id
large_stringlengths 9
16
| submitter
large_stringlengths 3
64
⌀ | authors
large_stringlengths 5
20.2k
| title
large_stringlengths 5
245
| comments
large_stringlengths 1
482
⌀ | journal-ref
large_stringlengths 4
382
⌀ | doi
large_stringlengths 9
151
⌀ | report-no
large_stringlengths 2
509
⌀ | categories
large_stringlengths 5
78
| license
large_stringclasses 9
values | abstract
large_stringlengths 83
3.55k
| versions
large listlengths 1
21
| update_date
timestamp[ms]date 2007-05-23 00:00:00
2025-05-30 00:00:00
| authors_parsed
large listlengths 1
1.35k
| prompt
large_stringlengths 166
3.64k
| label
stringclasses 2
values | prob
float64 0.5
0.73
|
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2304.04613
|
Mousumi Akter
|
Mousumi Akter, Souvika Sarkar, Shubhra Kanti Karmaker Santu
|
On Evaluation of Bangla Word Analogies
| null | null | null | null |
cs.CL
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
This paper presents a high-quality dataset for evaluating the quality of
Bangla word embeddings, which is a fundamental task in the field of Natural
Language Processing (NLP). Despite being the 7th most-spoken language in the
world, Bangla is a low-resource language and popular NLP models fail to perform
well. Developing a reliable evaluation test set for Bangla word embeddings are
crucial for benchmarking and guiding future research. We provide a
Mikolov-style word analogy evaluation set specifically for Bangla, with a
sample size of 16678, as well as a translated and curated version of the
Mikolov dataset, which contains 10594 samples for cross-lingual research. Our
experiments with different state-of-the-art embedding models reveal that Bangla
has its own unique characteristics, and current embeddings for Bangla still
struggle to achieve high accuracy on both datasets. We suggest that future
research should focus on training models with larger datasets and considering
the unique morphological characteristics of Bangla. This study represents the
first step towards building a reliable NLP system for the Bangla language1.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 14:27:35 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Akter",
"Mousumi",
""
],
[
"Sarkar",
"Souvika",
""
],
[
"Santu",
"Shubhra Kanti Karmaker",
""
]
] |
TITLE: On Evaluation of Bangla Word Analogies
ABSTRACT: This paper presents a high-quality dataset for evaluating the quality of
Bangla word embeddings, which is a fundamental task in the field of Natural
Language Processing (NLP). Despite being the 7th most-spoken language in the
world, Bangla is a low-resource language and popular NLP models fail to perform
well. Developing a reliable evaluation test set for Bangla word embeddings are
crucial for benchmarking and guiding future research. We provide a
Mikolov-style word analogy evaluation set specifically for Bangla, with a
sample size of 16678, as well as a translated and curated version of the
Mikolov dataset, which contains 10594 samples for cross-lingual research. Our
experiments with different state-of-the-art embedding models reveal that Bangla
has its own unique characteristics, and current embeddings for Bangla still
struggle to achieve high accuracy on both datasets. We suggest that future
research should focus on training models with larger datasets and considering
the unique morphological characteristics of Bangla. This study represents the
first step towards building a reliable NLP system for the Bangla language1.
|
new_dataset
| 0.714454
|
2304.04618
|
Jiatong Shi
|
Jiatong Shi, Yun Tang, Ann Lee, Hirofumi Inaguma, Changhan Wang, Juan
Pino, Shinji Watanabe
|
Enhancing Speech-to-Speech Translation with Multiple TTS Targets
| null | null | null | null |
cs.SD cs.CL eess.AS
|
http://creativecommons.org/licenses/by/4.0/
|
It has been known that direct speech-to-speech translation (S2ST) models
usually suffer from the data scarcity issue because of the limited existing
parallel materials for both source and target speech. Therefore to train a
direct S2ST system, previous works usually utilize text-to-speech (TTS) systems
to generate samples in the target language by augmenting the data from
speech-to-text translation (S2TT). However, there is a limited investigation
into how the synthesized target speech would affect the S2ST models. In this
work, we analyze the effect of changing synthesized target speech for direct
S2ST models. We find that simply combining the target speech from different TTS
systems can potentially improve the S2ST performances. Following that, we also
propose a multi-task framework that jointly optimizes the S2ST system with
multiple targets from different TTS systems. Extensive experiments demonstrate
that our proposed framework achieves consistent improvements (2.8 BLEU) over
the baselines on the Fisher Spanish-English dataset.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 14:33:33 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Shi",
"Jiatong",
""
],
[
"Tang",
"Yun",
""
],
[
"Lee",
"Ann",
""
],
[
"Inaguma",
"Hirofumi",
""
],
[
"Wang",
"Changhan",
""
],
[
"Pino",
"Juan",
""
],
[
"Watanabe",
"Shinji",
""
]
] |
TITLE: Enhancing Speech-to-Speech Translation with Multiple TTS Targets
ABSTRACT: It has been known that direct speech-to-speech translation (S2ST) models
usually suffer from the data scarcity issue because of the limited existing
parallel materials for both source and target speech. Therefore to train a
direct S2ST system, previous works usually utilize text-to-speech (TTS) systems
to generate samples in the target language by augmenting the data from
speech-to-text translation (S2TT). However, there is a limited investigation
into how the synthesized target speech would affect the S2ST models. In this
work, we analyze the effect of changing synthesized target speech for direct
S2ST models. We find that simply combining the target speech from different TTS
systems can potentially improve the S2ST performances. Following that, we also
propose a multi-task framework that jointly optimizes the S2ST system with
multiple targets from different TTS systems. Extensive experiments demonstrate
that our proposed framework achieves consistent improvements (2.8 BLEU) over
the baselines on the Fisher Spanish-English dataset.
|
no_new_dataset
| 0.709384
|
2304.04625
|
Gyojin Han
|
Gyojin Han, Jaehyun Choi, Haeil Lee, Junmo Kim
|
Reinforcement Learning-Based Black-Box Model Inversion Attacks
|
CVPR 2023, Accepted
| null | null | null |
cs.LG cs.CR cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Model inversion attacks are a type of privacy attack that reconstructs
private data used to train a machine learning model, solely by accessing the
model. Recently, white-box model inversion attacks leveraging Generative
Adversarial Networks (GANs) to distill knowledge from public datasets have been
receiving great attention because of their excellent attack performance. On the
other hand, current black-box model inversion attacks that utilize GANs suffer
from issues such as being unable to guarantee the completion of the attack
process within a predetermined number of query accesses or achieve the same
level of performance as white-box attacks. To overcome these limitations, we
propose a reinforcement learning-based black-box model inversion attack. We
formulate the latent space search as a Markov Decision Process (MDP) problem
and solve it with reinforcement learning. Our method utilizes the confidence
scores of the generated images to provide rewards to an agent. Finally, the
private data can be reconstructed using the latent vectors found by the agent
trained in the MDP. The experiment results on various datasets and models
demonstrate that our attack successfully recovers the private information of
the target model by achieving state-of-the-art attack performance. We emphasize
the importance of studies on privacy-preserving machine learning by proposing a
more advanced black-box model inversion attack.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 14:41:16 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Han",
"Gyojin",
""
],
[
"Choi",
"Jaehyun",
""
],
[
"Lee",
"Haeil",
""
],
[
"Kim",
"Junmo",
""
]
] |
TITLE: Reinforcement Learning-Based Black-Box Model Inversion Attacks
ABSTRACT: Model inversion attacks are a type of privacy attack that reconstructs
private data used to train a machine learning model, solely by accessing the
model. Recently, white-box model inversion attacks leveraging Generative
Adversarial Networks (GANs) to distill knowledge from public datasets have been
receiving great attention because of their excellent attack performance. On the
other hand, current black-box model inversion attacks that utilize GANs suffer
from issues such as being unable to guarantee the completion of the attack
process within a predetermined number of query accesses or achieve the same
level of performance as white-box attacks. To overcome these limitations, we
propose a reinforcement learning-based black-box model inversion attack. We
formulate the latent space search as a Markov Decision Process (MDP) problem
and solve it with reinforcement learning. Our method utilizes the confidence
scores of the generated images to provide rewards to an agent. Finally, the
private data can be reconstructed using the latent vectors found by the agent
trained in the MDP. The experiment results on various datasets and models
demonstrate that our attack successfully recovers the private information of
the target model by achieving state-of-the-art attack performance. We emphasize
the importance of studies on privacy-preserving machine learning by proposing a
more advanced black-box model inversion attack.
|
no_new_dataset
| 0.708377
|
2304.04672
|
Jizhizi Li
|
Jizhizi Li, Jing Zhang, Dacheng Tao
|
Deep Image Matting: A Comprehensive Survey
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Image matting refers to extracting precise alpha matte from natural images,
and it plays a critical role in various downstream applications, such as image
editing. Despite being an ill-posed problem, traditional methods have been
trying to solve it for decades. The emergence of deep learning has
revolutionized the field of image matting and given birth to multiple new
techniques, including automatic, interactive, and referring image matting. This
paper presents a comprehensive review of recent advancements in image matting
in the era of deep learning. We focus on two fundamental sub-tasks: auxiliary
input-based image matting, which involves user-defined input to predict the
alpha matte, and automatic image matting, which generates results without any
manual intervention. We systematically review the existing methods for these
two tasks according to their task settings and network structures and provide a
summary of their advantages and disadvantages. Furthermore, we introduce the
commonly used image matting datasets and evaluate the performance of
representative matting methods both quantitatively and qualitatively. Finally,
we discuss relevant applications of image matting and highlight existing
challenges and potential opportunities for future research. We also maintain a
public repository to track the rapid development of deep image matting at
https://github.com/JizhiziLi/matting-survey.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 15:48:55 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Li",
"Jizhizi",
""
],
[
"Zhang",
"Jing",
""
],
[
"Tao",
"Dacheng",
""
]
] |
TITLE: Deep Image Matting: A Comprehensive Survey
ABSTRACT: Image matting refers to extracting precise alpha matte from natural images,
and it plays a critical role in various downstream applications, such as image
editing. Despite being an ill-posed problem, traditional methods have been
trying to solve it for decades. The emergence of deep learning has
revolutionized the field of image matting and given birth to multiple new
techniques, including automatic, interactive, and referring image matting. This
paper presents a comprehensive review of recent advancements in image matting
in the era of deep learning. We focus on two fundamental sub-tasks: auxiliary
input-based image matting, which involves user-defined input to predict the
alpha matte, and automatic image matting, which generates results without any
manual intervention. We systematically review the existing methods for these
two tasks according to their task settings and network structures and provide a
summary of their advantages and disadvantages. Furthermore, we introduce the
commonly used image matting datasets and evaluate the performance of
representative matting methods both quantitatively and qualitatively. Finally,
we discuss relevant applications of image matting and highlight existing
challenges and potential opportunities for future research. We also maintain a
public repository to track the rapid development of deep image matting at
https://github.com/JizhiziLi/matting-survey.
|
no_new_dataset
| 0.657731
|
2304.04700
|
Shaojie Tang
|
Shaojie Tang, Jing Yuan, Twumasi Mensah-Boateng
|
Achieving Long-term Fairness in Submodular Maximization through
Randomization
|
This paper has been accepted to 19th Cologne-Twente Workshop on
Graphs and Combinatorial Optimization
| null | null | null |
cs.DS cs.AI cs.LG
|
http://creativecommons.org/licenses/by/4.0/
|
Submodular function optimization has numerous applications in machine
learning and data analysis, including data summarization which aims to identify
a concise and diverse set of data points from a large dataset. It is important
to implement fairness-aware algorithms when dealing with data items that may
contain sensitive attributes like race or gender, to prevent biases that could
lead to unequal representation of different groups. With this in mind, we
investigate the problem of maximizing a monotone submodular function while
meeting group fairness constraints. Unlike previous studies in this area, we
allow for randomized solutions, with the objective being to calculate a
distribution over feasible sets such that the expected number of items selected
from each group is subject to constraints in the form of upper and lower
thresholds, ensuring that the representation of each group remains balanced in
the long term. Here a set is considered feasible if its size does not exceed a
constant value of $b$. Our research includes the development of a series of
approximation algorithms for this problem.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 16:39:19 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Tang",
"Shaojie",
""
],
[
"Yuan",
"Jing",
""
],
[
"Mensah-Boateng",
"Twumasi",
""
]
] |
TITLE: Achieving Long-term Fairness in Submodular Maximization through
Randomization
ABSTRACT: Submodular function optimization has numerous applications in machine
learning and data analysis, including data summarization which aims to identify
a concise and diverse set of data points from a large dataset. It is important
to implement fairness-aware algorithms when dealing with data items that may
contain sensitive attributes like race or gender, to prevent biases that could
lead to unequal representation of different groups. With this in mind, we
investigate the problem of maximizing a monotone submodular function while
meeting group fairness constraints. Unlike previous studies in this area, we
allow for randomized solutions, with the objective being to calculate a
distribution over feasible sets such that the expected number of items selected
from each group is subject to constraints in the form of upper and lower
thresholds, ensuring that the representation of each group remains balanced in
the long term. Here a set is considered feasible if its size does not exceed a
constant value of $b$. Our research includes the development of a series of
approximation algorithms for this problem.
|
no_new_dataset
| 0.707196
|
2304.04703
|
Sina Ahmadi
|
Razhan Hameed and Sina Ahmadi and Fatemeh Daneshfar
|
Transfer Learning for Low-Resource Sentiment Analysis
|
14 pages - under review at ACM TALLIP
| null | null | null |
cs.CL
|
http://creativecommons.org/licenses/by/4.0/
|
Sentiment analysis is the process of identifying and extracting subjective
information from text. Despite the advances to employ cross-lingual approaches
in an automatic way, the implementation and evaluation of sentiment analysis
systems require language-specific data to consider various sociocultural and
linguistic peculiarities. In this paper, the collection and annotation of a
dataset are described for sentiment analysis of Central Kurdish. We explore a
few classical machine learning and neural network-based techniques for this
task. Additionally, we employ an approach in transfer learning to leverage
pretrained models for data augmentation. We demonstrate that data augmentation
achieves a high F$_1$ score and accuracy despite the difficulty of the task.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 16:44:44 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Hameed",
"Razhan",
""
],
[
"Ahmadi",
"Sina",
""
],
[
"Daneshfar",
"Fatemeh",
""
]
] |
TITLE: Transfer Learning for Low-Resource Sentiment Analysis
ABSTRACT: Sentiment analysis is the process of identifying and extracting subjective
information from text. Despite the advances to employ cross-lingual approaches
in an automatic way, the implementation and evaluation of sentiment analysis
systems require language-specific data to consider various sociocultural and
linguistic peculiarities. In this paper, the collection and annotation of a
dataset are described for sentiment analysis of Central Kurdish. We explore a
few classical machine learning and neural network-based techniques for this
task. Additionally, we employ an approach in transfer learning to leverage
pretrained models for data augmentation. We demonstrate that data augmentation
achieves a high F$_1$ score and accuracy despite the difficulty of the task.
|
no_new_dataset
| 0.70878
|
2304.04716
|
Cunxi Yu
|
Jiaqi Yin, Yingjie Li, Daniel Robinson, Cunxi Yu
|
RESPECT: Reinforcement Learning based Edge Scheduling on Pipelined Coral
Edge TPUs
|
6 pages, ACM/IEEE Design Automation Conference (DAC'23)
| null | null | null |
cs.AR cs.AI cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Deep neural networks (DNNs) have substantial computational and memory
requirements, and the compilation of its computational graphs has a great
impact on the performance of resource-constrained (e.g., computation, I/O, and
memory-bound) edge computing systems. While efficient execution of their
computational graph requires an effective scheduling algorithm, generating the
optimal scheduling solution is a challenging NP-hard problem. Furthermore, the
complexity of scheduling DNN computational graphs will further increase on
pipelined multi-core systems considering memory communication cost, as well as
the increasing size of DNNs. Using the synthetic graph for the training
dataset, this work presents a reinforcement learning (RL) based scheduling
framework RESPECT, which learns the behaviors of optimal optimization
algorithms and generates near-optimal scheduling results with short solving
runtime overhead. Our framework has demonstrated up to $\sim2.5\times$
real-world on-chip inference runtime speedups over the commercial compiler with
ten popular ImageNet models deployed on the physical Coral Edge TPUs system.
Moreover, compared to the exact optimization methods, the proposed RL
scheduling improves the scheduling optimization runtime by up to 683$\times$
speedups compared to the commercial compiler and matches the exact optimal
solutions with up to 930$\times$ speedups. Finally, we perform a comprehensive
generalizability test, which demonstrates RESPECT successfully imitates optimal
solving behaviors from small synthetic graphs to large real-world DNNs
computational graphs.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 17:22:12 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Yin",
"Jiaqi",
""
],
[
"Li",
"Yingjie",
""
],
[
"Robinson",
"Daniel",
""
],
[
"Yu",
"Cunxi",
""
]
] |
TITLE: RESPECT: Reinforcement Learning based Edge Scheduling on Pipelined Coral
Edge TPUs
ABSTRACT: Deep neural networks (DNNs) have substantial computational and memory
requirements, and the compilation of its computational graphs has a great
impact on the performance of resource-constrained (e.g., computation, I/O, and
memory-bound) edge computing systems. While efficient execution of their
computational graph requires an effective scheduling algorithm, generating the
optimal scheduling solution is a challenging NP-hard problem. Furthermore, the
complexity of scheduling DNN computational graphs will further increase on
pipelined multi-core systems considering memory communication cost, as well as
the increasing size of DNNs. Using the synthetic graph for the training
dataset, this work presents a reinforcement learning (RL) based scheduling
framework RESPECT, which learns the behaviors of optimal optimization
algorithms and generates near-optimal scheduling results with short solving
runtime overhead. Our framework has demonstrated up to $\sim2.5\times$
real-world on-chip inference runtime speedups over the commercial compiler with
ten popular ImageNet models deployed on the physical Coral Edge TPUs system.
Moreover, compared to the exact optimization methods, the proposed RL
scheduling improves the scheduling optimization runtime by up to 683$\times$
speedups compared to the commercial compiler and matches the exact optimal
solutions with up to 930$\times$ speedups. Finally, we perform a comprehensive
generalizability test, which demonstrates RESPECT successfully imitates optimal
solving behaviors from small synthetic graphs to large real-world DNNs
computational graphs.
|
no_new_dataset
| 0.710879
|
2304.04717
|
Zhongwu Chen
|
Zhongwu Chen, Chengjin Xu, Fenglong Su, Zhen Huang, Yong Dou
|
Incorporating Structured Sentences with Time-enhanced BERT for
Fully-inductive Temporal Relation Prediction
| null | null | null | null |
cs.CL cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Temporal relation prediction in incomplete temporal knowledge graphs (TKGs)
is a popular temporal knowledge graph completion (TKGC) problem in both
transductive and inductive settings. Traditional embedding-based TKGC models
(TKGE) rely on structured connections and can only handle a fixed set of
entities, i.e., the transductive setting. In the inductive setting where test
TKGs contain emerging entities, the latest methods are based on symbolic rules
or pre-trained language models (PLMs). However, they suffer from being
inflexible and not time-specific, respectively. In this work, we extend the
fully-inductive setting, where entities in the training and test sets are
totally disjoint, into TKGs and take a further step towards a more flexible and
time-sensitive temporal relation prediction approach SST-BERT, incorporating
Structured Sentences with Time-enhanced BERT. Our model can obtain the entity
history and implicitly learn rules in the semantic space by encoding structured
sentences, solving the problem of inflexibility. We propose to use a time
masking MLM task to pre-train BERT in a corpus rich in temporal tokens
specially generated for TKGs, enhancing the time sensitivity of SST-BERT. To
compute the probability of occurrence of a target quadruple, we aggregate all
its structured sentences from both temporal and semantic perspectives into a
score. Experiments on the transductive datasets and newly generated
fully-inductive benchmarks show that SST-BERT successfully improves over
state-of-the-art baselines.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 17:22:15 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Chen",
"Zhongwu",
""
],
[
"Xu",
"Chengjin",
""
],
[
"Su",
"Fenglong",
""
],
[
"Huang",
"Zhen",
""
],
[
"Dou",
"Yong",
""
]
] |
TITLE: Incorporating Structured Sentences with Time-enhanced BERT for
Fully-inductive Temporal Relation Prediction
ABSTRACT: Temporal relation prediction in incomplete temporal knowledge graphs (TKGs)
is a popular temporal knowledge graph completion (TKGC) problem in both
transductive and inductive settings. Traditional embedding-based TKGC models
(TKGE) rely on structured connections and can only handle a fixed set of
entities, i.e., the transductive setting. In the inductive setting where test
TKGs contain emerging entities, the latest methods are based on symbolic rules
or pre-trained language models (PLMs). However, they suffer from being
inflexible and not time-specific, respectively. In this work, we extend the
fully-inductive setting, where entities in the training and test sets are
totally disjoint, into TKGs and take a further step towards a more flexible and
time-sensitive temporal relation prediction approach SST-BERT, incorporating
Structured Sentences with Time-enhanced BERT. Our model can obtain the entity
history and implicitly learn rules in the semantic space by encoding structured
sentences, solving the problem of inflexibility. We propose to use a time
masking MLM task to pre-train BERT in a corpus rich in temporal tokens
specially generated for TKGs, enhancing the time sensitivity of SST-BERT. To
compute the probability of occurrence of a target quadruple, we aggregate all
its structured sentences from both temporal and semantic perspectives into a
score. Experiments on the transductive datasets and newly generated
fully-inductive benchmarks show that SST-BERT successfully improves over
state-of-the-art baselines.
|
no_new_dataset
| 0.709667
|
2304.04718
|
Jin Xu
|
Jin Xu, Yangning Li, Xiangjin Xie, Yinghui Li, Niu Hu, Haitao Zheng,
Yong Jiang
|
Investigating Graph Structure Information for Entity Alignment with
Dangling Cases
| null | null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Entity alignment (EA) aims to discover the equivalent entities in different
knowledge graphs (KGs), which play an important role in knowledge engineering.
Recently, EA with dangling entities has been proposed as a more realistic
setting, which assumes that not all entities have corresponding equivalent
entities. In this paper, we focus on this setting. Some work has explored this
problem by leveraging translation API, pre-trained word embeddings, and other
off-the-shelf tools. However, these approaches over-rely on the side
information (e.g., entity names), and fail to work when the side information is
absent. On the contrary, they still insufficiently exploit the most fundamental
graph structure information in KG. To improve the exploitation of the
structural information, we propose a novel entity alignment framework called
Weakly-Optimal Graph Contrastive Learning (WOGCL), which is refined on three
dimensions : (i) Model. We propose a novel Gated Graph Attention Network to
capture local and global graph structure similarity. (ii) Training. Two
learning objectives: contrastive learning and optimal transport learning are
designed to obtain distinguishable entity representations via the optimal
transport plan. (iii) Inference. In the inference phase, a PageRank-based
method is proposed to calculate higher-order structural similarity. Extensive
experiments on two dangling benchmarks demonstrate that our WOGCL outperforms
the current state-of-the-art methods with pure structural information in both
traditional (relaxed) and dangling (consolidated) settings. The code will be
public soon.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 17:24:43 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Xu",
"Jin",
""
],
[
"Li",
"Yangning",
""
],
[
"Xie",
"Xiangjin",
""
],
[
"Li",
"Yinghui",
""
],
[
"Hu",
"Niu",
""
],
[
"Zheng",
"Haitao",
""
],
[
"Jiang",
"Yong",
""
]
] |
TITLE: Investigating Graph Structure Information for Entity Alignment with
Dangling Cases
ABSTRACT: Entity alignment (EA) aims to discover the equivalent entities in different
knowledge graphs (KGs), which play an important role in knowledge engineering.
Recently, EA with dangling entities has been proposed as a more realistic
setting, which assumes that not all entities have corresponding equivalent
entities. In this paper, we focus on this setting. Some work has explored this
problem by leveraging translation API, pre-trained word embeddings, and other
off-the-shelf tools. However, these approaches over-rely on the side
information (e.g., entity names), and fail to work when the side information is
absent. On the contrary, they still insufficiently exploit the most fundamental
graph structure information in KG. To improve the exploitation of the
structural information, we propose a novel entity alignment framework called
Weakly-Optimal Graph Contrastive Learning (WOGCL), which is refined on three
dimensions : (i) Model. We propose a novel Gated Graph Attention Network to
capture local and global graph structure similarity. (ii) Training. Two
learning objectives: contrastive learning and optimal transport learning are
designed to obtain distinguishable entity representations via the optimal
transport plan. (iii) Inference. In the inference phase, a PageRank-based
method is proposed to calculate higher-order structural similarity. Extensive
experiments on two dangling benchmarks demonstrate that our WOGCL outperforms
the current state-of-the-art methods with pure structural information in both
traditional (relaxed) and dangling (consolidated) settings. The code will be
public soon.
|
no_new_dataset
| 0.707645
|
2304.04742
|
Shilong Liu
|
Shilong Liu, Tianhe Ren, Jiayu Chen, Zhaoyang Zeng, Hao Zhang, Feng
Li, Hongyang Li, Jun Huang, Hang Su, Jun Zhu, Lei Zhang
|
Detection Transformer with Stable Matching
|
SOTA detector. Project page:
https://github.com/IDEA-Research/Stable-DINO
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper is concerned with the matching stability problem across different
decoder layers in DEtection TRansformers (DETR). We point out that the unstable
matching in DETR is caused by a multi-optimization path problem, which is
highlighted by the one-to-one matching design in DETR. To address this problem,
we show that the most important design is to use and only use positional
metrics (like IOU) to supervise classification scores of positive examples.
Under the principle, we propose two simple yet effective modifications by
integrating positional metrics to DETR's classification loss and matching cost,
named position-supervised loss and position-modulated cost. We verify our
methods on several DETR variants. Our methods show consistent improvements over
baselines. By integrating our methods with DINO, we achieve 50.4 and 51.5 AP on
the COCO detection benchmark using ResNet-50 backbones under 12 epochs and 24
epochs training settings, achieving a new record under the same setting. We
achieve 63.8 AP on COCO detection test-dev with a Swin-Large backbone. Our code
will be made available at https://github.com/IDEA-Research/Stable-DINO.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 17:55:37 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Liu",
"Shilong",
""
],
[
"Ren",
"Tianhe",
""
],
[
"Chen",
"Jiayu",
""
],
[
"Zeng",
"Zhaoyang",
""
],
[
"Zhang",
"Hao",
""
],
[
"Li",
"Feng",
""
],
[
"Li",
"Hongyang",
""
],
[
"Huang",
"Jun",
""
],
[
"Su",
"Hang",
""
],
[
"Zhu",
"Jun",
""
],
[
"Zhang",
"Lei",
""
]
] |
TITLE: Detection Transformer with Stable Matching
ABSTRACT: This paper is concerned with the matching stability problem across different
decoder layers in DEtection TRansformers (DETR). We point out that the unstable
matching in DETR is caused by a multi-optimization path problem, which is
highlighted by the one-to-one matching design in DETR. To address this problem,
we show that the most important design is to use and only use positional
metrics (like IOU) to supervise classification scores of positive examples.
Under the principle, we propose two simple yet effective modifications by
integrating positional metrics to DETR's classification loss and matching cost,
named position-supervised loss and position-modulated cost. We verify our
methods on several DETR variants. Our methods show consistent improvements over
baselines. By integrating our methods with DINO, we achieve 50.4 and 51.5 AP on
the COCO detection benchmark using ResNet-50 backbones under 12 epochs and 24
epochs training settings, achieving a new record under the same setting. We
achieve 63.8 AP on COCO detection test-dev with a Swin-Large backbone. Our code
will be made available at https://github.com/IDEA-Research/Stable-DINO.
|
no_new_dataset
| 0.708824
|
2304.04743
|
Joseph M. Renes
|
Anqi Gong and Joseph M. Renes
|
Improved Logical Error Rate via List Decoding of Quantum Polar Codes
|
14 pages, 7 figures
| null | null | null |
quant-ph cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The successive cancellation list decoder (SCL) is an efficient decoder for
classical polar codes with low decoding error, approximating the maximum
likelihood decoder (MLD) for small list sizes. Here we adapt the SCL to the
task of decoding quantum polar codes and show that it inherits the high
performance and low complexity of the classical case, and can approximate the
quantum MLD for certain channels. We apply SCL decoding to a novel version of
quantum polar codes based on the polarization weight (PW) method, which
entirely avoids the need for small amounts of entanglement assistance apparent
in previous quantum polar code constructions. When used to find the precise
error pattern, the quantum SCL decoder (SCL-E) shows competitive performance
with surface codes of similar size and low-density parity check codes of
similar size and rate. The SCL decoder may instead be used to approximate the
probability of each equivalence class of errors, and then choose the most
likely class. We benchmark this class-oriented decoder (SCL-C) against the
SCL-E decoder and find a noticeable improvement in the logical error rate. This
improvement stems from the fact that the contributions from just the low-weight
errors give a reasonable approximation to the error class probabilities. Both
SCL-E and SCL-C maintain the complexity O(LN logN) of SCL for code size N and
list size L. We also show that the list decoder can be used to gain insight
into the weight distribution of the codes and how this impacts the effect of
degenerate errors.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 17:56:10 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Gong",
"Anqi",
""
],
[
"Renes",
"Joseph M.",
""
]
] |
TITLE: Improved Logical Error Rate via List Decoding of Quantum Polar Codes
ABSTRACT: The successive cancellation list decoder (SCL) is an efficient decoder for
classical polar codes with low decoding error, approximating the maximum
likelihood decoder (MLD) for small list sizes. Here we adapt the SCL to the
task of decoding quantum polar codes and show that it inherits the high
performance and low complexity of the classical case, and can approximate the
quantum MLD for certain channels. We apply SCL decoding to a novel version of
quantum polar codes based on the polarization weight (PW) method, which
entirely avoids the need for small amounts of entanglement assistance apparent
in previous quantum polar code constructions. When used to find the precise
error pattern, the quantum SCL decoder (SCL-E) shows competitive performance
with surface codes of similar size and low-density parity check codes of
similar size and rate. The SCL decoder may instead be used to approximate the
probability of each equivalence class of errors, and then choose the most
likely class. We benchmark this class-oriented decoder (SCL-C) against the
SCL-E decoder and find a noticeable improvement in the logical error rate. This
improvement stems from the fact that the contributions from just the low-weight
errors give a reasonable approximation to the error class probabilities. Both
SCL-E and SCL-C maintain the complexity O(LN logN) of SCL for code size N and
list size L. We also show that the list decoder can be used to gain insight
into the weight distribution of the codes and how this impacts the effect of
degenerate errors.
|
no_new_dataset
| 0.707967
|
2110.11155
|
Luca Traini PhD
|
Luca Traini, Vittorio Cortellessa
|
DeLag: Using Multi-Objective Optimization to Enhance the Detection of
Latency Degradation Patterns in Service-based Systems
|
Accepted for publication in IEEE Transactions on Software Engineering
(TSE)
| null |
10.1109/TSE.2023.3266041
| null |
cs.SE cs.LG cs.PF
|
http://creativecommons.org/licenses/by/4.0/
|
Performance debugging in production is a fundamental activity in modern
service-based systems. The diagnosis of performance issues is often
time-consuming, since it requires thorough inspection of large volumes of
traces and performance indices. In this paper we present DeLag, a novel
automated search-based approach for diagnosing performance issues in
service-based systems. DeLag identifies subsets of requests that show, in the
combination of their Remote Procedure Call execution times, symptoms of
potentially relevant performance issues. We call such symptoms Latency
Degradation Patterns. DeLag simultaneously searches for multiple latency
degradation patterns while optimizing precision, recall and latency
dissimilarity. Experimentation on 700 datasets of requests generated from two
microservice-based systems shows that our approach provides better and more
stable effectiveness than three state-of-the-art approaches and general purpose
machine learning clustering algorithms. DeLag is more effective than all
baseline techniques in at least one case study (with p $\leq$ 0.05 and
non-negligible effect size). Moreover, DeLag outperforms in terms of efficiency
the second and the third most effective baseline techniques on the largest
datasets used in our evaluation (up to 22%).
|
[
{
"version": "v1",
"created": "Thu, 21 Oct 2021 13:59:32 GMT"
},
{
"version": "v2",
"created": "Fri, 30 Sep 2022 10:58:53 GMT"
},
{
"version": "v3",
"created": "Thu, 29 Dec 2022 18:53:22 GMT"
},
{
"version": "v4",
"created": "Fri, 7 Apr 2023 14:09:42 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Traini",
"Luca",
""
],
[
"Cortellessa",
"Vittorio",
""
]
] |
TITLE: DeLag: Using Multi-Objective Optimization to Enhance the Detection of
Latency Degradation Patterns in Service-based Systems
ABSTRACT: Performance debugging in production is a fundamental activity in modern
service-based systems. The diagnosis of performance issues is often
time-consuming, since it requires thorough inspection of large volumes of
traces and performance indices. In this paper we present DeLag, a novel
automated search-based approach for diagnosing performance issues in
service-based systems. DeLag identifies subsets of requests that show, in the
combination of their Remote Procedure Call execution times, symptoms of
potentially relevant performance issues. We call such symptoms Latency
Degradation Patterns. DeLag simultaneously searches for multiple latency
degradation patterns while optimizing precision, recall and latency
dissimilarity. Experimentation on 700 datasets of requests generated from two
microservice-based systems shows that our approach provides better and more
stable effectiveness than three state-of-the-art approaches and general purpose
machine learning clustering algorithms. DeLag is more effective than all
baseline techniques in at least one case study (with p $\leq$ 0.05 and
non-negligible effect size). Moreover, DeLag outperforms in terms of efficiency
the second and the third most effective baseline techniques on the largest
datasets used in our evaluation (up to 22%).
|
no_new_dataset
| 0.708011
|
2111.08644
|
Radu Tudor Ionescu
|
Andra Acsintoae, Andrei Florescu, Mariana-Iuliana Georgescu, Tudor
Mare, Paul Sumedrea, Radu Tudor Ionescu, Fahad Shahbaz Khan, Mubarak Shah
|
UBnormal: New Benchmark for Supervised Open-Set Video Anomaly Detection
|
Accepted at CVPR 2022. Paper + supplementary (15 pages, 9 figures)
| null | null | null |
cs.CV cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Detecting abnormal events in video is commonly framed as a one-class
classification task, where training videos contain only normal events, while
test videos encompass both normal and abnormal events. In this scenario,
anomaly detection is an open-set problem. However, some studies assimilate
anomaly detection to action recognition. This is a closed-set scenario that
fails to test the capability of systems at detecting new anomaly types. To this
end, we propose UBnormal, a new supervised open-set benchmark composed of
multiple virtual scenes for video anomaly detection. Unlike existing data sets,
we introduce abnormal events annotated at the pixel level at training time, for
the first time enabling the use of fully-supervised learning methods for
abnormal event detection. To preserve the typical open-set formulation, we make
sure to include disjoint sets of anomaly types in our training and test
collections of videos. To our knowledge, UBnormal is the first video anomaly
detection benchmark to allow a fair head-to-head comparison between one-class
open-set models and supervised closed-set models, as shown in our experiments.
Moreover, we provide empirical evidence showing that UBnormal can enhance the
performance of a state-of-the-art anomaly detection framework on two prominent
data sets, Avenue and ShanghaiTech. Our benchmark is freely available at
https://github.com/lilygeorgescu/UBnormal.
|
[
{
"version": "v1",
"created": "Tue, 16 Nov 2021 17:28:46 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Mar 2022 14:06:40 GMT"
},
{
"version": "v3",
"created": "Fri, 7 Apr 2023 12:31:31 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Acsintoae",
"Andra",
""
],
[
"Florescu",
"Andrei",
""
],
[
"Georgescu",
"Mariana-Iuliana",
""
],
[
"Mare",
"Tudor",
""
],
[
"Sumedrea",
"Paul",
""
],
[
"Ionescu",
"Radu Tudor",
""
],
[
"Khan",
"Fahad Shahbaz",
""
],
[
"Shah",
"Mubarak",
""
]
] |
TITLE: UBnormal: New Benchmark for Supervised Open-Set Video Anomaly Detection
ABSTRACT: Detecting abnormal events in video is commonly framed as a one-class
classification task, where training videos contain only normal events, while
test videos encompass both normal and abnormal events. In this scenario,
anomaly detection is an open-set problem. However, some studies assimilate
anomaly detection to action recognition. This is a closed-set scenario that
fails to test the capability of systems at detecting new anomaly types. To this
end, we propose UBnormal, a new supervised open-set benchmark composed of
multiple virtual scenes for video anomaly detection. Unlike existing data sets,
we introduce abnormal events annotated at the pixel level at training time, for
the first time enabling the use of fully-supervised learning methods for
abnormal event detection. To preserve the typical open-set formulation, we make
sure to include disjoint sets of anomaly types in our training and test
collections of videos. To our knowledge, UBnormal is the first video anomaly
detection benchmark to allow a fair head-to-head comparison between one-class
open-set models and supervised closed-set models, as shown in our experiments.
