id
stringlengths
9
16
title
stringlengths
4
278
abstract
stringlengths
3
4.08k
cs.HC
bool
2 classes
cs.CE
bool
2 classes
cs.SD
bool
2 classes
cs.SI
bool
2 classes
cs.AI
bool
2 classes
cs.IR
bool
2 classes
cs.LG
bool
2 classes
cs.RO
bool
2 classes
cs.CL
bool
2 classes
cs.IT
bool
2 classes
cs.SY
bool
2 classes
cs.CV
bool
2 classes
cs.CR
bool
2 classes
cs.CY
bool
2 classes
cs.MA
bool
2 classes
cs.NE
bool
2 classes
cs.DB
bool
2 classes
Other
bool
2 classes
__index_level_0__
int64
0
541k
1106.3655
Bayesian multitask inverse reinforcement learning
We generalise the problem of inverse reinforcement learning to multiple tasks, from multiple demonstrations. Each one may represent one expert trying to solve a different task, or as different experts trying to solve the same task. Our main contribution is to formalise the problem as statistical preference elicitation,...
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
10,898
2304.04022
A Reinforcement Learning-assisted Genetic Programming Algorithm for Team Formation Problem Considering Person-Job Matching
An efficient team is essential for the company to successfully complete new projects. To solve the team formation problem considering person-job matching (TFP-PJM), a 0-1 integer programming model is constructed, which considers both person-job matching and team members' willingness to communicate on team efficiency, w...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
true
false
false
357,040
1810.03961
Intelligent Reflecting Surface Enhanced Wireless Network via Joint Active and Passive Beamforming
Intelligent reflecting surface (IRS) is envisioned to be a new and revolutionizing technology for achieving spectrum and energy efficient wireless communication networks cost-effectively in the future. Specifically, an IRS consists of a large number of low-cost passive elements each reflecting the incident signal with ...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
109,915
2309.04426
Advanced Computing and Related Applications Leveraging Brain-inspired Spiking Neural Networks
In the rapid evolution of next-generation brain-inspired artificial intelligence and increasingly sophisticated electromagnetic environment, the most bionic characteristics and anti-interference performance of spiking neural networks show great potential in terms of computational speed, real-time information processing...
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
true
false
false
390,720
1412.5090
Belief as Willingness to Bet
We investigate modal logics of high probability having two unary modal operators: an operator $K$ expressing probabilistic certainty and an operator $B$ expressing probability exceeding a fixed rational threshold $c\geq\frac 12$. Identifying knowledge with the former and belief with the latter, we may think of $c$ as t...
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
true
38,454
2407.01646
ESALE: Enhancing Code-Summary Alignment Learning for Source Code Summarization
(Source) code summarization aims to automatically generate succinct natural language summaries for given code snippets. Such summaries play a significant role in promoting developers to understand and maintain code. Inspired by neural machine translation, deep learning-based code summarization techniques widely adopt a...
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
true
469,405
1212.3900
A Tutorial on Probabilistic Latent Semantic Analysis
In this tutorial, I will discuss the details about how Probabilistic Latent Semantic Analysis (PLSA) is formalized and how different learning algorithms are proposed to learn the model.
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
20,438
2101.01036
VIS30K: A Collection of Figures and Tables from IEEE Visualization Conference Publications
We present the VIS30K dataset, a collection of 29,689 images that represents 30 years of figures and tables from each track of the IEEE Visualization conference series (Vis, SciVis, InfoVis, VAST). VIS30K's comprehensive coverage of the scientific literature in visualization not only reflects the progress of the field ...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
true
214,262
2310.17217
Beyond MLE: Convex Learning for Text Generation
Maximum likelihood estimation (MLE) is a statistical method used to estimate the parameters of a probability distribution that best explain the observed data. In the context of text generation, MLE is often used to train generative language models, which can then be used to generate new text. However, we argue that MLE...
false
false
false
false
true
false
true
false
true
false
false
false
false
false
false
false
false
false
403,049
1503.04877
An Automated System for Discovering Neighborhood Patterns in Ego Networks
Generally, social network analysis has often focused on the topology of the network without considering the characteristics of individuals involved in them. Less attention is given to study the behavior of individuals, considering they are the basic entity of a graph. Given a mobile social network graph, what are good ...
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
false
41,188
1708.08557
A parameterized activation function for learning fuzzy logic operations in deep neural networks
We present a deep learning architecture for learning fuzzy logic expressions. Our model uses an innovative, parameterized, differentiable activation function that can learn a number of logical operations by gradient descent. This activation function allows a neural network to determine the relationships between its inp...
