id
stringlengths
9
16
title
stringlengths
4
278
abstract
stringlengths
3
4.08k
cs.HC
bool
2 classes
cs.CE
bool
2 classes
cs.SD
bool
2 classes
cs.SI
bool
2 classes
cs.AI
bool
2 classes
cs.IR
bool
2 classes
cs.LG
bool
2 classes
cs.RO
bool
2 classes
cs.CL
bool
2 classes
cs.IT
bool
2 classes
cs.SY
bool
2 classes
cs.CV
bool
2 classes
cs.CR
bool
2 classes
cs.CY
bool
2 classes
cs.MA
bool
2 classes
cs.NE
bool
2 classes
cs.DB
bool
2 classes
Other
bool
2 classes
__index_level_0__
int64
0
541k
1906.02570
On typical encodings of multivariate ergodic sources
We show that the typical coordinate-wise encoding of multivariate ergodic source into prescribed alphabets has the entropy profile close to the convolution of the entropy profile of the source and the modular polymatroid that is determined by the cardinalities of the output alphabets. We show that the proportion of the...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
134,110
1508.03721
A Comparative Study on Regularization Strategies for Embedding-based Neural Networks
This paper aims to compare different regularization strategies to address a common phenomenon, severe overfitting, in embedding-based neural networks for NLP. We chose two widely studied neural models and tasks as our testbed. We tried several frequently applied or newly proposed regularization strategies, including pe...
false
false
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
46,033
2112.11393
A Survey on Perfectly-Secure Verifiable Secret-Sharing
Verifiable Secret-Sharing (VSS) is a fundamental primitive in secure distributed computing. It is used as a building block in several distributed computing tasks, such as Byzantine agreement and secure multi-party computation. In this article, we consider VSS schemes with perfect security, tolerating computationally un...
false
false
false
false
false
false
false
false
false
true
false
false
true
false
false
false
false
true
272,690
1807.05473
Codes with hierarchical locality from covering maps of curves
Locally recoverable (LRC) codes provide ways of recovering erased coordinates of the codeword without having to access each of the remaining coordinates. A subfamily of LRC codes with hierarchical locality (H-LRC codes) provides added flexibility to the construction by introducing several tiers of recoverability for co...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
102,929
2103.09100
A massively parallel explicit solver for elasto-dynamic problems exploiting octree meshes
Typical areas of application of explicit dynamics are impact, crash test, and most importantly, wave propagation simulations. Due to the numerically highly demanding nature of these problems, efficient automatic mesh generators and transient solvers are required. To this end, a parallel explicit solver exploiting the a...
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
225,082
1601.03829
Cellular Communications on License-Exempt Spectrum: A Tutorial
A traditional cellular system (e.g., LTE) operates only on the licensed spectrum. This tutorial explains the concept of cellular communications on both licensed and license-exempt spectrum under a unified architecture. The purpose to extend a cellular system into the bandwidth-rich license-exempt spectrum is to form a ...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
true
50,954
2312.02142
Object Recognition as Next Token Prediction
We present an approach to pose object recognition as next token prediction. The idea is to apply a language decoder that auto-regressively predicts the text tokens from image embeddings to form labels. To ground this prediction process in auto-regression, we customize a non-causal attention mask for the decoder, incorp...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
412,710
2210.06002
Face Super-Resolution with Progressive Embedding of Multi-scale Face Priors
The face super-resolution (FSR) task is to reconstruct high-resolution face images from low-resolution inputs. Recent works have achieved success on this task by utilizing facial priors such as facial landmarks. Most existing methods pay more attention to global shape and structure information, but less to local textur...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
323,101
2209.13113
FG-UAP: Feature-Gathering Universal Adversarial Perturbation
Deep Neural Networks (DNNs) are susceptible to elaborately designed perturbations, whether such perturbations are dependent or independent of images. The latter one, called Universal Adversarial Perturbation (UAP), is very attractive for model robustness analysis, since its independence of input reveals the intrinsic c...
false
false
false
false
false
false
true
false
false
false
false
true
true
false
false
false
false
false
319,776
2107.01205
HandVoxNet++: 3D Hand Shape and Pose Estimation using Voxel-Based Neural Networks
3D hand shape and pose estimation from a single depth map is a new and challenging computer vision problem with many applications. Existing methods addressing it directly regress hand meshes via 2D convolutional neural networks, which leads to artefacts due to perspective distortions in the images. To address the limit...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
244,410
2401.14498
Predictive Analysis for Optimizing Port Operations
Maritime transport is a pivotal logistics mode for the long-distance and bulk transportation of goods. However, the intricate planning involved in this mode is often hindered by uncertainties, including weather conditions, cargo diversity, and port dynamics, leading to increased costs. Consequently, accurate estimation...
