We gratefully acknowledge support from
the Simons Foundation and member institutions.

Computer Science

New submissions

[ total of 306 entries: 1-306 ]
[ showing up to 2000 entries per page: fewer | more ]

New submissions for Mon, 18 Jan 21

[1]  arXiv:2101.05806 [pdf, other]
Title: Exploration of Visual Features and their weighted-additive fusion for Video Captioning
Comments: 6 pages
Subjects: Computer Vision and Pattern Recognition (cs.CV)

Video captioning is a popular task that challenges models to describe events in videos using natural language. In this work, we investigate the ability of various visual feature representations derived from state-of-the-art convolutional neural networks to capture high-level semantic context. We introduce the Weighted Additive Fusion Transformer with Memory Augmented Encoders (WAFTM), a captioning model that incorporates memory in a transformer encoder and uses a novel method, to fuse features, that ensures due importance is given to more significant representations. We illustrate a gain in performance realized by applying Word-Piece Tokenization and a popular REINFORCE algorithm. Finally, we benchmark our model on two datasets and obtain a CIDEr of 92.4 on MSVD and a METEOR of 0.091 on the ActivityNet Captions Dataset.

[2]  arXiv:2101.05807 [pdf, other]
Title: A Machine-Learning Method for Time-Dependent Wave Equations over Unbounded Domains
Subjects: Numerical Analysis (math.NA)

Time-dependent wave equations represent an important class of partial differential equations (PDE) for describing wave propagation phenomena, which are often formulated over unbounded domains. Given a compactly supported initial condition, classical numerical methods reduce such problems to bounded domains using artificial boundary condition (ABC). In this work, we present a machine-learning method to solve this equation as an alternative to ABCs. Specifically, the mapping from the initial conditions to the PDE solution is represented by a neural network, trained using wave packets that are parameterized by their band width and wave numbers. The accuracy is tested for both the second-order wave equation and the Schrodinger equation, including the nonlinear Schrodinger. We examine the accuracy from both interpolations and extrapolations. For initial conditions lying in the training set, the learned map has good interpolation accuracy, due to the approximation property of deep neural networks. The learned map also exhibits some good extrapolation accuracy. Therefore, the proposed method provides an interesting alternative for finite-time simulation of wave propagation.

[3]  arXiv:2101.05833 [pdf, other]
Title: Context-Aware Image Denoising with Auto-Threshold Canny Edge Detection to Suppress Adversarial Perturbation
Comments: 5 pages, 3 figures, 1 table
Subjects: Computer Vision and Pattern Recognition (cs.CV)

This paper presents a novel context-aware image denoising algorithm that combines an adaptive image smoothing technique and color reduction techniques to remove perturbation from adversarial images. Adaptive image smoothing is achieved using auto-threshold canny edge detection to produce an accurate edge map used to produce a blurred image that preserves more edge features. The proposed algorithm then uses color reduction techniques to reconstruct the image using only a few representative colors. Through this technique, the algorithm can reduce the effects of adversarial perturbations on images. We also discuss experimental data on classification accuracy. Our results showed that the proposed approach reduces adversarial perturbation in adversarial attacks and increases the robustness of the deep convolutional neural network models.

[4]  arXiv:2101.05835 [pdf, other]
Title: An adaptive finite element DtN method for the elastic wave scattering problem in three dimensions
Subjects: Numerical Analysis (math.NA)

Consider the elastic scattering of an incident wave by a rigid obstacle in three dimensions, which is formulated as an exterior problem for the Navier equation. By constructing a Dirichlet-to-Neumann (DtN) operator and introducing a transparent boundary condition, the scattering problem is reduced equivalently to a boundary value problem in a bounded domain. The discrete problem with the truncated DtN operator is solved by using the a posteriori error estimate based adaptive finite element method. The estimate takes account of both the finite element approximation error and the truncation error of the DtN operator, where the latter is shown to converge exponentially with respect to the truncation parameter. Moreover, the generalized Woodbury matrix identity is utilized to solve the resulting linear system efficiently. Numerical experiments are presented to demonstrate the superior performance of the proposed method.

[5]  arXiv:2101.05840 [pdf, other]
Title: A Neophyte With AutoML: Evaluating the Promises of Automatic Machine Learning Tools
Comments: 10 pages, 3 tables, 3 figures. First author is a high school senior
Subjects: Machine Learning (cs.LG); Human-Computer Interaction (cs.HC)

This paper discusses modern Auto Machine Learning (AutoML) tools from the perspective of a person with little prior experience in Machine Learning (ML). There are many AutoML tools both ready-to-use and under development, which are created to simplify and democratize usage of ML technologies in everyday life. Our position is that ML should be easy to use and available to a greater number of people. Prior research has identified the need for intuitive AutoML tools. This work seeks to understand how well AutoML tools have achieved that goal in practice. We evaluate three AutoML Tools to evaluate the end-user experience and system performance. We evaluate the tools by having them create models from a competition dataset on banking data. We report on their performance and the details of our experience. This process provides a unique understanding of the state of the art of AutoML tools. Finally, we use these experiences to inform a discussion on how future AutoML tools can improve the user experience for neophytes of Machine Learning.

[6]  arXiv:2101.05844 [pdf, other]
Title: Scaling the Convex Barrier with Active Sets
Comments: Published at ICLR 2021
Subjects: Machine Learning (cs.LG)

Tight and efficient neural network bounding is of critical importance for the scaling of neural network verification systems. A number of efficient specialised dual solvers for neural network bounds have been presented recently, but they are often too loose to verify more challenging properties. This lack of tightness is linked to the weakness of the employed relaxation, which is usually a linear program of size linear in the number of neurons. While a tighter linear relaxation for piecewise linear activations exists, it comes at the cost of exponentially many constraints and thus currently lacks an efficient customised solver. We alleviate this deficiency via a novel dual algorithm that realises the full potential of the new relaxation by operating on a small active set of dual variables. Our method recovers the strengths of the new relaxation in the dual space: tightness and a linear separation oracle. At the same time, it shares the benefits of previous dual approaches for weaker relaxations: massive parallelism, GPU implementation, low cost per iteration and valid bounds at any time. As a consequence, we obtain better bounds than off-the-shelf solvers in only a fraction of their running time and recover the speed-accuracy trade-offs of looser dual solvers if the computational budget is small. We demonstrate that this results in significant formal verification speed-ups.

[7]  arXiv:2101.05846 [pdf, other]
Title: How Shift Equivariance Impacts Metric Learning for Instance Segmentation
Subjects: Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Image and Video Processing (eess.IV)

Metric learning has received conflicting assessments concerning its suitability for solving instance segmentation tasks. It has been dismissed as theoretically flawed due to the shift equivariance of the employed CNNs and their respective inability to distinguish same-looking objects. Yet it has been shown to yield state of the art results for a variety of tasks, and practical issues have mainly been reported in the context of tile-and-stitch approaches, where discontinuities at tile boundaries have been observed. To date, neither of the reported issues have undergone thorough formal analysis. In our work, we contribute a comprehensive formal analysis of the shift equivariance properties of encoder-decoder-style CNNs, which yields a clear picture of what can and cannot be achieved with metric learning in the face of same-looking objects. In particular, we prove that a standard encoder-decoder network that takes $d$-dimensional images as input, with $l$ pooling layers and pooling factor $f$, has the capacity to distinguish at most $f^{dl}$ same-looking objects, and we show that this upper limit can be reached. Furthermore, we show that to avoid discontinuities in a tile-and-stitch approach, assuming standard batch size 1, it is necessary to employ valid convolutions in combination with a training output window size strictly greater than $f^l$, while at test-time it is necessary to crop tiles to size $n\cdot f^l$ before stitching, with $n\geq 1$. We complement these theoretical findings by discussing a number of insightful special cases for which we show empirical results on synthetic data.

[8]  arXiv:2101.05850 [pdf, other]
Title: Continual Learning of Knowledge Graph Embeddings
Comments: 8 pages, 4 figures. Accepted for publication in IEEE Robotics and Automation Letters (RA-L)
Subjects: Robotics (cs.RO); Machine Learning (cs.LG)

In recent years, there has been a resurgence in methods that use distributed (neural) representations to represent and reason about semantic knowledge for robotics applications. However, while robots often observe previously unknown concepts, these representations typically assume that all concepts are known a priori, and incorporating new information requires all concepts to be learned afresh. Our work relaxes the static assumptions of these representations to tackle the incremental knowledge graph embedding problem by leveraging principles of a range of continual learning methods. Through an experimental evaluation with several knowledge graphs and embedding representations, we provide insights about trade-offs for practitioners to match a semantics-driven robotics application to a suitable continual knowledge graph embedding method.

[9]  arXiv:2101.05851 [pdf, other]
Title: A Subjective Model of Human Decision Making Based on Quantum Decision Theory
Subjects: Artificial Intelligence (cs.AI)

Computer modeling of human decision making is of large importance for, e.g., sustainable transport, urban development, and online recommendation systems. In this paper we present a model for predicting the behavior of an individual during a binary game under different amounts of risk, gain, and time pressure. The model is based on Quantum Decision Theory (QDT), which has been shown to enable modeling of the irrational and subjective aspects of the decision making, not accounted for by the classical Cumulative Prospect Theory (CPT). Experiments on two different datasets show that our QDT-based approach outperforms both a CPT-based approach and data driven approaches such as feed-forward neural networks and random forests.

[10]  arXiv:2101.05853 [pdf, other]
Title: Algorithmic Monoculture and Social Welfare
Subjects: Computer Science and Game Theory (cs.GT); Computers and Society (cs.CY); Machine Learning (cs.LG)

As algorithms are increasingly applied to screen applicants for high-stakes decisions in employment, lending, and other domains, concerns have been raised about the effects of algorithmic monoculture, in which many decision-makers all rely on the same algorithm. This concern invokes analogies to agriculture, where a monocultural system runs the risk of severe harm from unexpected shocks. Here we show that the dangers of algorithmic monoculture run much deeper, in that monocultural convergence on a single algorithm by a group of decision-making agents, even when the algorithm is more accurate for any one agent in isolation, can reduce the overall quality of the decisions being made by the full collection of agents. Unexpected shocks are therefore not needed to expose the risks of monoculture; it can hurt accuracy even under "normal" operations, and even for algorithms that are more accurate when used by only a single decision-maker. Our results rely on minimal assumptions, and involve the development of a probabilistic framework for analyzing systems that use multiple noisy estimates of a set of alternatives.

[11]  arXiv:2101.05855 [pdf, other]
Title: Preserving Privacy in Personalized Models for Distributed Mobile Services
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)

The ubiquity of mobile devices has led to the proliferation of mobile services that provide personalized and context-aware content to their users. Modern mobile services are distributed between end-devices, such as smartphones, and remote servers that reside in the cloud. Such services thrive on their ability to predict future contexts to pre-fetch content of make context-specific recommendations. An increasingly common method to predict future contexts, such as location, is via machine learning (ML) models. Recent work in context prediction has focused on ML model personalization where a personalized model is learned for each individual user in order to tailor predictions or recommendations to a user's mobile behavior. While the use of personalized models increases efficacy of the mobile service, we argue that it increases privacy risk since a personalized model encodes contextual behavior unique to each user. To demonstrate these privacy risks, we present several attribute inference-based privacy attacks and show that such attacks can leak privacy with up to 78% efficacy for top-3 predictions. We present Pelican, a privacy-preserving personalization system for context-aware mobile services that leverages both device and cloud resources to personalize ML models while minimizing the risk of privacy leakage for users. We evaluate Pelican using real world traces for location-aware mobile services and show that Pelican can substantially reduce privacy leakage by up to 75%.

[12]  arXiv:2101.05862 [pdf, other]
Title: GloBug: Using Global Data in Fault Localization
Subjects: Software Engineering (cs.SE)

Fault Localization (FL) is an important first step in software debugging and is mostly manual in the current practice. Many methods have been proposed over years to automate the FL process, including information retrieval (IR)-based techniques. These methods localize the fault based on the similarity of the reported bug report and the source code. Newer variations of IR-based FL (IRFL) techniques also look into the history of bug reports and leverage them during the localization. However, all existing IRFL techniques limit themselves to the current project's data (local data). In this study, we introduce Globug, which is an IRFL framework consisting of methods that use models pre-trained on the global data (extracted from open-source benchmark projects). In Globug, we investigate two heuristics: a) the effect of global data on a state-of-the-art IR-FL technique, namely BugLocator, and b) the application of a Word Embedding technique (Doc2Vec) together with global data. Our large scale experiment on 51 software projects shows that using global data improves BugLocator on average 6.6% and 4.8% in terms of MRR (Mean Reciprocal Rank) and MAP (Mean Average Precision), with over 14% in a majority (64% and 54% in terms of MRR and MAP, respectively) of the cases. This amount of improvement is significant compared to the improvement rates that five other state-of-the-art IRFL tools provide over BugLocator. In addition, training the models globally is a one-time offline task with no overhead on BugLocator's run-time fault localization. Our study, however, shows that a Word Embedding-based global solution did not further improve the results.

[13]  arXiv:2101.05865 [pdf, other]
Title: Impact of Distributed Rate Limiting on Load Distribution in a Latency-sensitive Messaging Service
Subjects: Networking and Internet Architecture (cs.NI)

The cloud's flexibility and promise of seamless auto-scaling notwithstanding, its ability to meet service level objectives (SLOs) typically calls for some form of control in resource usage. This seemingly traditional problem gives rise to new challenges in a cloud setting, and in particular a subtle yet significant trade-off involving load-distribution decisions (the distribution of workload across available cloud resources to optimize performance), and rate limiting (the capping of individual workloads to prevent global over-commitment). This paper investigates that trade-off through the design and implementation of a real-time messaging system motivated by Internet-of-Things (IoT) applications, and demonstrates a solution capable of realizing an effective compromise. The paper's contributions are in both explicating the source of this trade-off, and in demonstrating a possible solution.

[14]  arXiv:2101.05866 [pdf, ps, other]
Title: Comparisons of Graph Neural Networks on Cancer Classification Leveraging a Joint of Phenotypic and Genetic Features
Subjects: Machine Learning (cs.LG); Quantitative Methods (q-bio.QM)

Cancer is responsible for millions of deaths worldwide every year. Although significant progress hasbeen achieved in cancer medicine, many issues remain to be addressed for improving cancer therapy.Appropriate cancer patient stratification is the prerequisite for selecting appropriate treatment plan, ascancer patients are of known heterogeneous genetic make-ups and phenotypic differences. In thisstudy, built upon deep phenotypic characterizations extractable from Mayo Clinic electronic healthrecords (EHRs) and genetic test reports for a collection of cancer patients, we evaluated variousgraph neural networks (GNNs) leveraging a joint of phenotypic and genetic features for cancer typeclassification. Models were applied and fine-tuned on the Mayo Clinic cancer disease dataset. Theassessment was done through the reported accuracy, precision, recall, and F1 values as well as throughF1 scores based on the disease class. Per our evaluation results, GNNs on average outperformed thebaseline models with mean statistics always being higher that those of the baseline models (0.849 vs0.772 for accuracy, 0.858 vs 0.794 for precision, 0.843 vs 0.759 for recall, and 0.843 vs 0.855 for F1score). Among GNNs, ChebNet, GraphSAGE, and TAGCN showed the best performance, while GATshowed the worst. We applied and compared eight GNN models including AGNN, ChebNet, GAT,GCN, GIN, GraphSAGE, SGC, and TAGCN on the Mayo Clinic cancer disease dataset and assessedtheir performance as well as compared them with each other and with more conventional machinelearning models such as decision tree, gradient boosting, multi-layer perceptron, naive bayes, andrandom forest which we used as the baselines.

[15]  arXiv:2101.05869 [pdf]
Title: Technical Report: Rapid Reviews on Engineering of Internet of Things Software Systems
Comments: The report was performed in collaboration with other researchers in the context of a Ph.D. research
Subjects: Software Engineering (cs.SE)

We conducted a set of Rapid Reviews to characterize Internet of Things facets. We formatted a generic meta-protocol that was instantiated for each of the six facets presented (Connectivity, Things, Behavior, Smartness, Interactivity, and Environment)and considering the issue of Security, one of the most important and frequent challenges in the context of IoT. The meta-protocol is detailed and the results of each review are presented.

[16]  arXiv:2101.05875 [pdf, other]
Title: Interpretable Multi-Head Self-Attention model for Sarcasm Detection in social media
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Social and Information Networks (cs.SI)

Sarcasm is a linguistic expression often used to communicate the opposite of what is said, usually something that is very unpleasant with an intention to insult or ridicule. Inherent ambiguity in sarcastic expressions, make sarcasm detection very difficult. In this work, we focus on detecting sarcasm in textual conversations from various social networking platforms and online media. To this end, we develop an interpretable deep learning model using multi-head self-attention and gated recurrent units. Multi-head self-attention module aids in identifying crucial sarcastic cue-words from the input, and the recurrent units learn long-range dependencies between these cue-words to better classify the input text. We show the effectiveness of our approach by achieving state-of-the-art results on multiple datasets from social networking platforms and online media. Models trained using our proposed approach are easily interpretable and enable identifying sarcastic cues in the input text which contribute to the final classification score. We visualize the learned attention weights on few sample input texts to showcase the effectiveness and interpretability of our model.

[17]  arXiv:2101.05877 [pdf, other]
Title: "How Was Your Weekend?" Software Development Teams Working From Home During COVID-19
Comments: 12 pages. This is the version of the paper that was submitted to and accepted at ICSE 2021
Subjects: Software Engineering (cs.SE)

The mass shift to working at home during the COVID-19 pandemic radically changed the way many software development teams collaborate and communicate. To investigate how team culture and team productivity may also have been affected, we conducted two surveys at a large software company. The first, an exploratory survey during the early months of the pandemic with 2,265 developer responses, revealed that many developers faced challenges reaching milestones and that their team productivity had changed. We also found through qualitative analysis that important team culture factors such as communication and social connection had been affected. For example, the simple phrase "How was your weekend?" had become a subtle way to show peer support.
In our second survey, we conducted a quantitative analysis of the team cultural factors that emerged from our first survey to understand the prevalence of the reported changes. From 608 developer responses, we found that 74% of these respondents missed social interactions with colleagues and 51% reported a decrease in their communication ease with colleagues. We used data from the second survey to build a regression model to identify important team culture factors for modeling team productivity. We found that the ability to brainstorm with colleagues, difficulty communicating with colleagues, and satisfaction with interactions from social activities are important factors associated with how developers report their software development team's productivity. Our findings inform how managers and leaders in large software companies can support sustained team productivity during times of crisis and beyond.

[18]  arXiv:2101.05880 [pdf, other]
Title: Auto-weighted Robust Federated Learning with Corrupted Data Sources
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI)

Federated learning provides a communication-efficient and privacy-preserving training process by enabling learning statistical models with massive participants while keeping their data in local clients. However, standard federated learning techniques that naively minimize an average loss function are vulnerable to data corruptions from outliers, systematic mislabeling, or even adversaries. In addition, it is often prohibited for service providers to verify the quality of data samples due to the increasing concern of user data privacy. In this paper, we address this challenge by proposing Auto-weighted Robust Federated Learning (arfl), a novel approach that jointly learns the global model and the weights of local updates to provide robustness against corrupted data sources. We prove a learning bound on the expected risk with respect to the predictor and the weights of clients, which guides the definition of the objective for robust federated learning. The weights are allocated by comparing the empirical loss of a client with the average loss of the best p clients (p-average), thus we can downweight the clients with significantly high losses, thereby lower their contributions to the global model. We show that this approach achieves robustness when the data of corrupted clients is distributed differently from benign ones. To optimize the objective function, we propose a communication-efficient algorithm based on the blockwise minimization paradigm. We conduct experiments on multiple benchmark datasets, including CIFAR-10, FEMNIST and Shakespeare, considering different deep neural network models. The results show that our solution is robust against different scenarios including label shuffling, label flipping and noisy features, and outperforms the state-of-the-art methods in most scenarios.

[19]  arXiv:2101.05884 [pdf, ps, other]
Title: Enabling four-dimensional conformal hybrid meshing with cubic pyramids
Comments: 30 pages, 15 figures
Subjects: Numerical Analysis (math.NA)

The main purpose of this article is to develop a novel refinement strategy for four-dimensional hybrid meshes based on cubic pyramids. This optimal refinement strategy subdivides a given cubic pyramid into a conforming set of congruent cubic pyramids and invariant bipentatopes. The theoretical properties of the refinement strategy are rigorously analyzed and evaluated. In addition, a new class of fully symmetric quadrature rules with positive weights are generated for the cubic pyramid. These rules are capable of exactly integrating polynomials with degrees up to 12. Their effectiveness is successfully demonstrated on polynomial and transcendental functions. Broadly speaking, the refinement strategy and quadrature rules in this paper open new avenues for four-dimensional hybrid meshing, and space-time finite element methods.

[20]  arXiv:2101.05885 [pdf, ps, other]
Title: Cocktail Edge Caching: Ride Dynamic Trends of Content Popularity with Ensemble Learning
Comments: INFOCOM 2021
Subjects: Networking and Internet Architecture (cs.NI); Machine Learning (cs.LG)

Edge caching will play a critical role in facilitating the emerging content-rich applications. However, it faces many new challenges, in particular, the highly dynamic content popularity and the heterogeneous caching configurations. In this paper, we propose Cocktail Edge Caching, that tackles the dynamic popularity and heterogeneity through ensemble learning. Instead of trying to find a single dominating caching policy for all the caching scenarios, we employ an ensemble of constituent caching policies and adaptively select the best-performing policy to control the cache. Towards this goal, we first show through formal analysis and experiments that different variations of the LFU and LRU policies have complementary performance in different caching scenarios. We further develop a novel caching algorithm that enhances LFU/LRU with deep recurrent neural network (LSTM) based time-series analysis. Finally, we develop a deep reinforcement learning agent that adaptively combines base caching policies according to their virtual hit ratios on parallel virtual caches. Through extensive experiments driven by real content requests from two large video streaming platforms, we demonstrate that CEC not only consistently outperforms all single policies, but also improves the robustness of them. CEC can be well generalized to different caching scenarios with low computation overheads for deployment.

[21]  arXiv:2101.05886 [pdf, other]
Title: Reformulated dissipation for the free-stream preserving of the conservative finite difference schemes on curvilinear grids
Subjects: Numerical Analysis (math.NA); Computational Physics (physics.comp-ph); Fluid Dynamics (physics.flu-dyn)

In this paper, we develop a new free-stream preserving (FP) method for high-order upwind conservative finite-difference (FD) schemes on the curvilinear grids. This FP method is constrcuted by subtracting a reference cell-face flow state from each cell-center value in the local stencil of the original upwind conservative FD schemes, which effectively leads to a reformulated dissipation. It is convenient to implement this method, as it does not require to modify the original forms of the upwind schemes. In addition, the proposed method removes the constraint in the traditional FP conservative FD schemes that require a consistent discretization of the mesh metrics and the fluxes. With this, the proposed method is more flexible in simulating the engineering problems which usually require a low-order scheme for their low-quality mesh, while the high-order schemes can be applied to approximate the flow states to improve the resolution. After demonstrating the strict FP property and the order of accuracy by two simple test cases, we consider various validation cases, including the supersonic flow around the cylinder, the subsonic flow past the three-element airfoil, and the transonic flow around the ONERA M6 wing, etc., to show that the method is suitable for a wide range of fluid dynamic problems containing complex geometries. Moreover, these test cases also indicate that the discretization order of the metrics have no significant influences on the numerical results if the mesh resolution is not sufficiently large.

[22]  arXiv:2101.05890 [pdf, other]
Title: Transactive Framework for Dynamic Energy Storage Allocation for Critical Load Management
Subjects: Systems and Control (eess.SY)

With the increased penetration of Distributed Energy Resources and Renewable Energy Systems (RES), the conventional distribution grid is advancing towards a transactive framework supervised by a distribution system operator (DSO). However, the inherent uncertainty of RES poses a challenge in meeting the power demand of critical infrastructures in the microgrid unless sufficient battery energy storage is maintained. Yet, maintaining expensive battery storage increases the operating cost of the DSO. In this article, we propose a dynamic resource allocation strategy to optimize the battery reserve requirement while ensuring the critical demand is met with a provable guarantee. Our solution is built upon stochastic control techniques where we model the uncertain nature of RES with geometric Brownian motion. Our proposed scheme enables the DSO to optimize the RES and battery reserve allocation to eliminate the risk of over or underproduction. We apply the proposed scheme to derive battery reserve allocation strategy for conventional and transactive grid settings. Finally, we present numerical simulations under three different scenarios of multiple microgrids with uncertain renewable generation with detailed comparison of the performance of the proposed algorithm for conventional and transactive grid. The simulation results demonstrate the efficacy of the proposed transactive stochastic control algorithm.

[23]  arXiv:2101.05891 [pdf, other]
Title: A Deep Learning Based Ternary Task Classification System Using Gramian Angular Summation Field in fNIRS Neuroimaging Data
Comments: 4 pages, 4 Figures
Subjects: Machine Learning (cs.LG)

Functional near-infrared spectroscopy (fNIRS) is a non-invasive, economical method used to study its blood flow pattern. These patterns can be used to classify tasks a subject is performing. Currently, most of the classification systems use simple machine learning solutions for the classification of tasks. These conventional machine learning methods, which are easier to implement and interpret, usually suffer from low accuracy and undergo a complex preprocessing phase before network training. The proposed method converts the raw fNIRS time series data into an image using Gramian Angular Summation Field. A Deep Convolutional Neural Network (CNN) based architecture is then used for task classification, including mental arithmetic, motor imagery, and idle state. Further, this method can eliminate the feature selection stage, which affects the traditional classifiers' performance. This system obtained 87.14% average classification accuracy higher than any other method for the dataset.

[24]  arXiv:2101.05892 [pdf, other]
Title: A Ternary Bi-Directional LSTM Classification for Brain Activation Pattern Recognition Using fNIRS
Comments: 6 pages, 7 figures
Subjects: Machine Learning (cs.LG)

Functional near-infrared spectroscopy (fNIRS) is a non-invasive, low-cost method used to study the brain's blood flow pattern. Such patterns can enable us to classify performed by a subject. In recent research, most classification systems use traditional machine learning algorithms for the classification of tasks. These methods, which are easier to implement, usually suffer from low accuracy. Further, a complex pre-processing phase is required for data preparation before implementing traditional machine learning methods. The proposed system uses a Bi-Directional LSTM based deep learning architecture for task classification, including mental arithmetic, motor imagery, and idle state using fNIRS data. Further, this system will require less pre-processing than the traditional approach, saving time and computational resources while obtaining an accuracy of 81.48\%, which is considerably higher than the accuracy obtained using conventional machine learning algorithms for the same data set.

[25]  arXiv:2101.05893 [pdf, other]
Title: Instance-Aware Predictive Navigation in Multi-Agent Environments
Subjects: Robotics (cs.RO); Computer Vision and Pattern Recognition (cs.CV)

In this work, we aim to achieve efficient end-to-end learning of driving policies in dynamic multi-agent environments. Predicting and anticipating future events at the object level are critical for making informed driving decisions. We propose an Instance-Aware Predictive Control (IPC) approach, which forecasts interactions between agents as well as future scene structures. We adopt a novel multi-instance event prediction module to estimate the possible interaction among agents in the ego-centric view, conditioned on the selected action sequence of the ego-vehicle. To decide the action at each step, we seek the action sequence that can lead to safe future states based on the prediction module outputs by repeatedly sampling likely action sequences. We design a sequential action sampling strategy to better leverage predicted states on both scene-level and instance-level. Our method establishes a new state of the art in the challenging CARLA multi-agent driving simulation environments without expert demonstration, giving better explainability and sample efficiency.

[26]  arXiv:2101.05894 [pdf]
Title: Transmission-and-Distribution Frequency Dynamic Co-Simulation Framework for Distributed Energy Resources Frequency Response
Subjects: Systems and Control (eess.SY)

The rapid deployment of distributed energy resources (DERs) in distribution networks has brought challenges to balance the system and stabilize frequency. DERs have the ability to provide frequency regulation; however, existing dynamic frequency simulation tools-which were developed mainly for the transmission system-lack the capability to simulate distribution network dynamics with high penetrations of DERs. Although electromagnetic transient (EMT) simulation tools can simulate distribution network dynamics, the computation efficiency limits their use for large-scale transmission-and-distribution (T&D) simulations. This paper presents an efficient T&D dynamic frequency co-simulation framework for DER frequency response based on the HELICS platform and existing off-the-shelf simulators. The challenge of synchronizing frequency between the transmission network and DERs hosted in the distribution network is approached by detailed modeling of DERs in frequency dynamic models while DER phasor models are also preserved in the distribution networks. Thereby, local voltage constraints can be respected when dispatching the DER power for frequency response. The DER frequency responses (primary and secondary)-are simulated in case studies to validate the proposed framework. Lastly, fault-induced delayed voltage recovery (FIDVR) event of a large system is presented to demonstrate the efficiency and effectiveness of the overall framework.

