Search is not available for this dataset
abstract
stringclasses
0 values
embedding
list
Since its introduction, unsupervised representation learning has attracted a lot of attention from the research community, as it is demonstrated to be highly effective and easy-to-apply in tasks such as dimension reduction, clustering, visualization, information retrieval, and semi-supervised learning. In this work, ...
[ -0.015959708020091, 0.00119630980771, 0.012604693882167001, -0.029994627460837003, 0.0046849898062640005, 0.001938155503012, -0.005984890740364001, 0.004908880218863001, -0.018165195360779002, -0.043521616607904004, -0.0060416986234480006, 0.015531977638602002, -0.00033541786251500003, 0.0...
Video anomaly detection has great potential in enhancing safety in the production and monitoring of crucial areas. Currently, most video anomaly detection methods are based on RGB modality, but its redundant semantic information may breach the privacy of residents or patients. The 3D data obtained by depth camera and...
[ 0.00107693207, -0.006648226639999999, 0.016168272100000002, -0.023781618100000002, 0.00531656388, 0.0216428861, -0.00556204701, -0.0248846114, -0.009637743229999999, -0.0311528444, 0.021508375200000002, 0.0263911393, -0.00292226044, 0.021871555600000002, 0.0183339063, 0.000324718974, ...
Quantitative investment aims to maximize the return and minimize the risk in a sequential trading period over a set of financial instruments. Recently, inspired by rapid development and great potential of AI technologies in generating remarkable innovation in quantitative investment, there has been increasing adoptio...
[ -0.022223209962248, -0.033623248338699, -0.003828627755865, -0.029063232243061003, 0.00237958645448, 0.025286111980676002, -0.029255522415041, -0.0028912147972730002, -0.01814391836524, -0.027085395529866003, 0.005002968944609, 0.019764646887779, -0.001448182738386, 0.023843938484787, 0....
This work proposes a domain-informed neural network architecture for experimental particle physics, using particle interaction localization with the time-projection chamber (TPC) technology for dark matter research as an example application. A key feature of the signals generated within the TPC is that they allow loc...
[ -0.026595890522003, 0.029011188074946, 0.023214470595121002, -0.024304807186126, 0.006510955281555, 0.012235213071107, -0.010330577380955, -0.008605364710092, -0.011386408470571001, -0.04935490339994401, 0.019501812756061002, 0.030833013355731003, 0.00009763629350345583, 0.009136729873716,...
Soft labels in image classification are vector representations of an image's true classification. In this paper, we investigate soft labels in the context of satellite object detection. We propose using detections as the basis for a new dataset of soft labels. Much of the effort in creating a high-quality model is ga...
[ -0.011796947568655, -0.0031517897732550003, 0.007913524284958, -0.000056422271882183857, -0.014430132694542, 0.009925081394612002, 0.004913648590445001, 0.021694092079997, -0.035509582608938, -0.01841134019196, 0.029782230034470003, 0.021344862878322, -0.028036085888743, -0.005315261892974...
Movies reflect society and also hold power to transform opinions. Social biases and stereotypes present in movies can cause extensive damage due to their reach. These biases are not always found to be the need of storyline but can creep in as the author's bias. Movie production houses would prefer to ascertain that t...
[ -0.014384184964001002, -0.027987513691186003, 0.016206182539463, -0.047399315983057, 0.006099579390138001, 0.007842805236577, -0.014343087561428, 0.022151645272970002, -0.032494559884071, -0.031234230846166004, 0.00524680269882, 0.016206182539463, 0.009267524816095002, -0.009027788415551, ...
Given a small corpus $\mathcal D_T$ pertaining to a limited set of focused topics, our goal is to train embeddings that accurately capture the sense of words in the topic in spite of the limited size of $\mathcal D_T$. These embeddings may be used in various tasks involving $\mathcal D_T$. A popular strategy in limit...
[ -0.029799265787005, -0.021495241671800003, 0.026312414556741003, -0.020010879263281, -0.0029809768311670004, 0.017644301056861, -0.012379018589854001, 0.003791424445807, -0.021845325827598003, -0.049460057169198005, 0.017882360145449, 0.024968087673187003, -0.020739056169986003, 0.00885015...
We present OOD-Speech, the first out-of-distribution (OOD) benchmarking dataset for Bengali automatic speech recognition (ASR). Being one of the most spoken languages globally, Bengali portrays large diversity in dialects and prosodic features, which demands ASR frameworks to be robust towards distribution shifts. Fo...
[ -0.0108269425, -0.006258467209999999, 0.0057226158699999995, -0.0135955065, 0.007790452339999999, 0.0359157696, 0.0024937691599999996, 0.0142069263, -0.0322884694, -0.0247728135, 0.00242507015, 0.0172296781, -0.0334151313, -0.0135199381, -0.022684367400000002, 0.0134649789, 0.0100231...
Anchor-free detectors basically formulate object detection as dense classification and regression. For popular anchor-free detectors, it is common to introduce an individual prediction branch to estimate the quality of localization. The following inconsistencies are observed when we delve into the practices of classi...
[ -0.021868957206606, 0.012677355669438001, 0.017152123153209003, -0.01648817025125, -0.032091069966554, 0.011722922325134002, -0.019960092380642003, 0.035217180848121005, -0.023805486038327002, -0.026779443025588, 0.018134219571948003, 0.023598002269864003, -0.019130149856209002, 0.01637751...
Contrastive Language-Image Pre-training (CLIP) has been shown to learn visual representations with great transferability, which achieves promising accuracy for zero-shot classification. To further improve its downstream performance, existing works propose additional learnable modules upon CLIP and fine-tune them by f...
[ -0.035151906311511, 0.002118654549121, 0.040722731500864, -0.03167014196515, 0.006315922830253001, 0.029023999348282002, 0.010013557970523002, -0.001289123785682, -0.016420006752014, -0.029553227126598, 0.018982587382197002, 0.040082085877656, -0.025542233139276, 0.012353304773569001, 0....
Stackelberg equilibria have become increasingly important as a solution concept in computational game theory, largely inspired by practical problems such as security settings. In practice, however, there is typically uncertainty regarding the model about the opponent. This paper is, to our knowledge, the first to inv...
[ -0.005899987183511, -0.021787736564874, 0.0012458960991350001, -0.024286393076181002, -0.011134123429656001, 0.031823549419641, -0.019412640482187, 0.025673009455204003, -0.032949317246675006, -0.03207067027688, 0.028144208714365, -0.005120872985571, -0.004252521321177, 0.00037840232835100...
Context: Research at the intersection of cybersecurity, Machine Learning (ML), and Software Engineering (SE) has recently taken significant steps in proposing countermeasures for detecting sophisticated data exfiltration attacks. It is important to systematically review and synthesize the ML-based data exfiltration c...
[ -0.024269137531518003, 0.006500422023236, 0.018480539321899, -0.028822120279073004, -0.005939693655818001, 0.028875842690467002, -0.014249891974031, -0.00006180186028359458, 0.0011550337076180002, -0.024027386680245, 0.022093376144766003, 0.037095382809638006, -0.025759937241673, 0.0127926...
The paper presents an O(N log N)-implementation of t-SNE -- an embedding technique that is commonly used for the visualization of high-dimensional data in scatter plots and that normally runs in O(N^2). The new implementation uses vantage-point trees to compute sparse pairwise similarities between the input data obje...
