title
stringlengths
10
190
abstract
stringlengths
118
1.9k
related work
listlengths
2
8
references
listlengths
0
0
TECM: Transfer Learning-based Evidential C-Means Clustering
As a representative evidential clustering algorithm, evidential c-means (ECM)provides a deeper insight into the data by allowing an object to belong notonly to a single class, but also to any subset of a collection of classes,which generalizes the hard, fuzzy, possibilistic, and rough partitions.However, compared with other partition-based algorithms, ECM must estimatenumerous additional parameters, and thus insufficient or contaminated data willhave a greater influence on its clustering performance. To solve this problem,in this study, a transfer learning-based ECM (TECM) algorithm is proposed byintroducing the strategy of transfer learning into the process of evidentialclustering. The TECM objective function is constructed by integrating theknowledge learned from the source domain with the data in the target domain tocluster the target data. Subsequently, an alternate optimization scheme isdeveloped to solve the constraint objective function of the TECM algorithm. Theproposed TECM algorithm is applicable to cases where the source and targetdomains have the same or different numbers of clusters. A series of experimentswere conducted on both synthetic and real datasets, and the experimentalresults demonstrated the effectiveness of the proposed TECM algorithm comparedto ECM and other representative multitask or transfer-clustering algorithms.
[ "Several transfer clustering algorithms have been developed to address the problems of lack of data or data contamination. This section gives a brief review of the related work according to transfer method.", "Instance-based method In {{cite:ed84805733f28f4d7fae235878c56cbbf7e67a7e}}, a novel method called THUNTER is introduced to transform heterogenous unlabeled instances in the source domain and the target domain into a common subspace, and an approach called DicTrans is developed to automatically select and transfer some informative source instances to the target domain for better clustering performance.However, how and how many source instances to transfer is difficult to determine due to the differences in the distribution between the two domains.", "Feature-representation-based method In {{cite:a4c4f370d830947303f960911de668e132b4815e}}, a self-taught clustering algorithm is proposed. STC is a collaborative learning-based transfer clustering method, which simultaneously clusteres the instances in the target domain and the source domain with allowing the feature representation from the source instances to influence the clustering in the target domain via the common features. Benefiting from the new data representation, STC works well on data in the target domain.In {{cite:0ded7b4e2a47874f65970b81da0a5a83875922d6}}, it presents a co-transfer clustering method to deal with the two separate tasks together with the aid of co-occurrence instances in different domains. The proposed method consists of two steps. The first step is to learn the subspace of different domains that uncovers the latent common topics. The second step is to simultaneously cluster the instances in all domains via the symmetric nonnegative matrix factorization method.", "Parameter-based method In {{cite:c35f2874f98f22c07f1e76a67bac9452ace93e9c}}, {{cite:014bdf3af22e36af9aab66938ae9d1edcaeeb20b}}, the concept of transfer learning is applied to prototype-based clustering(such as FCM). The clustering centers in the source domain are used to establish the corresponding objective function to improve the clustering effect in the target domain. Both of the two papers propose transfer clustering algorithms with the same or different number of clustering centers in the source domain and the target domain. However, two papers have different ways to deal with situation where the number of clusters in the source domain and the target domain is different.A transfer-learning possibilistic c-means (TLPCM) algorithm is proposed in {{cite:30478b61988b7ddc667078d6821c22a583498c07}} using clustering centers in the source domain as transfer knowledge. Moreover, TLPCM overcomes the problem that the number of clusters in the source domain and the target domain is different.In {{cite:b26e8caf7e1d8412f14b0d5a663ca8a85d0add97}}, a novel technique for maximum entropy clustering (MEC) based on knowledge transfer is proposed. The clustering centers in the source domain are selected as the knowledge to transfer. In addition, it solves the problem that the clustering number of the source domain and the target domain is different.In {{cite:b3d289f98783eed7612f6525ce2044f8a1a9abae}}, using the strategy of transfer learning, it constructes a novel objective function by utilizing the clustering centers and membership matrix obtained from the source domain, and proposes the transfer learning clustering algorithm based on maximum entropy correspondingly. However, this algorithm is only applicable when the number of clusters in the source domain and the target domain is consistent.", "Relational knowledge-based method In {{cite:35f6edc4c553e46814e600bc515ee601eff74012}}, a new algorithm TCTC (Topic Constraint Transfer Clustering) is proposed. It assumes that although there are huge disparities in both domains, several common latent topics are shared. These latent topics in the source domain may help to identify some important features. TCTC consists of four steps: (1) Generate high-quality clusters in the source domain using efficient clustering method (In this paper it uses normalized cut spectral clustering). (2) Extract a number of topics from each cluster in the source domain(use an efficient Latent Dirichlet Allocation model to find latent topics in each cluster to be the cross-domain bridge). (3) Formulate several constraints in the target domain data based on the assumption that if two instances from the target domain are both close to many topics, they should be in same cluster with a high possibility. (4) Apply semi-supervised clustering algorithm on target instances.In {{cite:10f819ef4e9888fdb4dee7caa46111b2a890ddea}}, a new algorithm called transfer spectral clustering (TSC) is proposed. It involves not only the data manifold information of the clustering task but also the feature manifold information shared between related clustering tasks. Furthermore, it makes use of co-clustering to achieve and control the knowledge transfer among tasks.", "Among these transfer clustering algorithms, parameter-based transfer clustering is a research hotspot due to it can make full use of the inter-domain similarity and is more suitable to combine with these partition-based clustering algorithms. Therefore, parameter-based transfer method is applyed to ECM." ]
[]
New Mechanism for Fast System Calls
System calls have no place on the fast path of microsecond-scale systems.However, kernel bypass prevents the OS from controlling and supervising accessto the hardware. In this paper we introduce the fastcall space, a new layer inthe traditional OS architecture, that hosts fastcalls. A fastcall implementsthe fast path of a traditional kernel operation and can stay on the fast path,because the transition to the fastcall space is $\approx\times 15$ faster thanto the kernel space. This way the OS does not give up the control over deviceaccess, whereas the applications maintain their performance.
[ "Previous work improved the traditional POSIX API by acceleratingprivilege transition, reducing the number of system calls, removing unnecessarymemory copies, or improving application wake-up time.In this section we put fastcalls in the context of some of these techniques.", "The most straightforward way to improve system call performance is to make theprivilege transition faster.Currently the common way to make a system call is the syscall instruction,which replaced a slower software interrupt mechanism {{cite:8662c7ae27cb6bd1fd2bd7f5a5bb2eee342272f0}}.Call gates {{cite:8662c7ae27cb6bd1fd2bd7f5a5bb2eee342272f0}}, despite initial performanceadvantages {{cite:1186512bb441d68276a510058ee9d184c5de4e31}}, have been hard to use and did not gain momentum.Moreover, call gates do not offer performance advantagesfor modern CPUs anymore {{cite:957f64a85e3420abcb95807c6e934dc5a53cb7a3}}.Intel recently proposed FRED {{cite:9e4bbe0c0717c64bbe654c716894580bda87e4d8}}, an extension to the x86-64 architecture.FRED is designed to improve the performance or ring transitions and unifysystem call and interrupt invocation mechanisms.SkyBridge instead utilizes the vmfunc instruction to transitionto another process without the overhead of standard context switches,but in return weakens OS security guarantees {{cite:431f4d2ba094e26b54ecdb32a5a810f90bbf2036}}.The fastcall layer also could employ any of the aforementioned methods to transitioninto fastcall space, but we considered our method to be the most practical.", "Modern microsecond-scale systems often choose to avoid system calls entirely.Linux' vDSO mechanism maps system calls directly into the application,eliminating the need for costly privilege transitions {{cite:1c60cc940476d434091df98b790834280acd6a15}}.This mechanism offers only few system calls, that can only access non-secretread-only state of the kernel.The fastcall mechanism extends the general concept of vDSO by introducing a wayto execute functions in privileged mode, allowing to manipulate kernel state ina secure way.", "The io_uring interface {{cite:867ae0c8391b054c5d59dc3074af729f98d0f3ca}} utilizes shared memorybuffers to speed up the exchange of I/O requests between applications and thekernel.With io_uring, a system call is only required to update the kernel aboutchanges of the queue state, similarly to other system call batchingtechniques {{cite:ef0e1ddb676c5ea8b23b1bff18fe2f43843317b8}}, {{cite:756f5fbc5cb09026101f75d00902de70140f7a2c}}, {{cite:5a84d79722e9794ed38cefb30319a84dd68e06fd}}.In a fully asynchronous mode, a kernel thread actively polls on shared memory fornew requests, thus eliminating the kernel entry and exit overhead completely.However, polling on both the application and the kernel side leads to high CPUutilization.With fastcalls instead, the application logic and the communication with I/Odevices are carried out in the same thread.", "To avoid system calls one also could deploy user code directly into thecorresponding kernel subsystem.Multiple methods employed eBPF {{cite:455cab3912cc1e4a35e54407086bbf270449b8db}} to offload simple requestprocessing routines from the user application into thestorage {{cite:7b219842f76f56e78a822c1de4451357c3593783}}, network {{cite:802c53b21e0972d3cbaeef90fc43ac851d9f16d2}}, {{cite:69d398e7bf39410c7ebc2b712ea13188522f38fa}}, or scheduling {{cite:56c558a3229265e61c2bbf1d762a2063fc45109b}}subsystems of the Linux kernel.Additionally, it is possible to offload the request processingroutines to the device {{cite:9ba70509ae2b0de71895fe059bb8a9cac7dce565}}, {{cite:c3e5f2ec27ca5522cc3102a346c3b26e6de69826}}, {{cite:690dd5a12698d2e77e112674e223e77c7bab51fc}}, reducing data movement andCPU load.These architecture improve request response latency, but do not address theoverhead of creating new requests.In this regard, fastcalls are complementary to the aforementioned offloadingtechniques, because they enable low-latency user-initiated interactions with thekernel.", "An application can get maximum performance by getting direct access to theunderlying device, bypassing the kernel.In contrast to traditional OS architectures, kernel bypassing techniquesemploy special APIs to avoid privilege transitions and data copying between userand kernel space.For issuing device commands, user applications write to the corresponding deviceregisters directly.Latency of event delivery is minimized, because user applications poll on thedevice completion queues, instead of waiting in a blocking system call (e. g. epoll).Such approaches exist for networking {{cite:28c52dfc6fd19d489b258150f8e585f5104ae37f}}, {{cite:de4277b915e71c7c66a1874f940a77f928a308ce}}, {{cite:f83cf7adc8b0df71a872f06b46d492399b71bd28}} as well as forstorage devices {{cite:072d4624ebabe6555665af6bb795285c74731689}}, {{cite:721ea1a0bbae5fc581432a5e754fab7392b02d76}}.However, removing the kernel from the data path often requires special supportfrom the device {{cite:28c52dfc6fd19d489b258150f8e585f5104ae37f}}, {{cite:83608dc752b92f849b7293af4205a30a7fe5b0e7}} and results insecurity and manageability concerns, because the OS loses the control overhow the device is used.We hope that the introduction of the fastcall space into the kernel-bypassarchitectures may bring the OS back into the picture, without adding anysignificant overhead.", "The concept of kernel bypass has become a first-class citizen indataplane {{cite:435ec5cacb922d31dfe3fde693833204ed12a9b8}}, {{cite:6a6b4c2d8b91fd1d909469bffc06f5abcbdb3a4e}}, {{cite:b98b9f0fe74a89bd6d3fca033c06df7c23a659f5}} and microkernel-based {{cite:783942ae06b93b352d771e1cea991d14b56f3f69}}, {{cite:5ee58e8cc3de51da2a0f7e2db0364b0e5d745eaf}} operating systems.In addition to passing the device under the control of a user process, theseoperating systems focus on convenient programming abstractions to reducedevelopment effort, improve portability, and enable resource sharing.We see fastcalls as an instrument for replacing kernel bypass and for enablinglow-overhead kernel interposition with the purpose of passing the device to theuser application in controllable manner.", "Being the most popular, the dataplane OS is not the only architecture trying torevamp system calls. Singularity {{cite:34763415fd11882bfb877ca4b80d4383d883c0d3}} and RedLeaf {{cite:22b237b758732efbdba5587dd7d1e445e768d3c6}} avoid CPU-enforcedaddress space isolation by relying on language guarantees and runtime checks.Lee et al. employ call-gates to implement a new privileged user level forprocessing sensitive data using x86 privilege rings {{cite:957f64a85e3420abcb95807c6e934dc5a53cb7a3}},whereas {{cite:33cbe52dc68d9442a2c6ce9ee9d5001c782e6c57}} employ a new low-latency protection domain switchingmechanism to remove the kernel almost entirely {{cite:33cbe52dc68d9442a2c6ce9ee9d5001c782e6c57}}.Unfortunately, the latter mechanism comes with probabilistic security guarantees." ]
[]
RELAX: Representation Learning Explainability
Despite the significant improvements that representation learning viaself-supervision has led to when learning from unlabeled data, no methods existthat explain what influences the learned representation. We address this needthrough our proposed approach, RELAX, which is the first approach forattribution-based explanations of representations. Our approach can also modelthe uncertainty in its explanations, which is essential to produce trustworthyexplanations. RELAX explains representations by measuring similarities in therepresentation space between an input and masked out versions of itself,providing intuitive explanations and significantly outperforming thegradient-based baseline. We provide theoretical interpretations of RELAX andconduct a novel analysis of feature extractors trained using supervised andunsupervised learning, providing insights into different learning strategies.Finally, we illustrate the usability of RELAX in multi-view clustering andhighlight that incorporating uncertainty can be essential for providinglow-complexity explanations, taking a crucial step towards explainingrepresentations.
[ "In this section, we present the previous works that are most closely related to our work. The focus will be on attribution-based explanations where each input feature is assigned an importance. Therefore, we will not consider other explainability methods such as example-based explanations {{cite:f9352bc6ee1c9f7c2f2c3fbd3d593d96c4f66dfb}}, {{cite:3ff15357a78d2dbabf0357266b9f9ac291b3a3b9}} or global explanations {{cite:7ad677f40d1c662ac6ff0acd04c1fa51ab77dbca}}.", "Occlusion-based explainability. There exist a number of occlusion-based explainability methods. Systematically occluding an image with a gray rectangle and then measuring the change in activations could be used to provide coarse explanations for CNNs {{cite:ac4bd63d971d44faae99221b7e6fa8df67965006}}. A more sophisticated occlusion approach can improve explanations, in which smooth masks are generated and accumulated to produce explanations for the prediction of a model {{cite:5b47aee5796c2fbb0d9d1ca2e61601191fbaac73}}. A slightly different approach is meaningful perturbations, where a spatial perturbation mask that maximally affects the model's output is optimized {{cite:eeed4ebd0b52e1c25cfbfa3ee3de0e89a544b6c0}}. A follow up work proposed extremal perturbations, where a perturbation can be considered extremal if it has maximal effect on the network's output among all perturbation of a given, fixed area {{cite:f3becd728d2728bc87ca53bedce6a6d179ae042f}}. On a different note, an information theoretic approach to XAI has been proposed, where noise is injected in order to measure the information in different regions of the input {{cite:35c25fb96fb2636c66ed0cf72d3789cfd6713c78}}. Similarly, {{cite:9baaca6d57b48385d77846360f00040428eb4ecd}} introduced a rate-distortion perspective to explainability. However, none of these methods are capable of providing explanations for representations.", "Explaining representations. Attribution-based explainability methods are extensively used to explain specific sample predictions {{cite:d5f9251fd198e67cc5a2f2bd47e5e63d342c4db7}}, {{cite:5b47aee5796c2fbb0d9d1ca2e61601191fbaac73}}, {{cite:35c25fb96fb2636c66ed0cf72d3789cfd6713c78}}. However, to the best of our knowledge, no attribution-based explainability method exists for explaining representations.While initial attempts have been made to explain representations such as the Concept Activation Vectors {{cite:c908b6953092345f985b0b5f6991c8f2e313d647}}, which uses directional derivatives to quantify the model prediction's sensitivity, these explanations only relate the representations to high-level concepts and require label information. Similarly, network dissection has been proposed to interpret representations {{cite:642dd10f98dc67c3a62a70321f9163359d51dc94}}, but requires predefined concepts and label information without indicating the importance of individual pixels. Another approach mapped semantic concepts to vectorial embedding {{cite:2fba53f62b7a3e8239d34449d4e51188172aff7d}}, but requires segmentation masks that are not available in the unsupervised setting. Lastly, representations have also been investigated from learnability and describability perspectives {{cite:75665f8698050ece63ce4d80ea9551fae56c11ce}}, but this was achieved through human-annotators that are typically not available.", "Uncertainty in explainability. Modeling uncertainty in explainability is a rapidly evolving research topic that is receiving an increasing amount of attention. One of the earliest works proposed to use Monte Carlo Dropout {{cite:5a5397f2b1874b49ec4263a5bd60c185ae45eb4d}} in order to estimate the uncertainty in gradient-based explanations {{cite:f2c0d5c3b1cd04a2beb2ebd93726a7e31df97e06}}, {{cite:b0ffb0ecdfd8d746973772a60fb6efba456cc8e7}}, which was later followed by a similar approach that was based on Layer-wise Relevance Propagation {{cite:1a18840434bd607919c7de95eca52ac35e6665b4}}. Uncertainties inherent in the widely used LIME method {{cite:823742d3b9e89dae4d0e4721dd3992da9f4d8b34}} have been explored {{cite:b1ae270221de790b26cb46c13071343d5f125823}}, and ensemble-based approaches, where uncertainty estimates are obtained by taking the standard deviation across the ensemble, have also been proposed {{cite:13fe676149a6a095ecb6542617fd658b0640cea0}}. Nevertheless, none of these approaches were designed for quantifying the uncertainty in explanations of representations, as they either require label information or are computationally impractical." ]
[]
GPU optimization of the 3D Scale-invariant Feature Transform Algorithm and a Novel BRIEF-inspired 3D Fast Descriptor
This work details a highly efficient implementation of the 3D scale-invariantfeature transform (SIFT) algorithm, for the purpose of machine learning fromlarge sets of volumetric medical image data. The primary operations of the 3DSIFT code are implemented on a graphics processing unit (GPU), includingconvolution, sub-sampling, and 4D peak detection from scale-space pyramids. Theperformance improvements are quantified in keypoint detection andimage-to-image matching experiments, using 3D MRI human brain volumes ofdifferent people. Computationally efficient 3D keypoint descriptors areproposed based on the Binary Robust Independent Elementary Feature (BRIEF)code, including a novel descriptor we call Ranked Robust Independent ElementaryFeatures (RRIEF), and compared to the original 3D SIFT-Rankmethod\citep{toews2013efficient}. The GPU implementation affords a speedup ofapproximately 7X beyond an optimised CPU implementation, where computation timeis reduced from 1.4 seconds to 0.2 seconds for 3D volumes of size (145, 174,145) voxels with approximately 3000 keypoints. Notable speedups include theconvolution operation (20X), 4D peak detection (3X), sub-sampling (3X), anddifference-of-Gaussian pyramid construction (2X). Efficient descriptors offer aspeedup of 2X and a memory savings of 6X compared to standard SIFT-Rankdescriptors, at a cost of reduced numbers of keypoint correspondences,revealing a trade-off between computational efficiency and algorithmicperformance. The speedups gained by our implementation will allow for a moreefficient analysis on larger data sets. Our optimized GPU implementation of the3D SIFT-Rank extractor is available athttps://github.com/CarluerJB/3D_SIFT_CUDA.
[ "This related work section describes the context of keypoint-based 3D medical image analysis, including convolutional neural networks and local invariant keypoint analysis. Readers interested solely in our 3D GPU-SIFT model may continue directly to the following section without loss of information.", "Image-based machine learning can be generally described in the framework of artificial neural networks, where technological advancements typically involve reducing the complexity of neural network training the large parameter space and increasing the ability to generalise from smaller training data sets. Artificial neural networks were developed to model and simulate biological neural network processing, i.e. the perceptron model of Rosenblatt where the output of a neuron is a weighted linear combination of the inputs {{cite:b82d16e32733732817f33bcc51d801e2b7e1f5d6}}. 'Deep' networks emerged shortly thereafter with the multi-layer perceptron (MLP) {{cite:9937369578403c9556bcc6b3deccdf0fc9be628a}}, where perceptrons were organized into multiple, feed-forward layers evaluated in a sequential fashion. A persistent theme has been the incorporation of mathematical invariance, allowing networks to train from fewer data points, or equivalently to generalize to unseen data. LeCun developed the translation-invariant convolutional neural network (CNN) architecture in the 1980s {{cite:c458b5854f44e332730847bef3e3ce7edc34cb58}}, which greatly reduced the memory requirements of the weights from {{formula:8d18f07f-3faf-4e4a-9303-bcc20311db7a}} in the number {{formula:9a28b66f-cdb0-4f93-b91a-29a5a9520d84}} of pixels for fully-connected MLP network layers to {{formula:10bf0702-8e85-4b21-8d7b-aabc97a567f6}} for sets of weights computed locally and shared across the image in a manner invariant to image translation, i.e. convolution filters. While highly effective, CNN training via the backpropagation algorithm remained too computationally complex for practical applications from sequential CPU-based computers until the development of highly parallel GPU-based convolution allowed training of deep CNNs from 100000s of images {{cite:2534c78b5bfb3ce3805990824576cbc0cbe6ce85}}, e.g. the ImageNet dataset consisting of 1000 objects with 1000 training examples per category).", "Keypoint algorithms were developed to focus on small sets of informative image points rather than entire images. Keypoints are detected via convolutional filters with specific mathematical forms, guaranteeing invariance to input image translation {{cite:60bc957692f9820df35eaa775a50dbd01fb751db}}, scaling {{cite:867400e41e2d68978ecd62b961e5d18fa547eed8}}, similarity {{cite:9a81501005ef5ccb74c11b6d6702cb3916ff108c}} and affine deformations {{cite:c76ad67bb0b517a9de7dc1d00f48b2b0634bead5}}. Keypoint methods remained the defacto standard for image-based learning until the development of programmable graphics processing units (GPUs), e.g. the Compute Unified Device Architecture (CUDA) development system, that could be used to train full image-based CNNs via massive parallelization of the backpropagation learning algorithm {{cite:2534c78b5bfb3ce3805990824576cbc0cbe6ce85}}. This article focuses on the SIFT algorithm designed for keypoint extraction by David Lowe in 1999 {{cite:9a81501005ef5ccb74c11b6d6702cb3916ff108c}}. The backbone of the SIFT algorithm is the Gaussian scale-space {{cite:fea61913e7a39b0fc71f19a0f29374f306d33baf}} generated via recursive Gaussian convolution filtering, it can be generated efficiently via separable and even uniform 1D filters {{cite:e32ccb740ab1d6defe9d8ef6654558144a215912}}. Advantages of the SIFT algorithm include the fact that keypoints are identified in a manner invariant to image resolution, object pose, or intensity variations, no training procedure or data are required, Gaussian and Gaussian derivative filters are rotationally symmetric and uniformly sampled and unbiased by the specific training data used. For these reasons, the SIFT keypoint algorithm and descriptor remains and efficient, competitive solution in contexts with few training examples, i.e. matching images of the same specific 3D objects {{cite:f2d172edb3810705bc61735a436033af067ca574}} or scenes {{cite:b70ce51fd8d6708f6385b7b71ca479bb4df3e53f}}. The functioning of the SIFT algorithm is analogous to aspects of visual processing within the mammalian vision system, including retinal center-surround processing in the lateral geniculate nucleus and oriented gradient operators organised into hypercolumns {{cite:415b71af7a15bb7d546d0dc5dcba6fe16268503e}}. The scale-space derived from Gaussian convolution {{formula:4c36247c-5029-4746-8b57-352a9a3df08f}} representing the process of isotropic diffusion of particles (ex. Brownian motion ) or heat. The Laplacian-of-Gaussian {{formula:018ed293-d342-4eca-9b20-908dc961948d}} is a scale-normalized operator analogous to the Laplacian operator forming the kinetic energy component of the Hamiltonian, e.g. as found in the Schrodinger equation.", "The SIFT algorithm has been generalized to 3D volumetric image data in a variety of applications including video processing {{cite:7b44231fc78e635186d19d0d6e9a99a829f16f15}}, 3D object detection {{cite:d95023635b4c0111092533c9ca813642ea04f24a}}, and medical image analysis {{cite:a0ccdc916e116edf0b24ce89c28777816080b78f}}, {{cite:dbb5237dee866224eaf58a5ab5838f65a4bbc281}}, {{cite:d86dcf5daafaa2afb7abbfd299f45381f4c3ce36}}, {{cite:db43bcb5bd5cf79f86a4072060c567e615066143}}. Our work here is based on the 3D SIFT-Rank approach {{cite:d86dcf5daafaa2afb7abbfd299f45381f4c3ce36}}, which is unique in the way local keypoint orientation and descriptors are computed. Keypoint orientations may be parameterized via a suitable representation such as quaternions or 3x3 rotation matrices, are generally determined from dominant gradients of the scale-space {{formula:b8c6f4cd-ffb2-494c-b432-1ef922ac0db7}} in a scale-normalized neighborhood about the keypoint. The 3D SIFT-Rank method identifies dominant peaks in a discrete spherical histogram of gradient, rather than solid angle histograms {{cite:7b44231fc78e635186d19d0d6e9a99a829f16f15}}, {{cite:dbb5237dee866224eaf58a5ab5838f65a4bbc281}}, partial 3D orientation information {{cite:a0ccdc916e116edf0b24ce89c28777816080b78f}} or principal components of the local gradient{{cite:db43bcb5bd5cf79f86a4072060c567e615066143}}. This allows identification multiple dominant orientations (3x3 rotation matrices) at each keypoint {{formula:c46fd5d2-a74b-417c-88aa-60071bf133bb}} , leading to multiple descriptors per keypoint and providing robustness to noise, rather than single orientations per keypoint{{cite:db43bcb5bd5cf79f86a4072060c567e615066143}}. Descriptors generally encode the scale-space gradient {{formula:8dec43d2-daa1-43be-97d8-f4b3d637ed72}} in neighborhood about the keypoint, following reorientation. The 3D SIFT-Rank method adopts a compact 64-element gradient orientation descriptor, where the local orientation space is sampled according to {{formula:6ad4c1df-f2bc-4f69-a122-81af74fe0e6c}} spatial bins and 8 orientation bins. Other approaches adopt descriptors that are orders of magnitude larger, e.g. 768-elements from {{formula:cc217053-8317-4af1-9ed8-b6dda57ebc47}} spatial bins x 12 orientation bins, leading to similar image matching performance at a much greater memory footprint {{cite:db43bcb5bd5cf79f86a4072060c567e615066143}}. Finally, the SIFT-Rank descriptor is normalized by ranking {{cite:344cf34d93e6ee7ac5d699fe38dfcd1b72b3cf44}}, offering invariance to monotonic variations in image gradient.", "Our GPU-optimized 3D SIFT-CNN method was first described and used in the context of brain MRI analysis {{cite:7db9c07b41d65e86b27ffdd9d734700e27b1f623}}. The original 3D SIFT-Rank method has been used in a variety of keypoint applications analyzing 3D images of the human body. These include modeling the development of the infant human brain over time {{cite:cdb414f121a2e9b8ec7d175827755936d7d5f378}}, keypoint matching between different image modalities having multi-modal, non-linear intensity relationships {{cite:6bf155ad1f2396e35a348e0455368b55f1f34868}}, robust alignment of lung scans {{cite:e11dd9d9a19b2aa05327c9c1d3fcb2363f1fa498}}, kernel density formulation for efficient memory-based indexing from large image datasets {{cite:18a1cb1e34023b19972c6097f0897e5f55f6670e}}, efficient whole-body medical image segmentation via keypoint matching and label transfer {{cite:18945f2fd33143c9a8b3d2d07947eb4e4526c5c4}}, {{cite:96c1055dd25a739459f8756a897a5863065749d2}}, alignment of 4D cardiac ultrasound sequences {{cite:6bdbe24c469fcd7c08998c807380d271146d4801}}, alignment of 3D ultrasound volumes for panoramic stitching {{cite:f2853cb6cc7758580c9101b1697486e3118f5e60}}, identifying family members from brain MRI {{cite:66b77fdd63b9657f1b892c697de55c347eeab53d}}, and large-scale population studies using multiple neurological MRI modalities  {{cite:586fd35f66c12f097d8e21677f7ae737ae9e3fc0}}. The 3D SIFT-Rank method was also used for robust image alignment in the context of image-guided neurosurgery {{cite:3a18745fbfb605911d60eb6b70a83b41740e6e86}}, including non-rigid registration {{cite:59d94e6c2eb3f25373ae3774e397c5fc49bfc809}} based on regularization of deformation fields via thin-plane splines and finite element models {{cite:eb4f2a2b5dcd00d399d8fae82b49ecb2385d8d27}}, {{cite:18e19d9bde21e5067383998845245f74d0f8f946}}, and robust filtering of image-to-image correspondences using the variogram {{cite:305e1d2c9b01d5be3ec68b3617c39ba295e1c0cf}}. Alternative keypoint descriptors have been proposed based on vector data, e.g. diffusion MRI histograms of the human brain {{cite:ec53bfe8557dddb90c1f59bf0ee55d7b82ae761c}}. The Jaccard distance between feature sets was introduced to characterize the bag-of-feature manifold, to automatically flag errors in large public MRI datasets {{cite:05aab4d591fe2b4e110f213c3bb224d0357a692c}}, {{cite:2b8d29ac15476f671623f8ec0c01d839920b95cd}}, and most recently the first approach to identify family members from brain MRI {{cite:2a51aad01f5ee1e00ef8a185b556bfd633678e99}}.", "In terms of keypoint descriptors, a number of 2D descriptors have been proposed, generally based on local image gradient orientation information, including gradient orientation {{cite:9a81501005ef5ccb74c11b6d6702cb3916ff108c}}, ORB {{cite:206a28e0ff5c1e2771fc17a3986c8fdb6e70b81d}}, BRIEF {{cite:a06b5b80715e3e9958d6b832b1fb0ec56f07d22c}}, typically these have not been extended to 3D. Rank-order normalization has been shown to improve upon standard 2D gradient descriptors {{cite:344cf34d93e6ee7ac5d699fe38dfcd1b72b3cf44}}. Deep learning has been used to extract keypoints and descriptors, learned invariant feature transform (LIFT) {{cite:1e41f2c52edb9d7a9ac13e6cf17b8c58d34f2fbf}}, DISK {{cite:20995d2bc786277a0c07a338b8cba0d6383bebbc}}, LF-Net {{cite:c5ebb483007794afc79785ec9392e3e061feb03d}}, SuperPoint {{cite:3a1b581db181e7a6e77d1de668df6078804e83bc}}, Hardnet  {{cite:b70ce51fd8d6708f6385b7b71ca479bb4df3e53f}}. Surprisingly, variants of the original SIFT histogram descriptor including SIFT-Rank {{cite:c23910d266564f1fceebcd85ba832cdfc971aed2}}, DSP-SIFT {{cite:b465a0c2b0c3d05869ecb1795898a23892888519}} or RootSIFT {{cite:f83b8c598fcf6f13e0e0b3f6769eca12309409df}} are still competitive in terms of keypoint matching performance {{cite:a4a40b7f870e1eb8c7be09fe51b622255d6f8785}}, {{cite:47c06740628b6a8aca3b3bb4fb35bd5490218621}}, particularly for non-planar objects and image retrieval {{cite:f2d172edb3810705bc61735a436033af067ca574}}. SIFT keypoint extraction is based solely on fundamental, symmetric and uniform mathematical operators, e.g. the Gaussian, Laplacian, and uniformly sampled gradient operators. The resulting keypoints thus represent a class of highly informative patterns that are invariant to image scaling and rotation in addition to translation, and may be identified in any context with no explicit training procedure and nor bias towards specific training datasets used.", "In this paper, we describe an efficient implementation of the 3D SIFT-Rank algorithm via GPU parallelization of the operations required to generate the Gaussian scale-space. In particular, we target the Gaussian convolution, difference of Gaussians, sub-sampling and 4D extraction. This work was the first published GPU implementation of the 3D SIFT algorithm, first validated in the context of brain image indexing {{cite:7db9c07b41d65e86b27ffdd9d734700e27b1f623}}. Previously, GPU processing was used to speed up the SIFT algorithm for 2D image data {{cite:ea65d91203fc3c88ef869f27f39afedc224100e9}}, in real-time {{cite:3bc79437f7fb3596fbb690c00f1274eba8f27e02}} and video processing contexts {{cite:fbff91d69cb01fb094246cfd7e87491b9699b1dc}}, and high-dimensional feature matching {{cite:1d6b009f916ba662cec233ddc1c6842d91042015}} applications, and for use on mobile devices {{cite:4c7671cd5484c9016ce6160e1f9e7759a0a9ad51}}. We here provide a detailed descriptions of the implementation, justifying our parameter choices based on the CUDA API, and describing our optimisation strategy and its effect on speed. We also describe and test computationally efficient 3D descriptors including the Binary Robust Independent Elementary Features (BRIEF) approach of Calonder et al. {{cite:a06b5b80715e3e9958d6b832b1fb0ec56f07d22c}}, and a propose a novel descriptor based on BRIEF that we call RRIEF (Ranked Robust Independent Elementary Features). These descriptors are compared to the 3D SIFT-Rank descriptor of Toews and Wells {{cite:344cf34d93e6ee7ac5d699fe38dfcd1b72b3cf44}}, {{cite:d86dcf5daafaa2afb7abbfd299f45381f4c3ce36}} in keypoint matching experiments of magnetic resonance image (MRI)s of the human brain." ]
[]
HVTR: Hybrid Volumetric-Textural Rendering for Human Avatars
We propose a novel neural rendering pipeline, Hybrid Volumetric-TexturalRendering (HVTR), which synthesizes virtual human avatars from arbitrary posesefficiently and at high quality. First, we learn to encode articulated humanmotions on a dense UV manifold of the human body surface. To handle complicatedmotions (e.g., self-occlusions), we then leverage the encoded information onthe UV manifold to construct a 3D volumetric representation based on a dynamicpose-conditioned neural radiance field. While this allows us to represent 3Dgeometry with changing topology, volumetric rendering is computationally heavy.Hence we employ only a rough volumetric representation using a pose-conditioneddownsampled neural radiance field (PD-NeRF), which we can render efficiently atlow resolutions. In addition, we learn 2D textural features that are fused withrendered volumetric features in image space. The key advantage of our approachis that we can then convert the fused features into a high-resolution,high-quality avatar by a fast GAN-based textural renderer. We demonstrate thathybrid rendering enables HVTR to handle complicated motions, renderhigh-quality avatars under user-controlled poses/shapes and even looseclothing, and most importantly, be efficient at inference time. Ourexperimental results also demonstrate state-of-the-art quantitative results.
[ "Neural Scene Representations. Instead of explicitly modeling geometry, many neural rendering methods {{cite:d9d785d775b1a7b01d620ce7f93020afeb936bf2}}, {{cite:4e424574f07f05fa8498932293c9527f453631ec}}, {{cite:827e37d387bbfc0f4f9caff8d1e611231a2ee3e9}}, {{cite:3481715a65a6ac0a4be04bb7490c25f549eafd32}} propose to learn implicit representations of scenes, such as DeepVoxels {{cite:d9d785d775b1a7b01d620ce7f93020afeb936bf2}}, Neural Volumes {{cite:cd56f708fd446e48ad650bd50c4317df339abbf0}} SRNs {{cite:4e424574f07f05fa8498932293c9527f453631ec}}, or NeRF {{cite:827e37d387bbfc0f4f9caff8d1e611231a2ee3e9}}. In contrast to these static representations, we learn a dynamic radiance field on the UV manifold of human surfaces to model articulated human bodies.", "Shape Representations of Humans. To capture detailed deformations of human bodies, most recent papers utilize implicit functions {{cite:27f415d99f6bb10334e21d96cf7e282e0e4cef3e}}, {{cite:dbccb4539120df482c81ee6ccd5931005e565569}}, {{cite:9f4c6cb8fa77a36b4c246f5edcc76e197cf46adb}}, {{cite:e4f6234543081a0c066656530c3d0e572af1743a}}, {{cite:8ae2800e138b03d1071f469ead863f9bd2f37d44}}, {{cite:1f53474124d8b0c2d3c5f74a765d30bdc9c8ef06}}, {{cite:1c972a72de1aa27050eeb2f0e38dc144f3f483e7}}, {{cite:b9aac3f0dc8206867b21b1b07dcad73a6b8b566d}}, {{cite:07a56331c4c5dac92c68fb886e06a0112ab62342}}, {{cite:c1c25c059e3d48cdee2c12c83a75721eaf9494de}}, {{cite:acdcac5082186a6f99b6634bba5dde6bc5f9cc1c}}, {{cite:079a01bdc794f11d3a1d3b059b48ef76f655ebaa}}, {{cite:c855d5396bfac1eac7d7c75d685d53b71a2be04a}}, {{cite:174569c28745dd8cc16b27dbe877e2f92f272b91}}, {{cite:46d5daf07fdcebef6a21308fc57542080cc63218}} or point clouds {{cite:ae4a64c56e3f4def3c94b621a35d89885c0ce48c}}, {{cite:7f9d7f21e6bd1d9762fa7769bc3e69446edf2383}} due to their topological flexibility. These methods aim at learning geometry from 3D datasets, whereas we synthesize human images of novel poses only from 2D RGB training images.", "Rendering Humans by Neural Image Translation (NIT). Some existing approaches render human avatars by neural image translation, i.e. they map the body pose given in the form of renderings of a skeleton {{cite:496946f93843449151e52cd3c9a7a4c36c914db4}}, {{cite:4998bc636b37abc7f8bd917d68549bf498f23909}}, {{cite:a080242d87c54d11dbe224d09e8a6680e6d311d8}}, {{cite:e262e135dafb269b5fb9fa539ae2f82d9f63d647}}, {{cite:763f25d3bf82af4b959694c684749a645dbe2e3a}}, {{cite:617469b689d149e2cbaec705c83a2eb5d47d47f1}}, dense mesh {{cite:4d9f23a875c20095fea2e439788e0f4b844939da}}, {{cite:6141f07f0710da035d87a25debf2b16b221ab9b9}}, {{cite:4f32345f4d3b171b289fff86dbeaffdffaefae3c}}, {{cite:4711f59ea6db8f1c7bc2bdecef7869ea96b2e28a}}, {{cite:bea82179e8fc4c7594175e7760790720b8dcd03c}}, {{cite:8b57be905414f11cc3325ef9325c213aac584946}} or joint position heatmaps {{cite:63bc524533dab493392eedd827e5ff8f21de4bf0}}, {{cite:902f1dc8a29cea41ebfe22478ee1765897ddf47e}}, {{cite:9952a2a7d4faa21ab3a649de1216af0405f70507}}, to real images. As summarized in Tab. REF , EDN {{cite:496946f93843449151e52cd3c9a7a4c36c914db4}} and vid2vid {{cite:617469b689d149e2cbaec705c83a2eb5d47d47f1}} utilize GAN {{cite:c0f9b9150f55cc45ac1d1c18e7a693e816ef94c9}} networks to learn a mapping from 2D poses to human images. To improve temporal stability and learn a better mapping, “2D Plus” methods {{cite:3481715a65a6ac0a4be04bb7490c25f549eafd32}}, {{cite:0c2098e86154b6c7afc1ec41a8c58141cfff9ae3}}, {{cite:deb040bf826ba90de8ff9a0346951e8ef92081f6}} are conditioned on a coarse mesh (SMPL {{cite:a497dffd96ba9fd09cb54e5262be9da0a913bc00}}), and take as input additional geometry features, such as DNR (UV mapped features) {{cite:3481715a65a6ac0a4be04bb7490c25f549eafd32}}, SMPLpix (+ depth map) {{cite:0c2098e86154b6c7afc1ec41a8c58141cfff9ae3}}, and ANR (UV + normal map) {{cite:306ef314072a4de415eb8f0d2ead81b489039ddf}}. A 2D convolutional network is often utilized for both shape completion and appearance synthesis in one stage {{cite:3481715a65a6ac0a4be04bb7490c25f549eafd32}}, {{cite:0c2098e86154b6c7afc1ec41a8c58141cfff9ae3}}. However, {{cite:3481715a65a6ac0a4be04bb7490c25f549eafd32}}, {{cite:0c2098e86154b6c7afc1ec41a8c58141cfff9ae3}}, {{cite:306ef314072a4de415eb8f0d2ead81b489039ddf}}, {{cite:a9c2cab7af43ef315b49341be4ff34c4e0680eff}} do not reconstruct geometry explicitly and cannot handle self-occlusions effectively. In contrast, our rendering is conditioned on a learned 3D volumetric representation using a two-stage approach (see Fig. REF ). We show that our learned representation handles occlusions more effectively than other techniques {{cite:3481715a65a6ac0a4be04bb7490c25f549eafd32}}, {{cite:0c2098e86154b6c7afc1ec41a8c58141cfff9ae3}}, {{cite:306ef314072a4de415eb8f0d2ead81b489039ddf}}, {{cite:a9c2cab7af43ef315b49341be4ff34c4e0680eff}} that just take geometry priors (e.g., UV, depth or normal maps) from a coarse mesh as input (see Fig. REF , REF ).", "Rendering Humans by Volume Rendering (VolR). For stable view synthesis, recent papers {{cite:041ea489e0dfb3fa628f155a5dc47f343ae591bd}}, {{cite:b537be96a081c86ce3405d65ff63318ae5c078d6}}, {{cite:d722168c4d61f32aa734b27534691b07050ad391}}, {{cite:f217ea8b724dfe2bad6219865c761d18228f3e37}}, {{cite:4bb44a0e1e6872f9e917e2ced36b50f30acd95ad}}, {{cite:8cc72b3af72ff040cc2b29bded9a0be5d6b4dad7}} propose to unify geometry reconstruction with view synthesis by volume rendering, which, however, is computationally heavy. In addition, the appearance synthesis (e.g., Neural Body {{cite:041ea489e0dfb3fa628f155a5dc47f343ae591bd}}) largely relies on the quality of geometry reconstruction, which is very challenging for dynamic humans, and imperfect geometry reconstruction will lead to blurry images (Fig. REF ). Furthermore, due to the difficulties of reconstructing geometry for loose clothing, most animatable NeRF methods (e.g., state-of-the-art Neural Actor {{cite:041ea489e0dfb3fa628f155a5dc47f343ae591bd}}) cannot handle skirts. In contrast, our method utilizes a GAN to render high frequency details based on a downsampled radiance field, which makes our method more robust to geometry inaccuracies and fast at inference time. We can also render skirts (Fig. REF ). A comparison of ours, NIT, and VolR is shown in Fig. REF .", "Ours is distinguished from {{cite:e353f9b1a530b2476ee6630eee5fc37448a39d02}} by rendering dynamic humans at high resolutions, and conditioning our rendering framework on the UV manifold of human body surfaces.{{figure:d9b52a68-9442-4bc7-a593-bdcfa449d015}}" ]
[]
Stable Conformal Prediction Sets
When one observes a sequence of variables $(x_1, y_1), ..., (x_n, y_n)$,conformal prediction is a methodology that allows to estimate a confidence setfor $y_{n+1}$ given $x_{n+1}$ by merely assuming that the distribution of thedata is exchangeable. While appealing, the computation of such set turns out tobe infeasible in general, e.g. when the unknown variable $y_{n+1}$ iscontinuous. In this paper, we combine conformal prediction techniques withalgorithmic stability bounds to derive a prediction set computable with asingle model fit. We perform some numerical experiments that illustrate thetightness of our estimation when the sample size is sufficiently large.
[ "For regression problems where {{formula:b4c9ff63-d946-4f17-8683-0713479b5214}} lies in a subset of {{formula:5418f939-df64-4413-96a7-adfd3c1baffb}} , obtaining the conformal set {{formula:9b26f3d5-9f8c-4ab4-8552-e66f7d1f9326}} in eq:exactconformalset is computationally challenging. It requires re-fitting the prediction model {{formula:ad3086f4-1f6c-4291-abf0-4a918087e20c}} for infinitely many candidates {{formula:36597865-e9c8-4f63-90a1-e7de581df1b7}} in order to compute a conformity measure such as {{formula:272dc58d-89fa-4a8e-80fc-010fed51076b}} . Except for few examples, the computation of conformal prediction set is infeasible in general.", "In Ridge regression, for any {{formula:ae2282ea-d763-4115-8af4-f4b936a120bf}} in {{formula:16a0ee0a-6972-47ac-8774-0cd4b8de6799}} , {{formula:6d89f2ab-310e-421b-b4dd-ee167c4ea02f}} is a linear function of {{formula:9b47bf1c-b234-409d-b8f1-5a96e61ca85d}} , implying that {{formula:6b0b36fa-53aa-4a56-a152-65e0355d81c4}} is piecewise linear. Exploiting this fact, an exact conformal set {{formula:54319abd-daae-49a0-9e94-6550b5e12011}} for Ridge regression was efficiently constructed in {{cite:f4d8cd3a9c7007fededa8596d3fcafd27b4c104f}}.Similarly, using the piecewise linearity sparsity level of the Lasso path provided by the Lars algorithm {{cite:c68062fb21629c8ffea0779dbee6751d004587f1}}, {{cite:91545b48aaffae864abfe51d6248eabd9ac3ff4f}} builds a sequence of conformal sets for the Lasso associated to the transition points of the Lars with the observed data {{formula:a1fdc7f6-3178-4488-8fe6-53d544bc8a3c}} . Nevertheless, such procedure breaks the proof technique for the coverage guarantee as the exchangeability of the sequence {{formula:82cc2732-155d-4b30-a78e-072f794b2e87}} is not necessarily maintained. However, a slight adaptation can fix the previous problem. Indeed using the piecewise linearity in {{formula:01355d8e-4c86-4d18-872a-c0ae6c5f3742}} of the Lasso solution, {{cite:7c814f3587d87f4eb86f34cd2bf68e64ef4fd5a3}} proposed a piecewise linear homotopy under mild assumptions, when a single input sample point is perturbed. This finally allows to compute the whole solution path {{formula:d278b7d4-521c-4dae-bdb5-9989945c7909}} and successfully provides a conformal set for the Lasso and Elastic Net. Later, {{cite:fa4d1379e6b92a72c1895e1caff247c46a1be146}} proposed an adaptation of approximate the solution path {{cite:cfb78ec3de9370ea38642598661a0df64e9fec26}}, by carefully discretizing the set of candidate restricted into a compact {{formula:37173c05-d099-4d6b-a572-8419d3786b6a}} . Assuming the optimization problem in eq:modeloptimization is convex and that the loss function is smooth, this leads to a computational complexity of {{formula:bf7d341a-d0a4-4e16-90a1-c2e7dbb583a8}} where {{formula:5717ae8b-3bd4-46af-b8bc-cbc77bbab916}} is a prescribed optimization error. A different road is to assume the conformal set {{formula:4dc2ea3c-cfe3-4f76-a3b8-ef3f7d9460ff}} in eq:exactconformalset itself is a bounded interval. As such, its endpoints can be estimated by approximating the roots of the function {{formula:2487d956-1544-401b-a8de-6a0fb82cb9ba}} . A direct bisection search can then compute a conformal set with a complexity of {{formula:05bb1645-e6dc-4e6a-8c1a-8ac15e2a043d}} {{cite:3f7d0bebcfa80547e683b17d350252f194b6859f}} where {{formula:fbe14a4f-cda6-4cfb-be68-e9c4d38612e4}} is the tolerance error to exact root.", "In this paper, we actually show that a single model fit is enough to tightly approximate the conformal set when the underlying model fitting is stable." ]
[]
SSDNet: State Space Decomposition Neural Network for Time Series Forecasting
In this paper, we present SSDNet, a novel deep learning approach for timeseries forecasting. SSDNet combines the Transformer architecture with statespace models to provide probabilistic and interpretable forecasts, includingtrend and seasonality components and previous time steps important for theprediction. The Transformer architecture is used to learn the temporal patternsand estimate the parameters of the state space model directly and efficiently,without the need for Kalman filters. We comprehensively evaluate theperformance of SSDNet on five data sets, showing that SSDNet is an effectivemethod in terms of accuracy and speed, outperforming state-of-the-art deeplearning and statistical methods, and able to provide meaningful trend andseasonality components.
[ "DeepSSM {{cite:5433f34520f3c4b70e87c234421fd98572137d26}} combines SSMs with Recurrent Neural Networks (RNNs). A RNN is used to generate the parameters of a linear Gaussian SSM for time series forecasting and Kalman filter is used to derive posterior knowledge.DeepSSM is considered interpretable because it can recover the SSM parameters and they can be inspected.The Deep Factor model DF-LDS {{cite:e1486de192746b26d6ec97a260af5c28abc94306}} is a variation of DeepSSM that can handle non-Gaussian observations and it also uses Kalman filters.", "Although Kalman filters have been successfully used in linear dynamic systems for decades, the need for covariance matrix inversions is computationally expensive and limits their applicability for processing large data sets {{cite:3d62cc8528f7239485783b0a345b5385e8cfb313}}, {{cite:b567dc9a9b43aef1e39d6c3bdf00cce92200dcc7}}.In contrast, Eleftheriadis et al. {{cite:922c2e49bc006d16b4c63db5be2da477d53d3d7c}} proposed Gaussian Process State Space Model (GPSSM) merging Gaussian process with a bi-directional RNN to approximate the posterior of a non-linear system. However, GPSSM has high complexity of inference ({{formula:bffa23f0-738e-411b-a6a0-c401dabcba43}} per time step) which is a disadvantage for forecasting multi-horizon large data sets.", "N-BEATS {{cite:68d41d48d36fd23d4f00c9afe8c09a211eeca09f}} is a novel deep neural architecture using backward and forward residual links and stacks of fully connected layers for univariate point forecasting.Each N-BEATS layer contains a number of blocks which produce partial forecasts; these forecasts are aggregated at stack level and then network level in hierarchical fashion. The final forecast is the sum of the partial forecasts of all blocks.N-BEATS can produce interpretable forecasting results without expert knowledge by employing a fixed form of block function to generate prediction with decomposition components.The interpretable version (N-BEATS-I) uses the deterministic polynomial trend modeland assumes a stationary trend with constant slope. However, the local trend of time series over a short period (one or a few days) could vary significantly and inconsistently - e.g. the solar power generation or electricity consumption could decrease suddenly due to temporary cloud coverage or irregular activities of users (see Fig. REF ). Hence, a stochastic model which assumes a nonstationary trend with varying slope would be more suitable for such cases {{cite:87f9d9e3cac04e91f978e5506b2f96bd525b2a60}} and this is what we use in SSDNet.", "In summary, compared to DeepSSM, the proposed SSDNet:i) employs the Transformer architecture to learn temporal patterns, and estimates the parameters of SSM and the probability term directly instead of using Kalman filters;ii) uses the SSM with fixed and non-trainable transition matrix at the decoder to generate decomposition results within the forecasting horizon, while DeepSSM uses a more flexible SSM along all time steps;iii) combines Mean Absolute Error (MAE) and Negative Log-Likelihood (NLL) together as loss function to achieve accurate point and probabilistic forecasting results simultaneously instead of using NLL only;iv) shows better interpretability by using a stochastic decomposition technique in the form of SSM with an innovation term to model nonlinear trend and seasonality components and attention mappings to show the importance of historical time steps for forecasting.Compared to N-BEATS, SSDNet can model trend with nonlinear slope, provide probabilistic forecasts and also better utilizes the covariates." ]
[]
LUC at ComMA-2021 Shared Task: Multilingual Gender Biased and Communal Language Identification without using linguistic features
This work aims to evaluate the ability that both probabilistic andstate-of-the-art vector space modeling (VSM) methods provide to well knownmachine learning algorithms to identify social network documents to beclassified as aggressive, gender biased or communally charged. To this end, anexploratory stage was performed first in order to find relevant settings totest, i.e. by using training and development samples, we trained multiplealgorithms using multiple vector space modeling and probabilistic methods anddiscarded the less informative configurations. These systems were submitted tothe competition of the ComMA@ICON'21 Workshop on Multilingual Gender Biased andCommunal Language Identification.
[ "There already exist software designed to identify aggression and cyberbullying in social medias, e.g. CyberPatrol. The main drawback of these systems is that they are based onkeyword filtering, which is a limitation because no statistical features of texts are taken into account.Further, these keyword filtering methods require manual maintenance.To overcome the limitations of keyword filtering systems, {{cite:33d42d946a2f661985d20185313cfed95fcadd81}} is one of the former attempts to detect cyberbullying by using statistical features: word frequency, analysis offeelings(use ofpronouns in the second person, insults, etc.) and context. {{cite:afae9c919f0e7d9bd8adac3aaaf1dbf148e8ea76}} built a system that candetect bullying elements in commentaries of YouTube videos. These were classified according to different representative categories (sexuality, intelligence, race and physical attributes). The classificationrevealed weaknesses and an increase in false positive cases. Researchers emphasized the importanceof using common sense to understand users’ goals, emotions, and relationships, thereby disambiguatingand contextualizing language.In {{cite:a8c54403ffaa5b0c198f99a7c08498d4d4dba06e}} the authors were also interested in a word search method based on a bagof words (BoW) system incorporating sentiment and contextual analysis. They build a decision tree thatpredicted intimidating messages with an accuracy rate of 0.93. The researchers also have developed theChatcoder software to detect malicious activities online {{cite:59cf34eb6c3f4b7c0a593bec2d3ff4209bacd56b}}.", "Another study tested a system that allows users of a website to control the messages postedon their web pages: it customized vocabulary filtering criteria using a machine learning method thatautomatically labeled the contents. This approach had limitations because it was unable to measurerelationships between terms beyond a certain semantic level {{cite:a4179d036953dd05a043efaedeef840d1d9a7247}}.{{cite:82c9cad26763f156d04dcbd6e82f3335b6100788}} provided a concrete method for detecting online harassment by measuring thescore of sent and received messages (and thus their degree of involvement in a conversation) using theHyper-link Induced Topic Research algorithm (HITS). The authors also proposed a graphical model thatidentifies the aggressors and their most active victims.Other studies have attempted to go further by seeking to take into account more specific characteristics.{{cite:a4179d036953dd05a043efaedeef840d1d9a7247}} tried to establish a system based on language features characterizing the author's genre of comments on MySpace. Their results revealed an improvement in the detection of bullyingwhen this information is taken into account.As we can see, recent work defines the means to respond to the cyberbullying phenomenon that is becoming more and more widespread as the use of the web does.", "The problem of identifying offensive and abusive language is a more difficult task than expected due to the prevalence of 5 factors, according to {{cite:f83fba3eb01cbc027c4cc1c2f98f8b652c8b0518}}, described below:", "The intentional obfuscation of words that lead to false positives.The difficulty in identifying racial slurs since depending on the target group, this can be offensive or flattering.The grammatical fluidity that leads to false negatives.The limit of sentences, that is, abusive language can be articulated in more than one sentence.The sarcasm, which is even difficult for a human to interpret, implies a lot of knowledge about the context of the message (geographical, historical, social, etc).", "Other aspects detected by {{cite:f83fba3eb01cbc027c4cc1c2f98f8b652c8b0518}} corresponds to the heterogeneity in the approach to the problem itself that causes too much noise and confusion, such as the fact of only addressing specific aspects, specific contexts, different definitions for certain terms and / or domain, and finally different sets of assessment.", "At present, the task of classifying text in \"agglutinating\" or \"morphologically rich\" languages, leaves aside classical preprocessing and is replaced by the use of deep neural networks and word embeddings, since they take into account the semantic distance of the words in context, which is very useful in categorization tasks, which is not the case with the classic bag of words methods. A clear example of this is the implementation of fastText for the Turkish language by {{cite:bb92cc5faf9c82bde4c407e63a3d1e7376d17b65}}." ]
[]
Automated Vision-Based Wellness Analysis for Elderly Care Centers
The growth in the aging population requires caregivers to improve bothefficiency and quality of healthcare. In this study, we develop an automatic,vision-based system for monitoring and analyzing the physical and mentalwell-being of senior citizens. Through collaboration with Haven of HopeChristian Service, we collect video recording data in the care center withsurveillance cameras. We then process and extract personalized facial,activity, and interaction features from the video data using deep neuralnetworks. This integrated health information systems can assist caregivers togain better insights into the seniors they are taking care of. These insights,including wellness metrics and long-term health patterns of senior citizens,can help caregivers update their caregiving strategies. We report the findingsof our analysis and evaluate the system quantitatively. We also summarizetechnical challenges and additional functionalities and technologies needed foroffering a comprehensive system.
[ "Smart healthcare systems have drawn increased research attention since the flourish of artificial intelligence and smart devices. However, most of the existing healthcare systems require wearable devices to monitor the activity which is intrusive and hence not widely accepted. Computer vision based solutions bring the opportunity of a non-intrusive system based upon stationary cameras that allow passive detection of important activities. Most of the vision-based works focuses on fall detection {{cite:6c18039b084a7f9987a47d92b932f83948bebdb2}}, {{cite:239b4acac0d294d91e4116e0d488f54b29e87ae3}}, {{cite:75e8adf8fa48c63c3cd8aedbfe6a0fb37dd6fc5e}}, {{cite:be16c9c77cd0e3597d337c7d6ec821af297d1686}}. While these models are effective for identifying critical acute conditions, they do not detect and analyze daily behaviors and their long-term patterns, which are of great importance for understanding elderly citizens.Prior works focusing on the long-term health monitoring {{cite:d5aaa891c5a025e93fa36f8d3b029012c5f040d1}}, {{cite:5d8c4c4ab1793d0ff2c73900b90e42104e3e5e59}}, focuses on using depth {{cite:d5aaa891c5a025e93fa36f8d3b029012c5f040d1}} and thermal {{cite:5d8c4c4ab1793d0ff2c73900b90e42104e3e5e59}} sensors instead of vision sensors. To the best of our knowledge, an automated non-intrusive vision-based system that is capable of activity detection and long-term health monitoring has not been proposed prior to our work.", "An automated vision-based healthcare system calls for a comprehensive detection and analysis of individual condition and the surrounding circumstance, which includes facial analysis, action analysis, interaction analysis. We will introduce research related to this three topics in following subsections." ]
[]
CGIBNet: Bandwidth-constrained Communication with Graph Information Bottleneck in Multi-Agent Reinforcement Learning
Communication is one of the core components for cooperative multi-agentreinforcement learning (MARL). The communication bandwidth, in many realapplications, is always subject to certain constraints. To improvecommunication efficiency, in this article, we propose to simultaneouslyoptimize whom to communicate with and what to communicate for each agent inMARL. By initiating the communication between agents with a directed completegraph, we propose a novel communication model, named Communicative GraphInformation Bottleneck Network (CGIBNet), to simultaneously compress the graphstructure and the node information with the graph information bottleneckprinciple. The graph structure compression is designed to cut the redundantedges for determining whom to communicate with. The node informationcompression aims to address the problem of what to communicate via learningcompact node representations. Moreover, CGIBNet is the first universal modulefor bandwidth-constrained communication, which can be applied to varioustraining frameworks (i.e., policy-based and value-based MARL frameworks) andcommunication modes (i.e., single-round and multi-round communication).Extensive experiments are conducted in Traffic Control and StarCraft IIenvironments. The results indicate that our method can achieve betterperformance in bandwidth-constrained settings compared with state-of-the-artalgorithms, especially for large-scale multi-agent tasks.
[ "MARL communication.A variety of works have been proposed to explore communication protocols in MARL, including message aggregation {{cite:854ac17d55823e48d46dd6a6354f5ff95b3a87c4}}, {{cite:365d1b79a317aa3d892b9957240250f8e7981f1b}}, {{cite:74df850a3e8665b59a1a8b23f4ce9464fce5ca64}}, memory-driven communication {{cite:9b078638647f7410d08615117a2d43c6394228cd}}, etc.To efficiently utilize finite communication resources, some recent MARL methods introduce various gating mechanisms to reduce communication channels between agents. e.g., IC3Net {{cite:d15a4c7edeb6f9c0a90f17efa1f2344e22fb637e}} models the gate by learning an extra actor, while G2A {{cite:d8e321f14c7872a460c9c4502bf3b2e3ebdd3d61}} achieves this goal through hard attention and combines with soft attention to improving its performance.However, these methods still need frequent communication.SchedNet {{cite:5c722e9f240899f8d1d928763a026bbce05a3ca8}} leverages a weight generator to explicitly restrict bandwidth occupancy, but this method requires each agent to always communicate with a predefined number of other agents even if the agent can make the optimal decision based on its own private observation. Also, This method is not suitable for value-based MARL since the generator is modeled as an actor.Another direction is to compress node message representations to save communication resources. e.g., NDQ {{cite:21c38c9d1d77f34a94cca9bc6db6aa0d346db69a}} and IMAC {{cite:e4cb562ad4c32dbea124f7c0d3bcbbeb07c53c7e}} introduce a specific regularizer based on information theory to achieve this goal, but these methods rely on fully connected communication, resulting in sub-optimal message representations and poor performance in some specific scenarios. e.g., target communication is needed {{cite:365d1b79a317aa3d892b9957240250f8e7981f1b}}.In this paper, we simultaneously schedule communication channels and compress node representations under a unified framework through the graph information bottleneck principle and overcome all their shortcomings.", "Information bottleneck. Information bottleneck (IB), originally proposed for signal processing, tries to find a short code of the input signal but preserves maximum information of the code {{cite:6c428c3cf71b5521d1d7b0a1bbde4fdfd83f0e9b}}. {{cite:c5b26add459deb7e19f323c5186d8efb9a7f69ff}} first introduces the IB into deep neural networks, then the IB is applied to various domains {{cite:46aaf68025d32ce9ef2fc58b155814ec856c13de}}, {{cite:40e8137ec3c87a5f504ef4b47199a52239bd92cb}}, {{cite:3415bcef86f80837bdd91206f161ce3107e09fa0}}. Recently,{{cite:916a8b2277bad62145360bf084802f19f26a2cf0}} extend the IB theory to the graph data to learn compact node representations, which can improve model robustness against adversarial examples. However, they assume that the graph data satisfies the local-dependence assumption and the underlying graph is a static graph, while we deal with a dynamic graph (i.e, communication graph), leading to differences between our method and their method in terms of both theoretical derivation and instantiation." ]
[]
Subresultants and the Shape Lemma
In nice cases, a zero-dimensional complete intersection ideal over a field ofcharacteristic zero has a Shape Lemma. There are also cases where the ideal isgenerated by the resultant and first subresultant polynomials of thegenerators. This paper explores the relation between these representations andstudies when the resultant generates the elimination ideal. We also prove aPoisson formula for resultants arising from the hidden variable method.
[ "The representation of algebraic varieties by polynomials having a “Shape Lemma” has a long history in Computational Algebra. In 1826, Abel solved {{formula:89d9c610-5298-43ce-8dac-903f21fff29e}} by eliminating {{formula:0346b523-62b9-46f3-968d-093493eedecd}} via a Poisson formula and then expressing {{formula:58d9ad34-7402-4285-acb3-62e678a9692a}} as a rational function of {{formula:2cb91a4a-ca09-4ce0-b40b-c2daabbcd8f8}} (see {{cite:b680aaade067511655fae78187b3a0a4dcb30f33}}). A more general version of this idea is due to Kronecker (see the introduction of {{cite:421774b9f19593a17bbe3c60d5a669a1006355de}} for a reference and more history). In {{cite:234bca6566f29c70d639a57590b9b332a4c0b92e}}, {{formula:a1490b5e-8a45-4b27-bbcf-d8cf387846c1}} -resultants are used to compute this representation, while {{cite:421774b9f19593a17bbe3c60d5a669a1006355de}} introduces geometric resolutions of varieties to simplify the computations. In this representation, the focus is on equations for the variety {{formula:a4d9aac7-2b95-4b43-a49f-f49f43696610}} and not on the ideal {{formula:dcfef132-1097-4b5e-ac24-dd6e30359d08}} itself, so these results are limited to radical ideals with points in some kind of general position (see for instance {{cite:e04a6fb662b8343e7b1142c5ac191903b8241ba5}}). In {{cite:c50b3e3ad2451e57cc1fabc8808d835dd9e0bc79}}, a “Rational Univariate Representation,” which also takes into account the multiplicities of the points, is introduced and studied from a computational point of view. A generalization to a sparse RUR can be found in {{cite:e9fc38b2ada08aa60427258b9d53769a85d18615}}.", "In another direction, {{cite:a349cc1d6136644699607a10d6683846d1d6a964}} characterizes ideals having a Shape Lemma in terms of the geometry of the points in {{formula:a36f9573-8d30-442d-9056-c83f38a78b6c}} . We will review and use some of their results in Section . Also, comparing the monic generator of {{formula:a0c15364-9d86-459a-a00c-f76b049ab693}} with {{formula:0b42521c-c8e6-4e8a-8671-13ab5c6de714}} is a classical exercise in basic Computational Algebra, see for instance Exercise 3 ofChapter 3, §6 in the first three editions of {{cite:8498d35ef8698f0b55e6e00714f157cbe89fe136}}.It is clear that both multiplicities and roots at infinity play a decisive role here. In {{cite:fff21f24d5c208c937581877754de21f83d2879b}}, directional multiplicities are used to explain the differences between the degrees of these two polynomials. In {{cite:7742c7863c314aca0f3df27bea72465e88ee061f}}, the connection between the elimination ideal and univariate resultants of two generators is explored.", "The use of subresultants for the Shape Lemma has been done already by Habicht in {{cite:1db9199aee794f388c0ebf16dd1eba7ddd86633f}}. In {{cite:adc28bfd99d7f6dad5fba2025bce2a65189d21d8}}, this method is explained and used to produce another Gröbner-free/resultant-friendly computation of the Shape Lemma for a radical ideal with points in general position.In a different context (overdetermined {{formula:8728c614-83f4-4002-aaf1-0d8ca9804dbc}} homogeneous polynomials in {{formula:330928a4-cd7c-412d-8960-4e184bcdc73c}} variables), {{cite:d3d7f01f32d71bb30baa3a93b9c3118e533f73c4}} uses multivariable subresultants to describe the roots of a polynomial system.", "As already noted, Poisson-type formulæ for resultants are important tools for solving polynomial systems. For the classical homogeneous case, this goes back to Poisson in 1802. See {{cite:d7b5044465fe00718423bc79fe13352bba167b5a}} for the presentation of this formula for generic polynomials. Whether or not one can apply Poisson to a given polynomial system depends on where the solutions are. For the classical resultant, such a formula is valid if there are no solutions at infinity. In {{cite:7fd3442aa650238d5fa8dff01c7cd474510eb46e}}, Poisson has been extended to sparse resultants and its validity has been shown for systems having all of their roots in {{formula:11d9f38d-f203-4907-b714-9a9c1b8b8c84}} (no solutions at any infinity of the associated toric variety). We will use this sparse Poisson formula to prove the main result of Section ." ]
[]
Estimating Causal Effects of Multi-Aspect Online Reviews with Multi-Modal Proxies
Online reviews enable consumers to engage with companies and provideimportant feedback. Due to the complexity of the high-dimensional text, thesereviews are often simplified as a single numerical score, e.g., ratings orsentiment scores. This work empirically examines the causal effects ofuser-generated online reviews on a granular level: we consider multipleaspects, e.g., the Food and Service of a restaurant. Understanding consumers'opinions toward different aspects can help evaluate business performance indetail and strategize business operations effectively. Specifically, we aim toanswer interventional questions such as What will the restaurant popularity beif the quality w.r.t. its aspect Service is increased by 10%? The definingchallenge of causal inference with observational data is the presence of"confounder", which might not be observed or measured, e.g., consumers'preference to food type, rendering the estimated effects biased andhigh-variance. To address this challenge, we have recourse to the multi-modalproxies such as the consumer profile information and interactions betweenconsumers and businesses. We show how to effectively leverage the richinformation to identify and estimate causal effects of multiple aspectsembedded in online reviews. Empirical evaluations on synthetic and real-worlddata corroborate the efficacy and shed light on the actionable insight of theproposed approach.
[ "Causal Effect Estimation with Multiple Treatments.Classical causal inference with multiple treatments typically uses generalized propensity scores (GPS) {{cite:2e92cde764dbf4cf3a265659f39f48d9d670849a}}. Methods that extend classical matching, subclassification, and weighting strategies to multiple treatments based on GPS can be seen in {{cite:dcb4a1839c0a679001341e91acc5e5ce06de56a2}}, {{cite:9847845503838a96952f45087167f405ac9247fd}}, {{cite:2b352149f8a32d30a0fc25eeb27b56a1f4c028c8}}, {{cite:fb485ebbbc9ce4d6a7c0fc9b0d0e4990df0cc19e}}, {{cite:5fb7be64b14d844edc50ea4733087cfe09e7ec7b}}, {{cite:73ee9fdf0b47f602f4f456a5d6848e65de132bc6}}. Many established works rely on a strong assumption that observed covariates can fully account for confounding. The recently proposed Deconfounder framework {{cite:b098b8d3ac484165b2abf00de8d3cc2ed9fe8eb5}} advocated to infer the substitute confounders by directly factorizing the multiple causes via latent variable models such as PCA {{cite:5324117e799bdc28f04800bbee9774c972f4a26a}}. While Deconfounder opens up new research frontier in multiple causal inference in the presence of HC, its design suffers from inherent limitations {{cite:430c0cb9517c3dded0faa5e6bfd37d5c3258e43d}}, {{cite:d87c6e5714732d5148d614b18a2bc2b682190669}}, {{cite:677b7cdee5b4db664aebddf68329f4976e31d0bd}}. Our work advances this line of research by advocating to use the representation of multi-modal proxies that is sufficient for confounding adjustment meanwhile excludes the potential biases induced by bad proxies. The benefits are mainly two folds: (1) multi-modal proxies provide multi-faceted views of HC, enabling more accurate and low-variance estimations of causal effects; (2) DMCEE considers the non-i.i.d. proxies, thereby advancing existing works in causal inference assuming i.i.d. proxy variables (e.g., {{cite:ff637e2fa975043cadb9b2d995c50e2676867c11}}).", "Causal Effect Estimation with Proxy Variables.Proxy variable has been widely studied in causal inference with observational data {{cite:fbc00df29a4ac63c7acd214fd994c51680401ab1}}, {{cite:6b8657d9c587b5eb2c17de3bbf52cbfc692cf312}}, {{cite:eed16977b27760fd575cdfd2c1025a110c4cc7de}}, {{cite:ff637e2fa975043cadb9b2d995c50e2676867c11}}, {{cite:d940fd9ca16349adcefc37c40dab241a0ee9e6c1}}. Previous works have shown sufficient conditions for causal identification in the presence of HC using proxy variables, see, e.g., {{cite:7f11d5c84b0e7a39271d89914f8e458b58f3584f}}, {{cite:ff637e2fa975043cadb9b2d995c50e2676867c11}}, {{cite:c61e4a226dcacb0a0d12322dc2edb6f82b1e2f3c}}. In {{cite:7f11d5c84b0e7a39271d89914f8e458b58f3584f}}, {{cite:d940fd9ca16349adcefc37c40dab241a0ee9e6c1}}, for example, the authors showed that the treatment effect can be identified with the method of effect restoration under several conditions. Weaker identification conditions proposed in {{cite:ff637e2fa975043cadb9b2d995c50e2676867c11}} require two independent proxy variables, one conditionally independent of causes given HC, and the other conditionally independent of outcome given HC. A recent work {{cite:eed16977b27760fd575cdfd2c1025a110c4cc7de}} applied a variational autoencoder model to simultaneously approximate HC and estimate causal effects. However, most of these works assumed a single and binary cause.", "Causal Effect Estimation in Online Review Systems.Prior empirical research on the effects of online reviews has established its importance in guiding consumer choices and business operations. For example, it has been shown that positive reviews, high ratings and popularity of reviews can largely increase book sales {{cite:ecc27932ed4b97809d560e81867ce3946ddb93bc}}, movie sales {{cite:0c97d742eae4a7aa906f498b411d755ec28b81da}}, box office revenue {{cite:b7b44021002cd0c55ee2fd29a411a5cec1780fba}}, sales of video games {{cite:91df08b35401c9cc3e9083f8784f6feef6eaa67a}}, and restaurant reservation availability {{cite:b1c4335a0d6309f2478c4cce2b569533ff56e42f}}. Based on user-generated online reviews, researchers also studied micro-level impact of documentary films on individual behavior {{cite:d5469323921428bad67270a3bd8ae1f0364687e1}}. Prior works, however, have been focused on a single and coarse-grained cause such as ratings without considering the granular information in textual reviews as well as the presence of HC. This research, however, investigates the effects of online reviews from multiple dimensions while controlling for hidden confounding." ]
[]
Fusion and Orthogonal Projection for Improved Face-Voice Association
We study the problem of learning association between face and voice, which isgaining interest in the computer vision community lately. Prior works adoptpairwise or triplet loss formulations to learn an embedding space amenable forassociated matching and verification tasks. Albeit showing some progress, suchloss formulations are, however, restrictive due to dependency ondistance-dependent margin parameter, poor run-time training complexity, andreliance on carefully crafted negative mining procedures. In this work, wehypothesize that enriched feature representation coupled with an effective yetefficient supervision is necessary in realizing a discriminative jointembedding space for improved face-voice association. To this end, we propose alight-weight, plug-and-play mechanism that exploits the complementary cues inboth modalities to form enriched fused embeddings and clusters them based ontheir identity labels via orthogonality constraints. We coin our proposedmechanism as fusion and orthogonal projection (FOP) and instantiate in atwo-stream pipeline. The overall resulting framework is evaluated on alarge-scale VoxCeleb dataset with a multitude of tasks, including cross-modalverification and matching. Results show that our method performs favourablyagainst the current state-of-the-art methods and our proposed supervisionformulation is more effective and efficient than the ones employed by thecontemporary methods.
[ "Face-voice Association.The work of Nagrani et al. {{cite:dca144cba5ddf01f890addee7045210e26ca9708}} leveraged audio and visual information to establish an association between faces and voices in a cross-modal biometric matching task.Similarly, some recent work {{cite:17e58f7287c44ebcdf1668ba9e36f01402c7c70a}}, {{cite:faedcc5e804eda6cddbb41a54bfdfe82274d3b5e}}, {{cite:b2c0fd703ceabcda476de5ceeddd8dbc23e0083e}}, {{cite:10f44807510e1d38806a3edd8967c52024faf15e}} introduced joint embeddings to establish correlation between face and voice of an identity. These methods extract audio and face embeddings and then minimize the distance between embeddings of same identities while maximize the distance among embeddings from different ones.Wen et al. {{cite:5a1f586252823bfac8574b2b335889dd3106ff06}} presented a disjoint mapping network to learn a shared representation for audio and visual information by mapping them individually to common covariates (gender, nationality, identity) without needing to construct pairs or triplets at the input.Similarly, Nawaz et al. {{cite:561a00f89c465164f2985989eaab35785df0815a}} extracted audio and visual information with a single stream network to learn a shared deep latent representation, leveraging identity centroids to eliminate the need of pairs or triplets {{cite:faedcc5e804eda6cddbb41a54bfdfe82274d3b5e}}, {{cite:dca144cba5ddf01f890addee7045210e26ca9708}}.Both Wen et al. {{cite:5a1f586252823bfac8574b2b335889dd3106ff06}} and Nawaz et al. {{cite:561a00f89c465164f2985989eaab35785df0815a}} show that effective face-voice representations can be learned without pairs or triplets formation.", "Contrary to previous works, our method proposes to construct enriched embeddings via exploiting complementary cues from the embeddings of both modalities through a attention-based fusion. Further, it clusters the embeddings of same identity and separates embeddings of different identities via orthogonality constraints. The instantiation of both proposals in a two-stream pipeline results in an effective and efficient face-voice association framework.{{figure:c4b5812f-00de-40ff-953a-fe812b7f9bea}}" ]
[]
Spiral Language Modeling
In almost all text generation applications, word sequences are constructed ina left-to-right (L2R) or right-to-left (R2L) manner, as natural languagesentences are written either L2R or R2L. However, we find that the naturallanguage written order is not essential for text generation. In this paper, wepropose Spiral Language Modeling (SLM), a general approach that enables one toconstruct natural language sentences beyond the L2R and R2L order. SLM allowsone to form natural language text by starting from an arbitrary token insidethe result text and expanding the rest tokens around the selected ones. Itmakes the decoding order a new optimization objective besides the languagemodel perplexity, which further improves the diversity and quality of thegenerated text. Furthermore, SLM makes it possible to manipulate the textconstruction process by selecting a proper starting token. SLM also introducesgeneration orderings as additional regularization to improve model robustnessin low-resource scenarios. Experiments on 8 widely studied Neural MachineTranslation (NMT) tasks show that SLM is constantly effective with up to 4.7BLEU increase comparing to the conventional L2R decoding approach.
