id stringlengths 9 16 | title stringlengths 4 278 | abstract stringlengths 3 4.08k | cs.HC bool 2
classes | cs.CE bool 2
classes | cs.SD bool 2
classes | cs.SI bool 2
classes | cs.AI bool 2
classes | cs.IR bool 2
classes | cs.LG bool 2
classes | cs.RO bool 2
classes | cs.CL bool 2
classes | cs.IT bool 2
classes | cs.SY bool 2
classes | cs.CV bool 2
classes | cs.CR bool 2
classes | cs.CY bool 2
classes | cs.MA bool 2
classes | cs.NE bool 2
classes | cs.DB bool 2
classes | Other bool 2
classes | __index_level_0__ int64 0 541k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1808.04803 | Hierarchical binary CNNs for landmark localization with limited
resources | Our goal is to design architectures that retain the groundbreaking performance of Convolutional Neural Networks (CNNs) for landmark localization and at the same time are lightweight, compact and suitable for applications with limited computational resources. To this end, we make the following contributions: (a) we are ... | false | false | false | false | true | false | true | false | false | false | false | true | false | false | false | false | false | false | 105,235 |
2411.16079 | Debiasing Classifiers by Amplifying Bias with Latent Diffusion and Large
Language Models | Neural networks struggle with image classification when biases are learned and misleads correlations, affecting their generalization and performance. Previous methods require attribute labels (e.g. background, color) or utilizes Generative Adversarial Networks (GANs) to mitigate biases. We introduce DiffuBias, a novel ... | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | false | false | false | 510,879 |
2107.03840 | Molecular Communication with Passive Receivers in Anomalous Diffusion
Channels | We consider anomalous diffusion for molecular communication with a passive receiver. We first consider the probability density function of molecules' location at a given time in a space of arbitrary dimension. The expected number of observed molecules inside a receptor space of the receiver at certain time is derived t... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 245,267 |
2103.02781 | Structure-Preserving Progressive Low-rank Image Completion for Defending
Adversarial Attacks | Deep neural networks recognize objects by analyzing local image details and summarizing their information along the inference layers to derive the final decision. Because of this, they are prone to adversarial attacks. Small sophisticated noise in the input images can accumulate along the network inference path and pro... | false | false | false | false | true | false | true | false | false | false | false | true | false | false | false | false | false | false | 223,063 |
1904.03971 | Jointly Measuring Diversity and Quality in Text Generation Models | Text generation is an important Natural Language Processing task with various applications. Although several metrics have already been introduced to evaluate the text generation methods, each of them has its own shortcomings. The most widely used metrics such as BLEU only consider the quality of generated sentences and... | false | false | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | 126,898 |
2412.02197 | Cascaded Multi-Scale Attention for Enhanced Multi-Scale Feature
Extraction and Interaction with Low-Resolution Images | In real-world applications of image recognition tasks, such as human pose estimation, cameras often capture objects, like human bodies, at low resolutions. This scenario poses a challenge in extracting and leveraging multi-scale features, which is often essential for precise inference. To address this challenge, we pro... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 513,430 |
2204.06508 | FactGraph: Evaluating Factuality in Summarization with Semantic Graph
Representations | Despite recent improvements in abstractive summarization, most current approaches generate summaries that are not factually consistent with the source document, severely restricting their trust and usage in real-world applications. Recent works have shown promising improvements in factuality error identification using ... | false | false | false | false | true | false | true | false | true | false | false | false | false | false | false | false | false | false | 291,361 |
2002.00864 | Optimal Iterative Sketching with the Subsampled Randomized Hadamard
Transform | Random projections or sketching are widely used in many algorithmic and learning contexts. Here we study the performance of iterative Hessian sketch for least-squares problems. By leveraging and extending recent results from random matrix theory on the limiting spectrum of matrices randomly projected with the subsample... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 162,505 |
1502.05599 | Spread of Influence in Weighted Networks under Time and Budget
Constraints | Given a network represented by a weighted directed graph G, we consider the problem of finding a bounded cost set of nodes S such that the influence spreading from S in G, within a given time bound, is as large as possible. The dynamic that governs the spread of influence is the following: initially only elements in S ... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | true | 40,386 |
1504.02526 | Learning Arbitrary Statistical Mixtures of Discrete Distributions | We study the problem of learning from unlabeled samples very general statistical mixture models on large finite sets. Specifically, the model to be learned, $\vartheta$, is a probability distribution over probability distributions $p$, where each such $p$ is a probability distribution over $[n] = \{1,2,\dots,n\}$. When... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 41,935 |
1912.09522 | Event Outlier Detection in Continuous Time | Continuous-time event sequences represent discrete events occurring in continuous time. Such sequences arise frequently in real-life. Usually we expect the sequences to follow some regular pattern over time. However, sometimes these patterns may be interrupted by unexpected absence or occurrences of events. Identificat... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 158,085 |
2309.08009 | Measuring the Quality of Text-to-Video Model Outputs: Metrics and
Dataset | Evaluating the quality of videos generated from text-to-video (T2V) models is important if they are to produce plausible outputs that convince a viewer of their authenticity. We examine some of the metrics used in this area and highlight their limitations. The paper presents a dataset of more than 1,000 generated video... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | true | 391,998 |
2401.04854 | Are Language Models More Like Libraries or Like Librarians?