[27]  arXiv:2101.05895 [pdf, ps, other]
Title: A Ramsey Theorem for Finite Monoids
Authors: Ismaël Jecker
Subjects: Formal Languages and Automata Theory (cs.FL)

Repeated idempotent elements are commonly used to characterise iterable behaviours in abstract models of computation. Therefore, given a monoid $M$, it is natural to ask how long a sequence of elements of $M$ needs to be to ensure the presence of consecutive idempotent factors. This question is formalised through the notion of the Ramsey function $R_M$ associated to M, obtained by mapping every positive integer $k$ to the minimal integer $R_M(k)$ such that every word $u$ in $M^*$ of length $R_M(k)$ contains $k$ consecutive non-empty factors that correspond to the same idempotent element of $M$.
In this work, we study the behaviour of the Ramsey function $R_M$ by investigating the regular $D$-length of $M$, defined as the largest size $L(M)$ of a submonoid of $M$ isomorphic to the set of natural numbers $\{1,2, ..., L(M)\}$ equipped with the Max operation. We show that the regular $D$-length of $M$ determines the degree of $R_M$, by proving that $k^{L(M)} \leq R_M(k) \leq (k|M|^4)^{L(M)}$.
To allow applications of this result, we provide the value of the regular $D$-length of diverse monoids. In particular, we prove that the full monoid of $n \times n$ Boolean matrices, which is used to express transition monoids of non-deterministic automata, has a regular $D$-length of $\frac{n^2+n+2}{2}$.

[28]  arXiv:2101.05902 [pdf, other]
Title: An EIM-degradation free reduced basis method via over collocation and residual hyper reduction-based error estimation
Comments: arXiv admin note: substantial text overlap with arXiv:2009.04812, arXiv:1906.07349
Subjects: Numerical Analysis (math.NA)

The need for multiple interactive, real-time simulations using different parameter values has driven the design of fast numerical algorithms with certifiable accuracies. The reduced basis method (RBM) presents itself as such an option. RBM features a mathematically rigorous error estimator which drives the construction of a low-dimensional subspace. A surrogate solution is then sought in this low-dimensional space approximating the parameter-induced high fidelity solution manifold. However when the system is nonlinear or its parameter dependence nonaffine, this efficiency gain degrades tremendously, an inherent drawback of the application of the empirical interpolation method (EIM).
In this paper, we augment and extend the EIM approach as a direct solver, as opposed to an assistant, for solving nonlinear partial differential equations on the reduced level. The resulting method, called Reduced Over-Collocation method (ROC), is stable and capable of avoiding the efficiency degradation. Two critical ingredients of the scheme are collocation at about twice as many locations as the number of basis elements for the reduced approximation space, and an efficient error indicator for the strategic building of the reduced solution space. The latter, the main contribution of this paper, results from an adaptive hyper reduction of the residuals for the reduced solution. Together, these two ingredients render the proposed R2-ROC scheme both offline- and online-efficient. A distinctive feature is that the efficiency degradation appearing in traditional RBM approaches that utilize EIM for nonlinear and nonaffine problems is circumvented, both in the offline and online stages. Numerical tests on different families of time-dependent and steady-state nonlinear problems demonstrate the high efficiency and accuracy of our R2-ROC and its superior stability performance.

[29]  arXiv:2101.05913 [pdf, other]
Title: Supervised Transfer Learning at Scale for Medical Imaging
Subjects: Computer Vision and Pattern Recognition (cs.CV)

Transfer learning is a standard technique to improve performance on tasks with limited data. However, for medical imaging, the value of transfer learning is less clear. This is likely due to the large domain mismatch between the usual natural-image pre-training (e.g. ImageNet) and medical images. However, recent advances in transfer learning have shown substantial improvements from scale. We investigate whether modern methods can change the fortune of transfer learning for medical imaging. For this, we study the class of large-scale pre-trained networks presented by Kolesnikov et al. on three diverse imaging tasks: chest radiography, mammography, and dermatology. We study both transfer performance and critical properties for the deployment in the medical domain, including: out-of-distribution generalization, data-efficiency, sub-group fairness, and uncertainty estimation. Interestingly, we find that for some of these properties transfer from natural to medical images is indeed extremely effective, but only when performed at sufficient scale.

[30]  arXiv:2101.05916 [pdf, other]
Title: Scalable Learning of Safety Guarantees for Autonomous Systems using Hamilton-Jacobi Reachability
Comments: The first two authors are co-first authors. Submitted to ICRA 2021
Subjects: Robotics (cs.RO); Machine Learning (cs.LG); Systems and Control (eess.SY)

Autonomous systems like aircraft and assistive robots often operate in scenarios where guaranteeing safety is critical. Methods like Hamilton-Jacobi reachability can provide guaranteed safe sets and controllers for such systems. However, often these same scenarios have unknown or uncertain environments, system dynamics, or predictions of other agents. As the system is operating, it may learn new knowledge about these uncertainties and should therefore update its safety analysis accordingly. However, work to learn and update safety analysis is limited to small systems of about two dimensions due to the computational complexity of the analysis. In this paper we synthesize several techniques to speed up computation: decomposition, warm-starting, and adaptive grids. Using this new framework we can update safe sets by one or more orders of magnitude faster than prior work, making this technique practical for many realistic systems. We demonstrate our results on simulated 2D and 10D near-hover quadcopters operating in a windy environment.

[31]  arXiv:2101.05917 [pdf, other]
Title: DiffPD: Differentiable Projective Dynamics with Contact
Subjects: Machine Learning (cs.LG); Graphics (cs.GR)

We present a novel, fast differentiable simulator for soft-body learning and control applications. Existing differentiable soft-body simulators can be classified into two categories based on their time integration methods. Simulators using explicit time-stepping scheme require tiny time steps to avoid numerical instabilities in gradient computation, and simulators using implicit time integration typically compute gradients by employing the adjoint method to solve the expensive linearized dynamics. Inspired by Projective Dynamics (PD), we present DiffPD, an efficient differentiable soft-body simulator with implicit time integration. The key idea in DiffPD is to speed up backpropagation by exploiting the prefactorized Cholesky decomposition in PD to achieve a super-linear convergence rate. To handle contacts, DiffPD solves contact forces by analyzing a linear complementarity problem (LCP) and its gradients. With the assumption that contacts occur on a small number of nodes, we develop an efficient method for gradient computation by exploring the low-rank structure in the linearized dynamics. We evaluate the performance of DiffPD and observe a speedup of 4-19 times compared to the standard Newton's method in various applications including system identification, inverse design problems, trajectory optimization, and closed-loop control.

[32]  arXiv:2101.05919 [pdf, other]
Title: A Dataset of State-Censored Tweets
Subjects: Social and Information Networks (cs.SI); Computers and Society (cs.CY)

Many governments impose traditional censorship methods on social media platforms. Instead of removing it completely, many social media companies, including Twitter, only withhold the content from the requesting country. This makes such content still accessible outside of the censored region, allowing for an excellent setting in which to study government censorship on social media. We mine such content using the Internet Archive's Twitter Stream Grab. We release a dataset of 583,437 tweets by 155,715 users that were censored between 2012-2020 July. We also release 4,301 accounts that were censored in their entirety. Additionally, we release a set of 22,083,759 supplemental tweets made up of all tweets by users with at least one censored tweet as well as instances of other users retweeting the censored user. We provide an exploratory analysis of this dataset. Our dataset will not only aid in the study of government censorship but will also aid in studying hate speech detection and the effect of censorship on social media users. The dataset is publicly available at https://doi.org/10.5281/zenodo.4439509

[33]  arXiv:2101.05921 [pdf, ps, other]
Title: An Improved Approximation Algorithm for the Minimum $k$-Edge Connected Multi-Subgraph Problem
Subjects: Data Structures and Algorithms (cs.DS); Combinatorics (math.CO); Probability (math.PR)

We give a randomized $1+\sqrt{\frac{8\ln k}{k}}$-approximation algorithm for the minimum $k$-edge connected spanning multi-subgraph problem, $k$-ECSM.

[34]  arXiv:2101.05922 [pdf]
Title: Image Enhancement using Fuzzy Intensity Measure and Adaptive Clipping Histogram Equalization
Subjects: Computer Vision and Pattern Recognition (cs.CV)

Image enhancement aims at processing an input image so that the visual content of the output image is more pleasing or more useful for certain applications. Although histogram equalization is widely used in image enhancement due to its simplicity and effectiveness, it changes the mean brightness of the enhanced image and introduces a high level of noise and distortion. To address these problems, this paper proposes image enhancement using fuzzy intensity measure and adaptive clipping histogram equalization (FIMHE). FIMHE uses fuzzy intensity measure to first segment the histogram of the original image, and then clip the histogram adaptively in order to prevent excessive image enhancement. Experiments on the Berkeley database and CVF-UGR-Image database show that FIMHE outperforms state-of-the-art histogram equalization based methods.

[35]  arXiv:2101.05924 [pdf, other]
Title: Nowcasting Gentrification Using Airbnb Data
Comments: To appear in the proceedings of the ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW 2021)
Subjects: Computers and Society (cs.CY); Machine Learning (cs.LG)

There is a rumbling debate over the impact of gentrification: presumed gentrifiers have been the target of protests and attacks in some cities, while they have been welcome as generators of new jobs and taxes in others. Census data fails to measure neighborhood change in real-time since it is usually updated every ten years. This work shows that Airbnb data can be used to quantify and track neighborhood changes. Specifically, we consider both structured data (e.g. number of listings, number of reviews, listing information) and unstructured data (e.g. user-generated reviews processed with natural language processing and machine learning algorithms) for three major cities, New York City (US), Los Angeles (US), and Greater London (UK). We find that Airbnb data (especially its unstructured part) appears to nowcast neighborhood gentrification, measured as changes in housing affordability and demographics. Overall, our results suggest that user-generated data from online platforms can be used to create socioeconomic indices to complement traditional measures that are less granular, not in real-time, and more costly to obtain.

[36]  arXiv:2101.05930 [pdf, other]
Title: Neural Attention Distillation: Erasing Backdoor Triggers from Deep Neural Networks
Comments: 19 pages, 14 figures, ICLR 2021
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI)

Deep neural networks (DNNs) are known vulnerable to backdoor attacks, a training time attack that injects a trigger pattern into a small proportion of training data so as to control the model's prediction at the test time. Backdoor attacks are notably dangerous since they do not affect the model's performance on clean examples, yet can fool the model to make incorrect prediction whenever the trigger pattern appears during testing. In this paper, we propose a novel defense framework Neural Attention Distillation (NAD) to erase backdoor triggers from backdoored DNNs. NAD utilizes a teacher network to guide the finetuning of the backdoored student network on a small clean subset of data such that the intermediate-layer attention of the student network aligns with that of the teacher network. The teacher network can be obtained by an independent finetuning process on the same clean subset. We empirically show, against 6 state-of-the-art backdoor attacks, NAD can effectively erase the backdoor triggers using only 5\% clean training data without causing obvious performance degradation on clean examples.

[37]  arXiv:2101.05938 [pdf, other]
Title: KDLSQ-BERT: A Quantized Bert Combining Knowledge Distillation with Learned Step Size Quantization
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)

Recently, transformer-based language models such as BERT have shown tremendous performance improvement for a range of natural language processing tasks. However, these language models usually are computation expensive and memory intensive during inference. As a result, it is difficult to deploy them on resource-restricted devices. To improve the inference performance, as well as reduce the model size while maintaining the model accuracy, we propose a novel quantization method named KDLSQ-BERT that combines knowledge distillation (KD) with learned step size quantization (LSQ) for language model quantization. The main idea of our method is that the KD technique is leveraged to transfer the knowledge from a "teacher" model to a "student" model when exploiting LSQ to quantize that "student" model during the quantization training process. Extensive experiment results on GLUE benchmark and SQuAD demonstrate that our proposed KDLSQ-BERT not only performs effectively when doing different bit (e.g. 2-bit $\sim$ 8-bit) quantization, but also outperforms the existing BERT quantization methods, and even achieves comparable performance as the full-precision base-line model while obtaining 14.9x compression ratio. Our code will be public available.

[38]  arXiv:2101.05940 [pdf, other]
Title: Implicit Surface Reconstruction with a Curl-free Radial Basis Function Partition of Unity Method
Subjects: Numerical Analysis (math.NA)

Surface reconstruction from a set of scattered points, or a point cloud, has many applications ranging from computer graphics to remote sensing. We present a new method for this task that produces an implicit surface (zero-level set) approximation for an oriented point cloud using only information about (approximate) normals to the surface. The technique exploits the fundamental result from vector calculus that the normals to an implicit surface are curl-free. By using a curl-free radial basis function (RBF) interpolation of the normals, we can extract a potential for the vector field whose zero-level surface approximates the point cloud. We use curl-free RBFs based on polyharmonic splines for this task, since they are free of any shape or support parameters. Furthermore, to make this technique efficient and able to better represent local sharp features, we combine it with a partition of unity (PU) method. The result is the curl-free partition of unity (CFPU) method. We show how CFPU can be adapted to enforce exact interpolation of a point cloud and can be regularized to handle noise in both the normal vectors and the point positions. Numerical results are presented that demonstrate how the method converges for a known surface as the sampling density increases, how regularization handles noisy data, and how the method performs on various problems found in the literature.

[39]  arXiv:2101.05944 [pdf, other]
Title: Experimental Validation of Eco-Driving and Eco-Heating Strategies for Connected and Automated HEVs
Comments: 12 pages, 16 figures, SAE WCX Digital Summit, SAE Technical Paper 2021-01-0435
Journal-ref: SAE Technical Paper 2021-01-0435
Subjects: Systems and Control (eess.SY); Optimization and Control (math.OC)

This paper presents experimental results that validate eco-driving and eco-heating strategies developed for connected and automated vehicles (CAVs). By exploiting vehicle-to-infrastructure (V2I) communications, traffic signal timing, and queue length estimations, optimized and smoothed speed profiles for the ego-vehicle are generated to reduce energy consumption. Next, the planned eco-trajectories are incorporated into a real-time predictive optimization framework that coordinates the cabin thermal load (in cold weather) with the speed preview, i.e., eco-heating. To enable eco-heating, the engine coolant (as the only heat source for cabin heating) and the cabin air are leveraged as two thermal energy storages. Our eco-heating strategy stores thermal energy in the engine coolant and cabin air while the vehicle is driving at high speeds, and releases the stored energy slowly during the vehicle stops for cabin heating without forcing the engine to idle to provide the heating source. To test and validate these solutions, a power-split hybrid electric vehicle (HEV) has been instrumented for cabin thermal management, allowing to regulate heating, ventilation, and air conditioning (HVAC) system inputs (cabin temperature setpoint and blower flow rate) in real-time. Experiments were conducted to demonstrate the energy-saving benefits of eco-driving and eco-heating strategies over real-world city driving cycles at different cold ambient temperatures. The data confirmed average fuel savings of 14.5% and 4.7% achieved by eco-driving and eco-heating, respectively, offering a combined energy saving of more than 19% when comparing to the baseline vehicle driven by a human driver with a constant-heating strategy.

[40]  arXiv:2101.05946 [pdf, other]
Title: A Risk-Sensitive Task Offloading Strategy for Edge Computing in Industrial Internet of Things
Comments: 17 pages, has been submitted to EURASIP JWCN, major revision
Subjects: Information Theory (cs.IT)

Edge computing has become one of the key enablers for ultra-reliable and low-latency communications in the industrial Internet of Things in the fifth generation communication systems, and is also a promising technology in the future sixth generation communication systems. In this work, we consider the application of edge computing to smart factories for mission-critical task offloading through wireless links. In such scenarios, although high end-to-end delays from the generation to completion of tasks happen with low probability, they may incur severe casualties and property loss, and should be seriously treated. Inspired by the risk management theory widely used in finance, we adopt the Conditional Value at Risk to capture the tail of the delay distribution. An upper bound of the Conditional Value at Risk is derived through analysis of the queues both at the devices and the edge computing servers. We aim to find out the optimal offloading policy taking into consideration both the average and the worst case delay performance of the system. Given that the formulated optimization problem is a non-convex mixed integer non-linear programming problem, a decomposition into sub-problems is performed and a two-stage heuristic algorithm is proposed. Simulation results validate our analysis and indicate that the proposed algorithm can reduce the risk in both the queuing and end-to-end delay.

[41]  arXiv:2101.05948 [pdf, other]
Title: Differentiable Nonparametric Belief Propagation
Authors: Anthony Opipari (1), Chao Chen (1), Shoutian Wang (1), Jana Pavlasek (1), Karthik Desingh (2), Odest Chadwicke Jenkins (1) ((1) Robotics Institute, University of Michigan, Ann Arbor, (2) Department of Computer Science and Engineering, University of Washington, Seattle)
Comments: 12 pages, 9 figures
Subjects: Robotics (cs.RO)

We present a differentiable approach to learn the probabilistic factors used for inference by a nonparametric belief propagation algorithm. Existing nonparametric belief propagation methods rely on domain-specific features encoded in the probabilistic factors of a graphical model. In this work, we replace each crafted factor with a differentiable neural network enabling the factors to be learned using an efficient optimization routine from labeled data. By combining differentiable neural networks with an efficient belief propagation algorithm, our method learns to maintain a set of marginal posterior samples using end-to-end training. We evaluate our differentiable nonparametric belief propagation (DNBP) method on a set of articulated pose tracking tasks and compare performance with a recurrent neural network. Results from this comparison demonstrate the effectiveness of using learned factors for tracking and suggest the practical advantage over hand-crafted approaches. The project webpage is available at: progress.eecs.umich.edu/projects/dnbp.

[42]  arXiv:2101.05950 [pdf, other]
Title: Robusta: Robust AutoML for Feature Selection via Reinforcement Learning
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI)

Several AutoML approaches have been proposed to automate the machine learning (ML) process, such as searching for the ML model architectures and hyper-parameters. However, these AutoML pipelines only focus on improving the learning accuracy of benign samples while ignoring the ML model robustness under adversarial attacks. As ML systems are increasingly being used in a variety of mission-critical applications, improving the robustness of ML systems has become of utmost importance. In this paper, we propose the first robust AutoML framework, Robusta--based on reinforcement learning (RL)--to perform feature selection, aiming to select features that lead to both accurate and robust ML systems. We show that a variation of the 0-1 robust loss can be directly optimized via an RL-based combinatorial search in the feature selection scenario. In addition, we employ heuristics to accelerate the search procedure based on feature scoring metrics, which are mutual information scores, tree-based classifiers feature importance scores, F scores, and Integrated Gradient (IG) scores, as well as their combinations. We conduct extensive experiments and show that the proposed framework is able to improve the model robustness by up to 22% while maintaining competitive accuracy on benign samples compared with other feature selection methods.

[43]  arXiv:2101.05951 [pdf, ps, other]
Title: Two Chebyshev Spectral Methods for Solving Normal Modes in Atmospheric Acoustics
Comments: 10 pages, 8 figures and 3 tables
Subjects: Computational Engineering, Finance, and Science (cs.CE)

The normal mode model is important in computational atmospheric acoustics. It is often used to compute the atmospheric acoustic field under a harmonic point source. Its solution consists of a set of discrete modes radiating into the upper atmosphere, usually related to the continuous spectrum. In this article, we present two spectral methods, the Chebyshev--Tau and Chebyshev--Collocation methods, to solve for the atmospheric acoustic normal modes, and corresponding programs were developed. The two spectral methods successfully transform the problem of searching for the modal wavenumbers in the complex plane into a simple dense matrix eigenvalue problem by projecting the governing equation onto a set of orthogonal bases, which can be easily solved through linear algebra methods. After obtaining the eigenvalues and eigenvectors, the horizontal wavenumbers and their corresponding modes can be obtained with simple processing. Numerical experiments were examined for both downwind and upwind conditions to verify the effectiveness of the methods. The running time data indicated that both spectral methods proposed in this article are faster than the Legendre--Galerkin spectral method proposed previously.

[44]  arXiv:2101.05952 [pdf, other]
Title: Dynamic DNN Decomposition for Lossless Synergistic Inference
Comments: 11 pages, 13 figures
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)

Deep neural networks (DNNs) sustain high performance in today's data processing applications. DNN inference is resource-intensive thus is difficult to fit into a mobile device. An alternative is to offload the DNN inference to a cloud server. However, such an approach requires heavy raw data transmission between the mobile device and the cloud server, which is not suitable for mission-critical and privacy-sensitive applications such as autopilot. To solve this problem, recent advances unleash DNN services using the edge computing paradigm. The existing approaches split a DNN into two parts and deploy the two partitions to computation nodes at two edge computing tiers. Nonetheless, these methods overlook collaborative device-edge-cloud computation resources. Besides, previous algorithms demand the whole DNN re-partitioning to adapt to computation resource changes and network dynamics. Moreover, for resource-demanding convolutional layers, prior works do not give a parallel processing strategy without loss of accuracy at the edge side. To tackle these issues, we propose D3, a dynamic DNN decomposition system for synergistic inference without precision loss. The proposed system introduces a heuristic algorithm named horizontal partition algorithm to split a DNN into three parts. The algorithm can partially adjust the partitions at run time according to processing time and network conditions. At the edge side, a vertical separation module separates feature maps into tiles that can be independently run on different edge nodes in parallel. Extensive quantitative evaluation of five popular DNNs illustrates that D3 outperforms the state-of-the-art counterparts up to 3.4 times in end-to-end DNN inference time and reduces backbone network communication overhead up to 3.68 times.

[45]  arXiv:2101.05953 [pdf, other]
Title: Hostility Detection and Covid-19 Fake News Detection in Social Media
Comments: 13 pages, 3 figures, 3 tables
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)

Withtheadventofsocialmedia,therehasbeenanextremely rapid increase in the content shared online. Consequently, the propagation of fake news and hostile messages on social media platforms has also skyrocketed. In this paper, we address the problem of detecting hostile and fake content in the Devanagari (Hindi) script as a multi-class, multi-label problem. Using NLP techniques, we build a model that makes use of an abusive language detector coupled with features extracted via Hindi BERT and Hindi FastText models and metadata. Our model achieves a 0.97 F1 score on coarse grain evaluation on Hostility detection task. Additionally, we built models to identify fake news related to Covid-19 in English tweets. We leverage entity information extracted from the tweets along with textual representations learned from word embeddings and achieve a 0.93 F1 score on the English fake news detection task.

[46]  arXiv:2101.05954 [pdf, ps, other]
Title: Recent Advances in Video Question Answering: A Review of Datasets and Methods
Comments: 18 pages, 5 tables, Video and Image Question Answering Workshop, 25th International Conference on Pattern Recognition
Subjects: Computer Vision and Pattern Recognition (cs.CV)

Video Question Answering (VQA) is a recent emerging challenging task in the field of Computer Vision. Several visual information retrieval techniques like Video Captioning/Description and Video-guided Machine Translation have preceded the task of VQA. VQA helps to retrieve temporal and spatial information from the video scenes and interpret it. In this survey, we review a number of methods and datasets for the task of VQA. To the best of our knowledge, no previous survey has been conducted for the VQA task.

[47]  arXiv:2101.05957 [pdf, other]
Title: Descriptive AI Ethics: Collecting and Understanding the Public Opinion
Comments: Accepted to the Ethics in Design Workshop at ACM CSCW 2020 (this https URL). 5 pages
Subjects: Computers and Society (cs.CY); Artificial Intelligence (cs.AI)

There is a growing need for data-driven research efforts on how the public perceives the ethical, moral, and legal issues of autonomous AI systems. The current debate on the responsibility gap posed by these systems is one such example. This work proposes a mixed AI ethics model that allows normative and descriptive research to complement each other, by aiding scholarly discussion with data gathered from the public. We discuss its implications on bridging the gap between optimistic and pessimistic views towards AI systems' deployment.

[48]  arXiv:2101.05960 [pdf, other]
Title: DeepWaste: Applying Deep Learning to Waste Classification for a Sustainable Planet
Authors: Yash Narayan
Journal-ref: Tackling Climate Change with Machine Learning at NeurIPS 2020
Subjects: Machine Learning (cs.LG)

Accurate waste disposal, at the point of disposal, is crucial to fighting climate change. When materials that could be recycled or composted get diverted into landfills, they cause the emission of potent greenhouse gases such as methane. Current attempts to reduce erroneous waste disposal are expensive, inaccurate, and confusing. In this work, we propose DeepWaste, an easy-to-use mobile app, that utilizes highly optimized deep learning techniques to provide users instantaneous waste classification into trash, recycling, and compost. We experiment with several convolution neural network architectures to detect and classify waste items. Our best model, a deep learning residual neural network with 50 layers, achieves an average precision of 0.881 on the test set. We demonstrate the performance and efficiency of our app on a set of real-world images.

[49]  arXiv:2101.05961 [pdf, other]
Title: Mining Knowledge Graphs From Incident Reports
Subjects: Software Engineering (cs.SE); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)

Incident management is a critical part of the DevOps processes for developing and operating large-scale services in the cloud. Incident reports filed by customers are largely unstructured making any automated diagnosis or mitigation non-trivial. It requires on-call engineers to parse verbose reports to understand the issue and locate key information. Prior work has looked into extraction of key attributes or entities like error codes, tenant Ids, stack traces, etc. from incident and bug reports. Although a flat list of entities is informative, to unlock the full potential of knowledge extraction, it is necessary to provide context to these entities. For instance, the relations between the real-world concepts or objects that these entities represent in otherwise unstructured data is useful for downstream tasks like incident linking, triaging and mitigation. With this additional context, entities are transformed from "Strings" to "Things". In this work, we present an approach to mine and score binary entity relations from co-occurring entity pairs. We evaluate binary relations extracted and show that our approach has a high precision of 0.9. Further, we construct knowledge graphs automatically and show that the implicit knowledge in the graph can be used to mine and rank relevant entities for distinct incidents, by mapping entities to clusters of incident titles.

[50]  arXiv:2101.05962 [pdf, ps, other]
Title: A Data Flow Analysis Framework for Data Flow Subsumption
Subjects: Software Engineering (cs.SE)

Data flow testing creates test requirements as definition-use (DU) associations, where a definition is a program location that assigns a value to a variable and a use is a location where that value is accessed. Data flow testing is expensive, largely because of the number of test requirements. Luckily, many DU-associations are redundant in the sense that if one test requirement (e.g., node, edge, DU-association) is covered, other DU-associations are guaranteed to also be covered. This relationship is called subsumption. Thus, testers can save resources by only covering DU-associations that are not subsumed by other testing requirements. In this work, we formally describe the Data Flow Subsumption Framework (DSF) conceived to tackle the data flow subsumption problem. We show that DFS is a distributive data flow analysis framework which allows efficient iterative algorithms to find the Meet-Over-All-Paths (MOP) solution for DSF transfer functions. The MOP solution implies that the results at a point $p$ are valid for all paths that reach $p$. We also present an algorithm, called Subsumption Algorithm (SA), that uses DSF transfer functions and iterative algorithms to find the local DU-associations-node subsumption; that is, the set of DU-associations that are covered whenever a node $n$ is toured by a test. A proof of SA's correctness is presented and its complexity is analyzed.

[51]  arXiv:2101.05963 [pdf]
Title: Determine Disturbance Locations in Power Grids using Bicubic 2D Interpolation on Electromechanical Wave-front Propagation Delay
Authors: Shutang You
Comments: 18 pages, 14 figures, 1 table
Subjects: Systems and Control (eess.SY)

This study presents a method to locate power system disturbance using wide-area synchrophasor measurements. The merits of the proposed method include robustness and easy for visualization. In addition, the proposed method facilitates the calculation of electromechanical wave propagation speed distribution. An example of locating the disturbance and generating the propagation speed distribution is demonstrated based on FNET/GridEye, a distribution-level wide-area measurement system. Without losing generality, the proposed method can be implemented in any other wide-area measurement systems.