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
true
false
false
79,654
1905.12430
Norm-based generalisation bounds for multi-class convolutional neural networks
We show generalisation error bounds for deep learning with two main improvements over the state of the art. (1) Our bounds have no explicit dependence on the number of classes except for logarithmic factors. This holds even when formulating the bounds in terms of the $L^2$-norm of the weight matrices, where previous bo...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
132,768
2312.02212
Portrait Diffusion: Training-free Face Stylization with Chain-of-Painting
Face stylization refers to the transformation of a face into a specific portrait style. However, current methods require the use of example-based adaptation approaches to fine-tune pre-trained generative models so that they demand lots of time and storage space and fail to achieve detailed style transformation. This pa...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
412,765
2210.00856
A forensic analysis of the Google Home: repairing compressed data without error correction
This paper provides a detailed explanation of the steps taken to extract and repair a Google Home's internal data. Starting with reverse engineering the hardware of a commercial off-the-shelf Google Home, internal data is then extracted by desoldering and dumping the flash memory. As error correction is performed by th...
false
false
false
false
false
true
false
false
false
false
false
false
true
false
false
false
false
false
321,030
2108.10580
Detection of Criminal Texts for the Polish State Border Guard
This paper describes research on the detection of Polish criminal texts appearing on the Internet. We carried out experiments to find the best available setup for the efficient classification of unbalanced and noisy data. The best performance was achieved when our model was fine-tuned on a pre-trained Polish-based tran...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
251,944
1602.01410
A Framework for Fast Image Deconvolution with Incomplete Observations
In image deconvolution problems, the diagonalization of the underlying operators by means of the FFT usually yields very large speedups. When there are incomplete observations (e.g., in the case of unknown boundaries), standard deconvolution techniques normally involve non-diagonalizable operators, resulting in rather ...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
51,695
1706.05839
On Optimal Group Claims at Voting in a Stochastic Environment
There is a paradox in the model of social dynamics determined by voting in a stochastic environment (the ViSE model) called "pit of losses." It consists in the fact that a series of democratic decisions may systematically lead the society to the states unacceptable for all the voters. The paper examines how this parado...
false
false
false
true
false
false
false
false
false
false
true
false
false
false
true
false
false
false
75,585
2208.05863
GEM-2: Next Generation Molecular Property Prediction Network by Modeling Full-range Many-body Interactions
Molecular property prediction is a fundamental task in the drug and material industries. Physically, the properties of a molecule are determined by its own electronic structure, which is a quantum many-body system and can be exactly described by the Schr"odinger equation. Full-range many-body interactions between elect...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
312,527
2304.11275
Semantic-Aware Graph Matching Mechanism for Multi-Label Image Recognition
Multi-label image recognition aims to predict a set of labels that present in an image. The key to deal with such problem is to mine the associations between image contents and labels, and further obtain the correct assignments between images and their labels. In this paper, we treat each image as a bag of instances, a...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
359,746
1208.3855
Effects of delayed immune-response in tumor immune-system interplay
Tumors constitute a wide family of diseases kinetically characterized by the co-presence of multiple spatio-temporal scales. So, tumor cells ecologically interplay with other kind of cells, e.g. endothelial cells or immune system effectors, producing and exchanging various chemical signals. As such, tumor growth is an ...
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
18,155
2402.01729
Contextualization Distillation from Large Language Model for Knowledge Graph Completion
While textual information significantly enhances the performance of pre-trained language models (PLMs) in knowledge graph completion (KGC), the static and noisy nature of existing corpora collected from Wikipedia articles or synsets definitions often limits the potential of PLM-based KGC models. To surmount these chall...
false
false
false
false
true
false
false
false
true
false
false
false
false
false
false
false
false
false
426,177
2407.04621
OneRestore: A Universal Restoration Framework for Composite Degradation
In real-world scenarios, image impairments often manifest as composite degradations, presenting a complex interplay of elements such as low light, haze, rain, and snow. Despite this reality, existing restoration methods typically target isolated degradation types, thereby falling short in environments where multiple de...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
470,637
2008.12046
Inner Eye Canthus Localization for Human Body Temperature Screening
In this paper, we propose an automatic approach for localizing the inner eye canthus in thermal face images. We first coarsely detect 5 facial keypoints corresponding to the center of the eyes, the nosetip and the ears. Then we compute a sparse 2D-3D points correspondence using a 3D Morphable Face Model (3DMM). This co...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
193,472
2202.14037
Understanding Contrastive Learning Requires Incorporating Inductive Biases
Contrastive learning is a popular form of self-supervised learning that encourages augmentations (views) of the same input to have more similar representations compared to augmentations of different inputs. Recent attempts to theoretically explain the success of contrastive learning on downstream classification tasks p...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
false
false
282,828
1912.00700
ReD-CaNe: A Systematic Methodology for Resilience Analysis and Design of Capsule Networks under Approximations
Recent advances in Capsule Networks (CapsNets) have shown their superior learning capability, compared to the traditional Convolutional Neural Networks (CNNs). However, the extremely high complexity of CapsNets limits their fast deployment in real-world applications. Moreover, while the resilience of CNNs have been ext...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
155,860
1811.07146
The Impatient May Use Limited Optimism to Minimize Regret
Discounted-sum games provide a formal model for the study of reinforcement learning, where the agent is enticed to get rewards early since later rewards are discounted. When the agent interacts with the environment, she may regret her actions, realizing that a previous choice was suboptimal given the behavior of the en...