Bibliotechnism, the Novel Reference Problem, and the Attitudes of LLMs | Are LLMs cultural technologies like photocopiers or printing presses, which transmit information but cannot create new content? A challenge for this idea, which we call bibliotechnism, is that LLMs generate novel text. We begin with a defense of bibliotechnism, showing how even novel text may inherit its meaning from o... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 420,560 |
2403.10105 | Belief Aided Navigation using Bayesian Reinforcement Learning for
Avoiding Humans in Blind Spots | Recent research on mobile robot navigation has focused on socially aware navigation in crowded environments. However, existing methods do not adequately account for human robot interactions and demand accurate location information from omnidirectional sensors, rendering them unsuitable for practical applications. In re... | false | false | false | false | true | false | true | true | false | false | false | false | false | false | false | false | false | false | 438,059 |
2209.01258 | Object-based active inference | The world consists of objects: distinct entities possessing independent properties and dynamics. For agents to interact with the world intelligently, they must translate sensory inputs into the bound-together features that describe each object. These object-based representations form a natural basis for planning behavi... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 315,818 |
2201.00985 | Variational Stacked Local Attention Networks for Diverse Video
Captioning | While describing Spatio-temporal events in natural language, video captioning models mostly rely on the encoder's latent visual representation. Recent progress on the encoder-decoder model attends encoder features mainly in linear interaction with the decoder. However, growing model complexity for visual data encourage... | false | false | false | false | false | false | false | false | true | false | false | true | false | false | false | false | false | false | 274,116 |
2212.00564 | Leveraging Single-View Images for Unsupervised 3D Point Cloud Completion | Point clouds captured by scanning devices are often incomplete due to occlusion. To overcome this limitation, point cloud completion methods have been developed to predict the complete shape of an object based on its partial input. These methods can be broadly classified as supervised or unsupervised. However, both cat... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 334,102 |
1408.4692 | Seeing through bag-of-visual-word glasses: towards understanding
quantization effects in feature extraction methods | Vector-quantized local features frequently used in bag-of-visual-words approaches are the backbone of popular visual recognition systems due to both their simplicity and their performance. Despite their success, bag-of-words-histograms basically contain low-level image statistics (e.g., number of edges of different ori... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 35,480 |
2312.15843 | A New Framework for Bounding Reachability Probabilities of
Continuous-time Stochastic Systems | This manuscript presents an innovative framework for constructing barrier functions to bound reachability probabilities for continuous-time stochastic systems described by stochastic differential equations (SDEs). The reachability probabilities considered in this paper encompass two aspects: the probability of reaching... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 418,154 |
1904.01150 | Thickened 2D Networks for Efficient 3D Medical Image Segmentation | There has been a debate in 3D medical image segmentation on whether to use 2D or 3D networks, where both pipelines have advantages and disadvantages. 2D methods enjoy a low inference time and greater transfer-ability while 3D methods are superior in performance for hard targets requiring contextual information. This pa... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 126,066 |
2204.00734 | SkeleVision: Towards Adversarial Resiliency of Person Tracking with
Multi-Task Learning | Person tracking using computer vision techniques has wide ranging applications such as autonomous driving, home security and sports analytics. However, the growing threat of adversarial attacks raises serious concerns regarding the security and reliability of such techniques. In this work, we study the impact of multi-... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 289,363 |
2305.06299 | Summarizing, Simplifying, and Synthesizing Medical Evidence Using GPT-3
(with Varying Success) | Large language models, particularly GPT-3, are able to produce high quality summaries of general domain news articles in few- and zero-shot settings. However, it is unclear if such models are similarly capable in more specialized, high-stakes domains such as biomedicine. In this paper, we enlist domain experts (individ... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 363,481 |
2402.08812 | Intelligent Canvas: Enabling Design-Like Exploratory Visual Data
Analysis with Generative AI through Rapid Prototyping, Iteration and Curation | Complex data analysis inherently seeks unexpected insights through exploratory visual analysis methods, transcending logical, step-by-step processing. However, existing interfaces such as notebooks and dashboards have limitations in exploration and comparison for visual data analysis. Addressing these limitations, we i... | true | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 429,248 |
2306.16819 | Graph Denoising Diffusion for Inverse Protein Folding | Inverse protein folding is challenging due to its inherent one-to-many mapping characteristic, where numerous possible amino acid sequences can fold into a single, identical protein backbone. This task involves not only identifying viable sequences but also representing the sheer diversity of potential solutions. Howev... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 376,497 |
2409.12507 | Towards Low-latency Event-based Visual Recognition with Hybrid Step-wise
