title
stringlengths 7
246
| abstract
stringlengths 6
3.31k
|
---|---|
Efficient L1-Norm Principal-Component Analysis via Bit Flipping | It was shown recently that the $K$ L1-norm principal components (L1-PCs) of a
real-valued data matrix $\mathbf X \in \mathbb R^{D \times N}$ ($N$ data
samples of $D$ dimensions) can be exactly calculated with cost
$\mathcal{O}(2^{NK})$ or, when advantageous, $\mathcal{O}(N^{dK - K + 1})$
where $d=\mathrm{rank}(\mathbf X)$, $K<d$ [1],[2]. In applications where
$\mathbf X$ is large (e.g., "big" data of large $N$ and/or "heavy" data of
large $d$), these costs are prohibitive. In this work, we present a novel
suboptimal algorithm for the calculation of the $K < d$ L1-PCs of $\mathbf X$
of cost $\mathcal O(ND \mathrm{min} \{ N,D\} + N^2(K^4 + dK^2) + dNK^3)$, which
is comparable to that of standard (L2-norm) PC analysis. Our theoretical and
experimental studies show that the proposed algorithm calculates the exact
optimal L1-PCs with high frequency and achieves higher value in the L1-PC
optimization metric than any known alternative algorithm of comparable
computational cost. The superiority of the calculated L1-PCs over standard
L2-PCs (singular vectors) in characterizing potentially faulty
data/measurements is demonstrated with experiments on data dimensionality
reduction and disease diagnosis from genomic data.
|
Polynomial-time Tensor Decompositions with Sum-of-Squares | We give new algorithms based on the sum-of-squares method for tensor
decomposition. Our results improve the best known running times from
quasi-polynomial to polynomial for several problems, including decomposing
random overcomplete 3-tensors and learning overcomplete dictionaries with
constant relative sparsity. We also give the first robust analysis for
decomposing overcomplete 4-tensors in the smoothed analysis model. A key
ingredient of our analysis is to establish small spectral gaps in moment
matrices derived from solutions to sum-of-squares relaxations. To enable this
analysis we augment sum-of-squares relaxations with spectral analogs of maximum
entropy constraints.
|
Active exploration in parameterized reinforcement learning | Online model-free reinforcement learning (RL) methods with continuous actions
are playing a prominent role when dealing with real-world applications such as
Robotics. However, when confronted to non-stationary environments, these
methods crucially rely on an exploration-exploitation trade-off which is rarely
dynamically and automatically adjusted to changes in the environment. Here we
propose an active exploration algorithm for RL in structured (parameterized)
continuous action space. This framework deals with a set of discrete actions,
each of which is parameterized with continuous variables. Discrete exploration
is controlled through a Boltzmann softmax function with an inverse temperature
$\beta$ parameter. In parallel, a Gaussian exploration is applied to the
continuous action parameters. We apply a meta-learning algorithm based on the
comparison between variations of short-term and long-term reward running
averages to simultaneously tune $\beta$ and the width of the Gaussian
distribution from which continuous action parameters are drawn. When applied to
a simple virtual human-robot interaction task, we show that this algorithm
outperforms continuous parameterized RL both without active exploration and
with active exploration based on uncertainty variations measured by a
Kalman-Q-learning algorithm.
