id
stringlengths
9
16
title
stringlengths
4
278
abstract
stringlengths
3
4.08k
cs.HC
bool
2 classes
cs.CE
bool
2 classes
cs.SD
bool
2 classes
cs.SI
bool
2 classes
cs.AI
bool
2 classes
cs.IR
bool
2 classes
cs.LG
bool
2 classes
cs.RO
bool
2 classes
cs.CL
bool
2 classes
cs.IT
bool
2 classes
cs.SY
bool
2 classes
cs.CV
bool
2 classes
cs.CR
bool
2 classes
cs.CY
bool
2 classes
cs.MA
bool
2 classes
cs.NE
bool
2 classes
cs.DB
bool
2 classes
Other
bool
2 classes
__index_level_0__
int64
0
541k
2305.10366
Set-Membership Filtering-Based Cooperative State Estimation for Multi-Agent Systems
In this article, we focus on the cooperative state estimation problem of a multi-agent system. Each agent is equipped with absolute and relative measurements. The purpose of this research is to make each agent generate its own state estimation with only local measurement information and local communication with neighbo...
false
false
false
false
false
false
false
false
false
false
true
false
false
false
true
false
false
false
365,022
2404.15296
Maximum Discrepancy Generative Regularization and Non-Negative Matrix Factorization for Single Channel Source Separation
The idea of adversarial learning of regularization functionals has recently been introduced in the wider context of inverse problems. The intuition behind this method is the realization that it is not only necessary to learn the basic features that make up a class of signals one wants to represent, but also, or even mo...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
true
449,031
1807.08087
Capacity Analysis for Full Duplex Self-backhauled Small Cells
Full duplex (FD) communication enables simultaneous transmission and reception on the same frequency band. Though it has the potential of doubling the throughput on isolated links, in reality, higher interference and asymmetric traffic demands in the uplink and downlink could significantly reduce the gains of FD operat...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
true
103,450
2402.05876
Federated Offline Reinforcement Learning: Collaborative Single-Policy Coverage Suffices
Offline reinforcement learning (RL), which seeks to learn an optimal policy using offline data, has garnered significant interest due to its potential in critical applications where online data collection is infeasible or expensive. This work explores the benefit of federated learning for offline RL, aiming at collabor...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
true
false
false
false
428,041
2203.13692
Bisimulations for Verifying Strategic Abilities with an Application to the ThreeBallot Voting Protocol
We propose a notion of alternating bisimulation for strategic abilities under imperfect information. The bisimulation preserves formulas of ATL$^*$ for both the {\em objective} and {\em subjective} variants of the state-based semantics with imperfect information, which are commonly used in the modeling and verification...
false
false
false
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
287,728
2210.02862
Causal Inference for Chatting Handoff
Aiming to ensure chatbot quality by predicting chatbot failure and enabling human-agent collaboration, Machine-Human Chatting Handoff (MHCH) has attracted lots of attention from both industry and academia in recent years. However, most existing methods mainly focus on the dialogue context or assist with global satisfac...
false
false
false
false
true
false
true
false
true
false
false
false
false
false
false
false
false
false
321,805
2207.06814
BERTIN: Efficient Pre-Training of a Spanish Language Model using Perplexity Sampling
The pre-training of large language models usually requires massive amounts of resources, both in terms of computation and data. Frequently used web sources such as Common Crawl might contain enough noise to make this pre-training sub-optimal. In this work, we experiment with different sampling methods from the Spanish ...
false
false
false
false
true
false
false
false
true
false
false
false
false
false
false
false
false
false
308,001
2411.01019
A lightweight Convolutional Neural Network based on U shape structure and Attention Mechanism for Anterior Mediastinum Segmentation
To automatically detect Anterior Mediastinum Lesions (AMLs) in the Anterior Mediastinum (AM), the primary requirement will be an automatic segmentation model specifically designed for the AM. The prevalence of AML is extremely low, making it challenging to conduct screening research similar to lung cancer screening. Re...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
504,876
1909.03965
Evaluating Long-form Text-to-Speech: Comparing the Ratings of Sentences and Paragraphs
Text-to-speech systems are typically evaluated on single sentences. When long-form content, such as data consisting of full paragraphs or dialogues is considered, evaluating sentences in isolation is not always appropriate as the context in which the sentences are synthesized is missing. In this paper, we investigate t...
false
false
true
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
144,657
2202.02796
GLPanoDepth: Global-to-Local Panoramic Depth Estimation
In this paper, we propose a learning-based method for predicting dense depth values of a scene from a monocular omnidirectional image. An omnidirectional image has a full field-of-view, providing much more complete descriptions of the scene than perspective images. However, fully-convolutional networks that most curren...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
278,948
2209.14064
A mass-conserving sparse grid combination technique with biorthogonal hierarchical basis functions for kinetic simulations
The exact numerical simulation of plasma turbulence is one of the assets and challenges in fusion research. For grid-based solvers, sufficiently fine resolutions are often unattainable due to the curse of dimensionality. The sparse grid combination technique provides the means to alleviate the curse of dimensionality f...