[ "Most of the Neural Machine Translation (NMT) approaches decode the target language sentences through an L2R order {{cite:00fd0f18bb3ff75f43eb788206586488d4078055}}, {{cite:3a3167601e9e40a6d8505e5ddee28cae5d7f8ce9}}, {{cite:0dfbce3b6e11bb3cc54281482157185e94e59784}}, {{cite:c14cd3b5ccd7bb51e4b3bf8e63ef5daf8e9f6aa4}}.Researchers are also interested in the research topics on sequence ordering and text decoding manipulation.", "Sequence Ordering Sequence ordering is studied in the density estimation tasks ever since {{cite:46ee3802a683d23db6de87f7416d9de05b194697}} propose to optimize the mean auto-regressive cost over all orderings of a given variable sequence.{{cite:2ff71969e31713190b03549f88af4258280fec69}} further implement their order-agnostic training by permuting the input variable sequence with observed variables all before the masked ones.{{cite:1082c296f4cbb0a9eac83eb8cde48013ff191844}} treat the orderings of the sequence variables as a stochastic variablewith a uniform distribution and optimize the expected likelihood over the ordering of variables.Introducing ordering generally improves the density estimation effectiveness.Recently, permutation language modeling is borrowed in the large-scale unsupervised auto-regressive model pre-training task XLNet in {{cite:df10ab55f4959e4cf3f392de1afe1552f01a99c6}}.The XLNet design a partial prediction task where normally the last 1/6 of the permuted sequence is masked for reconstruction.To the best of our knowledge, there is no existing work discussing sequence ordering in text generation tasks.{{cite:3a3ca72ef124a9e65be6b881a72142c8c62667e0}} also employed a pseudo-mask method to support different factorization orders in the Partially AutoRegressive model, in which the randomly sampled factorization orders are similar to permutation-based language modeling used by XLNet.", "Decoding Manipulation Decoding text during generation naturally follows the text written order. However, employing additional decoding order generally introduces text generation diversity which leads to better performance.{{cite:00a1d3c47e777355e90e25e40e61d1e3427c980f}} use an R2L trained language model together with an L2R trained one and achieve BLEU gains constantly on all MT tasks.{{cite:5b85d9fa9721ecf0dfbb163e582199a439d826b8}} expand the bidirectional decoding idea to a mixture of the L2R and R2L ordering with a directed graphical model factorization.NMT approaches such as {{cite:8c09dd3758e0d5fb9c9952f191083776d85241bf}}, {{cite:7cd552bc54c6082bd80539e59ee296b93b79fe5a}}, {{cite:3deff67a9a31be662f7b02b53bf62e3d32156a07}}, {{cite:7d53b4353596b066a800602469126df794541196}} run beam search for L2R and R2L models independently to get two n-best lists and re-score the union of the two lists to obtain the best one.They all train separate forward and reverse decoders and require multiple rounds of decoding during inference.Comparing to the above bi-directional decoding approaches, SLM is much neater as it explores all possible decoding directions that could maximize the result sequence scores in a single round of beam search.", "Besides re-scoring, researchers are also trying to find a unified bi-directional searching approach.{{cite:3a3167601e9e40a6d8505e5ddee28cae5d7f8ce9}} employ the reverse decoder as an auxiliary module for the forward decoder to foresee a part of the target text.{{cite:0dfbce3b6e11bb3cc54281482157185e94e59784}} propose a synchronous bidirectional neural machine translation (SB-NMT) approach that generates an L2R sequence and an R2L sequence simultaneously and interactively.{{cite:2aa2011028cd13e7355e1a5eeefb776ed1b05135}} carry out a decoding strategy that starts from both ends of a target sequence and generates two subsequences separately.Moreover, {{cite:f422b8fb7d316389d32c4a3406a6b8682eb03f07}} proposes a reversed strategy of the above one, which predicts a starting token first and generates the two subsequences on both sides separately.All the above approaches simply try to find a better way to combine an L2R and an R2L language model.Besides MT tasks, {{cite:86feea0bbb3496fae0af7a30ad8429983dbf1022}}, {{cite:f7e82fb5c26ebd5d1410ad223436155375ea02de}}, {{cite:c9847a21b385bfce4a3e06e2e5655a395a0c932e}}, {{cite:ce3032f1b8de9b8fdad364927c6446dd260301b8}} also employ bi-directional language models with well chosen decoding strategy in dialog generation tasks.Our proposed SLM breaks the constraints that language modeling may only follow the L2R or R2L order.Therefore, SLM provides a wide number of decoding strategies that the result decoding model can choose from." ]
[]
From Robot Self-Localization to Global-Localization: An RSSI Based Approach
Localization is a crucial task for autonomous mobile robots in order tosuccessfully move to goal locations in their environment. Usually this is donein a robot-centric manner, where the robot maintains a map with its body in thecenter. In swarm robotics applications, where a group of robots need tocoordinate in order to achieve their common goals, robot-centric localizationwill not suffice as each member of the swarm has its own frame of reference.One way to deal with this problem is to create, maintain and share a common map(global coordinate system), among the members of the swarm. This paper presentsan approach to global localization for a group of robots in unknown, GPS andlandmark free environments that extends the localization scheme of the LadyBugalgorithm. The main idea relies on members of the swarm stay still and act asbeacons, emitting electromagnetic signals. These stationary robots form aglobal frame of reference and the rest of the group localize themselves in itusing the received signal strength indicator (RSSI). The proposed method isevaluated, and the results obtained from the experiments are promising.
[ "Radio frequency identification technology (RFID) is used in {{cite:3bcf328ef476653a9f77a79727cbd63dbc7f0ae2}} to localize robots navigating indoors. The passive RFID tags installed, divided the area into a grid. As a robot, equipped with an RFID reader, explores the area, the reader reads the tag. The position is then estimated by correlating the ID of the tag with a map containing the localization information of the tags. Despite the high accuracy, the need for a map containing the ID and location of the tags limits the practical applications.", "Localization based on RSSI is proposed in the Ladybug algorithm {{cite:8abc225938e438ad2d05291bc8bc1baef8cd85a4}}. A robot equipped with sensors able to measure the strength of the received electromagnetic signal, is able to identify the location of the source of the signal and navigate to it. The source could be either a beacon or another robot.", "A localization method based on RSSI of heterogeneous sources (i.e. WLAN, GSM etc) is presented in {{cite:d02ad26a349fbdf20d9173a326847cf642467ee9}}. By analyzing the fingerprint and strength of the received signal, the robot is able to localize itself by comparing it with a fingerprint map. While exploiting already existing infrastructures, negating the need for a network deployment, the main disadvantage is the need for a fingerprint map covering all the area of interest.", "A distributed localization method based on swarm intelligence algorithms is presented in {{cite:c6d00b69e722a37ae6db129580536b04204ca06f}}. Particle swarm optimization and an approach based on backtracking search algorithm is proposed. The proposed method operates in three stages. The first stage allows a robot to estimate the distance from a reference node using the Sum-Dist algorithm {{cite:07cf799eb9c02e8ca5cb7c60d8fb6b27cc2d6556}}. The second stage estimates the position of the robot using the min-max technique{{cite:8e26bc0d7bbad2af32da2d494327101a7205c840}}, {{cite:07cf799eb9c02e8ca5cb7c60d8fb6b27cc2d6556}}. Finally the third stage the accuracy improves by re-evaluating the position based on the position of the neighbors." ]
[]
REFORM: Reputation Based Fair and Temporal Reward Framework for Crowdsourcing
Crowdsourcing is an effective method to collect data by employing distributedhuman population. Researchers introduce appropriate reward mechanisms toincentivize agents to report accurately. In particular, this paper focuses onPeer-Based Mechanisms (PBMs). We observe that with PBMs, crowdsourcing systemsmay not be fair, i.e., agents may not receive the deserved rewards despiteinvesting efforts and reporting truthfully. Unfair rewards for the agents maydiscourage participation. This paper aims to build a general framework thatassures fairness for PBMs in temporal settings, i.e., settings that preferearly reports. Towards this, we introduce two general notions of fairness forPBMs, namely gamma-fairness and qualitative fairness. To satisfy these notions,our framework provides trustworthy agents with additional chances of pairing.We introduce Temporal Reputation Model (TERM) to quantify agents'trustworthiness across tasks. With TERM as the key constituent, we present ouriterative framework, REFORM, that can adopt the reward scheme of any existingPBM. We demonstrate REFORM's significance by deploying the framework withRPTSC's reward scheme. Specifically, we prove that REFORM with RPTSCconsiderably improves fairness; while incentivizing truthful and early reports.We conduct synthetic simulations and show that our framework provides improvedfairness over RPTSC.
[ "Crowdsourcing systems use reward mechanisms to improve the accuracy of the reports {{cite:c36938cd5f4224e4f2f3062e46455a5ae4b668a0}}, {{cite:f8a0e19583e3171e04a4c33d6486498adfe4acee}}, {{cite:59745b0d1432a6e555a831b0bd078595337e7f81}}. Towards this, researchers have proposed PBMs which appropriately incentivize agents by evaluating their reports against other agents.", "The earliest PBM, Bayesian Truth Serum (BTS) {{cite:567032fa8dd0f256ab4b3078030f1b038097e882}}, elicits the reports by asking agents to submit their answers and their beliefs about other agents' answers. Huang et al. {{cite:7cc3564f17d5d052cac7c69e49ffd668988b031d}} propose Peer consistency (PC), which rewards the agent based on its consistency with the peer reports. Here, for all the agents, an optimal strategy is to collude and submit the same report. We refer to such a collusion strategy as single report strategy. Peer Truth Serum (PTS) {{cite:887729eaea09a012b61cd90c4eb8c842561be272}} is a combined version of PC and BTS but requires prior distribution of answers. However, in many settings, prior about the answers is not accessible. Randanovic et al. {{cite:4e0cbe5e0c2a9fe2aa267800b359724272d58a0b}} present an incentive mechanism, Robust Peer Truth Serum for Crowdsourcing (RPTSC), which uses the distribution of reported answers from similar tasks as prior. RPTSC can operate with a small number of statistically independent tasks and is resistant to single report strategy. In multi-task settings, Correlated Agreement (CA) {{cite:884f5458fed6ba2fd188aa6e8925daf6745b6309}} achieve informed truthfulness with an infinite number of tasks, while Determinant based Mutual Information (DMI) {{cite:7c8465bde72d5fcd5795aee023dacdc1ab472d93}} is dominantly truthful but requires a batch of agents to solve the same set of tasks in a single round. Though we work on Nash Incentive Compatibility, we relax these strong limitations allowing agents to solve any finite number of tasks.", "Despite their advantages, we believe that PBMs are inherently unfair, necessitating fair rewards to ensure the participation of trustworthy agents in crowdsourcing. Researchers are actively looking to achieve fairness in crowdsourcing through mechanism design {{cite:c61d4caaf5f5b9dac24373b13a8f77a618ca78c4}}, {{cite:b12a7e60a216e7ef255a066d3ccce095bdda6a8b}}, {{cite:3c41a65d480472dc131d5464ec55a96f9c82e26d}}, {{cite:a6870837b206a21db9e837c93a8a5ab4648aabd3}}. For instance, Goel et al. {{cite:3c41a65d480472dc131d5464ec55a96f9c82e26d}} present Deep Bayesian Trust, which assures fair rewards to the agents by assuming a few gold-standard tasks. Moti et al. {{cite:a6870837b206a21db9e837c93a8a5ab4648aabd3}} propose a fair reward mechanism for localized settings. However, we can not apply the proposed notions to address unfairness in PBMs. To the best of our knowledge, we believe that we are the first to address fairness in PBMs." ]
[]
SelFSR: Self-Conditioned Face Super-Resolution in the Wild via Flow Field Degradation Network
In spite of the success on benchmark datasets, most advanced facesuper-resolution models perform poorly in real scenarios since the remarkabledomain gap between the real images and the synthesized training pairs. Totackle this problem, we propose a novel domain-adaptive degradation network forface super-resolution in the wild. This degradation network predicts a flowfield along with an intermediate low resolution image. Then, the degradedcounterpart is generated by warping the intermediate image. With the preferenceof capturing motion blur, such a model performs better at preserving identityconsistency between the original images and the degraded. We further presentthe self-conditioned block for super-resolution network. This block takes theinput image as a condition term to effectively utilize facial structureinformation, eliminating the reliance on explicit priors, e.g. facial landmarksor boundary. Our model achieves state-of-the-art performance on both CelebA andreal-world face dataset. The former demonstrates the powerful generativeability of our proposed architecture while the latter shows great identityconsistency and perceptual quality in real-world images.
[ "Face generation.Recently, some methods can directly generate realistic faces from the latent space, which boosted many applications in face editing {{cite:3b31f5a8c315317328fef5aadf02bf60b600e42c}}, {{cite:7d97f9b5226416790f6580507f179079bb3b9570}}, {{cite:089775b99bfab79dfe6a25c1eedf6a77042b1a80}} and face super-resolution {{cite:db4310984a8eb2fa05229f54cd5161a44cdbe9d2}}.Tero et al.  {{cite:d7dee24648ed88f62821db847c1ea1a0d185effc}} described a progressive growing methodology for the face generation on 1024{{formula:9d45e5dd-141f-4931-8609-4f3d1e215b3f}} 1024 resolution from an underlying code.StyleGAN {{cite:0b92a64971d2d73fbcdc24d8dfcef2791c10870b}} proposed a style-based generator that manipulates the activations of image features at different scales, synthesizing extremely naturalistic face images.Tero et al.  {{cite:4f6a42693b7a6808f4e93f1cbf4e924b39e4818f}} further analyzed the influence of instance normalization and improved the image quality via path length regularization and modified architecture.As face super-resolution is a case of conditional generation processing, researchers can benefit from the advanced methods in face generation.Inspired by the remarkable success of the style-based architecture in face generation {{cite:0b92a64971d2d73fbcdc24d8dfcef2791c10870b}}, {{cite:4f6a42693b7a6808f4e93f1cbf4e924b39e4818f}}, {{cite:0df499949eacc39e8273228544cc4ff963e0dc63}}, we proposed the self-conditioned block which takes the input as a condition term.Unlike some methods {{cite:0c0f4bfee7f0ac019aa15a31a40cc1d2e5572a56}}, {{cite:ce060a6cc633526a86940d84169e2701ba270350}}, {{cite:347ab51eea02014b5d96080799b6ccf203c6d6cd}} which concatenate the input images onto intermediate feature maps, our self-conditioned block modulates the activations of each layer given the input.", "Image super-resolution.The single image super-resolution performance on benchmark datasets has been boosted continuously by numerous proposed models {{cite:7a7bc50fabf5863b84193053649581c914bf2ce6}}, {{cite:e52df71ded649f501700c2fa34c02c53c4ab410f}}, {{cite:46c6ca3d1b6af6a8dc763c110f2e2a0d46954d37}}, {{cite:82b318c1ed1c89f58c5b0ab5429939e2b9acbc73}}, {{cite:347ab51eea02014b5d96080799b6ccf203c6d6cd}}, which usually achieve state-of-the-art performance via advanced network architecture or learning strategy.Some fundamental and classic network designs in SR models contain recursive learning {{cite:072728fccea688a78204d310759588b72c71e451}}, residual learning {{cite:e359bb665ba986f2cf7c98f3b438430b6fae631c}}, dense connection {{cite:aa14af14ba6516d257c0a24f59c0b55eb1286f0a}}, multi-path learning {{cite:de2c6a77c0b345e13e9b97779aa53887e51fb676}} and attention mechanism {{cite:e52df71ded649f501700c2fa34c02c53c4ab410f}}, {{cite:e7e7edafc14c98a7f73537e27e94b081d0c4a52b}}, {{cite:b82bb15884992d35f2328407137298cbd3938a45}}.Kim et al.  {{cite:072728fccea688a78204d310759588b72c71e451}} proposed Deeply-recursive Convolutional Network (DRCN) to recursively learning high-level representations with a weight-shared module.In residual learning, the model only predicts the residual map that transforms the LR image into an HR image.Since the learning difficulty is significantly reduced with residual learning, it is widely used in SR models {{cite:72b284330b0599453c3460ad6cbe7ae251524ee3}}, {{cite:1ac0d98b2f74e572097ed3354bbd321fe62ca44c}}, {{cite:6d0589babd594f96e0e882dce9bcb2442d9dd6bf}}.Further, SRDenseNet {{cite:feaf1110cac33a142b05ff6a49e914c503b4e96d}} introduced dense block into SR models, utilizing all the previous feature maps to learn the missing high-frequency details in the LR image.In multi-path learning based SR models {{cite:de2c6a77c0b345e13e9b97779aa53887e51fb676}}, {{cite:1ac0d98b2f74e572097ed3354bbd321fe62ca44c}}, {{cite:5084561c710ecdac288463329c7042a589d10d54}}, the features are transferred to multiple paths for different scale or reception field. Multiple representations are then combined to gain improved performance.As for attention mechanism, Zhang et al.  {{cite:e52df71ded649f501700c2fa34c02c53c4ab410f}} proposed the channel attention network for image SR task and largely improve performance.Further, they proposed non-local attention block {{cite:a66ff8d9e4a13f56938d006a57e5505d5daf14be}} to extract local and non-local representations between pixels for a more effective feature aggregation.", "Another important factor is learning strategy like loss function or upsampling framework.SRGAN {{cite:cfb529ddc69b2cabd2ce14c835ac8a696999d469}} achieved photo realistic SR results by introducing perceptual loss {{cite:cc51d454252d2c934f39b0091215207acc1f28bf}} and adversarial loss {{cite:7cbe58352d1fb025d6db1aa6ec1feea62c8b2d4d}}.ESRGAN {{cite:7a7bc50fabf5863b84193053649581c914bf2ce6}} utilized a relativistic version of adversarial loss {{cite:4077f5b1af11339b5c72af6bf35a1a3c8737cebe}} and got the state-of-the-art perception-oriented performance at that time, largely boosting the development of paired image super-resolution.As for upsampling framework, the classical frameworks are pre-upsampling SR {{cite:4dfff3e0210a48541aeaf2682e253ee003ed3084}} and post-upsampling SR {{cite:37c25b0061604c945b09bb3a64c7f87dac4f8069}}, {{cite:41cf9c47aef3cd6af8a8d93fe7d206f89952a1bd}}.Recently, the progressive-upsampling framework {{cite:d27fed418beed8322b6ed9f3b020820933b38eb2}}, {{cite:26afd0dfb4cdb66fc05997edef43a201ecb0acbf}} is proposed to reduce the learning difficulty and support for multi-scale SR task.A detailed and comprehensive survey on SR components can be found in recent image super-resolution reviews {{cite:74b21720285c95d55e2102e42d649b570d0cede9}}, {{cite:1d9f1f04558e9daaccc77d1dac19769154fb1068}}.Our SR network also belongs to the progressive-upsampling framework, where ProSR {{cite:d27fed418beed8322b6ed9f3b020820933b38eb2}} and LapSRN {{cite:26afd0dfb4cdb66fc05997edef43a201ecb0acbf}} are the most similar model to our SR network.The difference is that they predict the residual map with respect to the LR progressively, while our model take the input as a condition to modulate feature maps.", "As a domain-specific image super-resolution task, face super-resolution models usually use image priors like facial-structured information to achieve high SR performance.For instance, FSRNet {{cite:3d03e102fb8124b3985a8bc080f34c813eacc05e}} use facial parsing maps and landmarks as priors to achieve face SR task.Ma et al. proposed an iterative collaboration framework between face super-resolution and landmark estimation.Instead of directly utilizing facial priors, we propose the self-conditioned block to use the implicit structure information contained in the input.", "Real-world image super-resolution.Amount of attempts have been made to tackle the real image super-resolution task.By adjusting the focal length of a digital camera, several works collected the training pairs in real scenarios {{cite:ff821abcd35637afd8d65d88f75792c1df848d3d}}, {{cite:4a09dcb7875285bcfe1ca5d75fa7b5ce980eca05}}, {{cite:a1ba4b13ae669430aec91bea5380ccdf13883197}}.Those methods are able to capture the real degradation with an expensive and laborious collection processing.Another category of approaches sought for real-world image SR from an algorithmic perspective.Jinjin et al.  {{cite:9d2e5f502961509cd85d38490cb30e352d1d34f8}} proposed an iterative kernel correction at the test phase for blind SR.Ruofan et al.  {{cite:891df2c141b91a4a7facb7279580a964080ce207}} incorporated the blur-kernel modeling in the training phase for real LR image super-resolution.However, those methods usually are limited by the ability of modeling complicated distortions in real-world.Several researchers, therefore, turned to utilize deep neural networks to estimate the real degradation {{cite:836eb7dfd5a468f435185c083e14040f1465c12c}}, {{cite:2e71f9bd7d77bb09d61e699ab4d50abce0b76210}}, {{cite:3bf2492d32ea7fa08d0cc5ada07cbd3ddcffa19a}}, {{cite:9bad2af4843a96bd5a45341f5be8fb53a687e685}}.Unlike most existing methods which directly utilize CycleGAN estimating the real degradation, we propose a displacement-based architecture to perform the domain adaptation task." ]
[]
Low-Complexity Resource Allocation for Dense Cellular Vehicle-to-Everything (C-V2X) Communications
Vehicular communications are the key enabler of traffic reduction and roadsafety improvement referred to as cellular vehicle-to-everything (C-V2X)communications. Considering the numerous transmitting entities in nextgeneration cellular networks, most existing resource allocation algorithms areimpractical or non-effective to ensure reliable C-V2X communications which leadto safe intelligent transportation systems. We study a centralized framework todevelop a low-complexity, scalable, and practical resource allocation schemefor dense C-V2X communications. The NP-hard sum-rate maximization resourceallocation problem is formulated as a mixed-integer non-linear non-convexoptimization problem considering both cellular vehicular links (CVLs) andnon-cellular VLs (NCVLs) quality-of-service (QoS) constraints. By assuming thatmultiple NCVLs can simultaneously reuse a single cellular link (CL), we proposetwo low-complexity sub-optimal matching-based algorithms in four steps. Thefirst two steps provide a channel gain-based CVL priority and CL assignmentfollowed by an innovative scalable min-max channel-gain-based CVL-NCVLmatching. We propose an analytically proven closed-form fast feasibility checktheorem as the third step. The objective function is transformed into adifference of convex (DC) form and the power allocation problem is solvedoptimally using majorization-minimization (MaMi) method and interior pointmethods as the last step. Numerical results verify that our schemes arescalable and effective for dense C-V2X communications. The low-complexity andpracticality of the proposed schemes for dense cellular networks is also shown.Furthermore, it is shown that the proposed schemes outperform other methods upto %6 in terms of overall sum-rate in dense scenarios and have a near optimalperformance.
[ "In this section, we review recent researches of the literature.The topics of V2X and C-V2X communications, uplink and downlink spectrum reuse, resource allocation to a single CVL or NCVL, resource allocation to multiple CVLs or NCVLs, dense networks, and resource allocation to dense C-V2X communications are investigated in the following paragraphs.Since the topics of V2X and C-V2X communications are closely related to the topic of D2D communications, D2D communications related researches are also reviewed in this section in order to present a comprehensive vision of the literature.", "V2X communications in the unlicensed band have limited usage due to their short-range coverage and the fact that QoS requirements of all links may not always be guaranteed {{cite:0d9f4e78add3c8f731a46fa4125b23a5845c80e8}}.The reason is that the data transmissions related to NCVLs are not controlled by a BS when the unlicensed spectrum is utilized.In addition to that, the interference may not be addressed effectively, since a wide range of users and devices may use the unlicensed spectrum.Therefore, cellular spectrum is proposed in the 3GPP Release-18 Sidelink enhancement where C-V2X communications is a big topic {{cite:d774f33bee9d03f7b07e77e3092d6fde0d37eac9}}.Despite these challenges, we study V2X communications in cellular systems denoted as C-V2X for their potential to improve SE.One of the main challenges of C-V2X communications is the intra-cell interference caused by NCVLs to CVLs.In the overlay scheme of C-V2X communications, dedicated cellular resources are assigned to NCVLs.Thus, there is no interference between NCVLs and CVLs.In the underlay scheme, however, NCVLs and CVLs use the same spectrum, and interference management is critical.The spectrum that is assigned to CVLs in the overlay scheme is not effectively utilized since the spatial reuse gain is not considered.As a result, the underlay scheme can improve the SE of the cell more than the overlay scheme.Further, uplink spectrum reuse can provide greater SE compared to the downlink spectrum due to the underutilization of the latter.In this paper, we study the uplink C-V2X communications underlaying dense cellular networks where interference coordination and resource allocation are two of the main challenges.", "The uplink resource allocation problem can be solved in a centralized or distributed manner.Centralized approaches are usually more complex and effective compared to distributed approaches.Game theory is an effective tool for designing distributed resource allocation schemes {{cite:09378668354b016365f6c6a3fd847b79572a6d8b}}, {{cite:64c50d81fc6034db69f4bb0a7e030686bdeed3c1}} for D2D communications as well as C-V2X communications, while optimization approaches are usually utilized in centralized schemes {{cite:d2085ad0bfdd80905ce4a5763f1c29df928aeebc}}.The authors of and {{cite:09378668354b016365f6c6a3fd847b79572a6d8b}} used auction theory and Stackelberg game modeling to propose distributed resource allocation algorithms, respectively.The authors of {{cite:09378668354b016365f6c6a3fd847b79572a6d8b}} proposed a benchmark for system performance and compared the performance of their proposed system with the benchmark.The benchmark is a centralized resource allocation scheme that was developed using convex optimization techniques.The authors of {{cite:b418feb16dd2e8c1543c2cc3f129cd129eaeec18}} used game theory as a tool for distributed resource allocation in dense cellullar networks.Due to the higher performance of centralized approaches, we aim to design a centralized resource allocation scheme.", "A single CVL or NCVL might be considered in a resource allocation or performance evaluation problem.Cellular UEs (CUEs) and D2D pairs in D2D communications can be viewed equivalent to CVLs and NCVLs in C-V2X communications.The authors of {{cite:76c61fabc0a206fdd6ac5ed26d5e631c43c9e7a8}} investigated cooperative communication considering one CUE and one D2D pair in the cell and computed the outage probability of the CUE and the average data rate of the D2D pair.The authors of {{cite:0c2ddc98def09f10d87d564c9b7a9534f5a109d3}} introduced the concept of an interference-limited area (ILA) corresponding to the area of a cell that receives little interference.The ILA concept was used in {{cite:0c2ddc98def09f10d87d564c9b7a9534f5a109d3}} to enhance the capacity of D2D communications.In {{cite:eecbdb167c7d984dabb1d8b1e7d316715e15fac0}}, a capacity oriented algorithm was introduced to allocate resources to a single D2D pair reusing CLs of multiple CUEs.Since just one NCVL was considered, the proposed methods of {{cite:76c61fabc0a206fdd6ac5ed26d5e631c43c9e7a8}}, {{cite:0c2ddc98def09f10d87d564c9b7a9534f5a109d3}}, {{cite:eecbdb167c7d984dabb1d8b1e7d316715e15fac0}} resulted in a lower SE improvement than works with multiple NCVLs.Hence, the researches assuming a single NCVL or CVL are not suitable for dense C-V2X communications in future wireless networks.", "Multiple D2D pairs assumption which is equivalent to multiple NCVLs was investigated in {{cite:8dd0f15fa1f16683ee5ed2e2d47237ebba422bb9}}, {{cite:0fc3a7cc3e496e5dd5dd20a4b64f439d2210e2ab}}, {{cite:cbaf681c6c4873cff5aeb8b47f70ee9082621456}}, {{cite:3af73f1f4c68dbc5255eb5f6c7ac8a942bde787d}} where at most one D2D pair could reuse each CL and each CL could be shared with at most one D2D pair.The authors in {{cite:8dd0f15fa1f16683ee5ed2e2d47237ebba422bb9}} allocated optimal power to a fully loaded system with an equal number of CUEs and D2D pairs using the maximization on the boundary property of the objective function followed by the Kuhn-Munkres algorithm {{cite:daea93c29372f4883a831022af86c8eaefe7184c}}.This approach is suitable for non-dense C-V2X communications since it is necessary to assume that the number of NCVLs is equal to the number of CVLs.In {{cite:0fc3a7cc3e496e5dd5dd20a4b64f439d2210e2ab}}, resource allocation for relay-aided D2D communications involving channel uncertainty was investigated, and a distributed solution for sum-rate maximization using a gradient aided dual decomposition algorithm was proposed.The authors of {{cite:d3ecae8fb0fdeb2d674d32c5780d1e817b5a835b}} also investigated the channel uncertainty problem for beyond 5G C-V2X communications.However, the authors maximized the energy efficiency (EE) of the network in a non-dense environment.In {{cite:3af73f1f4c68dbc5255eb5f6c7ac8a942bde787d}}, a joint mode selection and resource group assignment algorithm with polynomial time was proposed for relay-aided D2D communications.The authors of {{cite:8dd0f15fa1f16683ee5ed2e2d47237ebba422bb9}}, {{cite:0fc3a7cc3e496e5dd5dd20a4b64f439d2210e2ab}}, {{cite:cbaf681c6c4873cff5aeb8b47f70ee9082621456}}, {{cite:3af73f1f4c68dbc5255eb5f6c7ac8a942bde787d}} assumed that multiple NCVLs could reuse the whole spectrum, but each CL could be used by at most one NCVL.Depending on the spatial reuse gain of the cell, multiple NCVLs can reuse the same CL simultaneously if interference is addressed properly.Thus, the spatial reuse gain of the cell was not utilized in {{cite:8dd0f15fa1f16683ee5ed2e2d47237ebba422bb9}}, {{cite:0fc3a7cc3e496e5dd5dd20a4b64f439d2210e2ab}}, {{cite:cbaf681c6c4873cff5aeb8b47f70ee9082621456}}, {{cite:3af73f1f4c68dbc5255eb5f6c7ac8a942bde787d}}.Resource allocation for V2X communications using deep neural networks was addressed in {{cite:68089a12e5705865cd2e5b4c5bf8ac514fc2b1fa}}, {{cite:2927f7170abbf45fe6f737424be76538bce88c87}}.The authors of {{cite:68089a12e5705865cd2e5b4c5bf8ac514fc2b1fa}} considered a limited number of transmitting entities and only V2I links.The authors of {{cite:2927f7170abbf45fe6f737424be76538bce88c87}} focused on mobile edge computing in non-dense environments.Considering the large number of transmitting nodes in future wireless networks, taking advantage of the spatial reuse gain of the cell is critical.", "To meet the rate requirements of future wireless networks with a large number of transmitting nodes, dense C-V2X communications can be utilized if resource allocation algorithms are developed properly.In order to develop practical resource allocation algorithms for dense C-V2X communications in future cellular networks, the feasibility of resource allocation problem, its practicality, and its complexity should be considered.In addition to that, the spatial reuse gain of cells should be utilized effectively.Therefore, it is necessary to assume that multiple NCVLs can reuse one CL at the same time, which is a more challenging assumption and can result in a dramatically higher SE.Since C-V2X communications can be implemented on a D2D platform, it is necessary to consider proposed schemes in the field of D2D communications.Some researchers have assumed that one D2D pair may use multiple CLs {{cite:2a6056261b48fc79433d8e7fc37c931500327ab6}}, {{cite:c809e84a66dfbfc734b34e6c2ddfe33348e86f79}} which is not a practical assumption from a hardware point of view, as each D2D pair may need multiple transmitter modules.Therefore, these approaches are not suitable practical C-V2X communications.A sub-optimal graph-coloring based algorithm where D2D pairs are viewed as a set of vertexes was proposed in {{cite:2a6056261b48fc79433d8e7fc37c931500327ab6}}.However, the approach was heuristic and focused on the downlink spectrum.The system model of {{cite:2a6056261b48fc79433d8e7fc37c931500327ab6}} was not practical since the usage of multiple CLs by one D2D pair was assumed by the authors.A resource allocation algorithm consisting of a channel assignment phase followed by a reuse phase was developed in {{cite:c809e84a66dfbfc734b34e6c2ddfe33348e86f79}}.To admit a D2D pair, a minimum QoS requirement is assumed for previously admitted D2D pairs during the reuse phase, which prevents resource allocation to a large number of D2D pairs in a dense cellular network.Thus, the proposed scheme is not suitable for dense C-V2X communications.Distributed and game-theoretical approaches were investigated in {{cite:543262ecb82d7d90a389227f74d82d0dc4a7d377}}, {{cite:7205cc3b83d52618757995d358daccd5d24f3895}}. The authors of {{cite:543262ecb82d7d90a389227f74d82d0dc4a7d377}} addressed the interference management problem properly using a pricing-based resource sharing algorithm where interference costs were defined for all CLs.The proposed method did not result in SE maximization but tried to guarantee QoS requirements of CUEs.A large value for the distance between D2D pairs was also assumed, which was not a practical assumption.The authors of {{cite:7205cc3b83d52618757995d358daccd5d24f3895}} proposed a coalitional game based scheme for the resource allocation problem.The convergence of the proposed scheme to the Nash-stable equilibrium was also proven.The authors of {{cite:56e39076268238430ce3d4e7449e4c8085fffb84}}, investigated power allocation problem in drone-assisted V2X communications.However, the main focus of the paper was on trajectory design and the usage of a unmanned-aerial-vehicle as a relay, while resource allocation to dense C-V2X communications in future wireless networks was not considered.The authors of {{cite:f80258fcff99544dd15e22d00007d3f1a6f54fab}}, proposed a V2V resource allocation based on C-V2X communications.However, latency reduction was the main focus of the paper and dense C-V2X communications was not considered.The authors of {{cite:c8f298e3b197d5e19eb174559c772f8c4e4e6cbc}}, investigated the resource allocation problem for V2X communications by formulating the problem as a three dimensional matching problem.However, the sum-rate of maximization of all transmitting entities was not considered and a local search based approximation algorithm was utilized.Considering the hardware limitations of D2D pairs, it is more reasonable to assume that each D2D pair can reuse just one CL {{cite:1caff533ecc9239c6e2f0a3575c05d7e17d0ed99}}.The maximization on the boundary property of the objective function was used in {{cite:1caff533ecc9239c6e2f0a3575c05d7e17d0ed99}}.The authors of {{cite:695771a09ea72341831332729404ce560c5ff0fb}} modeled the resource allocation problem as a mixed-integer programming problem and solved it using a subchannel sharing protocol.The resource sharing possibility among each two D2D pairs was investigated in the proposed subchannel sharing protocol.However, only the QoS of CUEs was considered, and the sum-rate of D2D pairs was maximized.Additionally, the approach was not scalable, and therefore not practical for ultra-dense scenarios.{{figure:27badbf3-d9e6-4cac-ba04-0f93c78830b8}}" ]
[]
MuMuQA: Multimedia Multi-Hop News Question Answering via Cross-Media Knowledge Extraction and Grounding
Recently, there has been an increasing interest in building questionanswering (QA) models that reason across multiple modalities, such as text andimages. However, QA using images is often limited to just picking the answerfrom a pre-defined set of options. In addition, images in the real world,especially in news, have objects that are co-referential to the text, withcomplementary information from both modalities. In this paper, we present a newQA evaluation benchmark with 1,384 questions over news articles that requirecross-media grounding of objects in images onto text. Specifically, the taskinvolves multi-hop questions that require reasoning over image-caption pairs toidentify the grounded visual object being referred to and then predicting aspan from the news body text to answer the question. In addition, we introducea novel multimedia data augmentation framework, based on cross-media knowledgeextraction and synthetic question-answer generation, to automatically augmentdata that can provide weak supervision for this task. We evaluate bothpipeline-based and end-to-end pretraining-based multimedia QA models on ourbenchmark, and show that they achieve promising performance, while considerablylagging behind human performance hence leaving large room for future work onthis challenging new task.
[ "Visual Question Answering {{cite:872ee1539291dc933f8f194f23e3566bc1be70c3}} aims to find a natural language answer given a natural language question and an image. Several datasets have been proposed, such as VQA {{cite:a6ae4ef792aaf3f6ae9016c023c33cc06f321221}}, {{cite:ef84295f4dc1647ef9e721716277ccfe75feea91}},DAQUAR {{cite:51e52b71b13104e811b1a1f05bdb1e816e78ad21}}, COCO-QA {{cite:c9fbdef444924b191fd5159e9d8b1ffd1d85d47d}}, VCR {{cite:1a1e7eaf924886c7a0357d6b39d942cf2a10121d}}, and PlotQA {{cite:3aa47ba9395b3a1101a241179b81a4ecdc24dbd3}}, all of which require answering questions about images. However, the questions are multiple-choice or the answers are from a predefined vocabulary with only the information in the image being sufficient to get the correct answer. Simple baseline methods that only use question understanding {{cite:3be79b11546e0d1de2fe2657580cfc3df1a4c4d8}} or answer option sentiment analysis {{cite:e1def0b84255bcb57209253e9b3c99d2077507a4}} have been proven to perform surprisingly well on datasets such as VQA {{cite:872ee1539291dc933f8f194f23e3566bc1be70c3}} and VQA2.0 {{cite:ef84295f4dc1647ef9e721716277ccfe75feea91}}.But they are unlikely to provide good answers for understanding complex events. Current QA datasets over news involve using just the news body text {{cite:1c489f2f5261b1cece3666d9a088cfdaf9c5e6f2}}. In contrast, our benchmark focuses on questions with informative answers that require reasoning across multiple data modalities.", "Recently, there has been some interest in using information from multiple modalities for answering questions. The first step in this direction is ManyModalQA {{cite:6d61ce319796cfa2732eef542a0d415c14b2512f}}, which requires figuring out which modality to use when answering the question. However, all questions are still answerable using a single modality, without any need for cross-media reasoning. MultimodalQA {{cite:0014d7f8359e73d3c6ae013878c5d50c818c8060}} extends it by using multi-hop questions that require cross-media reasoning, with each image linked to a Wikipedia entity. In contrast, our dataset requires grounding between the image-caption pairs to identify which objects in the image are being referred to in the question.Moreover, the images in MuMuQA, which are from news articles, capture real-world events and are hence more realistic.", "Grounding text mentions to image regions has previously been explored via cross-media attention {{cite:91b038117b1968979bbc4aeb7ebc7bf7bd4a6480}}, {{cite:3a01785778dcc2d21feb77343ed3df1550e48a5e}}, {{cite:5f2b51bebc6808b0f4b5d387631345c4980efc7d}}, {{cite:d39dcd0d674b948c43c101dcd61626692309ea1c}} or learning of an optimal transport plan {{cite:e294dc2e210fa941aaddcdd335545047221f1cbb}}, {{cite:e438352538189a88dbac3c149d0fe97e6d4c5bb7}}. Different from general text phrases, cross-media entity coreference {{cite:bcd1d6c5611bacce61701b7f1b8dde2ef84f552a}}, {{cite:0d29424e44e4d4658eac6c5dd7d663b6d56f00b1}} takes text knowledge extraction graph as input and ground the entity with graph context. We are the first to explore cross-media grounding in an extractive QA setting." ]
[]
Logarithmic Unbiased Quantization: Simple 4-bit Training in Deep Learning
Quantization of the weights and activations is one of the main methods toreduce the computational footprint of Deep Neural Networks (DNNs) training.Current methods enable 4-bit quantization of the forward phase. However, thisconstitutes only a third of the training process. Reducing the computationalfootprint of the entire training process requires the quantization of theneural gradients, i.e., the loss gradients with respect to the outputs ofintermediate neural layers. In this work, we examine the importance of havingunbiased quantization in quantized neural network training, where to maintainit, and how. Based on this, we suggest a \textit{logarithmic unbiasedquantization} (LUQ) method to quantize all both the forward and backward phaseto 4-bit, achieving state-of-the-art results in 4-bit training withoutoverhead. For example, in ResNet50 on ImageNet, we achieved a degradation of1.1\%. We further improve this to degradation of only 0.32\% after three epochsof high precision fine-tunining, combined with a variance reduction method --where both these methods add overhead comparable to previously suggestedmethods.
[ "Neural networks Quantization has been extensively investigated in the last few years. Most of the quantization research has focused on reducing the numerical precision of the weights and activations for inference (e.g., {{cite:0b01c3e03273e1599b21c39513d5cbd8aa3715ce}}, {{cite:e764e46f220440d03aa81f44a1c3322aa5eb9157}}, {{cite:a240fceddd97b24614cbc31c622f8fcf3e90197c}}, {{cite:f597ca7bf5b8cfb137eb6d1c00e6c72b0e3f1219}}, {{cite:ea876b94af8fd789e1d8f7459b99919f37f306b5}}, {{cite:6d38d64394368d37fbf9818970dd0f21be1f3467}}, {{cite:b766402e276beddb877c90aa92fe7b020f669e3b}}, {{cite:5a826979f89fd702c616cdd97ce6396d556ed5e7}}). In this case, for standard ImageNet models, the best performing methods can achieve quantization to 4 bits with small or no degradation {{cite:b766402e276beddb877c90aa92fe7b020f669e3b}}. These methods can be used to reduce the computational resources in approximately a third of the training (eq:forward). However, without quantizing the neural gradients, we cannot reduce the computational resources in the remaining two thirds of the training process (eq:backward and eq:update). An orthogonal approach of quantization is low precision for the gradients of the weights in distributed training {{cite:8206044b5bae6aa7e46214a202beaffa420809c6}}, {{cite:6d53b78cddea1f2bd4fa1d5754d3587508074746}} in order to reduce the bandwidth and not the training computational resources.", "{{cite:2947c2cea910951bb8776a15438a3776d7e82483}} suggest a systematic approach to design a full training using fixed point quantization which includes mixed-precision quantization. {{cite:63528a6a87e2c942fd0fd0fcd12deb1b6219085c}} first showed that it is possible to use INT8 quantization for the weights, activations, and neural gradients, thus reducing the computational footprint of most parts of the training process. Concurrently, {{cite:b42c6a97510e1ca8892059efa74911d54d5241b1}} was the first work to achieve full training in FP8 format. Additionally, they suggested a method to reduce the accumulator precision from 32bit to 16 bits, by using chunk-based accumulation and floating point stochastic rounding. Later, {{cite:64d3ce859963aeb81f00252975dd188c32e1d04c}} showed full training in INT8 with improved convergence, by applying a stochastic quantization scheme to the neural gradients called non-subtractive-dithering (NSD) that induce sparsity followed by stochastic quantization. Also, {{cite:b69fee6d6ce395796318e92db42e2be13c18dd72}} presented a novel hybrid format for full training in FP8, while the weights and activations are quantized to [1,4,3] format, the neural gradients are quantized to [1,5,2] format to catch a wider dynamic range. {{cite:3563e1602bb8b0be3e4771a7d39641469aed272f}} suggested a method to reduce the data traffic during the calculation of the quantization range.", "While it appears that it is possible to quantize to 8-bits all computational elements in the training process, 4-bits quantization of the neural gradients is still challenging. {{cite:1325a837346d291ec5d74e6af05654404ae2bd48}} suggested that this difficulty stems from the heavy-tailed distribution of the neural gradients, which can be approximated with a lognormal distribution. This distribution is more challenging to quantize in comparison to the normal distribution which is usually used to approximate the weights or activations {{cite:a240fceddd97b24614cbc31c622f8fcf3e90197c}}.", "{{cite:865c10276846521268659ace8ff3a717c960902b}} was the first work that presented a method to reduce the numerical precision to 4-bits for the vast majority of the computations needed during DNNs training. They use known methods to quantize the forward phase to INT4 (SAWB {{cite:b766402e276beddb877c90aa92fe7b020f669e3b}} for the weights and PACT {{cite:ea876b94af8fd789e1d8f7459b99919f37f306b5}} for the activations) and suggested to quantize the neural gradients twice (one for the update and another for the next layer neural gradient) with a non-standard radix-4 FP4 format. The use of the radix-4, instead of the commonly used radix-2 format, allows covering a wider dynamic range. The main problem of their method is the specific hardware support for their suggested radix-4 datatype, which may limit the practicality of implementing their suggested data type.", "{{cite:bdbf95b66ad86c9d37096f5caca8d195500ba068}} suggested reducing the variance in neural gradients quantization by dividing them into several blocks and quantizing each to INT4 separately. Their method requires each iteration to sort all the neural gradients and divide them into blocks, a costly operation that will affect the network throughput. Additionally, they suggested another method to quantize each sample separately. The multiple scales per layer in both methods do not allow the use of an efficient GEMM operation." ]
[]
Learning Semi-Structured Representations of Radiology Reports
Beyond their primary diagnostic purpose, radiology reports have been aninvaluable source of information in medical research. Given a corpus ofradiology reports, researchers are often interested in identifying a subset ofreports describing a particular medical finding. Because the space of medicalfindings in radiology reports is vast and potentially unlimited, recent studiesproposed mapping free-text statements in radiology reports to semi-structuredstrings of terms taken from a limited vocabulary. This paper aims to present anapproach for the automatic generation of semi-structured representations ofradiology reports. The approach consists of matching sentences from radiologyreports to manually created semi-structured representations, followed bylearning a sequence-to-sequence neural model that maps matched sentences totheir semi-structured representations. We evaluated the proposed approach onthe OpenI corpus of manually annotated chest x-ray radiology reports. Theresults indicate that the proposed approach is superior to several baselines,both in terms of (1) quantitative measures such as BLEU, ROUGE, and METEOR and(2) qualitative judgment of a radiologist. The results also demonstrate thatthe trained model produces reasonable semi-structured representations on anout-of-sample corpus of chest x-ray radiology reports from a different medicalprovider.
[ "Annotations from Radiology Reports. Most prior works have attempted to automatically detect the presence of key findings (e.g., disease diagnoses) from radiology reports {{cite:1758110f2f3fe1a161cb4f866de4bb6c5e8b3d4a}}, {{cite:e54c08266f68ac8897152cf3a1b5b5939265c972}}, {{cite:6b5952f79a1fded231bc9c0a7e6710e53475d898}}, {{cite:328d55df4dd65b2f3dfa5a8234e83fc345b1e3a8}}, {{cite:a86fe8472f004a53a1bdb5b119a9fd11f71f2f25}}, {{cite:f980a6e1c8ea90fb0abc5ddc9983c8b9991aaa59}} without much contextual information such as location and severity of diseases.On the other hand, Shin et al. {{cite:3b78cdb70e7e493f847278a9122e68d58d7add70}} trained a model that learned from both text and images to produce annotations that include both diseases and their contexts.They used only reports from the OpenI dataset that contain the 17 most frequent MeSH terms, which resulted in approximately 40% of all OpenI reports. Conversely, this paper utilizes the original OpenI corpus with manual annotations covered by 101 MeSH terms and 76 RadLex terms.", "Mapping Radiology Terms to a Pre-defined Vocabulary. Datta et al. {{cite:db81afa6929f31881c92ac64ab6d9d9049f7aaeb}} created and normalized a manually-annotated corpus of radiology reports. They mapped findings, medical devices, and procedures to the publicly available radiology lexicon-RadLex. However, some terms could not be mapped due to the lack of exact matches in RadLex.Demner-Fushman et al. {{cite:e89223c0361d5da8cb1e36394addd7ce70803e8c}} also found no exact matches of several terms from their reports to the RadLex, UMLShttps://www.nlm.nih.gov/research/umls/index.html, and MeSH lexicons. Due to the absence of publicly available annotated datasets, most of these works require human effort to annotate several thousands of reports.", "Summarization of Radiology Findings. Several text summarization methods {{cite:56fbb40bc216fb1d6be7f83a92e1bb564ef34476}}, {{cite:9e43e05a2cfcf4d9e3ad544e60ec7b39410a5c7b}}, {{cite:1a71021c2351114b743469abb8466ec728436a24}}, {{cite:6e2d7af96ddad672c3dc520bb78ec126847feb7e}} were used to summarize clinical notes {{cite:a9efbace225e050b36b958f41ea789eb2d9ae54c}}, {{cite:9bb4d6740c7c577dfb0af1e435442328b0eecf02}}, {{cite:2af2739c878f64c0485eaf559c1ae6b8d54d9921}}.Summarizing a report's Findings paragraph into an Impression paragraph was explored in {{cite:a9efbace225e050b36b958f41ea789eb2d9ae54c}}, {{cite:0f707afba4636bd5801885b136fc2117a314f951}}. On the other hand, in this paper, we study the summarization of both of these paragraphs into shorter sequences of annotation terms." ]
[]
Learning Physics Properties of Fabrics and Garments with a Physics Similarity Neural Network
In this paper, we propose to predict the physics parameters of real fabricsand garments by learning their physics similarities between simulated fabricsvia a Physics Similarity Network (PhySNet). For this, we estimate wind speedsgenerated by an electric fan and the area weight to predict bending stiffnessof simulated and real fabrics and garments. We found that PhySNet coupled witha Bayesian optimiser can predict physics parameters and improve thestate-of-art by 34%for real fabrics and 68% for real garments.
[ "Previous research on the physics properties of deformable objects can be further divided into four categories: (i) using simulation models of objects to fit real models {{cite:8a1dc60dfd0dbecd369816653e3e7a0cd2203537}}, {{cite:2c62c751abcbbee3c8e5367c31f1243d7a7ca717}}; (ii) learning model-free shape transformations given initial and goal object configurations {{cite:ec7978ecfb44e24a1886557d83513b830fe753ff}}, {{cite:f785602f22fe99ecf44c0564fc00b9e3e91fd336}}; (iii) applying external forces and observing shape changes {{cite:387adef97146ddac1212cc8469b62cfb93847dfe}}, {{cite:eaddf0ea648faa9210b464896487e2f567a08e9a}}; and, (iv) learning dynamic characteristics from videos {{cite:fa1f67908d3d4d00a612fcff69bddb04a8b0ce02}}, {{cite:0355db308d336662a9de5f54d5701d55b9f199a7}}, {{cite:f8d85be057e78b8db61c99d961be2a46300a0657}} by using knowledge learned from dynamic characteristics of simulation models on real models {{cite:d15e52a77a2098cd2566862ad196de2396c3172e}}.", "Tawbe et al. {{cite:8a1dc60dfd0dbecd369816653e3e7a0cd2203537}} proposed simulating sponges through a neural gas fitting method {{cite:3c7c72df25f1423420f5e3121b9b660ec70316e7}} rather than simulating meshes. They learnt and predicted the shapes of deformable objects without prior knowledge about the objects' material properties by applying the neural gas fitting on simplified 3D point-cloud models. These 3D point-cloud models focused on the parts of an object that had been deformed to improve learning. Their approach required a multi-step learning process to simplify the models and to find the deformed parts, but it was only tested on objects with simple geometries. Similarly, Arriola-Rios et al. {{cite:387adef97146ddac1212cc8469b62cfb93847dfe}} suggested learning materials of sponges by using a force sensor mounted on a finger in a robot gripper. The finger pressed a sponge to measure the applied force, which was then used to learn the material properties and to predict the sponge's deformation.Wang et al. {{cite:eaddf0ea648faa9210b464896487e2f567a08e9a}} proposed learning external robot-exerted forces applied on objects. For this, they devised a Generative Adversarial Network (GAN) to predict their deformed shapes and combine the objects’ visual shapes (depth images) and the force applied on the objects. Both {{cite:387adef97146ddac1212cc8469b62cfb93847dfe}} and {{cite:eaddf0ea648faa9210b464896487e2f567a08e9a}} considered learning from both the deformations of objects and the exerted forces on objects because exerted forces are an essential indicator of the physics properties as defined by the slope of the strain-stress curve {{cite:c82f49297b51e24288e4c2ad1f9c4af9e7a75bb4}} of the deformable objects. Therefore, learning these physic properties means learning the relationship between strain (deformations of objects) and stress (exerted forces).", "Guler et al.{{cite:f785602f22fe99ecf44c0564fc00b9e3e91fd336}} also aimed to learn the deformation of soft sponges but they they proposed a Mesh-less Shape Matching (MSM) approach which comprises learning linear transformations between deformed objects. Similar to {{cite:f785602f22fe99ecf44c0564fc00b9e3e91fd336}}, Simeonov et al. {{cite:ec7978ecfb44e24a1886557d83513b830fe753ff}} proposed that deformable objects can be manipulated by representing objects using cloud points, rather than object models, and calculating manipulating routes to estimate transformations between object initial and goal configurations. Model-free physics property and deformation learning does not require learning actual object physics properties but imagines how objects can be deformed when an external force acts into the object. The above methods are, however, constrained to regular patterns of shape changes.", "Bouman et al. {{cite:fa1f67908d3d4d00a612fcff69bddb04a8b0ce02}} proposed to learn the physics properties of fabrics from videos. Bouman et al. focused on fabric stiffness and their approach consisted of learning statistical features of the image's frequency domain of fabric videos and using a regression neural network to predict stiffness parameters of fabrics. Similarly, Yang et al. {{cite:0355db308d336662a9de5f54d5701d55b9f199a7}} proposed predicting the physics properties of fabrics by learning the dynamics of fabrics from videos using a CNN-LSTM network. However, these methods are constrained on fabrics with regular shapes, while our approach extends to garments with irregular and complex shapes.", "Wang et al.{{cite:2c62c751abcbbee3c8e5367c31f1243d7a7ca717}} proposed reparameterising the stiffness of fabrics as a piecewise linear function of the fabrics' strain tensor. That is, they sampled the strain tensor with principle strains (maximum and minimum normal strains) and strain angulars, combined as a matrix of 24 parameters for stretching stiffness (i.e. resistance when fabrics are stretched) and 15 parameters for bending stiffness (i.e. resistance when fabrics are bent). To measure the stiffness of the fabrics, they opted for a FEM approach that aligned simulated meshes with the fabrics. They considered that stiffness is nonlinear, making simulations and stiffness measurements more accurate. However, the FEM method requires considerable time to construct models and real-time robotic manipulation.", "Learning from simulated objects to predict the physics properties of real objects has been proposed by Runia et al. {{cite:d15e52a77a2098cd2566862ad196de2396c3172e}}. They learnt physics similarity distances between simulated fabrics and predict physics properties of real fabrics, where they decrease physics similarity distances between real and simulated fabrics by fine-tuning parameters of simulated fabrics via a Bayesian optimiser. Their approach paved the way to a novel alternative that frees a network from complicated simulation-reality approximations such as {{cite:2c62c751abcbbee3c8e5367c31f1243d7a7ca717}} and extends to regular shape fabrics, of which deformations are more complex, e.g. {{cite:8a1dc60dfd0dbecd369816653e3e7a0cd2203537}}, {{cite:387adef97146ddac1212cc8469b62cfb93847dfe}}, {{cite:eaddf0ea648faa9210b464896487e2f567a08e9a}}. Our approach is similar to {{cite:d15e52a77a2098cd2566862ad196de2396c3172e}}, but we propose to use depth information to learn the dynamics of fabrics and garments from their depth images, and opted to use a triplet loss function instead of a pair-wise contrastive loss. Compared with {{cite:d15e52a77a2098cd2566862ad196de2396c3172e}}, where they only used one material, our proposed pipeline is able to predict the physics properties of seven fabric materials and three garments." ]
[]
Improving Learning-to-Defer Algorithms Through Fine-Tuning
The ubiquity of AI leads to situations where humans and AI work together,creating the need for learning-to-defer algorithms that determine how topartition tasks between AI and humans. We work to improve learning-to-deferalgorithms when paired with specific individuals by incorporating twofine-tuning algorithms and testing their efficacy using both synthetic andimage datasets. We find that fine-tuning can pick up on simple human skillpatterns, but struggles with nuance, and we suggest future work that usesrobust semi-supervised to improve learning.
[ "Human-AI Collaboration. Collaboration between humans and machines has been explored in various domains including finance [{{cite:2fba496ab963daccb329b1e491f77695e2b6ce3a}}] and healthcare {{cite:368590efefc4cb6d5dd6bafe40271222561aaeb2}}.Collaboration is beneficial as information from both sources can be combined to make decisions [{{cite:2fba496ab963daccb329b1e491f77695e2b6ce3a}}].However, collaboration has risks, as algorithmic predictions can anchor and bias human predictions {{cite:e33b8290d27729a040115e0b671b2503e8ba1341}}.This problem is further exacerbated when AI solutions are accompanied by explanations [{{cite:5c6abc68c6889dbd78ea4495921a113e3075a9a7}}], as humans are more liable to accept explanations regardless of their veracity.However, the problem can be mitigated through the development of human mental models, which acknowledge deficits in AI performance [{{cite:8495ecb59e9a5d60eed0c15b75e576d33560a5dd}}].", "Learning to defer. One area of research within human-AI collaboration is learning to defer, where AI systems defer to humans when unsure.For classification problems, the AI system consists of a rejector, which determines whether or not to defer, and a classifier, which solves the task.One strategy is to calculate confidence scores for AI and humans, and defer based on whichever is higher [{{cite:b6bc3002e95f7ad2aa775cde4c4bfcf667390e51}}, {{cite:2f0ba959b5a914d984d37adfb298c1c871ab941a}}].However, these confidence-based approaches ignore the interconnectedness of the rejector and classifier by training the classifier independently. Ideally, the classifier should be trained to focus on tasks that are hard for humans, and to solve this, prior work has developed a joint learning algorithm to simultaneously learn a rejector and classifier through the use of a new loss function [{{cite:d5fdf4d54acd874993a010b9361eabc112e928cb}}, {{cite:ebaa01181e70cc79c8015a6c3fbc1050151d683d}}].In the case of SVMs, prior work has shown theoretically and experimentally that learning-to-defer algorithms outperform humans and machines separately [{{cite:77832a8234bc57b1feff2bf60aefcaaac5e95528}}].Extensions to the learning-to-defer approach include algorithms for multiple experts [{{cite:29eaa08d41b3eb8705fd323fd7fb7c8ebb6c4f92}}] and human-initiated deferral [{{cite:cb78409c0c6598830537fb885f6d8f48869a64fa}}].Our work most directly builds on prior work by Mozannar et al. [{{cite:ebaa01181e70cc79c8015a6c3fbc1050151d683d}}], and responds to a call from De et al. [{{cite:77832a8234bc57b1feff2bf60aefcaaac5e95528}}] to develop human-AI collaboration algorithms that can be adapted to specific humans." ]
[]
ACGNet: Action Complement Graph Network for Weakly-supervised Temporal Action Localization
Weakly-supervised temporal action localization (WTAL) in untrimmed videos hasemerged as a practical but challenging task since only video-level labels areavailable. Existing approaches typically leverage off-the-shelf segment-levelfeatures, which suffer from spatial incompleteness and temporal incoherence,thus limiting their performance. In this paper, we tackle this problem from anew perspective by enhancing segment-level representations with a simple yeteffective graph convolutional network, namely action complement graph network(ACGNet). It facilitates the current video segment to perceive spatial-temporaldependencies from others that potentially convey complementary clues,implicitly mitigating the negative effects caused by the two issues above. Bythis means, the segment-level features are more discriminative and robust tospatial-temporal variations, contributing to higher localization accuracies.More importantly, the proposed ACGNet works as a universal module that can beflexibly plugged into different WTAL frameworks, while maintaining theend-to-end training fashion. Extensive experiments are conducted on theTHUMOS'14 and ActivityNet1.2 benchmarks, where the state-of-the-art resultsclearly demonstrate the superiority of the proposed approach.
[ "Fully-supervised Temporal Action Localization.Action localization has recently attracted numerous research interests {{cite:d725a3055365f34d5f93651240cd59db356a7730}}, {{cite:1be2f9f63aea6fdc7a0f1fd41fd92a4f6d399b99}}, {{cite:6bc38bf792c84104cc3efcb68f9e7afa97cc083e}}, {{cite:57db0b1334caa964b7712ff374c9e353b49cba57}}, {{cite:1f8e93c8c15d87d24610af4c964e14e6e27a1665}}. A typical pipeline is to first generate temporal action proposals and then classify pre-defined actions based on the proposals. For example, {{cite:74f75d01c7909f5770a82f0db445eaf44cfa01b4}} proposes a Convolutional-De-Convolutional filter through temporal upsampling and spatial downsampling to precisely detect segment boundaries. {{cite:70633e79623a76cdce941ab86abdfa299e31fb81}} presents the Structured Segment Network to model the temporal structure of each action segment via a structured temporal pyramid. {{cite:20e5d27a86312aacdbff87ccb73601031b680485}} provides an end-to-end progressive optimization framework (STEP) for more effective spatial-temporal modeling.{{figure:121bff12-9c2a-41cd-8dd2-4271cc5584f1}}", "Weakly-supervised Temporal Action Localization.Regarding WTAL, only category labels for whole videos are available, without any fine-grained annotation for each action instance. To tackle this challenge, existing methods usually segment the video at equal temporal intervals, and then classify each segment by multiple instance learning. Specifically, the activation score of a segment to each category, i.e., class activation sequence (CAS), is calculated to classify the action segment. {{cite:93b71d610432bb2dc568637ca1058f532ad6ed33}} formally proposes the tasks of `weakly supervised action recognition and temporal localization' and used attention weights to exclude the video clips that do not contain actions. {{cite:3e2cdfdbe77551d8d53f481e3321ca274d01fd16}} presents BaS-Net by introducing a background class to assist training, inhibiting the activation of background frames to improve the positioning performance. {{cite:76b7c60c0d1fdd3e425d5469d73a080d5104e03b}} deliver a frame-level probability distribution model (i.e., DGAM) based on frame-level attention to distinguish action frames from background frames. BaM {{cite:a49e9709ad0f3e17f5f814814c64989a13845ed4}} is an improved variant of BaS-Net, which employs multiple instance learning to estimate the uncertainty of video frame classification and model the background frames.", "Currently, most of the existing studies focus more on developing various learning techniques to improve localization performance based on pre-extracted segment-level features. By contrast, this work emphasizes on the enhancement of the segment-level features by exploring and exploiting the spatial-temporal complementarity across segments, universally benefiting different WTAL frameworks.", "Graph-based Temporal Action Localization.Recently, some works investigate graph learning to fuse the information among related categories, multiple proposals or multiple sub-actions to infer the possible actions of a certain segment. For example, P-GCN {{cite:7be56fc2b8b97372794bed60d80af67fe602c0f8}} constructs a graph according to the distances and IoUs between proposals, aiming to adjust the category and boundary of each proposal by using context information. G-TAD {{cite:0d4be5637fc55b7c79d1a9230a5b4338a767006c}} attempts to make use of not only temporal context, but also semantic context captured through graph convolutional networks (GCN), and then temporal action detection is cast as a sub-graph localization problem. GTRM {{cite:05d068ea0e1246b284792caf46567c523f8f50e0}} employs GCN to integrate all the action segments within a certain period of time in the action segmentation task. All such efforts are made in the fully-supervised setting.", "In WTAL, {{cite:fdd1248edb7f891b97130c94306e539587953cab}} establishes a similarity graph to understand how an action appears as well as the sub-actions that comprise the action's full extent. Notably, this is essentially different from our purpose to complement and enhance features by fully mining the complementary information across segments. Moreover, they design a fixed WTAL network, while our ACGNet works as a universal module to improve various WTAL frameworks. In addition, we propose different graph designs and a novel loss function that enables the joint training of ACGNet and WTAL frameworks." ]
[]
Translational Concept Embedding for Generalized Compositional Zero-shot Learning
Generalized compositional zero-shot learning means to learn composed conceptsof attribute-object pairs in a zero-shot fashion, where a model is trained on aset of seen concepts and tested on a combined set of seen and unseen concepts.This task is very challenging because of not only the gap between seen andunseen concepts but also the contextual dependency between attributes andobjects. This paper introduces a new approach, termed translational conceptembedding, to solve these two difficulties in a unified framework. It modelsthe effect of applying an attribute to an object as adding a translationalattribute feature to an object prototype. We explicitly take into account ofthe contextual dependency between attributes and objects by generatingtranslational attribute features conditionally dependent on the objectprototypes. Furthermore, we design a ratio variance constraint loss to promotethe model's generalization ability on unseen concepts. It regularizes thedistances between concepts by utilizing knowledge from their pretrained wordembeddings. We evaluate the performance of our model under both the unbiasedand biased concept classification tasks, and show that our model is able toachieve good balance in predicting unseen and seen concepts.
[ "Generalized Zero-shot Learning (GZSL). The aim of GZSL is to train a classification model on a set of seen classes and test its performance on both seen and unseen classes {{cite:acdf493c11ab5468338274221cc11bbf42188a36}}, {{cite:50a6abb88c948cae40f45d09f30346ae88520eb4}}. The goal is to achieve good performance on both seen and unseen classes. There are mainly two streams in the research of this problem, namely deterministic and generative approaches. The deterministic approaches {{cite:98a455a316fe2451fe2ad4e80acab598a112f474}}, {{cite:703e5a0d479e455d90c7c7cb2239f33fadf9a59f}}, {{cite:e4cdede51afa70e30c40cdc1ae0e21e423b7ed8d}} try to learn a visual-semantic mapping function that maps an image feature to the semantic feature of its corresponding class (or vice versa), where classification is performed by nearest-neighbor search. The generative approaches {{cite:d3018b5cb9ba302bf19276b609f77f142b6c0fe9}}, {{cite:4217278a10188a933ea91652c40b179fb981e96f}}, {{cite:50a6abb88c948cae40f45d09f30346ae88520eb4}}, {{cite:448bead8817b89b78ccb19d1565a84cb64f596dc}}, {{cite:9723acdf282ac37d5d4011c8ee89a2f111562650}}, on the other hand, try to generate samples of unseen classes so that the zero-shot classification problem becomes a traditional classification problem with labeled data generated by the learned model.Although deterministic models are known for their simplicity and theoretical elegance, generative models {{cite:9723acdf282ac37d5d4011c8ee89a2f111562650}}, {{cite:2242513423c93f629f708773ce72130ce83cbe69}} achieve superior results at the cost of trickier training techniques brought by generative adversarial nets (GANs) {{cite:84e548782dc461f6f4153a9c79dcd377354ae57a}} and variational auto-encoders (VAEs) {{cite:d0c01133f78efad6a9e56be4e5a59b82ec997054}}.", "Compositional Zero-shot Learning (CZSL). CZSL is different from other zero-shot learning problems in that it focuses on classifying visual concepts that are composed of attributes and objects, and the large number of potential combinations as well as the contextual dependency between attributes and objects make this problem very challenging. The most naive approach is VisProd where we simply train two different classifiers for attributes and objects respectively, but this approach does not perform well due to the dependency between attributes and objects. AttrAsOp {{cite:36bdcb77a4bac0f04fb4caddfe72981146591298}} treats objects as feature vectors and attributes as matrices, and a concept feature vector is composed by multiplying an attribute matrix with an object feature vector. Although being effective, AttrAsOp still applies the same attribute matrix to different objects, which ignores the contextual dependency between them. AdvFG {{cite:cadf10d6bc6bfbc1a26cdb850e9601b9c4d41e0b}} proposes to use multi-scale visual features and adversarial training to facilitate CZSL, while our method does not depend on those techniques that are not particularly related to the task. TaskMod {{cite:05d2b6a94a13da43a455888c13e938c006a9ee0d}} uses meta-learning and proposes to use modular gating networks to predict how relevant an image is to a given concept. As we show in the experiments, TaskMod is very biased towards seen classes and has inferior performance on unseen classes if the metric is unbiased accuracy. On the other hand, our proposed method achieves good balance on both seen and unseen classes. Nan et al {{cite:91baa9704eee93971a74064f2160ac44eb6ba84e}} propose to learn an auto-encoder that trains the model to reconstruct image features with the learned concept features. HiDC {{cite:80ce4b1a46aa9b640c03d17bae68ded8806064fc}} proposes to learn subspaces for attributes and objects, and compose the concept space using features sampled from the two subspaces. However, these two works also lack an explicit mechanism to capture the contextual dependency between attributes and objects.", "{{cite:5d7e6f616c520f2983aff4b724375a50e339f6e8}} propose to use graph convoluational networks (GCN) to learn concept embeddings. In the graph, each attribute, object and concept represents an individual node, and there is an edge between an attribute/object node and a concept node if the attribute/object is used in the concept. Here they study the compositional zero-shot learning (CZSL) problem under a transductive setting, since they use the unseen attribute-object concepts to build the graph used in both training and testing, while our model dose not have access to the test concepts. Additionally, they finetune the image feature extractor along with training the GCN, while previous methods all used fixed image feature extractor.", "{{cite:876a23b03263d3d82938c4c4c4fdcbefeb8e1f36}} study the open-world setting of CZSL, where there are infeasible concepts that don't belong to either seen or unseen concepts during classification. To solve this problem, they propose to learn a feasibility score for each constructed attribute-object concept, and then use this score to calibrate the softmax logits for classification.", "{{cite:70d35d05dd17cd4a860ce54e56968ef8ed97a414}} propose a generative model to learn concept embeddings. Our method is different from theirs in that we use a deterministic approach which is easier to train than generative approaches, and we utilize the correlation between concepts in the semantic word embedding space." ]
[]
Accelerating Clique Counting in Sparse Real-World Graphs via Communication-Reducing Optimizations
Counting instances of specific subgraphs in a larger graph is an importantproblem in graph mining. Finding cliques of size k (k-cliques) is one exampleof this NP-hard problem. Different algorithms for clique counting avoidcounting the same clique multiple times by pivoting or ordering the graph.Ordering-based algorithms include an ordering step to direct the edges in theinput graph, and a counting step, which is dominated by building node oredge-induced subgraphs. Of the ordering-based algorithms, kClist is thestate-of-the art algorithm designed to work on sparse real-world graphs.Despite its leading overall performance, kClist's vertex-parallelimplementation does not scale well in practice on graphs with a few millionvertices. We present CITRON (Clique counting with Traffic Reducing Optimizations) toimprove the parallel scalability and thus overall performance of cliquecounting. We accelerate the ordering phase by abandoning kClist's sequentialcore ordering and using a parallelized degree ordering. We accelerate thecounting phase with our reorganized subgraph data structures that reduce memorytraffic to improve scaling bottlenecks. Our sorted, compact neighbor listsimprove locality and communication efficiency which results in near-linearparallel scaling. CITRON significantly outperforms kClist while countingmoderately sized cliques, and thus increases the size of graph practical forclique counting. We have recently become aware of ArbCount (arXiv:2002.10047), which oftenoutperforms us. However, we believe that the analysis included in this paperwill be helpful for anyone who wishes to understand the performancecharacteristics of k-clique counting.
[ "One of the fastest sequential algorithms for clique counting is provided by Chiba and Nishizeki {{cite:fcee7b9d5ed80e1a700934c5a527b505a73ea537}}. First, it ranks the vertices in descending order of degree. Next, it searches the induced subgraph of each vertex recursively k-2 times where k is the size of the desired clique. Once the recursion is complete, the vertex is removed from the graph to avoid duplicate work. The execution time of this algorithm is {{formula:3655999f-e532-4525-a681-cab0698d3b70}} , where m is the number of edges in the input graph and a(G) is the arboricity, i.e. the minimum number of forests into which the edges can be partitioned. While the algorithm is simple and efficient, the process of removing vertices from the graph makes it sequential and suboptimal for dealing with the massive real-world graphs of today.", "In recent years, more work has been done to parallelize clique counting to boost performance. Danisch et al. present kClist {{cite:50693fc3fe78ca4886b4aad15feccb2609b7126b}}, the current state-of-the art parallel algorithm for counting and listing cliques. KClist is able to parallelize the counting step by first converting the input graph into a directed acyclic graph (DAG). Directionalizing the graph ensures kClist counts each clique only once without resorting to sorting the vertices and then removing them one by one sequentially while counting like Chiba and Nishizeki's algorithm. KClist uses a core ordering to rank vertices for directionalizing the graph to be used in the counting phase. The algorithm for computing the core ordering from Matula and Beck{{cite:1247089a242bbbad59bebbdf069395303225536b}} guarantees the smallest maximum out-degree in the graph. This is significant, because the maximum degree determines the execution time of the counting phase and a smaller value means less algorithmic work and a more efficient algorithm.", "[H]Core Ordering[1]OrdCoreG{{formula:222ac78c-5942-4d6a-9591-8dd0f5d839db}} {{formula:5ad1b0ac-d27a-42fd-bf1b-72caa7ae2034}} Array to hold rank of each node{{formula:74f30643-6255-4d44-971d-603a9a2d9465}} Sort nodes by degree {{formula:be6d3061-d2a1-4259-a27b-2c469e2c374b}} {{formula:7ee38976-6791-4dee-88b8-d73bb191df20}} first element from sorted list{{formula:dfff48e7-87d7-4507-b659-1ff66885bcf7}} {{formula:b0cc7f91-75f3-4393-a330-1a3d09bd22a3}} Update degrees of all {{formula:71da3d80-2484-4f79-bcc3-1333d23b956c}}{{formula:65b23441-a048-47fc-9f56-27eaf2a89946}} {{formula:a14bf81c-4ca9-4eb3-aeeb-ef15d46944ef}} Build Graph {{formula:86315135-0503-41ce-a400-fb8462d1ba3d}} using {{formula:dcd0d03a-7292-4d13-be5a-bbc8d0e72814}}", "Once the ranking of each vertex is computed (Algorithm ), the graph is directionalized and edges u {{formula:b5c1d370-baed-432f-baa8-004f364594ad}} v are only included if and only if R(u) {{formula:bf2915ab-5049-4781-b919-662990f21d91}} R(v). Similar to Chiba and Nishizeki's algorithm, producing the core ordering is also sequential since it requires removing a vertex from the graph in each iteration.", "After the DAG is generated, kClist starts counting the cliques (Algorithm ). It recursively builds subgraphs until a certain depth and then adds up the degrees of vertices in the last recursion layer. Since the DAG is not being modified any further, each vertex can be processed in parallel to reduce execution time.", "[H]kClist Algorithm for Counting k-cliques[1]{{formula:9fd93ad0-c8b2-4b9c-a895-a0f9a67f3b39}} {{formula:4b874100-19fa-4b67-af9d-b286d84d7d28}} OrdCore({{formula:e2602586-da49-44a1-835b-908d3d09c34a}} ) Directionalize input graphCounting(k, {{formula:c57ca445-e1d4-4ce5-b810-0210cfe97bee}} , n)Countingl, {{formula:d4dbdd78-5bd8-4d76-8ab1-d0a95066ed32}} , countl {{formula:d39f0f5f-73a5-439f-8fb0-b21e811c4d64}} 2nodes in {{formula:84959e57-f298-478d-b5a3-41c723b678da}} {{formula:7202a732-bca8-4411-84a1-575b9b58bef5}} nodes {{formula:149a217e-d67a-44e4-a7a5-bfebf5da08fa}} V({{formula:ba0fe073-d390-49f2-8a8d-707f8e9f83cb}} ) in parallelBuild subgraph {{formula:037ac1d6-313e-4f51-ab81-2b5e8826ca0b}} Counting(l-1, {{formula:ad2eeff0-bcf6-46c4-b3ee-52346bc0797a}} , count){{formula:6f888a55-0add-45f9-874c-a5cda66a5b0a}}", "The worst case execution time for kClist is {{formula:4fe0e1ab-6abc-4627-b89c-7048c6b2be84}} , where c(G) is the core value, i.e. the smallest maximum out-degree generated by ordering the vertices. Since c(G) {{formula:25ce6434-2370-4ff4-a439-407eea82643f}} 2a(G)-1, this is an improvement in the execution time over Chiba and Nishizeki for large values of k even without considering parallelization.", "Finocchi et al. {{cite:d1e0f32104b3d8e674e04ba88bf5f0c0d969355f}} present a scalable algorithm for counting k-cliques using the MapReduce framework. They use a degree ordering to direct the graph. More recently, Shi et al. {{cite:bcb01d87f8dda6a86467864e42f5938db70dfc00}} present Arb-Count, a new work-efficient parallel algorithm with polylogarithmic span. Aside from the core and degree ordering, they also implement the Barenboim-Elkin {{cite:eb572b2483f4635aa8784ea2ef9b4101edc4c97d}} and Goodrich-Pszona {{cite:8346d3204cd614796eb0d9e9d39d941c84457fda}} orderings. Jain and Seshadhri present Pivoter {{cite:cbf5270f5591c0e1f53fd5153343e3d24921c516}}, the leading pivoting-based algorithm for k-clique counting. Their algorithm compresses the recursion tree and stores the canonical form as a Succint Clique Tree (SCT), eliminating the need for ordering the graph. Lastly, Almasri et al. {{cite:7bec7210d76662299f5fda3e32f28625c0a7791f}} implement ordering and pivoting-based k-clique counting algorithms on GPUs. Aside from the aforementioned dedicated solvers, various GPM frameworks {{cite:37dca8283d62be131321429848a1fe9c9665e229}}, {{cite:24065f03e4502701d65100093bfbf4ab1580af92}}, {{cite:4bf8e6e0782002733b6ede47ad72785772c6f887}}, {{cite:a7b17484b1a803c41d4fe5e507544f601d833b51}} are also capable of counting cliques in large graphs. Peregrine {{cite:24065f03e4502701d65100093bfbf4ab1580af92}} is a pattern-aware framework, meaning it can avoid expensive computation by only exploring relevant subgraphs. Peregrine achieves this by analyzing the input pattern (i.e., k-cliques) to develop a search plan and use it to traverse the graph." ]
[]
Continuous-Time Video Generation via Learning Motion Dynamics with Neural ODE
In order to perform unconditional video generation, we must learn thedistribution of the real-world videos. In an effort to synthesize high-qualityvideos, various studies attempted to learn a mapping function between noise andvideos, including recent efforts to separate motion distribution and appearancedistribution. Previous methods, however, learn motion dynamics in discretized,fixed-interval timesteps, which is contrary to the continuous nature of motionof a physical body. In this paper, we propose a novel video generation approachthat learns separate distributions for motion and appearance, the formermodeled by neural ODE to learn natural motion dynamics. Specifically, we employa two-stage approach where the first stage converts a noise vector to asequence of keypoints in arbitrary frame rates, and the second stagesynthesizes videos based on the given keypoints sequence and the appearancenoise vector. Our model not only quantitatively outperforms recent baselinesfor video generation, but also demonstrates versatile functionality such asdynamic frame rate manipulation and motion transfer between two datasets, thusopening new doors to diverse video generation applications.