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
true
113,687
2302.10720
Learning to Play Text-based Adventure Games with Maximum Entropy Reinforcement Learning
Text-based games are a popular testbed for language-based reinforcement learning (RL). In previous work, deep Q-learning is commonly used as the learning agent. Q-learning algorithms are challenging to apply to complex real-world domains due to, for example, their instability in training. Therefore, in this paper, we a...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
346,914
2203.16280
CMMD: Cross-Metric Multi-Dimensional Root Cause Analysis
In large-scale online services, crucial metrics, a.k.a., key performance indicators (KPIs), are monitored periodically to check their running statuses. Generally, KPIs are aggregated along multiple dimensions and derived by complex calculations among fundamental metrics from the raw data. Once abnormal KPI values are o...
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
288,728
2106.00872
On the Efficacy of Adversarial Data Collection for Question Answering: Results from a Large-Scale Randomized Study
In adversarial data collection (ADC), a human workforce interacts with a model in real time, attempting to produce examples that elicit incorrect predictions. Researchers hope that models trained on these more challenging datasets will rely less on superficial patterns, and thus be less brittle. However, despite ADC's ...
false
false
false
false
true
false
true
false
true
false
false
false
false
false
false
false
false
false
238,280
2402.00295
Comparative Evaluation of Traditional and Deep Learning-Based Segmentation Methods for Spoil Pile Delineation Using UAV Images
The stability of mine dumps is contingent upon the precise arrangement of spoil piles, taking into account their geological and geotechnical attributes. Yet, on-site characterisation of individual piles poses a formidable challenge. The utilisation of image-based techniques for spoil pile characterisation, employing re...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
425,547
2403.12900
Toward Sustainable GenAI using Generation Directives for Carbon-Friendly Large Language Model Inference
The rapid advancement of Generative Artificial Intelligence (GenAI) across diverse sectors raises significant environmental concerns, notably the carbon emissions from their cloud and high performance computing (HPC) infrastructure. This paper presents Sprout, an innovative framework designed to address these concerns ...
false
false
false
false
true
false
true
false
true
false
false
false
false
false
false
false
false
true
439,382
1607.03189
A Framework for Estimating Long Term Driver Behavior
The authors present a cyber-physical systems study on the estimation of driver behavior in autonomous vehicles and vehicle safety systems. Extending upon previous work, the approach described is suitable for the long term estimation and tracking of autonomous vehicle behavior. The proposed system makes use of a previou...
false
false
false
false
true
false
false
true
false
false
false
false
false
false
false
false
false
false
58,466
2305.10329
G-Adapter: Towards Structure-Aware Parameter-Efficient Transfer Learning for Graph Transformer Networks
It has become a popular paradigm to transfer the knowledge of large-scale pre-trained models to various downstream tasks via fine-tuning the entire model parameters. However, with the growth of model scale and the rising number of downstream tasks, this paradigm inevitably meets the challenges in terms of computation c...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
365,005
2109.04872
Negative Sample Matters: A Renaissance of Metric Learning for Temporal Grounding
Temporal grounding aims to localize a video moment which is semantically aligned with a given natural language query. Existing methods typically apply a detection or regression pipeline on the fused representation with the research focus on designing complicated prediction heads or fusion strategies. Instead, from a pe...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
true
254,574
2403.18327
$\forall$uto$\exists$val: Autonomous Assessment of LLMs in Formal Synthesis and Interpretation Tasks
This paper presents $\forall$uto$\exists$val, a new approach for scaling LLM assessment in translating formal syntax -- such as first-order logic, regular expressions, etc -- to natural language (interpretation) or vice versa (compilation), thereby facilitating their use in applications such as generating/explaining lo...
false
false
false
false
true
false
false
false
true
false
false
false
false
false
false
false
false
false
441,885
2203.10507
Soft-CP: A Credible and Effective Data Augmentation for Semantic Segmentation of Medical Lesions
The medical datasets are usually faced with the problem of scarcity and data imbalance. Moreover, annotating large datasets for semantic segmentation of medical lesions is domain-knowledge and time-consuming. In this paper, we propose a new object-blend method(short in soft-CP) that combines the Copy-Paste augmentation...
