stringlengths
31
5.65k
This paper provides a mid level vision feedback module as an Add-On for CNN's. Authors argue that such mid-level feedback properties improve CNN performance (though perhaps for the wrong reasons), and also argue that this idea is worth pursuing given neuroscience/perceptual psychology motivated ideas. See below for Mai...
Recommendation: 5: marginally below the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper provides a mid level vision feedback module as an Add-On for CNN's. Authors argue that such mid-level feedback properties improve CNN performance (though perhaps for the wrong reasons), and also argue that this idea is worth pursuing given neuroscience/perceptual psychology motivated ideas. See below...
This paper introduces a new method for jointly learning a predictor and an interpretability model. The method offers a general framework that has LEX, INVASE, and REAL-X as special cases. The paper also introduces two more datasets synthetically created from FashionMNIST and CelebA with ground truth selected features. ...
Recommendation: 6: marginally above the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper introduces a new method for jointly learning a predictor and an interpretability model. The method offers a general framework that has LEX, INVASE, and REAL-X as special cases. The paper also introduces two more datasets synthetically created from FashionMNIST and CelebA with ground truth selected fe...
This paper proposes to use key points as internal representations of scenes and model forward dynamics with graph interaction networks. The authors used a multi-object manipulation testbed for evaluating the proposed Keypoint Interaction Network (KINet). They show that KINet can achieve similar results for forward pred...
Recommendation: 5: marginally below the acceptance threshold
Area: Unsupervised and Self-supervised learning
Review: This paper proposes to use key points as internal representations of scenes and model forward dynamics with graph interaction networks. The authors used a multi-object manipulation testbed for evaluating the proposed Keypoint Interaction Network (KINet). They show that KINet can achieve similar results for forw...
The paper deals with the topic of mutual information (MI) maximization in multi-view self-supervised learning (SSL). The paper takes an information-theoretic perspective and shows that many current self-supervised learning methods maximize a lower bound on the MI between the representations of different views---a resul...
Recommendation: 3: reject, not good enough
Area: Unsupervised and Self-supervised learning
Review: The paper deals with the topic of mutual information (MI) maximization in multi-view self-supervised learning (SSL). The paper takes an information-theoretic perspective and shows that many current self-supervised learning methods maximize a lower bound on the MI between the representations of different views--...
This paper focuses on addressing unsupervised anomaly detection via disentangled conditional VAE. The new architecture combines three core components: beta-VAE, CVAE and the principle of TC. The authors claim that the new method improves the disentanglement of latent features, and the ability to detect anomalies. Mu...
Recommendation: 3: reject, not good enough
Area: Unsupervised and Self-supervised learning
Review: This paper focuses on addressing unsupervised anomaly detection via disentangled conditional VAE. The new architecture combines three core components: beta-VAE, CVAE and the principle of TC. The authors claim that the new method improves the disentanglement of latent features, and the ability to detect anomal...
This paper presents a neural network brain encoding analysis comparing the performance of Transformer architectures trained on language modeling objectives versus those trained on a narrative summarization objective. The authors argue that the narrative summarization task is a proxy for "deeper understanding," and that...
Recommendation: 8: accept, good paper
Area: Neuroscience and Cognitive Science (e.g., neural coding, brain-computer interfaces)
Review: This paper presents a neural network brain encoding analysis comparing the performance of Transformer architectures trained on language modeling objectives versus those trained on a narrative summarization objective. The authors argue that the narrative summarization task is a proxy for "deeper understanding," ...
This paper proposes a method for learning a Bregman divergence using neural networks. A Bregman divergence is the divergence defined using a convex function, and any convex function has its corresponding Bregman divergence. The proposed method learns the divergence by representing the convex function by an Input Convex...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: This paper proposes a method for learning a Bregman divergence using neural networks. A Bregman divergence is the divergence defined using a convex function, and any convex function has its corresponding Bregman divergence. The proposed method learns the divergence by representing the convex function by an Inpu...
In high dimensional setting, it is typically impossible to approximate the solution $\rho_t$ to a Fokker Planck Equation (FPE) with conventional grid-based methods. A standard method consists in considering the associated SDE a simulate many trajectories from this SDE to collect statistics of the solution at any futur...
Recommendation: 6: marginally above the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: In high dimensional setting, it is typically impossible to approximate the solution $\rho_t$ to a Fokker Planck Equation (FPE) with conventional grid-based methods. A standard method consists in considering the associated SDE a simulate many trajectories from this SDE to collect statistics of the solution at a...
This paper proposes a faster algorithm, DMCMC, for integrating the reverse SDE/ODE associated with diffusion models. Unlike many existing works, DMCMC samples in the joint space of (x, sigma). Gibbs sampling is adopted for sampling in the joint space. Sampling x | sigma is just ordinary Langevin dynamics, and sampling ...
Recommendation: 6: marginally above the acceptance threshold
Area: Generative models
Review: This paper proposes a faster algorithm, DMCMC, for integrating the reverse SDE/ODE associated with diffusion models. Unlike many existing works, DMCMC samples in the joint space of (x, sigma). Gibbs sampling is adopted for sampling in the joint space. Sampling x | sigma is just ordinary Langevin dynamics, and s...
This paper presented CBP-QSNN, which applies the CBP algorithm proposed by Kim & Jeong in a recent study of quantized DNN as a general post-training method to quantized SNN. The authors began by introducing key elements of CBP, including the Lagrangian objective function and the weight-constraint function cs(w) in it, ...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This paper presented CBP-QSNN, which applies the CBP algorithm proposed by Kim & Jeong in a recent study of quantized DNN as a general post-training method to quantized SNN. The authors began by introducing key elements of CBP, including the Lagrangian objective function and the weight-constraint function cs(w)...
The paper aims to learn multiple RL tasks with the same network. SNIP is used to prune all but the 5% most "relevant" parameters of the network, yielding a mask for every task. Tasks can share parameters, and therefore all tasks have to be trained simultaneously. The authors show that SNIP depends strongly on the data ...
Recommendation: 6: marginally above the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The paper aims to learn multiple RL tasks with the same network. SNIP is used to prune all but the 5% most "relevant" parameters of the network, yielding a mask for every task. Tasks can share parameters, and therefore all tasks have to be trained simultaneously. The authors show that SNIP depends strongly on t...
This paper proposes a new architecture for Neural Processes named Versatile Neural Process (VNP). This new architecture is build as an improvement over previous Attentive Neural Process (ANP) with two main modifications: 1. The context points are pre-processed by a encoder module built using set convolutions and self-a...
Recommendation: 8: accept, good paper
Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes)
Review: This paper proposes a new architecture for Neural Processes named Versatile Neural Process (VNP). This new architecture is build as an improvement over previous Attentive Neural Process (ANP) with two main modifications: 1. The context points are pre-processed by a encoder module built using set convolutions an...
