id stringlengths 9 16 | title stringlengths 4 278 | abstract stringlengths 3 4.08k | cs.HC bool 2
classes | cs.CE bool 2
classes | cs.SD bool 2
classes | cs.SI bool 2
classes | cs.AI bool 2
classes | cs.IR bool 2
classes | cs.LG bool 2
classes | cs.RO bool 2
classes | cs.CL bool 2
classes | cs.IT bool 2
classes | cs.SY bool 2
classes | cs.CV bool 2
classes | cs.CR bool 2
classes | cs.CY bool 2
classes | cs.MA bool 2
classes | cs.NE bool 2
classes | cs.DB bool 2
classes | Other bool 2
classes | __index_level_0__ int64 0 541k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2004.01185 | Introducing Anisotropic Minkowski Functionals and Quantitative
Anisotropy Measures for Local Structure Analysis in Biomedical Imaging | The ability of Minkowski Functionals to characterize local structure in different biological tissue types has been demonstrated in a variety of medical image processing tasks. We introduce anisotropic Minkowski Functionals (AMFs) as a novel variant that captures the inherent anisotropy of the underlying gray-level stru... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 170,845 |
2007.00843 | Low-light Environment Neural Surveillance | We design and implement an end-to-end system for real-time crime detection in low-light environments. Unlike Closed-Circuit Television, which performs reactively, the Low-Light Environment Neural Surveillance provides real time crime alerts. The system uses a low-light video feed processed in real-time by an optical-fl... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 185,237 |
1808.09468 | Learning To Split and Rephrase From Wikipedia Edit History | Split and rephrase is the task of breaking down a sentence into shorter ones that together convey the same meaning. We extract a rich new dataset for this task by mining Wikipedia's edit history: WikiSplit contains one million naturally occurring sentence rewrites, providing sixty times more distinct split examples and... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 106,194 |
2411.14927 | LiDAR-based End-to-end Temporal Perception for Vehicle-Infrastructure
Cooperation | Temporal perception, the ability to detect and track objects over time, is critical in autonomous driving for maintaining a comprehensive understanding of dynamic environments. However, this task is hindered by significant challenges, including incomplete perception caused by occluded objects and observational blind sp... | false | false | false | false | true | false | true | true | false | false | false | true | false | false | false | false | false | false | 510,375 |
2301.04740 | The Berkelmans-Pries Feature Importance Method: A Generic Measure of
Informativeness of Features | Over the past few years, the use of machine learning models has emerged as a generic and powerful means for prediction purposes. At the same time, there is a growing demand for interpretability of prediction models. To determine which features of a dataset are important to predict a target variable $Y$, a Feature Impor... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 340,150 |
2106.14167 | PeCoQ: A Dataset for Persian Complex Question Answering over Knowledge
Graph | Question answering systems may find the answers to users' questions from either unstructured texts or structured data such as knowledge graphs. Answering questions using supervised learning approaches including deep learning models need large training datasets. In recent years, some datasets have been presented for the... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | 243,318 |
1304.1346 | Domain Specific Language for Geometric Relations between Rigid Bodies
targeted to robotic applications | This paper presents a DSL for geometric relations between rigid bodies such as relative position, orientation, pose, linear velocity, angular velocity, and twist. The DSL is the formal model of the recently proposed semantics for the standardization of geometric relations between rigid bodies, referred to as `geometric... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 23,511 |
2310.09792 | SCME: A Self-Contrastive Method for Data-free and Query-Limited Model
Extraction Attack | Previous studies have revealed that artificial intelligence (AI) systems are vulnerable to adversarial attacks. Among them, model extraction attacks fool the target model by generating adversarial examples on a substitute model. The core of such an attack is training a substitute model as similar to the target model as... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 399,951 |
2404.01744 | Octopus v2: On-device language model for super agent | Language models have shown effectiveness in a variety of software applications, particularly in tasks related to automatic workflow. These models possess the crucial ability to call functions, which is essential in creating AI agents. Despite the high performance of large-scale language models in cloud environments, th... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 443,563 |
1608.02927 | Temporal Attention Model for Neural Machine Translation | Attention-based Neural Machine Translation (NMT) models suffer from attention deficiency issues as has been observed in recent research. We propose a novel mechanism to address some of these limitations and improve the NMT attention. Specifically, our approach memorizes the alignments temporally (within each sentence) ... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 59,618 |
2404.05311 | BruSLeAttack: A Query-Efficient Score-Based Black-Box Sparse Adversarial
Attack | We study the unique, less-well understood problem of generating sparse adversarial samples simply by observing the score-based replies to model queries. Sparse attacks aim to discover a minimum number-the l0 bounded-perturbations to model inputs to craft adversarial examples and misguide model decisions. But, in contra... | false | false | false | false | false | false | true | false | false | false | false | false | true | false | false | false | false | false | 445,037 |
2208.09743 | Where Shall I Touch? Vision-Guided Tactile Poking for Transparent Object
