id
stringlengths
9
16
title
stringlengths
4
278
abstract
stringlengths
3
4.08k
cs.HC
bool
2 classes
cs.CE
bool
2 classes
cs.SD
bool
2 classes
cs.SI
bool
2 classes
cs.AI
bool
2 classes
cs.IR
bool
2 classes
cs.LG
bool
2 classes
cs.RO
bool
2 classes
cs.CL
bool
2 classes
cs.IT
bool
2 classes
cs.SY
bool
2 classes
cs.CV
bool
2 classes
cs.CR
bool
2 classes
cs.CY
bool
2 classes
cs.MA
bool
2 classes
cs.NE
bool
2 classes
cs.DB
bool
2 classes
Other
bool
2 classes
__index_level_0__
int64
0
541k
2107.07919
A Survey on Bias in Visual Datasets
Computer Vision (CV) has achieved remarkable results, outperforming humans in several tasks. Nonetheless, it may result in significant discrimination if not handled properly as CV systems highly depend on the data they are fed with and can learn and amplify biases within such data. Thus, the problems of understanding a...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
246,565
1805.05101
Sparse Convolutional Beamforming for Ultrasound Imaging
The standard technique used by commercial medical ultrasound systems to form B-mode images is delay and sum (DAS) beamforming. However, DAS often results in limited image resolution and contrast, which are governed by the center frequency and the aperture size of the ultrasound transducer. A large number of elements le...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
97,381
cs/0002012
On The Closest String and Substring Problems
The problem of finding a center string that is `close' to every given string arises and has many applications in computational biology and coding theory. This problem has two versions: the Closest String problem and the Closest Substring problem. Assume that we are given a set of strings ${\cal S}=\{s_1, s_2, ..., s_n\...
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
true
537,011
2406.13101
On instabilities in neural network-based physics simulators
When neural networks are trained from data to simulate the dynamics of physical systems, they encounter a persistent challenge: the long-time dynamics they produce are often unphysical or unstable. We analyze the origin of such instabilities when learning linear dynamical systems, focusing on the training dynamics. We ...
false
true
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
465,688
2202.12326
Towards Better Meta-Initialization with Task Augmentation for Kindergarten-aged Speech Recognition
Children's automatic speech recognition (ASR) is always difficult due to, in part, the data scarcity problem, especially for kindergarten-aged kids. When data are scarce, the model might overfit to the training data, and hence good starting points for training are essential. Recently, meta-learning was proposed to lear...
false
false
true
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
282,190
2403.06045
Sample-Optimal Zero-Violation Safety For Continuous Control
In this paper, we study the problem of ensuring safety with a few shots of samples for partially unknown systems. We first characterize a fundamental limit when producing safe actions is not possible due to insufficient information or samples. Then, we develop a technique that can generate provably safe actions and rec...
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
436,272
2408.10653
UIE-UnFold: Deep Unfolding Network with Color Priors and Vision Transformer for Underwater Image Enhancement
Underwater image enhancement (UIE) plays a crucial role in various marine applications, but it remains challenging due to the complex underwater environment. Current learning-based approaches frequently lack explicit incorporation of prior knowledge about the physical processes involved in underwater image formation, r...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
481,961
2005.08519
Yseop at SemEval-2020 Task 5: Cascaded BERT Language Model for Counterfactual Statement Analysis
In this paper, we explore strategies to detect and evaluate counterfactual sentences. We describe our system for SemEval-2020 Task 5: Modeling Causal Reasoning in Language: Detecting Counterfactuals. We use a BERT base model for the classification task and build a hybrid BERT Multi-Layer Perceptron system to handle the...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
177,647
2104.14589
User-centric Cell-free Massive MIMO Networks: A Survey of Opportunities, Challenges and Solutions
Densification of network base stations is indispensable to achieve the stringent Quality of Service (QoS) requirements of future mobile networks. However, with a dense deployment of transmitters, interference management becomes an arduous task. To solve this issue, exploring radically new network architectures with int...
false
false
false
false
false
false
false
false
false
true
true
false
false
false
false
false
false
true
232,874
2204.05007
HiMODE: A Hybrid Monocular Omnidirectional Depth Estimation Model
Monocular omnidirectional depth estimation is receiving considerable research attention due to its broad applications for sensing 360{\deg} surroundings. Existing approaches in this field suffer from limitations in recovering small object details and data lost during the ground-truth depth map acquisition. In this pape...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
290,876
2403.08528
Pig aggression classification using CNN, Transformers and Recurrent Networks
The development of techniques that can be used to analyze and detect animal behavior is a crucial activity for the livestock sector, as it is possible to monitor the stress and animal welfare and contributes to decision making in the farm. Thus, the development of applications can assist breeders in making decisions to...
false
false
false
false
true
false
false
false
false
false
false
true
false
false
false
false
false
false
437,373
2205.11739
Deep Learning Meets Software Engineering: A Survey on Pre-Trained Models of Source Code
Recent years have seen the successful application of deep learning to software engineering (SE). In particular, the development and use of pre-trained models of source code has enabled state-of-the-art results to be achieved on a wide variety of SE tasks. This paper provides an overview of this rapidly advancing field ...