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
320,125
2412.12448
Task-Parameter Nexus: Task-Specific Parameter Learning for Model-Based Control
This paper presents the Task-Parameter Nexus (TPN), a learning-based approach for online determination of the (near-)optimal control parameters of model-based controllers (MBCs) for tracking tasks. In TPN, a deep neural network is introduced to predict the control parameters for any given tracking task at runtime, espe...
false
false
false
false
false
false
false
true
false
false
true
false
false
false
false
false
false
false
517,869
1403.0284
Bayes Merging of Multiple Vocabularies for Scalable Image Retrieval
The Bag-of-Words (BoW) representation is well applied to recent state-of-the-art image retrieval works. Typically, multiple vocabularies are generated to correct quantization artifacts and improve recall. However, this routine is corrupted by vocabulary correlation, i.e., overlapping among different vocabularies. Vocab...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
31,280
1703.10730
Unsupervised Holistic Image Generation from Key Local Patches
We introduce a new problem of generating an image based on a small number of key local patches without any geometric prior. In this work, key local patches are defined as informative regions of the target object or scene. This is a challenging problem since it requires generating realistic images and predicting locatio...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
70,966
1905.05006
Time-Series Event Prediction with Evolutionary State Graph
The accurate and interpretable prediction of future events in time-series data often requires the capturing of representative patterns (or referred to as states) underpinning the observed data. To this end, most existing studies focus on the representation and recognition of states, but ignore the changing transitional...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
130,618
2111.09496
Developing a Machine Learning Algorithm-Based Classification Models for the Detection of High-Energy Gamma Particles
Cherenkov gamma telescope observes high energy gamma rays, taking advantage of the radiation emitted by charged particles produced inside the electromagnetic showers initiated by the gammas, and developing in the atmosphere. The detector records and allows for the reconstruction of the shower parameters. The reconstruc...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
267,034
2307.10915
Revisiting Fine-Tuning Strategies for Self-supervised Medical Imaging Analysis
Despite the rapid progress in self-supervised learning (SSL), end-to-end fine-tuning still remains the dominant fine-tuning strategy for medical imaging analysis. However, it remains unclear whether this approach is truly optimal for effectively utilizing the pre-trained knowledge, especially considering the diverse ca...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
380,735
2407.04737
Hierarchical Decoupling Capacitor Optimization for Power Distribution Network of 2.5D ICs with Co-Analysis of Frequency and Time Domains Based on Deep Reinforcement Learning
With the growing need for higher memory bandwidth and computation density, 2.5D design, which involves integrating multiple chiplets onto an interposer, emerges as a promising solution. However, this integration introduces significant challenges due to increasing data rates and a large number of I/Os, necessitating adv...
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
470,684
2210.12352
NeuPhysics: Editable Neural Geometry and Physics from Monocular Videos
We present a method for learning 3D geometry and physics parameters of a dynamic scene from only a monocular RGB video input. To decouple the learning of underlying scene geometry from dynamic motion, we represent the scene as a time-invariant signed distance function (SDF) which serves as a reference frame, along with...
false
false
false
false
false
false
true
false
false
false
false
true
false
false
false
false
false
true
325,699
2210.07661
CAB: Comprehensive Attention Benchmarking on Long Sequence Modeling
Transformer has achieved remarkable success in language, image, and speech processing. Recently, various efficient attention architectures have been proposed to improve transformer's efficiency while largely preserving its efficacy, especially in modeling long sequences. A widely-used benchmark to test these efficient ...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
323,816
1801.03623
Optimal locally repairable codes of distance $3$ and $4$ via cyclic codes
Like classical block codes, a locally repairable code also obeys the Singleton-type bound (we call a locally repairable code {\it optimal} if it achieves the Singleton-type bound). In the breakthrough work of \cite{TB14}, several classes of optimal locally repairable codes were constructed via subcodes of Reed-Solomon ...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
88,133
2403.13551
Ground-A-Score: Scaling Up the Score Distillation for Multi-Attribute Editing
Despite recent advancements in text-to-image diffusion models facilitating various image editing techniques, complex text prompts often lead to an oversight of some requests due to a bottleneck in processing text information. To tackle this challenge, we present Ground-A-Score, a simple yet powerful model-agnostic imag...
false
false
false
false
false
false
true
false
false
false
false
true
false
false
false
false
false
false
439,678
cs/0203021
NetNeg: A Connectionist-Agent Integrated System for Representing Musical Knowledge
The system presented here shows the feasibility of modeling the knowledge involved in a complex musical activity by integrating sub-symbolic and symbolic processes. This research focuses on the question of whether there is any advantage in integrating a neural network together with a distributed artificial intelligence...
false
false
false
false
true
false
false
false
false
false
false
false
false
false
true
false
false
false
537,527
2412.11815
ColorFlow: Retrieval-Augmented Image Sequence Colorization
Automatic black-and-white image sequence colorization while preserving character and object identity (ID) is a complex task with significant market demand, such as in cartoon or comic series colorization. Despite advancements in visual colorization using large-scale generative models like diffusion models, challenges w...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
517,596
2404.09696
Are Large Language Models Reliable Argument Quality Annotators?