[ -0.022652857005596, 0.007319043856114001, 0.014046720229089002, 0.014415455050766001, 0.024002566933631002, 0.019605575129389003, -0.007527761626988001, -0.016460891813039003, -0.028830910101532003, -0.039461612701416, -0.004727462306618, 0.013114445842802, 0.002073265146464, 0.00807738583...
Recent systems on structured prediction focus on increasing the level of structural dependencies within the model. However, our study suggests that complex structures entail high overfitting risks. To control the structure-based overfitting, we propose to conduct structure regularization decoding (SR decoding). The d...
[ -0.006256100721657, 0.019621875137090003, 0.028520964086055003, -0.018799154087901, -0.01173747330904, 0.005155712831765, 0.0066160405986010005, 0.003465708345174, -0.002103078179061, -0.0029000884387640003, 0.010455401614308002, 0.023008739575743002, -0.011641489341855, 0.020101794973015,...
Recurrent Neural Networks (RNNS) are now widely used on sequence generation tasks due to their ability to learn long-range dependencies and to generate sequences of arbitrary length. However, their left-to-right generation procedure only allows a limited control from a potential user which makes them unsuitable for i...
[ -0.0256018768996, -0.002156567061319, 0.000313273369101, -0.006535470951348, 0.026626506820321003, 0.012094775214791001, -0.021364897489547, -0.013493255712091002, -0.03552970290184, -0.004001591354608001, 0.024937253445386002, 0.012143237516283, -0.021586440503597003, 0.006410853937268, ...
Change detection (CD) is an essential task for various real-world applications, such as urban management and disaster assessment. However, previous methods primarily focus on improving the accuracy of CD, while neglecting the reliability of detection results. In this paper, we propose a novel change detection network...
[ 0.00359645602, -0.0048189800000000005, 0.0155507782, 0.00143333338, 0.00466658827, -0.00466658827, -0.01074873, 0.00407395186, -0.0289612934, -0.0175555833, 0.0105184484, 0.0283381771, -0.038958221700000004, 0.0108503252, -0.0218361095, 0.0107961409, 0.0311286487, 0.0238409135, -...
Adversarial machine learning is a fast growing research area, which considers the scenarios when machine learning systems may face potential adversarial attackers, who intentionally synthesize input data to make a well-trained model to make mistake. It always involves a defending side, usually a classifier, and an at...
[ -0.029044549912214, -0.0037905939389020005, 0.007434498053044001, -0.013922180980443, -0.006290985736995, 0.024483835324645, -0.0063476609066120005, 0.0077145420946180005, -0.03216503933072, -0.028884524479508, 0.027057573199272003, 0.026390802115201003, -0.019122995436191, 0.0066343727521...
The speed of convergence of the Expectation Maximization (EM) algorithm for Gaussian mixture model fitting is known to be dependent on the amount of overlap among the mixture components. In this paper, we study the impact of mixing coefficients on the convergence of EM. We show that when the mixture components exhibi...
[ -0.010548343881964, 0.0023270410019900004, -0.013083217665553001, -0.039113368839025005, -0.011386487632989, 0.037477966398, -0.0014071273617440002, 0.008544976823031, -0.039385937154293005, -0.031481493264436, 0.014718620106577, 0.025730328634381003, -0.020129075273871002, 0.0087698446586...
Artificial intelligence literature suggests that minority and fragile communities in society can be negatively impacted by machine learning algorithms due to inherent biases in the design process, which lead to socially exclusive decisions and policies. Faced with similar challenges in dealing with an increasingly di...
[ -0.017442086711525, -0.014739791862666001, 0.013313580304384, -0.014030097983777001, -0.022287111729383, 0.014521424658596, -0.015394894406199, 0.011252739466726001, -0.014371297322213001, -0.022287111729383, -0.008454908616840002, 0.01652767509222, 0.0051828110590570005, -0.01617282815277...
Sentiment classification and sarcasm detection are both important natural language processing (NLP) tasks. Sentiment is always coupled with sarcasm where intensive emotion is expressed. Nevertheless, most literature considers them as two separate tasks. We argue that knowledge in sarcasm detection can also be benefic...
[ -0.007216766942292001, 0.004315249621868, 0.035679910331964, -0.023117890581488002, 0.0037901489995410004, 0.017314855009317003, -0.021731086075305002, 0.015874193981289, -0.025635680183768002, -0.018836300820112003, 0.024450836703181003, 0.045024007558822, -0.025231756269931002, 0.0145547...
We study the problem of shape generation in 3D mesh representation from a few color images with known camera poses. While many previous works learn to hallucinate the shape directly from priors, we resort to further improving the shape quality by leveraging cross-view information with a graph convolutional network. I...
[ -0.023284811526536, 0.0022565338294950003, 0.000966471154242, -0.015077983029186, 0.004165378864854, 0.016289729624986, -0.022678939625620002, -0.013349867425858001, -0.013143319636583, -0.044449068605899006, 0.016592666506767002, 0.014127863571047, -0.006406421773135, 0.006554447580128001...
Reinforcement Learning (RL) has become an increasingly important research area as the success of machine learning algorithms and methods grows. To combat the safety concerns surrounding the freedom given to RL agents while training, there has been an increase in work concerning Safe Reinforcement Learning (SRL). Howe...
[ -0.008710419759154, -0.008863111957907, 0.020557979121804, -0.02627701126039, 0.000485406373627, 0.008759004063904001, 0.007308423984795, 0.014436393044888002, -0.041921064257621, -0.006819113623350001, 0.005871725268661, 0.007103676907718, -0.006274278275668001, 0.006708064116537, 0.012...
Here we present a novel approach to conditioning the SampleRNN generative model for voice conversion (VC). Conventional methods for VC modify the perceived speaker identity by converting between source and target acoustic features. Our approach focuses on preserving voice content and depends on the generative network...
[ -0.021867427974939003, -0.006231738720089, 0.02280987240374, 0.0019070828566320002, 0.024722076952457, 0.011241032741963001, 0.013856655918061001, -0.004602950066328, -0.025268420577049002, -0.010025416500866, 0.017155209556221, 0.044800225645303005, -0.013446897268295002, 0.00116012780927...
The neural network (NN) based singing voice synthesis (SVS) systems require sufficient data to train well and are prone to over-fitting due to data scarcity. However, we often encounter data limitation problem in building SVS systems because of high data acquisition and annotation costs. In this work, we propose a Pe...
[ -0.018526911735534002, -0.025049701333045002, 0.013155204243957, -0.013196314685046001, 0.019650585949420003, 0.016457708552479, 0.006385755259543001, 0.00477561308071, -0.024734525009989003, -0.016485115513205, 0.012935950420796, 0.06237759441137301, -0.02178830653429, -0.0059095644392070...
For text summarization, the role of discourse structure is pivotal in discerning the core content of a text. Regrettably, prior studies on incorporating Rhetorical Structure Theory (RST) into transformer-based summarization models only consider the nuclearity annotation, thereby overlooking the variety of discourse r...
[ -0.0263113827, 0.0040997946599999995, 0.0113032693, -0.0047813458399999995, -0.009164246729999999, 0.00797590055, -0.023123819400000002, -0.00414173584, -0.0152667537, -0.0131766628, 0.011897442900000001, 0.0400962, 0.000547425647, 0.0271362346, -0.0133584095, 0.0141902519, 0.0269544...
