review stringlengths 5 16.6k | score stringclasses 5
values | area stringclasses 12
values | text stringlengths 31 5.65k |
|---|---|---|---|
Most of the recent work on language models for solving math word problems relies on prompting engineering. Instead, this paper studies how to finetune the language models for solving math word problems with outcome-based and process-based approaches. The paper develops two metrics: race error rate and final-answer err... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
Most of the recent work on language models for solving math word problems relies on prompting engineering. Instead, this paper studies how to finetune the language models for solving math word problems with outcome-based and process-based approaches. The paper develops two metrics: race error rate and final-an... |
This paper considers the HiP-MDPs where a set of low-dimensional hidden parameters models the variations in tasks, this setting is naturally applicable to settings with transfers. The main contribution of this paper is the theoretical analysis on the regret upper bounds of model and policy transfer algorithms, as well ... | Recommendation: 6: marginally above the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper considers the HiP-MDPs where a set of low-dimensional hidden parameters models the variations in tasks, this setting is naturally applicable to settings with transfers. The main contribution of this paper is the theoretical analysis on the regret upper bounds of model and policy transfer algorithms, ... |
The authors propose a technique based on topological data analysis to: 1. estimate pointwise the intrinsic dimensionality of the data manifold in the local neighbourhood, and 2. assess if the local neighbourhood resembles a Euclidean space with the same dimensionality. In this way, singularities on the data manifold ca... | Recommendation: 6: marginally above the acceptance threshold | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
The authors propose a technique based on topological data analysis to: 1. estimate pointwise the intrinsic dimensionality of the data manifold in the local neighbourhood, and 2. assess if the local neighbourhood resembles a Euclidean space with the same dimensionality. In this way, singularities on the data man... |
The paper analyzes parallel neural networks for nonparametric regression (including approximation error and regression error analysis). Suppose the regression function has nonhomogeneous regularities, e.g., Besov functions or functions of bounded variation. Parallel neural networks trained with weight decay achieves ne... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
The paper analyzes parallel neural networks for nonparametric regression (including approximation error and regression error analysis). Suppose the regression function has nonhomogeneous regularities, e.g., Besov functions or functions of bounded variation. Parallel neural networks trained with weight decay ach... |
This paper first formally analyze the vulnerability of optimal policies trained by safe RL algorithms under observational disturbance. By defining state-adversarial safe RL, this paper theoretically shows these optimal policies are vulnerable under observational adversarial attacks. Based on these analyses, this paper ... | Recommendation: 6: marginally above the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper first formally analyze the vulnerability of optimal policies trained by safe RL algorithms under observational disturbance. By defining state-adversarial safe RL, this paper theoretically shows these optimal policies are vulnerable under observational adversarial attacks. Based on these analyses, thi... |
This paper proposes to ensemble multiple pre-trained models with different architecture by estimating and thresholding p-value for out-of-distribution detection. Experimental results show the effectiveness of the proposed method.
Strengths
+ Theoretical analysis on the p-value looks interesting.
+ The proposed metho... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper proposes to ensemble multiple pre-trained models with different architecture by estimating and thresholding p-value for out-of-distribution detection. Experimental results show the effectiveness of the proposed method.
Strengths
+ Theoretical analysis on the p-value looks interesting.
+ The propos... |
The paper presents density sketches, which is a cheap and practical way to reduce data in a streaming setting., DS can keep a succint representation of data and can sample unseen data on the fly from this succint represesentation. This is done by reducing KDE into a problem related to histograms. The integrated mean sq... | Recommendation: 5: marginally below the acceptance threshold | Area: General Machine Learning | Review:
The paper presents density sketches, which is a cheap and practical way to reduce data in a streaming setting., DS can keep a succint representation of data and can sample unseen data on the fly from this succint represesentation. This is done by reducing KDE into a problem related to histograms. The integrated... |
This paper proposes semantic uncertainty, a new uncertainty estimation metric that operates on the meaning space of natural language sentences. Semantic uncertainty accounts for the invariance of the meaning of sentences against surface syntactic or linguistic styles. Formally, semantic uncertainty of an input context ... | Recommendation: 6: marginally above the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
This paper proposes semantic uncertainty, a new uncertainty estimation metric that operates on the meaning space of natural language sentences. Semantic uncertainty accounts for the invariance of the meaning of sentences against surface syntactic or linguistic styles. Formally, semantic uncertainty of an input ... |
The paper investigates grokking, i.e., the abrupt phase change in the performance of transformers when trained on simple algorithmic tasks, through the lens of mechanistic interpretability. It uses the insights gained to propose new progress measures that vary smoothly throughout training and thus provide new insights ... | Recommendation: 8: accept, good paper | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
The paper investigates grokking, i.e., the abrupt phase change in the performance of transformers when trained on simple algorithmic tasks, through the lens of mechanistic interpretability. It uses the insights gained to propose new progress measures that vary smoothly throughout training and thus provide new i... |
This paper proposes a method to make prompt proposals from repository-level context and add concatenate the prompt proposals with normal context to LLM in order to feed more related information to achieve better generations. The paper explores different sources of repository level prompts, as well as prompt context typ... | Recommendation: 5: marginally below the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper proposes a method to make prompt proposals from repository-level context and add concatenate the prompt proposals with normal context to LLM in order to feed more related information to achieve better generations. The paper explores different sources of repository level prompts, as well as prompt con... |
This paper focuses on the out-of-distribution detection task and proposes a new method called CIDER, which trains the model by optimizing a dispersion loss and a compactness loss. The compactness loss encourages samples to be close to their class prototypes while the dispersion loss encourages large angular distance am... | Recommendation: 6: marginally above the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
This paper focuses on the out-of-distribution detection task and proposes a new method called CIDER, which trains the model by optimizing a dispersion loss and a compactness loss. The compactness loss encourages samples to be close to their class prototypes while the dispersion loss encourages large angular dis... |
The paper provides a procedure for building better surrogate networks for transformer models fine-tuned to a specific downstream task that allows for faster MPC for private sharing with clients while preserving the model's performance (defined by model accuracy). To build a better surrogate, the authors propose a two-s... | Recommendation: 8: accept, good paper | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
The paper provides a procedure for building better surrogate networks for transformer models fine-tuned to a specific downstream task that allows for faster MPC for private sharing with clients while preserving the model's performance (defined by model accuracy). To build a better surrogate, the authors propose... |
This paper aims to tackle the partially observable few-shot learning problem where useful features are only contained in some of the views of a data instance. It develops a product of experts model to map different views to the representations with different uncertainty, which can capture the importance of different fe... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper aims to tackle the partially observable few-shot learning problem where useful features are only contained in some of the views of a data instance. It develops a product of experts model to map different views to the representations with different uncertainty, which can capture the importance of diff... |