Evaluating the quality of arguments is a crucial aspect of any system leveraging argument mining. However, it is a challenge to obtain reliable and consistent annotations regarding argument quality, as this usually requires domain-specific expertise of the annotators. Even among experts, the assessment of argument qual...
false
false
false
false
true
false
false
false
true
false
false
false
false
false
false
false
false
true
446,797
2409.13286
Generative Learning Powered Probing Beam Optimization for Cell-Free Hybrid Beamforming
Probing beam measurement (PBM)-based hybrid beamforming provides a feasible solution for cell-free MIMO. In this letter, we propose a novel probing beam optimization framework where three collaborative modules respectively realize PBM augmentation, sum-rate prediction and probing beam optimization. Specifically, the PB...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
489,929
1803.04813
Artificial neural network based modelling approach for municipal solid waste gasification in a fluidized bed reactor
In this paper, multi-layer feed forward neural networks are used to predict the lower heating value of gas (LHV), lower heating value of gasification products including tars and entrained char (LHVp) and syngas yield during gasification of municipal solid waste (MSW) during gasification in a fluidized bed reactor. Thes...
false
true
false
false
false
false
true
false
false
false
false
false
false
false
false
true
false
false
92,521
2011.07584
Pix2Streams: Dynamic Hydrology Maps from Satellite-LiDAR Fusion
Where are the Earth's streams flowing right now? Inland surface waters expand with floods and contract with droughts, so there is no one map of our streams. Current satellite approaches are limited to monthly observations that map only the widest streams. These are fed by smaller tributaries that make up much of the de...
false
false
false
false
false
false
true
false
false
false
false
true
false
false
false
false
false
false
206,603
1811.08840
Integrating Reinforcement Learning to Self Training for Pulmonary Nodule Segmentation in Chest X-rays
Machine learning applications in medical imaging are frequently limited by the lack of quality labeled data. In this paper, we explore the self training method, a form of semi-supervised learning, to address the labeling burden. By integrating reinforcement learning, we were able to expand the application of self train...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
114,137
2105.02573
Assessing Dialogue Systems with Distribution Distances
An important aspect of developing dialogue systems is how to evaluate and compare the performance of different systems. Existing automatic evaluation metrics are based on turn-level quality evaluation and use average scores for system-level comparison. In this paper, we propose to measure the performance of a dialogue ...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
233,859
2111.09076
To Trust or Not To Trust Prediction Scores for Membership Inference Attacks
Membership inference attacks (MIAs) aim to determine whether a specific sample was used to train a predictive model. Knowing this may indeed lead to a privacy breach. Most MIAs, however, make use of the model's prediction scores - the probability of each output given some input - following the intuition that the traine...
false
false
false
false
false
false
true
false
false
false
false
true
true
false
false
false
false
false
266,899
2101.07517
FUBOCO: Structure Synthesis of Basic Op-Amps by FUnctional BlOck COmposition
This paper presents a method to automatically synthesize the structure of an operational amplifier. It is positioned between approaches with fixed design plans and a small search space of structures and approaches with generic structural production rules and a large search space with technically impractical structures....
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
216,054
1907.10559
QRMODA and BRMODA: Novel Models for Face Recognition Accuracy in Computer Vision Systems with Adapted Video Streams
A major challenge facing Computer Vision systems is providing the ability to accurately detect threats and recognize subjects and/or objects under dynamically changing network conditions. We propose two novel models that characterize the face recognition accuracy in terms of video encoding parameters. Specifically, we ...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
true
139,653
2410.01100
Unlocking Korean Verbs: A User-Friendly Exploration into the Verb Lexicon
The Sejong dictionary dataset offers a valuable resource, providing extensive coverage of morphology, syntax, and semantic representation. This dataset can be utilized to explore linguistic information in greater depth. The labeled linguistic structures within this dataset form the basis for uncovering relationships be...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
493,609
2105.09279
Unsupervised Discriminative Learning of Sounds for Audio Event Classification
Recent progress in network-based audio event classification has shown the benefit of pre-training models on visual data such as ImageNet. While this process allows knowledge transfer across different domains, training a model on large-scale visual datasets is time consuming. On several audio event classification benchm...