This paper presents a balanced sampling data augmentation technique, for addressing the multi-domain and long-tailed learning problems in which the number of samples in different classes is imbalanced and potential domain shift. First, the class-specific and domain-specific representations are decoupled by instance-nor...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper presents a balanced sampling data augmentation technique, for addressing the multi-domain and long-tailed learning problems in which the number of samples in different classes is imbalanced and potential domain shift. First, the class-specific and domain-specific representations are decoupled by inst...
The paper presents an interesting training algorithm for training SNNs from scratch. It uses a combination of skip connections and BN tools to get better accuracy on image recognition tasks. + Very comprehensive results + Simple yet effective idea - Since the authors use a BN technique, I am wondering if the authors...
Recommendation: 3: reject, not good enough
Area: Neuroscience and Cognitive Science (e.g., neural coding, brain-computer interfaces)
Review: The paper presents an interesting training algorithm for training SNNs from scratch. It uses a combination of skip connections and BN tools to get better accuracy on image recognition tasks. + Very comprehensive results + Simple yet effective idea - Since the authors use a BN technique, I am wondering if the...
Based Gaussian process, this paper develops a zeroth-order optimization algorithm which requires fewer function queries to estimate the gradient than previous zeroth-order methods. Additionally, a so-called dynamic virtual update schemes is incorporated. Theoretically, the proposed method is shown to obtain gradient wi...
Recommendation: 6: marginally above the acceptance threshold
Area: Optimization (eg, convex and non-convex optimization)
Review: Based Gaussian process, this paper develops a zeroth-order optimization algorithm which requires fewer function queries to estimate the gradient than previous zeroth-order methods. Additionally, a so-called dynamic virtual update schemes is incorporated. Theoretically, the proposed method is shown to obtain gra...
This paper tackles an imbalanced semi-supervised learning (SSL) problem by proposing a new way to construct the pseudo labels of unlabeled samples, coined INlier Pseudo-Labeling (INPL). Unlike the previous approaches, which use the softmax confidence from the training classifier, INPL instead uses the energy score calc...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper tackles an imbalanced semi-supervised learning (SSL) problem by proposing a new way to construct the pseudo labels of unlabeled samples, coined INlier Pseudo-Labeling (INPL). Unlike the previous approaches, which use the softmax confidence from the training classifier, INPL instead uses the energy sc...
This paper proposed a new way of acceleration diffusion based generative models that combines MCMC on a augmented space with reverse-S/ODE integrators. More specifically, a Gibbs sampler procedure is introduced to traverse the augmented space based on a pre-trained classifier. Numerical experiments demonstate the effec...
Recommendation: 6: marginally above the acceptance threshold
Area: Generative models
Review: This paper proposed a new way of acceleration diffusion based generative models that combines MCMC on a augmented space with reverse-S/ODE integrators. More specifically, a Gibbs sampler procedure is introduced to traverse the augmented space based on a pre-trained classifier. Numerical experiments demonstate t...
This paper proposes a novel adaptive depth network by inducing a training strategy without the need of additional intermediate gate/classifier. It use a skip-aware BN, with a cost of 0.07% parameter increasing, but reduces the inference cost and achieve better results comparing with the non-adaptive baselines. Pro: 1) ...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposes a novel adaptive depth network by inducing a training strategy without the need of additional intermediate gate/classifier. It use a skip-aware BN, with a cost of 0.07% parameter increasing, but reduces the inference cost and achieve better results comparing with the non-adaptive baselines. ...
This paper proves pointwise convergence of q-replicator dynamics to NE and corresponding bounds on average price of anarchy, generalizing previous works. Strengths: The results are solid. The motivation and proof ideas are well explained. Weaknesses: I'm not familiar with this specific topic studied in this paper, ...
Recommendation: 5: marginally below the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: This paper proves pointwise convergence of q-replicator dynamics to NE and corresponding bounds on average price of anarchy, generalizing previous works. Strengths: The results are solid. The motivation and proof ideas are well explained. Weaknesses: I'm not familiar with this specific topic studied in this...
The paper introduces a novel task-incremental approach that diminishes the gradients based on their importance (SPG). Specifically, the importance is calculated as the normalized gradients on the current and past tasks. For the current task, the gradients are taken w.r.t. the log-likelihood of the data. For past tasks...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: The paper introduces a novel task-incremental approach that diminishes the gradients based on their importance (SPG). Specifically, the importance is calculated as the normalized gradients on the current and past tasks. For the current task, the gradients are taken w.r.t. the log-likelihood of the data. For pa...
The paper provides a unified setting among generative models. In particular it offers a perspective on diffusion models (DM) that cast them in a framework more similar to GANs, which admit a Gaussian formulation of the latent space. This point of view is then leveraged in three settings. Contributions: 1. provide a f...
Recommendation: 5: marginally below the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The paper provides a unified setting among generative models. In particular it offers a perspective on diffusion models (DM) that cast them in a framework more similar to GANs, which admit a Gaussian formulation of the latent space. This point of view is then leveraged in three settings. Contributions: 1. pro...
This paper presents graph contrastive learning approach with counterfactual views. Specifically, the authors propose a counterfactual inference objective to generate task-oriented causal views that will be helpful in determining positive and negative samples. Experimental results show superiority over existing graph co...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This paper presents graph contrastive learning approach with counterfactual views. Specifically, the authors propose a counterfactual inference objective to generate task-oriented causal views that will be helpful in determining positive and negative samples. Experimental results show superiority over existing ...
The paper proposes improved sampling for training program surrogates. The proposed sampling scheme takes into account both data distribution and sample complexity of different paths. A language suitable for application of the proposed sampling scheme is introduced, and the scheme is evaluated on a graphics program. Str...
Recommendation: 1: strong reject
Area: Deep Learning and representational learning
Review: The paper proposes improved sampling for training program surrogates. The proposed sampling scheme takes into account both data distribution and sample complexity of different paths. A language suitable for application of the proposed sampling scheme is introduced, and the scheme is evaluated on a graphics prog...
This paper proposes a channel pruning method which aims to enhance global consistence among samples for network channels. It claims integrating both static and dynamic information into the formulation. Comparison on small datasets demonstrate the effectiveness of the proposed methods. Strong points + The bayesian b...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This paper proposes a channel pruning method which aims to enhance global consistence among samples for network channels. It claims integrating both static and dynamic information into the formulation. Comparison on small datasets demonstrate the effectiveness of the proposed methods. Strong points + The ba...