Grasping | Picking up transparent objects is still a challenging task for robots. The visual properties of transparent objects such as reflection and refraction make the current grasping methods that rely on camera sensing fail to detect and localise them. However, humans can handle the transparent object well by first observing ... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 313,818 |
1702.01285 | On a Relationship between the Correct Probability of Estimation from
Correlated Data and Mutual Information | Let $X$, $Y$ be two correlated discrete random variables. We consider an estimation of $X$ from encoded data $\varphi(Y)$ of $Y$ by some encoder function $\varphi(Y)$. We derive an inequality describing a relation of the correct probability of estimation and the mutual information between $X$ and $\varphi(Y)$. This ine... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 67,784 |
1806.07621 | Smallest Ellipsoid Containing $p$-Sum of Ellipsoids with Application to
Reachability Analysis | We study the problem of ellipsoidal bounding of convex set-valued data, where the convex set is obtained by the $p$-sum of finitely many ellipsoids, for any real $p\geq 1$. The notion of $p$-sum appears in the Brunn-Minkowski-Firey theory in convex analysis, and generalizes several well-known set-valued operations such... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 100,976 |
2008.08046 | TactileSGNet: A Spiking Graph Neural Network for Event-based Tactile
Object Recognition | Tactile perception is crucial for a variety of robot tasks including grasping and in-hand manipulation. New advances in flexible, event-driven, electronic skins may soon endow robots with touch perception capabilities similar to humans. These electronic skins respond asynchronously to changes (e.g., in pressure, temper... | false | false | false | false | false | false | true | true | false | false | false | true | false | false | false | false | false | false | 192,300 |
2502.13110 | MLPs at the EOC: Dynamics of Feature Learning | Since infinitely wide neural networks in the kernel regime are random feature models, the success of contemporary deep learning lies in the rich regime, where a satisfying theory should explain not only the convergence of gradient descent but the learning of features along the way. Such a theory should also cover pheno... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 535,205 |
1709.09402 | Low-Complexity Iterative Detection for Orthogonal Time Frequency Space
Modulation | We elaborate on the recently proposed orthogonal time frequency space (OTFS) modulation technique, which provides significant advantages over orthogonal frequency division multiplexing (OFDM) in Doppler channels. We first derive the input--output relation describing OTFS modulation and demodulation (mod/demod) for dela... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 81,623 |
2301.01459 | Modeling the Central Supermassive Black Holes Mass of Quasars via LSTM
Approach | One of the fundamental questions about quasars is related to their central supermassive black holes. The reason for the existence of these black holes with such a huge mass is still unclear and various models have been proposed to explain them. However, there is still no comprehensive explanation that is accepted by th... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 339,244 |
2405.17718 | AdapNet: Adaptive Noise-Based Network for Low-Quality Image Retrieval | Image retrieval aims to identify visually similar images within a database using a given query image. Traditional methods typically employ both global and local features extracted from images for matching, and may also apply re-ranking techniques to enhance accuracy. However, these methods often fail to account for the... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 458,077 |
2408.08707 | Beam Prediction based on Large Language Models | In this letter, we use large language models (LLMs) to develop a high-performing and robust beam prediction method. We formulate the millimeter wave (mmWave) beam prediction problem as a time series forecasting task, where the historical observations are aggregated through cross-variable attention and then transformed ... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 481,120 |
2501.00367 | Who Gets Recommended? Investigating Gender, Race, and Country
Disparities in Paper Recommendations from Large Language Models | This paper investigates the performance of several representative large models in the tasks of literature recommendation and explores potential biases in research exposure. The results indicate that not only LLMs' overall recommendation accuracy remains limited but also the models tend to recommend literature with grea... | false | false | false | false | false | true | false | false | false | false | false | false | false | true | false | false | false | true | 521,642 |
2206.10338 | Comparative Analysis of Dynamic Data Race Detection Techniques | The consequences of data races can be potentially very problematic [1], and it is important to determine what tools and methods are best at detecting them. The following conditions must be met for a data race to occur: two or more threads in a single process access the same memory location concurrently, at least one of... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | 303,879 |
2006.10092 | Housing Market Prediction Problem using Different Machine Learning
Algorithms: A Case Study | Developing an accurate prediction model for housing prices is always needed for socio-economic development and well-being of citizens. In this paper, a diverse set of machine learning algorithms such as XGBoost, CatBoost, Random Forest, Lasso, Voting Regressor, and others, are being employed to predict the housing pric... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 182,756 |
1105.1823 | Design of Low-Thrust Gravity Assist Trajectories to Europa | This paper presents the design of a mission to Europa using solar electric propulsion as main source of thrust. A direct transcription method based on Finite Elements in Time was used for the design and optimisation of the entire low-thrust gravity assist transfer from the Earth to Europa. Prior to that, a global searc... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 10,305 |