[52]  arXiv:2101.05965 [pdf, other]
Title: Real-time Power System Simulation with Hardware Devices through DNP3 in Cyber-Physical Testbed
Comments: 6 pages, to be published in the 5th Texas Power and Energy Conference
Subjects: Systems and Control (eess.SY)

Modern power grids are dependent on communication systems for data collection, visualization, and control. Distributed Network Protocol 3 (DNP3) is commonly used in supervisory control and data acquisition (SCADA) systems in power systems to allow control system software and hardware to communicate. To study the dependencies between communication network security, power system data collection, and industrial hardware, it is important to enable communication capabilities with real-time power system simulation. In this paper, we present the integration of new functionality of a power systems dynamic simulation package into our cyber-physical power system testbed that supports real-time power system data transfer using DNP3, demonstrated with an industrial real-time automation controller (RTAC). The usage and configuration of DNP3 with real-world equipment in to achieve power system monitoring and control of a large-scale synthetic electric grid via this DNP3 communication is presented. Then, an exemplar of DNP3 data collection and control is achieved in software and hardware using the 2000-bus Texas synthetic grid.

[53]  arXiv:2101.05967 [pdf, other]
Title: Responsible AI Challenges in End-to-end Machine Learning
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI)

Responsible AI is becoming critical as AI is widely used in our everyday lives. Many companies that deploy AI publicly state that when training a model, we not only need to improve its accuracy, but also need to guarantee that the model does not discriminate against users (fairness), is resilient to noisy or poisoned data (robustness), is explainable, and more. In addition, these objectives are not only relevant to model training, but to all steps of end-to-end machine learning, which include data collection, data cleaning and validation, model training, model evaluation, and model management and serving. Finally, responsible AI is conceptually challenging, and supporting all the objectives must be as easy as possible. We thus propose three key research directions towards this vision - depth, breadth, and usability - to measure progress and introduce our ongoing research. First, responsible AI must be deeply supported where multiple objectives like fairness and robust must be handled together. To this end, we propose FR-Train, a holistic framework for fair and robust model training in the presence of data bias and poisoning. Second, responsible AI must be broadly supported, preferably in all steps of machine learning. Currently we focus on the data pre-processing steps and propose Slice Tuner, a selective data acquisition framework for training fair and accurate models, and MLClean, a data cleaning framework that also improves fairness and robustness. Finally, responsible AI must be usable where the techniques must be easy to deploy and actionable. We propose FairBatch, a batch selection approach for fairness that is effective and simple to use, and Slice Finder, a model evaluation tool that automatically finds problematic slices. We believe we scratched the surface of responsible AI for end-to-end machine learning and suggest research challenges moving forward.

[54]  arXiv:2101.05970 [pdf, other]
Title: Affordance-based Reinforcement Learning for Urban Driving
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Robotics (cs.RO)

Traditional autonomous vehicle pipelines that follow a modular approach have been very successful in the past both in academia and industry, which has led to autonomy deployed on road. Though this approach provides ease of interpretation, its generalizability to unseen environments is limited and hand-engineering of numerous parameters is required, especially in the prediction and planning systems. Recently, deep reinforcement learning has been shown to learn complex strategic games and perform challenging robotic tasks, which provides an appealing framework for learning to drive. In this work, we propose a deep reinforcement learning framework to learn optimal control policy using waypoints and low-dimensional visual representations, also known as affordances. We demonstrate that our agents when trained from scratch learn the tasks of lane-following, driving around inter-sections as well as stopping in front of other actors or traffic lights even in the dense traffic setting. We note that our method achieves comparable or better performance than the baseline methods on the original and NoCrash benchmarks on the CARLA simulator.

[55]  arXiv:2101.05972 [pdf, other]
Title: "Killing Me" Is Not a Spoiler: Spoiler Detection Model using Graph Neural Networks with Dependency Relation-Aware Attention Mechanism
Comments: EACL 2021
Subjects: Computation and Language (cs.CL)

Several machine learning-based spoiler detection models have been proposed recently to protect users from spoilers on review websites. Although dependency relations between context words are important for detecting spoilers, current attention-based spoiler detection models are insufficient for utilizing dependency relations. To address this problem, we propose a new spoiler detection model called SDGNN that is based on syntax-aware graph neural networks. In the experiments on two real-world benchmark datasets, we show that our SDGNN outperforms the existing spoiler detection models.

[56]  arXiv:2101.05974 [pdf, other]
Title: Inductive Representation Learning in Temporal Networks via Causal Anonymous Walks
Comments: Accepted to ICLR 2021
Subjects: Machine Learning (cs.LG); Social and Information Networks (cs.SI); Machine Learning (stat.ML)

Temporal networks serve as abstractions of many real-world dynamic systems. These networks typically evolve according to certain laws, such as the law of triadic closure, which is universal in social networks. Inductive representation learning of temporal networks should be able to capture such laws and further be applied to systems that follow the same laws but have not been unseen during the training stage. Previous works in this area depend on either network node identities or rich edge attributes and typically fail to extract these laws. Here, we propose Causal Anonymous Walks (CAWs) to inductively represent a temporal network. CAWs are extracted by temporal random walks and work as automatic retrieval of temporal network motifs to represent network dynamics while avoiding the time-consuming selection and counting of those motifs. CAWs adopt a novel anonymization strategy that replaces node identities with the hitting counts of the nodes based on a set of sampled walks to keep the method inductive, and simultaneously establish the correlation between motifs. We further propose a neural-network model CAW-N to encode CAWs, and pair it with a CAW sampling strategy with constant memory and time cost to support online training and inference. CAW-N is evaluated to predict links over 6 real temporal networks and uniformly outperforms previous SOTA methods by averaged 15% AUC gain in the inductive setting. CAW-N also outperforms previous methods in 5 out of the 6 networks in the transductive setting.

[57]  arXiv:2101.05982 [pdf, other]
Title: Randomized Ensembled Double Q-Learning: Learning Fast Without a Model
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI)

Using a high Update-To-Data (UTD) ratio, model-based methods have recently achieved much higher sample efficiency than previous model-free methods for continuous-action DRL benchmarks. In this paper, we introduce a simple model-free algorithm, Randomized Ensembled Double Q-Learning (REDQ), and show that its performance is just as good as, if not better than, a state-of-the-art model-based algorithm for the MuJoCo benchmark. Moreover, REDQ can achieve this performance using fewer parameters than the model-based method, and with less wall-clock run time. REDQ has three carefully integrated ingredients which allow it to achieve its high performance: (i) a UTD ratio >> 1; (ii) an ensemble of Q functions; (iii) in-target minimization across a random subset of Q functions from the ensemble. Through carefully designed experiments, we provide a detailed analysis of REDQ and related model-free algorithms. To our knowledge, REDQ is the first successful model-free DRL algorithm for continuous-action spaces using a UTD ratio >> 1.

[58]  arXiv:2101.05983 [pdf]
Title: Russian Troll Account Classification with Twitter and Facebook Data
Comments: 17 pages
Subjects: Social and Information Networks (cs.SI)

In this analysis, we work with the data set that was compiled by Darren Linvill and Patrick Warren, along with a representative sample of Facebook ads that were released by the House Intelligence Committee Minority. The goal of this analysis is to use the categories defined by Linvill and Warren in the Twitter data and investigate if these categories exist in Facebook ads. This begin to give us insights to the tactics used between the two social media services. Further, we try to replicate Linvill and Warren's original categorization of the Twitter data. Lastly, we investigate what categories may exist in the Facebook data.

[59]  arXiv:2101.05985 [pdf, other]
Title: Interaction-Aware Behavior Planning for Autonomous Vehicles Validated with Real Traffic Data
Subjects: Robotics (cs.RO); Systems and Control (eess.SY)

Autonomous vehicles (AVs) need to interact with other traffic participants who can be either cooperative or aggressive, attentive or inattentive. Such different characteristics can lead to quite different interactive behaviors. Hence, to achieve safe and efficient autonomous driving, AVs need to be aware of such uncertainties when they plan their own behaviors. In this paper, we formulate such a behavior planning problem as a partially observable Markov Decision Process (POMDP) where the cooperativeness of other traffic participants is treated as an unobservable state. Under different cooperativeness levels, we learn the human behavior models from real traffic data via the principle of maximum likelihood. Based on that, the POMDP problem is solved by Monte-Carlo Tree Search. We verify the proposed algorithm in both simulations and real traffic data on a lane change scenario, and the results show that the proposed algorithm can successfully finish the lane changes without collisions.

[60]  arXiv:2101.05986 [pdf, other]
Title: Quality meets Diversity: A Model-Agnostic Framework for Computerized Adaptive Testing
Comments: Accepted by ICDM'2020
Subjects: Artificial Intelligence (cs.AI); Computers and Society (cs.CY); Machine Learning (cs.LG)

Computerized Adaptive Testing (CAT) is emerging as a promising testing application in many scenarios, such as education, game and recruitment, which targets at diagnosing the knowledge mastery levels of examinees on required concepts. It shows the advantage of tailoring a personalized testing procedure for each examinee, which selects questions step by step, depending on her performance. While there are many efforts on developing CAT systems, existing solutions generally follow an inflexible model-specific fashion. That is, they need to observe a specific cognitive model which can estimate examinee's knowledge levels and design the selection strategy according to the model estimation. In this paper, we study a novel model-agnostic CAT problem, where we aim to propose a flexible framework that can adapt to different cognitive models. Meanwhile, this work also figures out CAT solution with addressing the problem of how to generate both high-quality and diverse questions simultaneously, which can give a comprehensive knowledge diagnosis for each examinee. Inspired by Active Learning, we propose a novel framework, namely Model-Agnostic Adaptive Testing (MAAT) for CAT solution, where we design three sophisticated modules including Quality Module, Diversity Module and Importance Module. Extensive experimental results on two real-world datasets clearly demonstrate that our MAAT can support CAT with guaranteeing both quality and diversity perspectives.

[61]  arXiv:2101.05988 [pdf]
Title: Coarse-grained decomposition and fine-grained interaction for multi-hop question answering
Authors: Xing Cao, Yun Liu
Subjects: Computation and Language (cs.CL)

Recent advances regarding question answering and reading comprehension have resulted in models that surpass human performance when the answer is contained in a single, continuous passage of text, requiring only single-hop reasoning. However, in actual scenarios, lots of complex queries require multi-hop reasoning. The key to the Question Answering task is semantic feature interaction between documents and questions, which is widely processed by Bi-directional Attention Flow (Bi-DAF), but Bi-DAF generally captures only the surface semantics of words in complex questions and fails to capture implied semantic feature of intermediate answers. As a result, Bi-DAF partially ignores part of the contexts related to the question and cannot extract the most important parts of multiple documents. In this paper we propose a new model architecture for multi-hop question answering, by applying two completion strategies: (1) Coarse-Grain complex question Decomposition (CGDe) strategy are introduced to decompose complex question into simple ones under the condition of without any additional annotations (2) Fine-Grained Interaction (FGIn) strategy are introduced to better represent each word in the document and extract more comprehensive and accurate sentences related to the inference path. The above two strategies are combined and tested on the SQuAD and HotpotQA datasets, and the experimental results show that our method outperforms state-of-the-art baselines.

[62]  arXiv:2101.05993 [pdf, other]
Title: Ensemble Learning Based Classification Algorithm Recommendation
Subjects: Information Retrieval (cs.IR); Machine Learning (cs.LG)

Recommending appropriate algorithms to a classification problem is one of the most challenging issues in the field of data mining. The existing algorithm recommendation models are generally constructed on only one kind of meta-features by single learners. Considering that i) ensemble learners usually show better performance and ii) different kinds of meta-features characterize the classification problems in different viewpoints independently, and further the models constructed with different sets of meta-features will be complementary with each other and applicable for ensemble. This paper proposes an ensemble learning-based algorithm recommendation method. To evaluate the proposed recommendation method, extensive experiments with 13 well-known candidate classification algorithms and five different kinds of meta-features are conducted on 1090 benchmark classification problems. The results show the effectiveness of the proposed ensemble learning based recommendation method.

[63]  arXiv:2101.05995 [pdf, other]
Title: Accurate and Robust Scale Recovery for Monocular Visual Odometry Based on Plane Geometry
Comments: Submitting to IEEE International Conference on Robotics and Automation 2021
Subjects: Computer Vision and Pattern Recognition (cs.CV)

Scale ambiguity is a fundamental problem in monocular visual odometry. Typical solutions include loop closure detection and environment information mining. For applications like self-driving cars, loop closure is not always available, hence mining prior knowledge from the environment becomes a more promising approach. In this paper, with the assumption of a constant height of the camera above the ground, we develop a light-weight scale recovery framework leveraging an accurate and robust estimation of the ground plane. The framework includes a ground point extraction algorithm for selecting high-quality points on the ground plane, and a ground point aggregation algorithm for joining the extracted ground points in a local sliding window. Based on the aggregated data, the scale is finally recovered by solving a least-squares problem using a RANSAC-based optimizer. Sufficient data and robust optimizer enable a highly accurate scale recovery. Experiments on the KITTI dataset show that the proposed framework can achieve state-of-the-art accuracy in terms of translation errors, while maintaining competitive performance on the rotation error. Due to the light-weight design, our framework also demonstrates a high frequency of 20Hz on the dataset.

[64]  arXiv:2101.05996 [pdf]
Title: Convolutional Neural Network with Pruning Method for Handwritten Digit Recognition
Authors: Mengyu Chen
Subjects: Computer Vision and Pattern Recognition (cs.CV); Neural and Evolutionary Computing (cs.NE)

CNN model is a popular method for imagery analysis, so it could be utilized to recognize handwritten digits based on MNIST datasets. For higher recognition accuracy, various CNN models with different fully connected layer sizes are exploited to figure out the relationship between the CNN fully connected layer size and the recognition accuracy. Inspired by previous pruning work, we performed pruning methods of distinctiveness on CNN models and compared the pruning performance with NN models. For better pruning performances on CNN, the effect of angle threshold on the pruning performance was explored. The evaluation results show that: for the fully connected layer size, there is a threshold, so that when the layer size increases, the recognition accuracy grows if the layer size smaller than the threshold, and falls if the layer size larger than the threshold; the performance of pruning performed on CNN is worse than on NN; as pruning angle threshold increases, the fully connected layer size and the recognition accuracy decreases. This paper also shows that for CNN models trained by the MNIST dataset, they are capable of handwritten digit recognition and achieve the highest recognition accuracy with fully connected layer size 400. In addition, for same dataset MNIST, CNN models work better than big, deep, simple NN models in a published paper.

[65]  arXiv:2101.05998 [pdf, other]
Title: A Vehicles Control Model to Alleviate Traffic Instability
Comments: 13 pages, 35 figures
Subjects: Systems and Control (eess.SY)

While bringing convenience to people, the growing number of vehicles on road already cause inevitable traffic congestion. Some traffic congestion happen with observable reasons, but others occur without apparent reasons or bottlenecks, which referred to as phantom jams, are caused by traditional vehicle following model. In order to alleviate the traffic instability caused by phantom jam, several models have been proposed with the development of intelligent transportation system (ITS). these have been proved to be able to suppress traffic instability in the ideal situation. But in road scenarios, uncertainties of vehicle state measurements and time delay caused by on-board sensors, inter-vehicle communications and control system of vehicles will affect the performance of the existing models severely, and cannot be ignored. In this paper, a novel predictable bilateral control model-PBCM, which consists of best estimation and state prediction is proposed to determine accurate acceleration values of the host vehicle in traffic flow to alleviate traffic instability. Theoretical analysis and simulation results show that our model could reduce the influence of the measurement errors and the delay caused by communication and control system effectively, control the state of the vehicles in traffic flow accurately, thus achieve the goal of restrain the instability of traffic flow.

[66]  arXiv:2101.06000 [pdf, other]
Title: Horizon: A Gas-Efficient, Trustless Bridge for Cross-Chain Transactions
Comments: 14 Pages
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)

With the rise of digital currency systems that rely on blockchain to ensure ledger security, the ability to perform cross-chain transactions is becoming a crucial interoperability requirement. Such transactions allow not only funds to be transferred from one blockchain to another (as done in atomic swaps), but also a blockchain to verify the inclusion of any event on another blockchain. Cross-chain bridges are protocols that allow on-chain exchange of cryptocurrencies, on-chain transfer of assets to sidechains, and cross-shard verification of events in sharded blockchains, many of which rely on Byzantine fault tolerance (BFT) for scalability. Unfortunately, existing bridge protocols that can transfer funds from a BFT blockchain incur significant computation overhead on the destination blockchain, resulting in a high gas cost for smart contract verification of events. In this paper, we propose Horizon, a gas-efficient, cross-chain bridge protocol to transfer assets from a BFT blockchain to another blockchain (e.g., Ethereum) that supports basic smart contract execution.

[67]  arXiv:2101.06004 [pdf, other]
Title: Walk in Wild: An Ensemble Approach for Hostility Detection in Hindi Posts
Subjects: Computation and Language (cs.CL)

As the reach of the internet increases, pejorative terms started flooding over social media platforms. This leads to the necessity of identifying hostile content on social media platforms. Identification of hostile contents on low-resource languages like Hindi poses different challenges due to its diverse syntactic structure compared to English. In this paper, we develop a simple ensemble based model on pre-trained mBERT and popular classification algorithms like Artificial Neural Network (ANN) and XGBoost for hostility detection in Hindi posts. We formulated this problem as binary classification (hostile and non-hostile class) and multi-label multi-class classification problem (for more fine-grained hostile classes). We received third overall rank in the competition and weighted F1-scores of ~0.969 and ~0.61 on the binary and multi-label multi-class classification tasks respectively.

[68]  arXiv:2101.06005 [pdf, other]
Title: SimGAN: Hybrid Simulator Identification for Domain Adaptation via Adversarial Reinforcement Learning
Comments: Submitted to ICRA 2021
Subjects: Robotics (cs.RO)

As learning-based approaches progress towards automating robot controllers design, transferring learned policies to new domains with different dynamics (e.g. sim-to-real transfer) still demands manual effort. This paper introduces SimGAN, a framework to tackle domain adaptation by identifying a hybrid physics simulator to match the simulated trajectories to the ones from the target domain, using a learned discriminative loss to address the limitations associated with manual loss design. Our hybrid simulator combines neural networks and traditional physics simulaton to balance expressiveness and generalizability, and alleviates the need for a carefully selected parameter set in System ID. Once the hybrid simulator is identified via adversarial reinforcement learning, it can be used to refine policies for the target domain, without the need to collect more data. We show that our approach outperforms multiple strong baselines on six robotic locomotion tasks for domain adaptation.

[69]  arXiv:2101.06006 [pdf, other]
Title: The Geometry of Deep Generative Image Models and its Applications
Comments: 23 pages, 10 figures. Published as a conference paper at ICLR 2021
Subjects: Machine Learning (cs.LG); Neural and Evolutionary Computing (cs.NE); Numerical Analysis (math.NA)

Generative adversarial networks (GANs) have emerged as a powerful unsupervised method to model the statistical patterns of real-world data sets, such as natural images. These networks are trained to map random inputs in their latent space to new samples representative of the learned data. However, the structure of the latent space is hard to intuit due to its high dimensionality and the non-linearity of the generator, which limits the usefulness of the models. Understanding the latent space requires a way to identify input codes for existing real-world images (inversion), and a way to identify directions with known image transformations (interpretability). Here, we use a geometric framework to address both issues simultaneously. We develop an architecture-agnostic method to compute the Riemannian metric of the image manifold created by GANs. The eigen-decomposition of the metric isolates axes that account for different levels of image variability. An empirical analysis of several pretrained GANs shows that image variation around each position is concentrated along surprisingly few major axes (the space is highly anisotropic) and the directions that create this large variation are similar at different positions in the space (the space is homogeneous). We show that many of the top eigenvectors correspond to interpretable transforms in the image space, with a substantial part of eigenspace corresponding to minor transforms which could be compressed out. This geometric understanding unifies key previous results related to GAN interpretability. We show that the use of this metric allows for more efficient optimization in the latent space (e.g. GAN inversion) and facilitates unsupervised discovery of interpretable axes. Our results illustrate that defining the geometry of the GAN image manifold can serve as a general framework for understanding GANs.

[70]  arXiv:2101.06013 [pdf, other]
Title: Reasoning over Vision and Language: Exploring the Benefits of Supplemental Knowledge
Subjects: Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)

The limits of applicability of vision-and-language models are defined by the coverage of their training data. Tasks like vision question answering (VQA) often require commonsense and factual information beyond what can be learned from task-specific datasets. This paper investigates the injection of knowledge from general-purpose knowledge bases (KBs) into vision-and-language transformers. We use an auxiliary training objective that encourages the learned representations to align with graph embeddings of matching entities in a KB. We empirically study the relevance of various KBs to multiple tasks and benchmarks. The technique brings clear benefits to knowledge-demanding question answering tasks (OK-VQA, FVQA) by capturing semantic and relational knowledge absent from existing models. More surprisingly, the technique also benefits visual reasoning tasks (NLVR2, SNLI-VE). We perform probing experiments and show that the injection of additional knowledge regularizes the space of embeddings, which improves the representation of lexical and semantic similarities. The technique is model-agnostic and can expand the applicability of any vision-and-language transformer with minimal computational overhead.

[71]  arXiv:2101.06015 [pdf, ps, other]
Title: Deadlock in packet switching networks
Comments: This is a version with full proofs of the preprint that was submitted to FSEN 2021, and accepted for publication in that conference (to appear in Springer LNCS)
Subjects: Networking and Internet Architecture (cs.NI); Logic in Computer Science (cs.LO)

A deadlock in a packet switching network is a state in which one or more messages have not yet reached their target, yet cannot progress any further. We formalize three different notions of deadlock in the context of packet switching networks, to which we refer as global, local and weak deadlock. We establish the precise relations between these notions, and prove they characterize different sets of deadlocks. Moreover, we implement checking of deadlock freedom of packet switching networks using the symbolic model checker nuXmv. We show experimentally that the implementation is effective at finding subtle deadlock situations in packet switching networks.

[72]  arXiv:2101.06021 [pdf, other]
Title: Non-uniform Motion Deblurring with Blurry Component Divided Guidance
Subjects: Computer Vision and Pattern Recognition (cs.CV)

Blind image deblurring is a fundamental and challenging computer vision problem, which aims to recover both the blur kernel and the latent sharp image from only a blurry observation. Despite the superiority of deep learning methods in image deblurring have displayed, there still exists major challenge with various non-uniform motion blur. Previous methods simply take all the image features as the input to the decoder, which handles different degrees (e.g. large blur, small blur) simultaneously, leading to challenges for sharp image generation. To tackle the above problems, we present a deep two-branch network to deal with blurry images via a component divided module, which divides an image into two components based on the representation of blurry degree. Specifically, two component attentive blocks are employed to learn attention maps to exploit useful deblurring feature representations on both large and small blurry regions. Then, the blur-aware features are fed into two-branch reconstruction decoders respectively. In addition, a new feature fusion mechanism, orientation-based feature fusion, is proposed to merge sharp features of the two branches. Both qualitative and quantitative experimental results show that our method performs favorably against the state-of-the-art approaches.

[73]  arXiv:2101.06022 [pdf, other]
Title: Motion-Based Handwriting Recognition
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI)

We attempt to overcome the restriction of requiring a writing surface for handwriting recognition. In this study, we design a prototype of a stylus equipped with motion sensor, and utilizes gyroscopic and acceleration sensor reading to perform written letter classification using various deep learning techniques such as CNN and RNNs. We also explore various data augmentation techniques and their effects, reaching up to 86% accuracy.

[74]  arXiv:2101.06025 [pdf, other]
Title: Motion-Based Handwriting Recognition and Word Reconstruction
Subjects: Computer Vision and Pattern Recognition (cs.CV)

In this project, we leverage a trained single-letter classifier to predict the written word from a continuously written word sequence, by designing a word reconstruction pipeline consisting of a dynamic-programming algorithm and an auto-correction model. We conduct experiments to optimize models in this pipeline, then employ domain adaptation to explore using this pipeline on unseen data distributions.

[75]  arXiv:2101.06028 [pdf, other]
Title: QoS-Driven Video Uplinking in NOMA-Based IoT
Subjects: Networking and Internet Architecture (cs.NI)

In recent years, with the explosive growth of visual sensors and a large number of related video applications in Internet of Things (IoT), massive video data is generated by IoT devices. Since the volume of video data is far greater than traditional data in IoT, it is challenging to ensure high Quality of Service (QoS) for video uplinking in IoT. To address this challenge, we integrate non-orthogonal multiple access (NOMA) and scalable video coding (SVC) in IoT. To improve the video quality, we formulate a power allocation problem to maximize the average QoS in the proposed integrated system. Due to that the problem is non-convex, we transform it into a monotonic problem based on its hidden monotonicity. Then a power allocation algorithm based on polyblock outer approximation is proposed to solve the problem effectively. Finally, simulation results demonstrate that the proposed algorithm outperforms existing OMA and NOMA based schemes for video uplinking in IoT in terms of QoS and energy efficiency.

[76]  arXiv:2101.06030 [pdf]
Title: Directed Diversity: Leveraging Language Embedding Distances for Collective Creativity in Crowd Ideation
Comments: CHI 2021
Subjects: Human-Computer Interaction (cs.HC)

Crowdsourcing can collect many diverse ideas by prompting ideators individually, but this can generate redundant ideas. Prior methods reduce redundancy by presenting peers' ideas or peer-proposed prompts, but these require much human coordination. We introduce Directed Diversity, an automatic prompt selection approach that leverages language model embedding distances to maximize diversity. Ideators can be directed towards diverse prompts and away from prior ideas, thus improving their collective creativity. Since there are diverse metrics of diversity, we present a Diversity Prompting Evaluation Framework consolidating metrics from several research disciplines to analyze along the ideation chain - prompt selection, prompt creativity, prompt-ideation mediation, and ideation creativity. Using this framework, we evaluated Directed Diversity in a series of a simulation study and four user studies for the use case of crowdsourcing motivational messages to encourage physical activity. We show that automated diverse prompting can variously improve collective creativity across many nuanced metrics of diversity.

[77]  arXiv:2101.06033 [pdf, ps, other]
Title: Improved Rank-Modulation Codes for DNA Storage with Shotgun Sequencing
Subjects: Information Theory (cs.IT); Combinatorics (math.CO)

We study permutations over the set of $\ell$-grams, that are feasible in the sense that there is a sequence whose $\ell$-gram frequency has the same ranking as the permutation. Codes, which are sets of feasible permutations, protect information stored in DNA molecules using the rank-modulation scheme, and read using the shotgun sequencing technique. We construct systematic codes with an efficient encoding algorithm, and show that they are optimal in size. The length of the DNA sequences that correspond to the codewords is shown to be polynomial in the code parameters. Non-systematic with larger size are also constructed.

[78]  arXiv:2101.06039 [pdf, other]
Title: Secure Optimization Through Opaque Observations
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)

Secure applications implement software protections against side-channel and physical attacks. Such protections are meaningful at machine code or micro-architectural level, but they typically do not carry observable semantics at source level. To prevent optimizing compilers from altering the protection, security engineers embed input/output side-effects into the protection. These side-effects are error-prone and compiler-dependent, and the current practice involves analyzing the generated machine code to make sure security or privacy properties are still enforced. Vu et al. recently demonstrated how to automate the insertion of volatile side-effects in a compiler [52], but these may be too expensive in fined-grained protections such as control-flow integrity. We introduce observations of the program state that are intrinsic to the correct execution of security protections, along with means to specify and preserve observations across the compilation flow. Such observations complement the traditional input/output-preservation contract of compilers. We show how to guarantee their preservation without modifying compilation passes and with as little performance impact as possible. We validate our approach on a range of benchmarks, expressing the secure compilation of these applications in terms of observations to be made at specific program points.