The paper presents a novel architecture for graph neural networks called MeGraph. MeGraph builds on the Select-Reduce-Connect framework for graph pooling (Grattarola et al., 2022). In particular, the Select function of a pooling method implicitly induces a bipartite "inter-graph" between the input and output graph. B...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: The paper presents a novel architecture for graph neural networks called MeGraph. MeGraph builds on the Select-Reduce-Connect framework for graph pooling (Grattarola et al., 2022). In particular, the Select function of a pooling method implicitly induces a bipartite "inter-graph" between the input and output ...
The paper proposes a theoretical analysis of SGMs that extends Chen et al. (2022c) and the bad set approach from (Lee et al., 2022a). Compared to Chen et al. the analysis is much more general in a number of ways, and compared to Lee et al. the analysis relaxes an LSI assumption and is applicable to a larger class of g...
Recommendation: 8: accept, good paper
Area: Generative models
Review: The paper proposes a theoretical analysis of SGMs that extends Chen et al. (2022c) and the bad set approach from (Lee et al., 2022a). Compared to Chen et al. the analysis is much more general in a number of ways, and compared to Lee et al. the analysis relaxes an LSI assumption and is applicable to a larger cl...
This article proposed a distill multiple steps method to decrease the number of required steps to speed up iterative non-autoregressive transformer. Strengths: 1. The training of the distilled student model obtained improved training efficiency with a certain translation quality. 2. The proposed approach gained impr...
Recommendation: 5: marginally below the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This article proposed a distill multiple steps method to decrease the number of required steps to speed up iterative non-autoregressive transformer. Strengths: 1. The training of the distilled student model obtained improved training efficiency with a certain translation quality. 2. The proposed approach gai...
This paper proposes an end-to-end visual learning method for 3D robotic manipulation. The authors construct an SE(3)-equivariant energy-based model to learn end-to-end from limited demonstrations without prior knowledge. The proposed Equivariant Descriptor Fields could be generalized to unseen poses, instances, and tar...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper proposes an end-to-end visual learning method for 3D robotic manipulation. The authors construct an SE(3)-equivariant energy-based model to learn end-to-end from limited demonstrations without prior knowledge. The proposed Equivariant Descriptor Fields could be generalized to unseen poses, instances,...
This paper proposes a defense against backdoor attacks to FL. The assumption is that the system has access to some clean validation dataset, which can be used to filter backdoored model updates from malicious clients via analyzing the output layer distribution. Some evaluation is performed to show the effectiveness of ...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This paper proposes a defense against backdoor attacks to FL. The assumption is that the system has access to some clean validation dataset, which can be used to filter backdoored model updates from malicious clients via analyzing the output layer distribution. Some evaluation is performed to show the effective...
In this paper, the authors studied the optimization and generalization of two-layer ReLU network when the first layer neuron rotate little. Three regimes are considered, including the near initialization regime, Neural Collapse regime and non-rotate regime. The results show that low test error could be achieved and hav...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: In this paper, the authors studied the optimization and generalization of two-layer ReLU network when the first layer neuron rotate little. Three regimes are considered, including the near initialization regime, Neural Collapse regime and non-rotate regime. The results show that low test error could be achieved...
The paper aims at learning whether a certain text is visualizable or not as generative models such as DALLE-2 are becoming very popular. To this effort, the authors curate a dataset called Text Imageability Dataset (TIMED) which contains 3620 sentences with label for whether it is a visual or non-visual text. The autho...
Recommendation: 3: reject, not good enough
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The paper aims at learning whether a certain text is visualizable or not as generative models such as DALLE-2 are becoming very popular. To this effort, the authors curate a dataset called Text Imageability Dataset (TIMED) which contains 3620 sentences with label for whether it is a visual or non-visual text. T...
This paper works on image restoration and introduces a multi-branch dynamic selective frequency (MDSF) module with learned kernels to generate high and low-frequency features and a multi-branch compact selective frequency (MCSF) module to enhance the features with an attention mechanism. The proposed method achieves se...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper works on image restoration and introduces a multi-branch dynamic selective frequency (MDSF) module with learned kernels to generate high and low-frequency features and a multi-branch compact selective frequency (MCSF) module to enhance the features with an attention mechanism. The proposed method ach...
This work proposes a backdoor attack which does not require modifying the inputs and only requires modifying labels. The way it operates is by trigger selection where a trigger is an object already in the training images. The work also tests against several defenses. I generally like the idea of this paper, and the e...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This work proposes a backdoor attack which does not require modifying the inputs and only requires modifying labels. The way it operates is by trigger selection where a trigger is an object already in the training images. The work also tests against several defenses. I generally like the idea of this paper, a...
In this paper, the authors introduced TAMiL, a continual-learning model inspired by the global workspace theory that can learn multiple tasks without catastrophic forgetting by constructing a common representation space across tasks. By combining previous approaches on self-regulated neurogenesis and experience replay,...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: In this paper, the authors introduced TAMiL, a continual-learning model inspired by the global workspace theory that can learn multiple tasks without catastrophic forgetting by constructing a common representation space across tasks. By combining previous approaches on self-regulated neurogenesis and experience...
The present paper is concerned about measuring how much a set of molecules covers the chemical space. All of the metrics that they consider take a set of molecules $\mathcal{S}$ as input and output a coverage metric. Among many existing heuristically-designed metrics, the authors propose a metric called #Circles, which...
Recommendation: 8: accept, good paper
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: The present paper is concerned about measuring how much a set of molecules covers the chemical space. All of the metrics that they consider take a set of molecules $\mathcal{S}$ as input and output a coverage metric. Among many existing heuristically-designed metrics, the authors propose a metric called #Circle...
This work considers neural operators in the semisupervised setting. It extends Fourier neural operator with a hypernetwork structure, which allows composition in time. The paper provides numerical experiments on 1d Burger equation and 2d and 3d Navier-Stokes equation. The proposed method has a slightly improved error r...
Recommendation: 5: marginally below the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: This work considers neural operators in the semisupervised setting. It extends Fourier neural operator with a hypernetwork structure, which allows composition in time. The paper provides numerical experiments on 1d Burger equation and 2d and 3d Navier-Stokes equation. The proposed method has a slightly improved...
This is a theoretical paper on an NTK analysis of two-layer ReLU network with a trainable nontrivial initial bias. The motivation of study is that by using an appropriately initialized bias term, the network produces *sparse* activation at initialization; and if one considers the kernel regime then the sparsity is main...
Recommendation: 6: marginally above the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: This is a theoretical paper on an NTK analysis of two-layer ReLU network with a trainable nontrivial initial bias. The motivation of study is that by using an appropriately initialized bias term, the network produces *sparse* activation at initialization; and if one considers the kernel regime then the sparsity...