2203.08072 | Neural Solvers for Fast and Accurate Numerical Optimal Control | Synthesizing optimal controllers for dynamical systems often involves solving optimization problems with hard real-time constraints. These constraints determine the class of numerical methods that can be applied: computationally expensive but accurate numerical routines are replaced by fast and inaccurate methods, trad... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 285,667 |
2306.13531 | WBCAtt: A White Blood Cell Dataset Annotated with Detailed Morphological
Attributes | The examination of blood samples at a microscopic level plays a fundamental role in clinical diagnostics, influencing a wide range of medical conditions. For instance, an in-depth study of White Blood Cells (WBCs), a crucial component of our blood, is essential for diagnosing blood-related diseases such as leukemia and... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 375,310 |
2306.00914 | Conditioning Diffusion Models via Attributes and Semantic Masks for Face
Generation | Deep generative models have shown impressive results in generating realistic images of faces. GANs managed to generate high-quality, high-fidelity images when conditioned on semantic masks, but they still lack the ability to diversify their output. Diffusion models partially solve this problem and are able to generate ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 370,206 |
2202.05100 | Adaptively Exploiting d-Separators with Causal Bandits | Multi-armed bandit problems provide a framework to identify the optimal intervention over a sequence of repeated experiments. Without additional assumptions, minimax optimal performance (measured by cumulative regret) is well-understood. With access to additional observed variables that d-separate the intervention from... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 279,763 |
2312.05632 | Subject-Based Domain Adaptation for Facial Expression Recognition | Adapting a deep learning model to a specific target individual is a challenging facial expression recognition (FER) task that may be achieved using unsupervised domain adaptation (UDA) methods. Although several UDA methods have been proposed to adapt deep FER models across source and target data sets, multiple subject-... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 414,167 |
2211.04188 | DepthFormer: Multimodal Positional Encodings and Cross-Input Attention
for Transformer-Based Segmentation Networks | Most approaches for semantic segmentation use only information from color cameras to parse the scenes, yet recent advancements show that using depth data allows to further improve performances. In this work, we focus on transformer-based deep learning architectures, that have achieved state-of-the-art performances on t... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 329,168 |
1703.05443 | Detecting the Hate Code on Social Media | Social media has become an indispensable part of the everyday lives of millions of people around the world. It provides a platform for expressing opinions and beliefs, communicated to a massive audience. However, this ease with which people can express themselves has also allowed for the large scale spread of propagand... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 70,079 |
2304.10900 | A Common Misassumption in Online Experiments with Machine Learning
Models | Online experiments such as Randomised Controlled Trials (RCTs) or A/B-tests are the bread and butter of modern platforms on the web. They are conducted continuously to allow platforms to estimate the causal effect of replacing system variant "A" with variant "B", on some metric of interest. These variants can differ in... | false | false | false | false | false | true | true | false | false | false | false | false | false | false | false | false | false | false | 359,601 |
1611.03942 | Anomaly Detection in the Bitcoin System - A Network Perspective | The problem of anomaly detection has been studied for a long time, and many Network Analysis techniques have been proposed as solutions. Although some results appear to be quite promising, no method is clearly to be superior to the rest. In this paper, we particularly consider anomaly detection in the Bitcoin transacti... | false | false | false | true | false | false | false | false | false | false | false | false | true | false | false | false | false | false | 63,762 |
1908.08597 | Sign Language Recognition, Generation, and Translation: An
Interdisciplinary Perspective | Developing successful sign language recognition, generation, and translation systems requires expertise in a wide range of fields, including computer vision, computer graphics, natural language processing, human-computer interaction, linguistics, and Deaf culture. Despite the need for deep interdisciplinary knowledge, ... | true | false | false | false | false | false | false | false | true | false | false | true | false | true | false | false | false | true | 142,595 |
1909.11212 | Augmenting the Pathology Lab: An Intelligent Whole Slide Image
Classification System for the Real World | Standard of care diagnostic procedure for suspected skin cancer is microscopic examination of hematoxylin \& eosin stained tissue by a pathologist. Areas of high inter-pathologist discordance and rising biopsy rates necessitate higher efficiency and diagnostic reproducibility. We present and validate a deep learning sy... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 146,738 |
2501.01422 | Multi-Modal Video Feature Extraction for Popularity Prediction | This work aims to predict the popularity of short videos using the videos themselves and their related features. Popularity is measured by four key engagement metrics: view count, like count, comment count, and share count. This study employs video classification models with different architectures and training methods... | false | false | false | false | true | false | true | false | false | false | false | true | false | false | false | false | false | false | 522,056 |