false
false
true
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
236,019
2110.10030
Accelerating Framework of Transformer by Hardware Design and Model Compression Co-Optimization
State-of-the-art Transformer-based models, with gigantic parameters, are difficult to be accommodated on resource constrained embedded devices. Moreover, with the development of technology, more and more embedded devices are available to run a Transformer model. For a Transformer model with different constraints (tight...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
262,013
2304.00387
HaLP: Hallucinating Latent Positives for Skeleton-based Self-Supervised Learning of Actions
Supervised learning of skeleton sequence encoders for action recognition has received significant attention in recent times. However, learning such encoders without labels continues to be a challenging problem. While prior works have shown promising results by applying contrastive learning to pose sequences, the qualit...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
355,664
2004.01113
ProxyNCA++: Revisiting and Revitalizing Proxy Neighborhood Component Analysis
We consider the problem of distance metric learning (DML), where the task is to learn an effective similarity measure between images. We revisit ProxyNCA and incorporate several enhancements. We find that low temperature scaling is a performance-critical component and explain why it works. Besides, we also discover tha...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
170,819
2405.12421
A Unified Linear Programming Framework for Offline Reward Learning from Human Demonstrations and Feedback
Inverse Reinforcement Learning (IRL) and Reinforcement Learning from Human Feedback (RLHF) are pivotal methodologies in reward learning, which involve inferring and shaping the underlying reward function of sequential decision-making problems based on observed human demonstrations and feedback. Most prior work in rewar...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
false
false
455,512
2203.08731
Tangles and Hierarchical Clustering
We establish a connection between tangles, a concept from structural graph theory that plays a central role in Robertson and Seymour's graph minor project, and hierarchical clustering. Tangles cannot only be defined for graphs, but in fact for arbitrary connectivity functions, which are functions defined on the subsets...
false
false
false
false
false
false
true
false
false
false
false
true
false
false
false
false
false
true
285,893
2311.07166
NDDepth: Normal-Distance Assisted Monocular Depth Estimation and Completion
Over the past few years, monocular depth estimation and completion have been paid more and more attention from the computer vision community because of their widespread applications. In this paper, we introduce novel physics (geometry)-driven deep learning frameworks for these two tasks by assuming that 3D scenes are c...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
407,225
1512.01725
The Evolution of Wikipedia's Norm Network
Social norms have traditionally been difficult to quantify. In any particular society, their sheer number and complex interdependencies often limit a system-level analysis. One exception is that of the network of norms that sustain the online Wikipedia community. We study the fifteen-year evolution of this network usin...
false
false
false
true
false
false
false
false
false
false
false
false
false
true
false
false
false
false
49,850
2408.11266
Practical Aspects on Solving Differential Equations Using Deep Learning: A Primer
Deep learning has become a popular tool across many scientific fields, including the study of differential equations, particularly partial differential equations. This work introduces the basic principles of deep learning and the Deep Galerkin method, which uses deep neural networks to solve differential equations. Thi...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
true
482,205
1711.07893
Effective Strategies in Zero-Shot Neural Machine Translation
In this paper, we proposed two strategies which can be applied to a multilingual neural machine translation system in order to better tackle zero-shot scenarios despite not having any parallel corpus. The experiments show that they are effective in terms of both performance and computing resources, especially in multil...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
85,092
2206.05478
Monitoring and Proactive Management of QoS Levels in Pervasive Applications
The advent of Edge Computing (EC) as a promising paradigm that provides multiple computation and analytics capabilities close to data sources opens new pathways for novel applications. Nonetheless, the limited computational capabilities of EC nodes and the expectation of ensuring high levels of QoS during tasks executi...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
true
302,018
2206.04003
Patch-based Object-centric Transformers for Efficient Video Generation
In this work, we present Patch-based Object-centric Video Transformer (POVT), a novel region-based video generation architecture that leverages object-centric information to efficiently model temporal dynamics in videos. We build upon prior work in video prediction via an autoregressive transformer over the discrete la...
false
false
false
false
false
false
true
false
false
false
false
true
false
false
false
false
false
false
301,480
2207.09682
Quantized Training of Gradient Boosting Decision Trees
Recent years have witnessed significant success in Gradient Boosting Decision Trees (GBDT) for a wide range of machine learning applications. Generally, a consensus about GBDT's training algorithms is gradients and statistics are computed based on high-precision floating points. In this paper, we investigate an essenti...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
308,983
1704.04313
CBinfer: Change-Based Inference for Convolutional Neural Networks on Video Data
Extracting per-frame features using convolutional neural networks for real-time processing of video data is currently mainly performed on powerful GPU-accelerated workstations and compute clusters. However, there are many applications such as smart surveillance cameras that require or would benefit from on-site process...
