id
stringlengths
9
16
title
stringlengths
4
278
abstract
stringlengths
3
4.08k
cs.HC
bool
2 classes
cs.CE
bool
2 classes
cs.SD
bool
2 classes
cs.SI
bool
2 classes
cs.AI
bool
2 classes
cs.IR
bool
2 classes
cs.LG
bool
2 classes
cs.RO
bool
2 classes
cs.CL
bool
2 classes
cs.IT
bool
2 classes
cs.SY
bool
2 classes
cs.CV
bool
2 classes
cs.CR
bool
2 classes
cs.CY
bool
2 classes
cs.MA
bool
2 classes
cs.NE
bool
2 classes
cs.DB
bool
2 classes
Other
bool
2 classes
__index_level_0__
int64
0
541k
2305.05772
Spiking Neural Networks in the Alexiewicz Topology: A New Perspective on Analysis and Error Bounds
In order to ease the analysis of error propagation in neuromorphic computing and to get a better understanding of spiking neural networks (SNN), we address the problem of mathematical analysis of SNNs as endomorphisms that map spike trains to spike trains. A central question is the adequate structure for a space of spi...
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
true
false
true
363,271
2402.13987
A Simple and Yet Fairly Effective Defense for Graph Neural Networks
Graph Neural Networks (GNNs) have emerged as the dominant approach for machine learning on graph-structured data. However, concerns have arisen regarding the vulnerability of GNNs to small adversarial perturbations. Existing defense methods against such perturbations suffer from high time complexity and can negatively ...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
431,486
2007.08607
Optimization of Surface Plasmon Resonance Biosensor for Analysis of Lipid Molecules
Surface Plasmon Resonance (SPR) is an important bio-sensing technique for real-time label-free detection. However, it is pivotal to optimize various parameters of the sensor configuration for efficient and highly sensitive sensing. To that effect, we focus on optimizing two different SPR structures -- the basic Kretsch...
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
187,679
2012.06060
Spatially Conditioned Graphs for Detecting Human-Object Interactions
We address the problem of detecting human-object interactions in images using graphical neural networks. Unlike conventional methods, where nodes send scaled but otherwise identical messages to each of their neighbours, we propose to condition messages between pairs of nodes on their spatial relationships, resulting in...
false
false
false
false
true
false
true
false
false
false
false
true
false
false
false
false
false
false
210,982
2407.21571
PMoE: Progressive Mixture of Experts with Asymmetric Transformer for Continual Learning
Large Language Models (LLMs) encounter significant challenges in continual learning due to catastrophic forgetting, where new information overwrites previously acquired knowledge. This limitation leads to substantial environmental and economic waste. In this study, we introduce the PMoE, Progressive Mixture of Experts ...
false
false
false
false
true
false
false
false
true
false
false
false
false
false
false
false
false
false
477,595
1905.06618
On the Fairness of Time-Critical Influence Maximization in Social Networks
Influence maximization has found applications in a wide range of real-world problems, for instance, viral marketing of products in an online social network, and information propagation of valuable information such as job vacancy advertisements and health-related information. While existing algorithmic techniques usuall...
false
false
false
true
false
false
false
false
false
false
false
false
false
true
false
false
false
false
131,042
2501.10062
OMoE: Diversifying Mixture of Low-Rank Adaptation by Orthogonal Finetuning
Building mixture-of-experts (MoE) architecture for Low-rank adaptation (LoRA) is emerging as a potential direction in parameter-efficient fine-tuning (PEFT) for its modular design and remarkable performance. However, simply stacking the number of experts cannot guarantee significant improvement. In this work, we first ...
false
false
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
525,370
2003.13419
Use of fitted polynomials for the decentralized estimation of network variables in unbalanced radial LV feeders
The lack of comprehensive monitoring equipment in low voltage (LV) residential feeders, impedes a near-term deployment of centralized schemes for the integration of domestic-scale distributed generation (DG). In this context, this paper introduces a technique that generates a set of fitted polynomials, derived from off...
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
170,202
1906.08230
Evaluating Protein Transfer Learning with TAPE
Protein modeling is an increasingly popular area of machine learning research. Semi-supervised learning has emerged as an important paradigm in protein modeling due to the high cost of acquiring supervised protein labels, but the current literature is fragmented when it comes to datasets and standardized evaluation tec...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
135,810
1908.00328
ScarfNet: Multi-scale Features with Deeply Fused and Redistributed Semantics for Enhanced Object Detection
Convolutional neural network (CNN) has led to significant progress in object detection. In order to detect the objects in various sizes, the object detectors often exploit the hierarchy of the multi-scale feature maps called feature pyramid, which is readily obtained by the CNN architecture. However, the performance of...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
140,489
0812.0885
Elementary epistemological features of machine intelligence
Theoretical analysis of machine intelligence (MI) is useful for defining a common platform in both theoretical and applied artificial intelligence (AI). The goal of this paper is to set canonical definitions that can assist pragmatic research in both strong and weak AI. Described epistemological features of machine int...