The paper proposes a simple complexity-based prompting method for chain-of-thought prompting. The idea is to prompt with more complex questions: The authors use example questions with more reasoning steps (9 per question). When combining the predictions from multiple prompts, they choose the top K predictions with the ...
Recommendation: 8: accept, good paper
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The paper proposes a simple complexity-based prompting method for chain-of-thought prompting. The idea is to prompt with more complex questions: The authors use example questions with more reasoning steps (9 per question). When combining the predictions from multiple prompts, they choose the top K predictions w...
This paper proposes an architecture for solving CSPs based on a transformer network. The transformer makes multiple passes over the inputs, keeping information across different passes in the form of a recurrent state. The network is also augmented with a constraint loss that injects problem knowledge into the training ...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposes an architecture for solving CSPs based on a transformer network. The transformer makes multiple passes over the inputs, keeping information across different passes in the form of a recurrent state. The network is also augmented with a constraint loss that injects problem knowledge into the t...
The paper is concerned with the scalability of training GNNs on large graph datasets where there may not be sufficient memory to store the graph structure. The basic idea is to decompose the graph into smaller components. The paper builds upon the earlier works such as (Chiang et al., 2019), which uses METIS to decompo...
Recommendation: 3: reject, not good enough
Area: General Machine Learning
Review: The paper is concerned with the scalability of training GNNs on large graph datasets where there may not be sufficient memory to store the graph structure. The basic idea is to decompose the graph into smaller components. The paper builds upon the earlier works such as (Chiang et al., 2019), which uses METIS to...
To address the task interference in multi-task learning, this paper presents an innovative method to obtain deconflicted gradients among tasks. This is done through projecting the gradient of a task to the subspace that is orthogonal to that spanned by the gradients of all other tasks. The authors provide the convergen...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: To address the task interference in multi-task learning, this paper presents an innovative method to obtain deconflicted gradients among tasks. This is done through projecting the gradient of a task to the subspace that is orthogonal to that spanned by the gradients of all other tasks. The authors provide the c...
This paper studied extreme multi-label classification problems where labels short text descriptions are available. The author proposed Gandalf, a data-augmentation technique that augmented the label text as input data, and used the label correlation graph as its soft-labels. The proposed Gandalf technique was applied t...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper studied extreme multi-label classification problems where labels short text descriptions are available. The author proposed Gandalf, a data-augmentation technique that augmented the label text as input data, and used the label correlation graph as its soft-labels. The proposed Gandalf technique was a...
Consider the problem of finding a linear classifier with positive margin for a given linearly separable dataset, which can be formulated as a bilinear minmax problem. This paper proposes a unified interpretation for two algorithms by Soheili & Pena (2012) and Ji et al. (2021) and a new algorithm based on Nesterov's acc...
Recommendation: 8: accept, good paper
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: Consider the problem of finding a linear classifier with positive margin for a given linearly separable dataset, which can be formulated as a bilinear minmax problem. This paper proposes a unified interpretation for two algorithms by Soheili & Pena (2012) and Ji et al. (2021) and a new algorithm based on Nester...
The paper proposes a simple progressive knowledge distillation framework with a sequence of teachers for detectors. Strength: 1. The idea of progressively transferring knowledge from a sequence of teachers to a lightweight detector is somewhat novel. 2. It represents the first effort to distill knowledge from Transf...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: The paper proposes a simple progressive knowledge distillation framework with a sequence of teachers for detectors. Strength: 1. The idea of progressively transferring knowledge from a sequence of teachers to a lightweight detector is somewhat novel. 2. It represents the first effort to distill knowledge fro...
This paper introduces a multi-explanation graph attention network architecture by useing attention mechanisms to produce node and edge attribution explanations along multiple channels for graph classification and regression tasks. Experiments demonstrate the effectiveness of the proposed model. Strength: 1. The res...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: This paper introduces a multi-explanation graph attention network architecture by useing attention mechanisms to produce node and edge attribution explanations along multiple channels for graph classification and regression tasks. Experiments demonstrate the effectiveness of the proposed model. Strength: 1....
Monge's primal Wasserstein-$2$ transport map optimization problem admits a (Kantorovich) dual with appealing properties which enable the use of several learning/optimization algorithms to (approximately) solve the problem. However, the dual objective function includes a term involving the convex conjugate of the potent...
Recommendation: 8: accept, good paper
Area: Optimization (eg, convex and non-convex optimization)
Review: Monge's primal Wasserstein-$2$ transport map optimization problem admits a (Kantorovich) dual with appealing properties which enable the use of several learning/optimization algorithms to (approximately) solve the problem. However, the dual objective function includes a term involving the convex conjugate of th...
The paper connects policy gradient method in joint policy optimization of multi-agent RL to MI maximization framework and shows that joint policy optimization essentially leads to MI maximization. Thus joint policy optimization produces skills that are transferable across agents but it costs in diversity and performanc...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The paper connects policy gradient method in joint policy optimization of multi-agent RL to MI maximization framework and shows that joint policy optimization essentially leads to MI maximization. Thus joint policy optimization produces skills that are transferable across agents but it costs in diversity and pe...
This paper studies the problem of learning Linear Program (LP) properties—feasibility, optimal value, and shortest optimal solution—by Graph Neural Networks (GNNs). By extending existing results on GNNs—namely the paper by Xu et al. 2019 which equates the separation power of GNNs with Weisfeiler–Lehman isomorphism test...
Recommendation: 6: marginally above the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: This paper studies the problem of learning Linear Program (LP) properties—feasibility, optimal value, and shortest optimal solution—by Graph Neural Networks (GNNs). By extending existing results on GNNs—namely the paper by Xu et al. 2019 which equates the separation power of GNNs with Weisfeiler–Lehman isomorph...
This paper tries to address feature shift by modelling feature statistics among clients. Specifically, the authors model feature statistic via a Gaussian distribution. The mean of the Gaussian distribution denote the original statistic while the variance denote the augmentation scope. The authors designed a solution ...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper tries to address feature shift by modelling feature statistics among clients. Specifically, the authors model feature statistic via a Gaussian distribution. The mean of the Gaussian distribution denote the original statistic while the variance denote the augmentation scope. The authors designed a s...
This paper proposes a novel federated learning (FL) paradigm, AdaFGL, for subgraph learning (i.e., each client holds a subgraph and considers node classification or link prediction task). AdaFGL is designed to handle the structure non-iidness, a graph unique non-iidness issue in FL. The authors conducted extensive empi...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper proposes a novel federated learning (FL) paradigm, AdaFGL, for subgraph learning (i.e., each client holds a subgraph and considers node classification or link prediction task). AdaFGL is designed to handle the structure non-iidness, a graph unique non-iidness issue in FL. The authors conducted extens...