|
Regularized Dynamic Boltzmann Machine with Delay Pruning for
Unsupervised Learning of Temporal Sequences | We introduce Delay Pruning, a simple yet powerful technique to regularize
dynamic Boltzmann machines (DyBM). The recently introduced DyBM provides a
particularly structured Boltzmann machine, as a generative model of a
multi-dimensional time-series. This Boltzmann machine can have infinitely many
layers of units but allows exact inference and learning based on its
biologically motivated structure. DyBM uses the idea of conduction delays in
the form of fixed length first-in first-out (FIFO) queues, with a neuron
connected to another via this FIFO queue, and spikes from a pre-synaptic neuron
travel along the queue to the post-synaptic neuron with a constant period of
delay. Here, we present Delay Pruning as a mechanism to prune the lengths of
the FIFO queues (making them zero) by setting some delay lengths to one with a
fixed probability, and finally selecting the best performing model with fixed
delays. The uniqueness of structure and a non-sampling based learning rule in
DyBM, make the application of previously proposed regularization techniques
like Dropout or DropConnect difficult, leading to poor generalization. First,
we evaluate the performance of Delay Pruning to let DyBM learn a
multidimensional temporal sequence generated by a Markov chain. Finally, we
show the effectiveness of delay pruning in learning high dimensional sequences
using the moving MNIST dataset, and compare it with Dropout and DropConnect
methods.
|
Stochastic Games for Smart Grid Energy Management with Prospect
Prosumers | In this paper, the problem of smart grid energy management under stochastic
dynamics is investigated. In the considered model, at the demand side, it is
assumed that customers can act as prosumers who own renewable energy sources
and can both produce and consume energy. Due to the coupling between the
prosumers' decisions and the stochastic nature of renewable energy, the
interaction among prosumers is formulated as a stochastic game, in which each
prosumer seeks to maximize its payoff, in terms of revenues, by controlling its
energy consumption and demand. In particular, the subjective behavior of
prosumers is explicitly reflected into their payoff functions using prospect
theory, a powerful framework that allows modeling real-life human choices. For
this prospect-based stochastic game, it is shown that there always exists a
stationary Nash equilibrium where the prosumers' trading policies in the
equilibrium are independent of the time and their histories of the play.
Moreover, a novel distributed algorithm with no information sharing among
prosumers is proposed and shown to converge to an $\epsilon$-Nash equilibrium.
On the other hand, at the supply side, the interaction between the utility
company and the prosumers is formulated as an online optimization problem in
which the utility company's goal is to learn its optimal energy allocation
rules. For this case, it is shown that such an optimization problem admits a
no-regret algorithm meaning that regardless of the actual outcome of the game
among the prosumers, the utility company can follow a strategy that mitigates
its allocation costs as if it knew the entire demand market a priori.
Simulation results show the convergence of the proposed algorithms to their
predicted outcomes and present new insights resulting from prospect theory that
contribute toward more efficient energy management in the smart grids.
|
An efficient high-probability algorithm for Linear Bandits | For the linear bandit problem, we extend the analysis of algorithm CombEXP
from [R. Combes, M. S. Talebi Mazraeh Shahi, A. Proutiere, and M. Lelarge.
Combinatorial bandits revisited. In C. Cortes, N. D. Lawrence, D. D. Lee, M.
Sugiyama, and R. Garnett, editors, Advances in Neural Information Processing
Systems 28, pages 2116--2124. Curran Associates, Inc., 2015. URL
http://papers.nips.cc/paper/5831-combinatorial-bandits-revisited.pdf] to the
high-probability case against adaptive adversaries, allowing actions to come
from an arbitrary polytope. We prove a high-probability regret of
\(O(T^{2/3})\) for time horizon \(T\). While this bound is weaker than the
optimal \(O(\sqrt{T})\) bound achieved by GeometricHedge in [P. L. Bartlett, V.
Dani, T. Hayes, S. Kakade, A. Rakhlin, and A. Tewari. High-probability regret
bounds for bandit online linear optimization. In 21th Annual Conference on
Learning Theory (COLT 2008), July 2008.
http://eprints.qut.edu.au/45706/1/30-Bartlett.pdf], CombEXP is computationally
efficient, requiring only an efficient linear optimization oracle over the
convex hull of the actions.
|
QSGD: Communication-Efficient SGD via Gradient Quantization and Encoding | Parallel implementations of stochastic gradient descent (SGD) have received
significant research attention, thanks to excellent scalability properties of
this algorithm, and to its efficiency in the context of training deep neural
networks. A fundamental barrier for parallelizing large-scale SGD is the fact
that the cost of communicating the gradient updates between nodes can be very
large. Consequently, lossy compression heuristics have been proposed, by which
nodes only communicate quantized gradients. Although effective in practice,
these heuristics do not always provably converge, and it is not clear whether
they are optimal.