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
2,744
2306.16354
cuSLINK: Single-linkage Agglomerative Clustering on the GPU
In this paper, we propose cuSLINK, a novel and state-of-the-art reformulation of the SLINK algorithm on the GPU which requires only $O(Nk)$ space and uses a parameter $k$ to trade off space and time. We also propose a set of novel and reusable building blocks that compose cuSLINK. These building blocks include highly o...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
376,346
2205.04060
Approaches to the classification of complex systems: Words, texts, and more
The Chapter starts with introductory information about quantitative linguistics notions, like rank--frequency dependence, Zipf's law, frequency spectra, etc. Similarities in distributions of words in texts with level occupation in quantum ensembles hint at a superficial analogy with statistical physics. This enables on...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
295,521
1311.2795
Complete solution of a constrained tropical optimization problem with application to location analysis
We present a multidimensional optimization problem that is formulated and solved in the tropical mathematics setting. The problem consists of minimizing a nonlinear objective function defined on vectors over an idempotent semifield by means of a conjugate transposition operator, subject to constraints in the form of li...
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
28,351
1704.04760
In-Datacenter Performance Analysis of a Tensor Processing Unit
Many architects believe that major improvements in cost-energy-performance must now come from domain-specific hardware. This paper evaluates a custom ASIC---called a Tensor Processing Unit (TPU)---deployed in datacenters since 2015 that accelerates the inference phase of neural networks (NN). The heart of the TPU is a ...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
true
false
true
71,883
2406.14799
Capture Point Control in Thruster-Assisted Bipedal Locomotion
Despite major advancements in control design that are robust to unplanned disturbances, bipedal robots are still susceptible to falling over and struggle to negotiate rough terrains. By utilizing thrusters in our bipedal robot, we can perform additional posture manipulation and expand the modes of locomotion to enhance...
false
false
false
false
false
false
false
true
false
false
true
false
false
false
false
false
false
false
466,474
2104.05379
Comparing the Benefit of Synthetic Training Data for Various Automatic Speech Recognition Architectures
Recent publications on automatic-speech-recognition (ASR) have a strong focus on attention encoder-decoder (AED) architectures which tend to suffer from over-fitting in low resource scenarios. One solution to tackle this issue is to generate synthetic data with a trained text-to-speech system (TTS) if additional text i...
false
false
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
229,706
2007.09919
Robust Tracking against Adversarial Attacks
While deep convolutional neural networks (CNNs) are vulnerable to adversarial attacks, considerably few efforts have been paid to construct robust deep tracking algorithms against adversarial attacks. Current studies on adversarial attack and defense mainly reside in a single image. In this work, we first attempt to ge...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
188,111
2309.00649
GPT has become financially literate: Insights from financial literacy tests of GPT and a preliminary test of how people use it as a source of advice
We assess the ability of GPT -- a large language model -- to serve as a financial robo-advisor for the masses, by using a financial literacy test. Davinci and ChatGPT based on GPT-3.5 score 66% and 65% on the financial literacy test, respectively, compared to a baseline of 33%. However, ChatGPT based on GPT-4 achieves ...
false
false
false
false
true
false
false
false
true
false
false
false
false
true
false
false
false
false
389,376
2401.14426
M$^3$TN: Multi-gate Mixture-of-Experts based Multi-valued Treatment Network for Uplift Modeling
Uplift modeling is a technique used to predict the effect of a treatment (e.g., discounts) on an individual's response. Although several methods have been proposed for multi-valued treatment, they are extended from binary treatment methods. There are still some limitations. Firstly, existing methods calculate uplift ba...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
false
false
424,087
2006.08643
On the training dynamics of deep networks with $L_2$ regularization
We study the role of $L_2$ regularization in deep learning, and uncover simple relations between the performance of the model, the $L_2$ coefficient, the learning rate, and the number of training steps. These empirical relations hold when the network is overparameterized. They can be used to predict the optimal regular...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
182,247
2103.17007
Tossing Quantum Coins and Dice
The procedure of tossing quantum coins and dice is described. This case is an important example of a quantum procedure because it presents a typical framework employed in quantum information processing and quantum computing. The emphasis is on the clarification of the difference between quantum and classical conditiona...
false
false
false
false
true
false
false
false
false
true
false
false
false
false
false
false
false
false
227,762
2202.06851
HAKE: A Knowledge Engine Foundation for Human Activity Understanding
Human activity understanding is of widespread interest in artificial intelligence and spans diverse applications like health care and behavior analysis. Although there have been advances in deep learning, it remains challenging. The object recognition-like solutions usually try to map pixels to semantics directly, but ...