Distillation Spiking Neural Networks | Spiking neural networks (SNNs) have garnered significant attention for their low power consumption and high biological interpretability. Their rich spatio-temporal information processing capability and event-driven nature make them ideally well-suited for neuromorphic datasets. However, current SNNs struggle to balance... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 489,622 |
2109.03699 | Sample and Communication-Efficient Decentralized Actor-Critic Algorithms
with Finite-Time Analysis | Actor-critic (AC) algorithms have been widely adopted in decentralized multi-agent systems to learn the optimal joint control policy. However, existing decentralized AC algorithms either do not preserve the privacy of agents or are not sample and communication-efficient. In this work, we develop two decentralized AC an... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 254,143 |
2502.06280 | IceBerg: Debiased Self-Training for Class-Imbalanced Node Classification | Graph Neural Networks (GNNs) have achieved great success in dealing with non-Euclidean graph-structured data and have been widely deployed in many real-world applications. However, their effectiveness is often jeopardized under class-imbalanced training sets. Most existing studies have analyzed class-imbalanced node cl... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 532,015 |
2105.09866 | Deep learning in physics: a study of dielectric quasi-cubic particles in
a uniform electric field | Solving physics problems for which we know the equations, boundary conditions and symmetries can be done by deep learning. The constraints can be either imposed as terms in a loss function or used to formulate a neural ansatz. In the present case study, we calculate the induced field inside and outside a dielectric cub... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 236,188 |
2003.00045 | Library Adoption Dynamics in Software Teams | When a group of people strives to understand new information, struggle ensues as various ideas compete for attention. Steep learning curves are surmounted as teams learn together. To understand how these team dynamics play out in software development, we explore Git logs, which provide a complete change history of soft... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 166,178 |
2401.02203 | Robust bilinear factor analysis based on the matrix-variate $t$
distribution | Factor Analysis based on multivariate $t$ distribution ($t$fa) is a useful robust tool for extracting common factors on heavy-tailed or contaminated data. However, $t$fa is only applicable to vector data. When $t$fa is applied to matrix data, it is common to first vectorize the matrix observations. This introduces two ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 419,638 |
2202.08557 | CADRE: A Cascade Deep Reinforcement Learning Framework for Vision-based
Autonomous Urban Driving | Vision-based autonomous urban driving in dense traffic is quite challenging due to the complicated urban environment and the dynamics of the driving behaviors. Widely-applied methods either heavily rely on hand-crafted rules or learn from limited human experience, which makes them hard to generalize to rare but critica... | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | false | false | false | 280,929 |
0909.4592 | Autocorrelation-Run Formula for Binary Sequences | The autocorrelation function and the run structure are two basic notions for binary sequences, and have been used as two independent postulates to test randomness of binary sequences ever since Golomb 1955. In this paper, we prove for binary sequence that the autocorrelation function is in fact completely determined by... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | true | 4,568 |
2007.06290 | Paranoid Transformer: Reading Narrative of Madness as Computational
Approach to Creativity | This papers revisits the receptive theory in context of computational creativity. It presents a case study of a Paranoid Transformer - a fully autonomous text generation engine with raw output that could be read as the narrative of a mad digital persona without any additional human post-filtering. We describe technical... | false | false | false | false | true | false | false | false | true | false | false | false | false | true | false | false | false | false | 186,972 |
2010.11437 | Task-Adaptive Feature Transformer for Few-Shot Segmentation | Few-shot learning allows machines to classify novel classes using only a few labeled samples. Recently, few-shot segmentation aiming at semantic segmentation on low sample data has also seen great interest. In this paper, we propose a learnable module for few-shot segmentation, the task-adaptive feature transformer (TA... | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | false | false | false | 202,256 |
2312.06454 | Point Transformer with Federated Learning for Predicting Breast Cancer
HER2 Status from Hematoxylin and Eosin-Stained Whole Slide Images | Directly predicting human epidermal growth factor receptor 2 (HER2) status from widely available hematoxylin and eosin (HE)-stained whole slide images (WSIs) can reduce technical costs and expedite treatment selection. Accurately predicting HER2 requires large collections of multi-site WSIs. Federated learning enables ... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 414,525 |
2112.06194 | Improving Performance of Federated Learning based Medical Image Analysis
in Non-IID Settings using Image Augmentation | Federated Learning (FL) is a suitable solution for making use of sensitive data belonging to patients, people, companies, or industries that are obligatory to work under rigid privacy constraints. FL mainly or partially supports data privacy and security issues and provides an alternative to model problems facilitating... | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | false | false | false | 271,090 |
2304.10977 | Evaluating Transformer Language Models on Arithmetic Operations Using
Number Decomposition | In recent years, Large Language Models such as GPT-3 showed remarkable capabilities in performing NLP tasks in the zero and few shot settings. On the other hand, the experiments highlighted the difficulty of GPT-3 in carrying out tasks that require a certain degree of reasoning, such as arithmetic operations. In this p... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 359,622 |