In this paper, we propose Quantized SGD (QSGD), a family of compression
schemes which allow the compression of gradient updates at each node, while
guaranteeing convergence under standard assumptions. QSGD allows the user to
trade off compression and convergence time: it can communicate a sublinear
number of bits per iteration in the model dimension, and can achieve
asymptotically optimal communication cost. We complement our theoretical
results with empirical data, showing that QSGD can significantly reduce
communication cost, while being competitive with standard uncompressed
techniques on a variety of real tasks.
In particular, experiments show that gradient quantization applied to
training of deep neural networks for image classification and automated speech
recognition can lead to significant reductions in communication cost, and
end-to-end training time. For instance, on 16 GPUs, we are able to train a
ResNet-152 network on ImageNet 1.8x faster to full accuracy. Of note, we show
that there exist generic parameter settings under which all known network
architectures preserve or slightly improve their full accuracy when using
quantization.
|
A Baseline for Detecting Misclassified and Out-of-Distribution Examples
in Neural Networks | We consider the two related problems of detecting if an example is
misclassified or out-of-distribution. We present a simple baseline that
utilizes probabilities from softmax distributions. Correctly classified
examples tend to have greater maximum softmax probabilities than erroneously
classified and out-of-distribution examples, allowing for their detection. We
assess performance by defining several tasks in computer vision, natural
language processing, and automatic speech recognition, showing the
effectiveness of this baseline across all. We then show the baseline can
sometimes be surpassed, demonstrating the room for future research on these
underexplored detection tasks.
|
Stochastic Averaging for Constrained Optimization with Application to
Online Resource Allocation | Existing approaches to resource allocation for nowadays stochastic networks
are challenged to meet fast convergence and tolerable delay requirements. The
present paper leverages online learning advances to facilitate stochastic
resource allocation tasks. By recognizing the central role of Lagrange
multipliers, the underlying constrained optimization problem is formulated as a
machine learning task involving both training and operational modes, with the
goal of learning the sought multipliers in a fast and efficient manner. To this
end, an order-optimal offline learning approach is developed first for batch
training, and it is then generalized to the online setting with a procedure
termed learn-and-adapt. The novel resource allocation protocol permeates
benefits of stochastic approximation and statistical learning to obtain
low-complexity online updates with learning errors close to the statistical
accuracy limits, while still preserving adaptation performance, which in the
stochastic network optimization context guarantees queue stability. Analysis
and simulated tests demonstrate that the proposed data-driven approach improves
the delay and convergence performance of existing resource allocation schemes.
|
Deep Reinforcement Learning From Raw Pixels in Doom | Using current reinforcement learning methods, it has recently become possible
to learn to play unknown 3D games from raw pixels. In this work, we study the
challenges that arise in such complex environments, and summarize current
methods to approach these. We choose a task within the Doom game, that has not
been approached yet. The goal for the agent is to fight enemies in a 3D world
consisting of five rooms. We train the DQN and LSTM-A3C algorithms on this
task. Results show that both algorithms learn sensible policies, but fail to
achieve high scores given the amount of training. We provide insights into the
learned behavior, which can serve as a valuable starting point for further
research in the Doom domain.
|
Temporal Ensembling for Semi-Supervised Learning | In this paper, we present a simple and efficient method for training deep
neural networks in a semi-supervised setting where only a small portion of
training data is labeled. We introduce self-ensembling, where we form a
consensus prediction of the unknown labels using the outputs of the
network-in-training on different epochs, and most importantly, under different
regularization and input augmentation conditions. This ensemble prediction can
be expected to be a better predictor for the unknown labels than the output of
the network at the most recent training epoch, and can thus be used as a target
for training. Using our method, we set new records for two standard
semi-supervised learning benchmarks, reducing the (non-augmented)
classification error rate from 18.44% to 7.05% in SVHN with 500 labels and from
18.63% to 16.55% in CIFAR-10 with 4000 labels, and further to 5.12% and 12.16%
by enabling the standard augmentations. We additionally obtain a clear
improvement in CIFAR-100 classification accuracy by using random images from
the Tiny Images dataset as unlabeled extra inputs during training. Finally, we
demonstrate good tolerance to incorrect labels.