false
false
false
false
true
false
true
false
false
false
false
true
false
false
false
false
false
false
280,354
2202.02171
NeAT: Neural Adaptive Tomography
In this paper, we present Neural Adaptive Tomography (NeAT), the first adaptive, hierarchical neural rendering pipeline for multi-view inverse rendering. Through a combination of neural features with an adaptive explicit representation, we achieve reconstruction times far superior to existing neural inverse rendering m...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
true
278,719
1003.5893
Recognition of Handwritten Textual Annotations using Tesseract Open Source OCR Engine for information Just In Time (iJIT)
Objective of the current work is to develop an Optical Character Recognition (OCR) engine for information Just In Time (iJIT) system that can be used for recognition of handwritten textual annotations of lower case Roman script. Tesseract open source OCR engine under Apache License 2.0 is used to develop user-specific ...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
6,038
1902.04696
Using Approximate Models in Robot Learning
Trajectory following is one of the complicated control problems when its dynamics are nonlinear, stochastic and include a large number of parameters. The problem has significant difficulties including a large number of trials required for data collection and a massive volume of computations required to find a closed-lo...
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
121,397
2012.07619
What Makes a Good and Useful Summary? Incorporating Users in Automatic Summarization Research
Automatic text summarization has enjoyed great progress over the years and is used in numerous applications, impacting the lives of many. Despite this development, there is little research that meaningfully investigates how the current research focus in automatic summarization aligns with users' needs. To bridge this g...
true
false
false
false
true
true
false
false
true
false
false
false
false
false
false
false
false
false
211,525
2201.05917
Skydiving Technique Analysis from a Control Engineering Perspective: Developing a Tool for Aiding Motor Learning
This study offers an interdisciplinary approach to movement technique analysis, designed to deal with intensive interaction between an environment and a trainee. The free-fall stage of skydiving is investigated, when aerial maneuvers are performed by changing the body posture and thus deflecting the surrounding airflow...
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
275,546
2007.07606
timeXplain -- A Framework for Explaining the Predictions of Time Series Classifiers
Modern time series classifiers display impressive predictive capabilities, yet their decision-making processes mostly remain black boxes to the user. At the same time, model-agnostic explainers, such as the recently proposed SHAP, promise to make the predictions of machine learning models interpretable, provided there ...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
187,384
2302.06492
Optical flow estimation from event-based cameras and spiking neural networks
Event-based cameras are raising interest within the computer vision community. These sensors operate with asynchronous pixels, emitting events, or "spikes", when the luminance change at a given pixel since the last event surpasses a certain threshold. Thanks to their inherent qualities, such as their low power consumpt...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
345,423
2302.00441
Scaling Laws for Hyperparameter Optimization
Hyperparameter optimization is an important subfield of machine learning that focuses on tuning the hyperparameters of a chosen algorithm to achieve peak performance. Recently, there has been a stream of methods that tackle the issue of hyperparameter optimization, however, most of the methods do not exploit the domina...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
343,217
2208.02938
Abstract Interpretation for Generalized Heuristic Search in Model-Based Planning
Domain-general model-based planners often derive their generality by constructing search heuristics through the relaxation or abstraction of symbolic world models. We illustrate how abstract interpretation can serve as a unifying framework for these abstraction-based heuristics, extending the reach of heuristic search ...
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
true
311,621
2006.10129
Smoothed Analysis of Online and Differentially Private Learning
Practical and pervasive needs for robustness and privacy in algorithms have inspired the design of online adversarial and differentially private learning algorithms. The primary quantity that characterizes learnability in these settings is the Littlestone dimension of the class of hypotheses [Ben-David et al., 2009, Al...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
true
182,772
1806.02193
GraKeL: A Graph Kernel Library in Python
The problem of accurately measuring the similarity between graphs is at the core of many applications in a variety of disciplines. Graph kernels have recently emerged as a promising approach to this problem. There are now many kernels, each focusing on different structural aspects of graphs. Here, we present GraKeL, a ...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
99,723
2103.01737
Distilling Causal Effect of Data in Class-Incremental Learning
We propose a causal framework to explain the catastrophic forgetting in Class-Incremental Learning (CIL) and then derive a novel distillation method that is orthogonal to the existing anti-forgetting techniques, such as data replay and feature/label distillation. We first 1) place CIL into the framework, 2) answer why ...
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
222,729
2106.16118
SimNet: Enabling Robust Unknown Object Manipulation from Pure Synthetic Data via Stereo
Robot manipulation of unknown objects in unstructured environments is a challenging problem due to the variety of shapes, materials, arrangements and lighting conditions. Even with large-scale real-world data collection, robust perception and manipulation of transparent and reflective objects across various lighting co...
false
false
false
false
false
false
true
true
false
false
false
true
false
false
false
false
false
false
243,978
2106.06027
Sparse and Imperceptible Adversarial Attack via a Homotopy Algorithm
Sparse adversarial attacks can fool deep neural networks (DNNs) by only perturbing a few pixels (regularized by l_0 norm). Recent efforts combine it with another l_infty imperceptible on the perturbation magnitudes. The resultant sparse and imperceptible attacks are practically relevant, and indicate an even higher vul...
false
false
false
false
true
false
true
false
false
false
false
true
false
false
false
false
false
false
240,320
2409.09063
TS-EoH: An Edge Server Task Scheduling Algorithm Based on Evolution of Heuristic
With the widespread adoption of 5G and Internet of Things (IoT) technologies, the low latency provided by edge computing has great importance for real-time processing. However, managing numerous simultaneous service requests poses a significant challenge to maintaining low latency. Current edge server task scheduling m...