[79]  arXiv:2101.06040 [pdf, other]
Title: Towards a Computed-Aided Diagnosis System in Colonoscopy: Automatic Polyp Segmentation Using Convolution Neural Networks
Comments: 10 pages, 6 figures
Journal-ref: Journal of Medical Robotics Research, Volume 03, No. 02, 1840002 (2018) G
Subjects: Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)

Early diagnosis is essential for the successful treatment of bowel cancers including colorectal cancer (CRC) and capsule endoscopic imaging with robotic actuation can be a valuable diagnostic tool when combined with automated image analysis. We present a deep learning rooted detection and segmentation framework for recognizing lesions in colonoscopy and capsule endoscopy images. We restructure established convolution architectures, such as VGG and ResNets, by converting them into fully-connected convolution networks (FCNs), fine-tune them and study their capabilities for polyp segmentation and detection. We additionally use Shape from-Shading (SfS) to recover depth and provide a richer representation of the tissue's structure in colonoscopy images. Depth is incorporated into our network models as an additional input channel to the RGB information and we demonstrate that the resulting network yields improved performance. Our networks are tested on publicly available datasets and the most accurate segmentation model achieved a mean segmentation IU of 47.78% and 56.95% on the ETIS-Larib and CVC-Colon datasets, respectively. For polyp detection, the top performing models we propose surpass the current state of the art with detection recalls superior to 90% for all datasets tested. To our knowledge, we present the first work to use FCNs for polyp segmentation in addition to proposing a novel combination of SfS and RGB that boosts performance

[80]  arXiv:2101.06043 [pdf, other]
Title: Bulwark: Holistic and Verified Security Monitoring of Web Protocols
Comments: Full version of the paper presented at ESORICS2020 (14-18 September 2020)
Journal-ref: ESORICS 2020: Computer Security (2020) 23-41
Subjects: Cryptography and Security (cs.CR)

Modern web applications often rely on third-party services to provide their functionality to users. The secure integration of these services is a non-trivial task, as shown by the large number of attacks against Single Sign On and Cashier-as-a-Service protocols. In this paper we present Bulwark, a new automatic tool which generates formally verified security monitors from applied pi-calculus specifications of web protocols. The security monitors generated by Bulwark offer holistic protection, since they can be readily deployed both at the client side and at the server side, thus ensuring full visibility of the attack surface against web protocols. We evaluate the effectiveness of Bulwark by testing it against a pool of vulnerable web applications that use the OAuth 2.0 protocol or integrate the PayPal payment system.

[81]  arXiv:2101.06044 [pdf, other]
Title: A Particle Filtering Framework for Integrity Risk of GNSS-Camera Sensor Fusion
Journal-ref: Proceedings of the 33rd International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+ 2020)
Subjects: Robotics (cs.RO); Machine Learning (cs.LG)

Adopting a joint approach towards state estimation and integrity monitoring results in unbiased integrity monitoring unlike traditional approaches. So far, a joint approach was used in Particle RAIM [l] for GNSS measurements only. In our work, we extend Particle RAIM to a GNSS-camera fused system for joint state estimation and integrity monitoring. To account for vision faults, we derive a probability distribution over position from camera images using map-matching. We formulate a Kullback-Leibler Divergence metric to assess the consistency of GNSS and camera measurements and mitigate faults during sensor fusion. The derived integrity risk upper bounds the probability of Hazardously Misleading Information (HMI). Experimental validation on a real-world dataset shows that our algorithm produces less than 11 m position error and the integrity risk over bounds the probability of HMI with 0.11 failure rate for an 8 m Alert Limit in an urban scenario.

[82]  arXiv:2101.06046 [pdf, other]
Title: Counterfactual Generative Networks
Comments: Published at ICLR 2021
Subjects: Machine Learning (cs.LG); Computer Vision and Pattern Recognition (cs.CV)

Neural networks are prone to learning shortcuts -- they often model simple correlations, ignoring more complex ones that potentially generalize better. Prior works on image classification show that instead of learning a connection to object shape, deep classifiers tend to exploit spurious correlations with low-level texture or the background for solving the classification task. In this work, we take a step towards more robust and interpretable classifiers that explicitly expose the task's causal structure. Building on current advances in deep generative modeling, we propose to decompose the image generation process into independent causal mechanisms that we train without direct supervision. By exploiting appropriate inductive biases, these mechanisms disentangle object shape, object texture, and background; hence, they allow for generating counterfactual images. We demonstrate the ability of our model to generate such images on MNIST and ImageNet. Further, we show that the counterfactual images can improve out-of-distribution robustness with a marginal drop in performance on the original classification task, despite being synthetic. Lastly, our generative model can be trained efficiently on a single GPU, exploiting common pre-trained models as inductive biases.

[83]  arXiv:2101.06052 [pdf, other]
Title: Chance constrained sets approximation: A probabilistic scaling approach -- EXTENDED VERSION
Comments: 16 pages, 11 figures, submitted to Automatica
Subjects: Systems and Control (eess.SY); Optimization and Control (math.OC)

In this paper, a sample-based procedure for obtaining simple and computable approximations of chance-constrained sets is proposed. The procedure allows to control the complexity of the approximating set, by defining families of simple-approximating sets of given complexity. A probabilistic scaling procedure then allows to rescale these sets to obtain the desired probabilistic guarantees. The proposed approach is shown to be applicable in several problem in systems and control, such as the design of Stochastic Model Predictive Control schemes or the solution of probabilistic set membership estimation problems.

[84]  arXiv:2101.06053 [pdf, other]
Title: The Multimodal Sentiment Analysis in Car Reviews (MuSe-CaR) Dataset: Collection, Insights and Improvements
Subjects: Multimedia (cs.MM); Computation and Language (cs.CL)

Truly real-life data presents a strong, but exciting challenge for sentiment and emotion research. The high variety of possible `in-the-wild' properties makes large datasets such as these indispensable with respect to building robust machine learning models. A sufficient quantity of data covering a deep variety in the challenges of each modality to force the exploratory analysis of the interplay of all modalities has not yet been made available in this context. In this contribution, we present MuSe-CaR, a first of its kind multimodal dataset. The data is publicly available as it recently served as the testing bed for the 1st Multimodal Sentiment Analysis Challenge, and focused on the tasks of emotion, emotion-target engagement, and trustworthiness recognition by means of comprehensively integrating the audio-visual and language modalities. Furthermore, we give a thorough overview of the dataset in terms of collection and annotation, including annotation tiers not used in this year's MuSe 2020. In addition, for one of the sub-challenges - predicting the level of trustworthiness - no participant outperformed the baseline model, and so we propose a simple, but highly efficient Multi-Head-Attention network that exceeds using multimodal fusion the baseline by around 0.2 CCC (almost 50 % improvement).

[85]  arXiv:2101.06054 [pdf, other]
Title: Artificial Intelligence for IT Operations (AIOPS) Workshop White Paper
Comments: 8 pages, white paper for the AIOPS 2020 workshop at ICSOC 2020
Subjects: Machine Learning (cs.LG); Software Engineering (cs.SE)

Artificial Intelligence for IT Operations (AIOps) is an emerging interdisciplinary field arising in the intersection between the research areas of machine learning, big data, streaming analytics, and the management of IT operations. AIOps, as a field, is a candidate to produce the future standard for IT operation management. To that end, AIOps has several challenges. First, it needs to combine separate research branches from other research fields like software reliability engineering. Second, novel modelling techniques are needed to understand the dynamics of different systems. Furthermore, it requires to lay out the basis for assessing: time horizons and uncertainty for imminent SLA violations, the early detection of emerging problems, autonomous remediation, decision making, support of various optimization objectives. Moreover, a good understanding and interpretability of these aiding models are important for building trust between the employed tools and the domain experts. Finally, all this will result in faster adoption of AIOps, further increase the interest in this research field and contribute to bridging the gap towards fully-autonomous operating IT systems.
The main aim of the AIOPS workshop is to bring together researchers from both academia and industry to present their experiences, results, and work in progress in this field. The workshop aims to strengthen the community and unite it towards the goal of joining the efforts for solving the main challenges the field is currently facing. A consensus and adoption of the principles of openness and reproducibility will boost the research in this emerging area significantly.

[86]  arXiv:2101.06056 [pdf, other]
Title: EC-SAGINs: Edge Computing-enhanced Space-Air-Ground Integrated Networks for Internet of Vehicles
Comments: The paper is accepted by IEEE IoTJ, Jan. 2021
Subjects: Networking and Internet Architecture (cs.NI); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC)

Edge computing-enhanced Internet of Vehicles (EC-IoV) enables ubiquitous data processing and content sharing among vehicles and terrestrial edge computing (TEC) infrastructures (e.g., 5G base stations and roadside units) with little or no human intervention, plays a key role in the intelligent transportation systems. However, EC-IoV is heavily dependent on the connections and interactions between vehicles and TEC infrastructures, thus will break down in some remote areas where TEC infrastructures are unavailable (e.g., desert, isolated islands and disaster-stricken areas). Driven by the ubiquitous connections and global-area coverage, space-air-ground integrated networks (SAGINs) efficiently support seamless coverage and efficient resource management, represent the next frontier for edge computing. In light of this, we first review the state-of-the-art edge computing research for SAGINs in this article. After discussing several existing orbital and aerial edge computing architectures, we propose a framework of edge computing-enabled space-air-ground integrated networks (EC-SAGINs) to support various IoV services for the vehicles in remote areas. The main objective of the framework is to minimize the task completion time and satellite resource usage. To this end, a pre-classification scheme is presented to reduce the size of action space, and a deep imitation learning (DIL) driven offloading and caching algorithm is proposed to achieve real-time decision making. Simulation results show the effectiveness of our proposed scheme. At last, we also discuss some technology challenges and future directions.

[87]  arXiv:2101.06060 [pdf]
Title: The Challenge of Value Alignment: from Fairer Algorithms to AI Safety
Subjects: Computers and Society (cs.CY)

This paper addresses the question of how to align AI systems with human values and situates it within a wider body of thought regarding technology and value. Far from existing in a vacuum, there has long been an interest in the ability of technology to 'lock-in' different value systems. There has also been considerable thought about how to align technologies with specific social values, including through participatory design-processes. In this paper we look more closely at the question of AI value alignment and suggest that the power and autonomy of AI systems gives rise to opportunities and challenges in the domain of value that have not been encountered before. Drawing important continuities between the work of the fairness, accountability, transparency and ethics community, and work being done by technical AI safety researchers, we suggest that more attention needs to be paid to the question of 'social value alignment' - that is, how to align AI systems with the plurality of values endorsed by groups of people, especially on the global level.

[88]  arXiv:2101.06061 [pdf, other]
Title: Heating up decision boundaries: isocapacitory saturation, adversarial scenarios and generalization bounds
Comments: Accepted as conference paper at ICLR 2021. 36 pages, 16 figures, comments welcome!
Subjects: Machine Learning (cs.LG); Metric Geometry (math.MG); Probability (math.PR); Statistics Theory (math.ST); Machine Learning (stat.ML)

In the present work we study classifiers' decision boundaries via Brownian motion processes in ambient data space and associated probabilistic techniques. Intuitively, our ideas correspond to placing a heat source at the decision boundary and observing how effectively the sample points warm up. We are largely motivated by the search for a soft measure that sheds further light on the decision boundary's geometry. En route, we bridge aspects of potential theory and geometric analysis (Mazya, 2011, Grigoryan-Saloff-Coste, 2002) with active fields of ML research such as adversarial examples and generalization bounds. First, we focus on the geometric behavior of decision boundaries in the light of adversarial attack/defense mechanisms. Experimentally, we observe a certain capacitory trend over different adversarial defense strategies: decision boundaries locally become flatter as measured by isoperimetric inequalities (Ford et al, 2019); however, our more sensitive heat-diffusion metrics extend this analysis and further reveal that some non-trivial geometry invisible to plain distance-based methods is still preserved. Intuitively, we provide evidence that the decision boundaries nevertheless retain many persistent "wiggly and fuzzy" regions on a finer scale. Second, we show how Brownian hitting probabilities translate to soft generalization bounds which are in turn connected to compression and noise stability (Arora et al, 2018), and these bounds are significantly stronger if the decision boundary has controlled geometric features.

[89]  arXiv:2101.06066 [pdf, other]
Title: Unstructured Knowledge Access in Task-oriented Dialog Modeling using Language Inference, Knowledge Retrieval and Knowledge-Integrative Response Generation
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI)

Dialog systems enriched with external knowledge can handle user queries that are outside the scope of the supporting databases/APIs. In this paper, we follow the baseline provided in DSTC9 Track 1 and propose three subsystems, KDEAK, KnowleDgEFactor, and Ens-GPT, which form the pipeline for a task-oriented dialog system capable of accessing unstructured knowledge. Specifically, KDEAK performs knowledge-seeking turn detection by formulating the problem as natural language inference using knowledge from dialogs, databases and FAQs. KnowleDgEFactor accomplishes the knowledge selection task by formulating a factorized knowledge/document retrieval problem with three modules performing domain, entity and knowledge level analyses. Ens-GPT generates a response by first processing multiple knowledge snippets, followed by an ensemble algorithm that decides if the response should be solely derived from a GPT2-XL model, or regenerated in combination with the top-ranking knowledge snippet. Experimental results demonstrate that the proposed pipeline system outperforms the baseline and generates high-quality responses, achieving at least 58.77% improvement on BLEU-4 score.

[90]  arXiv:2101.06067 [pdf, other]
Title: Constraint Handling in Continuous-Time DDP-Based Model Predictive Control
Subjects: Robotics (cs.RO); Systems and Control (eess.SY); Optimization and Control (math.OC)

The Sequential Linear Quadratic (SLQ) algorithm is a continuous-time variant of the well-known Differential Dynamic Programming (DDP) technique with a Gauss-Newton Hessian approximation. This family of methods has gained popularity in the robotics community due to its efficiency in solving complex trajectory optimization problems. However, one major drawback of DDP-based formulations is their inability to properly incorporate path constraints. In this paper, we address this issue by devising a constrained SLQ algorithm that handles a mixture of constraints with a previously implemented projection technique and a new augmented-Lagrangian approach. By providing an appropriate multiplier update law, and by solving a single inner and outer loop iteration, we are able to retrieve suboptimal solutions at rates suitable for real-time model-predictive control applications. We particularly focus on the inequality-constrained case, where three augmented-Lagrangian penalty functions are introduced, along with their corresponding multiplier update rules. These are then benchmarked against a relaxed log-barrier formulation in a cart-pole swing up example, an obstacle-avoidance task, and an object-pushing task with a quadrupedal mobile manipulator.

[91]  arXiv:2101.06069 [pdf, other]
Title: Data Impressions: Mining Deep Models to Extract Samples for Data-free Applications
Comments: PAMI Submission (Under Review). arXiv admin note: substantial text overlap with arXiv:1905.08114
Subjects: Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Machine Learning (stat.ML)

Pretrained deep models hold their learnt knowledge in the form of the model parameters. These parameters act as memory for the trained models and help them generalize well on unseen data. However, in absence of training data, the utility of a trained model is merely limited to either inference or better initialization towards a target task. In this paper, we go further and extract synthetic data by leveraging the learnt model parameters. We dub them "Data Impressions", which act as proxy to the training data and can be used to realize a variety of tasks. These are useful in scenarios where only the pretrained models are available and the training data is not shared (e.g., due to privacy or sensitivity concerns). We show the applicability of data impressions in solving several computer vision tasks such as unsupervised domain adaptation, continual learning as well as knowledge distillation. We also study the adversarial robustness of the lightweight models trained via knowledge distillation using these data impressions. Further, we demonstrate the efficacy of data impressions in generating UAPs with better fooling rates. Extensive experiments performed on several benchmark datasets demonstrate competitive performance achieved using data impressions in absence of the original training data.

[92]  arXiv:2101.06070 [pdf, other]
Title: Efficient Semi-Implicit Variational Inference
Subjects: Machine Learning (cs.LG)

In this paper, we propose CI-VI an efficient and scalable solver for semi-implicit variational inference (SIVI). Our method, first, maps SIVI's evidence lower bound (ELBO) to a form involving a nonlinear functional nesting of expected values and then develops a rigorous optimiser capable of correctly handling bias inherent to nonlinear nested expectations using an extrapolation-smoothing mechanism coupled with gradient sketching. Our theoretical results demonstrate convergence to a stationary point of the ELBO in general non-convex settings typically arising when using deep network models and an order of $O(t^{-\frac{4}{5}})$ gradient-bias-vanishing rate. We believe these results generalise beyond the specific nesting arising from SIVI to other forms. Finally, in a set of experiments, we demonstrate the effectiveness of our algorithm in approximating complex posteriors on various data-sets including those from natural language processing.

[93]  arXiv:2101.06071 [pdf, other]
Title: Hierarchical Multitask Learning with Dependency Parsing for Japanese Semantic Role Labeling Improves Performance of Argument Identification
Subjects: Computation and Language (cs.CL)

With the advent of FrameNet and PropBank, many semantic role labeling (SRL) systems have been proposed in English. Although research on Japanese predicate argument structure analysis (PASA) has been conducted, most studies focused on surface cases. There are only few previous works on Japanese SRL for deep cases, and their models' accuracies are low. Therefore, we propose a hierarchical multitask learning method with dependency parsing (DP) and show that our model achieves state-of-the-art results in Japanese SRL. Also, we conduct experiments with a joint model that performs both argument identification and argument classification simultaneously. The result suggests that multitasking with DP is mainly effective for argument identification.

[94]  arXiv:2101.06072 [pdf, ps, other]
Title: Video Summarization Using Deep Neural Networks: A Survey
Comments: Journal paper; Under review
Subjects: Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Multimedia (cs.MM)

Video summarization technologies aim to create a concise and complete synopsis by selecting the most informative parts of the video content. Several approaches have been developed over the last couple of decades and the current state of the art is represented by methods that rely on modern deep neural network architectures. This work focuses on the recent advances in the area and provides a comprehensive survey of the existing deep-learning-based methods for generic video summarization. After presenting the motivation behind the development of technologies for video summarization, we formulate the video summarization task and discuss the main characteristics of a typical deep-learning-based analysis pipeline. Then, we suggest a taxonomy of the existing algorithms and provide a systematic review of the relevant literature that shows the evolution of the deep-learning-based video summarization technologies and leads to suggestions for future developments. We then report on protocols for the objective evaluation of video summarization algorithms and we compare the performance of several deep-learning-based approaches. Based on the outcomes of these comparisons, as well as some documented considerations about the suitability of evaluation protocols, we indicate potential future research directions.

[95]  arXiv:2101.06073 [pdf, other]
Title: Dynamic Normalization
Comments: 9 pages, 5 figures
Subjects: Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)

Batch Normalization has become one of the essential components in CNN. It allows the network to use a higher learning rate and speed up training. And the network doesn't need to be initialized carefully. However, in our work, we find that a simple extension of BN can increase the performance of the network. First, we extend BN to adaptively generate scale and shift parameters for each mini-batch data, called DN-C (Batch-shared and Channel-wise). We use the statistical characteristics of mini-batch data ($E[X], Std[X]\in\mathbb{R}^{c}$) as the input of SC module. Then we extend BN to adaptively generate scale and shift parameters for each channel of each sample, called DN-B (Batch and Channel-wise). Our experiments show that DN-C model can't train normally, but DN-B model has very good robustness. In classification task, DN-B can improve the accuracy of the MobileNetV2 on ImageNet-100 more than 2% with only 0.6% additional Mult-Adds. In detection task, DN-B can improve the accuracy of the SSDLite on MS-COCO nearly 4% mAP with the same settings. Compared with BN, DN-B has stable performance when using higher learning rate or smaller batch size.

[96]  arXiv:2101.06079 [pdf, other]
Title: Preprocessing Imprecise Points for the Pareto Front
Subjects: Computational Geometry (cs.CG)

In the preprocessing model for uncertain data we are given a set of regions R which model the uncertainty associated with an unknown set of points P. In this model there are two phases: a preprocessing phase, in which we have access only to R, followed by a reconstruction phase, in which we have access to points in P at a certain retrieval cost C per point. We study the following algorithmic question: how fast can we construct the pareto front of P in the preprocessing model?
We show that if R is a set of pairwise-disjoint axis-aligned rectangles, then we can preprocess R to reconstruct the Pareto front of P efficiently. To refine our algorithmic analysis, we introduce a new notion of algorithmic optimality which relates to the entropy of the uncertainty regions. Our proposed uncertainty-region optimality falls on the spectrum between worst-case optimality and instance optimality. We prove that instance optimality is unobtainable in the preprocessing model, whenever the classic algorithmic problem reduces to sorting. Our results are worst-case optimal in the preprocessing phase; in the reconstruction phase, our results are uncertainty-region optimal with respect to real RAM instructions, and instance optimal with respect to point retrievals.

[97]  arXiv:2101.06085 [pdf, other]
Title: Deep Dual-resolution Networks for Real-time and Accurate Semantic Segmentation of Road Scenes
Comments: 12 pages, 6 figures. This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
Subjects: Computer Vision and Pattern Recognition (cs.CV)

Semantic segmentation is a critical technology for autonomous vehicles to understand surrounding scenes. For practical autonomous vehicles, it is undesirable to spend a considerable amount of inference time to achieve high-accuracy segmentation results. Using light-weight architectures (encoder-decoder or two-pathway) or reasoning on low-resolution images, recent methods realize very fast scene parsing which even run at more than 100 FPS on single 1080Ti GPU. However, there are still evident gaps in performance between these real-time methods and models based on dilation backbones. To tackle this problem, we propose novel deep dual-resolution networks (DDRNets) for real-time semantic segmentation of road scenes. Besides, we design a new contextual information extractor named Deep Aggregation Pyramid Pooling Module (DAPPM) to enlarge effective receptive fields and fuse multi-scale context. Our method achieves new state-of-the-art trade-off between accuracy and speed on both Cityscapes and CamVid dataset. Specially, on single 2080Ti GPU, DDRNet-23-slim yields 77.4% mIoU at 109 FPS on Cityscapes test set and 74.4% mIoU at 230 FPS on CamVid test set. Without utilizing attention mechanism, pre-training on larger semantic segmentation dataset or inference acceleration, DDRNet-39 attains 80.4% test mIoU at 23 FPS on Cityscapes. With widely used test augmentation, our method is still superior to most state-of-the-art models, requiring much less computation. Codes and trained models will be made publicly available.

[98]  arXiv:2101.06087 [pdf, ps, other]
Title: An Abstract Contract Theory for Programs with Procedures
Authors: Christian Lidström, Dilian Gurov (KTH Royal Institute of Technology, Stockholm, Sweden)
Comments: 24 pages. This is the full version of the paper An Abstract Contract Theory for Programs with Procedures, to appear in the Proceedings of the 24th International Conference on Fundamental Approaches to Software Engineering (FASE 2021), which includes the proofs of all theorems and additional examples. The conference version should always be cited
Subjects: Logic in Computer Science (cs.LO)

When developing complex software and systems, contracts provide a means for controlling the complexity by dividing the responsibilities among the components of the system in a hierarchical fashion. In specific application areas, dedicated contract theories formalise the notion of contract and the operations on contracts in a manner that supports best the development of systems in that area. At the other end, contract meta-theories attempt to provide a systematic view on the various contract theories by axiomatising their desired properties. However, there exists a noticeable gap between the most well-known contract meta-theory of Benveniste et al., which focuses on the design of embedded and cyber-physical systems, and the established way of using contracts when developing general software, following Meyer's design-by-contract methodology. At the core of this gap appears to be the notion of procedure: while it is a central unit of composition in software development, the meta-theory does not suggest an obvious way of treating procedures as components.
In this paper, we provide a first step towards a contract theory that takes procedures as the basic building block, and is at the same time an instantiation of the meta-theory. To this end, we propose an abstract contract theory for sequential programming languages with procedures, based on denotational semantics. We show that, on the one hand, the specification of contracts of procedures in Hoare logic, and their procedure-modular verification, can be cast naturally in the framework of our abstract contract theory. On the other hand, we also show our contract theory to fulfil the axioms of the meta-theory. In this way, we give further evidence for the utility of the meta-theory, and prepare the ground for combining our instantiation with other, already existing instantiations.

[99]  arXiv:2101.06091 [pdf, other]
Title: On the Verification and Validation of AI Navigation Algorithms
Subjects: Artificial Intelligence (cs.AI)

This paper explores the state of the art on to methods to verify and validate navigation algorithms for autonomous surface ships. We perform a systematic mapping study to find research works published in the last 10 years proposing new algorithms for autonomous navigation and collision avoidance and we have extracted what verification and validation approaches have been applied on these algorithms. We observe that most research works use simulations to validate their algorithms. However, these simulations often involve just a few scenarios designed manually. This raises the question if the algorithms have been validated properly. To remedy this, we propose the use of a systematic scenario-based testing approach to validate navigation algorithms extensively.

[100]  arXiv:2101.06092 [pdf, other]
Title: Black-box Adversarial Attacks in Autonomous Vehicle Technology
Comments: 7 pages, 10 figures, published in 49th Annual IEEE AIPR 2020: Trusted Computing, Privacy, and Securing Multimedia Washington, D.C. October 13-15, 2020
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI)

Despite the high quality performance of the deep neural network in real-world applications, they are susceptible to minor perturbations of adversarial attacks. This is mostly undetectable to human vision. The impact of such attacks has become extremely detrimental in autonomous vehicles with real-time "safety" concerns. The black-box adversarial attacks cause drastic misclassification in critical scene elements such as road signs and traffic lights leading the autonomous vehicle to crash into other vehicles or pedestrians. In this paper, we propose a novel query-based attack method called Modified Simple black-box attack (M-SimBA) to overcome the use of a white-box source in transfer based attack method. Also, the issue of late convergence in a Simple black-box attack (SimBA) is addressed by minimizing the loss of the most confused class which is the incorrect class predicted by the model with the highest probability, instead of trying to maximize the loss of the correct class. We evaluate the performance of the proposed approach to the German Traffic Sign Recognition Benchmark (GTSRB) dataset. We show that the proposed model outperforms the existing models like Transfer-based projected gradient descent (T-PGD), SimBA in terms of convergence time, flattening the distribution of confused class probability, and producing adversarial samples with least confidence on the true class.

[101]  arXiv:2101.06096 [pdf]
Title: Motorcycle System for Optimum Road Safety with Anti-theft Capability
Authors: Carlo H Godoy Jr
Comments: 10 pages. International Journal of Innovative Science and Research Technology 2020
Subjects: Computers and Society (cs.CY)

Due to road traffic accidents, 6941 Filipinos died in 2010, and thousands more were wounded or disabled. Head and neck injuries are the main cause of death, severe injury, and motorcycle users disabilities. Motorcycle users make up a large proportion of those on the road who were killed. The main purpose of the study is to develop an MCU Based Motorcycle System for Optimum Road Safety with Anti-theft Capability that will help motorcycle riders to be safe while travelling in national roads. The researchers will be using the prototyping methodology where in a prototype is built according to the initial requirements gathered from the motorists themselves. The expected result of the proposed methodology is the system will be utilizing the different function of each modules to ensure that the riders will be able to detect and avoid possible danger while on the road. As a result of different literature in relation to each module, the system is expected to provide a new leap to ensure the safety of all riders here in the Philippines. Future studies will ensure the development of the system, provide testing and improve the functionality of the system depending on the test result. Due to the high increase in the number of cars and motorcycle travelling on national road, the percentage of accidents also is getting higher. In line with that, the proposed system is expected to lessen the percentage of accident by avoiding the possible cause of it.

[102]  arXiv:2101.06097 [pdf]
Title: Impact of Autonomous Vehicle Technology on Long Distance Travel Behavior
Comments: This paper has been accepted by the Institute of Industrial and Systems Engineers (IISE) annual conference and expo 2020
Subjects: Computers and Society (cs.CY)

Although rapid progress in-vehicle automated technology has sped up the possibility of using fully automated technology for public use, little research has been done on the possible influences of autonomous vehicles (AVs) technology on long-distance travel. This technology has the potential to have a significant effect on intercity trips. This study analyzed a travel survey to anticipate the impact of this technology on long-distance trips. We have divided trips into two different categories including trips for pleasure and trips for business. Different hypotheses based on the authors' knowledge and assisted by existing literature have been defined for each type of trip. By using the Pearson method these hypotheses have been tested and the positive or negative responses from respondents have been evaluated. The findings show that using AVs for pleasure trips can increase the number of travelers and stimulate people to choose longer distances for their trips. In addition, people enjoy more and will be interested to travel more frequently. For business trips, AV technology can reduce travel costs and job-related stress. Unlike pleasure trips for which people are not interested in traveling at night, business travelers prefer to travel at night.

[103]  arXiv:2101.06098 [pdf, other]
Title: How AI Developers Overcome Communication Challenges in a Multidisciplinary Team: A Case Study
Comments: 25 pages, 7 figures, 4 tables
Subjects: Computers and Society (cs.CY); Artificial Intelligence (cs.AI)

The development of AI applications is a multidisciplinary effort, involving multiple roles collaborating with the AI developers, an umbrella term we use to include data scientists and other AI-adjacent roles on the same team. During these collaborations, there is a knowledge mismatch between AI developers, who are skilled in data science, and external stakeholders who are typically not. This difference leads to communication gaps, and the onus falls on AI developers to explain data science concepts to their collaborators. In this paper, we report on a study including analyses of both interviews with AI developers and artifacts they produced for communication. Using the analytic lens of shared mental models, we report on the types of communication gaps that AI developers face, how AI developers communicate across disciplinary and organizational boundaries, and how they simultaneously manage issues regarding trust and expectations.