While known algorithms for sensitivity analysis and parameter tuning in probabilistic networks have a running time that is exponential in the size of the network, the exact computational complexity of these problems has not been established as yet. In this paper we study several variants of the tuning problem and sho...
[ 0.007847535423934, -0.010640034452080002, 0.030900944024324, -0.013092814013361001, 0.003033700864762, 0.002294809557497, -0.01153689622879, -0.010938988998532, -0.046582426875829, -0.039788022637367006, 0.016904475167393, 0.026307927444577002, -0.0065633929334580005, 0.004983694292604, ...
Obtaining first-order regret bounds -- regret bounds scaling not as the worst-case but with some measure of the performance of the optimal policy on a given instance -- is a core question in sequential decision-making. While such bounds exist in many settings, they have proven elusive in reinforcement learning with l...
[ 0.015090464614331, -0.014365899376571001, 0.008896825835108, -0.033525075763463, 0.0009762471891000001, 0.005197362508624, 0.003140363376587, 0.018727226182818, -0.031769398599863004, -0.019549328833818002, 0.016832208260893003, 0.019730469211935, -0.004838563036173, 0.016010105609893, -...
Video processing and analysis have become an urgent task since a huge amount of videos (e.g., Youtube, Hulu) are uploaded online every day. The extraction of representative key frames from videos is very important in video processing and analysis since it greatly reduces computing resources and time. Although great p...
[ -0.004993135109543001, 0.008424021303653, 0.014073705300688001, -0.046301815658807005, 0.012255570851266, 0.00789204891771, -0.018073599785566, 0.005036904942244001, -0.014006366953253002, -0.029898205772042004, 0.006413973402231, 0.053601291030645, -0.0013282480649650001, 0.01383128762245...
Background: Federated learning methods offer the possibility of training machine learning models on privacy-sensitive data sets, which cannot be easily shared. Multiple regulations pose strict requirements on the storage and usage of healthcare data, leading to data being in silos (i.e. locked-in at healthcare facili...
[ -0.01973021030426, 0.01767554692924, 0.018179008737206, -0.052387110888957006, -0.014722819440066, 0.030969627201557003, -0.010205280967056, -0.008232260122895001, -0.034697957336902, -0.044821593910455, 0.010783581063151, 0.017389798536896, 0.004119531717151, -0.017947688698768, -0.0116...
We study the problem of attacking video recognition models in the black-box setting, where the model information is unknown and the adversary can only make queries to detect the predicted top-1 class and its probability. Compared with the black-box attack on images, attacking videos is more challenging as the computa...
[ -0.020041983574628, -0.012745938263833, 0.003469197778031, -0.031009893864393002, 0.009564562700688001, 0.010858912952244, -0.001141071435995, -0.02109108865261, -0.015995437279343, -0.047223325818777, 0.023053050041198002, 0.009680373594164, -0.009087697602808, -0.0054941740818320005, -...
Computational Grids are a new trend in distributed computing systems. They allow the sharing of geographically distributed resources in an efficient way, extending the boundaries of what we perceive as distributed computing. Various sciences can benefit from the use of grids to solve CPU-intensive problems, creating ...
[ -0.009842676110565001, -0.017091581597924, -0.002696156036108, -0.015849301591515, 0.007003179751336, 0.004293372388929, -0.026374548673629, 0.0042660697363310005, -0.034783825278282006, -0.040954269468784006, 0.029487073421478, 0.006385453045368, 0.0010818752925840002, 0.01126242429018000...
In several physical systems, important properties characterizing the system itself are theoretically related with specific degrees of freedom. Although standard Monte Carlo simulations provide an effective tool to accurately reconstruct the physical configurations of the system, they are unable to isolate the differe...
[ -0.016609471291303, -0.004500697832554, 0.00951871741563, -0.021699916571378, -0.00963597651571, 0.016043867915868003, -0.015064405277371, 0.002181372838094, -0.02181027829647, -0.041247773915529, 0.019975511357188003, 0.04847648367285701, -0.011581106111407, 0.008104705251753, 0.0061975...
Understanding theoretical properties of deep and locally connected nonlinear network, such as deep convolutional neural network (DCNN), is still a hard problem despite its empirical success. In this paper, we propose a novel theoretical framework for such networks with ReLU nonlinearity. The framework explicitly form...
[ -0.019874529913067002, -0.0014689079253, -0.001674968749284, -0.013929384760558002, 0.020059902220964, -0.012188211083412, -0.025038465857505, 0.00816299021244, -0.0034624848049130004, -0.008891236968338, 0.016339220106601, 0.025515137240290003, 0.005624055396765, 0.014644390903413, -0.0...
In recent years we have seen fast progress on a number of benchmark problems in AI, with modern methods achieving near or super human performance in Go, Poker and Dota. One common aspect of all of these challenges is that they are by design adversarial or, technically speaking, zero-sum. In contrast to these settings...
[ -0.037323843687772, -0.0013397851726040001, 0.020957691594958, -0.016337985172867, -0.009507017210125, 0.01149292755872, -0.018774598836898002, 0.004936606623232, -0.027197111397981002, -0.030028089880943003, 0.020929522812366003, 0.016028126701712, 0.014971791766583002, 0.016985870897769,...
Deep learning and other machine learning approaches are deployed to many systems related to Internet of Things or IoT. However, it faces challenges that adversaries can take loopholes to hack these systems through tampering history data. This paper first presents overall points of adversarial machine learning. Then, ...
[ -0.010607643984258001, -0.0065036155283450005, 0.004632071591913, -0.002790605882182, 0.0028557756450020002, 0.009177249856293, -0.016322536394, 0.01343501266092, -0.033153064548969005, -0.014517834410071002, 0.028126632794737, 0.037831924855709, -0.016777055338025003, 0.010968584567308001...
Network data are ubiquitous in modern machine learning, with tasks of interest including node classification, node clustering and link prediction. A frequent approach begins by learning an Euclidean embedding of the network, to which algorithms developed for vector-valued data are applied. For large networks, embeddi...
[ -0.006099278572946, -0.009245513007044001, 0.016214145347476002, -0.022727401927113002, 0.005971635226160001, 0.017000705003738, 0.005516259465366001, 0.003946592099964, -0.015993356704711, -0.032897464931011006, 0.00162141455803, 0.004795247223228, -0.016062354668974002, 0.010397751815617...
Astronomical source deblending is the process of separating the contribution of individual stars or galaxies (sources) to an image comprised of multiple, possibly overlapping sources. Astronomical sources display a wide range of sizes and brightnesses and may show substantial overlap in images. Astronomical imaging d...
[ 0.004094622097909, 0.013056112453341002, -0.007104666903614, -0.021897476166486, -0.02752629481256, 0.036655962467193, -0.0021828832104800002, 0.036244098097085, -0.017037471756339, -0.031384095549583005, 0.007187040057033, 0.025576800107955003, -0.0007598046795460001, 0.007825430482625, ...
Universal style transfer tries to explicitly minimize the losses in feature space, thus it does not require training on any pre-defined styles. It usually uses different layers of VGG network as the encoders and trains several decoders to invert the features into images. Therefore, the effect of style transfer is ach...