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
true
488,160
1809.02888
Lost in the Digital Wild: Hiding Information in Digital Activities
This paper presents a new general framework of information hiding, in which the hidden information is embedded into a collection of activities conducted by selected human and computer entities (e.g., a number of online accounts of one or more online social networks) in a selected digital world. Different from other tra...
false
false
false
true
false
false
false
false
false
false
false
false
true
false
false
false
false
false
107,168
2004.01790
Sifter: A Hybrid Workflow for Theme-based Video Curation at Scale
User-generated content platforms curate their vast repositories into thematic compilations that facilitate the discovery of high-quality material. Platforms that seek tight editorial control employ people to do this curation, but this process involves time-consuming routine tasks, such as sifting through thousands of v...
true
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
false
171,007
2111.08693
Inverting brain grey matter models with likelihood-free inference: a tool for trustable cytoarchitecture measurements
Effective characterisation of the brain grey matter cytoarchitecture with quantitative sensitivity to soma density and volume remains an unsolved challenge in diffusion MRI (dMRI). Solving the problem of relating the dMRI signal with cytoarchitectural characteristics calls for the definition of a mathematical model tha...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
266,781
2410.16089
Multi-Sensor Fusion for UAV Classification Based on Feature Maps of Image and Radar Data
The unique cost, flexibility, speed, and efficiency of modern UAVs make them an attractive choice in many applications in contemporary society. This, however, causes an ever-increasing number of reported malicious or accidental incidents, rendering the need for the development of UAV detection and classification mechan...
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
500,866
1212.2498
Learning Continuous Time Bayesian Networks
Continuous time Bayesian networks (CTBNs) describe structured stochastic processes with finitely many states that evolve over continuous time. A CTBN is a directed (possibly cyclic) dependency graph over a set of variables, each of which represents a finite state continuous time Markov process whose transition model is...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
20,301
2403.00944
Optimizing Dynamic Balance in a Rat Robot via the Lateral Flexion of a Soft Actuated Spine
Balancing oneself using the spine is a physiological alignment of the body posture in the most efficient manner by the muscular forces for mammals. For this reason, we can see many disabled quadruped animals can still stand or walk even with three limbs. This paper investigates the optimization of dynamic balance durin...
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
434,193
1911.05146
HyPar-Flow: Exploiting MPI and Keras for Scalable Hybrid-Parallel DNN Training using TensorFlow
To reduce training time of large-scale DNNs, scientists have started to explore parallelization strategies like data-parallelism, model-parallelism, and hybrid-parallelism. While data-parallelism has been extensively studied and developed, several problems exist in realizing model-parallelism and hybrid-parallelism eff...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
false
true
153,174
2304.07883
Bent & Broken Bicycles: Leveraging synthetic data for damaged object re-identification
Instance-level object re-identification is a fundamental computer vision task, with applications from image retrieval to intelligent monitoring and fraud detection. In this work, we propose the novel task of damaged object re-identification, which aims at distinguishing changes in visual appearance due to deformations ...
false
false
false
false
false
false
true
false
false
false
false
true
false
false
false
false
false
true
358,508
1212.0692
An Empirical Evaluation of Portfolios Approaches for solving CSPs
Recent research in areas such as SAT solving and Integer Linear Programming has shown that the performances of a single arbitrarily efficient solver can be significantly outperformed by a portfolio of possibly slower on-average solvers. We report an empirical evaluation and comparison of portfolio approaches applied to...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
false
false
20,115
2402.05460
I-FENN with Temporal Convolutional Networks: expediting the load-history analysis of non-local gradient damage propagation
In this paper, we demonstrate for the first time how the Integrated Finite Element Neural Network (I-FENN) framework, previously proposed by the authors, can efficiently simulate the entire loading history of non-local gradient damage propagation. To achieve this goal, we first adopt a Temporal Convolutional Network (T...