The paper introduces the concept of renaming invariance and develops a model with this property. They carry out experiments and demonstrate that their model performs better. The paper develops good intuition with the application to formal languages and concrete examples. Experimental results are very strong on standard...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: The paper introduces the concept of renaming invariance and develops a model with this property. They carry out experiments and demonstrate that their model performs better. The paper develops good intuition with the application to formal languages and concrete examples. Experimental results are very strong on ...
This paper adapts the contrastive learning from self-supervised learning to semi-supervised learning with two core designs: 1) performing pseudo-labeling based on the similarities to the labeled data in the encoded feature space; 2) select positives for a datapoint based on the pseudo-labels. Pros: The idea is simple ...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper adapts the contrastive learning from self-supervised learning to semi-supervised learning with two core designs: 1) performing pseudo-labeling based on the similarities to the labeled data in the encoded feature space; 2) select positives for a datapoint based on the pseudo-labels. Pros: The idea is...
The paper presents a taxonomy of the tasks, namely the Learning Challenge Diagnosticator (LCD), based on the perceptual and reinforcement learning challenges in the Procgen benchmark. The games are parameterized to perturb the perceptual representation (original pixels, figure-ground or semantic segmentations) or to va...
Recommendation: 6: marginally above the acceptance threshold
Area: Neuroscience and Cognitive Science (e.g., neural coding, brain-computer interfaces)
Review: The paper presents a taxonomy of the tasks, namely the Learning Challenge Diagnosticator (LCD), based on the perceptual and reinforcement learning challenges in the Procgen benchmark. The games are parameterized to perturb the perceptual representation (original pixels, figure-ground or semantic segmentations) ...
The paper under review considers the problem of multimodal learning in the case where one or more of the modalities might be unavailable during either training or testing. The proposed solution works by decomposing representation space into a collection of orthogonal vectors, a “common” component to capture high-level ...
Recommendation: 3: reject, not good enough
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The paper under review considers the problem of multimodal learning in the case where one or more of the modalities might be unavailable during either training or testing. The proposed solution works by decomposing representation space into a collection of orthogonal vectors, a “common” component to capture hig...
The paper introduces a dynamic graph neural network model that handles the dynamics in graph homophily wrt specific prediction tasks. Specific modules are designed to model the topology-task discordance along time with theoretical analysis. Experiments are done on real-world traffic and climate datasets. S1: Novel angl...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: The paper introduces a dynamic graph neural network model that handles the dynamics in graph homophily wrt specific prediction tasks. Specific modules are designed to model the topology-task discordance along time with theoretical analysis. Experiments are done on real-world traffic and climate datasets. S1: No...
The paper proposes a low-light enhancement method to simultaneously enhance low-light images and suppress noise. The proposed method obtains the noise level of a low-light image and initial illumination layer using a network. Based on the initial illumination layer and the noise level, another network is used to estima...
Recommendation: 3: reject, not good enough
Area: Deep Learning and representational learning
Review: The paper proposes a low-light enhancement method to simultaneously enhance low-light images and suppress noise. The proposed method obtains the noise level of a low-light image and initial illumination layer using a network. Based on the initial illumination layer and the noise level, another network is used t...
In this paper, the authors propose a ring-enhanced GNN called \mathcal{O}-GNN to learn ring representations for molecular modeling. The ring representations are updated by concatenating the atom representations and bond representations in the ring, as well as the overall compound representation. Experiments on 11 publi...
Recommendation: 5: marginally below the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: In this paper, the authors propose a ring-enhanced GNN called \mathcal{O}-GNN to learn ring representations for molecular modeling. The ring representations are updated by concatenating the atom representations and bond representations in the ring, as well as the overall compound representation. Experiments on ...
The paper proposes a simple data-efficient fine-tuning technique, where the few-shot data for a test task is augmented by retrieving similar examples from a multi-task training set (which does not contain the exact test task). The test task training set is augmented by taking the union of the training examples retrieve...
Recommendation: 3: reject, not good enough
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The paper proposes a simple data-efficient fine-tuning technique, where the few-shot data for a test task is augmented by retrieving similar examples from a multi-task training set (which does not contain the exact test task). The test task training set is augmented by taking the union of the training examples ...
The paper studies the ECE of language models trained using different recipes, including the pretrained model, finetuned model and parameter-efficient finetuned models. They find that the finetuned model has larger ECE and tend to be over confident when making predictions. The paper proposes a baseline method of mixing ...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: The paper studies the ECE of language models trained using different recipes, including the pretrained model, finetuned model and parameter-efficient finetuned models. They find that the finetuned model has larger ECE and tend to be over confident when making predictions. The paper proposes a baseline method of...
1. This paper proved that the training of deep threshold networks with weight decay can be formulated as a convex optimization problem. The size of the convex optimization problem depends on the total number of hyperplane arrangements, which can be exponentially large in the number of samples in the worst case. 2. For...
Recommendation: 6: marginally above the acceptance threshold
Area: Optimization (eg, convex and non-convex optimization)
Review: 1. This paper proved that the training of deep threshold networks with weight decay can be formulated as a convex optimization problem. The size of the convex optimization problem depends on the total number of hyperplane arrangements, which can be exponentially large in the number of samples in the worst case....
This paper presents a study which compares developers' attention to input context for sense-making tasks (e.g., mental code execution, side effects detection, algorithmic complexity, deadlock detection) with that of large autoregressive pretrained language models (CodeGen, GPT-J). For this, they collect a dataset throu...
Recommendation: 6: marginally above the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper presents a study which compares developers' attention to input context for sense-making tasks (e.g., mental code execution, side effects detection, algorithmic complexity, deadlock detection) with that of large autoregressive pretrained language models (CodeGen, GPT-J). For this, they collect a datas...
The work explores general linear corruption processes for diffusion models and practical training and sampling to improve performance for the new diffusion models. However, there are several technical questions unclear. Strength: 1. Authors show denoising score matching~(DSM) can be used to learn score for noised diff...
Recommendation: 3: reject, not good enough
Area: Generative models
Review: The work explores general linear corruption processes for diffusion models and practical training and sampling to improve performance for the new diffusion models. However, there are several technical questions unclear. Strength: 1. Authors show denoising score matching~(DSM) can be used to learn score for noi...
The authors investigate the effect of large batch size in training the SAC algorithm. The result shows that a large batch size allows the algorithm to converge faster and introduces a form of conservatism (shown through the standard deviation ratio between ID vs. OOD state/action). This effect cannot be achieved by lay...
Recommendation: 5: marginally below the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The authors investigate the effect of large batch size in training the SAC algorithm. The result shows that a large batch size allows the algorithm to converge faster and introduces a form of conservatism (shown through the standard deviation ratio between ID vs. OOD state/action). This effect cannot be achieve...