[ "Video Generation from Random Noise.The goal of unconditional video generation is to learn a mapping function that generates a realistic video given a random noise vector.Existing approaches tried to decompose a video into several independent components.In an earlier study, VGAN {{cite:66674d8a9f8d9f1c0083b87e9ec9643af3afb049}} decomposed a video into a foreground object and a background during video synthesis.In addition, TGAN {{cite:76cfa3fc783db73772dc444cf5fa497a33260426}} tried to split each frame into a fast and slow part.MoCoGAN {{cite:14f728fc33cee66852872a9936569c34a13051b4}} was the first approach to divide the video signal into appearance and motion.Lastly, G{{formula:7d98a77d-ffb6-43c9-9163-744eefec9788}} AN {{cite:e1aa9433ce737a5621c2b48c5ca4b3cb06ca7d82}} proposed a three-stream video generator to promote the disentanglement of appearance and motion to improve video quality.Our work is distinguished from previous approaches by learning completely independent density functions for motion and appearance where the former is modeled in continuous-time via neural ODE.This choice or architecture enables not only improved video quality with smooth motion dynamics in arbitrary frame rates, but also transferring motion from one dataset to another.", "Conditional Video Generation with Additional Input.Generating videos with the additional inputs such as semantic segmentation {{cite:cd46e186e55cdacc516ed46a0d2b7376269c4bb7}}, {{cite:1ba461782564927480e65785a770cd115cdb5d69}}, {{cite:ab1dab9407dfac43fb77db75fcacb8b825ce3ba0}}, pose keypoints {{cite:5693f14822804d7773494ac584fd6f0d0886002a}}, {{cite:7e66972cc73c87ae21574964d58f8430e405719f}}, {{cite:ae1655585902c0b509115ded0993948c1ee584e6}} relates to learning the marginal distributions instead of modeling the joint distributions {{cite:8f7902a11713d58a843700ab57a073f732a7fa81}}.There exist a large body of work, where given a single video frame {{cite:e4e8aef9feb98d20178506e3886c1196efc56b4c}}, {{cite:f373795f0f31ff5ea1bf7373a6d93b0f281cabdc}}, {{cite:74361d2d70dad58b1f132742213ea83446526887}} or a sequence of frames {{cite:ac66c9f946a7445bed3b9db2a87201d26438cb29}}, {{cite:6aa065f40032b984dc6e720e62982b6ccf28ec0e}}, {{cite:abf46376cf698fc4290a63bf1fc4db78092bcfd1}}, the model predicts the in-between frames or future frames.Some works among them are related to our work in that they predict video frames by extracting the pose keypoints from an input image {{cite:e4e8aef9feb98d20178506e3886c1196efc56b4c}}, {{cite:74361d2d70dad58b1f132742213ea83446526887}}.Although these works for conditional video generation also handle video data, our contribution lies in learning separate density functions for motion and appearance, rather than making predictions given an initial video frame(s).", "Neural ODE.Neural ODEs {{cite:2bc62618f5d31134e00d87682c07b67bb13441df}} represent one of the continuous-depth deep learning models which employ a neural network to model the dynamics (i.e., vector field) of the latent state.Equipped with widely used numerical solvers such as Runge-Kutta and Dormand–Prince method, neural ODE has the capacity to express the latent state in continuous-depth, or equivalently continuous-time.The continuous nature of neural ODE paved a way to design the continuous time-series modeling as shown in following studies {{cite:b24dd06b6fb3831470c92b53babaeb919c7bdb59}}, {{cite:3dd2090c46ef197f73af3bea5cab92cc244c2ec4}}, {{cite:fc674d45412d29d2dc81815f371bc42e2ca2aa02}}, {{cite:c5de6de7b70cf38d0066c56b673dc97f9e54415e}}, {{cite:c9d1a181e3a138fe4251725a1aa3a70d5d166c59}}.Latent ODE {{cite:b24dd06b6fb3831470c92b53babaeb919c7bdb59}} introduced ODE-RNN as an encoder and demonstrated the effectiveness of handling the time-series data taken at non-uniform intervals.Furthermore, ODE{{formula:bfb59fc8-7c11-4041-ae0f-e15031ce5ec8}} VAE {{cite:3dd2090c46ef197f73af3bea5cab92cc244c2ec4}} and Vid-ODE {{cite:c9d1a181e3a138fe4251725a1aa3a70d5d166c59}} performed continuous-time video prediction conditioned on input video frames, demonstrating the potential to apply neural ODE to computer vision." ]
[]
Load-balanced Gather-scatter Patterns for Sparse Deep Neural Networks
Deep neural networks (DNNs) have been proven to be effective in solving manyreal-life problems, but its high computation cost prohibits those models frombeing deployed to edge devices. Pruning, as a method to introduce zeros tomodel weights, has shown to be an effective method to provide good trade-offsbetween model accuracy and computation efficiency, and is a widely-used methodto generate compressed models. However, the granularity of pruning makesimportant trade-offs. At the same sparsity level, a coarse-grained structuredsparse pattern is more efficient on conventional hardware but results in worseaccuracy, while a fine-grained unstructured sparse pattern can achieve betteraccuracy but is inefficient on existing hardware. On the other hand, some modern processors are equipped with fast on-chipscratchpad memories and gather/scatter engines that perform indirect load andstore operations on such memories. In this work, we propose a set of novelsparse patterns, named gather-scatter (GS) patterns, to utilize the scratchpadmemories and gather/scatter engines to speed up neural network inferences.Correspondingly, we present a compact sparse format. The proposed set of sparsepatterns, along with a novel pruning methodology, address the load imbalanceissue and result in models with quality close to unstructured sparse models andcomputation efficiency close to structured sparse models. Our experiments showthat GS patterns consistently make better trade-offs between accuracy andcomputation efficiency compared to conventional structured sparse patterns. GSpatterns can reduce the runtime of the DNN components by two to three times atthe same accuracy levels. This is confirmed on three different deep learningtasks and popular models, namely, GNMT for machine translation, ResNet50 forimage recognition, and Japser for acoustic speech recognition.
[ "Many network pruning methods have been proposed in order to reduce the number of non-zero values in a neural network {{cite:8d2f68a2f1dfa0234e5775c0aa4ed379d6b9eb49}}, {{cite:f635d97d936263ecef675ed13087f1797441c076}}.A magnitude-based iterative pruning method for irregular sparse patterns is proposed in {{cite:47c91093823845ee474aafe1183902385bfdeb4b}}. {{formula:a6c1b1fc-cd62-4998-9868-4ff9d16bf311}} -based regularization and its {{formula:f73a9f6d-e04b-4be8-9913-04fd9fdec242}} relaxation methods are proposed in  {{cite:5f31d81808448fa553ba75a9d4e32b8c71f2cc90}} and {{cite:11c6dc2c5c0592d6bc489bd1b47aa62b54203233}}. Other methods closely related to optimization theory are proposed to improve the sparsity on {{formula:f44d2276-e00a-4898-95cc-be35ba85ee71}} regularization in {{cite:457f27f30bad5baac77b8f9ee5a23eac5219d10e}}, {{cite:34fdcf98aebfba5a2d6fd8f224470ec130952ed9}}. Structured pruning is more friendly to accelerators at the cost of model accuracy. For example, rows and columns in matrix-matrix multiplications can be removed by filter-wise pruning and shape-wise pruning {{cite:11c6dc2c5c0592d6bc489bd1b47aa62b54203233}}.", "In previous works, maintaining accuracy and hardware-friendly sparse patterns are not both achievable.The sparsity patterns we propose in this paper can achieve the accuracy of irregular pattern while being more hardware friendly.", "On the hardware side, fine-grained structured sparsity has gained a lot of attraction recently.Similarly, The NVIDIA A100 GPU {{cite:2103cca306fa14c255c120cc53006247c5084a8a}} achieves 50% sparsity by choosing two out of every four elements. The density-adaptive regular-block pruning method is proposed in {{cite:24b4215f82f98d10331e80f695ae9c60a8fa1dd4}} and has achieved higher sparsity levels on custom hardware. Bank balanced pruning method is proposed in {{cite:4824c28af07aebb8fc83d2c7a9ee5f654c914bd6}}, focusing on spMV computation.Those works, however, are built on custom hardware accelerators. They explore sparsity among neighboring elements and are difficult to extend varying sparsity to an entire weight matrix row or an entire convolution filter.They also only focus on reducing the load imbalance along the reduction dimension (i.e. the horizontal pattern). In our work, we explore load imbalance in several different dimensions (e.g. horizontal, vertical, hybrid, scatter) across several weight matrix rows or convolution filters.Our work is built on existing common modules in processors and DSPs, which is easier to be adopted." ]
[]
Hybrid Modeling of Regional COVID-19 Transmission Dynamics in the U.S
The fast transmission rate of COVID-19 worldwide has made this virus the mostimportant challenge of year 2020. Many mitigation policies have been imposed bythe governments at different regional levels (country, state, county, and city)to stop the spread of this virus. Quantifying the effect of such mitigationstrategies on the transmission and recovery rates, and predicting the rate ofnew daily cases are two crucial tasks. In this paper, we propose a hybridmodeling framework which not only accounts for such policies but also utilizesthe spatial and temporal information to characterize the pattern of COVID-19progression. Specifically, a piecewise susceptible-infected-recovered (SIR)model is developed while the dates at which the transmission/recover rateschange significantly are defined as "break points" in this model. A novel anddata-driven algorithm is designed to locate the break points using ideas fromfused lasso and thresholding. In order to enhance the forecasting power and todescribe additional temporal dependence among the daily number of cases, thismodel is further coupled with spatial smoothing covariates and vectorauto-regressive (VAR) model. The proposed model is applied to several U.S.states and counties, and the results confirm the effect of "stay-at-homeorders" and some states' early "re-openings" by detecting break points close tosuch events. Further, the model provided satisfactory short-term forecasts ofthe number of new daily cases at regional levels by utilizing the estimatedspatio-temporal covariance structures. They were also better or on par withother proposed models in the literature, including flexible deep learning ones.Finally, selected theoretical results and empirical performance of the proposedmethodology on synthetic data are reported which justify the good performanceof the proposed method.
[ "A number of epidemic models have been developed to analyze and predict COVID-19 transmission dynamics.Mathematical models, such as the class of susceptible-infectious-recovered (SIR) models are widely used to model and forecast epidemic spreads.{{cite:8501419cf1f78b462e689b6225052d9ca51f05af}} proposed a time-dependent SIR model and tracked transmission and recovery rates at each time point by employing ridge regression while {{cite:cf5ba1f0092670b8340d1c70162c267e408a29d3}} proposed a discrete-time susceptible-infectious-recovered-dead (SIRD) model and provided estimations of the basic reproduction number ({{formula:6a66b527-2717-4808-80d1-da7b208ebd15}} ), and the infection mortality and recovery rates by least squares method.Moreover, {{cite:c512f40e6b8d107125757ddca319e5c7608c8a2f}} and {{cite:7ce6c1955cd887815c4bd4dee4033a0df1f89277}} built an extended SIR model with time-varying transmission rates and implemented a Markov Chain Monte Carlo algorithm (MCMC) to obtain posterior estimates and credible intervals of the model parameters.", "A number of models focused on identifying a change in the parameters of the underlying model employed. For example,{{cite:1786d0362ff76909b0af7299afdaa6f1b8fa6a74}} combined the widely used SIR model (see Section ) with Bayesian parameter inference through MCMC algorithms, assuming a time-dependent transmission rate. Instead of directly estimating a change point in the transmission rate and the other parameters in the SIR model, they assumed a fixed value on the number of the change points, and imposed informative prior distributions on their locations, as well as the transmission rate based on information from intervention policies. Further, {{cite:277360937aacb735026060822cebf2a6b0fb01b6}} proposed to model the time series of the log-scaled cumulative confirmed cases and deaths of each country via a piecewise linear trend model. They combined the self-normalization (SN) change-point test with the narrowest-over-threshold (NOT) algorithm {{cite:0495727d18ebb7e2f112b24991a454377c243d76}} to achieve multiple change-point estimation. Moreover, {{cite:f8b7902442f31390628c56e5109d11dd51bbe3d7}} and {{cite:5297f48f0cfa4849d573db35b91ec2ec944e1ca7}} analyzed the effect of social distancing measures adopted in Europe and the United States, respectively, using an interrupted time series (ITS) analysis of the confirmed case counts. Their work aim to find a change point in the time series data of confirmed cases counts for which there is a significant change in the growth rate.In {{cite:f8b7902442f31390628c56e5109d11dd51bbe3d7}}'s paper, the change points were determined by linear threshold regression models of the logarithm of daily cases while {{cite:5297f48f0cfa4849d573db35b91ec2ec944e1ca7}} used an algorithm developed in {{cite:16021a79335bf59b62e158278c194e09458e548d}}, based on an {{formula:9f77ce7b-741a-4d9b-aa03-f35313cc356a}} penalty on changes in slope to identify the change points. Finally, {{cite:265bf7389f239699bf8b442984daba214e6a9b62}}utilized a branching process for modeling and forecasting the spread of COVID-19.", "Another line of work employed spatio-temporal models for parameter estimation and forecasting the spread of COVID-19. For example, {{cite:295b5eac56e35b5121e36adcd6517297c01ea164}} introducedan additive varying coefficient model and coupled it with a non-parametric approach for modeling the data, to study spatio-temporal patterns in the spread of COVID-19 at the county level. Further, {{cite:6f9b88f7fb03c776e3ab6ce116604e57675f6ff6}} proposed a heterogeneous infection rate model with human mobility from multiple regions and trained it using weighted least squares at regional levels while {{cite:7efa2fe2bb1ab6a67863a911121eba3322f1ab94}} fitted a generalized additive model (GAM) to quantify the province-specific associations between meteorological variables and the daily cases of COVID-19 during the period under consideration.", "In addition to mathematical methods, many machine learning/deep learning methods were applied for forecasting of COVID-19 transmission. For example,{{cite:39d768abb364c7f6a2641a30dfc861de1b6cc553}}and {{cite:50122b42b2c2de7b77713596da4fdfa90fca653d}} employed Artificial Neural Networks (ANN) and Long Short-Term Memory (LSTM) type deep neural networks to forecast future COVID-19 cases in Iran and Canada, respectively, while {{cite:424832b6f222cc3e2120e8262d19a726973c0268}} developed a modified stacked auto-encoder for modeling the transmission dynamics of the epidemic. Review paper {{cite:8ec5334a03810d4edc57b3dd4b90c139bfd2c409}} presents a summary of recent COVID-19 forecasting models.", "The previous brief overview of the literature indicates that there are two streams of models, the first mechanistic and the second statistical in nature. The former (SIR/SIRD) describe key components of the transmission chain and its dynamics and have proved useful in assessing scenarios of the evolution of a contagious disease, by altering the values of key model parameters. However, they are macroscopic in nature and can not easily incorporate additional information provided either by mitigation strategies or other features, such as movement of people assessed through cell phone data. Statistical models can easily utilize such information in the form of covariates to improve their forecasting power. However, they primarily leverage correlation patterns in the available data, that may be noisy, especially at more granular spatio-temporal scales (e.g., county or city level) that are of primary interest to public health officials and policy makers.", "To that end, this paper aims to develop an interpretable hybrid model that combines a mechanistic and a statistical model, that respects the theoretical transmission dynamics of the former, but also incorporates additional spatio-temporal characteristics resulting in improved forecasting capabilities at fairly granular spatio-temporal scales.", "Specifically, we analyze confirmed cases and deaths related to COVID-19 from several states and counties/cities in the United States from March 1st, 2020 to March 31st, 2021. In the absence of non-pharmaceutical interventions, the spread of COVID-19 can be modeled by a SIR model with fixed transmission and recovery rates. One of the main reasons to select that model as the building block for the proposed methodology is that the transmission and recovery rates are easy to interpret and hence can be used in policy decision making. However, many diverse mitigation policies were put in place at different regional levels in the U.S. Thus, the simple SIR model may not be a good fit for the data. Instead, we propose a piecewise stationary SIR model (Model 1), i.e. the SIR model parameters may change at certain (unknown) time points. Such time points are defined as “break (change) points\". Unlike some other methods discussed in the literature review, in our modeling framework, the number of change points and their locations are assumed to be unknown and must be inferred from the data. Such flexibility on the modeling front allows inferring potentially different temporal patterns across different regions (states or counties), and yields a data-driven segmentation of the data which subsequently improves the fit (see more details in Section ), but also complicates the model fitting procedures. To that end, a novel data-driven algorithm is developed to detect all break points, and to estimate the model parameters within each stationary segment. Specifically, we define certain time blocks and assume the model parameters are fixed during each block of time points. Then, a fused lasso penalty is used to estimate all model parameters {{cite:978c156091b97a50e1e51e845a771a81f5088530}}. This procedure is further coupled with hard-thresholding and exhaustive search steps to estimate the number and location of change points (details provided in Section ). To enhance the forecasting power of the model and to capture additional spatial and temporal dependence not explained through the SIR model, the piecewise constant SIR model is coupled with spatial smoothing (Model 2) and time series components (Model 3). The former is accomplished through the addition of a spatial effect term which accounts for the effect of neighboring regions, while the latter through a Vector Auto-Regressive (VAR) component to capture additional auto-correlations among new daily cases and deaths. Capturing the spatio-temporal dependence through Model 3 aids in reducing the prediction error significantly (sometimes around 80%) compared to the piecewise SIR model which confirms the usefulness of a hybrid modeling framework (for more details see Section ). To verify the applicability of the proposed methodology to other data sets with similar characteristics, the developed algorithm is tested over several simulation settings and exhibits very satisfactory performance (details in Section ) and some theoretical properties of the proposed method (prediction consistency, as well as detection accuracy) are established in Appendix .", "The remainder of the paper is organized as follows. In Section , proposed statistical models are introduced and data-driven algorithms are described to estimate their parameters. The proposed algorithms are tested on various simulation settings and the results are reported in Section . The proposed models are applied to several U.S. states and counties and the results are described in Section . Finally, some concluding remarks are drawn in Section ." ]
[]
More is Less: Inducing Sparsity via Overparameterization
In deep learning it is common to overparameterize neural networks, that is,to use more parameters than training samples. Quite surprisingly training theneural network via (stochastic) gradient descent leads to models thatgeneralize very well, while classical statistics would suggest overfitting. Inorder to gain understanding of this implicit bias phenomenon we study thespecial case of sparse recovery (compressed sensing) which is of interest onits own. More precisely, in order to reconstruct a vector from underdeterminedlinear measurements, we introduce a corresponding overparameterized square lossfunctional, where the vector to be reconstructed is deeply factorized intoseveral vectors. We show that, if there exists an exact solution, vanillagradient flow for the overparameterized loss functional converges to a goodapproximation of the solution of minimal $\ell_1$-norm. The latter iswell-known to promote sparse solutions. As a by-product, our resultssignificantly improve the sample complexity for compressed sensing via gradientflow/descent on overparameterized models derived in previous works. The theoryaccurately predicts the recovery rate in numerical experiments. Our proofrelies on analyzing a certain Bregman divergence of the flow. This bypasses theobstacles caused by non-convexity and should be of independent interest.
[ "Before continuing with the main body of the work, let us give a brief overview over related results in the literature. As already mentioned before, the works {{cite:a58848b1c5778396efcee58a085d9e07a1c76b2a}}, {{cite:c010388ec50b9c89a36127e11b5374e674421903}} derive robust reconstruction guarantees for gradient descent and the compressed sensing model (REF ). Robust means here that their model incorporates additive noise on {{formula:b1de2f35-83de-4fa8-b541-052db6fecd0e}} . Whereas {{cite:c010388ec50b9c89a36127e11b5374e674421903}} considers {{formula:465f6a54-f7bb-4e2e-a714-9d477311c546}} and {{formula:131aca6b-7e02-4f4a-8f84-f448537bb4c1}} having a restricted isometry property, {{cite:a58848b1c5778396efcee58a085d9e07a1c76b2a}} extends the results to {{formula:a38998aa-4003-4c6c-8aa5-526a89f35a61}} under a coherence assumption for {{formula:29e8ebde-ba56-4c18-b5a6-d063310bb778}} .", "In {{cite:9999ac1a50cd898f559882e19b0db9f81c54b93b}} the authors examine the limits of gradient flow when initialized by {{formula:2a8ae7e9-49bd-4e38-983d-dd4af8ef9ade}} , for any {{formula:fcc38413-6174-4cc1-9239-ca8b19911610}} . They can show that for large {{formula:3e79f2d6-024c-4b4a-9a58-a91b5ea80105}} the limit of gradient flow approximates the least-square solution, whereas for {{formula:469161f7-8761-46dc-bc91-2bb81c5b09b9}} small it approximates an {{formula:ea82f555-b88a-4fe4-a351-f603e5cd9913}} -norm minimizer.This paper is maybe most related to our work. Whereas the authors discuss more general types of initialization, their proof strategy is fundamentally different from ours and has certain shortcomings. They need to assume convergence of the gradient flow and obtain only for {{formula:cfcbf251-808c-401d-bda8-41da189cf0ec}} non-asymptotic bounds on the initialization magnitude required for implicit {{formula:bf6ee7f9-c98e-46e5-9df8-b11e46d09303}} -regularization. In contrast, we show convergence of gradient flow under mild assumptions on {{formula:978f7dce-c13d-409d-bfea-8b1dc84e2769}} and provide non-asymptotic bounds for all {{formula:f553a8ba-d8d2-4741-8b9b-138248eb3519}} leading to less restrictive assumptions on the initialization magnitude.", "The connection between factorized overparametrization and {{formula:d5c878a7-791f-4997-b016-a0f6d2017fe6}} -minimization was also observed in statistics literature. In {{cite:42e4e9bd558283f2a909e0a83dd23b57879e87d9}} the author shows that solving the LASSO is equivalent to minimizing an {{formula:585b8058-750b-4692-aa81-f60c155b9b9e}} -regularized overparametrized functional (for {{formula:7277d52f-ea32-499d-b954-823633f7da7d}} ) and uses this to solve LASSO by alternating least-squares methods. Although deeper factorizations are considered as well in the paper, the presented approach leads to different results since the overparametrized functional is equivalent to {{formula:4417bc14-c37e-488b-8cc2-a3af2aa94b33}} -norm and not {{formula:cc435b3e-cb52-4484-a4ed-305589e9bf0c}} -norm minimization, for {{formula:78aed11a-a08b-49e4-aa8b-27458347a87d}} . The subsequent work {{cite:ace061500e59bc4ed594f4eeb00a923590f66b21}} builds upon those ideas to perform sparse recovery with gradient descent assuming a restricted isometry property of {{formula:147b7a6c-ebb7-4ecb-afa0-b8152b30c663}} . Nevertheless, the presented results share the suboptimal sample complexity of {{cite:c010388ec50b9c89a36127e11b5374e674421903}}, {{cite:a58848b1c5778396efcee58a085d9e07a1c76b2a}}.", "Apart from these closely related works, which treat the reconstruction of sparse vectors, another line of research deals with factorization/reconstruction of matrix-valued signals via overparametrization. The corresponding results are of a similar flavor and show an implicit low-rank bias of gradient flow/descent when minimizing factorized square losses {{cite:7de290124b2d8efe9d15f34820afc5d33a914d36}}, {{cite:d862c8b9079a5dfe1136bd7b3bb7641e911e8d13}}, {{cite:4f1f9dbe9be6f4fe67c917d818794e6952919d88}}, {{cite:143610ff3efa6e9ed94106629fed95500dc3edb6}}, {{cite:dd5279ecc0914a71c9abffe46663ea8fd798b586}}, {{cite:98bbfaee5ad09a2cc0d5ed1ea6fb8af51be4e845}}, {{cite:9b27d41b7b5e519f9c66dcb89bbeebc587c90b07}}, {{cite:923a6322d160484725e02b54cc6603387015313a}}, {{cite:224679b0dba0a5017e8e6f97a3872a47c00aa3f3}}, {{cite:e9f8ed6c06521db3d2167b42a15cf545f81d0146}}, {{cite:675ba231a7ee1765568a451de764b7e44fe5bbdc}}, {{cite:76c0ef1adbebeec147272238cbe570aa3973d950}}, {{cite:c286ea52697c58f84cd53eb939c28d32b6f84450}}. It is noteworthy that the existing matrix sensing results, e.g., {{cite:c286ea52697c58f84cd53eb939c28d32b6f84450}}, require {{formula:ec4313d1-ef24-4165-8211-1646dbe683b1}} measurements to guarantee reconstruction of rank-{{formula:5ec6f9a3-0b1b-47dc-b59f-f60c562b1686}} {{formula:e3d894da-1c93-4adb-b823-a74a3bba2903}} -matrices via gradient descent, i.e., they share the suboptimal sample complexity of {{cite:c010388ec50b9c89a36127e11b5374e674421903}}, {{cite:a58848b1c5778396efcee58a085d9e07a1c76b2a}}. For comparison, for low-rank matrix reconstruction by conventional methods like nuclear-norm minimization, only {{formula:8a89b921-ad11-43a7-8cb6-a49cb01dc27b}} measurements are needed. For a more detailed discussion of the literature on matrix factorization/sensing via overparametrization, we refer the reader to {{cite:4f1f9dbe9be6f4fe67c917d818794e6952919d88}}." ]
[]
On Cross-Lingual Retrieval with Multilingual Text Encoders
In this work we present a systematic empirical study focused on thesuitability of the state-of-the-art multilingual encoders for cross-lingualdocument and sentence retrieval tasks across a number of diverse languagepairs. We first treat these models as multilingual text encoders and benchmarktheir performance in unsupervised ad-hoc sentence- and document-level CLIR. Incontrast to supervised language understanding, our results indicate that forunsupervised document-level CLIR -- a setup with no relevance judgments forIR-specific fine-tuning -- pretrained multilingual encoders on average fail tosignificantly outperform earlier models based on CLWEs. For sentence-levelretrieval, we do obtain state-of-the-art performance: the peak scores, however,are met by multilingual encoders that have been further specialized, in asupervised fashion, for sentence understanding tasks, rather than using theirvanilla 'off-the-shelf' variants. Following these results, we introducelocalized relevance matching for document-level CLIR, where we independentlyscore a query against document sections. In the second part, we evaluatemultilingual encoders fine-tuned in a supervised fashion (i.e., we learn torank) on English relevance data in a series of zero-shot language and domaintransfer CLIR experiments. Our results show that supervised re-ranking rarelyimproves the performance of multilingual transformers as unsupervised baserankers. Finally, only with in-domain contrastive fine-tuning (i.e., samedomain, only language transfer), we manage to improve the ranking quality. Weuncover substantial empirical differences between cross-lingual retrievalresults and results of (zero-shot) cross-lingual transfer for monolingualretrieval in target languages, which point to "monolingual overfitting" ofretrieval models trained on monolingual data.
[ "Self-Supervised Pretraining and Transfer Learning. Recently, research on universal sentence representations and transfer learning has gained much traction. InferSent {{cite:2f629dec746868814df0c4fe8544014fc6bccc2b}} transfers the encoder of a model trained on natural language inference to other tasks, while USE {{cite:e0c25256ee6aa2c325fcbb0d379505c594b2c91e}} extends this idea to a multi-task learning setting. More recent work explores self-supervised neural Transformer-based {{cite:f5147793fe1a044e27c008c1f49b2859e19fd081}} models, all based on (causal or masked) language modeling (LM) objectives, such as BERT {{cite:2e039b62f759c6b6731422773b9ca40822f6f8c9}}, RoBERTa {{cite:35f817d464d8ecfe157c11c1e4db42d946ea638b}}, GPT {{cite:f3feb278df7bef9705054f1512dbe2cad0de13b5}}, {{cite:6f7374aee427f7c40ff78c4714c89f2231ac570e}}, and XLM {{cite:1a96b46e0e3d6b0f511e7ff444c50c7ee26b4316}}.Note that self-supervised learning can come in different flavors depending on the training objective {{cite:b7faca3af05b9b894d60823aaec574b9911216f5}}, but language modeling objectives still seem to be the most popular choice. Results on benchmarks such as GLUE {{cite:b2076f4598c6655dbbfcbe8370ddf397d0e6fb8d}} and SentEval {{cite:660a01e1a4dfccd546da0f8d61b362ad6c4f06e6}} indicate that these models can yield impressive (sometimes human-level) performance in supervised Natural Language Understanding (NLU) and Generation (NLG) tasks. These models have become de facto standard and omnipresent text representation models in NLP. In supervised monolingual IR, self-supervised LMs have been employed as contextualized word encoders {{cite:55e1da73dcc18a1fba4f524913879952f94fbb7e}}, or fine-tuned as pointwise and pairwise rankers {{cite:967f639b989e4ec56460c8061a9a669d365e3cdc}}.", "Multilingual Text Encoders based on the (masked) LM objectives have also been massively adopted in multilingual and cross-lingual NLP and IR applications. A multilingual extension of BERT (mBERT) is trained with a shared subword vocabulary on a single multilingual corpus obtained as concatenation of large monolingual data in 104 languages. The XLM model {{cite:1a96b46e0e3d6b0f511e7ff444c50c7ee26b4316}} extends this idea and proposes natively cross-lingual LM pretraining, combining causal language modeling (CLM) and translation language modeling (TLM).In CLM, the model is trained to predict the probability of a word given the previous words in a sentence. TLM is a cross-lingual variant of standard masked LM (MLM), with the core difference that the model is given pairs of parallel sentences and allowed to attend to the aligned sentence when reconstructing a word in the current sentence. Strong performance of these models in supervised settings is confirmed across a range of tasks on multilingual benchmarks such as XGLUE {{cite:9dea62a51c3304aa4a4a4a2c8671859b5488d0b0}} and XTREME {{cite:112fb8d9629211bdadde23ce0157665332d26ca5}}. However, recent work {{cite:a17ecc881b5b0ebc47bbf76ef8a40141ddc78924}}, {{cite:decfbf96dcc38a268913ff499f0194119dc94ea1}} has indicated that these general-purpose models do not yield strong results when used as out-of-the-box text encoders in an unsupervised transfer learning setup. We further investigate these preliminaries, and confirm this finding also for unsupervised ad-hoc CLIR tasks.", "Multilingual text encoders have already found applications in document-level CLIR. Jiang et al. {{cite:2fc385e5afcaaedf06d18ff167551b6498fec941}} use mBERT as a matching model by feeding pairs of English queries and foreign language documents. MacAvaney et al. {{cite:492bd6f2775a218eb3d9d6f664489868bed2e74e}} use mBERT in a zero-shot setting, where they train a retrieval model on top of mBERT on English relevance data and apply it on a different language.", "Specialized Multilingual Sentence Encoders.An extensive body of work focuses on inducing multilingual encoders that capture sentence meaning. In {{cite:da2144ef91ef8f4ee8fe5afa594ae3c123c02772}}, the multilingual encoder of a sequence-to-sequence model is shared across languages and optimized to be language-agnostic, whereas Guo et al. {{cite:0f00a0fab93e60011d660bf0566d23254cc2dac9}} rely on a dual Transformer-based encoder architecture instead (with tied/shared parameters) to represent parallel sentences. Rather than optimizing for translation performance directly, their approach minimizes the cosine distance between parallel sentences. A ranking softmax loss is used to classify the correct (i.e., aligned) sentence in the other language from negative samples (i.e., non-aligned sentences). In {{cite:7bb1a06b94f63e2f35a8d63ce057db88bd2ab499}}, this approach is extended by using a bidirectional dual encoder and adding an additive margin softmax function, which serves to push away non-translation-pairs in the shared embedding space. The dual-encoder approach is now widely adopted {{cite:0f00a0fab93e60011d660bf0566d23254cc2dac9}}, {{cite:2c76e900befb4ffbfc7fd21ce06d18a83dcc3bc8}}, {{cite:1bdc31111b39190c3a5f6edb65bbad92a01594ff}}, {{cite:a17ecc881b5b0ebc47bbf76ef8a40141ddc78924}}, {{cite:32d04a2841100c24c92a5afb44b293cfa450fbd6}}, and yields state-of-the-art multilingual sentence encoders which excel in sentence-level NLU tasks.", "Other recent approaches propose input space normalization, and using parallel data to re-align mBERT and XLM {{cite:32d04a2841100c24c92a5afb44b293cfa450fbd6}}, {{cite:decfbf96dcc38a268913ff499f0194119dc94ea1}}, or using a teacher-student framework where a student model is trained to imitate the output of the teacher network while preserving high similarity of translation pairs {{cite:a17ecc881b5b0ebc47bbf76ef8a40141ddc78924}}. In {{cite:2c76e900befb4ffbfc7fd21ce06d18a83dcc3bc8}}, authors combine multi-task learning with a translation bridging task to train a universal sentence encoder. We benchmark a series of representative sentence encoders in this article; their brief descriptions are provided in §REF .", "Neural Learning-to-Rank. In the context of neural retrieval the vast majority of rankers can be broadly classified into the two paradigms of (i) Cross-Encoders (ii) and Bi-Encoders {{cite:fa98cf4457c7d95b4b9393122f14988b241688dc}}, {{cite:b5ccbfcfe0db81f18157f4d2bb50de949d4cfa79}}, {{cite:d0e38a12b92b251ac44fd00faac498cd84e374c8}}. Cross-Encoders compute the full interaction between pairs of queries and documents and induce a joint representation for a query-document pair by means of cross-attention. Transformed representation of the query-document pair is then fed to a relevance classifier; the encoder and classifier parameters are updated jointly in an end-to-end fashion {{cite:967f639b989e4ec56460c8061a9a669d365e3cdc}}, {{cite:492bd6f2775a218eb3d9d6f664489868bed2e74e}}, {{cite:d2dfe610172b81f7463f3a7876ae9896f74df902}}. This paradigm is usually impractical for end-to-end ranking due to slow matching and retrieval. Recent work addresses this challenge by performing late interaction and by precomputing token-level representations {{cite:d2dfe610172b81f7463f3a7876ae9896f74df902}}, {{cite:33533540d8081c0024a33b74d304d6d7f47dc11e}}. Nonetheless, neural rankers are still predominantly used for re-ranking the top-ranked results returned by some base ranker. The alternative paradigm – the so-called Bi-Encoders – computes vector representations of documents and queries independently; it then relies on fast similarity computations in the vector space of precomputed query and document embeddings. All similarity-specialized multilingual encoders described in §REF belong to this category of Bi-Encoders. [comment=In response to suggested related work; last citation is a book citation from Morgan Claypool]Contrary to most NLP tasks, document-level ad-hoc IR deals with much longer text sequences. For instance, one notable approach computes document scores as an interpolation between a pre-ranking score and a weighed sum of scores of the top-k highest scoring sentences {{cite:e9b7559960a0b7b93b02dc417220a1214df7de36}}. Our approach scores local regions of documents independently (§REF ); this is most similar to the BERT-MaxP model which encodes and scores individual passages of a document {{cite:946a727d6fbb521682c79046133b27ab9ea58ad1}}. For further discussion on long document matching we refer the reader to Chapter 3.3 of Lin et al.'s handbook {{cite:7e3abafc85925e8af8bd53cbc444645f4aa60f88}}.", "[comment=in response to reviewer 1 and the three paper references]A related recent line of research targets cross-lingual transfer of (monolingual) rankers, where such rankers are typically trained on English data and then applied in a monolingual non-English setting {{cite:3a404e45942d3cc1af2fe4dcabe51fb1c35e3812}}, {{cite:1053bff0511271440bb0d3a2ab59a484435d803e}}, {{cite:e833ec260bdfc417487e15195abc7a10a61ff994}}. This is different from our cross-lingual retrieval evaluation setting where queries and documents are in different languages. A systematic comparative study focused on the suitability of the multilingual text encoders for diverse ad-hoc CLIR tasks and language pairs is still lacking.", "CLIR Evaluation and Application. The cross-lingual ability of mBERT and XLM has been investigated by probing and analyzing their internals {{cite:14221459e7e074f63ccc4d14d4c0d4b89e194308}}, as well as in terms of downstream performance {{cite:97ff32b0ac659a8f1b465dd771dbc09ea429d81b}}, {{cite:30535793643a4ead7593175d43583b92f43ad759}}. In CLIR, these models as well as dedicated multilingual sentence encoders have been evaluated on tasks such as cross-lingual question-answer retrieval {{cite:2c76e900befb4ffbfc7fd21ce06d18a83dcc3bc8}}, bitext mining {{cite:294c5bc313be11f65123180f1a17b6493e149753}}, {{cite:ae725868b3fcae23b289ccc804079afd8677b340}}, and semantic textual similarity (STS) {{cite:adf7e77c426a96b97f41b97dd306990c7bf75f78}}, {{cite:73a56120630322b90dcb813b20f6f1384da6ca60}}. Yet, the models have been primarily evaluated on sentence-level retrieval, while classic ad-hoc (unsupervised) document-level CLIR has not been in focus. Further, previous work has not provided a large-scale comparative study across diverse language pairs and with different model variants, nor has tried to understand and analyze the differences between sentence-level and document-level tasks, or the impact of domain versus language transfer. In this work, we aim to fill these gaps." ]
[]
Efficient reductions and algorithms for variants of Subset Sum
Given $(a_1, \dots, a_n, t) \in \mathbb{Z}_{\geq 0}^{n + 1}$, the Subset Sumproblem ($\mathsf{SSUM}$) is to decide whether there exists $S \subseteq [n]$such that $\sum_{i \in S} a_i = t$. There is a close variant of the$\mathsf{SSUM}$, called $\mathsf{Subset~Product}$. Given positive integers$a_1, ..., a_n$ and a target integer $t$, the $\mathsf{Subset~Product}$ problemasks to determine whether there exists a subset $S \subseteq [n]$ such that$\prod_{i \in S} a_i=t$. There is a pseudopolynomial time dynamic programmingalgorithm, due to Bellman (1957) which solves the $\mathsf{SSUM}$ and$\mathsf{Subset~Product}$ in $O(nt)$ time and $O(t)$ space. In the first part, we present {\em search} algorithms for variants of theSubset Sum problem. Our algorithms are parameterized by $k$, which is a givenupper bound on the number of realisable sets (i.e.,~number of solutions,summing exactly $t$). We show that $\mathsf{SSUM}$ with a unique solution isalready NP-hard, under randomized reduction. This makes the regime ofparametrized algorithms, in terms of $k$, very interesting. Subsequently, we present an $\tilde{O}(k\cdot (n+t))$ time deterministicalgorithm, which finds the hamming weight of all the realisable sets for asubset sum instance. We also give a poly$(knt)$-time and $O(\log(knt))$-spacedeterministic algorithm that finds all the realisable sets for a subset suminstance. In the latter part, we present a simple and elegant randomized $\tilde{O}(n +t)$ time algorithm for $\mathsf{Subset~Product}$. Moreover, we also present apoly$(nt)$ time and $O(\log^2 (nt))$ space deterministic algorithm for thesame. We study these problems in the unbounded setting as well. Our algorithmsuse multivariate FFT, power series and number-theoretic techniques, introducedby Jin and Wu (SOSA'19) and Kane (2010).
[ "Before going into the details, we briefly review the state of the art of the problems (& its variants). After Bellman's {{formula:015f8c32-643a-420d-aaa0-1b59a7b22c84}} dynamic solution {{cite:d09bfe5eba1b835c51de9983923cce6b7326cf83}}, Pisinger {{cite:24c8db2ca6fbae977162f480d8d6956bb321e3de}} first improved it to {{formula:0c16b942-2c31-423b-bee6-7a655f8e338b}} on word-RAM models. Recently, Koiliaris and Xu gave a deterministic algorithm {{cite:a98d137a66b37e1ad669b4ae37f68fb4439080c6}}, {{cite:b83132c7e5af4bfb421e7d87b0c079ebfae08002}} in time {{formula:f17ef973-d671-4b0d-aeb4-91e0b5673d91}} , which is the best deterministicalgorithm so far. Bringmann {{cite:1abb2f66f22dae42a97326787d891147cf8f2cf4}} & Jin et.al. {{cite:09317782b5344ecf5b063759942e0444fc35878a}} later improved the running time to randomized {{formula:ea1700d4-bfdd-4749-9b15-473bce147c86}} . All these algorithms require {{formula:00b38706-5244-4703-895d-2a4c1d01baac}} space. Moreover, most of the recent algorithms solve the decision versions. Here we remark that in {{cite:25a5bfc78ada194375e433dd5b347167f9a9da69}}, the authors showed that {{formula:7f1d1575-4da5-44f0-919e-66fd3389e591}} has no {{formula:887e49dc-779b-4f93-ae07-e83dc8ff162a}} time algorithm for any {{formula:e4616d37-e159-4c2e-9ca2-4f4ede56c0be}} , unless the Strong ExponentialTime Hypothesis (SETH) is false. Therefore, the {{formula:cb592690-cbfa-4a55-a7a8-26a9c35b7074}} time bound is likely to be near-optimal.", "There have been a very few attempts to classically solve {{formula:ac828206-0aaf-4729-8c70-dfeb59500c43}} or its variants. It is known to be {{formula:896081af-721d-46c0-a2b0-4dc42a32fb2f}} -complete and the reduction follows from the Exact Cover by 3-Sets (X3C) problem {{cite:ed1a0a022a4b0b81d9ac02ad4499be6379b24525}}. Though the knapsack and its approximation versions have been studied {{cite:42c76e6e5481849f0b9ef0d07bc354e2f9272d03}}, {{cite:87aebb2b25df834e4fb7d812ddcc9a59dfe26b36}}, we do not know many classical algorithms and attempts to solve this, unlike the recent attention for the subset sum problem {{cite:1abb2f66f22dae42a97326787d891147cf8f2cf4}}, {{cite:09317782b5344ecf5b063759942e0444fc35878a}}, {{cite:ba2d948c09dfe807a01b40fc89f4eba9b8b8882b}}, {{cite:10cf444130c18ae7c55ce9094515ed3937b2da48}}.", "In {{cite:a98d137a66b37e1ad669b4ae37f68fb4439080c6}} (also see {{cite:b83132c7e5af4bfb421e7d87b0c079ebfae08002}}), the authors gave a deterministic {{formula:50b93d0a-dbc0-4870-b867-22b9be142d57}} algorithm that finds all the hamming weights for all realisable targets less than equal to {{formula:c5bd57bd-d9dc-45f5-8b01-c777f809b5a0}} . Their algorithm does not depend on the number of solutions for a particular target. Compared to this, our thm1:hamming is faster when {{formula:99ee2427-abae-4c55-9e09-fb92db56ae85}} , for a large constant {{formula:397b0af9-c7ec-46ea-a6e2-3baf4cb8e432}} . Similarly, with the `extra' information of {{formula:6bec03d4-6b0f-4084-bddf-4f0e33e51ce3}} , we give a faster deterministic algorithm (which even outputs all the hamming weights of the solutions) compared to {{formula:fef2a396-e9e7-4e1e-b73d-b9e38d048557}} decision algorithm in {{cite:b83132c7e5af4bfb421e7d87b0c079ebfae08002}}, {{cite:a98d137a66b37e1ad669b4ae37f68fb4439080c6}} (which outputs all the realisable subset sums {{formula:6bec1cba-9022-45f8-a758-89a1e6352f09}} ), when {{formula:c4f29f9f-3b43-4f80-a845-713243683b71}} , for a large constant {{formula:359075fe-32f9-4a12-8c58-f9f26fed349e}} . Here we remark that the {{formula:f0f0e8e1-1296-4189-8504-4c7068ad8828}} -time dynamic programming algorithm {{cite:d09bfe5eba1b835c51de9983923cce6b7326cf83}} can be easily modified to find all the solutions, but this gives an {{formula:053695e0-0d17-4495-85e6-5ffc34b3e622}} -time (and space) algorithm solution (for more details, see appendex:k-SSSUM-trivial).", "On the other hand, there have been quite some work on solving {{formula:d0f0f12f-dd2b-4f9f-8e38-745e7a583316}} in {{formula:68048466-d72e-4bd6-b067-8858003e13b2}} . Elberfeld, Jakoby, and Tantau {{cite:8d34572e57c591a2892ed7ccb1e1935413cb166c}}, and Kane{{cite:c6be6b9b45349655703426b557adc391cad9d785}}(2010) gave {{formula:363d7902-582f-4c17-95ac-9f9a4df6ec69}} space {{formula:124687f2-dfbe-46f7-9046-8ab8c509745e}} -time deterministic algorithm, which have been very recently improved to {{formula:3f6ee2aa-22d3-43fd-8f27-56ae13818c75}} -time and {{formula:fa2dc5d7-e9f4-45de-bdd3-5677df7459db}} space. On the other hand, Bringmann {{cite:1abb2f66f22dae42a97326787d891147cf8f2cf4}} gave a {{formula:6668fb29-67cc-40c2-9eb9-90bfc7218f99}} time, {{formula:c1ddea60-dad6-4723-a873-5d1ebcd3f66d}} space randomized algorithm, which have been improved to {{formula:9afbf0d6-64b7-4941-ba8e-31cd8373dc52}} space by Jin et.al.{{cite:ba2d948c09dfe807a01b40fc89f4eba9b8b8882b}}. Again, most of the algorithms are decision algorithms and do not output the solution set. In contrast to this, our algorithm (algo:lowspace) in thm2:algo-lowspace uses only {{formula:58045146-88eb-47f7-8af4-9dc9033d1429}} and outputs all the solution sets, which is near-optimal.", "Since subset sum can be solved in randomized {{formula:a7836499-c4a3-45c1-b39c-06726cb81891}} time {{cite:09317782b5344ecf5b063759942e0444fc35878a}}, as mentioned before, one obvious way to solve {{formula:8b7b6d30-13bd-40c4-b30f-09324f5dbec6}} would be to work with {{formula:a49f70d0-2ede-4d22-bd6d-f4662a24f066}} and a {{formula:e103ace6-305d-4f33-b047-084f9101f207}} , a range of target values {{formula:01a08e8f-6a45-4dcd-a77e-8342abc5f084}} which could be as large as {{formula:2aa83778-2efb-4998-bde7-326054348f0a}} such that {{formula:e3334434-88a7-42a1-9af7-90159772b840}} is YES iff subset sum instance with {{formula:8ca1155d-e705-4f18-9290-fcfc6a99bce8}} and {{formula:b7fc27c7-c135-4acc-9c65-eff5ead88a44}} is YES. But {{formula:e2ee52de-1478-4ae1-b293-5f02b8d0caa7}} could be as large as {{formula:c9131ef7-1c4b-4394-8ebf-f89d22ba65ef}} . Therefore, although there is a randomized near-linear time algorithm for subset sum, when one reduces the instance of {{formula:821889a6-ebe5-4eca-8c36-8db52289b3c0}} to a subset sum instance, the target becomes very large, failing to give an {{formula:70f811ae-3472-43e6-9db2-e56a476f90b3}} algorithm.", "Moreover, the general techniques, used for subset sum {{cite:1abb2f66f22dae42a97326787d891147cf8f2cf4}}, {{cite:09317782b5344ecf5b063759942e0444fc35878a}}, {{cite:ba2d948c09dfe807a01b40fc89f4eba9b8b8882b}} seem to fail to `directly' give algorithms for {{formula:402ae582-19b2-4b8c-be63-fd3eb2c42dbd}} . This is exactly why, in this work, the efficient algorithms have been indirect, via solving {{formula:05510048-d41f-4234-b406-fde1f50adcba}} instances." ]
[]
Learning Human Motion Prediction via Stochastic Differential Equations
Human motion understanding and prediction is an integral aspect in ourpursuit of machine intelligence and human-machine interaction systems. Currentmethods typically pursue a kinematics modeling approach, relying heavily uponprior anatomical knowledge and constraints. However, such an approach is hardto generalize to different skeletal model representations, and also tends to beinadequate in accounting for the dynamic range and complexity of motion, thushindering predictive accuracy. In this work, we propose a novel approach inmodeling the motion prediction problem based on stochastic differentialequations and path integrals. The motion profile of each skeletal joint isformulated as a basic stochastic variable and modeled with the Langevinequation. We develop a strategy of employing GANs to simulate path integralsthat amounts to optimizing over possible future paths. We conduct experimentsin two large benchmark datasets, Human 3.6M and CMU MoCap. It is highlightedthat our approach achieves a 12.48% accuracy improvement over currentstate-of-the-art methods in average.
[ "Human motion prediction    Earlier works approached the human motion prediction task via hidden Markov models or Gaussian processes that encodes high dimensional skeletal motion data as parameterized latent variables. However, the hypothesis space of these latent variable models tend to be overly-restrictive and fails to capture the diverse range of motions faithfully, leading to inadequate performance.Driven by the advances of deep learning {{cite:112202b674cca84988853ea676884b029ed44332}}, {{cite:fcfc9a17095ef545b464ba528f3e2523f6403dc5}}, {{cite:3dced68d69b472a5fbd71b0f273bdba75b7f44db}}, {{cite:c1958139fe25622b7db5384f05b914a8d5beb534}}, {{cite:b3f7ccc84f2ff84d6ef95ce15308ac28c1883b3d}}, {{cite:3ef74e02f4f2b8fa7dde77674f6bfa757ec1a058}}, {{cite:bfc5101c0b4c62cfa6bc3c0210969603e896f8fb}}, RNNs and sequence to sequence modeling inspired a major line of work {{cite:d37de7638d2a6af9aebe88c9b55d7ebba4d204b4}}, {{cite:446ac1d8d6d4f97b091499992f2f56d3cf196a9f}}, {{cite:e20315425612899664bfd694ac2eca5fbf788baa}}, {{cite:f9039c1c854743b2f4e84c2de52f2d4265e4892b}} where various RNN architectures are utilized to better model motion dynamics.", "Parallel to this development, researchers also proposed using kinematic trees {{cite:e20315425612899664bfd694ac2eca5fbf788baa}}, Convolutional Neural Networks {{cite:7f010f3c55c6f614f410c3c861c3f5cc47c9b3b9}}, {{cite:0dc70908a34ead0c8c56b14f2e094399958c7265}} and Graph Convolutional Networks {{cite:6d83cc0839630a47efbb663aa67e039e74537140}}, {{cite:7d80388725b12a72b15ad68d1a09c765cd196cda}}, {{cite:c40f47be5f22d8ef97c85cc3d2858826201dae34}}, {{cite:b025c8820400abfb62c543a0b280d51e7b591fdd}} to model motion data, with the aim of better encapsulating the kinematics correlations amongst different skeletal joints. These efforts were effective in improving predictive accuracy. However, their implementations were generally dependent on imposing a skeletal structure and anatomical constraints which derives from prior knowledge. In particular, the rotational degrees of freedom of constituent joints have to be specified as constraints instead of learning such characteristics from data. Such imposed priors may also reflect human bias and prejudiced understanding, leading to systematic propagation of errors. In our work, we seek to mitigate this issue and learn joint correlations without imposing a prior structural constraint.", "A concurrent track addresses the motion prediction problem with GANs {{cite:652f8c3b126689a89345be0689944cf4fd7b63c8}}, {{cite:08f54f47c3018a9bb386277d660f293624937625}}, {{cite:c6831d2f28e7e9abdc78ab3d3155f44a4d60b431}}, {{cite:60ef511be52eef82330f62b42265ebf86449565e}}, {{cite:cc175d051d0fa7ec92282fb34d5e4ac4107506b8}}. GANs carry the advantage of predicting a spectrum of possible futures instead of a single deterministic output, thus being more in line with the stochastic nature of the problem.", "Stochastic Differential Equations    Many physical systems exhibit some extent of randomness. In part the stochastic behavior might be due to incomplete knowledge about the system. To a greater extent, this non-deterministic nature could be reflected by the inherent randomness in fundamental physics {{cite:acb253bea631a7d209344a96ddc7b36c770d89ae}}, where even a hypothetical Laplace's demon with perfect knowledge would be unable to make deterministic predictions.", "Modeling such stochastic physical systems began with the efforts to understand Brownian motion, i.e., the drift and diffusion of particles suspended in a liquid medium {{cite:60ab3a149ca8d1c9aa5929e138e3e6075f02c0cf}}. Subsequent developments led to the Langevin equation {{cite:97d1e4885b0ac49dca87db2a9cee38d3814a0bd5}}, a stochastic differential equation describing the evolution of such systems. The drift term in the Langevin equation corresponds to deterministic dynamical evolution in the system. The source of stochasticity lies in the diffusion term. It entails a white noise Gaussian process whose integral is known as the Wiener process {{cite:100e97fd6965f014273a6dcac2fb5804fc5e4a88}}. The Langevin equation in its generic form is ambiguous and has to be complemented with a discretization scheme to have a well-defined notion of calculus {{cite:ec644e151e21075f5dadc933149dbf3559aaa2e2}}, with the Ito discretization and Stranovich discretization constituting two major schemes.", "Stochastic differential equations have been widely employed to model a plethora of physical phenomena {{cite:ec644e151e21075f5dadc933149dbf3559aaa2e2}}, {{cite:129cb569c4ae40426b7c5d7bc1b6c7a3df4fa097}} and systems with randomness such as quantitative finance and stock pricing {{cite:4a55f63e13dcc0140565d5abad0e9af384f6867d}}. To the best of our knowledge, there are no previous works combining deep learning and stochastic differential equations for our motion prediction task. Motion prediction is of a stochastic nature and certainly falls within the paradigm of stochastic modeling. In the subsequent section, we outline our approach in leveraging the Langevin equation for modeling human motion.{{figure:62623b6b-c676-4efb-bae5-69809e2a2d5e}}" ]
[]
ANUBIS: A Provenance Graph-Based Framework for Advanced Persistent Threat Detection
We present ANUBIS, a highly effective machine learning-based APT detectionsystem. Our design philosophy for ANUBIS involves two principal components.Firstly, we intend ANUBIS to be effectively utilized by cyber-response teams.Therefore, prediction explainability is one of the main focuses of ANUBISdesign. Secondly, ANUBIS uses system provenance graphs to capture causality andthereby achieve high detection performance. At the core of the predictivecapability of ANUBIS, there is a Bayesian Neural Network that can tell howconfident it is in its predictions. We evaluate ANUBIS against a recent APTdataset (DARPA OpTC) and show that ANUBIS can detect malicious activity akin toAPT campaigns with high accuracy. Moreover, ANUBIS learns about high-levelpatterns that allow it to explain its predictions to threat analysts. The highpredictive performance with explainable attack story reconstruction makesANUBIS an effective tool to use for enterprise cyber defense.
[ "This work lies in the intersection of graph-based anomaly detection and attack story re-construction.", "Graph-Based Anomaly Detection. There is a large body of work in the context of threat and anomaly detection based on graph {{cite:f5e77a8177e32d9a8f3a64efe6a792e3befb4367}}. UNICORN {{cite:d572ea963fbe6077802b5a15c2aaef93a078f451}} follows an unsupervised machine learning approach to analyze a streaming provenance graph for detecting APTs. It periodically computes a histogram sketch of the provenance graph which allows it to model benign system behavior. The approach is sensitive to sharp change in system behavior and can result in increase of false positive predictions. PROVDETECTOR {{cite:4b0f22ff561125bb6eebcbe1baa0ea8240d23e17}} extracts rare execution paths from the provenance graph. These rare paths are vectorized using doc2vec embedding model and then local outlier factor algorithm is used to classify the benign and malicious events. Both these approaches are unsupervised while ANUBIS is supervised. Moreover, none of these approaches offer causality analysis on the predictions. ANUBIS performs extensive causality analysis based on the confidence level of the prediction.", "StreamSpot {{cite:80131cd68a8be55434c8cfefb1c14f574a5f5ee3}} uses feature engineering from streaming information flow graphs to detect malicious activities. The feature engineering process extracts local graph structures from a single snapshot of the provenance graph. However, this approach is ineffective against APT which sometimes have campaign length of multiple months or years {{cite:675c70ad9a5d14f0b21a56388f1b7e1b6bcc273c}}. Moreover, StreamSpot triggers a large number of false alarms which can cause threat-fatigue and result in preemptive dismissal of alerts {{cite:5bbef4856ec5e1356de584780d0c7fb0334c566a}}. FRAPpuccino {{cite:a65fc5e081488bb7157005fdf86337c2eea811ce}} is another approach for provenance graph-based APT detection. It performs a sliding window analysis which results in a feature vector based on counts. A model is trained on these feature vectors. The model represents normal execution state of the system. Any deviation from the model is considered as anomaly. Using count for feature engineering is a major weakness of FRAPpuccino. We have shown in Section REF that count is a weaker density estimate to model the provenance graph neighborhood.", "ZePro {{cite:c6cc5e870f3622eef5352f6e4271e9cfcd252839}} is the first work that uses probabilistic approach for anomaly detection. ZePro differs from ANUBIS in many ways. Firstly, ZePro uses Probability Network (shallow learning model) while ANUBIS uses BNN (deep learning model). Secondly, ZePro works on System Object Dependency Graph (graph has cycles) where ANUBIS works on provenance graph (directed acyclic graph). Finally, ZePro solves zero-day attack path identification problem. On the other hand, ANUBIS solves the APT detection and explainability problem. APTs may or may not have zero-day exploits in them (although having zero-day is most common for APT). Therefore, ZePro solves a subset of the problem which ANUBIS solves.", "Gao et al. designed a complex query language SaQL {{cite:a2f5dd47f697ed5bfee7303a5fbbb50c45cef421}} that can query on a streaming provenance data. Based on the queries, the system leverages multiple anomaly detection model (rule-based, time-series-based, invariant-based, outlier-based anomaly detection models). The detection system aggregates data from multiple hosts and has showed promising performance in enterprise network settings. However, the rule-based matching still requires expert domain knowledge. ANUBIS does not require any expert domain knowledge during training or operation phase. Barre et al. used random forest classifier to detect APT by feature engineering from provenance graph {{cite:73b97c8a33ed400942b1ab69c5ef8a40d1a71b30}}. They used features that are likely to be important in APT detection (e.g., timespan, edge count, and type of event count). However, the system only had {{formula:35b43af0-4024-4ccc-ad10-59e73924791f}} 50% detection rate. This exemplifies that feature engineering has limited value in APT detection unless execution context is considered. ANUBIS takes context into account by encoding causal and neighborhood information in the training inputs.", "Attack Story Reconstruction and Explainability. One of the earliest works to leverage provenance graphs for attack story reconstruction is BackTracker {{cite:c7276624479ecf6588d8ca381f045dc9116c10a8}}. This work leverages the provenance graph to detect the entry point of an intrusion. BackTracker is farther improved in PriorTracker {{cite:caa9445d1ac757892225204365e790e4fdef3ec5}} which includes both forward and backward causality analysis. Both of these works perform causality analysis by graph traversal. On the contrary, ANUBIS takes a fundamentally different approach as it performs causality analysis by matching the event trace with the most similar event trace in the training set.", "ProPatrol {{cite:77ca9c99cfa74854da280ea0e0ea521564abf2f9}} approaches attack story reconstruction problem by compartmentalizing high level activity. This mitigates the dependence explosion problem which hinders forensic analysis of APT attacks. HOLMES {{cite:71e189e4f3bff137f0f2e19d4c8a7e67b25dce3c}} is another work that focuses on attack story reconstruction by high-level graph abstraction. HOLMES uses MITRE TTPs {{cite:cb7df4becde2a8ac2036d97ae79950de49fe96be}} to correlate provenance graph events and generate a high level overview of the attack story. POIROT {{cite:43e90657f076e684a6ffd426ebb84b37d7f3cf29}} shares a similar strategy for attack story reconstruction. POIROT constructs a query graph from available cyber threat intelligence and tries to align the query graph with the provenance graph in order to detect APT attacks. POIROT demonstrated strong performance in offline pattern matching, however, constructing a query graph from attack description is difficult and requires significant domain expertise. ANUBIS design does not require any domain knowledge. The causality and explainability provided by ANUBIS comes from the training data.", "ATLAS {{cite:b7168ed7cb2012ba8b8c4f23848fcf77d4710a76}} uses a sequence-based deep learning model for attack story reconstruction. Once ATLAS predicts an input sequence as malicious, it maps the sequence back to it's original events. The causality between the events are connected and the analyst can see the attack story. While this describes “This is how APT is attacking”, it does not tell why the model thinks this sequence of events represent an APT attack. ANUBIS takes an event trace as input which is similar to the input sequence of ATLAS. Therefore, ANUBIS can perform the same attack reconstruction that ATLAS does. Additionally, ANUBIS also explains why the model thinks this as a malicious event trace. This makes ANUBIS a superior information source for attack explanation and reconstruction." ]
[]
A Scalable Deep Reinforcement Learning Model for Online Scheduling Coflows of Multi-Stage Jobs for High Performance Computing
Coflow is a recently proposed networking abstraction to help improve thecommunication performance of data-parallel computing jobs. In multi-stage jobs,each job consists of multiple coflows and is represented by a Directed AcyclicGraph (DAG). Efficiently scheduling coflows is critical to improve thedata-parallel computing performance in data centers. Compared with hand-tunedscheduling heuristics, existing work DeepWeave [1] utilizes ReinforcementLearning (RL) framework to generate highly-efficient coflow scheduling policiesautomatically. It employs a graph neural network (GNN) to encode the jobinformation in a set of embedding vectors, and feeds a flat embedding vectorcontaining the whole job information to the policy network. However, thismethod has poor scalability as it is unable to cope with jobs represented byDAGs of arbitrary sizes and shapes, which requires a large policy network forprocessing a high-dimensional embedding vector that is difficult to train. Inthis paper, we first utilize a directed acyclic graph neural network (DAGNN) toprocess the input and propose a novel Pipelined-DAGNN, which can effectivelyspeed up the feature extraction process of the DAGNN. Next, we feed theembedding sequence composed of schedulable coflows instead of a flat embeddingof all coflows to the policy network, and output a priority sequence, whichmakes the size of the policy network depend on only the dimension of featuresinstead of the product of dimension and number of nodes in the job'sDAG.Furthermore, to improve the accuracy of the priority scheduling policy, weincorporate the Self-Attention Mechanism into a deep RL model to capture theinteraction between different parts of the embedding sequence to make theoutput priority scores relevant. Based on this model, we then develop a coflowscheduling algorithm for online multi-stage jobs.
[ "Coflow abstraction can better capture application-levelsemantics, thereby improving the communication performance of distributeddata-parallel jobs. Existing work mostly focuses on scheduling coflowsin single-stage jobs and minimizing coflow completion time (CCT) asthe optimization goal. However, only a few works consider multi-stagescenarios, which concentrate on minimizing job completion time (JCT).Next, we introduce related work from these two aspects.", "{{formula:7da17a71-2975-46c1-b435-81cabc0cc62b}} For the single-stage job schedulingproblem, many heuristic algorithms have been proposed to minimizeCCT, including heuristic algorithms {{cite:d8f95db57c4c51039ae134207433e9aea4253b00}}, {{cite:65a49397854d46d9afad6d751f8cb262dabaf958}}, {{cite:c453e8e02dc9ca64b21ab2ff8c426fcdc8040f99}}, {{cite:428c50e7771850417e9d7d62512f1cb1785ddd89}}.Orchestra {{cite:d8f95db57c4c51039ae134207433e9aea4253b00}} is perhaps the first work to mentionthe concept of coflow and shows that even a simple FIFO algorithmcan significantly improve coflow performance. Coflow abstraction islater formally defined in {{cite:0ed7afc369c733da44efd3efae166d6e73bad686}}. Varys {{cite:65a49397854d46d9afad6d751f8cb262dabaf958}}proposes the smallest-effective-bottleneck-first (SEBF) and minimum-allocation-for-desired-duration(MADD) heuristic algorithms to greedily schedule coflows accordingto the bottleneck completion time of coflow to minimize CCT and meetthe deadline of coflow at the same time. Barrat {{cite:c453e8e02dc9ca64b21ab2ff8c426fcdc8040f99}}and Stream {{cite:428c50e7771850417e9d7d62512f1cb1785ddd89}} both aim at decentralized coflow scheduling,and Barrat {{cite:c453e8e02dc9ca64b21ab2ff8c426fcdc8040f99}} exploits multiplexing to prevent head-of-lineblocking to small coflows. There is also some theoretical work {{cite:a1013fac5976e765ef2426b8bfc29395e81a0011}}, {{cite:2f0086cdbf58c07a245eaf88cebd054c6c7d9983}}, {{cite:479d95f01ddaf984353154b7918da505bc4dd6c2}}aimed at minimizing the approximate algorithm of the total weightedCCT. {{cite:a1013fac5976e765ef2426b8bfc29395e81a0011}} provided the first deterministic algorithmwith a constant approximation ratio of {{formula:64a23921-a3b6-4c10-8a48-74b3899bf5ef}} to minimizethe total weighted CCT. {{cite:2f0086cdbf58c07a245eaf88cebd054c6c7d9983}} presented a 12-approximationratio algorithm by reducing to concurrent open shop problem, and {{cite:479d95f01ddaf984353154b7918da505bc4dd6c2}}further proposed a 5-approximation ratio algorithm by relaxing theproblem to linear programming (LP). The work as mentioned above abstractsthe network topology as a big non-blocking switch without consideringthe constraints of network resources. Now, several research workshave considered network resource constraints and combined routingand resource scheduling to minimize CCT {{cite:68a432276462b1c804f55a72a4d024dce145e45d}}, {{cite:104a96b919a8ef2d8850f444e7cf82e04825c3af}}.Rapier {{cite:68a432276462b1c804f55a72a4d024dce145e45d}} is the first algorithm that considersrouting and scheduling jointly to minimize CCT. However, it is a heuristicsolution and cannot provide theoretical performance guarantees. Next,Tan et al. {{cite:104a96b919a8ef2d8850f444e7cf82e04825c3af}} proposed a rounding-based randomizationalgorithm for single coflow and online algorithms to provide performanceguarantees for multiple coflow routing and scheduling. Recently, adistributed bottleneck aware coflow scheduling algorithm {{cite:e610b12cd5945cc2c6ccad354fbc5d06575f747b}}was proposed to minimize CCT by reducing network bottlenecks and improvinglink capacity utilization. However, these algorithms focus on minimizingCCT without considering the dependencies among coflows of multi-stagejobs.", "{{formula:6542de38-1c25-4680-860d-7050214ca111}} Although the above methods havebeen proven to be effective for single-stage job scheduling problems,they may not be suitable for solving coflow scheduling problems inmulti-stage jobs. In a multi-stage job scenario, due to the dependencybetween coflows, minimizing CCT may not minimize JCT. To the bestof our knowledge, only a few works {{cite:b5a1b3cce12115be7f46fd3c860698a51b429c0b}}, {{cite:666d15489b6836d77e4eb285acfdcfaeaed58e53}}, {{cite:f61d884b02317bc38feeb6f86da9d321d85f6b56}}, {{cite:6714244481121885e30b0ac0bc715d108eba876c}}considered the coflow scheduling problem in the case of multi-stagejobs. Aalo {{cite:b5a1b3cce12115be7f46fd3c860698a51b429c0b}} is the first effective heuristic algorithmwith the objective of minimizing JCT, which discusses coflow schedulingin multi-stage jobs, and proposes to prioritize coflows accordingto dependency orders to schedule coflow. However, it only takes ashort section to discuss the heuristic algorithm without neither formalformulation and analysis. Tian et al. {{cite:666d15489b6836d77e4eb285acfdcfaeaed58e53}} proposeda deterministic algorithm with an {{formula:757f4a46-88ee-4c86-85f4-540de4d40148}} -approximation ratioby relaxing the multi-stage job scheduling problem to LP, where {{formula:95628d90-7fc5-4e7d-9cf7-6d4bc79dc6aa}} represents the number of machines. Unfortunately, it cannot be usedin online cases as all job statistics are required to be known inadvance to solve the relevant LP. DeepWeave {{cite:f61d884b02317bc38feeb6f86da9d321d85f6b56}} isthe first to propose a reinforcement learning model to solve the coflowscheduling problem, which can adaptively generate an efficient coflowscheduling policy without human expertise. However, this approachcannot scale to job DAGs of arbitrary sizes and shapes, and ignoresthe online situation where multiple multi-stage jobs coexist in thenetwork. Similarly, {{cite:6714244481121885e30b0ac0bc715d108eba876c}} is the first to study howto schedule multi-stage jobs under taking network resource constraintsinto account so as to minimize the total weighted JCT.", "In this paper, we ignore network resource constraints and only considerthe problem of minimizing the total weighted JCT of multi-stage jobsin a large non-blocking switch." ]
[]
Improving Robustness with Image Filtering
Adversarial robustness is one of the most challenging problems in DeepLearning and Computer Vision research. All the state-of-the-art techniquesrequire a time-consuming procedure that creates cleverly perturbed images. Dueto its cost, many solutions have been proposed to avoid Adversarial Training.However, all these attempts proved ineffective as the attacker manages toexploit spurious correlations among pixels to trigger brittle featuresimplicitly learned by the model. This paper first introduces a new imagefiltering scheme called Image-Graph Extractor (IGE) that extracts thefundamental nodes of an image and their connections through a graph structure.By leveraging the IGE representation, we build a new defense method, FilteringAs a Defense, that does not allow the attacker to entangle pixels to createmalicious patterns. Moreover, we show that data augmentation with filteredimages effectively improves the model's robustness to data corruption. Wevalidate our techniques on CIFAR-10, CIFAR-100, and ImageNet.
[ "Since the discovery of the existence of adversarial examples {{cite:540a6fa1ea3d194af234ef9d5f027a7b40ebe52a}}, countless attempts to make image classifiers robust to adversarial perturbations have appeared in the literature. As anticipated in sec:intro, current state-of-the-art methods to enforce robustness directly leverage adversarial examples during training {{cite:5ac79573876773c763a7dc9d4ba9c6aeb2d72ed9}}, {{cite:f1972df14b975eb8b6a398ec5a530c0a4d947023}}, {{cite:1378ca222d256913153e9f2dff7511d1a89818f2}}, {{cite:4d7b71216178f979b02a7512c699c17562c3032b}}. A major limitation affecting AT is the high computational cost as adversarial examples are typically crafted through iterative optimization routines. For this reason, significant efforts have been made to improve the robustness of models without resorting to AT. Proposed solutions cover a wide range of techniques based on curvature regularization {{cite:9435f5f399eaf1b0c2f7b3511ba01557c2f3c9df}}, robust optimization to improve local stability {{cite:b544fd03e16081baf1b6fc41462b4a0620dad7e8}}, the use of additional unlabeled data {{cite:b39f2a91022ec0846939b800c52e1e3c93ffdd3d}}, local linearization {{cite:508c70caff925df757b57ed151e4e5e6eadbd9eb}}, Parseval networks {{cite:8aa700f0f523bc264c1dfe80d8552331bb11edd8}}, defensive distillation {{cite:a94455ee4d65fa4e140dd26dc51aead15fcb17bb}}, model ensembles {{cite:129ae99b6fc0de8e6a1282d503fedf1138f46648}}, channel-wise activations suppressing {{cite:8672a25a66ba143c3aab0942ff7b1b4a3f9b5871}}, feature denoising {{cite:36d43863cbf2ca58f7ab45d1a9527030dbadbfd2}}, self-supervised learning for adversarial purification {{cite:0dfafc056bd8edb266183943fbd073ce6ca0b5f0}}, and input manipulations {{cite:d9b36b7f124b22778b36e8f0de87a016159e1b19}}, {{cite:0df1eff7837038ded36ee0fb848c4024ee638e05}}, {{cite:686a1e7aed75762ea39840a69d488046eafc896c}}. All the listed techniques, except those based on input manipulations, require training the model or an auxiliary module from scratch. Our method, instead, can be used in combination with pretrained models.", "In {{cite:686a1e7aed75762ea39840a69d488046eafc896c}} the authors analyze the effect of image rescaling on adversarial examples. {{cite:0df1eff7837038ded36ee0fb848c4024ee638e05}} explores the possibility to improve robustness through JPG (re)compression, based on the intuition that adversarial perturbations are unlikely to leave an image in the space of JPG images. In {{cite:d9b36b7f124b22778b36e8f0de87a016159e1b19}}, the authors assess the effectiveness of input transformations based on image cropping and rescaling, bit-depth reduction, JPEG compression, total variance minimization, and image quilting. The main objective is to remove the adversarial perturbations from images, while preserving sufficient information to correctly classify them. Unlike the mentioned input-based techniques that only implicitly (or not at all) induce mitigation of the bias towards textures, our method makes this effect explicit by directly removing textures from the input image." ]
[]
On the Adversarial Robustness of Causal Algorithmic Recourse
Algorithmic recourse seeks to provide actionable recommendations forindividuals to overcome unfavorable classification outcomes from automateddecision-making systems. Recourse recommendations should ideally be robust toreasonably small uncertainty in the features of the individual seekingrecourse. In this work, we formulate the adversarially robust recourse problemand show that recourse methods that offer minimally costly recourse fail to berobust. We then present methods for generating adversarially robust recoursefor linear and for differentiable classifiers. Finally, we show thatregularizing the decision-making classifier to behave locally linearly and torely more strongly on actionable features facilitates the existence ofadversarially robust recourse.