2205.13833 | A Decentralised Control Strategy for Secondary Voltage Regulation | This paper proposes a decentralised secondary voltage control strategy that has several benefits over the existing centralised strategies. For that, a new structure for the control is proposed in terms of an inner and outer loops for each generator. The individual generators of a particular zone participate in the seco... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 299,108 |
2205.10907 | Improved Modeling of Persistence Diagram | High-dimensional reduction methods are powerful tools for describing the main patterns in big data. One of these methods is the topological data analysis (TDA), which modeling the shape of the data in terms of topological properties. This method specifically translates the original data into two-dimensional system, whi... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 297,920 |
1911.03053 | Electric Analog Circuit Design with Hypernetworks and a Differential
Simulator | The manual design of analog circuits is a tedious task of parameter tuning that requires hours of work by human experts. In this work, we make a significant step towards a fully automatic design method that is based on deep learning. The method selects the components and their configuration, as well as their numerical ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 152,535 |
2103.14877 | Few-shot Semantic Image Synthesis Using StyleGAN Prior | This paper tackles a challenging problem of generating photorealistic images from semantic layouts in few-shot scenarios where annotated training pairs are hardly available but pixel-wise annotation is quite costly. We present a training strategy that performs pseudo labeling of semantic masks using the StyleGAN prior.... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | true | 227,003 |
2206.14507 | Variational Quantum Approximate Support Vector Machine with Inference
Transfer | A kernel-based quantum classifier is the most practical and influential quantum machine learning technique for the hyper-linear classification of complex data. We propose a Variational Quantum Approximate Support Vector Machine (VQASVM) algorithm that demonstrates empirical sub-quadratic run-time complexity with quantu... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 305,309 |
2307.02329 | Data-driven Predictive Latency for 5G: A Theoretical and Experimental
Analysis Using Network Measurements | The advent of novel 5G services and applications with binding latency requirements and guaranteed Quality of Service (QoS) hastened the need to incorporate autonomous and proactive decision-making in network management procedures. The objective of our study is to provide a thorough analysis of predictive latency within... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 377,659 |
1203.2021 | A new supervised non-linear mapping | Supervised mapping methods project multi-dimensional labeled data onto a 2-dimensional space attempting to preserve both data similarities and topology of classes. Supervised mappings are expected to help the user to understand the underlying original class structure and to classify new data visually. Several methods h... | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | 14,803 |
2405.12502 | EntropyStop: Unsupervised Deep Outlier Detection with Loss Entropy | Unsupervised Outlier Detection (UOD) is an important data mining task. With the advance of deep learning, deep Outlier Detection (OD) has received broad interest. Most deep UOD models are trained exclusively on clean datasets to learn the distribution of the normal data, which requires huge manual efforts to clean the ... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 455,551 |
1503.03011 | Technical Analysis on Financial Forecasting | Financial forecasting is an estimation of future financial outcomes for a company, industry, country using historical internal accounting and sales data. We may predict the future outcome of BSE_SENSEX practically by some soft computing techniques and can also optimized using PSO (Particle Swarm Optimization), EA (Evol... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | false | 41,003 |
1804.04212 | Word2Vec applied to Recommendation: Hyperparameters Matter | Skip-gram with negative sampling, a popular variant of Word2vec originally designed and tuned to create word embeddings for Natural Language Processing, has been used to create item embeddings with successful applications in recommendation. While these fields do not share the same type of data, neither evaluate on the ... | false | false | false | false | false | true | true | false | true | false | false | false | false | false | false | false | false | false | 94,783 |
2410.01079 | Concept Space Alignment in Multilingual LLMs | Multilingual large language models (LLMs) seem to generalize somewhat across languages. We hypothesize this is a result of implicit vector space alignment. Evaluating such alignment, we see that larger models exhibit very high-quality linear alignments between corresponding concepts in different languages. Our experime... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 493,596 |
1909.00952 | Graph-based Transforms for Video Coding | In many state-of-the-art compression systems, signal transformation is an integral part of the encoding and decoding process, where transforms provide compact representations for the signals of interest. This paper introduces a class of transforms called graph-based transforms (GBTs) for video compression, and proposes... | false | false | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | true | 143,765 |
2107.05530 | ROBIN: A Robust Optical Binary Neural Network Accelerator | Domain specific neural network accelerators have garnered attention because of their improved energy efficiency and inference performance compared to CPUs and GPUs. Such accelerators are thus well suited for resource-constrained embedded systems. However, mapping sophisticated neural network models on these accelerator... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 245,804 |