2012.02111 | Deep Inverse Sensor Models as Priors for evidential Occupancy Mapping | With the recent boost in autonomous driving, increased attention has been paid on radars as an input for occupancy mapping. Besides their many benefits, the inference of occupied space based on radar detections is notoriously difficult because of the data sparsity and the environment dependent noise (e.g. multipath ref... | false | false | false | false | false | false | true | true | false | false | false | false | false | false | false | false | false | false | 209,651 |
2012.14251 | A Differential-Cascaded Paradigm for Control of Nonlinear Systems | This paper focuses on developing a new paradigm motivated by investigating the consensus problem of networked Lagrangian systems with time-varying delay and switching topologies. We present adaptive controllers with piecewise continuous or arbitrary times differentiable control torques for realizing consensus of Lagran... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 213,452 |
2203.08949 | Latent-Variable Advantage-Weighted Policy Optimization for Offline RL | Offline reinforcement learning methods hold the promise of learning policies from pre-collected datasets without the need to query the environment for new transitions. This setting is particularly well-suited for continuous control robotic applications for which online data collection based on trial-and-error is costly... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 285,966 |
2409.14791 | Multiscale scattered data analysis in samplet coordinates | We study multiscale scattered data interpolation schemes for globally supported radial basis functions, with a focus on the Mat\'ern class. The multiscale approximation is constructed through a sequence of residual corrections, where radial basis functions with different lengthscale parameters are employed to capture v... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 490,631 |
2405.15320 | Organic Data-Driven Approach for Turkish Grammatical Error Correction
and LLMs | Grammatical Error Correction has seen significant progress with the recent advancements in deep learning. As those methods require huge amounts of data, synthetic datasets are being built to fill this gap. Unfortunately, synthetic datasets are not organic enough in some cases and even require clean data to start with. ... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | 456,873 |
1902.06626 | Mockingbird: Defending Against Deep-Learning-Based Website
Fingerprinting Attacks with Adversarial Traces | Website Fingerprinting (WF) is a type of traffic analysis attack that enables a local passive eavesdropper to infer the victim's activity, even when the traffic is protected by a VPN or an anonymity system like Tor. Leveraging a deep-learning classifier, a WF attacker can gain over 98% accuracy on Tor traffic. In this ... | false | false | false | false | false | false | true | false | false | false | false | false | true | false | false | false | false | false | 121,802 |
2008.06204 | Structure-Aware Network for Lane Marker Extraction with Dynamic Vision
Sensor | Lane marker extraction is a basic yet necessary task for autonomous driving. Although past years have witnessed major advances in lane marker extraction with deep learning models, they all aim at ordinary RGB images generated by frame-based cameras, which limits their performance in extreme cases, like huge illuminatio... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 191,730 |
1708.04907 | Multi-View Stereo with Single-View Semantic Mesh Refinement | While 3D reconstruction is a well-established and widely explored research topic, semantic 3D reconstruction has only recently witnessed an increasing share of attention from the Computer Vision community. Semantic annotations allow in fact to enforce strong class-dependent priors, as planarity for ground and walls, wh... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 79,041 |
2411.05804 | Reliability-Based Design Optimization Incorporating Extended Optimal
Uncertainty Quantification | Reliability-based design optimization (RBDO) approaches aim to identify the best design of an engineering problem, whilst the probability of failure (PoF) remains below an acceptable value. Thus, the incorporation of the sharpest bounds on the PoF under given constraints on the uncertain input quantities strongly stren... | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 506,802 |
1401.5245 | Edge detection of binary images using the method of masks | In this work the method of masks, creating and using of inverted image masks, together with binary operation of image data are used in edge detection of binary images, monochrome images, which yields about 300 times faster than ordinary methods. The method is divided into three stages: Mask construction, Fundamental ed... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 30,180 |
1803.05785 | Aggregated Sparse Attention for Steering Angle Prediction | In this paper, we apply the attention mechanism to autonomous driving for steering angle prediction. We propose the first model, applying the recently introduced sparse attention mechanism to visual domain, as well as the aggregated extension for this model. We show the improvement of the proposed method, comparing to ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 92,701 |
1811.07492 | DeepSeeNet: A deep learning model for automated classification of
patient-based age-related macular degeneration severity from color fundus
photographs | In assessing the severity of age-related macular degeneration (AMD), the Age-Related Eye Disease Study (AREDS) Simplified Severity Scale predicts the risk of progression to late AMD. However, its manual use requires the time-consuming participation of expert practitioners. Although several automated deep learning syste... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 113,789 |
1802.03359 | Minimum weight codewords in dual Algebraic-Geometric codes from the