false
false
false
false
true
false
true
false
false
false
false
true
false
false
false
false
false
true
71,787
1903.02313
Learning from Higher-Layer Feature Visualizations
Driven by the goal to enable sleep apnea monitoring and machine learning-based detection at home with small mobile devices, we investigate whether interpretation-based indirect knowledge transfer can be used to create classifiers with acceptable performance. Interpretation-based indirect knowledge transfer means that a...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
123,479
2409.15882
Exploring VQ-VAE with Prosody Parameters for Speaker Anonymization
Human speech conveys prosody, linguistic content, and speaker identity. This article investigates a novel speaker anonymization approach using an end-to-end network based on a Vector-Quantized Variational Auto-Encoder (VQ-VAE) to deal with these speech components. This approach is designed to disentangle these componen...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
491,108
2102.05547
Learning Equational Theorem Proving
We develop Stratified Shortest Solution Imitation Learning (3SIL) to learn equational theorem proving in a deep reinforcement learning (RL) setting. The self-trained models achieve state-of-the-art performance in proving problems generated by one of the top open conjectures in quasigroup theory, the Abelian Inner Mappi...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
false
true
219,478
1608.00147
Attention Span For Personalisation
A click on an item is arguably the most widely used feature in recommender systems. However, a click is one out of 174 events a browser can trigger. This paper presents a framework to effectively collect and store data from event streams. A set of mining methods is provided to extract user engagement features such as: ...
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
59,231
2003.02943
A deep learning-facilitated radiomics solution for the prediction of lung lesion shrinkage in non-small cell lung cancer trials
Herein we propose a deep learning-based approach for the prediction of lung lesion response based on radiomic features extracted from clinical CT scans of patients in non-small cell lung cancer trials. The approach starts with the classification of lung lesions from the set of primary and metastatic lesions at various ...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
167,075
2010.11793
Metapath- and Entity-aware Graph Neural Network for Recommendation
In graph neural networks (GNNs), message passing iteratively aggregates nodes' information from their direct neighbors while neglecting the sequential nature of multi-hop node connections. Such sequential node connections e.g., metapaths, capture critical insights for downstream tasks. Concretely, in recommender system...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
false
false
202,429
2110.04898
Response surface single loop reliability-based design optimization with higher-order reliability assessment
Reliability-based design optimization (RBDO) aims at determination of the optimal design in the presence of uncertainty. The available Single-Loop approaches for RBDO are based on the First-Order Reliability Method (FORM) for the computation of the probability of failure, along with different approximations in order to...
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
260,076
1806.06336
Improving Network Availability of Ultra-Reliable and Low-Latency Communications with Multi-Connectivity
Ultra-reliable and low-latency communications (URLLC) have stringent requirements on quality-of-service and network availability. Due to path loss and shadowing, it is very challenging to guarantee the stringent requirements of URLLC with satisfactory communication range. In this paper, we first provide a quantitative ...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
100,681
2405.19093
Multi-stage Retrieve and Re-rank Model for Automatic Medical Coding Recommendation
The International Classification of Diseases (ICD) serves as a definitive medical classification system encompassing a wide range of diseases and conditions. The primary objective of ICD indexing is to allocate a subset of ICD codes to a medical record, which facilitates standardized documentation and management of var...
false
false
false
false
false
true
false
false
true
false
false
false
false
false
false
false
false
false
458,747
2410.22284
Embedding-based classifiers can detect prompt injection attacks
Large Language Models (LLMs) are seeing significant adoption in every type of organization due to their exceptional generative capabilities. However, LLMs are found to be vulnerable to various adversarial attacks, particularly prompt injection attacks, which trick them into producing harmful or inappropriate content. A...
false
false
false
false
false
false
true
false
false
false
false
false
true
false
false
false
false
false
503,566
2407.07221
Tracing Back the Malicious Clients in Poisoning Attacks to Federated Learning
Poisoning attacks compromise the training phase of federated learning (FL) such that the learned global model misclassifies attacker-chosen inputs called target inputs. Existing defenses mainly focus on protecting the training phase of FL such that the learnt global model is poison free. However, these defenses often a...
false
false
false
false
false
false
false
false
false
false
false
true
true
false
false
false
false
false
471,674
2001.01798
Domain Adaptation via Teacher-Student Learning for End-to-End Speech Recognition
Teacher-student (T/S) has shown to be effective for domain adaptation of deep neural network acoustic models in hybrid speech recognition systems. In this work, we extend the T/S learning to large-scale unsupervised domain adaptation of an attention-based end-to-end (E2E) model through two levels of knowledge transfer:...
false
false
true
false
false
false
true
false
true
false
false
false
false
false
false
true
false
false
159,575
2403.14713
Auditing Fairness under Unobserved Confounding
Many definitions of fairness or inequity involve unobservable causal quantities that cannot be directly estimated without strong assumptions. For instance, it is particularly difficult to estimate notions of fairness that rely on hard-to-measure concepts such as risk (e.g., quantifying whether patients at the same risk...