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
true
298,259
2006.01889
Generating Random Logic Programs Using Constraint Programming
Testing algorithms across a wide range of problem instances is crucial to ensure the validity of any claim about one algorithm's superiority over another. However, when it comes to inference algorithms for probabilistic logic programs, experimental evaluations are limited to only a few programs. Existing methods to gen...
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
true
179,885
1808.02531
SchiNet: Automatic Estimation of Symptoms of Schizophrenia from Facial Behaviour Analysis
Patients with schizophrenia often display impairments in the expression of emotion and speech and those are observed in their facial behaviour. Automatic analysis of patients' facial expressions that is aimed at estimating symptoms of schizophrenia has received attention recently. However, the datasets that are typical...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
104,785
2410.18413
AC-Network-Informed DC Optimal Power Flow for Electricity Markets
This paper presents a parametric quadratic approximation of the AC optimal power flow (AC-OPF) problem for time-sensitive and market-based applications. The parametric approximation preserves the physics-based but simple representation provided by the DC-OPF model and leverages market and physics information encoded in...
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
501,877
1707.04724
Memoisation: Purely, Left-recursively, and with (Continuation Passing) Style
Memoisation, or tabling, is a well-known technique that yields large improvements in the performance of some recursive computations. Tabled resolution in Prologs such as XSB and B-Prolog can transform so called left-recursive predicates from non-terminating computations into finite and well-behaved ones. In the functio...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
true
77,095
2104.10093
Class-Incremental Learning with Generative Classifiers
Incrementally training deep neural networks to recognize new classes is a challenging problem. Most existing class-incremental learning methods store data or use generative replay, both of which have drawbacks, while 'rehearsal-free' alternatives such as parameter regularization or bias-correction methods do not consis...
false
false
false
false
true
false
true
false
false
false
false
true
false
false
false
false
false
false
231,461
2001.11710
Context-Aware Deep Q-Network for Decentralized Cooperative Reconnaissance by a Robotic Swarm
One of the crucial problems in robotic swarm-based operation is to search and neutralize heterogeneous targets in an unknown and uncertain environment, without any communication within the swarm. Here, some targets can be neutralized by a single robot, while others need multiple robots in a particular sequence to neutr...
false
false
false
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
162,145
2104.09088
Alexa Conversations: An Extensible Data-driven Approach for Building Task-oriented Dialogue Systems
Traditional goal-oriented dialogue systems rely on various components such as natural language understanding, dialogue state tracking, policy learning and response generation. Training each component requires annotations which are hard to obtain for every new domain, limiting scalability of such systems. Similarly, rul...
false
false
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
231,112
2202.07231
Few-shot semantic segmentation via mask aggregation
Few-shot semantic segmentation aims to recognize novel classes with only very few labelled data. This challenging task requires mining of the relevant relationships between the query image and the support images. Previous works have typically regarded it as a pixel-wise classification problem. Therefore, various models...
false
false
false
false
true
false
false
false
false
false
false
true
false
false
false
false
false
false
280,482
2409.15868
Privacy Evaluation Benchmarks for NLP Models
By inducing privacy attacks on NLP models, attackers can obtain sensitive information such as training data and model parameters, etc. Although researchers have studied, in-depth, several kinds of attacks in NLP models, they are non-systematic analyses. It lacks a comprehensive understanding of the impact caused by the...
false
false
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
491,104
2309.04013
An Element-wise RSAV Algorithm for Unconstrained Optimization Problems
We present a novel optimization algorithm, element-wise relaxed scalar auxiliary variable (E-RSAV), that satisfies an unconditional energy dissipation law and exhibits improved alignment between the modified and the original energy. Our algorithm features rigorous proofs of linear convergence in the convex setting. Fur...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
390,583
1807.05688
SCAN: Self-and-Collaborative Attention Network for Video Person Re-identification
Video person re-identification attracts much attention in recent years. It aims to match image sequences of pedestrians from different camera views. Previous approaches usually improve this task from three aspects, including a) selecting more discriminative frames, b) generating more informative temporal representation...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
102,975
2310.12976
Exploring Invariance in Images through One-way Wave Equations
In this paper, we empirically reveal an invariance over images-images share a set of one-way wave equations with latent speeds. Each image is uniquely associated with a solution to these wave equations, allowing for its reconstruction with high fidelity from an initial condition. We demonstrate it using an intuitive en...
false
false
false
false
false
false
true
false
false
false
false
true
false
false
false
false
false
false
401,229
2310.20366
Distil the informative essence of loop detector data set: Is network-level traffic forecasting hungry for more data?