false
false
false
false
false
false
true
false
false
false
true
false
false
false
false
false
false
false
424,113
2405.16219
Deep Causal Generative Models with Property Control
Generating data with properties of interest by external users while following the right causation among its intrinsic factors is important yet has not been well addressed jointly. This is due to the long-lasting challenge of jointly identifying key latent variables, their causal relations, and their correlation with pr...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
457,313
2211.09066
Teaching Algorithmic Reasoning via In-context Learning
Large language models (LLMs) have shown increasing in-context learning capabilities through scaling up model and data size. Despite this progress, LLMs are still unable to solve algorithmic reasoning problems. While providing a rationale with the final answer has led to further improvements in multi-step reasoning prob...
false
false
false
false
true
false
true
false
true
false
false
false
false
false
false
false
false
false
330,859
1609.06693
SoftTarget Regularization: An Effective Technique to Reduce Over-Fitting in Neural Networks
Deep neural networks are learning models with a very high capacity and therefore prone to over-fitting. Many regularization techniques such as Dropout, DropConnect, and weight decay all attempt to solve the problem of over-fitting by reducing the capacity of their respective models (Srivastava et al., 2014), (Wan et al...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
61,335
2304.05175
Sufficient Conditions for the Exact Relaxation of Complementarity Constraints for Storages in Multi-period OPF Problems
Storage-concerned Optimal Power Flow (OPF) with complementarity constraints is highly non-convex and intractable. In this paper, we propose two generalized sufficient conditions which guarantee no simultaneous charging and discharging (SCD) in the relaxed multi-period OPF excluding the complementarity constraints. More...
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
357,526
2304.06495
An embedding for EEG signals learned using a triplet loss
Neurophysiological time series recordings like the electroencephalogram (EEG) or local field potentials are obtained from multiple sensors. They can be decoded by machine learning models in order to estimate the ongoing brain state of a patient or healthy user. In a brain-computer interface (BCI), this decoded brain st...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
357,997
2106.15944
A survey on computational spectral reconstruction methods from RGB to hyperspectral imaging
Hyperspectral imaging enables versatile applications due to its competence in capturing abundant spatial and spectral information, which are crucial for identifying substances. However, the devices for acquiring hyperspectral images are expensive and complicated. Therefore, many alternative spectral imaging methods hav...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
243,922
2501.00464
Addressing Challenges in Data Quality and Model Generalization for Malaria Detection
Malaria remains a significant global health burden, particularly in resource-limited regions where timely and accurate diagnosis is critical to effective treatment and control. Deep Learning (DL) has emerged as a transformative tool for automating malaria detection and it offers high accuracy and scalability. However, ...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
521,675
2210.07565
Multitask Pre-training of Modular Prompt for Chinese Few-Shot Learning
Prompt tuning is a parameter-efficient approach to adapting pre-trained language models to downstream tasks. Although prompt tuning has been shown to match the performance of full model tuning when training data is sufficient, it tends to struggle in few-shot learning settings. In this paper, we present Multi-task Pre-...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
323,772
2301.02593
Multi-Agent Reinforcement Learning for Fast-Timescale Demand Response of Residential Loads
To integrate high amounts of renewable energy resources, electrical power grids must be able to cope with high amplitude, fast timescale variations in power generation. Frequency regulation through demand response has the potential to coordinate temporally flexible loads, such as air conditioners, to counteract these v...
false
false
false
false
true
false
true
false
false
false
true
false
false
false
true
false
false
false
339,542
2301.06544
Distinguish Sense from Nonsense: Out-of-Scope Detection for Virtual Assistants
Out of Scope (OOS) detection in Conversational AI solutions enables a chatbot to handle a conversation gracefully when it is unable to make sense of the end-user query. Accurately tagging a query as out-of-domain is particularly hard in scenarios when the chatbot is not equipped to handle a topic which has semantic ove...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
340,670
1709.05435
An Integrated System for Perception-Driven Autonomy with Modular Robots
The theoretical ability of modular robots to reconfigure in response to complex tasks in a priori unknown environments has frequently been cited as an advantage and remains a major motivator for work in the field. We present a modular robot system capable of autonomously completing high-level tasks by reactively reconf...
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
80,866
2010.15268
Understanding the Pathologies of Approximate Policy Evaluation when Combined with Greedification in Reinforcement Learning
Despite empirical success, the theory of reinforcement learning (RL) with value function approximation remains fundamentally incomplete. Prior work has identified a variety of pathological behaviours that arise in RL algorithms that combine approximate on-policy evaluation and greedification. One prominent example is p...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
false
false
203,713
1801.04623
Sex differences in network controllability as a predictor of executive function in youth
Executive function emerges late in development and displays different developmental trends in males and females. Sex differences in executive function in youth have been linked to vulnerability to psychopathology as well as to behaviors that impinge on health. Yet, the neurobiological basis of these differences is not ...