|
Near-Data Processing for Differentiable Machine Learning Models | Near-data processing (NDP) refers to augmenting memory or storage with
processing power. Despite its potential for acceleration computing and reducing
power requirements, only limited progress has been made in popularizing NDP for
various reasons. Recently, two major changes have occurred that have ignited
renewed interest and caused a resurgence of NDP. The first is the success of
machine learning (ML), which often demands a great deal of computation for
training, requiring frequent transfers of big data. The second is the
popularity of NAND flash-based solid-state drives (SSDs) containing multicore
processors that can accommodate extra computation for data processing. In this
paper, we evaluate the potential of NDP for ML using a new SSD platform that
allows us to simulate instorage processing (ISP) of ML workloads. Our platform
(named ISP-ML) is a full-fledged simulator of a realistic multi-channel SSD
that can execute various ML algorithms using data stored in the SSD. To conduct
a thorough performance analysis and an in-depth comparison with alternative
techniques, we focus on a specific algorithm: stochastic gradient descent
(SGD), which is the de facto standard for training differentiable models such
as logistic regression and neural networks. We implement and compare three SGD
variants (synchronous, Downpour, and elastic averaging) using ISP-ML,
exploiting the multiple NAND channels to parallelize SGD. In addition, we
compare the performance of ISP and that of conventional in-host processing,
revealing the advantages of ISP. Based on the advantages and limitations
identified through our experiments, we further discuss directions for future
research on ISP for accelerating ML.
|
Effective Classification of MicroRNA Precursors Using Combinatorial
Feature Mining and AdaBoost Algorithms | MicroRNAs (miRNAs) are non-coding RNAs with approximately 22 nucleotides (nt)
that are derived from precursor molecules. These precursor molecules or
pre-miRNAs often fold into stem-loop hairpin structures. However, a large
number of sequences with pre-miRNA-like hairpins can be found in genomes. It is
a challenge to distinguish the real pre-miRNAs from other hairpin sequences
with similar stem-loops (referred to as pseudo pre-miRNAs). Several
computational methods have been developed to tackle this challenge. In this
paper we propose a new method, called MirID, for identifying and classifying
microRNA precursors. We collect 74 features from the sequences and secondary
structures of pre-miRNAs; some of these features are taken from our previous
studies on non-coding RNA prediction while others were suggested in the
literature. We develop a combinatorial feature mining algorithm to identify
suitable feature sets. These feature sets are then used to train support vector
machines to obtain classification models, based on which classifier ensemble is
constructed. Finally we use an AdaBoost algorithm to further enhance the
accuracy of the classifier ensemble. Experimental results on a variety of
species demonstrate the good performance of the proposed method, and its
superiority over existing tools.
|
Adaptive Convolutional ELM For Concept Drift Handling in Online Stream
Data | In big data era, the data continuously generated and its distribution may
keep changes overtime. These challenges in online stream of data are known as
concept drift. In this paper, we proposed the Adaptive Convolutional ELM method
(ACNNELM) as enhancement of Convolutional Neural Network (CNN) with a hybrid
Extreme Learning Machine (ELM) model plus adaptive capability. This method is
aimed for concept drift handling. We enhanced the CNN as convolutional
hiererchical features representation learner combined with Elastic ELM
(E$^2$LM) as a parallel supervised classifier. We propose an Adaptive OS-ELM
(AOS-ELM) for concept drift adaptability in classifier level (named ACNNELM-1)
and matrices concatenation ensembles for concept drift adaptability in ensemble
level (named ACNNELM-2). Our proposed Adaptive CNNELM is flexible that works
well in classifier level and ensemble level while most current methods only
proposed to work on either one of the levels.