Network-level traffic condition forecasting has been intensively studied for decades. Although prediction accuracy has been continuously improved with emerging deep learning models and ever-expanding traffic data, traffic forecasting still faces many challenges in practice. These challenges include the robustness of da...
false
false
false
false
false
false
true
false
false
false
true
false
false
false
false
false
false
false
404,365
2001.01526
Mutual Mean-Teaching: Pseudo Label Refinery for Unsupervised Domain Adaptation on Person Re-identification
Person re-identification (re-ID) aims at identifying the same persons' images across different cameras. However, domain diversities between different datasets pose an evident challenge for adapting the re-ID model trained on one dataset to another one. State-of-the-art unsupervised domain adaptation methods for person ...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
159,503
2110.10994
Interpretable Machine Learning for Resource Allocation with Application to Ventilator Triage
Rationing of healthcare resources is a challenging decision that policy makers and providers may be forced to make during a pandemic, natural disaster, or mass casualty event. Well-defined guidelines to triage scarce life-saving resources must be designed to promote transparency, trust, and consistency. To facilitate b...
false
false
false
false
false
false
true
false
false
false
false
false
false
true
false
false
false
false
262,327
2307.13424
Holistic Exploration on Universal Decompositional Semantic Parsing: Architecture, Data Augmentation, and LLM Paradigm
In this paper, we conduct a holistic exploration of the Universal Decompositional Semantic (UDS) Parsing. We first introduce a cascade model for UDS parsing that decomposes the complex parsing task into semantically appropriate subtasks. Our approach outperforms the prior models, while significantly reducing inference ...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
381,583
2303.15046
Nighttime Smartphone Reflective Flare Removal Using Optical Center Symmetry Prior
Reflective flare is a phenomenon that occurs when light reflects inside lenses, causing bright spots or a "ghosting effect" in photos, which can impact their quality. Eliminating reflective flare is highly desirable but challenging. Many existing methods rely on manually designed features to detect these bright spots, ...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
354,340
2412.04137
Text Change Detection in Multilingual Documents Using Image Comparison
Document comparison typically relies on optical character recognition (OCR) as its core technology. However, OCR requires the selection of appropriate language models for each document and the performance of multilingual or hybrid models remains limited. To overcome these challenges, we propose text change detection (T...
false
false
false
false
true
false
true
false
true
false
false
true
false
false
false
false
false
false
514,276
2007.08053
Inductive Link Prediction for Nodes Having Only Attribute Information
Predicting the link between two nodes is a fundamental problem for graph data analytics. In attributed graphs, both the structure and attribute information can be utilized for link prediction. Most existing studies focus on transductive link prediction where both nodes are already in the graph. However, many real-world...
false
false
false
true
false
false
true
false
false
false
false
false
false
false
false
false
false
false
187,505
2207.04673
Learning Spatial and Temporal Variations for 4D Point Cloud Segmentation
LiDAR-based 3D scene perception is a fundamental and important task for autonomous driving. Most state-of-the-art methods on LiDAR-based 3D recognition tasks focus on single frame 3D point cloud data, and the temporal information is ignored in those methods. We argue that the temporal information across the frames prov...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
307,273
2411.13093
Video-RAG: Visually-aligned Retrieval-Augmented Long Video Comprehension
Existing large video-language models (LVLMs) struggle to comprehend long videos correctly due to limited context. To address this problem, fine-tuning long-context LVLMs and employing GPT-based agents have emerged as promising solutions. However, fine-tuning LVLMs would require extensive high-quality data and substanti...
false
false
false
false
true
false
false
false
false
false
false
true
false
false
false
false
false
false
509,674
2410.20855
ByteNet: Rethinking Multimedia File Fragment Classification through Visual Perspectives
Multimedia file fragment classification (MFFC) aims to identify file fragment types, e.g., image/video, audio, and text without system metadata. It is of vital importance in multimedia storage and communication. Existing MFFC methods typically treat fragments as 1D byte sequences and emphasize the relations between sep...
false
false
false
false
false
false
false
false
false
false
false
true
true
false
false
false
false
true
502,995
2002.00614
Regularizers for Single-step Adversarial Training
The progress in the last decade has enabled machine learning models to achieve impressive performance across a wide range of tasks in Computer Vision. However, a plethora of works have demonstrated the susceptibility of these models to adversarial samples. Adversarial training procedure has been proposed to defend agai...