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
88,317
1808.01204
Learning Overparameterized Neural Networks via Stochastic Gradient Descent on Structured Data
Neural networks have many successful applications, while much less theoretical understanding has been gained. Towards bridging this gap, we study the problem of learning a two-layer overparameterized ReLU neural network for multi-class classification via stochastic gradient descent (SGD) from random initialization. In ...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
104,535
2307.07681
Data-centric Operational Design Domain Characterization for Machine Learning-based Aeronautical Products
We give a first rigorous characterization of Operational Design Domains (ODDs) for Machine Learning (ML)-based aeronautical products. Unlike in other application sectors (such as self-driving road vehicles) where ODD development is scenario-based, our approach is data-centric: we propose the dimensions along which the ...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
true
379,499
2103.09555
Textile Taxonomy and Classification Using Pulling and Twisting
Identification of textile properties is an important milestone toward advanced robotic manipulation tasks that consider interaction with clothing items such as assisted dressing, laundry folding, automated sewing, textile recycling and reusing. Despite the abundance of work considering this class of deformable objects,...
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
225,196
1707.09093
How Often Should CSI be Updated for Massive MIMO Systems with Massive Connectivity?
Massive multiple-input multiple-output (MIMO) systems need to support massive connectivity for the application of the Internet of things (IoT). The overhead of channel state information (CSI) acquisition becomes a bottleneck in the system performance due to the increasing number of users. An intermittent estimation sch...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
77,944
2412.04473
Take Package as Language: Anomaly Detection Using Transformer
Network data packet anomaly detection faces numerous challenges, including exploring new anomaly supervision signals, researching weakly supervised anomaly detection, and improving model interpretability. This paper proposes NIDS-GPT, a GPT-based causal language model for network intrusion detection. Unlike previous wo...
false
false
false
false
true
false
false
false
false
false
false
false
true
false
false
false
false
false
514,428
2301.01917
Flying Bird Object Detection Algorithm in Surveillance Video Based on Motion Information
A Flying Bird Object Detection algorithm Based on Motion Information (FBOD-BMI) is proposed to solve the problem that the features of the object are not obvious in a single frame, and the size of the object is small (low Signal-to-Noise Ratio (SNR)) in surveillance video. Firstly, a ConvLSTM-PAN model structure is desi...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
339,364
1905.06287
Output-Constrained Bayesian Neural Networks
Bayesian neural network (BNN) priors are defined in parameter space, making it hard to encode prior knowledge expressed in function space. We formulate a prior that incorporates functional constraints about what the output can or cannot be in regions of the input space. Output-Constrained BNNs (OC-BNN) represent an int...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
130,946
1910.10781
Hierarchical Transformers for Long Document Classification
BERT, which stands for Bidirectional Encoder Representations from Transformers, is a recently introduced language representation model based upon the transfer learning paradigm. We extend its fine-tuning procedure to address one of its major limitations - applicability to inputs longer than a few hundred words, such as...
false
false
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
150,577
1907.10213
Image Super-Resolution Using a Wavelet-based Generative Adversarial Network
In this paper, we consider the problem of super-resolution recons-truction. This is a hot topic because super-resolution reconstruction has a wide range of applications in the medical field, remote sensing monitoring, and criminal investigation. Compared with traditional algorithms, the current super-resolution reconst...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
139,562
2008.08072
AssembleNet++: Assembling Modality Representations via Attention Connections
We create a family of powerful video models which are able to: (i) learn interactions between semantic object information and raw appearance and motion features, and (ii) deploy attention in order to better learn the importance of features at each convolutional block of the network. A new network component named peer-a...
false
false
false
false
false
false
true
false
false
false
false
true
false
false
false
true
false
false
192,313
2209.04862
Adaptive Perturbation-Based Gradient Estimation for Discrete Latent Variable Models
The integration of discrete algorithmic components in deep learning architectures has numerous applications. Recently, Implicit Maximum Likelihood Estimation (IMLE, Niepert, Minervini, and Franceschi 2021), a class of gradient estimators for discrete exponential family distributions, was proposed by combining implicit ...
false
false
false
false
true
false
true
false
true
false
false
false
false
false
false
true
false
false
316,909
2111.08073
Learning Robust Scheduling with Search and Attention
Allocating physical layer resources to users based on channel quality, buffer size, requirements and constraints represents one of the central optimization problems in the management of radio resources. The solution space grows combinatorially with the cardinality of each dimension making it hard to find optimal soluti...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
false
true
266,557
2203.02131
3D endoscopic depth estimation using 3D surface-aware constraints
Robotic-assisted surgery allows surgeons to conduct precise surgical operations with stereo vision and flexible motor control. However, the lack of 3D spatial perception limits situational awareness during procedures and hinders mastering surgical skills in the narrow abdominal space. Depth estimation, as a representat...