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
427,872
2310.11758
Domain-Generalized Face Anti-Spoofing with Unknown Attacks
Although face anti-spoofing (FAS) methods have achieved remarkable performance on specific domains or attack types, few studies have focused on the simultaneous presence of domain changes and unknown attacks, which is closer to real application scenarios. To handle domain-generalized unknown attacks, we introduce a new...
false
false
false
false
false
false
true
false
false
false
false
true
false
false
false
false
false
false
400,771
2406.13257
Reasoning with trees: interpreting CNNs using hierarchies
Challenges persist in providing interpretable explanations for neural network reasoning in explainable AI (xAI). Existing methods like Integrated Gradients produce noisy maps, and LIME, while intuitive, may deviate from the model's reasoning. We introduce a framework that uses hierarchical segmentation techniques for f...
false
false
false
false
true
false
true
false
false
false
false
true
false
false
false
false
false
false
465,774
2306.04076
Text-only Domain Adaptation using Unified Speech-Text Representation in Transducer
Domain adaptation using text-only corpus is challenging in end-to-end(E2E) speech recognition. Adaptation by synthesizing audio from text through TTS is resource-consuming. We present a method to learn Unified Speech-Text Representation in Conformer Transducer(USTR-CT) to enable fast domain adaptation using the text-on...
false
false
true
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
371,592
2306.02982
PolyVoice: Language Models for Speech to Speech Translation
We propose PolyVoice, a language model-based framework for speech-to-speech translation (S2ST) system. Our framework consists of two language models: a translation language model and a speech synthesis language model. We use discretized speech units, which are generated in a fully unsupervised way, and thus our framewo...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
371,140
2403.09930
Quality-Diversity Actor-Critic: Learning High-Performing and Diverse Behaviors via Value and Successor Features Critics
A key aspect of intelligence is the ability to demonstrate a broad spectrum of behaviors for adapting to unexpected situations. Over the past decade, advancements in deep reinforcement learning have led to groundbreaking achievements to solve complex continuous control tasks. However, most approaches return only one so...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
false
false
437,965
2005.00891
Zero-Shot Transfer Learning with Synthesized Data for Multi-Domain Dialogue State Tracking
Zero-shot transfer learning for multi-domain dialogue state tracking can allow us to handle new domains without incurring the high cost of data acquisition. This paper proposes new zero-short transfer learning technique for dialogue state tracking where the in-domain training data are all synthesized from an abstract d...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
175,422
2010.03550
Understanding Clinical Trial Reports: Extracting Medical Entities and Their Relations
The best evidence concerning comparative treatment effectiveness comes from clinical trials, the results of which are reported in unstructured articles. Medical experts must manually extract information from articles to inform decision-making, which is time-consuming and expensive. Here we consider the end-to-end task ...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
199,437
2008.00104
Optimizing Long-term Social Welfare in Recommender Systems: A Constrained Matching Approach
Most recommender systems (RS) research assumes that a user's utility can be maximized independently of the utility of the other agents (e.g., other users, content providers). In realistic settings, this is often not true---the dynamics of an RS ecosystem couple the long-term utility of all agents. In this work, we expl...
false
false
false
false
true
true
true
false
false
false
false
false
false
false
false
false
false
false
189,899
2310.02573
Robust Collision Detection for Robots with Variable Stiffness Actuation by Using MAD-CNN: Modularized-Attention-Dilated Convolutional Neural Network
Ensuring safety is paramount in the field of collaborative robotics to mitigate the risks of human injury and environmental damage. Apart from collision avoidance, it is crucial for robots to rapidly detect and respond to unexpected collisions. While several learning-based collision detection methods have been introduc...
true
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
396,911
2301.06527
XNLI 2.0: Improving XNLI dataset and performance on Cross Lingual Understanding (XLU)
Natural Language Processing systems are heavily dependent on the availability of annotated data to train practical models. Primarily, models are trained on English datasets. In recent times, significant advances have been made in multilingual understanding due to the steeply increasing necessity of working in different...
false
false
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
340,665
2408.15265
Multitask Fine-Tuning and Generative Adversarial Learning for Improved Auxiliary Classification
In this study, we implement a novel BERT architecture for multitask fine-tuning on three downstream tasks: sentiment classification, paraphrase detection, and semantic textual similarity prediction. Our model, Multitask BERT, incorporates layer sharing and a triplet architecture, custom sentence pair tokenization, loss...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
483,871
1906.01127
Proximal Reliability Optimization for Reinforcement Learning
Despite the numerous advances, reinforcement learning remains away from widespread acceptance for autonomous controller design as compared to classical methods due to lack of ability to effectively tackle the reality gap. The reliance on absolute or deterministic reward as a metric for optimization process renders rein...
false
false
false
false
false
false
true
false
false
false
true
false
false
false
false
false
false
false
133,602
2411.10669
Awaker2.5-VL: Stably Scaling MLLMs with Parameter-Efficient Mixture of Experts
As the research of Multimodal Large Language Models (MLLMs) becomes popular, an advancing MLLM model is typically required to handle various textual and visual tasks (e.g., VQA, Detection, OCR, and ChartQA) simultaneously for real-world applications. However, due to the significant differences in representation and dis...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
508,738
2112.07219
A real-time spatiotemporal AI model analyzes skill in open surgical videos
Open procedures represent the dominant form of surgery worldwide. Artificial intelligence (AI) has the potential to optimize surgical practice and improve patient outcomes, but efforts have focused primarily on minimally invasive techniques. Our work overcomes existing data limitations for training AI models by curatin...