false
false
false
false
false
false
true
false
false
false
false
true
false
false
false
false
false
false
162,409
1801.09749
Deep Learning based Retinal OCT Segmentation
Our objective is to evaluate the efficacy of methods that use deep learning (DL) for the automatic fine-grained segmentation of optical coherence tomography (OCT) images of the retina. OCT images from 10 patients with mild non-proliferative diabetic retinopathy were used from a public (U. of Miami) dataset. For each pa...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
89,163
2312.11862
Topo-MLP : A Simplicial Network Without Message Passing
Due to their ability to model meaningful higher order relations among a set of entities, higher order network models have emerged recently as a powerful alternative for graph-based network models which are only capable of modeling binary relationships. Message passing paradigm is still dominantly used to learn represen...
false
false
false
false
true
false
true
false
false
false
false
true
false
false
false
false
false
false
416,750
1202.5657
Design of a Fractional Order Phase Shaper for Iso-damped Control of a PHWR under Step-back Condition
Phase shaping using fractional order (FO) phase shapers has been proposed by many contemporary researchers as a means of producing systems with iso-damped closed loop response due to a stepped variation in input. Such systems, with the closed loop damping remaining invariant to gain changes can be used to produce dead-...
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
14,571
1905.10351
Tempus Volat, Hora Fugit -- A Survey of Tie-Oriented Dynamic Network Models in Discrete and Continuous Time
Given the growing number of available tools for modeling dynamic networks, the choice of a suitable model becomes central. The goal of this survey is to provide an overview of tie-oriented dynamic network models. The survey is focused on introducing binary network models with their corresponding assumptions, advantages...
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
false
132,032
2205.04169
Multi-Fingered In-Hand Manipulation with Various Object Properties Using Graph Convolutional Networks and Distributed Tactile Sensors
Multi-fingered hands could be used to achieve many dexterous manipulation tasks, similarly to humans, and tactile sensing could enhance the manipulation stability for a variety of objects. However, tactile sensors on multi-fingered hands have a variety of sizes and shapes. Convolutional neural networks (CNN) can be use...
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
295,560
2002.00666
Agent-Based Proof Design via Lemma Flow Diagram
We discuss an agent-based approach to proof design and implementation, which we call {\it Lemma Flow Diagram} (LFD). This approach is based on the multicut rule with $shared$ cuts. This approach is modular and easy to use, read and automate. Thus, we consider LFD an appealing alternative to `flow proof' which is popula...
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
true
162,422
1703.01956
5G Wireless and Wired Convergence in a Passive Optical Network using UF-OFDM and GFDM
The provision of both wireless and wired services in the optical access domain will be an important function for future passive optical networks (PON). With the emergence of 5th generation (5G) mobile communications, a move toward a dense deployment of small cell antenna sites, in conjunction with a cloud radio access ...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
69,460
2207.11177
Provable Defense Against Geometric Transformations
Geometric image transformations that arise in the real world, such as scaling and rotation, have been shown to easily deceive deep neural networks (DNNs). Hence, training DNNs to be certifiably robust to these perturbations is critical. However, no prior work has been able to incorporate the objective of deterministic ...
false
false
false
false
false
false
true
false
false
false
false
true
false
false
false
false
false
false
309,533
2105.07109
The Low-Dimensional Linear Geometry of Contextualized Word Representations
Black-box probing models can reliably extract linguistic features like tense, number, and syntactic role from pretrained word representations. However, the manner in which these features are encoded in representations remains poorly understood. We present a systematic study of the linear geometry of contextualized word...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
235,318
2210.11344
Towards Evology: a Market Ecology Agent-Based Model of US Equity Mutual Funds
The profitability of various investment styles in investment funds depends on macroeconomic conditions. Market ecology, which views financial markets as ecosystems of diverse, interacting and evolving trading strategies, has shown that endogenous interactions between strategies determine market behaviour and styles' pe...
false
true
false
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
325,277
2410.08900
A Benchmark for Cross-Domain Argumentative Stance Classification on Social Media
Argumentative stance classification plays a key role in identifying authors' viewpoints on specific topics. However, generating diverse pairs of argumentative sentences across various domains is challenging. Existing benchmarks often come from a single domain or focus on a limited set of topics. Additionally, manual an...
false
false
false
false
true
false
false
false
true
false
false
false
false
false
false
false
false
false
497,335
2309.15554
Direct Models for Simultaneous Translation and Automatic Subtitling: FBK@IWSLT2023
This paper describes the FBK's participation in the Simultaneous Translation and Automatic Subtitling tracks of the IWSLT 2023 Evaluation Campaign. Our submission focused on the use of direct architectures to perform both tasks: for the simultaneous one, we leveraged the knowledge already acquired by offline-trained mo...
false
false
true
false
true
false
false
false
true
false
false
false
false
false
false
false
false
false
395,015
2108.00612
Several classes of bent functions over finite fields
Let $\mathbb{F}_{p^{n}}$ be the finite field with $p^n$ elements and $\operatorname{Tr}(\cdot)$ be the trace function from $\mathbb{F}_{p^{n}}$ to $\mathbb{F}_{p}$, where $p$ is a prime and $n$ is an integer. Inspired by the works of Mesnager (IEEE Trans. Inf. Theory 60(7): 4397-4407, 2014) and Tang et al. (IEEE Trans....