This paper tries to improve adversarial robustness via a new perspective: tessellated 2D convolutional network as a divide and conquer defence. The input image is first divided into several non-overlapping patches (regular or irregular), sent to parallel branches, and then the features from different patches are aggreg...
Recommendation: 3: reject, not good enough
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper tries to improve adversarial robustness via a new perspective: tessellated 2D convolutional network as a divide and conquer defence. The input image is first divided into several non-overlapping patches (regular or irregular), sent to parallel branches, and then the features from different patches ar...
The authors study the conditions that a communication compression method should satisfy to be compatible with existing Byzantine-robust methods and privacy-preserving methods. The core of their proposed method is consensus sparsification, which is a variant of top-$K$ sparsification with additional memory and a random ...
Recommendation: 5: marginally below the acceptance threshold
Area: Optimization (eg, convex and non-convex optimization)
Review: The authors study the conditions that a communication compression method should satisfy to be compatible with existing Byzantine-robust methods and privacy-preserving methods. The core of their proposed method is consensus sparsification, which is a variant of top-$K$ sparsification with additional memory and a...
The paper introduces a new partial self-attention layer to improve numerical interpolation for scattered data. The module was used in a modified Transformer to solve the interpolation task. The proposed approach treats observed and target points in a unified way by embedding them in the same representation space. Stren...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: The paper introduces a new partial self-attention layer to improve numerical interpolation for scattered data. The module was used in a modified Transformer to solve the interpolation task. The proposed approach treats observed and target points in a unified way by embedding them in the same representation spac...
The paper presents a novel framework for reinforcement learning, specifically for evidence accumulation tasks that involve counting quantities and deciding which is greater. The general approach is to use cognitive models as inductive biases by learning a function representing the evidence and giving the resulting repr...
Recommendation: 6: marginally above the acceptance threshold
Area: Neuroscience and Cognitive Science (e.g., neural coding, brain-computer interfaces)
Review: The paper presents a novel framework for reinforcement learning, specifically for evidence accumulation tasks that involve counting quantities and deciding which is greater. The general approach is to use cognitive models as inductive biases by learning a function representing the evidence and giving the result...
The paper focuses on memory-replay-based approaches for Continual Learning (CL). The authors justifiably argue that a continual learner could overfit to the memory buffer reducing the generalizability of the model on previously learned tasks. Hence, one could benefit from adjusting the samples in the memory to avoid su...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: The paper focuses on memory-replay-based approaches for Continual Learning (CL). The authors justifiably argue that a continual learner could overfit to the memory buffer reducing the generalizability of the model on previously learned tasks. Hence, one could benefit from adjusting the samples in the memory to ...
This paper focuses on how to sample hard negative pairs in every batch, which is an important topic in contrastive learning. The paper motivates by the defects of uniform and KNN strategies, and then the authors propose to construct a proximity graph and employ the random walk to generate each batch. According to the c...
Recommendation: 3: reject, not good enough
Area: Unsupervised and Self-supervised learning
Review: This paper focuses on how to sample hard negative pairs in every batch, which is an important topic in contrastive learning. The paper motivates by the defects of uniform and KNN strategies, and then the authors propose to construct a proximity graph and employ the random walk to generate each batch. According ...
This paper exploits several kinds of attention mechanisms (Euclidean and semantic attention, spatial attention) upon EGNN [6]. Necessary theoretical claims have been made to justify the expressivity of the proposed spatial attention. Experiments are conducted on invariant tasks and equivariant tasks. Strengths: 1. The...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper exploits several kinds of attention mechanisms (Euclidean and semantic attention, spatial attention) upon EGNN [6]. Necessary theoretical claims have been made to justify the expressivity of the proposed spatial attention. Experiments are conducted on invariant tasks and equivariant tasks. Strengths:...
Volumetric segmentation of medical images is still an open problem. This work proposes a new U-net type segmentation network that uses large receptive field depth-wise convolution operations to emulate vision transformers (ViTs). Additionally, patch-wise feature propagation and 1x1 convolutions are introduced as means ...
Recommendation: 3: reject, not good enough
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: Volumetric segmentation of medical images is still an open problem. This work proposes a new U-net type segmentation network that uses large receptive field depth-wise convolution operations to emulate vision transformers (ViTs). Additionally, patch-wise feature propagation and 1x1 convolutions are introduced a...
The paper proposes a novel method for joint antibody sequence/structure design. The paper introduces / combines multiple innovations: * Modeling antibody heavy + light chain, along with antigen * Joint sequence / structure design * Iterative prediction of outputs While some of these have been introduced before, the c...
Recommendation: 8: accept, good paper
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: The paper proposes a novel method for joint antibody sequence/structure design. The paper introduces / combines multiple innovations: * Modeling antibody heavy + light chain, along with antigen * Joint sequence / structure design * Iterative prediction of outputs While some of these have been introduced befor...
The authors propose NDRL, which is a class of methods to automatically discretize action spaces. They identify issues with prior work and with their methods, and propose improvements to address these issues. They analyze their methods empirically. **Edits:** - introduction, “prior sets of discrete actions to from exp...
Recommendation: 5: marginally below the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The authors propose NDRL, which is a class of methods to automatically discretize action spaces. They identify issues with prior work and with their methods, and propose improvements to address these issues. They analyze their methods empirically. **Edits:** - introduction, “prior sets of discrete actions to ...
The paper empirically revisits a previous hypothesis/belief from the continual learning (CL) literature, that catastrophic forgetting is not the only important quantity in CL, and that often CL methods that mitigate forgetting can harm the "forward transfer" between tasks. The paper offers a new notion of transferabil...
Recommendation: 8: accept, good paper
Area: Deep Learning and representational learning
Review: The paper empirically revisits a previous hypothesis/belief from the continual learning (CL) literature, that catastrophic forgetting is not the only important quantity in CL, and that often CL methods that mitigate forgetting can harm the "forward transfer" between tasks. The paper offers a new notion of tran...
This paper proposes a new methodology for tuning hyperparameters of SSL methods, without using labels. The method is motivated by a result in the linear regression setting wherein the train accuracy of a linear probe improves with embedding rank. Based on this, the authors propose that a robust rank measure (originally...
Recommendation: 3: reject, not good enough
Area: Unsupervised and Self-supervised learning
Review: This paper proposes a new methodology for tuning hyperparameters of SSL methods, without using labels. The method is motivated by a result in the linear regression setting wherein the train accuracy of a linear probe improves with embedding rank. Based on this, the authors propose that a robust rank measure (or...
This paper extends the deterministic policy gradient algorithm to the average reward case and introduces an average reward version of DDPG. Finite-time analysis of linear function approximator version of the algorithm is also shown for both the on-policy and off-policy case. Empirically, the new algorithm is shown to o...