[ "We now draw connections with existing literature on the robustness of recourse. Previous works have identified that small changes to the features of the decision-subject {{formula:4820f213-757c-47aa-8fb1-e72d575c8b3d}} may result in recourse recommendations with very different costs being offered. Slack et al. {{cite:80f930442d53045f11d1a337805e0a1138d22b37}} show that for gradient-based recourse methods it is possible to maliciously train a classifier such that small perturbations to the features of an individual drastically alter the cost of the generated recourse, and von Kügelgen et al. {{cite:1d838a37d8f81f23267b0a110f517950885a80c0}} show that “counterfactual twins” obtained by intervening on sensitive attributes (e.g., race, gender) may be assigned recourse actions with drastically different cost. While these works study the robustness of the cost of recourse, we instead focus in the robustness in the validity of recourse, that is, finding a recourse action which remains valid under uncertainty in the individual {{formula:4d62316d-7b3e-4a0f-81f5-d822d48c1d94}} .", "Other works have considered the problem of generating recourse actions which remain valid under uncertainty in the classifier {{formula:b7b534fb-6591-411a-bd28-28e6cafde103}} . Pawelczyk et al. {{cite:40bc11a26f0da2f140703c51cddad753034a9701}} show that recourse actions which place the counterfactual individual in regions of the feature space with large data support are more robust under predictive multiplicity compared to minimum-cost recourse actions. However, recourse actions with large data support may be unnecessarily costly. In contrast, our approach seeks counterfactual individuals which are sufficiently far from the decision-boundary to be robust but not overtly so, thus ensuring robust recourse while maintaining a relatively low cost of recourse. Another line of work has considered the robustness of recourse with respect to changes to the classifier in response of dataset shift. Rawal et al. {{cite:c070828ba899f246dae25bb8ca9ec77183e787a9}} show that recourse actions are typically not robust to such model changes, and Upadhyay et al. {{cite:58b66460a9ff9966e3446a149e6f97a9156484c2}} aim to mitigate this issue by generating recourse with a minimax optimization procedure where the cost the recourse is minimized subject to the recourse action being valid under adversarial changes to the classifier {{formula:fcc142c7-0489-4fb4-84a7-9152b455792a}} . In contrast, we focus on generating recourse under uncertainty in the individual {{formula:9797b0a9-036d-4e42-9084-967733df6e03}} rather than the classifier {{formula:42520627-5be4-40f4-bf3c-637da44a0b96}} , and we consider the causal recourse setting.", "Finally, Karimi et al. {{cite:e272228ff898c01e6694b3a847934c8dde63d443}} consider the setting where the underlying SCM is not know and thus must be approximated, and propose a recourse method to generate recourse recommendations which have low probability of being invalid due to the misspecification of the underlying SCM. Our work is tangential to Karimi et al. {{cite:e272228ff898c01e6694b3a847934c8dde63d443}} and both approaches can be used in tandem." ]
[]
RetroComposer: Discovering Novel Reactions by Composing Templates for Retrosynthesis Prediction
The main target of retrosynthesis is to recursively decompose desiredmolecules into available building blocks. Existing template-basedretrosynthesis methods follow a template selection stereotype and suffer fromthe limited training templates, which prevents them from discovering novelreactions. To overcome the limitation, we propose an innovative retrosynthesisprediction framework that can compose novel templates beyond trainingtemplates. So far as we know, this is the first method that can find noveltemplates for retrosynthesis prediction. Besides, we propose an effectivereactant candidates scoring model that can capture atom-level transformationinformation, and it helps our method outperform existing methods by a largemargin. Experimental results show that our method can produce novel templatesfor 328 test reactions in the USPTO-50K dataset, including 21 test reactionsthat are not covered by the training templates.
[ "Recently there has been an increasing number of work using machine learning methods to solve the retrosynthesis problem.These methods can be categorized into template-based {{cite:b691191137b48a4e1386cb9201bad54ad5be165e}}, {{cite:6abcfa5bdf8ce6f0318016ea50af161c86fb7537}}, {{cite:6f95b4cb24b0a5827d4b243e3a43832485dd14d2}}, {{cite:48cb523373befe313d2aaf73a97131b06db18303}}, {{cite:f1b3f484c690f87a0becf40d708d27a835ab5900}} and template-free approaches.Template-based methods extract templates from training data and build models to learn the corresponding relationship between products and templates.RetroSim {{cite:b691191137b48a4e1386cb9201bad54ad5be165e}} selects the templates based on the fingerprint similarity between products and reactions.NeuralSym {{cite:6abcfa5bdf8ce6f0318016ea50af161c86fb7537}} uses a neural classification model to select corresponding templates.However, this method does not scale well with increasing number of templates.To mitigate the problem, {{cite:48cb523373befe313d2aaf73a97131b06db18303}} adopts a multi-scale classification model to select templates according to a manually defined template hierarchy.GLN {{cite:f1b3f484c690f87a0becf40d708d27a835ab5900}} proposes a graph logic network to model the decomposed template hierarchy by first selecting reaction centers within the targets and then only consider templates that contain the selected reaction centers.The decomposition strategy can reduce the search space significantly.GLN can model the reactants and templates jointly by applying selected templates to get reactants which are also used to optimize the model simultaneously.", "Template-free methods do not rely on retrosynthesis templates. Instead, they construct models to predict reactants from products directly.Translation based methods {{cite:6e469665065fb99138ae1d165718b045a3753d14}}, {{cite:354f0056447116037a23361abf1e57b521a8bf31}}, {{cite:b197270b418e8aca48c4bf117344ef38d9935bba}}, {{cite:200b3fe5ddb57231956102a5beb951d4ea0bcb03}} use SMILES to represent molecules and treat the problem as a sequence-to-sequence task.MEGAN {{cite:f07fa45b6fd8b5b3a48f87c237af56eec1f55d75}} treats the retrosynthesis problem as a graph transformation task, and train the model to predict a sequence of graph edits that can transform the product into the reactants.To imitate a chemist's approach to the retrosynthesis, two-step methods {{cite:b35353cd95a5a5c7d0b34f13aaf0a4751ddc2a35}}, {{cite:9c68f059cc26dc96290635ee25dec08702681cda}}, {{cite:19539c2fd71b531e09555e030078ae7ca2c798fd}}, {{cite:9d3974577a47c45b1e90f0da8d3d11fd26fb359b}} first perform reaction center recognition to obtain synthons by disconnecting targets according to the reaction center, and then generate reactants from the synthons.G2Gs {{cite:b35353cd95a5a5c7d0b34f13aaf0a4751ddc2a35}} treats the reactant generation process as a series of graph editing operations and utilizes a variational graph generation model to implement the generation process.RetroXpert {{cite:9c68f059cc26dc96290635ee25dec08702681cda}} converts the synthon into SMILES to generate reactants as a translation task.GraphRetro {{cite:9d3974577a47c45b1e90f0da8d3d11fd26fb359b}} also adopts a similar framework and generates the reactants by attaching leaving groups to synthons." ]
[]
Discrete fully probabilistic design: a tool to design control policies from examples
We present a discretized design that expounds an algorithm recentlyintroduced in Gagliardi and Russo (2021) to synthesize control policies fromexamples for constrained, possibly stochastic and nonlinear, systems. Theconstraints do not need to be fulfilled in the possibly noisy example data,which in turn might be collected from a system that is different from the oneunder control. For this discretized design, we discuss a number of propertiesand give a design pipeline. The design, which we term as discrete fullyprobabilistic design, is benchmarked numerically on an example that involvescontrolling an inverted pendulum with actuation constraints starting from datacollected from a physically different pendulum that does not satisfy thesystem-specific actuation constraints.
[ "We briefly survey a number of works that are related to the probabilistic design framework we use in this paper. We leverage a Bayesian approach to dynamical systems that allows to represent the behaviors of these systems via probability functions. In the context of control, the approach has been leveraged in e.g. {{cite:4aa65d43e8fc7e3d16742e20fc8ad89bc056cb7d}}, {{cite:68b5e4b4d0dff4c5a35dbbd726d82020e2ef92b7}}, , {{cite:cf740f09776b4aaf0bfa21c9fecc60551ad82be5}}, {{cite:22ada5299cc4a546bf73c53e97331125dd94891c}}, for the design of randomized control policies that enable tracking of a given target behavior. In these papers, the tracking problem is tackled by setting-up an unconstrained optimization problem. Closely related works, include , , {{cite:13d3c3f20c49e0bf2a720ed15d0e510a020f837a}}. These works, by leveraging a similar framework, formalize the control problem as the (unconstrained) problem of minimizing a cost that captures the discrepancy between an ideal probability density function and the actual probability density function of the system under control. An online version of these algorithms has been proposed in {{cite:877f82e5b84ea1428d5f05034e4ff6f3ece92b78}}: in such a work, by leveraging an average cost formulation, the probability mass function for the state transitions is found. Finally, we also recall here , {{cite:fa6fcf3e50d04ab7167e4b21eee6d7234256cec8}}, where policies are obtained from the minimization of similar costs by leveraging multiple, specialized, datasets. These last papers, together with {{cite:fefa6647007c2438fe946f8e92fe593ffbdc2deb}}, introduce constraints to the probabilistic formulation. Finally, we also recall {{cite:96bcf7e0d41108d5a271c2fa3f28f1cb3af138dc}}, where a decision making architecture for Robust Model-Predictive Path Integral Control is proposed and this indeed allows the introduction of the constraints (see also references therein).", "The paper is organized as follows. After giving the mathematical preliminaries and formalizing the statement of the problem (Section ), we present the DFPD. This is done in Section , where we also discuss a number of its properties. In Section we describe a design pipeline to use DFPD. The pipeline illustrates a process to determine, via DFPD, control inputs from the data. Finally, the effectiveness of DFPD is illustrated in Section on a pendulum with actuation constraints. Concluding remarks are given in Section ." ]
[]
PyTracer: Automatically profiling numerical instabilities in Python
Numerical stability is a crucial requirement of reliable scientificcomputing. However, despite the pervasiveness of Python in data science,analyzing large Python programs remains challenging due to the lack of scalablenumerical analysis tools available for this language. To fill this gap, wedeveloped PyTracer, a profiler to quantify numerical instability in Pythonapplications. PyTracer transparently instruments Python code to producenumerical traces and visualize them interactively in a Plotly dashboard. Wedesigned PyTracer to be agnostic to numerical noise model, allowing for toolevaluation through Monte-Carlo Arithmetic, random rounding, random dataperturbation, or structured noise for a particular application. We illustratePyTracer's capabilities by testing the numerical stability of key functions inboth SciPy and Scikit-learn, two dominant Python libraries for mathematicalmodeling. Through these evaluations, we demonstrate PyTracer as a scalable,automatic, and generic framework for numerical profiling in Python.
[ "Several tools have been developed to assess numerical quality, and can be divided into static and dynamic approaches. Static approaches typically analyze source code, while dynamic approaches trace floating-point computations throughout executions. A detailed review of these approaches is presented in {{cite:2330fed460ba9f2be1a0e0b3d7a090668e8428cb}}.Numerous tools exists to trace floating-point computations for C, C++, or FORTRAN programs due to the prevalence of these languages in High-Performance Computing (HPC).The main tracing techniques are source-to-source, compiler-based transformations, and dynamic binary instrumentation.", "The source-to-source technique requires a rewriting of the application to modify floating-point types and provides a fine-grained control on the analyzed code.CADNA {{cite:f45ef8883b4b71af446da7ad848efd4a9c4df72e}} is a library for C, C++, and Fortran implementingCESTAC {{cite:ab70006389d9d3fc8298c68f1120d11917f9594b}} stochastic arithmetic. Shaman {{cite:5bde297e6ec1b855e24f1a34b624419ce0a06025}} is a C++ library that uses a first-order error model to propagate numerical error.MCAlib {{cite:3d49e664eeffb02e2748648010582b3e5dc3e23c}} is a C library that implements the Monte Carlo Arithmetic (MCA) {{cite:770fb44578d76a6c1a31428d94e3c9c545fd5682}} using the MPFR {{cite:ebc7c5678a4b55c8234617ff985441e5b7181117}} library.Finally, the work in {{cite:c26e70805d119e3976e7d90d47a98bc89d27be0c}} proposed a source-to-source framework for executing targeted code in infinite and fixed precision with and without stochastic arithmetic. The main drawback of the source-to-source approach is its lacks of scalability since rewriting large codes can be a tedious task.", "The compiler-based approach instruments floating-point expressions at compile timeand so allows the user to automatically instrument large codebases.Verificarlo {{cite:ad9b90e8010079583d9ba7674cc74de376f3ff45}} is a compiler that supports different types of arithmetic instrumentations, including MCA.The work in {{cite:a3cd597903708fea12461b92b28bff879bc8deff}} modified the GNU Compiler Collection (GCC) to track local floating-point errors across executions. pLiner {{cite:cf4d7c9b95dfad541f066e4d58c093c23e32ab0a}} is a root-cause analyzer based on the Clang compiler that detects floating-point operations responsible for result variability using a source-to-source transformation at the Abstract Syntax Tree (AST) level to rewrite parts of code with higher precision.PFPSanitizer {{cite:e51fdaad2dde7ecd0640b40176d9c0b0dfbb83df}}, {{cite:9f0557d189a8e938f3ad545a8439c1a64bf8ddf2}} is a compiler that uses parallel shadow execution to detect numerical issues using higher precision.FLiT {{cite:090bd7e6f6ed5aae9c4f19bbc48435249d903da0}} is a framework to detect variability induced by compilers and their optimizations.The work in {{cite:0709ea4752efe5424371b6afa40da1267be1b6be}} proposes a numerical debugger based on GDB {{cite:7d7e47e6586134b31d71d4d044a9ca886a5122c4}} for Discrete Stochastic Arithmetic (DSA) on FPGA as an Eclipse plugging. Similarly, Cadtrace {{cite:f45ef8883b4b71af446da7ad848efd4a9c4df72e}} and Shaman propose a GDB-based tool to use the CADNA and Shaman libraries with GDB, respectively.The main limitation of the compiler-based approach is that one must have access to the source code.", "Dynamic Binary Instrumentation (DBI) operates directly on executables, without the need for recompilation or manual changes. Therefore, it is applicable to any programming language.CraftHPC {{cite:44c7f0dec9f74c2feba5e2690df3eff468c23b2d}} uses DBI to detect catastrophic cancellations at runtime.Verrou {{cite:2d834e5b8ae0bafe09569df8719547dee886899a}} is a Valgrind {{cite:5f03ae8a5453a5bda5f004528ce64c1efe666027}} based tool that dynamically replacesfloating-point operations with their stochastic arithmetic counterparts. FPDebug {{cite:6c424a955ed93e1e3ff27182d6ae6f4d9d69456b}} uses DBI to detect numerical inaccuracies by using shadow computations with higher precision.Herbgring {{cite:8e62b7ea72da5bfb40ce9a6924217913a73ee486}} is a Valgrind-based tool to detectnumerical instabilities. It uses a shadow memory to detect precision losses by comparison with results obtained at higher precision. It is combined with symbolic computation to backtrack the root of the error.We can note that all methods based on a high-precision oracle suppose that computing with a large number of bits is sufficient to obtain an accurate result, which is not always true (see for example, the famous Muller's sequence {{cite:19fc36b4eafc2bb9722b1b15fb36e7e3d8748e6a}}).Although versatile, the DBI looses high-level information useful to understand the source-code logic.", "Being agnostic to the programming language is a serious advantage of the DBI method compared to source-to-source and compiler-bases methods. However, working at the binary level makes it difficult to access high-level information needed to debug and understand the source-code logic. Conversely, the source-to-source approach provides a fine-grained control on the analyzed code, but it lacks scalability, as rewriting large codes can be a tedious task. Finally, the compiler-based approach takes advantage of the best of both by being automatic and having access to high-level information. However, like source-to-source, the compiler-based method is not suitable for analyzing closed-source libraries.", "To the best of our knowledge, PyTracer is the first tool dedicated to the numerical analysis of Python code. Existing tools for tracing Python code focus on performance profiling for time (cProfile)or memory consumption (memprofile).Anteater {{cite:350bbecd76976728e2e6c52be1ba65000bd6676f}} is a Python tracer tool to debug Python applications.It performs source transformations at the AST level but only deals with native numeric Python types.Moreover, the user needs to manually tag each variable to trace. Finally, according to the authors, Anteater does not scale to large traces.cProfile, memprofile, and Anteater use Python decorators as the primary instrumentation technique, a Python mechanism to instrument a function by adding a line over a function declaration.While this method is appropriate when targeting specific functions, it is not feasible for large codebases where potentially unstable code sections are unknown." ]
[]
Anomaly Clustering: Grouping Images into Coherent Clusters of Anomaly Types
We study anomaly clustering, grouping data into coherent clusters of anomalytypes. This is different from anomaly detection that aims to divide anomaliesfrom normal data. Unlike object-centered image clustering, anomaly clusteringis particularly challenging as anomalous patterns are subtle and local. Wepresent a simple yet effective clustering framework using a patch-basedpretrained deep embeddings and off-the-shelf clustering methods. We define adistance function between images, each of which is represented as a bag ofembeddings, by the Euclidean distance between weighted averaged embeddings. Theweight defines the importance of instances (i.e., patch embeddings) in the bag,which may highlight defective regions. We compute weights in an unsupervisedway or in a semi-supervised way when labeled normal data is available.Extensive experimental studies show the effectiveness of the proposedclustering framework along with a novel distance function upon exist-ingmultiple instance or deep clustering frameworks. Over-all, our frameworkachieves 0.451 and 0.674 normalized mutual information scores on MVTec objectand texture categories and further improve with a few labeled normal data(0.577, 0.669), far exceeding the baselines (0.244, 0.273) or state-of-the-artdeep clustering methods (0.176, 0.277).
[ "Anomaly detection has been extensively studied under various settings {{cite:b1c6d90dd2c2b08f15ad08e6ccf606faec80e485}}, such as supervised with both labeled normal and anomalous data, semi-supervised with labeled normal data {{cite:ff4583e1920aaa6c57195f645dbf79f3f94a1ed6}}, {{cite:92b19e3bfecbbf6ec818514ca28a5831c5f47e9a}}, or unsupervised with unlabeled data {{cite:bb7fc1db55ca870c94e9a356654cf0821f73a877}}, {{cite:0ad9577de4cedfe612341fc10e4466bc850ce64a}}, {{cite:43a6a69fd940f4f6b20fd75283cfe7e589ef054b}}, to train classifiers. While anomaly detection divides data into two classes of normalcy and anomaly, our goal is to group them into many clusters, each of which represents various anomalous behaviors.", "Thanks to the advanced deep learning {{cite:981aaf816d83affd6d9ac06bc572a62301074af6}} there has been a significant progress in visual anomaly detection. Self-supervised representation learning methods {{cite:a4a9a501079db08fb94541b322b73679c618f951}}, {{cite:b5c900b1549594dbbdd0c7917e6b9860abd21d7c}}, {{cite:c9db15e2fcc106857a6fd3cc7da492af6ef9605e}} have been adopted to build deep one-class classifiers {{cite:f80a23395755da4e7c8ca7cb77b4ff339878cdcc}}, {{cite:82f9dd7c97c36641aebdd8b0d133400a77aa0cec}}, {{cite:e25300e28a6d993c2eee4a3f9688f689a8ad32a3}}, {{cite:05015e82c6fdb393b56f6d0889880e5a8414cc8e}}, {{cite:d54f9ae87aeb414c117ab04e0a38905990ca2773}}, showing improvement in anomaly detection and localization {{cite:d5fc5d43d3d6cd1fba5a787e0a5dfd11fe6aed2d}}, {{cite:3d9650d61c00d4fb073c95172e0ee6b22aca6600}}, {{cite:489ca5962cfe4aaf6e3b358e94b40d160855cb00}}. In addition, the deep image representations trained on large-scale object recognition datasets {{cite:0d7d482f3a25a53bf2c93c7fd82f85b9a51714df}} have shown to be a good feature for visual anomaly detection {{cite:d5fc5d43d3d6cd1fba5a787e0a5dfd11fe6aed2d}}, {{cite:759ffbcf5e617534d6225e862a257e6193f97fc2}}, {{cite:43aeef5192b9fdd8b7bd6602a62aa3e00b26a338}}, {{cite:1bb83e1960bfb949198412d9d73017a821076fd7}}, {{cite:a0da674f6b9a9d5c3aad00c22811da2f93643dbf}}.While we follow the similar intuition as we represent an image as a bag of patch embeddings with pretrained networks, we propose a method to compute the distance between images for clustering instead of building one-class classifier for detection, i.e., binary classification.", "Image clustering is an active research area, and one of its key questions is on how to represent an image.Typical approaches {{cite:196e9afeb45dda8b8b2db52ffa4c559f936282ee}}, {{cite:8c78b16563a8cff8a8b726aadf7cf8bbe7a46dc5}} include bag-of-keypoints {{cite:8c78b16563a8cff8a8b726aadf7cf8bbe7a46dc5}}, where one builds a histogram of local descriptors such as SIFT {{cite:0c1252db941e0f91e07f900e6b433ee05dda320b}} or Texton {{cite:9a10000eed6257a3bf90627b082868ea15959d5c}}, and spatial pooling {{cite:a389d2a42181dd39f7ca982852be29e9796dd3a2}}, where one aggregates local descriptors by averaging, to obtain a holistic representation of an image.Some applications relevant to our work include texture and material classification {{cite:196e9afeb45dda8b8b2db52ffa4c559f936282ee}}, {{cite:0840af4514fa549e7e6b8f5d3d775616b80a4b86}}, {{cite:f9d6f748efe9a23e948bac13029f363294379832}}, and description {{cite:cf61170156a0c88b84c94ac83c2802a226015a26}}, {{cite:b6eaecb17d6a5d338849e74da0f19e880e620791}}. While their goal is to classify images of different texture or material properties with supervision, our goal is to cluster images with subtle differences due to defects without or with a minimal supervision. In addition, instead of using a holistic representation, we use patch representations and cast the problem as multiple instance clustering by automatically identifying important instances.", "Deep clustering {{cite:8d2fe2da5846e7e6d53e091d2ba6917bf3e529ac}}, {{cite:7eb1265ab372d8896a6ae2564a7e3c1d2db55879}}, {{cite:044c6073dd3e97ea710bf92ee08eec9659735ad5}}, {{cite:d73251348631ce73f77e639c87375fd425bc6df6}}, {{cite:366d872f9e732e9844b1ba452b34087e5946a7a6}}, on the other hand, jointly learns image representations and group assignments using deep neural networks.While there has been a huge progress in clustering natural and object-centered images, such as those from CIFAR-10 {{cite:a18ac926dbcc0b1cc683c28b1ab8bfe1a7b92f3a}} or ImageNet {{cite:d1b4e8c223b06826473f779ae1da54bc9670473b}}, state-of-the-art deep clustering methods do not work well for anomaly clustering, which requires to capture subtle differences of various anomaly types, as in Section REF ." ]
[]
MIA-Former: Efficient and Robust Vision Transformers via Multi-grained Input-Adaptation
ViTs are often too computationally expensive to be fitted onto real-worldresource-constrained devices, due to (1) their quadratically increasedcomplexity with the number of input tokens and (2) their overparameterizedself-attention heads and model depth. In parallel, different images are ofvaried complexity and their different regions can contain various levels ofvisual information, indicating that treating all regions/tokens equally interms of model complexity is unnecessary while such opportunities for trimmingdown ViTs' complexity have not been fully explored. To this end, we propose aMulti-grained Input-adaptive Vision Transformer framework dubbed MIA-Formerthat can input-adaptively adjust the structure of ViTs at threecoarse-to-fine-grained granularities (i.e., model depth and the number of modelheads/tokens). In particular, our MIA-Former adopts a low-cost network trainedwith a hybrid supervised and reinforcement training method to skip unnecessarylayers, heads, and tokens in an input adaptive manner, reducing the overallcomputational cost. Furthermore, an interesting side effect of our MIA-Formeris that its resulting ViTs are naturally equipped with improved robustnessagainst adversarial attacks over their static counterparts, becauseMIA-Former's multi-grained dynamic control improves the model diversity similarto the effect of ensemble and thus increases the difficulty of adversarialattacks against all its sub-models. Extensive experiments and ablation studiesvalidate that the proposed MIA-Former framework can effectively allocatecomputation budgets adaptive to the difficulty of input images meanwhileincrease robustness, achieving state-of-the-art (SOTA) accuracy-efficiencytrade-offs, e.g., 20% computation savings with the same or even a higheraccuracy compared with SOTA dynamic transformer models.
[ "Vision Transformers.Transformers are first introduced to natural language processing tasks in {{cite:184a98ff0987d19e367a7f172f69862f1045b78d}} and achieve impressive performance in language modeling, machine translation, and other downstream tasks. It has been shown that the self-attention module in transformers can serve as an effective way to model the token-wise relationship of sentences. {{cite:49dc020d405839f6ec5a9af913dcf2c5a0a5ad85}} then proposes ViTs, which is a pioneering work to extend transformer architectures to large scale compute vision tasks and matches SOTA CNNs' performance. Specifically,ViTs first split an input image into a series of patches which are embedded into tokens before passing into the ViT blocks;Each ViT block consists of a stacked MSA and multi-layer perceptron (MLP) module to extract the global relationship among input tokens;Multiple heads further enable ViT blocks to extract different features via different heads, improving the expressiveness of ViTs.The success of ViTs on large scale image recognition tasks (e.g., ImageNet dataset {{cite:82c2a5ffa26c3eeb82398bd58d1b725f62087efb}}) has inspired a series of following works to further exploit the expressive power of ViTs from different perspectives: {{cite:c656d96921881b7a15da15aaffab1928916a79b6}} performs an exhaustive search for the optimal training recipe for training ViTs; {{cite:054f54fcf03866dc041d7d16e6f8908bf529371f}} exploits the impact of patch sizes on ViTs' achievable performance and proposes a parallel ViT architecture to simultaneously utilize information from both small and large patches to achieve better performance; and {{cite:28699db03735d23459f783647bd0954daf7202bc}} proposes hierarchical structures for ViTs like ResNet {{cite:aebaac9189d87da36afffa5c1ebfa8a982712e7e}}, and {{cite:3ce269456838f126dac50356e16ca5bed14e0f8c}} modifies the shape of patches from square to cross to balance the global and local attentions.Among them, LeViT {{cite:255a2ef37afa3e2499359fe34b873fcb27ae215f}} achieves impressive performance by exploring the potential of applying convolutional layers before ViTs. Specifically, LeViT is the first ViT network that achieves a better accuracy-efficiency trade-off than EfficientNet {{cite:35de55fee2338838fd01cdfffdf1b5ec645331bb}} under certain FLOPs ranges.", "Input-adaptive Inference.Adaptively activating different components of a deep neural network (DNN) in an input-dependent manner has been proved to be an effective way to reduce the inference cost, which has been widely explored for CNNs. Existing techniques in this regard can be roughly summarized into two categories: (1) making early predictions by introducing multiple side branch classifiers and dynamically exiting from one branch by analyzing the confidence of intermediate feature maps {{cite:e630af688c98802142583df6359412d1d92cb092}}, {{cite:750f2f83a51d3e388fed50d5c3f6e501b2b20b0c}} and (2) adaptively skipping certain components of the model, such as blocks, channels and even bit-width {{cite:ac381fb7b92975b14b7f01c9479ca4ecef4981b5}}, {{cite:7b46d47a3afd0a7b502a684e4fc992210ee3e6be}}, {{cite:77546b4d9f252d5a1db6b078033c3c54b06b39e6}}, {{cite:4ef41544969f148958e2a6f4726ef7f638965d75}}.Nevertheless, the opportunities of input-adaptive inference have not yet been extensively explored in the scope of ViTs as existing works merely focus on dynamically adjust the input tokens, either by pruning out certain tokens {{cite:bfa5180422b8f85f412582d24fd20e09156502ae}} or by adjusting the input patch size {{cite:6a266e50590aaa2d2f522138cb8f6c364041190c}}. Other design dimensions in ViTs are still neglected, such as the number of attention heads and model depth, which play important roles in the overparameterization of ViTs.", "Adversarial Robustness and Model Efficiency.DNNs' robustness and efficiency are two critical features required in real-world applications.There are some pioneering works trying to simultaneously optimize both for CNNs. For example,{{cite:a1bb7e69e1c4f2e024cb7230751526f99f1d528f}}, {{cite:300d1894b22ce135085fcfc553be012da6439f94}}, {{cite:7e93c33528987a1dacbfa41e8aa19a64db2e0c9b}}, {{cite:f02265a538843e36051ed3caa8dc4e9cc5b6ce21}} combine pruning techniques with adversarial training methods. {{cite:c38c1624e32934f514cc68e9404be75775a46a20}} leverages the poor adversarial transferability between different precisions to win both robustness and efficiency, which can be accelerated by customized accelerators {{cite:95f75b9c619ceadbe175e7a79d40730319cbc54a}} for further boosted efficiency. And {{cite:01b1ade1792e2c9f92da4a0baa50b1125f8d5f73}} uses dynamic quantization of activation functions to defend against adversarial examples; {{cite:70244ec64763afbd8bdafa921fb795a844d53acc}} introduces input-adaptive inference for simultaneously boosting robustness and efficiency.However, existing works have shown that CNNs and ViTs behave differently under adversarial attacks {{cite:c965a5265cfd73cb5851440b3b1a5560dc3a5324}}, {{cite:1dd762d0c57c01675777de028ab8758e1b8e5401}}, and how to win both adversarial robustness and model efficiency for ViTs is still an open question." ]
[]
Entropic Herding
Herding is a deterministic algorithm used to generate data points that can beregarded as random samples satisfying input moment conditions. The algorithm isbased on the complex behavior of a high-dimensional dynamical system and isinspired by the maximum entropy principle of statistical inference. In thispaper, we propose an extension of the herding algorithm, called entropicherding, which generates a sequence of distributions instead of points.Entropic herding is derived as the optimization of the target function obtainedfrom the maximum entropy principle. Using the proposed entropic herdingalgorithm as a framework, we discuss a closer connection between herding andthe maximum entropy principle. Specifically, we interpret the original herdingalgorithm as a tractable version of entropic herding, the ideal outputdistribution of which is mathematically represented. We further discuss how thecomplex behavior of the herding algorithm contributes to optimization. We arguethat the proposed entropic herding algorithm extends the application of herdingto probabilistic modeling. In contrast to original herding, entropic herdingcan generate a smooth distribution such that both efficient probability densitycalculation and sample generation become possible. To demonstrate the viabilityof these arguments in this study, numerical experiments were conducted,including a comparison with other conventional methods, on both synthetic andreal data.
[ "Herding used the weighted average of features with time-varying weight values. This technique, which can be called time-varying feature weighting, is also employed in other research areas. It is mainly used to mitigate the problem of local minima often encountered in optimization.", "The maximum likelihood learning of MRF (REF ) is often performed using the following gradient:{{formula:f18e2227-bb22-461d-b76d-c1b65ab510e4}} ", "The expectation in the second term can be approximated using the Markov chain Monte Carlo (MCMC) {{cite:40ade829aa72261f0a78c8e7b0a6c3f14479fbf0}}, {{cite:4efb2a5d2be9b4872356b003a8cccdfae0d567af}}. However, it is known that MCMC often suffers from slow mixing because of the sharp local minima in the potential function {{formula:530e9bab-9318-4153-aac0-193042729877}} . In the case of MRF (REF ), the potential function is {{formula:073b20c3-e308-441b-8222-9bf35be62dfc}} , which also has the form of a weighted sum of the features. The parameter {{formula:0420d666-3b27-47c6-8601-ee9ae6b0962d}} changes over time during the learning process. {{cite:5b441954c17608ea26f7d28b44ae37294519df00}} demonstrated that the efficiency of learning can be improved by adding extra time variation to the parameter.", "Combinatorial optimization is another example of the application of time-varying feature weighting. The Boolean satisfiability problem (SAT) is the problem of finding a binary assignment to a set of variables satisfying the given Boolean formula. A Boolean formula can be represented in a conjunctive normal form (CNF), which is a set of subformulae called clauses combined by logical conjunctions. This problem can be regarded as the minimization of the weighted sum of features, where features are defined by the truth values of clauses in the CNF. Several methods {{cite:4a5f0eba1388cbb573031e53dd7818e61a7f851a}}, {{cite:a8ab2a71380c3eec720b1a4d273957c6ff2d71a0}}, {{cite:f766304448bb9fe4d9d21e7867b3bb18e742cdab}}, {{cite:a42ef1a1c25eac440cc196162248727154a14e58}} solve the SAT problem by repeatedly improving the assignment for the target function and changing its weights when the process is trapped in a local minimum.", "{{cite:335c90fe9e34eb3b6acad745e4c63371582eda13}}, {{cite:0770568220a02f14861c2345e6edaf27d9faf1b5}} proposed a continuous-time dynamical system to solve the SAT problem, which implements the local improvement and time variation of the weight values. It is also shown that this system is effective in solving MAX-SAT, which is the optimization version of the SAT problem {{cite:f7a27103caea8b149f15f37680dd259fe2e03cf2}}. As suggested by {{cite:0dc00fd7061bc41c9c77348700da74906127c421}}, one advantage of using deterministic dynamics is the possibility of efficient physical implementation. {{cite:81454843a048b299a529519cb2fdb50d33aab9eb}} designed an electric circuit implementing the SAT-solving continuous-time dynamical system and evaluated its performance." ]
[]
EyePAD++: A Distillation-based approach for joint Eye Authentication and Presentation Attack Detection using Periocular Images
A practical eye authentication (EA) system targeted for edge devices needs toperform authentication and be robust to presentation attacks, all whileremaining compute and latency efficient. However, existing eye-based frameworksa) perform authentication and Presentation Attack Detection (PAD) independentlyand b) involve significant pre-processing steps to extract the iris region.Here, we introduce a joint framework for EA and PAD using periocular images.While a deep Multitask Learning (MTL) network can perform both the tasks, MTLsuffers from the forgetting effect since the training datasets for EA and PADare disjoint. To overcome this, we propose Eye Authentication with PAD(EyePAD), a distillation-based method that trains a single network for EA andPAD while reducing the effect of forgetting. To further improve the EAperformance, we introduce a novel approach called EyePAD++ that includestraining an MTL network on both EA and PAD data, while distilling the`versatility' of the EyePAD network through an additional distillation step.Our proposed methods outperform the SOTA in PAD and obtain near-SOTAperformance in eye-to-eye verification, without any pre-processing. We alsodemonstrate the efficacy of EyePAD and EyePAD++ in user-to-user verificationwith PAD across network backbones and image quality.
[ "Eye authentication using irises: Daugman {{cite:be94b4fe9fa0c756399a47d722b019d95ad8e26c}}, {{cite:28f9925556e3c3907205aa4f91d74b211053338a}} introduced the first automated system for EA by applying Gabor Filters to the normalized image for generating spatial barcode-like features (IrisCode). More recently, several works have proposed using deep features for EA. {{cite:06ddac12bf659ea4bd4ba7ce261dacd9045d2d16}} proposed DeepIrisNet, the first deep learning-based framework for generalized EA, followed by {{cite:74a02d273f79ef2de03203ca6f1f1d7ce55c46ed}}, {{cite:7fb8602998cc72cfcfc2795144e1059520fbf8e4}}, {{cite:ddbaec8492e943fe5849d7c082bd255f4ca1fae8}}. {{cite:86a0a93ebeb5000f0b3d3153a53025f1a8bd7dbd}} presents UniNet, that consists of two components: one for generating discriminative features (FeatNet) and the other for segmenting the iris and non-iris region (MaskNet). Both of these components accept the normalized iris images that also requires segmentation. {{cite:eab39f5d9599bd27ae01d968d8719357e9c48187}} uses dilated convolution kernels for training CNNs for EA. {{cite:7de7af96345f1dbc3d73a498223ec24dbc844cf8}} presents an encoder-decoder pipeline to extract multi-level iris features and use an attention module to combine the multi-level features.{{figure:bafcd616-7031-422c-9e06-2f1cf8df57d2}}", "Eye-based Presentation Attack Detection: PAD in periocular images has received significant attention from the deep learning community in the past few years {{cite:0f140d3f8e914e5d1c893eefc63969a7a63454a0}}, {{cite:5e5b6edbd8532f9e1f02a70b952582a2761a3499}}, {{cite:a7df4e60b5b3be2ea6acabdc39970321c24356d4}}, {{cite:fa083b3b444e370c6de951d82f902454eb6b6a7c}}, {{cite:1505b07627ff3e18bdee4aa01cb18c6a69873e4d}}, {{cite:b3343adcb902bb1d70ed3de15da70955c065d4de}}. {{cite:a33cb70b9efc2b618d9546c484196b99a669697d}}, {{cite:21ce081dc0f7fc676614a28955b7cff1524638a3}} propose fusing handcrafted and CNN features to detect PA. {{cite:aa60533953aed7bfbde0fba7b2c49cb42ebd239f}} fuses the features from different layers in a deep network extracted for normalized iris images for PAD. {{cite:a7df4e60b5b3be2ea6acabdc39970321c24356d4}}, {{cite:fa083b3b444e370c6de951d82f902454eb6b6a7c}} show that DenseNet architecture helps to achieve high PAD accuracy. {{cite:f416bf1e824f2fc30fbec7f046c39fd8cb166c5e}} proposes dividing the iris region into overlapping patches and training CNNs using these patches. {{cite:1505b07627ff3e18bdee4aa01cb18c6a69873e4d}} introduces an attention guided mechanism to improve PAD accuracy. {{cite:b3343adcb902bb1d70ed3de15da70955c065d4de}} introduces a binary pixel-wise supervision with self attention to help the network to find patch-based cues and achieve high performance in PAD.", "All of the EA algorithms use the normalization process proposed in {{cite:28f9925556e3c3907205aa4f91d74b211053338a}} that requires iris segmentation. Similarly, most PAD algorithms also use auxiliary pre-processing steps such as iris detection/segmentation. A brief summary of the preprocessing steps in EA and PAD is given in Table REF .", "Disjoint Multitask Learning and Knowledge Distillation:Disjoint multitask learning (MTL) is the process of training a network to perform multiple tasks using data samples that have labels for either of the tasks, but not for all the tasks. Training a single network for EA and PAD is a disjoint MTL task because EA datasets do not include PAD labels. One solution is to follow the existing disjoint multitask learning strategies {{cite:6f5276101615356fa69930bcd71c466aa3d7ba9f}}, {{cite:651eecb91687c21a1e0bf0b38c90647f43b448b7}}, {{cite:8c408ebbd9c53f8888a422393216673969c33023}} and update each branch of the network alternately. However, it is well known {{cite:8ff649261d7ccc8fa812bdb5dc6ba76138e43b22}}, {{cite:d0c0c80b5f50c47f9c20de45bd9ff3cb848a0e9e}} that alternating training suffers from the forgetting effect {{cite:8ff649261d7ccc8fa812bdb5dc6ba76138e43b22}} and degrades performance in multitask learning. Knowledge Distillation (KD) {{cite:8df4063fe203ac917048fb3925d5d5ccdcf8783d}} has been commonly used to reduce forgetting in continual learning {{cite:8ff649261d7ccc8fa812bdb5dc6ba76138e43b22}}, {{cite:676a680810e54de98d7f98393d2bdc5d27a38362}}, {{cite:c030811cd01c413639778a403bc364a7e70cd4bf}}, {{cite:c479d598f83e8dfd8f178a53e4d60343168fcf42}}, {{cite:40990b31f95b339c7d1fcdd5f4e3c2eb190101e6}}. Inspired by this, {{cite:d0c0c80b5f50c47f9c20de45bd9ff3cb848a0e9e}}, {{cite:19025cf5630d2d984a4e0b7d14da2bf41f3177a7}} employ feature-level KD for multitasking. In {{cite:d0c0c80b5f50c47f9c20de45bd9ff3cb848a0e9e}}, KD is used to distill the information from the network from a previous iteration {{formula:16b3b49c-b092-45ec-be13-001fe7e8ea3d}} that was updated for task A (teacher), while training it to perform task B in the current iteration {{formula:58aefc2d-f8e3-47a6-83cc-c35a015a9123}} (student). However, in this scenario, the teacher network is not fully trained in the initial few iterations and thus the distillation step may not help preserve task A information. Similar to {{cite:d0c0c80b5f50c47f9c20de45bd9ff3cb848a0e9e}}, we propose strategies employing feature-level KD for disjoint multitasking (EA and PAD). But, unlike {{cite:d0c0c80b5f50c47f9c20de45bd9ff3cb848a0e9e}}, we ensure that the teacher network in our proposed methods is fully trained in one or more tasks." ]
[]
The Complexity of Iterated Reversible Computation
We study a class of functional problems reducible to computing $f^{(n)}(x)$for inputs $n$ and $x$, where $f$ is a polynomial-time bijection. As we prove,the definition is robust against variations in the type of reduction used inits definition, and in whether we require $f$ to have a polynomial-time inverseor to be computible by a reversible logic circuit. These problems arecharacterized by the complexity class $\mathsf{FP}^{\mathsf{PSPACE}}$, andinclude natural $\mathsf{FP}^{\mathsf{PSPACE}}$-complete problems in circuitcomplexity, cellular automata, graph algorithms, and the dynamical systemsdescribed by piecewise-linear transformations.
[ "Our research combines research from structural complexity theory, circuit complexity theory, the theory of cellular automata, graph algorithms, and dynamical systems theory, which we survey in more detail in the relevant sections and summarize here.", "In structural complexity theory, many early complexity classes such as {{formula:75ee8638-bd30-41f8-8d48-83ae76b184f9}} , {{formula:05c9ff87-dd57-4081-8ce8-757cf2d77517}} , and {{formula:cb195804-64dd-4461-ba6b-f511ce9712d4}} were defined by bounding resources such as space or time in computational models such as deterministic or nondeterministic Turing machines. More recently, it has become common instead to see complexity classes defined by reducibility to certain fundamental problems or classes of problems: for instance, {{formula:931a5d67-f23c-4c16-a080-2b736097c002}} and {{formula:149a5c02-4cb4-48a7-813f-68966a44a301}} are based on searching for specific structures in graphs {{cite:2e8f80a97cd1149e2058ab6d4a3d514a0c63efd5}}, while {{formula:6be7af34-0bb5-4a3d-9206-3836879a3587}} is based on reducibility to problems in the existential theory of the real numbers {{cite:eb030d93f22a72e8518412f356fe34edf5fa7d1d}}. Similarly, one can redefine {{formula:33eeae7b-f2c2-44ce-8267-9413cba06b23}} by reducibility to brute force search algorithms on deterministic machines. Our work takes inspiration from this shift in perspective, and similarly describes a class of problems that are reducible to iteration of bijections. One difference, however, is that while {{formula:d8816fd1-ca14-4377-89ee-51994bf88fa7}} , {{formula:b5bb3351-d0cd-4400-a3f8-a5de7db97102}} , and {{formula:0fac579e-274f-4667-abee-998a2c61c621}} are all in some sense “near” {{formula:96879349-f113-42d1-9392-e1ef43341848}} , our new class is more similar to {{formula:a284d7d4-eca1-4bf5-86aa-453a9fd37520}} both in its relation to other known classes and in how it is defined.", "In the theory of reversible circuits, a central result is the ability of these circuits to simulate non-reversible combinational logic circuits {{cite:c5c0c03a31cdce7511ad3837f49ec3b244285d16}}. Reversible logic gates or families of gates, such as the Fredkin gate {{cite:198b082a73d7bb3e070f53e0ac433d57be123165}} or the Toffoli gate {{cite:ddd135185351671d003f84c66e7ca740285f51c4}}, are said to be universal when they can be used for these simulations. This does not mean that they can compute all functions or even all bijective functions; the Fredkin gate, for instance, can only compute functions on binary values that preserve the number of nonzero bits {{cite:198b082a73d7bb3e070f53e0ac433d57be123165}}. As we discuss later, there are easily-computed bijections that cannot be computed by any reversible logic circuit. We are not aware of prior attempts to simulate sequential (cyclic) conventional logic using purely reversible logic circuits, as we consider here.", "The connection between reversible circuits and reversible cellular automata is well-established through the simulation of Fredkin-gate circuits by Margolus's billiard-ball block-cellular automaton {{cite:900e94fb0023de787ed4614fe4b3539f3ba99d37}}. This provides one route to Turing completeness of reversible cellular automata, for which many more constructions are known {{cite:f3f44b84cad2c0030a4677d3d6fd24a362f467ad}}, {{cite:28f9dede3349bdef184261595c738f401b360bbc}}, {{cite:ac7a781808ec14bc0ef9f436daafa5ccfe878320}}, {{cite:bf829562dbcd02b6b8f697f5b09eed11eb1d3776}}, {{cite:a2bcb9e9e85857a2a7aa97338a1c71dc7bed942c}}, {{cite:b63cd19db8fe53f2f4a80e8c8683613f3ddd5ec6}}. Although Turing completeness is closely related to the completeness properties studied here, these constructions generally involve infinite arrays of cells and in some cases initial conditions with infinite support, in contrast to our focus on space-bounded complexity. Another route to Turing completeness is the simulation of other cellular automata by reversible cellular automata. The billiard-ball model can simulate any other two-dimensional locally reversible cellular automata {{cite:d63d71bff68b8b90a74d11686fee5994222fe7a4}}, and Toffoli simulates abitrary (non-reversible) {{formula:3c89cad9-9042-46ea-845f-0e12b3d5b0cd}} -dimensional cellular automata by {{formula:e74d173f-10e4-4f10-b940-a4c06dddb323}} -dimensional reversible cellular automata {{cite:f3f44b84cad2c0030a4677d3d6fd24a362f467ad}}. Our construction of a one-dimensional {{formula:f87cae49-96ee-457d-9af2-486af3c78711}} -complete (and Turing-complete) reversible cellular automaton that simulates a two-dimensional one stands in sharp contrast to a result of Hertling {{cite:393c3a52f3f5249242585dd1ee1dde9cca8e8f54}} that (under weak additional assumptions) simulations of cellular automata by reversible ones must increase the dimension, as Toffoli's construction does. Our construction does not meet Hertling's assumptions.", "Another well-established connection relates algorithmic problems on implicitly-defined graphs to problems in computational complexity, by considering graphs that describe the state spaces of Turing machines or other computational models. It is standard, for instance, to reinterpret Savitch's theorem relating nondeterministic and deterministic space complexity as providing an algorithm for testing reachability in implicit directed graphs in quadratic space. Similarly, the Immerman–Szelepcsényi theorem on closure of nondeterministic space classes under complement has an equivalent algorithmic form, a nondeterministic linear-space algorithm for non-reachability in directed graphs {{cite:376958d282e4034b57501474e3a7fbbfd2f58870}}. The complexity classes {{formula:f138d112-154f-4590-8bca-7558d4adb1f5}} and {{formula:3e23d3b4-b520-4e4e-bb64-d1a74d00802c}} were formulated in the same way from algorithmic problems on implicit graphs {{cite:2e8f80a97cd1149e2058ab6d4a3d514a0c63efd5}}. A specific algorithm that has been frequently studied in this light is Thomasen's lollipop algorithm for finding a second Hamiltonian cycle in an (explicit) cubic graph by following a path in a much larger implicit graph defined from the given graph {{cite:b2199168d00e07cf16ff73246091882e8aeb2e45}}. Although some inputs cause this algorithm to take exponential time {{cite:92d26ddfcfe5aa5c43c072ea1ef2e001f5e6ead3}}, {{cite:a2c9a7c4829ae1b6c7542ecd17e457b94d174c4e}}, {{cite:b346edd94eb2fa51e1e4ae6d9bb3639590234281}} the complexity of finding a second Hamiltonian cycle in a different way is unknown, and was one of the motivating problems for the definition of {{formula:952b5d83-99b4-4079-bbe5-3118df01e430}}  {{cite:2e8f80a97cd1149e2058ab6d4a3d514a0c63efd5}}. We formulate the same question in a different way, asking how hard it is to find the same cycle that Thomasen's algorithm finds, but again the complexity of this problem remains unknown.", "Our final section concerns the iteration of invertible piecewise linear functions. This topic is well studied in the theory of dynamical systems; previously studied functions of this type include Arnold's cat map {{cite:3b58cb707c7441a585a77d61423488359381d79e}} and the baker's map {{cite:21c9a30eb24352a3358341b1c897ff8c8e02516f}}, both acting on the unit square, and the interval exchange transformations on a one-dimensional interval {{cite:0ab58ff57d7bc927df0974c751e570ab9851799f}}. The focus of past works on these transformations has been on their chaotic dynamics, rather than on the computational complexity of computing their iterates. We also consider perfect shuffle permutations, formulated as piecewise linear functions; their iterates have again been studied, notably to determine their order in the symmetric group {{cite:9869bbf21bf562061cd34153cdbae7110904666c}}." ]
[]
AdaptPose: Cross-Dataset Adaptation for 3D Human Pose Estimation by Learnable Motion Generation
This paper addresses the problem of cross-dataset generalization of 3D humanpose estimation models. Testing a pre-trained 3D pose estimator on a newdataset results in a major performance drop. Previous methods have mainlyaddressed this problem by improving the diversity of the training data. Weargue that diversity alone is not sufficient and that the characteristics ofthe training data need to be adapted to those of the new dataset such as cameraviewpoint, position, human actions, and body size. To this end, we proposeAdaptPose, an end-to-end framework that generates synthetic 3D human motionsfrom a source dataset and uses them to fine-tune a 3D pose estimator. AdaptPosefollows an adversarial training scheme. From a source 3D pose the generatorgenerates a sequence of 3D poses and a camera orientation that is used toproject the generated poses to a novel view. Without any 3D labels or camerainformation AdaptPose successfully learns to create synthetic 3D poses from thetarget dataset while only being trained on 2D poses. In experiments on theHuman3.6M, MPI-INF-3DHP, 3DPW, and Ski-Pose datasets our method outperformsprevious work in cross-dataset evaluations by 14% and previous semi-supervisedlearning methods that use partial 3D annotations by 16%.
[ "In the following, we discuss the related work with a focus on cross-dataset adaptation.", "Weakly-supervised Learning. Weakly supervised learning has been proposed to diminish the dependency of networks on 3D annotations. These methods rely on unpaired 3D annotation {{cite:ec906474499a4620206b35b803a429fabd65e845}}, {{cite:21c0265c4476d240ee4b04dfe8cff202a4270c51}}, {{cite:c0437720c14ce6ce6b82662425a9546e175b5e7b}}, multi-view images {{cite:1f8929e482dfacc5a8a1d37ed9de9db5dd1ee574}}, {{cite:b7f27b73ac1cda84482ac9a5b64ea4d4a9f09419}}, {{cite:399bb8df6eebd5a31a5742db01cad59f8820681a}}, {{cite:e92c10b121a4a9f7f82641bf41efb8995b3500d8}}, {{cite:381ad05ee173fb59e1acc1995062d1e5309b498f}}, or cycle-consistency {{cite:f16fd8c7da14623059139728caea9c02d9291600}}, {{cite:d60b8fd50961d4f3aeef40b7c77d8369627c0729}}. Most related to our work is the adaptation of a network to the target domain via weakly supervised learning. Zhang {{cite:3c243c190efbd386a88f9307f39b1016b06e881f}} propose an online adaptation to target test data based on the weakly supervised learning method of {{cite:f16fd8c7da14623059139728caea9c02d9291600}}. Yang {{cite:c0437720c14ce6ce6b82662425a9546e175b5e7b}} use unpaired 3D annotation to further fine-tune a network on in-the-wild images. Kundu {{cite:6f45bf81a1f1f8f8b615198133ac8b865c62f299}} use a self-supervised learning method to improve the generalization of a pre-trained network on images with occlusion.{{figure:ae19a630-ef6e-415c-8f66-e9f46dc46973}}", "Cross-dataset Generalization. Cross-dataset adaption of 3D pose estimators has recently gained attention. Guan and Zhang  {{cite:adbc1e68ede159db54e29e062a176b79fd735410}}, {{cite:3c243c190efbd386a88f9307f39b1016b06e881f}} propose an online adaptation of the pose estimator during the inference stage over test data. Guan  {{cite:adbc1e68ede159db54e29e062a176b79fd735410}} use a temporal consistency loss and a 2D projection loss on the streaming test data to adapt the network to the target test dataset. Zhang  {{cite:3c243c190efbd386a88f9307f39b1016b06e881f}} use a cycle consistency approach to optimize the network on every single test frame. Although the online-adaptation approach improves cross-dataset generalizability, it also increases the inference time, especially if the networks exploit temporal information. Wang  {{cite:0a8f4d56dd0f49966edab8d3a140113627214a95}} argues that estimating the camera viewpoint beside the 3D keypoints improves cross-dataset generalization of the 3D pose estimator. However, the camera viewpoint is not the only criterion that differs between datasets. Split-and-Recombine  {{cite:2ccd83c4404799d4a0d215eb0b228ca4b05f3fc9}} proposes to split the human skeleton into different body parts so that different body parts of a rare pose from the target dataset could have been seen in the source dataset.", "Data Augmentation is another way to diminish cross-dataset errors. Previous methods perform data augmentation on images {{cite:7aae3ddcb788855da3e6a25d05c410d56549895d}}, 3D mesh models {{cite:aed919c5a6d2b260322ae16afe7644db1aef612c}}, {{cite:da2fa692f8801a596215e5aa97520a26e005f561}}, {{cite:8ec94d73d911f3b351b08a8f0dd25a2b3ab9ef60}}, or 2D-3D pairs {{cite:b5f308e8994c75903995e20ed6028db7156d07da}}, {{cite:63328c086a1f3be9dc58967a2cd4f353d661ff80}}, {{cite:adbc1e68ede159db54e29e062a176b79fd735410}}. Most related to our work is augmenting 2D-3D pairs. Li {{cite:b5f308e8994c75903995e20ed6028db7156d07da}} generate synthetic 3D human samples by substituting body parts from a source training set. The evolutionary process of {{cite:b5f308e8994c75903995e20ed6028db7156d07da}} is successful in generating new poses, however, the generation of natural camera viewpoints is overlooked. Instead, it randomly perturbs source camera poses.", "PoseAug {{cite:2a84e72ca50a150d6dc5e5dfbac09e19bf72797b}} proposes an end-to-end data augmentation framework that trains along with a pose estimator network.", "Although it improves the diversity of the training data, there is no guarantee that the generated samples are in the distribution of the target dataset. Moreover, according to the ablation studies of PoseAug, the main improvement comes from generating camera viewpoints instead of generating new poses. This means that PoseAug has limited abilities to effectively improve pose diversities in the training set.In contrast, we enforce the generated synthetic data to be in the distribution of the target data.Unlike PoseAug, we show that our motion generation network significantly improves cross-dataset results even without augmenting the camera-viewpoints." ]
[]
A Large-Scale Characterization of How Readers Browse Wikipedia
Despite the importance and pervasiveness of Wikipedia as one of the largestplatforms for open knowledge, surprisingly little is known about how peoplenavigate its content when seeking information. To bridge this gap, we presentthe first systematic large-scale analysis of how readers browse Wikipedia.Using billions of page requests from Wikipedia's server logs, we measure howreaders reach articles, how they transition between articles, and how thesepatterns combine into more complex navigation paths. We find that navigationbehavior is characterized by highly diverse structures. Although mostnavigation paths are shallow, comprising a single pageload, there is muchvariety, and the depth and shape of paths vary systematically with topic,device type, and time of day. We show that Wikipedia navigation paths commonlymesh with external pages as part of a larger online ecosystem, and we describehow naturally occurring navigation paths are distinct from targeted navigationin lab-based settings. Our results further suggest that navigation is abandonedwhen readers reach low-quality pages. Our work provides a conceptual andmethodological framework for analyzing reader navigation patterns, whichenables a more systematic understanding of readers' information needs andallows for improving their experience on Wikipedia as well as the Web moregenerally.
[ "Navigation on the Web.Characterizing the user navigation on the Web is a challenging task because of the limited availability of data. Previous work focused on modeling navigation patterns based on server logs of large websites or by using modified browser versions. A common finding is that people frequently revisit the same content multiple times {{cite:8671aff5ce74310e2b3b827a8a27b6eaa1c270ea}}, {{cite:84f8587d9d05d378472f0435783c9df60ed563f3}}. This repeat consumption behavior, which is abandoned when the person gets bored of the content {{cite:2e840c670c060ba3ec57a87f0f3132672a93586b}}, makes human mobility on the Web predictable {{cite:0ed8f170a5a2703b0ee305e71b2fa95b5cb855af}}.Although researchers found that Web users are not strictly Markovian (the page visited next does not depend exclusively on the current state) {{cite:020dfdc49658af3b24ad506d963d932b81ecd62b}}, many prediction models approximate the navigation of users on a network with Markov chains {{cite:cc399bcda17ea7877dac36be2b47e7a694196cf4}}, {{cite:2a29da3ca4cffa970853b352509254a161220bcf}}, {{cite:bf348e71a4baa37a484e207620b976dd95f3a181}} and hybrid models {{cite:296e85238dc5efe3f1474b5961887d80555c9f56}}, {{cite:8563931652f1821daf71308e7c1b87544a583481}}, {{cite:5f5bbfd815a0c77dd4d6b0348c5e0c3ecb57ea78}}, {{cite:9570e8b375dc3a8821ad79f16d7694795a5a355c}}.", "In terms of applications, navigation traces have proven useful as a tool to improve the website navigability by identifying missing links {{cite:b43a1ec86dd73f8042e9f7b051d55f0424dc3d91}}, {{cite:bcf0a88885d3f593de60711f6dd0a07996246a87}}, {{cite:a87af02f04b1f3b793774ea308a74fbc025eda34}} and other usability issues that normally require the work of domain experts {{cite:b25641208bd6a817a6bc10665b4db192ffc16352}}.Similarly, navigation logs can be used to compute semantic relatedness of pages by studying what content is typically accessed together{{cite:8bdecc5495d387037b36c1c207dc517f7e893062}}, {{cite:0ec1c9999e611c1baa2520847b21cdca2cbe71f2}}.", "Reader behavior on Wikipedia.Researchers have studied how readers behave when reading Wikipedia. Recent work focuses on the interaction with external links {{cite:8e8a98d8c8a5b87930b993fcb099b631104a607f}} and references {{cite:b49516a8671b7cced8f94fd5a0930950796ca388}}, {{cite:ce0a42bf428df4c61d735f056dfea60af5754b18}}, and on the reading time of articles {{cite:7b04aec014412f97ec8f69433a0dd0ac4af1aef1}}. Researchers have concluded that Wikipedia users have reading patterns that fall in different categories, such as exploration, focus, trending, and passing {{cite:2ef28148173aa93e78c0e54d80d53cbd6c354897}}, and that readers prefer links that lead to the periphery of the network, about semantically similar content and located at the top of the article {{cite:3f6a5e371e52289f0397665cbc1f040376e2d80d}}, {{cite:d46ac7bdde26c94b29c7365bc519466525c045e8}}.Other studies have investigated the inter-event time in the navigation logs of Wikipedia and found strong regularities in the temporal rhythms, which suggest a good rule-of-thumb for segmenting sessions after inactivity periods of one hour {{cite:b88e08213e453f861ef8f137a65f122b0fea2f15}}.", "These studies are complemented by investigations of the motivations for visiting Wikipedia {{cite:3f6a00f8f687efb9d00425f7862e198e504ac9ae}}, {{cite:c652f109a6fddc7be23a1104d749e335fdaef984}}, which describe a variety of factors such as current events, media coverage of a topic, personal curiosity, work or school assignments, or boredom.", "Closest in spirit to the present work, multiple approaches have been used to study human navigation on Wikipedia. The public clickstream {{cite:6a8e6bf9b41fd48bdec53fac56f5766249b77d0c}}contains transition counts for pairs of articles. Although the clickstream constitutes an aggregated and filtered version of the server logs, it has been used to study how different topics relay more traffic than others {{cite:3100657e24544fb85ec80818feadfaeebb73b9af}}, {{cite:6f3eb25f271df0c1fd4a8db812f834d80a7350d8}}, and how readers' navigation paths tend to start general and become incrementally more focused at every step {{cite:522dfc13f8903d3a84c478cdd4075956fb475a7d}}.", "Other approaches to understanding readers' navigation have identified different types of curiosity during Wikipedia exploration by relying on data shared by volunteers {{cite:b8bd1bb6b4e79558d9d2f227f43b11a870e05301}},while yet others have characterized human navigation as manifested in digital traces obtained via Wikipedia navigation games such as Wikispeedia {{cite:06c56de2bb888dc09625ecbb27512c83577224f0}}, where players start from a random article and are tasked to reach a target page in as few clicks as possible by following links only.These trajectories, denoted as targeted navigation here, show how efficient people are at finding short paths {{cite:b91af243b8498159953860da254b08cc2da332aa}}, {{cite:b3444f87d190baf0e695615a206a07a6b06294d4}}, {{cite:683cba25f53f62ddff6f818f557f85ff0ff561ab}}.In contrast to natural navigation, targeted navigation posits an unambiguous definition of success (i.e., reaching the target article), which allows researchers to study how people drift away from the best path and when they abandon the search {{cite:5cd653b8ab12d5476630354748a7141d354fe6bf}}, {{cite:5f1088b163e8bb3d5d88bdafb11517a316803883}}." ]
[]
End to End Software Engineering Research
End to end learning is machine learning starting in raw data and predicting adesired concept, with all steps done automatically. In software engineeringcontext, we see it as starting from the source code and predicting processmetrics. This framework can be used for predicting defects, code quality,productivity and more. End-to-end improves over features based machine learningby not requiring domain experts and being able to extract new knowledge. Wedescribe a dataset of 5M files from 15k projects constructed for this goal. Thedataset is constructed in a way that enables not only predicting concepts butalso investigating their causes.
[ "End to end learning is common in deep learning, due to its ability to extract representations.See {{cite:cbfd0d088f6e5154fe4e934ff474ecc5d5a171d9}} for a systematic review of 128 papers using deep learning for 23 software engineering tasks.", "Datasets are common in software engineering today.Some of them collect diverse data on projects, aiming to enable multiple uses {{cite:4a56b3eabc3ce7708924f5606d47271354193109}}, {{cite:841dfa39c32c160054d97bf9d527d4db7542f4d3}}, {{cite:a23f2170d25c6b649c51b7379210cfb91e0bf6f0}}, {{cite:a9fa03c4c9d537c58d5b001bc4e80e50e74371fe}}.", "Others are dedicated to a specific task, and usually come with features and labels to support it.Datasets of 150k JavaScript files {{cite:07ca18f43a50f71afeae869eb057b84a65c5a7bf}} and 150k methods {{cite:a7e22392eb0118aeaa5ecc8d597de7d4a880802e}} were used for program generation.More examples are datasets for vulnerability {{cite:b44087b8803f4793e40a0f40fdc3dac24328b808}}, {{cite:dd8995b34e789246e96be8746ef37c3f0d1d1b77}}, tangling commits {{cite:f5ae643e30117aaed8002b9da34ff406d463bc93}}, text summarization {{cite:0e23e95d64a5df0146cc936416017f25bf10cfb0}}, Truck Factor Developers Detachment (TFDD) {{cite:2310f1178828da2a256f3b8687ddefeb0737e8c6}}, commit classification {{cite:b02c1ece0b37576646b90af1507cb9c96449ccee}}, {{cite:49ee424e79639f008085987f0b69c0db115cb1d6}}, code translation {{cite:1f97a84c8451319b073408073d3149f7c1c4e73a}} and many more {{cite:4736f2fcd243b05e642f03094cedc5613fa1cad4}}, {{cite:57dda78c9b3888cfc8a4294ae688fab30b18e07e}}.", "Another common type of datasets collections of bugs and defect prediction datasets {{cite:338d12b87c18a411524d37156b415855d85fe3eb}}, {{cite:7becc0ecf3f83a652cf85eaeab8bf9d2602530d8}}, {{cite:dba897ff9e13e9a918fa1f9394048c4044328492}}, {{cite:dd8995b34e789246e96be8746ef37c3f0d1d1b77}}.", "We built this dataset in order to enable both general exploration and specific tasks.We pre-computed many process metrics, allowing researchers to build supervised learning models for defect prediction, quality, vulnerability, productivity, etc.We also provided the source code and commit messages.This allows future definition of new process metrics and adapting the dataset for predicting it.We also suggest new tasks that the dataset can be used for." ]
[]
Local permutation tests for conditional independence
In this paper, we investigate local permutation tests for testing conditionalindependence between two random vectors $X$ and $Y$ given $Z$. The localpermutation test determines the significance of a test statistic by locallyshuffling samples which share similar values of the conditioning variables $Z$,and it forms a natural extension of the usual permutation approach forunconditional independence testing. Despite its simplicity and empiricalsupport, the theoretical underpinnings of the local permutation test remainunclear. Motivated by this gap, this paper aims to establish theoreticalfoundations of local permutation tests with a particular focus on binning-basedstatistics. We start by revisiting the hardness of conditional independencetesting and provide an upper bound for the power of any valid conditionalindependence test, which holds when the probability of observing collisions in$Z$ is small. This negative result naturally motivates us to impose additionalrestrictions on the possible distributions under the null and alternate. Tothis end, we focus our attention on certain classes of smooth distributions andidentify provably tight conditions under which the local permutation method isuniversally valid, i.e. it is valid when applied to any (binning-based) teststatistic. To complement this result on type I error control, we also show thatin some cases, a binning-based statistic calibrated via the local permutationmethod can achieve minimax optimal power. We also introduce a double-binningpermutation strategy, which yields a valid test over less smooth nulldistributions than the typical single-binning method without compromising muchpower. Finally, we present simulation results to support our theoreticalfindings.
[ "There is an extensive body of literature on CI measures and CI tests. Here, we give a selective review of existing methods, which can be categorized into several groups.", "The first category of methods is based on kernel mean embeddings {{cite:f24943ca50ac6978290f0c37da51e1277e07307c}}. The idea of kernel mean embeddings is to represent probability distributions as elements of a reproducing kernel Hilbert space (RKHS), which enables us to understand properties of these distributions using Hilbert space operations. One of the initial attempts to use kernel mean embeddings for CI testing was made by {{cite:d41d2361312ff1da8af0ef150fe26b2f9af9ded1}}. In particular, {{cite:d41d2361312ff1da8af0ef150fe26b2f9af9ded1}} propose a test based on the empirical Hilbert–Schmidt norm of the conditional cross-covariance operator. {{cite:84a8e10e1a8607d2fd7623a9c376ca7e54b0487c}} introduce another kernel-based test attempting to measure partial correlations, which in turn characterize CI {{cite:61ba4925b50edec272007b34a5a384390d70ef37}}. {{cite:9ab56d4e26b5fe635d2de156c6d91c67e735aec3}} use random Fourier features to approximate kernel computations, and propose a more computationally efficient version of the test of {{cite:84a8e10e1a8607d2fd7623a9c376ca7e54b0487c}}. Other CI measures proposed by {{cite:1b00aabacdef95bc54f09c27e912322fdae73fc3}} and {{cite:07850d5c12e04d6b8e5c6af9b08062a8790f7d82}} are motivated by the kernel maximum mean discrepancy for two-sample testing {{cite:b20ea332f41a494d627870c8c08486d179b5a735}}. In particular, the CI measure introduced by {{cite:07850d5c12e04d6b8e5c6af9b08062a8790f7d82}} compares whether {{formula:8034faff-57c9-4f2f-85ee-bb2a26b5e603}} and {{formula:c9dfa3f2-eb78-446d-a752-36f9f082862c}} have the same distribution, and their measure can be viewed as a kernelized version of the CI measure of {{cite:26bd3ce9f57ab3dc1de38b0d9ba967d320d708e5}}. Recently, {{cite:18e2139d0d1e17fdcac4e9b5dcaf23929b982211}} and {{cite:38138928c32f5c27cbbd9ee6c7f4942b0b38da5a}} propose kernel CI measures that are closely connected to the Hillbert–Schmidt independence criterion {{cite:003fc2febfd6cada64e03ffa6e56ba50c85603d7}}. {{cite:18e2139d0d1e17fdcac4e9b5dcaf23929b982211}} also discuss the connection between their CI measure to the conditional distance correlation proposed by {{cite:9590cc195ebed0cdbf8e68e738070836551ae213}}.", "Another category of methods relies on estimating regression functions. Consider random variables {{formula:2636cd7e-e534-4483-a199-030fd126bd3b}} and {{formula:ee4966df-55b5-4059-b761-d2d3e236ba3f}} , and their regression residuals on {{formula:b09b6c67-1d0c-462a-b159-6a2db3e4134a}} , denoted by {{formula:852d223f-bf19-4520-ab77-03303a294549}} and {{formula:81723485-888a-4456-83ac-149bfb20c6c9}} . The underlying idea of regression-based methods is that the expected value of {{formula:314b4a41-5af6-4de8-866d-c92368785d6e}} is zero if {{formula:88e273eb-5afa-4730-bae7-7b7131eef7cc}} , and not necessarily zero if {{formula:244c8fd6-71b4-4237-9a72-86c3f451b563}} . Thus, one can use an empirical estimate of the expected value of {{formula:8720e8a7-575e-4f30-8129-650502221c60}} as a test statistic for CI. We refer to {{cite:c52c32a4daed368cf52a30e6ac3ef33ab428eeb9}} for a discussion of the relationship between {{formula:7ec29212-5a91-4bb4-bec4-2b5d59b0b115}} and {{formula:77f9caa9-34c0-4c1a-b896-8bb39f22f4e0}} . Given that there exist a variety of successful regression algorithms to estimate {{formula:eaddb96b-a845-4f34-8577-74af00cef0b6}} and {{formula:441382fc-d81a-4f02-bcdd-0671c4a5d4b5}} , the expected value of {{formula:97ca057c-78a7-4e01-9f48-197079e173b0}} can be accurately estimated as well. This regression-based idea has been exploited by several authors to tackle CI testing. For instance, {{cite:a6235fdd6317ee0eb3b5be195f4f70f0e441a798}} propose the generalized covariance measure, which has been extended to functional linear models by {{cite:89d2d558e9ecba8ae1eac6a2a2976af48d3b6d10}}.The methods proposed by {{cite:84a8e10e1a8607d2fd7623a9c376ca7e54b0487c}} and {{cite:9ab56d4e26b5fe635d2de156c6d91c67e735aec3}} rest on the regression of a function in a RKHS, thereby belonging to this category as well.We also note that there has been a growing interest in estimating the expected conditional covariance in semi-parametric statistics {{cite:5a4713fea33f3c994192d5dcca39b7c479979317}}, {{cite:be207f057e6ffe993626cea070762636a09ff526}}, {{cite:4fdc6236617f92027187e31eadb5e770de4e1805}} often employing non-parametricregression methods followed by adjustments to reduce bias, and this work in turn has implications for the design of CI tests.", "Apart from the above two categories, there are many other novel approaches for CI testing developed in recent years. For example, {{cite:959a53e5f9311bf82514b35fdc07c5cfa673f26f}}, {{cite:9a798a8b7bee2d04dbd409e49f48980602f7ae55}} design nonparametric tests by leveraging the success of generative adversarial networks. {{cite:c11ea66a671a5c8b8545e7d48a34b8fd00a16a23}}, {{cite:3caec04cb84bb3c7a237dd74e8c8ddf00240e146}} convert the CI testing problem into a binary classification problem, which allows one to leverage existing classification algorithms. Approaches based on the partial copula have been examined by {{cite:6695fbc21c8f0f7cb6f4658ac419f7790534407f}}, {{cite:81da9395b12d069f682d383a9ef518e5e04f4e11}}, {{cite:c7c80ad015e5e11f765b0f1b7d019327212cfd1f}}, {{cite:96f18044445e21cf09e4c3c93b2ea04c26ca50da}}, {{cite:03ab04e28a5b43dba6283504da482cf180f6c994}}. A metric-based approach is also common in the literature, including tests based on the conditional Hellinger distance {{cite:5386409b2a2fcc5331d0fea6a3ef7efe72ec2871}} and conditional mutual information {{cite:3d623339afea621a8bbfc2b33880ae9ad01492bd}}. The above methods are mainly for continuous data, whereas there are numerous CI tests available for discrete data as well {{cite:76d9f41753196d8ac960546b8cfd9b00c68f7426}}, {{cite:70599e54d48f70060c8fc8c0c3c1c0237ba8f82c}}, {{cite:36190277fa7f41cc016d035a496e10dbc1ca8f49}}, {{cite:9102e8029ac2997ac8d0773ed7097248da56a86f}}, {{cite:c8572082df745097475228010cd55eafbfc0fd92}}, {{cite:4346dedb3a98a9518ecfb7df4e07d719a809bec5}}, {{cite:78452e829339c09c438bcb71aeed43c510e4a038}}. A more extensive review of CI tests can be found in {{cite:9e962ed3cb35db85bccaefeb310deea7a6491b03}}.", "So far we have mainly reviewed various ways of measuring CI and constructing test statistics. For testing problems, it is also important to determine a reasonable critical value, that results in small type I and type II errors. The current literature usually considers one of the following three approaches for setting critical values.", "Asymptotic method. The first common approach is based on the limiting null distribution of a test statistic. Once the limiting null distribution is known, the critical value is determined by using a quantile of this limiting distribution or a bootstrap procedure. In order to obtain a tractable asymptotic distribution, the test statistic typically has an asymptotically linear or quadratic form. Examples of CI tests based on the asymptotic approach include {{cite:5386409b2a2fcc5331d0fea6a3ef7efe72ec2871}}, {{cite:a36e53180a22ca5e3f011de83884d76f300129a8}}, {{cite:84a8e10e1a8607d2fd7623a9c376ca7e54b0487c}}, {{cite:9590cc195ebed0cdbf8e68e738070836551ae213}}, {{cite:9ab56d4e26b5fe635d2de156c6d91c67e735aec3}}, {{cite:a6235fdd6317ee0eb3b5be195f4f70f0e441a798}}, {{cite:9e53e5bb71ed9cbf8ab7a453f30be98081e7888d}}.Due to technical hurdles, this line of work often focuses on a pointwise (rather than uniform) type I error guarantee with a few exceptions {{cite:a6235fdd6317ee0eb3b5be195f4f70f0e441a798}}, {{cite:89d2d558e9ecba8ae1eac6a2a2976af48d3b6d10}}.Model-X framework. Formalized by {{cite:b1615c4493f5165addb1bf7d49343c908e9c94f9}}, the model-X framework builds on the assumption that the conditional distribution {{formula:564d07b7-5aed-48a4-add0-95ab4ebeca43}} is (approximately) known. In this case, one can compute a set of test statistics, which are exchangeable under the null, by exploiting the knowledge of {{formula:371a775d-8984-42f8-9c74-7f87a69c324b}} . The critical value is then set to be an empirical quantile of these test statistics, and the resulting test has finite-sample validity. Nevertheless, this methodology may not be appropriate for applications where {{formula:61116802-aa16-4718-80df-b84ba5cf7b62}} is not known or hard to estimate.Local permutation method. The third approach is based on local permutations. This method generates a reference distribution by randomly permuting {{formula:386ba5c9-4336-4264-8b11-1799c2445092}} within subclasses, which are defined in terms of the proximity of the conditional variable {{formula:a7d8cd09-537b-4628-8380-7b6812058d88}} . Then the critical value is determined as a quantile of this reference distribution. The work of {{cite:e8c84f8be6f8edc6d98a00600d34fdba7d493bb3}}, {{cite:d41d2361312ff1da8af0ef150fe26b2f9af9ded1}}, {{cite:1b00aabacdef95bc54f09c27e912322fdae73fc3}}, {{cite:c11ea66a671a5c8b8545e7d48a34b8fd00a16a23}} fall into this category. When observing multiple samples with the same value of {{formula:957d1eeb-5dbc-47c3-a4cd-b6bf8725555e}} is possible, this method can yield an exact CI test with reasonable power against certain alternatives. However, its validity has not been fully explored beyond discrete settings.", "As mentioned before, our work heavily builds upon the recent work of {{cite:9102e8029ac2997ac8d0773ed7097248da56a86f}}, {{cite:4346dedb3a98a9518ecfb7df4e07d719a809bec5}} and {{cite:e6b31089af2de753e22b83deb1401bcad9cb8948}}. {{cite:9102e8029ac2997ac8d0773ed7097248da56a86f}} construct tests for CI when {{formula:717421a0-90d3-48ae-ae99-38500bae6f87}} are discrete random variables, but with a possibly large number of categories, and establish the optimality of their tests from a minimax perspective, in certain regimes. {{cite:4346dedb3a98a9518ecfb7df4e07d719a809bec5}} extend the work of {{cite:9102e8029ac2997ac8d0773ed7097248da56a86f}} to the case where {{formula:116e3e0d-931c-4ff4-ac08-431ceb002548}} is a continuous and bounded random variable. However, both tests considered in {{cite:9102e8029ac2997ac8d0773ed7097248da56a86f}} and {{cite:4346dedb3a98a9518ecfb7df4e07d719a809bec5}} rely on critical values that depend on unspecified constants. In this sense, it has been unknown whether there exists a minimax optimal CI test, which is easily implementable in practice. To address this issue, our work considers the local permutation method, which leads to an explicit critical value. In order to analyze the power of the resulting test, webuild on results of {{cite:e6b31089af2de753e22b83deb1401bcad9cb8948}} who provide a sufficient condition under which the permutation test has non-trivial power for (unconditional) independence testing. To verify this sufficient condition, we build on the analysis of U-statistic-based tests from the previous work of {{cite:9102e8029ac2997ac8d0773ed7097248da56a86f}} and {{cite:4346dedb3a98a9518ecfb7df4e07d719a809bec5}}." ]
[]
Bottom-up approaches for multi-person pose estimation and it's applications: A brief review
Human Pose Estimation (HPE) is one of the fundamental problems in computervision. It has applications ranging from virtual reality, human behavioranalysis, video surveillance, anomaly detection, self-driving to medicalassistance. The main objective of HPE is to obtain the person's posture fromthe given input. Among different paradigms for HPE, one paradigm is calledbottom-up multi-person pose estimation. In the bottom-up approach, initially,all the key points of the targets are detected, and later in the optimizationstage, the detected key points are associated with the corresponding targets.This review paper discussed the recent advancements in bottom-up approaches forthe HPE and listed the possible high-quality datasets used to train the models.Additionally, a discussion of the prominent bottom-up approaches and theirquantitative results on the standard performance matrices are given. Finally,the limitations of the existing methods are highlighted, and guidelines of thefuture research directions are given.