false
false
false
false
false
false
true
false
false
false
false
true
false
false
false
false
false
false
286,570
2501.07358
Deep Generative Clustering with VAEs and Expectation-Maximization
We propose a novel deep clustering method that integrates Variational Autoencoders (VAEs) into the Expectation-Maximization (EM) framework. Our approach models the probability distribution of each cluster with a VAE and alternates between updating model parameters by maximizing the Evidence Lower Bound (ELBO) of the lo...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
524,368
1907.09615
Towards Realistic Individual Recourse and Actionable Explanations in Black-Box Decision Making Systems
Machine learning based decision making systems are increasingly affecting humans. An individual can suffer an undesirable outcome under such decision making systems (e.g. denied credit) irrespective of whether the decision is fair or accurate. Individual recourse pertains to the problem of providing an actionable set o...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
139,417
2407.06513
Computer vision tasks for intelligent aerospace missions: An overview
Computer vision tasks are crucial for aerospace missions as they help spacecraft to understand and interpret the space environment, such as estimating position and orientation, reconstructing 3D models, and recognizing objects, which have been extensively studied to successfully carry out the missions. However, traditi...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
471,421
2409.01871
Real-Time Indoor Object Detection based on hybrid CNN-Transformer Approach
Real-time object detection in indoor settings is a challenging area of computer vision, faced with unique obstacles such as variable lighting and complex backgrounds. This field holds significant potential to revolutionize applications like augmented and mixed realities by enabling more seamless interactions between di...
false
false
false
false
true
false
false
false
false
false
false
true
false
false
false
false
false
false
485,490
2412.05345
Osteoporosis Prediction from Hand X-ray Images Using Segmentation-for-Classification and Self-Supervised Learning
Osteoporosis is a widespread and chronic metabolic bone disease that often remains undiagnosed and untreated due to limited access to bone mineral density (BMD) tests like Dual-energy X-ray absorptiometry (DXA). In response to this challenge, current advancements are pivoting towards detecting osteoporosis by examining...
false
false
false
false
false
false
true
false
false
false
false
true
false
false
false
false
false
false
514,800
1805.02912
The Complexity of Limited Belief Reasoning -- The Quantifier-Free Case
The classical view of epistemic logic is that an agent knows all the logical consequences of their knowledge base. This assumption of logical omniscience is often unrealistic and makes reasoning computationally intractable. One approach to avoid logical omniscience is to limit reasoning to a certain belief level, which...
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
true
96,947
2010.04676
A Clustering-Based Method for Automatic Educational Video Recommendation Using Deep Face-Features of Lecturers
Discovering and accessing specific content within educational video bases is a challenging task, mainly because of the abundance of video content and its diversity. Recommender systems are often used to enhance the ability to find and select content. But, recommendation mechanisms, especially those based on textual inf...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
true
199,828
2311.08278
ARTEMIS: Using GANs with Multiple Discriminators to Generate Art
We propose a novel method for generating abstract art. First an autoencoder is trained to encode and decode the style representations of images, which are extracted from source images with a pretrained VGG network. Then, the decoder component of the autoencoder is extracted and used as a generator in a GAN. The generat...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
407,658
1901.11095
Saliency detection for seismic applications using multi-dimensional spectral projections and directional comparisons
In this paper, we propose a novel approach for saliency detection for seismic applications using 3D-FFT local spectra and multi-dimensional plane projections. We develop a projection scheme by dividing a 3D-FFT local spectrum of a data volume into three distinct components, each depicting changes along a different dime...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
120,165
2009.07923
Hiding in Plain Sight: A Measurement and Analysis of Kids' Exposure to Malicious URLs on YouTube
The Internet has become an essential part of children's and adolescents' daily life. Social media platforms are used as educational and entertainment resources on daily bases by young users, leading enormous efforts to ensure their safety when interacting with various social media platforms. In this paper, we investiga...
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
false
196,075
2109.02171
Right Ventricular Segmentation from Short- and Long-Axis MRIs via Information Transition
Right ventricular (RV) segmentation from magnetic resonance imaging (MRI) is a crucial step for cardiac morphology and function analysis. However, automatic RV segmentation from MRI is still challenging, mainly due to the heterogeneous intensity, the complex variable shapes, and the unclear RV boundary. Moreover, curre...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
253,658
2410.06124
Learning AND-OR Templates for Professional Photograph Parsing and Guidance
Since the development of photography art, many so-called "templates" have been formed, namely visual styles summarized from a series of themed and stylized photography works. In this paper, we propose to analysize and and summarize these 'templates' in photography by learning composite templates of photography images. ...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
496,060
2112.00557
3D Reconstruction Using a Linear Laser Scanner and a Camera
With the rapid development of computer graphics and vision, several three-dimensional (3D) reconstruction techniques have been proposed and used to obtain the 3D representation of objects in the form of point cloud models, mesh models, and geometric models. The cost of 3D reconstruction is declining due to the maturing...
false
false
false
false
false
false
true
false
false
false
false
true
false
false
false
false
false
false
269,171
2103.03114
Self-supervised Geometric Perception
We present self-supervised geometric perception (SGP), the first general framework to learn a feature descriptor for correspondence matching without any ground-truth geometric model labels (e.g., camera poses, rigid transformations). Our first contribution is to formulate geometric perception as an optimization problem...