Giulietti-Korchm\'aros curve | In this paper we investigate the number of minimum weight codewords of some dual Algebraic-Geometric codes associated with the Giulietti-Korchm\'aros maximal curve, by computing the maximal number of intersections between the Giulietti-Korchm\'aros curve and lines, plane conics and plane cubics. | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 89,953 |
2106.10084 | Subjective Bias in Abstractive Summarization | Due to the subjectivity of the summarization, it is a good practice to have more than one gold summary for each training document. However, many modern large-scale abstractive summarization datasets have only one-to-one samples written by different human with different styles. The impact of this phenomenon is understud... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 241,893 |
1906.07749 | A Framework for Parallelizing OWL Classification in Description Logic
Reasoners | In this paper we report on a black-box approach to parallelize existing description logic (DL) reasoners for the Web Ontology Language (OWL). We focus on OWL ontology classification, which is an important inference service and supported by every major OWL/DL reasoner. We propose a flexible parallel framework which can ... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | true | 135,670 |
1901.11143 | Natural Analysts in Adaptive Data Analysis | Adaptive data analysis is frequently criticized for its pessimistic generalization guarantees. The source of these pessimistic bounds is a model that permits arbitrary, possibly adversarial analysts that optimally use information to bias results. While being a central issue in the field, still lacking are notions of na... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 120,179 |
2002.05540 | SpotNet: Self-Attention Multi-Task Network for Object Detection | Humans are very good at directing their visual attention toward relevant areas when they search for different types of objects. For instance, when we search for cars, we will look at the streets, not at the top of buildings. The motivation of this paper is to train a network to do the same via a multi-task learning app... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 163,932 |
1605.01020 | Implicit large-eddy simulation of compressible flows using the Interior
Embedded Discontinuous Galerkin method | We present a high-order implicit large-eddy simulation (ILES) approach for simulating transitional turbulent flows. The approach consists of an Interior Embedded Discontinuous Galerkin (IEDG) method for the discretization of the compressible Navier-Stokes equations and a parallel preconditioned Newton-GMRES solver for ... | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 55,419 |
0711.1383 | On Minimal Tree Realizations of Linear Codes | A tree decomposition of the coordinates of a code is a mapping from the coordinate set to the set of vertices of a tree. A tree decomposition can be extended to a tree realization, i.e., a cycle-free realization of the code on the underlying tree, by specifying a state space at each edge of the tree, and a local constr... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 880 |
1708.03940 | Leveraging Sparse and Dense Feature Combinations for Sentiment
Classification | Neural networks are one of the most popular approaches for many natural language processing tasks such as sentiment analysis. They often outperform traditional machine learning models and achieve the state-of-art results on most tasks. However, many existing deep learning models are complex, difficult to train and prov... | false | false | false | false | false | true | true | false | true | false | false | false | false | false | false | false | false | false | 78,851 |
1501.01773 | Estimates for the growth of inverse determinant sums of quasi-orthogonal
and number field lattices | Inverse determinant sums appear naturally as a tool for analyzing performance of space-time codes in Rayleigh fading channels. This work will analyze the growth of inverse determinant sums of a family of quasi-orthogonal codes and will show that the growths are in logarithmic class. This is considerably lower than that... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 39,120 |
1809.08116 | On the Optimal Broadcast Rate of the Two-Sender Unicast Index Coding
Problem with Fully-Participated Interactions | The problem of two-sender unicast index coding consists of two senders and a set of receivers. Each receiver demands a unique message and possesses some of the messages demanded by other receivers as its side-information. Every demanded message is present with at least one of the senders. Senders avail the knowledge of... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 108,433 |
2403.05713 | tsGT: Stochastic Time Series Modeling With Transformer | Time series methods are of fundamental importance in virtually any field of science that deals with temporally structured data. Recently, there has been a surge of deterministic transformer models with time series-specific architectural biases. In this paper, we go in a different direction by introducing tsGT, a stocha... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 436,116 |
2405.10446 | Tell me more: Intent Fulfilment Framework for Enhancing User Experiences
in Conversational XAI | The evolution of Explainable Artificial Intelligence (XAI) has emphasised the significance of meeting diverse user needs. The approaches to identifying and addressing these needs must also advance, recognising that explanation experiences are subjective, user-centred processes that interact with users towards a better ... | true | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 454,762 |
1806.11103 | Comment on: Decomposition of structural learning about directed acyclic
graphs [1] | We propose an alternative proof concerning necessary and sufficient conditions to split the problem of searching for d-separators and building the skeleton of a DAG into small problems for every node of a separation tree T. The proof is simpler than the original [1]. The same proof structure has been used in [2] for le... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 101,649 |
1603.07195 | A Decentralized Quasi-Newton Method for Dual Formulations of Consensus