This paper introduces a method for extracting compact and interpretable vector maps from input camera and lidar data. The method consists of three key components: a feature extractor, a map element predictor and a polyline generator. The feature extractor uses a CNN to extract features from the images and the point clo... | Recommendation: 6: marginally above the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper introduces a method for extracting compact and interpretable vector maps from input camera and lidar data. The method consists of three key components: a feature extractor, a map element predictor and a polyline generator. The feature extractor uses a CNN to extract features from the images and the p... |
The paper focuses on the empirical study of zero-shot RL, whose goal is to learn a set of policies and/or representations during training so that they can be adapted to solve unseen tasks in a zero-shot manner. Specifically, the authors focus on the successor features (SFs) framework and forward-backward (FB) represent... | Recommendation: 8: accept, good paper | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
The paper focuses on the empirical study of zero-shot RL, whose goal is to learn a set of policies and/or representations during training so that they can be adapted to solve unseen tasks in a zero-shot manner. Specifically, the authors focus on the successor features (SFs) framework and forward-backward (FB) r... |
In this paper, the authors introduce a methodology for pareto front sub-network identification from a supernetwork. This is done in a two step process, by first conducting fair subsampling of subnetworks for Nf epochs, followed by Pareto-Rank training for Np epochs. Sub-networks that are furthest from the pareto front... | Recommendation: 5: marginally below the acceptance threshold | Area: Optimization (eg, convex and non-convex optimization) | Review:
In this paper, the authors introduce a methodology for pareto front sub-network identification from a supernetwork. This is done in a two step process, by first conducting fair subsampling of subnetworks for Nf epochs, followed by Pareto-Rank training for Np epochs. Sub-networks that are furthest from the pare... |
The authors propose a novel adversarial attack strategy for discrete-time graph neural networks (GNNs). The objective is to perturb the sequence of graphs to decrease accuracy on prediction tasks such as dynamic link prediction and node classification. To preserve temporal dynamics of the graph to avoid detection, the ... | Recommendation: 6: marginally above the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
The authors propose a novel adversarial attack strategy for discrete-time graph neural networks (GNNs). The objective is to perturb the sequence of graphs to decrease accuracy on prediction tasks such as dynamic link prediction and node classification. To preserve temporal dynamics of the graph to avoid detecti... |
The paper presents a novel representation learning method inspired by energy-based generative models, which can be combined with different restoration tasks as self-supervised surrogate tasks. Specifically, a neural network-based energy function is learned which assigns a high energy to corrupted images, and a low ener... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
The paper presents a novel representation learning method inspired by energy-based generative models, which can be combined with different restoration tasks as self-supervised surrogate tasks. Specifically, a neural network-based energy function is learned which assigns a high energy to corrupted images, and a ... |
Inspired by Regularized Lottery Ticket Hypothesis, which hypothesizes that smooth subnetworks exist within a dense network, this paper propose Soft-SubNetworks (SoftNet), an incremental learning strategy that preserves the learned class knowledge and learns the newer ones. The SoftNet jointly learns the model weights a... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
Inspired by Regularized Lottery Ticket Hypothesis, which hypothesizes that smooth subnetworks exist within a dense network, this paper propose Soft-SubNetworks (SoftNet), an incremental learning strategy that preserves the learned class knowledge and learns the newer ones. The SoftNet jointly learns the model w... |
This paper introduces a sequential node matching scheme for graph matching, via deep reinforcement learning.
The proposed scheme differs from the majority of existing works that obtain the whole matching in one shot.
The main effectiveness of the proposed method seems to lie in handling outliers.
Experiments on both... | Recommendation: 6: marginally above the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper introduces a sequential node matching scheme for graph matching, via deep reinforcement learning.
The proposed scheme differs from the majority of existing works that obtain the whole matching in one shot.
The main effectiveness of the proposed method seems to lie in handling outliers.
Experiments... |
The paper studies the problem of estimating individual treatment effects (ITE) under unobserved confounding using binary instruments. The paper starts with discussing conditions under which the ITE is identifiable. It then proceeds with proposing a two-stage meta learner (MRIV) that estimates the ITE. In the first stag... | Recommendation: 6: marginally above the acceptance threshold | Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes) | Review:
The paper studies the problem of estimating individual treatment effects (ITE) under unobserved confounding using binary instruments. The paper starts with discussing conditions under which the ITE is identifiable. It then proceeds with proposing a two-stage meta learner (MRIV) that estimates the ITE. In the fi... |
The authors proposed a three-player GAN-based model called PGASL for class-inbalanced data. The model was tested against several existing models for class-imbalanced data using two text datasets and showed superior performance.
Strength
- The proposed strategy seems straightforward.
Weaknesses
- Why was the model t... | Recommendation: 3: reject, not good enough | Area: General Machine Learning | Review:
The authors proposed a three-player GAN-based model called PGASL for class-inbalanced data. The model was tested against several existing models for class-imbalanced data using two text datasets and showed superior performance.
Strength
- The proposed strategy seems straightforward.
Weaknesses
- Why was the... |
This paper considers the problem of representation learning for bag-of-words count data, trying to understand the usefulness of recent self-supervised learning, including reconstruction objectives (Eq 1) and contrastive objectives (Eq 2). The key question is: why might these approaches be better than previous ones? The... | Recommendation: 6: marginally above the acceptance threshold | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
This paper considers the problem of representation learning for bag-of-words count data, trying to understand the usefulness of recent self-supervised learning, including reconstruction objectives (Eq 1) and contrastive objectives (Eq 2). The key question is: why might these approaches be better than previous o... |
The paper proposes a modification of TRADES, one of the most popular algorithms to obtain adversarially robust classifiers, to improve its performance: in particular, the regularization term to achieve robustness is weighted to penalize more the training examples which are less robust. In the experimental evaluation on... | Recommendation: 6: marginally above the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
The paper proposes a modification of TRADES, one of the most popular algorithms to obtain adversarially robust classifiers, to improve its performance: in particular, the regularization term to achieve robustness is weighted to penalize more the training examples which are less robust. In the experimental evalu... |
This article presents a new loss (KFIoU) approximating the Skew Intersection over Union Loss (SkewIoU) for the rotated object detection problem. This loss is composed of a scale-insensitive center point loss, and a second distance-insensitive term using Gaussian modeling
and Kalman filtering. Compared to other Gaussian... | Recommendation: 6: marginally above the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This article presents a new loss (KFIoU) approximating the Skew Intersection over Union Loss (SkewIoU) for the rotated object detection problem. This loss is composed of a scale-insensitive center point loss, and a second distance-insensitive term using Gaussian modeling
and Kalman filtering. Compared to other ... |
The paper proposes a progressive data dropout (PDD) framework that gradually discards the majority of the samples for already-accurate classes, in order to speedup the training. There are other design choices including warmup, residue and swapout. Experiments on MNIST, CIFAR, SVHN and ImageNet are performed.