[ "In the last couple of years, there has been a couple of HPE review papers, specifically for 3D HPE ({{cite:0753478acf97ab344eeaf7985ba3ab3174bb12f1}}, {{cite:23812fcbd0563f26fc918ff1f6c3b6fbbd0e6539}}), model-based HPE ({{cite:0753478acf97ab344eeaf7985ba3ab3174bb12f1}}, {{cite:2668cc0460076e12f948f6afbed6e1a0158f2308}}), monocular-based HPE ({{cite:0753478acf97ab344eeaf7985ba3ab3174bb12f1}}, {{cite:23812fcbd0563f26fc918ff1f6c3b6fbbd0e6539}}), etc. Some of the review papers are just focused on methods that don’t implement deep-learning approaches ({{cite:f1be23ce9425cb4263b4f36ef4e3e689bae32909}}, {{cite:d4114c0606bcf02424c5ca27735af09031b60087}}), while others {{cite:0fe4d5094ddf4af4b842095227c17293e58cd1ed}} focus on methods based on deep-learning. A comprehensive review of the 2D and 3D HPE is presented in {{cite:0753478acf97ab344eeaf7985ba3ab3174bb12f1}}. In this paper, 2D HPE is categorized like it is in the {{cite:61ee0f01103ab63df3645dacf2a8a19d31d57601}}, which is a review paper oriented only at 2D HPE approaches. On the other hand, in {{cite:0753478acf97ab344eeaf7985ba3ab3174bb12f1}}, 3D HPE methods are categorized as in {{cite:9cc90cc07263a32b3bda735e0a20347ab9a9bff6}}. This review paper focuses on 3D HPEs and categorization of these HPEs into three distinctive groups:", "Generative vs. Discriminative methodsRegression-based vs. Detection-based methodsOne-stage vs. Multi-stage methods" ]
[]
Using Machine Learning Predictions to Speed-up Dijkstra's Shortest Path Algorithm
We study the use of machine learning techniques to solve a fundamentalshortest path problem, which is also known as the single-source many targetsshortest path problem (SSMTSP). Given a directed graph with non-negative edgeweights, our goal is to compute a shortest path from a given source node to anyof several designated target nodes. Basically, our idea is to combine a machinelearning approach with an adapted version of Dijkstra's algorithm to solve thisproblem: Based on the trace of Dijkstra's algorithm, we design a neural networkthat predicts the shortest path distance after only a few iterations. Theprediction is then used to prune the search space explored by Dijkstra'salgorithm, which allows us to save a significant fraction of operations on theunderlying priority queue. Crucially, our approach always computes the exactshortest path distances, even if the prediction is inaccurate, and never usesmore queue operations than the standard algorithm. In fact, we are able toprove a lower bound on the number of queue operations saved by our newalgorithm, which depends on the accuracy of the prediction. Our bound appliesto arbitrary graphs as long as (some of) the edge weights are drawn at random.Our experimental findings on random graphs confirm these bounds and show thatthe actual savings are oftentimes significantly higher.
[ "Finding the shortest path in a graph is a classical problem in combinatorial optimisation, so it comes as no surprise that the classical methods to solve this problem come from a combinatorial perspective.Alternatives to Dijkstra's method are goal-directed algorithms such as {{formula:1172aa7e-dcfd-4c83-b749-eedc2986180d}} -search ({{cite:5a8c0a9b3233ddb4112b0faf347178f718053528}}), which use a heuristic approach to mostly search paths that lead to the goal, and landmark approaches, which use a pre-processing step to pre-compute distances between nodes and use these to speedup the shortest path computation (see, e.g., {{cite:cc7565ba8425a74fad1b6cc493f673088ec3c331}}). A third well-known approach uses the concept of reach (see {{cite:aa6a4200a56055d873d0440ce1a72f2ac9a6d483}}). Intuitively, the reach of a vertex encodes the lengths of shortest paths on which it lies, and can be used in combination with the {{formula:00dabda4-ad4e-4682-a890-713b0c23f64d}} algorithm to compute shortest paths. An extensive survey of combinatorial algorithms to solve the shortest path problem is given by {{cite:94c330fe285dab8036c36454636f64a8ca7d7fbb}}.", "However, there has also been great interest from the field of ML in finding approximates for the shortest path distance, using a ML perspective.For example, {{cite:00118dd2b499a05fe4d55c0cf107af241c73eeaf}} compute shortest paths by using a genetic algorithm. The crossover operation considers the set of current solutions and computes better ones, while the mutation operator introduces new shortest path solutions. Their algorithm works faster than Dijkstra, but they only test on small graphs with at most 80 nodes. Also, more recently, using ML techniques to approximate shortest path distances has lead to interesting results.For example, {{cite:6641bdeb500718ec9a30e9fa5a8fed5bb3e7d8d9}} create an estimate for the shortest path distance between two nodes in a two step approach. In the first step, they create a vector embedding for each node, which is generated by deep learning techniques. In the second step, they then use the well-known landmark approach (see, e.g., {{cite:299dba8af996aec240711d6871ed3e592ec80500}}, {{cite:3c2dd4050a8205f33d7aa1aa50343ca2b879f9a2}}), where a small set of nodes is chosen as landmark and all distances from each landmark to all of the remaining nodes are computed. These distances are used to compute sample pairs which samples are used to train a feed-forward neural network to approximate the distance between two new nodes. {{cite:6641bdeb500718ec9a30e9fa5a8fed5bb3e7d8d9}} show results on large-scale real-world social networks (more than 1 million nodes). Their method differs from our approach in the sense that an algorithm is created to approximate shortest path distances in a specific large-scale real-world graph, opposed to an algorithm which can be used for any graph from a set of random graphs with similar properties. An advantage of the landmark-based approach is its scalability to huge graphs, but {{cite:6d864a8a7ea31e32b8b9a5cb36a11da3dbdc372d}} show that strong theoretical guarantees on approximation quality are not provided for landmark-based methods. {{cite:d98446950717830a57a073ffa57baf4e2dc701b9}} use an idea similar to the one by {{cite:6641bdeb500718ec9a30e9fa5a8fed5bb3e7d8d9}}. But instead of using a two step approach, a single model is used to predict vertex distances and also to create an embedding for a vertex. They demonstrate the efficiency of their approach on a real-world network.", "The aim of our paper is to bridge the gap between the combinatorial viewpoint and the ML perspective. Using ML techniques in combinatorial algorithms has been studied intenstively recently, see {{cite:691ab859aff4a0f688dec597fdc19d2a7336836a}} for a survey paper on leveraging ML to solve combinatorial problems. In this survey, three different approaches of using ML components in combinatorial optimisation algorithms are given. Firstly, ML could be used to train a model to output solutions to combinatorial problems directly from the input instances (see, e.g., {{cite:ac25c14d8eda7f45198ac92bb712e0ad934bd7e1}}, {{cite:20e103adb5bc2877a07cfabb5c396a0865931cd3}}, {{cite:d610f5e2f77e645de1eb05c51ed615557c8142d3}}, {{cite:5291229409047430a2988ebd1a91c4830714a060}}).A second approach is to learn meaningful properties of the optimisation problem at hand, and to augment the algorithm with these properties (see, e.g., {{cite:4e32c2595f58b766c34243b36ac7c24b67b7caac}}). Also our approach, in which we use a prediction for the shortest path to prune our search space, can be categorised under this kind of combination. Thirdly, one could use ML repeatedly alongside the optimisation algorithm (see, e.g., {{cite:1e243f75ec256f56f8cb90cd9009b7d3540979c6}}).", "Another line of research which uses machine learning predictions in algorithms is proposed in {{cite:c602953d5b73c58142b46ce1af7bf1811ec95a3d}}. The aim here is to achieve near optimal algorithms when the predictions are good, while one falls back to the worst-case behaviour if the prediction error is (too) large. This idea is applied to several different optimisation problems, for example to the ski rental problem and the caching problem. The algorithm proposed in our paper also has the property that it performs nearly optimal in case of a very good prediction, but never uses more iterations than the original algorithm (if no predictions are used).{{cite:95e2d67098144a6de70df0814c89cfaf4db28ff6}} build further on the ideas of {{cite:c602953d5b73c58142b46ce1af7bf1811ec95a3d}} and use similar techniques to break worst-case barriers in online scheduling." ]
[]
On the stability of multigraded Betti numbers and Hilbert functions
Multigraded Betti numbers are one of the simplest invariants ofmultiparameter persistence modules. This invariant is useful in theory -- itcompletely determines the Hilbert function of the module and the isomorphismtype of the free modules in its minimal free resolution -- as well as inpractice -- it is easy to visualize and it is one of the main outputs ofcurrent multiparameter persistent homology software, such as RIVET. However, tothe best of our knowledge, no bottleneck stability result with respect to theinterleaving distance has been established for this invariant so far, and thispotential lack of stability limits its practical applications. We prove astability result for multigraded Betti numbers, using an efficiently computablebottleneck-type dissimilarity function we introduce. Our notion of matching isinspired by recent work on signed barcodes, and allows matching bars of thesame module in homological degrees of different parity, in addition tomatchings bars of different modules in homological degrees of the same parity.Our stability result is a combination of Hilbert's syzygy theorem, Bjerkevik'sbottleneck stability for free modules, and a novel stability result forprojective resolutions. We also prove, in the $2$-parameter case, a$1$-Wasserstein stability result for Hilbert functions with respect to the$1$-presentation distance of Bjerkevik and Lesnick.
[ "Our use of free resolutions to construct invariants of multiparameter persistence modules is tightly related to the concept of rank decomposition introduced in {{cite:6691cb86cd41f2a2a7e0482e319a0d7e51059954}}: while free resolutions may not be rank-exact, in the sense that the rank invariant of a module {{formula:9d27f76d-b72b-4cee-a3c6-86a146df4700}} may not decompose as the alternating sum of the rank invariants of the terms in a free resolution of {{formula:ceaac06f-5c39-4bbe-a96c-8960997082e0}} , it is known that the Hilbert function of {{formula:07c7d512-ecdd-4781-80eb-3833335beb5f}} does decompose as such, leading to a notion of signed decomposition of the Hilbert function, which can be viewed as a simpler variant of the rank decomposition.We show that Hilbert decompositions coming from free resolutions are stable in the bottleneck dissimilarity while minimal Hilbert decompositions are not (although they are in the signed 1-Wasserstein distance), thus answering, in this simpler setting, a question left open in {{cite:6691cb86cd41f2a2a7e0482e319a0d7e51059954}}.", "In {{cite:820978a63c843d78ba22e46bdcbf1d3c572b16a4}}, McCleary and Patel prove a stability result for a variant of the generalized persistence diagram of a simplicial filtration indexed over a finite lattice.Their result is stated in terms of an edit distance for filtrations and an edit distance for diagrams.The latter distance is known to be Lipschitz equivalent to the bottleneck distance in the one-parameter setting, but connections in the multiparameter setting have not been established so far.", "Our notion of signed barcode is closely related to the notion of virtual persistence diagram, introduced by Bubenik and Elchesen {{cite:eb8a0e3e958570d2e31563ab6ad0089fa64231cb}}.In fact, the space of signed barcodes endowed with the signed 1-Wasserstein distance is isometric to a certain space of virtual persistence diagrams in the sense of {{cite:eb8a0e3e958570d2e31563ab6ad0089fa64231cb}}.In contrast, the space of signed barcodes endowed with the bottleneck dissimilarity cannot be directly interpreted as a space of virtual persistence diagrams.This is a consequence of the fact that our notion of signed barcode allows for the same bar to appear, perhaps multiple times, as both a positive and a negative bar, which is important for proving the bottleneck stability of Betti signed barcodes." ]
[]
Sum-Rate Maximization of RIS-Aided Multi-User MIMO Systems With Statistical CSI
This paper investigates a reconfigurable intelligent surface (RIS)-aidedmulti-user multiple-input multiple-output (MIMO) system by considering only thestatistical channel state information (CSI) at the base station (BS). We aim tomaximize its sum-rate via the joint optimization of beamforming at the BS andphase shifts at the RIS. However, the multi-user MIMO transmissions and thespatial correlations make the optimization cumbersome. For tractability, adeterministic approximation is derived for the sum-rate under a large number ofthe reflecting elements. By adopting the approximate sum-rate for maximization,the optimal designs of the transmit beamforming and the phase shifts can bedecoupled and solved in closed-forms individually. More specifically, theglobal optimality of the transmit beamforming can be guaranteed by using thewater-filling algorithm and a sub-optimal solution of phase shifts can beobtained by using the projected gradient ascent (PGA) algorithm. By comparingto the case of the instantaneous CSI assumed at the BS, the proposed algorithmbased on statistical CSI can achieve comparable performance but with much lowercomplexity and signaling overhead, which is more affordable and appealing forpractical applications. Moreover, the impact of spatial correlation isthoroughly examined by using majorization theory.
[ "By properly adjusting the phase shifts to improve the electromagnetic propagation environment with a low cost and energy consumption, the RIS has attracted tremendous attention from both industry and academics, recently {{cite:2e1dd2b53838de63ddb2f142a004f0409c4477ef}}, {{cite:6a743fa0e92dc45356dc9af75b51bb8ebe28a044}}, {{cite:da41434703f2b916108c1ada8fe1c96321730037}}, {{cite:17b2261c9808c256d1e60fa9c77b469b9ca1f57c}}, {{cite:49721b09b3d5fd4b78727126beef9227d522a0c3}}, {{cite:368554bd79e36fef49096fa13d85e23d8aa327d8}}, {{cite:cdcc9b581c85ae35fc554855137398caf8e9509d}}, {{cite:756cf3c4d5f8f06df881e9c7c9ee2f94425b9298}}, {{cite:ab06eafdfa41b1448bbf2860c2d02b42d649a9eb}}, {{cite:73c8887b37bd36f10c2b5f49054008c9eea95863}}, {{cite:3a21d350ea752cab6927b29fc1eaebe3d734ec2b}}, {{cite:4b7524a8a98a491ca8a3b287d699f6542bb73531}}, {{cite:8ab4acaf1e285be52e219d5585a82b2e00457617}}, {{cite:f7275569efcf547688f73f408704ea88263edd5c}}, {{cite:5106250cfce33564d5ea5d9ccfa6b7edde5c9b68}}, {{cite:62d58ee092392805482424030a1cb6c976944d40}}, {{cite:6100ff237100412ad3186fce4118339e5ade8386}}, {{cite:5f1f0910025093bac9497df026e3e9e1fa710ef8}}, {{cite:f3a6ad2a6d3662ac442e68c26b5383d8927fccac}}, {{cite:68fb6dc424ef08cfb3097671c24098d248eff2f2}}, {{cite:8886457b62fecd3ddb5acea34b9e003c8d817bb5}}, {{cite:6c4260cdad77a4a1dd8bf8dc9acf95c90b1e3429}}, {{cite:099bbb92e5f1c96f16eec637ec105bbe33793fa4}}, {{cite:315b1b380837245048af4d14296c9d6dfa9667b3}}.The authors in {{cite:da41434703f2b916108c1ada8fe1c96321730037}} proposed RIS-aided multiple-input single-output (MISO) system communications by jointly optimizing the transmit beamforming at the base station (BS) and reflect beamforming at the RIS to minimize the total transmit power consumption. Numerical results showed that the RIS not only achieves the comparable performance to the conventional massive MIMO or multi-antenna AF relay, but also is more cost efficient. Similar conclusions were drawn in {{cite:17b2261c9808c256d1e60fa9c77b469b9ca1f57c}} by extending the continuous phase shifts to discrete phase shifts due to the hardware limitation at reflecting elements. In {{cite:49721b09b3d5fd4b78727126beef9227d522a0c3}} and {{cite:368554bd79e36fef49096fa13d85e23d8aa327d8}}, the authors considered the sum-rate maximization problem for RIS-assisted multi-group multi-cast MISO and multi-user MISO systems to find the optimal solution for the precoding matrix at the BS and the reflection coefficients at the RIS under both the power and unit-modulus constraints. In order to reap the benefit of diversity gain at user sides, the symbol error rate (SER) minimization problem for the RIS-assisted MIMO systems and the sum-rate maximization problem for the RIS-assisted multi-user MIMO systems also have been investigated in {{cite:cdcc9b581c85ae35fc554855137398caf8e9509d}} and {{cite:756cf3c4d5f8f06df881e9c7c9ee2f94425b9298}}, respectively.Furthermore, the RIS-assisted user cooperation has been extended to the wireless powered communications, NOMA network, backscatter communications, physical layer security, unmanned aerial vehicle (UAV) communications, millimeter wave networks, etc. {{cite:73c8887b37bd36f10c2b5f49054008c9eea95863}}, {{cite:3a21d350ea752cab6927b29fc1eaebe3d734ec2b}}, {{cite:4b7524a8a98a491ca8a3b287d699f6542bb73531}}, {{cite:8ab4acaf1e285be52e219d5585a82b2e00457617}}, {{cite:f7275569efcf547688f73f408704ea88263edd5c}}, {{cite:5106250cfce33564d5ea5d9ccfa6b7edde5c9b68}}, {{cite:62d58ee092392805482424030a1cb6c976944d40}}.", "Although the wireless communication systems can be significantly improved with the help of the RIS, the aforementioned works for RIS-aided communication systems design, i.e., {{cite:da41434703f2b916108c1ada8fe1c96321730037}}, {{cite:17b2261c9808c256d1e60fa9c77b469b9ca1f57c}}, {{cite:49721b09b3d5fd4b78727126beef9227d522a0c3}}, {{cite:368554bd79e36fef49096fa13d85e23d8aa327d8}}, {{cite:cdcc9b581c85ae35fc554855137398caf8e9509d}}, {{cite:756cf3c4d5f8f06df881e9c7c9ee2f94425b9298}}, {{cite:73c8887b37bd36f10c2b5f49054008c9eea95863}}, {{cite:ab06eafdfa41b1448bbf2860c2d02b42d649a9eb}}, {{cite:3a21d350ea752cab6927b29fc1eaebe3d734ec2b}}, {{cite:4b7524a8a98a491ca8a3b287d699f6542bb73531}}, {{cite:8ab4acaf1e285be52e219d5585a82b2e00457617}}, {{cite:f7275569efcf547688f73f408704ea88263edd5c}}, {{cite:5106250cfce33564d5ea5d9ccfa6b7edde5c9b68}}, {{cite:62d58ee092392805482424030a1cb6c976944d40}}, are all based on instantaneous channel state information (CSI) available at BS. As opposed to the traditional wireless systems where channel acquisition is a straightforward matter, due to the passive nature of RIS, the low-cost reflecting elements can not possess any active RF chains to facilitate channel estimation. In {{cite:6100ff237100412ad3186fce4118339e5ade8386}}, the authors estimated the reflecting cascaded channel via element-wise on-off operation at each reflecting element. Another alternative approach to estimate the channel coefficients is leveraging compressive sensing and deep learning tools by proposing a novel RIS architecture, where sparse channel sensors are assumed and a few number of elements are connected to the baseband of the RIS controller {{cite:5f1f0910025093bac9497df026e3e9e1fa710ef8}}. However, the channel training overhead becomes excessively high as the number of RIS reflecting elements and/or RIS-aided users increases. So the authors studied the RIS-aided communication systems design basing on statistical CSI in {{cite:f3a6ad2a6d3662ac442e68c26b5383d8927fccac}}, {{cite:68fb6dc424ef08cfb3097671c24098d248eff2f2}}, {{cite:8886457b62fecd3ddb5acea34b9e003c8d817bb5}}, by considering the practical CSI acquisition. Furthermore, another difficulty for RIS-aided wireless communication systems is the joint design of the transmit precoding and the phase shift (active and passive beamforming) design at BS and RIS. Since the optimization problems are usually non-convex, the alternating algorithms have been widely adopted for sub-optimal solutions in {{cite:da41434703f2b916108c1ada8fe1c96321730037}}, {{cite:17b2261c9808c256d1e60fa9c77b469b9ca1f57c}}, {{cite:49721b09b3d5fd4b78727126beef9227d522a0c3}}, {{cite:368554bd79e36fef49096fa13d85e23d8aa327d8}}, {{cite:cdcc9b581c85ae35fc554855137398caf8e9509d}}, {{cite:756cf3c4d5f8f06df881e9c7c9ee2f94425b9298}}, {{cite:ab06eafdfa41b1448bbf2860c2d02b42d649a9eb}}, {{cite:73c8887b37bd36f10c2b5f49054008c9eea95863}}, {{cite:3a21d350ea752cab6927b29fc1eaebe3d734ec2b}}, {{cite:4b7524a8a98a491ca8a3b287d699f6542bb73531}}, {{cite:8ab4acaf1e285be52e219d5585a82b2e00457617}}, {{cite:f7275569efcf547688f73f408704ea88263edd5c}}, {{cite:5106250cfce33564d5ea5d9ccfa6b7edde5c9b68}}, {{cite:62d58ee092392805482424030a1cb6c976944d40}}, {{cite:f3a6ad2a6d3662ac442e68c26b5383d8927fccac}}, {{cite:68fb6dc424ef08cfb3097671c24098d248eff2f2}}, {{cite:8886457b62fecd3ddb5acea34b9e003c8d817bb5}} with high computational complexity.", "Meanwhile, the spatial correlation between antenna or reflecting elements for RIS-aided system always exist in realistic propagation environments due to mutual antenna coupling, space limitations for adjacent antenna or reflecting elements, and non-rich scattering environments, etc. {{cite:8886457b62fecd3ddb5acea34b9e003c8d817bb5}}, {{cite:6c4260cdad77a4a1dd8bf8dc9acf95c90b1e3429}}, {{cite:315b1b380837245048af4d14296c9d6dfa9667b3}}, {{cite:099bbb92e5f1c96f16eec637ec105bbe33793fa4}}, {{cite:1aaf965d65294678265d6147c13eb1b9d07d5e70}}. However, for analytical simplicity, the RIS-aided MISO/MIMO systems for multi-user case in existing works, i.e., {{cite:2e1dd2b53838de63ddb2f142a004f0409c4477ef}}, {{cite:6a743fa0e92dc45356dc9af75b51bb8ebe28a044}}, {{cite:da41434703f2b916108c1ada8fe1c96321730037}}, {{cite:17b2261c9808c256d1e60fa9c77b469b9ca1f57c}}, {{cite:368554bd79e36fef49096fa13d85e23d8aa327d8}}, {{cite:49721b09b3d5fd4b78727126beef9227d522a0c3}}, {{cite:756cf3c4d5f8f06df881e9c7c9ee2f94425b9298}}, {{cite:ab06eafdfa41b1448bbf2860c2d02b42d649a9eb}}, {{cite:cdcc9b581c85ae35fc554855137398caf8e9509d}}, {{cite:73c8887b37bd36f10c2b5f49054008c9eea95863}}, {{cite:3a21d350ea752cab6927b29fc1eaebe3d734ec2b}}, {{cite:4b7524a8a98a491ca8a3b287d699f6542bb73531}}, {{cite:8ab4acaf1e285be52e219d5585a82b2e00457617}}, {{cite:f7275569efcf547688f73f408704ea88263edd5c}}, {{cite:5106250cfce33564d5ea5d9ccfa6b7edde5c9b68}}, {{cite:62d58ee092392805482424030a1cb6c976944d40}}, {{cite:6100ff237100412ad3186fce4118339e5ade8386}}, {{cite:5f1f0910025093bac9497df026e3e9e1fa710ef8}}, {{cite:f3a6ad2a6d3662ac442e68c26b5383d8927fccac}}, {{cite:68fb6dc424ef08cfb3097671c24098d248eff2f2}}, assumed the independence among antenna and reflecting elements. Even though the spatial correlation has been taken into account for RIS in {{cite:6c4260cdad77a4a1dd8bf8dc9acf95c90b1e3429}}, {{cite:315b1b380837245048af4d14296c9d6dfa9667b3}}, {{cite:099bbb92e5f1c96f16eec637ec105bbe33793fa4}}, those works only considered single-side spatial correlation on RIS (from RIS to users link) for single-input single-output (SISO) or MISO communication systems." ]
[]
Few-shot Multi-hop Question Answering over Knowledge Base
KBQA is a task that requires to answer questions by using semantic structuredinformation in knowledge base. Previous work in this area has been restricteddue to the lack of large semantic parsing dataset and the exponential growth ofsearching space with the increasing hops of relation paths. In this paper, wepropose an efficient pipeline method equipped with a pre-trained languagemodel. By adopting Beam Search algorithm, the searching space will not berestricted in subgraph of 3 hops. Besides, we propose a data generationstrategy, which enables our model to generalize well from few training samples.We evaluate our model on an open-domain complex Chinese Question Answering taskCCKS2019 and achieve F1-score of 62.55% on the test dataset. In addition, inorder to test the few-shot learning capability of our model, we ramdomly select10% of the primary data to train our model, the result shows that our model canstill achieves F1-score of 58.54%, which verifies the capability of our modelto process KBQA task and the advantage in few-shot Learning.
[ "Recently, with the rapid development and increasing attention of deep learning, the research on natural language processing has made great process. Especially when supported by emerging word embedding technologies and pretrained language models, the effectiveness of knowledge base question answering has been greatly improved. In this section, we will introduce some previous work related to the sub-modules of our model including Named Entity Recognition(NER) and Beam Search algorithm. Besides, some few-shot KBQA model and an Information Retrieval-based models will also be introduced.", "Named Entity Recognition is a key component in NLP systems for question answering, information retrieval, relation extraction, etc. Early NER models are mainly based on unsupervised and bootstrapped system({{cite:eb60767a34906eec28212731d21fc3e7f1ab4b21}}Collins and Singer et al., 1999; {{cite:fc2659b1135e57ac1c4cd881b497f5056e3af948}}Etzioni et al., 2005) or Feature-engineering supervised task.({{cite:b3943a3e2f873c6ae7d7d7a93cca7d1e627d03a3}}Zhou and Su et al., 2002; {{cite:bb0094cf07f2f848bd76c2007c9dbd7639790852}}Malouf et al., 2002). Nowadays, people tend to use neural network for NER task. NER is often solved as a sequence labeling problem by using the Conditional Random Field(CRF) which require a set of pre-defined features. Recently, some effective neural network approaches, especially for Bi-directional Long Short-Term Memory, significantly improves the performance of CRF for NER task. {{cite:9c92ad22a299e87c0132426e674d17ced1a4aa34}} Huang et al. using two LSTMs to capture past features and future features in sequence tagging task. Then a CRF layer is used to efficiently grasp the sentence level tag information of the sentence. The BiLSTM-CRF was usually employed as the cornerstone of many subsequent improved NER models. BERT BiLSTM CRF{{cite:5057995928a26bc57ece892395a4b5c02cee24cd}} uses BERT to embed extract rich semantic features into vectors and send them to the BiLSTM CRF. This model has achieve state-of-art performance in many NER tasks.{{cite:b975c806cef162b7ac06ae5936225590e4dcf7b1}}", "Beam Search is a common heuristic algorithm for decoding structured predictors. When generating query paths for complex multi-hop question, we need to consider longer relation path in order to reach the correct answers. However, the search space grows exponentially with the length of relation paths, bringing expensiveness for calculation and storage. The core idea of beam search is to use a score function to keep Top-K candidate relations instead of considering all relations when extending a relation path. Thus, the definition of score function determine the performance of Bean Search. Chen et al. (2019) {{cite:566bb03f58647e557234aca12fc204dc17815612}} proposed to keep only the best matching relation with a path ranking module that considers features extracted from topic entities and semantic information of the generated query paths. {{cite:c2e75992fabd16a059ad2241d4a16564de84160c}} also keep only one candidate relation using a traditional Siamese architecture where both the question and the candidate path are each separately encoded into a single vector before the two vectors are matched. This experiment results of this two model show little performance dropped but with significance reduction in spatial Complexity and Time Complexity.", "Since the expensive of constructing the annotated datasets, several works have been focused on few-shot learning for KBQA task. Chada et al.(2021) {{cite:d8af9444a28f0c45498e73505334eb160a8bcf8c}} proposed a simple fine-tuning framework that regards the query path generation as a text-to-text task. By leveraging a pre-trained sequence-to-sequence models, their method outperforms many state-of-art models with an average margin of 34.2 F1 points on various few-shot settings of multiple QA benchmarks. Hua et al. (2020) {{cite:ee3a5a17b04269c7085c8235e5f4824842192db4}} proposed a Semantic-Parsing based mothod using BFS to find the pseudo-gold annotation of a question and learning a Reinforcement-Learning(RL) policy to generate a query sequence for obtaining the final answer.", "Our model is most inspired by a Information Retrived-based Chinese CKBQA model proposed by Cao et al.{{cite:b15e7aa5a60d428a038cb3f45a527b58f0e31db1}}. They use a pipeline method including a NER module, a query paths generating module and candidate tuples ranking module and process the question step by step. In NER module, they attach the BiLSTM CRF layer with a BERT layer to better understanding the semantic information in the question, which arrives quite high accuracy in topic entities recognition. Then, they extend one or two relations from the topic entity to generating the query paths and adopting Bridging technology to process question with multiple entities. Finally, a candidate query paths ranking module is carefully designed to select the final query path and execute it on Knowledge Base. The most differences between their work and our model are that we process the one-entity and multi-entity questions separately with a Question Classification module and predefine a set of query schema to restrict the searching space. On the predefined query pattern, we use a strategy to construct artificial questions which improve the ability of the classification model for few-shot learning. Moreover, we adopt a Beam Search algorithm when generating query paths, which helps us achieve comparable performance but only using only 10{{formula:32dfdd76-a58a-448a-9a96-946620717b1e}} resource of calculation and storage. Most importantly, as our model is a framework which facilitates the use of different models, we can expect the performance to remain competitive over time.{{figure:a9884c3a-e672-4596-aff6-abaae0f512be}}" ]
[]
DevOps and Microservices in Scientific System development
There is a gap in scientific information systems development concerningmodern software engineering and scientific computing. Historically, softwareengineering methodologies have been perceived as an unwanted accidentalcomplexity to computational scientists in their scientific systems development.More recent trends, like the end of Moore's law and the subsequentdiversification of hardware platforms, combined with the increasingmultidisciplinarity of science itself have exacerbated the problem becauseself-taught "end user developers" are not familiar with the disciplines neededto tackle this increased complexity. On a more positive note, agile programmingmethods have approached software development practices to the way scientificsoftware is produced. In this work, we present the experience of a multi-yearindustry research project where agile methods, microservices and DevOps wereapplied. Our goal is to validate the hypothesis that the use of microserviceswould allow computational scientists to work in the more minimalisticprototype-oriented way that they prefer while the software engineering teamwould handle the integration. Hence, scientific multidisciplinary systems wouldgain in a twofold way: (i) Subject Matter Experts(SME) use their preferabletools to develop the specific scientific part of the system; (ii) softwareengineers provide the high quality software code for the system delivery.
[ "Idaszak et al. {{cite:28c70420095a7a9a836d95c4e423e0717ede7d45}} describe the lessons learned when applying DevOps, among other techniques, to a large scientific software project. In this project, a software engineer was appointed as DevOps lead, which allowed SMEs to learn how to use tools like Git and Github, thus simplifying the contributions and increasing collaboration. They concluded that software engineering techniques will foster research by ensuring validity of findings in a long run.", "Itkonen et al. {{cite:064dbdab2c97cf96d057f48f94fc7d8f409e8c88}} conducted interviews with both the supplier organization and their customer to understand how the customer perceived the changes to process and methods, and to identify how the adoption of continuous delivery has had beneficial effects on their work. Their findings were the following: (i) automated testing reduced bugs in production; (ii) development and production environments are similar, which reduced the risk of errors; (iii) simple metrics, such as lead times and release cycle metrics do not give good enough picture of how development works.", "Savor et al. {{cite:4956d71efd9e7c59b73b568a8d092c884d74dcb4}} analysed data from Git repositories from Facebook and OANDA companies over a period of 7 and 5 years, respectively, in order to investigate the experiences with CI in these companies. Their findings were that CI allows scaling the number of developers and code base size and also the developers prefer short release cycles over long ones.", "Subjectively comparing our project to the ones described in this section and also to the ones observed by Segal {{cite:a2b17a72cad52ff57aedb50af3a462307308b04c}} and Carver et al. {{cite:9473b13cdc08c3d8a9e6cff9983aebff750c63b1}} and the surveys by Johanson and Hasselbring {{cite:6fdfc329986a15c12a523983cf83f1aed61decaf}} and Storer {{cite:a6f062050634137d4c6410ac2db1b74c55d4d444}} we believe that it is representative of scientific computing in general, although there are three important disclaimers to be made: (i) since we do not depend on research grants, our incentive structures are slightly different than in academia in general; (ii) our team does have a large percentage of people with a computer science background; and (iii) compared to the literature we have the advantage of time, since Agile and DevOps already have broad acceptance in the industry and are already past the \"peak of inflated expectations\" {{cite:3a8bfd6cc7c32717e31589ba520ce42164d3cc73}}." ]
[]
A Case Study on Optimization of Warehouses
In warehouses, order picking is known to be the most labor-intensive andcostly task in which the employees account for a large part of the warehouseperformance. Hence, many approaches exist, that optimize the order pickingprocess based on diverse economic criteria. However, most of these approachesfocus on a single economic objective at once and disregard ergonomic criteriain their optimization. Further, the influence of the placement of the items tobe picked is underestimated and accordingly, too little attention is paid tothe interdependence of these two problems. In this work, we aim at optimizingthe storage assignment and the order picking problem within mezzanine warehousewith regards to their reciprocal influence. We propose a customized version ofthe Non-dominated Sorting Genetic Algorithm II (NSGA-II) for optimizing thestorage assignment problem as well as an Ant Colony Optimization (ACO)algorithm for optimizing the order picking problem. Both algorithms incorporatemultiple economic and ergonomic constraints simultaneously. Furthermore, thealgorithms incorporate knowledge about the interdependence between bothproblems, aiming to improve the overall warehouse performance. Our evaluationresults show that our proposed algorithms return better storage assignments andorder pick routes compared to commonly used techniques for the followingquality indicators for comparing Pareto fronts: Coverage, GenerationalDistance, Euclidian Distance, Pareto Front Size, and Inverted GenerationalDistance. Additionally, the evaluation regarding the interaction of bothalgorithms shows a better performance when combining both proposed algorithms.
[ "In the literature, diverse storage assignment policies exist such as the dedicated and the random storage policy {{cite:e19400c0d461fedb4ef495577b2e66f4163c8580}}, the closest open location storage policy {{cite:eb817ff0804ad88caac8c7ad15603b7e20020f4a}}, rank-based storage policies {{cite:59fe900ec6b8a0419b55dae3da71cdc8157e91f4}}.Further, class-based, golden zone, and family grouping storage policies are introduced in the literature {{cite:eb817ff0804ad88caac8c7ad15603b7e20020f4a}}, {{cite:be17e96c1207edf0557670d5ecca239d09a65e00}}.Additionally, diverse approaches apply optimization techniques.{{cite:53f2fae57d77d06a42f99fe6a6db3b5635c00a15}} propose a particle swarm optimization algorithm for warehouses that deploy the class-based storage policy.{{cite:23a52bdc1a96339468cee611135b1f57486e28b3}} presents a mixed integer programming model for optimizing the storage assignment problem for class-based assigned warehouses.{{cite:8458bbf1829ecf5c0374d62c15114d70cd90b97e}} apply local search algorithms for reorganizing the products in the warehouse to keep it operating efficiently.{{cite:79f26bf07864a3c7f1dc8769150c9fd900daec33}} propose a multi-objective genetic algorithm for optimizing the storage assignment problem in automated storage/retrieval warehouses.", "Similarly, heuristic policies exist for the order picking problem such as the S-Shape, Return, Mid-Point, Largest Gap, and Combined heuristic {{cite:c8800fe7144a49d97acb22f9d18378aec025fe00}}, {{cite:3f22a3d73dccfb64d4b9e394ead918f81eb130bc}}, {{cite:76c59b47f0f2b40fa8e5e8a1ca8758f1aa038af8}}Besides, {{cite:7d47d35b8868ca6db29b56cef8a6cfa6dd819b25}} presents an optimal algorithm using dynamic programming to find the shortest pick route in a single-block warehouse.Additionally, {{cite:16ab840737ba1bebcd2473395b90b30097733be4}} propose a mathematical model in combination with construction heuristics and apply Tabu Search to construct order picking routes.{{cite:c8dd766c22b1e63bece377e568884a95533dc0ed}} present an integer programming model for optimizing the order picking problem.{{cite:d1807b1dbddd1f76750255c3a6a5eddc1a2b9fb2}} propose an Max-Min Ant System (MMAS) algorithm for optimizing machine travel paths in automated storage/retrieval warehouses.{{cite:240dceb70aab2deee0c8a700bb5a079525fdf317}} propose an ACO algorithm that detects congestion situations that arise when multiple order pickers traverse the same pick aisle simultaneously.", "Finally, related work also assess the interaction of storage assignment and order picking approaches.{{cite:59fe900ec6b8a0419b55dae3da71cdc8157e91f4}} and {{cite:9bfdfc5425f1f55e5e3702c168d7576ed03db1b7}} provide an overview of well-performing combinations of storage assignment strategies and routing heuristics.{{cite:65ba7cca85bef11ce4af431fe2e27a0c53427227}} analyze different parameters that affect the travel time in single-block warehouses that deploy the class-based storage policy.{{cite:db585200f8a494ddf9a51e0c63fd8d3f17de58d4}} study the effects of different parameters on the travel distance in multi-block warehouses.", "Our work delineates from these existing approaches in diverse aspects.First of all, our work applies optimization techniques and does not rely on a policy on how to select fitting storage racks or shortest pick routes.Second, regarding existing optimization approaches, our work integrates multiple objectives at once considering economic as well as ergonomic constraints at once while most of the other approaches focus on a single economic goal.Finally, in contrast to existing work that address the influence of storage assignment and order picking tasks, we designed algorithms that optimize the targets of both tasks.Hence, they optimize storage assignment and order picking with regards to the interdependence of both algorithms, while other works only provide well-performing combinations of algorithms or perform parameter tuning." ]
[]
Scaling Open-Vocabulary Image Segmentation with Image-Level Labels
We design an open-vocabulary image segmentation model to organize an imageinto meaningful regions indicated by arbitrary texts. Recent works (CLIP andALIGN), despite attaining impressive open-vocabulary classification accuracywith image-level caption labels, are unable to segment visual concepts withpixels. We argue that these models miss an important step of visual grouping,which organizes pixels into groups before learning visual-semantic alignments.We propose OpenSeg to address the above issue while still making use ofscalable image-level supervision of captions. First, it learns to proposesegmentation masks for possible organizations. Then it learns visual-semanticalignments by aligning each word in a caption to one or a few predicted masks.We find the mask representations are the key to support learning imagesegmentation from captions, making it possible to scale up the dataset andvocabulary sizes. OpenSeg significantly outperforms the recent open-vocabularymethod of LSeg by +19.9 mIoU on PASCAL dataset, thanks to its scalability.
[ "paragraph4.5em plus1ex minus.2ex-.5emGrouping for visual recognition:Grouping has been a core research area in mid-level visual representations.The importance of grouping for human perception was pointed out almost a hundred years ago {{cite:04019d1dd5fe8e825f39c4643cc064146deee9b3}}.In machine perception, early works {{cite:e0d27054f0e2ec2bf21667df7e8928430e4ac3e5}}, {{cite:f20a29bb7ba9f2a4199d37c79927aa6fdba4c2f8}} group pixels based on local affinities.Arbelaez   find contour detection and multiscale information helpful to generate segmentation {{cite:dcbc825fb76c3e42936a8c91fca75e6618734ee3}} and use it to predict object candidates {{cite:dd5d4ae6dbe4b6874c7ac41a490aab96df63c091}}.COB {{cite:9b96f6c6d2c0dea6af0ecfe8d4a11a1e37d4d94c}} improves the efficiency and performance by leveraging deep nets.These mid-level region representations are then used for semantic segmentation {{cite:9b96f6c6d2c0dea6af0ecfe8d4a11a1e37d4d94c}} and object detection {{cite:ce28a3ec74e3ca2c3dfcb2e511370a40035ea589}}.Recently, Qi  {{cite:984efaad4fb834d67cfbc0ee00acee2aa3190267}} propose to segment all visual entities without considering semanticcategory labels and show generalization to unseen domains.In contrast to {{cite:984efaad4fb834d67cfbc0ee00acee2aa3190267}}, our work aims to predict segmentation and understand the semantics of segmented regions by open-vocabulary visual-semantic alignments.", "paragraph4.5em plus1ex minus.2ex-.5emFully-supervised segmentation:To understand semantics of pixels, several datasets have been developed with an increasing number of images and categories {{cite:7103c87cdb60d9777004e32244ed190fba6ce6ce}}, {{cite:bd29bdf2af2cc62fa8af6643b6e9f2f57c422fb4}}, {{cite:6e5a89b7de69a3f35ccf32443d90709fabd2fd69}}, {{cite:384a9822b51de27c38edb7e72cc0cb7842064e17}}.Models trained and evaluated on these datasets can only learn to recognize the pre-defined classes, which are at most in the order of thousands {{cite:bd29bdf2af2cc62fa8af6643b6e9f2f57c422fb4}}, {{cite:6e5a89b7de69a3f35ccf32443d90709fabd2fd69}}, {{cite:384a9822b51de27c38edb7e72cc0cb7842064e17}}. However, most classes only have one or few examples, thus the community often works on learning a subset of hundred classes.The classes across datasets are not transferable. MSeg {{cite:b760fc7fa3e4bed96cadca5bca87b3f88900f06c}} points out the ambiguity of class definitions, and shows that it requires manual efforts to clean up the ambiguity in order to learn a transferable model across datasets. But the model still can not transfer to new visual concepts not present in supervised datasets. Zhao  {{cite:2904909de52415b8dfb82b00093fc779f13f5097}} propose to use WordNet hierarchy to aid knowledge transfer. On the other hand, our work aims at learning a model that can take arbitrary text queries for image segmentation.", "paragraph4.5em plus1ex minus.2ex-.5emSemantic segmentation with less supervisions:Approaches using less supervision are more scalable. Weakly-supervised semantic segmentation can train with image-level labels {{cite:f74461872a269745e5bd79cf3c73d909ec622848}}, {{cite:16c57c6cbf3ba97549a03181a532731b274f8f0c}}, {{cite:afaf5236007080997a050900070e51f973207a3d}}, {{cite:b10f9fb4ed8aeebad2b0b44d8459715a5d1830c7}}, {{cite:da3842f1be3d83cdd18f536fedb4024e24e5d885}}, of which refining CAMs {{cite:7634e44ac6db6b430377798ec65f7879fd497420}} is a popular techniques.Zero-shot semantic segmentation methods {{cite:25ba2620bcda608472c324d61e32dcf70fb37861}}, {{cite:13daaa2c38a1b5580a708b79e4daf1f7cc22449d}}, {{cite:c538c26bbdf7775e08babd086df95d45b33cc6d9}}, {{cite:adc639550ac39118ac9ad90421a77fb2f0126314}}, {{cite:cad8b9618028e8f6a3401633cd0bf7da09e69626}} aim to segment images with unseen visual concepts using language embeddings. These approaches learn with pixel-wise class labels which are expensive to scale up due to the long-tailed nature mentioned in the previous paragraph.Nonetheless, most previous works are evaluated on limited number of categories. On the contrary, we evaluate on datasets with large number of categories to verify the zero-shot transfer ability on large vocabulary.", "paragraph4.5em plus1ex minus.2ex-.5emVisual grounding:Image captioning and image-text coreference datasets {{cite:2e8e895d4815cc11a983570b19c5b4a6d98f54ca}}, {{cite:6624740576156e153eb0926aa615fb34f0b9fc68}}, {{cite:00c165c1c2117f4332a118c99803fb5de29e6c11}} enable research on the interplay of captions and grounded visual concepts {{cite:ae1d2465f5af8adbc1a0e738b83fa8e846f66acc}}, {{cite:8cc03fb9a9d254ef7494b4dc0f2a28c417002b9d}}, {{cite:066b2fdfe2387f80fc15f1cc3d0adda1d301e592}}, {{cite:7dde5b1395b74f668306b967bdedd9e37ac77245}}, {{cite:b5a280a5b42d118d75a45f75d24e55018f73e5b6}}. However, these methods often rely on an object detector to predict object bounding boxes for grounding and are not able to handle stuff.Our method also uses captions as semantically-rich supervision. We draw inspiration from these works and expand the model's ability to ground visual concepts of both things and stuff to pixels with our mask representations." ]
[]
Judging a book by its cover: Predicting the marginal impact of title on Reddit post popularity
Several factors influence the popularity of content on social media,including the what, when, and who of a post. Of these factors, the what andwhen of content are easiest to customize in order to maximize viewership andreach. Further, the title of a post (part of the what) is the easiest totailor, compared to the post's body, which is often fixed. So, in this paper,we assess the impact of a post's title on its popularity while controlling forthe time of posting (the when) by proposing an interpretable attention-basedmodel. Our approach achieves state-of-the-art performance in predicting thepopularity of posts on multiple online communities of various sizes, topics,and formats while still being parsimonious. Interpretation of our model'sattention weights sheds light on the heterogeneous patterns in how the specificwords in a post's title shape its popularity across different communities. Ourresults highlight the power of sentiment alignment, personal storytelling, andeven personality politics in propelling content to virality.
[ "Reddit, the sixth-largest website on the internet by unique traffic, is home to over a million subreddit communities. Each of these user-created themed communities is a microcosm of the broader social news ecosystem, aggregating thousands of user-generated posts sorted by realtime user voting feedback {{cite:63729eb8b68a5a2454b0828402d2cce7924fbae3}}. Since Reddit provides such a user-centric slice of social media, it is a natural site to study online community interaction and content virality at scale {{cite:eb028e1a20e5f7c063e9fc92b0f86b7362a82fdc}}, {{cite:b3f21d98c9570c479b2fa91aa11968281a41ab68}}. For example, many studies have attempted to predict comment popularity using linear regression, feed-forward neural networks, and recurrent neural networks (RNNs) {{cite:f5936c7b9fccf332e959d6d615bd00dc97404313}}, {{cite:8502b6ae1593d801c1a9fe1f351bb01bd40805a1}}, {{cite:d1cff9973f9f5ddea6b17283fd87312585ea3327}}. The most successful ones have used deep reinforcement learning, for instance, for predicting the popularity of future comment replies to existing threads {{cite:2a327409df7e0ae87d14198387bbfa51d91ac202}}, {{cite:3910a6e2334c23cdf539fcfccb1940ee8b3717f8}}. All these studies reveal that, on Reddit, context is key to predicting popularity.", "A different thread of research focuses squarely on predicting post popularity, a more difficult and input-rich task; rather than a simple sentence or paragraph, a user-generated post can include a link, image, gif, or video {{cite:f5b774d29d987a9a65b2026737aed69470beea46}}. Additionally, many variables are involved in post popularity including title, content, creation time, subreddit of origin, and author {{cite:3af65e6d05fb92adb98b2f5e9bb9a701b2afcf10}}, {{cite:3910a6e2334c23cdf539fcfccb1940ee8b3717f8}}, {{cite:c18ce6ea6b1b344c7a5481593c25afe0c99b153c}}, {{cite:07f67db5c6dd7a8b96f1c98b6e4c7ce6b57410c1}}, {{cite:8c17123a3f0d9cbc1276c4ab6a65860ca448ee83}}, {{cite:3ddc50cf134af74f8cac2a2e98a5d4c60378696f}}, {{cite:30ad30290ebfabefd463e322f0a2f5136082bb4e}}. Disentangling the related effects of these variables to assess the weight of a single one is a difficult task, yet it often yields fruitful community insights.", "Content popularity prediction is challenging in general because it is the result of a stochastic user-influenced positive feedback loop. {{cite:a88999ac1ce8938481512e5f910f9735e2f40b04}} explore this phenomenon, concluding that although the best content tends not to be rated poorly by validators and the least popular content tends not to be rated well, for most other posts, validation results were inconclusive. {{cite:e69195b859231ed18423568c162c74b11c2865f0}} investigates this relationship between inherent post quality and post popularity further, introducing a viewership-corrected metric of inherent quality on dual datasets of Reddit and Hacker News. Contrary to {{cite:a88999ac1ce8938481512e5f910f9735e2f40b04}}, {{cite:e69195b859231ed18423568c162c74b11c2865f0}} finds that his inherent quality metric has a strong correlation with popularity. However, {{cite:e69195b859231ed18423568c162c74b11c2865f0}} omits a large quantity of data in his analysis, preferring to focus on high-ranking posts.", "Similar content “reposting” is another phenomenon of interest, first studied in the context of post popularity prediction by {{cite:8c17123a3f0d9cbc1276c4ab6a65860ca448ee83}}. They developed a model based on title, image, and repost count to predict the relative popularity of reposted content generally on Reddit. Interestingly, they note that a repost following a previously popular high-visibility post is unlikely to be popular.", "Studies in other online communities have also found that title plays a critical role in content popularity. On a dataset of online news articles, {{cite:2ba4b459529791a8992f30245628ff3984c6fcdd}} improve on popularity prediction baselines using a title-only model and propose that the content title is often “the most prominent” component of online content. Undoubtedly, content titles serve as useful hooks to draw initial attention.", "Prior to our work, the most generalizable model for predicting post popularity on Reddit was a multimodal study on the role of captions versus images by {{cite:c18ce6ea6b1b344c7a5481593c25afe0c99b153c}}. They use existing machine learning architectures to contrast the importance of post titles and related images on subreddits r/aww, r/pics, and r/cats. They show that treating popularity prediction as a pairwise task can be effectively used to control for time, so we also adopt this relative popularity prediction task in our model. Their results suggest that both text and image features are essential components in a popularity prediction model. Our results show conversely that popularity prediction is tractable without using image features and with a much smaller model. Therefore, our work differs in scope since we exclusively focus on the impact of a post's title in driving popularity and assume the post's content is fixed ahead of time, as is often the case when posting an image or link online. Further, while {{cite:c18ce6ea6b1b344c7a5481593c25afe0c99b153c}} analyze the role of caption versus image; our work focuses on presenting our state-of-the-art model for title-oriented popularity prediction, as well as developing a model-driven qualitative analysis of the community-level textual factors that propel content to virality." ]
[]
Density Regression with Bayesian Additive Regression Trees
Flexibly modeling how an entire density changes with covariates is animportant but challenging generalization of mean and quantile regression. Whileexisting methods for density regression primarily consist ofcovariate-dependent discrete mixture models, we consider a continuous latentvariable model in general covariate spaces, which we call DR-BART. The priormapping the latent variable to the observed data is constructed via a novelapplication of Bayesian Additive Regression Trees (BART). We prove that theposterior induced by our model concentrates quickly around true generativefunctions that are sufficiently smooth. We also analyze the performance ofDR-BART on a set of challenging simulated examples, where it outperformsvarious other methods for Bayesian density regression. Lastly, we apply DR-BARTto two real datasets from educational testing and economics, to study studentgrowth and predict returns to education. Our proposed sampler is efficient andallows one to take advantage of BART's flexibility in many applied settingswhere the entire distribution of the response is of primary interest.Furthermore, our scheme for splitting on latent variables within BARTfacilitates its future application to other classes of models that can bedescribed via latent variables, such as those involving hierarchical or timeseries data.
[ "Our proposal generalizes a common approach to density regression that uses covariate dependent mixture models. In these models, the conditional density is given by:{{formula:8d0497b3-c6f6-4157-9d46-3a807123cd35}} ", "allowing for {{formula:5df17910-e8f5-4da0-b370-0546a6ace411}} , where {{formula:4315743f-fe0e-4895-933e-f07ad817e90d}} is a positive definite kernel function and {{formula:9aee9543-0a70-4ee7-a6d2-ab78682a1444}} are covariate-dependent mixture weights. We restrict attention to normal kernels:{{formula:a8168441-5cc0-4617-ac3f-69f5f9f7f2e2}} ", "where {{formula:b382d296-d7c1-4a95-bc30-058749362877}} and {{formula:bd53ebdb-a97e-4232-afed-ad45fbf99596}} denotes the standard normal pdf – but the extension to other kernels is straightforward. In practice {{formula:b281ca84-4ad7-4a8c-ae22-03d5ec9f6003}} or {{formula:2b67aac5-d45f-40a4-9102-3e0956deb7b2}} may not vary with {{formula:bec5a07f-5ebd-47a3-b5af-0116a38d91fb}} , or may vary in a limited way. (e.g., by taking {{formula:6ffb1846-f073-471e-95cf-2b917f9abb64}} {{formula:e17f2292-82c9-4bdc-b697-3c17fefa7e82}} ). Our proposed model in (REF ) recovers that in (REF ) when {{formula:797fc321-7083-4076-8c63-83a060526121}} and {{formula:8dfe0060-d808-44bb-a1fc-e39bdf43c363}} are step functions with the same points of discontinuity (which can depend on the covariates).", "Models of the form in (REF ) appear in the machine learning literature as “mixtures of experts” {{cite:52bd273e595c60cda8227b4a2f3e99b61a46ddc4}}, {{cite:4fa9d7c5bfb109b833d8ae0b5d47fba88cbadf3a}} where the initial focus was on using these models for flexible mean regression or classification.{{cite:66ea413b87e707d62336e9bc118473fda8adccd4}} and {{cite:3d16799314cf8de2632562b963af1cac71a34934}} study models of this form for semiparametric density regression, using finite {{formula:31bb2edf-6796-446c-9058-ead4ff2e2d4a}} and multinomial probit and logit regression models for {{formula:93992734-13c5-437b-94ba-f719c186d5ea}} . While it is possible to get consistency properties for large classes of conditional densities (see e.g. {{cite:9fe1f699e756f73397f73fe64df6b8afd4a9ffb4}}, {{cite:966d39e8ea4d17de9d43f14d85db1a9d601906b2}}, {{cite:498d118fa9ac6b56bb7a2ddce9d258421e63aff9}} and the monograph {{cite:b9166e9f6a5a37a75a207335a34bc0c5738faa04}}), practical experience in finite samples suggests that there can be value in allowing the kernel variance to depend on {{formula:bde9fe7b-cc0d-4507-92ca-0c19e65d14a3}} , as this can reduce the number of clusters required for an accurate approximation. {{cite:3d16799314cf8de2632562b963af1cac71a34934}} provide simulated examples and discussion in the case of fixed {{formula:24085a5c-9a43-4d87-be4e-e94cc144c72a}} , and we will revisit this point in the context of the models introduced here (Section ).", "Another approach proposes to leverage the joint model for {{formula:e1740bdb-6baa-48ac-9725-7f8aad3161bb}} as a convenient device for inducing a particular conditional model as {{formula:c36d9d4c-6c5d-4d75-8970-9bab67933cd0}} (as in e.g. {{cite:97c451bae6b7da1a5795231eb23bfb77a870a609}}, {{cite:15c352644baeef879014d86958018d461f2f915e}}, among others). There is some cost to the joint modeling approach – which itself has commanded a large literature (see {{cite:cf9f02c43e3d307895049f27f9a70c4f9aaabf36}}, {{cite:97c451bae6b7da1a5795231eb23bfb77a870a609}} and variations in {{cite:20a5a02bb8e54182f03de7fc7628332c068eb873}}, {{cite:c81231fba168342a9345fdf499426825f9cadc65}}, {{cite:ab02c3c9cb6ea9064eae6ee9df2570507a4a93d9}}, {{cite:24c2797197ed3116c09054c3e35e8cef52a7dbd3}}, {{cite:3fded4b5633e3da3b999115902830bb57ece3b0c}}, {{cite:0eed657ce79adc03d13ede40f3b8c5cedc401f5a}}, {{cite:277a949442bf15b4518af86239aa295b415211db}}) – in terms of computation and accuracy as the dimension of the covariate vector grows (see {{cite:0eed657ce79adc03d13ede40f3b8c5cedc401f5a}}, {{cite:277a949442bf15b4518af86239aa295b415211db}}). The posterior can also depend on the distribution of the covariates, even when care is taken to separate the parameter spaces in the prior, as the auxiliary joint model assumes a common clustering for the response and the covariates (see Griffin's discussion of {{cite:3fded4b5633e3da3b999115902830bb57ece3b0c}}; also, {{cite:c9a67e2c17aa75f93a4698b7ce860f91dbf9c66d}} and {{cite:277a949442bf15b4518af86239aa295b415211db}}). Thus, other nonparametric Bayesian models focus explicitly on the conditional distributions of interest; these date to (at least) MacEachern's seminal work on dependent Dirichlet processes (DDPs) {{cite:c40ffb6c9c16f20751990bd8dff944be1b54031f}}, {{cite:5883a54ac69e799f8ccca04a403446cd5415fc39}}. A DDP is a prior for a collection of distributions such that at each covariate value the process is marginally a DP. Models in this class include {{cite:ac63f275e8a1bead9d6fb6f1ca6d4e96dd1ced72}}, {{cite:2e8509936c7ca306758309ffb497d09623ae5546}}, {{cite:fa219f96ec9b731ddabcfdbffabc1d11558f263a}}, {{cite:570db2f0c7bf280dcbcdc287c3a4e32bd4053aa0}}, {{cite:838a9ee0af4f811c1bdd4c6c88ea0fa81787a647}}, and numerous other specializations to spatiotemporal or hierarchical models. {{cite:beb8e66107c2ed7badb185283120c48eab2479d5}} characterize the DDP in terms of copulas and provide results about its support and about kernel mixtures using the DDP." ]
[]
Randomize the Future: Asymptotically Optimal Locally Private Frequency Estimation Protocol for Longitudinal Data
Longitudinal data tracking under Local Differential Privacy (LDP) is achallenging task. Baseline solutions that repeatedly invoke a protocol designedfor one-time computation lead to linear decay in the privacy or utilityguarantee with respect to the number of computations. To avoid this, the recentapproach of Erlingsson et al. (2020) exploits the potential sparsity of userdata that changes only infrequently. Their protocol targets the fundamentalproblem of frequency estimation protocol for longitudinal binary data, with$\ell_\infty$ error of $O ( (1 / \epsilon) \cdot (\log d)^{3 / 2} \cdot k \cdot\sqrt{ n \cdot \log ( d / \beta ) } )$, where $\epsilon$ is the privacy budget,$d$ is the number of time periods, $k$ is the maximum number of changes of userdata, and $\beta$ is the failure probability. Notably, the error bound scalespolylogarithmically with $d$, but linearly with $k$. In this paper, we break through the linear dependence on $k$ in theestimation error. Our new protocol has error $O ( (1 / \epsilon) \cdot (\log d)\cdot \sqrt{ k \cdot n \cdot \log ( d / \beta ) } )$, matching the lower boundup to a logarithmic factor. The protocol is an online one, that outputs anestimate at each time period. The key breakthrough is a new randomizer forsequential data, FutureRand, with two key features. The first is a compositionstrategy that correlates the noise across the non-zero elements of thesequence. The second is a pre-computation technique which, by exploiting thesymmetry of input space, enables the randomizer to output the results on thefly, without knowing future inputs. Our protocol closes the error gap betweenexisting online and offline algorithms.
[ "Data analysis under continual observation was studied in the central mode of differential privacy {{cite:7d68767ab99f638123ca02eb4300ca5206c05415}}, {{cite:8e07e06d646e4c20baf1657a3366bb3e8d49ee0d}}, where a trusted curator, to which the clients report their true data, perturbs and releases the aggregated data.Given a stream of Boolean values, 0 and 1, differentially private frequency estimation algorithms were independently proposed by both {{cite:7d68767ab99f638123ca02eb4300ca5206c05415}} {{cite:7d68767ab99f638123ca02eb4300ca5206c05415}} and {{cite:8e07e06d646e4c20baf1657a3366bb3e8d49ee0d}} {{cite:8e07e06d646e4c20baf1657a3366bb3e8d49ee0d}}, which output at each time period an estimate of the number of 1s appearing so far.These algorithms guarantee an error of {{formula:b70cef05-474f-4fe3-b85a-35f33a3b5874}} (omitting failure probability) at each time {{formula:6cf95be2-8747-4b53-9bd0-2a700adff30e}} .", "In the local mode, the memoization technique was proposed and deployed for continual collection of counter data {{cite:90e5b2cd18bd7425efa6c7803fbf298dbd9ad524}}, {{cite:164ee4a1096349bdb04567094109a6e1518f1aa9}}, where noisy answers for all elements in the domain are memorized.However, as pointed out by {{cite:164ee4a1096349bdb04567094109a6e1518f1aa9}}, this technique can violate differential privacy.", "Our algorithmic framework is inspired by the work of {{cite:b5f79033f42bd083c7e9c7233a493ec7fa29b6ad}} {{cite:22e034a1f02601b818a52bdfc604cecee2b1402e}}, who proposed to exploit the potential sparsity of users' dataif it changes infrequently.Here we provide a succinct description of their protocol under the notations and framework of our paper.The protocol in {{cite:22e034a1f02601b818a52bdfc604cecee2b1402e}} requiresan additional sampling step: each user {{formula:d2d27366-258d-4364-bdfc-aa37ecb10674}} samples uniformly and keeps only one non-zero coordinate of {{formula:b399f4d9-1822-4ae3-8fe7-3d3b05a500b6}} , and sets all other non-zero coordinates to 0.Therefore, there can be at most one non-zero partial sum with sampled order {{formula:5b9cd9ec-2cfd-4615-9300-2886aa3ffae7}} .This partial sum is perturbed by the basic randomizer {{formula:6e54915f-be97-4cb0-b242-25840babe2b9}} (Equation (REF )) with {{formula:0df9c3da-50cb-4299-b6ae-37645c9c3ede}} , resulting in a {{formula:c6b22aee-1e0f-4451-9781-a4b6e08158eb}} .However, due to the additional sampling step, the server side estimator of {{formula:c76f3ccd-152d-4464-b7e7-633f86dfe571}} (Algorithm REF , line REF ) needs to be multiplied by an additional factor of {{formula:09321d02-d23c-4153-85c2-6db998955bdc}} .Via similar analysis as Lemma REF ,the error guarantee of their protocol involves a factor of {{formula:97aed4c7-36d2-4480-95cc-59712bb4602f}} , instead of {{formula:8b846e40-63e6-4465-8f35-fb83219f277f}} .", "The composed randomizer {{formula:655f32e8-6fb0-46b5-9e6d-fe01ac1ae3a3}} presented in this paper builds on the composed randomizer proposed by {{cite:004086f518f21177f623df78eca6b4107c0cfdc5}} {{cite:004086f518f21177f623df78eca6b4107c0cfdc5}}.Their designfocused on preserving the statistical distance between the distribution of the output of the composed randomizer, and joint distribution of {{formula:24560f3a-7242-443c-9e10-d0bd98039e54}} independent randomized responses.This difference in the problem setting prompts the non-trivial changes in parameters, assumptions and analysis.The {{cite:004086f518f21177f623df78eca6b4107c0cfdc5}} proof {{cite:004086f518f21177f623df78eca6b4107c0cfdc5}} relies extensively on concentration and anti-concentration inequalities.Their design can only achieve{{formula:13404640-a603-4607-9889-7fb9400072e2}} (detailed discussion and proof are in Appendix REF ).When the first term dominates, this simplifies to {{formula:2f08c8ff-5edd-457c-9e1b-d6e4c297efd8}} , which implies that {{formula:efc05eaf-740e-4221-9677-2057fa9ca82a}} .If we apply this composed randomizer to our framework, according to Lemma REF , this leads to an error that scales at least with {{formula:e90b8129-84a9-440d-ae94-d74f50eb0c05}} .In comparison, our composed randomizer reduces this to at most {{formula:20619b35-270c-4ae9-bb3a-d52bdb873945}} .Further, {{cite:004086f518f21177f623df78eca6b4107c0cfdc5}}'s original design {{cite:004086f518f21177f623df78eca6b4107c0cfdc5}} applies only to offline inputs.We overcome this limitation by proposing the pre-computation technique for converting the algorithm to an online one.", "Finally, the recent independent parallel work by {{cite:56f4bb97937ac0180319a938f1b0fb9d3fd1fbc8}} {{cite:56f4bb97937ac0180319a938f1b0fb9d3fd1fbc8}}considers the problem in the offline setting, where there is no requirement for the server to report the estimate at each time step.They describe a protocol that achieves an error of {{formula:0247170d-ea93-4049-aa59-6cdccd44e08a}} .Their client-side algorithm involves hashing the coordinates of user data into a table, and reporting a perturbed version of the hash table to the server.Since the value of the entries of the hash table depends on all coordinates of the user data, it is unclear how to convert this algorithm into an online one." ]
[]
Making sense of electrical vehicle discussions using sentiment analysis on closely related news and user comments
We used a token-wise and document-wise sentiment analysis using bothunsupervised and supervised models applied to both news and user reviewsdataset. And our token-wise sentiment analysis found a statisticallysignificant difference in sentiment between the two groups (both of which werevery large N), our document-wise supervised sentiment analysis found nosignificant difference in sentiment.
[ "While the field of NLP-based EV research is relatively young, there has been some attempt to use topic-analysis/topic-modelling and sentiment analysis/classification of user reviews. Ha et al. {{cite:91ee3f57aa29e7ba3775a471fbcba8509faf7954}} have performed a user-experience-focused topic analysis related to EVs using language transformer models and supervised topic classification. However, whereas Ha et al. {{cite:91ee3f57aa29e7ba3775a471fbcba8509faf7954}} focused mainly on consumer reviews of EV charging stations, we will instead focus more generally on a comparison between consumer and media sentiment towards EVs. Ha et al. found that frequent topics included charger functionality, range-anxiety, charging cost, and dealership experiences {{cite:91ee3f57aa29e7ba3775a471fbcba8509faf7954}}. Given this, we believe that topic-modeling can be an effective way of understanding consumer data.", "Another paper which focused on user-reviews of charging station experiences found by Asensio et al. {{cite:e98150fad127b476f6e7c19191fdbc98dcb59ba8}} used a word2vec-based CNN classifier to classify sentiment. They found that positive/negative sentiment in the user reviews is roughly 50/50. Similarly to the previous work of Ha et. al., we will attempt to extend this exploration to EV-consumer reviews more broadly.", "Song et. al. {{cite:57b88a488ed7d76637d1fe1b83110a431dcc32a7}} formulated a survey analyzing people's perceptions to Automated Vehicles (AVs). They found differences in perception and sentiment towards AV-transit systems depending on people's familiarity with technology in general. While this study is not directly related to EVs, there are many shared similarities between EVs and AVs: namely they both offer a sea-change in vehicle consumer experience. Our project could potentially help extend and offer a broader comparison of consumer sentiment towards electric-AVs. For example, systems likeAutopilot are directly with EV companies like Tesla.", "While we have decided to focus on news and consumer-reviews for now, others have focused on social media such as Twitter. Suresha and Tawari analyzed 45000 tweets using topic models and Valence Aware Dictionary tools. They found that, on Twitter, \"Tesla\" was one of the top hashtags associated with EVs {{cite:7d4ed8a4384bcb35a69df0c1b08032353f528e31}}. In related work, a Twitter-based sentiment analysis using TF-IDF scores and a Naive Bayes Classifier by Bhatnagar and Choubey found that the hashtag \"#Tesla\" had a more positive sentiment than other manufacturers {{cite:8ab24c41ec43efdd85e108d5a76ffac488762c73}}. In light of this high association of Tesla with EVs in general, we have decided to opt to compare our news data with consumer data scraped from a Tesla forum, as it was both a large dataset and may still broadly reflect many of the topics and opinions held by those on social media as Suresha and Tawari found.", "In perhaps the most similar work to our current project, Carpenter (2015) {{cite:f71fecefeea3c6597a7f4f53d85f8c863ed3332a}} used data scraped from user discussion forums surrounding EVs to determine overarching sentiments and topics of interest. From their data, Carpenter found that \"range anxiety\" and \"price\" were two of the most common barriers to EV adoption {{cite:f71fecefeea3c6597a7f4f53d85f8c863ed3332a}}. This specific result gives us a comparison target for our own analysis and it will be interesting to see if these topics are still a concern 6 years later in 2021. Furthermore, Carpenter uses a term-frequency and regex based classification of sentiment; we attempt newer word-embedding and deep-learner based methods to see if we can generate an improvement.", "Because NLP research related to EVs is still relatively new, the overall body of work is quite small. However, from the above literature we can see that a sentiment analysis combining both user reviews and news media sentiment could provide a useful extension of previous work, as so far most literature has focused on consumer and charging reviews alone and/or yields an opportunity to apply newer supervised language learning models such as BERT." ]
[]
TFW2V: An Enhanced Document Similarity Method for the Morphologically Rich Finnish Language
Measuring the semantic similarity of different texts has many importantapplications in Digital Humanities research such as information retrieval,document clustering and text summarization. The performance of differentmethods depends on the length of the text, the domain and the language. Thisstudy focuses on experimenting with some of the current approaches to Finnish,which is a morphologically rich language. At the same time, we propose a simplemethod, TFW2V, which shows high efficiency in handling both long text documentsand limited amounts of data. Furthermore, we design an objective evaluationmethod which can be used as a framework for benchmarking text similarityapproaches.
[ "A survey conducted by {{cite:60073bafa0713062a08da610fccfd2c5a506dc89}} showed that 83% of text-based recommendation systems in digital libraries use TF–IDF. There is also a recent survey paper on the current state of Finnish NLP {{cite:7a54e9bfcb52d74ba1a2f7054342a8e014115251}}. There is a number of papers studying automatic detection of genres {{cite:0445f5c3aeae0a5e0757bd2d93f2fb1189981f09}}, {{cite:7bf3a1ff7fefc113c090bd356a0641868e144e35}}, {{cite:76ff23109a9e4d447e2398b61949cb055adcc674}}, which, as a task, is not too far from ours. However, in this section, we focus mainly on approaches on document similarity.", "{{cite:2928cba2c54458ca24a98f21f2ab1f51b1663deb}} have combined multiple document representation approaches, which are TF-IDF, LDA and Doc2Vec, to classify documents in a semi-supervised fashion. Their results indicate that combining the features of the aforementioned models enhanced the performance of the classification task. {{cite:73d61c96ceb0af6289f08e39aa7fb4888744d862}} has compared how different text representation models perform when training a Support Vector Machine (SVM) classifier. The results show that Doc2Vec was the superior model for the task addressed by the author, which is text categorization. {{cite:b1f1bbda55c8e4c3419ebe8477a8002bfe1ea889}} also showed that clustering Finnish text is more effective by Doc2Vec compared to LDA.", "A recent study by {{cite:015b84ce355f3f28a21ba6f316c6c822e2b43bb6}} compared WordNet –a manually constructed network of concepts–, TF-IDF and word embeddings extracted from Doc2Vec and BERT for unsupervised classification of Polish text documents. Their study showed that manually constructed knowledge bases, i.e. WordNet in this case, is a valuable resource for the task. {{cite:cce87e0b4839259bbf589a3cfdefbcedaa4760da}} merged TF-IDF and Word Embeddings similarity scores to build the recommendation system for similar bug reports.", "{{cite:2cbf29a3f1dff1ed3fd9798b22b28fa57a11052a}} have used text representation models to extract keywords from short texts collected from social media by employing a TextRank {{cite:5fcb01e1af3fe2d0cb009e8fd326002e1a8a871f}} algorithm which constructs a network and traverses it using random walk to discover the most important concepts. Text representation models have also been utilized with deep neural networks to classify text by {{cite:79ad8bb2378891fea9295dc8259ec5f843642e46}}.TF-IDF and word embeddings have also been used to assess the similarity of entities {{cite:e08ef22354caecd410424dc2b40e0a037311797c}}. In particular, the authors used the aforementioned methods to extract and predict properties for Pokémon." ]
[]
Quantum autoencoders for communication-efficient quantum cloud computing
In the model of quantum cloud computing, the server executes a computation onthe quantum data provided by the client. In this scenario, it is important toreduce the amount of quantum communication between the client and the server. Apossible approach is to transform the desired computation into a compressedversion that acts on a smaller number of qubits, thereby reducing the amount ofdata exchanged between the client and the server. Here we propose quantumautoencoders for quantum gates (QAEGate) as a method for compressing quantumcomputations. We illustrate it in concrete scenarios of single-round andmulti-round communication and validate it through numerical experiments. Abonus of our method is it does not reveal any information about the server'scomputation other than the information present in the output.