1810.03284 | Noise-synchronizability of opinion dynamics | With the analysis of noise-induced synchronization of opinion dynamics with bounded confidence (BC), a natural and fundamental question is what opinion structures can be synchronized by noise. In the traditional Hegselmann-Krause (HK) model, each agent examines the opinion values of all the other ones and then choose n... | false | false | false | true | false | false | false | false | false | false | true | false | false | false | true | false | false | false | 109,778 |
2308.13872 | Vision-Based Human Pose Estimation via Deep Learning: A Survey | Human pose estimation (HPE) has attracted a significant amount of attention from the computer vision community in the past decades. Moreover, HPE has been applied to various domains, such as human-computer interaction, sports analysis, and human tracking via images and videos. Recently, deep learning-based approaches h... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 388,090 |
2210.10249 | Discovering Limitations of Image Quality Assessments with Noised Deep
Learning Image Sets | Image quality is important, and can affect overall performance in image processing and computer vision as well as for numerous other reasons. Image quality assessment (IQA) is consequently a vital task in different applications from aerial photography interpretation to object detection to medical image analysis. In pre... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 324,841 |
2103.09560 | Big Plastic Masses Detection using Sentinel 2 Images | This communication describes a preliminary research on detection of big masses of plastic (marine litter) on the oceans and seas using EO (Earth Observation) satellite systems. Free images from the Sentinel 2 (Copernicus Project) platform are used. To develop a plastic recognizer, we start with an image where we can fi... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | false | 225,198 |
1405.1486 | Events and Controversies: Influences of a Shocking News Event on
Information Seeking | It has been suggested that online search and retrieval contributes to the intellectual isolation of users within their preexisting ideologies, where people's prior views are strengthened and alternative viewpoints are infrequently encountered. This so-called "filter bubble" phenomenon has been called out as especially ... | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | false | 32,884 |
2307.05384 | Stochastic Nested Compositional Bi-level Optimization for Robust Feature
Learning | We develop and analyze stochastic approximation algorithms for solving nested compositional bi-level optimization problems. These problems involve a nested composition of $T$ potentially non-convex smooth functions in the upper-level, and a smooth and strongly convex function in the lower-level. Our proposed algorithm ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 378,721 |
2302.06403 | Sources of Richness and Ineffability for Phenomenally Conscious States | Conscious states (states that there is something it is like to be in) seem both rich or full of detail, and ineffable or hard to fully describe or recall. The problem of ineffability, in particular, is a longstanding issue in philosophy that partly motivates the explanatory gap: the belief that consciousness cannot be ... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 345,391 |
2112.04716 | DR3: Value-Based Deep Reinforcement Learning Requires Explicit
Regularization | Despite overparameterization, deep networks trained via supervised learning are easy to optimize and exhibit excellent generalization. One hypothesis to explain this is that overparameterized deep networks enjoy the benefits of implicit regularization induced by stochastic gradient descent, which favors parsimonious so... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 270,620 |
1002.2171 | Reverse Engineering Financial Markets with Majority and Minority Games
using Genetic Algorithms | Using virtual stock markets with artificial interacting software investors, aka agent-based models (ABMs), we present a method to reverse engineer real-world financial time series. We model financial markets as made of a large number of interacting boundedly rational agents. By optimizing the similarity between the act... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | true | false | false | false | 5,670 |
1304.1134 | Rules, Belief Functions and Default Logic | This paper describes a natural framework for rules, based on belief functions, which includes a repre- sentation of numerical rules, default rules and rules allowing and rules not allowing contraposition. In particular it justifies the use of the Dempster-Shafer Theory for representing a particular class of rules, Beli... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 23,487 |
2401.17511 | Linguistically Communicating Uncertainty in Patient-Facing Risk
Prediction Models | This paper addresses the unique challenges associated with uncertainty quantification in AI models when applied to patient-facing contexts within healthcare. Unlike traditional eXplainable Artificial Intelligence (XAI) methods tailored for model developers or domain experts, additional considerations of communicating i... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | 425,221 |
2409.02152 | Fair Railway Network Design | When designing a public transportation network in a country, one may want to minimise the sum of travel duration of all inhabitants. This corresponds to a purely utilitarian view and does not involve any fairness consideration, as the resulting network will typically benefit the capital city and/or large central cities... | false | false | false | true | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 485,606 |
1903.03862 | Lipstick on a Pig: Debiasing Methods Cover up Systematic Gender Biases
in Word Embeddings But do not Remove Them | Word embeddings are widely used in NLP for a vast range of tasks. It was shown that word embeddings derived from text corpora reflect gender biases in society. This phenomenon is pervasive and consistent across different word embedding models, causing serious concern. Several recent works tackle this problem, and propo... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 123,840 |