Recommendation: 5: marginally below the acceptance threshold
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper extends the deterministic policy gradient algorithm to the average reward case and introduces an average reward version of DDPG. Finite-time analysis of linear function approximator version of the algorithm is also shown for both the on-policy and off-policy case. Empirically, the new algorithm is sh...
The paper claims to be amongst the first paper's to consider the interplay of games and risk aversion in decision making and examines existence of a solution/equilibrium concept as well as methods for computing of approximating them. "Despite the importance of risk-aversion in the single-agent decision making literatu...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The paper claims to be amongst the first paper's to consider the interplay of games and risk aversion in decision making and examines existence of a solution/equilibrium concept as well as methods for computing of approximating them. "Despite the importance of risk-aversion in the single-agent decision making ...
The paper proposes a method for video-language retrieval. The method is based on pretraining a general still image detector and feeding the pooled output of the detector plus position+time features into a transformer to produce a video embedding. A global loss on cls video embedding, as well as local individual token l...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: The paper proposes a method for video-language retrieval. The method is based on pretraining a general still image detector and feeding the pooled output of the detector plus position+time features into a transformer to produce a video embedding. A global loss on cls video embedding, as well as local individual...
This paper proposes a tree-based encoder for fair representation learning (FRL). The encoder transforms the input data such that downstream classifiers using the transformed data achieve some fairness guarantees. The authors focus on demographic parity as the fairness criterion in binary classification settings. [St...
Recommendation: 3: reject, not good enough
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper proposes a tree-based encoder for fair representation learning (FRL). The encoder transforms the input data such that downstream classifiers using the transformed data achieve some fairness guarantees. The authors focus on demographic parity as the fairness criterion in binary classification settings...
The paper proposes a new training framework for multi-agent reinforcement learning (MARL) to improve the robustness of MARL agents by generating state/observation perturbation on strategically selected agent during training. They additionally propose a defense module to prevent the MARL agent from being attacked by ob...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: The paper proposes a new training framework for multi-agent reinforcement learning (MARL) to improve the robustness of MARL agents by generating state/observation perturbation on strategically selected agent during training. They additionally propose a defense module to prevent the MARL agent from being attack...
This paper proposes replacing Learning (RL) methods based on Transformers with the S4 family of models. Two algorithms are proposed for both the on-policy and off-policy setting, showing strong empirical results. **Strengths:** - The method is well-motivated. RL can require both efficient batch training as well as eff...
Recommendation: 8: accept, good paper
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper proposes replacing Learning (RL) methods based on Transformers with the S4 family of models. Two algorithms are proposed for both the on-policy and off-policy setting, showing strong empirical results. **Strengths:** - The method is well-motivated. RL can require both efficient batch training as wel...
This paper studies the convergence of a regularized Q learning algorithm and the features are learned from a nonlinear approximation. The features are updated much slower than the $Q$ function parameter. The authors prove that the proposed regularized Q-learning converges as long as the feature learning scheme converge...
Recommendation: 3: reject, not good enough
Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics)
Review: This paper studies the convergence of a regularized Q learning algorithm and the features are learned from a nonlinear approximation. The features are updated much slower than the $Q$ function parameter. The authors prove that the proposed regularized Q-learning converges as long as the feature learning scheme ...
The paper addresses the multi-source UDA problems by proposing the method Multi-Prompt Alignment (MPA). MPA is built on the pre-trained CLIP which can effectively encode images and texts. Compared to other existing approaches to mutli-source UDA, MPA only needs to train a small number of parameters by prompt learning. ...
Recommendation: 5: marginally below the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: The paper addresses the multi-source UDA problems by proposing the method Multi-Prompt Alignment (MPA). MPA is built on the pre-trained CLIP which can effectively encode images and texts. Compared to other existing approaches to mutli-source UDA, MPA only needs to train a small number of parameters by prompt le...
In this paper, the authors introduced the concept of Populated Region Set (PRS) to characterize the complexity of DNNs and build the correction between low PRS ratio and high robustness of models via several experiments. Strength: 1. The concept of the Populated Region Set (PRS) is novel and interesting. 2. The experim...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: In this paper, the authors introduced the concept of Populated Region Set (PRS) to characterize the complexity of DNNs and build the correction between low PRS ratio and high robustness of models via several experiments. Strength: 1. The concept of the Populated Region Set (PRS) is novel and interesting. 2. The...
In this paper, the authors study the theoretical properties of diagonally grouped linear neural networks, and they show that gradient descent over the squared regression loss, without any explicit regularization, biases towards solutions with a group sparsity structure. They conduct some experiments to verify their con...
Recommendation: 5: marginally below the acceptance threshold
Area: Optimization (eg, convex and non-convex optimization)
Review: In this paper, the authors study the theoretical properties of diagonally grouped linear neural networks, and they show that gradient descent over the squared regression loss, without any explicit regularization, biases towards solutions with a group sparsity structure. They conduct some experiments to verify t...
This paper provides a new perspective on solving the conflicting gradients problem in MTL. It checks the conflicting level at layer scale, and turns the layers with high conflict scores into task-specific ones. Some theoretical analysis and experimental verifications are provided. Strengths: + The perspective on iden...
Recommendation: 3: reject, not good enough
Area: General Machine Learning
Review: This paper provides a new perspective on solving the conflicting gradients problem in MTL. It checks the conflicting level at layer scale, and turns the layers with high conflict scores into task-specific ones. Some theoretical analysis and experimental verifications are provided. Strengths: + The perspective...
To address semantic image synthesis, this paper mainly proposes to tackle three issues of lack of details from semantic lables, spatial resolution loss from CNN operations, and ignoring 'global' semantic information from a single input semantic layout, with the design of edge guided generative adversarial network (GAN)...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: To address semantic image synthesis, this paper mainly proposes to tackle three issues of lack of details from semantic lables, spatial resolution loss from CNN operations, and ignoring 'global' semantic information from a single input semantic layout, with the design of edge guided generative adversarial netwo...
The authors propose Diffusion Variational Monte Carlo (DVMC) for simulating many-body quantum systems based on the neural score function. Contrast to a conventional Variational Monte Carlo (VMC), the proposed method requires estimating the score function only, which is a gradient of the logarithm of the wavefunction, r...
Recommendation: 6: marginally above the acceptance threshold
Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability )
Review: The authors propose Diffusion Variational Monte Carlo (DVMC) for simulating many-body quantum systems based on the neural score function. Contrast to a conventional Variational Monte Carlo (VMC), the proposed method requires estimating the score function only, which is a gradient of the logarithm of the wavefun...