Optimization | This paper considers consensus optimization problems where each node of a network has access to a different summand of an aggregate cost function. Nodes try to minimize the aggregate cost function, while they exchange information only with their neighbors. We modify the dual decomposition method to incorporate a curvat... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 53,599 |
1709.03572 | Real-Time Multiple Object Tracking - A Study on the Importance of Speed | In this project, we implement a multiple object tracker, following the tracking-by-detection paradigm, as an extension of an existing method. It works by modelling the movement of objects by solving the filtering problem, and associating detections with predicted new locations in new frames using the Hungarian algorith... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 80,484 |
1804.01466 | Gaussian Process Subset Scanning for Anomalous Pattern Detection in
Non-iid Data | Identifying anomalous patterns in real-world data is essential for understanding where, when, and how systems deviate from their expected dynamics. Yet methods that separately consider the anomalousness of each individual data point have low detection power for subtle, emerging irregularities. Additionally, recent dete... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 94,227 |
2209.01514 | A Novel Nearest Neighbors Algorithm Based on Power Muirhead Mean | This paper introduces the innovative Power Muirhead Mean K-Nearest Neighbors (PMM-KNN) algorithm, a novel data classification approach that combines the K-Nearest Neighbors method with the adaptive Power Muirhead Mean operator. The proposed methodology aims to address the limitations of traditional KNN by leveraging th... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 315,913 |
1807.05748 | Learning Stochastic Differential Equations With Gaussian Processes
Without Gradient Matching | We introduce a novel paradigm for learning non-parametric drift and diffusion functions for stochastic differential equation (SDE). The proposed model learns to simulate path distributions that match observations with non-uniform time increments and arbitrary sparseness, which is in contrast with gradient matching that... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 102,991 |
1811.04407 | An initial attempt of combining visual selective attention with deep
reinforcement learning | Visual attention serves as a means of feature selection mechanism in the perceptual system. Motivated by Broadbent's leaky filter model of selective attention, we evaluate how such mechanism could be implemented and affect the learning process of deep reinforcement learning. We visualize and analyze the feature maps of... | false | false | false | false | true | false | true | false | false | false | false | true | false | false | false | false | false | false | 113,084 |
2402.01878 | LiPO: Listwise Preference Optimization through Learning-to-Rank | Aligning language models (LMs) with curated human feedback is critical to control their behaviors in real-world applications. Several recent policy optimization methods, such as DPO and SLiC, serve as promising alternatives to the traditional Reinforcement Learning from Human Feedback (RLHF) approach. In practice, huma... | false | false | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | 426,269 |
2411.02795 | The Evolution of RWKV: Advancements in Efficient Language Modeling | This paper reviews the development of the Receptance Weighted Key Value (RWKV) architecture, emphasizing its advancements in efficient language modeling. RWKV combines the training efficiency of Transformers with the inference efficiency of RNNs through a novel linear attention mechanism. We examine its core innovation... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | 505,664 |
2304.13432 | Design and analysis of bent functions using $\mathcal{M}$-subspaces | In this article, we provide the first systematic analysis of bent functions $f$ on $\mathbb{F}_2^{n}$ in the Maiorana-McFarland class $\mathcal{MM}$ regarding the origin and cardinality of their $\mathcal{M}$-subspaces, i.e., vector subspaces on which the second-order derivatives of $f$ vanish. By imposing restrictions... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 360,579 |
2205.03316 | Application of Clustering Algorithms for Dimensionality Reduction in
Infrastructure Resilience Prediction Models | Recent studies increasingly adopt simulation-based machine learning (ML) models to analyze critical infrastructure system resilience. For realistic applications, these ML models consider the component-level characteristics that influence the network response during emergencies. However, such an approach could result in... | false | false | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | 295,245 |
2305.11092 | Universal Domain Adaptation from Foundation Models: A Baseline Study | Foundation models (e.g., CLIP or DINOv2) have shown their impressive learning and transfer capabilities in a wide range of visual tasks, by training on a large corpus of data and adapting to specific downstream tasks. It is, however, interesting that foundation models have not been fully explored for universal domain a... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 365,380 |
1901.06140 | Backbone Can Not be Trained at Once: Rolling Back to Pre-trained Network
for Person Re-Identification | In person re-identification (ReID) task, because of its shortage of trainable dataset, it is common to utilize fine-tuning method using a classification network pre-trained on a large dataset. However, it is relatively difficult to sufficiently fine-tune the low-level layers of the network due to the gradient vanishing... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 118,934 |
2412.06082 | Are foundation models for computer vision good conformal predictors? | Recent advances in self-supervision and constrastive learning have brought the performance of foundation models to unprecedented levels in a variety of tasks. Fueled by this progress, these models are becoming the prevailing approach for a wide array of real-world vision problems, including risk-sensitive and high-stak... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 515,081 |