1312.6134 | An Algebra of Causal Chains | In this work we propose a multi-valued extension of logic programs under the stable models semantics where each true atom in a model is associated with a set of justifications, in a similar spirit than a set of proof trees. The main contribution of this paper is that we capture justifications into an algebra of truth v... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 29,321 |
2005.07107 | Natural Way to Overcome the Catastrophic Forgetting in Neural Networks | Not so long ago, a method was discovered that successfully overcomes the catastrophic forgetting in neural networks. Although we know about the cases of using this method to preserve skills when adapting pre-trained networks to particular tasks, it has not obtained widespread distribution yet. In this paper, we would l... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 177,194 |
2309.03921 | C-CLIP: Contrastive Image-Text Encoders to Close the
Descriptive-Commentative Gap | The interplay between the image and comment on a social media post is one of high importance for understanding its overall message. Recent strides in multimodal embedding models, namely CLIP, have provided an avenue forward in relating image and text. However the current training regime for CLIP models is insufficient ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 390,562 |
2108.13098 | Object-aware Long-short-range Spatial Alignment for Few-Shot
Fine-Grained Image Classification | The goal of few-shot fine-grained image classification is to recognize rarely seen fine-grained objects in the query set, given only a few samples of this class in the support set. Previous works focus on learning discriminative image features from a limited number of training samples for distinguishing various fine-gr... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 252,710 |
1907.04407 | Sentiment Analysis Challenges in Persian Language | The rapid growth in data on the internet requires a data mining process to reach a decision to support insight. The Persian language has strong potential for deep research in any aspect of natural language processing, especially sentimental analysis approach. Thousands of websites and blogs updates and modifies by Pers... | false | false | false | false | false | true | false | false | true | false | false | false | false | false | false | false | false | false | 138,099 |
2003.11243 | Volumization as a Natural Generalization of Weight Decay | We propose a novel regularization method, called \textit{volumization}, for neural networks. Inspired by physics, we define a physical volume for the weight parameters in neural networks, and we show that this method is an effective way of regularizing neural networks. Intuitively, this method interpolates between an $... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 169,558 |
1807.01480 | A Stabilized Cut Streamline Diffusion Finite Element Method for
Convection-Diffusion Problems on Surfaces | We develop a stabilized cut finite element method for the stationary convection diffusion problem on a surface embedded in ${\mathbb{R}}^d$. The cut finite element method is based on using an embedding of the surface into a three dimensional mesh consisting of tetrahedra and then using the restriction of the standard p... | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | 102,073 |
1310.7950 | Technical Report: Distribution Temporal Logic: Combining Correctness
with Quality of Estimation | We present a new temporal logic called Distribution Temporal Logic (DTL) defined over predicates of belief states and hidden states of partially observable systems. DTL can express properties involving uncertainty and likelihood that cannot be described by existing logics. A co-safe formulation of DTL is defined and al... | false | false | false | false | true | false | false | false | false | false | true | false | false | false | false | false | false | true | 28,068 |
2104.06160 | Probabilistic Accumulate-then-Transmit in Wireless-Powered Covert
Communications | In this paper, we investigate the optimal design of a wireless-powered covert communication (WP-CC) system, in which a probabilistic accumulate-then-transmit (ATT) protocol is proposed to maximize the communication covertness subject to a quality-of-service (QoS) requirement on communication. Specifically, in the consi... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 229,980 |
1610.03906 | Single Controller Stochastic Games for Optimized Moving Target Defense | Moving target defense (MTD) techniques that enable a system to randomize its configuration to thwart prospective attacks are an effective security solution for tomorrow's wireless networks. However, there is a lack of analytical techniques that enable one to quantify the benefits and tradeoffs of MTDs. In this paper, a... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | true | 62,312 |
2310.06913 | A Comparative Study of Transformer-based Neural Text Representation
Techniques on Bug Triaging | Often, the first step in managing bug reports is related to triaging a bug to the appropriate developer who is best suited to understand, localize, and fix the target bug. Additionally, assigning a given bug to a particular part of a software project can help to expedite the fixing process. However, despite the importa... | false | false | false | false | false | true | false | false | true | false | false | false | false | false | false | false | false | true | 398,758 |
2501.04734 | Generative Style Transfer for MRI Image Segmentation: A Case of Glioma
Segmentation in Sub-Saharan Africa | In Sub-Saharan Africa (SSA), the utilization of lower-quality Magnetic Resonance Imaging (MRI) technology raises questions about the applicability of machine learning methods for clinical tasks. This study aims to provide a robust deep learning-based brain tumor segmentation (BraTS) method tailored for the SSA populati... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 523,325 |