false
false
false
false
true
false
false
true
false
false
false
true
false
false
false
false
false
false
283,652
2407.02772
Gradient descent with generalized Newton's method
We propose the generalized Newton's method (GeN) -- a Hessian-informed approach that applies to any optimizer such as SGD and Adam, and covers the Newton-Raphson method as a sub-case. Our method automatically and dynamically selects the learning rate that accelerates the convergence, without the intensive tuning of the...
false
false
false
false
false
false
true
false
true
false
false
true
false
false
false
false
false
false
469,876
cs/0703002
Integral Biomathics: A Post-Newtonian View into the Logos of Bios (On the New Meaning, Relations and Principles of Life in Science)
This work is an attempt for a state-of-the-art survey of natural and life sciences with the goal to define the scope and address the central questions of an original research program. It is focused on the phenomena of emergence, adaptive dynamics and evolution of self-assembling, self-organizing, self-maintaining and s...
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
true
false
true
540,209
1804.09788
Multi-Layer Sparse Coding: The Holistic Way
The recently proposed multi-layer sparse model has raised insightful connections between sparse representations and convolutional neural networks (CNN). In its original conception, this model was restricted to a cascade of convolutional synthesis representations. In this paper, we start by addressing a more general mod...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
96,035
1904.13353
Object Contour and Edge Detection with RefineContourNet
A ResNet-based multi-path refinement CNN is used for object contour detection. For this task, we prioritise the effective utilization of the high-level abstraction capability of a ResNet, which leads to state-of-the-art results for edge detection. Keeping our focus in mind, we fuse the high, mid and low-level features ...
false
false
false
false
false
false
true
false
false
false
false
true
false
false
false
false
false
false
129,367
2411.16642
Preventing Jailbreak Prompts as Malicious Tools for Cybercriminals: A Cyber Defense Perspective
Jailbreak prompts pose a significant threat in AI and cybersecurity, as they are crafted to bypass ethical safeguards in large language models, potentially enabling misuse by cybercriminals. This paper analyzes jailbreak prompts from a cyber defense perspective, exploring techniques like prompt injection and context ma...
false
false
false
false
false
false
false
false
true
false
false
false
true
false
false
false
false
false
511,100
1204.1624
UCB Algorithm for Exponential Distributions
We introduce in this paper a new algorithm for Multi-Armed Bandit (MAB) problems. A machine learning paradigm popular within Cognitive Network related topics (e.g., Spectrum Sensing and Allocation). We focus on the case where the rewards are exponentially distributed, which is common when dealing with Rayleigh fading c...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
15,333
2106.15420
Spiking-GAN: A Spiking Generative Adversarial Network Using Time-To-First-Spike Coding
Spiking Neural Networks (SNNs) have shown great potential in solving deep learning problems in an energy-efficient manner. However, they are still limited to simple classification tasks. In this paper, we propose Spiking-GAN, the first spike-based Generative Adversarial Network (GAN). It employs a kind of temporal codi...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
true
false
false
243,765
2407.01606
On Discrete Prompt Optimization for Diffusion Models
This paper introduces the first gradient-based framework for prompt optimization in text-to-image diffusion models. We formulate prompt engineering as a discrete optimization problem over the language space. Two major challenges arise in efficiently finding a solution to this problem: (1) Enormous Domain Space: Setting...
false
false
false
false
true
false
true
false
true
false
false
true
false
false
false
false
false
false
469,382
2009.03984
Automatic feature-preserving size field for 3D mesh generation
This paper presents a methodology aiming at easing considerably the generation of high-quality meshes for complex 3D domains. We show that the whole mesh generation process can be controlled with only five parameters to generate in one stroke quality meshes for arbitrary geometries. The main idea is to build a meshsize...
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
true
194,933
1908.09092
Fairness Warnings and Fair-MAML: Learning Fairly with Minimal Data
Motivated by concerns surrounding the fairness effects of sharing and transferring fair machine learning tools, we propose two algorithms: Fairness Warnings and Fair-MAML. The first is a model-agnostic algorithm that provides interpretable boundary conditions for when a fairly trained model may not behave fairly on sim...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
142,752
2105.12272
Provable Representation Learning for Imitation with Contrastive Fourier Features
In imitation learning, it is common to learn a behavior policy to match an unknown target policy via max-likelihood training on a collected set of target demonstrations. In this work, we consider using offline experience datasets - potentially far from the target distribution - to learn low-dimensional state representa...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
false
false
236,958
2108.00475
Self-supervised Learning with Local Attention-Aware Feature
In this work, we propose a novel methodology for self-supervised learning for generating global and local attention-aware visual features. Our approach is based on training a model to differentiate between specific image transformations of an input sample and the patched images. Utilizing this approach, the proposed me...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
248,729
2305.17478
Deep Variational Lesion-Deficit Mapping
Causal mapping of the functional organisation of the human brain requires evidence of \textit{necessity} available at adequate scale only from pathological lesions of natural origin. This demands inferential models with sufficient flexibility to capture both the observable distribution of pathological damage and the un...