[ 0.008442793041467, -0.020023109391331003, 0.036224145442247, -0.001047327066771, 0.028237719088792003, -0.002246182179078, -0.012336175888776, 0.006927511189132001, -0.015188470482826, -0.017199337482452, 0.017185077071189003, 0.024986103177070004, 0.006535320542752, 0.015801714733242, -...
Unsupervised person re-identification (ReID) aims to match a query image of a pedestrian to the images in gallery set without supervision labels. The most popular approaches to tackle unsupervised person ReID are usually performing a clustering algorithm to yield pseudo labels at first and then exploit the pseudo lab...
[ -0.009641200304031, 0.011586945503950001, 0.026257459074258003, -0.033528756350278, 0.010449122637510001, 0.033663410693407, 0.011533084325492, 0.007062583230435001, -0.024614686146378, -0.034255884587764004, 0.0033074300736180002, 0.026230528950691, -0.013620215468108002, 0.00232950807549...
Graph neural networks that leverage coordinates via directional message passing have recently set the state of the art on multiple molecular property prediction tasks. However, they rely on atom position information that is often unavailable, and obtaining it is usually prohibitively expensive or even impossible. In ...
[ -0.025366181507706, 0.004345197696238001, -0.014295525848865, -0.0023331441916520004, 0.00306083401665, 0.04847076535224901, -0.006941845640540001, -0.00038740315358100005, -0.032583747059106, -0.025352220982313003, 0.02464023604989, 0.011189320124685001, -0.007147762924432001, 0.017869407...
The Listen, Attend and Spell (LAS) model and other attention-based automatic speech recognition (ASR) models have known limitations when operated in a fully online mode. In this paper, we analyze the online operation of LAS models to demonstrate that these limitations stem from the handling of silence regions and the...
[ -0.021932028234004003, 0.004449578467756001, 0.030460387468338002, -0.017551116645336002, 0.0030041523277750002, 0.008995289914309, -0.002770686754956, 0.002296888967975, -0.019432572647929, -0.030240654945373, 0.007230565417557001, 0.02246762625873, -0.04043073952198, 0.012703272514045, ...
Safety and decline of road traffic accidents remain important issues of autonomous driving. Statistics show that unintended lane departure is a leading cause of worldwide motor vehicle collisions, making lane detection the most promising and challenge task for self-driving. Today, numerous groups are combining deep l...
[ 0.011689647100865001, 0.016751773655414002, 0.0011359287891530001, 0.0012841670541090002, 0.000717473274562, 0.009751537814736, -0.025032786652445002, 0.024056956171989, -0.012089467607438, -0.019272670149803002, -0.001373109989799, 0.04131019860506, -0.014352854341268002, 0.00989384669810...
We study the model of projective simulation (PS) which is a novel approach to artificial intelligence (AI). Recently it was shown that the PS agent performs well in a number of simple task environments, also when compared to standard models of reinforcement learning (RL). In this paper we study the performance of the...
[ -0.005434666760265001, 0.00511015811935, -0.013308271765708, -0.014934231527149, -0.010753192938864, 0.025004249066114002, -0.011607163585722, 0.014278382062911, -0.023036701604723, -0.048751451075077, 0.0009385133162140001, 0.006664383690804, 0.002597777405753, 0.002471389947459, 0.0064...
In our previous work, we introduced the rule-based Bayesian Regression, a methodology that leverages two concepts: (i) Bayesian inference, for the general framework and uncertainty quantification and (ii) rule-based systems for the incorporation of expert knowledge and intuition. The resulting method creates a penalt...
[ -0.011861114762723, -0.007745894603431, -0.008592141792178001, 0.000193114188732, -0.009602179750800001, 0.019409095868468, -0.007063436787575, 0.005353880580514001, -0.014563647098839002, -0.027735080569982, -0.017279827967286002, 0.0071248579770320005, -0.007247700355947, 0.0101686194539...
Complex multivariate time series arise in many fields, ranging from computer vision to robotics or medicine. Often we are interested in the independent underlying factors that give rise to the high-dimensional data we are observing. While many models have been introduced to learn such disentangled representations, on...
[ -0.023617584258317, 0.010364501737058001, 0.037083871662616, -0.008933966979384, 0.005729017779231, 0.015158169902861, 0.007166430354118, 0.010199439711868001, -0.044429119676351006, -0.049903664737939, 0.017345238476991, 0.055213153362274, -0.013204938732087002, 0.008988986723124, 0.013...
In this paper, we present a new MTL framework that searches for structures optimized for multiple tasks with diverse graph topologies and shares features among tasks. We design a restricted DAG-based central network with read-in/read-out layers to build topologically diverse task-adaptive structures while limiting se...
[ -0.0427925922, 0.0122334333, 0.00408246368, -0.0218708385, 0.008506877349999999, 0.0325480513, -0.0107958484, 0.0124427909, -0.0138943335, -0.0239364952, 0.017390597600000002, 0.0312639959, -0.0117658693, 0.00319618522, -0.0034055423499999996, 0.009337326509999999, 0.0159250963, 0....
An analogy is an identification of structural similarities and correspondences between two objects. Computational models of analogy making have been studied extensively in the field of cognitive science to better understand high-level human cognition. For instance, Melanie Mitchell and Douglas Hofstadter sought to be...
[ -0.009040875360369, 0.000518988177645, 0.007465315517038, -0.009446599520742002, -0.025641735643148002, 0.010258046910166001, -0.023572545498609, -0.0018899961141860002, 0.011651030741631001, -0.048822078853845007, 0.0030818092636760003, 0.0028468277305360003, -0.00031126613612200005, 0.00...
Electrocardiogram (ECG) is a widely used diagnostic tool for detecting heart conditions. Rare cardiac diseases may be underdiagnosed using traditional ECG analysis, considering that no training dataset can exhaust all possible cardiac disorders. This paper proposes using anomaly detection to identify any unhealthy st...
[ -0.0156742502, 0.00754736038, 0.0174532719, -0.006465796849999999, -0.00607158197, 0.0181001872, -0.004430704749999999, -0.006566877479999999, -0.013551555600000001, 0.00351087051, 0.0183832143, 0.0227768552, -0.0105460882, 0.000784639094, -0.00991264917, 0.00253375666, 0.0318336897,...
Exploration is a fundamental problem in robot autonomy. A major limitation, however, is that during exploration robots oftentimes have to rely on on-board systems alone for state estimation, accumulating significant drift over time in large environments. Drift can be detrimental to robot safety and exploration perfor...
[ 0.011273599229753, -0.000373512331862, 0.01976203918457, -0.029083227738738, -0.011168630793690001, 0.03375781700015, -0.028943270444869003, 0.0028516398742790003, -0.034653548151254, -0.024534599855542003, 0.010321886278688, 0.024744536727666, -0.004027285147458, 0.020125929266214003, -...
Natural language understanding (NLU) has two core tasks: intent classification and slot filling. The success of pre-training language models resulted in a significant breakthrough in the two tasks. One of the promising solutions called BERT can jointly optimize the two tasks. We note that BERT-based models convert ea...
[ -0.034061253070831, -0.015425790101289001, -0.0025110142305490002, -0.004776461049914, -0.022675219923257002, 0.013661854900419, -0.004288784693926, 0.014222163707017002, -0.026756484061479003, -0.030574886128306004, 0.022052654996514, 0.034088920801877004, -0.019396375864744003, 0.0183726...