2401.10942 | Machine Unlearning for Recommendation Systems: An Insight | This review explores machine unlearning (MUL) in recommendation systems, addressing adaptability, personalization, privacy, and bias challenges. Unlike traditional models, MUL dynamically adjusts system knowledge based on shifts in user preferences and ethical considerations. The paper critically examines MUL's basics,... | false | false | false | false | true | true | true | false | false | false | false | false | false | false | false | false | false | false | 422,826 |
1610.02323 | Almost ISS property for feedback connected systems | Small-gain conditions used in analysis of feedback interconnections are contraction conditions which imply certain stability properties. Such conditions are applied to a finite or infinite interval. In this paper we consider the case, when a small-gain condition is applied to several disjunct intervals and use the dens... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 62,082 |
1806.09835 | Graph-to-Sequence Learning using Gated Graph Neural Networks | Many NLP applications can be framed as a graph-to-sequence learning problem. Previous work proposing neural architectures on this setting obtained promising results compared to grammar-based approaches but still rely on linearisation heuristics and/or standard recurrent networks to achieve the best performance. In this... | false | false | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | 101,438 |
2303.10472 | Practical and Matching Gradient Variance Bounds for Black-Box
Variational Bayesian Inference | Understanding the gradient variance of black-box variational inference (BBVI) is a crucial step for establishing its convergence and developing algorithmic improvements. However, existing studies have yet to show that the gradient variance of BBVI satisfies the conditions used to study the convergence of stochastic gra... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 352,469 |
1904.12323 | An approach to image denoising using manifold approximation without
clean images | Image restoration has been an extensively researched topic in numerous fields. With the advent of deep learning, a lot of the current algorithms were replaced by algorithms that are more flexible and robust. Deep networks have demonstrated impressive performance in a variety of tasks like blind denoising, image enhance... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 129,077 |
2407.04221 | Autoverse: An Evolvable Game Language for Learning Robust Embodied
Agents | We introduce Autoverse, an evolvable, domain-specific language for single-player 2D grid-based games, and demonstrate its use as a scalable training ground for Open-Ended Learning (OEL) algorithms. Autoverse uses cellular-automaton-like rewrite rules to describe game mechanics, allowing it to express various game envir... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 470,475 |
2111.00137 | Efficient Inference Without Trading-off Regret in Bandits: An Allocation
Probability Test for Thompson Sampling | Using bandit algorithms to conduct adaptive randomised experiments can minimise regret, but it poses major challenges for statistical inference (e.g., biased estimators, inflated type-I error and reduced power). Recent attempts to address these challenges typically impose restrictions on the exploitative nature of the ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 264,112 |
2412.11299 | How not to Stitch Representations to Measure Similarity: Task Loss
Matching versus Direct Matching | Measuring the similarity of the internal representations of deep neural networks is an important and challenging problem. Model stitching has been proposed as a possible approach, where two half-networks are connected by mapping the output of the first half-network to the input of the second one. The representations ar... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 517,346 |
1506.08643 | Diffusion of innovations in Axelrod's model | Axelrod's model for the dissemination of culture contains two key factors required to model the process of diffusion of innovations, namely, social influence (i.e., individuals become more similar when they interact) and homophily (i.e., individuals interact preferentially with similar others). The strength of these so... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 44,640 |
2403.12352 | A New Intelligent Reflecting Surface-Aided Electromagnetic Stealth
Strategy | Electromagnetic wave absorbing material (EWAM) plays an essential role in manufacturing stealth aircraft, which can achieve the electromagnetic stealth (ES) by reducing the strength of the signal reflected back to the radar system. However, the stealth performance is limited by the coating thickness, incident wave angl... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 439,127 |
2208.11636 | ImitAL: Learned Active Learning Strategy on Synthetic Data | Active Learning (AL) is a well-known standard method for efficiently obtaining annotated data by first labeling the samples that contain the most information based on a query strategy. In the past, a large variety of such query strategies has been proposed, with each generation of new strategies increasing the runtime ... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 314,497 |
1811.06609 | A Spectral View of Adversarially Robust Features | Given the apparent difficulty of learning models that are robust to adversarial perturbations, we propose tackling the simpler problem of developing adversarially robust features. Specifically, given a dataset and metric of interest, the goal is to return a function (or multiple functions) that 1) is robust to adversar... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 113,562 |
2008.03903 | Online Optimization of Switched LTI Systems Using Continuous-Time and
Hybrid Accelerated Gradient Flows | This paper studies the design of feedback controllers to steer a switching linear time-invariant dynamical system towards the solution trajectory of a time-varying convex optimization problem. We propose two types of controllers: (i) a continuous controller inspired by the online gradient descent method, and (ii) a hyb... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 191,065 |