The paper proposes a general method (hyper label model) to infer pseudo-labels in weak supervision that doesn't require learning parameters for each dataset separately. They characterize an optimal analytical model that is computationally intractable but gives true labels for any dataset under mild assumptions on label...
Recommendation: 6: marginally above the acceptance threshold
Area: General Machine Learning
Review: The paper proposes a general method (hyper label model) to infer pseudo-labels in weak supervision that doesn't require learning parameters for each dataset separately. They characterize an optimal analytical model that is computationally intractable but gives true labels for any dataset under mild assumptions ...
This paper studies the convergence of the mean-field gradient Langevin dynamics for the regularized mean-field neural network model. Under certain regularity assumption, it is proved that the dynamics in mean-field limit and the finite particle approximation are close for all time t>0, and certain statistic of these tw...
Recommendation: 6: marginally above the acceptance threshold
Area: Theory (eg, control theory, learning theory, algorithmic game theory)
Review: This paper studies the convergence of the mean-field gradient Langevin dynamics for the regularized mean-field neural network model. Under certain regularity assumption, it is proved that the dynamics in mean-field limit and the finite particle approximation are close for all time t>0, and certain statistic of ...
This paper aims to address the fact that deep networks may condition on spurious features that are correlated with the target class without being causal. They attempt to leverage the front door criterion in order to avoid the need to explicitly condition on confounders. Their approach works by treating the hidden repre...
Recommendation: 1: strong reject
Area: Deep Learning and representational learning
Review: This paper aims to address the fact that deep networks may condition on spurious features that are correlated with the target class without being causal. They attempt to leverage the front door criterion in order to avoid the need to explicitly condition on confounders. Their approach works by treating the hidd...
Authors propose a technique to detect peak performance without a reference for Deep Image Prior (DIP) based computational imaging algorithms. The proposed strategy utilizes the running variance of past reconstruction iterates to determine when to terminate training. Authors provide theoretical results to justify the p...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: Authors propose a technique to detect peak performance without a reference for Deep Image Prior (DIP) based computational imaging algorithms. The proposed strategy utilizes the running variance of past reconstruction iterates to determine when to terminate training. Authors provide theoretical results to justi...
The paper studies optimal transport with prescribed sparsity. Specifically, based on the well known quadratic regularized optimal transport, the paper further constrains the cardinality of non-zeros entries of each column of the optimal plan. The problem of optimal transport with constrained sparsity is well motivated ...
Recommendation: 6: marginally above the acceptance threshold
Area: Optimization (eg, convex and non-convex optimization)
Review: The paper studies optimal transport with prescribed sparsity. Specifically, based on the well known quadratic regularized optimal transport, the paper further constrains the cardinality of non-zeros entries of each column of the optimal plan. The problem of optimal transport with constrained sparsity is well mo...
The paper introduces concepts of benign forgetting and malignant forgetting in continual learning, and it conducts a study to discourage malignant forgetting and encourage benign forgetting. The performance of the proposed method is compared to previously proposed continual learning algorithms. (+) The paper proposes ...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: The paper introduces concepts of benign forgetting and malignant forgetting in continual learning, and it conducts a study to discourage malignant forgetting and encourage benign forgetting. The performance of the proposed method is compared to previously proposed continual learning algorithms. (+) The paper p...
In this paper, the authors propose a latent ODE model for irregularly sampled timeseries forecasting, where the dynamics in the latent space evolve according to a linear neural ODE. This is enabled by (1) a nonlinear encoder/decoder pair that maps the dynamics between the latent and observed space, and (2) a neural Kal...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: In this paper, the authors propose a latent ODE model for irregularly sampled timeseries forecasting, where the dynamics in the latent space evolve according to a linear neural ODE. This is enabled by (1) a nonlinear encoder/decoder pair that maps the dynamics between the latent and observed space, and (2) a ne...
This paper extends the prevalent GSM8K benchmark to a multilignual verison covering ten languages, and accordingly verify a recently proposed technique Chain-of-though upon it, resulting a best performance of 55 with the most competent LLM. The authors also verify such capability on established benchmark XCOPA, achiev...
Recommendation: 6: marginally above the acceptance threshold
Area: Applications (eg, speech processing, computer vision, NLP)
Review: This paper extends the prevalent GSM8K benchmark to a multilignual verison covering ten languages, and accordingly verify a recently proposed technique Chain-of-though upon it, resulting a best performance of 55 with the most competent LLM. The authors also verify such capability on established benchmark XCOPA...
This paper studies the problem of generating optimal task-oriented contrastive views in graph contrastive learning (GCL). Existing GCL methods find this problem challenging when the task-related semantics are incomplete in positive/negative views. For this problem, the authors propose G-CENSOR, which is a model-agnost...
Recommendation: 5: marginally below the acceptance threshold
Area: Deep Learning and representational learning
Review: This paper studies the problem of generating optimal task-oriented contrastive views in graph contrastive learning (GCL). Existing GCL methods find this problem challenging when the task-related semantics are incomplete in positive/negative views. For this problem, the authors propose G-CENSOR, which is a mode...
This work proposes new variants of relative positional encoding (PE) that are applicable for linear transformers - relative PE with unitary transformation (URPE). The proposed URPE variants preserve a linear time-space complexity, and demonstrates a comparable performance against the standard/vanilla transformer, acros...
Recommendation: 6: marginally above the acceptance threshold
Area: Deep Learning and representational learning
Review: This work proposes new variants of relative positional encoding (PE) that are applicable for linear transformers - relative PE with unitary transformation (URPE). The proposed URPE variants preserve a linear time-space complexity, and demonstrates a comparable performance against the standard/vanilla transforme...
This paper provides a new computational framework of the matrix local low rank representation (MLLRR), namely Random Probing based submatrix Propagation (RPSP). RPSP is the first method capable of handling the general MLLRM problem. Specifically, RPSP utilizes a random projection and GPU-based computation of singular v...
Recommendation: 5: marginally below the acceptance threshold
Area: General Machine Learning
Review: This paper provides a new computational framework of the matrix local low rank representation (MLLRR), namely Random Probing based submatrix Propagation (RPSP). RPSP is the first method capable of handling the general MLLRM problem. Specifically, RPSP utilizes a random projection and GPU-based computation of si...
This paper studies the vulnerability of actor-critic reinforcement learning in the context of membership inference attacks. The attacker aims to make inferences about the training environments based on the outcomes of an RL algorithm. From the attack perspective, this paper proposes CriticAttack, which examines the cor...
Recommendation: 5: marginally below the acceptance threshold
Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics)
Review: This paper studies the vulnerability of actor-critic reinforcement learning in the context of membership inference attacks. The attacker aims to make inferences about the training environments based on the outcomes of an RL algorithm. From the attack perspective, this paper proposes CriticAttack, which examines...