2105.02263 | ADAM: A Sandbox for Implementing Language Learning | We present ADAM, a software system for designing and running child language learning experiments in Python. The system uses a virtual world to simulate a grounded language acquisition process in which the language learner utilizes cognitively plausible learning algorithms to form perceptual and linguistic representatio... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 233,763 |
1912.05790 | Zooming into Face Forensics: A Pixel-level Analysis | The stunning progress in face manipulation methods has made it possible to synthesize realistic fake face images, which poses potential threats to our society. It is urgent to have face forensics techniques to distinguish those tampered images. A large scale dataset "FaceForensics++" has provided enormous training data... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 157,194 |
2403.16224 | Inverse Rendering of Glossy Objects via the Neural Plenoptic Function
and Radiance Fields | Inverse rendering aims at recovering both geometry and materials of objects. It provides a more compatible reconstruction for conventional rendering engines, compared with the neural radiance fields (NeRFs). On the other hand, existing NeRF-based inverse rendering methods cannot handle glossy objects with local light i... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 440,936 |
2402.11534 | PreAct: Prediction Enhances Agent's Planning Ability | Addressing the disparity between forecasts and actual results can enable individuals to expand their thought processes and stimulate self-reflection, thus promoting accurate planning. In this research, we present **PreAct**, an agent framework that integrates **pre**diction, **rea**soning, and **act**ion. By utilizing ... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | 430,445 |
2307.14938 | Efficient Interaction-Aware Interval Analysis of Neural Network Feedback
Loops | In this paper, we propose a computationally efficient framework for interval reachability of systems with neural network controllers. Our approach leverages inclusion functions for the open-loop system and the neural network controller to embed the closed-loop system into a larger-dimensional embedding system, where a ... | false | false | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | 382,102 |
2311.13947 | High-Ratio Compression for Machine-Generated Data | Machine-generated data is rapidly growing and poses challenges for data-intensive systems, especially as the growth of data outpaces the growth of storage space. To cope with the storage issue, compression plays a critical role in storage engines, particularly for data-intensive applications, where high compression rat... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | 409,934 |
1801.02194 | Private Computation of Systematically Encoded Data with Colluding
Servers | Private Computation (PC), recently introduced by Sun and Jafar, is a generalization of Private Information Retrieval (PIR) in which a user wishes to privately compute an arbitrary function of data stored across several servers. We construct a PC scheme which accounts for server collusion, coded data, and non-linear fun... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 87,882 |
2408.10276 | FEDKIM: Adaptive Federated Knowledge Injection into Medical Foundation
Models | Foundation models have demonstrated remarkable capabilities in handling diverse modalities and tasks, outperforming conventional artificial intelligence (AI) approaches that are highly task-specific and modality-reliant. In the medical domain, however, the development of comprehensive foundation models is constrained b... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 481,795 |
1908.04655 | Bayesian posterior repartitioning for nested sampling | Priors in Bayesian analyses often encode informative domain knowledge that can be useful in making the inference process more efficient. Occasionally, however, priors may be unrepresentative of the parameter values for a given dataset, which can result in inefficient parameter space exploration, or even incorrect infer... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | false | 141,536 |
2008.01593 | Learning Transition Models with Time-delayed Causal Relations | This paper introduces an algorithm for discovering implicit and delayed causal relations between events observed by a robot at arbitrary times, with the objective of improving data-efficiency and interpretability of model-based reinforcement learning (RL) techniques. The proposed algorithm initially predicts observatio... | false | false | false | false | false | false | true | true | false | false | false | false | false | false | false | false | false | false | 190,385 |
1804.06112 | Human Motion Capture Using a Drone | Current motion capture (MoCap) systems generally require markers and multiple calibrated cameras, which can be used only in constrained environments. In this work we introduce a drone-based system for 3D human MoCap. The system only needs an autonomously flying drone with an on-board RGB camera and is usable in various... | false | false | false | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | 95,229 |
2403.00642 | Rethinking The Uniformity Metric in Self-Supervised Learning | Uniformity plays an important role in evaluating learned representations, providing insights into self-supervised learning. In our quest for effective uniformity metrics, we pinpoint four principled properties that such metrics should possess. Namely, an effective uniformity metric should remain invariant to instance p... | false | false | false | false | true | false | true | false | false | false | false | true | false | false | false | false | false | false | 434,052 |
1212.5882 | The Kernel-SME Filter for Multiple Target Tracking | We present a novel method called Kernel-SME filter for tracking multiple targets when the association of the measurements to the targets is unknown. The method is a further development of the Symmetric Measurement Equation (SME) filter, which removes the data association uncertainty of the original measurement equation... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 20,601 |