[104]  arXiv:2101.06100 [pdf, other]
Title: A New Artificial Neuron Proposal with Trainable Simultaneous Local and Global Activation Function
Subjects: Neural and Evolutionary Computing (cs.NE); Machine Learning (cs.LG)

The activation function plays a fundamental role in the artificial neural network learning process. However, there is no obvious choice or procedure to determine the best activation function, which depends on the problem. This study proposes a new artificial neuron, named global-local neuron, with a trainable activation function composed of two components, a global and a local. The global component term used here is relative to a mathematical function to describe a general feature present in all problem domain. The local component is a function that can represent a localized behavior, like a transient or a perturbation. This new neuron can define the importance of each activation function component in the learning phase. Depending on the problem, it results in a purely global, or purely local, or a mixed global and local activation function after the training phase. Here, the trigonometric sine function was employed for the global component and the hyperbolic tangent for the local component. The proposed neuron was tested for problems where the target was a purely global function, or purely local function, or a composition of two global and local functions. Two classes of test problems were investigated, regression problems and differential equations solving. The experimental tests demonstrated the Global-Local Neuron network's superior performance, compared with simple neural networks with sine or hyperbolic tangent activation function, and with a hybrid network that combines these two simple neural networks.

[105]  arXiv:2101.06102 [pdf]
Title: GSM-GPRS Based Smart Street Light
Comments: 5 pages, 10 figures, 2nd International Conference on Robotics, electrical and Signal Processing Techniques (ICREST)
Subjects: Computers and Society (cs.CY)

Street lighting system has always been the traditional manual system of illuminating the streets in Bangladesh, where a dedicated person is posted only to control the street lights of a zone, who roams around the zonal area to switch on and switch off the lights two times a day, which brings about the exhibition of bright lights in street even after sunrise and in some cases maybe the whole day. This results in insertion to the budget. In addition to this, faulty lights may not come to the heed of the concerned authority for a long time which leads to the technical downside. This paper demonstrates a process of controlling the street lights in country like Bangladesh employing SIM900 GSM-GPRS Shield which comes up with the provision of manual control, semi-automated control as well as full-automated control.

[106]  arXiv:2101.06103 [pdf, ps, other]
Title: Is the Chen-Sbert Divergence a Metric?
Authors: Min Chen, Mateu Sbert
Subjects: Information Theory (cs.IT)

Recently, Chen and Sbert proposed a general divergence measure. This report presents some interim findings about the question whether the divergence measure is a metric or not. It has been postulated that (i) the measure might be a metric when (0 < k <= 1), and (ii) the k-th root of the measure might be a metric when (k > 1). The report shows that for a 2-letter alphabet, postulation (i) can be proved. The possible pathway for obtaining a proof for (i) in n-letter cases is also discussed. The authors hope that the report may stimulate more scholarly effort to study the mathematical properties of this divergence measure.

[107]  arXiv:2101.06104 [pdf]
Title: Modeling and Analysis of Three Properties of Mobile Interactive Systems Based on Variable Petri Nets
Comments: 12 pages
Subjects: Systems and Control (eess.SY); Formal Languages and Automata Theory (cs.FL)

Due to the mobility and frequent disconnections, the correctness of mobile interaction systems, such as mobile robot systems and mobile payment systems, are often difficult to analyze. This paper introduces three critical properties of systems, called system connectivity, interaction soundness and data validity, and presents a related modeling and analysis method, based on a kind of Petri nets called VPN. For a given system, a model including component nets and interaction structure nets is constructed by using VPNs. The component net describes the internal process of each component, while the interaction structure net reflects the dynamic interaction between components. Based on this model, three properties are defined and analyzed. The case study of a practical mobile payment system shows the effectiveness of the proposed method.

[108]  arXiv:2101.06105 [pdf]
Title: Scientific Relevance and Future of Digital Immortality and Virtual Humans
Authors: Daniel Cebo
Comments: 5 pages
Journal-ref: volume 5, issue 12, December 2020, SJIF Impact Factor: 7.001, ISI I.F.Value:1.241
Subjects: Computers and Society (cs.CY)

We are on the threshold of a significant change in the way we view digital life, which will have a major effect on the physical world. Computers have increasingly emulated deceased human beings through growing awareness in the fields of artificial intelligence, big data, and machine learning, and have symbolically managed to overcome death with the help of technology. One thing is clear, though: now that there are proper and legitimate discussions happening about human immortality, we can be certain that the future is upon us. This article attempts to explain and challenge the ways in which digital immortality, in particular, has manifested itself. This paper summarizes the technological solutions, research findings and technical challenges of major researchers by reviewing the key technologies and general technical schemes in the field of digital human beings. The prospects of digital human beings are being investigated.

[109]  arXiv:2101.06106 [pdf]
Title: Big Data Generated by Connected and Automated Vehicles for Safety Monitoring, Assessment and Improvement, Final Report (Year 3)
Comments: 47 pages, 21 figures, this http URL
Subjects: Computers and Society (cs.CY)

This report focuses on safety aspects of connected and automated vehicles (CAVs). The fundamental question to be answered is how can CAVs improve road users' safety? Using advanced data mining and thematic text analytics tools, the goal is to systematically synthesize studies related to Big Data for safety monitoring and improvement. Within this domain, the report systematically compares Big Data initiatives related to transportation initiatives nationally and internationally and provides insights regarding the evolution of Big Data science applications related to CAVs and new challenges. The objectives addressed are: 1-Creating a database of Big Data efforts by acquiring reports, white papers, and journal publications; 2-Applying text analytics tools to extract key concepts, and spot patterns and trends in Big Data initiatives; 3-Understanding the evolution of CAV Big Data in the context of safety by quantifying granular taxonomies and modeling entity relations among contents in CAV Big Data research initiatives, and 4-Developing a foundation for exploring new approaches to tracking and analyzing CAV Big Data and related innovations. The study synthesizes and derives high-quality information from innovative research activities undertaken by various research entities through Big Data initiatives. The results can provide a conceptual foundation for developing new approaches for guiding and tracking the safety implications of Big Data and related innovations.

[110]  arXiv:2101.06110 [pdf]
Title: Bridging the Gap: the case for an Incompletely Theorized Agreement on AI policy
Subjects: Computers and Society (cs.CY)

Recent progress in artificial intelligence (AI) raises a wide array of ethical and societal concerns. Accordingly, an appropriate policy approach is needed today. While there has been a wave of scholarship in this field, the research community at times appears divided amongst those who emphasize near-term concerns, and those focusing on long-term concerns and corresponding policy measures. In this paper, we seek to map and critically examine this alleged gulf, with a view to understanding the practical space for inter-community collaboration on AI policy. This culminates in a proposal to make use of the legal notion of an incompletely theorized agreement. We propose that on certain issue areas, scholars working with near-term and long-term perspectives can converge and cooperate on selected mutually beneficial AI policy projects all the while maintaining divergent perspectives.

[111]  arXiv:2101.06111 [pdf, ps, other]
Title: Knowledge Graphs and Natural-Language Processing
Authors: Andreas L Opdahl
Comments: In Big Data in Emergency Management: Exploitation Techniques for Social and Mobile Data (pp. 75-91). Springer, Cham
Subjects: Computers and Society (cs.CY); Computation and Language (cs.CL)

Emergency-relevant data comes in many varieties. It can be high volume and high velocity, and reaction times are critical, calling for efficient and powerful techniques for data analysis and management. Knowledge graphs represent data in a rich, flexible, and uniform way that is well matched with the needs of emergency management. They build on existing standards, resources, techniques, and tools for semantic data and computing. This chapter explains the most important semantic technologies and how they support knowledge graphs. We proceed to discuss their benefits and challenges and give examples of relevant semantic data sources and vocabularies. Natural-language texts -- in particular those collected from social media such as Twitter -- is a type of data source that poses particular analysis challenges. We therefore include an overview of techniques for processing natural-language texts.

[112]  arXiv:2101.06112 [pdf]
Title: Context, input and process as critical elements for successful Emergency Remote Learning
Comments: 10 pages, 1 figure, 1 table
Subjects: Computers and Society (cs.CY)

In Spring 2020, the world moved from traditional classes to what was coined as ERL (Emergency Remote Teaching, Learning, Instruction), posing real challenges to all actors involved, requiring an immediate, unprecedented, and unplanned devising of mitigation strategies. The impacts of this transition cannot, however, be studied only at the educational level, as it consists of a broader social shift with multidomain repercussions. In this paper, we use the CIPP model (Context, Input, Process and Product evaluations) to further investigate interrelations among the context, input and process elements of ERL during the first wave of COVID-19, as the second wave presses towards reconfining. A correlation analysis of 46 variables, based students responses (N=360) to a closed-ended questionnaire shows the crucial importance of motivation and engagement in online classes, as learning enablers or constrainers. These also shape the students perception of the role that online classes play in helping them to stay more positive during ERL.

[113]  arXiv:2101.06115 [pdf, ps, other]
Title: Approximations with deep neural networks in Sobolev time-space
Comments: 34 pages. This is the first version of the paper. It is expected that some changes will be performed for the next version. arXiv admin note: text overlap with arXiv:1902.07896
Subjects: Machine Learning (cs.LG); Functional Analysis (math.FA)

Solutions of evolution equation generally lies in certain Bochner-Sobolev spaces, in which the solution may has regularity and integrability properties for the time variable that can be different for the space variables. Therefore, in this paper, we develop a framework shows that deep neural networks can approximate Sobolev-regular functions with respect to Bochner-Sobolev spaces. In our work we use the so-called Rectified Cubic Unit (ReCU) as an activation function in our networks, which allows us to deduce approximation results of the neural networks while avoiding issues caused by the non regularity of the most commonly used Rectivied Linear Unit (ReLU) activation function.

[114]  arXiv:2101.06119 [pdf, other]
Title: Data Science for Engineers: A Teaching Ecosystem
Comments: Accepted at IEEE Signal Processing Magazine (Special Issue on Innovation Starts with Education)
Subjects: Computers and Society (cs.CY); Physics Education (physics.ed-ph)

We describe an ecosystem for teaching data science (DS) to engineers which blends theory, methods, and applications, developed at the Faculty of Physical and Mathematical Sciences, Universidad de Chile, over the last three years. This initiative has been motivated by the increasing demand for DS qualifications both from academic and professional environments. The ecosystem is distributed in a collaborative fashion across three departments in the above Faculty and includes postgraduate programmes, courses, professional diplomas, data repositories, laboratories, trainee programmes, and internships. By sharing our teaching principles and the innovative components of our approach to teaching DS, we hope our experience can be useful to those developing their own DS programmes and ecosystems. The open challenges and future plans for our ecosystem are also discussed at the end of the article.

[115]  arXiv:2101.06120 [pdf, other]
Title: Effect of Gameplay Uncertainty, Display Type, and Age on Virtual Reality Exergames
Comments: Accepted to ACM 2021 CHI Conference on Human Factors in Computing Systems (CHI 2021)
Journal-ref: CHI 2021
Subjects: Human-Computer Interaction (cs.HC)

Uncertainty is widely acknowledged as an engaging gameplay element but rarely used in exergames. In this research, we explore the role of uncertainty in exergames and introduce three uncertain elements (false-attacks, misses, and critical hits) to an exergame. We conducted a study under two conditions (uncertain and certain), with two display types (virtual reality and large display) and across young and middle-aged adults to measure their effect on game performance, experience, and exertion. Results show that (1) our designed uncertain elements are instrumental in increasing exertion levels; (2) when playing a motion-based first-person perspective exergame, virtual reality can improve performance, while maintaining the same motion sickness level as a large display; and (3) exergames for middle-aged adults should be designed with age-related declines in mind, similar to designing for elderly adults. We also framed two design guidelines for exergames that have similar features to the game used in this research.

[116]  arXiv:2101.06124 [pdf, other]
Title: Identifying Authorship Style in Malicious Binaries: Techniques, Challenges & Datasets
Comments: 31 pages, 3 figures, 10 tables
Subjects: Cryptography and Security (cs.CR)

Attributing a piece of malware to its creator typically requires threat intelligence. Binary attribution increases the level of difficulty as it mostly relies upon the ability to disassemble binaries to identify authorship style. Our survey explores malicious author style and the adversarial techniques used by them to remain anonymous. We examine the adversarial impact on the state-of-the-art methods. We identify key findings and explore the open research challenges. To mitigate the lack of ground truth datasets in this domain, we publish alongside this survey the largest and most diverse meta-information dataset of 15,660 malware labeled to 164 threat actor groups.

[117]  arXiv:2101.06125 [pdf]
Title: The Impact of Post-editing and Machine Translation on Creativity and Reading Experience
Comments: 28 pages, 10 tables, 4 figures. Translation Spaces (2020)
Subjects: Computation and Language (cs.CL)

This article presents the results of a study involving the translation of a fictional story from English into Catalan in three modalities: machine-translated (MT), post-edited (MTPE) and translated without aid (HT). Each translation was analysed to evaluate its creativity. Subsequently, a cohort of 88 Catalan participants read the story in a randomly assigned modality and completed a survey. The results show that HT presented a higher creativity score if compared to MTPE and MT. HT also ranked higher in narrative engagement, and translation reception, while MTPE ranked marginally higher in enjoyment. HT and MTPE show no statistically significant differences in any category, whereas MT does in all variables tested. We conclude that creativity is highest when professional translators intervene in the process, especially when working without any aid. We hypothesize that creativity in translation could be the factor that enhances reading engagement and the reception of translated literary texts.

[118]  arXiv:2101.06126 [pdf, other]
Title: EAGER: Embedding-Assisted Entity Resolution for Knowledge Graphs
Comments: 10 pages, 7 figures
Subjects: Machine Learning (cs.LG); Databases (cs.DB)

Entity Resolution (ER) is a constitutional part for integrating different knowledge graphs in order to identify entities referring to the same real-world object. A promising approach is the use of graph embeddings for ER in order to determine the similarity of entities based on the similarity of their graph neighborhood. The similarity computations for such embeddings translates to calculating the distance between them in the embedding space which is comparatively simple. However, previous work has shown that the use of graph embeddings alone is not sufficient to achieve high ER quality. We therefore propose a more comprehensive ER approach for knowledge graphs called EAGER (Embedding-Assisted Knowledge Graph Entity Resolution) to flexibly utilize both the similarity of graph embeddings and attribute values within a supervised machine learning approach. We evaluate our approach on 23 benchmark datasets with differently sized and structured knowledge graphs and use hypothesis tests to ensure statistical significance of our results. Furthermore we compare our approach with state-of-the-art ER solutions, where our approach yields competitive results for table-oriented ER problems and shallow knowledge graphs but much better results for deeper knowledge graphs.

[119]  arXiv:2101.06129 [pdf, other]
Title: Let's Share VMs: Optimal Placement and Pricing across Base Stations in MEC Systems
Comments: Accepted at IEEE INFOCOM 2021 - IEEE Conference on Computer Communications
Subjects: Information Theory (cs.IT); Networking and Internet Architecture (cs.NI); Systems and Control (eess.SY)

In mobile edge computing (MEC) systems, users offload computationally intensive tasks to edge servers at base stations. However, with unequal demand across the network, there might be excess demand at some locations and underutilized resources at other locations. To address such load-unbalanced problem in MEC systems, in this paper we propose virtual machines (VMs) sharing across base stations. Specifically, we consider the joint VM placement and pricing problem across base stations to match demand and supply and maximize revenue at the network level. To make this problem tractable, we decompose it into master and slave problems. For the placement master problem, we propose a Markov approximation algorithm MAP on the design of a continuous time Markov chain. As for the pricing slave problem, we propose OPA - an optimal VM pricing auction, where all users are truthful. Furthermore, given users' potential untruthful behaviors, we propose an incentive compatible auction iCAT along with a partitioning mechanism PUFF, for which we prove incentive compatibility and revenue guarantees. Finally, we combine MAP and OPA or PUFF to solve the original problem, and analyze the optimality gap. Simulation results show that collaborative base stations increases revenue by up to 50%.

[120]  arXiv:2101.06133 [pdf]
Title: Teaming up with information agents
Comments: 4 pages
Subjects: Human-Computer Interaction (cs.HC); Artificial Intelligence (cs.AI)

Despite the intricacies involved in designing a computer as a teampartner, we can observe patterns in team behavior which allow us to describe at a general level how AI systems are to collaborate with humans. Whereas most work on human-machine teaming has focused on physical agents (e.g. robotic systems), our aim is to study how humans can collaborate with information agents. We propose some appropriate team design patterns, and test them using our Collaborative Intelligence Analysis (CIA) tool.

[121]  arXiv:2101.06137 [pdf, ps, other]
Title: Quantitative System-Level Security Verification of the IoV Infrastructure
Subjects: Cryptography and Security (cs.CR)

The Internet of Vehicles (IoV) equips vehicles with connectivity to the Internet and the Internet of Things (IoT) to support modern applications such as autonomous driving. However, the consolidation of complex computing domains of vehicles, the Internet, and the IoT limits the applicability of tailored security solutions. In this paper, we propose a new methodology to quantitatively verify the security of single or system-level assets of the IoV infrastructure. In detail, our methodology decomposes assets of the IoV infrastructure with the help of reference sub-architectures and the 4+1 view model analysis to map identified assets into data, software, networking, and hardware categories. This analysis includes a custom threat modeling concept to perform parameterization of Common Vulnerability Scoring System (CVSS) scores per view model domain. As a result, our methodology is able to allocate assets from attack paths to view model domains. This equips assets of attack paths with our IoV-driven CVSS scores. Our CVSS scores assess the attack likelihood which we use for Markov Chain transition probabilities. This way, we quantitatively verify system-level security among a set of IoV assets. Our results show that our methodology applies to arbitrary IoV attack paths. Based on our parameterization of CVSS scores and our selection of use cases, remote attacks are less likely to compromise location data compared to attacks from close proximity for authorized and unauthorized attackers respectively.

[122]  arXiv:2101.06138 [pdf, other]
Title: TrustSECO: An Interview Survey into Software Trust
Subjects: Software Engineering (cs.SE)

The software ecosystem is a trust-rich part of the world. Collaboratively, software engineers trust major hubs in the ecosystem, such as package managers, repository services, and programming language ecosystems. This trust, however, is often broken by vulnerabilities, ransomware, and abuse from malignant actors.
But what is trust? In this paper we explore, through twelve in-depth interviews with software engineers, how they perceive trust in their daily work. From the interviews we conclude three things. First, software engineers make a distinction between an adoption factor and a trust factor when selecting a package. Secondly, while in literature mostly technical factors are considered as the main trust factors, the software engineers in this study conclude that organizational factors are more important. Finally, we find that different kinds of software engineers require different views on trust, and that it is impossible to create one unified perception of trust.
Keywords: software ecosystem trust, empirical software engineering, TrustSECO, external software adoption, cross-sectional exploratory interview analysis, trust perception.

[123]  arXiv:2101.06139 [pdf, other]
Title: CPU Scheduling in Data Centers Using Asynchronous Finite-Time Distributed Coordination Mechanisms
Comments: 10 pages, 11 figures
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Systems and Control (eess.SY)

We propose an asynchronous iterative scheme which allows a set of interconnected nodes to distributively reach an agreement to within a pre-specified bound in a finite number of steps. While this scheme could be adopted in a wide variety of applications, we discuss it within the context of task scheduling for data centers. In this context, the algorithm is guaranteed to approximately converge to the optimal scheduling plan, given the available resources, in a finite number of steps. Furthermore, being asynchronous, the proposed scheme is able to take in account the uncertainty that can be introduced from straggler nodes or communication issues in the form of latency variability while still converging to the target objective. In addition, by using extensive empirical evaluation through simulations we show that the proposed method exhibits state-of-the-art performance.

[124]  arXiv:2101.06141 [pdf, other]
Title: Operationalizing Framing to Support MultiperspectiveRecommendations of Opinion Pieces
Comments: Accepted to ACM FAccT 2021, this https URL
Subjects: Information Retrieval (cs.IR); Computers and Society (cs.CY)

Diversity in personalized news recommender systems is often defined as dissimilarity, and based on topic diversity (e.g., corona versus farmers strike). Diversity in news media, however, is understood as multiperspectivity (e.g., different opinions on corona measures), and arguably a key responsibility of the press in a democratic society. While viewpoint diversity is often considered synonymous with source diversity in communication science domain, in this paper, we take a computational view. We operationalize the notion of framing, adopted from communication science. We apply this notion to a re-ranking of topic-relevant recommended lists, to form the basis of a novel viewpoint diversification method. Our offline evaluation indicates that the proposed method is capable of enhancing the viewpoint diversity of recommendation lists according to a diversity metric from literature. In an online study, on the Blendle platform, a Dutch news aggregator platform, with more than 2000 users, we found that users are willing to consume viewpoint diverse news recommendations. We also found that presentation characteristics significantly influence the reading behaviour of diverse recommendations. These results suggest that future research on presentation aspects of recommendations can be just as important as novel viewpoint diversification methods to truly achieve multiperspectivity in online news environments.

[125]  arXiv:2101.06143 [pdf, other]
Title: Ask Me or Tell Me? Enhancing the Effectiveness of Crowdsourced Design Feedback
Subjects: Human-Computer Interaction (cs.HC)

Crowdsourced design feedback systems are emerging resources for getting large amounts of feedback in a short period of time. Traditionally, the feedback comes in the form of a declarative statement, which often contains positive or negative sentiment. Prior research has shown that overly negative or positive sentiment can strongly influence the perceived usefulness and acceptance of feedback and, subsequently, lead to ineffective design revisions. To enhance the effectiveness of crowdsourced design feedback, we investigate a new approach for mitigating the effects of negative or positive feedback by combining open-ended and thought-provoking questions with declarative feedback statements. We conducted two user studies to assess the effects of question-based feedback on the sentiment and quality of design revisions in the context of graphic design. We found that crowdsourced question-based feedback contains more neutral sentiment than statement-based feedback. Moreover, we provide evidence that presenting feedback as questions followed by statements leads to better design revisions than question- or statement-based feedback alone.

[126]  arXiv:2101.06146 [pdf, other]
Title: Needmining: Designing Digital Support to Elicit Needs from Social Media
Subjects: Computers and Society (cs.CY); Machine Learning (cs.LG)

Today's businesses face a high pressure to innovate in order to succeed in highly competitive markets. Successful innovations, though, typically require the identification and analysis of customer needs. While traditional, established need elicitation methods are time-proven and have demonstrated their capabilities to deliver valuable insights, they lack automation and scalability and, thus, are expensive and time-consuming. In this article, we propose an approach to automatically identify and quantify customer needs by utilizing a novel data source: Users voluntarily and publicly expose information about themselves via social media, as for instance Facebook or Twitter. These posts may contain valuable information about the needs, wants, and demands of their authors. We apply a Design Science Research (DSR) methodology to add design knowledge and artifacts for the digitalization of innovation processes, in particular to provide digital support for the elicitation of customer needs. We want to investigate whether automated, speedy, and scalable need elicitation from social media is feasible. We concentrate on Twitter as a data source and on e-mobility as an application domain. In a first design cycle we conceive, implement and evaluate a method to demonstrate the feasibility of identifying those social media posts that actually express customer needs. In a second cycle, we build on this artifact to additionally quantify the need information elicited, and prove its feasibility. Third, we integrate both developed methods into an end-user software artifact and test usability in an industrial use case. Thus, we add new methods for need elicitation to the body of knowledge, and introduce concrete tooling for innovation management in practice.

[127]  arXiv:2101.06148 [pdf, other]
Title: SRACARE: Secure Remote Attestation with Code Authentication and Resilience Engine
Subjects: Cryptography and Security (cs.CR)

Recent technological advancements have enabled proliferated use of small embedded and IoT devices for collecting, processing, and transferring the security-critical information and user data. This exponential use has acted as a catalyst in the recent growth of sophisticated attacks such as the replay, man-in-the-middle, and malicious code modification to slink, leak, tweak or exploit the security-critical information in malevolent activities. Therefore, secure communication and software state assurance (at run-time and boot-time) of the device has emerged as open security problems. Furthermore, these devices need to have an appropriate recovery mechanism to bring them back to the known-good operational state. Previous researchers have demonstrated independent methods for attack detection and safeguard. However, the majority of them lack in providing onboard system recovery and secure communication techniques. To bridge this gap, this manuscript proposes SRACARE- a framework that utilizes the custom lightweight, secure communication protocol that performs remote/local attestation, and secure boot with an onboard resilience recovery mechanism to protect the devices from the above-mentioned attacks. The prototype employs an efficient lightweight, low-power 32-bit RISC-V processor, secure communication protocol, code authentication, and resilience engine running on the Artix 7 Field Programmable Gate Array(FPGA) board. This work presents the performance evaluation and state-of-the-art comparison results, which shows promising resilience to attacks and demonstrate the novel protection mechanism with onboard recovery. The framework achieves these with only 8 % performance overhead and a very small increase in hardware-software footprint.

[128]  arXiv:2101.06150 [pdf]
Title: Annotation of epidemiological information in animal disease-related news articles: guidelines
Comments: 8 pages
Subjects: Information Retrieval (cs.IR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)

This paper describes a method for annotation of epidemiological information in animal disease-related news articles. The annotation guidelines are generic and aim to embrace all animal or zoonotic infectious diseases, regardless of the pathogen involved or its way of transmission (e.g. vector-borne, airborne, by contact). The framework relies on the successive annotation of all the sentences from a news article. The annotator evaluates the sentences in a specific epidemiological context, corresponding to the publication of the news article.

[129]  arXiv:2101.06156 [pdf, ps, other]
Title: Data-Driven Controller Design via Finite-Horizon Dissipativity
Subjects: Systems and Control (eess.SY)

Given a single measured trajectory of a discrete-time linear time-invariant system, we present a framework for data-driven controller design for closed-loop finite-horizon dissipativity. First, we parametrize all closed-loop trajectories using the given data of the plant and a model of the controller. We then provide an approach to validate the controller by verifying closed-loop dissipativity in the standard feedback loop based on this parametrization. The developed conditions allow us to state the corresponding controller synthesis problem as a quadratic matrix inequality feasibility problem. Hence, we obtain purely data-driven synthesis conditions leading to a desired closed-loop dissipativity property. Finally, the results are illustrated with a simulation example.

[130]  arXiv:2101.06159 [pdf, other]
Title: Vision-based Vehicle Speed Estimation for ITS: A Survey
Comments: Manuscript submitted to the IET Intelligent Transport Systems journal
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Robotics (cs.RO)

The need to accurately estimate the speed of road vehicles is becoming increasingly important for at least two main reasons. First, the number of speed cameras installed worldwide has been growing in recent years, as the introduction and enforcement of appropriate speed limits is considered one of the most effective means to increase the road safety. Second, traffic monitoring and forecasting in road networks plays a fundamental role to enhance traffic, emissions and energy consumption in smart cities, being the speed of the vehicles one of the most relevant parameters of the traffic state. Among the technologies available for the accurate detection of vehicle speed, the use of vision-based systems brings great challenges to be solved, but also great potential advantages, such as the drastic reduction of costs due to the absence of expensive range sensors, and the possibility of identifying vehicles accurately. This paper provides a review of vision-based vehicle speed estimation. We describe the terminology, the application domains, and propose a complete taxonomy of a large selection of works that categorizes all stages involved. An overview of performance evaluation metrics and available datasets is provided. Finally, we discuss current limitations and future directions.

[131]  arXiv:2101.06162 [pdf, other]
Title: Learning Invariant Representation for Continual Learning
Comments: Accepted at the AAAI Meta-Learning for Computer Vision Workshop (2021)
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV)

Continual learning aims to provide intelligent agents that are capable of learning continually a sequence of tasks, building on previously learned knowledge. A key challenge in this learning paradigm is catastrophically forgetting previously learned tasks when the agent faces a new one. Current rehearsal-based methods show their success in mitigating the catastrophic forgetting problem by replaying samples from previous tasks during learning a new one. However, these methods are infeasible when the data of previous tasks is not accessible. In this work, we propose a new pseudo-rehearsal-based method, named learning Invariant Representation for Continual Learning (IRCL), in which class-invariant representation is disentangled from a conditional generative model and jointly used with class-specific representation to learn the sequential tasks. Disentangling the shared invariant representation helps to learn continually a sequence of tasks, while being more robust to forgetting and having better knowledge transfer. We focus on class incremental learning where there is no knowledge about task identity during inference. We empirically evaluate our proposed method on two well-known benchmarks for continual learning: split MNIST and split Fashion MNIST. The experimental results show that our proposed method outperforms regularization-based methods by a big margin and is better than the state-of-the-art pseudo-rehearsal-based method. Finally, we analyze the role of the shared invariant representation in mitigating the forgetting problem especially when the number of replayed samples for each previous task is small.