[ "Classical cloud computing involves the execution of a computation on a remote server {{cite:3e9ace7b43ade18051707768b044d3a55c879cf6}}. In the quantum version of this scenario {{cite:777f438aa0bf6ca12396c35748a80d00f3524182}}, a client provides an input state and asks a remote server to perform a sequence of quantum gates on it. Two important issues are (1) to cope with the limited amount of quantum communication available in realistic scenarios, and (2) to minimize the leakage of the information about the server's computation. These two issues have been previously approached with techniques from quantum Shannon theory {{cite:77f44501149803e3ad64e3cb6e9a5aea96c85aff}} and quantum cryptography {{cite:bbfa6a2a970e41f8a797e074238ce520bf2f57fe}}. Related issues have also been considered in blind delegated quantum computation {{cite:82338c4b25082433ca5752c2585b77d4c883e3ff}}, where the goal is to guarantee data confidentiality on the client side rather than the server side.", "Quantum autoencoders for quantum states were proposed by {{cite:bf196545b8eb5f6bfb47f9029977f39409b91a26}} and has been applied to quantum state compression and denoising quantum data {{cite:4f311520e999badb19ca1eb0581cb3c19971e6ba}}, {{cite:51c11ba09feb4a89a47da5357b9b70b468e95bd6}}. The quantum model used in these works has a similar structure to classical autoencoders, taking as input a quantum state represented by a fixed-length vector. This model, however, cannot be extended from quantum states to quantum gates, which in general are provided as black boxes. To convert a gate into a quantum state, one would have to apply it on a fixed input state. However, such conversion is not reversible due to the quantum No-programming theorem {{cite:534c47700223b55bb33abf29e4db185da698facb}}, {{cite:de05e924fd9c0dc453853799dcfb41c40b65beeb}}." ]
[]
In-storage Processing of I/O Intensive Applications on Computational Storage Drives
Computational storage drives (CSD) are solid-state drives (SSD) empowered bygeneral-purpose processors that can perform in-storage processing. They havethe potential to improve both performance and energy significantly for big-dataanalytics by bringing compute to data, thereby eliminating costly data transferwhile offering better privacy. In this work, we introduce Solana, thefirst-ever high-capacity(12-TB) CSD in E1.S form factor, and present an actualprototype for evaluation. To demonstrate the benefits of in-storage processingon CSD, we deploy several natural language processing (NLP) applications ondatacenter-grade storage servers comprised of clusters of the Solana.Experimental results show up to 3.1x speedup in processing while reducing theenergy consumption and data transfer by 67% and 68%, respectively, compared toregular enterprise SSDs.
[ "Near-data processing (or in this case In-Storage Processing) is a new way to break the artificial lower bound on data transmission between storage and computation by re-partitioning so that data transmission can be eliminated partially or entirely. Researchers have proposed ways of augmenting the storage with more computing power for near-data processing.{{cite:1a0c0789908476760e061030fa28640c47a69351}}, {{cite:26a9b07dc492656b45d469a583615bfbea507338}}, {{cite:fc9f28770f6a3d9a2bd6a12f6db23f49ffafcbdf}}, {{cite:e6b66c628a6fa603a56790971a38319f9db33b87}}, {{cite:e9f5f606196cd5c6bf658b11f1c7916be08c0e6f}}, {{cite:b375167001aaa798f272196f399165506c9d886e}}, {{cite:da409590897562efabaf11f5ccf68d9ad647e378}}, {{cite:22a91a830d62f1c71298f966dd7606802c9f4e49}}, {{cite:2aafedd4e0c16d662e8591a9fcb7532019c74728}}, {{cite:4d4921c25245240524fde20a9157f7fe28549e6f}}Traditionally, there are two approaches to implement CSD.", "The first approach uses the same processing engine that runs the SSD controller tasks i.e. low-capability ARM M-series or R-series that yields a low performance for in-storage processing. Such design can address light computational tasks {{cite:1a0c0789908476760e061030fa28640c47a69351}}, but cannot be used for heavier computation tasks.", "The second approach uses an external engine coupled with the main SSD controller, to run the task computations. This method is easier to design as the storage module is separated from the ISP module. But it comes at the price of another bottleneck, that is the communication bandwidth between the storage module and the computation module. The external ISP engine can be a mixture of low-power processors such as ARM A-series or reconfigurable logic such as FPGA. FPGA-based ISP provides flexibility for implementing custom-designed accelerators. But deploying an FPGA-based unit requires RTL-level design which significantly complicates the deployment of new tasks{{cite:2aafedd4e0c16d662e8591a9fcb7532019c74728}}, {{cite:22a91a830d62f1c71298f966dd7606802c9f4e49}}.", "Researchers in {{cite:4d4921c25245240524fde20a9157f7fe28549e6f}} investigate a computational storage platform for big data analytics. The computation part is based on the Xilinx's Zynq, an SoC containing both ARM cores and FPGA arrays. It can directly communicate with the storage part by transferring data in P2P mode. With their software stack, it can run user binaries without modification, making it easy to port applications. Experimental results show that this system can achieve 6x improvement in query times and an average of 60% lower CPU usage. However, no power and energy results were reported, even though the FPGAs and the off-chip accelerator are likely to be power hungry. Also, the communication between the SSD engine and the computation engine can emerge as a new bottleneck and the entire design falls behind of an integrated solution such as Solana.", "A close work to ours, RecSSD {{cite:7dc4813713598a6847fbaee42368c9eef273c03c}} proposes a near-data processing solution that improves the performance of the underlying SSD storage for embedding table operations for recommendation applications. It utilizes the internal SSD bandwidth and reduces data communication overhead between the host processor and the SSDs by offloading the entire embedding table operation, including gather and aggregation computations, to the SSDs. The hardware is a commercial OpenSSD evaluation platform{{cite:787113d6b4512a0768558dc10585ee6d9ec13112}}. This research's main contribution is a software solution that is implemented on the flash translation layer (FTL). Experimental results show that their proposed system enhances the overall latency by up to 2x compared to off-the-shelf SSDs. Even though the results of RecSSD looks promising, the design is application specific and cannot be adapted to different applications. It also requires changes deep down to the flash translation layer (FTL) which is not an viable option for end users.", "We take in-storage processing a step further by designing an ASIC that includes both the SSD controller and a dedicated ARM processor subsystem for running general applications on a single chip. The 64 bit quad-core ARM processor supports running a Linux operating system which in turn enables running executables without source-code modification or recompiling. We have also implemented a TCP/IP-based tunneling system that allows the in-storage processing engine to connect to a network, including the Internet and other processing nodes. The next section details the hardware and software that enable our system to function both as a regular storage system and as a standalone processing node." ]
[]
Directional Analytic Discrete Cosine Frames
Block frames called directional analytic discrete cosine frames (DADCFs) areproposed for sparse image representation. In contrast to conventionaloverlapped frames, the proposed DADCFs require a reduced amount of 1)computational complexity, 2) memory usage, and 3) global memory access. Thesecharacteristics are strongly required for current high-resolution imageprocessing. Specifically, we propose two DADCFs based on discrete cosinetransform (DCT) and discrete sine transform (DST). The first DADCF isconstructed from parallel separable transforms of DCT and DST, where the DST ispermuted by row. The second DADCF is also designed based on DCT and DST, whilethe DST is customized to have no DC leakage property which is a desirableproperty for image processing. Both DADCFs have rich directional selectivitywith slightly different characteristics each other and they can be implementedas non-overlapping block-based transforms, especially they form Parseval blockframes with low transform redundancy. We perform experiments to evaluate ourDADCFs and compare them with conventional directional block transforms in imagerecovery.
[ "Directional block bases and frames can be classified into two categories. One is the fixed class, i.e., transforms equipped with directionally oriented bases. This class of transforms includes discrete Fourier transform (DFT) {{cite:fd73370135115cc9aba9ef23be300c027bee27fb}}, discrete Hartley transform (DHT) {{cite:89c8fb1180d40986d0f1c52eec4be6971b56dfaf}}, and real-valued conjugate-symmetric Hadamard transform {{cite:3a6930c29e77227720f49599de803e40752a7687}}. The other is the adaptive class, i.e., the application of a non-directional block transform (e.g., the DCT) along suitable oblique directions provided by preprocessing (e.g., edge analysis) for each block {{cite:c26114b25bab8829ba9366ea2001393f0967f30e}}, {{cite:9665009df7b40bb6b0218c4e419f9711a7484bca}}. Applications of the latter class are relatively limited because transform directions have to be determined from an input signal in advance. For example, in signal recovery, degraded observations make it difficult to find suitable directions. Our directional block frames correspond to the fixed class.", "The main problem with DFT and its variants is that they contain duplicated atoms along the same direction in their basis and hence cannot provide rich directional selectivity (i.e., the number of directional orientations in a basis or a frame). This degrades the efficiency of signal analysis and processing. In order to achieve richer directional selectivity, in this paper, we extend the DCT to the DADCF. Definitely, the DCT is one of the most effective block transforms for image processing tasks and is already integrated into many digital devices. For example, video coding standards, e.g. HEVC {{cite:f8828c12a5dc038ba773cd84be0abb80a7453e0a}} and VVC {{cite:a04185f9c7542a21ab878a8b62910fafe9cd9d83}}, employ the various sizes of the (integer) DCT. However, since it does not contain obliquely oriented atoms in its basis, it cannot achieve rich directional selectivity.", "In this paper, we reveal that by appending some extra modules, i.e., DST and scaling/addition (and subtraction)/permutation (SAP) operations, to the DCT, the resulting transform provides directionally oriented atoms and thus leads to rich directional selectivity. Furthermore, since the DST can be designed by the (row-wise) flipped and sign-altered version of the DCT, the implementation cost for the proposed transform can be kept low, i.e., the total procedure can be fully implemented by using the DCT and a few SAP operations.", "A preliminary version of this work was presented in {{cite:5daff80689ba1a266da6bb00441682ab26fad71a}}, which provides a basic structure of the DADCF. In this paper, we newly introduce theory and design algorithm of the RDADCF, and comprehensive experiments.{{table:30ca4a3e-8fa9-4b9d-ab23-ab24e274ba3f}}" ]
[]
On the Reception Process of Molecular Communication-Based Drug Delivery
One of the important applications of molecular communication is the targeteddrug delivery process in which the drug molecules are released toward thetarget (receiver) in a way that the side effects are minimized in the humanbody. As the total number of released molecules increases, the receiver cannotreceive all of the transmitted drug molecules. Therefore, the molecules wouldbe accumulated in the system which results in side effects in the body. Inorder to diagnose the appropriate transmission rate of the drug molecules, itis important to investigate the reception process of the receiver. In thispaper, a reception model is studied using queuing theory. In the proposedmodel, the rejection rate of the drug molecules due to different reasons, suchas random movement of the molecules, as well as the rejection rate due toactive receptors are taken into account. Moreover, an interval consisting ofthe lower and upper bounds for the number of released molecules is presentedbased on the proposed model in order to determine the range of allowable dosageof the drug molecules. It is shown that the queuing theory can be successfullyemployed in accurate modeling of the reception process of the receiver in drugdelivery applications.
[ "In many studies, the receiver is assumed to be a fully cover receiver {{cite:bc46c019e72911678eee4d869a496965c70888b3}}, {{cite:880e737a08e700eaa7675c380bc59d932a941231}}, {{cite:9eaa2df69d65fa39eb7e0b5d616f4755a478b18a}}, {{cite:ba838e62bc62ba8d13ad1e54bd6d9768ebcabfc4}}. In these models, the finite number of the receptors is not taken into consideration. Moreover, the interaction between a receptor and a messenger molecule is ignored. In some cases, such as some processing performed by cells, having a fully cover receiver is an appropriate assumption {{cite:4954e362d8f768b7a6b713e25ced9649226de23f}}. Also, in some cases where the main focus of the study is on the other parts of the MC system, such as designing a modulation technique {{cite:9eaa2df69d65fa39eb7e0b5d616f4755a478b18a}}, {{cite:67ac0e452a7301b93c163872ef2d8c9794a28733}}, the receiver is usually considered to be fully cover. However, in order to study the behavior of the receiver more accurately, it is necessary to take some conditions into account, such as the limited number of receptors and the interaction between the ligand and the receptor. A list of related works contains the following. in {{cite:38b9d05807ee9edf5aa3d100c9060686d1217f30}}, the interaction between the receptors and the ligands is considered. In this model, it is assumed that a receptor can interact with multiple ligands simultaneously. Moreover, the environment is considered to be unbounded. This model is generalized to a model with a bounded environment in {{cite:51c7fa7c7b3610e9e02cf98412ba11392002f1aa}}. Moreover, the binding and unbinding rates of the ligand-receptor are considered in this model. Note that in the model proposed in {{cite:51c7fa7c7b3610e9e02cf98412ba11392002f1aa}}, no limitation is considered for the number of the receptors. In {{cite:e812d62c3eb9d2c0ed0982a53e7886ba39ecdcff}}, the binding and unbinding rates of the ligand-receptor are also considered, and the number of received ligands is modeled using the Poisson distribution. In {{cite:7edee2db1789058c98b9167463b042effe9a05a5}}, it is assumed that the number of the receptors is finite. Then, the considered model is approximated with the fully cover receiver to solve the problem. In {{cite:39b659e6e99ccc3fbf6f54f98d6af6af4735fd73}}, the finite receptor model is considered, and a maximum likelihood detection-based method is presented using the ligand-receptor unbinding duration. In the study conducted in {{cite:39b659e6e99ccc3fbf6f54f98d6af6af4735fd73}}, only one type of ligands and receptors is assumed. The mentioned model is generalized to multiple types of the receptors and ligands in {{cite:0391db89bcf1fe8110e2b5f646adfe154dc91b4f}} and a detection method is presented in order to detect the concentration of each type of the ligands. In {{cite:b06688c9c5df57c46c767c54e3a6d0393ca182f1}}, the blocking effect of the receptors caused by other types of molecules is considered in the finite receptor model. In {{cite:b94ac2c8f8deff4156f42855779ea3506c5cb830}}, with the consideration of the finite receptor model, the rejection rate of the ligand by the receptor is taken into account. Note that in this study, it is assumed that the rejection rate occurs due to the activation of all of the receptors. This problem is further investigated in {{cite:d5a7684442f608e2eecd8b54af8649e7ffde3db2}} and it is shown that the positions of the receptors on the receiver surface can be approximated to be concentrated in a single point. Considering the finite receptor model, in {{cite:534660a028be31d9ce39e514dc270acea508b729}} the probability distribution of the active receptors is obtained in steady-state using the queuing theory principles, and the minimum release rate of the ligands is optimized at the transmitter part.", "The rejection rate of the ligands in the case where the receptors are in the inactive mode is not considered in the recent studies. Also, the rejection process due to active receptors, which is investigated in {{cite:b94ac2c8f8deff4156f42855779ea3506c5cb830}}, {{cite:d5a7684442f608e2eecd8b54af8649e7ffde3db2}}, affects the enter rate of the molecules; it is assumed that when the molecule, which is entering the system, faces an active receptor, it is rejected from the system. However, in the proposed reception model, the rejection rate, due to active receptors or random movement of the molecules is investigated in the exit rate of the molecules from the system. Moreover, in optimizing the release rate of the drug molecules, a lower bound is determined in the previous studies, as mentioned before. However, the upper bound of the release rate is not specified to the best of our knowledge. In this study, in addition to the lower bound obtained according to the proposed model, an upper bound for the number of releasing drug molecules is also proposed." ]
[]
NeRD++: Improved 3D-mirror symmetry learning from a single image
Many objects are naturally symmetric, and this symmetry can be exploited toinfer unseen 3D properties from a single 2D image. Recently, NeRD is proposedfor accurate 3D mirror plane estimation from a single image. Despite theunprecedented accuracy, it relies on large annotated datasets for training andsuffers from slow inference. Here we aim to improve its data and computeefficiency. We do away with the computationally expensive 4D feature volumesand instead explicitly compute the feature correlation of the pixelcorrespondences across depth, thus creating a compact 3D volume. We also designmulti-stage spherical convolutions to identify the optimal mirror plane on thehemisphere, whose inductive bias offers gains in data-efficiency. Experimentson both synthetic and real-world datasets show the benefit of our proposedchanges for improved data efficiency and inference speed.
[ "Planar symmetry detection.The work in {{cite:e7c0ed44673fe54ddb5f31b3df14a99bbfc2999f}} presents a thorough overview of existing methods on 2D symmetry detection by organizing a series workshops. Further work in {{cite:a79f4fd30f8dd5a2ead633290f8a383cb96b49de}} expands the workshop by including other types of symmetries such as medial-axis-like symmetries and by adding synthetic 3D data. The work in {{cite:57d12b5314351adb3250408cdaa76b374f13a185}} first adapts neural networks for planar symmetry detection and achieves competitive results. However, most objects in this challenge are strictly front-facing and therefore only exhibit planar symmetries. In addition, planar symmetry does not encode any 3D perspective information. Different from these works, we aim to detect 3D mirror symmetry from single-view images where images can be taken from any perspective.", "3D mirror symmetry detection.3D mirror symmetry is prevalent in both nature and the man-made world. There has been excellent research on utilizing geometric transforms for detecting mirror symmetries from 3D inputs {{cite:3c8a9e28defbe79cb7df1bbcb1a7e961e1e3e465}}, {{cite:b73fd0233b2e0ad4a7323c30ad329e8d1a1b77c7}}, {{cite:b1504006fa17323aca11931c842502181a34bce6}}. The work in {{cite:3c8a9e28defbe79cb7df1bbcb1a7e961e1e3e465}} detects mirror symmetry plane from point clouds via a 3D Hough Transform. The work in {{cite:b1504006fa17323aca11931c842502181a34bce6}} relies on the Planar Reflective Symmetry Transform to find symmetry planes from 3D volumetric data. Similar to these works, we also make use of the 3D geometric knowledge for detecting mirror symmetries, but from single-view images only.", "Recently, the work in {{cite:451363e62324ed64c6ffc74540887013c79f8b7a}}, {{cite:02f17a0a00d456fd58fefa7064cbd81813ca4a03}} take advantage of large datasets and employ neural networks for learning 3D symmetries. Despite being able to detect multiple symmetries, they rely on heavy post-processing procedures to find the optimal symmetry. Moreover, these models have only been tested on synthetic 3D datasets (i.e. ShapeNet {{cite:1a3d07af6f7672f7ae95b2e401d0dbf92e5c101a}} with voxelized volumes or RGB-D data). In contrast, we propose to learn 3D mirror symmetry in an end-to-end manner, and test on both synthetic and real-world 2D images.", "3D mirror symmetry from single-view images.In {{cite:17c8d54f06175ab57e3f7a8b04aaee10fb66ad58}}, a two-stage approach is proposed to estimate mirror symmetry from 2D images. This approach first does correspondence matching and then applies RANSAC to identify the best symmetry plane. However, this strategy is no longer applicable in certain cases where textureless objects, smooth surfaces and repetitive patterns are present, because of lacking correspondences. Rather than relying on local feature matching, NeRD {{cite:0ba3aa138c77dab03ffcf57b0a00e169b8a712a3}} makes use of neural networks to learn dense features and incorporates 3D mirror geometry into learning, making it the top-performing model. Inspired by NeRD, we also explicitly add geometric knowledge into learning. Different from NeRD which relies on large amounts of training data, we reduce the inference latency and the demand for massive data by calculating the correlations between the input and its mirrors and by introducing multi-stage spherical convolutions to the localize the optimal mirror plane." ]
[]
Well Begun is Half Done: An Empirical Study of Exploitability & Impact of Base-Image Vulnerabilities
Container technology, (e.g., Docker) is being widely adopted for deployingsoftware infrastructures or applications in the form of container images.Security vulnerabilities in the container images are a primary concern fordeveloping containerized software. Exploitation of the vulnerabilities couldresult in disastrous impact, such as loss of confidentiality, integrity, andavailability of containerized software. Understanding the exploitability andimpact characteristics of vulnerabilities can help in securing theconfiguration of containerized software. However, there is a lack of researchaimed at empirically identifying and understanding the exploitability andimpact of vulnerabilities in container images. We carried out an empiricalstudy to investigate the exploitability and impact of security vulnerabilitiesin base-images and their prevalence in open-source containerized software. Weconsidered base-images since container images are built from base-images thatprovide all the core functionalities to build and operate containerizedsoftware. We discovered and characterized the exploitability and impact ofsecurity vulnerabilities in 261 base-images, which are the origin of 4,681actively maintained official container images in the largest containerregistry, i.e., Docker Hub. To characterize the prevalence of vulnerablebase-images in real-world projects, we analysed 64,579 containerized softwarefrom GitHub. Our analysis of a set of $1,983$ unique base-image securityvulnerabilities revealed 13 novel findings. These findings are expected to helpdevelopers to understand the potential security problems related to base-imagesand encourage them to investigate base-images from security perspective beforedeveloping their applications.
[ "Shu et al. {{cite:689ef5906a03d81dc4bc39de24c8bd97d07acbf1}} performed the first study on common vulnerabilities in images hosted in DH. They proposed a framework named Docker Image Vulnerability Analysis (DIVA) for collecting and analysing images. Wist et al. {{cite:4e448ab7c6bc1f492719e74451fdfe0e2e79d0cd}} also performed a similar study recently on 2,500 DH images. Moreover, Kwon et al. {{cite:7db2c1db1fd4c69edb09b7248fe402381d9bc80b}} proposed a Docker Image Vulnerability Diagnostic System (DIVDS) to diagnoses images when uploading or downloading the images from DH. Zerouali et al. focused on vulnerabilities and outdated packages in debian-based images {{cite:c7887865e3d2750245992e6d90df3b603f791670}}, {{cite:fdf5b4a27d391423ef038d89d3fef3cfd72f8957}}, programming language images {{cite:f9e8b70cae290df47015040684a2eafed090c53c}}, {{cite:5d2af6416f253725a9205bc8c558eb77ffd95925}} from DH. Mohallel et al. {{cite:80b3ae2f2d0e726beb6b028129a0743c03c2c828}} showed the presence of vulnerability in images can increase attack surface for Docker than traditional virtual machines. Ibrahim et al. showed the lack of guidance for developers to select suitable images to build applications {{cite:ee487e3149d8acd1be18efeac3bfabe98f538b35}}. Tak et al. performed study on DH images and showed that a majority of the images contained vulnerable packages and violated security compliance rules {{cite:375d1e65a0fcf651977ddcffe480c3cf4f93db11}}. Socchi et al. investigated the findings revealed by Shu et al. {{cite:689ef5906a03d81dc4bc39de24c8bd97d07acbf1}} and showed prevalence of vulnerabilities in all types of repositories, such as official, community, verified and certified {{cite:8b3d9a247139894fb6b429b9b83146d0219b47d3}}. Besides, Liu et al. identified user unawareness on using images from DH and proposed a framework to identify malicious images {{cite:4c0050e8ed9ff7ff2aa813ba19b26684a0c715ee}}.", "However, our work is significantly different to the previous studies in several ways. Firstly, our research questions and goals of the study are different in terms of identification of exploitability of known vulnerabilities, their assessment, prioritization, remediation and of such exploitable vulnerabilities, providing a comprehensive evidence-based knowledge on vulnerability management for base-images. We also investigated the practice of developing containerized software in terms of analyzing the relationship of vulnerable/secure base-images with different project attributes (e.g., project age, popularity, contributor size, etc) from GH.", "Secondly, the data we analyzed is significantly different from the previous studies due to our base-image extraction process. To collect base-images, we leveraged the Dockerfile from all official repositories of DH and iteratively mined images (mentioned in Dockerfile) until it fell in scratch. In contrast, the most relevant study {{cite:8b3d9a247139894fb6b429b9b83146d0219b47d3}} used only the most recent updated image (i.e., latest-tagged images) from the base-image repositories, which may missed a huge portion of actually deployed base-images. Our assumption is verified as we found 99.1% of official image's Dockerfiles did not use latest-tagged images, indicating that such latest-tagged base-images are not in the real-world practice of building official images in DHOracle Linux officially removed latest-tagged images from their repository, https://hub.docker.com/_/oraclelinux?tab=description. Moreover, our analyzed images are different (minimally overlapped, less than 1%) with the most recent studies on image vulnerabilities {{cite:c7887865e3d2750245992e6d90df3b603f791670}}, {{cite:4e448ab7c6bc1f492719e74451fdfe0e2e79d0cd}}, {{cite:ee487e3149d8acd1be18efeac3bfabe98f538b35}}, which mean the findings and observations we contributed are substantially different than the earlier studies.", "Thirdly, the vulnerability report in our study was computed using ANCHORE {{cite:8ef5f3932fb16b5bba951cdaeee0d64e80277698}}, which showed better precision and recall than CLAIR {{cite:e3c8dba165439341459c3316ef3de5b4b4eb6daa}}. Therefore, we suspect the vulnerabilities reported by the studies {{cite:689ef5906a03d81dc4bc39de24c8bd97d07acbf1}}, {{cite:8b3d9a247139894fb6b429b9b83146d0219b47d3}} using CLAIR {{cite:246a48600470d7f1c364628691af377443c36fe5}} may miss some vulnerabilities. We verified our observation by scanning our base-image data set with CLAIR, and found that it could not detect 28.8% of the existing vulnerabilities, which indicates our data set contains broader set of vulnerabilities. Besides, our data set is generalized, and not specific to any particular distribution, such as debian {{cite:c7887865e3d2750245992e6d90df3b603f791670}}, {{cite:ee487e3149d8acd1be18efeac3bfabe98f538b35}}.", "In summary, our work has uniquely performed in-depth vulnerability analysis of `base-images', which are used to create containerized software. This analysis is indispensable for a precise understanding of security issues in container-based applications since base-image is a key component in multi-tenant environments. Our results also provide an empirically discovered secure `base-image' library which can be used to build secure containerized applications. Moreover, we have also demonstrated how propagation of vulnerabilities from base-images can be minimized by using the identified secured base-images list." ]
[]
FourierMask: Instance Segmentation using Fourier Mapping in Implicit Neural Networks
We present FourierMask, which employs Fourier series combined with implicitneural representations to generate instance segmentation masks. We apply aFourier mapping (FM) to the coordinate locations and utilize the mappedfeatures as inputs to an implicit representation (coordinate-based multi-layerperceptron (MLP)). FourierMask learns to predict the coefficients of the FM fora particular instance, and therefore adapts the FM to a specific object. Thisallows FourierMask to be generalized to predict instance segmentation masksfrom natural images. Since implicit functions are continuous in the domain ofinput coordinates, we illustrate that by sub-sampling the input pixelcoordinates, we can generate higher resolution masks during inference.Furthermore, we train a renderer MLP (FourierRend) on the uncertain predictionsof FourierMask and illustrate that it significantly improves the quality of themasks. FourierMask shows competitive results on the MS COCO dataset compared tothe baseline Mask R-CNN at the same output resolution and surpasses it onhigher resolution.
[ "In two-stage instance segmentation, the network first detects (proposes) the objects and then predicts a segmentation mask from the detected region. The baseline method for many two stage methods is Mask R-CNN {{cite:a33458f8cfe7825ed045703521e114a2c85de851}}. Mask R-CNN added a mask branch to Faster R-CNN {{cite:ccc4d23632d71318e74d172e02f70c9fdc919916}}, which generated a binary mask that separated the foreground and background pixels in a region of interest.Mask Scoring R-CNN {{cite:922716241b428f28ef9010d3025c3384c1fff801}} had a network block to learn the quality of the predicted instance masks and regressed the mask IoU.ShapeMask {{cite:f42144c79a32f2a0cbdc474b118d13acc627735d}} estimated the shape from bounding box detections using shape priors and refined it into a mask by learning instance embeddings.CenterMask {{cite:969e65bd1d5e04ea5cdd49089422b4f8daf51b7f}} added spatial attention-guided mask on top FCOS {{cite:e939206114d6a6794ff7d09a60d673eec328518c}} object detector, which helped to focus on important pixels and diminished noise. PointRend {{cite:a64387f86ba0f27e0200db7d010693a20288d6b3}} tackled instance segmentation as rendering problem. By sampling unsure points from the feature map and its fine grained features from higher resolution feature map, it was able to predict really crisp object boundaries using a fully connected MLP.Rather than employing binary grid representation of masks, PolyTransform {{cite:3ad8a0b34e1ee39aef86bf77e858b3541117eb7b}} used a polygon representation. These methods accomplish state-of-the-art accuracy, but they are generally slower than one stage methods.", "One stage instance segmentation methods predict the instance masks in a single shot, without using any proposed regions/bounding boxes as an intermediate step. YOLACT {{cite:eaa0eb8fa50cb7e205b782c5f6a70714ba5eb2d8}} linearly combined prototype masks and mask coefficients for each instance, to predict masks in real-time speeds. Likewise, Embedmask {{cite:701272af9c2599f40179e7866940ceead0a53095}} employed embedding modules for pixels and proposals. ExtremeNet {{cite:c5f7da43dc31e82afb681f7ed7ebf71fdc5b5357}} predicted the contour (octagon) around an object using keypoints of the object. Similary, Polarmask {{cite:32b1da6d36991a99ea949267181cb9d5e98338b0}} used the polar representation to predict a contour from a center point (centerness from FCOS {{cite:e939206114d6a6794ff7d09a60d673eec328518c}}).Dense RepPoints {{cite:56a17ecada64b76d34815b1403bfedf17d2d127e}} used a large set of points to represent the boundary of objects. FourierNet {{cite:4c3e4524027e335ff525a4ff0e22c94ce1f9735a}} employed inverse fast Fourier transform (IFFT) to generate a contour around an object represented by polar coordinates. The network learned the coefficients of the Fourier series to predict those contours.", "Implicit representations learn to encode a signal as a continuous function. Mescheder et al. {{cite:08af11e79c951c2c0648f8b1a5d42c73f42092a3}} proposed occupancy networks, which implicitly represented the 3D surface as the continuous decision boundary of a deep neural network classifier. Mildenhall et al. {{cite:4262623f5a3c9367d66ed7eaaf853bf052224ea3}} used implicit neural networks to learn 3D scenes and synthesize novel-views. Tancik et al. {{cite:b1c6a88379196c1cb864a9dfa0eda611f53143c2}} showed that mapping input coordinates using a Fourier feature mapping, allows MLPs to learn high frequency function in low dimensional domains. Sirens {{cite:6efe29de65900697e743b04555e93b926a5101e0}} showed that using periodic activation functions (such as sine) in implicit representations, lets the MLPs learn the information of natural signals and their derivatives better than when using other activation functions such as ReLU." ]
[]
LaTr: Layout-Aware Transformer for Scene-Text VQA
We propose a novel multimodal architecture for Scene Text Visual QuestionAnswering (STVQA), named Layout-Aware Transformer (LaTr). The task of STVQArequires models to reason over different modalities. Thus, we first investigatethe impact of each modality, and reveal the importance of the language module,especially when enriched with layout information. Accounting for this, wepropose a single objective pre-training scheme that requires only text andspatial cues. We show that applying this pre-training scheme on scanneddocuments has certain advantages over using natural images, despite the domaingap. Scanned documents are easy to procure, text-dense and have a variety oflayouts, helping the model learn various spatial cues (e.g. left-of, belowetc.) by tying together language and layout information. Compared to existingapproaches, our method performs vocabulary-free decoding and, as shown,generalizes well beyond the training vocabulary. We further demonstrate thatLaTr improves robustness towards OCR errors, a common reason for failure casesin STVQA. In addition, by leveraging a vision transformer, we eliminate theneed for an external object detector. LaTr outperforms state-of-the-art STVQAmethods on multiple datasets. In particular, +7.6% on TextVQA, +10.8% on ST-VQAand +4.0% on OCR-VQA (all absolute accuracy numbers).
[ "Pre-training and Language Models. The low cost of obtaining language text combined with the success of pre-training, language models {{cite:3588da372261d1a6e2f302fe3ac3ad71872bb486}}, {{cite:37bd5d71ecea201ce2ce55a258e1f7943550cb46}}, {{cite:a67d4134e0a3b08a27e72044a64bf052287f2c72}}, {{cite:98047df12e8acedd5fdb363663a0e706e838eb2a}} has shown remarkable success in machine translation, natural language understanding, question answering and more. Recently, numerous studies {{cite:53a3c02aafc854b24867474e5ba75f09337f0d1c}}, {{cite:2d242c4f7e1a5383c02a6cf1a4168d2abdd97050}}, {{cite:5d3b7ec5435ae133701ccee58da632cb66dd4be0}}, {{cite:59ea50b7e0aa32b4f7006b89f86444366dbdc0a9}}, {{cite:7398473e4074a3fca35eb3be4628a0be6ceea235}}, {{cite:fc5f46a9f97eccca9fe244ce05b74e890a1aac14}}, {{cite:9ebee1bab1900a4462dbedb7a0d75d76aaebeec7}}, {{cite:96841707dbccdd65f02f0e4d8e433f57ce9f0f6f}}, {{cite:a5495bc618a660622d4433e654cd3f84d130fc7e}}, {{cite:688d5d32791c12679d65f5cfa4344f59365c4bd4}}, {{cite:90cc752e4b8523d4a93cb071397a0e05b4c5ddda}}, {{cite:b3ca812770bae2fb74e61b72597d34fc42d9f077}}, {{cite:0a9c7ff211b4a1d4ccabf7a863140537b6246213}} showed the benefits of pre-training multi-modal architectures for vision and language tasks. Yang et al. {{cite:cd502b847c9e69b8ba452c7fc7aae28ecc886264}} demonstrated, for the first time, the effectiveness of pre-training in scene text VQA by using masked language modeling and image-text matching as pretext tasks.In this paper, we show that tying together language and layout information via a simple layout-aware pre-training scheme is beneficial for scene text VQA. Moreover, we perform pre-training over scanned documents and discover that, despite the domain gap, documents can be leveraged for task of STVQA.{{figure:3c0881a5-ebb3-46a3-9160-a017ee260cfa}}{{figure:771ab6bb-016f-4d65-b3f0-7345ef30960c}}", "Vision-language tasks incorporating scene text. Recently, integrating reading into the vision and language tasks has become imperative, especially in VQA and captioning where the models were known to be illiterate {{cite:f40886a2235da8c663629be3745514951eec2b47}}, {{cite:38d3af460b85c67e4ef88b25be2c6e8fdb68127e}}.Since the usage of text can be quite distinct in terms of the environment, several papers introduce new datasets for various contexts in which text appears; ST-VQA {{cite:eccc14861c607ed8be0aff6885a2461755950913}}, TextVQA {{cite:38d3af460b85c67e4ef88b25be2c6e8fdb68127e}} in natural images; OCR-VQA {{cite:cf417dbb0958c85ef3638eb03bafc409420d267e}} in book and movie covers;DocVQA {{cite:f33314de3dd0c39de58f93595d29307192d038dc}} in scanned documents; InfoVQA {{cite:8bcd38320bb238d4222434bfb34c8beea8944f42}} in info-graphics. Moreover, STE-VQA {{cite:5ea45291b0a6653d9768c9a725aee032fd465c3c}} is proposed for multi-lingual VQA and TextCaps {{cite:f0d78382a0f346605e11d421c92e473f31a26120}} for captioning on natural images.There are several papers published on scene text VQA. LoRRa {{cite:38d3af460b85c67e4ef88b25be2c6e8fdb68127e}} extended Pythia {{cite:f8cfab11c9187d7af91be2c0853abf9dc4cda6e1}} with a pointer network {{cite:00b80c9cda42b68de2f65ae9c2f14c0bf7756c85}} to select either from a fixed vocabulary or from OCR tokens. M4C {{cite:d1ca82fa40b3f190ecd5e6998eef052f7addd401}} also used pointer networks but instead used multi-modal transformers {{cite:9e1dbb08f95fc9c8070cdc9a1b3bd08cd64012a6}} to encode all modalities together. SA-M4C {{cite:8ce0bae0990d20ddf4b73ffb7edddf45dc559a1a}} build on top of M4C by providing supervision on self-attention weights. MM-GNN {{cite:9bc65438e1794116654bf8df86cefd65a0a00694}} builds separate graphs for different modalities by utilizing graph neural networks {{cite:ac3935ec4ddbb7abc87ceede12e5a0b9c82f78a6}}. Instead of having separate graphs for each modality, SMA {{cite:1fc77850a947111761c107f981cdb4fe5649f670}} introduces a single graph that encodes all modalities. {{cite:ccbfe8e3f816282454b6a1d05261e4f1ac5de095}} proposes to use an attention mechanism to fuse pairwise modalities.", "LaTr enriches the language modality with layout information via pre-training to achieve state-of-the-art performance across multiple benchmarks. Our model is generative in nature and as such alleviates the problem of vocabulary reliance current methods suffer from. In addition, we will show that LaTr is more robust to OCR errors, one of the most common reasons for failure cases in STVQA {{cite:d1ca82fa40b3f190ecd5e6998eef052f7addd401}}, {{cite:cd502b847c9e69b8ba452c7fc7aae28ecc886264}}." ]
[]
Digital Editions as Distant Supervision for Layout Analysis of Printed Books
Archivists, textual scholars, and historians often produce digital editionsof historical documents. Using markup schemes such as those of the TextEncoding Initiative and EpiDoc, these digital editions often record documents'semantic regions (such as notes and figures) and physical features (such aspage and line breaks) as well as transcribing their textual content. Wedescribe methods for exploiting this semantic markup as distant supervision fortraining and evaluating layout analysis models. In experiments with severalmodel architectures on the half-million pages of the Deutsches Textarchiv(DTA), we find a high correlation of these region-level evaluation methods withpixel-level and word-level metrics. We discuss the possibilities for improvingaccuracy with self-training and the ability of models trained on the DTA togeneralize to other historical printed books.
[ "Perhaps the largest dataset proposed recently for document layout analysis is PubLayNet {{cite:d719f9ed301b17d9c178eb92a001ed9c2fd46dfa}}. The dataset is obtained by matching XML representations and PDF articles of over 1 million publicly available academic papers on PubMed CentralTM. This dataset is then used to train both Faster-RCNN and Mask-RCNN to detect text, title, list, table, and figure elements. Both models use ResNeXt-101-64x4d from Detectron as their backbone. Their Faster-RCNN and Mask-RCNN achieve macro mean average precision (MAP) at intersection over union (IOU) [0.50:0.95] of 0.900 and 0.907 respectively on the test set.", "Newspaper Navigator {{cite:e9808a25307c5524325a4d762bba4ef0e0f1eaba}} comprises a dataset and model for detecting non-textual elements in the historic newspapers in the Chronicling America corpus. The model is a finetuned R50-FPN Faster-RCNN from Detectron2 and is trained to detect photographs, illustrations, maps, comics/cartoons, editorial cartoons, headlines, and advertisements. The authors report a MAP of 63.4%.", "U-net was first proposed for medical image segmentation {{cite:20c6116a25a2e1637111761e85a5afebb3d431a0}}. Its architecture, based on convolutional layers, consists of a down-sampling analysis path (encoder) and an up-sampling synthesis path (decoder) which, unlike regular encoder-decoders, are not decoupled. There are skip connections to transfer fine-grained information from the low-level layers of the analysis path to the high-level layers of the synthesis path as this information is required to accurately generate fine-grained reconstructions. In this work, we employ the U-net implementation P2PaLahttps://github.com/lquirosd/P2PaLA described in {{cite:4ca10c44f6e002dc8533032cc2f51e7c41be9d50}} for detection and semantic classification of both text regions and lines. This implementation has been trainedand tested on different publicly available datasets:cBAD {{cite:83165b87be3f7b29f4c4ce27d77948180ac0bba7}} for baseline detection, andBozen {{cite:866dd67269ea804d1e950bd761f999811cb9ea60}} and OHG {{cite:bc6902966046c22198c16134c9858987cf22703b}} for both text regionclassification and baseline detection. Reported mean intersection overunion results are above 84% for region and baseline detection on theBozen dataset.It is worth noting that the U-net implementation isprovided with a weighted loss functionmechanism {{cite:8dc0e2aa034846f17f03b95ca0a47c56960e19ee}}, which can mitigate possibleclass imbalance problems.", "Kraken, an OCR system forked from Ocropy, uses neuralnetworks to perform both document layout analysis and textrecognition.See http://kraken.re and https://github.com/ocropus/ocropy.For pixel classification in layout analysis, Kraken's networkarchitecture was designed for fewer memory resources than U-net. Roughly, it comprises down-sampling convolutional layerswith an increasing number of feature maps followed by BLSTM blocks forprocessing such feature maps in both horizontal and verticaldirections {{cite:068ef7c41bf54f2ff9492a423106193704b0b753}}. The final convolutional layer,with sigmoid activation function, outputs probability maps of regionsand text lines.Kraken's model for baseline detection has been trained and tested onthe public dataset BADAM {{cite:71b0acd9a1b984d84559ecd1992184b61b4376f6}} and also on thesame datasets as P2PaLA. For region detection, Kraken obtained meanintersection over union figures are 0.81 and 0.49 for Bozen and OHGdatasets respectively.", "Several evaluation metrics have been commonly employed for document layout analysis. The Jaccard Index, also known as intersection over union (iu), is one of the most popular pixel-level evaluation measures used in ICDAR'sorganized competitions related with document layout analysis as{{cite:15f2f24a694eb3f24e38d3ecc7f77fa23a88bcf1}},{{cite:f380078a468bf51f52e224d2738a31817e79b8e7}}. Likewise this measure has also served as a wayto consider when there is a match between detected objects and theirreferences as in{{cite:34e3cfd1f7bed542988a92d102ab936139a03ddc}}." ]
[]
ELSA: Enhanced Local Self-Attention for Vision Transformer
Self-attention is powerful in modeling long-range dependencies, but it isweak in local finer-level feature learning. The performance of localself-attention (LSA) is just on par with convolution and inferior to dynamicfilters, which puzzles researchers on whether to use LSA or its counterparts,which one is better, and what makes LSA mediocre. To clarify these, wecomprehensively investigate LSA and its counterparts from two sides:\emph{channel setting} and \emph{spatial processing}. We find that the devillies in the generation and application of spatial attention, where relativeposition embeddings and the neighboring filter application are key factors.Based on these findings, we propose the enhanced local self-attention (ELSA)with Hadamard attention and the ghost head. Hadamard attention introduces theHadamard product to efficiently generate attention in the neighboring case,while maintaining the high-order mapping. The ghost head combines attentionmaps with static matrices to increase channel capacity. Experiments demonstratethe effectiveness of ELSA. Without architecture / hyperparameter modification,drop-in replacing LSA with ELSA boosts Swin Transformer \cite{swin} by up to+1.4 on top-1 accuracy. ELSA also consistently benefits VOLO \cite{volo} fromD1 to D5, where ELSA-VOLO-D5 achieves 87.2 on the ImageNet-1K without extratraining images. In addition, we evaluate ELSA in downstream tasks. ELSAsignificantly improves the baseline by up to +1.9 box Ap / +1.3 mask Ap on theCOCO, and by up to +1.9 mIoU on the ADE20K. Code is available at\url{https://github.com/damo-cv/ELSA}.
[ "Vision Transformers.Transformer {{cite:807c2940c4c5f78d6fab4df5f3c4ae200a9562e3}} is first proposed in the NLP task and achieves dominant performance {{cite:b63d731c50118518cb76955c707400fd9c7a4984}}, {{cite:7986e8d7a37ef91bec9a8df0c55e092c65378253}}. Recently, the pioneering work ViT {{cite:a5b5cfcea0049d3e63f400806e3144e4ba397161}} successfully applies the pure transformer-based architecture to computer vision, revealing the potential of transformer in handling visual tasks. Lots of follow-up studies are proposed {{cite:8f773dd8b25c8a375f72a6989a4de0d887fd5c76}}, {{cite:8c9211ff0902d92acd9a19f9c0a6d0fe66407d9e}}, {{cite:ff4a9ccc5d3490bbdc533d0d67f12855fd96dc6c}}, {{cite:23cc16d028317c2384ac99e47574ed7dab2c4202}}, {{cite:7c35d3c52e02f3e0e5d8fa7608b96e3b054ddbc6}}, {{cite:c52da77020e40e33741d08d8af1dd3487c09795d}}, {{cite:632cfa21e93fe988c1464540f2cf24064045cb81}}, {{cite:2ea72a2f62bf909ad377c7cd0f8183f1f7af62de}}, {{cite:62d519f39567973f52fcd66bd357495df70ee13e}}, {{cite:5dd4d43c0217ba877c1b3837f1f9918e02406dd4}}, {{cite:4c1afd538af8f59e30cc0ce380b3cf758891112f}}, {{cite:9653bd4ffa4cd9fab7e902f9a996fd3afc2672a8}}, {{cite:8278397e7c2c864fa1e249bdb4545a1f6764c972}}, {{cite:40ab0cc539abd9202f439209f8b6dacf9e14270d}}, {{cite:f2edc3327f5d687628d9e2dc163c3691b5696216}}, {{cite:1abbb5a62a8f98a2c303370a5e209d4e19070b0e}}, {{cite:302c99824d6f7f0183a1fd45bb84c80b4631b8a8}}, {{cite:771a72baebd5725815fcdc7bfec23ce2d2144b05}}, {{cite:a35084924790960bbaef2846214e3a25f7e2a2e1}}, {{cite:fa9a671897062f943a6bb8017793a3d511f9e464}}, {{cite:4a463184da3490b6089687bcf258143ae188dcf9}}, {{cite:a74bb7df5c1c0b087b3b77aad6afd13ecb05b5cf}}, {{cite:2b58ddc3ff965dc5fe4a54613b125ea759301b2c}}, {{cite:55bfe8ffa5f9167fee32f5abf9b870ad88563d15}}.Many of them analyze the ViT {{cite:df1a4741e3416e2d30569c6a0306e696090fd991}}, {{cite:eaedcfb4981fae7e7d601d7c22878e188c5533d4}}, {{cite:63e2e1dd47d8273cb2b1d28e0582e9143c98b8d5}}, {{cite:ba76f2915ae51e8554d5b36c7547badd71efb511}}, {{cite:ddec98e13d6ed23a5fa5e6f23852e856862182ef}}, {{cite:aa7962699d5abc6bb8b1db1ab2988eec2a4062cb}}, {{cite:22b3986ae7141357b11320a215a7b92e4218e0f7}}, {{cite:52bfe73fcf60088fa876239e580d580c41cdfc12}}, {{cite:26c4f47fef9f4bb1846853455da6aa8bfd409330}}, {{cite:80c4dc1f309a5a1ff1b25c7be8301f9c4773fffe}} and improve it via introducing locality to earlier layers {{cite:ddec98e13d6ed23a5fa5e6f23852e856862182ef}}, {{cite:fda538d3c589e1a5e041dd57007bad79915224cf}}, {{cite:ca1aed65e1b0cee181e84999130d3d06b8914349}}, {{cite:7f5ea525f27576d6daae9762c59ace4e14db056d}}, {{cite:3c7983e1202cae4771520d0011317aecb3907334}}, {{cite:f9e8863e5d426b41dd9c57192de16acbfd4cf16d}}, {{cite:9f07b621aac8bbbe17b12c9ed54bed64344b46b9}}. In particular, Raghu  {{cite:80c4dc1f309a5a1ff1b25c7be8301f9c4773fffe}} observe that the first few layers in ViTs focus on local information. Li  {{cite:52bfe73fcf60088fa876239e580d580c41cdfc12}} also demonstrate that the first few layers embed local details. Xiao  {{cite:aa7962699d5abc6bb8b1db1ab2988eec2a4062cb}} and Wang  {{cite:1dc1ff31da067a6a5ab8022c36e956711998e131}} find that introducing inductive bias, like convolution stem, can stabilize the training and improve the peak performance of ViTs. Similarly, Dai  {{cite:ddec98e13d6ed23a5fa5e6f23852e856862182ef}} marry convolution with ViTs, improving the model generalization ability. Swin Transformer {{cite:9f07b621aac8bbbe17b12c9ed54bed64344b46b9}}, as a milestone, also leverages local self-attention (LSA) to embed detailed information in high-resolution finer-level features. Despite these successes, several studies {{cite:22b3986ae7141357b11320a215a7b92e4218e0f7}}, {{cite:ddec98e13d6ed23a5fa5e6f23852e856862182ef}}, {{cite:fda538d3c589e1a5e041dd57007bad79915224cf}}, {{cite:e7daf6aa99157e98830b426d8b420bbb4dec911f}} observe that the performance of LSA is just on par with convolution in both upstream and downstream tasks {{cite:22b3986ae7141357b11320a215a7b92e4218e0f7}}. The reasons behind this phenomenon are not clear, and in-depth comparisons under the same conditions are valuable.", "Dynamic filters.Convolution and depth-wise convolution {{cite:aa613311546c908cc2c20af31f3906c365ef0e71}} has been widely used in CNNs {{cite:3f001228891260cab66a770af58b82fba683bf2e}}, {{cite:5355e3110919a0891ece04a0eb8ca23e2c4c9830}}, {{cite:73b8ca1e81354f670b3260ce22e36c7091fae8af}}, {{cite:657cc060b187a0f5cfa53553213a5b28d5cdb03c}}, {{cite:d46c468038c74e5a47ff452629f0056abba950bb}}, while their content-agnostic nature limits the model flexibility and capacity. To solve this problem, dynamic filters are proposed one after another. One kind of dynamic filter {{cite:f1618f7b61fab59ff241aaa379515b6c3f1287a6}}, {{cite:c947b12f9a5c1f611d857a3f7f6cb9eaae9f3f3f}}, {{cite:408cbc2e6eb81a036d13c9ffd11f42b498330f18}}, {{cite:81cae38e32e8c6582d5b01afb1c4a63bda82c871}} predicts coefficients to combine several expert filters which are then shared across all spatial pixels. Another kind of dynamic filter {{cite:e2c818f5075572b2c2ba57cfa0a92fda01d1ab7a}}, {{cite:dc921363d2e63d29badc31eea071857707216872}}, {{cite:0b12f2596b80cf981a30058a47e7471644248fd9}}, {{cite:0b2ce2b6fe30ea0fa5889ec502b742da87371ce3}}, {{cite:faca42a416148e54b55bec12d3736bf8d495eea2}}, {{cite:68575d2a480678aabdb12cdf433982d367b2d498}}, {{cite:b52054448b6a7a6cc9ea769b056740c07ecb2ab2}}, {{cite:fda538d3c589e1a5e041dd57007bad79915224cf}} generates spatial-specific filters. Specifically, the dynamic filter networks {{cite:e2c818f5075572b2c2ba57cfa0a92fda01d1ab7a}} use the separate network branches to predict a complete filter at each pixel. PAC {{cite:68575d2a480678aabdb12cdf433982d367b2d498}} uses a fixed Gaussian kernel on adapting features to modify the standard convolution filter at each pixel. DRConv {{cite:dc921363d2e63d29badc31eea071857707216872}} extends CondConv {{cite:c947b12f9a5c1f611d857a3f7f6cb9eaae9f3f3f}} to each pixel. CARAFE {{cite:0b12f2596b80cf981a30058a47e7471644248fd9}} and CARAFE++ {{cite:0b2ce2b6fe30ea0fa5889ec502b742da87371ce3}} are the dynamic layers for upsampling and downsampling, where a channel-shared 2D filter is predicted at each pixel. Similarly, Involution {{cite:faca42a416148e54b55bec12d3736bf8d495eea2}} applies the CARAFE-like structure to feature extraction. VOLO {{cite:fda538d3c589e1a5e041dd57007bad79915224cf}} introduces the Outlooker to embed local details.DDF {{cite:b52054448b6a7a6cc9ea769b056740c07ecb2ab2}} decouples dynamic filters to spatial and channel ones, reducing computational overhead while achieving promising results. In this work, we observe that dynamic filters, like DDF {{cite:b52054448b6a7a6cc9ea769b056740c07ecb2ab2}}, perform superior to LSA. Based on comparison and discussion, we empirically reveal the factors leading to such a phenomenon, and propose enhanced local self-attention (ELSA) to better embed local details." ]
[]
EIFFeL: Ensuring Integrity for Federated Learning
Federated learning (FL) enables clients to collaborate with a server to traina machine learning model. To ensure privacy, the server performs secureaggregation of updates from the clients. Unfortunately, this preventsverification of the well-formedness (integrity) of the updates as the updatesare masked. Consequently, malformed updates designed to poison the model can beinjected without detection. In this paper, we formalize the problem of ensuring\textit{both} update privacy and integrity in FL and present a new system,\textsf{EIFFeL}, that enables secure aggregation of \textit{verified} updates.\textsf{EIFFeL} is a general framework that can enforce \textit{arbitrary}integrity checks and remove malformed updates from the aggregate, withoutviolating privacy. Our empirical evaluation demonstrates the practicality of\textsf{EIFFeL}. For instance, with $100$ clients and $10\%$ poisoning,\textsf{EIFFeL} can train an MNIST classification model to the same accuracy asthat of a non-poisoned federated learner in just $2.4s$ per iteration.
[ "Secure Aggregation. Prior work has addressed the problem of (non-Byzantine) secure aggregation in FL {{cite:21c94ecaf4885b94ac7bf42959e4eb731be77c24}}, {{cite:3114cfa51feea08a84db5644e4905aa492c9b541}}, {{cite:9dd47fcd51223da0b3902ea88d834f0742d3333f}}, {{cite:7b4dbf301762f37891d140f10aca8e03729cd5b5}}. A popular approach is to use pairwise random masking to protect the local updates {{cite:21c94ecaf4885b94ac7bf42959e4eb731be77c24}}, {{cite:9dd47fcd51223da0b3902ea88d834f0742d3333f}}. Recent approaches have improved the communication overhead, by training in a smallerparameter space {{cite:a0804f79398a1e5d3d94ca002f0cf1a4e0307df4}}, autotuning the parameters {{cite:467a9748832948a3e76ed71ba8eb0f0469116a80}}, or via coding techniques {{cite:7b4dbf301762f37891d140f10aca8e03729cd5b5}}.", "Robust Machine Learning.A large number of studies have explored methods to make machine learners robust to Byzantine failures {{cite:606f72aed23a8c0ec513052a2d5bef8ca8f6514b}}, {{cite:aeef45fcbca8e4aaac79b5cdd0e1560b2f01403f}}, {{cite:444c93929d36af8838335c04edff86d5614e04b8}}.Many of these robust machine-learning methods require the learned to have full access to the training data or to fully control the training process {{cite:1185782336e1431f444743fbd1bbf7d65db8f2e4}}, {{cite:ebf596be59be5e5e2d3865fd994897bba736bda5}}, {{cite:4fbd48b68dac2134a0be8eae27363cd628f86588}}, {{cite:77a09e2b129d1f6ed49788f990cded0b749849ce}}, {{cite:d0e8c86b4420644f459fa8d8b1d0360e2e70915c}}, {{cite:14be8677c264bd44d5b54abe09e3861412a8dcea}} which is infeasible in FL.Another line of work has focused on the development of estimators that are inherently robust to Byzantine errors {{cite:bacc96945a9927662d0154eb6ed8c15fe1b52c59}}, {{cite:a5ff9df5f17789787d6f9ec89e3f639f953fee99}}, {{cite:59b171e3fcf4a60b57ba33330c57b7d2d4fe4d68}}, {{cite:76156b067441a9627d3cdc125a345fa287167e45}}, {{cite:7b720aed3242b9b7d48555c4a0441e08cdb4d3e5}}.In our work, we target a set of methods that provides robustness by checking per-client updates  {{cite:bacc96945a9927662d0154eb6ed8c15fe1b52c59}}, {{cite:645345c306607616225a86f3abf3acc23180fe39}}, {{cite:14393c0c06144151575d460ac0451abe85e08e95}}.", "Verifying Data Integrity in Secure Aggregation.Most similar to our work is RoFL {{cite:4eea19936cea6f901402d8ebbbae3e8fc9c948ad}}, which uses range proofs to check update integrity.There are three key differences between RoFL and EIFFeL: {{formula:e5777bd1-717a-499c-b59f-e3e45e878b01}} RoFL supports only range checks with {{formula:c56baffc-b426-419d-9a9f-2eb26021d51b}} or {{formula:75b77b48-b75f-42fe-b3e1-cf3de091559b}} norms. By contrast, EIFFeL is a general framework that supports arbitrary validation predicates. {{formula:cbb0cfc0-78be-424a-8eb1-57d4303419f4}} RoFL is susceptible to DoS attacks because it only detects malformed updates and aborts if it finds one. By contrast, EIFFeL is a SAVI protocol that detects and removes malformed updates in every round.{{formula:abc48c18-23ba-47f7-be35-a8ef3c036212}} RoFL assumes an honest-but-curious server, whereas EIFFeL considers a malicious threat model.BREA {{cite:f039deaaa51968e47f48c1d5486581335dfaf637}} also removes outlying updates but, unlike EIFFeL, it leaks pairwise distances between inputs.Alternative solutions {{cite:fcb6dae37e0a0fc554d1062225e0c734c2f9b3c9}}, {{cite:1dfceddd6d736868fc7662f29040dbc4df7ca3a0}} for distance-based Byzantine-robustaggregation uses two non-colluding servers in the semi-honest threat model, which is incompatible with centralized FL.Other work {{cite:55d494424075b06ece824c0ed4be9b2262efd1f2}} randomly clusters clients, reveals inputs from the clusters and then robustly aggregates them; but doing this requires small clusters, which affects input privacy.", "Secure Aggregation. Prior work has addressed the problem of (non-Byzantine) secure aggregation in FL {{cite:21c94ecaf4885b94ac7bf42959e4eb731be77c24}}, {{cite:3114cfa51feea08a84db5644e4905aa492c9b541}}, {{cite:9dd47fcd51223da0b3902ea88d834f0742d3333f}}, {{cite:7b4dbf301762f37891d140f10aca8e03729cd5b5}}. A popular approach is to use pairwise random masking to protect the local updates {{cite:21c94ecaf4885b94ac7bf42959e4eb731be77c24}}, {{cite:9dd47fcd51223da0b3902ea88d834f0742d3333f}}. Recent approaches have improved the communication overhead, by training in a smallerparameter space {{cite:a0804f79398a1e5d3d94ca002f0cf1a4e0307df4}}, autotuning the parameters {{cite:467a9748832948a3e76ed71ba8eb0f0469116a80}}, or via coding techniques {{cite:7b4dbf301762f37891d140f10aca8e03729cd5b5}}.", "Robust Machine Learning.A large number of studies have explored methods to make machine learners robust to Byzantine failures {{cite:606f72aed23a8c0ec513052a2d5bef8ca8f6514b}}, {{cite:aeef45fcbca8e4aaac79b5cdd0e1560b2f01403f}}, {{cite:444c93929d36af8838335c04edff86d5614e04b8}}.Many of these robust machine-learning methods require the learned to have full access to the training data or to fully control the training process {{cite:1185782336e1431f444743fbd1bbf7d65db8f2e4}}, {{cite:ebf596be59be5e5e2d3865fd994897bba736bda5}}, {{cite:4fbd48b68dac2134a0be8eae27363cd628f86588}}, {{cite:77a09e2b129d1f6ed49788f990cded0b749849ce}}, {{cite:d0e8c86b4420644f459fa8d8b1d0360e2e70915c}}, {{cite:14be8677c264bd44d5b54abe09e3861412a8dcea}} which is infeasible in FL.Another line of work has focused on the development of estimators that are inherently robust to Byzantine errors {{cite:bacc96945a9927662d0154eb6ed8c15fe1b52c59}}, {{cite:a5ff9df5f17789787d6f9ec89e3f639f953fee99}}, {{cite:59b171e3fcf4a60b57ba33330c57b7d2d4fe4d68}}, {{cite:76156b067441a9627d3cdc125a345fa287167e45}}, {{cite:7b720aed3242b9b7d48555c4a0441e08cdb4d3e5}}.In our work, we target a set of methods that provides robustness by checking per-client updates  {{cite:bacc96945a9927662d0154eb6ed8c15fe1b52c59}}, {{cite:645345c306607616225a86f3abf3acc23180fe39}}, {{cite:14393c0c06144151575d460ac0451abe85e08e95}}.", "Verifying Data Integrity in Secure Aggregation.Most similar to our work is RoFL {{cite:4eea19936cea6f901402d8ebbbae3e8fc9c948ad}}, which uses range proofs to check update integrity.There are three key differences between RoFL and EIFFeL: {{formula:e5777bd1-717a-499c-b59f-e3e45e878b01}} RoFL supports only range checks with {{formula:c56baffc-b426-419d-9a9f-2eb26021d51b}} or {{formula:75b77b48-b75f-42fe-b3e1-cf3de091559b}} norms. By contrast, EIFFeL is a general framework that supports arbitrary validation predicates. {{formula:cbb0cfc0-78be-424a-8eb1-57d4303419f4}} RoFL is susceptible to DoS attacks because it only detects malformed updates and aborts if it finds one. By contrast, EIFFeL is a SAVI protocol that detects and removes malformed updates in every round.{{formula:abc48c18-23ba-47f7-be35-a8ef3c036212}} RoFL assumes an honest-but-curious server, whereas EIFFeL considers a malicious threat model.BREA {{cite:f039deaaa51968e47f48c1d5486581335dfaf637}} also removes outlying updates but, unlike EIFFeL, it leaks pairwise distances between inputs.Alternative solutions {{cite:fcb6dae37e0a0fc554d1062225e0c734c2f9b3c9}}, {{cite:1dfceddd6d736868fc7662f29040dbc4df7ca3a0}} for distance-based Byzantine-robustaggregation uses two non-colluding servers in the semi-honest threat model, which is incompatible with centralized FL.Other work {{cite:55d494424075b06ece824c0ed4be9b2262efd1f2}} randomly clusters clients, reveals inputs from the clusters and then robustly aggregates them; but doing this requires small clusters, which affects input privacy." ]
[]
SLIP: Self-supervision meets Language-Image Pre-training
Recent work has shown that self-supervised pre-training leads to improvementsover supervised learning on challenging visual recognition tasks. CLIP, anexciting new approach to learning with language supervision, demonstratespromising performance on a wide variety of benchmarks. In this work, we explorewhether self-supervised learning can aid in the use of language supervision forvisual representation learning. We introduce SLIP, a multi-task learningframework for combining self-supervised learning and CLIP pre-training. Afterpre-training with Vision Transformers, we thoroughly evaluate representationquality and compare performance to both CLIP and self-supervised learning underthree distinct settings: zero-shot transfer, linear classification, andend-to-end finetuning. Across ImageNet and a battery of additional datasets, wefind that SLIP improves accuracy by a large margin. We validate our resultsfurther with experiments on different model sizes, training schedules, andpre-training datasets. Our findings show that SLIP enjoys the best of bothworlds: better performance than self-supervision (+8.1% linear accuracy) andlanguage supervision (+5.2% zero-shot accuracy).
[ "Language supervision.Early work explored learning visual representations from image captions, even before the advent of deep learning {{cite:42f2054d645d103f4313106d29fd3b81e71e98a3}}.DeViSE {{cite:4f066bb22d1c94b0d6ed4b569aac50124a5020a4}} jointly embeds images and textual class labels within a shared semantic space, allowing the model to recognize classes that were not explicitly trained for.Initial attempts at leveraging the YFCC dataset for representation learning included predicting the bag-of-words representation {{cite:c7c75ab48ce69914245f71f61171b389fdd7d228}} or n-gram occurrence {{cite:78521ee15d9d7c41d2638d5cf3c3ec2b28cda80a}} from images.ICMLM {{cite:19a54f2c3b957f31e26a27bff76243b2b5b64d21}} and VirTex {{cite:7a6ce62fb2c5d5d9a5146c47e3330c32fc2fdb7d}} showed that language supervision on COCO Captions produced useful visual representations.Prior to CLIP, Multimodal Contrastive Training {{cite:145a95e03365f098ada08eef104f9568f0c1b9b7}} adds contrastive image-image and language-image losses to VirTex which further improve performance.CLIP {{cite:b3e733324f5bab2cdc9e5d91866a5019d9c1f38b}} quickly garnered significant attention for its simplicity, scale, and strong results.Developed concurrently, ALIGN {{cite:2a545c820649d17bc38fee5087b6f96f6f9fc96b}}, uses a larger but noisier uncurated dataset and shows similar results.", "Self-supervised learning.Earlier self-supervised learning methods have shown subpar scaling with dataset size {{cite:a84a2a5c33d9257c18465cc8653baf26bdaea67e}}. Contrastive learning methods ushered in rapid progress {{cite:2e218e5a8f8b035f55c84cdfbf59cb421eff6a6e}}, {{cite:da09084b61197e8e9350f6fd546c27d831a7538c}}, {{cite:7631897bd70c76c9ba4793d227effd1cc34bdf75}}, {{cite:461a5fe9a6106610bc9f64b69140785c3ec3b071}} due to their simplicity and effectiveness. Recent methods for self-supervised learning also propose a variety of alternatives to the contrastive objective such as self-distillation {{cite:72a9eb8f35c75041341971d54162a741da7de96a}}, {{cite:7443325dcdeb59f6aa5deab0ef5566d9dd9f0692}}, or input reconstruction {{cite:e9b36dd65a850d0ec7f5789e4bc0aa60e7e6a66e}}, {{cite:400f1e21688ac7805cdeee9f5b0a9d34cd428448}}.", "Multi-modal multi-task learning.MURAL {{cite:acca98e01b2759574acc657adb43b1f65084c69d}} extends ALIGN to the multi-lingual setting and introduces a cross-lingual objective to improve multi-lingual image and text retrieval.Concurrently to this work, DeCLIP {{cite:0a45e987e353abef79f6494a7e4ab4cde0da93e2}} adds several additional training objectives and more data collected in-house to CLIP in order to improve data efficiency." ]
[]
Towards Disturbance-Free Visual Mobile Manipulation
Deep reinforcement learning has shown promising results on an abundance ofrobotic tasks in simulation, including visual navigation and manipulation.Prior work generally aims to build embodied agents that solve their assignedtasks as quickly as possible, while largely ignoring the problems caused bycollision with objects during interaction. This lack of prioritization isunderstandable: there is no inherent cost in breaking virtual objects. As aresult, "well-trained" agents frequently collide with objects before achievingtheir primary goals, a behavior that would be catastrophic in the real world.In this paper, we study the problem of training agents to complete the task ofvisual mobile manipulation in the ManipulaTHOR environment while avoidingunnecessary collision (disturbance) with objects. We formulate disturbanceavoidance as a penalty term in the reward function, but find that directlytraining with such penalized rewards often results in agents being unable toescape poor local optima. Instead, we propose a two-stage training curriculumwhere an agent is first allowed to freely explore and build basic competencieswithout penalization, after which a disturbance penalty is introduced to refinethe agent's behavior. Results on testing scenes show that our curriculum notonly avoids these poor local optima, but also leads to 10% absolute gains insuccess rate without disturbance, compared to our state-of-the-art baselines.Moreover, our curriculum is significantly more performant than a safe RLalgorithm that casts collision avoidance as a constraint. Finally, we propose anovel disturbance-prediction auxiliary task that accelerates learning.
[ "Visual Navigation and Manipulation.A long history of work exists for both (stationary) tabletop manipulation using fixed-based arms {{cite:7e35dc4a615cb225d6f23e667f69cb83137eed34}}, {{cite:5b1024532f1fc2f0a9ef11abc34f6d540189f3dd}}, {{cite:55d9f5edcf740e175d46b5bf543e29e4e7fee0c0}}, pure embodied navigation {{cite:39f1c702267d06c817b3f045e5a5f2c278e2ecf2}}, {{cite:ba83787c2ae4e56c300dffcb8ad0b89ff9a52b38}},and mobile manipulation {{cite:60f712daa6d09d7d62dcbc3f26e4695a7e1dd69e}}, {{cite:a8cef02637f8582f86ce0eb0ad0286735adfbe3d}}, {{cite:f3d0b610bae2342bd38fd1dc9879cf9b20d43e3e}}, {{cite:0670aeb08b226fa800ff8b2c72749a534a949b07}}, {{cite:affc8dbba2d2cd9017c18fe0c9be19560b243bac}}, {{cite:7dbf6e8338a3b06fd61e329d8c3e8ea0b6f7aecf}}, {{cite:b3f588ceb1144ebfaf4f74f9822d23de7c1537b1}}.Much of this prior work, especially traditional methods for manipulation {{cite:fbcd087fdaa1c43af42c7e8b0c8b782459277b66}}, {{cite:2da8f8e64c4f9ccb24a953281339f6c815e23030}}, {{cite:add2f1e177e3d38b083a18d0df8fa856e7468db5}}, {{cite:e723cca4f622a2b01d393d60253e5a458a7ae26a}}, {{cite:831c78400ec11889d987218e1958c20316a53af1}}, {{cite:17a15236061ab119d4859259187da584fba2d0bd}}, {{cite:2537c7f708ebd5aac625aecda69d6a691d7d2d0b}}, {{cite:08aa46f67d718f9e14c3b741158e12b6f55d78d9}}, {{cite:23639a3b1ffe674115ca3e39c91664ec935ab25a}}, {{cite:9ce59b1c1ed0ebd23638cab3e7cf8baf1f5c898a}}, {{cite:22c40b159cada78500c124ae4f6fa6257348cbaa}}, requires ground-truth knowledge of objects and the environment (such as their geometry) and becomes computationally expensive in high-dimensional settings.Data-driven methods relax these assumptions and enable agents to act from visual inputs.We summarized the data-driven related work in Table REF from several perspectives.", "Our work focuses on ArmPointNav {{cite:769e8c09f4228e2da181a438926216d548232047}}, a visual mobile manipulation task where agents must navigate in the ManipulaTHOR environment to find an object, pick it up using an attached arm, and then bring the object to a new location. The ManipulaTHOR environment consists of a set of visually complex scenes, supports navigation with a mobile robot, and allows for object manipulation with a 6-DOF arm through clutter.ArmPointNav follows the more general POMDP framework that only has ego-centric depth observations and 3D goal sensors without other state information.Our method is built upon a recurrent model-free RL baseline provided by ManipulaTHOR, and focuses on disturbance avoidance discussed below.", "Collision/Disturbance Avoidance.In safety-critical domains, collision avoidance is of extreme importance.Classic methods in safe motion planning {{cite:c92f5e96395f16602b417b9e9f21d92f2da99870}}, {{cite:4c7e9ca894d93db711142a11e461c2dd703410bd}}, {{cite:42a3096b09e8f7512d5a7a08e92ecb1e9c4bbd62}}, {{cite:6ccbd296435cdae5b6c2a17eb9526281c75ce495}}, {{cite:058f1c76c0cff57f27143fd1dff47dfdfa939634}} and path planning {{cite:e723cca4f622a2b01d393d60253e5a458a7ae26a}}, {{cite:8c73cda68e0c61a4a976b8f8f89f94da63caaf44}}, {{cite:d8f1624efb3ad1cbeafc7fd4a5aef27a9dc8a3af}}, although with safety guarantees, require privileged information of obstacles to avoid collision and are hard to scale to partially-observable visually complex scenarios.Data-driven methods learn to avoid collision from data with less privileged information, which are summarized in the “collision\" column in Table REF .", "DRL methods can learn collision avoidance from interaction with environments, further divided into model-free and model-based approaches.Model-free methods simply introduce collision penalties in the reward function, in the form of constants when facing collision {{cite:d8e9d278c90cc58552b257b13e0f799435a96645}}, {{cite:fbba7a69a5d95a3f8d8d123d8434619a76f72e46}}, {{cite:2f0ae3fb8fd402820c5366a9449ee28d892f650d}}, {{cite:42559fe19cbaf46ae05745d07e8f2185b326954d}}, {{cite:63a18d7eb686cf7800fe7a498c2615fcac7204fb}} or being proportional to the distances to the nearest obstacles {{cite:3fb3bfdf50bc15d0cd8ccd071e8d3fcaf512ce0a}}, {{cite:7eb6e78369d967ceada6d2b1141c7420e9ecded5}}, {{cite:afbf1a1c1b0a6081be6f4f084ca02d8a3e422976}}, {{cite:94306f958150ff0c55c082925b68296b529764ad}}.Model-based methods {{cite:375fa9db9c8b624e53d5bd58b3ac5be7873a8583}}, {{cite:0034cf4ad8a9cc6099900357cfb64278a822b7db}}, {{cite:94306f958150ff0c55c082925b68296b529764ad}} explicitly learn a collision prediction model, and use it for policy search.Our work focuses on disturbance, viewed as visible collision, because disturbance moves an object by some distance.Our method combines both model-free (a disturbance penalty) and model-based (disturbance prediction) approaches in RL. Moreover, unlike viewing avoiding collision as the main objective in an MDP {{cite:375fa9db9c8b624e53d5bd58b3ac5be7873a8583}}, {{cite:0034cf4ad8a9cc6099900357cfb64278a822b7db}}, {{cite:94306f958150ff0c55c082925b68296b529764ad}}, we consider avoiding disturbance as an auxiliary task in a POMDP, assisting the main task in ArmPointNav.", "Auxiliary Tasks in Visual RL. Auxiliary tasks, co-trained with the main task (maximizing the total rewards) on the shared model weights, are shown to have the promise to improve sample efficiency and asymptotic performance in visual RL {{cite:39f1c702267d06c817b3f045e5a5f2c278e2ecf2}}, {{cite:e56eb47012286ad50db3314acdd296bf352b2390}}.Supervised auxiliary tasks provide extra information to the policy via external signals, such as depth maps {{cite:39f1c702267d06c817b3f045e5a5f2c278e2ecf2}}, {{cite:88ca5c65d71684e348c7071a4cafd68695800637}} and game internal states {{cite:b29002b835d4383588693d1860f4c4cc71013686}},while self-supervised/unsupervised auxiliary tasks use the existing information as signals, such as auto-encoders {{cite:8f97e5d7747d99868a99126ba0c5e704bc6b0ce9}}, {{cite:bf6987b90284805ef74ff768715918c4a119cf48}}, {{cite:f4f5a004a4ef2976fbdb419ef1697bc5d412cdce}}, forward {{cite:d96a7dc2311e796811158e0695e19b289c65e406}} and inverse dynamics {{cite:d4f9a4b2518ade62d7eaf06eadb817a05f68bca1}}, reward prediction {{cite:e56eb47012286ad50db3314acdd296bf352b2390}}, and contrastive learning {{cite:e07397771ce26fb7a10fa379c74c3a33d2590555}}, {{cite:25bccea4477937bc780136fbf2af5c1389326f5c}}, {{cite:d905d136b75f4a026c6a3654520387bcbcf885a1}}, {{cite:59ddaa67fb1bb052744a26c980d46d448a75b91b}}.However, most of the prior work only uses the auxiliary tasks for efficient training, not for evaluation.{{cite:826d4cba065d81c7dd0e2f8b0153047bb75bf052}} re-trains the self-supervised auxiliary task during evaluation so that the policy can adapt to new environments.", "Our work proposes a supervised auxiliary task that predicts the disturbance, which is both useful in training and evaluation. During training, the auxiliary task can significantly improve the learning performance. During evaluation, the prediction results of the auxiliary task can reweight the action distribution for safety concerns. Since it is not self-supervised, it cannot be re-trained during evaluation." ]
[]
Distilling the Knowledge of Romanian BERTs Using Multiple Teachers
Running large-scale pre-trained language models in computationallyconstrained environments remains a challenging problem yet to be addressed,while transfer learning from these models has become prevalent in NaturalLanguage Processing tasks. Several solutions, including knowledge distillation,network quantization, or network pruning have been previously proposed;however, these approaches focus mostly on the English language, thus wideningthe gap when considering low-resource languages. In this work, we introducethree light and fast versions of distilled BERT models for the Romanianlanguage: Distil-BERT-base-ro, Distil-RoBERT-base, andDistilMulti-BERT-base-ro. The first two models resulted from the individualdistillation of knowledge from two base versions of Romanian BERTs available inliterature, while the last one was obtained by distilling their ensemble. Toour knowledge, this is the first attempt to create publicly available Romaniandistilled BERT models, which were thoroughly evaluated on five tasks:part-of-speech tagging, named entity recognition, sentiment analysis, semantictextual similarity, and dialect identification. Our experimental results arguethat the three distilled models offer performance comparable to their teachers,while being twice as fast on a GPU and ~35% smaller. In addition, we furthertest the similarity between the predictions of our students versus theirteachers by measuring their label and probability loyalty, together withregression loyalty - a new metric introduced in this work.