Strengths:... | Recommendation: 3: reject, not good enough | Area: General Machine Learning | Review:
The paper proposes a progressive data dropout (PDD) framework that gradually discards the majority of the samples for already-accurate classes, in order to speedup the training. There are other design choices including warmup, residue and swapout. Experiments on MNIST, CIFAR, SVHN and ImageNet are performed.
St... |
The submission presents an algorithm for learning decision trees with logistic regression models at the leaf nodes. It initially considers soft splits and estimation of the model using expectation maximization before proceeding to more interpretable hard splits and a stochastic expectation maximization algorithm for le... | Recommendation: 3: reject, not good enough | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
The submission presents an algorithm for learning decision trees with logistic regression models at the leaf nodes. It initially considers soft splits and estimation of the model using expectation maximization before proceeding to more interpretable hard splits and a stochastic expectation maximization algorith... |
This paper studies offline reinforcement learning with heterogeneous data sources. The paper propose a new algorithm applying pessimism to handle the randomness from both the sample and the source. It proves the sample efficiency of such an algorithm. The theoretical analysis is based on tabular and linear MDPs.
Streng... | Recommendation: 3: reject, not good enough | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper studies offline reinforcement learning with heterogeneous data sources. The paper propose a new algorithm applying pessimism to handle the randomness from both the sample and the source. It proves the sample efficiency of such an algorithm. The theoretical analysis is based on tabular and linear MDPs... |
This work presents a novel method for the co-design of 1D sequence and 3D structures of antibody proteins that can bind to the target antigen. The method proposes to include the target antigen and the light chain of the antibody as additional conditions, and designs a novel E(3)-equivariant network to predict the amino... | Recommendation: 8: accept, good paper | Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability ) | Review:
This work presents a novel method for the co-design of 1D sequence and 3D structures of antibody proteins that can bind to the target antigen. The method proposes to include the target antigen and the light chain of the antibody as additional conditions, and designs a novel E(3)-equivariant network to predict t... |
This paper proposed a replay buffer strategy to help model-based RL models effectively adapt to local changes in the environment. When local changes happen, the traditional first-in-first-out (FIFO) data buffer will interfere with the model training due to the out-of-data samples still being stored in the buffer. To fi... | Recommendation: 5: marginally below the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper proposed a replay buffer strategy to help model-based RL models effectively adapt to local changes in the environment. When local changes happen, the traditional first-in-first-out (FIFO) data buffer will interfere with the model training due to the out-of-data samples still being stored in the buffe... |
This paper is in the realm of generalizable reward learning and the aim is to learn value-discriminative visual representation from a diverse set of human manipulation demonstrations by contrasting conditioned on goals. The learned representation is used for constructing reward as similarity in embedded space between a... | Recommendation: 6: marginally above the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper is in the realm of generalizable reward learning and the aim is to learn value-discriminative visual representation from a diverse set of human manipulation demonstrations by contrasting conditioned on goals. The learned representation is used for constructing reward as similarity in embedded space b... |
## Overview
In this paper, PIXEL, a pixel-based encoder of language is introduced to circumvent the vocabulary bottleneck problem. PIXEL is built on ViT-MAE and is pretrained on the same corpus as BERT. Specifically, the authors proposed to render text onto blank images and patchify raw pixels into image tokens and mas... | Recommendation: 8: accept, good paper | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
## Overview
In this paper, PIXEL, a pixel-based encoder of language is introduced to circumvent the vocabulary bottleneck problem. PIXEL is built on ViT-MAE and is pretrained on the same corpus as BERT. Specifically, the authors proposed to render text onto blank images and patchify raw pixels into image tokens... |
The authors propose using using hitting times, commute times and resistive embeddings as features in a GNN. They show that using using this makes the network more powerful than 1-WL. They also show that this can be approximated by sketching techniques in large graphs. Then they show that empirically these networks do b... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
The authors propose using using hitting times, commute times and resistive embeddings as features in a GNN. They show that using using this makes the network more powerful than 1-WL. They also show that this can be approximated by sketching techniques in large graphs. Then they show that empirically these netwo... |
This paper studies where (weak) prior learning can and can’t work in unsupervised inverse problems, by considering dictionary learning in a conventional model as well as convolutional dictionary learning. Inpainting and deblurring asks are addressed in this work.
Weakness: this paper is roughly an extension of the wor... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper studies where (weak) prior learning can and can’t work in unsupervised inverse problems, by considering dictionary learning in a conventional model as well as convolutional dictionary learning. Inpainting and deblurring asks are addressed in this work.
Weakness: this paper is roughly an extension of... |
The authors consider the definition of unlearning developed in previous work. The paper claims that these definitions do not satisfy the true meaning of unlearning as data could be added back in at later points in time. To this end, the propose that the new definition should be stateless and algorithms for deletion and... | Recommendation: 6: marginally above the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
The authors consider the definition of unlearning developed in previous work. The paper claims that these definitions do not satisfy the true meaning of unlearning as data could be added back in at later points in time. To this end, the propose that the new definition should be stateless and algorithms for dele... |
An important research question in neural computing is the interplay between Batch Normalization (BN) and learning. In this vein, this paper studies the influence of BN on gradient norm across the layers. BN causes an exponential growth with depth for the norm of a gradient in the first layer. When studying this phenom... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
An important research question in neural computing is the interplay between Batch Normalization (BN) and learning. In this vein, this paper studies the influence of BN on gradient norm across the layers. BN causes an exponential growth with depth for the norm of a gradient in the first layer. When studying thi... |
This work introduced a new setting of few-shot supervised mulit-source domain adaptation with a few labeled target samples and labeled multiple source domain data. Under this new setting, they proposed a progressive mix-up method for few-shot supervised multi-source domain transfer. Specifically, it creates an intermed... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This work introduced a new setting of few-shot supervised mulit-source domain adaptation with a few labeled target samples and labeled multiple source domain data. Under this new setting, they proposed a progressive mix-up method for few-shot supervised multi-source domain transfer. Specifically, it creates an ... |
This paper proposes to learn a new exploration technique to learn a symbolic model of an environment. This model is then used to speed up goal directed exploration. The proposed technique is then evaluated against Q-learning with epsilon-greedy and R-max as well as a hierarchical RL method. Experiments are done on bloc... | Recommendation: 3: reject, not good enough | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper proposes to learn a new exploration technique to learn a symbolic model of an environment. This model is then used to speed up goal directed exploration. The proposed technique is then evaluated against Q-learning with epsilon-greedy and R-max as well as a hierarchical RL method. Experiments are done... |
This paper proposes to find salient features of images of the target class in the encoded latent space with an auto-encoder, perturb the source image in its encoded representations with a learned mask, and decode the representation to form poisoned data for dirty-label data poisoning. Mask learning is performed with a ... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
This paper proposes to find salient features of images of the target class in the encoded latent space with an auto-encoder, perturb the source image in its encoded representations with a learned mask, and decode the representation to form poisoned data for dirty-label data poisoning. Mask learning is performed... |
This paper proposed an automated data augmentation method for fair graph representation learning. This seems to be the first automated graph data augmentation method that focuses on learning fair representations on graph data. The authors designed the Graphair framework with four components: edge augmentation, feature ... | Recommendation: 6: marginally above the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
This paper proposed an automated data augmentation method for fair graph representation learning. This seems to be the first automated graph data augmentation method that focuses on learning fair representations on graph data. The authors designed the Graphair framework with four components: edge augmentation, ... |
The work presents a memory network-based autoencoder method for unsupervised anomaly detection, in which random forgetting gates and top-k prototype selection functions are used to regularize the autoencoder networks to avoid overfitting.