false
false
false
false
true
false
false
false
false
false
false
true
false
false
false
false
false
false
271,412
1209.0053
A Session Based Blind Watermarking Technique within the NROI of Retinal Fundus Images for Authentication Using DWT, Spread Spectrum and Harris Corner Detection
Digital Retinal Fundus Images helps to detect various ophthalmic diseases by detecting morphological changes in optical cup, optical disc and macula. Present work proposes a method for the authentication of medical images based on Discrete Wavelet Transformation (DWT) and Spread Spectrum. Proper selection of the Non Re...
false
false
false
false
false
false
false
false
false
false
false
true
false
true
false
false
false
false
18,337
2207.07403
PodcastMix: A dataset for separating music and speech in podcasts
We introduce PodcastMix, a dataset formalizing the task of separating background music and foreground speech in podcasts. We aim at defining a benchmark suitable for training and evaluating (deep learning) source separation models. To that end, we release a large and diverse training dataset based on programatically ge...
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
true
false
308,197
1506.07980
A Java Implementation of the SGA, UMDA, ECGA, and HBOA
The Simple Genetic Algorithm, the Univariate Marginal Distribution Algorithm, the Extended Compact Genetic Algorithm, and the Hierarchical Bayesian Optimization Algorithm are all well known Evolutionary Algorithms. In this report we present a Java implementation of these four algorithms with detailed instructions on ...
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
true
false
true
44,567
2309.15284
A Physics Enhanced Residual Learning (PERL) Framework for Vehicle Trajectory Prediction
In vehicle trajectory prediction, physics models and data-driven models are two predominant methodologies. However, each approach presents its own set of challenges: physics models fall short in predictability, while data-driven models lack interpretability. Addressing these identified shortcomings, this paper proposes...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
394,912
2409.09313
Tensor-Based Synchronization and the Low-Rankness of the Block Trifocal Tensor
The block tensor of trifocal tensors provides crucial geometric information on the three-view geometry of a scene. The underlying synchronization problem seeks to recover camera poses (locations and orientations up to a global transformation) from the block trifocal tensor. We establish an explicit Tucker factorization...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
true
488,266
2010.12770
Conversational Semantic Parsing for Dialog State Tracking
We consider a new perspective on dialog state tracking (DST), the task of estimating a user's goal through the course of a dialog. By formulating DST as a semantic parsing task over hierarchical representations, we can incorporate semantic compositionality, cross-domain knowledge sharing and co-reference. We present Tr...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
202,839
1506.07924
Decentralized Q-Learning for Stochastic Teams and Games
There are only a few learning algorithms applicable to stochastic dynamic teams and games which generalize Markov decision processes to decentralized stochastic control problems involving possibly self-interested decision makers. Learning in games is generally difficult because of the non-stationary environment in whic...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
true
44,562
2205.13383
BppAttack: Stealthy and Efficient Trojan Attacks against Deep Neural Networks via Image Quantization and Contrastive Adversarial Learning
Deep neural networks are vulnerable to Trojan attacks. Existing attacks use visible patterns (e.g., a patch or image transformations) as triggers, which are vulnerable to human inspection. In this paper, we propose stealthy and efficient Trojan attacks, BppAttack. Based on existing biology literature on human visual sy...
false
false
false
false
false
false
true
false
false
false
false
true
true
false
false
false
false
false
298,916
2204.02462
Quadratic Approximation Manifold for Mitigating the Kolmogorov Barrier in Nonlinear Projection-Based Model Order Reduction
A quadratic approximation manifold is presented for performing nonlinear, projection-based, model order reduction (PMOR). It constitutes a departure from the traditional affine subspace approximation that is aimed at mitigating the Kolmogorov barrier for nonlinear PMOR, particularly for convection-dominated transport p...
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
289,950
2008.00324
Improving Skeleton-based Action Recognitionwith Robust Spatial and Temporal Features
Recently skeleton-based action recognition has made signif-icant progresses in the computer vision community. Most state-of-the-art algorithms are based on Graph Convolutional Networks (GCN), andtarget at improving the network structure of the backbone GCN lay-ers. In this paper, we propose a novel mechanism to learn m...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
189,976
1904.02755
ExCL: Extractive Clip Localization Using Natural Language Descriptions
The task of retrieving clips within videos based on a given natural language query requires cross-modal reasoning over multiple frames. Prior approaches such as sliding window classifiers are inefficient, while text-clip similarity driven ranking-based approaches such as segment proposal networks are far more complicat...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
126,512
2410.12277
A Robot Kinematics Model Estimation Using Inertial Sensors for On-Site Building Robotics
In order to make robots more useful in a variety of environments, they need to be highly portable so that they can be transported to wherever they are needed, and highly storable so that they can be stored when not in use. We propose "on-site robotics", which uses parts procured at the location where the robot will be ...