To improve patient survival and treatment outcomes, early diagnosis of brain tumors is an essential task. It is a difficult task to evaluate the magnetic resonance imaging (MRI) images manually. Thus, there is a need for digital methods for tumor diagnosis with better accuracy. However, it is still a very challenging...
[ -0.015574034303426002, 0.012498095631599001, -0.004161564167588, -0.028708761557936002, -0.011090802960097, 0.006171981804072001, -0.00363215431571, -0.014300770126283, -0.044899325817823, -0.016337992623448, 0.002950287656858, 0.026483900845050003, -0.011311949230730001, 0.01201559510082,...
Unsupervised Domain Adaptation (UDA) is a key issue in visual recognition, as it allows to bridge different visual domains enabling robust performances in the real world. To date, all proposed approaches rely on human expertise to manually adapt a given UDA method (e.g. DANN) to a specific backbone architecture (e.g....
[ -0.007466966751962001, -0.009366886690258001, 0.017155162990093002, -0.014305283315479, 0.008116572163999, 0.0119792772457, -0.015576553530991001, -0.0019348454661660003, -0.01925066486001, -0.023469604551792003, 0.019264634698629, 0.012552048079669, 0.004938396159559, 0.008137526921927, ...
Given that language models are trained on vast datasets that may contain inherent biases, there is a potential danger of inadvertently perpetuating systemic discrimination. Consequently, it becomes essential to examine and address biases in language models, integrating fairness into their development to ensure these ...
[ -0.0183323771, 0.00974164438, 0.014016458800000001, -0.038336318, -0.020113550100000002, 0.0231963489, -0.0181953646, -0.00180515, -0.0304169487, -0.043734639900000004, 0.0052373325499999995, 0.001717804, -0.0161538664, -0.0157017224, -0.000379141449, 0.0200998485, 0.0311568212, -0...
POI-level geo-information of social posts is critical to many location-based applications and services. However, the multi-modality, complexity and diverse nature of social media data and their platforms limit the performance of inferring such fine-grained locations and their subsequent applications. To address this ...
[ -0.010752851143479, 0.000669475004542, 0.0023891404271120004, -0.023650772869586, -0.013709197752177, 0.015510505996644, -0.020900681614875002, -0.014437971636652001, 0.0007335005211640001, -0.04336891695857, 0.013344810344278, 0.025122070685029002, -0.032396055757999004, 0.008463401347398...
Deep transfer learning (DTL) has formed a long-term quest toward enabling deep neural networks (DNNs) to reuse historical experiences as efficiently as humans. This ability is named knowledge transferability. A commonly used paradigm for DTL is firstly learning general knowledge (pre-training) and then reusing (fine-...
[ -0.0038097635842850005, -0.015294218435883002, 0.036132417619228, -0.019914202392101, 0.010563905350863, -0.0054612355306740005, -0.006278352346271001, 0.030036795884370002, -0.029567902907729003, -0.042365949600934004, 0.017707642167806, 0.032739832997322, -0.001600617892108, -0.002949550...
Biological muscles have always attracted robotics researchers due to their efficient capabilities in compliance, force generation, and mechanical work. Many groups are working on the development of artificial muscles, however, state-of-the-art methods still fall short in performance when compared with their biologica...
[ -0.025043535977602, -0.002178733237087, -0.026104010641574003, -0.0037728454917660002, 0.017960103228688, 0.022120431065559002, -0.018354382365942, -0.006957670673727, -0.022582689300179003, -0.014846656471490001, 0.008640156127512, 0.014248439110815001, 0.0029553954955190004, 0.0005315123...
A key assumption of top-down human pose estimation approaches is their expectation of having a single person/instance present in the input bounding box. This often leads to failures in crowded scenes with occlusions. We propose a novel solution to overcome the limitations of this fundamental assumption. Our Multi-Ins...
[ -0.008218182250857001, -0.004471962805837001, 0.016685189679265, -0.028808563947677, -0.008688187226653, 0.017348727211356, -0.010533649474382002, 0.004357917234301001, -0.006510956678539, -0.020085817202925002, 0.012068078853189002, -0.000207463293918, 0.013194709084928001, -0.00376004283...
Reinforcement Learning (RL) algorithms have led to recent successes in solving complex games, such as Atari or Starcraft, and to a huge impact in real-world applications, such as cybersecurity or autonomous driving. In the side of the drawbacks, recent works have shown how the performance of RL algorithms decreases u...
[ -0.013791068457067, 0.007223229389637001, 0.024472523480653003, -0.031291361898183004, 0.0033449267502870003, 0.00214221724309, -0.010827871970832001, 0.011267121881246001, -0.022687632590532, -0.024347024038434, 0.027331138029694002, 0.02381713502109, -0.004897990729659, 0.011790039017796...
Effective models of social dialog must understand a broad range of rhetorical and figurative devices. Rhetorical questions (RQs) are a type of figurative language whose aim is to achieve a pragmatic goal, such as structuring an argument, being persuasive, emphasizing a point, or being ironic. While there are computat...
[ -0.0061990492977200004, 0.015457886271178, 0.009212476201355001, -0.018756099045276, -0.002597838873043, 0.0032601305283600003, 0.001332034007646, -0.025511473417282, -0.028372572734951, -0.027895722538232002, 0.019881993532180002, 0.029670665040612002, -0.012285509146749, -0.0041591911576...
There have been significant interests in designing Graph Neural Networks (GNNs) for seeded graph matching, which aims to match two (unlabeled) graphs using only topological information and a small set of seeds. However, most previous GNNs for seeded graph matching employ a semi-supervised approach, which requires a l...
[ -0.014665619470179001, -0.01086876168847, -0.00022442996851100003, 0.003450128016993, 0.01667046919465, 0.003086233977228, -0.007387736812233, 0.004181349184364001, -0.027738343924283003, -0.030512178316712, 0.00795760937035, 0.038202013820409005, -0.013807378709316, -0.001912160543724, ...
Inspired by the "Cognitive Hour-glass" model presented in https://doi.org/10.1515/jagi-2016-0001, we propose a new framework for developing cognitive architectures aimed at cognitive robotics. The purpose of the proposed framework is foremost to ease the development of cognitive architectures by encouraging and mitig...
[ -0.017433758825063, -0.002529723802581, 0.027931943535804003, -0.023732669651508, 0.011006160639226001, 0.0026753437705330004, -0.009001346305012, 0.001208984409458, -0.00191845849622, -0.030532784759998002, 0.005513240117579, 0.012096617370843001, 0.0061261984519660004, -0.000641320541035...
Given two sources of evidence about a latent variable, one can combine the information from both by multiplying the likelihoods of each piece of evidence. However, when one or both of the observation models are misspecified, the distributions will conflict. We study this problem in the setting with two conflicting re...
[ -0.021317802369594, 0.0066574560478320005, -0.014639432542026001, -0.017748568207025, -0.025207707658410003, 0.024371169507503003, 0.0020652057137340004, -0.005806974601, -0.019993280991911, -0.043053872883319, 0.016173087060451, 0.023925013840198003, 0.001995494123548, 0.03393559902906400...
Visualization techniques for the decision space of continuous multi-objective optimization problems (MOPs) are rather scarce in research. For long, all techniques focused on global optimality and even for the few available landscape visualizations, e.g., cost landscapes, globality is the main criterion. In contrast, ...