Strengths.
- The studied problem - having small reconstruction errors in reconst... | Recommendation: 3: reject, not good enough | Area: General Machine Learning | Review:
The work presents a memory network-based autoencoder method for unsupervised anomaly detection, in which random forgetting gates and top-k prototype selection functions are used to regularize the autoencoder networks to avoid overfitting.
Strengths.
- The studied problem - having small reconstruction errors in... |
This paper proposes the use of joint masking for vision and language for learning representations from text and images. The proposed approach is tested on multiple tasks and achieves state-of-the-art results especially in the case of limited training data.
Strengths
The paper is well written and easy to follow.
An in... | Recommendation: 8: accept, good paper | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper proposes the use of joint masking for vision and language for learning representations from text and images. The proposed approach is tested on multiple tasks and achieves state-of-the-art results especially in the case of limited training data.
Strengths
The paper is well written and easy to follow.... |
The paper proposes to use EP together with approximate inference methods for federated learning. The approach shows promising results on toy examples and real data. The method works with any approximate inference methods, and different choices are evaluated and compared.
Strengths:
- I found the toy experiment in Sec... | Recommendation: 6: marginally above the acceptance threshold | Area: General Machine Learning | Review:
The paper proposes to use EP together with approximate inference methods for federated learning. The approach shows promising results on toy examples and real data. The method works with any approximate inference methods, and different choices are evaluated and compared.
Strengths:
- I found the toy experimen... |
This paper studies the problem of vanishing gradient and over-smoothing in graph neural networks which is highly related to the deep GNN training. This paper proposes two tricks into existing GNN layers named: Weight-Decaying Graph Residual Connection module (WDG-ResNet) and Topology-Guided Graph Contrastive Loss (TGCL... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper studies the problem of vanishing gradient and over-smoothing in graph neural networks which is highly related to the deep GNN training. This paper proposes two tricks into existing GNN layers named: Weight-Decaying Graph Residual Connection module (WDG-ResNet) and Topology-Guided Graph Contrastive Lo... |
This paper introduces a new dataset of probabilistic dynamic stability of synthetic power grids which is much larger than the existing datasets. Moreover, it also includes a Texan power grid model alongside with the dataset. Second, this paper also proposes a new method to identify the nodes which could be the one lead... | Recommendation: 5: marginally below the acceptance threshold | Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability ) | Review:
This paper introduces a new dataset of probabilistic dynamic stability of synthetic power grids which is much larger than the existing datasets. Moreover, it also includes a Texan power grid model alongside with the dataset. Second, this paper also proposes a new method to identify the nodes which could be the ... |
This paper analyzes gradient boosting ensembles and shows that they can be understood as a kernel method that is indeed finding the solution to an optimization problem that converges to the posterior mean of a Gaussian process. Using the technique known as sample-first-then-optimize the considered method can... | Recommendation: 6: marginally above the acceptance threshold | Area: Probabilistic Methods (eg, variational inference, causal inference, Gaussian processes) | Review:
This paper analyzes gradient boosting ensembles and shows that they can be understood as a kernel method that is indeed finding the solution to an optimization problem that converges to the posterior mean of a Gaussian process. Using the technique known as sample-first-then-optimize the considered me... |
This paper proposes a method to prune deep neural networks. The motivation of this work is to consider DATA FLOW DRIVEN PRUNING OF COUPLED CHANNELS (DFPC), which considers the coupled channels (CCs) in a data-free mode when conducting network pruning. The key part of this work is developing a method called DFCs that a... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper proposes a method to prune deep neural networks. The motivation of this work is to consider DATA FLOW DRIVEN PRUNING OF COUPLED CHANNELS (DFPC), which considers the coupled channels (CCs) in a data-free mode when conducting network pruning. The key part of this work is developing a method called DFC... |
In this paper, the authors aim to employ OOD data to improve self-supervised learning in the long-tailed setting. To achieve that, they use tailness score estimation, dynamic sampling strategies, and additional contrastive losses for long-tailed learning with additional OOD samples. The authors conduct experiments on... | Recommendation: 6: marginally above the acceptance threshold | Area: Unsupervised and Self-supervised learning | Review:
In this paper, the authors aim to employ OOD data to improve self-supervised learning in the long-tailed setting. To achieve that, they use tailness score estimation, dynamic sampling strategies, and additional contrastive losses for long-tailed learning with additional OOD samples. The authors conduct experi... |
The paper considers the use of tensor decomposition (TD) for compression of the weight tensors in CNNs. It considers the problem of choosing the best compression hyperparameters (which layer to compress, which type of TD to use) for a given level of compression. In particular, it investigates if the decomposition error... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
The paper considers the use of tensor decomposition (TD) for compression of the weight tensors in CNNs. It considers the problem of choosing the best compression hyperparameters (which layer to compress, which type of TD to use) for a given level of compression. In particular, it investigates if the decompositi... |
Adversarial attack is a common issue in traditional ML models against malicious adversary. Randomized smoothing is a sota method to tackle the issue. However, computing exact probability over the smoothing neighborhood is computationally expensive. Instead, sampling is required to estimate the probability. This work fo... | Recommendation: 6: marginally above the acceptance threshold | Area: General Machine Learning | Review:
Adversarial attack is a common issue in traditional ML models against malicious adversary. Randomized smoothing is a sota method to tackle the issue. However, computing exact probability over the smoothing neighborhood is computationally expensive. Instead, sampling is required to estimate the probability. This... |
The authors study the problem of constrained DRO, and proposed a dual-free algorithm for solving the robust optimization problem, and hence the per-iteration complexity is independent of the sample size.
The algorithm for solving the constrained DRO doesn't use dual information and hence enjoys per-iteration complexit... | Recommendation: 8: accept, good paper | Area: Optimization (eg, convex and non-convex optimization) | Review:
The authors study the problem of constrained DRO, and proposed a dual-free algorithm for solving the robust optimization problem, and hence the per-iteration complexity is independent of the sample size.