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
498,946
2204.04918
When NAS Meets Trees: An Efficient Algorithm for Neural Architecture Search
The key challenge in neural architecture search (NAS) is designing how to explore wisely in the huge search space. We propose a new NAS method called TNAS (NAS with trees), which improves search efficiency by exploring only a small number of architectures while also achieving a higher search accuracy. TNAS introduces a...
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
290,847
2406.05743
Peptide Vaccine Design by Evolutionary Multi-Objective Optimization
Peptide vaccines are growing in significance for fighting diverse diseases. Machine learning has improved the identification of peptides that can trigger immune responses, and the main challenge of peptide vaccine design now lies in selecting an effective subset of peptides due to the allelic diversity among individual...
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
true
false
false
462,271
1610.02876
Heuristic Approaches for Generating Local Process Models through Log Projections
Local Process Model (LPM) discovery is focused on the mining of a set of process models where each model describes the behavior represented in the event log only partially, i.e. subsets of possible events are taken into account to create so-called local process models. Often such smaller models provide valuable insight...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
true
false
62,170
2212.11087
On Reinforcement Learning for the Game of 2048
2048 is a single-player stochastic puzzle game. This intriguing and addictive game has been popular worldwide and has attracted researchers to develop game-playing programs. Due to its simplicity and complexity, 2048 has become an interesting and challenging platform for evaluating the effectiveness of machine learning...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
false
false
337,688
2403.17931
Track Everything Everywhere Fast and Robustly
We propose a novel test-time optimization approach for efficiently and robustly tracking any pixel at any time in a video. The latest state-of-the-art optimization-based tracking technique, OmniMotion, requires a prohibitively long optimization time, rendering it impractical for downstream applications. OmniMotion is s...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
441,701
2006.11431
Band-limited Soft Actor Critic Model
Soft Actor Critic (SAC) algorithms show remarkable performance in complex simulated environments. A key element of SAC networks is entropy regularization, which prevents the SAC actor from optimizing against fine grained features, oftentimes transient, of the state-action value function. This results in better sample e...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
false
false
183,227
1909.01064
Face-to-Parameter Translation for Game Character Auto-Creation
Character customization system is an important component in Role-Playing Games (RPGs), where players are allowed to edit the facial appearance of their in-game characters with their own preferences rather than using default templates. This paper proposes a method for automatically creating in-game characters of players...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
143,799
1710.11383
Flexible Prior Distributions for Deep Generative Models
We consider the problem of training generative models with deep neural networks as generators, i.e. to map latent codes to data points. Whereas the dominant paradigm combines simple priors over codes with complex deterministic models, we argue that it might be advantageous to use more flexible code distributions. We de...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
83,586
2201.12819
A Safety-Critical Decision Making and Control Framework Combining Machine Learning and Rule-based Algorithms
While artificial-intelligence-based methods suffer from lack of transparency, rule-based methods dominate in safety-critical systems. Yet, the latter cannot compete with the first ones in robustness to multiple requirements, for instance, simultaneously addressing safety, comfort, and efficiency. Hence, to benefit from...
false
false
false
false
true
false
true
true
false
false
true
false
false
false
false
false
false
false
277,793
2411.01172
Covariance-based Space Regularization for Few-shot Class Incremental Learning
Few-shot Class Incremental Learning (FSCIL) presents a challenging yet realistic scenario, which requires the model to continually learn new classes with limited labeled data (i.e., incremental sessions) while retaining knowledge of previously learned base classes (i.e., base sessions). Due to the limited data in incre...
false
false
false
false
true
false
false
false
false
false
false
true
false
false
false
false
false
false
504,945
1604.07044
Analyzing User Preference for Social Image Recommendation
With the incredibly growing amount of multimedia data shared on the social media platforms, recommender systems have become an important necessity to ease users' burden on the information overload. In such a scenario, extensive amount of heterogeneous information such as tags, image content, in addition to the user-to-...
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
55,028
1906.04586
Proposition d'une nouvelle approche d'extraction des motifs ferm\'es fr\'equents
This work is done as part of a master's thesis project. The increase in the volume of data has given rise to various issues related to the collection, storage, analysis and exploitation of these data in order to create an added value. In this master, we are interested in the search of frequent closed patterns in the tr...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
134,767
2212.00523
The Limits of Learning and Planning: Minimal Sufficient Information Transition Systems
In this paper, we view a policy or plan as a transition system over a space of information states that reflect a robot's or other observer's perspective based on limited sensing, memory, computation, and actuation. Regardless of whether policies are obtained by learning algorithms, planning algorithms, or human insight...