[ -0.0030072205699980003, 0.006843421142548001, 0.018785590305924003, -0.027345936745405003, -0.008622779510915, 0.033075958490371, -0.011425356380641, -0.002275359584018, -0.035240322351455, -0.034435622394084, 0.017009699717164, 0.0185774769634, -0.004037375561892, 0.016121754422783, 0.0...
The biomechanics of the human body gives subjects a high degree of freedom in how they can execute movement. Nevertheless, subjects exhibit regularity in their movement patterns. One way to account for this regularity is to suppose that subjects select movement trajectories that are optimal in some sense. We adopt th...
[ 0.0052100494503970005, 0.000138072180561, 0.008266299031674001, -0.011735191568732001, 0.027375405654311003, 0.016760725528001, -0.00015746729332000002, 0.006978044286370001, -0.002442315453663, -0.036205314099788, -0.016331307590007, 0.021538002416491002, 0.008796362206339, 0.026771536096...
We study the capabilities of speech processing systems trained simply to predict large amounts of transcripts of audio on the internet. When scaled to 680,000 hours of multilingual and multitask supervision, the resulting models generalize well to standard benchmarks and are often competitive with prior fully supervi...
[ -0.002818637061864, -0.009200910106301, 0.024389278143644003, -0.020557854324579003, 0.018031036481261, 0.028069643303751002, 0.0048991413787, 0.021519143134355, -0.020969836041331003, -0.031612679362297, 0.019280713051557003, 0.015600348822772002, -0.030706321820616004, -0.017509194090962...
Finding local invariant patterns in handwrit-ten characters and/or digits for optical character recognition is a difficult task. Variations in writing styles from one person to another make this task challenging. We have proposed a non-explicit feature extraction method using a multi-scale multi-column skip convoluti...
[ -0.022403866052627, 0.019999409094452, 0.014610601589083002, -0.019674101844429002, -0.004674543626606, 0.028259420767426, -0.022135131061077003, -0.0077013284899290005, -0.031399358063936005, -0.022630166262388, 0.031455930322408, 0.022969618439674003, -0.022517016157507, 0.01279311627149...
This document contains a discussion of the F1 score evaluation used in the article 'Relation Classification with Entity Type Restriction' by Shengfei Lyu, Huanhuan Chen published on Findings of the Association for Computational Linguistics: ACL-IJCNLP 2021. The authors created a system named RECENT and claim it achie...
[ -0.0142921405, 0.006889386569999999, 0.0162634701, -0.028584281000000003, -0.00010882313699999999, 0.00682436, -0.0154010132, 0.000109732224, -0.0185770448, -0.024449965, 0.0263254661, 0.029925881, -0.0156611204, 0.005718909669999999, -0.0228893291, 0.0020380674399999997, 0.021917354...
Deep Convolutional Neural Networks (CNNs) are capable of learning unprecedentedly effective features from images. Some researchers have struggled to enhance the parameters' efficiency using grouped convolution. However, the relation between the optimal number of convolutional groups and the recognition performance re...
[ -0.032352369278669, 0.016349121928215003, 0.030383558943867003, -0.006411941722035, 0.0023479412775480003, -0.00016358267748700002, 0.01533810980618, -0.002677185228094, -0.014194070361554002, -0.053450588136911004, 0.0015439543640240001, 0.046745982021093, -0.008034881204366, -0.003069617...
Popular models such as Transformers and LSTMs use tokens as its unit of information. That is, each token is encoded into a vector representation, and those vectors are used directly in a computation. However, humans frequently consider spans of tokens (i.e., phrases) instead of their constituent tokens. In this paper...
[ -0.024451738223433002, 0.000314083503326, -0.005497444886714001, -0.00676339585334, 0.0033782008104020003, 0.005511433351784001, -0.00042314938036700005, 0.009952752850949001, -0.014310142025351, -0.037041306495666004, 0.008190213702619001, 0.021052556112408003, -0.027766991406679, 0.02053...
Product-specific community question answering platforms can greatly help address the concerns of potential customers. However, the user-provided answers on such platforms often vary a lot in their qualities. Helpfulness votes from the community can indicate the overall quality of the answer, but they are often missin...
[ 0.0033815749920900005, 0.016928287222981002, 0.020479960367083, -0.028114018961787002, 0.011498715728521, 0.0008020183886400001, 0.004861439112573001, -0.014329168945550001, -0.033666063100099, -0.049179121851921005, -0.006048732437193001, -0.000781181210186, -0.026807656511664002, -0.0136...
Statistical significance testing plays an important role when drawing conclusions from experimental results in NLP papers. Particularly, it is a valuable tool when one would like to establish the superiority of one algorithm over another. This appendix complements the guide for testing statistical significance in NLP...
[ -0.008699613623321, 0.003921288065612, 0.030445247888565, -0.025221398100256, 0.003035342320799, -0.005873430054634, -0.005543538369238, 0.037274342030286005, -0.012597095221281001, -0.026092041283845003, 0.011250321753323, 0.019208529964089, -0.013474538922309001, 0.022310191765427003, ...
We unify different broad-coverage semantic parsing tasks under a transduction paradigm, and propose an attention-based neural framework that incrementally builds a meaning representation via a sequence of semantic relations. By leveraging multiple attention mechanisms, the transducer can be effectively trained withou...
[ -0.012823205441236002, -0.001415436971001, 0.052228420972824006, 0.002050061943009, -0.008963860571384001, 0.035167504101991, -0.014666885137557002, 0.0017628468340260002, -0.023032238706946002, -0.041221376508474, 0.027531366795301004, 0.045596677809953, -0.013401075266301, 0.002454226603...
Few Shot Instance Segmentation (FSIS) requires models to detect and segment novel classes with limited several support examples. In this work, we explore a simple yet unified solution for FSIS as well as its incremental variants, and introduce a new framework named Reference Twice (RefT) to fully explore the relation...
[ 0.0036689222324630005, 0.022111557424068003, 0.000541323563084, -0.023035790771245002, -0.003959495108574, 0.011608918197453001, -0.013751456514000001, 0.0025346369948230003, -0.004379600752145, -0.035961039364337005, 0.012953256256878001, 0.021453391760587002, 0.0018432133365420002, -0.00...
Fine-grained visual classification (FGVC) is becoming an important research field, due to its wide applications and the rapid development of computer vision technologies. The current state-of-the-art (SOTA) methods in the FGVC usually employ attention mechanisms to first capture the semantic parts and then discover t...
[ -0.014015812426805002, 0.020773803815245, 0.017446160316467, -0.020308207720518, 0.000274094025371, 0.02870263159275, -0.027237372472882004, -0.012954527512192001, -0.017596794292330003, -0.036809481680393004, 0.026374651119112, 0.023074395954608, -0.025991218164563002, 0.019650895148515, ...
The theory of reinforcement learning currently suffers from a mismatch between its empirical performance and the theoretical characterization of its performance, with consequences for, e.g., the understanding of sample efficiency, safety, and robustness. The linear quadratic regulator with unknown dynamics is a funda...
[ 0.0017848351271820002, -0.004580732900649, 0.0045153922401360005, -0.028392290696501003, -0.0024967058561740003, 0.0013248703908170002, 0.0019137972267340001, 0.005406090524047001, -0.037636291235685, -0.011046031489968001, 0.016300806775689, 0.017002360895276, -0.007792748510837001, 0.016...