[ "Knowledge Distillation {{cite:8c093de4e5750a3ccdf7cd3f0ea082de651ea360}} is a compression method in which a smaller framework, the student model, is trained to reduce the loss {{formula:83aca099-03c9-44eb-9dca-15ce2ee3f515}} over the soft probabilities predicted by a larger model (i.e., the teacher):{{formula:2761a370-e474-49cb-bcac-b9fdbbb8c63c}} ", "where {{formula:a6acb1b9-8af4-44a1-ad32-5a6806ed5a2a}} and {{formula:35417515-1fe9-4598-a520-3e3a3c1a94b6}} are the probabilities predicted by the teacher and the student, respectively.", "The technique usually uses a temperature parameter {{formula:4d8d5a0d-260e-4552-bc70-a853abe58e04}} in the softmax function that controls the smoothness of the distribution given by probabilities {{formula:1626ad48-024d-4e73-9e24-4d92bae4da30}} , known as softmax-temperature:{{formula:df3a22b9-1776-436a-8150-ebb61461decf}} ", "where {{formula:7e71de2f-3bab-431a-98f1-460b2fcfae16}} is the logit corresponding the probability at index {{formula:18b3987a-72e8-4f7d-afc8-4b4a92aa2fb9}} .", "sanh2019distilbert introduced the first distilled Transformer-based language model for English, where the authors created a model that was 1.6x smaller, 2.5x faster, and retained 97% of the performance of the original BERT {{cite:329f2c73f6efc46621a24cd4db67327fcf26a8df}} on the General Language Understanding Evaluation (GLUE) benchmark {{cite:535a25a8f3fc6644a4e93dbd9ef5dd1afb9849ef}}. Soon after, TinyBERT {{cite:26ca22da5bddd6b0c4a4ead5680a5fac57144045}} was introduced and it reduced the size of BERT by 7.5x, improved the inference time by 9.4x, while maintained 96.8% of the performance of the original model on GLUE; TinyBERT performed distillation at both the pre-training and fine-tuning stages. Also, sun2020mobilebert introduced MobileBERT, a slightly heavier model compared to TinyBERT - 4.3x smaller and 5.5x faster than the original BERT, which managed to retain most of the its knowledge by achieving a GLUE score of 77.7 (0.6 lower than BERT).", "One of the first attempts to distill the knowledge of pre-trained language models for languages other than English was BERTino {{cite:ec7e23c915b244da19b11927dc7760d748e2423b}} for Italian. The distillation corpus was composed of 1.8 billion tokens and bert-base-italian-xxl-uncasedhttps://huggingface.co/dbmdz/bert-base-italian-xxl-uncased was used as the teacher model. The resulted model retained most of the knowledge from the original model, as its performance was below with values ranging from 0.29% to 5.15% on the evaluated tasks.", "Additionally, a distilled version of Multilingual BERT (mBERT) - LightMBERT - {{cite:9f1cb3b5e3f15a7a37f303f5da6a0476abfa73a5}} was developed to reduce the discrepancies between languages by transferring the cross-lingual capabilities of the original model into a smaller one. The authors first initialized the student layers with the bottom layers of the teacher - mBERT. Then, they froze the embedding layer, and performed distillation only on the other layers. This simple process allowed them to maintain the cross-lingual generalization capabilities of the original model.", "Nevertheless, the knowledge transferred from a single teacher trough distillation may be limited and even biased, resulting in a student model of low quality. As such, wu2021one proposed a knowledge distillation approach from several teachers in both the pre-training and fine-tuning stages. Their experimental results showed a significant improvement over single teacher models like DistilBERT or TinyBERT, and even over other models used as teachers." ]
[]
Robust Secretary and Prophet Algorithms for Packing Integer Programs
We study the problem of solving Packing Integer Programs (PIPs) in the onlinesetting, where columns in $[0,1]^d$ of the constraint matrix are revealedsequentially, and the goal is to pick a subset of the columns that sum to atmost $B$ in each coordinate while maximizing the objective. Excellent resultsare known in the secretary setting, where the columns are adversarially chosen,but presented in a uniformly random order. However, these existing algorithmsare susceptible to adversarial attacks: they try to "learn" characteristics ofa good solution, but tend to over-fit to the model, and hence a small number ofadversarial corruptions can cause the algorithm to fail. In this paper, we give the first robust algorithms for Packing IntegerPrograms, specifically in the recently proposed Byzantine Secretary framework.Our techniques are based on a two-level use of online learning, to robustlylearn an approximation to the optimal value, and then to use this robustestimate to pick a good solution. These techniques are general and we use themto design robust algorithms for PIPs in the prophet model as well, specificallyin the Prophet-with-Augmentations framework. We also improve known results inthe Byzantine Secretary framework: we make the non-constructive resultsalgorithmic and improve the existing bounds for single-item and matroidconstraints.
[ "See{{cite:b65c08093771f520603ffd896cc682cdfe871e65}} for general works on random-order online problems.In particular, generalizations to matroid and Packing LPs in stochastic models have been extensively studied, e.g., see {{cite:439c1fb111db689e205bb81f6703d44aa2a7f1aa}}, {{cite:d982f123e5463b2eaae2eff40a685761eaa24cd1}}, {{cite:6915f52af54efd8dfa04ef7b0cc896c37063da52}} for matroids and {{cite:319ec2f3390e772519817354217efba6d5145602}}, {{cite:49cff763050673bda1ae30f1636bb8d60b17f602}}, {{cite:fdb220828e18f19b4e23e5db10cc27dc6846a337}} and references therein for packing.In the last two decades, there is a long line of work extendingthe classical single-item 12-approximation prophet inequality {{cite:8e1f4b615094514d3d7cfaba1c31e24f4981ffea}}, {{cite:92e9ffe4d4f37d1433b3b69ae47c67c0fff1d65b}} to packing constraints. In particular, see {{cite:47b0ee8669137dc4d1b851746e6be1f18aa28a47}} for matroids and {{cite:b51749b1165d1666f1b1fd178d4c53f1631065c7}}, {{cite:6a5abd7215e04af8f141d68eb5220594e85c863b}} for arbitrary packing constraints.For applications of prophet inequalities to pricing mechanisms and online algorithms, we suggest the tutorial {{cite:e0615e7c5fa62ed25b7725f2b5c84c1272c14ed8}} and the survey {{cite:698f81535d4c5b08fa35784f9cf98bd41f789916}}.", "The above online algorithms for secretary and prophet models relyheavily on the stochastic assumption, and are susceptible to evenslight worst-case corruptions. We believe that the robust algorithmsin this paper are interesting in their own right. They bridge the gapbetween the (optimistic) stochastic and (pessimistic) adversarialmodels, which has been a topic of significant interest in both onlinealgorithms {{cite:01e1cf1234c7260e3908968e416191c4b1f96c02}}, {{cite:d29b95fe9c1617a45a3564e9e9f946ca9499cbc8}}, {{cite:124420b51ef7f2f39de7c391b0c6620230ab3500}}, {{cite:2005ab138139db49b7b5da5f1a288895b36ae1b8}}, {{cite:e20c056f79d488709a6f0a677cd4f1012fc28e2c}}, {{cite:0700f7f52ad3f33938281d24732a76c1310aaf78}}, {{cite:997f3d292770db3837a811624378ad2b42f43053}}, {{cite:5f77163aeb2b26f23e7ac01a9eed7c0158643c22}}, {{cite:1088a5a5e831527ba578785c5231c017289f1d7c}}and online learning (see {{cite:9366c978c4a280514b793bb49dc4ed777fe7c4f1}}, {{cite:71d218f8406c578bda62bfb288757993ca4990c0}} andreferences within).", "The recent paper {{cite:1088a5a5e831527ba578785c5231c017289f1d7c}} considers a Byzantine-type model with adversarial and stochastic items, and studies Online Convex Optimization and Welfare Maximization problems. A major difference from our work is that both of these problems are unconstrained. In {{cite:997f3d292770db3837a811624378ad2b42f43053}}, the authors consider the Knapsack Secretary problem (i.e., PIP's with a single constraint) in a similar Byzantine model but with the additional assumption that the adversarial items come in bursts. They obtain a {{formula:9d380867-33ac-4433-8085-27f66ae93608}} -approximation when {{formula:50c204dc-485b-408b-827d-6e366bdde47a}} and there are at most {{formula:ce570847-f8cd-47dc-a79e-62a8de66584b}} adversarial items in bursts of size {{formula:ef6a766e-8059-4d4b-a421-ffa059461c11}} .Finally, {{cite:5f77163aeb2b26f23e7ac01a9eed7c0158643c22}} consider streaming problems (i.e. the algorithm has limited memory) in a similar Byzantine model, and design algorithms for max-matching and submodular maximization." ]
[]
Multi-initialization Optimization Network for Accurate 3D Human Pose and Shape Estimation
3D human pose and shape recovery from a monocular RGB image is a challengingtask. Existing learning based methods highly depend on weak supervisionsignals, e.g. 2D and 3D joint location, due to the lack of in-the-wild paired3D supervision. However, considering the 2D-to-3D ambiguities existed in theseweak supervision labels, the network is easy to get stuck in local optima whentrained with such labels. In this paper, we reduce the ambituity by optimizingmultiple initializations. Specifically, we propose a three-stage frameworknamed Multi-Initialization Optimization Network (MION). In the first stage, westrategically select different coarse 3D reconstruction candidates which arecompatible with the 2D keypoints of input sample. Each coarse reconstructioncan be regarded as an initialization leads to one optimization branch. In thesecond stage, we design a mesh refinement transformer (MRT) to respectivelyrefine each coarse reconstruction result via a self-attention mechanism.Finally, a Consistency Estimation Network (CEN) is proposed to find the bestresult from mutiple candidates by evaluating if the visual evidence in RGBimage matches a given 3D reconstruction. Experiments demonstrate that ourMulti-Initialization Optimization Network outperforms existing 3D mesh basedmethods on multiple public benchmarks.
[ "Optimization based methods. With the developement of parametric 3D human body model, such as SCAPE {{cite:56de29b0cf6cd89057949043e1918064bc7701ee}}, SMPL {{cite:d04e5384a3f1f7ebe13858a7eaab7c639052b219}}, optimization based 3Dhuman reconstruction method becomes an important branch in the research community. This kind of method infers 3D reconstruction byfitting a parametric model to match the given 2D observation. Early optimization methods {{cite:002a8b2d31411e953be7a82330b0cf56e5ada2c4}}, {{cite:ca72be21ebe06e7331960bef9dbf2bbdfb221276}}fit the human body model by the manually generated keypoints and silhouettes labels. These methods rely on manualintervention and generalize badly to images in the wild. Federica et al. {{cite:4227359dc9484471e2e6d70522fcc7c004eb23ea}} proposefirst automatic 3d human modelreconstruction method SMPLify which fits SMPL model to the 2D keypoints predicted by CNN detector {{cite:4aea08367213c8a14d789a5fea52444a415e1ec1}}.Meanwhile, objection function contains different regularization terms to ensure the optimization can produce a plausible result.In order to further improve the performance, more supervision information are incorporated into the optimization target, such as silhouette {{cite:f423041d81b4f65696fa20d28b8a970ccaab712a}}, scene constrains {{cite:d1dfc5d39a08134270b9baf383e412a7b4cbf2f6}} and multi-view {{cite:8aa8f0f5527542df291edd6ce810dc37e1a0787a}}.", "Generally, these optimization based methods are sensitive to the choice of initialization and tends to have a slow optimization speed.Meanwhile, the optimization process only converges to one local optimal result by the 2D observation input without appearence information.Thus it suffers from the problem of label ambiguities.", "Learning based methods. Another representative method is learning base reconstruction method, which learns a human model parameter regressor by a data-driven way.Because of the lack of in-the-wild 3D reconstruction paired training data. Existing methods focus on the weak supervision way to solve thisissue. HMR {{cite:ad13282184c2c1b0cabc6a0d5c6d8fb28533d6d0}} directly regresses SMPL parameters from images by a CNN andadds iterative regression to further improve the accuracy.It also proposes an adversarial prior in case the reconstruction is not realistic. SPIN {{cite:ecee11a57e95f2efa1a45620b0e89ef3aa147c1b}} incorporates aoptimization into the network learning process, where the predicted parameter is refined by a optimization process to furthersupervise the network. These two methods both apply 2D and 3D keypoints as weak supervision signal.Inspired by the dense correspondence representation used in DensePose {{cite:cc8ab4756f82c6d65029fceefe7307651f661988}}, variouslearning based methods {{cite:8283fce1a7d6b6ed240a50b18ef8fc3092651444}}, {{cite:9a557482511f82d5202b4e2cdf26e3ce8f081edd}} regard IUV map as intermediaterepresentation or weak supervision label for improving the regression CNN.On the other hand, in order to remove the limitation of SMPL parameter space, many learning based methods do not rely on the parametricmodel and directly regress the coordinates of each vertices on the mesh. BodyNet {{cite:db6bf5cdcde8dacc43faac1169c9764bee8e4e67}} regresses avolumetric representation of 3D human by a Voxel-CNN. Densebody {{cite:63ef3ca4b454410a8b927566d0927a33dfd4a5df}} and DaNet {{cite:8dbb1b249897c16f7382b1f88e8c82b2303e5201}} use a UV positionmap to represent 3D human body.", "All the aforementioned learning based methods rely on weak supervision label during tranining stage. It is flawed in that the labelwith ambiguites cannot always lead the network to predict the real reconstruction. In this work, with the same weak supervision labels,we propose a multi-path optimization based reconstruction framework to reduce the possibility of getting into local optimal.In order to deal with the occlusion cases with ambiguites, Biggs et al. {{cite:3e87a6845cd2895aff4749c78eeeaf403599382a}} also proposes to predict a candidate set which contains different possible reconstruction results. However, their network is only trained on the single Human3.6m dataset {{cite:a3496d7c9c97be731eb9222fe4778d0d46007c66}}where each sample already has 3D reconstruction ground-truth. Thus it still cannot solve the problem raised by the weak label.", "Synthetic data. Since it is diffcult to collect in-the-wild samples with 3D ground-truth, synthetic data plays an important role in 3D human pose and shapeestimation task. Pavlakos et al. {{cite:2770bb62c18be0aca1b379a5079cc2112e89e6f8}} adopt joint heatmap and silhouette as intermediate representation and designtwo decoders to respectively predict the pose and shape parameter from the above two representations. Without introducing appearanceinformation, the decoders can be trained by synthetic data. Xu et al. {{cite:33b28822764c7bb915568b83c3069eef9d95680c}} propose a network to decode human body froma synthetic IUV map. Although the above methods benefit from the abundant synthetic training data, the inference process fromweak label to 3D ground-truth is an ambiguity task which cannot be solved by even human.", "Existing synthetic data based methods usually ignore the appearance information. Different from them, we utilize synthetic data to helpthe network discriminate if the visual evidence in RGB image matches a given 3D reconstruction, which can be used to select the bestresult from multiple candidates.", "Human structure dependence. Human body structure in natural world has a strong prior, which builds the dependencies between different parts of the whole human body.Some existing methods explict model such dependencies in their learning framework. CMR {{cite:34cabb25e97ff11eb3b9758fa3cc6021d7aa0efa}} apply aGraph-CNN {{cite:58c1a06871a49201fd36174efd008f59fe4c15fb}} to model the interactions between different vertices in the inference framework.METRO {{cite:88c2a7f68ed3583355967f2f417e83b355da73e4}} replaces Graph-CNN with a Transformer encoder {{cite:f3df65d355aa305848c9fed835303a2ef25dcc39}} to model the interactions.However the query in its Transformer only contains the global feature of the input image and abandons detailed local information.In this work, we apply a full encoder-decoder Transformer structure which maintains the local image appearance information to refine the bodystructure." ]
[]
Backhaul-Aware Drone Base Station Placement and Resource Management for FSO based Drone Assisted Mobile Networks
In drone assisted mobile networks, drones mounted small cell base stations(DBSs) are responsively and flexibly deployed over any Places of Interest(PoI), such as sporadic hotspots and disaster-struck areas, where the existingmobile network infrastructure is unable to provide wireless coverage. Here, aDBS is a relay node to relay traffic between a nearby macro base station (MBS)and the users. In addition, Free-space optics (FSO) is applied as thebackhauling solution to significantly increase the capacity of the backhaullink between an MBS and a DBS in a drone assisted mobile network. Most of theexisting DBS placement solutions assume the FSO based backhaul link providessufficient link capacity, which may not be true, especially when a DBS isplaced far away from an MBS (e.g., > 10 km in disaster-struck areas) or in abad weather condition. In this paper, we formulate a problem to jointlyoptimize bandwidth allocation and DBS placement by considering the FSO basedbackhaul link capacity constraint. A Backhaul awaRe bandwidth allOcAtion andDBS placement (BROAD) algorithm is designed to efficiently solve the problem,and the performance of the algorithm is demonstrated via extensive simulations.
[ "Researchers have shown an increased interest in resource management and DBS placement in drone assisted mobile networks. Al-Hourani et al. {{cite:f8584ee8a25a2e313391e3ab1d44629004eaf30a}} provided a probabilistic LoS pathloss model between ground users and a DBS, and designed a method to optimize the altitude of the DBS to maximize the size of the DBS's coverage area. Alzenad et al. {{cite:19869e37700cb2bbc97454d8113afeae5d87e4e0}} designed a 3D DBS placement algorithm to maximize the number of covered users. Basically, the algorithm first determines the altitude of the DBS that maximizes the size of the DBS's coverage area, and then adjusts the horizontal position of the DBS such that the DBS can cover the maximum number of users in the network. Arribas et al. {{cite:03405383877f1c7197b7ad8b4dad2e37d5ec653d}} designed a heuristic algorithm to optimize the bandwidth allocation, user association, and multi-DBS placement to maximize the {{formula:8df11190-2491-4ec9-860c-c8cae2ccf445}} -fair throughput utility function, which is used to measure the tradeoff between fairness and throughput in the access links between users and DBSs. Some other works have investigated the DBS placement in the context of FSO based drone assisted mobile networks, where FSO is considered as the backhauling solution. However, they all assumed that the capacity of the FSO based backhaul link is large enough to accommodate the traffic demand of the access network, which could be impractical under certain conditions. For example, Sun et al. {{cite:a04038033cb0aa44da87f2b2f312c2229a133d54}} designed an algorithm to determine the 3D position of a DBS and the user association to maximize the overall spectrum efficiency of a PoI in the access network. Specifically, in each iteration, the designed algorithm sequentially derives the user association, horizontal position, and altitude of the DBS that can increase the spectrum efficiency of the PoI. The iteration terminates once the spectrum efficiency of the PoI cannot be further improved. Zhang and Ansari {{cite:b8cc0718045dc3d81822e1d79422730b13e42823}} jointly optimized the 3D DBS placement, bandwidth allocation, and power management to maximize the overall throughput of the access links while guaranteeing the data rate requirement of the users. Di et al. {{cite:18ca61fa9c5fec798b04be70575d0fcd4e558826}} designed a heuristic algorithm to optimize the multi-DBS deployment, user association jointly, and bandwidth allocation in the context of disaster-struck scenarios, where all the BSs in a disaster-struck area are damaged and multiple DBSs are deployed over the area to provide emergency communications.", "All the above-mentioned works do not consider the capacity of the wireless backhaul link between a DBS and an MBS. Some works have investigated the backhaul aware DBS placement in drone assisted mobile networks, where traditional RF communications is applied as the backhaul solution. Kalantari et al. {{cite:06167cfa0dfe60971e56cb121850e0c8015c46fb}} designed a heuristic algorithm to determine the 3D position of a DBS and the bandwidth allocation such that the number of users whose pathloss to the DBS is larger than the predefined threshold can be maximized, while guaranteeing the overall throughput of the access network no larger than the capacity of the wireless backhaul link. However, they assumed that the capacity of the backhaul link does not change by varying the DBS placement, which may not be a practical assumption. Sun and Ansari {{cite:ee0e6e2577e1c75591acb88b47cf565057470946}} assumed that the DBS is operated in the in-band half-duplex mode, i.e., backhaul and access link communications are conducted over the same frequency band but in different time slots. They designed a heuristic algorithm to optimize the DBS placement and user association to maximize the overall spectral efficiency in a PoI. Zhang et al. {{cite:2fbc31cfedaa1dd4fd6d71529891c6fa4fbbfcc3}} proposed a heuristic algorithm to maximize the overall throughput by determining the DBS placement, bandwidth assignment, and power allocation in both backhaul and access links, where the DBS is operated in the in-band full-duplex mode." ]
[]
nvBench: A Large-Scale Synthesized Dataset for Cross-Domain Natural Language to Visualization Task
NL2VIS - which translates natural language (NL) queries to correspondingvisualizations (VIS) - has attracted more and more attention both in commercialvisualization vendors and academic researchers. In the last few years, theadvanced deep learning-based models have achieved human-like abilities in manynatural language processing (NLP) tasks, which clearly tells us that the deeplearning-based technique is a good choice to push the field of NL2VIS. However,a big balk is the lack of benchmarks with lots of (NL, VIS) pairs. We presentnvBench, the first large-scale NL2VIS benchmark, containing 25,750 (NL, VIS)pairs from 750 tables over 105 domains, synthesized from (NL, SQL) benchmarksto support cross-domain NL2VIS task. The quality of nvBench has beenextensively validated by 23 experts and 300+ crowd workers. Deep learning-basedmodels training using nvBench demonstrate that nvBench can push the field ofNL2VIS.
[ "As shown in Figure REF ,there has been a surge of works on developing techniques to support translating natural languages to visualizations {{cite:6549d6ddc151f514c7be06b0d3fbb2335dfe4aff}}, {{cite:bfdab1fddadd66adf7c0708064f00708f63327cb}}, {{cite:1b6c73bfcc53693de1892a32cb1bc46b97cd9d40}}, {{cite:38d8f4ec221fadf9b1c1a00c6e0582ac2b62696e}}, {{cite:882bdd761aabffe1f2c0a26f61b3591844d623bd}}, {{cite:bbaf39c79c47bd2719e9bb5fe14e1d8bcdb880d3}}, {{cite:982c340ffd44871877c9870bb796f7c24ea38bc3}}, {{cite:0aab86cd969867fa67f1817f83557d81a1a29ed7}}, {{cite:d211a841709891d7e655b46887cfe06d84fcb68e}}, {{cite:6c6f7cafdff7400315ac02da668155b965e04e5d}}, {{cite:a5b57b72704d170edcdaf46f0216286038249995}}.", "Rule-based NL2VIS Approaches.The idea of creating visualizations using NL queries was explored around two decades ago {{cite:a5b57b72704d170edcdaf46f0216286038249995}}.Afterward, semantic parser techniques (e.g., Stanford Core NLP Parser {{cite:5c3384796d5c00a4205d9546b3c2f68b1e50fc9a}}) are becoming increasingly popular in the research of NL2VIS because these techniques can extract useful semantic information from the NL query.The Articulate {{cite:6549d6ddc151f514c7be06b0d3fbb2335dfe4aff}} is an NL2VIS system that translates the user-provided NL query into a representative visualization with two steps. First, it maps the NL query into a set of explicit commands using Stanford Parser and classifies the NL query to a set of user tasks using a supervised learning method. Second, it deploys a heuristic algorithm to generate a suitable visualization based on the commands and data properties automatically.DataTone {{cite:bfdab1fddadd66adf7c0708064f00708f63327cb}} mainly utilizes Stanford Core NLP Parser {{cite:5c3384796d5c00a4205d9546b3c2f68b1e50fc9a}} and a set of rules to mapping an NL query into a visualization. It also develops a mixed-initiative method to handle ambiguity in the process of NL2VIS. The user can interact with the ambiguity widgets in the interface to handle the ambiguities.Eviza {{cite:1b6c73bfcc53693de1892a32cb1bc46b97cd9d40}} is an NL2VIS system that allows users to have a conversation on a given visualization. Eviza develops a probabilistic grammar-based approach and a finite state machine to manage the interaction processing of the NL2VIS task. Eviza also manages syntactic and semantic ambiguity through simple GUI widgets in the interface, similar to DataTone {{cite:bfdab1fddadd66adf7c0708064f00708f63327cb}}.Evizeon {{cite:38d8f4ec221fadf9b1c1a00c6e0582ac2b62696e}}, extending Eviza's features and introduces additional pragmatics concepts, enables users to issue standalone and follow-up NL queries to specify a new visualization or interact with an existing visualization.Note that, Ask Data {{cite:3f136d51ef1ff6c552cdc013aeeb7072519c2818}} in Tableau is partially based on their previous studies – Eviza {{cite:1b6c73bfcc53693de1892a32cb1bc46b97cd9d40}} and Evizeon {{cite:38d8f4ec221fadf9b1c1a00c6e0582ac2b62696e}}.DeepEye {{cite:882bdd761aabffe1f2c0a26f61b3591844d623bd}} demonstrates a simple rule-based method for generating VIS charts from (constrained) keyword queries.Flowsense {{cite:bbaf39c79c47bd2719e9bb5fe14e1d8bcdb880d3}} uses state-of-the-art semantic parser techniques to support NL queries in a dataflow system, which allows users to use NL query for the majority of dataflow diagram editing operations.NL4DV {{cite:982c340ffd44871877c9870bb796f7c24ea38bc3}} is a Python toolkit that supports to generate data visualization using NL queries, mainly based on the NLP parser tree techniques, similar to the previous works (e.g., DataTone {{cite:bfdab1fddadd66adf7c0708064f00708f63327cb}} and Flowsense {{cite:bbaf39c79c47bd2719e9bb5fe14e1d8bcdb880d3}})", "NL2VIS Benchmarks.A recent work {{cite:f439ca1322f205636ea223a7303e4f10291fce9a}} collected 893 NL queries over 3 datasets byconducting an online study with 102 participants.This work characterizes the NL queries based on the phrasing (e.g., what types of keywords are used by real users) and the information contained (e.g., aggregation).Therefore, the 893 NL queries can be used to evaluate the performance of existing NL2VIS systems, or used by the developers to design their NL2VIS techniques, especially for rule-based techniques.However, this dataset has two limitations.First, the size of the dataset is too small for training the data-intensive deep learning model.Second, since this dataset is curated from 3 tables, it is hard to generalize to real-world scenarios.", "Therefore, it needs a large-scale, high-quality, and realistic NL2VIS dataset for the cross-domain NL2VIS task.", "Deep learning-based NL2VIS Approaches.The aforementioned studies are mainly developed based on rule-based NLP methods, which do not support well in free-form NL input.Some researchers try to support NL2VIS by applying deep learning-based NLP techniques such as language representation.", "ADVISor {{cite:6c6f7cafdff7400315ac02da668155b965e04e5d}}, a deep learning-based pipeline, aims to create visualization relevant to the user-provided NL query.Roughly speaking, The whole pipeline of ADVISor can be divided into two steps: (1) NL2SQL step, and (2) rule-based visualization generation step.For the first step – NL2SQL, ADVISor uses WikiSQL {{cite:e488b53a50c3c51decb346bf5aeb312542c34d18}}, a large crowd-sourced dataset for NL2SQL task, as the training dataset.In this step,ADVISor firstly takes as input the NL query and table headers to a BERT model {{cite:bc10e26b8adcb4dfc90d33461c637d5476fd72b0}}. Next, two neural networks are trained to classify aggregation types, and relevant attributes and filter conditions.In the second step, ADVISor designs a rule-based method to automatically create a visualization based on the selected attribute, filter conditions, and aggregation type.Hence, the neural network components of ADVISor are trained to produce fragments of SQL queries from the given NL query.It means that the deep learning models of ADVISor do not directly generate the visualization results from the given NL query.", "Thanks to the large number of (inputcolorNL, outputcolorVIS) pairs in nvBench, developers can use these pairs to train an end-to-end neural network for the NL2VIS task.ncNet  {{cite:d211a841709891d7e655b46887cfe06d84fcb68e}} is a Transformer-based model for translating NL queries into visualizations. It takes nvBench as the training corpus to solve the NL2VIS task in an end-to-end way." ]
[]
SGTR: End-to-end Scene Graph Generation with Transformer
Scene Graph Generation (SGG) remains a challenging visual understanding taskdue to its compositional property. Most previous works adopt a bottom-uptwo-stage or a point-based one-stage approach, which often suffers from hightime complexity or sub-optimal designs. In this work, we propose a novel SGGmethod to address the aforementioned issues, formulating the task as abipartite graph construction problem. To solve the problem, we develop atransformer-based end-to-end framework that first generates the entity andpredicate proposal set, followed by inferring directed edges to form therelation triplets. In particular, we develop a new entity-aware predicaterepresentation based on a structural predicate generator that leverages thecompositional property of relationships. Moreover, we design a graph assemblingmodule to infer the connectivity of the bipartite scene graph based on ourentity-aware structure, enabling us to generate the scene graph in anend-to-end manner. Extensive experimental results show that our design is ableto achieve the state-of-the-art or comparable performance on two challengingbenchmarks, surpassing most of the existing approaches and enjoying higherefficiency in inference. We hope our model can serve as a strong baseline forthe Transformer-based scene graph generation. Code is available:https://github.com/Scarecrow0/SGTR
[ "We categorize the related work of SGG/HOI into three directions: Two-stage Scene Graph Generation, One-stage Scene Graph Generation, and One-stage Human-Object Interaction.", "Two-stage Scene Graph Generation Two-stage SGG methods predict the relationships between densely connected entity pairs. On dense relationship proposals, some works propose a contextual modeling structure {{cite:c3ceb37a04182fd887cf09b3269b026228859ecf}}, {{cite:b627a0c5014ec54c6806bf774286136bdbf04b96}}, {{cite:d646604d2e02e0e5c82ecf3256a73dff42aa4de4}}, {{cite:30a000789921414e418730825470fd1fb9ad0383}}, {{cite:3c46003b1a8a772cc241241656d7dfdc0fa5c3d2}}, {{cite:4bb9c1880959f21167ecb38a06115d6587c65cfd}}, {{cite:edf64fc39df66305d8ca25dd085f2bfce23673af}}, {{cite:f43f4ee87933412676c251f375a655f52bf9ee6d}}, {{cite:0a4f776179c6141875536cbd1137efaffc904e12}}, {{cite:2ec3d5da0d84574fc661ff2aaa216f8874f835b4}}, {{cite:cc8e23763cd87975de92943728889344d9ba9a29}}, {{cite:343492c30aa12aabeeb57913eaeeb04755bb5d5d}}, {{cite:67922eff3701750f5854cb0a59a11e4af3f169f2}}, {{cite:f1c7cbe7ab1605a5adcf268d154c7af87325c8fe}}, {{cite:c562153a4bcde80716b59375060c2fe2bbcd8fd6}}, {{cite:b7c504050544ca71342239e806e4ca5cbf78d4d8}}, {{cite:ce209d7424e7fe018f4a1b8c62a0b32b311a4e67}}, {{cite:5efd344842be2f641b9164502032445ae00cc6d5}}.Recent studies have focused on developing logit adjustment and training strategies to address the SGG task's long-tail recognition {{cite:268678f5e87fe942488fefd94ff9a9e04dcfabd4}}, {{cite:e4837bede219942c82c8933d89689884215dfa38}}, {{cite:2a9b0446bf96ff5aebffa5f2970f4540e42786c8}}, {{cite:b7c504050544ca71342239e806e4ca5cbf78d4d8}}, {{cite:033542edb18abaeb79cb695ef1a19c88ba711af6}}, {{cite:5efd344842be2f641b9164502032445ae00cc6d5}}, {{cite:8615ca1f2fd4cd3c16e336cccb2e07847782d54a}}, {{cite:f81e649b8c833c927c4b9f673b6832db14c8f437}}, {{cite:c3d5b83b3f4f649570ca5a267097e54fe5972215}}, {{cite:c8fc041d5edf9208d9eca9c1e2815cea25efd26a}}, {{cite:bffcc026d5d31e61bf5494a40890722ed94816fb}}, {{cite:82f9dab3c8a576b19f00c95c82293b24260ba434}}, {{cite:833611da7ab91d0ff65d1583619e6997f1828de8}}.The two-stage design is capable of dealing with the complicated scenarios encountered in SGG.However, as mentioned earlier in Sec. , the overhead relation proposal leads to large time complexity and unavoidable noise in context modeling.Many two-stage works propose heuristic designs to address these issues (e.g., proposal generation {{cite:edf64fc39df66305d8ca25dd085f2bfce23673af}}, efficient context modeling {{cite:4bb9c1880959f21167ecb38a06115d6587c65cfd}}, {{cite:3c46003b1a8a772cc241241656d7dfdc0fa5c3d2}}, {{cite:f43f4ee87933412676c251f375a655f52bf9ee6d}}, {{cite:50e7db661efda1b1754f347aa5ea62058f023488}}, {{cite:2ec3d5da0d84574fc661ff2aaa216f8874f835b4}}, {{cite:5efd344842be2f641b9164502032445ae00cc6d5}}).However, these sophisticated two-stage designs often rely on their specific designs being based on the downstream tasks, which limits end-to-end optimization and the flexibility of their representation learning.", "One-stage Scene Graph Generation Inspired by the fully convolutional one-stage object detection methods {{cite:d9c66f5210313d502a49f0146aebf3b312ca3b6b}}, {{cite:9214e91822362dd5723b0e82d8430e87c443d031}}, {{cite:2bd09f9e5d4e24c642c55b3a98cec3522bfd2d14}}, the SGG community starts to explore the one-stage design.The fully convolutional network {{cite:53a7ff38979fa2b1313c9ceb6189a87d989d44c7}}, {{cite:e64fafcca0d74d417cb64fddc29600d6b96b88b5}} or CNN-Transformer {{cite:0a46c402462debccc3fe32aa38d88bb6b25e0a0b}} architecture is used in these one-stage methods to detect the relationship from image features directly.These one-stage frameworks perform efficiently due to their sparse proposal set.Nonetheless, with a less instance-aware structure, those designs may struggle to model the more complicated compositing situations associated with visual relationships.Additionally, the majority of one-stage methods ignore node-edge consistency because each relationship is predicted independently rather than a valid graph structure with consistent node consistency.", "One-stege Human-Object Interaction Our work is also related to the Human-Object Interaction (HOI) task.There has been a recent trend toward studying the one-stage framework for Human-Object Interaction {{cite:bda13ea0160f6671e9fca370a01af9ee7f46c7c5}}, {{cite:c7cf530bd50257a1c050bd76eb7b797d56ea2536}}, {{cite:0a2784b963b83b0aeaf3fa7518096cecf1c5883c}}, {{cite:9363ee7f3bed20a81d16a1f47912b28d523eef6c}}, {{cite:2f3e11db52f84ba1b91fd488a0095cc33a1fdf38}}, {{cite:4302693d97c825177fdc4f9ddc2d506f584f322a}}, {{cite:141bd5ecb9944ab154afd5f6da343a38f589d4d3}}, {{cite:d1117e3bb12f5c06d4d4ceedf149dea7e39e17ee}}.The {{cite:2f3e11db52f84ba1b91fd488a0095cc33a1fdf38}}, {{cite:141bd5ecb9944ab154afd5f6da343a38f589d4d3}} introduce an intriguing framework based on a dual decoder structure that simultaneously extracts the human, object, and interaction and then groups the components into final triplets.This decoding-grouping approach provides a divide-and-conquer perspective for detecting the human and interacted object.Inspired by this design, we propose the bipartite graph construction digram in our SGTR for the more general SGG task.To further improve the association modeling between entity and predicate, we propose a predicate node generator with an entity-aware structure and a graph assembling mechanism.With such a design, the SGTR is able to handle the complex composition of relationships and achieve optimal performance on SGG benchmarks." ]
[]
Multi-Provider NFV Network Service Delegation via Average Reward Reinforcement Learning
In multi-provider 5G/6G networks, service delegation enables administrativedomains to federate in provisioning NFV network services. Admission control isfundamental in selecting the appropriate deployment domain to maximize averageprofit without prior knowledge of service requests' statistical distributions.This paper analyzes a general federation contract model for service delegationin various ways. First, under the assumption of known system dynamics, weobtain the theoretically optimal performance bound by formulating the admissioncontrol problem as an infinite-horizon Markov decision process (MDP) andsolving it through dynamic programming. Second, we apply reinforcement learningto practically tackle the problem when the arrival and departure rates are notknown. As Q-learning maximizes the discounted rewards, we prove it is not anefficient solution due to its sensitivity to the discount factor. Then, wepropose the average reward reinforcement learning approach (R-Learning) to findthe policy that directly maximizes the average profit. Finally, we evaluatedifferent solutions through extensive simulations and experimentally using the5Growth platform. Results confirm that the proposed R-Learning solution alwaysoutperforms Q-Learning and the greedy policies. Furthermore, while there is atmost 9% optimality gap in the ideal simulation environment, it competes withthe MDP solution in the experimental assessment.
[ "In this section, we review three categories of related work, i.e., ({{formula:69fad0d6-3dab-4403-b5b2-e3ebbee7d520}} ) service federation in multi-domain networks, ({{formula:c0bfe131-6fec-4bb8-a5a4-b3d8ca7a5e24}} ) AC in 5G networks, and ({{formula:6db0554d-c7b5-4fe8-8fad-c3681a5af5cb}} ) RL-based AC solutions; and identify the differences between those studies and this paper.", "Multi-domain orchestration is an inherent concept in 5G/6G network architecture {{cite:31cb8de3bd2e7bccf251e9d55a22400c8f1d7666}}, {{cite:7e1e5f709f84afedebc99d7484203888c26765a6}}, but its realization needs resolving research challenges and implementation issues {{cite:ca8f9d0a1d02fc83b5cfbc29ba70200cf15b2581}}, {{cite:9eeb43833ee936203dd79b26af5c6f531bae1606}}. From the theoretical point of view, the problem is formulated as optimization models, and due to the complexity of the problem, heuristic algorithms are proposed to find sub-optimal solutions in {{cite:64393029fc4aacaad96b5f6587435edbe53ad2d7}}, {{cite:57a70130ee231faa09d3e186b22fbaa76fe21ffe}}, {{cite:e87483cec3668818b0103ce1774cc62844392555}}. These preliminary works were extended later to consider more complex objective functions, e.g., energy efficiency {{cite:dcafbfcc6c4b4595296251795146b1ae38912f86}}, {{cite:b8a6e8c0ec15574cd1682e0c3292d87f5f3b800a}}, and network service latency {{cite:bd74d9b24e8b910a23a7f4fb0d9f0e29abb90c3f}}.To tackle the complexity of the problem, a topology aggregation technique {{cite:6798d8091971d1af4caf26d8d16bf35ae42608b0}} and a deep learning-based solution {{cite:d84708bc57533d29645bef4b75c3985f5733fb03}} were also proposed recently. From the implementation point of view, the architectural framework for multi-domain service orchestration {{cite:be4fe59ace64a4708595bcfd8a13a74030f35740}} and, more specifically, service federation {{cite:3feb6a560a1de0dfcef1397f2c31223027dc4e33}}, {{cite:3c8a0aad7799e679a5fc854ec0afa8437c9711e6}} were also studied. In the 5G-Transformer platform {{cite:f3e92ca84b96cbd16c7c67146a80d047e5ec0f39}}, {{cite:466cded103068b84da1f35f76f41335880549865}}, the service federation component was developed so that it is capable of deploying NSs spanning multiple domains and transport networks. While these theoretical studies and the practical developments address some aspects of the multi-domain service orchestration, they do not specifically consider the AC problem; i.e., they assume that the service has already been accepted and attempt to efficiently deploy it.", "Admission control in 5G networks has been the topic of many studies in recent years {{cite:6cc684f8d788ecc90bcc7d0a362bc261627d931b}}. Various objectives are aimed, including revenue maximization {{cite:3b64eaa35cdff4c52d4c7fa06e84f5d2f753b87f}}, {{cite:295c22dbed94588ffa0e01112ef83b910c2a86b4}} and fairness assurance {{cite:de3e4c9369241b181d090b5d7782c751229366c1}}. Different strategies, and techniques have been utilized to achieve these goals. The most straightforward approach is to greedily attempt to accept any given NS request. However, to get closer to the optimal policy, techniques based on optimization theory {{cite:3b64eaa35cdff4c52d4c7fa06e84f5d2f753b87f}}, and reinforcement learning {{cite:295c22dbed94588ffa0e01112ef83b910c2a86b4}} have also been proposed. In {{cite:55220a254017d14170495622fe98764581cf0b36}}, the authors formulated the AC problem in the case of two inelastic and elastic traffic models as a Semi-Markov decision problem, and then obtained the optimal policy to maximize the revenue of the service provider. These solutions cannot be applied directly to the AC-MPSD problem, since they are proposed for single-domain networks, hence without service delegation.", "RL is an adequate tool to deal with the AC problem through which the admission controller learns the appropriate policy via the rewards gained over time. For the first time, AC in multimedia networks was approached by RL in {{cite:4bdcbec52ef6d5ee2ef47d0a6da463bf2637ef4d}}. Later the authors extended the problem and dealt with the joint routing and admission control via RL in {{cite:017b91450d39470c1b095d85fc157f9a9f67ef8e}}.Recently, the joint AC and routing problem in SDN has been investigated via approximate dynamic programming {{cite:a76eecc5c8de47ea3f16f1585f27938e3d141d3e}}. In wireless networks, RL-based AC solutions have also been proposed. In {{cite:1dbf7bed735737679271b0d91b67842db42d53ac}}, AC in cellular networks is formulated as an MDP. AC in CDMA networks using RL was studied in {{cite:12320f78a600cf5bde1380c877f1a0a63987e326}}. Recently, in 5G networks, the network slice admission control problem is formulated as an MDP in {{cite:d147feb9625c1bc1232fde4e21581617960f85c4}}, and RL-based solutions are proposed in {{cite:983604d25d3e964252361c05ff93506bdd1e7c44}}, {{cite:7827534ca8b37d8a44c5f4afbda0a65ee3050a90}}. While these works approach the AC problem using RL, they are not applicable to the service delegation problem, since the contexts of those problems are quite different from multi-domain service orchestration.", "In the most closely related work, Q-Learning was applied to a similar problem {{cite:89e06f26a196c3ebea8f45aa18f88d0b0fcf3590}}. However, this paper differs from that one by considering a more general and flexible federation contract model, analytically investigating the limitation of Q-Learning, proposing an average reward-based RL algorithm, and implementing the solution using the 5Growth platform." ]
[]
Accelerated and instance-optimal policy evaluation with linear function approximation
We study the problem of policy evaluation with linear function approximationand present efficient and practical algorithms that come with strong optimalityguarantees. We begin by proving lower bounds that establish baselines on boththe deterministic error and stochastic error in this problem. In particular, weprove an oracle complexity lower bound on the deterministic error in aninstance-dependent norm associated with the stationary distribution of thetransition kernel, and use the local asymptotic minimax machinery to prove aninstance-dependent lower bound on the stochastic error in the i.i.d.observation model. Existing algorithms fail to match at least one of theselower bounds: To illustrate, we analyze a variance-reduced variant of temporaldifference learning, showing in particular that it fails to achieve the oraclecomplexity lower bound. To remedy this issue, we develop an accelerated,variance-reduced fast temporal difference algorithm (VRFTD) that simultaneouslymatches both lower bounds and attains a strong notion of instance-optimality.Finally, we extend the VRFTD algorithm to the setting with Markovianobservations, and provide instance-dependent convergence results. Ourtheoretical guarantees of optimality are corroborated by numerical experiments.
[ "There is a large literature on stochastic approximation for policy evaluation. The most popular stochastic iterative algorithm used for policy evaluation is temporal difference (TD) learning; see {{cite:68729ca502aa722b227e7b06817b43ccc4fe0f29}} for a survey. The TD learning algorithm was first introduced by {{cite:2c9ae953f83cc27264739d07c237ff886a73f15e}},and convergence guarantees for TD have been proven in both asymptotic and non-asymptotic settings.Asymptotic convergence of TD with linear function approximationwas established in {{cite:9a51a30827bec9044ec5567bdfd4157a51cdd43a}}, and other classical asymptotic guarantees include {{cite:ed9f91a67a2e062aa255c26b406b6dd18e33f5f1}}, {{cite:15c3c8ca9c035e8064c1134705569be56cbc48c0}}. The vanilla TD algorithm can also be combined with the iterate averaging technique, and the asymptotic convergence of this algorithm was shown by {{cite:9578b09cd7b6863dad46ec08e7f5b52e890a6398}}, who extended the convergence results for solving noisy linear systems {{cite:245e9febf7dd51907b4dfbe9c39f4eeb1214d15a}}.", "While asymptotic convergence results offer a proof-of-concept, the algorithm is often run in large-scale applications with relatively small sample sizes. The first results proving finite time convergence under i.i.d. setting were proposed by {{cite:a3d342da6ea1137d8a2bb55a8f1c0f020e707c63}} and later extended by {{cite:dd2c5165600fa6558f66cfa63781bc3be3405101}}.Finite-time analysis of TD learning under Markovian noise was carried out by {{cite:e0a5b7471632d8b0a536c2541f79993661231286}}, where the authors employed nonsmooth analysis to a variant of the traditional TD algorithm, by requiring projections at each iteration onto a pre-specified ball. A consequence of the nonsmooth approach in {{cite:e0a5b7471632d8b0a536c2541f79993661231286}} is that there is no obvious way of benefiting from the variance reduction effect of distributed/parallel computing. In recent work, a subset of the current authors {{cite:64324a10a4232c797eeea53cb85d28acc940fed2}} provided an improved analysis of vanilla TD algorithm that can benefit from parallel computing.Other notable analyses of TD learning and some of its variants include those by {{cite:de5abef7f6ac21eabb91d79da35d2c418509dbc3}}, {{cite:28480f98be279995713c39594df26eb182ddee5d}}, {{cite:9dba5181bbce5dfa7dacd522a7df5177b6010a43}}. While some of these analyses are sharp, it is well-known that vanilla TD learning does not attain optimal oracle and sample complexities.Recently, {{cite:64324a10a4232c797eeea53cb85d28acc940fed2}} presented two new algorithms, the conditional temporal difference (CTD) and the fast temporal difference (FTD) learning, where FTD exhibits an accelerated rate in deterministic error. However, these algorithms fail to capture the correct stochastic error in the policy evaluation problem, and the bounds can be shown to be suboptimal for policy evaluation both in an instance-dependent sense, and in the worst-case over natural problem classes.", "During the past decade, there has been a flurry of parallel work in stochastic optimization on developing first-order methods with variance-reduction; early examples include IAG {{cite:edf6e99c9f7413f0f01e8c667632e680e094a510}}, SAG {{cite:26705bccc3db74588ce8375274814055a5f1cacc}}, SVRG {{cite:5baab43ffefe962584576943cc4b181f6425d818}}, {{cite:c07f0e1cc56f0159d953e375faa7a227b75f3a70}}, and SAGA {{cite:857fc3063cb8bcf2b2b67c5acf11eca7f8aed45d}}. Recent work in policy evaluation has shown that variance reduction techniques can also be applied to algorithms of the TD-type {{cite:b772e0e356fa2386adb184e90f7ee4d8a892e67e}}, {{cite:78a265f09a58d0e1d6976eeec140426ca9b346e0}}, {{cite:154b2a1bcb7725903a56a44613b9da87a7cd5e78}}, {{cite:cc1b94e9f677fb6e474ef95edfbacdb873466728}}. Among these, the paper {{cite:cc1b94e9f677fb6e474ef95edfbacdb873466728}} is motivated by the desire to draw distinctions between RL algorithms with similar worst-case performance and follows a line of work deriving instance-dependent bounds on the stochastic error in policy evaluation {{cite:0956a96461034befa8728c2b4f065f50dcb9983a}}, {{cite:1879ff6fd2b4049cc36bb066a2cbd8c6fa53f835}}.Specifically, the results of {{cite:cc1b94e9f677fb6e474ef95edfbacdb873466728}} capture the optimal instance-dependent stochastic error in the {{formula:4fd39b9f-7cf7-4361-a142-2f4f304ec0e4}} -norm. However, the optimal sample complexity is not achieved in {{cite:cc1b94e9f677fb6e474ef95edfbacdb873466728}} since the algorithm requires {{formula:8d3aa271-5b75-4062-90eb-1a08fa8c6a5f}} samples in each epoch.", "To our knowledge, the only work using variance reduction that captures the correct instance-specific stochastic error is that of {{cite:cc1b94e9f677fb6e474ef95edfbacdb873466728}}, which showed that the VRTD algorithm can match the lower bound on stochastic error in {{formula:0ecb2949-e6c6-4f5d-85d3-a450486224ba}} -norm. However, their guarantees require {{formula:b8e70803-b6d1-47c6-a541-42b9b746bab6}} samples in each epoch to compute the recentered update, and this sample size is suboptimal. In addition, the deterministic error proved in this paper is of the order {{formula:25a6fb45-c1e9-4340-a9a9-a04818812653}} which is also suboptimal.In more detail, a family of such deterministic error guarantees is possible to extract from the paper. The dependence on {{formula:9aa57f9c-14a6-4b58-ab82-997a245750fb}} can be improved but the dependence on {{formula:1a7bcb96-585e-4b19-a87d-0d5fdbd123d5}} is at least quadratic. The work of {{cite:b22dc44f44032d8baa22628c70fe6d829cd4e66e}} provided an analysis for the Polyak–Ruppert averaged temporal difference learning algorithm with linear function approximation in the weighted {{formula:ba49ad8c-1b15-4396-9123-8b8faf2e7d75}} -norm, showing that the dominant stochastic error term matches the stochastic lower bound proved in Proposition REF . However, the sample complexity is suboptimal due to the presence of higher-order terms (see {{cite:cc1b94e9f677fb6e474ef95edfbacdb873466728}} for simulations demonstrating this suboptimality), as is the oracle complexity." ]
[]
On the mutual visibility in Cartesian products and triangle-free graphs
Given a graph $G=(V(G), E(G))$ and a set $P\subseteq V(G)$, the followingconcepts have been recently introduced: $(i)$ two elements of $P$ are\emph{mutually visible} if there is a shortest path between them withoutfurther elements of $P$; $(ii)$ $P$ is a \emph{mutual-visibility set} if itselements are pairwise mutually visible; $(iii)$ the \emph{mutual-visibilitynumber} of $G$ is the size of any largest mutual-visibility set. % In this workwe continue to investigate about these concepts. We first focus onmutual-visibility in Cartesian products. For this purpose, too, we introduceand investigate independent mutual-visibility sets. In the very special case ofthe Cartesian product of two complete graphs the problem is shown to beequivalent to the well-known Zarenkiewicz's problem. We also characterize thetriangle-free graphs with the mutual-visibility number equal to $3$.
[ "The past two decades have seen rapid growth and development of the field of distributed computing by mobile entities {{cite:254195b37ebed897c487b49578cd2db1d8820872}}, whose aim is the study of the computational and complexity issues arising in systems of decentralized computational entities operating either in the Euclidean plane or in some discrete environment (e.g., a graph). In both settings, the research concern is on determining what tasks can be performed by the entities, under what conditions, and at what cost. One of such basic task is called Mutual Visibility and has been introduced in {{cite:30de546440c8b8b3fa8eedc4bb2e5ed8c5110e1b}} under the assumption that three collinear entities are not mutually visible: given an arbitrary initial configuration of {{formula:b6095347-3cd8-408d-8585-8b4569c7035b}} entities located at distinct positions, they autonomously arrange themselves in a configuration in which each entity is in a distinct position and from which it can see all other entities.", "Starting with this initial work, many papers have addressed the same problem (e.g., see {{cite:46cd184dbe562b8fca71c8a0495a7ab6681f524d}}, {{cite:c6179cf2a54f21c4cc3501257cd9b8703ce287f7}}, {{cite:6639b03df005c15d4d0fdd0091244e7e5ee9c74c}}). Later, similar visibility problems were considered in different contexts, where the entities are “fat entities” modeled as disks in the Euclidean plane (e.g., see {{cite:0434eb5b58c4853549cb0c3251e9aed0b8ac4378}}) or are points on a grid based terrain and their movements are restricted only along grid lines (e.g., see {{cite:301c3cc46c06e688af8a4028baaaac4ffe3d3af8}}).", "However, questions about sets of points and their mutual visibility in the Euclidean plane have been investigated since the end of XIX century. In {{cite:bee0edfc73af61110fc3db96e925380665c22bcc}} Dudeney posed the still open no-three-in-line problem: find the maximum number of points thatcan be placed in an {{formula:8b2010a4-bd82-44de-8103-011ba9719425}} grid so that no three points lie on a line.Motivated by the Dudeney's problem, in {{cite:65862e611c4d32de2ff2fcae78a762f9b2232c8d}} the General Position problem in graphs was introduced. A couple of years earlier and in a different language, an equivalent problem was posed in {{cite:75bfc3cf7dfbb3869d36512dc852bbc943b18aea}}. A subset {{formula:947b946d-24c6-423b-a4fc-9365dbb1bf54}} of vertices in a graph {{formula:2750a32c-f284-4b41-817e-eeb7021c2b67}} is a general position set if no triple of vertices from {{formula:66ed4b64-5ab4-49ef-bada-2cabccb3dc1d}} lie on a common geodesic in {{formula:f763cabd-5bd6-49e3-abf6-5c0169a5db9b}} . The General Position problem is to find a largest general position set of {{formula:3173fc82-c6bf-499e-a6af-b5656644a54e}} , the order of such a set is the general position number {{formula:82838e9f-5c06-492f-9dc4-bcce1ea42f18}} of {{formula:52959fef-2af8-4b44-9d84-637e67624532}} . Since its introduction, the general position number has been studied for several graph classes (e.g., grid networks {{cite:8c588ad0e770118773509e8d8cb43816f215d717}}, cographs and bipartite graphs {{cite:c04debfdcf2cb99476e08a6027ed7fa5228df298}}, graph classes with large general position number {{cite:578830048a1b97797e71588425ca4032e76b9f32}}, Cartesian products of graphs {{cite:bdf00cd25c9d8337280940b824264175328a21e6}}, {{cite:31cbc2394586a94d9699f937fe8d9ae5b4e01274}}, {{cite:ca526d783359f22d20105941e937fb04ad5c9181}}, {{cite:24b225d869c1d6645e898ec3a7d20626e7d69bba}}, and Kneser graphs {{cite:4b32ce5e54e71db1f1fcc6e3c22bd95238ad5748}}, {{cite:023c46fef2942fab76a2c47b95fca15f9dcd9f31}}).", "The difference between a general position set {{formula:07e416ef-7b87-43c5-aaa6-4cab034d45bc}} and a mutual-visibility set {{formula:3f47fe67-04a9-4ef5-a3bf-40938297ab79}} is that two vertices are in {{formula:6099d192-431b-498d-aeb9-f1f06db9c02d}} if there exists a shortest path between them with no further vertex in {{formula:3ed27185-b786-4a4a-a7a6-38b6295438a0}} , whereas two vertices are in {{formula:f8c72f01-951a-4309-9d62-25228c944faa}} if for every shortest path between them no further vertex is in {{formula:77c2b758-9a2c-4bfc-8888-77165e2f7950}} . The two concepts are intrinsically different, but also closely related, since the vertices of a general position set are in mutual visibility." ]
[]
Variance Reduction for Experiments with One-Sided Triggering using CUPED
In online experimentation, trigger-dilute analysis is an approach to obtainmore precise estimates of intent-to-treat (ITT) effects when the interventionis only exposed, or "triggered", for a small subset of the population.Trigger-dilute analysis cannot be used for estimation when triggering is onlypartially observed. In this paper, we propose an unbiased ITT estimator withreduced variance for cases where triggering status is only observed in thetreatment group. Our method is based on the efficiency augmentation idea ofCUPED and draws upon identification frameworks from the principalstratification and instrumental variables literature. The unbiasedness of ourestimation approach relies on a testable assumption that an augmentation termused for covariate adjustment equals zero in expectation. When thisaugmentation term fails a mean-zero test, we show how our estimator canincorporate in-experiment observations to reduce the augmentation's bias, bysacrificing the amount of variance reduced. This provides an explicit knob totrade off bias with variance. We demonstrate through simulations that ourestimator can remain unbiased and achieve precision improvements as good as iftriggering status were fully observed, and in some cases outperformstrigger-dilute analysis.
[ "In the online A/B testing literature, trigger-dilute analysis is a popular approach for obtaining a more precise ITT estimate when the intervention is only exposed to a small subset of the experimental population {{cite:8412c0c0879d5b8b8bde67c7b21335c5ebc6c63a}}, {{cite:508b455626627e01f5ae2f852c8c3e847834a6a5}}, {{cite:91e37b525a01a0d48464b9745f619251cb97fa42}}, {{cite:592fd05afdb93ff9f5793f7a1bf87f5744dbdff6}}.First, an average treatment effect is estimated among the triggered subjects.This triggered average treatment effect is then multiplied (“diluted”) by the triggering rate.The success of a trigger-dilute analysis depends on either a simple triggering condition, or a mechanism of counterfactual logging such that the experimentation system is able to compare the treatment vs. control experience at any time and label whether there is a realized difference in the study groups' experiences.Complex triggering conditions can easily lead to sample ratio mismatch, rendering the triggered analysis untrustworthy {{cite:cd714d8d0f5ed47b3a6a751801e819cd6e29a428}}.Meanwhile, high fidelity counterfactual logging is unwieldy and too expensive for many real applications.When triggering status is not observed for all units, trigger-dilute analysis cannot be applied.", "To tackle scenarios with partially-observed triggering, we turn to the causal inference literature around noncompliance, which occurs when treatment assignment differs from treatment exposure (i.e., {{formula:6506bb45-e65e-4daa-a032-525404ad83ab}} for some units {{formula:a7934306-5b8d-4b76-b8a7-276332fe1f88}} ).Instrumental variables (IV) {{cite:53f347ac32506de5ac44027e17c2e69e51e9a27f}}, {{cite:d8d36d90a33721cdd9cc70a56564f5be271f0c66}} and principal stratification {{cite:709f17ec5ed3f1885dc53fe5f8fbdc6a7e3c8267}}, {{cite:b7babf617f8cd959484850e66f01b15151971739}}, {{cite:1debd4e528164332c9e735e56509617e0efcf522}}, {{cite:ecde52a81fce43f81fa19091a75ac119f379acf1}} frameworks provide strategies for identifying and estimating subgroup average treatment effects under a range of noncompliance conditions.", "In the IV literature, for example, the causal quantity of interest is typically the local average treatment effect (LATE), which is equivalent to the average treatment effect for the triggered.The standard IV estimator for LATE is {{formula:eb06c988-4722-4dfe-a499-8982e7d70d91}} divided by the estimated proportion of Compliers (i.e., the triggering rate).Multiplying this IV estimator by the triggering rate therefore recovers {{formula:e40fe83f-872f-4514-b800-65c821344829}} .As such, the standard IV approach is not aimed at producing a more precise estimate of the overall ITT.There are, however, extensions of the standard IV estimator that attempt to improve estimation efficiency.Weighted IV methods {{cite:de288d58e94d0a51bdb8ad8058d6ceca580f321c}}, {{cite:f51793836747fba05b59b42033a35f5850cbc725}}, {{cite:8e03599b1f9085172b159a56e5849d4f36a8c0c9}} use predicted compliance to weight both treatment and control groups when computing the LATE estimator.Our method is similar in that we also use predicted compliance or triggering probabilities, but whereas the weighted IV estimator is unbiased for LATE only when there is no correlation between treatment effect heterogeneity and compliance, our estimator is unbiased for ITT (and asymptotically unbiased for LATE after dividing by the triggering rate) as long as the augmentation term that we construct equals zero in expectation.Weighted IV and our method also have different variance reduction properties.To achieve variance reduction, weighted IV depends heavily on high prediction accuracy of triggering status, while our method can reduce variance even when triggering is completely random.", "Beyond instrumental variables, the principal stratification literature generalizes identification and estimation strategies for causal effects under more complicated forms of noncompliance {{cite:b7babf617f8cd959484850e66f01b15151971739}}, {{cite:1debd4e528164332c9e735e56509617e0efcf522}}, {{cite:526afdf3089e94c3fabfc1f3edf5e9e59505516d}}, {{cite:ecde52a81fce43f81fa19091a75ac119f379acf1}}.We draw upon many ideas from the principal stratification literature to construct our proposed estimator.In particular, we invoke a key assumption called weak principal ignorability {{cite:fd696a967ee14ec5e988ff633fa49a878b72ee98}}, {{cite:1debd4e528164332c9e735e56509617e0efcf522}}, {{cite:b7babf617f8cd959484850e66f01b15151971739}} as a sufficient condition under which our estimator is unbiased for ITT.We also use principal scores (i.e., predicted triggering probabilities) to construct the augmentation term critical to our estimator.", "More generally, there is a vast literature on using pre-assignment covariates for regression adjustment to increase estimation efficiency {{cite:667fb2b45e5b183617b84abdf189e1e5d19cd900}}, {{cite:f0d1ed2e03383dab8f537f0d57484e65fd931b77}}, {{cite:1bc5a9ae4cfb95f9b8bef1ac73743d26c6205a82}}, {{cite:b7ddf1e589ea173d8ecb9ee1d979890db1e5f6b3}}, {{cite:3b90472d025bc68584875478297a400ee774b43d}}, .Our method is based on the augmentation idea of CUPED {{cite:249e503efbdfa567923d77d2049c745e74b4c2b3}}(see also ), applied to the one-sided triggering context, and is a general approach that can be used on top of any pre-assignment covariate regression adjustment.In particular, our approach has the flexibility to incorporate in-experiment observations for covariate adjustment without introducing bias, though there is a tradeoff in the amount of variance reduced." ]
[]
A Preliminary Study for Literary Rhyme Generation based on Neuronal Representation, Semantics and Shallow Parsing
In recent years, researchers in the area of Computational Creativity havestudied the human creative process proposing different approaches to reproduceit with a formal procedure. In this paper, we introduce a model for thegeneration of literary rhymes in Spanish, combining structures of language andneural network models %(\textit{Word2vec}).%, into a structure for semanticassimilation. The results obtained with a manual evaluation of the textsgenerated by our algorithm are encouraging.
[ "There has been much interest and work in the area of ATG with different and interesting goals, regarding the different types of texts. Many of the proposed algorithms are based on neural networks.In {{cite:b43ad1702b060e610cc3f10c82f3feb0494d9a5a}}, the authors generate coherent text using a recurrent neural network (RNN) and a neural checklist model. Their RNN predicts the best context from a list of keywords.Another RNN approach is proposed in {{cite:d3ca8a2a39c86895f3b777345dc0bca727c0f42f}} for generating narrative text, such as fiction or news stories. Entities mentioned in thetext are represented by vectors, which are updated as the text generation proceeds as they represent different contexts and guide the RNN in determining the vocabulary to be retrieved in order to generate a narrative.", "We note that there are other ATG techniques, such as text realization that creates text in a human language, e.g. English or French, from a syntactic representation {{cite:23793cdaa1ed894bc5ab688dba38c2d21d5405c0}}. Oliveira has written a survey of work treating the automatic generation of poetry {{cite:dd468d42bbc4f8fff5f9a26a44b4c3062dbf03b8}}, and presents his own method for generating poems based on the use of templates (canned text) in {{cite:08aaa248cf0d4541812435089d43265b69f78d26}}.Another work based on canned text is presented in {{cite:e8faded6f40392566950eadf600afaff024cf04b}}, which generates strophes of verses for Basque poetry. In {{cite:9cc55dcad7d79cfb04e1661156180ac50433002c}}, a RNN was proposed for the generation of Chinese poetry based on learning of known text structure." ]
[]
Continual Learning for Unsupervised Anomaly Detection in Continuous Auditing of Financial Accounting Data
International audit standards require the direct assessment of a financialstatement's underlying accounting journal entries. Driven by advances inartificial intelligence, deep-learning inspired audit techniques emerged toexamine vast quantities of journal entry data. However, in regular audits, mostof the proposed methods are applied to learn from a comparably stationaryjournal entry population, e.g., of a financial quarter or year. Ignoringsituations where audit relevant distribution changes are not evident in thetraining data or become incrementally available over time. In contrast, incontinuous auditing, deep-learning models are continually trained on a streamof recorded journal entries, e.g., of the last hour. Resulting in situationswhere previous knowledge interferes with new information and will be entirelyoverwritten. This work proposes a continual anomaly detection framework toovercome both challenges and designed to learn from a stream of journal entrydata experiences. The framework is evaluated based on deliberately designedaudit scenarios and two real-world datasets. Our experimental results provideinitial evidence that such a learning scheme offers the ability to reducefalse-positive alerts and false-negative decisions.
[ "Lately, techniques that build on (deep) machine learning have been gradually applied to different audit tasks {{cite:a0a2a93481355ac03e7b1f19d804afc7036e2f34}}, {{cite:f812d6050d75b1e5f34c5547eb05b3a0a493bdad}}. In parallel, the idea of continual learning triggered a sizable body of machine learning research {{cite:e041d505e0a90fcade100cb527c8c54ff04e37a8}}, {{cite:1f012aaf8fc40ff74a8e816c4f3e2f0dbf1fdc54}}. In the following, we focus our literature review on (i) CAATs applied in financial audits and (ii) continual deep-learning techniques.", "Computer Assisted Audit Techniques: With the evolution of AIS systems, the development of CAATs has been of central relevance in auditing. Various techniques have been proposed to audit structured accounting data, such as (un-) supervised machine-learning approaches {{cite:1548738e0ee9c37698906b1138fbf55e184febfe}}, {{cite:7f725bc2878621e08e96166a390038119e9ac5c8}}, {{cite:77ed537ca66fa3c43d888c8a1b02452641f82af9}}, {{cite:bfb6fa3c3dbe53392dafd19db7ef174e5e8a384b}}, {{cite:33999f315a88e396a19bbbcab65ff63b7ab3d970}}, {{cite:294eebee653b0783eee1e3a83d7b12a3ce30ab6d}}, {{cite:797d5886ff12a3b624285eb3cbb1dc732e4c7123}}, statistical analyzes {{cite:43fb93b7f7aef61cded31e877e3ac2031d5a921e}}, {{cite:bcdbdd630323dfeb840351dcc647e0b477694570}}, rule-based procedures {{cite:453389740e10c71ef303adb7ebd794ba2cc19aff}}, {{cite:b39a056b8539d81fbb1da1815f2925bd879091fe}}, {{cite:69fc631ecd37420e0392c5968f2772396c98cbf7}}, {{cite:12b156fea43fc61e78f6581c17c2a77db19fc5cd}}, business process mining {{cite:6af658d6aa7e8d4d09cf981e07cf485a380a36ae}}, {{cite:3342475b592b9d4f581bb5f6714730e45ed3172f}}, {{cite:e308ef5faa5e52ec1acc347d8aeefafbc42788db}}, {{cite:1c2e382de6518c18430c0c20d7aa108e1eb3f607}}, and the combination thereof {{cite:20f6fc7918bef9a8f63c38ca1beb20df66ead205}}, {{cite:835065b34e0b8bc819767a97071170f68a6bab6a}}. Recently, deep-learning techniques have emerged in auditing. Such techniques encompass, autoencoder neural networks {{cite:91ef6b6dd1fdef25639915738a22f8559be4885b}}, {{cite:7676e3d9b1be78c3ddc11435b9c509d4d5b45fd0}}, {{cite:ffc95fb0ff23a46146bc2b918ddc687a6c7b0733}}, {{cite:a69e4eaf9169e8c5a15bb3fce3c51c0aff325937}}, {{cite:895448f4697f92b0aa4680fa99a1e892fe11373c}} to detect accounting anomalies and learn representative audit samples. Lately, self-supervised learning has been proposed to learn multi-task audit models {{cite:2192c3712fc735dc41df5a8124625173a9cca90e}}.", "Continual Deep-Learning Techniques: The challenge of CF in training neural networks, has been studied extensively {{cite:cf32a90aa08fc1597f7ff9ece4b3d71a5de75fc2}}, {{cite:f899464cbf624a882b3292c37e4701def9aa172a}}, {{cite:1d542ad978d2dba66810ccc6d4ddf338c641fc9a}}, {{cite:522ead83249e4dede732577aa699686dce425f99}}. To mitigate CF, several approaches have been proposed, broadly classified as (i) rehearsal, (ii) regularization, and (iii) dynamic architecture techniques. Rehearsal based techniques {{cite:a2ec8ac860faa2c310579bfefe9370b1e489fa23}}, {{cite:e077dd946d9e1425131469da073b35a44ac7d828}}, {{cite:b2887736b17aa2453ad65f2b40a7575bcadf205a}} replay samples from past experiences. Thereby, samples are saved in a buffer and replayed to conduct knowledge distillation {{cite:f3ceff8d076007f2ed8a0142ccf3495e70f2cc4b}}. Other methods use gradients of previous tasks to mitigate gradient interference {{cite:9b4cd325e70b907d8fb534ecd24711c21d01343a}}, {{cite:f967c1e9bf9a39b5141430363c169dc383f089f8}}. Furthermore, generative models are used to generate synthesized samples for rehearsal {{cite:080f8ce1b24353ec48c9587fb3eaf6d55fb58044}}. Regularization based techniques consolidate previously acquired knowledge when optimizing the model parameters. Learning without Forgetting (LwF) {{cite:84daa02520f0483cb0f9afb629229146253dbb45}}, use knowledge distillation to regularize parameter updates. Elastic Weight Consolidation (EWC) {{cite:b27081fe7285d04db5d7a1986c4a8dd3de8c5ced}} directly regularizes the parameters based on their importance concerning previous data. Similarly to EWC, in Synaptic Intelligence {{cite:ff470993e277bc6510547d00826d0a972fac3b35}} the model parameter importance is regularized but in a separate parameter optimization step. Dynamic architecture methods prevent forgetting by the deliberate reuse of {{cite:9e3d9b8c0c594ff4b4b385f6121262a578be3161}} or increase in {{cite:3411393c8d70343c9766e907dac4c8e1ca0f6f31}} model parameters.", "Concluding from the reviewed literature, this work presents, to the best of our knowledge, the first analysis on the application of continual deep-learning methods for the purpose of real-world financial statement audits." ]
[]
A Parallel SystemC Virtual Platform for Neuromorphic Architectures
With the increasing interest in neuromorphic computing, designers of embeddedsystems face the challenge of efficiently simulating such platforms to enablearchitecture design exploration early in the development cycle. Executingartificial neural network applications on neuromorphic systems which are beingsimulated on virtual platforms (VPs) is an extremely demanding computationaltask. Nevertheless, it is a vital benchmarking task for comparing differentpossible architectures. Therefore, exploiting the multicore capabilities of theVP's host system is essential to achieve faster simulations. Hence, this paperpresents a parallel SystemC based VP for RISC-V multicore platforms integratingmultiple computing-in-memory neuromorphic accelerators. In this paper,different VP segmentation architectures are explored for the integration ofneuromorphic accelerators and are shown their corresponding speedup simulationscompared to conventional sequential SystemC execution.
[ "With the advancements in emerging non-volatile memory technologies, various research groups have tried to explore the technologies at the system level. On the other hand, for the CMOS-based electronic systems, SystemC-based virtual prototypes are extremely popular for early software development and performance tuning. In this section, we first review various simulators and then briefly discuss the relevant systemC-based virtual prototypes.", "A system-level simulation of a tiled neuromorphic architecture is presented in {{cite:ea33c8c9905f78aad36bed1ddb142b27b2222ec5}}. The authors have implemented a micro-instruction set to perform the operations on analog/digital memristive crossbars. Along with the crossbars, each tile consists of analog/digital converters, digital modulators, and sample-hold mechanisms. The micro-instruction has three types of functions: initialize, compute, and read. The system-level simulator presented in {{cite:22de0c94c555b1e899399354ae75ea59fd7e3014}} is built on similar principles. NVMain {{cite:aabd0b551ee7ea5a267c191f535f5b40b430c126}} and NVMain 2.0 {{cite:39b169b3c58d3a2ce1fdbe92a341f831d6d99618}} are the simulators that can simulate memory and memory interfaces. NVMain focuses on memory-oriented simulations and requires significant engineering efforts in modeling and simulation of CIM.", "The MNSIM {{cite:3586edf6a942dfa3f36bdd054387095c8297d840}} and MNSIM 2.0 {{cite:f2ebd94273c054857262122e25a1769a9656ecd7}} simulators use behavioral models to estimate the worst case and accuracy. The increased simulation speed comes at the cost of accuracy in MNSIM. Apart from the system level and architecture simulators, there are various simulators capable of performing circuit-level simulations {{cite:1a1a66910b02a6dbaca9edf83f428e859ed8df02}} {{cite:3f25e0a043a3e91b8854cc0c7ca26a20cf208b71}}. While these simulators can perform low-level simulations and provide better estimates of the energy efficiency of the design, scaling to system-level is not possible due to simulation complexity and run-time.", "VPs commonly use SystemC as their underlying simulation engine, which deploys a standard discrete event approach to simulate the concurrency of multiprocessor systems. There are several approaches for parallelization of SystemC {{cite:b4a4f5483977b9f30843b87d849f0e92c74b7891}}, {{cite:88722ad10de9b446558444f33036e2711767b107}}, {{cite:81abb253f3e5edd404dec6ca45ffb17723725297}}. A synchronous approach to parallel SystemC simulation is presented in {{cite:81abb253f3e5edd404dec6ca45ffb17723725297}}. Synchronous techniques, however, are unable to exploit the full parallelism of a simulation, given that they enforce strict time synchronization among all threads. This synchronous limitation can be overcome by applying a time-decoupled technique as proposed in {{cite:b0c7b2c84a27933087008fc3c6b1d56cf3223f7a}}. These techniques have been applied in {{cite:ed6b85dc4b9c5e432815a233824894b3098869bc}} to multicore VPs for specific workloads like booting operating systems and for network intensive communication applications. However for heavy VMM operations needed in machine learning applications, that are executed in a system-level VP with multiple neuromorphic accelerators architecture, there is limited work available. Extensive work on different simulators for neuromorphic architectures with different abstraction levels is summarized in {{cite:b24118467dee74a55be5bbfeb3e089ee68282558}}, where the majority of simulators focus on circuit level. Only a few works like {{cite:eb26c21ab5ea7db1aa62f92e7a0b109da9a7e879}}, {{cite:5cf2fafe28ff8d2599f93b16b4c6612a3bd12956}} have presented complete integration of neuromorphic accelerators into a full system. However, they have not been explicitly developed to exploit the multicore nature of their host systems. Therefore, this work presents a time-decoupled parallel simulation framework that allows different VP segmentation strategies of neuromorphic architectures. A summary for several neuromorphic simulation frameworks is captured in Table REF where a qualitative comparison can be observed. The proposed simulation framework has a few features that are desired but absent in simulators found in the literature." ]
[]
Defending Against Membership Inference Attacks on Beacon Services
Large genomic datasets are now created through numerous activities, includingrecreational genealogical investigations, biomedical research, and clinicalcare. At the same time, genomic data has become valuable for reuse beyond theirinitial point of collection, but privacy concerns often hinder access. Over thepast several years, Beacon services have emerged to broaden accessibility tosuch data. These services enable users to query for the presence of aparticular minor allele in a private dataset, information that can help careproviders determine if genomic variation is spurious or has some known clinicalindication. However, various studies have shown that even this limited accessmodel can leak if individuals are members in the underlying dataset. Severalapproaches for mitigating this vulnerability have been proposed, but they arelimited in that they 1) typically rely on heuristics and 2) offer probabilisticprivacy guarantees, but neglect utility. In this paper, we present a novelalgorithmic framework to ensure privacy in a Beacon service setting with aminimal number of query response flips (e.g., changing a positive response to anegative). Specifically, we represent this problem as combinatorialoptimization in both the batch setting (where queries arrive all at once), aswell as the online setting (where queries arrive sequentially). The formersetting has been the primary focus in prior literature, whereas real Beaconsallow sequential queries, motivating the latter investigation. We presentprincipled algorithms in this framework with both privacy and, in some cases,worst-case utility guarantees. Moreover, through an extensive experimentalevaluation, we show that the proposed approaches significantly outperform thestate of the art in terms of privacy and utility.