[132]  arXiv:2101.06166 [pdf, other]
Title: A General Framework for Hypercomplex-valued Extreme Learning Machines
Subjects: Machine Learning (cs.LG)

This paper aims to establish a framework for extreme learning machines (ELMs) on general hypercomplex algebras. Hypercomplex neural networks are machine learning models that feature higher-dimension numbers as parameters, inputs, and outputs. Firstly, we review broad hypercomplex algebras and show a framework to operate in these algebras through real-valued linear algebra operations in a robust manner. We proceed to explore a handful of well-known four-dimensional examples. Then, we propose the hypercomplex-valued ELMs and derive their learning using a hypercomplex-valued least-squares problem. Finally, we compare real and hypercomplex-valued ELM models' performance in an experiment on time-series prediction and another on color image auto-encoding. The computational experiments highlight the excellent performance of hypercomplex-valued ELMs to treat high-dimensional data, including models based on unusual hypercomplex algebras.

[133]  arXiv:2101.06171 [pdf, other]
Title: Probabilistic Inference for Learning from Untrusted Sources
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC)

Federated learning brings potential benefits of faster learning, better solutions, and a greater propensity to transfer when heterogeneous data from different parties increases diversity. However, because federated learning tasks tend to be large and complex, and training times non-negligible, it is important for the aggregation algorithm to be robust to non-IID data and corrupted parties. This robustness relies on the ability to identify, and appropriately weight, incompatible parties. Recent work assumes that a \textit{reference dataset} is available through which to perform the identification. We consider settings where no such reference dataset is available; rather, the quality and suitability of the parties needs to be \textit{inferred}. We do so by bringing ideas from crowdsourced predictions and collaborative filtering, where one must infer an unknown ground truth given proposals from participants with unknown quality. We propose novel federated learning aggregation algorithms based on Bayesian inference that adapt to the quality of the parties. Empirically, we show that the algorithms outperform standard and robust aggregation in federated learning on both synthetic and real data.

[134]  arXiv:2101.06172 [pdf, other]
Title: Empirical Evaluation of Supervision Signals for Style Transfer Models
Comments: 13 pages, 6 figures
Subjects: Computation and Language (cs.CL); Machine Learning (cs.LG)

Text style transfer has gained increasing attention from the research community over the recent years. However, the proposed approaches vary in many ways, which makes it hard to assess the individual contribution of the model components. In style transfer, the most important component is the optimization technique used to guide the learning in the absence of parallel training data. In this work we empirically compare the dominant optimization paradigms which provide supervision signals during training: backtranslation, adversarial training and reinforcement learning. We find that backtranslation has model-specific limitations, which inhibits training style transfer models. Reinforcement learning shows the best performance gains, while adversarial training, despite its popularity, does not offer an advantage over the latter alternative. In this work we also experiment with Minimum Risk Training, a popular technique in the machine translation community, which, to our knowledge, has not been empirically evaluated in the task of style transfer. We fill this research gap and empirically show its efficacy.

[135]  arXiv:2101.06175 [pdf, other]
Title: PaddleSeg: A High-Efficient Development Toolkit for Image Segmentation
Subjects: Computer Vision and Pattern Recognition (cs.CV)

Image Segmentation plays an essential role in computer vision and image processing with various applications from medical diagnosis to autonomous car driving. A lot of segmentation algorithms have been proposed for addressing specific problems. In recent years, the success of deep learning techniques has tremendously influenced a wide range of computer vision areas, and the modern approaches of image segmentation based on deep learning are becoming prevalent. In this article, we introduce a high-efficient development toolkit for image segmentation, named PaddleSeg. The toolkit aims to help both developers and researchers in the whole process of designing segmentation models, training models, optimizing performance and inference speed, and deploying models. Currently, PaddleSeg supports around 20 popular segmentation models and more than 50 pre-trained models from real-time and high-accuracy levels. With modular components and backbone networks, users can easily build over one hundred models for different requirements. Furthermore, we provide comprehensive benchmarks and evaluations to show that these segmentation algorithms trained on our toolkit have more competitive accuracy. Also, we provide various real industrial applications and practical cases based on PaddleSeg. All codes and examples of PaddleSeg are available at https://github.com/PaddlePaddle/PaddleSeg.

[136]  arXiv:2101.06177 [pdf, other]
Title: Hierarchical Width-Based Planning and Learning
Subjects: Artificial Intelligence (cs.AI)

Width-based search methods have demonstrated state-of-the-art performance in a wide range of testbeds, from classical planning problems to image-based simulators such as Atari games. These methods scale independently of the size of the state-space, but exponentially in the problem width. In practice, running the algorithm with a width larger than 1 is computationally intractable, prohibiting IW from solving higher width problems. In this paper, we present a hierarchical algorithm that plans at two levels of abstraction. A high-level planner uses abstract features that are incrementally discovered from low-level pruning decisions. We illustrate this algorithm in classical planning PDDL domains as well as in pixel-based simulator domains. In classical planning, we show how IW(1) at two levels of abstraction can solve problems of width 2. For pixel-based domains, we show how in combination with a learned policy and a learned value function, the proposed hierarchical IW can outperform current flat IW-based planners in Atari games with sparse rewards.

[137]  arXiv:2101.06178 [pdf, ps, other]
Title: Learning to Sample from Censored Markov Random Fields
Subjects: Machine Learning (cs.LG)

We study learning Censor Markov Random Fields (abbreviated CMRFs). These are Markov Random Fields where some of the nodes are censored (not observed). We present an algorithm for learning high-temperature CMRFs within o(n) transportation distance. Crucially our algorithm makes no assumption about the structure of the graph or the number or location of the observed nodes. We obtain stronger results for high girth high-temperature CMRFs as well as computational lower bounds indicating that our results can not be qualitatively improved.

[138]  arXiv:2101.06182 [pdf, other]
Title: STENCIL-NET: Data-driven solution-adaptive discretization of partial differential equations
Subjects: Numerical Analysis (math.NA); Machine Learning (cs.LG)

Numerical methods for approximately solving partial differential equations (PDE) are at the core of scientific computing. Often, this requires high-resolution or adaptive discretization grids to capture relevant spatio-temporal features in the PDE solution, e.g., in applications like turbulence, combustion, and shock propagation. Numerical approximation also requires knowing the PDE in order to construct problem-specific discretizations. Systematically deriving such solution-adaptive discrete operators, however, is a current challenge. Here we present STENCIL-NET, an artificial neural network architecture for data-driven learning of problem- and resolution-specific local discretizations of nonlinear PDEs. STENCIL-NET achieves numerically stable discretization of the operators in an unknown nonlinear PDE by spatially and temporally adaptive parametric pooling on regular Cartesian grids, and by incorporating knowledge about discrete time integration. Knowing the actual PDE is not necessary, as solution data is sufficient to train the network to learn the discrete operators. A once-trained STENCIL-NET model can be used to predict solutions of the PDE on larger spatial domains and for longer times than it was trained for, hence addressing the problem of PDE-constrained extrapolation from data. To support this claim, we present numerical experiments on long-term forecasting of chaotic PDE solutions on coarse spatio-temporal grids. We also quantify the speed-up achieved by substituting base-line numerical methods with equation-free STENCIL-NET predictions on coarser grids with little compromise on accuracy.

[139]  arXiv:2101.06184 [pdf, other]
Title: Temporal-Relational CrossTransformers for Few-Shot Action Recognition
Subjects: Computer Vision and Pattern Recognition (cs.CV)

We propose a novel approach to few-shot action recognition, finding temporally-corresponding frame tuples between the query and videos in the support set. Distinct from previous few-shot action recognition works, we construct class prototypes using the CrossTransformer attention mechanism to observe relevant sub-sequences of all support videos, rather than using class averages or single best matches. Video representations are formed from ordered tuples of varying numbers of frames, which allows sub-sequences of actions at different speeds and temporal offsets to be compared.
Our proposed Temporal-Relational CrossTransformers achieve state-of-the-art results on both Kinetics and Something-Something V2 (SSv2), outperforming prior work on SSv2 by a wide margin (6.8%) due to the method's ability to model temporal relations. A detailed ablation showcases the importance of matching to multiple support set videos and learning higher-order relational CrossTransformers. Code is available at https://github.com/tobyperrett/trx

[140]  arXiv:2101.06189 [pdf, other]
Title: Hybrid Quantum-Classical Graph Convolutional Network
Subjects: Machine Learning (cs.LG); Computer Vision and Pattern Recognition (cs.CV); High Energy Physics - Experiment (hep-ex); Data Analysis, Statistics and Probability (physics.data-an); Quantum Physics (quant-ph)

The high energy physics (HEP) community has a long history of dealing with large-scale datasets. To manage such voluminous data, classical machine learning and deep learning techniques have been employed to accelerate physics discovery. Recent advances in quantum machine learning (QML) have indicated the potential of applying these techniques in HEP. However, there are only limited results in QML applications currently available. In particular, the challenge of processing sparse data, common in HEP datasets, has not been extensively studied in QML models. This research provides a hybrid quantum-classical graph convolutional network (QGCNN) for learning HEP data. The proposed framework demonstrates an advantage over classical multilayer perceptron and convolutional neural networks in the aspect of number of parameters. Moreover, in terms of testing accuracy, the QGCNN shows comparable performance to a quantum convolutional neural network on the same HEP dataset while requiring less than $50\%$ of the parameters. Based on numerical simulation results, studying the application of graph convolutional operations and other QML models may prove promising in advancing HEP research and other scientific fields.

[141]  arXiv:2101.06192 [pdf, other]
Title: New Approximation Algorithms for Forest Closeness Centrality -- for Individual Vertices and Vertex Groups
Subjects: Data Structures and Algorithms (cs.DS)

The emergence of massive graph data sets requires fast mining algorithms. Centrality measures to identify important vertices belong to the most popular analysis methods in graph mining. A measure that is gaining attention is forest closeness centrality; it is closely related to electrical measures using current flow but can also handle disconnected graphs. Recently, [Jin et al., ICDM'19] proposed an algorithm to approximate this measure probabilistically. Their algorithm processes small inputs quickly, but does not scale well beyond hundreds of thousands of vertices.
In this paper, we first propose a different approximation algorithm; it is up to two orders of magnitude faster and more accurate in practice. Our method exploits the strong connection between uniform spanning trees and forest distances by adapting and extending recent approximation algorithms for related single-vertex problems. This results in a nearly-linear time algorithm with an absolute probabilistic error guarantee. In addition, we are the first to consider the problem of finding an optimal group of vertices w.r.t. forest closeness. We prove that this latter problem is NP-hard; to approximate it, we adapt a greedy algorithm by [Li et al., WWW'19], which is based on (partial) matrix inversion. Moreover, our experiments show that on disconnected graphs, group forest closeness outperforms existing centrality measures in the context of semi-supervised vertex classification.

[142]  arXiv:2101.06195 [pdf, other]
Title: Switched Systems as Hybrid Programs
Comments: This work has been submitted to IFAC for possible publication
Subjects: Logic in Computer Science (cs.LO)

Real world systems of interest often feature interactions between discrete and continuous dynamics. Various hybrid system formalisms have been used to model and analyse this combination of dynamics, ranging from mathematical descriptions, e.g., using impulsive differential equations and switching, to automata-theoretic and language-based approaches. This paper bridges two such formalisms by showing how various classes of switched systems can be modeled using the language of hybrid programs from differential dynamic logic (dL). The resulting models enable the formal specification and verification of switched systems using dL and its existing deductive verification tools such as KeYmaera X. Switched systems also provide a natural avenue for the generalization of dL's deductive proof theory for differential equations. The completeness results for switched system invariants proved in this paper enable effective safety verification of those systems in dL.

[143]  arXiv:2101.06197 [pdf, other]
Title: Deciding What to Learn: A Rate-Distortion Approach
Subjects: Machine Learning (cs.LG); Information Theory (cs.IT)

Agents that learn to select optimal actions represent a prominent focus of the sequential decision-making literature. In the face of a complex environment or constraints on time and resources, however, aiming to synthesize such an optimal policy can become infeasible. These scenarios give rise to an important trade-off between the information an agent must acquire to learn and the sub-optimality of the resulting policy. While an agent designer has a preference for how this trade-off is resolved, existing approaches further require that the designer translate these preferences into a fixed learning target for the agent. In this work, leveraging rate-distortion theory, we automate this process such that the designer need only express their preferences via a single hyperparameter and the agent is endowed with the ability to compute its own learning targets that best achieve the desired trade-off. We establish a general bound on expected discounted regret for an agent that decides what to learn in this manner along with computational experiments that illustrate the expressiveness of designer preferences and even show improvements over Thompson sampling in identifying an optimal policy.

[144]  arXiv:2101.06203 [pdf]
Title: Reviving Purpose Limitation and Data Minimisation in Personalisation, Profiling and Decision-Making Systems
Comments: Max Planck Institute for Innovation & Competition Research Paper No. 21-04
Subjects: Computers and Society (cs.CY); Information Retrieval (cs.IR)

This paper determines, through an interdisciplinary law and computer science lens, whether data minimisation and purpose limitation can be meaningfully implemented in data-driven algorithmic systems, including personalisation, profiling and decision-making systems. Our analysis reveals that the two legal principles continue to play an important role in mitigating the risks of personal data processing, allowing us to rebut claims that they have become obsolete. The paper goes beyond this finding, however. We highlight that even though these principles are important safeguards in the systems under consideration, there are important limits to their practical implementation, namely, (i) the difficulties of measuring law and the resulting open computational research questions as well as a lack of concrete guidelines for practitioners; (ii) the unacknowledged trade-offs between various GDPR principles, notably between data minimisation on the one hand and accuracy or fairness on the other; (iii) the lack of practical means of removing personal data from trained models in order to ensure legal compliance; and (iv) the insufficient enforcement of data protection law.

[145]  arXiv:2101.06204 [pdf, other]
Title: The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts
Subjects: Cryptography and Security (cs.CR)

In recent years, Ethereum gained tremendously in popularity, growing from a daily transaction average of 10K in January 2016 to an average of 500K in January 2020. Similarly, smart contracts began to carry more value, making them appealing targets for attackers. As a result, they started to become victims of attacks, costing millions of dollars. In response to these attacks, both academia and industry proposed a plethora of tools to scan smart contracts for vulnerabilities before deploying them on the blockchain. However, most of these tools solely focus on detecting vulnerabilities and not attacks, let alone quantifying or tracing the number of stolen assets. In this paper, we present Horus, a framework that empowers the automated detection and investigation of smart contract attacks based on logic-driven and graph-driven analysis of transactions. Horus provides quick means to quantify and trace the flow of stolen assets across the Ethereum blockchain. We perform a large-scale analysis of all the smart contracts deployed on Ethereum until May 2020. We identified 1,888 attacked smart contracts and 8,095 adversarial transactions in the wild. Our investigation shows that the number of attacks did not necessarily decrease over the past few years, but for some vulnerabilities remained constant. Finally, we also demonstrate the practicality of our framework via an in-depth analysis on the recent Uniswap and Lendf.me attacks.

[146]  arXiv:2101.06210 [pdf, other]
Title: Cryptoasset Competition and Market Concentration in the Presence of Network Effects
Subjects: Networking and Internet Architecture (cs.NI); Computers and Society (cs.CY); Social and Information Networks (cs.SI); Physics and Society (physics.soc-ph)

When network products and services become more valuable as their userbase grows (network effects), this tendency can become a major determinant of how they compete with each other in the market and how the market is structured. Network effects are traditionally linked to high market concentration, early-mover advantages, and entry barriers, and in the cryptoasset market they have been used as a valuation tool too. The recent resurgence of Bitcoin has been partly attributed to network effects too. We study the existence of network effects in six cryptoassets from their inception to obtain a high-level overview of the application of network effects in the cryptoasset market. We show that contrary to the usual implications of network effects, they do not serve to concentrate the cryptoasset market, nor do they accord any one cryptoasset a definitive competitive advantage, nor are they consistent enough to be reliable valuation tools. Therefore, while network effects do occur in cryptoasset networks, they are not a defining feature of the cryptoasset market as a whole.

[147]  arXiv:2101.06213 [pdf]
Title: A Novel Prediction Approach for Exploring PM2.5 Spatiotemporal Propagation Based on Convolutional Recursive Neural Networks
Subjects: Machine Learning (cs.LG); Neural and Evolutionary Computing (cs.NE)

The spread of PM2.5 pollutants that endanger health is difficult to predict because it involves many atmospheric variables. These micron particles can spread rapidly from their source to residential areas, increasing the risk of respiratory disease if exposed for long periods. The prediction system of PM2.5 propagation provides more detailed and accurate information as an early warning system to reduce health impacts on the community. According to the idea of transformative computing, the approach we propose in this paper allows computation on the dataset obtained from massive-scale PM2.5 sensor nodes via wireless sensor network. In the scheme, the deep learning model is implemented on the server nodes to extract spatiotemporal features on these datasets. This research was conducted by using dataset of air quality monitoring systems in Taiwan. This study presents a new model based on the convolutional recursive neural network to generate the prediction map. In general, the model is able to provide accurate predictive results by considering the bonds among measurement nodes in both spatially and temporally. Therefore, the particulate pollutant propagation of PM2.5 could be precisely monitored by using the model we propose in this paper.

[148]  arXiv:2101.06215 [pdf, other]
Title: Node and Edge Eigenvector Centrality for Hypergraphs
Subjects: Social and Information Networks (cs.SI); Numerical Analysis (math.NA); Data Analysis, Statistics and Probability (physics.data-an)

Network scientists have shown that there is great value in studying pairwise interactions between components in a system. From a linear algebra point of view, this involves defining and evaluating functions of the associated adjacency matrix. Recent work indicates that there are further benefits from accounting directly for higher order interactions, notably through a hypergraph representation where an edge may involve multiple nodes. Building on these ideas, we motivate, define and analyze a class of spectral centrality measures for identifying important nodes and hyperedges in hypergraphs, generalizing existing network science concepts. By exploiting the latest developments in nonlinear Perron-Frobenius theory, we show how the resulting constrained nonlinear eigenvalue problems have unique solutions that can be computed efficiently via a nonlinear power method iteration. We illustrate the measures on realistic data sets.

[149]  arXiv:2101.06217 [pdf, other]
Title: APEX-Net: Automatic Plot Extractor Network
Comments: Submitted to ICASSP 2021
Subjects: Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)

Automatic extraction of raw data from 2D line plot images is a problem of great importance having many real-world applications. Several algorithms have been proposed for solving this problem. However, these algorithms involve a significant amount of human intervention. To minimize this intervention, we propose APEX-Net, a deep learning based framework with novel loss functions for solving the plot extraction problem. We introduce APEX-1M, a new large scale dataset which contains both the plot images and the raw data. We demonstrate the performance of APEX-Net on the APEX-1M test set and show that it obtains impressive accuracy. We also show visual results of our network on unseen plot images and demonstrate that it extracts the shape of the plots to a great extent. Finally, we develop a GUI based software for plot extraction that can benefit the community at large. The dataset and code will be made publicly available.

[150]  arXiv:2101.06220 [pdf, other]
Title: Player-AI Interaction: What Neural Network Games Reveal About AI as Play
Subjects: Human-Computer Interaction (cs.HC); Artificial Intelligence (cs.AI)

The advent of artificial intelligence (AI) and machine learning (ML) bring human-AI interaction to the forefront of HCI research. This paper argues that games are an ideal domain for studying and experimenting with how humans interact with AI. Through a systematic survey of neural network games (n = 38), we identified the dominant interaction metaphors and AI interaction patterns in these games. In addition, we applied existing human-AI interaction guidelines to further shed light on player-AI interaction in the context of AI-infused systems. Our core finding is that AI as play can expand current notions of human-AI interaction, which are predominantly productivity-based. In particular, our work suggests that game and UX designers should consider flow to structure the learning curve of human-AI interaction, incorporate discovery-based learning to play around with the AI and observe the consequences, and offer users an invitation to play to explore new forms of human-AI interaction.

[151]  arXiv:2101.06223 [pdf, other]
Title: LIME: Learning Inductive Bias for Primitives of Mathematical Reasoning
Comments: 16 pages
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Logic in Computer Science (cs.LO)

While designing inductive bias in neural architectures has been widely studied, we hypothesize that transformer networks are flexible enough to learn inductive bias from suitable generic tasks. Here, we replace architecture engineering by encoding inductive bias in the form of datasets. Inspired by Peirce's view that deduction, induction, and abduction form an irreducible set of reasoning primitives, we design three synthetic tasks that are intended to require the model to have these three abilities. We specifically design these synthetic tasks in a way that they are devoid of mathematical knowledge to ensure that only the fundamental reasoning biases can be learned from these tasks. This defines a new pre-training methodology called "LIME" (Learning Inductive bias for Mathematical rEasoning). Models trained with LIME significantly outperform vanilla transformers on three very different large mathematical reasoning benchmarks. Unlike dominating the computation cost as traditional pre-training approaches, LIME requires only a small fraction of the computation cost of the typical downstream task.

[152]  arXiv:2101.06224 [pdf, other]
Title: Multi-point dimensionality reduction to improve projection layout reliability
Subjects: Computer Vision and Pattern Recognition (cs.CV)

In ordinary Dimensionality Reduction (DR), each data instance in an m-dimensional space (original space) is mapped to one point in a d-dimensional space (visual space), preserving as much as possible distance and/or neighborhood relationships. Despite their popularity, even for simple datasets, the existing DR techniques unavoidably may produce misleading visual representations. The problem is not with the existing solutions but with problem formulation. For two dimensional visual space, if data instances are not co-planar or do not lie on a 2D manifold, there is no solution for the problem, and the possible approximations usually result in layouts with inaccuracies in the distance preservation and overlapped neighborhoods. In this paper, we elaborate on the concept of Multi-point Dimensionality Reduction where each data instance can be mapped to possibly more than one point in the visual space by providing the first general solution to it as a step toward mitigating this issue. By duplicating points, background information is added to the visual representation making local neighborhoods in the visual space more faithful to the original space. Our solution, named Red Gray Plus, is built upon and extends a combination of ordinary DR and graph drawing techniques. We show that not only Multi-point Dimensionality Reduction can be one of the potential directions to improve DR layouts' reliability but also that our initial solution to the problem outperforms popular ordinary DR methods quantitatively.

[153]  arXiv:2101.06227 [pdf, other]
Title: Deep Reinforcement Learning for Haptic Shared Control in Unknown Tasks
Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
Subjects: Robotics (cs.RO); Machine Learning (cs.LG)

Recent years have shown a growing interest in using haptic shared control (HSC) in teleoperated systems. In HSC, the application of virtual guiding forces decreases the user's control effort and improves execution time in various tasks, presenting a good alternative in comparison with direct teleoperation. HSC, despite demonstrating good performance, opens a new gap: how to design the guiding forces. For this reason, the challenge lies in developing controllers to provide the optimal guiding forces for the tasks that are being performed. This work addresses this challenge by designing a controller based on the deep deterministic policy gradient (DDPG) algorithm to provide the assistance, and a convolutional neural network (CNN) to perform the task detection, called TAHSC (Task Agnostic Haptic Shared Controller). The agent learns to minimize the time it takes the human to execute the desired task, while simultaneously minimizing their resistance to the provided feedback. This resistance thus provides the learning algorithm with information about which direction the human is trying to follow, in this case, the pick-and-place task. Diverse results demonstrate the successful application of the proposed approach by learning custom policies for each user who was asked to test the system. It exhibits stable convergence and aids the user in completing the task with the least amount of time possible.

[154]  arXiv:2101.06232 [pdf]
Title: Towards interpreting ML-based automated malware detection models: a survey
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)

Malware is being increasingly threatening and malware detectors based on traditional signature-based analysis are no longer suitable for current malware detection. Recently, the models based on machine learning (ML) are developed for predicting unknown malware variants and saving human strength. However, most of the existing ML models are black-box, which made their pre-diction results undependable, and therefore need further interpretation in order to be effectively deployed in the wild. This paper aims to examine and categorize the existing researches on ML-based malware detector interpretability. We first give a detailed comparison over the previous work on common ML model inter-pretability in groups after introducing the principles, attributes, evaluation indi-cators and taxonomy of common ML interpretability. Then we investigate the interpretation methods towards malware detection, by addressing the importance of interpreting malware detectors, challenges faced by this field, solutions for migitating these challenges, and a new taxonomy for classifying all the state-of-the-art malware detection interpretability work in recent years. The highlight of our survey is providing a new taxonomy towards malware detection interpreta-tion methods based on the common taxonomy summarized by previous re-searches in the common field. In addition, we are the first to evaluate the state-of-the-art approaches by interpretation method attributes to generate the final score so as to give insight to quantifying the interpretability. By concluding the results of the recent researches, we hope our work can provide suggestions for researchers who are interested in the interpretability on ML-based malware de-tection models.

[155]  arXiv:2101.06233 [pdf, other]
Title: Predictive Optimization with Zero-Shot Domain Adaptation
Comments: SDM2021. Full version including appendix
Subjects: Machine Learning (cs.LG); Machine Learning (stat.ML)

Prediction in a new domain without any training sample, called zero-shot domain adaptation (ZSDA), is an important task in domain adaptation. While prediction in a new domain has gained much attention in recent years, in this paper, we investigate another potential of ZSDA. Specifically, instead of predicting responses in a new domain, we find a description of a new domain given a prediction. The task is regarded as predictive optimization, but existing predictive optimization methods have not been extended to handling multiple domains. We propose a simple framework for predictive optimization with ZSDA and analyze the condition in which the optimization problem becomes convex optimization. We also discuss how to handle the interaction of characteristics of a domain in predictive optimization. Through numerical experiments, we demonstrate the potential usefulness of our proposed framework.

[156]  arXiv:2101.06239 [pdf, other]
Title: A Random Algorithm for Profit Maximization with Multiple Adoptions in Online Social Networks
Comments: 21 pages, 6 figures
Journal-ref: Volume 803, 10 January 2020, Pages 36-47
Subjects: Social and Information Networks (cs.SI)

Online social networks have been one of the most effective platforms for marketing and advertising. Through "word of mouth" effects, information or product adoption could spread from some influential individuals to millions of users in social networks. Given a social network $G$ and a constant $k$, the influence maximization problem seeks for $k$ nodes in $G$ that can influence the largest number of nodes. This problem has found important applications, and a large amount of works have been devoted to identifying the few most influential users. But most of existing works only focus on the diffusion of a single idea or product in social networks. However, in reality, one company may produce multiple kinds of products and one user may also have multiple adoptions.
Given multiple kinds of different products with different activation costs and profits, it is crucial for the company to distribute the limited budget among multiple products in order to achieve profit maximization. Profit Maximization with Multiple Adoptions (PM$^{2}$A) problem aims to seek for a seed set within the budget to maximize the overall profit. In this paper, a Randomized Modified Greedy (RMG) algorithm based on the Reverse Influence Sampling (RIS) technique is presented for the PM$^{2}$A problem, which could achieve a $(1-1/e-\varepsilon)$-approximate solution with high probability. Compared with the algorithm proposed in [16] that achieves a $\frac{1}{2}(1-1/e^{2})$-approximate solution, our algorithm provides a better performance ratio which is also the best performance ratio of the PM$^{2}$A problem. Comprehensive experiments on three real-world social networks are conducted, and the results demonstrate that our RMG algorithm outperforms the algorithm proposed in [16] and other heuristics in terms of profit maximization, and could better allocate the budget.