2004.09502 | Multi-Scale Thermal to Visible Face Verification via Attribute Guided
Synthesis | Thermal-to-visible face verification is a challenging problem due to the large domain discrepancy between the modalities. Existing approaches either attempt to synthesize visible faces from thermal faces or learn domain-invariant robust features from these modalities for cross-modal matching. In this paper, we use attr... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 173,359 |
2312.03928 | Adaptive Weighted Co-Learning for Cross-Domain Few-Shot Learning | Due to the availability of only a few labeled instances for the novel target prediction task and the significant domain shift between the well annotated source domain and the target domain, cross-domain few-shot learning (CDFSL) induces a very challenging adaptation problem. In this paper, we propose a simple Adaptive ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 413,487 |
2306.00674 | CRS-FL: Conditional Random Sampling for Communication-Efficient and
Privacy-Preserving Federated Learning | Federated Learning (FL), a privacy-oriented distributed ML paradigm, is being gaining great interest in Internet of Things because of its capability to protect participants data privacy. Studies have been conducted to address challenges existing in standard FL, including communication efficiency and privacy-preserving.... | false | false | false | false | false | false | true | false | false | false | false | false | true | false | false | false | false | true | 370,118 |
2308.06924 | FedEdge AI-TC: A Semi-supervised Traffic Classification Method based on
Trusted Federated Deep Learning for Mobile Edge Computing | As a typical entity of MEC (Mobile Edge Computing), 5G CPE (Customer Premise Equipment)/HGU (Home Gateway Unit) has proven to be a promising alternative to traditional Smart Home Gateway. Network TC (Traffic Classification) is a vital service quality assurance and security management method for communication networks, ... | false | false | false | false | true | false | false | false | false | false | false | false | true | false | false | false | false | true | 385,322 |
2005.10058 | On embedding Lambek calculus into commutative categorial grammars | We consider tensor grammars, which are an example of \commutative" grammars, based on the classical (rather than intuitionistic) linear logic. They can be seen as a surface representation of abstract categorial grammars ACG in the sense that derivations of ACG translate to derivations of tensor grammars and this transl... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | true | 178,081 |
2303.02753 | Frequency-domain Blind Quality Assessment of Blurred and
Blocking-artefact Images using Gaussian Process Regression model | Most of the standard image and video codecs are block-based and depending upon the compression ratio the compressed images/videos suffer from different distortions. At low ratios, blurriness is observed and as compression increases blocking artifacts occur. Generally, in order to reduce blockiness, images are low-pass ... | false | false | false | false | true | false | true | false | false | false | false | true | false | false | false | false | false | false | 349,474 |
1810.02690 | Robotics CTF (RCTF), a playground for robot hacking | Robots state of insecurity is onstage. There is an emerging concern about major robot vulnerabilities and their adverse consequences. However, there is still a considerable gap between robotics and cybersecurity domains. For the purpose of filling that gap, the present technical report presents the Robotics CTF (RCTF),... | false | false | false | false | false | false | false | true | false | false | false | false | false | true | false | false | false | false | 109,644 |
2105.10559 | Hyper-Convolution Networks for Biomedical Image Segmentation | The convolution operation is a central building block of neural network architectures widely used in computer vision. The size of the convolution kernels determines both the expressiveness of convolutional neural networks (CNN), as well as the number of learnable parameters. Increasing the network capacity to capture r... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 236,431 |
2104.04250 | Periodic Load Rejection for Floating Offshore Wind Turbines via
Constrained Subspace Predictive Repetitive Control | Individual Pitch Control (IPC) is an effective control strategy to mitigate the blade loads on large-scale wind turbines. Since IPC usually requires high pitch actuation, the safety constraints of the pitch actuator should be taken into account when designing the controller. This paper introduces a constrained Subspace... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 229,339 |
2207.04639 | A Dual-Polarization Information Guided Network for SAR Ship
Classification | How to fully utilize polarization to enhance synthetic aperture radar (SAR) ship classification remains an unresolved issue. Thus, we propose a dual-polarization information guided network (DPIG-Net) to solve it. | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 307,264 |
2112.08656 | DREAM: Improving Situational QA by First Elaborating the Situation | When people answer questions about a specific situation, e.g., "I cheated on my mid-term exam last week. Was that wrong?", cognitive science suggests that they form a mental picture of that situation before answering. While we do not know how language models (LMs) answer such questions, we conjecture that they may answ... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | 271,884 |
2007.03028 | Labeling of Multilingual Breast MRI Reports | Medical reports are an essential medium in recording a patient's condition throughout a clinical trial. They contain valuable information that can be extracted to generate a large labeled dataset needed for the development of clinical tools. However, the majority of medical reports are stored in an unregularized format... | false | false | false | false | false | false | false | false | true | false | false | true | false | false | false | false | false | false | 185,921 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.