false
false
false
false
false
false
true
true
false
false
false
true
false
false
false
false
false
false
223,179
2409.06904
Applied Federated Model Personalisation in the Industrial Domain: A Comparative Study
The time-consuming nature of training and deploying complicated Machine and Deep Learning (DL) models for a variety of applications continues to pose significant challenges in the field of Machine Learning (ML). These challenges are particularly pronounced in the federated domain, where optimizing models for individual...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
false
true
487,314
2203.01304
Supervised Hebbian Learning
In neural network's Literature, Hebbian learning traditionally refers to the procedure by which the Hopfield model and its generalizations store archetypes (i.e., definite patterns that are experienced just once to form the synaptic matrix). However, the term "Learning" in Machine Learning refers to the ability of the ...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
true
false
false
283,331
2309.13292
Beyond Fairness: Age-Harmless Parkinson's Detection via Voice
Parkinson's disease (PD), a neurodegenerative disorder, often manifests as speech and voice dysfunction. While utilizing voice data for PD detection has great potential in clinical applications, the widely used deep learning models currently have fairness issues regarding different ages of onset. These deep models perf...
false
false
true
false
false
false
true
false
false
false
false
false
false
true
false
false
false
false
394,144
2408.06261
Open-Source Molecular Processing Pipeline for Generating Molecules
Generative models for molecules have shown considerable promise for use in computational chemistry, but remain difficult to use for non-experts. For this reason, we introduce open-source infrastructure for easily building generative molecular models into the widely used DeepChem [Ramsundar et al., 2019] library with th...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
false
false
480,133
2212.02752
An Index Policy for Minimizing the Uncertainty-of-Information of Markov Sources
This paper focuses on the information freshness of finite-state Markov sources, using the uncertainty of information (UoI) as the performance metric. Measured by Shannon's entropy, UoI can capture not only the transition dynamics of the Markov source but also the different evolutions of information quality caused by th...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
true
334,872
1906.00499
Budgeted Policy Learning for Task-Oriented Dialogue Systems
This paper presents a new approach that extends Deep Dyna-Q (DDQ) by incorporating a Budget-Conscious Scheduling (BCS) to best utilize a fixed, small amount of user interactions (budget) for learning task-oriented dialogue agents. BCS consists of (1) a Poisson-based global scheduler to allocate budget over different st...
false
false
false
false
true
false
true
false
true
false
false
false
false
false
false
true
false
false
133,411
2406.02616
Adaptive Layer Splitting for Wireless LLM Inference in Edge Computing: A Model-Based Reinforcement Learning Approach
Optimizing the deployment of large language models (LLMs) in edge computing environments is critical for enhancing privacy and computational efficiency. Toward efficient wireless LLM inference in edge computing, this study comprehensively analyzes the impact of different splitting points in mainstream open-source LLMs....
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
false
false
460,868
2306.14357
PolicyClusterGCN: Identifying Efficient Clusters for Training Graph Convolutional Networks
Graph convolutional networks (GCNs) have achieved huge success in several machine learning (ML) tasks on graph-structured data. Recently, several sampling techniques have been proposed for the efficient training of GCNs and to improve the performance of GCNs on ML tasks. Specifically, the subgraph-based sampling approa...
false
false
false
true
false
false
true
false
false
false
false
false
false
false
false
false
false
false
375,653
2012.05999
An IoT Framework for Heart Disease Prediction based on MDCNN Classifier
Nowadays, heart disease is the leading cause of death worldwide. Predicting heart disease is a complex task since it requires experience along with advanced knowledge. Internet of Things (IoT) technology has lately been adopted in healthcare systems to collect sensor values for heart disease diagnosis and prediction. M...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
false
false
210,951
2106.10662
FedXGBoost: Privacy-Preserving XGBoost for Federated Learning
Federated learning is the distributed machine learning framework that enables collaborative training across multiple parties while ensuring data privacy. Practical adaptation of XGBoost, the state-of-the-art tree boosting framework, to federated learning remains limited due to high cost incurred by conventional privacy...
false
false
false
false
false
false
true
false
false
false
false
false
true
false
false
false
false
false
242,104
2106.11596
Multi-layered Semantic Representation Network for Multi-label Image Classification
Multi-label image classification (MLIC) is a fundamental and practical task, which aims to assign multiple possible labels to an image. In recent years, many deep convolutional neural network (CNN) based approaches have been proposed which model label correlations to discover semantics of labels and learn semantic repr...
false
false
false
false
true
false
false
false
false
false
false
true
false
false
false
false
false
false
242,459
1404.6813
Diffusion LMS over Multitask Networks
The diffusion LMS algorithm has been extensively studied in recent years. This efficient strategy allows to address distributed optimization problems over networks in the case where nodes have to collaboratively estimate a single parameter vector. Problems of this type are referred to as single-task problems. Neverthel...