Moreover, we provide empirical evidence showing that UBnormal can enhance the
performance of a state-of-the-art anomaly detection framework on two prominent
data sets, Avenue and ShanghaiTech. Our benchmark is freely available at
https://github.com/lilygeorgescu/UBnormal.
|
no_new_dataset
| 0.569553
|
2112.00319
|
Shlok Mishra
|
Shlok Mishra, Anshul Shah, Ankan Bansal, Abhyuday Jagannatha, Janit
Anjaria, Abhishek Sharma, David Jacobs, Dilip Krishnan
|
Object-Aware Cropping for Self-Supervised Learning
| null |
Transactions on Machine Learning Research 2022
| null | null |
cs.CV cs.LG
|
http://creativecommons.org/publicdomain/zero/1.0/
|
A core component of the recent success of self-supervised learning is
cropping data augmentation, which selects sub-regions of an image to be used as
positive views in the self-supervised loss. The underlying assumption is that
randomly cropped and resized regions of a given image share information about
the objects of interest, which the learned representation will capture. This
assumption is mostly satisfied in datasets such as ImageNet where there is a
large, centered object, which is highly likely to be present in random crops of
the full image. However, in other datasets such as OpenImages or COCO, which
are more representative of real world uncurated data, there are typically
multiple small objects in an image. In this work, we show that self-supervised
learning based on the usual random cropping performs poorly on such datasets.
We propose replacing one or both of the random crops with crops obtained from
an object proposal algorithm. This encourages the model to learn both object
and scene level semantic representations. Using this approach, which we call
object-aware cropping, results in significant improvements over scene cropping
on classification and object detection benchmarks. For example, on OpenImages,
our approach achieves an improvement of 8.8% mAP over random scene-level
cropping using MoCo-v2 based pre-training. We also show significant
improvements on COCO and PASCAL-VOC object detection and segmentation tasks
over the state-of-the-art self-supervised learning approaches. Our approach is
efficient, simple and general, and can be used in most existing contrastive and
non-contrastive self-supervised learning frameworks.
|
[
{
"version": "v1",
"created": "Wed, 1 Dec 2021 07:23:37 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2023 20:05:35 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Mishra",
"Shlok",
""
],
[
"Shah",
"Anshul",
""
],
[
"Bansal",
"Ankan",
""
],
[
"Jagannatha",
"Abhyuday",
""
],
[
"Anjaria",
"Janit",
""
],
[
"Sharma",
"Abhishek",
""
],
[
"Jacobs",
"David",
""
],
[
"Krishnan",
"Dilip",
""
]
] |
TITLE: Object-Aware Cropping for Self-Supervised Learning
ABSTRACT: A core component of the recent success of self-supervised learning is
cropping data augmentation, which selects sub-regions of an image to be used as
positive views in the self-supervised loss. The underlying assumption is that
randomly cropped and resized regions of a given image share information about
the objects of interest, which the learned representation will capture. This
assumption is mostly satisfied in datasets such as ImageNet where there is a
large, centered object, which is highly likely to be present in random crops of
the full image. However, in other datasets such as OpenImages or COCO, which
are more representative of real world uncurated data, there are typically
multiple small objects in an image. In this work, we show that self-supervised
learning based on the usual random cropping performs poorly on such datasets.
We propose replacing one or both of the random crops with crops obtained from
an object proposal algorithm. This encourages the model to learn both object
and scene level semantic representations. Using this approach, which we call
object-aware cropping, results in significant improvements over scene cropping
on classification and object detection benchmarks. For example, on OpenImages,
our approach achieves an improvement of 8.8% mAP over random scene-level
cropping using MoCo-v2 based pre-training. We also show significant
improvements on COCO and PASCAL-VOC object detection and segmentation tasks
over the state-of-the-art self-supervised learning approaches. Our approach is
efficient, simple and general, and can be used in most existing contrastive and
non-contrastive self-supervised learning frameworks.
|
no_new_dataset
| 0.710653
|
2203.02090
|
Nathaniel Josephs
|
Luyi Shen, Arash Amini, Nathaniel Josephs, and Lizhen Lin
|
Bayesian community detection for networks with covariates
| null | null | null | null |
stat.ME cs.SI stat.CO stat.ML
|
http://creativecommons.org/licenses/by/4.0/
|
The increasing prevalence of network data in a vast variety of fields and the
need to extract useful information out of them have spurred fast developments
in related models and algorithms. Among the various learning tasks with network
data, community detection, the discovery of node clusters or "communities," has
arguably received the most attention in the scientific community. In many
real-world applications, the network data often come with additional
information in the form of node or edge covariates that should ideally be
leveraged for inference. In this paper, we add to a limited literature on
community detection for networks with covariates by proposing a Bayesian
stochastic block model with a covariate-dependent random partition prior. Under
our prior, the covariates are explicitly expressed in specifying the prior
distribution on the cluster membership. Our model has the flexibility of
modeling uncertainties of all the parameter estimates including the community
membership. Importantly, and unlike the majority of existing methods, our model
has the ability to learn the number of the communities via posterior inference
without having to assume it to be known. Our model can be applied to community
detection in both dense and sparse networks, with both categorical and
continuous covariates, and our MCMC algorithm is very efficient with good
mixing properties. We demonstrate the superior performance of our model over
existing models in a comprehensive simulation study and an application to two
real datasets.
|
[
{
"version": "v1",
"created": "Fri, 4 Mar 2022 01:58:35 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2023 18:57:17 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Shen",
"Luyi",
""
],
[
"Amini",
"Arash",
""
],
[
"Josephs",
"Nathaniel",
""
],
[
"Lin",
"Lizhen",
""
]
] |
TITLE: Bayesian community detection for networks with covariates
ABSTRACT: The increasing prevalence of network data in a vast variety of fields and the
need to extract useful information out of them have spurred fast developments
in related models and algorithms. Among the various learning tasks with network
data, community detection, the discovery of node clusters or "communities," has
arguably received the most attention in the scientific community. In many
real-world applications, the network data often come with additional
information in the form of node or edge covariates that should ideally be
leveraged for inference. In this paper, we add to a limited literature on
community detection for networks with covariates by proposing a Bayesian
stochastic block model with a covariate-dependent random partition prior. Under
our prior, the covariates are explicitly expressed in specifying the prior
distribution on the cluster membership. Our model has the flexibility of
modeling uncertainties of all the parameter estimates including the community
membership. Importantly, and unlike the majority of existing methods, our model
has the ability to learn the number of the communities via posterior inference
without having to assume it to be known. Our model can be applied to community
detection in both dense and sparse networks, with both categorical and
continuous covariates, and our MCMC algorithm is very efficient with good
mixing properties. We demonstrate the superior performance of our model over
existing models in a comprehensive simulation study and an application to two
real datasets.
|
no_new_dataset
| 0.712057
|
2203.04249
|
Anirudh Allam
|
Aki Takahashi, Anirudh Allam, Simona Onori
|
Evaluating feasibility of batteries for second-life applications using
machine learning
|
23 pages
| null | null | null |
eess.SY cs.LG cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a combination of machine learning techniques to enable
prompt evaluation of retired electric vehicle batteries as to either retain
those batteries for a second-life application and extend their operation beyond
the original and first intent or send them to recycle facilities. The proposed
algorithm generates features from available battery current and voltage
measurements with simple statistics, selects and ranks the features using
correlation analysis, and employs Gaussian Process Regression enhanced with
bagging. This approach is validated over publicly available aging datasets of
more than 200 cells with slow and fast charging, with different cathode
chemistries, and for diverse operating conditions. Promising results are
observed based on multiple training-test partitions, wherein the mean of Root
Mean Squared Percent Error and Mean Percent Error performance errors are found
to be less than 1.48% and 1.29%, respectively, in the worst-case scenarios.
|
[
{
"version": "v1",
"created": "Tue, 8 Mar 2022 18:07:33 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Apr 2023 15:55:50 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Takahashi",
"Aki",
""
],
[
"Allam",
"Anirudh",
""
],
[
"Onori",
"Simona",
""
]
] |
TITLE: Evaluating feasibility of batteries for second-life applications using
machine learning
ABSTRACT: This paper presents a combination of machine learning techniques to enable
prompt evaluation of retired electric vehicle batteries as to either retain
those batteries for a second-life application and extend their operation beyond
the original and first intent or send them to recycle facilities. The proposed
algorithm generates features from available battery current and voltage
measurements with simple statistics, selects and ranks the features using
correlation analysis, and employs Gaussian Process Regression enhanced with
bagging. This approach is validated over publicly available aging datasets of
more than 200 cells with slow and fast charging, with different cathode
chemistries, and for diverse operating conditions. Promising results are
observed based on multiple training-test partitions, wherein the mean of Root
Mean Squared Percent Error and Mean Percent Error performance errors are found
to be less than 1.48% and 1.29%, respectively, in the worst-case scenarios.
|
no_new_dataset
| 0.70883
|
2203.11987
|
Ryan Grainger
|
Ryan Grainger, Thomas Paniagua, Xi Song, Naresh Cuntoor, Mun Wai Lee,
Tianfu Wu
|
PaCa-ViT: Learning Patch-to-Cluster Attention in Vision Transformers
|
CVPR 2023
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Vision Transformers (ViTs) are built on the assumption of treating image
patches as ``visual tokens" and learn patch-to-patch attention. The patch
embedding based tokenizer has a semantic gap with respect to its counterpart,
the textual tokenizer. The patch-to-patch attention suffers from the quadratic
complexity issue, and also makes it non-trivial to explain learned ViTs. To
address these issues in ViT, this paper proposes to learn Patch-to-Cluster
attention (PaCa) in ViT. Queries in our PaCa-ViT starts with patches, while
keys and values are directly based on clustering (with a predefined small
number of clusters). The clusters are learned end-to-end, leading to better
tokenizers and inducing joint clustering-for-attention and
attention-for-clustering for better and interpretable models. The quadratic
complexity is relaxed to linear complexity. The proposed PaCa module is used in
designing efficient and interpretable ViT backbones and semantic segmentation
head networks. In experiments, the proposed methods are tested on ImageNet-1k
image classification, MS-COCO object detection and instance segmentation and
MIT-ADE20k semantic segmentation. Compared with the prior art, it obtains
better performance in all the three benchmarks than the SWin and the PVTs by
significant margins in ImageNet-1k and MIT-ADE20k. It is also significantly
more efficient than PVT models in MS-COCO and MIT-ADE20k due to the linear
complexity. The learned clusters are semantically meaningful. Code and model
checkpoints are available at https://github.com/iVMCL/PaCaViT.
|
[
{
"version": "v1",
"created": "Tue, 22 Mar 2022 18:28:02 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Apr 2023 00:46:43 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Grainger",
"Ryan",
""
],
[
"Paniagua",
"Thomas",
""
],
[
"Song",
"Xi",
""
],
[
"Cuntoor",
"Naresh",
""
],
[
"Lee",
"Mun Wai",
""
],
[
"Wu",
"Tianfu",
""
]
] |
TITLE: PaCa-ViT: Learning Patch-to-Cluster Attention in Vision Transformers
ABSTRACT: Vision Transformers (ViTs) are built on the assumption of treating image
patches as ``visual tokens" and learn patch-to-patch attention. The patch
embedding based tokenizer has a semantic gap with respect to its counterpart,
the textual tokenizer. The patch-to-patch attention suffers from the quadratic
complexity issue, and also makes it non-trivial to explain learned ViTs. To
address these issues in ViT, this paper proposes to learn Patch-to-Cluster
attention (PaCa) in ViT. Queries in our PaCa-ViT starts with patches, while
keys and values are directly based on clustering (with a predefined small
number of clusters). The clusters are learned end-to-end, leading to better
tokenizers and inducing joint clustering-for-attention and
attention-for-clustering for better and interpretable models. The quadratic
complexity is relaxed to linear complexity. The proposed PaCa module is used in
designing efficient and interpretable ViT backbones and semantic segmentation
head networks. In experiments, the proposed methods are tested on ImageNet-1k
image classification, MS-COCO object detection and instance segmentation and
MIT-ADE20k semantic segmentation. Compared with the prior art, it obtains
better performance in all the three benchmarks than the SWin and the PVTs by
significant margins in ImageNet-1k and MIT-ADE20k. It is also significantly
more efficient than PVT models in MS-COCO and MIT-ADE20k due to the linear
complexity. The learned clusters are semantically meaningful. Code and model
checkpoints are available at https://github.com/iVMCL/PaCaViT.
|
no_new_dataset
| 0.713082
|
2204.06552
|
Edoardo Mello Rella
|
Edoardo Mello Rella, Ajad Chhatkuli, Ender Konukoglu, and Luc Van Gool
|
Neural Vector Fields for Implicit Surface Representation and Inference
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Implicit fields have recently shown increasing success in representing and
learning 3D shapes accurately. Signed distance fields and occupancy fields are
decades old and still the preferred representations, both with well-studied
properties, despite their restriction to closed surfaces. With neural networks,
several other variations and training principles have been proposed with the
goal to represent all classes of shapes. In this paper, we develop a novel and
yet a fundamental representation considering unit vectors in 3D space and call
it Vector Field (VF): at each point in $\mathbb{R}^3$, VF is directed at the
closest point on the surface. We theoretically demonstrate that VF can be
easily transformed to surface density by computing the flux density. Unlike
other standard representations, VF directly encodes an important physical
property of the surface, its normal. We further show the advantages of VF
representation, in learning open, closed, or multi-layered as well as piecewise
planar surfaces. We compare our method on several datasets including ShapeNet
where the proposed new neural implicit field shows superior accuracy in
representing any type of shape, outperforming other standard methods. Code is
available at https://github.com/edomel/ImplicitVF.
|
[
{
"version": "v1",
"created": "Wed, 13 Apr 2022 17:53:34 GMT"
},
{
"version": "v2",
"created": "Fri, 9 Dec 2022 10:43:49 GMT"
},
{
"version": "v3",
"created": "Fri, 7 Apr 2023 15:15:46 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Rella",
"Edoardo Mello",
""
],
[
"Chhatkuli",
"Ajad",
""
],
[
"Konukoglu",
"Ender",
""
],
[
"Van Gool",
"Luc",
""
]
] |
TITLE: Neural Vector Fields for Implicit Surface Representation and Inference
ABSTRACT: Implicit fields have recently shown increasing success in representing and
learning 3D shapes accurately. Signed distance fields and occupancy fields are
decades old and still the preferred representations, both with well-studied
properties, despite their restriction to closed surfaces. With neural networks,
several other variations and training principles have been proposed with the
goal to represent all classes of shapes. In this paper, we develop a novel and
yet a fundamental representation considering unit vectors in 3D space and call
it Vector Field (VF): at each point in $\mathbb{R}^3$, VF is directed at the
closest point on the surface. We theoretically demonstrate that VF can be
easily transformed to surface density by computing the flux density. Unlike
other standard representations, VF directly encodes an important physical
property of the surface, its normal. We further show the advantages of VF
representation, in learning open, closed, or multi-layered as well as piecewise
planar surfaces. We compare our method on several datasets including ShapeNet
where the proposed new neural implicit field shows superior accuracy in
representing any type of shape, outperforming other standard methods. Code is
available at https://github.com/edomel/ImplicitVF.
|
no_new_dataset
| 0.709239
|
2205.14354
|
Yangyang Xu
|
Yangyang Xu, Xiangtai Li, Haobo Yuan, Yibo Yang, Lefei Zhang
|
Multi-Task Learning with Multi-Query Transformer for Dense Prediction
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Previous multi-task dense prediction studies developed complex pipelines such
as multi-modal distillations in multiple stages or searching for task
relational contexts for each task. The core insight beyond these methods is to
maximize the mutual effects of each task. Inspired by the recent query-based
Transformers, we propose a simple pipeline named Multi-Query Transformer
(MQTransformer) that is equipped with multiple queries from different tasks to
facilitate the reasoning among multiple tasks and simplify the cross-task
interaction pipeline. Instead of modeling the dense per-pixel context among
different tasks, we seek a task-specific proxy to perform cross-task reasoning
via multiple queries where each query encodes the task-related context. The
MQTransformer is composed of three key components: shared encoder, cross-task
query attention module and shared decoder. We first model each task with a
task-relevant query. Then both the task-specific feature output by the feature
extractor and the task-relevant query are fed into the shared encoder, thus
encoding the task-relevant query from the task-specific feature. Secondly, we
design a cross-task query attention module to reason the dependencies among
multiple task-relevant queries; this enables the module to only focus on the
query-level interaction. Finally, we use a shared decoder to gradually refine
the image features with the reasoned query features from different tasks.
Extensive experiment results on two dense prediction datasets (NYUD-v2 and
PASCAL-Context) show that the proposed method is an effective approach and
achieves state-of-the-art results. Code and models are available at
https://github.com/yangyangxu0/MQTransformer.
|
[
{
"version": "v1",
"created": "Sat, 28 May 2022 06:51:10 GMT"
},
{
"version": "v2",
"created": "Tue, 31 May 2022 07:36:22 GMT"
},
{
"version": "v3",
"created": "Sat, 16 Jul 2022 09:29:11 GMT"
},
{
"version": "v4",
"created": "Fri, 7 Apr 2023 17:58:55 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Xu",
"Yangyang",
""
],
[
"Li",
"Xiangtai",
""
],
[
"Yuan",
"Haobo",
""
],
[
"Yang",
"Yibo",
""
],
[
"Zhang",
"Lefei",
""
]
] |
TITLE: Multi-Task Learning with Multi-Query Transformer for Dense Prediction
ABSTRACT: Previous multi-task dense prediction studies developed complex pipelines such
as multi-modal distillations in multiple stages or searching for task
relational contexts for each task. The core insight beyond these methods is to
maximize the mutual effects of each task. Inspired by the recent query-based
Transformers, we propose a simple pipeline named Multi-Query Transformer
(MQTransformer) that is equipped with multiple queries from different tasks to
facilitate the reasoning among multiple tasks and simplify the cross-task
interaction pipeline. Instead of modeling the dense per-pixel context among
different tasks, we seek a task-specific proxy to perform cross-task reasoning
via multiple queries where each query encodes the task-related context. The
MQTransformer is composed of three key components: shared encoder, cross-task
query attention module and shared decoder. We first model each task with a
task-relevant query. Then both the task-specific feature output by the feature
extractor and the task-relevant query are fed into the shared encoder, thus
encoding the task-relevant query from the task-specific feature. Secondly, we
design a cross-task query attention module to reason the dependencies among
multiple task-relevant queries; this enables the module to only focus on the
query-level interaction. Finally, we use a shared decoder to gradually refine
the image features with the reasoned query features from different tasks.
Extensive experiment results on two dense prediction datasets (NYUD-v2 and
PASCAL-Context) show that the proposed method is an effective approach and
achieves state-of-the-art results. Code and models are available at
https://github.com/yangyangxu0/MQTransformer.
|
no_new_dataset
| 0.70619
|
2206.01856
|
Calvin-Khang Ta
|
Calvin-Khang Ta, Abhishek Aich, Akash Gupta, Amit K. Roy-Chowdhury
|
Poisson2Sparse: Self-Supervised Poisson Denoising From a Single Image
|
Accepted to MICCAI 2022
| null |
10.1007/978-3-031-16452-1_53
| null |
eess.IV cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Image enhancement approaches often assume that the noise is signal
independent, and approximate the degradation model as zero-mean additive
Gaussian. However, this assumption does not hold for biomedical imaging systems
where sensor-based sources of noise are proportional to signal strengths, and
the noise is better represented as a Poisson process. In this work, we explore
a sparsity and dictionary learning-based approach and present a novel
self-supervised learning method for single-image denoising where the noise is
approximated as a Poisson process, requiring no clean ground-truth data.
Specifically, we approximate traditional iterative optimization algorithms for
image denoising with a recurrent neural network that enforces sparsity with
respect to the weights of the network. Since the sparse representations are
based on the underlying image, it is able to suppress the spurious components
(noise) in the image patches, thereby introducing implicit regularization for
denoising tasks through the network structure. Experiments on two bio-imaging
datasets demonstrate that our method outperforms the state-of-the-art
approaches in terms of PSNR and SSIM. Our qualitative results demonstrate that,
in addition to higher performance on standard quantitative metrics, we are able
to recover much more subtle details than other compared approaches. Our code is
made publicly available at https://github.com/tacalvin/Poisson2Sparse
|
[
{
"version": "v1",
"created": "Sat, 4 Jun 2022 00:08:58 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Jun 2022 05:05:05 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Ta",
"Calvin-Khang",
""
],
[
"Aich",
"Abhishek",
""
],
[
"Gupta",
"Akash",
""
],
[
"Roy-Chowdhury",
"Amit K.",
""
]
] |
TITLE: Poisson2Sparse: Self-Supervised Poisson Denoising From a Single Image
ABSTRACT: Image enhancement approaches often assume that the noise is signal
independent, and approximate the degradation model as zero-mean additive
Gaussian. However, this assumption does not hold for biomedical imaging systems
where sensor-based sources of noise are proportional to signal strengths, and
the noise is better represented as a Poisson process. In this work, we explore
a sparsity and dictionary learning-based approach and present a novel
self-supervised learning method for single-image denoising where the noise is
approximated as a Poisson process, requiring no clean ground-truth data.
Specifically, we approximate traditional iterative optimization algorithms for
image denoising with a recurrent neural network that enforces sparsity with
respect to the weights of the network. Since the sparse representations are
based on the underlying image, it is able to suppress the spurious components
(noise) in the image patches, thereby introducing implicit regularization for
denoising tasks through the network structure. Experiments on two bio-imaging
datasets demonstrate that our method outperforms the state-of-the-art
approaches in terms of PSNR and SSIM. Our qualitative results demonstrate that,
in addition to higher performance on standard quantitative metrics, we are able
to recover much more subtle details than other compared approaches. Our code is
made publicly available at https://github.com/tacalvin/Poisson2Sparse
|
no_new_dataset
| 0.709252
|
2206.02066
|
Jiacong Xu
|
Jiacong Xu, Zixiang Xiong and Shankar P. Bhattacharyya
|
PIDNet: A Real-time Semantic Segmentation Network Inspired by PID
Controllers
|
11 pages, 9 figures; This paper will be published by CVPR2023 soon,
please refer to the official version then
| null | null | null |
cs.CV cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Two-branch network architecture has shown its efficiency and effectiveness in
real-time semantic segmentation tasks. However, direct fusion of
high-resolution details and low-frequency context has the drawback of detailed
features being easily overwhelmed by surrounding contextual information. This
overshoot phenomenon limits the improvement of the segmentation accuracy of
existing two-branch models. In this paper, we make a connection between
Convolutional Neural Networks (CNN) and Proportional-Integral-Derivative (PID)
controllers and reveal that a two-branch network is equivalent to a
Proportional-Integral (PI) controller, which inherently suffers from similar
overshoot issues. To alleviate this problem, we propose a novel three-branch
network architecture: PIDNet, which contains three branches to parse detailed,
context and boundary information, respectively, and employs boundary attention
to guide the fusion of detailed and context branches. Our family of PIDNets
achieve the best trade-off between inference speed and accuracy and their
accuracy surpasses all the existing models with similar inference speed on the
Cityscapes and CamVid datasets. Specifically, PIDNet-S achieves 78.6% mIOU with
inference speed of 93.2 FPS on Cityscapes and 80.1% mIOU with speed of 153.7
FPS on CamVid.
|
[
{
"version": "v1",
"created": "Sat, 4 Jun 2022 23:16:52 GMT"
},
{
"version": "v2",
"created": "Fri, 10 Jun 2022 00:44:39 GMT"
},
{
"version": "v3",
"created": "Fri, 7 Apr 2023 01:10:17 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Xu",
"Jiacong",
""
],
[
"Xiong",
"Zixiang",
""
],
[
"Bhattacharyya",
"Shankar P.",
""
]
] |
TITLE: PIDNet: A Real-time Semantic Segmentation Network Inspired by PID
Controllers
ABSTRACT: Two-branch network architecture has shown its efficiency and effectiveness in
real-time semantic segmentation tasks. However, direct fusion of
high-resolution details and low-frequency context has the drawback of detailed
features being easily overwhelmed by surrounding contextual information. This
overshoot phenomenon limits the improvement of the segmentation accuracy of
existing two-branch models. In this paper, we make a connection between
Convolutional Neural Networks (CNN) and Proportional-Integral-Derivative (PID)
controllers and reveal that a two-branch network is equivalent to a
Proportional-Integral (PI) controller, which inherently suffers from similar
overshoot issues. To alleviate this problem, we propose a novel three-branch
network architecture: PIDNet, which contains three branches to parse detailed,
context and boundary information, respectively, and employs boundary attention
to guide the fusion of detailed and context branches. Our family of PIDNets
achieve the best trade-off between inference speed and accuracy and their
accuracy surpasses all the existing models with similar inference speed on the
Cityscapes and CamVid datasets. Specifically, PIDNet-S achieves 78.6% mIOU with
inference speed of 93.2 FPS on Cityscapes and 80.1% mIOU with speed of 153.7
FPS on CamVid.
|
no_new_dataset
| 0.710245
|
2206.12036
|
Zitao Liu
|
Qiongqiong Liu, Yaying Huang, Zitao Liu, Shuyan Huang, Jiahao Chen,
Xiangyu Zhao, Guimin Lin, Yuyu Zhou, Weiqi Luo
|
SC-Ques: A Sentence Completion Question Dataset for English as a Second
Language Learners
|
Accepted in ITS'2023: The 19th International Conference on
Intelligent Tutoring Systems(ITS), 2023
| null | null | null |
cs.CL cs.AI
|
http://creativecommons.org/licenses/by/4.0/
|
Sentence completion (SC) questions present a sentence with one or more blanks
that need to be filled in, three to five possible words or phrases as options.
SC questions are widely used for students learning English as a Second Language
(ESL). In this paper, we present a large-scale SC dataset, \textsc{SC-Ques},
which is made up of 289,148 ESL SC questions from real-world standardized
English examinations. Furthermore, we build a comprehensive benchmark of
automatically solving the SC questions by training the large-scale pre-trained
language models on the proposed \textsc{SC-Ques} dataset. We conduct detailed
analysis of the baseline models performance, limitations and trade-offs. The
data and our code are available for research purposes from:
\url{https://github.com/ai4ed/SC-Ques}.
|
[
{
"version": "v1",
"created": "Fri, 24 Jun 2022 02:17:13 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Apr 2023 11:55:04 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Liu",
"Qiongqiong",
""
],
[
"Huang",
"Yaying",
""
],
[
"Liu",
"Zitao",
""
],
[
"Huang",
"Shuyan",
""
],
[
"Chen",
"Jiahao",
""
],
[
"Zhao",
"Xiangyu",
""
],
[
"Lin",
"Guimin",
""
],
[
"Zhou",
"Yuyu",
""
],
[
"Luo",
"Weiqi",
""
]
] |
TITLE: SC-Ques: A Sentence Completion Question Dataset for English as a Second
Language Learners
ABSTRACT: Sentence completion (SC) questions present a sentence with one or more blanks
that need to be filled in, three to five possible words or phrases as options.
SC questions are widely used for students learning English as a Second Language
(ESL). In this paper, we present a large-scale SC dataset, \textsc{SC-Ques},
which is made up of 289,148 ESL SC questions from real-world standardized
English examinations. Furthermore, we build a comprehensive benchmark of
automatically solving the SC questions by training the large-scale pre-trained
language models on the proposed \textsc{SC-Ques} dataset. We conduct detailed
analysis of the baseline models performance, limitations and trade-offs. The
data and our code are available for research purposes from:
\url{https://github.com/ai4ed/SC-Ques}.
|
new_dataset
| 0.715778
|
2207.01398
|
Madeline Chantry Schiappa
|
Madeline Chantry Schiappa, Naman Biyani, Prudvi Kamtam, Shruti Vyas,
Hamid Palangi, Vibhav Vineet, Yogesh Rawat
|
Large-scale Robustness Analysis of Video Action Recognition Models
|
Accepted in 2023 Conference on Computer Vision and Pattern
Recognition (CVPR)
| null | null | null |
cs.CV eess.IV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We have seen a great progress in video action recognition in recent years.
There are several models based on convolutional neural network (CNN) and some
recent transformer based approaches which provide top performance on existing
benchmarks. In this work, we perform a large-scale robustness analysis of these
existing models for video action recognition. We focus on robustness against
real-world distribution shift perturbations instead of adversarial
perturbations. We propose four different benchmark datasets, HMDB51-P,
UCF101-P, Kinetics400-P, and SSv2-P to perform this analysis. We study
robustness of six state-of-the-art action recognition models against 90
different perturbations. The study reveals some interesting findings, 1)
transformer based models are consistently more robust compared to CNN based
models, 2) Pretraining improves robustness for Transformer based models more
than CNN based models, and 3) All of the studied models are robust to temporal
perturbations for all datasets but SSv2; suggesting the importance of temporal
information for action recognition varies based on the dataset and activities.
Next, we study the role of augmentations in model robustness and present a
real-world dataset, UCF101-DS, which contains realistic distribution shifts, to
further validate some of these findings. We believe this study will serve as a
benchmark for future research in robust video action recognition.
|
[
{
"version": "v1",
"created": "Mon, 4 Jul 2022 13:29:34 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Apr 2023 16:40:59 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Schiappa",
"Madeline Chantry",
""
],
[
"Biyani",
"Naman",
""
],
[
"Kamtam",
"Prudvi",
""
],
[
"Vyas",
"Shruti",
""
],
[
"Palangi",
"Hamid",
""
],
[
"Vineet",
"Vibhav",
""
],
[
"Rawat",
"Yogesh",
""
]
] |
TITLE: Large-scale Robustness Analysis of Video Action Recognition Models
ABSTRACT: We have seen a great progress in video action recognition in recent years.
There are several models based on convolutional neural network (CNN) and some
recent transformer based approaches which provide top performance on existing
benchmarks. In this work, we perform a large-scale robustness analysis of these
existing models for video action recognition. We focus on robustness against
real-world distribution shift perturbations instead of adversarial
perturbations. We propose four different benchmark datasets, HMDB51-P,
UCF101-P, Kinetics400-P, and SSv2-P to perform this analysis. We study
robustness of six state-of-the-art action recognition models against 90
different perturbations. The study reveals some interesting findings, 1)
transformer based models are consistently more robust compared to CNN based
models, 2) Pretraining improves robustness for Transformer based models more
than CNN based models, and 3) All of the studied models are robust to temporal
perturbations for all datasets but SSv2; suggesting the importance of temporal
information for action recognition varies based on the dataset and activities.
Next, we study the role of augmentations in model robustness and present a
real-world dataset, UCF101-DS, which contains realistic distribution shifts, to
further validate some of these findings. We believe this study will serve as a
benchmark for future research in robust video action recognition.
|
new_dataset
| 0.718224
|
2207.08349
|
Julie Jiang
|
Julie Jiang, Xiang Ren, Emilio Ferrara
|
Retweet-BERT: Political Leaning Detection Using Language Features and
Information Diffusion on Social Networks
|
11 pages, 3 figures, 4 tables. arXiv admin note: text overlap with
arXiv:2103.10979
|
The 17th International AAAI Conference on Web and Social Media
(ICWSM 2023)
| null | null |
cs.SI cs.LG physics.soc-ph
|
http://creativecommons.org/licenses/by-nc-nd/4.0/
|
Estimating the political leanings of social media users is a challenging and
ever more pressing problem given the increase in social media consumption. We
introduce Retweet-BERT, a simple and scalable model to estimate the political
leanings of Twitter users. Retweet-BERT leverages the retweet network structure
and the language used in users' profile descriptions. Our assumptions stem from
patterns of networks and linguistics homophily among people who share similar
ideologies. Retweet-BERT demonstrates competitive performance against other
state-of-the-art baselines, achieving 96%-97% macro-F1 on two recent Twitter
datasets (a COVID-19 dataset and a 2020 United States presidential elections
dataset). We also perform manual validation to validate the performance of
Retweet-BERT on users not in the training data. Finally, in a case study of
COVID-19, we illustrate the presence of political echo chambers on Twitter and
show that it exists primarily among right-leaning users. Our code is
open-sourced and our data is publicly available.
|
[
{
"version": "v1",
"created": "Mon, 18 Jul 2022 02:18:20 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Oct 2022 02:30:56 GMT"
},
{
"version": "v3",
"created": "Sat, 1 Apr 2023 22:08:55 GMT"
},
{
"version": "v4",
"created": "Thu, 6 Apr 2023 18:48:15 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Jiang",
"Julie",
""
],
[
"Ren",
"Xiang",
""
],
[
"Ferrara",
"Emilio",
""
]
] |
TITLE: Retweet-BERT: Political Leaning Detection Using Language Features and
Information Diffusion on Social Networks
ABSTRACT: Estimating the political leanings of social media users is a challenging and
ever more pressing problem given the increase in social media consumption. We
introduce Retweet-BERT, a simple and scalable model to estimate the political
leanings of Twitter users. Retweet-BERT leverages the retweet network structure
and the language used in users' profile descriptions. Our assumptions stem from
patterns of networks and linguistics homophily among people who share similar
ideologies. Retweet-BERT demonstrates competitive performance against other
state-of-the-art baselines, achieving 96%-97% macro-F1 on two recent Twitter
datasets (a COVID-19 dataset and a 2020 United States presidential elections
dataset). We also perform manual validation to validate the performance of
Retweet-BERT on users not in the training data. Finally, in a case study of
COVID-19, we illustrate the presence of political echo chambers on Twitter and
show that it exists primarily among right-leaning users. Our code is
open-sourced and our data is publicly available.
|
no_new_dataset
| 0.708458
|
2208.12933
|
Tatsuro Kawamoto
|
Tatsuro Kawamoto, Masaki Ochi, Teruyoshi Kobayashi
|
Consistency between ordering and clustering methods for graphs
|
30 pages, 26 figures
|
Phys. Rev. Research 5, 023006 (2023)
|
10.1103/PhysRevResearch.5.023006
| null |
cs.LG cs.SI physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A relational dataset is often analyzed by optimally assigning a label to each
element through clustering or ordering. While similar characterizations of a
dataset would be achieved by both clustering and ordering methods, the former
has been studied much more actively than the latter, particularly for the data
represented as graphs. This study fills this gap by investigating
methodological relationships between several clustering and ordering methods,
focusing on spectral techniques. Furthermore, we evaluate the resulting
performance of the clustering and ordering methods. To this end, we propose a
measure called the label continuity error, which generically quantifies the
degree of consistency between a sequence and partition for a set of elements.
Based on synthetic and real-world datasets, we evaluate the extents to which an
ordering method identifies a module structure and a clustering method
identifies a banded structure.
|
[
{
"version": "v1",
"created": "Sat, 27 Aug 2022 05:55:26 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Apr 2023 16:02:19 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Kawamoto",
"Tatsuro",
""
],
[
"Ochi",
"Masaki",
""
],
[
"Kobayashi",
"Teruyoshi",
""
]
] |
TITLE: Consistency between ordering and clustering methods for graphs
ABSTRACT: A relational dataset is often analyzed by optimally assigning a label to each
element through clustering or ordering. While similar characterizations of a
dataset would be achieved by both clustering and ordering methods, the former
has been studied much more actively than the latter, particularly for the data
represented as graphs. This study fills this gap by investigating
methodological relationships between several clustering and ordering methods,
focusing on spectral techniques. Furthermore, we evaluate the resulting
performance of the clustering and ordering methods. To this end, we propose a
measure called the label continuity error, which generically quantifies the
degree of consistency between a sequence and partition for a set of elements.