false
false
false
false
false
false
true
false
false
false
false
false
false
true
false
false
false
false
440,221
2302.06683
Enhancing Multivariate Time Series Classifiers through Self-Attention and Relative Positioning Infusion
Time Series Classification (TSC) is an important and challenging task for many visual computing applications. Despite the extensive range of methods developed for TSC, relatively few utilized Deep Neural Networks (DNNs). In this paper, we propose two novel attention blocks (Global Temporal Attention and Temporal Pseudo...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
345,494
2009.07964
Tasty Burgers, Soggy Fries: Probing Aspect Robustness in Aspect-Based Sentiment Analysis
Aspect-based sentiment analysis (ABSA) aims to predict the sentiment towards a specific aspect in the text. However, existing ABSA test sets cannot be used to probe whether a model can distinguish the sentiment of the target aspect from the non-target aspects. To solve this problem, we develop a simple but effective ap...
false
false
false
false
false
true
true
false
true
false
false
false
false
false
false
false
false
false
196,084
0805.0510
Iterative Hard Thresholding for Compressed Sensing
Compressed sensing is a technique to sample compressible signals below the Nyquist rate, whilst still allowing near optimal reconstruction of the signal. In this paper we present a theoretical analysis of the iterative hard thresholding algorithm when applied to the compressed sensing recovery problem. We show that the...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
true
1,714
2107.03690
Proceedings of the First Workshop on Weakly Supervised Learning (WeaSuL)
Welcome to WeaSuL 2021, the First Workshop on Weakly Supervised Learning, co-located with ICLR 2021. In this workshop, we want to advance theory, methods and tools for allowing experts to express prior coded knowledge for automatic data annotations that can be used to train arbitrary deep neural networks for prediction...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
245,228
2104.09373
My Experience in Physical Layer Communications
I feel that I have been very lucky since I have experienced the most dynamic 30 years on electronics in the past. I think that the most visible change in our daily life over the past 30 years is communications. From computer modems, to internet, and to smart phones, people now feel much less lonely or bored since they ...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
231,213
cond-mat/0202190
Threshold Disorder as a Source of Diverse and Complex Behavior in Random Nets
We study the diversity of complex spatio-temporal patterns in the behavior of random synchronous asymmetric neural networks (RSANNs). Special attention is given to the impact of disordered threshold values on limit-cycle diversity and limit-cycle complexity in RSANNs which have `normal' thresholds by default. Surprisin...
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
true
false
false
536,937
2303.11117
EmotionIC: emotional inertia and contagion-driven dependency modeling for emotion recognition in conversation
Emotion Recognition in Conversation (ERC) has attracted growing attention in recent years as a result of the advancement and implementation of human-computer interface technologies. In this paper, we propose an emotional inertia and contagion-driven dependency modeling approach (EmotionIC) for ERC task. Our EmotionIC c...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
352,711
2207.06757
Secure Network Function Computation for Linear Functions -- Part I: Source Security
In this paper, we put forward secure network function computation over a directed acyclic network. In such a network, a sink node is required to compute with zero error a target function of which the inputs are generated as source messages at multiple source nodes, while a wiretapper, who can access any one but not mor...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
307,982
2101.02069
Model Extraction and Defenses on Generative Adversarial Networks
Model extraction attacks aim to duplicate a machine learning model through query access to a target model. Early studies mainly focus on discriminative models. Despite the success, model extraction attacks against generative models are less well explored. In this paper, we systematically study the feasibility of model ...
false
false
false
false
false
false
true
false
false
false
false
true
true
false
false
false
false
false
214,518
2407.08073
NDST: Neural Driving Style Transfer for Human-Like Vision-Based Autonomous Driving
Autonomous Vehicles (AV) and Advanced Driver Assistant Systems (ADAS) prioritize safety over comfort. The intertwining factors of safety and comfort emerge as pivotal elements in ensuring the effectiveness of Autonomous Driving (AD). Users often experience discomfort when AV or ADAS drive the vehicle on their behalf. P...
false
false
false
false
true
false
true
true
false
false
false
false
false
false
false
false
false
false
471,998
2305.12309
Uniform Pricing vs Pay as Bid in 100%-Renewables Electricity Markets: A Game-theoretical Analysis
This paper evaluates market equilibrium under different pricing mechanisms in a two-settlement 100%-renewables electricity market. Given general probability distributions of renewable energy, we establish game-theoretical models to analyze equilibrium bidding strategies, market prices, and profits under uniform pricing...
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
true
365,938
1511.03690
Deep Multimodal Semantic Embeddings for Speech and Images
In this paper, we present a model which takes as input a corpus of images with relevant spoken captions and finds a correspondence between the two modalities. We employ a pair of convolutional neural networks to model visual objects and speech signals at the word level, and tie the networks together with an embedding a...
false
false
false
false
true
false
false
false
true
false
false
true
false
false
false
false
false
false
48,785
1807.10562
Contributions to the development of the CRO-SL algorithm: Engineering applications problems
This Ph.D. thesis discusses advanced design issues of the evolutionary-based algorithm \textit{"Coral Reef Optimization"}, in its Substrate-Layer (CRO-SL) version, for optimization problems in Engineering Applications. The problems that can be tackled with meta-heuristic approaches is very wide and varied, and it is no...