The algorithm for solving the constrained DRO doesn't use dual information and hence enjoys per-iteration c... |
Gradient inversion in federated learning is often constrained by the lack of labels. Current label restoration methods are limited to class-wise label restoration, which is to infer the presence of a category. This paper introduces a new method to infer instance-wise labels in federated learning, i.e., the number of in... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
Gradient inversion in federated learning is often constrained by the lack of labels. Current label restoration methods are limited to class-wise label restoration, which is to infer the presence of a category. This paper introduces a new method to infer instance-wise labels in federated learning, i.e., the numb... |
This paper studies how the quality of embedding affects the performance of GNNs. The authors selected two types of data, images and texts, and tested different embedding extraction techniques. Then a general framework Graph-connected Network (GraNet) is proposed to combine GNNs and unconnected models to better learn em... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
This paper studies how the quality of embedding affects the performance of GNNs. The authors selected two types of data, images and texts, and tested different embedding extraction techniques. Then a general framework Graph-connected Network (GraNet) is proposed to combine GNNs and unconnected models to better ... |
This paper introduces NEWS-COPY, a manually-annotated dataset of 27k documents in the news domain, to study de-duplication. The authors show that two neural approaches (bi-encoder and re-ranking) significantly outperform hashing and n-gram overlap on this dataset, despite the latter being more widely used in the litera... | Recommendation: 6: marginally above the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper introduces NEWS-COPY, a manually-annotated dataset of 27k documents in the news domain, to study de-duplication. The authors show that two neural approaches (bi-encoder and re-ranking) significantly outperform hashing and n-gram overlap on this dataset, despite the latter being more widely used in th... |
This paper theoretically analyzed the reason why transformers could outperform fully-connected NNs in NLP tasks.
This paper claimed that the transformer could avoid the curse of dimensionality and accomplish a minimax optimal rate in a setting where the target function takes fixed-length input and belongs to Besov spac... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper theoretically analyzed the reason why transformers could outperform fully-connected NNs in NLP tasks.
This paper claimed that the transformer could avoid the curse of dimensionality and accomplish a minimax optimal rate in a setting where the target function takes fixed-length input and belongs to Be... |
This paper proposes a method to attack against models defended by randomized smoothing, and identify smaller adversarial perturbations for smoothed classifier than previous methods.
Strength:
1) Propose a novel method to attack randomized smoothing/
2) Achieve state-of-the-art performance compared with previous atta... | Recommendation: 5: marginally below the acceptance threshold | Area: General Machine Learning | Review:
This paper proposes a method to attack against models defended by randomized smoothing, and identify smaller adversarial perturbations for smoothed classifier than previous methods.
Strength:
1) Propose a novel method to attack randomized smoothing/
2) Achieve state-of-the-art performance compared with previ... |
This work performs a detailed investigation into the training process and qualities of a black-box meta-learning algorithm in a 'general-purpose learning' framework.
The focus is on a setup where the data is a collection of 'tasks', that consist of a sequence of (input, label) pairs for which the learner needs to predi... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This work performs a detailed investigation into the training process and qualities of a black-box meta-learning algorithm in a 'general-purpose learning' framework.
The focus is on a setup where the data is a collection of 'tasks', that consist of a sequence of (input, label) pairs for which the learner needs ... |
This work proposes a novel method for advancing recommender system with a lightweight and effective graph contrastive learning paradigm. The proposed method is technically sound from a novel perspective of efficient SVD-guided graph augmentation. To demonstrate the effectiveness of the new framework, 10 baselines are c... | Recommendation: 8: accept, good paper | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This work proposes a novel method for advancing recommender system with a lightweight and effective graph contrastive learning paradigm. The proposed method is technically sound from a novel perspective of efficient SVD-guided graph augmentation. To demonstrate the effectiveness of the new framework, 10 baselin... |
This provides us with expected generalization and excess risk guarantees for symmetric, deterministic algorithms on smooth loss functions. These bounds depend on the $\ell_2$ expected output stability, the expected optimization error, and the model capacity (hence, Theorem 3 and its proof are interesting contributions)... | Recommendation: 8: accept, good paper | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
This provides us with expected generalization and excess risk guarantees for symmetric, deterministic algorithms on smooth loss functions. These bounds depend on the $\ell_2$ expected output stability, the expected optimization error, and the model capacity (hence, Theorem 3 and its proof are interesting contri... |
This paper proposes the mixture-of-denoisers as the training objective for pertained language models. The mixture consists of two types of denoising pradigms of different noise configurations and a prefix language model-like next token prediction. Authors hint that each paradigm is suitable for a particular kind of dow... | Recommendation: 3: reject, not good enough | Area: Deep Learning and representational learning | Review:
This paper proposes the mixture-of-denoisers as the training objective for pertained language models. The mixture consists of two types of denoising pradigms of different noise configurations and a prefix language model-like next token prediction. Authors hint that each paradigm is suitable for a particular kin... |
This paper addresses the problem of compressing the client-to-server model updates in a Federated Learning (FL) setup implementing secure aggregation (SecAgg) protocols.
First, the paper discusses the incompatibility of standard compression methods (scalar quantization, pruning, and product quantization) with secure... | Recommendation: 3: reject, not good enough | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
This paper addresses the problem of compressing the client-to-server model updates in a Federated Learning (FL) setup implementing secure aggregation (SecAgg) protocols.
First, the paper discusses the incompatibility of standard compression methods (scalar quantization, pruning, and product quantization) wit... |
This paper proposed a novel group entanglement method under the concern of conditional shift in dataset. In the paper, the author argues that under the conditional shift, the group representation and instance representation cannot be inferred independently since the instance distribution is confounded by the group iden... | Recommendation: 3: reject, not good enough | Area: Unsupervised and Self-supervised learning | Review:
This paper proposed a novel group entanglement method under the concern of conditional shift in dataset. In the paper, the author argues that under the conditional shift, the group representation and instance representation cannot be inferred independently since the instance distribution is confounded by the gr... |
This paper looks into whether carefully making design choices for Offline RL training objectives can have similar power law scaling to supervised learning.
Strength
- The paper is very well-written.
- Design choices are well-explained and motivated.
- Experiments/ablations are abundant, and experimental results are co... | Recommendation: 8: accept, good paper | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper looks into whether carefully making design choices for Offline RL training objectives can have similar power law scaling to supervised learning.
Strength
- The paper is very well-written.
- Design choices are well-explained and motivated.