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
334,090
2205.13621
Differentially Private Decoding in Large Language Models
Recent large-scale natural language processing (NLP) systems use a pre-trained Large Language Model (LLM) on massive and diverse corpora as a headstart. In practice, the pre-trained model is adapted to a wide array of tasks via fine-tuning on task-specific datasets. LLMs, while effective, have been shown to memorize in...
false
false
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
299,011
2104.09793
What is Wrong with One-Class Anomaly Detection?
From a safety perspective, a machine learning method embedded in real-world applications is required to distinguish irregular situations. For this reason, there has been a growing interest in the anomaly detection (AD) task. Since we cannot observe abnormal samples for most of the cases, recent AD methods attempt to fo...
false
false
false
false
false
false
true
false
false
false
false
true
false
false
false
false
false
false
231,359
1512.09251
Solving the G-problems in less than 500 iterations: Improved efficient constrained optimization by surrogate modeling and adaptive parameter control
Constrained optimization of high-dimensional numerical problems plays an important role in many scientific and industrial applications. Function evaluations in many industrial applications are severely limited and no analytical information about objective function and constraint functions is available. For such expensi...
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
true
false
false
50,577
2207.08372
Correcting $k$ Deletions and Insertions in Racetrack Memory
One of the main challenges in developing racetrack memory systems is the limited precision in controlling the track shifts, that in turn affects the reliability of reading and writing the data. A current proposal for combating deletions in racetrack memories is to use redundant heads per-track resulting in multiple cop...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
308,567
2311.18495
Improving Adversarial Transferability via Model Alignment
Neural networks are susceptible to adversarial perturbations that are transferable across different models. In this paper, we introduce a novel model alignment technique aimed at improving a given source model's ability in generating transferable adversarial perturbations. During the alignment process, the parameters o...
false
false
false
false
false
false
true
false
false
false
false
true
false
false
false
false
false
false
411,699
1905.05961
Demographic Inference and Representative Population Estimates from Multilingual Social Media Data
Social media provide access to behavioural data at an unprecedented scale and granularity. However, using these data to understand phenomena in a broader population is difficult due to their non-representativeness and the bias of statistical inference tools towards dominant languages and groups. While demographic attri...
false
false
false
false
false
false
true
false
true
false
false
true
false
true
false
false
false
false
130,870
1910.05366
Learning Nearly Decomposable Value Functions Via Communication Minimization
Reinforcement learning encounters major challenges in multi-agent settings, such as scalability and non-stationarity. Recently, value function factorization learning emerges as a promising way to address these challenges in collaborative multi-agent systems. However, existing methods have been focusing on learning full...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
149,032
2410.09999
Leveraging Customer Feedback for Multi-modal Insight Extraction
Businesses can benefit from customer feedback in different modalities, such as text and images, to enhance their products and services. However, it is difficult to extract actionable and relevant pairs of text segments and images from customer feedback in a single pass. In this paper, we propose a novel multi-modal met...
false
false
false
false
true
true
false
false
true
false
false
true
false
false
false
false
false
false
497,864
2008.09644
Blending of Learning-based Tracking and Object Detection for Monocular Camera-based Target Following
Deep learning has recently started being applied to visual tracking of generic objects in video streams. For the purposes of robotics applications, it is very important for a target tracker to recover its track if it is lost due to heavy or prolonged occlusions or motion blur of the target. We present a real-time appro...
false
false
false
false
false
false
false
true
false
false
false
true
false
false
false
false
false
false
192,771
2003.11844
P $\approx$ NP, at least in Visual Question Answering
In recent years, progress in the Visual Question Answering (VQA) field has largely been driven by public challenges and large datasets. One of the most widely-used of these is the VQA 2.0 dataset, consisting of polar ("yes/no") and non-polar questions. Looking at the question distribution over all answers, we find that...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
169,738
2305.03530
Exploring Softly Masked Language Modelling for Controllable Symbolic Music Generation
This document presents some early explorations of applying Softly Masked Language Modelling (SMLM) to symbolic music generation. SMLM can be seen as a generalisation of masked language modelling (MLM), where instead of each element of the input set being either known or unknown, each element can be known, unknown or pa...
false
false
true
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
362,432
1909.13611
MonoNet: Towards Interpretable Models by Learning Monotonic Features
Being able to interpret, or explain, the predictions made by a machine learning model is of fundamental importance. This is especially true when there is interest in deploying data-driven models to make high-stakes decisions, e.g. in healthcare. While recent years have seen an increasing interest in interpretable machi...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
147,478
2309.06825
Topology-inspired Cross-domain Network for Developmental Cervical Stenosis Quantification
Developmental Canal Stenosis (DCS) quantification is crucial in cervical spondylosis screening. Compared with quantifying DCS manually, a more efficient and time-saving manner is provided by deep keypoint localization networks, which can be implemented in either the coordinate or the image domain. However, the vertebra...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
391,561