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
true
false
false
103,959
0801.4716
Methods to integrate a language model with semantic information for a word prediction component
Most current word prediction systems make use of n-gram language models (LM) to estimate the probability of the following word in a phrase. In the past years there have been many attempts to enrich such language models with further syntactic or semantic information. We want to explore the predictive powers of Latent Se...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
1,232
1403.2024
Node Removal Vulnerability of the Largest Component of a Network
The connectivity structure of a network can be very sensitive to removal of certain nodes in the network. In this paper, we study the sensitivity of the largest component size to node removals. We prove that minimizing the largest component size is equivalent to solving a matrix one-norm minimization problem whose colu...
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
true
31,454
2408.08544
Scaling up Multimodal Pre-training for Sign Language Understanding
Sign language serves as the primary meaning of communication for the deaf-mute community. Different from spoken language, it commonly conveys information by the collaboration of manual features, i.e., hand gestures and body movements, and non-manual features, i.e., facial expressions and mouth cues. To facilitate commu...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
true
481,035
2309.01552
OutRank: Speeding up AutoML-based Model Search for Large Sparse Data sets with Cardinality-aware Feature Ranking
The design of modern recommender systems relies on understanding which parts of the feature space are relevant for solving a given recommendation task. However, real-world data sets in this domain are often characterized by their large size, sparsity, and noise, making it challenging to identify meaningful signals. Fea...
false
false
false
false
true
true
true
false
false
false
false
false
false
false
false
false
false
false
389,723
1802.02605
Unsupervised word sense disambiguation in dynamic semantic spaces
In this paper, we are mainly concerned with the ability to quickly and automatically distinguish word senses in dynamic semantic spaces in which new terms and new senses appear frequently. Such spaces are built '"on the fly" from constantly evolving data sets such as Wikipedia, repositories of patent grants and applica...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
89,802
2107.10173
Assured Mission Adaptation of UAVs
The design of systems that can change their behaviour to account for scenarios that were not foreseen at design time remains an open challenge. In this paper we propose an approach for adaptation of mobile robot missions that is not constrained to a predefined set of mission evolutions. We propose applying the MORPH ad...
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
247,234
2104.05082
The Core of Approval Participatory Budgeting with Uniform Costs (or with up to Four Projects) is Non-Empty
In the Approval Participatory Budgeting problem an agent prefers a set of projects $W'$ over $W$ if she approves strictly more projects in $W'$. A set of projects $W$ is in the core, if there is no other set of projects $W'$ and set of agents $K$ that both prefer $W'$ over $W$ and can fund $W'$. It is an open problem w...
false
false
false
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
229,597
2410.01791
DreamGarden: A Designer Assistant for Growing Games from a Single Prompt
Coding assistants are increasingly leveraged in game design, both generating code and making high-level plans. To what degree can these tools align with developer workflows, and what new modes of human-computer interaction can emerge from their use? We present DreamGarden, an AI system capable of assisting with the dev...
true
false
false
false
true
false
false
false
true
false
false
false
false
false
false
false
false
true
493,947
2410.23526
LEAF: Learning and Evaluation Augmented by Fact-Checking to Improve Factualness in Large Language Models
Large language models (LLMs) have shown remarkable capabilities in various natural language processing tasks, yet they often struggle with maintaining factual accuracy, particularly in knowledge-intensive domains like healthcare. This study introduces LEAF: Learning and Evaluation Augmented by Fact-Checking, a novel ap...
false
false
false
false
true
false
false
false
true
false
false
false
false
false
false
false
false
false
504,072
2501.10401
Custom Loss Functions in Fuel Moisture Modeling
Fuel moisture content (FMC) is a key predictor for wildfire rate of spread (ROS). Machine learning models of FMC are being used more in recent years, augmenting or replacing traditional physics-based approaches. Wildfire rate of spread (ROS) has a highly nonlinear relationship with FMC, where small differences in dry f...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
525,505
2212.07611
Residual Policy Learning for Powertrain Control
Eco-driving strategies have been shown to provide significant reductions in fuel consumption. This paper outlines an active driver assistance approach that uses a residual policy learning (RPL) agent trained to provide residual actions to default power train controllers while balancing fuel consumption against other dr...
false
false
false
false
true
false
true
false
false
false
true
false
false
false
false
false
false
false
336,460
2110.00415
Optimization Networks for Integrated Machine Learning
Optimization networks are a new methodology for holistically solving interrelated problems that have been developed with combinatorial optimization problems in mind. In this contribution we revisit the core principles of optimization networks and demonstrate their suitability for solving machine learning problems. We u...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
258,377
2303.00934
Helpful, Misleading or Confusing: How Humans Perceive Fundamental Building Blocks of Artificial Intelligence Explanations
Explainable artificial intelligence techniques are developed at breakneck speed, but suitable evaluation approaches lag behind. With explainers becoming increasingly complex and a lack of consensus on how to assess their utility, it is challenging to judge the benefit and effectiveness of different explanations. To add...