- Experiments/ablations are abundant, and experimental result... |
This work proposes a series of modifications to the MobileViT V1 and V2 architectures. It introduces a few tweaks to the original model architecture, including replacing regular conv by depthwise conv to reduce latency, using 1x1 conv instead of 3x3 conv to reduce number of parameters, and adding residual connection in... | Recommendation: 3: reject, not good enough | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This work proposes a series of modifications to the MobileViT V1 and V2 architectures. It introduces a few tweaks to the original model architecture, including replacing regular conv by depthwise conv to reduce latency, using 1x1 conv instead of 3x3 conv to reduce number of parameters, and adding residual conne... |
The paper proposes a new method leveraging equivariant deep learning to approximate hypervolume calculation in multi-objective optimization (DeepHV). The authors first introduce important concepts in multi-objective optimization, such as problem formulation and the Pareto optimality. The authors then describe current h... | Recommendation: 6: marginally above the acceptance threshold | Area: Optimization (eg, convex and non-convex optimization) | Review:
The paper proposes a new method leveraging equivariant deep learning to approximate hypervolume calculation in multi-objective optimization (DeepHV). The authors first introduce important concepts in multi-objective optimization, such as problem formulation and the Pareto optimality. The authors then describe c... |
This paper mainly focuses on combining the strengths of Transformer and NMN by introducing a novel NMN based on compositions of Transformer modules named Transformer Module Network (TMN). The model is evaluated on CLEVR-CoGenT, CLOSURE, and GQA-SGL.
*[Strength]*
The motivation that combining the strength of NMN and Tr... | Recommendation: 5: marginally below the acceptance threshold | Area: Neuroscience and Cognitive Science (e.g., neural coding, brain-computer interfaces) | Review:
This paper mainly focuses on combining the strengths of Transformer and NMN by introducing a novel NMN based on compositions of Transformer modules named Transformer Module Network (TMN). The model is evaluated on CLEVR-CoGenT, CLOSURE, and GQA-SGL.
*[Strength]*
The motivation that combining the strength of NM... |
This work studies Actionable Recourse (AR) and proposes to incorporate user preferences as constraints into the recourse generation process. The authors propose three forms of user preferences: scoring continuous features, bounding feature values, and ranking categorical features. An optimization approach is provided t... | Recommendation: 6: marginally above the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
This work studies Actionable Recourse (AR) and proposes to incorporate user preferences as constraints into the recourse generation process. The authors propose three forms of user preferences: scoring continuous features, bounding feature values, and ranking categorical features. An optimization approach is pr... |
The authors target to detect the input masks that extract the minimal backdoor patterns that lead to the model output. They further leverage the learned masks to detect and remove backdoor samples from poisoned datasets. Experiments show that they can detect several backdoor attacks and help detect biases from face dat... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
The authors target to detect the input masks that extract the minimal backdoor patterns that lead to the model output. They further leverage the learned masks to detect and remove backdoor samples from poisoned datasets. Experiments show that they can detect several backdoor attacks and help detect biases from ... |
This paper introduces a new approach, ORCA, to tackle the cross-model transfer problem. ORCA equips a pre-trained transformer with a task-specific embedder and a task-specific predictor. When facing a downstream task, the embedder is learned to map data of any dimension to a standard sequence of tokens that is then fed... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
This paper introduces a new approach, ORCA, to tackle the cross-model transfer problem. ORCA equips a pre-trained transformer with a task-specific embedder and a task-specific predictor. When facing a downstream task, the embedder is learned to map data of any dimension to a standard sequence of tokens that is ... |
The paper presented a method for learning talking head generation/reenactment. Specifically, the paper proposed a memory bank based architecture to address the inconsistency caused by varying shape/appearance of source and driving signals. A learnable external prior is introduced to learn and store the shape/appearance... | Recommendation: 6: marginally above the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
The paper presented a method for learning talking head generation/reenactment. Specifically, the paper proposed a memory bank based architecture to address the inconsistency caused by varying shape/appearance of source and driving signals. A learnable external prior is introduced to learn and store the shape/ap... |
The paper discusses heterogeneous label noise in federated learning and proposes two ways to introduce this noise into the system. The paper further develops a dual-model structure with three possible variations to tackle the label noise issue. The paper follows up with experimental results for six models based on the ... | Recommendation: 5: marginally below the acceptance threshold | Area: General Machine Learning | Review:
The paper discusses heterogeneous label noise in federated learning and proposes two ways to introduce this noise into the system. The paper further develops a dual-model structure with three possible variations to tackle the label noise issue. The paper follows up with experimental results for six models based... |
The paper propose a trigger reverse engineering based defense and show that the method can achieve robustness improvement with guarantee (i.e., reducing the attack success rate) without affecting benign accuracy. The paper conducts comprehensive experiments across different datasets and attack settings. The results on ... | Recommendation: 6: marginally above the acceptance threshold | Area: General Machine Learning | Review:
The paper propose a trigger reverse engineering based defense and show that the method can achieve robustness improvement with guarantee (i.e., reducing the attack success rate) without affecting benign accuracy. The paper conducts comprehensive experiments across different datasets and attack settings. The res... |
This paper proposes a Movable Object Radiance Fields, by using the EISEN method to generate object masks and processing object and background separately. Comparing with uORF and PixelNeRF methods on three self-generated datasets, the authors show that the proposed method can extract accurate object geometry and has hig... | Recommendation: 3: reject, not good enough | Area: Unsupervised and Self-supervised learning | Review:
This paper proposes a Movable Object Radiance Fields, by using the EISEN method to generate object masks and processing object and background separately. Comparing with uORF and PixelNeRF methods on three self-generated datasets, the authors show that the proposed method can extract accurate object geometry and... |
This paper uses the spectral decomposition perspective to study the expressive power of GNNs. It argues that the 1-WL is not the real limit of GNN expressiveness. Instead, it only serves as the limit when we use all-one vectors as input features. Further, this paper proposes a new model, which uses features derived fro... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper uses the spectral decomposition perspective to study the expressive power of GNNs. It argues that the 1-WL is not the real limit of GNN expressiveness. Instead, it only serves as the limit when we use all-one vectors as input features. Further, this paper proposes a new model, which uses features der... |
-Proposes gap-dependent bounds on adaptive pure exploration algorithms.
-Algorithms do not require prior knowledge of causal inference distributions.
-Allows combinatorial interventions.
-Applicable to causal graphs with hidden variables.
-Studies sample complexity in both fixed confidence and fixed budget setti... | Recommendation: 8: accept, good paper | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
-Proposes gap-dependent bounds on adaptive pure exploration algorithms.
-Algorithms do not require prior knowledge of causal inference distributions.
-Allows combinatorial interventions.
-Applicable to causal graphs with hidden variables.
-Studies sample complexity in both fixed confidence and fixed budg... |
This paper attempts to study the generalisation properties of one-dimensional ReLU networks directly, instead of via the usual VC-dimension or Rademacher complexity-type bounds.
To this end, they *geometrically* characterise the space of one-layer ReLU networks with a single linear unit, which *fit* a given dataset $... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
This paper attempts to study the generalisation properties of one-dimensional ReLU networks directly, instead of via the usual VC-dimension or Rademacher complexity-type bounds.