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
32,634
1911.07524
The Devil is in the Details: Delving into Unbiased Data Processing for Human Pose Estimation
Being a fundamental component in training and inference, data processing has not been systematically considered in human pose estimation community, to the best of our knowledge. In this paper, we focus on this problem and find that the devil of human pose estimation evolution is in the biased data processing. Specifica...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
153,883
2003.11154
A Systematic Evaluation: Fine-Grained CNN vs. Traditional CNN Classifiers
To make the best use of the underlying minute and subtle differences, fine-grained classifiers collect information about inter-class variations. The task is very challenging due to the small differences between the colors, viewpoint, and structure in the same class entities. The classification becomes more difficult du...
false
false
false
false
false
false
true
false
false
false
false
true
false
false
false
false
false
false
169,529
2312.05966
Fake It Till Make It: Federated Learning with Consensus-Oriented Generation
In federated learning (FL), data heterogeneity is one key bottleneck that causes model divergence and limits performance. Addressing this, existing methods often regard data heterogeneity as an inherent property and propose to mitigate its adverse effects by correcting models. In this paper, we seek to break this inher...
false
false
false
false
false
false
true
false
false
false
false
true
false
false
false
false
false
false
414,316
2010.06392
Projection techniques to update the truncated SVD of evolving matrices
This paper considers the problem of updating the rank-k truncated Singular Value Decomposition (SVD) of matrices subject to the addition of new rows and/or columns over time. Such matrix problems represent an important computational kernel in applications such as Latent Semantic Indexing and Recommender Systems. Noneth...
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
true
200,469
2402.12415
Vehicle-group-based Crash Risk Prediction and Interpretation on Highways
Previous studies in predicting crash risks primarily associated the number or likelihood of crashes on a road segment with traffic parameters or geometric characteristics, usually neglecting the impact of vehicles' continuous movement and interactions with nearby vehicles. Recent technology advances, such as Connected ...
false
false
false
false
false
false
true
false
false
false
false
false
false
true
false
false
false
false
430,843
1801.04953
Fast Uplink Grant for Machine Type Communications: Challenges and Opportunities
The notion of a fast uplink grant is emerging as a promising solution for enabling massive machine type communications (MTCs) in the Internet of Things over cellular networks. By using the fast uplink grant, machine type devices (MTD) will no longer require random access (RA) channels to send scheduling requests. Inste...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
88,364
2311.06680
Extremum Seeking for Stefan PDE with Moving Boundary
This paper presents the design and analysis of the extremum seeking for static maps with input passed through a partial differential equation (PDE) of the diffusion type defined on a time-varying spatial domain whose boundary position is governed by an ordinary differential equation (ODE). This is the first effort to p...
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
407,030
2305.09786
A Comparative Study of GAN-Generated Handwriting Images and MNIST Images using t-SNE Visualization
The quality of GAN-generated images on the MNIST dataset was explored in this paper by comparing them to the original images using t-distributed stochastic neighbor embedding (t- SNE) visualization. A GAN was trained with the dataset to generate images and the result of generating all synthetic images, the correspondin...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
364,771
1811.04516
Agent Embeddings: A Latent Representation for Pole-Balancing Networks
We show that it is possible to reduce a high-dimensional object like a neural network agent into a low-dimensional vector representation with semantic meaning that we call agent embeddings, akin to word or face embeddings. This can be done by collecting examples of existing networks, vectorizing their weights, and then...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
false
false
113,109
1411.2169
The Sum-Product Algorithm for Degree-2 Check Nodes and Trapping Sets
The sum-product algorithm for decoding of binary codes is analyzed for bipartite graphs in which the check nodes all have degree $2$. The algorithm simplifies dramatically and may be expressed using linear algebra. Exact results about the convergence of the algorithm are derived and applied to trapping sets.
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
37,392
1407.1809
Decomposed Interval Type-2 Fuzzy Systems with Application to Inverted Pendulum
This article introduces the idea of decomposition of interval Type-2 fuzzy logic system into two parallel type-1 fuzzy systems. This decomposition avoids the problems associated with type-reduction techniques normally needed in type-2 fuzzy systems. Next, we compare the performance of a decomposed type-2 controller to ...
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
34,474
2202.04238
Parametric t-Stochastic Neighbor Embedding With Quantum Neural Network
t-Stochastic Neighbor Embedding (t-SNE) is a non-parametric data visualization method in classical machine learning. It maps the data from the high-dimensional space into a low-dimensional space, especially a two-dimensional plane, while maintaining the relationship, or similarities, between the surrounding points. In ...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
279,498
2210.07497
Distributed Emergency Frequency Control Considering Transient Stability Constraints in Multi-Infeed Hybrid AC-DC System
Due to possible emergency faults and frequency regulation reserve shortage in the multi-infeed hybrid AC-DC (MIDC) system, the emergency frequency control (EFC) with LCC-HVDC systems participating is important for system frequency stability. Nevertheless, the existing decentralized EFC strategies cannot guarantee the t...