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
248,774
2003.10675
Increasing Security Degree of Freedom in Multi-user and Multi-eve Systems
Secure communication in the Multi-user and Multi-eavesdropper (MUME) scenario is considered in this paper. It has be shown that secrecy can be improved when the transmitter simultaneously transmits information-bearing signal to the intended receivers and artificial noise to confuse the eavesdroppers. Several processing...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
169,410
2310.11589
Eliciting Human Preferences with Language Models
Language models (LMs) can be directed to perform target tasks by using labeled examples or natural language prompts. But selecting examples or writing prompts for can be challenging--especially in tasks that involve unusual edge cases, demand precise articulation of nebulous preferences, or require an accurate mental m...
false
false
false
false
true
false
true
false
true
false
false
false
false
false
false
false
false
false
400,690
2002.07788
Multi-Issue Bargaining With Deep Reinforcement Learning
Negotiation is a process where agents aim to work through disputes and maximize their surplus. As the use of deep reinforcement learning in bargaining games is unexplored, this paper evaluates its ability to exploit, adapt, and cooperate to produce fair outcomes. Two actor-critic networks were trained for the bidding a...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
true
false
false
true
164,569
2102.08498
Pattern Sampling for Shapelet-based Time Series Classification
Subsequence-based time series classification algorithms provide accurate and interpretable models, but training these models is extremely computation intensive. The asymptotic time complexity of subsequence-based algorithms remains a higher-order polynomial, because these algorithms are based on exhaustive search for h...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
220,475
2105.11678
Hybrid Movie Recommender System based on Resource Allocation
Recommender Systems are inevitable to personalize user's experiences on the Internet. They are using different approaches to recommend the Top-K items to users according to their preferences. Nowadays recommender systems have become one of the most important parts of largescale data mining techniques. In this paper, we...
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
236,783
2203.00111
Pedagogical Demonstrations and Pragmatic Learning in Artificial Tutor-Learner Interactions
When demonstrating a task, human tutors pedagogically modify their behavior by either "showing" the task rather than just "doing" it (exaggerating on relevant parts of the demonstration) or by giving demonstrations that best disambiguate the communicated goal. Analogously, human learners pragmatically infer the communi...
true
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
282,871
1801.06742
Multi-pseudo Regularized Label for Generated Data in Person Re-Identification
Sufficient training data normally is required to train deeply learned models. However, due to the expensive manual process for labelling large number of images, the amount of available training data is always limited. To produce more data for training a deep network, Generative Adversarial Network (GAN) can be used to ...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
88,665
2202.05709
A Python Tool for Object-Centric Process Mining Comparison
Object-centric process mining provides a more holistic view of processes where we analyze processes with multiple case notions. However, most object-centric process mining techniques consider the whole event log rather than the comparison of existing behaviors in the log. In this paper, we introduce a stand-alone objec...
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
true
false
279,959
2110.03659
Transform2Act: Learning a Transform-and-Control Policy for Efficient Agent Design
An agent's functionality is largely determined by its design, i.e., skeletal structure and joint attributes (e.g., length, size, strength). However, finding the optimal agent design for a given function is extremely challenging since the problem is inherently combinatorial and the design space is prohibitively large. A...
false
false
false
false
true
false
true
true
false
false
false
true
false
false
false
true
false
false
259,580
2406.17475
Performative Debias with Fair-exposure Optimization Driven by Strategic Agents in Recommender Systems
Data bias, e.g., popularity impairs the dynamics of two-sided markets within recommender systems. This overshadows the less visible but potentially intriguing long-tail items that could capture user interest. Despite the abundance of research surrounding this issue, it still poses challenges and remains a hot topic in ...
false
false
false
false
false
true
true
false
false
false
false
false
false
false
false
false
false
false
467,589
2402.04655
Open-Vocabulary Calibration for Fine-tuned CLIP
Vision-language models (VLMs) have emerged as formidable tools, showing their strong capability in handling various open-vocabulary tasks in image recognition, text-driven visual content generation, and visual chatbots, to name a few. In recent years, considerable efforts and resources have been devoted to adaptation m...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
427,546
2404.16339
Training-Free Unsupervised Prompt for Vision-Language Models
Prompt learning has become the most effective paradigm for adapting large pre-trained vision-language models (VLMs) to downstream tasks. Recently, unsupervised prompt tuning methods, such as UPL and POUF, directly leverage pseudo-labels as supervisory information to fine-tune additional adaptation modules on unlabeled ...