To this end, they *geometrically* characterise the space of one-layer ReLU networks with a single linear unit, which *fit* a given d... |
This paper addresses the overs-moothing problem of graph neural network (GNN) and Transformers, and proposes to avoid the dimensional collapses in the representation, borrowing the idea from self-supervised learning. It thus proposes a normalization layer ContraNorm, which aims to learn a more uniform distribution in t... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper addresses the overs-moothing problem of graph neural network (GNN) and Transformers, and proposes to avoid the dimensional collapses in the representation, borrowing the idea from self-supervised learning. It thus proposes a normalization layer ContraNorm, which aims to learn a more uniform distribut... |
This paper aims to accelerate and improve goal-conditioned RL. The main contribution is the continuous goal sampling technique proposed. The idea is very simple. Instead of sampling a goal only at the start of an episode, we can sample a new goal every fixed number of timesteps within an episode. The second contributio... | Recommendation: 5: marginally below the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper aims to accelerate and improve goal-conditioned RL. The main contribution is the continuous goal sampling technique proposed. The idea is very simple. Instead of sampling a goal only at the start of an episode, we can sample a new goal every fixed number of timesteps within an episode. The second con... |
This paper presents a scheme of policy expansion (PEX) to bridge offline and online RL. Instead of directly fine-tuning the policy learned by offline dataset during online interaction, PEX freezes the learned policy and expands the policy set with a newly added policy. This new policy is optimized during the online lea... | Recommendation: 6: marginally above the acceptance threshold | Area: Reinforcement Learning (eg, decision and control, planning, hierarchical RL, robotics) | Review:
This paper presents a scheme of policy expansion (PEX) to bridge offline and online RL. Instead of directly fine-tuning the policy learned by offline dataset during online interaction, PEX freezes the learned policy and expands the policy set with a newly added policy. This new policy is optimized during the on... |
This work tackles the problem of using a injective and continuous set function as a neighborhood aggregation scheme in GNNs. The authors prove that such a construction exists (by extending some results from DeepSets) and how it would look like in GNNs. Finally, they present the practical benefits of such design in a se... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
This work tackles the problem of using a injective and continuous set function as a neighborhood aggregation scheme in GNNs. The authors prove that such a construction exists (by extending some results from DeepSets) and how it would look like in GNNs. Finally, they present the practical benefits of such design... |
This paper proposes an equivariance regularizer as a modification to the usual invariance-inducing self-supervised losses. This is an interesting approach to enabling equivariance as there is no need to have a special architecture as prior work. The authors are able to train multiple self-supervised losses on a standar... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
This paper proposes an equivariance regularizer as a modification to the usual invariance-inducing self-supervised losses. This is an interesting approach to enabling equivariance as there is no need to have a special architecture as prior work. The authors are able to train multiple self-supervised losses on a... |
Based on the knowledge structure fact, this paper proposes a logic-aware pre-trained language model PROPHET, which can then learn logical relations more generally from larger corpus. Extract fact from a given syntax to leverage multidimensional logical information for better representation. In this paper, three new pre... | Recommendation: 5: marginally below the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
Based on the knowledge structure fact, this paper proposes a logic-aware pre-trained language model PROPHET, which can then learn logical relations more generally from larger corpus. Extract fact from a given syntax to leverage multidimensional logical information for better representation. In this paper, three... |
The paper considers the problem of a contextual bandit with both a high-dimensional action space and a high-dimensional covariate space. The author(s) propose a new bandit model describing the aforementioned problem, and provide a learning algorithm under the model. Theoretical results are developed for the algorithm ... | Recommendation: 3: reject, not good enough | Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability ) | Review:
The paper considers the problem of a contextual bandit with both a high-dimensional action space and a high-dimensional covariate space. The author(s) propose a new bandit model describing the aforementioned problem, and provide a learning algorithm under the model. Theoretical results are developed for the al... |
Paper introduces a many-domain generalization approach, a siamese-type architecture that takes in paired samples from the same domain (e.g. patient) which learns sample as well as domain embedding and in the end predicts the label. The architecture is trained through optimization of a 4-part objective which aims to 1) ... | Recommendation: 8: accept, good paper | Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability ) | Review:
Paper introduces a many-domain generalization approach, a siamese-type architecture that takes in paired samples from the same domain (e.g. patient) which learns sample as well as domain embedding and in the end predicts the label. The architecture is trained through optimization of a 4-part objective which aim... |
This work focuses on a practical challenge that deep learning models cannot remain stable performance when being deployed in real-world environments. For this problem, the author(s) defines three objectives, i.e., target domain generalization, target domain adaptation and forgetting alleviation. To achieve these object... | Recommendation: 8: accept, good paper | Area: Deep Learning and representational learning | Review:
This work focuses on a practical challenge that deep learning models cannot remain stable performance when being deployed in real-world environments. For this problem, the author(s) defines three objectives, i.e., target domain generalization, target domain adaptation and forgetting alleviation. To achieve thes... |
The author has discussed the issue of backpropagation and obtaining the gradient of a quantum computer. The gradient computation during backpropagation in a quantum computer is not similar to a classical computer because the complexity increase with the number of parameters and measurements. The author discusses the Ko... | Recommendation: 6: marginally above the acceptance threshold | Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability ) | Review:
The author has discussed the issue of backpropagation and obtaining the gradient of a quantum computer. The gradient computation during backpropagation in a quantum computer is not similar to a classical computer because the complexity increase with the number of parameters and measurements. The author discusse... |
This paper proposes two unsupervised adversarial risks, i.e., breakaway risk and overlap risk, that evaluate the adversarial robustness without requiring labels. Further, this paper generates unsupervised adversarial attacks via FGSM and PGD maximizes or minimizes the distance between benign and adversarial data. The a... | Recommendation: 3: reject, not good enough | Area: Unsupervised and Self-supervised learning | Review:
This paper proposes two unsupervised adversarial risks, i.e., breakaway risk and overlap risk, that evaluate the adversarial robustness without requiring labels. Further, this paper generates unsupervised adversarial attacks via FGSM and PGD maximizes or minimizes the distance between benign and adversarial dat... |
the paper benchmarks how various existing approaches for the problem of *DP synthetic tabular data generation* perform as the number of features and instances of the dataset change. in particular, the paper answers some previous under-studied research questions such as 1) how do methods scale with the number of columns... | Recommendation: 5: marginally below the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
the paper benchmarks how various existing approaches for the problem of *DP synthetic tabular data generation* perform as the number of features and instances of the dataset change. in particular, the paper answers some previous under-studied research questions such as 1) how do methods scale with the number of... |
This work proposes a version of Slot Attention with vector-quantized representations, focussing on object- as well as feature-level disentanglement. The paper also proposes a pair of techniques (DQCF-micro and DQCF-macro) to look at disentanglement when generative factors are encoded as vectors.