false
false
false
false
false
false
true
false
false
false
false
true
false
false
false
false
false
false
368,612
2112.02128
MIMO Networks with One-Bit ADCs: Receiver Design and Communication Strategies
High resolution analog to digital converters (ADCs) are conventionally used at the receiver terminals to store an accurate digital representation of the received signal, thereby allowing for reliable decoding of transmitted messages. However, in a wide range of applications, such as communication over millimeter wave a...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
269,735
2303.11126
Robustifying Token Attention for Vision Transformers
Despite the success of vision transformers (ViTs), they still suffer from significant drops in accuracy in the presence of common corruptions, such as noise or blur. Interestingly, we observe that the attention mechanism of ViTs tends to rely on few important tokens, a phenomenon we call token overfocusing. More critic...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
352,713
2401.12486
Quaternary codes and their binary images
Recently, simplicial complexes are used in constructions of several infinite families of minimal and optimal linear codes by Hyun {\em et al.} Building upon their research, in this paper more linear codes over the ring $\mathbb{Z}_4$ are constructed by simplicial complexes. Specifically, the Lee weight distributions of...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
423,398
2108.13153
LIGAR: Lightweight General-purpose Action Recognition
Growing amount of different practical tasks in a video understanding problem has addressed the great challenge aiming to design an universal solution, which should be available for broad masses and suitable for the demanding edge-oriented inference. In this paper we are focused on designing a network architecture and a...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
252,726
1705.05922
LCDet: Low-Complexity Fully-Convolutional Neural Networks for Object Detection in Embedded Systems
Deep convolutional Neural Networks (CNN) are the state-of-the-art performers for object detection task. It is well known that object detection requires more computation and memory than image classification. Thus the consolidation of a CNN-based object detection for an embedded system is more challenging. In this work, ...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
73,565
2009.13239
Scalable Transfer Learning with Expert Models
Transfer of pre-trained representations can improve sample efficiency and reduce computational requirements for new tasks. However, representations used for transfer are usually generic, and are not tailored to a particular distribution of downstream tasks. We explore the use of expert representations for transfer with...
false
false
false
false
false
false
true
false
false
false
false
true
false
false
false
false
false
false
197,677
1503.04404
Predicting Item Popularity: Analysing Local Clustering Behaviour of Users
Predicting the popularity of items in rating networks is an interesting but challenging problem. This is especially so when an item has first appeared and has received very few ratings. In this paper, we propose a novel approach to predicting the future popularity of new items in rating networks, defining a new biparti...
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
false
41,158
2209.05477
Adaptive 3D Localization of 2D Freehand Ultrasound Brain Images
Two-dimensional (2D) freehand ultrasound is the mainstay in prenatal care and fetal growth monitoring. The task of matching corresponding cross-sectional planes in the 3D anatomy for a given 2D ultrasound brain scan is essential in freehand scanning, but challenging. We propose AdLocUI, a framework that Adaptively Loca...
false
false
false
false
false
false
true
false
false
false
false
true
false
false
false
false
false
false
317,107
2405.02334
Rad4XCNN: a new agnostic method for post-hoc global explanation of CNN-derived features by means of radiomics
In recent years, machine learning-based clinical decision support systems (CDSS) have played a key role in the analysis of several medical conditions. Despite their promising capabilities, the lack of transparency in AI models poses significant challenges, particularly in medical contexts where reliability is a mandato...
false
false
false
false
true
false
true
false
false
false
false
true
false
false
false
false
false
false
451,719
2105.13782
How to Split: the Effect of Word Segmentation on Gender Bias in Speech Translation
Having recognized gender bias as a major issue affecting current translation technologies, researchers have primarily attempted to mitigate it by working on the data front. However, whether algorithmic aspects concur to exacerbate unwanted outputs remains so far under-investigated. In this work, we bring the analysis o...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
237,402
1606.04721
Personality Traits and Echo Chambers on Facebook
In online social networks, users tend to select information that adhere to their system of beliefs and to form polarized groups of like minded people. Polarization as well as its effects on online social interactions have been extensively investigated. Still, the relation between group formation and personality traits ...
true
false
false
true
false
false
false
false
true
false
false
false
false
true
false
false
false
false
57,303
2502.12453
UniMatch: Universal Matching from Atom to Task for Few-Shot Drug Discovery
Drug discovery is crucial for identifying candidate drugs for various diseases.However, its low success rate often results in a scarcity of annotations, posing a few-shot learning problem. Existing methods primarily focus on single-scale features, overlooking the hierarchical molecular structures that determine differe...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
false
false
534,871
2205.09977
FairNorm: Fair and Fast Graph Neural Network Training
Graph neural networks (GNNs) have been demonstrated to achieve state-of-the-art for a number of graph-based learning tasks, which leads to a rise in their employment in various domains. However, it has been shown that GNNs may inherit and even amplify bias within training data, which leads to unfair results towards cer...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
297,499
1402.4732
Efficient Inference of Gaussian Process Modulated Renewal Processes with Application to Medical Event Data
The episodic, irregular and asynchronous nature of medical data render them difficult substrates for standard machine learning algorithms. We would like to abstract away this difficulty for the class of time-stamped categorical variables (or events) by modeling them as a renewal process and inferring a probability dens...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
30,990
1704.05815
Headphones on the wire
We analyze a dataset providing the complete information on the effective plays of thousands of music listeners during several months. Our analysis confirms a number of properties previously highlighted by research based on interviews and questionnaires, but also uncover new statistical patterns, both at the individual ...