[157]  arXiv:2101.06240 [pdf, ps, other]
Title: Towards Approximate Query Enumeration with Sublinear Preprocessing Time
Subjects: Logic in Computer Science (cs.LO); Databases (cs.DB)

This paper aims at providing extremely efficient algorithms for approximate query enumeration on sparse databases, that come with performance and accuracy guarantees. We introduce a new model for approximate query enumeration on classes of relational databases of bounded degree. We first prove that on databases of bounded degree any local first-order definable query can be enumerated approximately with constant delay after a constant time preprocessing phase. We extend this, showing that on databases of bounded tree-width and bounded degree, every query that is expressible in first-order logic can be enumerated approximately with constant delay after a sublinear (more precisely, polylogarithmic) time preprocessing phase.
Durand and Grandjean (ACM Transactions on Computational Logic 2007) proved that exact enumeration of first-order queries on databases of bounded degree can be done with constant delay after a linear time preprocessing phase. Hence we achieve a significant speed-up in the preprocessing phase. Since sublinear running time does not allow reading the whole input database even once, sacrificing some accuracy is inevitable for our speed-up. Nevertheless, our enumeration algorithms come with guarantees: With high probability, (1) only tuples are enumerated that are answers to the query or `close' to being answers to the query, and (2) if the proportion of tuples that are answers to the query is sufficiently large, then all answers will be enumerated. Here the notion of `closeness' is a tuple edit distance in the input database. For local first-order queries, only actual answers are enumerated, strengthening (1). Moreover, both the `closeness' and the proportion required in (2) are controllable.
We combine methods from property testing of bounded degree graphs with logic and query enumeration, which we believe can inspire further research.

[158]  arXiv:2101.06241 [pdf, other]
Title: Blind Image Deblurring based on Kernel Mixture
Subjects: Computer Vision and Pattern Recognition (cs.CV)

Blind Image deblurring tries to estimate blurriness and a latent image out of a blurred image. This estimation, as being an ill-posed problem, requires imposing restrictions on the latent image or a blur kernel that represents blurriness. Different from recent studies that impose some priors on the latent image, this paper regulates the structure of the blur kernel. We propose a kernel mixture structure while using the Gaussian kernel as a base kernel. By combining multiple Gaussian kernels structurally enhanced in terms of scales and centers, the kernel mixture becomes capable of modeling nearly non-parametric shape of blurriness. A data-driven decision for the number of base kernels to combine makes the structure even more flexible. We apply this approach to a remote sensing problem to recover images from blurry images of satellite. This case study shows the superiority of the proposed method regulating the blur kernel in comparison with state-of-the-art methods that regulates the latent image.

[159]  arXiv:2101.06243 [pdf, ps, other]
Title: Enhancing Security via Deliberate Unpredictability of Solutions in Optimisation
Comments: Accepted for publication in PATAT 2020
Subjects: Discrete Mathematics (cs.DM)

The main aim of decision support systems is to find solutions that satisfy user requirements. Often, this leads to predictability of those solutions, in the sense that having the input data and the model, an adversary or enemy can predict to a great extent the solution produced by your decision support system. Such predictability can be undesirable, for example, in military or security timetabling, or applications that require anonymity. In this paper, we discuss the notion of solution predictability and introduce potential mechanisms to intentionally avoid it.

[160]  arXiv:2101.06248 [pdf, other]
Title: Local Navigation and Docking of an Autonomous Robot Mower using Reinforcement Learning and Computer Vision
Subjects: Robotics (cs.RO); Artificial Intelligence (cs.AI)

We demonstrate a successful navigation and docking control system for the John Deere Tango autonomous mower, using only a single camera as the input. This vision-only system is of interest because it is inexpensive, simple for production, and requires no external sensing. This is in contrast to existing systems that rely on integrated position sensors and global positioning system (GPS) technologies. To produce our system we combined a state-of-the-art object detection architecture, YOLO, with a reinforcement learning (RL) architecture, Double Deep QNetworks (Double DQN). The object detection network identifies features on the mower and passes its output to the RL network, providing it with a low-dimensional representation that enables rapid and robust training. Finally, the RL network learns how to navigate the machine to the desired spot in a custom simulation environment. When tested on mower hardware the system is able to dock with centimeter-level accuracy from arbitrary initial locations and orientations.

[161]  arXiv:2101.06249 [pdf, ps, other]
Title: Manifestly Phased Communication via Shared Session Types
Comments: Technical report; 63 pages (30 from Appendix) and 2 figures
Subjects: Programming Languages (cs.PL)

Session types denote message protocols between concurrent processes, allowing a type-safe formalization of inter-process communication. Although previous works demonstrate a well-defined notion of subtyping where processes have different perceptions of the protocol, these formulations were limited to linear session types where each channel of communication has a unique provider and client. In our work, we extend these previous formulations into the shared session type setting where channels can now have multiple clients instead of a single client. We demonstrate that this allows shared sessions to be released at a different type, allowing the encoding of phases in a shared protocol to be manifest in the session type.

[162]  arXiv:2101.06255 [pdf, ps, other]
Title: Harmonization and the Worst Scanner Syndrome
Comments: Med-NeurIPS 2020 Workshop Paper
Subjects: Machine Learning (cs.LG); Computer Vision and Pattern Recognition (cs.CV); Image and Video Processing (eess.IV); Quantitative Methods (q-bio.QM); Machine Learning (stat.ML)

We show that for a wide class of harmonization/domain-invariance schemes several undesirable properties are unavoidable. If a predictive machine is made invariant to a set of domains, the accuracy of the output predictions (as measured by mutual information) is limited by the domain with the least amount of information to begin with. If a real label value is highly informative about the source domain, it cannot be accurately predicted by an invariant predictor. These results are simple and intuitive, but we believe that it is beneficial to state them for medical imaging harmonization.

[163]  arXiv:2101.06256 [pdf, other]
Title: Internet of Robotic Things: Current Technologies, Applications, Challenges and Future Directions
Comments: 8 pages, 6 figures, 1 table
Subjects: Robotics (cs.RO); Computers and Society (cs.CY); Networking and Internet Architecture (cs.NI)

Nowadays, the Internet of Things (IoT) concept is gaining more and more notoriety bringing the number of connected devices to reach the order of billion units. Its smart technology is influencing the research and developments of advanced solutions in many areas. This paper focuses on the merger between the IoT and robotics named the Internet of Robotic Things (IoRT). Allowing robotic systems to communicate over the internet at a minimal cost is an important technological opportunity. Robots can use the cloud to improve the overall performance and for offloading demanding tasks. Since communicating to the cloud results in latency, data loss, and energy loss, finding efficient techniques is a concern that can be addressed with current machine learning methodologies. Moreover, the use of robotic generates ethical and regulation questions that should be answered for a proper coexistence between humans and robots. This paper aims at providing a better understanding of the new concept of IoRT with its benefits and limitations, as well as guidelines and directions for future research and studies.

[164]  arXiv:2101.06262 [pdf, other]
Title: Local Search Algorithms for Rank-Constrained Convex Optimization
Comments: Accepted in ICLR 2021
Subjects: Machine Learning (cs.LG)

We propose greedy and local search algorithms for rank-constrained convex optimization, namely solving $\underset{\mathrm{rank}(A)\leq r^*}{\min}\, R(A)$ given a convex function $R:\mathbb{R}^{m\times n}\rightarrow \mathbb{R}$ and a parameter $r^*$. These algorithms consist of repeating two steps: (a) adding a new rank-1 matrix to $A$ and (b) enforcing the rank constraint on $A$. We refine and improve the theoretical analysis of Shalev-Shwartz et al. (2011), and show that if the rank-restricted condition number of $R$ is $\kappa$, a solution $A$ with rank $O(r^*\cdot \min\{\kappa \log \frac{R(\mathbf{0})-R(A^*)}{\epsilon}, \kappa^2\})$ and $R(A) \leq R(A^*) + \epsilon$ can be recovered, where $A^*$ is the optimal solution. This significantly generalizes associated results on sparse convex optimization, as well as rank-constrained convex optimization for smooth functions. We then introduce new practical variants of these algorithms that have superior runtime and recover better solutions in practice. We demonstrate the versatility of these methods on a wide range of applications involving matrix completion and robust principal component analysis.

Cross-lists for Mon, 18 Jan 21

[165]  arXiv:2101.05808 (cross-list from cond-mat.mtrl-sci) [pdf, other]
Title: Materials Fingerprinting Classification
Subjects: Materials Science (cond-mat.mtrl-sci); Machine Learning (cs.LG); Applications (stat.AP)

Significant progress in many classes of materials could be made with the availability of experimentally-derived large datasets composed of atomic identities and three-dimensional coordinates. Methods for visualizing the local atomic structure, such as atom probe tomography (APT), which routinely generate datasets comprised of millions of atoms, are an important step in realizing this goal. However, state-of-the-art APT instruments generate noisy and sparse datasets that provide information about elemental type, but obscure atomic structures, thus limiting their subsequent value for materials discovery. The application of a materials fingerprinting process, a machine learning algorithm coupled with topological data analysis, provides an avenue by which here-to-fore unprecedented structural information can be extracted from an APT dataset. As a proof of concept, the material fingerprint is applied to high-entropy alloy APT datasets containing body-centered cubic (BCC) and face-centered cubic (FCC) crystal structures. A local atomic configuration centered on an arbitrary atom is assigned a topological descriptor, with which it can be characterized as a BCC or FCC lattice with near perfect accuracy, despite the inherent noise in the dataset. This successful identification of a fingerprint is a crucial first step in the development of algorithms which can extract more nuanced information, such as chemical ordering, from existing datasets of complex materials.

[166]  arXiv:2101.05829 (cross-list from math.OC) [pdf, ps, other]
Title: Numerical procedure for optimal control of hybrid systems with sliding modes, Part I
Subjects: Optimization and Control (math.OC); Numerical Analysis (math.NA)

This paper concerns the numerical procedure for solving hybrid optimal control problems with sliding modes. The proposed procedure has several features which distinguishes it from the other procedures for the problem. First of all a sliding mode is coped with differential-algebraic equations (DAEs) and that guarantees accurate tracking of the sliding motion surface. The second important feature is the calculation of cost and constraints functions gradients with the help of adjoint equations. The adjoint equations presented in the paper take into account sliding motion and exhibit jump conditions at transition instants. The procedure uses the discretization of system equations by Radau IIA Runge--Kutta scheme and the evaluation of optimization functions gradients with the help of the adjoint equations stated for discretized system equations. In the first part of the paper we demonstrate the correspondence between the discrete adjoint equations and the discretized version of the continuous adjoint equations in the case of system equations described by ODEs. We show that the discrete adjoint state trajectories converge to their continuous counterparts in the case of ODEs.

[167]  arXiv:2101.05834 (cross-list from stat.ML) [pdf, other]
Title: Physics-aware, probabilistic model order reduction with guaranteed stability
Comments: ICLR 2021
Subjects: Machine Learning (stat.ML); Machine Learning (cs.LG); Computational Physics (physics.comp-ph)

Given (small amounts of) time-series' data from a high-dimensional, fine-grained, multiscale dynamical system, we propose a generative framework for learning an effective, lower-dimensional, coarse-grained dynamical model that is predictive of the fine-grained system's long-term evolution but also of its behavior under different initial conditions. We target fine-grained models as they arise in physical applications (e.g. molecular dynamics, agent-based models), the dynamics of which are strongly non-stationary but their transition to equilibrium is governed by unknown slow processes which are largely inaccessible by brute-force simulations. Approaches based on domain knowledge heavily rely on physical insight in identifying temporally slow features and fail to enforce the long-term stability of the learned dynamics. On the other hand, purely statistical frameworks lack interpretability and rely on large amounts of expensive simulation data (long and multiple trajectories) as they cannot infuse domain knowledge. The generative framework proposed achieves the aforementioned desiderata by employing a flexible prior on the complex plane for the latent, slow processes, and an intermediate layer of physics-motivated latent variables that reduces reliance on data and imbues inductive bias. In contrast to existing schemes, it does not require the a priori definition of projection operators from the fine-grained description and addresses simultaneously the tasks of dimensionality reduction and model estimation. We demonstrate its efficacy and accuracy in multiscale physical systems of particle dynamics where probabilistic, long-term predictions of phenomena not contained in the training data are produced.

[168]  arXiv:2101.05848 (cross-list from nlin.AO) [pdf, other]
Title: Unveiling the role of plasticity rules in reservoir computing
Subjects: Adaptation and Self-Organizing Systems (nlin.AO); Machine Learning (cs.LG); Neural and Evolutionary Computing (cs.NE)

Reservoir Computing (RC) is an appealing approach in Machine Learning that combines the high computational capabilities of Recurrent Neural Networks with a fast and easy training method. Likewise, successful implementation of neuro-inspired plasticity rules into RC artificial networks has boosted the performance of the original models. In this manuscript, we analyze the role that plasticity rules play on the changes that lead to a better performance of RC. To this end, we implement synaptic and non-synaptic plasticity rules in a paradigmatic example of RC model: the Echo State Network. Testing on nonlinear time series prediction tasks, we show evidence that improved performance in all plastic models are linked to a decrease of the pair-wise correlations in the reservoir, as well as a significant increase of individual neurons ability to separate similar inputs in their activity space. Here we provide new insights on this observed improvement through the study of different stages on the plastic learning. From the perspective of the reservoir dynamics, optimal performance is found to occur close to the so-called edge of instability. Our results also show that it is possible to combine different forms of plasticity (namely synaptic and non-synaptic rules) to further improve the performance on prediction tasks, obtaining better results than those achieved with single-plasticity models.

[169]  arXiv:2101.05958 (cross-list from math.OC) [pdf, other]
Title: Stochastic Learning Approach to Binary Optimization for Optimal Design of Experiments
Comments: 34 pages, 12 figures
Subjects: Optimization and Control (math.OC); Machine Learning (cs.LG)

We present a novel stochastic approach to binary optimization for optimal experimental design (OED) for Bayesian inverse problems governed by mathematical models such as partial differential equations. The OED utility function, namely, the regularized optimality criterion, is cast into a stochastic objective function in the form of an expectation over a multivariate Bernoulli distribution. The probabilistic objective is then solved by using a stochastic optimization routine to find an optimal observational policy. The proposed approach is analyzed from an optimization perspective and also from a machine learning perspective with correspondence to policy gradient reinforcement learning. The approach is demonstrated numerically by using an idealized two-dimensional Bayesian linear inverse problem, and validated by extensive numerical experiments carried out for sensor placement in a parameter identification setup.

[170]  arXiv:2101.05975 (cross-list from eess.AS) [pdf, other]
Title: MFFCN: Multi-layer Feature Fusion Convolution Network for Audio-visual Speech Enhancement
Subjects: Audio and Speech Processing (eess.AS); Sound (cs.SD); Image and Video Processing (eess.IV)

The purpose of speech enhancement is to extract target speech signal from a mixture of sounds generated from several sources. Speech enhancement can potentially benefit from the visual information from the target speaker, such as lip move-ment and facial expressions, because the visual aspect of speech isessentially unaffected by acoustic environment. In order to fuse audio and visual information, an audio-visual fusion strategy is proposed, which goes beyond simple feature concatenation and learns to automatically align the two modalities, leading to more powerful representation which increase intelligibility in noisy conditions. The proposed model fuses audio-visual featureslayer by layer, and feed these audio-visual features to each corresponding decoding layer. Experiment results show relative improvement from 6% to 24% on test sets over the audio modalityalone, depending on audio noise level. Moreover, there is a significant increase of PESQ from 1.21 to 2.06 in our -15 dB SNR experiment.

[171]  arXiv:2101.05992 (cross-list from eess.IV) [pdf]
Title: Neural Network-derived perfusion maps: a Model-free approach to computed tomography perfusion in patients with acute ischemic stroke
Subjects: Image and Video Processing (eess.IV); Computer Vision and Pattern Recognition (cs.CV)

Purpose: In this study we investigate whether a Convolutional Neural Network (CNN) can generate clinically relevant parametric maps from CT perfusion data in a clinical setting of patients with acute ischemic stroke. Methods: Training of the CNN was done on a subset of 100 perfusion data, while 15 samples were used as validation. All the data used for the training/validation of the network and to generate ground truth (GT) maps, using a state-of-the-art deconvolution-algorithm, were previously pre-processed using a standard pipeline. Validation was carried out through manual segmentation of infarct core and penumbra on both CNN-derived maps and GT maps. Concordance among segmented lesions was assessed using the Dice and the Pearson correlation coefficients across lesion volumes. Results: Mean Dice scores from two different raters and the GT maps were > 0.70 (good-matching). Inter-rater concordance was also high and strong correlation was found between lesion volumes of CNN maps and GT maps (0.99, 0.98). Conclusion: Our CNN-based approach generated clinically relevant perfusion maps that are comparable to state-of-the-art perfusion analysis methods based on deconvolution of the data. Moreover, the proposed technique requires less information to estimate the ischemic core and thus might allow the development of novel perfusion protocols with lower radiation dose.

[172]  arXiv:2101.06116 (cross-list from eess.IV) [pdf, other]
Title: Hyperspectral Image Classification -- Traditional to Deep Models: A Survey for Future Prospects
Subjects: Image and Video Processing (eess.IV); Computer Vision and Pattern Recognition (cs.CV)

Hyperspectral Imaging (HSI) has been extensively utilized in many real-life applications because it benefits from the detailed spectral information contained in each pixel. Notably, the complex characteristics i.e., the nonlinear relation among the captured spectral information and the corresponding object of HSI data make accurate classification challenging for traditional methods. In the last few years, deep learning (DL) has been substantiated as a powerful feature extractor that effectively addresses the nonlinear problems that appeared in a number of computer vision tasks. This prompts the deployment of DL for HSI classification (HSIC) which revealed good performance. This survey enlists a systematic overview of DL for HSIC and compared state-of-the-art strategies of the said topic. Primarily, we will encapsulate the main challenges of traditional machine learning for HSIC and then we will acquaint the superiority of DL to address these problems. This survey breakdown the state-of-the-art DL frameworks into spectral-features, spatial-features, and together spatial-spectral features to systematically analyze the achievements (future directions as well) of these frameworks for HSIC. Moreover, we will consider the fact that DL requires a large number of labeled training examples whereas acquiring such a number for HSIC is challenging in terms of time and cost. Therefore, this survey discusses some strategies to improve the generalization performance of DL strategies which can provide some future guidelines.

[173]  arXiv:2101.06131 (cross-list from physics.soc-ph) [pdf, other]
Title: Flow stability for dynamic community detection
Comments: 41 pages, 6 figures
Subjects: Physics and Society (physics.soc-ph); Social and Information Networks (cs.SI); Dynamical Systems (math.DS); Data Analysis, Statistics and Probability (physics.data-an)

Many systems exhibit complex temporal dynamics due to the presence of different processes taking place simultaneously. Temporal networks provide a framework to describe the time-resolve interactions between components of a system. An important task when investigating such systems is to extract a simplified view of the temporal network, which can be done via dynamic community detection or clustering. Several works have generalized existing community detection methods for static networks to temporal networks, but they usually rely on temporal aggregation over time windows, the assumption of an underlying stationary process, or sequences of different stationary epochs. Here, we derive a method based on a dynamical process evolving on the temporal network and restricted by its activation pattern that allows to consider the full temporal information of the system. Our method allows dynamics that do not necessarily reach a steady state, or follow a sequence of stationary states. Our framework encompasses several well-known heuristics as special cases. We show that our method provides a natural way to disentangle the different natural dynamical scales present in a system. We demonstrate our method abilities on synthetic and real-world examples.

[174]  arXiv:2101.06147 (cross-list from eess.AS) [pdf]
Title: Estimation of the Frequency of Occurrence of Italian Phonemes in Text
Comments: submitted to Speech Communication
Subjects: Audio and Speech Processing (eess.AS); Sound (cs.SD)

The purpose of this project was to derive a reliable estimate of the frequency of occurrence of the 30 phonemes - plus consonant geminated counterparts - of the Italian language, based on four selected written texts. Since no comparable dataset was found in previous literature, the present analysis may serve as a reference in future studies. Four textual sources were considered: Come si fa una tesi di laurea: le materie umanistiche by Umberto Eco, I promessi sposi by Alessandro Manzoni, a recent article in Corriere della Sera (a popular daily Italian newspaper), and In altre parole by Jhumpa Lahiri. The sources were chosen to represent varied genres, subject matter, time periods, and writing styles. Results of the analysis, which also included an analysis of variance, showed that, for all four sources, the frequencies of occurrence reached relatively stable values after about 6,000 phonemes (approx. 1,250 words), varying by <0.025%. Estimated frequencies are provided for each single source and as an average across sources.

[175]  arXiv:2101.06154 (cross-list from quant-ph) [pdf, other]
Title: On the statistical complexity of quantum circuits
Comments: 6+19 pages
Subjects: Quantum Physics (quant-ph); Machine Learning (cs.LG); Machine Learning (stat.ML)

In theoretical machine learning, the statistical complexity is a notion that measures the richness of a hypothesis space. In this work, we apply a particular measure of statistical complexity, namely the Rademacher complexity, to the quantum circuit model in quantum computation and study how the statistical complexity depends on various quantum circuit parameters. In particular, we investigate the dependence of the statistical complexity on the resources, depth, width, and the number of input and output registers of a quantum circuit. To study how the statistical complexity scales with resources in the circuit, we introduce a resource measure of magic based on the $(p,q)$ group norm, which quantifies the amount of magic in the quantum channels associated with the circuit. These dependencies are investigated in the following two settings: (i) where the entire quantum circuit is treated as a single quantum channel, and (ii) where each layer of the quantum circuit is treated as a separate quantum channel. The bounds we obtain can be used to constrain the capacity of quantum neural networks in terms of their depths and widths as well as the resources in the network.

[176]  arXiv:2101.06201 (cross-list from math.GR) [pdf, other]
Title: Solving one variable word equations in the free group in cubic time
Comments: 52 pages, accepted to STACS 2021
Subjects: Group Theory (math.GR); Discrete Mathematics (cs.DM); Data Structures and Algorithms (cs.DS); Formal Languages and Automata Theory (cs.FL)

A word equation with one variable in a free group is given as $U = V$, where both $U$ and $V$ are words over the alphabet of generators of the free group and $X, X^{-1}$, for a fixed variable $X$. An element of the free group is a solution when substituting it for $X$ yields a true equality (interpreted in the free group) of left- and right-hand sides. It is known that the set of all solutions of a given word equation with one variable is a finite union of sets of the form $\{\alpha w^i \beta \: : \: i \in \mathbb Z \}$, where $\alpha, w, \beta$ are reduced words over the alphabet of generators, and a polynomial-time algorithm (of a high degree) computing this set is known. We provide a cubic time algorithm for this problem, which also shows that the set of solutions consists of at most a quadratic number of the above-mentioned sets. The algorithm uses only simple tools of word combinatorics and group theory and is simple to state. Its analysis is involved and focuses on the combinatorics of occurrences of powers of a word within a larger word.

[177]  arXiv:2101.06228 (cross-list from eess.IV) [pdf]
Title: Task-driven Self-supervised Bi-channel Networks Learning for Diagnosis of Breast Cancers with Mammography
Subjects: Image and Video Processing (eess.IV); Computer Vision and Pattern Recognition (cs.CV)

Deep learning can promote the mammography-based computer-aided diagnosis (CAD) for breast cancers, but it generally suffers from the small size sample problem. In this work, a task-driven self-supervised bi-channel networks (TSBNL) framework is proposed to improve the performance of classification network with limited mammograms. In particular, a new gray-scale image mapping (GSIM) task for image restoration is designed as the pretext task to improve discriminate feature representation with label information of mammograms. The TSBNL then innovatively integrates this image restoration network and the downstream classification network into a unified SSL framework, and transfers the knowledge from the pretext network to the classification network with improved diagnostic accuracy. The proposed algorithm is evaluated on a public INbreast mammogram dataset. The experimental results indicate that it outperforms the conventional SSL algorithms for diagnosis of breast cancers with limited samples.

[178]  arXiv:2101.06234 (cross-list from math.CT) [pdf, other]
Title: Nets with Mana: A Framework for Chemical Reaction Modelling
Comments: 14 pages
Subjects: Category Theory (math.CT); Formal Languages and Automata Theory (cs.FL); Molecular Networks (q-bio.MN)

We use categorical methods to define a new flavor of Petri nets which could be useful in modelling chemical reactions.