false
false
false
false
true
false
false
false
false
false
false
true
false
false
false
false
false
false
449,452
2412.17226
OLiDM: Object-aware LiDAR Diffusion Models for Autonomous Driving
To enhance autonomous driving safety in complex scenarios, various methods have been proposed to simulate LiDAR point cloud data. Nevertheless, these methods often face challenges in producing high-quality, diverse, and controllable foreground objects. To address the needs of object-aware tasks in 3D perception, we int...
false
false
false
false
false
false
false
true
false
false
false
true
false
false
false
false
false
false
519,874
2307.01400
Spatio-Temporal Surrogates for Interaction of a Jet with High Explosives: Part II -- Clustering Extremely High-Dimensional Grid-Based Data
Building an accurate surrogate model for the spatio-temporal outputs of a computer simulation is a challenging task. A simple approach to improve the accuracy of the surrogate is to cluster the outputs based on similarity and build a separate surrogate model for each cluster. This clustering is relatively straightforwa...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
true
377,335
2106.15121
Face Sketch Synthesis via Semantic-Driven Generative Adversarial Network
Face sketch synthesis has made significant progress with the development of deep neural networks in these years. The delicate depiction of sketch portraits facilitates a wide range of applications like digital entertainment and law enforcement. However, accurate and realistic face sketch generation is still a challengi...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
243,619
2406.05366
Regret Bounds for Episodic Risk-Sensitive Linear Quadratic Regulator
Risk-sensitive linear quadratic regulator is one of the most fundamental problems in risk-sensitive optimal control. In this paper, we study online adaptive control of risk-sensitive linear quadratic regulator in the finite horizon episodic setting. We propose a simple least-squares greedy algorithm and show that it ac...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
462,103
2110.12468
False Correlation Reduction for Offline Reinforcement Learning
Offline reinforcement learning (RL) harnesses the power of massive datasets for resolving sequential decision problems. Most existing papers only discuss defending against out-of-distribution (OOD) actions while we investigate a broader issue, the false correlations between epistemic uncertainty and decision-making, an...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
false
false
262,855
1102.2250
Modeling the pairwise key distribution scheme in the presence of unreliable links
We investigate the secure connectivity of wireless sensor networks under the pairwise key distribution scheme of Chan et al.. Unlike recent work which was carried out under the assumption of full visibility, here we assume a (simplified) communication model where unreliable wireless links are represented as on/off chan...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
9,113
2307.08319
Soft Curriculum for Learning Conditional GANs with Noisy-Labeled and Uncurated Unlabeled Data
Label-noise or curated unlabeled data is used to compensate for the assumption of clean labeled data in training the conditional generative adversarial network; however, satisfying such an extended assumption is occasionally laborious or impractical. As a step towards generative modeling accessible to everyone, we intr...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
379,763
1007.1270
How to Maximize User Satisfaction Degree in Multi-service IP Networks
Bandwidth allocation is a fundamental problem in communication networks. With current network moving towards the Future Internet model, the problem is further intensified as network traffic demanding far from exceeds network bandwidth capability. Maintaining a certain user satisfaction degree therefore becomes a challe...
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
true
7,022
1910.07320
The Blessings of Multiple Causes: A Reply to Ogburn et al. (2019)
Ogburn et al. (2019, arXiv:1910.05438) discuss "The Blessings of Multiple Causes" (Wang and Blei, 2018, arXiv:1805.06826). Many of their remarks are interesting. But they also claim that the paper has "foundational errors" and that its "premise is...incorrect." These claims are not substantiated. There are no foundatio...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
149,575
1903.03692
Self-triggered Control for Safety Critical Systems using Control Barrier Functions
We propose a real-time control strategy that combines self-triggered control with Control Lyapunov Functions (CLF) and Control Barrier Functions (CBF). Similar to related works proposing CLF-CBF-based controllers, the computation of the controller is achieved by solving a Quadratic Program (QP). However, we propose a Z...
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
123,788
1905.10328
Tiresias: Predicting Security Events Through Deep Learning
With the increased complexity of modern computer attacks, there is a need for defenders not only to detect malicious activity as it happens, but also to predict the specific steps that will be taken by an adversary when performing an attack. However this is still an open research problem, and previous research in predi...
false
false
false
false
false
false
true
false
false
false
false
false
true
false
false
false
false
false
132,021
2210.08667
From Function to Failure
Failure Mode Reasoning (FMR) is a method for formal analysis of system-related faults. The method was originally developed for identifying failure modes of safety-critical systems based on an analysis of their programs. In this paper, we generalize the method and present a mathematical framework for its use in model-ba...