Based on synthetic and real-world datasets, we evaluate the extents to which an
ordering method identifies a module structure and a clustering method
identifies a banded structure.
|
no_new_dataset
| 0.711212
|
2209.00727
|
Xin-Yi Tong
|
Xin-Yi Tong, Gui-Song Xia, Xiao Xiang Zhu
|
Enabling Country-Scale Land Cover Mapping with Meter-Resolution
Satellite Imagery
| null | null |
10.1016/j.isprsjprs.2022.12.011
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
High-resolution satellite images can provide abundant, detailed spatial
information for land cover classification, which is particularly important for
studying the complicated built environment. However, due to the complex land
cover patterns, the costly training sample collections, and the severe
distribution shifts of satellite imageries, few studies have applied
high-resolution images to land cover mapping in detailed categories at large
scale. To fill this gap, we present a large-scale land cover dataset,
Five-Billion-Pixels. It contains more than 5 billion labeled pixels of 150
high-resolution Gaofen-2 (4 m) satellite images, annotated in a 24-category
system covering artificial-constructed, agricultural, and natural classes. In
addition, we propose a deep-learning-based unsupervised domain adaptation
approach that can transfer classification models trained on labeled dataset
(referred to as the source domain) to unlabeled data (referred to as the target
domain) for large-scale land cover mapping. Specifically, we introduce an
end-to-end Siamese network employing dynamic pseudo-label assignment and class
balancing strategy to perform adaptive domain joint learning. To validate the
generalizability of our dataset and the proposed approach across different
sensors and different geographical regions, we carry out land cover mapping on
five megacities in China and six cities in other five Asian countries severally
using: PlanetScope (3 m), Gaofen-1 (8 m), and Sentinel-2 (10 m) satellite
images. Over a total study area of 60,000 square kilometers, the experiments
show promising results even though the input images are entirely unlabeled. The
proposed approach, trained with the Five-Billion-Pixels dataset, enables
high-quality and detailed land cover mapping across the whole country of China
and some other Asian countries at meter-resolution.
|
[
{
"version": "v1",
"created": "Thu, 1 Sep 2022 21:00:23 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Apr 2023 13:22:01 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Tong",
"Xin-Yi",
""
],
[
"Xia",
"Gui-Song",
""
],
[
"Zhu",
"Xiao Xiang",
""
]
] |
TITLE: Enabling Country-Scale Land Cover Mapping with Meter-Resolution
Satellite Imagery
ABSTRACT: High-resolution satellite images can provide abundant, detailed spatial
information for land cover classification, which is particularly important for
studying the complicated built environment. However, due to the complex land
cover patterns, the costly training sample collections, and the severe
distribution shifts of satellite imageries, few studies have applied
high-resolution images to land cover mapping in detailed categories at large
scale. To fill this gap, we present a large-scale land cover dataset,
Five-Billion-Pixels. It contains more than 5 billion labeled pixels of 150
high-resolution Gaofen-2 (4 m) satellite images, annotated in a 24-category
system covering artificial-constructed, agricultural, and natural classes. In
addition, we propose a deep-learning-based unsupervised domain adaptation
approach that can transfer classification models trained on labeled dataset
(referred to as the source domain) to unlabeled data (referred to as the target
domain) for large-scale land cover mapping. Specifically, we introduce an
end-to-end Siamese network employing dynamic pseudo-label assignment and class
balancing strategy to perform adaptive domain joint learning. To validate the
generalizability of our dataset and the proposed approach across different
sensors and different geographical regions, we carry out land cover mapping on
five megacities in China and six cities in other five Asian countries severally
using: PlanetScope (3 m), Gaofen-1 (8 m), and Sentinel-2 (10 m) satellite
images. Over a total study area of 60,000 square kilometers, the experiments
show promising results even though the input images are entirely unlabeled. The
proposed approach, trained with the Five-Billion-Pixels dataset, enables
high-quality and detailed land cover mapping across the whole country of China
and some other Asian countries at meter-resolution.
|
new_dataset
| 0.599661
|
2209.09339
|
Emily Wang
|
Emily L. Wang, Luca Luceri, Francesco Pierri, Emilio Ferrara
|
Identifying and Characterizing Behavioral Classes of Radicalization
within the QAnon Conspiracy on Twitter
|
12 pages, 11 figures, 2 tables
|
The 17th International AAAI Conference on Web and Social Media
(ICWSM 2023)
| null | null |
cs.SI
|
http://creativecommons.org/licenses/by-nc-nd/4.0/
|
Social media provide a fertile ground where conspiracy theories and radical
ideas can flourish, reach broad audiences, and sometimes lead to hate or
violence beyond the online world itself. QAnon represents a notable example of
a political conspiracy that started out on social media but turned mainstream,
in part due to public endorsement by influential political figures. Nowadays,
QAnon conspiracies often appear in the news, are part of political rhetoric,
and are espoused by significant swaths of people in the United States. It is
therefore crucial to understand how such a conspiracy took root online, and
what led so many social media users to adopt its ideas. In this work, we
propose a framework that exploits both social interaction and content signals
to uncover evidence of user radicalization or support for QAnon. Leveraging a
large dataset of 240M tweets collected in the run-up to the 2020 US
Presidential election, we define and validate a multivariate metric of
radicalization. We use that to separate users in distinct, naturally-emerging,
classes of behaviors associated to radicalization processes, from self-declared
QAnon supporters to hyper-active conspiracy promoters. We also analyze the
impact of Twitter's moderation policies on the interactions among different
classes: we discover aspects of moderation that succeed, yielding a substantial
reduction in the endorsement received by hyper-active QAnon accounts. But we
also uncover where moderation fails, showing how QAnon content amplifiers are
not deterred or affected by Twitter intervention. Our findings refine our
understanding of online radicalization processes, reveal effective and
ineffective aspects of moderation, and call for the need to further investigate
the role social media play in the spread of conspiracies.
|
[
{
"version": "v1",
"created": "Mon, 19 Sep 2022 20:39:22 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Sep 2022 16:25:40 GMT"
},
{
"version": "v3",
"created": "Sun, 30 Oct 2022 02:28:54 GMT"
},
{
"version": "v4",
"created": "Mon, 28 Nov 2022 18:17:26 GMT"
},
{
"version": "v5",
"created": "Thu, 6 Apr 2023 23:40:09 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Wang",
"Emily L.",
""
],
[
"Luceri",
"Luca",
""
],
[
"Pierri",
"Francesco",
""
],
[
"Ferrara",
"Emilio",
""
]
] |
TITLE: Identifying and Characterizing Behavioral Classes of Radicalization
within the QAnon Conspiracy on Twitter
ABSTRACT: Social media provide a fertile ground where conspiracy theories and radical
ideas can flourish, reach broad audiences, and sometimes lead to hate or
violence beyond the online world itself. QAnon represents a notable example of
a political conspiracy that started out on social media but turned mainstream,
in part due to public endorsement by influential political figures. Nowadays,
QAnon conspiracies often appear in the news, are part of political rhetoric,
and are espoused by significant swaths of people in the United States. It is
therefore crucial to understand how such a conspiracy took root online, and
what led so many social media users to adopt its ideas. In this work, we
propose a framework that exploits both social interaction and content signals
to uncover evidence of user radicalization or support for QAnon. Leveraging a
large dataset of 240M tweets collected in the run-up to the 2020 US
Presidential election, we define and validate a multivariate metric of
radicalization. We use that to separate users in distinct, naturally-emerging,
classes of behaviors associated to radicalization processes, from self-declared
QAnon supporters to hyper-active conspiracy promoters. We also analyze the
impact of Twitter's moderation policies on the interactions among different
classes: we discover aspects of moderation that succeed, yielding a substantial
reduction in the endorsement received by hyper-active QAnon accounts. But we
also uncover where moderation fails, showing how QAnon content amplifiers are
not deterred or affected by Twitter intervention. Our findings refine our
understanding of online radicalization processes, reveal effective and
ineffective aspects of moderation, and call for the need to further investigate
the role social media play in the spread of conspiracies.
|
no_new_dataset
| 0.630258
|
2210.05810
|
Xi Ye
|
Xi Ye, Guillaume-Alexandre Bilodeau
|
A unified model for continuous conditional video prediction
|
Accepted by CVPR2023 Workshop
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Different conditional video prediction tasks, like video future frame
prediction and video frame interpolation, are normally solved by task-related
models even though they share many common underlying characteristics.
Furthermore, almost all conditional video prediction models can only achieve
discrete prediction. In this paper, we propose a unified model that addresses
these two issues at the same time. We show that conditional video prediction
can be formulated as a neural process, which maps input spatio-temporal
coordinates to target pixel values given context spatio-temporal coordinates
and context pixel values. Specifically, we feed the implicit neural
representation of coordinates and context pixel features into a
Transformer-based non-autoregressive conditional video prediction model. Our
task-specific models outperform previous work for video future frame prediction
and video interpolation on multiple datasets. Importantly, the model is able to
interpolate or predict with an arbitrary high frame rate, i.e., continuous
prediction. Our source code is available at \url{https://npvp.github.io}.
|
[
{
"version": "v1",
"created": "Tue, 11 Oct 2022 22:26:59 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2023 17:00:54 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Ye",
"Xi",
""
],
[
"Bilodeau",
"Guillaume-Alexandre",
""
]
] |
TITLE: A unified model for continuous conditional video prediction
ABSTRACT: Different conditional video prediction tasks, like video future frame
prediction and video frame interpolation, are normally solved by task-related
models even though they share many common underlying characteristics.
Furthermore, almost all conditional video prediction models can only achieve
discrete prediction. In this paper, we propose a unified model that addresses
these two issues at the same time. We show that conditional video prediction
can be formulated as a neural process, which maps input spatio-temporal
coordinates to target pixel values given context spatio-temporal coordinates
and context pixel values. Specifically, we feed the implicit neural
representation of coordinates and context pixel features into a
Transformer-based non-autoregressive conditional video prediction model. Our
task-specific models outperform previous work for video future frame prediction
and video interpolation on multiple datasets. Importantly, the model is able to
interpolate or predict with an arbitrary high frame rate, i.e., continuous
prediction. Our source code is available at \url{https://npvp.github.io}.
|
no_new_dataset
| 0.711418
|
2210.15446
|
Jiebao Zhang
|
Jiebao Zhang, Wenhua Qian, Rencan Nie, Jinde Cao, Dan Xu
|
LP-BFGS attack: An adversarial attack based on the Hessian with limited
pixels
|
15 pages, 7 figures
| null | null | null |
cs.CR cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Deep neural networks are vulnerable to adversarial attacks. Most $L_{0}$-norm
based white-box attacks craft perturbations by the gradient of models to the
input. Since the computation cost and memory limitation of calculating the
Hessian matrix, the application of Hessian or approximate Hessian in white-box
attacks is gradually shelved. In this work, we note that the sparsity
requirement on perturbations naturally lends itself to the usage of Hessian
information. We study the attack performance and computation cost of the attack
method based on the Hessian with a limited number of perturbation pixels.
Specifically, we propose the Limited Pixel BFGS (LP-BFGS) attack method by
incorporating the perturbation pixel selection strategy and the BFGS algorithm.
Pixels with top-k attribution scores calculated by the Integrated Gradient
method are regarded as optimization variables of the LP-BFGS attack.
Experimental results across different networks and datasets demonstrate that
our approach has comparable attack ability with reasonable computation in
different numbers of perturbation pixels compared with existing solutions.
|
[
{
"version": "v1",
"created": "Wed, 26 Oct 2022 03:16:20 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Apr 2023 01:02:43 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Zhang",
"Jiebao",
""
],
[
"Qian",
"Wenhua",
""
],
[
"Nie",
"Rencan",
""
],
[
"Cao",
"Jinde",
""
],
[
"Xu",
"Dan",
""
]
] |
TITLE: LP-BFGS attack: An adversarial attack based on the Hessian with limited
pixels
ABSTRACT: Deep neural networks are vulnerable to adversarial attacks. Most $L_{0}$-norm
based white-box attacks craft perturbations by the gradient of models to the
input. Since the computation cost and memory limitation of calculating the
Hessian matrix, the application of Hessian or approximate Hessian in white-box
attacks is gradually shelved. In this work, we note that the sparsity
requirement on perturbations naturally lends itself to the usage of Hessian
information. We study the attack performance and computation cost of the attack
method based on the Hessian with a limited number of perturbation pixels.
Specifically, we propose the Limited Pixel BFGS (LP-BFGS) attack method by
incorporating the perturbation pixel selection strategy and the BFGS algorithm.
Pixels with top-k attribution scores calculated by the Integrated Gradient
method are regarded as optimization variables of the LP-BFGS attack.
Experimental results across different networks and datasets demonstrate that
our approach has comparable attack ability with reasonable computation in
different numbers of perturbation pixels compared with existing solutions.
|
no_new_dataset
| 0.708635
|
2211.01562
|
Peifeng Wang
|
Peifeng Wang, Aaron Chan, Filip Ilievski, Muhao Chen, Xiang Ren
|
PINTO: Faithful Language Reasoning Using Prompt-Generated Rationales
|
17 pages, 5 figures. Accepted to ICLR 2023
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Neural language models (LMs) have achieved impressive results on various
language-based reasoning tasks by utilizing latent knowledge encoded in their
own pretrained parameters. To make this reasoning process more explicit, recent
works retrieve a rationalizing LM's internal knowledge by training or prompting
it to generate free-text rationales, which can be used to guide task
predictions made by either the same LM or a separate reasoning LM. However,
rationalizing LMs require expensive rationale annotation and/or computation,
without any assurance that their generated rationales improve LM task
performance or faithfully reflect LM decision-making. In this paper, we propose
PINTO, an LM pipeline that rationalizes via prompt-based learning, and learns
to faithfully reason over rationales via counterfactual regularization. First,
PINTO maps out a suitable reasoning process for the task input by prompting a
frozen rationalizing LM to generate a free-text rationale. Second, PINTO's
reasoning LM is fine-tuned to solve the task using the generated rationale as
context, while regularized to output less confident predictions when the
rationale is perturbed. Across four datasets, we show that PINTO significantly
improves the generalization ability of the reasoning LM, yielding higher
performance on both in-distribution and out-of-distribution test sets. Also, we
find that PINTO's rationales are more faithful to its task predictions than
those generated by competitive baselines.
|
[
{
"version": "v1",
"created": "Thu, 3 Nov 2022 02:55:54 GMT"
},
{
"version": "v2",
"created": "Mon, 28 Nov 2022 23:54:15 GMT"
},
{
"version": "v3",
"created": "Thu, 6 Apr 2023 23:49:35 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Wang",
"Peifeng",
""
],
[
"Chan",
"Aaron",
""
],
[
"Ilievski",
"Filip",
""
],
[
"Chen",
"Muhao",
""
],
[
"Ren",
"Xiang",
""
]
] |
TITLE: PINTO: Faithful Language Reasoning Using Prompt-Generated Rationales
ABSTRACT: Neural language models (LMs) have achieved impressive results on various
language-based reasoning tasks by utilizing latent knowledge encoded in their
own pretrained parameters. To make this reasoning process more explicit, recent
works retrieve a rationalizing LM's internal knowledge by training or prompting
it to generate free-text rationales, which can be used to guide task
predictions made by either the same LM or a separate reasoning LM. However,
rationalizing LMs require expensive rationale annotation and/or computation,
without any assurance that their generated rationales improve LM task
performance or faithfully reflect LM decision-making. In this paper, we propose
PINTO, an LM pipeline that rationalizes via prompt-based learning, and learns
to faithfully reason over rationales via counterfactual regularization. First,
PINTO maps out a suitable reasoning process for the task input by prompting a
frozen rationalizing LM to generate a free-text rationale. Second, PINTO's
reasoning LM is fine-tuned to solve the task using the generated rationale as
context, while regularized to output less confident predictions when the
rationale is perturbed. Across four datasets, we show that PINTO significantly
improves the generalization ability of the reasoning LM, yielding higher
performance on both in-distribution and out-of-distribution test sets. Also, we
find that PINTO's rationales are more faithful to its task predictions than
those generated by competitive baselines.
|
no_new_dataset
| 0.711055
|
2212.06301
|
Zihui Xue
|
Zihui Xue, Yale Song, Kristen Grauman, Lorenzo Torresani
|
Egocentric Video Task Translation
|
Accepted by CVPR 2023 (Highlight), Project website:
https://vision.cs.utexas.edu/projects/egot2/
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Different video understanding tasks are typically treated in isolation, and
even with distinct types of curated data (e.g., classifying sports in one
dataset, tracking animals in another). However, in wearable cameras, the
immersive egocentric perspective of a person engaging with the world around
them presents an interconnected web of video understanding tasks -- hand-object
manipulations, navigation in the space, or human-human interactions -- that
unfold continuously, driven by the person's goals. We argue that this calls for
a much more unified approach. We propose EgoTask Translation (EgoT2), which
takes a collection of models optimized on separate tasks and learns to
translate their outputs for improved performance on any or all of them at once.
Unlike traditional transfer or multi-task learning, EgoT2's flipped design
entails separate task-specific backbones and a task translator shared across
all tasks, which captures synergies between even heterogeneous tasks and
mitigates task competition. Demonstrating our model on a wide array of video
tasks from Ego4D, we show its advantages over existing transfer paradigms and
achieve top-ranked results on four of the Ego4D 2022 benchmark challenges.
|
[
{
"version": "v1",
"created": "Tue, 13 Dec 2022 00:47:13 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2023 21:39:04 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Xue",
"Zihui",
""
],
[
"Song",
"Yale",
""
],
[
"Grauman",
"Kristen",
""
],
[
"Torresani",
"Lorenzo",
""
]
] |
TITLE: Egocentric Video Task Translation
ABSTRACT: Different video understanding tasks are typically treated in isolation, and
even with distinct types of curated data (e.g., classifying sports in one
dataset, tracking animals in another). However, in wearable cameras, the
immersive egocentric perspective of a person engaging with the world around
them presents an interconnected web of video understanding tasks -- hand-object
manipulations, navigation in the space, or human-human interactions -- that
unfold continuously, driven by the person's goals. We argue that this calls for
a much more unified approach. We propose EgoTask Translation (EgoT2), which
takes a collection of models optimized on separate tasks and learns to
translate their outputs for improved performance on any or all of them at once.
Unlike traditional transfer or multi-task learning, EgoT2's flipped design
entails separate task-specific backbones and a task translator shared across
all tasks, which captures synergies between even heterogeneous tasks and
mitigates task competition. Demonstrating our model on a wide array of video
tasks from Ego4D, we show its advantages over existing transfer paradigms and
achieve top-ranked results on four of the Ego4D 2022 benchmark challenges.
|
no_new_dataset
| 0.704986
|
2212.12952
|
Tiange Luo
|
Tiange Luo, Honglak Lee, Justin Johnson
|
Neural Shape Compiler: A Unified Framework for Transforming between
Text, Point Cloud, and Program
|
TMLR; project page:
https://tiangeluo.github.io/projectpages/shapecompiler.html
| null | null | null |
cs.CV cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
3D shapes have complementary abstractions from low-level geometry to
part-based hierarchies to languages, which convey different levels of
information. This paper presents a unified framework to translate between pairs
of shape abstractions: $\textit{Text}$ $\Longleftrightarrow$ $\textit{Point
Cloud}$ $\Longleftrightarrow$ $\textit{Program}$. We propose $\textbf{Neural
Shape Compiler}$ to model the abstraction transformation as a conditional
generation process. It converts 3D shapes of three abstract types into unified
discrete shape code, transforms each shape code into code of other abstract
types through the proposed $\textit{ShapeCode Transformer}$, and decodes them
to output the target shape abstraction. Point Cloud code is obtained in a
class-agnostic way by the proposed $\textit{Point}$VQVAE. On Text2Shape,
ShapeGlot, ABO, Genre, and Program Synthetic datasets, Neural Shape Compiler
shows strengths in $\textit{Text}$ $\Longrightarrow$ $\textit{Point Cloud}$,
$\textit{Point Cloud}$ $\Longrightarrow$ $\textit{Text}$, $\textit{Point
Cloud}$ $\Longrightarrow$ $\textit{Program}$, and Point Cloud Completion tasks.
Additionally, Neural Shape Compiler benefits from jointly training on all
heterogeneous data and tasks.
|
[
{
"version": "v1",
"created": "Sun, 25 Dec 2022 19:56:21 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2023 20:39:16 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Luo",
"Tiange",
""
],
[
"Lee",
"Honglak",
""
],
[
"Johnson",
"Justin",
""
]
] |
TITLE: Neural Shape Compiler: A Unified Framework for Transforming between
Text, Point Cloud, and Program
ABSTRACT: 3D shapes have complementary abstractions from low-level geometry to
part-based hierarchies to languages, which convey different levels of
information. This paper presents a unified framework to translate between pairs
of shape abstractions: $\textit{Text}$ $\Longleftrightarrow$ $\textit{Point
Cloud}$ $\Longleftrightarrow$ $\textit{Program}$. We propose $\textbf{Neural
Shape Compiler}$ to model the abstraction transformation as a conditional
generation process. It converts 3D shapes of three abstract types into unified
discrete shape code, transforms each shape code into code of other abstract
types through the proposed $\textit{ShapeCode Transformer}$, and decodes them
to output the target shape abstraction. Point Cloud code is obtained in a
class-agnostic way by the proposed $\textit{Point}$VQVAE. On Text2Shape,
ShapeGlot, ABO, Genre, and Program Synthetic datasets, Neural Shape Compiler
shows strengths in $\textit{Text}$ $\Longrightarrow$ $\textit{Point Cloud}$,
$\textit{Point Cloud}$ $\Longrightarrow$ $\textit{Text}$, $\textit{Point
Cloud}$ $\Longrightarrow$ $\textit{Program}$, and Point Cloud Completion tasks.
Additionally, Neural Shape Compiler benefits from jointly training on all
heterogeneous data and tasks.
|
no_new_dataset
| 0.709447
|
2301.00004
|
Pan Tan
|
Mingchen Li, Liqi Kang, Yi Xiong, Yu Guang Wang, Guisheng Fan, Pan
Tan, Liang Hong
|
SESNet: sequence-structure feature-integrated deep learning method for
data-efficient protein engineering
| null |
Journal of Cheminformatics (2023) 15:12
|
10.1186/s13321-023-00688-x
| null |
q-bio.QM cs.LG
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
Deep learning has been widely used for protein engineering. However, it is
limited by the lack of sufficient experimental data to train an accurate model
for predicting the functional fitness of high-order mutants. Here, we develop
SESNet, a supervised deep-learning model to predict the fitness for protein
mutants by leveraging both sequence and structure information, and exploiting
attention mechanism. Our model integrates local evolutionary context from
homologous sequences, the global evolutionary context encoding rich semantic
from the universal protein sequence space and the structure information
accounting for the microenvironment around each residue in a protein. We show
that SESNet outperforms state-of-the-art models for predicting the
sequence-function relationship on 26 deep mutational scanning datasets. More
importantly, we propose a data augmentation strategy by leveraging the data
from unsupervised models to pre-train our model. After that, our model can
achieve strikingly high accuracy in prediction of the fitness of protein
mutants, especially for the higher order variants (> 4 mutation sites), when
finetuned by using only a small number of experimental mutation data (<50). The
strategy proposed is of great practical value as the required experimental
effort, i.e., producing a few tens of experimental mutation data on a given
protein, is generally affordable by an ordinary biochemical group and can be
applied on almost any protein.
|
[
{
"version": "v1",
"created": "Thu, 29 Dec 2022 01:49:52 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Li",
"Mingchen",
""
],
[
"Kang",
"Liqi",
""
],
[
"Xiong",
"Yi",
""
],
[
"Wang",
"Yu Guang",
""
],
[
"Fan",
"Guisheng",
""
],
[
"Tan",
"Pan",
""
],
[
"Hong",
"Liang",
""
]
] |
TITLE: SESNet: sequence-structure feature-integrated deep learning method for
data-efficient protein engineering
ABSTRACT: Deep learning has been widely used for protein engineering. However, it is
limited by the lack of sufficient experimental data to train an accurate model
for predicting the functional fitness of high-order mutants. Here, we develop
SESNet, a supervised deep-learning model to predict the fitness for protein
mutants by leveraging both sequence and structure information, and exploiting
attention mechanism. Our model integrates local evolutionary context from
homologous sequences, the global evolutionary context encoding rich semantic
from the universal protein sequence space and the structure information
accounting for the microenvironment around each residue in a protein. We show
that SESNet outperforms state-of-the-art models for predicting the
sequence-function relationship on 26 deep mutational scanning datasets. More
importantly, we propose a data augmentation strategy by leveraging the data
from unsupervised models to pre-train our model. After that, our model can
achieve strikingly high accuracy in prediction of the fitness of protein
mutants, especially for the higher order variants (> 4 mutation sites), when
finetuned by using only a small number of experimental mutation data (<50). The
strategy proposed is of great practical value as the required experimental
effort, i.e., producing a few tens of experimental mutation data on a given
protein, is generally affordable by an ordinary biochemical group and can be
applied on almost any protein.
|
no_new_dataset
| 0.711481
|
2301.07284
|
Shangyu Xie
|
Shangyu Xie, Xin Yang, Yuanshun Yao, Tianyi Liu, Taiqing Wang and
Jiankai Sun
|
Label Inference Attack against Split Learning under Regression Setting
|
9 pages
| null | null | null |
cs.CR cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
As a crucial building block in vertical Federated Learning (vFL), Split
Learning (SL) has demonstrated its practice in the two-party model training
collaboration, where one party holds the features of data samples and another
party holds the corresponding labels. Such method is claimed to be private
considering the shared information is only the embedding vectors and gradients
instead of private raw data and labels. However, some recent works have shown
that the private labels could be leaked by the gradients. These existing attack
only works under the classification setting where the private labels are
discrete. In this work, we step further to study the leakage in the scenario of
the regression model, where the private labels are continuous numbers (instead
of discrete labels in classification). This makes previous attacks harder to
infer the continuous labels due to the unbounded output range. To address the
limitation, we propose a novel learning-based attack that integrates gradient
information and extra learning regularization objectives in aspects of model
training properties, which can infer the labels under regression settings
effectively. The comprehensive experiments on various datasets and models have
demonstrated the effectiveness of our proposed attack. We hope our work can
pave the way for future analyses that make the vFL framework more secure.
|
[
{
"version": "v1",
"created": "Wed, 18 Jan 2023 03:17:24 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Apr 2023 05:47:39 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Xie",
"Shangyu",
""
],
[
"Yang",
"Xin",
""
],
[
"Yao",
"Yuanshun",
""
],
[
"Liu",
"Tianyi",
""
],
[
"Wang",
"Taiqing",
""
],
[
"Sun",
"Jiankai",
""
]
] |
TITLE: Label Inference Attack against Split Learning under Regression Setting
ABSTRACT: As a crucial building block in vertical Federated Learning (vFL), Split
Learning (SL) has demonstrated its practice in the two-party model training
collaboration, where one party holds the features of data samples and another
party holds the corresponding labels. Such method is claimed to be private
considering the shared information is only the embedding vectors and gradients
instead of private raw data and labels. However, some recent works have shown
that the private labels could be leaked by the gradients. These existing attack
only works under the classification setting where the private labels are
discrete. In this work, we step further to study the leakage in the scenario of
the regression model, where the private labels are continuous numbers (instead
of discrete labels in classification). This makes previous attacks harder to
infer the continuous labels due to the unbounded output range. To address the
limitation, we propose a novel learning-based attack that integrates gradient
information and extra learning regularization objectives in aspects of model
training properties, which can infer the labels under regression settings
effectively. The comprehensive experiments on various datasets and models have
demonstrated the effectiveness of our proposed attack. We hope our work can
pave the way for future analyses that make the vFL framework more secure.
|
no_new_dataset
| 0.708603
|
2301.09479
|
Jonathan Richard Schwarz
|
Jonathan Richard Schwarz and Jihoon Tack and Yee Whye Teh and Jaeho
Lee and Jinwoo Shin
|
Modality-Agnostic Variational Compression of Implicit Neural
Representations
| null | null | null | null |
stat.ML cs.AI cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce a modality-agnostic neural compression algorithm based on a
functional view of data and parameterised as an Implicit Neural Representation
(INR). Bridging the gap between latent coding and sparsity, we obtain compact
latent representations non-linearly mapped to a soft gating mechanism. This
allows the specialisation of a shared INR network to each data item through
subnetwork selection. After obtaining a dataset of such latent representations,
we directly optimise the rate/distortion trade-off in a modality-agnostic space
using neural compression. Variational Compression of Implicit Neural
Representations (VC-INR) shows improved performance given the same
representational capacity pre quantisation while also outperforming previous
quantisation schemes used for other INR techniques. Our experiments demonstrate
strong results over a large set of diverse modalities using the same algorithm
without any modality-specific inductive biases. We show results on images,
climate data, 3D shapes and scenes as well as audio and video, introducing
VC-INR as the first INR-based method to outperform codecs as well-known and
diverse as JPEG 2000, MP3 and AVC/HEVC on their respective modalities.
|
[
{
"version": "v1",
"created": "Mon, 23 Jan 2023 15:22:42 GMT"
},
{
"version": "v2",
"created": "Mon, 6 Feb 2023 15:24:37 GMT"
},
{
"version": "v3",
"created": "Fri, 7 Apr 2023 11:29:26 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Schwarz",
"Jonathan Richard",
""
],
[
"Tack",
"Jihoon",
""
],
[
"Teh",
"Yee Whye",
""
],
[
"Lee",
"Jaeho",
""
],
[
"Shin",
"Jinwoo",
""
]
] |
TITLE: Modality-Agnostic Variational Compression of Implicit Neural
Representations
ABSTRACT: We introduce a modality-agnostic neural compression algorithm based on a
functional view of data and parameterised as an Implicit Neural Representation
(INR). Bridging the gap between latent coding and sparsity, we obtain compact
latent representations non-linearly mapped to a soft gating mechanism. This
allows the specialisation of a shared INR network to each data item through
subnetwork selection. After obtaining a dataset of such latent representations,
we directly optimise the rate/distortion trade-off in a modality-agnostic space
using neural compression. Variational Compression of Implicit Neural
Representations (VC-INR) shows improved performance given the same
representational capacity pre quantisation while also outperforming previous
quantisation schemes used for other INR techniques. Our experiments demonstrate
strong results over a large set of diverse modalities using the same algorithm
without any modality-specific inductive biases. We show results on images,
climate data, 3D shapes and scenes as well as audio and video, introducing
VC-INR as the first INR-based method to outperform codecs as well-known and
diverse as JPEG 2000, MP3 and AVC/HEVC on their respective modalities.
|
no_new_dataset
| 0.70562
|
2302.09051
|
Xavier Daull
|
Xavier Daull, Patrice Bellot, Emmanuel Bruno, Vincent Martin,
Elisabeth Murisasco
|
Complex QA and language models hybrid architectures, Survey
| null | null | null | null |
cs.CL cs.AI cs.IR cs.LG
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
This paper reviews the state-of-the-art of language models architectures and
strategies for "complex" question-answering (QA, CQA, CPS) with a focus on
hybridization. Large Language Models (LLM) are good at leveraging public data
on standard problems but once you want to tackle more specific complex
questions or problems (e.g. How does the concept of personal freedom vary
between different cultures ? What is the best mix of power generation methods
to reduce climate change ?) you may need specific architecture, knowledge,
skills, methods, sensitive data protection, explainability, human approval and
versatile feedback... Recent projects like ChatGPT and GALACTICA have allowed
non-specialists to grasp the great potential as well as the equally strong
limitations of LLM in complex QA. In this paper, we start by reviewing required
skills and evaluation techniques. We integrate findings from the robust
community edited research papers BIG, BLOOM and HELM which open source,
benchmark and analyze limits and challenges of LLM in terms of tasks complexity
and strict evaluation on accuracy (e.g. fairness, robustness, toxicity, ...) as
a baseline. We discuss some challenges associated with complex QA, including
domain adaptation, decomposition and efficient multi-step QA, long form and
non-factoid QA, safety and multi-sensitivity data protection, multimodal
search, hallucinations, explainability and truthfulness, temporal reasoning. We
analyze current solutions and promising research trends, using elements such
as: hybrid LLM architectural patterns, training and prompting strategies,
active human reinforcement learning supervised with AI, neuro-symbolic and
structured knowledge grounding, program synthesis, iterated decomposition and
others.
|
[
{
"version": "v1",
"created": "Fri, 17 Feb 2023 18:31:31 GMT"
},
{
"version": "v2",
"created": "Mon, 6 Mar 2023 21:46:08 GMT"
},
{
"version": "v3",
"created": "Thu, 9 Mar 2023 17:25:10 GMT"
},
{
"version": "v4",
"created": "Fri, 7 Apr 2023 16:37:35 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Daull",
"Xavier",
""
],
[
"Bellot",
"Patrice",
""
],
[
"Bruno",
"Emmanuel",
""
],
[
"Martin",
"Vincent",
""
],
[
"Murisasco",
"Elisabeth",
""
]
] |
TITLE: Complex QA and language models hybrid architectures, Survey
ABSTRACT: This paper reviews the state-of-the-art of language models architectures and
strategies for "complex" question-answering (QA, CQA, CPS) with a focus on
hybridization. Large Language Models (LLM) are good at leveraging public data
on standard problems but once you want to tackle more specific complex
questions or problems (e.g. How does the concept of personal freedom vary
between different cultures ? What is the best mix of power generation methods
to reduce climate change ?) you may need specific architecture, knowledge,
skills, methods, sensitive data protection, explainability, human approval and
versatile feedback... Recent projects like ChatGPT and GALACTICA have allowed
non-specialists to grasp the great potential as well as the equally strong
limitations of LLM in complex QA. In this paper, we start by reviewing required
skills and evaluation techniques. We integrate findings from the robust
community edited research papers BIG, BLOOM and HELM which open source,
benchmark and analyze limits and challenges of LLM in terms of tasks complexity
and strict evaluation on accuracy (e.g. fairness, robustness, toxicity, ...) as
a baseline. We discuss some challenges associated with complex QA, including
domain adaptation, decomposition and efficient multi-step QA, long form and
non-factoid QA, safety and multi-sensitivity data protection, multimodal
search, hallucinations, explainability and truthfulness, temporal reasoning. We
analyze current solutions and promising research trends, using elements such
as: hybrid LLM architectural patterns, training and prompting strategies,
active human reinforcement learning supervised with AI, neuro-symbolic and
structured knowledge grounding, program synthesis, iterated decomposition and
others.
|
no_new_dataset
| 0.707392
|
2302.14556
|
Lars Reimann
|
Lars Reimann, G\"unter Kniesel-W\"unsche
|
An Alternative to Cells for Selective Execution of Data Science
Pipelines
|
Accepted for the NIER Track of the 45th International Conference on
Software Engineering (ICSE 2023)
| null | null | null |
cs.SE
|
http://creativecommons.org/licenses/by/4.0/
|
Data Scientists often use notebooks to develop Data Science (DS) pipelines,
particularly since they allow to selectively execute parts of the pipeline.
However, notebooks for DS have many well-known flaws. We focus on the following
ones in this paper: (1) Notebooks can become littered with code cells that are
not part of the main DS pipeline but exist solely to make decisions (e.g.
listing the columns of a tabular dataset). (2) While users are allowed to
execute cells in any order, not every ordering is correct, because a cell can
depend on declarations from other cells. (3) After making changes to a cell,
this cell and all cells that depend on changed declarations must be rerun. (4)
Changes to external values necessitate partial re-execution of the notebook.
(5) Since cells are the smallest unit of execution, code that is unaffected by
changes, can inadvertently be re-executed.