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
323,740
2308.13727
Dynamic Mode Decomposition for data-driven analysis and reduced-order modelling of ExB plasmas: II. dynamics forecasting
In part I of the article, we demonstrated that a variant of the Dynamic Mode Decomposition (DMD) algorithm based on variable projection optimization, called Optimized DMD (OPT-DMD), enables a robust identification of the dominant spatiotemporally coherent modes underlying the data across various test cases representing...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
388,027
2308.13772
Boosting Residual Networks with Group Knowledge
Recent research understands the residual networks from a new perspective of the implicit ensemble model. From this view, previous methods such as stochastic depth and stimulative training have further improved the performance of the residual network by sampling and training of its subnets. However, they both use the sa...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
388,047
2008.09236
Spatial Language Representation with Multi-Level Geocoding
We present a multi-level geocoding model (MLG) that learns to associate texts to geographic locations. The Earth's surface is represented using space-filling curves that decompose the sphere into a hierarchy of similarly sized, non-overlapping cells. MLG balances generalization and accuracy by combining losses across m...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
192,647
1804.05482
Binary Matrix Factorization via Dictionary Learning
Matrix factorization is a key tool in data analysis; its applications include recommender systems, correlation analysis, signal processing, among others. Binary matrices are a particular case which has received significant attention for over thirty years, especially within the field of data mining. Dictionary learning ...
false
false
false
false
false
true
true
false
false
true
false
true
false
false
false
false
false
false
95,087
1903.11461
Tracking the Consumption Junction: Temporal Dependencies between Articles and Advertisements in Dutch Newspapers
Historians have regularly debated whether advertisements can be used as a viable source to study the past. Their main concern centered on the question of agency. Were advertisements a reflection of historical events and societal debates, or were ad makers instrumental in shaping society and the ways people interacted w...
false
false
false
false
false
true
false
false
false
false
false
false
false
true
false
false
false
false
125,523
2007.10539
Verification and Parameter Synthesis for Real-Time Programs using Refinement of Trace Abstraction
We address the safety verification and synthesis problems for real-time systems. We introduce real-time programs that are made of instructions that can perform assignments to discrete and real-valued variables. They are general enough to capture interesting classes of timed systems such as timed automata, stopwatch aut...
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
true
188,299
2202.11064
Occupation similarity through bipartite graphs
Similarity between occupations is a crucial piece of information when making career decisions. However, the notion of a single and unified occupation similarity measure is more of a limitation than an asset. The goal of the study is to assess multiple explainable occupation similarity measures that can provide differen...
false
false
false
true
true
false
false
false
false
false
false
false
false
false
false
false
false
false
281,758
2206.04449
Segmentation Enhanced Lameness Detection in Dairy Cows from RGB and Depth Video
Cow lameness is a severe condition that affects the life cycle and life quality of dairy cows and results in considerable economic losses. Early lameness detection helps farmers address illnesses early and avoid negative effects caused by the degeneration of cows' condition. We collected a dataset of short clips of cow...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
301,632
2501.01648
Dual Mutual Learning Network with Global-local Awareness for RGB-D Salient Object Detection
RGB-D salient object detection (SOD), aiming to highlight prominent regions of a given scene by jointly modeling RGB and depth information, is one of the challenging pixel-level prediction tasks. Recently, the dual-attention mechanism has been devoted to this area due to its ability to strengthen the detection process....
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
true
522,152
2404.09384
Tasks People Prompt: A Taxonomy of LLM Downstream Tasks in Software Verification and Falsification Approaches
Prompting has become one of the main approaches to leverage emergent capabilities of Large Language Models [Brown et al. NeurIPS 2020, Wei et al. TMLR 2022, Wei et al. NeurIPS 2022]. Recently, researchers and practitioners have been "playing" with prompts (e.g., In-Context Learning) to see how to make the most of pre-t...
false
false
false
false
true
false
true
false
true
false
false
false
false
false
false
false
false
true
446,647
2305.03111
Can LLM Already Serve as A Database Interface? A BIg Bench for Large-Scale Database Grounded Text-to-SQLs
Text-to-SQL parsing, which aims at converting natural language instructions into executable SQLs, has gained increasing attention in recent years. In particular, Codex and ChatGPT have shown impressive results in this task. However, most of the prevalent benchmarks, i.e., Spider, and WikiSQL, focus on database schema w...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
362,272
2206.14658
Cut Inner Layers: A Structured Pruning Strategy for Efficient U-Net GANs
Pruning effectively compresses overparameterized models. Despite the success of pruning methods for discriminative models, applying them for generative models has been relatively rarely approached. This study conducts structured pruning on U-Net generators of conditional GANs. A per-layer sensitivity analysis confirms ...