The identification of nonlinear dynamics from observations is essential for the alignment of the theoretical ideas and experimental data. The last, in turn, is often corrupted by the side effects and noise of different natures, so probabilistic approaches could give a more general picture of the process. At the same ...
[ -0.027718856930732002, -0.021676862612366003, -0.014231031760573, -0.0038846314419060004, 0.001074380939826, 0.006117692217230001, -0.0020231737289570003, -0.00241370149888, -0.004352576099336001, -0.019984003156423003, 0.017093753442168, 0.037738386541604, 0.003024438396096, 0.03115963004...
Size, weight, and power constrained platforms impose constraints on computational resources that introduce unique challenges in implementing localization algorithms. We present a framework to perform fast localization on such platforms enabled by the compressive capabilities of Gaussian Mixture Model representations ...
[ 0.009676106274127001, 0.011495077051222002, -0.005231251474469001, -0.019201770424842002, -0.0007957998896010001, 0.012288312427699, -0.011823312379419, 0.009696620516479001, -0.006482649128884001, -0.028337655588984004, 0.025616036728024, 0.031237067654728, -0.026874272152781, 0.011631841...
Event cameras differ from conventional RGB cameras in that they produce asynchronous data sequences. While RGB cameras capture every frame at a fixed rate, event cameras only capture changes in the scene, resulting in sparse and asynchronous data output. Despite the fact that event data carries useful information tha...
[ -0.0212200936, -0.00719692698, -0.0123445839, -0.0123096127, -0.00809217151, -0.0034480905199999997, -0.00781940203, 0.00840690639, -0.0151911816, -0.0279344283, 0.0053819585599999996, 0.047867607300000004, 0.010169418500000001, 0.0181846563, -0.0036054577199999996, 0.0115752323, 0.0...
Flying drones can be used in a wide range of applications and services from surveillance to package delivery. To ensure robust control and safety of drone operations, cellular networks need to provide reliable wireless connectivity to drone user equipments (UEs). To date, existing mobile networks have been primarily ...
[ -0.019989229738712002, -0.000524884962942, 0.006855366751551, -0.006342220585793001, 0.019251372665166, -0.00333209731616, -0.010719057172536002, 0.00866647157818, -0.024241972714662, -0.041615162044763, 0.010544653981924001, 0.012040492147207002, -0.011081277392804002, 0.01409978512674500...
The primary aim of this project is to build a contextual Question-Answering model for videos. The current methodologies provide a robust model for image based Question-Answering, but we are aim to generalize this approach to be videos. We propose a graphical representation of video which is able to handle several typ...
[ -0.015020249411463002, 0.005217181518673001, 0.011454902589321001, -0.034907687455415004, -0.000435037713032, 0.013299724087119002, -0.012396939098834001, -0.004278415814042, -0.018121119588613, -0.02799941971898, 0.013162343762814001, 0.015739860013127, -0.0014833804452790002, -0.00239924...
We propose a novel hardware-aware magnitude pruning technique for coherent photonic neural networks. The proposed technique can prune 99.45% of network parameters and reduce the static power consumption by 98.23% with a negligible accuracy loss.
[ -0.003206307068467, 0.006841516122221, 0.021326562389731, 0.011116592213511, -0.00011844941764100001, 0.027561338618397, 0.006998431868851001, -0.001242247759364, -0.016751602292060002, -0.040226161479949, 0.012455604970455001, 0.034507464617490005, -0.021019704639911003, 0.006911256350576...
Swarms are highly robust systems that offer unique benefits compared to their alternatives. In this work, we propose a bio-inspired and artificial potential field-driven robot swarm control method, where the swarm formation dynamics are modeled on the basis of Markov Random Field (MRF) optimization. We integrate the ...
[ -0.021884378045797, -0.014684675261378, -0.01836603321135, 0.005691839847713, 0.005501659121364, 0.011791210621595001, -0.00874831713736, -0.008870576508343001, -0.039095740765333, -0.024628415703773002, -0.001121557434089, 0.017469465732574, -0.012871165759861001, 0.0028747867327180003, ...
Given an alphabet A and a binary relation $\tau$ $\subseteq$ A * x A * , a language X $\subseteq$ A * is $\tau$-independent if $\tau$ (X) $\cap$ X = $\emptyset$; X is $\tau$-closed if $\tau$ (X) $\subseteq$ X. The language X is complete if any word over A is a factor of some concatenation of words in X. Given a famil...
[ 0.011927565559744, 0.01205460447818, 0.011638198979198001, -0.00291660730727, -0.032889027148485, 0.0007759093423370001, -0.022500047460198003, -0.015230583958327002, -0.027087572962045003, -0.041217148303985006, 0.028767311945557, 0.023911593481898002, 0.010854790918529, -0.00463340058922...
This paper presents an empirical study regarding training probabilistic neural networks using training objectives derived from PAC-Bayes bounds. In the context of probabilistic neural networks, the output of training is a probability distribution over network weights. We present two training objectives, used here for...
[ -0.020995553582906, -0.025835255160927002, 0.020685136318206003, -0.012289736419916, 0.004874975886195, 0.00035517301876000003, 0.005442899651825, 0.021221311762928, -0.014095805585384001, -0.02374698780477, 0.0138277169317, 0.022731073200702, -0.021461181342601002, 0.014956509694457, 0....
Due to the complexity of modeling the elastic properties of materials, the use of machine learning algorithms is continuously increasing for tactile sensing applications. Recent advances in deep neural networks applied to computer vision make vision-based tactile sensors very appealing for their high-resolution and l...
[ -0.015501599758863002, 0.005134643055498001, 0.025240678340196002, -0.016436439007520003, 0.020426949486136003, 0.004133527167141, -0.011406442150473001, 0.011859909631311, -0.028170773759484003, -0.048220995813608, 0.001470279996283, 0.0242639798671, -0.015069061890244002, -0.004437001422...
The mixed multinomial logit (MMNL) model assumes constant preference parameters of a decision-maker throughout different choice situations, which may be considered too strong for certain choice modelling applications. This paper proposes an effective approach to model context-dependent intra-respondent heterogeneity ...
[ -0.035038590431213004, 0.003238674486055, 0.012331942096352001, -0.020119816064834, -0.012195072136819, 0.015219888649880001, -0.009423465467989, -0.012756237760186001, -0.036927390843629004, -0.037365373224020004, 0.004366137087345, 0.026675865054130003, -0.020516738295555, -0.00549188861...
Progress in natural language generation research has been shaped by the ever-growing size of language models. While large language models pre-trained on web data can generate human-sounding text, they also reproduce social biases and contribute to the propagation of harmful stereotypes. This work utilises the flaw of...
[ -0.00227014697, 0.00962843653, 0.0194623172, -0.028132019600000002, 0.00506075, 0.0119157042, -0.012401919800000001, 0.029529031400000003, -0.0212702174, -0.0437457, 0.008183486759999999, 0.016586111900000002, -0.0340213887, 0.0050812945699999995, 0.019147303, 0.0162163153, 0.0327887...
Learning to control robots directly based on images is a primary challenge in robotics. However, many existing reinforcement learning approaches require iteratively obtaining millions of robot samples to learn a policy, which can take significant time. In this paper, we focus on learning a realistic world model captu...