To solve these issues, we propose to replace cells as the basis for the
selective execution of DS pipelines. Instead, we suggest populating a
context-menu for variables with actions fitting their type (like listing
columns if the variable is a tabular dataset). These actions are executed based
on a data-flow analysis to ensure dependencies between variables are respected
and results are updated properly after changes. Our solution separates pipeline
code from decision making code and automates dependency management, thus
reducing clutter and the risk of making errors.
|
[
{
"version": "v1",
"created": "Tue, 28 Feb 2023 13:21:04 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Apr 2023 09:57:05 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Reimann",
"Lars",
""
],
[
"Kniesel-Wünsche",
"Günter",
""
]
] |
TITLE: An Alternative to Cells for Selective Execution of Data Science
Pipelines
ABSTRACT: Data Scientists often use notebooks to develop Data Science (DS) pipelines,
particularly since they allow to selectively execute parts of the pipeline.
However, notebooks for DS have many well-known flaws. We focus on the following
ones in this paper: (1) Notebooks can become littered with code cells that are
not part of the main DS pipeline but exist solely to make decisions (e.g.
listing the columns of a tabular dataset). (2) While users are allowed to
execute cells in any order, not every ordering is correct, because a cell can
depend on declarations from other cells. (3) After making changes to a cell,
this cell and all cells that depend on changed declarations must be rerun. (4)
Changes to external values necessitate partial re-execution of the notebook.
(5) Since cells are the smallest unit of execution, code that is unaffected by
changes, can inadvertently be re-executed.
To solve these issues, we propose to replace cells as the basis for the
selective execution of DS pipelines. Instead, we suggest populating a
context-menu for variables with actions fitting their type (like listing
columns if the variable is a tabular dataset). These actions are executed based
on a data-flow analysis to ensure dependencies between variables are respected
and results are updated properly after changes. Our solution separates pipeline
code from decision making code and automates dependency management, thus
reducing clutter and the risk of making errors.
|
no_new_dataset
| 0.709831
|
2303.12755
|
Haoran Ma
|
Haoran Ma
|
Text Semantics to Image Generation: A method of building facades design
base on Stable Diffusion model
|
data mistake
| null | null | null |
cs.CV cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Stable Diffusion model has been extensively employed in the study of
archi-tectural image generation, but there is still an opportunity to enhance
in terms of the controllability of the generated image content. A multi-network
combined text-to-building facade image generating method is proposed in this
work. We first fine-tuned the Stable Diffusion model on the CMP Fa-cades
dataset using the LoRA (Low-Rank Adaptation) approach, then we ap-ply the
ControlNet model to further control the output. Finally, we contrast-ed the
facade generating outcomes under various architectural style text con-tents and
control strategies. The results demonstrate that the LoRA training approach
significantly decreases the possibility of fine-tuning the Stable Dif-fusion
large model, and the addition of the ControlNet model increases the
controllability of the creation of text to building facade images. This
pro-vides a foundation for subsequent studies on the generation of
architectural images.
|
[
{
"version": "v1",
"created": "Thu, 23 Feb 2023 14:03:07 GMT"
},
{
"version": "v2",
"created": "Thu, 23 Mar 2023 01:20:55 GMT"
},
{
"version": "v3",
"created": "Fri, 7 Apr 2023 10:22:34 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Ma",
"Haoran",
""
]
] |
TITLE: Text Semantics to Image Generation: A method of building facades design
base on Stable Diffusion model
ABSTRACT: Stable Diffusion model has been extensively employed in the study of
archi-tectural image generation, but there is still an opportunity to enhance
in terms of the controllability of the generated image content. A multi-network
combined text-to-building facade image generating method is proposed in this
work. We first fine-tuned the Stable Diffusion model on the CMP Fa-cades
dataset using the LoRA (Low-Rank Adaptation) approach, then we ap-ply the
ControlNet model to further control the output. Finally, we contrast-ed the
facade generating outcomes under various architectural style text con-tents and
control strategies. The results demonstrate that the LoRA training approach
significantly decreases the possibility of fine-tuning the Stable Dif-fusion
large model, and the addition of the ControlNet model increases the
controllability of the creation of text to building facade images. This
pro-vides a foundation for subsequent studies on the generation of
architectural images.
|
no_new_dataset
| 0.711262
|
2303.12922
|
Jacob Epifano
|
Jacob R. Epifano, Ravi P. Ramachandran, Aaron J. Masino, Ghulam Rasool
|
Revisiting the Fragility of Influence Functions
|
11 pages, 5 figures, published in Neural Networks
|
Neural Networks 162C (2023) pp. 581-588
|
10.1016/j.neunet.2023.03.029
| null |
cs.LG cs.AI stat.ML stat.OT
|
http://creativecommons.org/licenses/by/4.0/
|
In the last few years, many works have tried to explain the predictions of
deep learning models. Few methods, however, have been proposed to verify the
accuracy or faithfulness of these explanations. Recently, influence functions,
which is a method that approximates the effect that leave-one-out training has
on the loss function, has been shown to be fragile. The proposed reason for
their fragility remains unclear. Although previous work suggests the use of
regularization to increase robustness, this does not hold in all cases. In this
work, we seek to investigate the experiments performed in the prior work in an
effort to understand the underlying mechanisms of influence function fragility.
First, we verify influence functions using procedures from the literature under
conditions where the convexity assumptions of influence functions are met.
Then, we relax these assumptions and study the effects of non-convexity by
using deeper models and more complex datasets. Here, we analyze the key metrics
and procedures that are used to validate influence functions. Our results
indicate that the validation procedures may cause the observed fragility.
|
[
{
"version": "v1",
"created": "Wed, 22 Mar 2023 21:36:56 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Apr 2023 15:46:06 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Epifano",
"Jacob R.",
""
],
[
"Ramachandran",
"Ravi P.",
""
],
[
"Masino",
"Aaron J.",
""
],
[
"Rasool",
"Ghulam",
""
]
] |
TITLE: Revisiting the Fragility of Influence Functions
ABSTRACT: In the last few years, many works have tried to explain the predictions of
deep learning models. Few methods, however, have been proposed to verify the
accuracy or faithfulness of these explanations. Recently, influence functions,
which is a method that approximates the effect that leave-one-out training has
on the loss function, has been shown to be fragile. The proposed reason for
their fragility remains unclear. Although previous work suggests the use of
regularization to increase robustness, this does not hold in all cases. In this
work, we seek to investigate the experiments performed in the prior work in an
effort to understand the underlying mechanisms of influence function fragility.
First, we verify influence functions using procedures from the literature under
conditions where the convexity assumptions of influence functions are met.
Then, we relax these assumptions and study the effects of non-convexity by
using deeper models and more complex datasets. Here, we analyze the key metrics
and procedures that are used to validate influence functions. Our results
indicate that the validation procedures may cause the observed fragility.
|
no_new_dataset
| 0.709019
|
2303.14548
|
Dian Chen
|
Dian Chen, Jie Li, Vitor Guizilini, Rares Ambrus, Adrien Gaidon
|
Viewpoint Equivariance for Multi-View 3D Object Detection
|
11 pages, 4 figures; accepted to CVPR 2023
| null | null | null |
cs.CV cs.AI cs.LG cs.RO
|
http://creativecommons.org/licenses/by/4.0/
|
3D object detection from visual sensors is a cornerstone capability of
robotic systems. State-of-the-art methods focus on reasoning and decoding
object bounding boxes from multi-view camera input. In this work we gain
intuition from the integral role of multi-view consistency in 3D scene
understanding and geometric learning. To this end, we introduce VEDet, a novel
3D object detection framework that exploits 3D multi-view geometry to improve
localization through viewpoint awareness and equivariance. VEDet leverages a
query-based transformer architecture and encodes the 3D scene by augmenting
image features with positional encodings from their 3D perspective geometry. We
design view-conditioned queries at the output level, which enables the
generation of multiple virtual frames during training to learn viewpoint
equivariance by enforcing multi-view consistency. The multi-view geometry
injected at the input level as positional encodings and regularized at the loss
level provides rich geometric cues for 3D object detection, leading to
state-of-the-art performance on the nuScenes benchmark. The code and model are
made available at https://github.com/TRI-ML/VEDet.
|
[
{
"version": "v1",
"created": "Sat, 25 Mar 2023 19:56:41 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Apr 2023 04:59:08 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Chen",
"Dian",
""
],
[
"Li",
"Jie",
""
],
[
"Guizilini",
"Vitor",
""
],
[
"Ambrus",
"Rares",
""
],
[
"Gaidon",
"Adrien",
""
]
] |
TITLE: Viewpoint Equivariance for Multi-View 3D Object Detection
ABSTRACT: 3D object detection from visual sensors is a cornerstone capability of
robotic systems. State-of-the-art methods focus on reasoning and decoding
object bounding boxes from multi-view camera input. In this work we gain
intuition from the integral role of multi-view consistency in 3D scene
understanding and geometric learning. To this end, we introduce VEDet, a novel
3D object detection framework that exploits 3D multi-view geometry to improve
localization through viewpoint awareness and equivariance. VEDet leverages a
query-based transformer architecture and encodes the 3D scene by augmenting
image features with positional encodings from their 3D perspective geometry. We
design view-conditioned queries at the output level, which enables the
generation of multiple virtual frames during training to learn viewpoint
equivariance by enforcing multi-view consistency. The multi-view geometry
injected at the input level as positional encodings and regularized at the loss
level provides rich geometric cues for 3D object detection, leading to
state-of-the-art performance on the nuScenes benchmark. The code and model are
made available at https://github.com/TRI-ML/VEDet.
|
no_new_dataset
| 0.70724
|
2304.01598
|
Fangfang Zhou
|
Dan Zhang, Fangfang Zhou, Yuwen Jiang and Zhengming Fu
|
MM-BSN: Self-Supervised Image Denoising for Real-World with Multi-Mask
based on Blind-Spot Network
|
Accepted by CVPRW 2023
| null | null | null |
cs.CV
|
http://creativecommons.org/licenses/by/4.0/
|
Recent advances in deep learning have been pushing image denoising techniques
to a new level. In self-supervised image denoising, blind-spot network (BSN) is
one of the most common methods. However, most of the existing BSN algorithms
use a dot-based central mask, which is recognized as inefficient for images
with large-scale spatially correlated noise. In this paper, we give the
definition of large-noise and propose a multi-mask strategy using multiple
convolutional kernels masked in different shapes to further break the noise
spatial correlation. Furthermore, we propose a novel self-supervised image
denoising method that combines the multi-mask strategy with BSN (MM-BSN). We
show that different masks can cause significant performance differences, and
the proposed MM-BSN can efficiently fuse the features extracted by multi-masked
layers, while recovering the texture structures destroyed by multi-masking and
information transmission. Our MM-BSN can be used to address the problem of
large-noise denoising, which cannot be efficiently handled by other BSN
methods. Extensive experiments on public real-world datasets demonstrate that
the proposed MM-BSN achieves state-of-the-art performance among self-supervised
and even unpaired image denoising methods for sRGB images denoising, without
any labelling effort or prior knowledge. Code can be found in
https://github.com/dannie125/MM-BSN.
|
[
{
"version": "v1",
"created": "Tue, 4 Apr 2023 07:38:14 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2023 07:01:44 GMT"
},
{
"version": "v3",
"created": "Fri, 7 Apr 2023 09:31:51 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Zhang",
"Dan",
""
],
[
"Zhou",
"Fangfang",
""
],
[
"Jiang",
"Yuwen",
""
],
[
"Fu",
"Zhengming",
""
]
] |
TITLE: MM-BSN: Self-Supervised Image Denoising for Real-World with Multi-Mask
based on Blind-Spot Network
ABSTRACT: Recent advances in deep learning have been pushing image denoising techniques
to a new level. In self-supervised image denoising, blind-spot network (BSN) is
one of the most common methods. However, most of the existing BSN algorithms
use a dot-based central mask, which is recognized as inefficient for images
with large-scale spatially correlated noise. In this paper, we give the
definition of large-noise and propose a multi-mask strategy using multiple
convolutional kernels masked in different shapes to further break the noise
spatial correlation. Furthermore, we propose a novel self-supervised image
denoising method that combines the multi-mask strategy with BSN (MM-BSN). We
show that different masks can cause significant performance differences, and
the proposed MM-BSN can efficiently fuse the features extracted by multi-masked
layers, while recovering the texture structures destroyed by multi-masking and
information transmission. Our MM-BSN can be used to address the problem of
large-noise denoising, which cannot be efficiently handled by other BSN
methods. Extensive experiments on public real-world datasets demonstrate that
the proposed MM-BSN achieves state-of-the-art performance among self-supervised
and even unpaired image denoising methods for sRGB images denoising, without
any labelling effort or prior knowledge. Code can be found in
https://github.com/dannie125/MM-BSN.
|
no_new_dataset
| 0.709655
|
2304.02119
|
Maarten Schoukens
|
Rishi Ramkannan, Gerben I. Beintema, Roland T\'oth, Maarten Schoukens
|
Initialization Approach for Nonlinear State-Space Identification via the
Subspace Encoder Approach
|
Accepted for presentation at the IFAC World Congress 2023
| null | null | null |
eess.SY cs.LG cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The SUBNET neural network architecture has been developed to identify
nonlinear state-space models from input-output data. To achieve this, it
combines the rolled-out nonlinear state-space equations and a state encoder
function, both parameterised as neural networks The encoder function is
introduced to reconstruct the current state from past input-output data. Hence,
it enables the forward simulation of the rolled-out state-space model. While
this approach has shown to provide high-accuracy and consistent model
estimation, its convergence can be significantly improved by efficient
initialization of the training process. This paper focuses on such an
initialisation of the subspace encoder approach using the Best Linear
Approximation (BLA). Using the BLA provided state-space matrices and its
associated reconstructability map, both the state-transition part of the
network and the encoder are initialized. The performance of the improved
initialisation scheme is evaluated on a Wiener-Hammerstein simulation example
and a benchmark dataset. The results show that for a weakly nonlinear system,
the proposed initialisation based on the linear reconstructability map results
in a faster convergence and a better model quality.
|
[
{
"version": "v1",
"created": "Tue, 4 Apr 2023 20:57:34 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2023 21:57:48 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Ramkannan",
"Rishi",
""
],
[
"Beintema",
"Gerben I.",
""
],
[
"Tóth",
"Roland",
""
],
[
"Schoukens",
"Maarten",
""
]
] |
TITLE: Initialization Approach for Nonlinear State-Space Identification via the
Subspace Encoder Approach
ABSTRACT: The SUBNET neural network architecture has been developed to identify
nonlinear state-space models from input-output data. To achieve this, it
combines the rolled-out nonlinear state-space equations and a state encoder
function, both parameterised as neural networks The encoder function is
introduced to reconstruct the current state from past input-output data. Hence,
it enables the forward simulation of the rolled-out state-space model. While
this approach has shown to provide high-accuracy and consistent model
estimation, its convergence can be significantly improved by efficient
initialization of the training process. This paper focuses on such an
initialisation of the subspace encoder approach using the Best Linear
Approximation (BLA). Using the BLA provided state-space matrices and its
associated reconstructability map, both the state-transition part of the
network and the encoder are initialized. The performance of the improved
initialisation scheme is evaluated on a Wiener-Hammerstein simulation example
and a benchmark dataset. The results show that for a weakly nonlinear system,
the proposed initialisation based on the linear reconstructability map results
in a faster convergence and a better model quality.
|
no_new_dataset
| 0.710258
|
2304.02891
|
Prakash Chourasia
|
Sarwan Ali, Prakash Chourasia, Zahra Tayebi, Babatunde Bello, Murray
Patterson
|
ViralVectors: Compact and Scalable Alignment-free Virome Feature
Generation
|
24 pages, 5 figures, accepted to Springer Medical & Biological
Engineering & Computing
| null | null | null |
q-bio.GN cs.LG
|
http://creativecommons.org/licenses/by/4.0/
|
The amount of sequencing data for SARS-CoV-2 is several orders of magnitude
larger than any virus. This will continue to grow geometrically for SARS-CoV-2,
and other viruses, as many countries heavily finance genomic surveillance
efforts. Hence, we need methods for processing large amounts of sequence data
to allow for effective yet timely decision-making. Such data will come from
heterogeneous sources: aligned, unaligned, or even unassembled raw nucleotide
or amino acid sequencing reads pertaining to the whole genome or regions (e.g.,
spike) of interest. In this work, we propose \emph{ViralVectors}, a compact
feature vector generation from virome sequencing data that allows effective
downstream analysis. Such generation is based on \emph{minimizers}, a type of
lightweight "signature" of a sequence, used traditionally in assembly and read
mapping -- to our knowledge, the first use minimizers in this way. We validate
our approach on different types of sequencing data: (a) 2.5M SARS-CoV-2 spike
sequences (to show scalability); (b) 3K Coronaviridae spike sequences (to show
robustness to more genomic variability); and (c) 4K raw WGS reads sets taken
from nasal-swab PCR tests (to show the ability to process unassembled reads).
Our results show that ViralVectors outperforms current benchmarks in most
classification and clustering tasks.
|
[
{
"version": "v1",
"created": "Thu, 6 Apr 2023 06:46:17 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Apr 2023 11:58:23 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Ali",
"Sarwan",
""
],
[
"Chourasia",
"Prakash",
""
],
[
"Tayebi",
"Zahra",
""
],
[
"Bello",
"Babatunde",
""
],
[
"Patterson",
"Murray",
""
]
] |
TITLE: ViralVectors: Compact and Scalable Alignment-free Virome Feature
Generation
ABSTRACT: The amount of sequencing data for SARS-CoV-2 is several orders of magnitude
larger than any virus. This will continue to grow geometrically for SARS-CoV-2,
and other viruses, as many countries heavily finance genomic surveillance
efforts. Hence, we need methods for processing large amounts of sequence data
to allow for effective yet timely decision-making. Such data will come from
heterogeneous sources: aligned, unaligned, or even unassembled raw nucleotide
or amino acid sequencing reads pertaining to the whole genome or regions (e.g.,
spike) of interest. In this work, we propose \emph{ViralVectors}, a compact
feature vector generation from virome sequencing data that allows effective
downstream analysis. Such generation is based on \emph{minimizers}, a type of
lightweight "signature" of a sequence, used traditionally in assembly and read
mapping -- to our knowledge, the first use minimizers in this way. We validate
our approach on different types of sequencing data: (a) 2.5M SARS-CoV-2 spike
sequences (to show scalability); (b) 3K Coronaviridae spike sequences (to show
robustness to more genomic variability); and (c) 4K raw WGS reads sets taken
from nasal-swab PCR tests (to show the ability to process unassembled reads).
Our results show that ViralVectors outperforms current benchmarks in most
classification and clustering tasks.
|
no_new_dataset
| 0.711625
|
2304.02906
|
Christos Koutlis
|
Christos Koutlis, Manos Schinas, Symeon Papadopoulos
|
MemeFier: Dual-stage Modality Fusion for Image Meme Classification
|
8 pages, 2 figures, ICMR 2023
| null | null | null |
cs.CV
|
http://creativecommons.org/licenses/by-sa/4.0/
|
Hate speech is a societal problem that has significantly grown through the
Internet. New forms of digital content such as image memes have given rise to
spread of hate using multimodal means, being far more difficult to analyse and
detect compared to the unimodal case. Accurate automatic processing, analysis
and understanding of this kind of content will facilitate the endeavor of
hindering hate speech proliferation through the digital world. To this end, we
propose MemeFier, a deep learning-based architecture for fine-grained
classification of Internet image memes, utilizing a dual-stage modality fusion
module. The first fusion stage produces feature vectors containing modality
alignment information that captures non-trivial connections between the text
and image of a meme. The second fusion stage leverages the power of a
Transformer encoder to learn inter-modality correlations at the token level and
yield an informative representation. Additionally, we consider external
knowledge as an additional input, and background image caption supervision as a
regularizing component. Extensive experiments on three widely adopted
benchmarks, i.e., Facebook Hateful Memes, Memotion7k and MultiOFF, indicate
that our approach competes and in some cases surpasses state-of-the-art. Our
code is available on https://github.com/ckoutlis/memefier.
|
[
{
"version": "v1",
"created": "Thu, 6 Apr 2023 07:36:52 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Apr 2023 06:57:42 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Koutlis",
"Christos",
""
],
[
"Schinas",
"Manos",
""
],
[
"Papadopoulos",
"Symeon",
""
]
] |
TITLE: MemeFier: Dual-stage Modality Fusion for Image Meme Classification
ABSTRACT: Hate speech is a societal problem that has significantly grown through the
Internet. New forms of digital content such as image memes have given rise to
spread of hate using multimodal means, being far more difficult to analyse and
detect compared to the unimodal case. Accurate automatic processing, analysis
and understanding of this kind of content will facilitate the endeavor of
hindering hate speech proliferation through the digital world. To this end, we
propose MemeFier, a deep learning-based architecture for fine-grained
classification of Internet image memes, utilizing a dual-stage modality fusion
module. The first fusion stage produces feature vectors containing modality
alignment information that captures non-trivial connections between the text
and image of a meme. The second fusion stage leverages the power of a
Transformer encoder to learn inter-modality correlations at the token level and
yield an informative representation. Additionally, we consider external
knowledge as an additional input, and background image caption supervision as a
regularizing component. Extensive experiments on three widely adopted
benchmarks, i.e., Facebook Hateful Memes, Memotion7k and MultiOFF, indicate
that our approach competes and in some cases surpasses state-of-the-art. Our
code is available on https://github.com/ckoutlis/memefier.
|
no_new_dataset
| 0.711205
|
2304.03093
|
Chenglong Wang
|
Cheng-Long Wang, Mengdi Huai, Di Wang
|
Inductive Graph Unlearning
|
To appear in the 32nd USENIX Security Symposium, August 2023,
Anaheim, CA, USA
| null | null | null |
cs.LG cs.CR cs.SI
|
http://creativecommons.org/licenses/by/4.0/
|
As a way to implement the "right to be forgotten" in machine learning,
\textit{machine unlearning} aims to completely remove the contributions and
information of the samples to be deleted from a trained model without affecting
the contributions of other samples. Recently, many frameworks for machine
unlearning have been proposed, and most of them focus on image and text data.
To extend machine unlearning to graph data, \textit{GraphEraser} has been
proposed. However, a critical issue is that \textit{GraphEraser} is
specifically designed for the transductive graph setting, where the graph is
static and attributes and edges of test nodes are visible during training. It
is unsuitable for the inductive setting, where the graph could be dynamic and
the test graph information is invisible in advance. Such inductive capability
is essential for production machine learning systems with evolving graphs like
social media and transaction networks. To fill this gap, we propose the
\underline{{\bf G}}\underline{{\bf U}}ided \underline{{\bf I}}n\underline{{\bf
D}}uctiv\underline{{\bf E}} Graph Unlearning framework (GUIDE). GUIDE consists
of three components: guided graph partitioning with fairness and balance,
efficient subgraph repair, and similarity-based aggregation. Empirically, we
evaluate our method on several inductive benchmarks and evolving transaction
graphs. Generally speaking, GUIDE can be efficiently implemented on the
inductive graph learning tasks for its low graph partition cost, no matter on
computation or structure information. The code will be available here:
https://github.com/Happy2Git/GUIDE.
|
[
{
"version": "v1",
"created": "Thu, 6 Apr 2023 14:21:48 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Apr 2023 05:59:48 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Wang",
"Cheng-Long",
""
],
[
"Huai",
"Mengdi",
""
],
[
"Wang",
"Di",
""
]
] |
TITLE: Inductive Graph Unlearning
ABSTRACT: As a way to implement the "right to be forgotten" in machine learning,
\textit{machine unlearning} aims to completely remove the contributions and
information of the samples to be deleted from a trained model without affecting
the contributions of other samples. Recently, many frameworks for machine
unlearning have been proposed, and most of them focus on image and text data.
To extend machine unlearning to graph data, \textit{GraphEraser} has been
proposed. However, a critical issue is that \textit{GraphEraser} is
specifically designed for the transductive graph setting, where the graph is
static and attributes and edges of test nodes are visible during training. It
is unsuitable for the inductive setting, where the graph could be dynamic and
the test graph information is invisible in advance. Such inductive capability
is essential for production machine learning systems with evolving graphs like
social media and transaction networks. To fill this gap, we propose the
\underline{{\bf G}}\underline{{\bf U}}ided \underline{{\bf I}}n\underline{{\bf
D}}uctiv\underline{{\bf E}} Graph Unlearning framework (GUIDE). GUIDE consists
of three components: guided graph partitioning with fairness and balance,
efficient subgraph repair, and similarity-based aggregation. Empirically, we
evaluate our method on several inductive benchmarks and evolving transaction
graphs. Generally speaking, GUIDE can be efficiently implemented on the
inductive graph learning tasks for its low graph partition cost, no matter on
computation or structure information. The code will be available here:
https://github.com/Happy2Git/GUIDE.
|
no_new_dataset
| 0.709252
|
2304.03290
|
Neelesh Mungoli
|
Neelesh Mungoli
|
Adaptive Feature Fusion: Enhancing Generalization in Deep Learning
Models
| null | null | null | null |
cs.CV cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In recent years, deep learning models have demonstrated remarkable success in
various domains, such as computer vision, natural language processing, and
speech recognition. However, the generalization capabilities of these models
can be negatively impacted by the limitations of their feature fusion
techniques. This paper introduces an innovative approach, Adaptive Feature
Fusion (AFF), to enhance the generalization of deep learning models by
dynamically adapting the fusion process of feature representations.
The proposed AFF framework is designed to incorporate fusion layers into
existing deep learning architectures, enabling seamless integration and
improved performance. By leveraging a combination of data-driven and
model-based fusion strategies, AFF is able to adaptively fuse features based on
the underlying data characteristics and model requirements. This paper presents
a detailed description of the AFF framework, including the design and
implementation of fusion layers for various architectures.
Extensive experiments are conducted on multiple benchmark datasets, with the
results demonstrating the superiority of the AFF approach in comparison to
traditional feature fusion techniques. The analysis showcases the effectiveness
of AFF in enhancing generalization capabilities, leading to improved
performance across different tasks and applications.
Finally, the paper discusses various real-world use cases where AFF can be
employed, providing insights into its practical applicability. The conclusion
highlights the potential for future research directions, including the
exploration of advanced fusion strategies and the extension of AFF to other
machine learning paradigms.
|
[
{
"version": "v1",
"created": "Tue, 4 Apr 2023 21:41:38 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Mungoli",
"Neelesh",
""
]
] |
TITLE: Adaptive Feature Fusion: Enhancing Generalization in Deep Learning
Models
ABSTRACT: In recent years, deep learning models have demonstrated remarkable success in
various domains, such as computer vision, natural language processing, and
speech recognition. However, the generalization capabilities of these models
can be negatively impacted by the limitations of their feature fusion
techniques. This paper introduces an innovative approach, Adaptive Feature
Fusion (AFF), to enhance the generalization of deep learning models by
dynamically adapting the fusion process of feature representations.
The proposed AFF framework is designed to incorporate fusion layers into
existing deep learning architectures, enabling seamless integration and
improved performance. By leveraging a combination of data-driven and
model-based fusion strategies, AFF is able to adaptively fuse features based on
the underlying data characteristics and model requirements. This paper presents
a detailed description of the AFF framework, including the design and
implementation of fusion layers for various architectures.
Extensive experiments are conducted on multiple benchmark datasets, with the
results demonstrating the superiority of the AFF approach in comparison to
traditional feature fusion techniques. The analysis showcases the effectiveness
of AFF in enhancing generalization capabilities, leading to improved
performance across different tasks and applications.
Finally, the paper discusses various real-world use cases where AFF can be
employed, providing insights into its practical applicability. The conclusion
highlights the potential for future research directions, including the
exploration of advanced fusion strategies and the extension of AFF to other
machine learning paradigms.
|
no_new_dataset
| 0.708011
|
2304.03295
|
Euihyeok Lee
|
Euihyoek Lee, Chulhong Min, Jeaseung Lee, Jin Yu, Seungwoo Kang
|
Automatic Detection of Reactions to Music via Earable Sensing
| null | null | null | null |
cs.SD cs.HC eess.AS
|
http://creativecommons.org/licenses/by-nc-nd/4.0/
|
We present GrooveMeter, a novel system that automatically detects vocal and
motion reactions to music via earable sensing and supports music
engagement-aware applications. To this end, we use smart earbuds as sensing
devices, which are already widely used for music listening, and devise reaction
detection techniques by leveraging an inertial measurement unit (IMU) and a
microphone on earbuds. To explore reactions in daily music-listening
situations, we collect the first kind of dataset, MusicReactionSet, containing
926-minute-long IMU and audio data with 30 participants. With the dataset, we
discover a set of unique challenges in detecting music listening reactions
accurately and robustly using audio and motion sensing. We devise sophisticated
processing pipelines to make reaction detection accurate and efficient. We
present a comprehensive evaluation to examine the performance of reaction
detection and system cost. It shows that GrooveMeter achieves the macro F1
scores of 0.89 for vocal reaction and 0.81 for motion reaction with
leave-one-subject-out cross-validation. More importantly, GrooveMeter shows
higher accuracy and robustness compared to alternative methods. We also show
that our filtering approach reduces 50% or more of the energy overhead.
Finally, we demonstrate the potential use cases through a case study.
|
[
{
"version": "v1",
"created": "Thu, 6 Apr 2023 08:11:03 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Lee",
"Euihyoek",
""
],
[
"Min",
"Chulhong",
""
],
[
"Lee",
"Jeaseung",
""
],
[
"Yu",
"Jin",
""
],
[
"Kang",
"Seungwoo",
""
]
] |
TITLE: Automatic Detection of Reactions to Music via Earable Sensing
ABSTRACT: We present GrooveMeter, a novel system that automatically detects vocal and
motion reactions to music via earable sensing and supports music
engagement-aware applications. To this end, we use smart earbuds as sensing
devices, which are already widely used for music listening, and devise reaction
detection techniques by leveraging an inertial measurement unit (IMU) and a
microphone on earbuds. To explore reactions in daily music-listening
situations, we collect the first kind of dataset, MusicReactionSet, containing
926-minute-long IMU and audio data with 30 participants. With the dataset, we
discover a set of unique challenges in detecting music listening reactions
accurately and robustly using audio and motion sensing. We devise sophisticated
processing pipelines to make reaction detection accurate and efficient. We
present a comprehensive evaluation to examine the performance of reaction
detection and system cost. It shows that GrooveMeter achieves the macro F1
scores of 0.89 for vocal reaction and 0.81 for motion reaction with
leave-one-subject-out cross-validation. More importantly, GrooveMeter shows
higher accuracy and robustness compared to alternative methods. We also show
that our filtering approach reduces 50% or more of the energy overhead.
Finally, we demonstrate the potential use cases through a case study.
|
new_dataset
| 0.714398
|
2304.03369
|
Yunxiao Shi
|
Yunxiao Shi, Hong Cai, Amin Ansari, Fatih Porikli
|
EGA-Depth: Efficient Guided Attention for Self-Supervised Multi-Camera
Depth Estimation
|
CVPR 2023 Workshop on Autonomous Driving
| null | null | null |
cs.CV
|
http://creativecommons.org/licenses/by/4.0/
|
The ubiquitous multi-camera setup on modern autonomous vehicles provides an
opportunity to construct surround-view depth. Existing methods, however, either
perform independent monocular depth estimations on each camera or rely on
computationally heavy self attention mechanisms. In this paper, we propose a
novel guided attention architecture, EGA-Depth, which can improve both the
efficiency and accuracy of self-supervised multi-camera depth estimation. More
specifically, for each camera, we use its perspective view as the query to
cross-reference its neighboring views to derive informative features for this
camera view. This allows the model to perform attention only across views with
considerable overlaps and avoid the costly computations of standard
self-attention. Given its efficiency, EGA-Depth enables us to exploit
higher-resolution visual features, leading to improved accuracy. Furthermore,
EGA-Depth can incorporate more frames from previous time steps as it scales
linearly w.r.t. the number of views and frames. Extensive experiments on two
challenging autonomous driving benchmarks nuScenes and DDAD demonstrate the
efficacy of our proposed EGA-Depth and show that it achieves the new
state-of-the-art in self-supervised multi-camera depth estimation.
|
[
{
"version": "v1",
"created": "Thu, 6 Apr 2023 20:50:28 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Shi",
"Yunxiao",
""
],
[
"Cai",
"Hong",
""
],
[
"Ansari",
"Amin",
""
],
[
"Porikli",
"Fatih",
""
]
] |
TITLE: EGA-Depth: Efficient Guided Attention for Self-Supervised Multi-Camera
Depth Estimation
ABSTRACT: The ubiquitous multi-camera setup on modern autonomous vehicles provides an
opportunity to construct surround-view depth. Existing methods, however, either
perform independent monocular depth estimations on each camera or rely on
computationally heavy self attention mechanisms. In this paper, we propose a
novel guided attention architecture, EGA-Depth, which can improve both the
efficiency and accuracy of self-supervised multi-camera depth estimation. More
specifically, for each camera, we use its perspective view as the query to
cross-reference its neighboring views to derive informative features for this
camera view. This allows the model to perform attention only across views with
considerable overlaps and avoid the costly computations of standard
self-attention. Given its efficiency, EGA-Depth enables us to exploit
higher-resolution visual features, leading to improved accuracy. Furthermore,
EGA-Depth can incorporate more frames from previous time steps as it scales
linearly w.r.t. the number of views and frames. Extensive experiments on two
challenging autonomous driving benchmarks nuScenes and DDAD demonstrate the
efficacy of our proposed EGA-Depth and show that it achieves the new
state-of-the-art in self-supervised multi-camera depth estimation.
|
no_new_dataset
| 0.71039
|
2304.03377
|
Jackie Baek
|
Jackie Baek, Shixin Wang
|
Leveraging Reusability: Improved Competitive Ratio of Greedy for
Reusable Resources
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study online weighted bipartite matching of reusable resources where an
adversarial sequence of requests for resources arrive over time. A resource
that is matched is 'used' for a random duration, drawn independently from a
resource-dependent distribution, after which it returns and is able to be
matched again. We study the performance of the greedy policy, which matches
requests to the resource that yields the highest reward. Previously, it was
known that the greedy policy is 1/2 competitive against a clairvoyant benchmark
that knows the request sequence in advance. In this work, we improve this
result by introducing a parameter that quantifies the degree of reusability of
the resources. Specifically, if p represents the smallest probability over the
usage distributions that a matched resource returns in one time step, the
greedy policy achieves a competitive ratio of $1/(2-p)$. Furthermore, when the
usage distributions are geometric, we establish a stronger competitive ratio of
$(1+p)/2$, which we demonstrate to be tight. Both of these results align with
the known results in the two extreme scenarios: p = 0 corresponds to
non-reusable resources, where 1/2 is known to be tight, while p = 1 corresponds
to every resource returning immediately, where greedy is the optimal policy and
hence the competitive ratio is 1. Finally, we show that both results are robust
to approximations of the greedy policy. Our work demonstrates that the
reusability of resources can enhance performance compared to the non-reusable
setting, and that a simple greedy policy suffices when the degree of
reusability is high. Our insights contribute to the understanding of how
resource reusability can influence the performance of online algorithms, and
highlight the potential for improved performance as the degree of reusability
increases.
|
[
{
"version": "v1",
"created": "Thu, 6 Apr 2023 21:13:53 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Baek",
"Jackie",
""
],
[
"Wang",
"Shixin",
""
]
] |
TITLE: Leveraging Reusability: Improved Competitive Ratio of Greedy for
Reusable Resources
ABSTRACT: We study online weighted bipartite matching of reusable resources where an
adversarial sequence of requests for resources arrive over time. A resource
that is matched is 'used' for a random duration, drawn independently from a
resource-dependent distribution, after which it returns and is able to be
matched again. We study the performance of the greedy policy, which matches
requests to the resource that yields the highest reward. Previously, it was
known that the greedy policy is 1/2 competitive against a clairvoyant benchmark
that knows the request sequence in advance. In this work, we improve this
result by introducing a parameter that quantifies the degree of reusability of
the resources. Specifically, if p represents the smallest probability over the
usage distributions that a matched resource returns in one time step, the
greedy policy achieves a competitive ratio of $1/(2-p)$. Furthermore, when the
usage distributions are geometric, we establish a stronger competitive ratio of
$(1+p)/2$, which we demonstrate to be tight. Both of these results align with
the known results in the two extreme scenarios: p = 0 corresponds to
non-reusable resources, where 1/2 is known to be tight, while p = 1 corresponds
to every resource returning immediately, where greedy is the optimal policy and
hence the competitive ratio is 1. Finally, we show that both results are robust
to approximations of the greedy policy. Our work demonstrates that the
reusability of resources can enhance performance compared to the non-reusable
setting, and that a simple greedy policy suffices when the degree of
reusability is high. Our insights contribute to the understanding of how
resource reusability can influence the performance of online algorithms, and
highlight the potential for improved performance as the degree of reusability
increases.