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
true
324,241
1903.10453
dpUGC: Learn Differentially Private Representation for User Generated Contents
This paper firstly proposes a simple yet efficient generalized approach to apply differential privacy to text representation (i.e., word embedding). Based on it, we propose a user-level approach to learn personalized differentially private word embedding model on user generated contents (UGC). To our best knowledge, th...
false
false
false
false
false
false
false
false
true
false
false
false
true
false
false
false
false
false
125,279
1507.02921
Zero Attracting PNLMS Algorithm and Its Convergence in Mean
The proportionate normalized least mean square (PNLMS) algorithm and its variants are by far the most popular adaptive filters that are used to identify sparse systems. The convergence speed of the PNLMS algorithm, though very high initially, however, slows down at a later stage, even becoming worse than sparsity agnos...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
45,032
2103.02140
PML: Progressive Margin Loss for Long-tailed Age Classification
In this paper, we propose a progressive margin loss (PML) approach for unconstrained facial age classification. Conventional methods make strong assumption on that each class owns adequate instances to outline its data distribution, likely leading to bias prediction where the training samples are sparse across age clas...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
222,856
2106.07470
Comparing vector fields across surfaces: interest for characterizing the orientations of cortical folds
Vectors fields defined on surfaces constitute relevant and useful representations but are rarely used. One reason might be that comparing vector fields across two surfaces of the same genus is not trivial: it requires to transport the vector fields from the original surfaces onto a common domain. In this paper, we prop...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
240,933
2103.10600
GCN-ALP: Addressing Matching Collisions in Anchor Link Prediction
Nowadays online users prefer to join multiple social media for the purpose of socialized online service. The problem \textit{anchor link prediction} is formalized to link user data with the common ground on user profile, content and network structure across social networks. Most of the traditional works concentrated on...
false
false
false
true
true
false
false
false
false
false
false
false
false
false
false
false
false
false
225,506
2102.07156
ChipNet: Budget-Aware Pruning with Heaviside Continuous Approximations
Structured pruning methods are among the effective strategies for extracting small resource-efficient convolutional neural networks from their dense counterparts with minimal loss in accuracy. However, most existing methods still suffer from one or more limitations, that include 1) the need for training the dense model...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
220,012
2203.16763
CREATE: A Benchmark for Chinese Short Video Retrieval and Title Generation
Previous works of video captioning aim to objectively describe the video's actual content, which lacks subjective and attractive expression, limiting its practical application scenarios. Video titling is intended to achieve this goal, but there is a lack of a proper benchmark. In this paper, we propose to CREATE, the f...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
288,906
2111.02529
Shift Happens: Adjusting Classifiers
Minimizing expected loss measured by a proper scoring rule, such as Brier score or log-loss (cross-entropy), is a common objective while training a probabilistic classifier. If the data have experienced dataset shift where the class distributions change post-training, then often the model's performance will decrease, o...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
264,898
2108.06685
Vector-Decomposed Disentanglement for Domain-Invariant Object Detection
To improve the generalization of detectors, for domain adaptive object detection (DAOD), recent advances mainly explore aligning feature-level distributions between the source and single-target domain, which may neglect the impact of domain-specific information existing in the aligned features. Towards DAOD, it is impo...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
250,682
1909.11512
Synthetic Data for Deep Learning
Synthetic data is an increasingly popular tool for training deep learning models, especially in computer vision but also in other areas. In this work, we attempt to provide a comprehensive survey of the various directions in the development and application of synthetic data. First, we discuss synthetic datasets for bas...
false
false
false
false
false
false
true
false
false
false
false
true
true
false
false
false
false
false
146,832
2408.02210
ExoViP: Step-by-step Verification and Exploration with Exoskeleton Modules for Compositional Visual Reasoning
Compositional visual reasoning methods, which translate a complex query into a structured composition of feasible visual tasks, have exhibited a strong potential in complicated multi-modal tasks. Empowered by recent advances in large language models (LLMs), this multi-modal challenge has been brought to a new stage by ...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
478,543
2410.20210
Looking Beyond The Top-1: Transformers Determine Top Tokens In Order
Understanding the inner workings of Transformers is crucial for achieving more accurate and efficient predictions. In this work, we analyze the computation performed by Transformers in the layers after the top-1 prediction has become fixed, which has been previously referred to as the "saturation event". We expand the ...
false
false
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
502,701
2402.09392
LL-GABR: Energy Efficient Live Video Streaming Using Reinforcement Learning
Over the recent years, research and development in adaptive bitrate (ABR) algorithms for live video streaming have been successful in improving users' quality of experience (QoE) by reducing latency to near real-time levels while delivering higher bitrate videos with minimal rebuffering time. However, the QoE models us...