false
false
false
true
false
false
false
false
false
false
false
false
false
true
false
false
false
false
72,078
2305.18657
Representation Of Lexical Stylistic Features In Language Models' Embedding Space
The representation space of pretrained Language Models (LMs) encodes rich information about words and their relationships (e.g., similarity, hypernymy, polysemy) as well as abstract semantic notions (e.g., intensity). In this paper, we demonstrate that lexical stylistic notions such as complexity, formality, and figura...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
369,179
2305.12916
Towards higher-order accurate mass lumping in explicit isogeometric analysis for structural dynamics
We present a mass lumping approach based on an isogeometric Petrov-Galerkin method that preserves higher-order spatial accuracy in explicit dynamics calculations irrespective of the polynomial degree of the spline approximation. To discretize the test function space, our method uses an approximate dual basis, whose fun...
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
366,251
2306.00402
Discriminative Deep Feature Visualization for Explainable Face Recognition
Despite the huge success of deep convolutional neural networks in face recognition (FR) tasks, current methods lack explainability for their predictions because of their "black-box" nature. In recent years, studies have been carried out to give an interpretation of the decision of a deep FR system. However, the affinit...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
369,998
2208.06900
Convolutional Spiking Neural Networks for Detecting Anticipatory Brain Potentials Using Electroencephalogram
Spiking neural networks (SNNs) are receiving increased attention because they mimic synaptic connections in biological systems and produce spike trains, which can be approximated by binary values for computational efficiency. Recently, the addition of convolutional layers to combine the feature extraction power of conv...
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
true
false
false
312,862
2402.05400
Optimizing for ROC Curves on Class-Imbalanced Data by Training over a Family of Loss Functions
Although binary classification is a well-studied problem in computer vision, training reliable classifiers under severe class imbalance remains a challenging problem. Recent work has proposed techniques that mitigate the effects of training under imbalance by modifying the loss functions or optimization methods. While ...
false
false
false
false
false
false
true
false
false
false
false
true
false
false
false
false
false
false
427,846
2210.04213
Towards Understanding and Boosting Adversarial Transferability from a Distribution Perspective
Transferable adversarial attacks against Deep neural networks (DNNs) have received broad attention in recent years. An adversarial example can be crafted by a surrogate model and then attack the unknown target model successfully, which brings a severe threat to DNNs. The exact underlying reasons for the transferability...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
322,359
2311.13319
Deep Learning for Vascular Segmentation and Applications in Phase Contrast Tomography Imaging
Automated blood vessel segmentation is vital for biomedical imaging, as vessel changes indicate many pathologies. Still, precise segmentation is difficult due to the complexity of vascular structures, anatomical variations across patients, the scarcity of annotated public datasets, and the quality of images. We present...
false
false
false
false
false
false
true
false
false
false
false
true
false
false
false
false
false
false
409,704
cs/0011032
Top-down induction of clustering trees
An approach to clustering is presented that adapts the basic top-down induction of decision trees method towards clustering. To this aim, it employs the principles of instance based learning. The resulting methodology is implemented in the TIC (Top down Induction of Clustering trees) system for first order clustering. ...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
537,259
2209.03005
Knowledge-enhanced Iterative Instruction Generation and Reasoning for Knowledge Base Question Answering
Multi-hop Knowledge Base Question Answering(KBQA) aims to find the answer entity in a knowledge base which is several hops from the topic entity mentioned in the question. Existing Retrieval-based approaches first generate instructions from the question and then use them to guide the multi-hop reasoning on the knowledg...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
316,372
2308.10740
We Don't Need No Adam, All We Need Is EVE: On The Variance of Dual Learning Rate And Beyond
In the rapidly advancing field of deep learning, optimising deep neural networks is paramount. This paper introduces a novel method, Enhanced Velocity Estimation (EVE), which innovatively applies different learning rates to distinct components of the gradients. By bifurcating the learning rate, EVE enables more nuanced...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
false
false
386,862
2306.17187
An Intelligent Mechanism for Monitoring and Detecting Intrusions in IoT Devices
The current amount of IoT devices and their limitations has come to serve as a motivation for malicious entities to take advantage of such devices and use them for their own gain. To protect against cyberattacks in IoT devices, Machine Learning techniques can be applied to Intrusion Detection Systems. Moreover, privacy...