|
no_new_dataset
| 0.710019
|
2304.03399
|
Alaa Shaker
|
Alaa Shaker, Alaa Aldarf and Igor Bessmertny
|
Using LSTM and GRU With a New Dataset for Named Entity Recognition in
the Arabic Language
|
Proceedings of the 13th Majorov International Conference on Software
Engineering and Computer Systems
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Named entity recognition (NER) is a natural language processing task (NLP),
which aims to identify named entities and classify them like person, location,
organization, etc. In the Arabic language, we can find a considerable size of
unstructured data, and it needs to different preprocessing tool than languages
like (English, Russian, German...). From this point, we can note the importance
of building a new structured dataset to solve the lack of structured data. In
this work, we use the BIOES format to tag the word, which allows us to handle
the nested name entity that consists of more than one sentence and define the
start and the end of the name. The dataset consists of more than thirty-six
thousand records. In addition, this work proposes long short term memory (LSTM)
units and Gated Recurrent Units (GRU) for building the named entity recognition
model in the Arabic language. The models give an approximately good result
(80%) because LSTM and GRU models can find the relationships between the words
of the sentence. Also, use a new library from Google, which is Trax and
platform Colab
|
[
{
"version": "v1",
"created": "Thu, 6 Apr 2023 22:14:02 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Shaker",
"Alaa",
""
],
[
"Aldarf",
"Alaa",
""
],
[
"Bessmertny",
"Igor",
""
]
] |
TITLE: Using LSTM and GRU With a New Dataset for Named Entity Recognition in
the Arabic Language
ABSTRACT: Named entity recognition (NER) is a natural language processing task (NLP),
which aims to identify named entities and classify them like person, location,
organization, etc. In the Arabic language, we can find a considerable size of
unstructured data, and it needs to different preprocessing tool than languages
like (English, Russian, German...). From this point, we can note the importance
of building a new structured dataset to solve the lack of structured data. In
this work, we use the BIOES format to tag the word, which allows us to handle
the nested name entity that consists of more than one sentence and define the
start and the end of the name. The dataset consists of more than thirty-six
thousand records. In addition, this work proposes long short term memory (LSTM)
units and Gated Recurrent Units (GRU) for building the named entity recognition
model in the Arabic language. The models give an approximately good result
(80%) because LSTM and GRU models can find the relationships between the words
of the sentence. Also, use a new library from Google, which is Trax and
platform Colab
|
new_dataset
| 0.718002
|
2304.03400
|
Tu Bui
|
Tu Bui, Shruti Agarwal, Ning Yu and John Collomosse
|
RoSteALS: Robust Steganography using Autoencoder Latent Space
|
accepted to CVPR WMF 2023
| null | null | null |
cs.CV
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
Data hiding such as steganography and invisible watermarking has important
applications in copyright protection, privacy-preserved communication and
content provenance. Existing works often fall short in either preserving image
quality, or robustness against perturbations or are too complex to train. We
propose RoSteALS, a practical steganography technique leveraging frozen
pretrained autoencoders to free the payload embedding from learning the
distribution of cover images. RoSteALS has a light-weight secret encoder of
just 300k parameters, is easy to train, has perfect secret recovery performance
and comparable image quality on three benchmarks. Additionally, RoSteALS can be
adapted for novel cover-less steganography applications in which the cover
image can be sampled from noise or conditioned on text prompts via a denoising
diffusion process. Our model and code are available at
\url{https://github.com/TuBui/RoSteALS}.
|
[
{
"version": "v1",
"created": "Thu, 6 Apr 2023 22:14:26 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Bui",
"Tu",
""
],
[
"Agarwal",
"Shruti",
""
],
[
"Yu",
"Ning",
""
],
[
"Collomosse",
"John",
""
]
] |
TITLE: RoSteALS: Robust Steganography using Autoencoder Latent Space
ABSTRACT: Data hiding such as steganography and invisible watermarking has important
applications in copyright protection, privacy-preserved communication and
content provenance. Existing works often fall short in either preserving image
quality, or robustness against perturbations or are too complex to train. We
propose RoSteALS, a practical steganography technique leveraging frozen
pretrained autoencoders to free the payload embedding from learning the
distribution of cover images. RoSteALS has a light-weight secret encoder of
just 300k parameters, is easy to train, has perfect secret recovery performance
and comparable image quality on three benchmarks. Additionally, RoSteALS can be
adapted for novel cover-less steganography applications in which the cover
image can be sampled from noise or conditioned on text prompts via a denoising
diffusion process. Our model and code are available at
\url{https://github.com/TuBui/RoSteALS}.
|
no_new_dataset
| 0.708635
|
2304.03406
|
Xiangyi Yan
|
Xiangyi Yan, Junayed Naushad, Chenyu You, Hao Tang, Shanlin Sun, Kun
Han, Haoyu Ma, James Duncan, Xiaohui Xie
|
Localized Region Contrast for Enhancing Self-Supervised Learning in
Medical Image Segmentation
| null | null | null | null |
cs.CV cs.AI cs.LG
|
http://creativecommons.org/licenses/by/4.0/
|
Recent advancements in self-supervised learning have demonstrated that
effective visual representations can be learned from unlabeled images. This has
led to increased interest in applying self-supervised learning to the medical
domain, where unlabeled images are abundant and labeled images are difficult to
obtain. However, most self-supervised learning approaches are modeled as image
level discriminative or generative proxy tasks, which may not capture the finer
level representations necessary for dense prediction tasks like multi-organ
segmentation. In this paper, we propose a novel contrastive learning framework
that integrates Localized Region Contrast (LRC) to enhance existing
self-supervised pre-training methods for medical image segmentation. Our
approach involves identifying Super-pixels by Felzenszwalb's algorithm and
performing local contrastive learning using a novel contrastive sampling loss.
Through extensive experiments on three multi-organ segmentation datasets, we
demonstrate that integrating LRC to an existing self-supervised method in a
limited annotation setting significantly improves segmentation performance.
Moreover, we show that LRC can also be applied to fully-supervised pre-training
methods to further boost performance.
|
[
{
"version": "v1",
"created": "Thu, 6 Apr 2023 22:43:13 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Yan",
"Xiangyi",
""
],
[
"Naushad",
"Junayed",
""
],
[
"You",
"Chenyu",
""
],
[
"Tang",
"Hao",
""
],
[
"Sun",
"Shanlin",
""
],
[
"Han",
"Kun",
""
],
[
"Ma",
"Haoyu",
""
],
[
"Duncan",
"James",
""
],
[
"Xie",
"Xiaohui",
""
]
] |
TITLE: Localized Region Contrast for Enhancing Self-Supervised Learning in
Medical Image Segmentation
ABSTRACT: Recent advancements in self-supervised learning have demonstrated that
effective visual representations can be learned from unlabeled images. This has
led to increased interest in applying self-supervised learning to the medical
domain, where unlabeled images are abundant and labeled images are difficult to
obtain. However, most self-supervised learning approaches are modeled as image
level discriminative or generative proxy tasks, which may not capture the finer
level representations necessary for dense prediction tasks like multi-organ
segmentation. In this paper, we propose a novel contrastive learning framework
that integrates Localized Region Contrast (LRC) to enhance existing
self-supervised pre-training methods for medical image segmentation. Our
approach involves identifying Super-pixels by Felzenszwalb's algorithm and
performing local contrastive learning using a novel contrastive sampling loss.
Through extensive experiments on three multi-organ segmentation datasets, we
demonstrate that integrating LRC to an existing self-supervised method in a
limited annotation setting significantly improves segmentation performance.
Moreover, we show that LRC can also be applied to fully-supervised pre-training
methods to further boost performance.
|
no_new_dataset
| 0.711074
|
2304.03410
|
Sijie Zhu
|
Sijie Zhu, Linjie Yang, Chen Chen, Mubarak Shah, Xiaohui Shen, Heng
Wang
|
$R^{2}$Former: Unified $R$etrieval and $R$eranking Transformer for Place
Recognition
|
CVPR
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Visual Place Recognition (VPR) estimates the location of query images by
matching them with images in a reference database. Conventional methods
generally adopt aggregated CNN features for global retrieval and RANSAC-based
geometric verification for reranking. However, RANSAC only employs geometric
information but ignores other possible information that could be useful for
reranking, e.g. local feature correlations, and attention values. In this
paper, we propose a unified place recognition framework that handles both
retrieval and reranking with a novel transformer model, named $R^{2}$Former.
The proposed reranking module takes feature correlation, attention value, and
xy coordinates into account, and learns to determine whether the image pair is
from the same location. The whole pipeline is end-to-end trainable and the
reranking module alone can also be adopted on other CNN or transformer
backbones as a generic component. Remarkably, $R^{2}$Former significantly
outperforms state-of-the-art methods on major VPR datasets with much less
inference time and memory consumption. It also achieves the state-of-the-art on
the hold-out MSLS challenge set and could serve as a simple yet strong solution
for real-world large-scale applications. Experiments also show vision
transformer tokens are comparable and sometimes better than CNN local features
on local matching. The code is released at
https://github.com/Jeff-Zilence/R2Former.
|
[
{
"version": "v1",
"created": "Thu, 6 Apr 2023 23:19:32 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Zhu",
"Sijie",
""
],
[
"Yang",
"Linjie",
""
],
[
"Chen",
"Chen",
""
],
[
"Shah",
"Mubarak",
""
],
[
"Shen",
"Xiaohui",
""
],
[
"Wang",
"Heng",
""
]
] |
TITLE: $R^{2}$Former: Unified $R$etrieval and $R$eranking Transformer for Place
Recognition
ABSTRACT: Visual Place Recognition (VPR) estimates the location of query images by
matching them with images in a reference database. Conventional methods
generally adopt aggregated CNN features for global retrieval and RANSAC-based
geometric verification for reranking. However, RANSAC only employs geometric
information but ignores other possible information that could be useful for
reranking, e.g. local feature correlations, and attention values. In this
paper, we propose a unified place recognition framework that handles both
retrieval and reranking with a novel transformer model, named $R^{2}$Former.
The proposed reranking module takes feature correlation, attention value, and
xy coordinates into account, and learns to determine whether the image pair is
from the same location. The whole pipeline is end-to-end trainable and the
reranking module alone can also be adopted on other CNN or transformer
backbones as a generic component. Remarkably, $R^{2}$Former significantly
outperforms state-of-the-art methods on major VPR datasets with much less
inference time and memory consumption. It also achieves the state-of-the-art on
the hold-out MSLS challenge set and could serve as a simple yet strong solution
for real-world large-scale applications. Experiments also show vision
transformer tokens are comparable and sometimes better than CNN local features
on local matching. The code is released at
https://github.com/Jeff-Zilence/R2Former.
|
no_new_dataset
| 0.711418
|
2304.03420
|
Mana Masuda
|
Mana Masuda, Ryo Hachiuma, Ryo Fujii, Hideo Saito, Yusuke Sekikawa
|
Toward Unsupervised 3D Point Cloud Anomaly Detection using Variational
Autoencoder
|
ICIP2021
| null | null | null |
cs.CV
|
http://creativecommons.org/licenses/by-sa/4.0/
|
In this paper, we present an end-to-end unsupervised anomaly detection
framework for 3D point clouds. To the best of our knowledge, this is the first
work to tackle the anomaly detection task on a general object represented by a
3D point cloud. We propose a deep variational autoencoder-based unsupervised
anomaly detection network adapted to the 3D point cloud and an anomaly score
specifically for 3D point clouds. To verify the effectiveness of the model, we
conducted extensive experiments on the ShapeNet dataset. Through quantitative
and qualitative evaluation, we demonstrate that the proposed method outperforms
the baseline method. Our code is available at
https://github.com/llien30/point_cloud_anomaly_detection.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2023 00:02:37 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Masuda",
"Mana",
""
],
[
"Hachiuma",
"Ryo",
""
],
[
"Fujii",
"Ryo",
""
],
[
"Saito",
"Hideo",
""
],
[
"Sekikawa",
"Yusuke",
""
]
] |
TITLE: Toward Unsupervised 3D Point Cloud Anomaly Detection using Variational
Autoencoder
ABSTRACT: In this paper, we present an end-to-end unsupervised anomaly detection
framework for 3D point clouds. To the best of our knowledge, this is the first
work to tackle the anomaly detection task on a general object represented by a
3D point cloud. We propose a deep variational autoencoder-based unsupervised
anomaly detection network adapted to the 3D point cloud and an anomaly score
specifically for 3D point clouds. To verify the effectiveness of the model, we
conducted extensive experiments on the ShapeNet dataset. Through quantitative
and qualitative evaluation, we demonstrate that the proposed method outperforms
the baseline method. Our code is available at
https://github.com/llien30/point_cloud_anomaly_detection.
|
no_new_dataset
| 0.712001
|
2304.03428
|
Shaoyu Chen
|
Shaoyu Chen, Tianheng Cheng, Jiemin Fang, Qian Zhang, Yuan Li, Wenyu
Liu, Xinggang Wang
|
TinyDet: Accurate Small Object Detection in Lightweight Generic
Detectors
| null | null | null | null |
cs.CV
|
http://creativecommons.org/licenses/by/4.0/
|
Small object detection requires the detection head to scan a large number of
positions on image feature maps, which is extremely hard for computation- and
energy-efficient lightweight generic detectors. To accurately detect small
objects with limited computation, we propose a two-stage lightweight detection
framework with extremely low computation complexity, termed as TinyDet. It
enables high-resolution feature maps for dense anchoring to better cover small
objects, proposes a sparsely-connected convolution for computation reduction,
enhances the early stage features in the backbone, and addresses the feature
misalignment problem for accurate small object detection. On the COCO
benchmark, our TinyDet-M achieves 30.3 AP and 13.5 AP^s with only 991 MFLOPs,
which is the first detector that has an AP over 30 with less than 1 GFLOPs;
besides, TinyDet-S and TinyDet-L achieve promising performance under different
computation limitation.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2023 00:45:50 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Chen",
"Shaoyu",
""
],
[
"Cheng",
"Tianheng",
""
],
[
"Fang",
"Jiemin",
""
],
[
"Zhang",
"Qian",
""
],
[
"Li",
"Yuan",
""
],
[
"Liu",
"Wenyu",
""
],
[
"Wang",
"Xinggang",
""
]
] |
TITLE: TinyDet: Accurate Small Object Detection in Lightweight Generic
Detectors
ABSTRACT: Small object detection requires the detection head to scan a large number of
positions on image feature maps, which is extremely hard for computation- and
energy-efficient lightweight generic detectors. To accurately detect small
objects with limited computation, we propose a two-stage lightweight detection
framework with extremely low computation complexity, termed as TinyDet. It
enables high-resolution feature maps for dense anchoring to better cover small
objects, proposes a sparsely-connected convolution for computation reduction,
enhances the early stage features in the backbone, and addresses the feature
misalignment problem for accurate small object detection. On the COCO
benchmark, our TinyDet-M achieves 30.3 AP and 13.5 AP^s with only 991 MFLOPs,
which is the first detector that has an AP over 30 with less than 1 GFLOPs;
besides, TinyDet-S and TinyDet-L achieve promising performance under different
computation limitation.
|
no_new_dataset
| 0.709202
|
2304.03440
|
Takuro Kutsuna
|
Takuro Kutsuna
|
Supervised Contrastive Learning with Heterogeneous Similarity for
Distribution Shifts
|
23 pages, 11 figures, under review
| null | null | null |
cs.LG stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Distribution shifts are problems where the distribution of data changes
between training and testing, which can significantly degrade the performance
of a model deployed in the real world. Recent studies suggest that one reason
for the degradation is a type of overfitting, and that proper regularization
can mitigate the degradation, especially when using highly representative
models such as neural networks. In this paper, we propose a new regularization
using the supervised contrastive learning to prevent such overfitting and to
train models that do not degrade their performance under the distribution
shifts. We extend the cosine similarity in contrastive loss to a more general
similarity measure and propose to use different parameters in the measure when
comparing a sample to a positive or negative example, which is analytically
shown to act as a kind of margin in contrastive loss. Experiments on benchmark
datasets that emulate distribution shifts, including subpopulation shift and
domain generalization, demonstrate the advantage of the proposed method over
existing regularization methods.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2023 01:45:09 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Kutsuna",
"Takuro",
""
]
] |
TITLE: Supervised Contrastive Learning with Heterogeneous Similarity for
Distribution Shifts
ABSTRACT: Distribution shifts are problems where the distribution of data changes
between training and testing, which can significantly degrade the performance
of a model deployed in the real world. Recent studies suggest that one reason
for the degradation is a type of overfitting, and that proper regularization
can mitigate the degradation, especially when using highly representative
models such as neural networks. In this paper, we propose a new regularization
using the supervised contrastive learning to prevent such overfitting and to
train models that do not degrade their performance under the distribution
shifts. We extend the cosine similarity in contrastive loss to a more general
similarity measure and propose to use different parameters in the measure when
comparing a sample to a positive or negative example, which is analytically
shown to act as a kind of margin in contrastive loss. Experiments on benchmark
datasets that emulate distribution shifts, including subpopulation shift and
domain generalization, demonstrate the advantage of the proposed method over
existing regularization methods.
|
no_new_dataset
| 0.711017
|
2304.03441
|
Yulin Yu
|
Yulin Yu, Longqi Yang, Si\^an Lindley, Mengting Wan
|
Large-Scale Analysis of New Employee Network Dynamics
|
Accepted at the International World Wide Web Conference (WWW,2023)
| null |
10.1145/3543507.3583400
| null |
cs.SI physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The COVID-19 pandemic has accelerated digital transformations across
industries, but also introduced new challenges into workplaces, including the
difficulties of effectively socializing with colleagues when working remotely.
This challenge is exacerbated for new employees who need to develop workplace
networks from the outset. In this paper, by analyzing a large-scale telemetry
dataset of more than 10,000 Microsoft employees who joined the company in the
first three months of 2022, we describe how new employees interact and
telecommute with their colleagues during their ``onboarding'' period. Our
results reveal that although new hires are gradually expanding networks over
time, there still exists significant gaps between their network statistics and
those of tenured employees even after the six-month onboarding phase. We also
observe that heterogeneity exists among new employees in how their networks
change over time, where employees whose job tasks do not necessarily require
extensive and diverse connections could be at a disadvantaged position in this
onboarding process. By investigating how web-based people recommendations in
organizational knowledge base facilitate new employees naturally expand their
networks, we also demonstrate the potential of web-based applications for
addressing the aforementioned socialization challenges. Altogether, our
findings provide insights on new employee network dynamics in remote and hybrid
work environments, which may help guide organizational leaders and web
application developers on quantifying and improving the socialization
experiences of new employees in digital workplaces.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2023 01:51:50 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Yu",
"Yulin",
""
],
[
"Yang",
"Longqi",
""
],
[
"Lindley",
"Siân",
""
],
[
"Wan",
"Mengting",
""
]
] |
TITLE: Large-Scale Analysis of New Employee Network Dynamics
ABSTRACT: The COVID-19 pandemic has accelerated digital transformations across
industries, but also introduced new challenges into workplaces, including the
difficulties of effectively socializing with colleagues when working remotely.
This challenge is exacerbated for new employees who need to develop workplace
networks from the outset. In this paper, by analyzing a large-scale telemetry
dataset of more than 10,000 Microsoft employees who joined the company in the
first three months of 2022, we describe how new employees interact and
telecommute with their colleagues during their ``onboarding'' period. Our
results reveal that although new hires are gradually expanding networks over
time, there still exists significant gaps between their network statistics and
those of tenured employees even after the six-month onboarding phase. We also
observe that heterogeneity exists among new employees in how their networks
change over time, where employees whose job tasks do not necessarily require
extensive and diverse connections could be at a disadvantaged position in this
onboarding process. By investigating how web-based people recommendations in
organizational knowledge base facilitate new employees naturally expand their
networks, we also demonstrate the potential of web-based applications for
addressing the aforementioned socialization challenges. Altogether, our
findings provide insights on new employee network dynamics in remote and hybrid
work environments, which may help guide organizational leaders and web
application developers on quantifying and improving the socialization
experiences of new employees in digital workplaces.
|
no_new_dataset
| 0.706823
|
2304.03454
|
Yongjun Zhang
|
Yongjun Zhang, Sijia Liu, Yi Wang, Xinguang Fan
|
Detecting Chinese Fake News on Twitter during the COVID-19 Pandemic
| null | null | null | null |
cs.CY cs.SI
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
The outbreak of COVID-19 has led to a global surge of Sinophobia partly
because of the spread of misinformation, disinformation, and fake news on
China. In this paper, we report on the creation of a novel classifier that
detects whether Chinese-language social media posts from Twitter are related to
fake news about China. The classifier achieves an F1 score of 0.64 and an
accuracy rate of 93%. We provide the final model and a new training dataset
with 18,425 tweets for researchers to study fake news in the Chinese language
during the COVID-19 pandemic. We also introduce a new dataset generated by our
classifier that tracks the dynamics of fake news in the Chinese language during
the early pandemic.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2023 03:03:11 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Zhang",
"Yongjun",
""
],
[
"Liu",
"Sijia",
""
],
[
"Wang",
"Yi",
""
],
[
"Fan",
"Xinguang",
""
]
] |
TITLE: Detecting Chinese Fake News on Twitter during the COVID-19 Pandemic
ABSTRACT: The outbreak of COVID-19 has led to a global surge of Sinophobia partly
because of the spread of misinformation, disinformation, and fake news on
China. In this paper, we report on the creation of a novel classifier that
detects whether Chinese-language social media posts from Twitter are related to
fake news about China. The classifier achieves an F1 score of 0.64 and an
accuracy rate of 93%. We provide the final model and a new training dataset
with 18,425 tweets for researchers to study fake news in the Chinese language
during the COVID-19 pandemic. We also introduce a new dataset generated by our
classifier that tracks the dynamics of fake news in the Chinese language during
the early pandemic.
|
new_dataset
| 0.713045
|
2304.03456
|
Kyungyul Kim
|
Jae-Hun Lee, Doyoung Yoon, ByeongMoon Ji, Kyungyul Kim, Sangheum Hwang
|
Rethinking Evaluation Protocols of Visual Representations Learned via
Self-supervised Learning
| null | null | null | null |
cs.CV cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Linear probing (LP) (and $k$-NN) on the upstream dataset with labels (e.g.,
ImageNet) and transfer learning (TL) to various downstream datasets are
commonly employed to evaluate the quality of visual representations learned via
self-supervised learning (SSL). Although existing SSL methods have shown good
performances under those evaluation protocols, we observe that the performances
are very sensitive to the hyperparameters involved in LP and TL. We argue that
this is an undesirable behavior since truly generic representations should be
easily adapted to any other visual recognition task, i.e., the learned
representations should be robust to the settings of LP and TL hyperparameters.
In this work, we try to figure out the cause of performance sensitivity by
conducting extensive experiments with state-of-the-art SSL methods. First, we
find that input normalization for LP is crucial to eliminate performance
variations according to the hyperparameters. Specifically, batch normalization
before feeding inputs to a linear classifier considerably improves the
stability of evaluation, and also resolves inconsistency of $k$-NN and LP
metrics. Second, for TL, we demonstrate that a weight decay parameter in SSL
significantly affects the transferability of learned representations, which
cannot be identified by LP or $k$-NN evaluations on the upstream dataset. We
believe that the findings of this study will be beneficial for the community by
drawing attention to the shortcomings in the current SSL evaluation schemes and
underscoring the need to reconsider them.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2023 03:03:19 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Lee",
"Jae-Hun",
""
],
[
"Yoon",
"Doyoung",
""
],
[
"Ji",
"ByeongMoon",
""
],
[
"Kim",
"Kyungyul",
""
],
[
"Hwang",
"Sangheum",
""
]
] |
TITLE: Rethinking Evaluation Protocols of Visual Representations Learned via
Self-supervised Learning
ABSTRACT: Linear probing (LP) (and $k$-NN) on the upstream dataset with labels (e.g.,
ImageNet) and transfer learning (TL) to various downstream datasets are
commonly employed to evaluate the quality of visual representations learned via
self-supervised learning (SSL). Although existing SSL methods have shown good
performances under those evaluation protocols, we observe that the performances
are very sensitive to the hyperparameters involved in LP and TL. We argue that
this is an undesirable behavior since truly generic representations should be
easily adapted to any other visual recognition task, i.e., the learned
representations should be robust to the settings of LP and TL hyperparameters.
In this work, we try to figure out the cause of performance sensitivity by
conducting extensive experiments with state-of-the-art SSL methods. First, we
find that input normalization for LP is crucial to eliminate performance
variations according to the hyperparameters. Specifically, batch normalization
before feeding inputs to a linear classifier considerably improves the
stability of evaluation, and also resolves inconsistency of $k$-NN and LP
metrics. Second, for TL, we demonstrate that a weight decay parameter in SSL
significantly affects the transferability of learned representations, which
cannot be identified by LP or $k$-NN evaluations on the upstream dataset. We
believe that the findings of this study will be beneficial for the community by
drawing attention to the shortcomings in the current SSL evaluation schemes and
underscoring the need to reconsider them.
|
no_new_dataset
| 0.708408
|
2304.03481
|
Gaojie Wu
|
Gaojie Wu, Wei-Shi Zheng, Yutong Lu, Qi Tian
|
PSLT: A Light-weight Vision Transformer with Ladder Self-Attention and
Progressive Shift
|
Accepted to IEEE Transaction on Pattern Analysis and Machine
Intelligence, 2023 (Submission date: 08-Jul-202)
|
IEEE Transaction on Pattern Analysis and Machine Intelligence,
2023
|
10.1109/TPAMI.2023.3265499
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Vision Transformer (ViT) has shown great potential for various visual tasks
due to its ability to model long-range dependency. However, ViT requires a
large amount of computing resource to compute the global self-attention. In
this work, we propose a ladder self-attention block with multiple branches and
a progressive shift mechanism to develop a light-weight transformer backbone
that requires less computing resources (e.g. a relatively small number of
parameters and FLOPs), termed Progressive Shift Ladder Transformer (PSLT).
First, the ladder self-attention block reduces the computational cost by
modelling local self-attention in each branch. In the meanwhile, the
progressive shift mechanism is proposed to enlarge the receptive field in the
ladder self-attention block by modelling diverse local self-attention for each
branch and interacting among these branches. Second, the input feature of the
ladder self-attention block is split equally along the channel dimension for
each branch, which considerably reduces the computational cost in the ladder
self-attention block (with nearly 1/3 the amount of parameters and FLOPs), and
the outputs of these branches are then collaborated by a pixel-adaptive fusion.
Therefore, the ladder self-attention block with a relatively small number of
parameters and FLOPs is capable of modelling long-range interactions. Based on
the ladder self-attention block, PSLT performs well on several vision tasks,
including image classification, objection detection and person
re-identification. On the ImageNet-1k dataset, PSLT achieves a top-1 accuracy
of 79.9% with 9.2M parameters and 1.9G FLOPs, which is comparable to several
existing models with more than 20M parameters and 4G FLOPs. Code is available
at https://isee-ai.cn/wugaojie/PSLT.html.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2023 05:21:37 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Wu",
"Gaojie",
""
],
[
"Zheng",
"Wei-Shi",
""
],
[
"Lu",
"Yutong",
""
],
[
"Tian",
"Qi",
""
]
] |
TITLE: PSLT: A Light-weight Vision Transformer with Ladder Self-Attention and
Progressive Shift
ABSTRACT: Vision Transformer (ViT) has shown great potential for various visual tasks
due to its ability to model long-range dependency. However, ViT requires a
large amount of computing resource to compute the global self-attention. In
this work, we propose a ladder self-attention block with multiple branches and
a progressive shift mechanism to develop a light-weight transformer backbone
that requires less computing resources (e.g. a relatively small number of
parameters and FLOPs), termed Progressive Shift Ladder Transformer (PSLT).
First, the ladder self-attention block reduces the computational cost by
modelling local self-attention in each branch. In the meanwhile, the
progressive shift mechanism is proposed to enlarge the receptive field in the
ladder self-attention block by modelling diverse local self-attention for each
branch and interacting among these branches. Second, the input feature of the
ladder self-attention block is split equally along the channel dimension for
each branch, which considerably reduces the computational cost in the ladder
self-attention block (with nearly 1/3 the amount of parameters and FLOPs), and
the outputs of these branches are then collaborated by a pixel-adaptive fusion.
Therefore, the ladder self-attention block with a relatively small number of
parameters and FLOPs is capable of modelling long-range interactions. Based on
the ladder self-attention block, PSLT performs well on several vision tasks,
including image classification, objection detection and person
re-identification. On the ImageNet-1k dataset, PSLT achieves a top-1 accuracy
of 79.9% with 9.2M parameters and 1.9G FLOPs, which is comparable to several
existing models with more than 20M parameters and 4G FLOPs. Code is available
at https://isee-ai.cn/wugaojie/PSLT.html.
|
no_new_dataset
| 0.71
|
2304.03486
|
Subin Sahayam
|
Subin Sahayam, John Zakkam, Umarani Jayaraman
|
Can we learn better with hard samples?
| null | null | null | null |
cs.CV cs.AI
|
http://creativecommons.org/licenses/by/4.0/
|
In deep learning, mini-batch training is commonly used to optimize network
parameters. However, the traditional mini-batch method may not learn the
under-represented samples and complex patterns in the data, leading to a longer
time for generalization. To address this problem, a variant of the traditional
algorithm has been proposed, which trains the network focusing on mini-batches
with high loss. The study evaluates the effectiveness of the proposed training
using various deep neural networks trained on three benchmark datasets
(CIFAR-10, CIFAR-100, and STL-10). The deep neural networks used in the study
are ResNet-18, ResNet-50, Efficient Net B4, EfficientNetV2-S, and
MobilenetV3-S. The experimental results showed that the proposed method can
significantly improve the test accuracy and speed up the convergence compared
to the traditional mini-batch training method. Furthermore, we introduce a
hyper-parameter delta ({\delta}) that decides how many mini-batches are
considered for training. Experiments on various values of {\delta} found that
the performance of the proposed method for smaller {\delta} values generally
results in similar test accuracy and faster generalization. We show that the
proposed method generalizes in 26.47% less number of epochs than the
traditional mini-batch method in EfficientNet-B4 on STL-10. The proposed method
also improves the test top-1 accuracy by 7.26% in ResNet-18 on CIFAR-100.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2023 05:45:26 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Sahayam",
"Subin",
""
],
[
"Zakkam",
"John",
""
],
[
"Jayaraman",
"Umarani",
""
]
] |
TITLE: Can we learn better with hard samples?
ABSTRACT: In deep learning, mini-batch training is commonly used to optimize network
parameters. However, the traditional mini-batch method may not learn the
under-represented samples and complex patterns in the data, leading to a longer
time for generalization. To address this problem, a variant of the traditional
algorithm has been proposed, which trains the network focusing on mini-batches
with high loss. The study evaluates the effectiveness of the proposed training
using various deep neural networks trained on three benchmark datasets
(CIFAR-10, CIFAR-100, and STL-10). The deep neural networks used in the study
are ResNet-18, ResNet-50, Efficient Net B4, EfficientNetV2-S, and
MobilenetV3-S. The experimental results showed that the proposed method can
significantly improve the test accuracy and speed up the convergence compared
to the traditional mini-batch training method. Furthermore, we introduce a
hyper-parameter delta ({\delta}) that decides how many mini-batches are
considered for training. Experiments on various values of {\delta} found that
the performance of the proposed method for smaller {\delta} values generally
results in similar test accuracy and faster generalization. We show that the
proposed method generalizes in 26.47% less number of epochs than the
traditional mini-batch method in EfficientNet-B4 on STL-10. The proposed method
also improves the test top-1 accuracy by 7.26% in ResNet-18 on CIFAR-100.
|
no_new_dataset
| 0.710446
|
2304.03487
|
Ali Tehrani
|
Ali TehraniJamsaz, Alok Mishra, Akash Dutta, Abid M. Malik, Barbara
Chapman, Ali Jannesari
|
ParaGraph: Weighted Graph Representation for Performance Optimization of
HPC Kernels
| null | null | null | null |
cs.DC cs.LG cs.PF
|
http://creativecommons.org/licenses/by/4.0/
|
GPU-based HPC clusters are attracting more scientific application developers
due to their extensive parallelism and energy efficiency. In order to achieve
portability among a variety of multi/many core architectures, a popular choice
for an application developer is to utilize directive-based parallel programming
models, such as OpenMP. However, even with OpenMP, the developer must choose
from among many strategies for exploiting a GPU or a CPU. Recently, Machine
Learning (ML) approaches have brought significant advances in the optimizations
of HPC applications. To this end, several ways have been proposed to represent
application characteristics for ML models. However, the available techniques
fail to capture features that are crucial for exposing parallelism. In this
paper, we introduce a new graph-based program representation for parallel
applications that extends the Abstract Syntax Tree to represent control and
data flow information. The originality of this work lies in the addition of new
edges exploiting the implicit ordering and parent-child relationships in ASTs,
as well as the introduction of edge weights to account for loop and condition
information. We evaluate our proposed representation by training a Graph Neural
Network (GNN) to predict the runtime of an OpenMP code region across CPUs and
GPUs. Various transformations utilizing collapse and data transfer between the
CPU and GPU are used to construct the dataset. The predicted runtime of the
model is used to determine which transformation provides the best performance.
Results show that our approach is indeed effective and has normalized RMSE as
low as 0.004 to at most 0.01 in its runtime predictions.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2023 05:52:59 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"TehraniJamsaz",
"Ali",
""
],
[
"Mishra",
"Alok",
""
],
[
"Dutta",
"Akash",
""
],
[
"Malik",
"Abid M.",
""
],
[
"Chapman",
"Barbara",
""
],
[
"Jannesari",
"Ali",
""
]
] |
TITLE: ParaGraph: Weighted Graph Representation for Performance Optimization of
HPC Kernels
ABSTRACT: GPU-based HPC clusters are attracting more scientific application developers
due to their extensive parallelism and energy efficiency. In order to achieve
portability among a variety of multi/many core architectures, a popular choice
for an application developer is to utilize directive-based parallel programming
models, such as OpenMP. However, even with OpenMP, the developer must choose
from among many strategies for exploiting a GPU or a CPU. Recently, Machine
Learning (ML) approaches have brought significant advances in the optimizations
of HPC applications. To this end, several ways have been proposed to represent
application characteristics for ML models. However, the available techniques
fail to capture features that are crucial for exposing parallelism. In this
paper, we introduce a new graph-based program representation for parallel
applications that extends the Abstract Syntax Tree to represent control and
data flow information. The originality of this work lies in the addition of new
edges exploiting the implicit ordering and parent-child relationships in ASTs,
as well as the introduction of edge weights to account for loop and condition
information. We evaluate our proposed representation by training a Graph Neural
Network (GNN) to predict the runtime of an OpenMP code region across CPUs and
GPUs. Various transformations utilizing collapse and data transfer between the
CPU and GPU are used to construct the dataset. The predicted runtime of the
model is used to determine which transformation provides the best performance.
Results show that our approach is indeed effective and has normalized RMSE as
low as 0.004 to at most 0.01 in its runtime predictions.
|
no_new_dataset
| 0.707859
|
2304.03493
|
Yiwen Ye
|
Yiwen Ye, Yutong Xie, Jianpeng Zhang, Ziyang Chen, Yong Xia
|
UniSeg: A Prompt-driven Universal Segmentation Model as well as A Strong
Representation Learner
|
13 pages, 4 figures
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The universal model emerges as a promising trend for medical image
segmentation, paving up the way to build medical imaging large model (MILM).