Replacements for Mon, 18 Jan 21

[179]  arXiv:1705.04293 (replaced) [pdf, other]
Title: Bayesian Approaches to Distribution Regression
Journal-ref: Proceedings of the Twenty-First International Conference on Artificial Intelligence and Statistics (AISTATS 2018), PMLR 84:1167-1176
Subjects: Machine Learning (stat.ML); Machine Learning (cs.LG)
[180]  arXiv:1812.00160 (replaced) [pdf, other]
Title: A Proof of Non-stationary Channel Polarization
Subjects: Information Theory (cs.IT)
[181]  arXiv:1904.07818 (replaced) [pdf, other]
Title: Maximizing Drift is Not Optimal for Solving OneMax
Comments: To appear in Evolutionary Computation
Subjects: Neural and Evolutionary Computing (cs.NE)
[182]  arXiv:1904.12156 (replaced) [pdf, other]
Title: Parameterised Counting in Logspace
Comments: Updated technical report to final version at STACS21
Subjects: Logic in Computer Science (cs.LO); Computational Complexity (cs.CC)
[183]  arXiv:1905.00487 (replaced) [pdf]
Title: Online Decision Process based on Machine Learning Techniques
Authors: Tanzila Saba
Subjects: Computers and Society (cs.CY)
[184]  arXiv:1907.13003 (replaced) [pdf, other]
Title: Distributed Resource Allocation over Time-varying Balanced Digraphs with Discrete-time Communication
Comments: 12 pages, 7 figures
Subjects: Multiagent Systems (cs.MA); Systems and Control (eess.SY); Optimization and Control (math.OC)
[185]  arXiv:1909.12464 (replaced) [pdf, other]
Title: Comment on "$Φ$ memristor: Real memristor found" by F. Z. Wang, L. Li, L. Shi, H. Wu, and L. O. Chua [J. Appl. Phys. 125, 054504 (2019)]
Comments: Following this comment, the article [F. Z. Wang, L. Li, L. Shi, H. Wu, and L. O. Chua, J. Appl. Phys. 125, 054504 (2019)] was retracted from JAP on technical grounds. The retraction notice can be found at this https URL
Subjects: Emerging Technologies (cs.ET); Mesoscale and Nanoscale Physics (cond-mat.mes-hall)
[186]  arXiv:1910.01310 (replaced) [pdf, other]
Title: Blockchains vs. Distributed Databases: Dichotomy and Fusion
Subjects: Databases (cs.DB); Performance (cs.PF)
[187]  arXiv:1910.02151 (replaced) [pdf, ps, other]
Title: Towards a Definitive Compressibility Measure for Repetitive Sequences
Subjects: Data Structures and Algorithms (cs.DS)
[188]  arXiv:1910.04002 (replaced) [pdf, other]
Title: Mollified finite element approximants of arbitrary order and smoothness
Subjects: Numerical Analysis (math.NA)
[189]  arXiv:1910.11712 (replaced) [pdf, ps, other]
Title: NEP: a module for the parallel solution of nonlinear eigenvalue problems in SLEPc
Subjects: Mathematical Software (cs.MS); Numerical Analysis (math.NA)
[190]  arXiv:1910.13339 (replaced) [pdf, other]
Title: Scalable Evaluation and Improvement of Document Set Expansion via Neural Positive-Unlabeled Learning
Comments: Accepted as a long paper to EACL 2021
Subjects: Computation and Language (cs.CL); Machine Learning (cs.LG)
[191]  arXiv:1910.13870 (replaced) [pdf, other]
Title: On weak convergence of Monge-Ampere measures for discrete convex mesh functions
Authors: Gerard Awanou
Comments: arXiv admin note: text overlap with arXiv:1408.1729
Subjects: Numerical Analysis (math.NA)
[192]  arXiv:1910.14376 (replaced) [pdf, other]
Title: The second boundary value problem for a discrete Monge-Ampere equation
Authors: Gerard Awanou
Comments: one figure
Subjects: Numerical Analysis (math.NA)
[193]  arXiv:1911.00260 (replaced) [pdf, other]
Title: Convergence of a damped Newton's method for discrete Monge-Ampere functions with a prescribed asymptotic cone
Authors: Gerard Awanou
Comments: one figure
Subjects: Numerical Analysis (math.NA)
[194]  arXiv:1911.07346 (replaced) [pdf, other]
Title: Any-Precision Deep Neural Networks
Comments: AAAI 2021
Subjects: Machine Learning (cs.LG); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[195]  arXiv:1912.04061 (replaced) [pdf, other]
Title: Simpler Hyperparameter Optimization forSoftware Analytics: Why, How, When?
Comments: 15 Pages, In Submission to TSE 2021
Subjects: Software Engineering (cs.SE); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[196]  arXiv:1912.07458 (replaced) [pdf, other]
Title: On-manifold Adversarial Data Augmentation Improves Uncertainty Calibration
Comments: Accepted for oral at International Conference on Pattern Recognition, ICPR 2020. Nominated (top 4) for Best Industry Related Paper Award (BIRPA)
Subjects: Machine Learning (cs.LG); Machine Learning (stat.ML)
[197]  arXiv:1912.10149 (replaced) [pdf, other]
Title: A Swiss Army Knife for Dynamic Caching in Small Cell Networks
Comments: Results improved: we now show that qLRU-$\Delta$ achieves the optimal configuration (and not a locally optimal one)
Subjects: Networking and Internet Architecture (cs.NI)
[198]  arXiv:1912.10742 (replaced) [pdf, other]
Title: Statistical analysis of Mapper for stochastic and multivariate filters
Subjects: Algebraic Topology (math.AT); Computational Geometry (cs.CG); Methodology (stat.ME); Machine Learning (stat.ML)
[199]  arXiv:1912.12759 (replaced) [pdf, other]
Title: A Faithful Discretization of the Persistent Homology Transform and Other Topological Transforms
Subjects: Computational Geometry (cs.CG)
[200]  arXiv:2002.00306 (replaced) [pdf, other]
Title: Brainstorming Generative Adversarial Networks (BGANs): Towards Multi-Agent Generative Models with Distributed Private Datasets
Comments: 13 pages, 16 figures, 3 tables
Subjects: Machine Learning (cs.LG); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (stat.ML)
[201]  arXiv:2002.01264 (replaced) [pdf, other]
Title: Boosting API Recommendation with Implicit Feedback
Comments: 15 pages, 4 figures
Subjects: Software Engineering (cs.SE); Information Retrieval (cs.IR)
[202]  arXiv:2002.06103 (replaced) [pdf, other]
Title: Multivariate Probabilistic Time Series Forecasting via Conditioned Normalizing Flows
Subjects: Machine Learning (cs.LG); Machine Learning (stat.ML)
[203]  arXiv:2002.06805 (replaced) [pdf, ps, other]
Title: Polarization-adjusted Convolutional (PAC) Codes: Sequential Decoding vs List Decoding
Comments: To appear in IEEE Transactions on Vehicular Technology
Subjects: Information Theory (cs.IT)
[204]  arXiv:2002.08253 (replaced) [pdf, ps, other]
Title: Distance-Based Regularisation of Deep Networks for Fine-Tuning
Subjects: Machine Learning (stat.ML); Machine Learning (cs.LG)
[205]  arXiv:2003.05601 (replaced) [pdf, ps, other]
Title: Cooperative output feedback tracking control of stochastic linear heterogeneous multi-agent systems
Authors: Dianqiang Li, Tao Li
Subjects: Systems and Control (eess.SY)
[206]  arXiv:2003.08119 (replaced) [pdf, other]
Title: The Future of Digital Health with Federated Learning
Comments: This is a pre-print version of this https URL
Journal-ref: npj Digital Medicine volume 3, Article number: 119 (2020)
Subjects: Computers and Society (cs.CY); Machine Learning (cs.LG)
[207]  arXiv:2003.11954 (replaced) [pdf, other]
Title: Bounded State Estimation over Finite-State Channels: Relating Topological Entropy and Zero-Error Capacity
Comments: arXiv admin note: text overlap with arXiv:1902.00726
Subjects: Systems and Control (eess.SY); Information Theory (cs.IT)
[208]  arXiv:2004.04662 (replaced) [pdf, other]
Title: Residual Shuffle-Exchange Networks for Fast Processing of Long Sequences
Comments: 35th AAAI Conference on Artificial Intelligence (AAAI-21)
Subjects: Machine Learning (cs.LG); Sound (cs.SD); Audio and Speech Processing (eess.AS)
[209]  arXiv:2004.04919 (replaced) [pdf, other]
Title: Luring of transferable adversarial perturbations in the black-box paradigm
Subjects: Machine Learning (cs.LG); Machine Learning (stat.ML)
[210]  arXiv:2004.07919 (replaced) [pdf, other]
Title: A Framework for Enhancing Deep Neural Networks Against Adversarial Malware
Comments: A fully-fledge version for the preliminary paper arXiv:1812.08108 | D. Li, Q. Li, Y. Ye, and S. Xu, "A Framework for Enhancing Deep Neural Networks Against Adversarial Malware", in IEEE Transactions on Network Science and Engineering
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[211]  arXiv:2004.09863 (replaced) [pdf, other]
Title: A novel embedded min-max approach for feature selection in nonlinear support vector machine classification
Comments: Published at European Journal of Operational Research
Subjects: Machine Learning (cs.LG); Optimization and Control (math.OC); Machine Learning (stat.ML)
[212]  arXiv:2004.10596 (replaced) [pdf, other]
Title: Circuit Design Of Clique Problem And Its Implementation On NISQ Using Combinatorial Approach Of Classical-Quantum Hybrid Model
Comments: 27 pages,15 figures. arXiv admin note: text overlap with arXiv:2001.06575 by other authors
Subjects: Data Structures and Algorithms (cs.DS)
[213]  arXiv:2004.12311 (replaced) [pdf, ps, other]
Title: Filter Grafting for Deep Neural Networks: Reason, Method, and Cultivation
Comments: arXiv admin note: substantial text overlap with arXiv:2001.05868
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI)
[214]  arXiv:2004.14170 (replaced) [pdf, ps, other]
Title: Coded Computing and Cooperative Transmission for Wireless Distributed Matrix Multiplication
Comments: To appear in IEEE Transactions on Communications
Subjects: Information Theory (cs.IT)
[215]  arXiv:2005.02171 (replaced) [pdf]
Title: Neural Computing for Online Arabic Handwriting Character Recognition using Hard Stroke Features Mining
Authors: Amjad Rehman (PSU and UTM)
Comments: 16 pages
Journal-ref: IJICIC 2021
Subjects: Computer Vision and Pattern Recognition (cs.CV); Computation and Language (cs.CL)
[216]  arXiv:2005.03882 (replaced) [pdf, ps, other]
Title: Numerical conservative solutions of the Hunter--Saxton equation
Subjects: Analysis of PDEs (math.AP); Numerical Analysis (math.NA)
[217]  arXiv:2005.04372 (replaced) [pdf, other]
Title: Information-Theoretic Generalization Bounds for Meta-Learning and Applications
Comments: Accepted to Entropy
Subjects: Machine Learning (cs.LG); Information Theory (cs.IT); Signal Processing (eess.SP); Machine Learning (stat.ML)
[218]  arXiv:2005.05434 (replaced) [pdf, other]
Title: Scalable First-Order Methods for Robust MDPs
Subjects: Optimization and Control (math.OC); Machine Learning (cs.LG)
[219]  arXiv:2005.10864 (replaced) [pdf, other]
Title: Memory-Aware Denial-of-Service Attacks on Shared Cache in Multicore Real-Time Systems
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[220]  arXiv:2006.00701 (replaced) [pdf, ps, other]
Title: Locally Differentially Private (Contextual) Bandits Learning
Comments: Accepted by NeurIPS 2020
Subjects: Machine Learning (cs.LG); Machine Learning (stat.ML)
[221]  arXiv:2006.01605 (replaced) [src]
Title: Statistical physics of social networking
Authors: Vaibhav Wasnik
Comments: Error in manuscript as probabilities evaluted may go greaater than 1
Subjects: Physics and Society (physics.soc-ph); Statistical Mechanics (cond-mat.stat-mech); Social and Information Networks (cs.SI)
[222]  arXiv:2006.03151 (replaced) [pdf, other]
Title: Hidden Markov models as recurrent neural networks: An application to Alzheimer's disease
Subjects: Machine Learning (stat.ML); Machine Learning (cs.LG); Applications (stat.AP); Methodology (stat.ME)
[223]  arXiv:2006.03573 (replaced) [pdf, other]
Title: Variational Auto-Encoder for Recommender Systems with Exploration-Exploitation
Comments: 7 pages, 4 figures
Subjects: Machine Learning (stat.ML); Machine Learning (cs.LG)
[224]  arXiv:2006.06890 (replaced) [pdf, other]
Title: EMOGI: Efficient Memory-access for Out-of-memory Graph-traversal In GPUs
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Databases (cs.DB)
[225]  arXiv:2006.07215 (replaced) [pdf, other]
Title: Convergence of adaptive discontinuous Galerkin and $C^0$-interior penalty finite element methods for Hamilton--Jacobi--Bellman and Isaacs equations
Subjects: Numerical Analysis (math.NA)
[226]  arXiv:2006.09226 (replaced) [pdf, other]
Title: Parameter-based Value Functions
Comments: To appear as a conference paper at ICLR 2021
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Machine Learning (stat.ML)
[227]  arXiv:2006.10963 (replaced) [pdf, other]
Title: Evaluating Prediction-Time Batch Normalization for Robustness under Covariate Shift
Subjects: Machine Learning (cs.LG); Machine Learning (stat.ML)
[228]  arXiv:2006.11002 (replaced) [pdf, other]
Title: A First Look at Android Applications in Google Play related to Covid-19
Comments: Accepted in Empirical Software Engineering under reference: EMSE-D-20-00211R1
Subjects: Software Engineering (cs.SE); Computers and Society (cs.CY)
[229]  arXiv:2006.13092 (replaced) [pdf, other]
Title: Multi-Class Uncertainty Calibration via Mutual Information Maximization-based Binning
Comments: Accepted at International Conference on Learning Representations, ICLR 2021. Openreview link: this https URL
Subjects: Machine Learning (cs.LG); Machine Learning (stat.ML)
[230]  arXiv:2006.13256 (replaced) [pdf, other]
Title: Rescaling Egocentric Vision
Comments: Dataset available from: this http URL
Subjects: Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[231]  arXiv:2006.13297 (replaced) [pdf, other]
Title: Learning Potentials of Quantum Systems using Deep Neural Networks
Comments: New density to potential experiments, substantial rearrangement of the paper, Under Review, comments welcome
Subjects: Machine Learning (cs.LG); Computational Physics (physics.comp-ph); Quantum Physics (quant-ph); Machine Learning (stat.ML)
[232]  arXiv:2006.13542 (replaced) [pdf, other]
Title: Affinity Fusion Graph-based Framework for Natural Image Segmentation
Comments: 11 pages, 10 figures
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[233]  arXiv:2006.13635 (replaced) [pdf, ps, other]
Title: ReLoC Reloaded: A Mechanized Relational Logic for Fine-Grained Concurrency and Logical Atomicity
Subjects: Logic in Computer Science (cs.LO); Programming Languages (cs.PL)
[234]  arXiv:2006.15473 (replaced) [pdf, other]
Title: Interpretable and Trustworthy Deepfake Detection via Dynamic Prototypes
Comments: To appear in the 2021 IEEE Winter Conference on Applications of Computer Vision (WACV 21')
Subjects: Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[235]  arXiv:2006.16176 (replaced) [pdf, other]
Title: Natural Backdoor Attack on Text Data
Authors: Lichao Sun
Comments: under submission
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[236]  arXiv:2007.01502 (replaced) [pdf, other]
Title: DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis
Journal-ref: 42nd IEEE Symposium on Security and Privacy, S&P 2021
Subjects: Cryptography and Security (cs.CR)
[237]  arXiv:2007.04540 (replaced) [pdf, ps, other]
Title: Contrastive Multiple Correspondence Analysis (cMCA): Using Contrastive Learning to Identify Latent Subgroups in Political Parties
Comments: Both authors contributed equally to the paper and listed alphabetically. This manuscript is currently under review
Subjects: Social and Information Networks (cs.SI); Machine Learning (cs.LG); Machine Learning (stat.ML)
[238]  arXiv:2007.06103 (replaced) [pdf, other]
Title: VINNAS: Variational Inference-based Neural Network Architecture Search
Comments: 10 pages
Subjects: Machine Learning (cs.LG); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[239]  arXiv:2007.06981 (replaced) [pdf, ps, other]
Title: Algorithmic applications of the corestriction of central simple algebras
Comments: 23 pages, results unchanged, exposition improved
Subjects: Number Theory (math.NT); Symbolic Computation (cs.SC); Rings and Algebras (math.RA)
[240]  arXiv:2007.09177 (replaced) [pdf, other]
Title: iNNk: A Multi-Player Game to Deceive a Neural Network
Subjects: Human-Computer Interaction (cs.HC); Artificial Intelligence (cs.AI)
[241]  arXiv:2007.14966 (replaced) [pdf, other]
Title: Mirostat: A Neural Text Decoding Algorithm that Directly Controls Perplexity
Comments: 25 pages, 12 figures
Subjects: Computation and Language (cs.CL); Information Theory (cs.IT)
[242]  arXiv:2008.00558 (replaced) [pdf, ps, other]
Title: Semi-supervised deep learning based on label propagation in a 2D embedded space
Comments: 7 pages, 5 figures
Subjects: Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[243]  arXiv:2008.02457 (replaced) [pdf, other]
Title: Graph Convolutional Networks for Hyperspectral Image Classification
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[244]  arXiv:2008.04712 (replaced) [pdf, other]
Title: Learning Event-triggered Control from Data through Joint Optimization
Subjects: Systems and Control (eess.SY); Machine Learning (cs.LG); Robotics (cs.RO)
[245]  arXiv:2008.09041 (replaced) [pdf, other]
Title: Direct Adversarial Training: A New Approach for Stabilizing The Training Process of GANs
Subjects: Image and Video Processing (eess.IV); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[246]  arXiv:2008.09965 (replaced) [pdf, other]
Title: Neighbourhood-Insensitive Point Cloud Normal Estimation Network
Comments: Accepted in BMVC 2020 as oral presentation. Code available at this https URL and project page at this http URL
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[247]  arXiv:2008.10670 (replaced) [pdf, ps, other]
Title: On the $k$ Nearest-Neighbor Path Distance from the Typical Intersection in the Manhattan Poisson Line Cox Process
Subjects: Networking and Internet Architecture (cs.NI)
[248]  arXiv:2008.10680 (replaced) [pdf, other]
Title: Video Interpolation via Generalized Deformable Convolution
Comments: 13pages, journal
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[249]  arXiv:2008.11687 (replaced) [pdf, other]
Title: What is being transferred in transfer learning?
Comments: Equal contribution, authors ordered randomly
Journal-ref: NeurIPS 2020
Subjects: Machine Learning (cs.LG); Machine Learning (stat.ML)
[250]  arXiv:2008.12281 (replaced) [pdf, other]
Title: Domain-shift Conditioning using Adaptable Filtering via Hierarchical Embeddings for Robust Chinese Spell Check
Subjects: Computation and Language (cs.CL)
[251]  arXiv:2009.01027 (replaced) [pdf, other]
Title: DARTS-: Robustly Stepping out of Performance Collapse Without Indicators
Comments: Accepted to ICLR2021
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[252]  arXiv:2009.04142 (replaced) [pdf, other]
Title: Kernel-based parameter estimation of dynamical systems with unknown observation functions
Subjects: Machine Learning (stat.ML); Machine Learning (cs.LG); Dynamical Systems (math.DS); Computational Physics (physics.comp-ph)
[253]  arXiv:2009.04742 (replaced) [pdf, other]
Title: Backtracking algorithms for constructing the Hamiltonian decomposition of a 4-regular multigraph
Comments: In Russian. Computational experiments are revised
Subjects: Data Structures and Algorithms (cs.DS); Combinatorics (math.CO)
[254]  arXiv:2009.06613 (replaced) [pdf, other]
Title: High-Resolution Deep Image Matting
Comments: AAAI 2021
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[255]  arXiv:2009.07349 (replaced) [pdf, other]
Title: Recurrent autoencoder with sequence-aware encoding
Authors: Robert Susik
Subjects: Machine Learning (cs.LG); Machine Learning (stat.ML)
[256]  arXiv:2009.07583 (replaced) [pdf, other]
Title: Video Compression with CNN-based Post Processing
Subjects: Image and Video Processing (eess.IV); Artificial Intelligence (cs.AI)
[257]  arXiv:2009.10036 (replaced) [pdf, ps, other]
Title: Iterative Detection and Decoding for Multiuser MIMO Systems with Low Resolution Precoding and PSK Modulation
Subjects: Information Theory (cs.IT)
[258]  arXiv:2009.14043 (replaced) [pdf, other]
Title: Online Simple Knapsack with Reservation Costs
Comments: 27 pages, 4 figures, second version with additional results
Subjects: Data Structures and Algorithms (cs.DS)
[259]  arXiv:2010.05842 (replaced) [pdf, ps, other]
Title: Remote Electrical Tilt Optimization via Safe Reinforcement Learning
Subjects: Machine Learning (cs.LG)
[260]  arXiv:2010.06735 (replaced) [pdf, other]
Title: Error-guided likelihood-free MCMC
Subjects: Machine Learning (stat.ML); Machine Learning (cs.LG)
[261]  arXiv:2010.07351 (replaced) [pdf, other]
Title: Improved Discretization of the Full First-Order Magnetic Field Integral Equation
Comments: 3 pages, 1 figure, accepted for the 15th European Conference on Antennas and Propagation 2021 (EuCAP)
Subjects: Numerical Analysis (math.NA); Computational Physics (physics.comp-ph)
[262]  arXiv:2010.07859 (replaced) [pdf]
Title: EqSpike: Spike-driven Equilibrium Propagation for Neuromorphic Implementations
Subjects: Neural and Evolutionary Computing (cs.NE)
[263]  arXiv:2010.08506 (replaced) [pdf, other]
Title: Direct Policy Optimization using Deterministic Sampling and Collocation
Comments: revisions for RA-L 2021
Subjects: Robotics (cs.RO)
[264]  arXiv:2010.08582 (replaced) [pdf, other]
Title: CT Image Segmentation for Inflamed and Fibrotic Lungs Using a Multi-Resolution Convolutional Neural Network
Journal-ref: Sci Rep 11, 1455 (2021)
Subjects: Image and Video Processing (eess.IV); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[265]  arXiv:2010.11675 (replaced) [pdf, other]
Title: Optimization-Based Visual-Inertial SLAM Tightly Coupled with Raw GNSS Measurements
Comments: 9 pages, 8 figures, an extended version of a manuscript submitted to IEEE Robotics and Automation Letters with ICRA 2021 Option. This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
Subjects: Robotics (cs.RO)
[266]  arXiv:2010.12484 (replaced) [pdf, ps, other]
Title: Speech enhancement aided end-to-end multi-task learning for voice activity detection
Subjects: Audio and Speech Processing (eess.AS); Machine Learning (cs.LG); Sound (cs.SD)
[267]  arXiv:2010.15311 (replaced) [pdf, other]
Title: DeviceTTS: A Small-Footprint, Fast, Stable Network for On-Device Text-to-Speech
Comments: 5 pages, 1 figure, Submitted to ICASSP2021
Subjects: Audio and Speech Processing (eess.AS); Sound (cs.SD)
[268]  arXiv:2011.00083 (replaced) [pdf, ps, other]
Title: Estimating Sparse Discrete Distributions Under Local Privacy and Communication Constraints
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (cs.LG)
[269]  arXiv:2011.01767 (replaced) [pdf, other]
Title: Mitigating Backdoor Attacks in Federated Learning
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[270]  arXiv:2011.04102 (replaced) [pdf]
Title: Reliable Off-policy Evaluation for Reinforcement Learning
Comments: 39 pages, 4 figures
Subjects: Machine Learning (cs.LG); Machine Learning (stat.ML)
[271]  arXiv:2011.05957 (replaced) [pdf, ps, other]
Title: Counting Homomorphic Cycles in Degenerate Graphs
Subjects: Data Structures and Algorithms (cs.DS); Combinatorics (math.CO)
[272]  arXiv:2011.07391 (replaced) [pdf, other]
Title: Channel Tiling for Improved Performance and Accuracy of Optical Neural Network Accelerators
Comments: 11 pages, 8 figures
Subjects: Emerging Technologies (cs.ET); Hardware Architecture (cs.AR)
[273]  arXiv:2011.09280 (replaced) [pdf, other]
Title: Continuous Emotion Recognition with Spatiotemporal Convolutional Neural Networks
Comments: 33 pages
Subjects: Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[274]  arXiv:2011.14721 (replaced) [pdf, ps, other]
Title: Probabilistic Load Forecasting Based on Adaptive Online Learning
Comments: \c{opyright} 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works
Subjects: Machine Learning (cs.LG); Machine Learning (stat.ML)
[275]  arXiv:2012.00933 (replaced) [pdf, other]
Title: Global and Individualized Community Detection in Inhomogeneous Multilayer Networks
Comments: Corrected a few typos. 96 pages (main manuscript: 27 pages, appendices: 69 pages), 5 figures
Subjects: Statistics Theory (math.ST); Information Theory (cs.IT); Machine Learning (cs.LG)
[276]  arXiv:2012.01839 (replaced) [pdf, other]
Title: Distributed Training and Optimization Of Neural Networks
Comments: 20 pages, 4 figures, 2 tables, Submitted for review. To appear in "Artificial Intelligence for Particle Physics", World Scientific Publishing
Subjects: Machine Learning (cs.LG); High Energy Physics - Experiment (hep-ex)
[277]  arXiv:2012.02809 (replaced) [pdf, other]
Title: ACN-Sim: An Open-Source Simulator for Data-Driven Electric Vehicle Charging Research
Comments: 9 pages, 8 figures. [v2] Update timezone issue with Fig. 8 where x-axis and background load was shifted by 3 hours
Subjects: Systems and Control (eess.SY)
[278]  arXiv:2012.04400 (replaced) [pdf, other]
Title: An Answer to the Bose-Nelson Sorting Problem for 11 and 12 Channels
Authors: Jannis Harder
Comments: Revised attribution of previous results in the introduction
Subjects: Data Structures and Algorithms (cs.DS)
[279]  arXiv:2012.06573 (replaced) [pdf]
Title: Risk & returns around FOMC press conferences: a novel perspective from computer vision
Authors: Alexis Marchal
Comments: 20 pages
Subjects: Machine Learning (stat.ML); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); General Finance (q-fin.GN)
[280]  arXiv:2012.09916 (replaced) [pdf, other]
Title: RAICC: Revealing Atypical Inter-Component Communication in Android Apps
Comments: In the proceedings of the 43rd International Conference on Software Engineering 2021 (ICSE 2021)
Subjects: Software Engineering (cs.SE)
[281]  arXiv:2012.11099 (replaced) [pdf, other]
Title: A Graph Reasoning Network for Multi-turn Response Selection via Customized Pre-training
Comments: Accepted by AAAI 2021;10 pages,6 figures
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI)
[282]  arXiv:2012.11585 (replaced) [pdf, other]
Title: End-to-End Deep Structured Models for Drawing Crosswalks
Journal-ref: ECCV 2018
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[283]  arXiv:2012.12250 (replaced) [pdf, ps, other]
Title: Iteratively Reweighted Least Squares for $\ell_1$-minimization with Global Linear Convergence Rate
Comments: 23 pages, 3 figures
Subjects: Optimization and Control (math.OC); Information Theory (cs.IT); Machine Learning (cs.LG); Numerical Analysis (math.NA)
[284]  arXiv:2012.12556 (replaced) [pdf, other]
Title: A Survey on Visual Transformer
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI)
[285]  arXiv:2012.12877 (replaced) [pdf, other]
Title: Training data-efficient image transformers & distillation through attention
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[286]  arXiv:2012.13962 (replaced) [pdf, other]
Title: A Tutorial on Sparse Gaussian Processes and Variational Inference
Subjects: Machine Learning (cs.LG); Machine Learning (stat.ML)
[287]  arXiv:2012.15441 (replaced) [pdf, other]
Title: DeepTake: Prediction of Driver Takeover Behavior using Multimodal Data
Comments: Accepted to CHI 2021
Subjects: Machine Learning (cs.LG); Human-Computer Interaction (cs.HC)
[288]  arXiv:2012.15480 (replaced) [pdf, other]
Title: Likelihood Ratio Exponential Families
Comments: NeurIPS Workshop on Deep Learning through Information Geometry
Subjects: Machine Learning (cs.LG); Information Theory (cs.IT); Machine Learning (stat.ML)
[289]  arXiv:2101.01039 (replaced) [pdf, other]
Title: Improving reference mining in patents with BERT
Comments: 10 pages, 3 figures
Subjects: Information Retrieval (cs.IR); Computation and Language (cs.CL)
[290]  arXiv:2101.01528 (replaced) [pdf, other]
Title: Experience vs Data: A Case for More Data-informed Retrospective Activities
Comments: 5th International Conference on Lean and Agile Software Development (LASD 2021). 23 January 2021
Journal-ref: Lecture Notes in Business Information Processing. Springer International Publishing. pp. 130-144. 2021
Subjects: Software Engineering (cs.SE)
[291]  arXiv:2101.02636 (replaced) [pdf, other]
Title: Deep Reinforcement Learning for Black-Box Testing of Android Apps
Subjects: Software Engineering (cs.SE)
[292]  arXiv:2101.02772 (replaced) [pdf, other]
Title: TODG: Distributed Task Offloading with Delay Guarantees for Edge Computing
Subjects: Networking and Internet Architecture (cs.NI)
[293]  arXiv:2101.03087 (replaced) [pdf, other]
Title: Forecasting Commodity Prices Using Long Short-Term Memory Neural Networks
Comments: 13 pages, 8 figures, 7 tables, 27 references
Subjects: Statistical Finance (q-fin.ST); Machine Learning (cs.LG)
[294]  arXiv:2101.03252 (replaced) [pdf, other]
Title: Synthetic Glacier SAR Image Generation from Arbitrary Masks Using Pix2Pix Algorithm
Subjects: Machine Learning (cs.LG); Computer Vision and Pattern Recognition (cs.CV)
[295]  arXiv:2101.03289 (replaced) [pdf, other]
Title: Trankit: A Light-Weight Transformer-based Toolkit for Multilingual Natural Language Processing
Subjects: Computation and Language (cs.CL)
[296]  arXiv:2101.04339 (replaced) [pdf, other]
Title: Locality Sensitive Hashing for Efficient Similar Polygon Retrieval
Subjects: Data Structures and Algorithms (cs.DS); Computational Geometry (cs.CG); Information Retrieval (cs.IR)
[297]  arXiv:2101.04400 (replaced) [pdf, ps, other]
Title: Time and Communication Complexity of Leader Election in Anonymous Networks
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC)
[298]  arXiv:2101.04702 (replaced) [pdf, other]
Title: Cross-Modal Contrastive Learning for Text-to-Image Generation
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[299]  arXiv:2101.04758 (replaced) [pdf, other]
Title: Self-Training Pre-Trained Language Models for Zero- and Few-Shot Multi-Dialectal Arabic Sequence Labeling
Comments: Accepted at EACL 2021
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Neural and Evolutionary Computing (cs.NE)
[300]  arXiv:2101.04823 (replaced) [pdf, other]
Title: A reusable pipeline for large-scale fiber segmentation on unidirectional fiber beds using fully convolutional neural networks
Comments: 26 pages, 9 figures
Subjects: Image and Video Processing (eess.IV); Computer Vision and Pattern Recognition (cs.CV)
[301]  arXiv:2101.05171 (replaced) [pdf, other]
Title: High-resolution agent-based modeling of COVID-19 spreading in a small town
Comments: 44 pages (including 16 of Supplementary Information), Under Review
Subjects: Populations and Evolution (q-bio.PE); Systems and Control (eess.SY); Quantitative Methods (q-bio.QM)
[302]  arXiv:2101.05204 (replaced) [pdf, ps, other]
Title: Neural Volume Rendering: NeRF And Beyond
Comments: Blog: this https URL Bibtex: this https URL
Subjects: Computer Vision and Pattern Recognition (cs.CV); Graphics (cs.GR)
[303]  arXiv:2101.05435 (replaced) [pdf, ps, other]
Title: A Critical Look at Coulomb Counting Towards Improving the Kalman Filter Based State of Charge Tracking Algorithms in Rechargeable Batteries
Subjects: Systems and Control (eess.SY)
[304]  arXiv:2101.05511 (replaced) [pdf, other]
Title: Quantifying Blockchain Extractable Value: How dark is the forest?
Subjects: Cryptography and Security (cs.CR)
[305]  arXiv:2101.05604 (replaced) [pdf, ps, other]
Title: Decoding of Interleaved Linearized Reed-Solomon Codes with Applications to Network Coding
Comments: 6 pages, 2 figures, submitted to ISIT 2021
Subjects: Information Theory (cs.IT)
[306]  arXiv:2101.05624 (replaced) [src]
Title: Adversarially robust and explainable model compression with on-device personalization for NLP applications
Comments: Need to improve the paper
Subjects: Machine Learning (cs.LG)
[ total of 306 entries: 1-306 ]
[ showing up to 2000 entries per page: fewer | more ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, recent, 2101, contact, help  (Access key information)