false
false
false
false
false
false
true
false
false
false
false
true
false
false
false
false
false
false
305,358
2207.05456
TransFA: Transformer-based Representation for Face Attribute Evaluation
Face attribute evaluation plays an important role in video surveillance and face analysis. Although methods based on convolution neural networks have made great progress, they inevitably only deal with one local neighborhood with convolutions at a time. Besides, existing methods mostly regard face attribute evaluation ...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
307,544
2311.05808
Scale-MIA: A Scalable Model Inversion Attack against Secure Federated Learning via Latent Space Reconstruction
Federated learning is known for its capability to safeguard the participants' data privacy. However, recently emerged model inversion attacks (MIAs) have shown that a malicious parameter server can reconstruct individual users' local data samples from model updates. The state-of-the-art attacks either rely on computati...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
406,712
2407.02371
OpenVid-1M: A Large-Scale High-Quality Dataset for Text-to-video Generation
Text-to-video (T2V) generation has recently garnered significant attention thanks to the large multi-modality model Sora. However, T2V generation still faces two important challenges: 1) Lacking a precise open sourced high-quality dataset. The previous popular video datasets, e.g. WebVid-10M and Panda-70M, are either w...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
469,700
2412.18905
External Bias and Opinion Clustering in Cooperative Networks
In this work, we consider a group of n agents which interact with each other in a cooperative framework. A Laplacian-based model is proposed to govern the evolution of opinions in the group when the agents are subjected to external biases like agents' traits, news, etc. The objective of the paper is to design a control...
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
520,628
1807.06288
PointSeg: Real-Time Semantic Segmentation Based on 3D LiDAR Point Cloud
In this paper, we propose PointSeg, a real-time end-to-end semantic segmentation method for road-objects based on spherical images. We take the spherical image, which is transformed from the 3D LiDAR point clouds, as input of the convolutional neural networks (CNNs) to predict the point-wise semantic map. To make Point...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
103,096
2306.06643
Detection and Recovery of Hidden Submatrices
In this paper, we study the problems of detection and recovery of hidden submatrices with elevated means inside a large Gaussian random matrix. We consider two different structures for the planted submatrices. In the first model, the planted matrices are disjoint, and their row and column indices can be arbitrary. Insp...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
372,696
1904.02580
Online Convex Matrix Factorization with Representative Regions
Matrix factorization (MF) is a versatile learning method that has found wide applications in various data-driven disciplines. Still, many MF algorithms do not adequately scale with the size of available datasets and/or lack interpretability. To improve the computational efficiency of the method, an online (streaming) M...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
126,465
1810.10093
Structured Domain Randomization: Bridging the Reality Gap by Context-Aware Synthetic Data
We present structured domain randomization (SDR), a variant of domain randomization (DR) that takes into account the structure and context of the scene. In contrast to DR, which places objects and distractors randomly according to a uniform probability distribution, SDR places objects and distractors randomly according...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
111,194
2502.06911
Foundation Models for Anomaly Detection: Vision and Challenges
As data continues to grow in volume and complexity across domains such as finance, manufacturing, and healthcare, effective anomaly detection is essential for identifying irregular patterns that may signal critical issues. Recently, foundation models (FMs) have emerged as a powerful tool for advancing anomaly detection...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
false
false
532,343
2403.18853
Spatio-seasonal risk assessment of upward lightning at tall objects using meteorological reanalysis data
This study investigates lightning at tall objects and evaluates the risk of upward lightning (UL) over the eastern Alps and its surrounding areas. While uncommon, UL poses a threat, especially to wind turbines, as the long-duration current of UL can cause significant damage. Current risk assessment methods overlook the...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
442,107
1210.4846
Variational Dual-Tree Framework for Large-Scale Transition Matrix Approximation
In recent years, non-parametric methods utilizing random walks on graphs have been used to solve a wide range of machine learning problems, but in their simplest form they do not scale well due to the quadratic complexity. In this paper, a new dual-tree based variational approach for approximating the transition matrix...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
19,174
2006.10325
When OT meets MoM: Robust estimation of Wasserstein Distance
Issued from Optimal Transport, the Wasserstein distance has gained importance in Machine Learning due to its appealing geometrical properties and the increasing availability of efficient approximations. In this work, we consider the problem of estimating the Wasserstein distance between two probability distributions wh...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
182,847
2312.00886
Nash Learning from Human Feedback
Reinforcement learning from human feedback (RLHF) has emerged as the main paradigm for aligning large language models (LLMs) with human preferences. Typically, RLHF involves the initial step of learning a reward model from human feedback, often expressed as preferences between pairs of text generations produced by a pr...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
true
false
false
true
412,224