One popular strategy to build universal models is to encode each task as a
one-hot vector and generate dynamic convolutional layers at the end of the
decoder to extract the interested target. Although successful, it ignores the
correlations among tasks and meanwhile is too late to make the model 'aware' of
the ongoing task. To address both issues, we propose a prompt-driven Universal
Segmentation model (UniSeg) for multi-task medical image segmentation using
diverse modalities and domains. We first devise a learnable universal prompt to
describe the correlations among all tasks and then convert this prompt and
image features into a task-specific prompt, which is fed to the decoder as a
part of its input. Thus, we make the model 'aware' of the ongoing task early
and boost the task-specific training of the whole decoder. Our results indicate
that the proposed UniSeg outperforms other universal models and single-task
models on 11 upstream tasks. Moreover, UniSeg also beats other pre-trained
models on two downstream datasets, providing the community with a high-quality
pre-trained model for 3D medical image segmentation. Code and model are
available at https://github.com/yeerwen/UniSeg.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2023 06:28:51 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Ye",
"Yiwen",
""
],
[
"Xie",
"Yutong",
""
],
[
"Zhang",
"Jianpeng",
""
],
[
"Chen",
"Ziyang",
""
],
[
"Xia",
"Yong",
""
]
] |
TITLE: UniSeg: A Prompt-driven Universal Segmentation Model as well as A Strong
Representation Learner
ABSTRACT: The universal model emerges as a promising trend for medical image
segmentation, paving up the way to build medical imaging large model (MILM).
One popular strategy to build universal models is to encode each task as a
one-hot vector and generate dynamic convolutional layers at the end of the
decoder to extract the interested target. Although successful, it ignores the
correlations among tasks and meanwhile is too late to make the model 'aware' of
the ongoing task. To address both issues, we propose a prompt-driven Universal
Segmentation model (UniSeg) for multi-task medical image segmentation using
diverse modalities and domains. We first devise a learnable universal prompt to
describe the correlations among all tasks and then convert this prompt and
image features into a task-specific prompt, which is fed to the decoder as a
part of its input. Thus, we make the model 'aware' of the ongoing task early
and boost the task-specific training of the whole decoder. Our results indicate
that the proposed UniSeg outperforms other universal models and single-task
models on 11 upstream tasks. Moreover, UniSeg also beats other pre-trained
models on two downstream datasets, providing the community with a high-quality
pre-trained model for 3D medical image segmentation. Code and model are
available at https://github.com/yeerwen/UniSeg.
|
no_new_dataset
| 0.708862
|
2304.03495
|
Deunsol Jung
|
Deunsol Jung, Sanghyun Kim, Won Hwa Kim, Minsu Cho
|
Devil's on the Edges: Selective Quad Attention for Scene Graph
Generation
|
Accepted at CVPR 2023; Project page at
https://cvlab.postech.ac.kr/research/SQUAT/
| null | null | null |
cs.CV
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
Scene graph generation aims to construct a semantic graph structure from an
image such that its nodes and edges respectively represent objects and their
relationships. One of the major challenges for the task lies in the presence of
distracting objects and relationships in images; contextual reasoning is
strongly distracted by irrelevant objects or backgrounds and, more importantly,
a vast number of irrelevant candidate relations. To tackle the issue, we
propose the Selective Quad Attention Network (SQUAT) that learns to select
relevant object pairs and disambiguate them via diverse contextual
interactions. SQUAT consists of two main components: edge selection and quad
attention. The edge selection module selects relevant object pairs, i.e., edges
in the scene graph, which helps contextual reasoning, and the quad attention
module then updates the edge features using both edge-to-node and edge-to-edge
cross-attentions to capture contextual information between objects and object
pairs. Experiments demonstrate the strong performance and robustness of SQUAT,
achieving the state of the art on the Visual Genome and Open Images v6
benchmarks.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2023 06:33:46 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Jung",
"Deunsol",
""
],
[
"Kim",
"Sanghyun",
""
],
[
"Kim",
"Won Hwa",
""
],
[
"Cho",
"Minsu",
""
]
] |
TITLE: Devil's on the Edges: Selective Quad Attention for Scene Graph
Generation
ABSTRACT: Scene graph generation aims to construct a semantic graph structure from an
image such that its nodes and edges respectively represent objects and their
relationships. One of the major challenges for the task lies in the presence of
distracting objects and relationships in images; contextual reasoning is
strongly distracted by irrelevant objects or backgrounds and, more importantly,
a vast number of irrelevant candidate relations. To tackle the issue, we
propose the Selective Quad Attention Network (SQUAT) that learns to select
relevant object pairs and disambiguate them via diverse contextual
interactions. SQUAT consists of two main components: edge selection and quad
attention. The edge selection module selects relevant object pairs, i.e., edges
in the scene graph, which helps contextual reasoning, and the quad attention
module then updates the edge features using both edge-to-node and edge-to-edge
cross-attentions to capture contextual information between objects and object
pairs. Experiments demonstrate the strong performance and robustness of SQUAT,
achieving the state of the art on the Visual Genome and Open Images v6
benchmarks.
|
no_new_dataset
| 0.710998
|
2304.03509
|
Md. Azizul Hakim
|
Amena Begum Farha, Md. Azizul Hakim, Mst. Eshita Khatun
|
Local Rose Breeds Detection System Using Transfer Learning Techniques
|
6 pages, 11 figures, conference
| null |
10.1109/ICCCNT54827.2022.9984329
| null |
cs.CV cs.AI
|
http://creativecommons.org/licenses/by/4.0/
|
Flower breed detection and giving details of that breed with the suggestion
of cultivation processes and the way of taking care is important for flower
cultivation, breed invention, and the flower business. Among all the local
flowers in Bangladesh, the rose is one of the most popular and demanded
flowers. Roses are the most desirable flower not only in Bangladesh but also
throughout the world. Roses can be used for many other purposes apart from
decoration. As roses have a great demand in the flower business so rose breed
detection will be very essential. However, there is no remarkable work for
breed detection of a particular flower unlike the classification of different
flowers. In this research, we have proposed a model to detect rose breeds from
images using transfer learning techniques. For such work in flowers, resources
are not enough in image processing and classification, so we needed a large
dataset of the massive number of images to train our model. we have used 1939
raw images of five different breeds and we have generated 9306 images for the
training dataset and 388 images for the testing dataset to validate the model
using augmentation. We have applied four transfer learning models in this
research, which are Inception V3, ResNet50, Xception, and VGG16. Among these
four models, VGG16 achieved the highest accuracy of 99%, which is an excellent
outcome. Breed detection of a rose by using transfer learning methods is the
first work on breed detection of a particular flower that is publicly available
according to the study.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2023 07:02:25 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Farha",
"Amena Begum",
""
],
[
"Hakim",
"Md. Azizul",
""
],
[
"Khatun",
"Mst. Eshita",
""
]
] |
TITLE: Local Rose Breeds Detection System Using Transfer Learning Techniques
ABSTRACT: Flower breed detection and giving details of that breed with the suggestion
of cultivation processes and the way of taking care is important for flower
cultivation, breed invention, and the flower business. Among all the local
flowers in Bangladesh, the rose is one of the most popular and demanded
flowers. Roses are the most desirable flower not only in Bangladesh but also
throughout the world. Roses can be used for many other purposes apart from
decoration. As roses have a great demand in the flower business so rose breed
detection will be very essential. However, there is no remarkable work for
breed detection of a particular flower unlike the classification of different
flowers. In this research, we have proposed a model to detect rose breeds from
images using transfer learning techniques. For such work in flowers, resources
are not enough in image processing and classification, so we needed a large
dataset of the massive number of images to train our model. we have used 1939
raw images of five different breeds and we have generated 9306 images for the
training dataset and 388 images for the testing dataset to validate the model
using augmentation. We have applied four transfer learning models in this
research, which are Inception V3, ResNet50, Xception, and VGG16. Among these
four models, VGG16 achieved the highest accuracy of 99%, which is an excellent
outcome. Breed detection of a rose by using transfer learning methods is the
first work on breed detection of a particular flower that is publicly available
according to the study.
|
new_dataset
| 0.708635
|
2304.03522
|
Wonjun Yi
|
Wonjun Yi, Jung-Woo Choi
|
On-site Noise Exposure technique for noise-robust machine fault
classification
|
Presented at 24th International Congress on Acoustics (ICA) 2022
| null | null | null |
cs.SD eess.AS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In-situ classification of faulty sounds is an important issue in machine
health monitoring and diagnosis. However, in a noisy environment such as a
factory, machine sound is always mixed up with environmental noises, and
noise-only periods can exist when a machine is not in operation. Therefore, a
deep neural network (DNN)-based fault classifier has to be able to distinguish
noise from machine sound and be robust to mixed noises. To deal with these
problems, we investigate on-site noise exposure (ONE) that exposes a DNN model
to the noises recorded in the same environment where the machine operates. Like
the outlier exposure technique, noise exposure trains a DNN classifier to
produce a uniform predicted probability distribution against noise-only data.
During inference, the DNN classifier trained by ONE outputs the maximum softmax
probability as the noise score and determines the noise-only period. We mix
machine sound and noises of the ToyADMOS2 dataset to simulate highly noisy
data. A ResNet-based classifier trained by ONE is evaluated and compared with
those trained by other out-of-distribution detection techniques. The test
results show that exposing a model to on-site noises can make a model more
robust than using other noises or detection techniques.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2023 07:35:52 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Yi",
"Wonjun",
""
],
[
"Choi",
"Jung-Woo",
""
]
] |
TITLE: On-site Noise Exposure technique for noise-robust machine fault
classification
ABSTRACT: In-situ classification of faulty sounds is an important issue in machine
health monitoring and diagnosis. However, in a noisy environment such as a
factory, machine sound is always mixed up with environmental noises, and
noise-only periods can exist when a machine is not in operation. Therefore, a
deep neural network (DNN)-based fault classifier has to be able to distinguish
noise from machine sound and be robust to mixed noises. To deal with these
problems, we investigate on-site noise exposure (ONE) that exposes a DNN model
to the noises recorded in the same environment where the machine operates. Like
the outlier exposure technique, noise exposure trains a DNN classifier to
produce a uniform predicted probability distribution against noise-only data.
During inference, the DNN classifier trained by ONE outputs the maximum softmax
probability as the noise score and determines the noise-only period. We mix
machine sound and noises of the ToyADMOS2 dataset to simulate highly noisy
data. A ResNet-based classifier trained by ONE is evaluated and compared with
those trained by other out-of-distribution detection techniques. The test
results show that exposing a model to on-site noises can make a model more
robust than using other noises or detection techniques.
|
no_new_dataset
| 0.713032
|
2304.03526
|
Li Leheng
|
Leheng Li, Qing Lian, Luozhou Wang, Ningning Ma, Ying-Cong Chen
|
Lift3D: Synthesize 3D Training Data by Lifting 2D GAN to 3D Generative
Radiance Field
|
CVPR 2023
| null | null | null |
cs.CV
|
http://creativecommons.org/licenses/by/4.0/
|
This work explores the use of 3D generative models to synthesize training
data for 3D vision tasks. The key requirements of the generative models are
that the generated data should be photorealistic to match the real-world
scenarios, and the corresponding 3D attributes should be aligned with given
sampling labels. However, we find that the recent NeRF-based 3D GANs hardly
meet the above requirements due to their designed generation pipeline and the
lack of explicit 3D supervision. In this work, we propose Lift3D, an inverted
2D-to-3D generation framework to achieve the data generation objectives. Lift3D
has several merits compared to prior methods: (1) Unlike previous 3D GANs that
the output resolution is fixed after training, Lift3D can generalize to any
camera intrinsic with higher resolution and photorealistic output. (2) By
lifting well-disentangled 2D GAN to 3D object NeRF, Lift3D provides explicit 3D
information of generated objects, thus offering accurate 3D annotations for
downstream tasks. We evaluate the effectiveness of our framework by augmenting
autonomous driving datasets. Experimental results demonstrate that our data
generation framework can effectively improve the performance of 3D object
detectors. Project page: https://len-li.github.io/lift3d-web.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2023 07:43:02 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Li",
"Leheng",
""
],
[
"Lian",
"Qing",
""
],
[
"Wang",
"Luozhou",
""
],
[
"Ma",
"Ningning",
""
],
[
"Chen",
"Ying-Cong",
""
]
] |
TITLE: Lift3D: Synthesize 3D Training Data by Lifting 2D GAN to 3D Generative
Radiance Field
ABSTRACT: This work explores the use of 3D generative models to synthesize training
data for 3D vision tasks. The key requirements of the generative models are
that the generated data should be photorealistic to match the real-world
scenarios, and the corresponding 3D attributes should be aligned with given
sampling labels. However, we find that the recent NeRF-based 3D GANs hardly
meet the above requirements due to their designed generation pipeline and the
lack of explicit 3D supervision. In this work, we propose Lift3D, an inverted
2D-to-3D generation framework to achieve the data generation objectives. Lift3D
has several merits compared to prior methods: (1) Unlike previous 3D GANs that
the output resolution is fixed after training, Lift3D can generalize to any
camera intrinsic with higher resolution and photorealistic output. (2) By
lifting well-disentangled 2D GAN to 3D object NeRF, Lift3D provides explicit 3D
information of generated objects, thus offering accurate 3D annotations for
downstream tasks. We evaluate the effectiveness of our framework by augmenting
autonomous driving datasets. Experimental results demonstrate that our data
generation framework can effectively improve the performance of 3D object
detectors. Project page: https://len-li.github.io/lift3d-web.
|
no_new_dataset
| 0.71027
|
2304.03537
|
Shusuke Takahama
|
Shusuke Takahama, Yusuke Kurose, Yusuke Mukuta, Hiroyuki Abe, Akihiko
Yoshizawa, Tetsuo Ushiku, Masashi Fukayama, Masanobu Kitagawa, Masaru
Kitsuregawa, Tatsuya Harada
|
Domain Adaptive Multiple Instance Learning for Instance-level Prediction
of Pathological Images
|
Accepted to ISBI 2023 (Oral). ISBI paper version
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Pathological image analysis is an important process for detecting
abnormalities such as cancer from cell images. However, since the image size is
generally very large, the cost of providing detailed annotations is high, which
makes it difficult to apply machine learning techniques. One way to improve the
performance of identifying abnormalities while keeping the annotation cost low
is to use only labels for each slide, or to use information from another
dataset that has already been labeled. However, such weak supervisory
information often does not provide sufficient performance. In this paper, we
proposed a new task setting to improve the classification performance of the
target dataset without increasing annotation costs. And to solve this problem,
we propose a pipeline that uses multiple instance learning (MIL) and domain
adaptation (DA) methods. Furthermore, in order to combine the supervisory
information of both methods effectively, we propose a method to create
pseudo-labels with high confidence. We conducted experiments on the
pathological image dataset we created for this study and showed that the
proposed method significantly improves the classification performance compared
to existing methods.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2023 08:31:06 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Takahama",
"Shusuke",
""
],
[
"Kurose",
"Yusuke",
""
],
[
"Mukuta",
"Yusuke",
""
],
[
"Abe",
"Hiroyuki",
""
],
[
"Yoshizawa",
"Akihiko",
""
],
[
"Ushiku",
"Tetsuo",
""
],
[
"Fukayama",
"Masashi",
""
],
[
"Kitagawa",
"Masanobu",
""
],
[
"Kitsuregawa",
"Masaru",
""
],
[
"Harada",
"Tatsuya",
""
]
] |
TITLE: Domain Adaptive Multiple Instance Learning for Instance-level Prediction
of Pathological Images
ABSTRACT: Pathological image analysis is an important process for detecting
abnormalities such as cancer from cell images. However, since the image size is
generally very large, the cost of providing detailed annotations is high, which
makes it difficult to apply machine learning techniques. One way to improve the
performance of identifying abnormalities while keeping the annotation cost low
is to use only labels for each slide, or to use information from another
dataset that has already been labeled. However, such weak supervisory
information often does not provide sufficient performance. In this paper, we
proposed a new task setting to improve the classification performance of the
target dataset without increasing annotation costs. And to solve this problem,
we propose a pipeline that uses multiple instance learning (MIL) and domain
adaptation (DA) methods. Furthermore, in order to combine the supervisory
information of both methods effectively, we propose a method to create
pseudo-labels with high confidence. We conducted experiments on the
pathological image dataset we created for this study and showed that the
proposed method significantly improves the classification performance compared
to existing methods.
|
new_dataset
| 0.717439
|
2304.03538
|
Mohammad Ali Jamshidi
|
Mohammad Ali Jamshidi, Hadi Veisi, Mohammad Mahdi Mojahedian, Mohammad
Reza Aref
|
Adjustable Privacy using Autoencoder-based Learning Structure
| null | null | null | null |
cs.LG cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Inference centers need more data to have a more comprehensive and beneficial
learning model, and for this purpose, they need to collect data from data
providers. On the other hand, data providers are cautious about delivering
their datasets to inference centers in terms of privacy considerations. In this
paper, by modifying the structure of the autoencoder, we present a method that
manages the utility-privacy trade-off well. To be more precise, the data is
first compressed using the encoder, then confidential and non-confidential
features are separated and uncorrelated using the classifier. The confidential
feature is appropriately combined with noise, and the non-confidential feature
is enhanced, and at the end, data with the original data format is produced by
the decoder. The proposed architecture also allows data providers to set the
level of privacy required for confidential features. The proposed method has
been examined for both image and categorical databases, and the results show a
significant performance improvement compared to previous methods.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2023 08:32:44 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Jamshidi",
"Mohammad Ali",
""
],
[
"Veisi",
"Hadi",
""
],
[
"Mojahedian",
"Mohammad Mahdi",
""
],
[
"Aref",
"Mohammad Reza",
""
]
] |
TITLE: Adjustable Privacy using Autoencoder-based Learning Structure
ABSTRACT: Inference centers need more data to have a more comprehensive and beneficial
learning model, and for this purpose, they need to collect data from data
providers. On the other hand, data providers are cautious about delivering
their datasets to inference centers in terms of privacy considerations. In this
paper, by modifying the structure of the autoencoder, we present a method that
manages the utility-privacy trade-off well. To be more precise, the data is
first compressed using the encoder, then confidential and non-confidential
features are separated and uncorrelated using the classifier. The confidential
feature is appropriately combined with noise, and the non-confidential feature
is enhanced, and at the end, data with the original data format is produced by
the decoder. The proposed architecture also allows data providers to set the
level of privacy required for confidential features. The proposed method has
been examined for both image and categorical databases, and the results show a
significant performance improvement compared to previous methods.
|
no_new_dataset
| 0.711813
|
2304.03540
|
Sibei Chen
|
Sibei Chen, Hanbing Liu, Weiting Jin, Xiangyu Sun, Xiaoyao Feng, Ju
Fan, Xiaoyong Du, Nan Tang
|
ChatPipe: Orchestrating Data Preparation Program by Optimizing
Human-ChatGPT Interactions
| null | null | null | null |
cs.DB cs.AI cs.HC cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Orchestrating a high-quality data preparation program is essential for
successful machine learning (ML), but it is known to be time and effort
consuming. Despite the impressive capabilities of large language models like
ChatGPT in generating programs by interacting with users through natural
language prompts, there are still limitations. Specifically, a user must
provide specific prompts to iteratively guide ChatGPT in improving data
preparation programs, which requires a certain level of expertise in
programming, the dataset used and the ML task. Moreover, once a program has
been generated, it is non-trivial to revisit a previous version or make changes
to the program without starting the process over again. In this paper, we
present ChatPipe, a novel system designed to facilitate seamless interaction
between users and ChatGPT. ChatPipe provides users with effective
recommendation on next data preparation operations, and guides ChatGPT to
generate program for the operations. Also, ChatPipe enables users to easily
roll back to previous versions of the program, which facilitates more efficient
experimentation and testing. We have developed a web application for ChatPipe
and prepared several real-world ML tasks from Kaggle. These tasks can showcase
the capabilities of ChatPipe and enable VLDB attendees to easily experiment
with our novel features to rapidly orchestrate a high-quality data preparation
program.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2023 08:33:08 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Chen",
"Sibei",
""
],
[
"Liu",
"Hanbing",
""
],
[
"Jin",
"Weiting",
""
],
[
"Sun",
"Xiangyu",
""
],
[
"Feng",
"Xiaoyao",
""
],
[
"Fan",
"Ju",
""
],
[
"Du",
"Xiaoyong",
""
],
[
"Tang",
"Nan",
""
]
] |
TITLE: ChatPipe: Orchestrating Data Preparation Program by Optimizing
Human-ChatGPT Interactions
ABSTRACT: Orchestrating a high-quality data preparation program is essential for
successful machine learning (ML), but it is known to be time and effort
consuming. Despite the impressive capabilities of large language models like
ChatGPT in generating programs by interacting with users through natural
language prompts, there are still limitations. Specifically, a user must
provide specific prompts to iteratively guide ChatGPT in improving data
preparation programs, which requires a certain level of expertise in
programming, the dataset used and the ML task. Moreover, once a program has
been generated, it is non-trivial to revisit a previous version or make changes
to the program without starting the process over again. In this paper, we
present ChatPipe, a novel system designed to facilitate seamless interaction
between users and ChatGPT. ChatPipe provides users with effective
recommendation on next data preparation operations, and guides ChatGPT to
generate program for the operations. Also, ChatPipe enables users to easily
roll back to previous versions of the program, which facilitates more efficient
experimentation and testing. We have developed a web application for ChatPipe
and prepared several real-world ML tasks from Kaggle. These tasks can showcase
the capabilities of ChatPipe and enable VLDB attendees to easily experiment
with our novel features to rapidly orchestrate a high-quality data preparation
program.
|
no_new_dataset
| 0.70719
|
2304.03542
|
Xuhai Chen
|
Xuhai Chen, Jiangning Zhang, Chao Xu, Yabiao Wang, Chengjie Wang, Yong
Liu
|
Better "CMOS" Produces Clearer Images: Learning Space-Variant Blur
Estimation for Blind Image Super-Resolution
|
Accepted by CVPR 2023
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Most of the existing blind image Super-Resolution (SR) methods assume that
the blur kernels are space-invariant. However, the blur involved in real
applications are usually space-variant due to object motion, out-of-focus,
etc., resulting in severe performance drop of the advanced SR methods. To
address this problem, we firstly introduce two new datasets with out-of-focus
blur, i.e., NYUv2-BSR and Cityscapes-BSR, to support further researches of
blind SR with space-variant blur. Based on the datasets, we design a novel
Cross-MOdal fuSion network (CMOS) that estimate both blur and semantics
simultaneously, which leads to improved SR results. It involves a feature
Grouping Interactive Attention (GIA) module to make the two modalities interact
more effectively and avoid inconsistency. GIA can also be used for the
interaction of other features because of the universality of its structure.
Qualitative and quantitative experiments compared with state-of-the-art methods
on above datasets and real-world images demonstrate the superiority of our
method, e.g., obtaining PSNR/SSIM by +1.91/+0.0048 on NYUv2-BSR than MANet.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2023 08:40:31 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Chen",
"Xuhai",
""
],
[
"Zhang",
"Jiangning",
""
],
[
"Xu",
"Chao",
""
],
[
"Wang",
"Yabiao",
""
],
[
"Wang",
"Chengjie",
""
],
[
"Liu",
"Yong",
""
]
] |
TITLE: Better "CMOS" Produces Clearer Images: Learning Space-Variant Blur
Estimation for Blind Image Super-Resolution
ABSTRACT: Most of the existing blind image Super-Resolution (SR) methods assume that
the blur kernels are space-invariant. However, the blur involved in real
applications are usually space-variant due to object motion, out-of-focus,
etc., resulting in severe performance drop of the advanced SR methods. To
address this problem, we firstly introduce two new datasets with out-of-focus
blur, i.e., NYUv2-BSR and Cityscapes-BSR, to support further researches of
blind SR with space-variant blur. Based on the datasets, we design a novel
Cross-MOdal fuSion network (CMOS) that estimate both blur and semantics
simultaneously, which leads to improved SR results. It involves a feature
Grouping Interactive Attention (GIA) module to make the two modalities interact
more effectively and avoid inconsistency. GIA can also be used for the
interaction of other features because of the universality of its structure.
Qualitative and quantitative experiments compared with state-of-the-art methods
on above datasets and real-world images demonstrate the superiority of our
method, e.g., obtaining PSNR/SSIM by +1.91/+0.0048 on NYUv2-BSR than MANet.
|
new_dataset
| 0.670797
|
2304.03545
|
Alessandro Achille
|
Alessandro Achille, Michael Kearns, Carson Klingenberg, Stefano Soatto
|
AI Model Disgorgement: Methods and Choices
| null | null | null | null |
cs.LG cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Responsible use of data is an indispensable part of any machine learning (ML)
implementation. ML developers must carefully collect and curate their datasets,
and document their provenance. They must also make sure to respect intellectual
property rights, preserve individual privacy, and use data in an ethical way.
Over the past few years, ML models have significantly increased in size and
complexity. These models require a very large amount of data and compute
capacity to train, to the extent that any defects in the training corpus cannot
be trivially remedied by retraining the model from scratch. Despite
sophisticated controls on training data and a significant amount of effort
dedicated to ensuring that training corpora are properly composed, the sheer
volume of data required for the models makes it challenging to manually inspect
each datum comprising a training corpus. One potential fix for training corpus
data defects is model disgorgement -- the elimination of not just the
improperly used data, but also the effects of improperly used data on any
component of an ML model. Model disgorgement techniques can be used to address
a wide range of issues, such as reducing bias or toxicity, increasing fidelity,
and ensuring responsible usage of intellectual property. In this paper, we
introduce a taxonomy of possible disgorgement methods that are applicable to
modern ML systems. In particular, we investigate the meaning of "removing the
effects" of data in the trained model in a way that does not require retraining
from scratch.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2023 08:50:18 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Achille",
"Alessandro",
""
],
[
"Kearns",
"Michael",
""
],
[
"Klingenberg",
"Carson",
""
],
[
"Soatto",
"Stefano",
""
]
] |
TITLE: AI Model Disgorgement: Methods and Choices
ABSTRACT: Responsible use of data is an indispensable part of any machine learning (ML)
implementation. ML developers must carefully collect and curate their datasets,
and document their provenance. They must also make sure to respect intellectual
property rights, preserve individual privacy, and use data in an ethical way.
Over the past few years, ML models have significantly increased in size and
complexity. These models require a very large amount of data and compute
capacity to train, to the extent that any defects in the training corpus cannot
be trivially remedied by retraining the model from scratch. Despite
sophisticated controls on training data and a significant amount of effort
dedicated to ensuring that training corpora are properly composed, the sheer
volume of data required for the models makes it challenging to manually inspect
each datum comprising a training corpus. One potential fix for training corpus
data defects is model disgorgement -- the elimination of not just the
improperly used data, but also the effects of improperly used data on any
component of an ML model. Model disgorgement techniques can be used to address
a wide range of issues, such as reducing bias or toxicity, increasing fidelity,
and ensuring responsible usage of intellectual property. In this paper, we
introduce a taxonomy of possible disgorgement methods that are applicable to
modern ML systems. In particular, we investigate the meaning of "removing the
effects" of data in the trained model in a way that does not require retraining
from scratch.
|
no_new_dataset
| 0.710434
|
2304.03572
|
Hongrun Zhang
|
Hongrun Zhang, Liam Burrows, Yanda Meng, Declan Sculthorpe, Abhik
Mukherjee, Sarah E Coupland, Ke Chen, Yalin Zheng
|
Weakly supervised segmentation with point annotations for histopathology
images via contrast-based variational model
|
Accepted to CVPR2023
| null | null | null |
eess.IV cs.CV cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Image segmentation is a fundamental task in the field of imaging and vision.
Supervised deep learning for segmentation has achieved unparalleled success
when sufficient training data with annotated labels are available. However,
annotation is known to be expensive to obtain, especially for histopathology
images where the target regions are usually with high morphology variations and
irregular shapes. Thus, weakly supervised learning with sparse annotations of
points is promising to reduce the annotation workload. In this work, we propose
a contrast-based variational model to generate segmentation results, which
serve as reliable complementary supervision to train a deep segmentation model
for histopathology images. The proposed method considers the common
characteristics of target regions in histopathology images and can be trained
in an end-to-end manner. It can generate more regionally consistent and
smoother boundary segmentation, and is more robust to unlabeled `novel'
regions. Experiments on two different histology datasets demonstrate its
effectiveness and efficiency in comparison to previous models.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2023 10:12:21 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Zhang",
"Hongrun",
""
],
[
"Burrows",
"Liam",
""
],
[
"Meng",
"Yanda",
""
],
[
"Sculthorpe",
"Declan",
""
],
[
"Mukherjee",
"Abhik",
""
],
[
"Coupland",
"Sarah E",
""
],
[
"Chen",
"Ke",
""
],
[
"Zheng",
"Yalin",
""
]
] |
TITLE: Weakly supervised segmentation with point annotations for histopathology
images via contrast-based variational model
ABSTRACT: Image segmentation is a fundamental task in the field of imaging and vision.
Supervised deep learning for segmentation has achieved unparalleled success
when sufficient training data with annotated labels are available. However,
annotation is known to be expensive to obtain, especially for histopathology
images where the target regions are usually with high morphology variations and
irregular shapes. Thus, weakly supervised learning with sparse annotations of
points is promising to reduce the annotation workload. In this work, we propose
a contrast-based variational model to generate segmentation results, which
serve as reliable complementary supervision to train a deep segmentation model
for histopathology images. The proposed method considers the common
characteristics of target regions in histopathology images and can be trained
in an end-to-end manner. It can generate more regionally consistent and
smoother boundary segmentation, and is more robust to unlabeled `novel'
regions. Experiments on two different histology datasets demonstrate its
effectiveness and efficiency in comparison to previous models.
|
no_new_dataset
| 0.712826
|
2304.03580
|
Jing Hao
|
Jing Hao, Song Chen, Xiaodi Wang, Shumin Han
|
Language-aware Multiple Datasets Detection Pretraining for DETRs
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Pretraining on large-scale datasets can boost the performance of object
detectors while the annotated datasets for object detection are hard to scale
up due to the high labor cost. What we possess are numerous isolated
filed-specific datasets, thus, it is appealing to jointly pretrain models
across aggregation of datasets to enhance data volume and diversity. In this
paper, we propose a strong framework for utilizing Multiple datasets to
pretrain DETR-like detectors, termed METR, without the need for manual label
spaces integration. It converts the typical multi-classification in object
detection into binary classification by introducing a pre-trained language
model. Specifically, we design a category extraction module for extracting
potential categories involved in an image and assign these categories into
different queries by language embeddings. Each query is only responsible for
predicting a class-specific object. Besides, to adapt our novel detection
paradigm, we propose a group bipartite matching strategy that limits the ground
truths to match queries assigned to the same category. Extensive experiments
demonstrate that METR achieves extraordinary results on either multi-task joint
training or the pretrain & finetune paradigm. Notably, our pre-trained models
have high flexible transferability and increase the performance upon various
DETR-like detectors on COCO val2017 benchmark. Codes will be available after
this paper is published.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2023 10:34:04 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Hao",
"Jing",
""
],
[
"Chen",
"Song",
""
],
[
"Wang",
"Xiaodi",
""
],
[
"Han",
"Shumin",
""
]
] |
TITLE: Language-aware Multiple Datasets Detection Pretraining for DETRs
ABSTRACT: Pretraining on large-scale datasets can boost the performance of object
detectors while the annotated datasets for object detection are hard to scale
up due to the high labor cost. What we possess are numerous isolated
filed-specific datasets, thus, it is appealing to jointly pretrain models
across aggregation of datasets to enhance data volume and diversity. In this
paper, we propose a strong framework for utilizing Multiple datasets to
pretrain DETR-like detectors, termed METR, without the need for manual label
spaces integration. It converts the typical multi-classification in object
detection into binary classification by introducing a pre-trained language
model. Specifically, we design a category extraction module for extracting
potential categories involved in an image and assign these categories into
different queries by language embeddings. Each query is only responsible for
predicting a class-specific object. Besides, to adapt our novel detection
paradigm, we propose a group bipartite matching strategy that limits the ground
truths to match queries assigned to the same category. Extensive experiments
demonstrate that METR achieves extraordinary results on either multi-task joint
training or the pretrain & finetune paradigm. Notably, our pre-trained models
have high flexible transferability and increase the performance upon various
DETR-like detectors on COCO val2017 benchmark. Codes will be available after
this paper is published.
|
no_new_dataset
| 0.710823
|
2304.03585
|
Javad Peymanfard
|
Mohammd Hasan Shamgholi, Vahid Saeedi, Javad Peymanfard, Leila
Alhabib, Hossein Zeinali
|
ArmanTTS single-speaker Persian dataset
| null | null | null | null |
cs.CL
|
http://creativecommons.org/licenses/by/4.0/
|
TTS, or text-to-speech, is a complicated process that can be accomplished
through appropriate modeling using deep learning methods. In order to implement
deep learning models, a suitable dataset is required. Since there is a scarce
amount of work done in this field for the Persian language, this paper will
introduce the single speaker dataset: ArmanTTS. We compared the characteristics
of this dataset with those of various prevalent datasets to prove that ArmanTTS
meets the necessary standards for teaching a Persian text-to-speech conversion
model. We also combined the Tacotron 2 and HiFi GAN to design a model that can
receive phonemes as input, with the output being the corresponding speech. 4.0
value of MOS was obtained from real speech, 3.87 value was obtained by the
vocoder prediction and 2.98 value was reached with the synthetic speech
generated by the TTS model.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2023 10:52:55 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Shamgholi",
"Mohammd Hasan",
""
],
[
"Saeedi",
"Vahid",
""
],
[
"Peymanfard",
"Javad",
""
],
[
"Alhabib",
"Leila",
""
],
[
"Zeinali",
"Hossein",
""
]
] |
TITLE: ArmanTTS single-speaker Persian dataset
ABSTRACT: TTS, or text-to-speech, is a complicated process that can be accomplished
through appropriate modeling using deep learning methods. In order to implement
deep learning models, a suitable dataset is required. Since there is a scarce
amount of work done in this field for the Persian language, this paper will
introduce the single speaker dataset: ArmanTTS. We compared the characteristics
of this dataset with those of various prevalent datasets to prove that ArmanTTS
meets the necessary standards for teaching a Persian text-to-speech conversion
model. We also combined the Tacotron 2 and HiFi GAN to design a model that can
receive phonemes as input, with the output being the corresponding speech. 4.0
value of MOS was obtained from real speech, 3.87 value was obtained by the
vocoder prediction and 2.98 value was reached with the synthetic speech
generated by the TTS model.
|
new_dataset
| 0.7176
|
2304.03589
|
Li Shen
|
Li Shen, Yan Sun, Zhiyuan Yu, Liang Ding, Xinmei Tian, Dacheng Tao
|
On Efficient Training of Large-Scale Deep Learning Models: A Literature
Review
|
60 pages
| null | null | null |
cs.LG cs.AI cs.DC
|
http://creativecommons.org/licenses/by/4.0/
|
The field of deep learning has witnessed significant progress, particularly
in computer vision (CV), natural language processing (NLP), and speech. The use
of large-scale models trained on vast amounts of data holds immense promise for
practical applications, enhancing industrial productivity and facilitating
social development. With the increasing demands on computational capacity,
though numerous studies have explored the efficient training, a comprehensive
summarization on acceleration techniques of training deep learning models is
still much anticipated. In this survey, we present a detailed review for
training acceleration. We consider the fundamental update formulation and split
its basic components into five main perspectives: (1) data-centric: including
dataset regularization, data sampling, and data-centric curriculum learning
techniques, which can significantly reduce the computational complexity of the
data samples; (2) model-centric, including acceleration of basic modules,
compression training, model initialization and model-centric curriculum
learning techniques, which focus on accelerating the training via reducing the
calculations on parameters; (3) optimization-centric, including the selection
of learning rate, the employment of large batchsize, the designs of efficient
objectives, and model average techniques, which pay attention to the training
policy and improving the generality for the large-scale models; (4) budgeted
training, including some distinctive acceleration methods on source-constrained
situations; (5) system-centric, including some efficient open-source
distributed libraries/systems which provide adequate hardware support for the
implementation of acceleration algorithms. By presenting this comprehensive
taxonomy, our survey presents a comprehensive review to understand the general
mechanisms within each component and their joint interaction.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2023 11:13:23 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Shen",
"Li",
""
],
[
"Sun",
"Yan",
""
],
[
"Yu",
"Zhiyuan",
""
],
[
"Ding",
"Liang",
""
],
[
"Tian",
"Xinmei",
""
],
[
"Tao",
"Dacheng",
""
]
] |
TITLE: On Efficient Training of Large-Scale Deep Learning Models: A Literature
Review
ABSTRACT: The field of deep learning has witnessed significant progress, particularly
in computer vision (CV), natural language processing (NLP), and speech. The use
of large-scale models trained on vast amounts of data holds immense promise for
practical applications, enhancing industrial productivity and facilitating
social development. With the increasing demands on computational capacity,
though numerous studies have explored the efficient training, a comprehensive
summarization on acceleration techniques of training deep learning models is
still much anticipated. In this survey, we present a detailed review for
training acceleration. We consider the fundamental update formulation and split
its basic components into five main perspectives: (1) data-centric: including
dataset regularization, data sampling, and data-centric curriculum learning
techniques, which can significantly reduce the computational complexity of the
data samples; (2) model-centric, including acceleration of basic modules,
compression training, model initialization and model-centric curriculum
learning techniques, which focus on accelerating the training via reducing the
calculations on parameters; (3) optimization-centric, including the selection
of learning rate, the employment of large batchsize, the designs of efficient
objectives, and model average techniques, which pay attention to the training
policy and improving the generality for the large-scale models; (4) budgeted
training, including some distinctive acceleration methods on source-constrained
situations; (5) system-centric, including some efficient open-source
distributed libraries/systems which provide adequate hardware support for the
implementation of acceleration algorithms. By presenting this comprehensive
taxonomy, our survey presents a comprehensive review to understand the general
mechanisms within each component and their joint interaction.
|
no_new_dataset
| 0.70825
|
2304.03610
|
Mahla Nejati
|
Yuning Xing, Dexter Pham, Henry Williams, David Smith, Ho Seok Ahn,
JongYoon Lim, Bruce A. MacDonald, Mahla Nejati
|
Look how they have grown: Non-destructive Leaf Detection and Size
Estimation of Tomato Plants for 3D Growth Monitoring
|
10 Pages, 10 Figures
|
Proceedings of the Australasian conference on robotics and
automation (ACRA 2022)
| null | null |
cs.CV cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Smart farming is a growing field as technology advances. Plant
characteristics are crucial indicators for monitoring plant growth. Research
has been done to estimate characteristics like leaf area index, leaf disease,
and plant height. However, few methods have been applied to non-destructive
measurements of leaf size. In this paper, an automated non-destructive
imaged-based measuring system is presented, which uses 2D and 3D data obtained
using a Zivid 3D camera, creating 3D virtual representations (digital twins) of
the tomato plants. Leaves are detected from corresponding 2D RGB images and
mapped to their 3D point cloud using the detected leaf masks, which then pass
the leaf point cloud to the plane fitting algorithm to extract the leaf size to
provide data for growth monitoring. The performance of the measurement platform
has been measured through a comprehensive trial on real-world tomato plants
with quantified performance metrics compared to ground truth measurements.