true
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
false
false
348,757
1309.3029
On the Chi square and higher-order Chi distances for approximating f-divergences
We report closed-form formula for calculating the Chi square and higher-order Chi distances between statistical distributions belonging to the same exponential family with affine natural space, and instantiate those formula for the Poisson and isotropic Gaussian families. We then describe an analytic formula for the $f...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
26,991
2108.11674
Graph-guided random forest for gene set selection
Machine learning methods can detect complex relationships between variables, but usually do not exploit domain knowledge. This is a limitation because in many scientific disciplines, such as systems biology, domain knowledge is available in the form of graphs or networks, and its use can improve model performance. We n...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
false
false
252,249
2404.07445
Multi-view Aggregation Network for Dichotomous Image Segmentation
Dichotomous Image Segmentation (DIS) has recently emerged towards high-precision object segmentation from high-resolution natural images. When designing an effective DIS model, the main challenge is how to balance the semantic dispersion of high-resolution targets in the small receptive field and the loss of high-pre...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
445,830
2310.16376
GADY: Unsupervised Anomaly Detection on Dynamic Graphs
Anomaly detection on dynamic graphs refers to detecting entities whose behaviors obviously deviate from the norms observed within graphs and their temporal information. This field has drawn increasing attention due to its application in finance, network security, social networks, and more. However, existing methods fac...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
false
false
402,702
1011.0298
Intuitionistic Fuzzy Ideal Extensions of {\Gamma}-Semigroups
In this paper the concept of the extensions of intuitionistic fuzzy ideals in a semigroup has been extended to a {\Gamma}-Semigroups. Among other results characterization of prime ideals in a {\Gamma}-Semigroups in terms of intuitionistic fuzzy ideal extension has been obtained.
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
8,090
2404.18684
Work Smarter...Not Harder: Efficient Minimization of Dependency Length in SOV Languages
Dependency length minimization is a universally observed quantitative property of natural languages. However, the extent of dependency length minimization, and the cognitive mechanisms through which the language processor achieves this minimization remain unclear. This research offers mechanistic insights by postulatin...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
450,353
2006.00885
CoAID: COVID-19 Healthcare Misinformation Dataset
As the COVID-19 virus quickly spreads around the world, unfortunately, misinformation related to COVID-19 also gets created and spreads like wild fire. Such misinformation has caused confusion among people, disruptions in society, and even deadly consequences in health problems. To be able to understand, detect, and mi...
false
false
false
true
false
false
false
false
true
false
false
false
false
false
false
false
false
false
179,600
1610.00054
Outlier Detection from Network Data with Subnetwork Interpretation
Detecting a small number of outliers from a set of data observations is always challenging. This problem is more difficult in the setting of multiple network samples, where computing the anomalous degree of a network sample is generally not sufficient. In fact, explaining why the network is exceptional, expressed in th...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
false
false
61,785
1901.01479
Center of Gravity-based Approach for Modeling Dynamics of Multisection Continuum Arms
Multisection continuum arms offer complementary characteristics to those of traditional rigid-bodied robots. Inspired by biological appendages, such as elephant trunks and octopus arms, these robots trade rigidity for compliance, accuracy for safety, and therefore exhibit strong potential for applications in human-occu...
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
117,983
2008.01848
Forecasting AI Progress: A Research Agenda
Forecasting AI progress is essential to reducing uncertainty in order to appropriately plan for research efforts on AI safety and AI governance. While this is generally considered to be an important topic, little work has been conducted on it and there is no published document that gives and objective overview of the f...
false
false
false
false
true
false
false
false
false
false
false
false
false
true
false
false
false
false
190,448
1207.2711
The Outage Probability of a Finite Ad Hoc Network in Nakagami Fading
An ad hoc network with a finite spatial extent and number of nodes or mobiles is analyzed. The mobile locations may be drawn from any spatial distribution, and interference-avoidance protocols or protection against physical collisions among the mobiles may be modeled by placing an exclusion zone around each radio. The ...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
17,411
2403.07209
The entropic doubling constant and robustness of Gaussian codebooks for additive-noise channels
Entropy comparison inequalities are obtained for the differential entropy $h(X+Y)$ of the sum of two independent random vectors $X,Y$, when one is replaced by a Gaussian. For identically distributed random vectors $X,Y$, these are closely related to bounds on the entropic doubling constant, which quantifies the entropy...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
436,778
2201.01586
Learning True Rate-Distortion-Optimization for End-To-End Image Compression
Even though rate-distortion optimization is a crucial part of traditional image and video compression, not many approaches exist which transfer this concept to end-to-end-trained image compression. Most frameworks contain static compression and decompression models which are fixed after training, so efficient rate-dist...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
274,290