false
false
false
false
true
false
false
false
false
false
false
false
true
false
false
false
false
true
376,627
2404.15734
ODMixer: Fine-grained Spatial-temporal MLP for Metro Origin-Destination Prediction
Metro Origin-Destination (OD) prediction is a crucial yet challenging spatial-temporal prediction task in urban computing, which aims to accurately forecast cross-station ridership for optimizing metro scheduling and enhancing overall transport efficiency. Analyzing fine-grained and comprehensive relations among statio...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
449,215
2404.08676
ALERT: A Comprehensive Benchmark for Assessing Large Language Models' Safety through Red Teaming
When building Large Language Models (LLMs), it is paramount to bear safety in mind and protect them with guardrails. Indeed, LLMs should never generate content promoting or normalizing harmful, illegal, or unethical behavior that may contribute to harm to individuals or society. This principle applies to both normal an...
false
false
false
false
false
false
true
false
true
false
false
false
false
true
false
false
false
false
446,343
2209.15475
Point Cloud Quality Assessment using 3D Saliency Maps
Point cloud quality assessment (PCQA) has become an appealing research field in recent days. Considering the importance of saliency detection in quality assessment, we propose an effective full-reference PCQA metric which makes the first attempt to utilize the saliency information to facilitate quality prediction, call...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
320,626
2406.11012
Connecting the Dots: Evaluating Abstract Reasoning Capabilities of LLMs Using the New York Times Connections Word Game
The New York Times Connections game has emerged as a popular and challenging pursuit for word puzzle enthusiasts. We collect 438 Connections games to evaluate the performance of state-of-the-art large language models (LLMs) against expert and novice human players. Our results show that even the best performing LLM, Cla...
false
false
false
false
true
false
false
false
true
false
false
false
false
false
false
false
false
false
464,669
2301.08846
Regeneration Learning: A Learning Paradigm for Data Generation
Machine learning methods for conditional data generation usually build a mapping from source conditional data X to target data Y. The target Y (e.g., text, speech, music, image, video) is usually high-dimensional and complex, and contains information that does not exist in source data, which hinders effective and effic...
false
false
false
false
true
false
true
false
true
false
false
true
false
false
false
false
false
false
341,315
2009.08948
A New Citation Recommendation Strategy Based on Term Functions in Related Studies Section
Purpose: Researchers frequently encounter the following problems when writing scientific articles: (1) Selecting appropriate citations to support the research idea is challenging. (2) The literature review is not conducted extensively, which leads to working on a research problem that others have well addressed. This s...
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
196,400
1311.6091
A Primal-Dual Method for Training Recurrent Neural Networks Constrained by the Echo-State Property
We present an architecture of a recurrent neural network (RNN) with a fully-connected deep neural network (DNN) as its feature extractor. The RNN is equipped with both causal temporal prediction and non-causal look-ahead, via auto-regression (AR) and moving-average (MA), respectively. The focus of this paper is a prima...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
true
false
false
28,622
2110.07840
ESPnet2-TTS: Extending the Edge of TTS Research
This paper describes ESPnet2-TTS, an end-to-end text-to-speech (E2E-TTS) toolkit. ESPnet2-TTS extends our earlier version, ESPnet-TTS, by adding many new features, including: on-the-fly flexible pre-processing, joint training with neural vocoders, and state-of-the-art TTS models with extensions like full-band E2E text-...
false
false
true
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
261,153
2309.01875
Gradient Domain Diffusion Models for Image Synthesis
Diffusion models are getting popular in generative image and video synthesis. However, due to the diffusion process, they require a large number of steps to converge. To tackle this issue, in this paper, we propose to perform the diffusion process in the gradient domain, where the convergence becomes faster. There are ...
false
false
false
false
false
false
true
false
false
false
false
true
false
false
false
false
false
true
389,838
2209.03473
Higher-order Clustering and Pooling for Graph Neural Networks
Graph Neural Networks achieve state-of-the-art performance on a plethora of graph classification tasks, especially due to pooling operators, which aggregate learned node embeddings hierarchically into a final graph representation. However, they are not only questioned by recent work showing on par performance with rand...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
false
false
316,504
2409.19255
DENEB: A Hallucination-Robust Automatic Evaluation Metric for Image Captioning
In this work, we address the challenge of developing automatic evaluation metrics for image captioning, with a particular focus on robustness against hallucinations. Existing metrics are often inadequate for handling hallucinations, primarily due to their limited ability to compare candidate captions with multifaceted ...
false
false
false
false
true
false
false
false
true
false
false
true
false
false
false
false
false
false
492,603
2412.06484
Small Languages, Big Models: A Study of Continual Training on Languages of Norway
Training large language models requires vast amounts of data, posing a challenge for less widely spoken languages like Norwegian and even more so for truly low-resource languages like Northern S\'ami. To address this issue, we present a novel three-stage continual training approach that substantially improves the downs...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
515,263
1803.07870
Reservoir computing approaches for representation and classification of multivariate time series
Classification of multivariate time series (MTS) has been tackled with a large variety of methodologies and applied to a wide range of scenarios. Reservoir Computing (RC) provides efficient tools to generate a vectorial, fixed-size representation of the MTS that can be further processed by standard classifiers. Despite...