Three tomato leaf and height datasets (including 50+ 3D point cloud files of
tomato plants) were collected and open-sourced in this project. The proposed
leaf size estimation method demonstrates an RMSE value of 4.47mm and an R^2
value of 0.87. The overall measurement system (leaf detection and size
estimation algorithms combine) delivers an RMSE value of 8.13mm and an R^2
value of 0.899.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2023 12:16:10 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Xing",
"Yuning",
""
],
[
"Pham",
"Dexter",
""
],
[
"Williams",
"Henry",
""
],
[
"Smith",
"David",
""
],
[
"Ahn",
"Ho Seok",
""
],
[
"Lim",
"JongYoon",
""
],
[
"MacDonald",
"Bruce A.",
""
],
[
"Nejati",
"Mahla",
""
]
] |
TITLE: Look how they have grown: Non-destructive Leaf Detection and Size
Estimation of Tomato Plants for 3D Growth Monitoring
ABSTRACT: Smart farming is a growing field as technology advances. Plant
characteristics are crucial indicators for monitoring plant growth. Research
has been done to estimate characteristics like leaf area index, leaf disease,
and plant height. However, few methods have been applied to non-destructive
measurements of leaf size. In this paper, an automated non-destructive
imaged-based measuring system is presented, which uses 2D and 3D data obtained
using a Zivid 3D camera, creating 3D virtual representations (digital twins) of
the tomato plants. Leaves are detected from corresponding 2D RGB images and
mapped to their 3D point cloud using the detected leaf masks, which then pass
the leaf point cloud to the plane fitting algorithm to extract the leaf size to
provide data for growth monitoring. The performance of the measurement platform
has been measured through a comprehensive trial on real-world tomato plants
with quantified performance metrics compared to ground truth measurements.
Three tomato leaf and height datasets (including 50+ 3D point cloud files of
tomato plants) were collected and open-sourced in this project. The proposed
leaf size estimation method demonstrates an RMSE value of 4.47mm and an R^2
value of 0.87. The overall measurement system (leaf detection and size
estimation algorithms combine) delivers an RMSE value of 8.13mm and an R^2
value of 0.899.
|
new_dataset
| 0.637934
|
2304.03626
|
Donald Shenaj
|
Donald Shenaj, Marco Toldo, Alberto Rigon, Pietro Zanuttigh
|
Asynchronous Federated Continual Learning
|
CVPR 2023 FedVision Workshop (CVPRW)
| null | null | null |
cs.LG cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The standard class-incremental continual learning setting assumes a set of
tasks seen one after the other in a fixed and predefined order. This is not
very realistic in federated learning environments where each client works
independently in an asynchronous manner getting data for the different tasks in
time-frames and orders totally uncorrelated with the other ones. We introduce a
novel federated learning setting (AFCL) where the continual learning of
multiple tasks happens at each client with different orderings and in
asynchronous time slots. We tackle this novel task using prototype-based
learning, a representation loss, fractal pre-training, and a modified
aggregation policy. Our approach, called FedSpace, effectively tackles this
task as shown by the results on the CIFAR-100 dataset using 3 different
federated splits with 50, 100, and 500 clients, respectively. The code and
federated splits are available at https://github.com/LTTM/FedSpace.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2023 12:59:57 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Shenaj",
"Donald",
""
],
[
"Toldo",
"Marco",
""
],
[
"Rigon",
"Alberto",
""
],
[
"Zanuttigh",
"Pietro",
""
]
] |
TITLE: Asynchronous Federated Continual Learning
ABSTRACT: The standard class-incremental continual learning setting assumes a set of
tasks seen one after the other in a fixed and predefined order. This is not
very realistic in federated learning environments where each client works
independently in an asynchronous manner getting data for the different tasks in
time-frames and orders totally uncorrelated with the other ones. We introduce a
novel federated learning setting (AFCL) where the continual learning of
multiple tasks happens at each client with different orderings and in
asynchronous time slots. We tackle this novel task using prototype-based
learning, a representation loss, fractal pre-training, and a modified
aggregation policy. Our approach, called FedSpace, effectively tackles this
task as shown by the results on the CIFAR-100 dataset using 3 different
federated splits with 50, 100, and 500 clients, respectively. The code and
federated splits are available at https://github.com/LTTM/FedSpace.
|
no_new_dataset
| 0.707209
|
2304.03631
|
Eadom Dessalene
|
Eadom Dessalene, Michael Maynord, Cornelia Fermuller, Yiannis
Aloimonos
|
Therbligs in Action: Video Understanding through Motion Primitives
|
8 pages
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we introduce a rule-based, compositional, and hierarchical
modeling of action using Therbligs as our atoms. Introducing these atoms
provides us with a consistent, expressive, contact-centered representation of
action. Over the atoms we introduce a differentiable method of rule-based
reasoning to regularize for logical consistency. Our approach is complementary
to other approaches in that the Therblig-based representations produced by our
architecture augment rather than replace existing architectures'
representations. We release the first Therblig-centered annotations over two
popular video datasets - EPIC Kitchens 100 and 50-Salads. We also broadly
demonstrate benefits to adopting Therblig representations through evaluation on
the following tasks: action segmentation, action anticipation, and action
recognition - observing an average 10.5\%/7.53\%/6.5\% relative improvement,
respectively, over EPIC Kitchens and an average 8.9\%/6.63\%/4.8\% relative
improvement, respectively, over 50 Salads. Code and data will be made publicly
available.
|
[
{
"version": "v1",
"created": "Thu, 6 Apr 2023 17:27:39 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Dessalene",
"Eadom",
""
],
[
"Maynord",
"Michael",
""
],
[
"Fermuller",
"Cornelia",
""
],
[
"Aloimonos",
"Yiannis",
""
]
] |
TITLE: Therbligs in Action: Video Understanding through Motion Primitives
ABSTRACT: In this paper we introduce a rule-based, compositional, and hierarchical
modeling of action using Therbligs as our atoms. Introducing these atoms
provides us with a consistent, expressive, contact-centered representation of
action. Over the atoms we introduce a differentiable method of rule-based
reasoning to regularize for logical consistency. Our approach is complementary
to other approaches in that the Therblig-based representations produced by our
architecture augment rather than replace existing architectures'
representations. We release the first Therblig-centered annotations over two
popular video datasets - EPIC Kitchens 100 and 50-Salads. We also broadly
demonstrate benefits to adopting Therblig representations through evaluation on
the following tasks: action segmentation, action anticipation, and action
recognition - observing an average 10.5\%/7.53\%/6.5\% relative improvement,
respectively, over EPIC Kitchens and an average 8.9\%/6.63\%/4.8\% relative
improvement, respectively, over 50 Salads. Code and data will be made publicly
available.
|
no_new_dataset
| 0.710791
|
2304.03640
|
Muhammad Akbar Husnoo
|
Muhammad Akbar Husnoo, Adnan Anwar, Haftu Tasew Reda, Nasser
Hosseinzadeh, Shama Naz Islam, Abdun Naser Mahmood, Robin Doss
|
FedDiSC: A Computation-efficient Federated Learning Framework for Power
Systems Disturbance and Cyber Attack Discrimination
| null | null | null | null |
cs.CR cs.DC cs.LG
|
http://creativecommons.org/licenses/by/4.0/
|
With the growing concern about the security and privacy of smart grid
systems, cyberattacks on critical power grid components, such as state
estimation, have proven to be one of the top-priority cyber-related issues and
have received significant attention in recent years. However, cyberattack
detection in smart grids now faces new challenges, including privacy
preservation and decentralized power zones with strategic data owners. To
address these technical bottlenecks, this paper proposes a novel Federated
Learning-based privacy-preserving and communication-efficient attack detection
framework, known as FedDiSC, that enables Discrimination between power System
disturbances and Cyberattacks. Specifically, we first propose a Federated
Learning approach to enable Supervisory Control and Data Acquisition subsystems
of decentralized power grid zones to collaboratively train an attack detection
model without sharing sensitive power related data. Secondly, we put forward a
representation learning-based Deep Auto-Encoder network to accurately detect
power system and cybersecurity anomalies. Lastly, to adapt our proposed
framework to the timeliness of real-world cyberattack detection in SGs, we
leverage the use of a gradient privacy-preserving quantization scheme known as
DP-SIGNSGD to improve its communication efficiency. Extensive simulations of
the proposed framework on publicly available Industrial Control Systems
datasets demonstrate that the proposed framework can achieve superior detection
accuracy while preserving the privacy of sensitive power grid related
information. Furthermore, we find that the gradient quantization scheme
utilized improves communication efficiency by 40% when compared to a
traditional federated learning approach without gradient quantization which
suggests suitability in a real-world scenario.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2023 13:43:57 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Husnoo",
"Muhammad Akbar",
""
],
[
"Anwar",
"Adnan",
""
],
[
"Reda",
"Haftu Tasew",
""
],
[
"Hosseinzadeh",
"Nasser",
""
],
[
"Islam",
"Shama Naz",
""
],
[
"Mahmood",
"Abdun Naser",
""
],
[
"Doss",
"Robin",
""
]
] |
TITLE: FedDiSC: A Computation-efficient Federated Learning Framework for Power
Systems Disturbance and Cyber Attack Discrimination
ABSTRACT: With the growing concern about the security and privacy of smart grid
systems, cyberattacks on critical power grid components, such as state
estimation, have proven to be one of the top-priority cyber-related issues and
have received significant attention in recent years. However, cyberattack
detection in smart grids now faces new challenges, including privacy
preservation and decentralized power zones with strategic data owners. To
address these technical bottlenecks, this paper proposes a novel Federated
Learning-based privacy-preserving and communication-efficient attack detection
framework, known as FedDiSC, that enables Discrimination between power System
disturbances and Cyberattacks. Specifically, we first propose a Federated
Learning approach to enable Supervisory Control and Data Acquisition subsystems
of decentralized power grid zones to collaboratively train an attack detection
model without sharing sensitive power related data. Secondly, we put forward a
representation learning-based Deep Auto-Encoder network to accurately detect
power system and cybersecurity anomalies. Lastly, to adapt our proposed
framework to the timeliness of real-world cyberattack detection in SGs, we
leverage the use of a gradient privacy-preserving quantization scheme known as
DP-SIGNSGD to improve its communication efficiency. Extensive simulations of
the proposed framework on publicly available Industrial Control Systems
datasets demonstrate that the proposed framework can achieve superior detection
accuracy while preserving the privacy of sensitive power grid related
information. Furthermore, we find that the gradient quantization scheme
utilized improves communication efficiency by 40% when compared to a
traditional federated learning approach without gradient quantization which
suggests suitability in a real-world scenario.
|
no_new_dataset
| 0.71081
|
2304.03649
|
Jesus Silva Rodriguez
|
Jesus Silva-Rodriguez, Xingpeng Li
|
Privacy-Preserving Decentralized Energy Management for Networked
Microgrids via Objective-Based ADMM
|
10 Pages
| null | null | null |
eess.SY cs.SY
|
http://creativecommons.org/licenses/by/4.0/
|
This paper proposes a decentralized energy management (DEM) strategy for a
network of local microgrids, providing economically balanced energy schedules
for all participating microgrids. The proposed DEM strategy can preserve the
privacy of each microgrid by only requiring them to share network power
exchange information. The proposed DEM strategy enhances the traditional
alternating direction method of multipliers (ADMM) formulation for networks of
microgrids by examining the global objective value as well as the solution
quality. A novel stopping decision combining these two metrics is proposed for
the enhanced objective-based ADMM (OB-ADMM) method. This paper also presents a
centralized energy management (CEM) model as a benchmark, and a post-processing
proportional exchange algorithm (PEA) to balance the economic benefit of each
microgrid. The resulting proposed OB-ADMM model combined with the PEA delivers
the final high-fidelity optimal solution for multiple microgrids in a
grid-connected collaborative power exchange network. Moreover, the proposed
decentralized operational strategy preserves the economic and privacy interests
of individual microgrid participants. Different network cases are simulated to
test the algorithm's performance, and the results validate the aforementioned
claims.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2023 13:52:09 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Silva-Rodriguez",
"Jesus",
""
],
[
"Li",
"Xingpeng",
""
]
] |
TITLE: Privacy-Preserving Decentralized Energy Management for Networked
Microgrids via Objective-Based ADMM
ABSTRACT: This paper proposes a decentralized energy management (DEM) strategy for a
network of local microgrids, providing economically balanced energy schedules
for all participating microgrids. The proposed DEM strategy can preserve the
privacy of each microgrid by only requiring them to share network power
exchange information. The proposed DEM strategy enhances the traditional
alternating direction method of multipliers (ADMM) formulation for networks of
microgrids by examining the global objective value as well as the solution
quality. A novel stopping decision combining these two metrics is proposed for
the enhanced objective-based ADMM (OB-ADMM) method. This paper also presents a
centralized energy management (CEM) model as a benchmark, and a post-processing
proportional exchange algorithm (PEA) to balance the economic benefit of each
microgrid. The resulting proposed OB-ADMM model combined with the PEA delivers
the final high-fidelity optimal solution for multiple microgrids in a
grid-connected collaborative power exchange network. Moreover, the proposed
decentralized operational strategy preserves the economic and privacy interests
of individual microgrid participants. Different network cases are simulated to
test the algorithm's performance, and the results validate the aforementioned
claims.
|
no_new_dataset
| 0.711418
|
2304.03669
|
Haoyuan Li
|
Haoyuan Li, Hao Jiang, Tao Jin, Mengyan Li, Yan Chen, Zhijie Lin, Yang
Zhao, Zhou Zhao
|
DATE: Domain Adaptive Product Seeker for E-commerce
|
This paper was accepted by CVPR 2023
| null | null | null |
cs.CV
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
Product Retrieval (PR) and Grounding (PG), aiming to seek image and
object-level products respectively according to a textual query, have attracted
great interest recently for better shopping experience. Owing to the lack of
relevant datasets, we collect two large-scale benchmark datasets from Taobao
Mall and Live domains with about 474k and 101k image-query pairs for PR, and
manually annotate the object bounding boxes in each image for PG. As annotating
boxes is expensive and time-consuming, we attempt to transfer knowledge from
annotated domain to unannotated for PG to achieve un-supervised Domain
Adaptation (PG-DA). We propose a {\bf D}omain {\bf A}daptive Produc{\bf t}
S{\bf e}eker ({\bf DATE}) framework, regarding PR and PG as Product Seeking
problem at different levels, to assist the query {\bf date} the product.
Concretely, we first design a semantics-aggregated feature extractor for each
modality to obtain concentrated and comprehensive features for following
efficient retrieval and fine-grained grounding tasks. Then, we present two
cooperative seekers to simultaneously search the image for PR and localize the
product for PG. Besides, we devise a domain aligner for PG-DA to alleviate
uni-modal marginal and multi-modal conditional distribution shift between
source and target domains, and design a pseudo box generator to dynamically
select reliable instances and generate bounding boxes for further knowledge
transfer. Extensive experiments show that our DATE achieves satisfactory
performance in fully-supervised PR, PG and un-supervised PG-DA. Our
desensitized datasets will be publicly available
here\footnote{\url{https://github.com/Taobao-live/Product-Seeking}}.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2023 14:40:16 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Li",
"Haoyuan",
""
],
[
"Jiang",
"Hao",
""
],
[
"Jin",
"Tao",
""
],
[
"Li",
"Mengyan",
""
],
[
"Chen",
"Yan",
""
],
[
"Lin",
"Zhijie",
""
],
[
"Zhao",
"Yang",
""
],
[
"Zhao",
"Zhou",
""
]
] |
TITLE: DATE: Domain Adaptive Product Seeker for E-commerce
ABSTRACT: Product Retrieval (PR) and Grounding (PG), aiming to seek image and
object-level products respectively according to a textual query, have attracted
great interest recently for better shopping experience. Owing to the lack of
relevant datasets, we collect two large-scale benchmark datasets from Taobao
Mall and Live domains with about 474k and 101k image-query pairs for PR, and
manually annotate the object bounding boxes in each image for PG. As annotating
boxes is expensive and time-consuming, we attempt to transfer knowledge from
annotated domain to unannotated for PG to achieve un-supervised Domain
Adaptation (PG-DA). We propose a {\bf D}omain {\bf A}daptive Produc{\bf t}
S{\bf e}eker ({\bf DATE}) framework, regarding PR and PG as Product Seeking
problem at different levels, to assist the query {\bf date} the product.
Concretely, we first design a semantics-aggregated feature extractor for each
modality to obtain concentrated and comprehensive features for following
efficient retrieval and fine-grained grounding tasks. Then, we present two
cooperative seekers to simultaneously search the image for PR and localize the
product for PG. Besides, we devise a domain aligner for PG-DA to alleviate
uni-modal marginal and multi-modal conditional distribution shift between
source and target domains, and design a pseudo box generator to dynamically
select reliable instances and generate bounding boxes for further knowledge
transfer. Extensive experiments show that our DATE achieves satisfactory
performance in fully-supervised PR, PG and un-supervised PG-DA. Our
desensitized datasets will be publicly available
here\footnote{\url{https://github.com/Taobao-live/Product-Seeking}}.
|
no_new_dataset
| 0.710823
|
2304.03679
|
Xiaohui Xie
|
Xiaohui Xie, Qian Dong, Bingning Wang, Feiyang Lv, Ting Yao, Weinan
Gan, Zhijing Wu, Xiangsheng Li, Haitao Li, Yiqun Liu, Jin Ma
|
T2Ranking: A large-scale Chinese Benchmark for Passage Ranking
|
This Resource paper has been accepted by the 46th International ACM
SIGIR Conference on Research and Development in Information Retrieval (SIGIR
2023)
| null | null | null |
cs.IR
|
http://creativecommons.org/licenses/by/4.0/
|
Passage ranking involves two stages: passage retrieval and passage
re-ranking, which are important and challenging topics for both academics and
industries in the area of Information Retrieval (IR). However, the
commonly-used datasets for passage ranking usually focus on the English
language. For non-English scenarios, such as Chinese, the existing datasets are
limited in terms of data scale, fine-grained relevance annotation and false
negative issues. To address this problem, we introduce T2Ranking, a large-scale
Chinese benchmark for passage ranking. T2Ranking comprises more than 300K
queries and over 2M unique passages from real-world search engines. Expert
annotators are recruited to provide 4-level graded relevance scores
(fine-grained) for query-passage pairs instead of binary relevance judgments
(coarse-grained). To ease the false negative issues, more passages with higher
diversities are considered when performing relevance annotations, especially in
the test set, to ensure a more accurate evaluation. Apart from the textual
query and passage data, other auxiliary resources are also provided, such as
query types and XML files of documents which passages are generated from, to
facilitate further studies. To evaluate the dataset, commonly used ranking
models are implemented and tested on T2Ranking as baselines. The experimental
results show that T2Ranking is challenging and there is still scope for
improvement. The full data and all codes are available at
https://github.com/THUIR/T2Ranking/
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2023 15:02:33 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Xie",
"Xiaohui",
""
],
[
"Dong",
"Qian",
""
],
[
"Wang",
"Bingning",
""
],
[
"Lv",
"Feiyang",
""
],
[
"Yao",
"Ting",
""
],
[
"Gan",
"Weinan",
""
],
[
"Wu",
"Zhijing",
""
],
[
"Li",
"Xiangsheng",
""
],
[
"Li",
"Haitao",
""
],
[
"Liu",
"Yiqun",
""
],
[
"Ma",
"Jin",
""
]
] |
TITLE: T2Ranking: A large-scale Chinese Benchmark for Passage Ranking
ABSTRACT: Passage ranking involves two stages: passage retrieval and passage
re-ranking, which are important and challenging topics for both academics and
industries in the area of Information Retrieval (IR). However, the
commonly-used datasets for passage ranking usually focus on the English
language. For non-English scenarios, such as Chinese, the existing datasets are
limited in terms of data scale, fine-grained relevance annotation and false
negative issues. To address this problem, we introduce T2Ranking, a large-scale
Chinese benchmark for passage ranking. T2Ranking comprises more than 300K
queries and over 2M unique passages from real-world search engines. Expert
annotators are recruited to provide 4-level graded relevance scores
(fine-grained) for query-passage pairs instead of binary relevance judgments
(coarse-grained). To ease the false negative issues, more passages with higher
diversities are considered when performing relevance annotations, especially in
the test set, to ensure a more accurate evaluation. Apart from the textual
query and passage data, other auxiliary resources are also provided, such as
query types and XML files of documents which passages are generated from, to
facilitate further studies. To evaluate the dataset, commonly used ranking
models are implemented and tested on T2Ranking as baselines. The experimental
results show that T2Ranking is challenging and there is still scope for
improvement. The full data and all codes are available at
https://github.com/THUIR/T2Ranking/
|
new_dataset
| 0.595022
|
2304.03691
|
Vrizlynn L. L. Thing
|
Zihao Wang, Vrizlynn L. L. Thing
|
Feature Mining for Encrypted Malicious Traffic Detection with Deep
Learning and Other Machine Learning Algorithms
|
Computers & Security, Volume 128, No. 103143, 2023
|
Computers & Security, Volume 128, No. 103143, 2023
|
10.1016/j.cose.2023.103143
| null |
cs.CR cs.AI cs.LG
|
http://creativecommons.org/licenses/by-nc-nd/4.0/
|
The popularity of encryption mechanisms poses a great challenge to malicious
traffic detection. The reason is traditional detection techniques cannot work
without the decryption of encrypted traffic. Currently, research on encrypted
malicious traffic detection without decryption has focused on feature
extraction and the choice of machine learning or deep learning algorithms. In
this paper, we first provide an in-depth analysis of traffic features and
compare different state-of-the-art traffic feature creation approaches, while
proposing a novel concept for encrypted traffic feature which is specifically
designed for encrypted malicious traffic analysis. In addition, we propose a
framework for encrypted malicious traffic detection. The framework is a
two-layer detection framework which consists of both deep learning and
traditional machine learning algorithms. Through comparative experiments, it
outperforms classical deep learning and traditional machine learning
algorithms, such as ResNet and Random Forest. Moreover, to provide sufficient
training data for the deep learning model, we also curate a dataset composed
entirely of public datasets. The composed dataset is more comprehensive than
using any public dataset alone. Lastly, we discuss the future directions of
this research.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2023 15:25:36 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Wang",
"Zihao",
""
],
[
"Thing",
"Vrizlynn L. L.",
""
]
] |
TITLE: Feature Mining for Encrypted Malicious Traffic Detection with Deep
Learning and Other Machine Learning Algorithms
ABSTRACT: The popularity of encryption mechanisms poses a great challenge to malicious
traffic detection. The reason is traditional detection techniques cannot work
without the decryption of encrypted traffic. Currently, research on encrypted
malicious traffic detection without decryption has focused on feature
extraction and the choice of machine learning or deep learning algorithms. In
this paper, we first provide an in-depth analysis of traffic features and
compare different state-of-the-art traffic feature creation approaches, while
proposing a novel concept for encrypted traffic feature which is specifically
designed for encrypted malicious traffic analysis. In addition, we propose a
framework for encrypted malicious traffic detection. The framework is a
two-layer detection framework which consists of both deep learning and
traditional machine learning algorithms. Through comparative experiments, it
outperforms classical deep learning and traditional machine learning
algorithms, such as ResNet and Random Forest. Moreover, to provide sufficient
training data for the deep learning model, we also curate a dataset composed
entirely of public datasets. The composed dataset is more comprehensive than
using any public dataset alone. Lastly, we discuss the future directions of
this research.
|
new_dataset
| 0.710635
|
2304.03698
|
Vrizlynn L. L. Thing
|
Vrizlynn L. L. Thing
|
Deepfake Detection with Deep Learning: Convolutional Neural Networks
versus Transformers
|
IEEE Cyber Security and Resilience Conference 2023
| null | null | null |
cs.CR cs.CV cs.LG
|
http://creativecommons.org/licenses/by-nc-nd/4.0/
|
The rapid evolvement of deepfake creation technologies is seriously threating
media information trustworthiness. The consequences impacting targeted
individuals and institutions can be dire. In this work, we study the evolutions
of deep learning architectures, particularly CNNs and Transformers. We
identified eight promising deep learning architectures, designed and developed
our deepfake detection models and conducted experiments over well-established
deepfake datasets. These datasets included the latest second and third
generation deepfake datasets. We evaluated the effectiveness of our developed
single model detectors in deepfake detection and cross datasets evaluations. We
achieved 88.74%, 99.53%, 97.68%, 99.73% and 92.02% accuracy and 99.95%, 100%,
99.88%, 99.99% and 97.61% AUC, in the detection of FF++ 2020, Google DFD,
Celeb-DF, Deeper Forensics and DFDC deepfakes, respectively. We also identified
and showed the unique strengths of CNNs and Transformers models and analysed
the observed relationships among the different deepfake datasets, to aid future
developments in this area.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2023 15:33:09 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Thing",
"Vrizlynn L. L.",
""
]
] |
TITLE: Deepfake Detection with Deep Learning: Convolutional Neural Networks
versus Transformers
ABSTRACT: The rapid evolvement of deepfake creation technologies is seriously threating
media information trustworthiness. The consequences impacting targeted
individuals and institutions can be dire. In this work, we study the evolutions
of deep learning architectures, particularly CNNs and Transformers. We
identified eight promising deep learning architectures, designed and developed
our deepfake detection models and conducted experiments over well-established
deepfake datasets. These datasets included the latest second and third
generation deepfake datasets. We evaluated the effectiveness of our developed
single model detectors in deepfake detection and cross datasets evaluations. We
achieved 88.74%, 99.53%, 97.68%, 99.73% and 92.02% accuracy and 99.95%, 100%,
99.88%, 99.99% and 97.61% AUC, in the detection of FF++ 2020, Google DFD,
Celeb-DF, Deeper Forensics and DFDC deepfakes, respectively. We also identified
and showed the unique strengths of CNNs and Transformers models and analysed
the observed relationships among the different deepfake datasets, to aid future
developments in this area.
|
no_new_dataset
| 0.712676
|
2304.03709
|
Zhi Gao
|
Jin Chen, Zhi Gao, Xinxiao Wu, Jiebo Luo
|
Meta-causal Learning for Single Domain Generalization
|
Accepted by CVPR 2023
| null | null | null |
cs.CV cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Single domain generalization aims to learn a model from a single training
domain (source domain) and apply it to multiple unseen test domains (target
domains). Existing methods focus on expanding the distribution of the training
domain to cover the target domains, but without estimating the domain shift
between the source and target domains. In this paper, we propose a new learning
paradigm, namely simulate-analyze-reduce, which first simulates the domain
shift by building an auxiliary domain as the target domain, then learns to
analyze the causes of domain shift, and finally learns to reduce the domain
shift for model adaptation. Under this paradigm, we propose a meta-causal
learning method to learn meta-knowledge, that is, how to infer the causes of
domain shift between the auxiliary and source domains during training. We use
the meta-knowledge to analyze the shift between the target and source domains
during testing. Specifically, we perform multiple transformations on source
data to generate the auxiliary domain, perform counterfactual inference to
learn to discover the causal factors of the shift between the auxiliary and
source domains, and incorporate the inferred causality into factor-aware domain
alignments. Extensive experiments on several benchmarks of image classification
show the effectiveness of our method.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2023 15:46:38 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Chen",
"Jin",
""
],
[
"Gao",
"Zhi",
""
],
[
"Wu",
"Xinxiao",
""
],
[
"Luo",
"Jiebo",
""
]
] |
TITLE: Meta-causal Learning for Single Domain Generalization
ABSTRACT: Single domain generalization aims to learn a model from a single training
domain (source domain) and apply it to multiple unseen test domains (target
domains). Existing methods focus on expanding the distribution of the training
domain to cover the target domains, but without estimating the domain shift
between the source and target domains. In this paper, we propose a new learning
paradigm, namely simulate-analyze-reduce, which first simulates the domain
shift by building an auxiliary domain as the target domain, then learns to
analyze the causes of domain shift, and finally learns to reduce the domain
shift for model adaptation. Under this paradigm, we propose a meta-causal
learning method to learn meta-knowledge, that is, how to infer the causes of
domain shift between the auxiliary and source domains during training. We use
the meta-knowledge to analyze the shift between the target and source domains
during testing. Specifically, we perform multiple transformations on source
data to generate the auxiliary domain, perform counterfactual inference to
learn to discover the causal factors of the shift between the auxiliary and
source domains, and incorporate the inferred causality into factor-aware domain
alignments. Extensive experiments on several benchmarks of image classification
show the effectiveness of our method.
|
no_new_dataset
| 0.709849
|
2304.03722
|
Boris van Breugel
|
Boris van Breugel and Mihaela van der Schaar
|
Beyond Privacy: Navigating the Opportunities and Challenges of Synthetic
Data
| null | null | null | null |
cs.LG
|
http://creativecommons.org/licenses/by/4.0/
|
Generating synthetic data through generative models is gaining interest in
the ML community and beyond. In the past, synthetic data was often regarded as
a means to private data release, but a surge of recent papers explore how its
potential reaches much further than this -- from creating more fair data to
data augmentation, and from simulation to text generated by ChatGPT. In this
perspective we explore whether, and how, synthetic data may become a dominant
force in the machine learning world, promising a future where datasets can be
tailored to individual needs. Just as importantly, we discuss which fundamental
challenges the community needs to overcome for wider relevance and application
of synthetic data -- the most important of which is quantifying how much we can
trust any finding or prediction drawn from synthetic data.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2023 16:38:40 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"van Breugel",
"Boris",
""
],
[
"van der Schaar",
"Mihaela",
""
]
] |
TITLE: Beyond Privacy: Navigating the Opportunities and Challenges of Synthetic
Data
ABSTRACT: Generating synthetic data through generative models is gaining interest in
the ML community and beyond. In the past, synthetic data was often regarded as
a means to private data release, but a surge of recent papers explore how its
potential reaches much further than this -- from creating more fair data to
data augmentation, and from simulation to text generated by ChatGPT. In this
perspective we explore whether, and how, synthetic data may become a dominant
force in the machine learning world, promising a future where datasets can be
tailored to individual needs. Just as importantly, we discuss which fundamental
challenges the community needs to overcome for wider relevance and application
of synthetic data -- the most important of which is quantifying how much we can
trust any finding or prediction drawn from synthetic data.
|
no_new_dataset
| 0.710176
|
2304.03730
|
Zhuoxuan Jiang
|
Ziming Huang and Zhuoxuan Jiang and Ke Wang and Juntao Li and Shanshan
Feng and Xian-Ling Mao
|
Gated Mechanism Enhanced Multi-Task Learning for Dialog Routing
|
Accepted by COLING'22(Oral)
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Currently, human-bot symbiosis dialog systems, e.g., pre- and after-sales in
E-commerce, are ubiquitous, and the dialog routing component is essential to
improve the overall efficiency, reduce human resource cost, and enhance user
experience. Although most existing methods can fulfil this requirement, they
can only model single-source dialog data and cannot effectively capture the
underlying knowledge of relations among data and subtasks. In this paper, we
investigate this important problem by thoroughly mining both the data-to-task
and task-to-task knowledge among various kinds of dialog data. To achieve the
above targets, we propose a Gated Mechanism enhanced Multi-task Model (G3M),
specifically including a novel dialog encoder and two tailored gated mechanism
modules. The proposed method can play the role of hierarchical information
filtering and is non-invasive to existing dialog systems. Based on two datasets
collected from real world applications, extensive experimental results
demonstrate the effectiveness of our method, which achieves the
state-of-the-art performance by improving 8.7\%/11.8\% on RMSE metric and
2.2\%/4.4\% on F1 metric.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2023 16:51:46 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Huang",
"Ziming",
""
],
[
"Jiang",
"Zhuoxuan",
""
],
[
"Wang",
"Ke",
""
],
[
"Li",
"Juntao",
""
],
[
"Feng",
"Shanshan",
""
],
[
"Mao",
"Xian-Ling",
""
]
] |
TITLE: Gated Mechanism Enhanced Multi-Task Learning for Dialog Routing
ABSTRACT: Currently, human-bot symbiosis dialog systems, e.g., pre- and after-sales in
E-commerce, are ubiquitous, and the dialog routing component is essential to
improve the overall efficiency, reduce human resource cost, and enhance user
experience. Although most existing methods can fulfil this requirement, they
can only model single-source dialog data and cannot effectively capture the
underlying knowledge of relations among data and subtasks. In this paper, we
investigate this important problem by thoroughly mining both the data-to-task
and task-to-task knowledge among various kinds of dialog data. To achieve the
above targets, we propose a Gated Mechanism enhanced Multi-task Model (G3M),
specifically including a novel dialog encoder and two tailored gated mechanism
modules. The proposed method can play the role of hierarchical information
filtering and is non-invasive to existing dialog systems. Based on two datasets
collected from real world applications, extensive experimental results
demonstrate the effectiveness of our method, which achieves the
state-of-the-art performance by improving 8.7\%/11.8\% on RMSE metric and
2.2\%/4.4\% on F1 metric.