[ -0.014900429174304002, -0.005849848501384001, 0.016957070678472002, -0.029092611744999, 0.005008805077522, 0.008001830428838001, 0.0025588830467310002, 0.012319413945078002, -0.014042360708117001, -0.031816639006137, -0.009050580672919, 0.024216603487730002, 0.011577116325497001, 0.0039089...
We propose three regularization-based speaker adaptation approaches to adapt the attention-based encoder-decoder (AED) model with very limited adaptation data from target speakers for end-to-end automatic speech recognition. The first method is Kullback-Leibler divergence (KLD) regularization, in which the output dis...
[ -0.012996109202504, -0.00029603598522900005, 0.028932640329003, -0.012129239737987001, 0.010700638405978001, 0.035562459379434, -0.014140377752482001, -0.008634021505713001, -0.010194387286901, -0.026338966563344002, 0.027462430298328, 0.043052215129137004, -0.00339639512822, 0.02109614014...
Multi-parameter cognition in a cognitive radio network (CRN) provides a more thorough understanding of the radio environments, and could potentially lead to far more intelligent and efficient spectrum usage for a secondary user. In this paper, we investigate the multi-parameter cognition problem for a CRN where the p...
[ 0.0031246787402770004, -0.000314980803523, 0.030917508527636004, -0.003694850252941, -0.010432926006615, 0.027950538322329, 0.005836892873048001, 0.006800465751439001, -0.037378299981355, -0.032276216894388005, -0.002168038394302, 0.029919276013970004, -0.018619827926158003, -0.00831861235...
Conceptual graphs, which is a particular type of Knowledge Graphs, play an essential role in semantic search. Prior conceptual graph construction approaches typically extract high-frequent, coarse-grained, and time-invariant concepts from formal texts. In real applications, however, it is necessary to extract less-fr...
[ -0.007018054835498001, 0.002074918011203, 0.019806815311312002, -0.021520206704735003, -0.014282838441431002, 0.022767556831240002, -0.036680303514003004, -0.0022445439826690003, -0.020588122308254003, -0.04901672527194, -0.00027607032097800004, 0.016352616250514002, -0.006298430263996, 0....
In the absence of nonverbal cues during messaging communication, users express part of their emotions using emojis. Thus, having emojis in the vocabulary of text messaging language models can significantly improve many natural language processing (NLP) applications such as online communication analysis. On the other ...
[ -0.025741644203662, 0.00009733901970321314, 0.015126815997064, -0.024329075589776, -0.00687426701188, -0.000752140767872, -0.00041507027344700004, -0.004601130262017, -0.007775978650897001, -0.012089109979569001, -0.021874224767088002, 0.000368570414138, -0.039305035024881, 0.0065588392317...
Answering complex First-Order Logical (FOL) queries on large-scale incomplete knowledge graphs (KGs) is an important yet challenging task. Recent advances embed logical queries and KG entities in the same space and conduct query answering via dense similarity search. However, most logical operators designed in previo...
[ 0.005579617340117001, 0.018832065165042003, -0.0012310502352190001, -0.033573783934116, -0.022949865087866003, 0.020245842635631003, -0.018557546660304, -0.007082613650709, -0.030856037512421, -0.019586995244026, 0.007377722766250001, 0.023951862007379, -0.012737723998725001, 0.02281260490...
This paper revisits datasets and evaluation criteria for Symbolic Regression, a task of expressing given data using mathematical equations, specifically focused on its potential for scientific discovery. Focused on a set of formulas used in the existing datasets based on Feynman Lectures on Physics, we recreate 120 d...
[ -0.004171883221715, 0.000858553801663, 0.009797925129532, 0.002246534451842, -0.009261439554393, 0.0030389099847520002, -0.007059024181216, 0.006307238247245, -0.0029559663962570003, -0.038203436881303, -0.014838068746030001, 0.032895050942897006, -0.0012882718583560001, -0.005015436559915...
In Byzantine robust distributed or federated learning, a central server wants to train a machine learning model over data distributed across multiple workers. However, a fraction of these workers may deviate from the prescribed algorithm and send arbitrary messages. While this problem has received significant attenti...
[ -0.027095280587673003, -0.005856053903698, 0.011782705783843, -0.024878522381186003, -0.006890305783599, 0.026121037080883, -0.006791469641029, 0.006727932021021001, -0.019174253568053003, -0.05438823625445301, 0.018496518954634, 0.011154389008879, -0.019753152504563002, -0.005203028209507...
Construction robots are challenging the traditional paradigm of labor intensive and repetitive construction tasks. Present concerns regarding construction robots are focused on their abilities in performing complex tasks consisting of several subtasks and their adaptability to work in unstructured and dynamic constru...
[ -0.0239043161, -0.0223932788, -0.00711275917, -0.00997828227, -0.00285020843, 0.0153145529, -0.004955108739999999, 0.0093657, -0.00639127335, -0.018091591100000002, -0.006837097, 0.0063334186599999995, -0.00850808527, 0.000643211242, -0.0153417792, -0.0030016524299999996, 0.020174371...
We discuss a way to find a well behaved baseline for attribution methods that work by feeding a neural network with a sequence of interpolated inputs between two given inputs. Then, we test it with our novel Riemann-Stieltjes Integrated Gradient-weighted Class Activation Mapping (RSI-Grad-CAM) attribution method.
[ -0.008460226468741, 0.011088786646723001, 0.001046755583956, -0.02242175489664, 0.008287861943244, 0.005206845700740001, 0.0009650619467720001, -0.0064098066650330006, -0.027966149151325004, -0.04085040092468201, 0.023973036557435, 0.0178684592247, -0.010499874129891, 0.017566820606589, ...
Greybox fuzzing is one of the most useful and effective techniques for the bug detection in large scale application programs. It uses minimal amount of instrumentation. American Fuzzy Lop (AFL) is a popular coverage based evolutionary greybox fuzzing tool. AFL performs extremely well in fuzz testing large application...
[ -0.015933755785226, -0.013187543489038, 0.005778489634394, -0.009618896991014, -0.018837304785847, 0.016205517575144, -0.032782915979623004, -0.014303192496299001, -0.035901013761758, -0.031381204724311, 0.008481793105602, -0.002006022725254, 0.021225938573479, 0.016834856942296, -0.0190...
One primary technical challenge in photoacoustic microscopy (PAM) is the necessary compromise between spatial resolution and imaging speed. In this study, we propose a novel application of deep learning principles to reconstruct undersampled PAM images and transcend the trade-off between spatial resolution and imagin...
[ -0.013480611145496, 0.017388535663485, 0.028289224952459002, -0.010810771957039, -0.0036105073522770003, 0.018979372456669003, -0.018439872190356, 0.0059760124422600005, -0.012166441418230001, -0.023018714040517002, 0.012111107818782002, 0.033698070794343005, 0.013203944079577002, -0.00451...
Data augmentation for minority classes is an effective strategy for long-tailed recognition, thus developing a large number of methods. Although these methods all ensure the balance in sample quantity, the quality of the augmented samples is not always satisfactory for recognition, being prone to such problems as ove...
[ -0.012614530511200001, -0.016984919086098, 0.008357658982276, -0.018730236217379, -0.007697843480855001, 0.010166829451918, -0.015154464170336002, 0.006470445543527, -0.021993838250637002, -0.023980379104614, 0.0054452489130190004, 0.005792893469333001, -0.013891592621803001, 0.01392706669...