[ "Privacy Violation of Shared Genomic Data: Genomic data sharing picked up pace with programs such as the Database of Genotypes and Phenotypes (dbGaP) by the NIH as a centralized repository of large-scale genomic data for researchers which made summary statistics about genomic data publicly available. However, shortly thereafter, it was shown by Homer et al. {{cite:f5582694889c7d59a6167b03b0a5888a7a850f32}} that it was indeed possible to resolve individuals in a DNA mixture - even if the individual's contribution to the mixture is as little as 1% by comparing allele frequencies obtained from probe-intensities, to the allele frequencies of a reference population such as from the International HapMap Project {{cite:f965a4f78ea532683286af2ec306de1e4e0f9ae0}}. Various types of attacks on genomic data are addressed in {{cite:c3e20af36167822316820520be41bcd80d7f0105}}, spanning identity tracing, attribute-disclosure and completion attacks. Since the Shringarpure-Bustamante attack in {{cite:42e31fc42b9ad64550905522914aa7d9320182ed}}, further attacks on beacon-services {{cite:7d2981ae34fa8229924b49601d6d4b324c593892}}, {{cite:b75e69c906ffadf0a978921c26aa01117b57dc8c}}, {{cite:0a019528f1a154f1552b511580a178a71d0a6d0c}}, {{cite:dc8a945682fd68a7fa8acafa8c217e4c334388f6}} have been proposed, including genomic-reconstruction and addressing the effects of kinship.", "Protecting the Privacy of Genomic Data: In response, several defenses were proposed against attacks on genomic data - usually relying on injecting noise, or by suppressing a subset of the data. The efficacy of masking a subset of shared genomic data was studied in {{cite:73c3cf1c4efde2e0934fa3570463f4b84b42dc24}}. Preserving privacy was studied through a game-theoretic lens in {{cite:14d79c777f8e08f65bd3a2c2d1cc4bf21c55c584}}. Several other genomic privacy-preserving methods are summarized in {{cite:4138ca998beed9a02b036d0c4f216f42acd91388}}. Specific to beacon-services, {{cite:7d2981ae34fa8229924b49601d6d4b324c593892}} present a random-flipping heuristic which perturbs unique alleles in the database using a binomial distribution, as well as a query-budget approach for authenticated users. A differential-privacy approach was adopted in {{cite:3e2e89050805bab4c4dd2d5b3aaeaa8e6041c8e3}}, which forms one of the baselines in this paper. The winning entry {{cite:470100ce765acee1dd0aaa2bcb647cf0caf6cac7}} to the 2016 iDash Privacy and Security Workshop challenge defines a differential discriminative power to select SNVs from the dataset for which responses are flipped." ]
[]
A Neural Framework for Learning Subgraph and Graph Similarity Measures
Subgraph similarity search is a fundamental operator in graph analysis. Inthis framework, given a query graph and a graph database, the goal is toidentify subgraphs of the database graphs that are structurally similar to thequery. Subgraph edit distance (SED) is one of the most expressive measures forsubgraph similarity. In this work, we study the problem of learning SED from atraining set of graph pairs and their SED values. Towards that end, we design anovel siamese graph neural network called NEUROSED, which learns an embeddingspace with a rich structure reminiscent of SED. With the help of a speciallycrafted inductive bias, NEUROSED not only enables high accuracy but alsoensures that the predicted SED, like true SED, satisfies triangle inequality.The design is generic enough to also model graph edit distance (GED), whileensuring that the predicted GED space is metric, like the true GED space.Extensive experiments on real graph datasets, for both SED and GED, establishthat NEUROSED achieves approximately 2 times lower RMSE than the state of theart and is approximately 18 times faster than the fastest baseline. Further,owing to its pair-independent embeddings and theoretical properties, NEUROSEDallows approximately 3 orders of magnitude faster retrieval of graphs andsubgraphs.
[ "Graphs are used to model data in a wide variety of domains. Examples include chemical compounds {{cite:fdc271bae6a1987ff49f8e39e184e72fab135e7f}}, protein-protein interaction networks (PPI) {{cite:ae3a515dbf8952454f19c971c3634b7ece588350}}, knowledge graphs {{cite:fd93228cda778896e2eb2a03bcb50c22eae3172b}}, and social networks {{cite:bd951641896fac08d0e061b05a780e7fe635fdca}}. A distance function on any dataset, including graphs, is a fundamental operator. Among several distance measures on graphs, edit distance is one of the most powerful and popular mechanisms {{cite:96878e5b3218e763a786d7c28b5877ffdfde1407}}, {{cite:a90ee320ea10b5be9fc5e5ff4219e4472e1362ca}}, {{cite:96716f2015e9c3a319925dd4bffa0f57d80d6a73}}, {{cite:a1bdf1dd9093adba36959de18464b3abebd4d3b0}}, {{cite:d40a127f3f729c5665ecf71f9ee5a13602e6fa0c}}, {{cite:505df0de0b148a3a862a4685e9a8fa3210af7504}}, {{cite:3f29f77a94353f920c398bdfa21c4937956ce78e}}, {{cite:d860dd7c9042b66e95eb604f0f8479ca13d68527}}. Edit distance can be posed in two forms: graph edit distance (Ged) and subgraph edit distance (Sed). Given two graphs {{formula:acfcec5a-2dc2-4971-9fc4-f681fad69fb2}} and {{formula:58458996-8659-4086-ad69-77cc2b053a79}} , {{formula:70064d99-18d4-4670-a5ba-67961e9c11d0}} returns the minimum cost of edits needed to convert {{formula:7313377f-6957-4b88-8004-c5cd3ab1ed02}} to {{formula:9361c6b1-bf14-44c2-b763-df18c443a798}} . i.e., for {{formula:709842f4-24ce-4e00-8fd7-992feef1b77f}} to become isomorphic to {{formula:28495d77-1db1-4e3e-8b6b-154fc2af2414}} . An edit can be addition or deletion of edges and nodes, or replacement of edge or node labels, with an associated cost. In {{formula:ac32a8da-176f-438c-aabb-84fb5df837bb}} , the goal is to identify the minimum cost of edits so that {{formula:a5a06ebb-c520-4d6c-8291-aca223262fc1}} is subgraph isomorphic to {{formula:d7169361-990f-4247-8bf8-ad9193bdab5d}} . For examples, see Fig. REF . We define these notions more formally in § .", "Ged is typically restricted to graph databases containing small graphs to facilitate distance computation with queries of similar sizes. As an example, given a repository of molecules, and a query molecule, we may want to identify the closest molecule in the repository that is similar to the query. Sed, on the other hand, is useful when the database has large graphs and the query is a comparatively smaller graph. As examples, subgraph queries are used on knowledge graphs for analogy reasoning {{cite:fd93228cda778896e2eb2a03bcb50c22eae3172b}}. In PPI and chemical compounds, Sed is of central importance to identify functional motifs and binding pockets {{cite:fdc271bae6a1987ff49f8e39e184e72fab135e7f}}, {{cite:d860dd7c9042b66e95eb604f0f8479ca13d68527}}, {{cite:bd14fcb27993348f36cb45bdb3fe2f120d8b114a}}.", "While the applications of Ged and Sed are beyond doubt, their applicability is constrained by their computation costs. Specifically, both Ged and Sed are NP-complete {{cite:3f29f77a94353f920c398bdfa21c4937956ce78e}}, {{cite:7334fd437596412a0a087452005c101d9603fc58}}, {{cite:d860dd7c9042b66e95eb604f0f8479ca13d68527}}. To mitigate this computational bottleneck, several heuristics {{cite:96716f2015e9c3a319925dd4bffa0f57d80d6a73}}, {{cite:a1bdf1dd9093adba36959de18464b3abebd4d3b0}}, {{cite:d40a127f3f729c5665ecf71f9ee5a13602e6fa0c}}, {{cite:505df0de0b148a3a862a4685e9a8fa3210af7504}}, {{cite:7334fd437596412a0a087452005c101d9603fc58}} and index structures {{cite:d860dd7c9042b66e95eb604f0f8479ca13d68527}}, {{cite:3f29f77a94353f920c398bdfa21c4937956ce78e}}, {{cite:96878e5b3218e763a786d7c28b5877ffdfde1407}}, {{cite:a90ee320ea10b5be9fc5e5ff4219e4472e1362ca}} have been proposed. Recently, graph neural networks have been shown to be effective in learning and predicting Ged  {{cite:9614d64567fe05abba8914f058ec5d07ccb5ed24}}, {{cite:8485f62a6a68c251650e8ab8f78e1174962a8934}}, {{cite:f4024535372658ffc075b055bb311a6a1a84802f}}, {{cite:22d250a458330234f91d8f83f15ede008c83afb6}}, {{cite:b07e429c66bcf790ec10040167d94e69ff7f85c2}}, {{cite:07432e1068d214e51d68b085c51e60bae82cbde1}} and subgraph isomorphism {{cite:b1e5ba8532d2775d4b7ad8475a78e208734d3570}}. The basic goal in all these algorithms is to learn a neural model from a training set of graph pairs and their distances, such that, at inference time, given an unseen graph pair, we are able to predict its distance accurately. While this progress in the area of graph querying is undoubtedly impressive, there is scope to do more.", " Modeling Sed: Existing neural approaches to learning Ged cannot easily be adapted to learn Sed. While Ged is symmetric, Sed is not. Most neural architectures for Ged have the assumption of symmetry at its core and hence modeling Sed is non-trivial. In App. REF , we provide a detailed analysis of the limitations of prior architectures in failing to model Sed.Exponential Search Space: Computing {{formula:0cab3ed1-7a25-4fb1-a9e6-aa7d7ba30a13}} conceptually requires us to compare the query graph {{formula:17975778-e818-4b2e-a92f-70f1ea970e69}} with the exponentially many subgraphs of the target graph {{formula:cffc3d41-b85a-4a40-aed7-418ec7e5b8e2}} . Therefore, it is imperative that the model has an efficient and effective mechanism to prune the search space without compromising on the prediction accuracy. We note that while several index structures and heuristics exist for Ged  {{cite:d860dd7c9042b66e95eb604f0f8479ca13d68527}}, {{cite:3f29f77a94353f920c398bdfa21c4937956ce78e}}, {{cite:9614d64567fe05abba8914f058ec5d07ccb5ed24}}, {{cite:8485f62a6a68c251650e8ab8f78e1174962a8934}}, none exist for Sed. Thus, scalability of Sed on large graphs remains an unsolved problem.Preservation of theoretical properties: Ged is a metric distance function. While Sed is not metric due to being asymmetric, it satisfies triangle inequality, non-negativity, and subgraph-identity. Several higher-order tasks such as clustering and indexing rely on such properties {{cite:29d54fa5079f3b8f9064a21f513d1e0903a50474}}, {{cite:2f5c10f51f1ffec697e00e8dbcc738ed5baf971a}}, {{cite:9745eefcc6c205deb5f99771a130e415723c7944}}, {{cite:b9019ba7c600222868816721a19ec73d48946df3}}, {{cite:45c81f9f3b4a617ab19ce9c3ab28e339952e0ca6}}, {{cite:0195ddb26f6d352644ea328d46350304c952f9d4}}, {{cite:f124437a12862968ddaef4ec0ba0161b1fe60de7}}, {{cite:97d03f6716462c86cfdc190fce0b5a00056eb06e}}, {{cite:a1a8167604762302edf05eb2a67265afdf4164c3}}. Existing neural approaches do not preserve these properties, which limits their usability for these higher order tasks.Pair-independent embedding: There is little scope for pre-computation in existing approaches (either neural or non-neural), as the major computations are pair-dependent, i.e., both {{formula:4c9b0673-bff0-4432-ac7b-863270c8440a}} and {{formula:7beac0a1-bb23-4eff-9621-0639e6f8967e}} need to be known. In a typical graph querying framework, the graph database is known apriori; only the query graph is provided at runtime. If we can generate pair-independent embeddings, and make efficient predictions directly in the embedding space, then retrieval can be sped up tremendously by pre-computing and indexing the embeddings of the database graphs beforehand.Learning with low-volume data: Generating a large amount of high quality training data is computationally prohibitive for Sed/Ged. So, an effective model should encode powerful priors for Sed/Ged prediction, to enable generalization even with scarce training data.{{figure:6c2d57e6-e95b-4f6c-9d19-03c92d5d7c09}}", "We address these challenges by a novel architecture called NeuroSed. Our key contributions are:", "Novel formulation: We formulate the problem of learning subgraph edit distance (Sed) for graphs. Since Sed is more general than subgraph isomorphism and Ged, the proposed theory extends to prediction of Ged, graph isomorphism and subgraph isomorphism.Neural architecture: NeuroSed utilizes a siamese graph isomorphism network {{cite:e756492184970ecbc0dd07531b7c8cac70b31306}} to embed graphs in a pair-independent fashion to an embedding space over which a simple function can predict the Sed (or Ged). The same embedding model is used for both {{formula:134e8d0c-1f3c-42a5-bb29-08c8347ee098}} and {{formula:2fc44b01-4c12-4b9f-8493-4afbf96293af}} , which captures the prior that similar topological properties need to be considered for both graphs. The carefully crafted prediction function serves as another inductive bias for the model, which, in addition to enabling high generalisation accuracy, preserves the key properties of Sed/Ged, which is a major contribution of our work over existing neural approaches.Indexable embeddings: The prediction function satisfies triangle inequality over the embedding space for both Sed and Ged. This allows utilization of the rich literature on index structures {{cite:b63ecabef93b7f99775012c202f7f512325e9e19}}, {{cite:89e1c5212455a33843755c5f2c425eede739ec7d}}, {{cite:16072e838004fe69ce9b051413a4c971945537ea}} for boosting querying efficiency.Accurate, Fast and Scalable: Extensive experiments on real graph datasets containing up to a million nodes establish that NeuroSed is more accurate in both Ged and Sed when compared to the state of the art and is more than 3 orders of magnitude faster in range and {{formula:9e8f8f38-31f8-45ea-bef5-100cff697a6e}} -NN queries." ]
[]
DIAR: Removing Uninteresting Bytes from Seeds in Software Fuzzing
Software fuzzing mutates bytes in the test seeds to explore differentbehaviors of the program under test. Initial seeds can have great impact on theperformance of a fuzzing campaign. Mutating a lot of uninteresting bytes in alarge seed wastes the fuzzing resources. In this paper, we present thepreliminary results of our approach that aims to improve the performance offuzzers through identifying and removing uninteresting bytes in the seeds. Inparticular, we present DIAR, a technique that reduces the size of the seedsbased on their coverage. Our preliminary results suggest fuzzing campaigns thatstart with reduced seeds, find new paths faster, and can produce highercoverage overall.
[ "In this section, we first discuss closely associated work to DIAR's delta-debugging adaptation for test case reduction. Then, since our work aims to analyze the impact of test case reduction on AFL's performance, we present some of the techniques that have been integrated in coverage guided fuzzers to improve their performance.", "Delta-debugging based test case reduction. The traditional delta-debugging algorithm {{cite:2e02acdd671e097e8a1a5f1de51e0727b001f07e}} accepts a failing test case as input and iteratively reduces it by testing candidate sub-parts and removing parts that do not impact the failure outcome, until the smallest such test case is obtained. This work was extended to perform reduction while preserving arbitrary properties of the input test, rather than just its failing property {{cite:e187910e94bf6bf330ee4cba16e2eb7bbf32f00b}}, {{cite:97cb1d44bcad4f36d27c5ffc5d3ad9a437164d84}}. To speed up computation of reduced seeds, the property preserving requirement in delta-debugging was relaxed in Alipour et al.'s reduction approach {{cite:4c393a72b56a8c90710447189828c29200d5c922}} in order to allow candidate test cases to be non-adequate, i.e. to partially preserve some property. The fact non-adequate test cases can also be useful, further emphasized the practicability of this modified delta-debugging method, which was thereby adapted in DIAR. Analogously, this modified approach was also used in evaluating neural code intelligence models, where it was adapted to reduce input programs {{cite:17857609f183953f8b84ea8df5e10c2954f60f23}}. Other optimizations to delta-debugging include hierarchical delta-debugging {{cite:2ed2f91ad6089e5e88e34875ced904239b6fd964}}, where test cases are reduced in a structure-aware manner in order to minimize the generation of invalid tests, and parallelization {{cite:0577718e28c22aac402bbdfc9435a36dfd1c8cea}}.", "Approaches for improving coverage guided fuzzing. While there have been many approaches to improve fuzzing performance, here we discuss four strategies that have been deployed:", "1. Internal test case reduction. In order to introduce smaller test case generation within fuzzing, Hatfield-Dodds developed Hypofuzz {{cite:c338de26ab3924a01e3e98702b2c9e0df9ac5af4}}, a fuzzing backend that leverages Hypothesis {{cite:da78153c341a457cccdf263ead0fd5108fd5ebd8}}, a popular property-based testing library for Python. Hypothesis uses internal reduction {{cite:a4c622673cc77369cb9d39e091374e1829c06fd5}}, which manipulates the test case generator such that the generator itself outputs smaller interesting test cases. It does so by manipulating the random behavior of pseudo-random number generators (PRNG), which are typically used in test case generators. A PRNG generates choice sequences of bits,where each bit corresponds to a non-deterministic binary decision. By using shortlexoptimization {{cite:a4c622673cc77369cb9d39e091374e1829c06fd5}}, Hypothesis reduces the lengths of these choice sequencesin order to generate smaller test cases.", "2. Selective tracing. Wasteful tracing in fuzzers has been targetted by researchers. E.g. UnTracer {{cite:c5aa30e43b15c1cd5bac1ee2607e45b380a2fe2c}} improves the efficiency of coverage-guided fuzzers like AFL and Driller {{cite:bc18de73584981ba3fe028f4d22de6f8acb2f9ec}}, {{cite:b0adbe35d50c7a3dfe3ea335a6ed0665788b8780}} by eliminating tracing of generated test cases that do not increase coverageIn their evaluation, they found less than 1 in 10,000 of all test cases are coverage-increasing in conventional coverage guided fuzzers.. They instrument thetarget binary such that the binary self-reports whether a test case increasedits coverage, thereby gaining in efficiency from the native speeds of thebinaries' executions.", "3. Structure-aware fuzzing. Wasteful fuzzer performance is also contributed by the generation of meaningless test cases, which has been addressed by grammar-based fuzzers like Peach {{cite:3a688437fd82c2fa25ee6d3a415dfc691fd30101}}, LangFuzz {{cite:901f2be3de30d004ce3bcbf8546c23463fbde016}}, Sulley {{cite:83e6313144448fd0253b0ce9ea355ccbe26e6391}}, CSmith {{cite:3e323fa7225495c41a0e2d9ea250f2f988aec45f}}, and Jsfunfuzz {{cite:03e444f7b38e54853a0f562fcb8dbf416ef83efc}}. However, the need to know and provide grammar specifications has been a major drawback of grammar-based fuzzers.Grimoire {{cite:b261e595b05e2945c44489a7e5252ec5aa386c14}} overcomes this by learning the structure of the input during fuzzing, handling inputs in libxml2,SQLite, Lua, and JavaScriptCore. A similar tool that also learns from inputs isSkyfire {{cite:8334b64f4a71cc39ad03dbd4bfaf1e864bacce83}}.", "4. Smart Mutation Scheduling. Coverage-guided fuzzers have also been made more efficient by modifying their testcase mutation scheduler (for e.g. {{cite:d26bbc994e8e83112f813cd6d6ec5d341cbd2e38}}, {{cite:46f1d13d6f5b549eba6e5deee06e186a17903f6a}}, {{cite:3d6595b89f6482b9c75a01eb37cdc097e4acfbe2}}). MOPT {{cite:d26bbc994e8e83112f813cd6d6ec5d341cbd2e38}} has been shown to be among the most effective of these techniques in finding bugs – it uses a modified versionof the particle swarm optimization algorithm to find an optimal selection probabilitydistribution of mutation operators." ]
[]
Learning Multi-granularity User Intent Unit for Session-based Recommendation
Session-based recommendation aims to predict a user's next action based onprevious actions in the current session. The major challenge is to captureauthentic and complete user preferences in the entire session. Recent workutilizes graph structure to represent the entire session and adopts GraphNeural Network to encode session information. This modeling choice has beenproved to be effective and achieved remarkable results. However, most of theexisting studies only consider each item within the session independently anddo not capture session semantics from a high-level perspective. Such limitationoften leads to severe information loss and increases the difficulty ofcapturing long-range dependencies within a session. Intuitively, compared withindividual items, a session snippet, i.e., a group of locally consecutiveitems, is able to provide supplemental user intents which are hardly capturedby existing methods. In this work, we propose to learn multi-granularityconsecutive user intent unit to improve the recommendation performance.Specifically, we creatively propose Multi-granularity Intent HeterogeneousSession Graph which captures the interactions between different granularityintent units and relieves the burden of long-dependency. Moreover, we proposethe Intent Fusion Ranking module to compose the recommendation results fromvarious granularity user intents. Compared with current methods that onlyleverage intents from individual items, IFR benefits from different granularityuser intents to generate more accurate and comprehensive sessionrepresentation, thus eventually boosting recommendation performance. We conductextensive experiments on five session-based recommendation datasets and theresults demonstrate the effectiveness of our method.
[ "In this section, we review the related work for session-based recommendation.", "Inspired by the fact that similar users tend to buy similar items, the earliest session-based methods are mostly based on nearest neighbors {{cite:97f7927bac744abc4c0156469b0a6860851b246d}}, {{cite:56c99707b380859400e852e9573bfde324e28a7f}}, {{cite:0e8be70f0d85424c07445cdb48fab5358013b822}}. These methods need a similarity function to compute similarity scores. Then some approaches notice that exploiting sequential behavior is beneficial to predict the next item. Some of them employ Markov chain  (MC) to capture the sequential signal of interactions. For example, Rendle et al. {{cite:c39749e2bd107680e735476b2501183317dd64e8}} propose factorization of personalized Markov chains  (FPMC) to capture both sequential user behavior and long-term interest. King et al. {{cite:0dd17c2f9a49af8c800baccaa70be3f2b6ed2323}} propose a hierarchical representation model (HRM) to improve FPMC with a hierarchical architecture. However, Markov chain-based methods are usually unable to capture more complex higher-order sequential patterns.", "The rapid growth of deep learning methods brings significant performance gain on session-based recommendation. Recently proposed neural-based methods employ sequential structure neural networks like RNNs {{cite:26b2fe165852d763b35a8c452185626bb745a95d}}, {{cite:c30447e98d11762625043f4ff4c548e1108b64ce}} to capture the user's sequential behavior. For instance, Balázs et al. {{cite:420cae7818cdf84ddd5c82abab50bcc7e283906a}} propose GRU4Rec to use the gated recurrent unit (GRU) {{cite:c30447e98d11762625043f4ff4c548e1108b64ce}} to model user sequential behavior, Tan et al. {{cite:6671730966053e0231088df36398775f254543e6}} apply data augmentation and generalized distillation to improve GRU4Rec and Li et al. {{cite:54397b4f3ace3e8d619ca8beac9dbf15ae1a0931}} propose to use attention mechanism to improve the representation capacity of RNNs. In addition, as sessions can be very limited as in-progress information, the neighbor information is introduced to assist in modeling ongoing sessions {{cite:51b48f60eaa65faac9667d5c09bd3a53920a655b}}, {{cite:00995d6e40242e2050569506ad4ee735cefa60eb}}, {{cite:a243c270eae38c6ff7d2d34d00751bb16cafbce6}}. For example, Jannach and Ludewig {{cite:51b48f60eaa65faac9667d5c09bd3a53920a655b}} introduce a neighborhood session using the K-nearest neighbor (KNN) method. Unlike traditional KNNs, Wang et al. {{cite:a243c270eae38c6ff7d2d34d00751bb16cafbce6}} propose CSRM to incorporate neighbor sessions information via memory network {{cite:b663c57d5ec144c2e90110286ceb4fa6b60658a2}}, {{cite:cecbef15ef56b938f26bdd69b5ace9a4b57760cc}}. To learn better session representation, in NARM {{cite:54397b4f3ace3e8d619ca8beac9dbf15ae1a0931}} an attention pooling method is proposed and is widely applied in subsequent neural recommendation methods {{cite:12f0c8d5dc3d90494d13b41fcde3eab24638b168}}, {{cite:a2e807d843e48d307fbc57d5da16393f93d3a615}}, {{cite:1c2b89f0b4027be6f149e71ee4f94eeebe4d96d2}}, {{cite:d0ff11b5e6851a6537c6a18ba7fafe76008d8fd7}}, {{cite:7d0d53e2706858721465abb542073a6254114a50}}, {{cite:61fbc75ed4f6171d0819e803b882311dd69b2841}}. Specifically, these methods use global and local preference to make a recommendation. However, they still consider single items as the base recommendation units thus lack the description of in session combined information.", "Graph neural network (GNN) is introduced to capture the complex transition relationships of sessions {{cite:d0ff11b5e6851a6537c6a18ba7fafe76008d8fd7}}, {{cite:1c2b89f0b4027be6f149e71ee4f94eeebe4d96d2}}, {{cite:7d0d53e2706858721465abb542073a6254114a50}}, {{cite:0de133cd1285d94bbfcf66e9ec1cda6471d34eec}}, {{cite:a2e807d843e48d307fbc57d5da16393f93d3a615}}. For instance, SR-GNN {{cite:0de133cd1285d94bbfcf66e9ec1cda6471d34eec}} takes transition relations between adjacent items to construct unweighted session graphs and uses gated graph neural network  (GGNN) {{cite:d11b6955fcb771e2c3b7a68208829f304b68a90a}} to extract the transition information. Based on this work, Xu et al. {{cite:1c2b89f0b4027be6f149e71ee4f94eeebe4d96d2}} propose a method that uses a GGNN to extract local context information and a self-attention network  (SAN) to capture global dependencies between distant positions. These GNN-based methods have shown a new and promising direction for session-based recommendation, while the constructed session graph faces a lossy session encoding problem. To alleviate such problem, Chen and Wong {{cite:7d0d53e2706858721465abb542073a6254114a50}} propose lossless edge-order preserving aggregation and shortcut graph attention to efficiently aggregate information and make a recommendation. To propagate information more efficiently in long sessions, Pan et al. {{cite:a2e807d843e48d307fbc57d5da16393f93d3a615}} propose to use a star node to bridge items. The newly added star node can filter out irrelevant items, thus make better recommendations on long sessions. However, all these works take single items as intent unit and ignore the consecutive combined user behavior of a group of items, thus losing the recommendation accuracy.", "Some works employ Hypergraphs {{cite:e7681bca274cc9034a54a59e7e83275ce64b54d3}} to enhance item representation {{cite:9f08e9918e8fb7b415dba3222652121cfc2bf1cf}}, {{cite:d0ff11b5e6851a6537c6a18ba7fafe76008d8fd7}}. Xia et al. {{cite:9f08e9918e8fb7b415dba3222652121cfc2bf1cf}} take each session as a hyperedge to model cross-session item relationship, and Wang et al. {{cite:d0ff11b5e6851a6537c6a18ba7fafe76008d8fd7}} propose SHARE that uses a sliding window to construct a hypergraph of a single session to capture group intent. However, such hypergraph structure loses the user sequential behavior information, i.e., the sequential order of items. In addition, the last attention pooling only uses the item representation to generate session representation which can not fully utilize the user intent information from all intent unit granularity levels." ]
[]
A Spectral Method for Joint Community Detection and Orthogonal Group Synchronization
Community detection and orthogonal group synchronization are both fundamentalproblems with a variety of important applications in science and engineering.In this work, we consider the joint problem of community detection andorthogonal group synchronization which aims to recover the communities andperform synchronization simultaneously. To this end, we propose a simplealgorithm that consists of a spectral decomposition step followed by ablockwise column pivoted QR factorization (CPQR). The proposed algorithm isefficient and scales linearly with the number of edges in the graph. We alsoleverage the recently developed `leave-one-out' technique to establish anear-optimal guarantee for exact recovery of the cluster memberships and stablerecovery of the orthogonal transforms. Numerical experiments demonstrate theefficiency and efficacy of our algorithm and confirm our theoreticalcharacterization of it.
[ "Given the practical importance to a variety of applications, either community detection or group synchronization has been extensively studied over the past decades. Due to the vast volume of literature, we are not able to present a complete review of all previous works but only highlight the most related ones to this work. Community detection aims to find the underlying communities within a network by using the network topology information. It is commonly studied under the stochastic block model (SBM) {{cite:1e59297d02d035f404085eb8b93c77180d16f23b}}, {{cite:400b9f976f12a0cf57baaf7d4cb41de4894f758a}}, {{cite:a796917e6e6882c1e71615c927d0959a2925d3c8}} where obtaining the maximum likelihood estimator for clustering is often NP-hard. Therefore, different approaches such as semidefinite programming (SDP) {{cite:a4bd67c18d7afed7bda6920d294b4535d1236e68}}, {{cite:83e8fdce8c176b8f4feef3ff00f1bc2c8831a78e}}, {{cite:78caf7c136083e44fb956d299ef8eccb7c225b5c}}, {{cite:084ad86126bfbf780c3c77f8f39cab01c7ef7b2b}}, {{cite:9aafe629cc2ad372052ab3ec49e1ec43c2481f43}}, {{cite:5c588e666cf500ce5dfe5de1ea2d6b91dd56c3d1}}, {{cite:5520de95d1837dccdebb6ed5b4417ecb1ce004d4}}, spectral method {{cite:464176052b7074836aeed11fe8dad704e5226c7e}}, {{cite:024ac5b3cae28c0ce3cfc45662bd08e00b2647aa}}, {{cite:bc1d2e6203cd49d204901bbdf8c2f374fbeb2242}}, {{cite:7f0592b7193f413b172b44c3821f3224e3e859ab}}, {{cite:439dd1caf76415009ffbac0b3d44b57631be1ebc}}, {{cite:acbed09f043b7a01d70138c713f734d044d76966}}, and belief propagation {{cite:5078ebc64fbcfd775f4bb194b0aec3a2df2bc9a0}}, {{cite:46203b7bae385f17a146ddb524cf97ff9ec86670}} are considered for a practical solution. In particular, semidefinite relaxation has shown effectiveness {{cite:83e8fdce8c176b8f4feef3ff00f1bc2c8831a78e}}, {{cite:78caf7c136083e44fb956d299ef8eccb7c225b5c}}, {{cite:a4bd67c18d7afed7bda6920d294b4535d1236e68}}, {{cite:084ad86126bfbf780c3c77f8f39cab01c7ef7b2b}} in achieving the information theoretic limits of SBM presented in {{cite:a4bd67c18d7afed7bda6920d294b4535d1236e68}}, {{cite:46203b7bae385f17a146ddb524cf97ff9ec86670}}. However, solving large-scale SDPs is still highly nontrivial. In contrast, algorithms based on spectral method are generally much more efficient, and has also been theoretically proved to match the information theoretic limits in the SBM with two equal-sized clusters {{cite:464176052b7074836aeed11fe8dad704e5226c7e}}, {{cite:bc1d2e6203cd49d204901bbdf8c2f374fbeb2242}}, {{cite:0be3b1c2b3b0bfd21762b8706ece7c5268a82db3}}. This motivates the proposed method, which extended the spectral method in {{cite:94cd7db7c5c191d24d4436c200f9007d69757abc}} for clustering, to solve our joint problem.", "On the other hand, group synchronization wants to recover the underlying group elements {{formula:74a21637-52a9-4239-b895-3edf3e98c1aa}} from a set of noisy pairwise measurements {{formula:eff97d3b-a108-494c-9a92-670102687856}} . A common approach is the least square estimator which is usually NP-hard. Instead, similar to the development of community detection algorithms, convex relaxations such as semidefinite relaxation {{cite:dec55c99e288c1ad22a4be43453523dc6e0a4d3e}}, {{cite:96132d2748323ed6a4cb9601bd763d71b91904f3}} and spectral methods {{cite:dec55c99e288c1ad22a4be43453523dc6e0a4d3e}}, {{cite:57270d0758c99ec1857d7852f975be3887eb1ae9}}, {{cite:c206dff8234528e5ef197ed6c0fa3e399044842a}}, {{cite:a6ba1bc9c46c16d3ff03afe0ab4e28c7108c0f7b}}, {{cite:f85fa151f2e2649b56f5c52f615b448d1be79aac}}, {{cite:6678a757b2f769782bef163feb9655c9c195666d}} have shown to be powerful, along with many investigations of their theoretical properties {{cite:dec55c99e288c1ad22a4be43453523dc6e0a4d3e}}, {{cite:85592185c09ca1e2d5d041d73193545fb3d77600}}, {{cite:6197a19dd663c85437ada3a30b62b7a6f9408175}}, {{cite:96132d2748323ed6a4cb9601bd763d71b91904f3}}, {{cite:7d9f48edb309e8f61029ab42ccad6f24b9c85698}}. Again, spectral method based algorithms are generally more favorable and appealing than SDPs due to its computational efficiency.", "The joint community detection and synchronization is a relatively new topic, motivated by recent scientific applications such as cryo-electron microscopy as mentioned before. In {{cite:0a0f17d2b2f70a60b87eb47af2a622118be3aba9}}, the authors addressed simultaneous permutation group synchronization and clustering via a spectral method for simultaneously mapping and clustering 3D object volumes. In {{cite:c3b057b21d95e8c406b07e249c076a15e26f210d}}, as motivated by the cryo-EM single particle reconstruction problem, the authors proposed a harmonic analysis and SDP based approach for solving the rotational alignment and classification of 2D projection images simultaneously. The recent work {{cite:229ba1181702d3a5bc6316d1fed6ca8cbbfd2a3e}} by the authors of this paper proposed several SDPs and gave theoretical conditions for exact recovery for the probabilistic model considered. In this work, we propose an alternative spectral method based algorithm, which greatly reduces the computational complexity of SDP and obtains competitive performance compared to the existing methods.", "Besides the algorithm itself, a significant contribution of this work is to provide a near-optimal performance guarantee for exact recovery under the probabilistic model. This requires analyzing the perturbation of the eigenvectors of a low rank matrix corrupted by random noise. Such problem is a classic topic in matrix perturbation theory {{cite:6706b113f878fbf5ce5f3c9dce6591a5f3483623}}, {{cite:8fb945fb82a69bac402458f73f7a2aedb7e92bc9}}, {{cite:9ccd64570483c026ba1eb0d38639bf3fbcdb39b2}}, where a naive {{formula:e3627318-34ed-45ef-a5cf-fcba853b815c}} or Frobenius norm error bound can be easily obtained by Davis-Kahan theorem {{cite:4a7ad44f227edd8485f2f41e3eeb6eabab3a93a8}}. However, such result is not sufficient for exact recovery since it measures the “average” error, and if the error is concentrated on several entries (or blocks if each node is represented by a matrix instead of a scalar), exact recovery is not guaranteed. Instead, an {{formula:75654cab-d598-4f52-9d8d-69932b70e4e9}} normtype error bound is necessary for exact recovery since it bounds the error entrywisely (or blockwisely). Fortunately, in the past years we have seen a surge of developments on {{formula:5d5b4afe-f052-406f-9460-ea011a5ee714}} norm bounds. Most of them (e.g. {{cite:464176052b7074836aeed11fe8dad704e5226c7e}}, {{cite:85592185c09ca1e2d5d041d73193545fb3d77600}}, {{cite:17804eb7f69527a14c7625bada9e8d20f9be178a}}, {{cite:5a1d0212ba1d995e427ec4d0ff2ab2c862c828d1}}, {{cite:fc3dbdcef29815fa95d9e7c5dd4b6bf602a60163}}, {{cite:6197a19dd663c85437ada3a30b62b7a6f9408175}}) are based on the leave-one-out technique proposed in {{cite:464176052b7074836aeed11fe8dad704e5226c7e}}, {{cite:85592185c09ca1e2d5d041d73193545fb3d77600}}.In particular, our analysis greatly benefits from {{cite:464176052b7074836aeed11fe8dad704e5226c7e}}, which provides an entrywise error bound of the leading eigenvector of low-rank matrices, and also {{cite:6197a19dd663c85437ada3a30b62b7a6f9408175}}, which extends {{cite:464176052b7074836aeed11fe8dad704e5226c7e}} to consider block matrices and gives a blockwise bound on multiple eigenvectors. Results by other approaches exist such as {{cite:f18866e6932237e86102f10d1fd47b58a19aea37}}, {{cite:154f4f3ed44cd182a4bbc129251d95bed44baeae}}. Specifically, {{cite:154f4f3ed44cd182a4bbc129251d95bed44baeae}} introduces deterministic row-wise perturbation bounds for orthonormal bases of invariant subspaces of symmetric matrices. Such bounds can be applied to general forms of the perturbation matrix. Compared to {{cite:154f4f3ed44cd182a4bbc129251d95bed44baeae}}, the leave-one-out technique can exploit the independence of random variables involved and thus achieves sharper bounds in our setting. Here, our contribution lies in handling the additional cluster structures and analyzing the QR factorization.", "We summarize our contributions in the following: (1) We introduce a novel algorithm for joint community detection and orthogonal group synchronization, which consists of three simple steps: a spectral decomposition followed by a blockwise column-pivoted QR-factorization (CPQR), and a step for cluster assignment and group element recovery. (2) A variant of CPQR, called blockwise CPQR, is designed to deal with the block matrix structure induced by the {{formula:84f38451-da1d-4bfa-8203-b43b2dae56d0}} group transformation.(3) Under the probabilistic model, a near-optimal performance guarantee is established for exact recovery of the clusters memberships and stable recovery of the orthogonal transforms. (4) We demonstrate the efficacy of our method and verify the theoretical characterization of the sharp phase transition for recovery, via a series of numerical experiments." ]
[]
Combining Improvements for Exploiting Dependency Trees in Neural Semantic Parsing
The dependency tree of a natural language sentence can capture theinteractions between semantics and words. However, it is unclear whether thosemethods which exploit such dependency information for semantic parsing can becombined to achieve further improvement and the relationship of those methodswhen they combine. In this paper, we examine three methods to incorporate suchdependency information in a Transformer based semantic parser and empiricallystudy their combinations. We first replace standard self-attention heads in theencoder with parent-scaled self-attention (PASCAL) heads, i.e., the ones thatcan attend to the dependency parent of each token. Then we concatenatesyntax-aware word representations (SAWRs), i.e., the intermediate hiddenrepresentations of a neural dependency parser, with ordinary word embedding toenhance the encoder. Later, we insert the constituent attention (CA) module tothe encoder, which adds an extra constraint to attention heads that can bettercapture the inherent dependency structure of input sentences. Transductiveensemble learning (TEL) is used for model aggregation, and an ablation study isconducted to show the contribution of each method. Our experiments show that CAis complementary to PASCAL or SAWRs, and PASCAL + CA provides state-of-the-artperformance among neural approaches on ATIS, GEO, and JOBS.
[ "Neural semantic parsing has achieved promising results in recent years, where various sophisticated seq2seq models have been applied.Many works focus on integrating the syntax formalism of target representation into the decoder of the seq2seq model.For instance, hierarchical tree decoders are applied in {{cite:2633f96a6c10e6059556198b20be46a09a00a893}}, {{cite:5d0482b0495d67a8db64addb42242cac414a552a}} to take into account the tree structure of the logical expression. Sequence-to-tree (seq2tree) model {{cite:2633f96a6c10e6059556198b20be46a09a00a893}} updates the decoder by hierarchical tree-long short-term memory (Tree-LSTM), which helps the model to utilize the hierarchical structure of logical forms.{{cite:dc6d226321c16fd1849a204219e9945129700c85}}, {{cite:5d0482b0495d67a8db64addb42242cac414a552a}}, {{cite:bde4ee36e10663da11f89158a500f39a4fc1fba1}} first map a natural language sentence into an abstract syntax tree (AST), then serve it as an intermediate meaning representation and incorporate it with grammar rules, finally parse the AST to the corresponding target logic form.", "On the other hand, there are few works on incorporating syntax information of input natural language sentences to the encoder.Graph-to-sequence (graph2seq) model {{cite:da1a3079e9e1be5ddaf8b3b30f975d3f5a2f0374}} constructs a graph encoder to exploiting rich syntactic information for semantic parsing.", "It has shown that syntax information of input natural language sentences can be helpful for the encoder in neural machine translation (NMT) tasks {{cite:5c50fd844e48a4882bd1f2e90fc2e5ad2275f0cb}}.In specific, {{cite:7342d001771643d67d53ecdddc5160a294a25fbe}} places parent-scaled self-attention (PASCAL) heads, which can attend to the dependency parent of each token, in the Transformer encoder to improve the accuracy of machine translation.{{cite:9155327c05e42705c04b530a4750e0e4dbbd3402}} concatenates syntax-aware word representations (SAWRs), i.e., the intermediate hidden representations of a neural dependency parser, with ordinary word embedding to enhance the Transformer encoder.{{cite:4f7ba290a81c83afcb9ad70b5cc472c0db56859a}} introduces constituent attention (CA) module, which adds an extra constraint to attention heads to follow tree structures that can better capture the inherent dependency structure of input sentences.In this paper, we examine these ideas in semantic parsing and empirically study their combinations." ]
[]
An Ensemble of Pre-trained Transformer Models For Imbalanced Multiclass Malware Classification
Classification of malware families is crucial for a comprehensiveunderstanding of how they can infect devices, computers, or systems. Thus,malware identification enables security researchers and incident responders totake precautions against malware and accelerate mitigation. API call sequencesmade by malware are widely utilized features by machine and deep learningmodels for malware classification as these sequences represent the behavior ofmalware. However, traditional machine and deep learning models remain incapableof capturing sequence relationships between API calls. On the other hand, thetransformer-based models process sequences as a whole and learn relationshipsbetween API calls due to multi-head attention mechanisms and positionalembeddings. Our experiments demonstrate that the transformer model with onetransformer block layer surpassed the widely used base architecture, LSTM.Moreover, BERT or CANINE, pre-trained transformer models, outperformed inclassifying highly imbalanced malware families according to evaluation metrics,F1-score, and AUC score. Furthermore, the proposed bagging-based randomtransformer forest (RTF), an ensemble of BERT or CANINE, has reached thestate-of-the-art evaluation scores on three out of four datasets, particularlystate-of-the-art F1-score of 0.6149 on one of the commonly used benchmarkdataset.
[ "Cybercriminals leverage malware to exploit any device or system to steal sensitive data and hence cause enormous problems for victims. Analyzing and classifying incoming malware helps us define the problem and understand how to recover from the damage as quickly as possible.", "There are two techniques most commonly used in malware analysis, static analysis and dynamic analysis. Static analysis is a process of malware analysis that analyzes the given malware without running it. Unlike static analysis, a given malware file is executed in an isolated environment to avoid harming the computer system in dynamic analysis.", "Malware developers may implement various techniques to evade detection mechanisms such as code obfuscation, dynamic code loading, polymorphism, and metamorphism. For instance, the MD5 hash based detection method can be easily bypassed by malware authors with the methods mentioned above. As these methods cause the binary of the file to change, they also cause a change in the hash of the file. While the hash of the malicious file is changed and the file is defined as benign, the behavior of the file, thus its effect, remains unchanged {{cite:419ab8183035a4d4e6aa0541b19a9d1bf9513066}}.", "Since dynamic analysis requires the execution of a given sample to be monitored and observed in an isolated environment, malware even written with code obfuscation techniques hardly eludes dynamic analysis contrary to static analysis. This identified situation provides dynamic analysis to be more robust than static analysis {{cite:937a79a9994d23860c871a1235889fd1be5dd31c}}.", "Performing dynamic analysis requires more time than static analysis and organizations are dealing with millions of attacks carried out in a day.These shortcomings provide an excellent opportunity for machine learning to collaborate with dynamic and static analysis since machine learning can handle large volumes of data {{cite:c9f3944f1ee2d38b49ab1dce4f625162731e216f}}.", "In the malware detection and classification process, understanding malware behavior is one of the substantial parts of detecting and classifying malware. API calls are obtained by tracing the sequences of calls by way of calling operating system services such as creating a file and allocation of virtual memory by malware samples. Since API call sequences generate specific behavioral patterns and hence represent malware families, they can be considered as one of the most distinguished features among malware families {{cite:b1854b58b9a150961b8e0f876c966607b09706b2}}, {{cite:3fa57d804c90d0f61f5e378bd5d89b0349475227}}.", "Related studies about base models for malware analysis using API calls and transformer-based models on sequence problems will be examined respectively in the rest of this section." ]
[]
GPU Accelerated Voxel Grid Generation for Fast MAV Exploration
Voxel grids are a minimal and efficient environment representation that isused for robot motion planning in numerous tasks. Many state-of-the-artplanning algorithms use voxel grids composed of free, occupied and unknownvoxels. In this paper we propose a new GPU accelerated algorithm forpartitioning the space into a voxel grid with occupied, free and unknownvoxels. The proposed approach is low latency and suitable for high speednavigation.
[ "Numerous 3D space representations exist such as signed distance fields {{cite:17a84086db7656b708218ef6dabdba7b590cb371}} {{cite:ddde5f16bdf0dcc30ecaf058c0bb94f5bfb95e2a}}, octrees {{cite:7b93d5e63b9aaeae151952775bc2fd4195fddb93}} {{cite:21f99a12d05ea5fd977620faccbe10efba608a14}}, and voxel grids {{cite:864078d728c49e44ce65d886218596c01a9fe02e}}.", "Signed distance fields grids include in every voxel information about the distance and gradient against obstacles and is essential for gradient-based planning methods. The advantage of voxel grids over signed distance fields is processing time, since they don't need to calculate the distance of every voxel to the closest obstacle.", "Octrees are a tree data structure where each node has eight children. Octree based representations such as Octomap {{cite:7b93d5e63b9aaeae151952775bc2fd4195fddb93}} are an efficient probabilistic 3D representation of the environment. The advantage of voxel grids over octrees is the constant voxel access (read/write) time.", "In {{cite:b623945e2208a12d536344a2a6522f9aee5cce8a}}, the authors use General PurposeGraphics Processing Unit (GPGPU) to populate the voxel grid. However they focus on fast collision detectionand don't address the problem of unknown voxels generation, which is essential for some planning methods.", "In {{cite:864078d728c49e44ce65d886218596c01a9fe02e}} authors use {{cite:f8e2a3264a3d6009281b71c8af9150a7a2706d16}} to trace every pixel of the image and free the traversed voxels between the camera center and the pixel depth.This approach leads to a high computational cost and become intractable for medium/high resolution RGB-D cameras." ]
[]
FRuDA: Framework for Distributed Adversarial Domain Adaptation
Breakthroughs in unsupervised domain adaptation (uDA) can help in adaptingmodels from a label-rich source domain to unlabeled target domains. Despitethese advancements, there is a lack of research on how uDA algorithms,particularly those based on adversarial learning, can work in distributedsettings. In real-world applications, target domains are often distributedacross thousands of devices, and existing adversarial uDA algorithms -- whichare centralized in nature -- cannot be applied in these settings. To solve thisimportant problem, we introduce FRuDA: an end-to-end framework for distributedadversarial uDA. Through a careful analysis of the uDA literature, we identifythe design goals for a distributed uDA system and propose two novel algorithmsto increase adaptation accuracy and training efficiency of adversarial uDA indistributed settings. Our evaluation of FRuDA with five image and speechdatasets show that it can boost target domain accuracy by up to 50% and improvethe training efficiency of adversarial uDA by at least 11 times.
[ "Related work for OCS. There are prior works on computing similarity between domains, e.g., using distance measures such as Maximum Mean Discrepancy {{cite:5d41c0709a96c50f603e81e8e98d712963e983e2}}, Gromov-Wasserstein Discrepancy {{cite:5d78d291d25af1d8db73f749978f04541fb982d9}}, A-distance {{cite:9990aabb749a27bd2f8fc91dd92fb3830481c3f9}}, and subspace mapping {{cite:89acd7e47d515d3c6c3202b0eb349567522e2370}}. However, our results in § show that merely choosing the most similar domain as the collaborator is not optimal. Instead, OCS directly estimates the target cross-entropy error for collaborator selection. Another advantage of OCS over prior methods is that it relies on Wasserstein distance which could be computed in a distributed setting without exchanging raw data between domains.", "There are also works on selecting or generating intermediate domains for uDA. {{cite:de8fb959bffdbba0972f8f2a1c5d16ee93584d73}} studied a setting when source and target domains are too distant (e.g., image and text) which makes direct knowledge transfer infeasible. As a solution, they propose selecting intermediate domains using A-distance and domain complexity. However, as we discussed, merely using distance metrics does not guarantee the most optimal collaborator. Moreover, this work was done on a KNN classifier and did not involve adversarial uDA algorithms. {{cite:d948126e71b9473863a15b2fd7fdd2cba7b06dd3}} and {{cite:61d13ffd70fd309833a4e1c6e5bb3acabc28763c}} use style transfer to generate images in intermediate domains between the source and target. Although interesting, these works are orthogonal to OCS in which the goal is to select the best domain from a given set of candidates. Moreover, these works are primarily focused on visual adaptation, while OCS is a general method that can work for any modality. Finally, {{cite:3388cfc5bc05f3da4ccfe22aee93fafac9c5bb2c}}, {{cite:a6facda7c87ed64de29f15d5541a2047b47098e2}} are techniques for incremental uDA in continuously shifting domains. However, in our problem, different target domains may not have any inherent continuity in them and can appear in random order, and hence it becomes important to perform OCS.", "Related work for DILS. There is prior work on distributed model training, wherein training data is partitioned across multiple nodes to accelerate training. These methods include centralized aggregation {{cite:b94398a52dc38c7a106d80ff1ae945ab1ab6875e}}, {{cite:dabf485c8ea31a16b7e1172308bbdcf39d2c8f4c}}, decentralized training {{cite:ac9e47b81a7bf2aa1a715909cf14b0000a2e5b4d}}, {{cite:be01bcbf891b5be442146196874521b862f862b9}}, and asynchronous training {{cite:fb71d3d3d480a89dd56d7f3a6ab302d47311dc7c}}. Similarly, with the goal of preserving data privacy, Federated Learning proposes sharing model parameters between distributed nodes instead of the raw data {{cite:97b97ea015823aa051f249cfe2db91c28d9bd97c}}, {{cite:c3f45a85dfe105932ee7c57880f919f032c11930}}. However, these distributed and federated training techniques are primarily designed for supervised learning and do not extend directly to adversarial uDA architectures. A notable exception is FADA by {{cite:91ddfa2d3115ef32795f7e7e5ca640175afd0146}} which extends uDA to federated learning. As we discussed earlier, FADA is designed for a multi-source setting and assumes that all source domains are labeled. Moreover, it exchanges features and gradients of the feature extractor between nodes after every step. Instead, DILS operates by doing pairwise adaptation through lazy synchronization of discriminator gradients between nodes, which brings significant efficiency gains over FADA.", "Source-free uDA. {{cite:632ec44140ca6f6c6c487067bcc9cb00ae83e563}} and {{cite:0a1a3c6ad65375461b49eda08407fcf8172bd7e7}} are two very promising recent works on source-dataset-free uDA. Although the scope of these works are different from us, we share the same goal of making uDA techniques more practical in real-world settings.{{table:827da4d7-f468-4c9a-8429-89d1d73c314f}}" ]
[]
Automatic Configuration for Optimal Communication Scheduling in DNN Training
ByteScheduler partitions and rearranges tensor transmissions to improve thecommunication efficiency of distributed Deep Neural Network (DNN) training. Theconfiguration of hyper-parameters (i.e., the partition size and the creditsize) is critical to the effectiveness of partitioning and rearrangement.Currently, ByteScheduler adopts Bayesian Optimization (BO) to find the optimalconfiguration for the hyper-parameters beforehand. In practice, however,various runtime factors (e.g., worker node status and network conditions)change over time, making the statically-determined one-shot configurationresult suboptimal for real-world DNN training. To address this problem, wepresent a real-time configuration method (called AutoByte) that automaticallyand timely searches the optimal hyper-parameters as the training systemsdynamically change. AutoByte extends the ByteScheduler framework with ameta-network, which takes the system's runtime statistics as its input andoutputs predictions for speedups under specific configurations. Evaluationresults on various DNN models show that AutoByte can dynamically tune thehyper-parameters with low resource usage, and deliver up to 33.2\% higherperformance than the best static configuration in ByteScheduler.
[ "Communication optimization for distributed training. Generally speaking, there are a wide range of approaches we can explore to optimize the communication for distributed DNN training. These include, but are not limited to: 1) using large mini-batch {{cite:ed799896ec73af07e01cb507d3f84c74ba0ddfce}} and periodic communication {{cite:d4e8ccc9391c7c86aeb177d458a608b6f7ac7913}} to reduce the communication rounds; 2) using gradient compression technique, e.g., gradient sparsification {{cite:3bdfa66bcf2cb3d3cda94ef4982df6d67cb7fe91}} and quantization {{cite:f704911935fbe76656561730c7d04b5da7753c0b}}, to reduce the taffic volume in each iteration; 3) relaxing the synchronization requirement {{cite:9c6231623c99f39118c1cf2d983e2f6a7c7e49f7}}, {{cite:2248903fb25bcc6222144b490f10ac199022b6b6}}, {{cite:dbff246311f41fde2db0a5612d04d7d536a5b496}}; 4) taking the intra-machine GPU topology into consideration {{cite:d17d9edf4408481648c5bce50aa127924c60d69c}}; 5) designing a parameter exchanging scheme considering the network topology {{cite:ed3175f06acc705f0b4710c7de2681a342bb88c6}}; 6) overlapping communication with computation {{cite:ba688956a9b5882add1fefb787c36b06932b2e19}}, {{cite:6169436dae1f7eded40bb9a9c6a7741a32b7c765}}, {{cite:1e4a1ab1ce3a33422bbb4b65f8665dc428bc948b}}; 7) leveraging advanced communication library, e.g., ZMQ {{cite:f9981caf408789357d97c214231326a1c1f8a70a}} and NCCL {{cite:fe6efd769aa244708a8dfc8a16f68d5ba9c75ebb}}; 8) exploiting fast network protocols, e.g., RDMA {{cite:1111744188d87eab118a8ff8d0106ee580623a67}}, {{cite:ee2afefb8a1c1628574cd22257339a0bfd9e020c}}; 9) performing in-network aggregation to reduce the in-network traffic volume {{cite:fe5bced844ff51f9c0c5f0e8728c33c1dbaf7200}}, {{cite:23430b0acd28164a6c808f94063c3a8d1ac13ff0}}, {{cite:1ee35dece715a7024c672ecf8341af15ff6e04c6}}; 10) minimizing network flow completion time by using congestion control {{cite:8d5c40f49af95f0c885a34390b338e54a8cb3f50}}, {{cite:c74b296c4f1892d0436fd78a5544c6aef84a3428}}, flow scheduling {{cite:a19d932b66839300805e2d4490f33597ee0a0113}}, {{cite:210b3ba62025206e94b8dbb6c7d63c737d3d56b0}} or coflow scheduling {{cite:1e78428863dc5221d540ece2ae28f95d7be7ab85}}, {{cite:3a5103244429acc4cdf1766fe746789ffd994488}}, {{cite:d18201cbcea9ac75906d3d1365b56dfefe6f16e7}}, {{cite:284b9beb4e0e21208a18a7292962a899041cd4c9}}. We note that, while some of these methods have already been integrated into distributed DNN training systems, others remain to be explored in the future.", "Automatic parameter configuration. Parameter configuration is necessary for many applications, such as big data analytics {{cite:5f560b2fd9a301a32ad75169a024563816dbd153}}, tuning machine learning hyper-parameters {{cite:d4c8570f7dc0cf4d57f1283e67de32151769fa68}}, and databases {{cite:c2be20f05ddbe8ea6ee66c757eca239f2287d78d}}. Recently, many works focus on automatic configure the parameters. For datacenter congestion control, PCC {{cite:067dd0c384686eb1618646a8fff0b32301bb22a7}} leverages the reinforcement learning to automatically set the congestion windows. For the flow scheduling, AuTO {{cite:c4167e98fd6dd5a77d0dce5ec436f5d578b10c81}} dynamically chooses the suitable priority for each flow. For hyper-parameters tuning of machine learning, AutoML {{cite:4a755185fb9b26f048533d4c39e6947ca67c752d}} can automatically find the optimal setting." ]
[]
Tree exploration in dual-memory model
We study the problem of online tree exploration by a deterministic mobileagent. Our main objective is to establish what features of the model of themobile agent and the environment allow linear exploration time. We study agentsthat, upon entering to a node, do not receive as input the edge via which theyentered. In such a model, deterministic memoryless exploration is infeasible,hence the agent needs to be allowed to use some memory. The memory can belocated at the agent or at each node. The existing lower bounds show that ifthe memory is either only at the agent or only at the nodes, then theexploration needs superlinear time. We show that tree exploration indual-memory model, with constant memory at the agent and logarithmic at eachnode is possible in linear time when one of two additional features is present:fixed initial state of the memory at each node (so called clean memory) or asingle movable token. We present two algorithms working in linear time forarbitrary trees in these two models. On the other hand, in our lower bound weshow that if the agent has a single bit of memory and one bit is present ateach node, then exploration may require quadratic time on paths, if the initialmemory at nodes could be set arbitrarily (so called dirty memory). This showsthat having clean node memory or a token allows linear exploration of trees inthe model with two types of memory, but having neither of those features maylead to quadratic exploration time even on a simple path.
[ "Only node memory.  One approach for graph exploration that uses only node memory is Rotor-Router {{cite:ba062efae538ec461cb44c8908508c915942edd0}}. It is a simple strategy, where upon successive visits to each node, the agent is traversing the outgoing edges in a round-robin fashion. Its exploration time is {{formula:60bf6de0-71d9-433e-8559-bbb73b5ed125}} for any graph with {{formula:394059b1-ce90-4f47-9710-eed5df9a3291}} edges and diameter {{formula:67a0d629-64cf-496d-9cec-91e2a337bbad}}  {{cite:c1c1cdff132312fdadfd7fc5e8fc44217792f75e}}, {{cite:ba062efae538ec461cb44c8908508c915942edd0}}.It is easy to see that this algorithm can be implemented in port-labelled graphs with zero bits of memory at the agent and only {{formula:cc5e09a9-d1a3-4ab0-9bdb-837dc175a6e3}} bits of memory at each node {{formula:0f3036b3-d27f-45a2-8a28-d0c90f640ba9}} with degree {{formula:c52a654a-6b56-4266-b777-8afd6a2b3cb9}} (note that this is the minimum possible amount of memory for any correct exploration algorithm using only memory at the nodes). Allowing even unbounded memory at each node still leads to {{formula:b7a2c5b8-cdcd-4443-b8e2-e05530e782f8}} time for some graphs, and {{formula:4f5972bb-a6d2-4a67-9b9d-419af45ee95b}} time for paths {{cite:f327cba930c22b569f2331db40769f74a0ffcad5}}. Interestingly, these lower bounds hold even if the initial state of the memory at each node is clean (i.e., each node starts in some fixed state {{formula:40d392b9-507d-42a1-a7aa-477678032c5c}} like in CleanMem model).Hence, having only memory at the nodes is insufficient for exploration of trees faster than in quadratic time.", "Only agent memory.  When the agent is not allowed to interact with the environment, then such agent, when exploring regular graphs, does not acquire any new information during exploration. Hence such an algorithm, is practically a sequence of port numbers that can be defined prior to the exploration process. In the model with agent memory, the agent is endowed with some number of bits of memory that the agent can access and modify at any step.If this number of bits is logarithmic in {{formula:1bf6d16b-eaab-41cf-9b4c-4cf1fad42f28}} (otherwise,the exploration is infeasible {{cite:5ce664e613bd7f4efe5506e4c832f8c14a7d7b29}}), then in this model it is possible to implement Universal Traversal Sequences (the agent only remembers the position in the sequence). However, such sequences require {{formula:e9dcfa44-c896-4ecc-a489-8ba241b36ccc}} steps to explore paths {{cite:a9a4e3a3e35f1f3d27ee0a222abc7140cef9626a}}.Best known upper bound is {{formula:29ea2c7d-681d-4bfe-abb6-2ba34f98787b}}  {{cite:5d06f1714b6ab0bff9e62f42d11cd0b42bad06af}} and the best known constructive upper bound is {{formula:2314e59e-12b7-434a-8842-aacc96b259af}}  {{cite:1e04914a675d3c3df9356f13e2e45a199fce2933}}.Memory {{formula:cfc043a9-96ab-4dc5-a540-7bf563b06e7b}} is sufficient and sometimes required to explore any graph with maximum degree {{formula:3f40ed03-8104-43d7-8418-65d6038f67ca}}  {{cite:76a677489b6a12c19d4f5e4cefd7b667ef4388cf}}.For directed graphs, memory {{formula:4971b703-c492-47ff-bafc-63f7123bcb5a}} at the agent is sometimes required to explore any graph with maximum outdegree {{formula:924f9949-355f-4001-9d6f-e27553b238ae}} , while memory {{formula:58efbb52-ee8c-4550-8870-312daaa1848e}} is always sufficient {{cite:20baaf225b7c8e9436d26e060d6fa5549d187f64}}.", "Finite state automata.  An agent equipped with only constant number of bits of persistent memory (independent of the network size and topology and other parameters of the model) can be regarded as a finite state automaton(see e.g. {{cite:3c18c0cc19ad36feea12d3d5d56b4dccd1452e66}}, {{cite:76a677489b6a12c19d4f5e4cefd7b667ef4388cf}}, {{cite:d6ba72f06bc259443a0aa10302a4d5481bc61ff4}}). Movements of such agent, typically modeled as a finite Moore or Mealy automaton, are completely determined by a state transition function{{formula:48055c7a-0d77-40c8-92b9-e40eb0827cf9}} ,where {{formula:201328a7-7b82-4d34-82c7-374f9ddad346}} , {{formula:e123df08-d0cf-439b-8a26-24e2398bb005}} are the agent'sstates and {{formula:58a7721a-04a0-4b05-870a-2742bb0f59f5}} , {{formula:adb993fe-4885-4e4e-81b3-d9c3a1fd254d}} are the ports through which the agent enters and leaves the node {{formula:f926fd53-0ee8-4382-9a3e-f247e7b449f7}} . A finite state automaton cannot explore an arbitrary graph in the setting, where the nodeshave no unique labels {{cite:e6306b31f4e6b04fe1cdf956a7c95d9d971f8c82}}. Fraigniaud et al.  {{cite:76a677489b6a12c19d4f5e4cefd7b667ef4388cf}} showed that for any {{formula:37b8a012-7205-45db-b60e-457c807a3a7e}} and any finite state agent with {{formula:18160532-39f0-400e-bb45-f3ade416739b}} states, one can constructa planar graph with maximum degree {{formula:d0a55560-a3b5-4adb-ab0b-a0060d510f50}} and at most {{formula:7cddc309-e710-437c-ae96-d489ff46b844}} nodes, that cannot be explored by the agent. It is, however, possible in this model to explore (without stop) the trees, assuming thatthe finite state agent has access to the incoming port number (cf. {{cite:5ce664e613bd7f4efe5506e4c832f8c14a7d7b29}}).", "Tokens.  Deterministic, directed graph exploration in polynomial time using tokens has been considered in {{cite:6e9daacce24e10a320414baa32f130d350709d84}}, where the authors show that a single token is sufficient if the agent has an upper bound on the total number of vertices and {{formula:8a2313fe-763a-4063-8419-34b464804b8f}} tokens are sufficient and necessary otherwise. In {{cite:60cb3816a59d97b51be7d4a4097a35cb3a149a80}} the authors proposed a probabilistic polynomial time algorithm that allows two cooperating agents without the knowledge of {{formula:b61b5f16-63c8-4265-909e-d6a6888d654a}} to explore any strongly connecteddirected graph. They also proved that for a single agent with {{formula:69f945b1-f91d-4e72-bafd-efe36c1c7a42}} tokens this is not possible in polynomial time in {{formula:dda4adf1-456b-40f7-a44a-37e0b1330809}} with high probability.In {{cite:d6ba72f06bc259443a0aa10302a4d5481bc61ff4}} it was shown that using one pebble, the exploration with stoprequires an agent with {{formula:e83cadb3-bfcd-48ae-929c-e2a9487542d9}} bits of memory. The same space bound remains true for perpetual exploration {{cite:76a677489b6a12c19d4f5e4cefd7b667ef4388cf}}.", "Two types of memory.  Sudo et al.  {{cite:582e1f43be6bb8ad68821ac37ace40ea732ff867}} consider exploration of general graphs with two types of memory. They show that {{formula:fe46a303-d341-4eb0-986e-a12fc2881429}} bits at the agent and at each node allows exploration in time {{formula:c7cbf744-615d-4199-9432-f6ad2aedf208}} .Cohen et al.  {{cite:3c18c0cc19ad36feea12d3d5d56b4dccd1452e66}} studied the problem of exploring an arbitrary graph by a finite state automaton, which is capable of assigning {{formula:ffbdff91-d2e6-43c4-9b1c-d89a95410d8e}} -bit labels to the nodes. They proposedan algorithm, that – assuming the agent knows the incoming port numbers – dynamically labels the nodes with three different labels and explores (with stop) an arbitrary graph in time {{formula:1a63c4eb-9bcb-4216-b0c5-6ffebd76bbf3}} (if the graph can be labelled offline, both the preprocessing stage and the exploration take {{formula:63d2ac44-8725-4775-9957-70aca26425d4}} steps). They also show that with 1-bit labels and {{formula:3b640db2-c052-460e-bcdf-8ccea00a5020}} bits of agent memory it ispossible to explore (with stop) all bounded-degree graphs of maximum degree {{formula:2878d9ad-066d-48bc-85dd-21a5860da501}} in time {{formula:8e311c01-6658-4bed-8a57-1333e4eaa5e1}} .", "Other approaches.  If we assume that the port number via which the agent entered to the current node is part of the input to the algorithm (such a model is called a model with known inport) thentree exploration in linear time can be achieved by a simple algorithm known in the literature as basic walk {{cite:cb5cb9c10e5c3aa4f74d5b272e1590ab27be471a}}.This algorithm requires no memory (neither at the agent nor at the nodes).However, if we require that the agent terminates at the starting point, then {{formula:5c76b722-cbb7-45d6-914f-de0c5e6476a4}} bits are required if there is only memory at the agent {{cite:5ce664e613bd7f4efe5506e4c832f8c14a7d7b29}}.", "Random walk is a classical and well-studied process, where the agent in each step moves to a neighbor chosen uniformly at random (or does not move with some constant probability). Exploration using this method takes expected time {{formula:7bfb470b-26e9-4ca1-b6a6-17a89ab5bf71}}  {{cite:80cb7fe87d12130e1c35568f52e398b8116a43be}} and {{formula:966b01ce-3b77-4237-8249-0ebfc12f6cf0}}  {{cite:3ef4a3088cf49aeb554a7960dac89c48f45a5414}}, where for each of these bounds there exists a graph class for which this bound is tight.Randomness alone cannot ensure linear time of tree exploration, since expected time {{formula:d1e601f5-72e7-4817-a2f1-ba613a3b9733}} is required even for paths {{cite:affd3f1f6919278156df5d486eacae53b600bf4d}}. However approaches using memory at the agent {{cite:bd0055304f4a431fb4bcf9fb26f1ce0bb3474049}}, local information on explored neighbors {{cite:d35bba5dbb297f3d96bedbe740fecc7510d4752b}}, or local information on degrees {{cite:fab16d7c21a117e81362687b0e07b74bea7c7d3e}} have shown that there are many methods to speedup random walks.", "Finally, to achieve fast tree exploration, usage of multiple parallel agents is possible. A number of papers show that this approach allows to provide faster exploration than using only a single agent in the deterministic model with memory at the agent {{cite:85caaa0700c95e699a1f94a0de919f4dc6008d35}}, {{cite:4b992e12b0ab6f2bc260d47e580184b85c6768e5}}, {{cite:fc5b432c3f388c470a2814ab6f953a8c888cb0ec}}, with memory at the nodes {{cite:a97c44738407b715ab21019ce0e72343cb862612}}, {{cite:14d6b4d9d3838b17f0316be7a782dabb60045bad}}, {{cite:2f751f5f997f096aea2c30313659758d36d141f0}} or using randomness {{cite:85caaa0700c95e699a1f94a0de919f4dc6008d35}}, {{cite:d36089e58e14bd080b70176a248cf5eadc9c69f7}}, {{cite:df28dadd46b424025ec9263aa1f2a373b40c75a9}}." ]
[]
MPCLeague: Robust MPC Platform for Privacy-Preserving Machine Learning
In the modern era of computing, machine learning tools have demonstratedtheir potential in vital sectors, such as healthcare and finance, to deriveproper inferences. The sensitive and confidential nature of the data in suchsectors raises genuine concerns for data privacy. This motivated the area ofPrivacy-preserving Machine Learning (PPML), where privacy of data isguaranteed. In this thesis, we design an efficient platform, MPCLeague, forPPML in the Secure Outsourced Computation (SOC) setting using SecureMulti-party Computation (MPC) techniques. MPC, the holy-grail problem of secure distributed computing, enables a set ofn mutually distrusting parties to perform joint computation on their privateinputs in a way that no coalition of t parties can learn more information thanthe output (privacy) or affect the true output of the computation(correctness). While MPC, in general, has been a subject of extensive research,the area of MPC with a small number of parties has drawn popularity of latemainly due to its application to real-time scenarios, efficiency andsimplicity. This thesis focuses on designing efficient MPC frameworks for 2, 3and 4 parties, with at most one corruption and supports ring structures. At the heart of this thesis are four frameworks - ASTRA, SWIFT, Tetrad,ABY2.0 - catered to different settings. The practicality of our framework isargued through improvements in the benchmarking of widely used ML algorithms --Linear Regression, Logistic Regression, Neural Networks, and Support VectorMachines. We propose two variants for each of our frameworks, with one variantaiming to minimise the execution time while the other focuses on the monetarycost. The concrete efficiency gains of our frameworks coupled with the strongersecurity guarantee of robustness make our platform an ideal choice for areal-time deployment of PPML techniques.
[ "In the regime of PPML using MPC, the initial works considered the widely-used ML algorithms such as Decision Trees {{cite:3310769907e64b2351ee8cad82e34d2ec04d33ee}}, K-Means Clustering {{cite:a3c458847f484624afaa8d8e1605fae74e47fd70}}, {{cite:7c1b70601c8d83cd73b4f16eebecb54df83bfaaa}}, Support Vector Machines {{cite:770c167d479817a2df63acaa8f2d25ed27912ad3}}, {{cite:0ea0f2357efe648e66d7b4cd4718297d545133a2}}, Linear Regression {{cite:bfe71052055d3cc371d413444834e544e64a42bb}}, {{cite:0ba99afcc45695c1c63bf57cc57d7dc7d6bc1ea1}}, {{cite:5b2d4cb9ea7a5b4af25018221bcc2d22a6bfe927}} and Logistic Regression {{cite:62b9a38f75168ba40dd22a2ecab90399bc24fff8}}. However, these solutions are far from practical reach due to the huge performance overheads that they incur. We next discuss the literature concerning the following three algorithms – Linear Regression, Logistic Regression, and Neural Networks, which are the focus of this thesis. The initial set of practical solutions for these algorithms were proposed in the dishonest majority (two-party) setting and are discussed below.", "Linear Regression: Privacy-preserving linear regression on the two server model was first proposed by Nikolaenko et al. {{cite:f2fe3bd1f8bf14a5575e7705092a7a0364d55324}}. Their solution focused on horizontally partitioned data and used a combination of linearly homomorphic encryption (LHE) and garbled circuits. Later, Gascon et al. {{cite:275457ed954d37d21f0fe503a1b0f333892db7dd}} and Giacomelli et al.{{cite:d9b1bd2e2346efec7e853e40197280ca28166795}} extended these results to vertically partitioned data. Both papers, however, confine the problem to solving a linear system using Yao's garbled circuit protocol, which has a substantial training time overhead and cannot be applied to non-linear models. SecureML {{cite:c1b301e7c8284611f888edf553eb3535337c828f}} then used stochastic gradient descent (SGD) for training, as well as a mix of arithmetic, binary, and Yao sharing (using the ABY {{cite:31121e58488b4cb14e8890ed3459d85cc99b504e}} framework) over two parties, to increase the performance of linear regression over horizontally partitioned data. Furthermore, they present a unique design for approximation fixed-point multiplication that avoids boolean operations for truncating decimal numbers while providing state-of-the-art performance for training linear regression models.", "Logistic Regression: Wu et al. {{cite:347498a88b6f838c7bf398a04f0f1521425b0b45}} explored privacy-preserving logistic regression and proposed approximating the logistic function with polynomials and training the model with LHE, with the complexity being exponential in the degree of the approximation polynomial. Aono et al. {{cite:7a05ba8d9cbfc0a3b1421fe5f1d8bf28a30bf5a3}} considered a different security model where an additional untrusted server collects and mixes encrypted data from several clients and delivers it to a trusted client who trains the model on the plaintext on clear.", "Neural Networks: Privacy-preserving solutions for neural networks have also been studied. For the case of training, Shokri and Shmatikov {{cite:570f0bcc4c869b6847f0a0eb3ac6d1811f9e2083}} proposed a scheme where the two servers locally train their model using the horizontally partitioned data. Instead of exchanging the training data, they only share the changes in a portion of the coefficients in the locally trained model. Although the system is very efficient (no cryptographic operations are required), the leakage resulting from sharing these coefficient changes remains unclear, and no formal security guarantees are provided. The privacy-preserving training of neural networks was also considered in the work of SecureML {{cite:c1b301e7c8284611f888edf553eb3535337c828f}}, where the ABY framework was customized to achieve a new approximate fixed-point multiplication protocol that avoids binary circuits. For the case of inference, the works of  {{cite:c632e950271a595ea5d9ccd807c0b4e615f9fdec}}, {{cite:15393eb9a37ea98ecc3994a7c029c6bc90345418}}, {{cite:c1bc39eaf033a3ae3b2afa1ecf8796545f5aaf4b}}, {{cite:3491fca2ef8b40565c10d34a9729d00b13a7a9c1}} consider fully homomorphic or somewhat homomorphic encryption to evaluate the model on encrypted data, while {{cite:43b71620b1da2c911010e9602fe5161cc6de82cd}}, {{cite:8afa288a824c6b5a1cb83f8742f904c9e6254e7f}} uses a combination of LHE and garbled circuits.", "Departing from the dishonest majority setting, a performance breakthrough in the above-mentioned PPML algorithms was observed in ABY3 {{cite:807969bc175f028f2d31f8da0bd8f09a986d8a6b}}, which explored the honest majority setting for three parties. After that, a plethora of works followed, such as  {{cite:eae0893d3173785d03cc5eb70cf6c95fa05d2de8}}, {{cite:9c88e8135f3bd00d1fc53824791267f0cc7db24a}}, {{cite:7f657b9578ef11e4bbe45fc2d576457cf77a6b0c}}, {{cite:159e103dfde4680c6be77353b567cf7ecee94138}}, {{cite:72b78f0706f62a979144f290935ce7ca4c8b1551}}, {{cite:641c72e1c936d1bf92127b853f44db0ed0871e73}}, {{cite:e54087de2c05afdcad885bd0c646746d549e25f8}}, {{cite:14acc346fa1faf55572d257edf62bf737d81ea46}}, {{cite:dd9f266025de58db47f7e09474ba8ec1b9383122}}, which explored the setting of small population with honest-majority and showcased real-time efficiency even for complex neural-network architectures such as LeNet {{cite:5a7bf3bd3b66a6000a08a1cefdcf0682715d7594}} and VGG16 {{cite:a8890df31241689bfccdc570d272b12a1db16ade}}.", "While the literature above tackles only the line of works in PPML via MPC, other dimensions such as differential privacy, model attacks and defense mechanisms, etc., are relevant. However, the literature elaborating on the line of development in these areas is quite vast to be briefly explained in this section, and we refer the reader to {{cite:4e64d4577151075e95e1eb1ff132ceaa0c3e6a0a}}, {{cite:d3f921916389b54061800f4c99b8e1e3725f0627}}, {{cite:d28d46f508a1e4ae7618725811d6d19731fbd716}}, {{cite:ed75f13ebaf0d5e777cd00138ccc014cb3bee73b}} for a detailed overview of the same. Next, we provide an elaborate summary of the most relevant related work that focuses on MPC frameworks for PPML." ]
[]