|
no_new_dataset
| 0.708862
|
2304.03739
|
Prithvi Akella
|
Prithvi Akella and Aaron D. Ames
|
Bounding Optimality Gaps for Non-Convex Optimization Problems:
Applications to Nonlinear Safety-Critical Systems
| null | null | null | null |
math.OC cs.IT cs.RO cs.SY eess.SY math.IT
|
http://creativecommons.org/licenses/by/4.0/
|
Efficient methods to provide sub-optimal solutions to non-convex optimization
problems with knowledge of the solution's sub-optimality would facilitate the
widespread application of nonlinear optimal control algorithms. To that end,
leveraging recent work in risk-aware verification, we provide two algorithms to
(1) probabilistically bound the optimality gaps of solutions reported by novel
percentile optimization techniques, and (2) probabilistically bound the maximum
optimality gap reported by percentile approaches for repetitive applications,
e.g. Model Predictive Control (MPC). Notably, our results work for a large
class of optimization problems. We showcase the efficacy and repeatability of
our results on a few, benchmark non-convex optimization problems and the
utility of our results for controls in a Nonlinear MPC setting.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2023 17:22:12 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Akella",
"Prithvi",
""
],
[
"Ames",
"Aaron D.",
""
]
] |
TITLE: Bounding Optimality Gaps for Non-Convex Optimization Problems:
Applications to Nonlinear Safety-Critical Systems
ABSTRACT: Efficient methods to provide sub-optimal solutions to non-convex optimization
problems with knowledge of the solution's sub-optimality would facilitate the
widespread application of nonlinear optimal control algorithms. To that end,
leveraging recent work in risk-aware verification, we provide two algorithms to
(1) probabilistically bound the optimality gaps of solutions reported by novel
percentile optimization techniques, and (2) probabilistically bound the maximum
optimality gap reported by percentile approaches for repetitive applications,
e.g. Model Predictive Control (MPC). Notably, our results work for a large
class of optimization problems. We showcase the efficacy and repeatability of
our results on a few, benchmark non-convex optimization problems and the
utility of our results for controls in a Nonlinear MPC setting.
|
no_new_dataset
| 0.709057
|
2304.03754
|
Hung-Ting Su
|
Hung-Ting Su, Yulei Niu, Xudong Lin, Winston H. Hsu, Shih-Fu Chang
|
Language Models are Causal Knowledge Extractors for Zero-shot Video
Question Answering
|
CVPR 2023 Workshop L3D-IVU
| null | null | null |
cs.CL cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Causal Video Question Answering (CVidQA) queries not only association or
temporal relations but also causal relations in a video. Existing question
synthesis methods pre-trained question generation (QG) systems on reading
comprehension datasets with text descriptions as inputs. However, QG models
only learn to ask association questions (e.g., ``what is someone doing...'')
and result in inferior performance due to the poor transfer of association
knowledge to CVidQA, which focuses on causal questions like ``why is someone
doing ...''. Observing this, we proposed to exploit causal knowledge to
generate question-answer pairs, and proposed a novel framework, Causal
Knowledge Extraction from Language Models (CaKE-LM), leveraging causal
commonsense knowledge from language models to tackle CVidQA. To extract
knowledge from LMs, CaKE-LM generates causal questions containing two events
with one triggering another (e.g., ``score a goal'' triggers ``soccer player
kicking ball'') by prompting LM with the action (soccer player kicking ball) to
retrieve the intention (to score a goal). CaKE-LM significantly outperforms
conventional methods by 4% to 6% of zero-shot CVidQA accuracy on NExT-QA and
Causal-VidQA datasets. We also conduct comprehensive analyses and provide key
findings for future research.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2023 17:45:49 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Su",
"Hung-Ting",
""
],
[
"Niu",
"Yulei",
""
],
[
"Lin",
"Xudong",
""
],
[
"Hsu",
"Winston H.",
""
],
[
"Chang",
"Shih-Fu",
""
]
] |
TITLE: Language Models are Causal Knowledge Extractors for Zero-shot Video
Question Answering
ABSTRACT: Causal Video Question Answering (CVidQA) queries not only association or
temporal relations but also causal relations in a video. Existing question
synthesis methods pre-trained question generation (QG) systems on reading
comprehension datasets with text descriptions as inputs. However, QG models
only learn to ask association questions (e.g., ``what is someone doing...'')
and result in inferior performance due to the poor transfer of association
knowledge to CVidQA, which focuses on causal questions like ``why is someone
doing ...''. Observing this, we proposed to exploit causal knowledge to
generate question-answer pairs, and proposed a novel framework, Causal
Knowledge Extraction from Language Models (CaKE-LM), leveraging causal
commonsense knowledge from language models to tackle CVidQA. To extract
knowledge from LMs, CaKE-LM generates causal questions containing two events
with one triggering another (e.g., ``score a goal'' triggers ``soccer player
kicking ball'') by prompting LM with the action (soccer player kicking ball) to
retrieve the intention (to score a goal). CaKE-LM significantly outperforms
conventional methods by 4% to 6% of zero-shot CVidQA accuracy on NExT-QA and
Causal-VidQA datasets. We also conduct comprehensive analyses and provide key
findings for future research.
|
no_new_dataset
| 0.707992
|
2304.03755
|
Antonia Chmiela
|
Antonia Chmiela, Ambros Gleixner, Pawel Lichocki, Sebastian Pokutta
|
Online Learning for Scheduling MIP Heuristics
|
Published in the Proceedings of CPAIOR 2023
| null | null | null |
math.OC cs.AI cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Mixed Integer Programming (MIP) is NP-hard, and yet modern solvers often
solve large real-world problems within minutes. This success can partially be
attributed to heuristics. Since their behavior is highly instance-dependent,
relying on hard-coded rules derived from empirical testing on a large
heterogeneous corpora of benchmark instances might lead to sub-optimal
performance. In this work, we propose an online learning approach that adapts
the application of heuristics towards the single instance at hand. We replace
the commonly used static heuristic handling with an adaptive framework
exploiting past observations about the heuristic's behavior to make future
decisions. In particular, we model the problem of controlling Large
Neighborhood Search and Diving - two broad and complex classes of heuristics -
as a multi-armed bandit problem. Going beyond existing work in the literature,
we control two different classes of heuristics simultaneously by a single
learning agent. We verify our approach numerically and show consistent node
reductions over the MIPLIB 2017 Benchmark set. For harder instances that take
at least 1000 seconds to solve, we observe a speedup of 4%.
|
[
{
"version": "v1",
"created": "Tue, 4 Apr 2023 14:55:15 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Chmiela",
"Antonia",
""
],
[
"Gleixner",
"Ambros",
""
],
[
"Lichocki",
"Pawel",
""
],
[
"Pokutta",
"Sebastian",
""
]
] |
TITLE: Online Learning for Scheduling MIP Heuristics
ABSTRACT: Mixed Integer Programming (MIP) is NP-hard, and yet modern solvers often
solve large real-world problems within minutes. This success can partially be
attributed to heuristics. Since their behavior is highly instance-dependent,
relying on hard-coded rules derived from empirical testing on a large
heterogeneous corpora of benchmark instances might lead to sub-optimal
performance. In this work, we propose an online learning approach that adapts
the application of heuristics towards the single instance at hand. We replace
the commonly used static heuristic handling with an adaptive framework
exploiting past observations about the heuristic's behavior to make future
decisions. In particular, we model the problem of controlling Large
Neighborhood Search and Diving - two broad and complex classes of heuristics -
as a multi-armed bandit problem. Going beyond existing work in the literature,
we control two different classes of heuristics simultaneously by a single
learning agent. We verify our approach numerically and show consistent node
reductions over the MIPLIB 2017 Benchmark set. For harder instances that take
at least 1000 seconds to solve, we observe a speedup of 4%.
|
no_new_dataset
| 0.7082
|
2304.03767
|
Mingyu Ding
|
Mingyu Ding, Yan Xu, Zhenfang Chen, David Daniel Cox, Ping Luo, Joshua
B. Tenenbaum, Chuang Gan
|
Embodied Concept Learner: Self-supervised Learning of Concepts and
Mapping through Instruction Following
|
CoRL 2022
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Humans, even at a very early age, can learn visual concepts and understand
geometry and layout through active interaction with the environment, and
generalize their compositions to complete tasks described by natural languages
in novel scenes. To mimic such capability, we propose Embodied Concept Learner
(ECL) in an interactive 3D environment. Specifically, a robot agent can ground
visual concepts, build semantic maps and plan actions to complete tasks by
learning purely from human demonstrations and language instructions, without
access to ground-truth semantic and depth supervisions from simulations. ECL
consists of: (i) an instruction parser that translates the natural languages
into executable programs; (ii) an embodied concept learner that grounds visual
concepts based on language descriptions; (iii) a map constructor that estimates
depth and constructs semantic maps by leveraging the learned concepts; and (iv)
a program executor with deterministic policies to execute each program. ECL has
several appealing benefits thanks to its modularized design. Firstly, it
enables the robotic agent to learn semantics and depth unsupervisedly acting
like babies, e.g., ground concepts through active interaction and perceive
depth by disparities when moving forward. Secondly, ECL is fully transparent
and step-by-step interpretable in long-term planning. Thirdly, ECL could be
beneficial for the embodied instruction following (EIF), outperforming previous
works on the ALFRED benchmark when the semantic label is not provided. Also,
the learned concept can be reused for other downstream tasks, such as reasoning
of object states. Project page: http://ecl.csail.mit.edu/
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2023 17:59:34 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Ding",
"Mingyu",
""
],
[
"Xu",
"Yan",
""
],
[
"Chen",
"Zhenfang",
""
],
[
"Cox",
"David Daniel",
""
],
[
"Luo",
"Ping",
""
],
[
"Tenenbaum",
"Joshua B.",
""
],
[
"Gan",
"Chuang",
""
]
] |
TITLE: Embodied Concept Learner: Self-supervised Learning of Concepts and
Mapping through Instruction Following
ABSTRACT: Humans, even at a very early age, can learn visual concepts and understand
geometry and layout through active interaction with the environment, and
generalize their compositions to complete tasks described by natural languages
in novel scenes. To mimic such capability, we propose Embodied Concept Learner
(ECL) in an interactive 3D environment. Specifically, a robot agent can ground
visual concepts, build semantic maps and plan actions to complete tasks by
learning purely from human demonstrations and language instructions, without
access to ground-truth semantic and depth supervisions from simulations. ECL
consists of: (i) an instruction parser that translates the natural languages
into executable programs; (ii) an embodied concept learner that grounds visual
concepts based on language descriptions; (iii) a map constructor that estimates
depth and constructs semantic maps by leveraging the learned concepts; and (iv)
a program executor with deterministic policies to execute each program. ECL has
several appealing benefits thanks to its modularized design. Firstly, it
enables the robotic agent to learn semantics and depth unsupervisedly acting
like babies, e.g., ground concepts through active interaction and perceive
depth by disparities when moving forward. Secondly, ECL is fully transparent
and step-by-step interpretable in long-term planning. Thirdly, ECL could be
beneficial for the embodied instruction following (EIF), outperforming previous
works on the ALFRED benchmark when the semantic label is not provided. Also,
the learned concept can be reused for other downstream tasks, such as reasoning
of object states. Project page: http://ecl.csail.mit.edu/
|
no_new_dataset
| 0.709585
|
2304.03768
|
Ziteng Gao
|
Ziteng Gao, Zhan Tong, Limin Wang, Mike Zheng Shou
|
SparseFormer: Sparse Visual Recognition via Limited Latent Tokens
|
Technical report
| null | null | null |
cs.CV
|
http://creativecommons.org/licenses/by/4.0/
|
Human visual recognition is a sparse process, where only a few salient visual
cues are attended to rather than traversing every detail uniformly. However,
most current vision networks follow a dense paradigm, processing every single
visual unit (e.g,, pixel or patch) in a uniform manner. In this paper, we
challenge this dense paradigm and present a new method, coined SparseFormer, to
imitate human's sparse visual recognition in an end-to-end manner. SparseFormer
learns to represent images using a highly limited number of tokens (down to 49)
in the latent space with sparse feature sampling procedure instead of
processing dense units in the original pixel space. Therefore, SparseFormer
circumvents most of dense operations on the image space and has much lower
computational costs. Experiments on the ImageNet classification benchmark
dataset show that SparseFormer achieves performance on par with canonical or
well-established models while offering better accuracy-throughput tradeoff.
Moreover, the design of our network can be easily extended to the video
classification with promising performance at lower computational costs. We hope
that our work can provide an alternative way for visual modeling and inspire
further research on sparse neural architectures. The code will be publicly
available at https://github.com/showlab/sparseformer
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2023 17:59:58 GMT"
}
] | 2023-04-10T00:00:00
|
[
[
"Gao",
"Ziteng",
""
],
[
"Tong",
"Zhan",
""
],
[
"Wang",
"Limin",
""
],
[
"Shou",
"Mike Zheng",
""
]
] |
TITLE: SparseFormer: Sparse Visual Recognition via Limited Latent Tokens
ABSTRACT: Human visual recognition is a sparse process, where only a few salient visual
cues are attended to rather than traversing every detail uniformly. However,
most current vision networks follow a dense paradigm, processing every single
visual unit (e.g,, pixel or patch) in a uniform manner. In this paper, we
challenge this dense paradigm and present a new method, coined SparseFormer, to
imitate human's sparse visual recognition in an end-to-end manner. SparseFormer
learns to represent images using a highly limited number of tokens (down to 49)
in the latent space with sparse feature sampling procedure instead of
processing dense units in the original pixel space. Therefore, SparseFormer
circumvents most of dense operations on the image space and has much lower
computational costs. Experiments on the ImageNet classification benchmark
dataset show that SparseFormer achieves performance on par with canonical or
well-established models while offering better accuracy-throughput tradeoff.
Moreover, the design of our network can be easily extended to the video
classification with promising performance at lower computational costs. We hope
that our work can provide an alternative way for visual modeling and inspire
further research on sparse neural architectures. The code will be publicly
available at https://github.com/showlab/sparseformer
|
no_new_dataset
| 0.709818
|
1910.09161
|
Shixiang Zhu
|
Shixiang Zhu, Henry Shaowu Yuchi, Minghe Zhang, Yao Xie
|
Sequential Adversarial Anomaly Detection for One-Class Event Data
| null | null | null | null |
stat.ML cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the sequential anomaly detection problem in the one-class setting
when only the anomalous sequences are available and propose an adversarial
sequential detector by solving a minimax problem to find an optimal detector
against the worst-case sequences from a generator. The generator captures the
dependence in sequential events using the marked point process model. The
detector sequentially evaluates the likelihood of a test sequence and compares
it with a time-varying threshold, also learned from data through the minimax
problem. We demonstrate our proposed method's good performance using numerical
experiments on simulations and proprietary large-scale credit card fraud
datasets. The proposed method can generally apply to detecting anomalous
sequences.
|
[
{
"version": "v1",
"created": "Mon, 21 Oct 2019 06:12:47 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Apr 2020 19:25:55 GMT"
},
{
"version": "v3",
"created": "Sat, 1 Aug 2020 23:23:18 GMT"
},
{
"version": "v4",
"created": "Sun, 21 Feb 2021 23:46:36 GMT"
},
{
"version": "v5",
"created": "Thu, 6 Apr 2023 02:06:52 GMT"
}
] | 2023-04-07T00:00:00
|
[
[
"Zhu",
"Shixiang",
""
],
[
"Yuchi",
"Henry Shaowu",
""
],
[
"Zhang",
"Minghe",
""
],
[
"Xie",
"Yao",
""
]
] |
TITLE: Sequential Adversarial Anomaly Detection for One-Class Event Data
ABSTRACT: We consider the sequential anomaly detection problem in the one-class setting
when only the anomalous sequences are available and propose an adversarial
sequential detector by solving a minimax problem to find an optimal detector
against the worst-case sequences from a generator. The generator captures the
dependence in sequential events using the marked point process model. The
detector sequentially evaluates the likelihood of a test sequence and compares
it with a time-varying threshold, also learned from data through the minimax
problem. We demonstrate our proposed method's good performance using numerical
experiments on simulations and proprietary large-scale credit card fraud
datasets. The proposed method can generally apply to detecting anomalous
sequences.
|
no_new_dataset
| 0.708244
|
2003.02144
|
Adam Polak
|
Antonios Antoniadis and Christian Coester and Marek Elias and Adam
Polak and Bertrand Simon
|
Online metric algorithms with untrusted predictions
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Machine-learned predictors, although achieving very good results for inputs
resembling training data, cannot possibly provide perfect predictions in all
situations. Still, decision-making systems that are based on such predictors
need not only to benefit from good predictions but also to achieve a decent
performance when the predictions are inadequate. In this paper, we propose a
prediction setup for arbitrary metrical task systems (MTS) (e.g., caching,
k-server and convex body chasing) and online matching on the line. We utilize
results from the theory of online algorithms to show how to make the setup
robust. Specifically for caching, we present an algorithm whose performance, as
a function of the prediction error, is exponentially better than what is
achievable for general MTS. Finally, we present an empirical evaluation of our
methods on real world datasets, which suggests practicality.
|
[
{
"version": "v1",
"created": "Wed, 4 Mar 2020 15:48:37 GMT"
},
{
"version": "v2",
"created": "Fri, 26 Jun 2020 13:10:29 GMT"
},
{
"version": "v3",
"created": "Thu, 6 Apr 2023 09:30:19 GMT"
}
] | 2023-04-07T00:00:00
|
[
[
"Antoniadis",
"Antonios",
""
],
[
"Coester",
"Christian",
""
],
[
"Elias",
"Marek",
""
],
[
"Polak",
"Adam",
""
],
[
"Simon",
"Bertrand",
""
]
] |
TITLE: Online metric algorithms with untrusted predictions
ABSTRACT: Machine-learned predictors, although achieving very good results for inputs
resembling training data, cannot possibly provide perfect predictions in all
situations. Still, decision-making systems that are based on such predictors
need not only to benefit from good predictions but also to achieve a decent
performance when the predictions are inadequate. In this paper, we propose a
prediction setup for arbitrary metrical task systems (MTS) (e.g., caching,
k-server and convex body chasing) and online matching on the line. We utilize
results from the theory of online algorithms to show how to make the setup
robust. Specifically for caching, we present an algorithm whose performance, as
a function of the prediction error, is exponentially better than what is
achievable for general MTS. Finally, we present an empirical evaluation of our
methods on real world datasets, which suggests practicality.
|
no_new_dataset
| 0.710434
|
2008.12328
|
Radu Tudor Ionescu
|
Mariana-Iuliana Georgescu, Radu Tudor Ionescu, Fahad Shahbaz Khan,
Marius Popescu and Mubarak Shah
|
A Background-Agnostic Framework with Adversarial Training for Abnormal
Event Detection in Video
|
Accepted in IEEE Transactions on Pattern Analysis and Machine
Intelligence
| null |
10.1109/TPAMI.2021.3074805
| null |
cs.CV eess.IV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Abnormal event detection in video is a complex computer vision problem that
has attracted significant attention in recent years. The complexity of the task
arises from the commonly-adopted definition of an abnormal event, that is, a
rarely occurring event that typically depends on the surrounding context.
Following the standard formulation of abnormal event detection as outlier
detection, we propose a background-agnostic framework that learns from training
videos containing only normal events. Our framework is composed of an object
detector, a set of appearance and motion auto-encoders, and a set of
classifiers. Since our framework only looks at object detections, it can be
applied to different scenes, provided that normal events are defined
identically across scenes and that the single main factor of variation is the
background. To overcome the lack of abnormal data during training, we propose
an adversarial learning strategy for the auto-encoders. We create a
scene-agnostic set of out-of-domain pseudo-abnormal examples, which are
correctly reconstructed by the auto-encoders before applying gradient ascent on
the pseudo-abnormal examples. We further utilize the pseudo-abnormal examples
to serve as abnormal examples when training appearance-based and motion-based
binary classifiers to discriminate between normal and abnormal latent features
and reconstructions. We compare our framework with the state-of-the-art methods
on four benchmark data sets, using various evaluation metrics. Compared to
existing methods, the empirical results indicate that our approach achieves
favorable performance on all data sets. In addition, we provide region-based
and track-based annotations for two large-scale abnormal event detection data
sets from the literature, namely ShanghaiTech and Subway.
|
[
{
"version": "v1",
"created": "Thu, 27 Aug 2020 18:39:24 GMT"
},
{
"version": "v2",
"created": "Fri, 16 Apr 2021 14:38:12 GMT"
},
{
"version": "v3",
"created": "Mon, 19 Apr 2021 20:40:37 GMT"
},
{
"version": "v4",
"created": "Mon, 10 May 2021 14:47:29 GMT"
},
{
"version": "v5",
"created": "Thu, 6 Apr 2023 15:49:54 GMT"
}
] | 2023-04-07T00:00:00
|
[
[
"Georgescu",
"Mariana-Iuliana",
""
],
[
"Ionescu",
"Radu Tudor",
""
],
[
"Khan",
"Fahad Shahbaz",
""
],
[
"Popescu",
"Marius",
""
],
[
"Shah",
"Mubarak",
""
]
] |
TITLE: A Background-Agnostic Framework with Adversarial Training for Abnormal
Event Detection in Video
ABSTRACT: Abnormal event detection in video is a complex computer vision problem that
has attracted significant attention in recent years. The complexity of the task
arises from the commonly-adopted definition of an abnormal event, that is, a
rarely occurring event that typically depends on the surrounding context.
Following the standard formulation of abnormal event detection as outlier
detection, we propose a background-agnostic framework that learns from training
videos containing only normal events. Our framework is composed of an object
detector, a set of appearance and motion auto-encoders, and a set of
classifiers. Since our framework only looks at object detections, it can be
applied to different scenes, provided that normal events are defined
identically across scenes and that the single main factor of variation is the
background. To overcome the lack of abnormal data during training, we propose
an adversarial learning strategy for the auto-encoders. We create a
scene-agnostic set of out-of-domain pseudo-abnormal examples, which are
correctly reconstructed by the auto-encoders before applying gradient ascent on
the pseudo-abnormal examples. We further utilize the pseudo-abnormal examples
to serve as abnormal examples when training appearance-based and motion-based
binary classifiers to discriminate between normal and abnormal latent features
and reconstructions. We compare our framework with the state-of-the-art methods
on four benchmark data sets, using various evaluation metrics. Compared to
existing methods, the empirical results indicate that our approach achieves
favorable performance on all data sets. In addition, we provide region-based
and track-based annotations for two large-scale abnormal event detection data
sets from the literature, namely ShanghaiTech and Subway.
|
no_new_dataset
| 0.701138
|
2011.15028
|
G\'abor Sz\'arnyas
|
Alexandru Iosup, Ahmed Musaafir, Alexandru Uta, Arnau Prat P\'erez,
G\'abor Sz\'arnyas, Hassan Chafi, Ilie Gabriel T\u{a}nase, Lifeng Nai,
Michael Anderson, Mihai Capot\u{a}, Narayanan Sundaram, Peter Boncz,
Siegfried Depner, Stijn Heldens, Thomas Manhardt, Tim Hegeman, Wing Lung
Ngai, Yinglong Xia
|
The LDBC Graphalytics Benchmark
| null | null | null | null |
cs.DC cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this document, we describe LDBC Graphalytics, an industrial-grade
benchmark for graph analysis platforms. The main goal of Graphalytics is to
enable the fair and objective comparison of graph analysis platforms. Due to
the diversity of bottlenecks and performance issues such platforms need to
address, Graphalytics consists of a set of selected deterministic algorithms
for full-graph analysis, standard graph datasets, synthetic dataset generators,
and reference output for validation purposes. Its test harness produces deep
metrics that quantify multiple kinds of systems scalability, weak and strong,
and robustness, such as failures and performance variability. The benchmark
also balances comprehensiveness with runtime necessary to obtain the deep
metrics. The benchmark comes with open-source software for generating
performance data, for validating algorithm results, for monitoring and sharing
performance data, and for obtaining the final benchmark result as a standard
performance report.
|
[
{
"version": "v1",
"created": "Mon, 30 Nov 2020 17:34:37 GMT"
},
{
"version": "v2",
"created": "Sun, 31 Jan 2021 13:59:29 GMT"
},
{
"version": "v3",
"created": "Tue, 13 Apr 2021 18:37:57 GMT"
},
{
"version": "v4",
"created": "Thu, 31 Mar 2022 09:47:08 GMT"
},
{
"version": "v5",
"created": "Wed, 15 Feb 2023 09:58:57 GMT"
},
{
"version": "v6",
"created": "Thu, 6 Apr 2023 07:24:03 GMT"
}
] | 2023-04-07T00:00:00
|
[
[
"Iosup",
"Alexandru",
""
],
[
"Musaafir",
"Ahmed",
""
],
[
"Uta",
"Alexandru",
""
],
[
"Pérez",
"Arnau Prat",
""
],
[
"Szárnyas",
"Gábor",
""
],
[
"Chafi",
"Hassan",
""
],
[
"Tănase",
"Ilie Gabriel",
""
],
[
"Nai",
"Lifeng",
""
],
[
"Anderson",
"Michael",
""
],
[
"Capotă",
"Mihai",
""
],
[
"Sundaram",
"Narayanan",
""
],
[
"Boncz",
"Peter",
""
],
[
"Depner",
"Siegfried",
""
],
[
"Heldens",
"Stijn",
""
],
[
"Manhardt",
"Thomas",
""
],
[
"Hegeman",
"Tim",
""
],
[
"Ngai",
"Wing Lung",
""
],
[
"Xia",
"Yinglong",
""
]
] |
TITLE: The LDBC Graphalytics Benchmark
ABSTRACT: In this document, we describe LDBC Graphalytics, an industrial-grade
benchmark for graph analysis platforms. The main goal of Graphalytics is to
enable the fair and objective comparison of graph analysis platforms. Due to
the diversity of bottlenecks and performance issues such platforms need to
address, Graphalytics consists of a set of selected deterministic algorithms
for full-graph analysis, standard graph datasets, synthetic dataset generators,
and reference output for validation purposes. Its test harness produces deep
metrics that quantify multiple kinds of systems scalability, weak and strong,
and robustness, such as failures and performance variability. The benchmark
also balances comprehensiveness with runtime necessary to obtain the deep
metrics. The benchmark comes with open-source software for generating
performance data, for validating algorithm results, for monitoring and sharing
performance data, and for obtaining the final benchmark result as a standard
performance report.
|
new_dataset
| 0.61832
|
2104.09304
|
Kohei Watabe
|
Shohei Nakazawa, Yoshiki Sato, Kenji Nakagawa, Sho Tsugawa, Kohei
Watabe
|
A Tunable Model for Graph Generation Using LSTM and Conditional VAE
|
Accepted in Proceedings of the 41st IEEE International Conference on
Distributed Computing Systems (ICDCS 2021) Poster Track, Online , 2021. 2
pages, 3 pdf figures
| null |
10.1109/ICDCS51616.2021.00119
| null |
cs.LG cs.NI cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With the development of graph applications, generative models for graphs have
been more crucial. Classically, stochastic models that generate graphs with a
pre-defined probability of edges and nodes have been studied. Recently, some
models that reproduce the structural features of graphs by learning from actual
graph data using machine learning have been studied. However, in these
conventional studies based on machine learning, structural features of graphs
can be learned from data, but it is not possible to tune features and generate
graphs with specific features. In this paper, we propose a generative model
that can tune specific features, while learning structural features of a graph
from data. With a dataset of graphs with various features generated by a
stochastic model, we confirm that our model can generate a graph with specific
features.
|
[
{
"version": "v1",
"created": "Thu, 15 Apr 2021 06:47:14 GMT"
}
] | 2023-04-07T00:00:00
|
[
[
"Nakazawa",
"Shohei",
""
],
[
"Sato",
"Yoshiki",
""
],
[
"Nakagawa",
"Kenji",
""
],
[
"Tsugawa",
"Sho",
""
],
[
"Watabe",
"Kohei",
""
]
] |
TITLE: A Tunable Model for Graph Generation Using LSTM and Conditional VAE
ABSTRACT: With the development of graph applications, generative models for graphs have
been more crucial. Classically, stochastic models that generate graphs with a
pre-defined probability of edges and nodes have been studied. Recently, some
models that reproduce the structural features of graphs by learning from actual
graph data using machine learning have been studied. However, in these
conventional studies based on machine learning, structural features of graphs
can be learned from data, but it is not possible to tune features and generate
graphs with specific features. In this paper, we propose a generative model
that can tune specific features, while learning structural features of a graph
from data. With a dataset of graphs with various features generated by a
stochastic model, we confirm that our model can generate a graph with specific
features.
|
no_new_dataset
| 0.708584
|
2105.03725
|
Geraldo Francisco De Oliveira Junior
|
Geraldo F. Oliveira and Juan G\'omez-Luna and Lois Orosa and Saugata
Ghose and Nandita Vijaykumar and Ivan Fernandez and Mohammad Sadrosadati and
Onur Mutlu
|
DAMOV: A New Methodology and Benchmark Suite for Evaluating Data
Movement Bottlenecks
|
Our open source software is available at
https://github.com/CMU-SAFARI/DAMOV
| null | null | null |
cs.AR cs.DC cs.PF
|
http://creativecommons.org/licenses/by/4.0/
|
Data movement between the CPU and main memory is a first-order obstacle
against improving performance, scalability, and energy efficiency in modern
systems. Computer systems employ a range of techniques to reduce overheads tied
to data movement, spanning from traditional mechanisms (e.g., deep multi-level
cache hierarchies, aggressive hardware prefetchers) to emerging techniques such
as Near-Data Processing (NDP), where some computation is moved close to memory.
Our goal is to methodically identify potential sources of data movement over a
broad set of applications and to comprehensively compare traditional
compute-centric data movement mitigation techniques to more memory-centric
techniques, thereby developing a rigorous understanding of the best techniques
to mitigate each source of data movement.
With this goal in mind, we perform the first large-scale characterization of
a wide variety of applications, across a wide range of application domains, to
identify fundamental program properties that lead to data movement to/from main
memory. We develop the first systematic methodology to classify applications
based on the sources contributing to data movement bottlenecks. From our
large-scale characterization of 77K functions across 345 applications, we
select 144 functions to form the first open-source benchmark suite (DAMOV) for
main memory data movement studies. We select a diverse range of functions that
(1) represent different types of data movement bottlenecks, and (2) come from a
wide range of application domains. Using NDP as a case study, we identify new
insights about the different data movement bottlenecks and use these insights
to determine the most suitable data movement mitigation mechanism for a
particular application. We open-source DAMOV and the complete source code for
our new characterization methodology at https://github.com/CMU-SAFARI/DAMOV.
|
[
{
"version": "v1",
"created": "Sat, 8 May 2021 16:02:53 GMT"
},
{
"version": "v2",
"created": "Fri, 14 May 2021 17:03:34 GMT"
},
{
"version": "v3",
"created": "Thu, 20 May 2021 15:57:09 GMT"
},
{
"version": "v4",
"created": "Tue, 6 Jul 2021 17:05:36 GMT"
},
{
"version": "v5",
"created": "Tue, 15 Feb 2022 14:26:45 GMT"
},
{
"version": "v6",
"created": "Thu, 6 Apr 2023 14:33:03 GMT"
}
] | 2023-04-07T00:00:00
|
[
[
"Oliveira",
"Geraldo F.",
""
],
[
"Gómez-Luna",
"Juan",
""
],
[
"Orosa",
"Lois",
""
],
[
"Ghose",
"Saugata",
""
],
[
"Vijaykumar",
"Nandita",
""
],
[
"Fernandez",
"Ivan",
""
],
[
"Sadrosadati",
"Mohammad",
""
],
[
"Mutlu",
"Onur",
""
]
] |
TITLE: DAMOV: A New Methodology and Benchmark Suite for Evaluating Data
Movement Bottlenecks
ABSTRACT: Data movement between the CPU and main memory is a first-order obstacle
against improving performance, scalability, and energy efficiency in modern
systems. Computer systems employ a range of techniques to reduce overheads tied
to data movement, spanning from traditional mechanisms (e.g., deep multi-level
cache hierarchies, aggressive hardware prefetchers) to emerging techniques such
as Near-Data Processing (NDP), where some computation is moved close to memory.
Our goal is to methodically identify potential sources of data movement over a
broad set of applications and to comprehensively compare traditional
compute-centric data movement mitigation techniques to more memory-centric
techniques, thereby developing a rigorous understanding of the best techniques
to mitigate each source of data movement.
With this goal in mind, we perform the first large-scale characterization of
a wide variety of applications, across a wide range of application domains, to
identify fundamental program properties that lead to data movement to/from main
memory. We develop the first systematic methodology to classify applications
based on the sources contributing to data movement bottlenecks. From our
large-scale characterization of 77K functions across 345 applications, we
select 144 functions to form the first open-source benchmark suite (DAMOV) for
main memory data movement studies. We select a diverse range of functions that
(1) represent different types of data movement bottlenecks, and (2) come from a
wide range of application domains. Using NDP as a case study, we identify new
insights about the different data movement bottlenecks and use these insights
to determine the most suitable data movement mitigation mechanism for a
particular application. We open-source DAMOV and the complete source code for
our new characterization methodology at https://github.com/CMU-SAFARI/DAMOV.
|
no_new_dataset
| 0.70883
|
2106.13952
|
Di Wang
|
Di Wang, Bo Du, Liangpei Zhang
|
Spectral-Spatial Global Graph Reasoning for Hyperspectral Image
Classification
|
Accepted by IEEE TNNLS
| null | null | null |
cs.CV cs.LG eess.IV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Convolutional neural networks have been widely applied to hyperspectral image
classification. However, traditional convolutions can not effectively extract
features for objects with irregular distributions. Recent methods attempt to
address this issue by performing graph convolutions on spatial topologies, but
fixed graph structures and local perceptions limit their performances. To
tackle these problems, in this paper, different from previous approaches, we
perform the superpixel generation on intermediate features during network
training to adaptively produce homogeneous regions, obtain graph structures,
and further generate spatial descriptors, which are served as graph nodes.
Besides spatial objects, we also explore the graph relationships between
channels by reasonably aggregating channels to generate spectral descriptors.
The adjacent matrices in these graph convolutions are obtained by considering
the relationships among all descriptors to realize global perceptions. By
combining the extracted spatial and spectral graph features, we finally obtain
a spectral-spatial graph reasoning network (SSGRN). The spatial and spectral
parts of SSGRN are separately called spatial and spectral graph reasoning
subnetworks. Comprehensive experiments on four public datasets demonstrate the
competitiveness of the proposed methods compared with other state-of-the-art
graph convolution-based approaches.
|
[
{
"version": "v1",
"created": "Sat, 26 Jun 2021 06:24:51 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2023 16:50:23 GMT"
}
] | 2023-04-07T00:00:00
|
[
[
"Wang",
"Di",
""
],
[
"Du",
"Bo",
""
],
[
"Zhang",
"Liangpei",
""
]
] |
TITLE: Spectral-Spatial Global Graph Reasoning for Hyperspectral Image
Classification
ABSTRACT: Convolutional neural networks have been widely applied to hyperspectral image
classification. However, traditional convolutions can not effectively extract
features for objects with irregular distributions. Recent methods attempt to
address this issue by performing graph convolutions on spatial topologies, but
fixed graph structures and local perceptions limit their performances. To
tackle these problems, in this paper, different from previous approaches, we
perform the superpixel generation on intermediate features during network
training to adaptively produce homogeneous regions, obtain graph structures,
and further generate spatial descriptors, which are served as graph nodes.
Besides spatial objects, we also explore the graph relationships between
channels by reasonably aggregating channels to generate spectral descriptors.
The adjacent matrices in these graph convolutions are obtained by considering
the relationships among all descriptors to realize global perceptions. By
combining the extracted spatial and spectral graph features, we finally obtain
a spectral-spatial graph reasoning network (SSGRN). The spatial and spectral
parts of SSGRN are separately called spatial and spectral graph reasoning
subnetworks. Comprehensive experiments on four public datasets demonstrate the
competitiveness of the proposed methods compared with other state-of-the-art
graph convolution-based approaches.
|
no_new_dataset
| 0.710672
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.