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
true
429,500
1208.2015
Sharp analysis of low-rank kernel matrix approximations
We consider supervised learning problems within the positive-definite kernel framework, such as kernel ridge regression, kernel logistic regression or the support vector machine. With kernels leading to infinite-dimensional feature spaces, a common practical limiting difficulty is the necessity of computing the kernel ...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
18,011
2001.00784
Optimizing Wireless Systems Using Unsupervised and Reinforced-Unsupervised Deep Learning
Resource allocation and transceivers in wireless networks are usually designed by solving optimization problems subject to specific constraints, which can be formulated as variable or functional optimization. If the objective and constraint functions of a variable optimization problem can be derived, standard numerical...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
159,323
2305.16475
Initialization-Dependent Sample Complexity of Linear Predictors and Neural Networks
We provide several new results on the sample complexity of vector-valued linear predictors (parameterized by a matrix), and more generally neural networks. Focusing on size-independent bounds, where only the Frobenius norm distance of the parameters from some fixed reference matrix $W_0$ is controlled, we show that the...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
368,103
1907.11039
Visualization of Emergency Department Clinical Data for Interpretable Patient Phenotyping
Visual summarization of clinical data collected on patients contained within the electronic health record (EHR) may enable precise and rapid triage at the time of patient presentation to an emergency department (ED). The triage process is critical in the appropriate allocation of resources and in anticipating eventual ...
true
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
139,767
2202.01454
Deep Hierarchy in Bandits
Mean rewards of actions are often correlated. The form of these correlations may be complex and unknown a priori, such as the preferences of a user for recommended products and their categories. To maximize statistical efficiency, it is important to leverage these correlations when learning. We formulate a bandit varia...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
278,487
2102.12066
On the Minimal Error of Empirical Risk Minimization
We study the minimal error of the Empirical Risk Minimization (ERM) procedure in the task of regression, both in the random and the fixed design settings. Our sharp lower bounds shed light on the possibility (or impossibility) of adapting to simplicity of the model generating the data. In the fixed design setting, we s...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
221,599
2108.02842
Multimodal Meta-Learning for Time Series Regression
Recent work has shown the efficiency of deep learning models such as Fully Convolutional Networks (FCN) or Recurrent Neural Networks (RNN) to deal with Time Series Regression (TSR) problems. These models sometimes need a lot of data to be able to generalize, yet the time series are sometimes not long enough to be able ...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
249,467
2003.06849
Deep Affinity Net: Instance Segmentation via Affinity
Most of the modern instance segmentation approaches fall into two categories: region-based approaches in which object bounding boxes are detected first and later used in cropping and segmenting instances; and keypoint-based approaches in which individual instances are represented by a set of keypoints followed by a den...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
168,249
1911.08715
An Inception Inspired Deep Network to Analyse Fundus Images
A fundus image usually contains the optic disc, pathologies and other structures in addition to vessels to be segmented. This study proposes a deep network for vessel segmentation, whose architecture is inspired by inception modules. The network contains three sub-networks, each with a different filter size, which are ...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
154,279
2407.18808
Learning Chaotic Systems and Long-Term Predictions with Neural Jump ODEs
The Path-dependent Neural Jump ODE (PD-NJ-ODE) is a model for online prediction of generic (possibly non-Markovian) stochastic processes with irregular (in time) and potentially incomplete (with respect to coordinates) observations. It is a model for which convergence to the $L^2$-optimal predictor, which is given by t...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
false
false
476,522
1601.02658
Information-theoretic thresholds for community detection in sparse networks
We give upper and lower bounds on the information-theoretic threshold for community detection in the stochastic block model. Specifically, let $k$ be the number of groups, $d$ be the average degree, the probability of edges between vertices within and between groups be $c_\mathrm{in}/n$ and $c_\mathrm{out}/n$ respectiv...
false
false
false
true
false
false
false
false
false
true
false
false
false
false
false
false
false
true
50,849
2403.04810
Restricted Bayesian Neural Network
Modern deep learning tools are remarkably effective in addressing intricate problems. However, their operation as black-box models introduces increased uncertainty in predictions. Additionally, they contend with various challenges, including the need for substantial storage space in large networks, issues of overfittin...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
true
false
false
435,752
1906.03387
A Novel Modeling Approach for All-Dielectric Metasurfaces Using Deep Neural Networks
Metasurfaces have become a promising means for manipulating optical wavefronts in flat and high-performance optical devices. Conventional metasurface device design relies on trial-and-error methods to obtain target electromagnetic (EM) response, an approach that demands significant efforts to investigate the enormous n...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
134,364
2209.02384
Data Centred Intelligent Geosciences: Research Agenda and Opportunities, Position Paper
This paper describes and discusses our vision to develop and reason about best practices and novel ways of curating data-centric geosciences knowledge (data, experiments, models, methods, conclusions, and interpretations). This knowledge is produced from applying statistical modelling, Machine Learning, and modern data...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
true
false
316,185
2202.00866
Decoupled IoU Regression for Object Detection
Non-maximum suppression (NMS) is widely used in object detection pipelines for removing duplicated bounding boxes. The inconsistency between the confidence for NMS and the real localization confidence seriously affects detection performance. Prior works propose to predict Intersection-over-Union (IoU) between bounding ...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
278,286