Pros:
- The set predict... | Recommendation: 1: strong reject | Area: Deep Learning and representational learning | Review:
This work proposes a version of Slot Attention with vector-quantized representations, focussing on object- as well as feature-level disentanglement. The paper also proposes a pair of techniques (DQCF-micro and DQCF-macro) to look at disentanglement when generative factors are encoded as vectors.
Pros:
- The set... |
The paper proposes using implicit neural representations as a domain discretization, on which a PDE acts. For temporal evolution, classical PDE integrators are used. Next to requiring less memory for the representations, the model has the capacity to represent small but relevant features accurately. However, in the cur... | Recommendation: 8: accept, good paper | Area: Machine Learning for Sciences (eg biology, physics, health sciences, social sciences, climate/sustainability ) | Review:
The paper proposes using implicit neural representations as a domain discretization, on which a PDE acts. For temporal evolution, classical PDE integrators are used. Next to requiring less memory for the representations, the model has the capacity to represent small but relevant features accurately. However, in... |
The paper proposes a method for jointly computing region segmentation and image recognition, with any supervision to learn segmentations. The concept is based on hierarchical region segmentation to feed tokens into an image transformer, instead of fixed-size image patches. Experiments show that the method achieves reco... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
The paper proposes a method for jointly computing region segmentation and image recognition, with any supervision to learn segmentations. The concept is based on hierarchical region segmentation to feed tokens into an image transformer, instead of fixed-size image patches. Experiments show that the method achie... |
This paper proposes a new approach to find a subset of the pretraining corpus that supports BERT’s zero-shot predictions in a given task. This is done by iteratively finding pretraining examples whose gradient is the most similar to that of the downstream task examples. The technique is used to analyze the performance ... | Recommendation: 5: marginally below the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper proposes a new approach to find a subset of the pretraining corpus that supports BERT’s zero-shot predictions in a given task. This is done by iteratively finding pretraining examples whose gradient is the most similar to that of the downstream task examples. The technique is used to analyze the perf... |
The authors consider learning from a two-layer network, using a) a student with matching architecture trained with a two-phase Langevin+GD procedure b) linear methods. They provide upper (resp. lower) bounds on excess test error with the number of samples, and show that the student net always display faster rates than ... | Recommendation: 8: accept, good paper | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
The authors consider learning from a two-layer network, using a) a student with matching architecture trained with a two-phase Langevin+GD procedure b) linear methods. They provide upper (resp. lower) bounds on excess test error with the number of samples, and show that the student net always display faster rat... |
This paper presents Causal Proxy Models, which are trained to mimic outputs of a given model for original inputs as well as for alternative (counterfactual) versions of those inputs that differ based on modification of a particular (sentiment) feature. They use data from the CEBaB dataset for creating human-annotated a... | Recommendation: 5: marginally below the acceptance threshold | Area: Social Aspects of Machine Learning (eg, AI safety, fairness, privacy, interpretability, human-AI interaction, ethics) | Review:
This paper presents Causal Proxy Models, which are trained to mimic outputs of a given model for original inputs as well as for alternative (counterfactual) versions of those inputs that differ based on modification of a particular (sentiment) feature. They use data from the CEBaB dataset for creating human-ann... |
The submission presents an extension to the representational analysis framework of Chung et al. (2018) in order to apply the framework to more standard computer vision tasks such such as multiway classification, with the goal of more precise comparisons between humans and neural networks.
##### Strengths:
1. The idea ... | Recommendation: 6: marginally above the acceptance threshold | Area: Neuroscience and Cognitive Science (e.g., neural coding, brain-computer interfaces) | Review:
The submission presents an extension to the representational analysis framework of Chung et al. (2018) in order to apply the framework to more standard computer vision tasks such such as multiway classification, with the goal of more precise comparisons between humans and neural networks.
##### Strengths:
1. T... |
This work investigates stochastic gradient descent with momentum for the least squares problem at fixed design. In particular, it derives closed-form equations for the evolution of second moments of the weights and momentum parameters under a "spectrally expressible" (SE) approximation, which allow one to compute the t... | Recommendation: 6: marginally above the acceptance threshold | Area: Theory (eg, control theory, learning theory, algorithmic game theory) | Review:
This work investigates stochastic gradient descent with momentum for the least squares problem at fixed design. In particular, it derives closed-form equations for the evolution of second moments of the weights and momentum parameters under a "spectrally expressible" (SE) approximation, which allow one to compu... |
This paper extends the transform-based GNN by enhance the memory with multiple cluster prototypes. It justifies the correctness by effective considering the nodes from the same class but with long range. Experimental evaluations demonstrate its effectiveness.
Strength
- The writing and organization are good.
- The ex... | Recommendation: 5: marginally below the acceptance threshold | Area: Deep Learning and representational learning | Review:
This paper extends the transform-based GNN by enhance the memory with multiple cluster prototypes. It justifies the correctness by effective considering the nodes from the same class but with long range. Experimental evaluations demonstrate its effectiveness.
Strength
- The writing and organization are good.
... |
The paper tries to improve the sparse network training efficiency in a Federated learning framework in two folds: 1) bridging the gap between the sparse network and its dense counterpart (e.g., FedAvg) and 2) saving the communication cost between clients and the server. To this end, the proposed method performs a two... | Recommendation: 5: marginally below the acceptance threshold | Area: General Machine Learning | Review:
The paper tries to improve the sparse network training efficiency in a Federated learning framework in two folds: 1) bridging the gap between the sparse network and its dense counterpart (e.g., FedAvg) and 2) saving the communication cost between clients and the server. To this end, the proposed method perfor... |
The paper proposes a simple way for adapting image pretrained models to videos. Specifically, authors leverage the default ViT architecture, add a temporal attention layer simply by using the same weights learned for spatial attention, and add lightweight `adapter' layers that consists of a bottleneck block. Only the a... | Recommendation: 6: marginally above the acceptance threshold | Area: Deep Learning and representational learning | Review:
The paper proposes a simple way for adapting image pretrained models to videos. Specifically, authors leverage the default ViT architecture, add a temporal attention layer simply by using the same weights learned for spatial attention, and add lightweight `adapter' layers that consists of a bottleneck block. On... |
This paper proposes UNIFIED-IO, a unified model for a large variety of vision, language and V+L tasks. By formulating all inputs as sequences of embeddings, and all outputs as sequences of discrete tokens, UNIFIED-IO is able to use a simple Seq2Seq model to handle most V&L tasks such as image synthesis, depth estimatio... | Recommendation: 6: marginally above the acceptance threshold | Area: Applications (eg, speech processing, computer vision, NLP) | Review:
This paper proposes UNIFIED-IO, a unified model for a large variety of vision, language and V+L tasks. By formulating all inputs as sequences of embeddings, and all outputs as sequences of discrete tokens, UNIFIED-IO is able to use a simple Seq2Seq model to handle most V&L tasks such as image synthesis, depth e... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.