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
true
false
false
93,147
2303.06198
Deflated HeteroPCA: Overcoming the curse of ill-conditioning in heteroskedastic PCA
This paper is concerned with estimating the column subspace of a low-rank matrix $\boldsymbol{X}^\star \in \mathbb{R}^{n_1\times n_2}$ from contaminated data. How to obtain optimal statistical accuracy while accommodating the widest range of signal-to-noise ratios (SNRs) becomes particularly challenging in the presence...
false
false
false
false
false
false
true
false
false
true
false
false
false
false
false
false
false
false
350,732
2107.06907
TGIF: Tree-Graph Integrated-Format Parser for Enhanced UD with Two-Stage Generic- to Individual-Language Finetuning
We present our contribution to the IWPT 2021 shared task on parsing into enhanced Universal Dependencies. Our main system component is a hybrid tree-graph parser that integrates (a) predictions of spanning trees for the enhanced graphs with (b) additional graph edges not present in the spanning trees. We also adopt a f...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
246,232
2310.04787
HI-SLAM: Monocular Real-time Dense Mapping with Hybrid Implicit Fields
In this letter, we present a neural field-based real-time monocular mapping framework for accurate and dense Simultaneous Localization and Mapping (SLAM). Recent neural mapping frameworks show promising results, but rely on RGB-D or pose inputs, or cannot run in real-time. To address these limitations, our approach int...
false
false
false
false
false
false
false
true
false
false
false
true
false
false
false
false
false
false
397,816
2005.11401
Retrieval-Augmented Generation for Knowledge-Intensive NLP Tasks
Large pre-trained language models have been shown to store factual knowledge in their parameters, and achieve state-of-the-art results when fine-tuned on downstream NLP tasks. However, their ability to access and precisely manipulate knowledge is still limited, and hence on knowledge-intensive tasks, their performance ...
false
false
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
178,456
1307.7382
Learning Frames from Text with an Unsupervised Latent Variable Model
We develop a probabilistic latent-variable model to discover semantic frames---types of events and their participants---from corpora. We present a Dirichlet-multinomial model in which frames are latent categories that explain the linking of verb-subject-object triples, given document-level sparsity. We analyze what the...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
26,098
2205.00840
Traction of Interlocking Spikes on a Granular Material
The interlock drive system generates traction by inserting narrow articulated spikes into the ground and by leveraging the soil's strength to resist horizontal draft forces. The system promises high tractive performance in low gravity environments where tires have little traction for lack of weight. At Earth and Space ...
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
294,396
2302.02272
Divide and Compose with Score Based Generative Models
While score based generative models, or diffusion models, have found success in image synthesis, they are often coupled with text data or image label to be able to manipulate and conditionally generate images. Even though manipulation of images by changing the text prompt is possible, our understanding of the text embe...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
343,933
2412.11408
Federated Domain Generalization with Label Smoothing and Balanced Decentralized Training
In this paper, we propose a novel approach, Federated Domain Generalization with Label Smoothing and Balanced Decentralized Training (FedSB), to address the challenges of data heterogeneity within a federated learning framework. FedSB utilizes label smoothing at the client level to prevent overfitting to domain-specifi...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
false
false
517,391
2409.03111
What is Normal? A Big Data Observational Science Model of Anonymized Internet Traffic
Understanding what is normal is a key aspect of protecting a domain. Other domains invest heavily in observational science to develop models of normal behavior to better detect anomalies. Recent advances in high performance graph libraries, such as the GraphBLAS, coupled with supercomputers enables processing of the tr...
false
false
false
true
false
false
false
false
false
false
false
false
true
true
false
false
false
true
485,919
2203.02860
Compartmental Models for COVID-19 and Control via Policy Interventions
We demonstrate an approach to replicate and forecast the spread of the SARS-CoV-2 (COVID-19) pandemic using the toolkit of probabilistic programming languages (PPLs). Our goal is to study the impact of various modeling assumptions and motivate policy interventions enacted to limit the spread of infectious diseases. Usi...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
283,888
1608.05997
OFDM Without CP in Massive MIMO
We study the possibility of removing the cyclic prefix (CP) overhead from orthogonal frequency division multiplexing (OFDM) in massive multiple-input multiple-output (MIMO) systems. We consider the uplink transmission while our results are applicable to the downlink as well. The absence of CP increases the spectral eff...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
60,052