1709.04057 | Parallelizing Linear Recurrent Neural Nets Over Sequence Length | Recurrent neural networks (RNNs) are widely used to model sequential data but their non-linear dependencies between sequence elements prevent parallelizing training over sequence length. We show the training of RNNs with only linear sequential dependencies can be parallelized over the sequence length using the parallel... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | true | false | false | 80,590 |
2106.08882 | Robust Training in High Dimensions via Block Coordinate Geometric Median
Descent | Geometric median (\textsc{Gm}) is a classical method in statistics for achieving a robust estimation of the uncorrupted data; under gross corruption, it achieves the optimal breakdown point of 0.5. However, its computational complexity makes it infeasible for robustifying stochastic gradient descent (SGD) for high-dime... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 241,458 |
2007.02907 | Including Image-based Perception in Disturbance Observer for Warehouse
Drones | Grasping and releasing objects would cause oscillations to delivery drones in the warehouse. To reduce such undesired oscillations, this paper treats the to-be-delivered object as an unknown external disturbance and presents an image-based disturbance observer (DOB) to estimate and reject such disturbance. Different fr... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 185,896 |
2402.02583 | DiffEditor: Boosting Accuracy and Flexibility on Diffusion-based Image
Editing | Large-scale Text-to-Image (T2I) diffusion models have revolutionized image generation over the last few years. Although owning diverse and high-quality generation capabilities, translating these abilities to fine-grained image editing remains challenging. In this paper, we propose DiffEditor to rectify two weaknesses i... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 426,631 |
2103.01746 | Comparison of Methods Generalizing Max- and Average-Pooling | Max- and average-pooling are the most popular pooling methods for downsampling in convolutional neural networks. In this paper, we compare different pooling methods that generalize both max- and average-pooling. Furthermore, we propose another method based on a smooth approximation of the maximum function and put it in... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 222,732 |
2310.11014 | Hyperspectral In-Memory Computing with Optical Frequency Combs and
Programmable Optical Memories | The rapid advancements in machine learning across numerous industries have amplified the demand for extensive matrix-vector multiplication operations, thereby challenging the capacities of traditional von Neumann computing architectures. To address this, researchers are currently exploring alternatives such as in-memor... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | true | false | true | 400,481 |
2303.01979 | ACL-SPC: Adaptive Closed-Loop system for Self-Supervised Point Cloud
Completion | Point cloud completion addresses filling in the missing parts of a partial point cloud obtained from depth sensors and generating a complete point cloud. Although there has been steep progress in the supervised methods on the synthetic point cloud completion task, it is hardly applicable in real-world scenarios due to ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 349,181 |
1903.09516 | Was ist eine Professur fuer Kuenstliche Intelligenz? | The Federal Government of Germany aims to boost the research in the field of Artificial Intelligence (AI). For instance, 100 new professorships are said to be established. However, the white paper of the government does not answer what an AI professorship is at all. In order to give colleagues, politicians, and citizen... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | true | 125,075 |
1808.06250 | Dynamic Temporal Alignment of Speech to Lips | Many speech segments in movies are re-recorded in a studio during postproduction, to compensate for poor sound quality as recorded on location. Manual alignment of the newly-recorded speech with the original lip movements is a tedious task. We present an audio-to-video alignment method for automating speech to lips ali... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 105,497 |
2011.04975 | Evolving Nano Particle Cancer Treatments with Multiple Particle Types | Evolutionary algorithms have long been used for optimization problems where the appropriate size of solutions is unclear a priori. The applicability of this methodology is here investigated on the problem of designing a nano-particle (NP) based drug delivery system targeting cancer tumours. Utilizing a treatment compri... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | false | 205,757 |
2402.14123 | DeiSAM: Segment Anything with Deictic Prompting | Large-scale, pre-trained neural networks have demonstrated strong capabilities in various tasks, including zero-shot image segmentation. To identify concrete objects in complex scenes, humans instinctively rely on deictic descriptions in natural language, i.e., referring to something depending on the context such as "T... | false | false | false | false | true | false | true | false | false | false | false | true | false | false | false | false | false | false | 431,538 |
2309.02061 | Scenario-Aware Hierarchical Dynamic Network for Multi-Scenario
Recommendation | Click-Through Rate (CTR) prediction is a fundamental technique in recommendation and advertising systems. Recent studies have shown that implementing multi-scenario recommendations contributes to strengthening information sharing and improving overall performance. However, existing multi-scenario models only consider c... | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | 389,916 |
2103.04067 | Visual Explanation using Attention Mechanism in Actor-Critic-based Deep
Reinforcement Learning | Deep reinforcement learning (DRL) has great potential for acquiring the optimal action in complex environments such as games and robot control. However, it is difficult to analyze the decision-making of the agent, i.e., the reasons it selects the action acquired by learning. In this work, we propose Mask-Attention A3C ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 223,516 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.