We verified our method in extended MNIST data set and not MNIST data set. We
set the experiment to simulate virtual drift, real drift, and hybrid drift
event and we demonstrated how our CNNELM adaptability works. Our proposed
method works well and gives better accuracy, computation scalability, and
concept drifts adaptability compared to the regular ELM and CNN. Further
researches are still required to study the optimum parameters and to use more
varied image data set.
|
Distributed Averaging CNN-ELM for Big Data | Increasing the scalability of machine learning to handle big volume of data
is a challenging task. The scale up approach has some limitations. In this
paper, we proposed a scale out approach for CNN-ELM based on MapReduce on
classifier level. Map process is the CNN-ELM training for certain partition of
data. It involves many CNN-ELM models that can be trained asynchronously.
Reduce process is the averaging of all CNN-ELM weights as final training
result. This approach can save a lot of training time than single CNN-ELM
models trained alone. This approach also increased the scalability of machine
learning by combining scale out and scale up approaches. We verified our method
in extended MNIST data set and not-MNIST data set experiment. However, it has
some drawbacks by additional iteration learning parameters that need to be
carefully taken and training data distribution that need to be carefully
selected. Further researches to use more complex image data set are required.
|
Grad-CAM: Visual Explanations from Deep Networks via Gradient-based
Localization | We propose a technique for producing "visual explanations" for decisions from
a large class of CNN-based models, making them more transparent. Our approach -
Gradient-weighted Class Activation Mapping (Grad-CAM), uses the gradients of
any target concept, flowing into the final convolutional layer to produce a
coarse localization map highlighting important regions in the image for
predicting the concept. Grad-CAM is applicable to a wide variety of CNN
model-families: (1) CNNs with fully-connected layers, (2) CNNs used for
structured outputs, (3) CNNs used in tasks with multimodal inputs or
reinforcement learning, without any architectural changes or re-training. We
combine Grad-CAM with fine-grained visualizations to create a high-resolution
class-discriminative visualization and apply it to off-the-shelf image
classification, captioning, and visual question answering (VQA) models,
including ResNet-based architectures. In the context of image classification
models, our visualizations (a) lend insights into their failure modes, (b) are
robust to adversarial images, (c) outperform previous methods on localization,
(d) are more faithful to the underlying model and (e) help achieve
generalization by identifying dataset bias. For captioning and VQA, we show
that even non-attention based models can localize inputs. We devise a way to
identify important neurons through Grad-CAM and combine it with neuron names to
provide textual explanations for model decisions. Finally, we design and
conduct human studies to measure if Grad-CAM helps users establish appropriate
trust in predictions from models and show that Grad-CAM helps untrained users
successfully discern a 'stronger' nodel from a 'weaker' one even when both make
identical predictions. Our code is available at
https://github.com/ramprs/grad-cam/, along with a demo at
http://gradcam.cloudcv.org, and a video at youtu.be/COjUB9Izk6E.
|
Equality of Opportunity in Supervised Learning | We propose a criterion for discrimination against a specified sensitive
attribute in supervised learning, where the goal is to predict some target
based on available features. Assuming data about the predictor, target, and
membership in the protected group are available, we show how to optimally
adjust any learned predictor so as to remove discrimination according to our
definition. Our framework also improves incentives by shifting the cost of poor
classification from disadvantaged groups to the decision maker, who can respond
by improving the classification accuracy.
In line with other studies, our notion is oblivious: it depends only on the
joint statistics of the predictor, the target and the protected attribute, but
not on interpretation of individualfeatures. We study the inherent limits of
defining and identifying biases based on such oblivious measures, outlining
what can and cannot be inferred from different oblivious tests.
We illustrate our notion using a case study of FICO credit scores.
|
Automatic chemical design using a data-driven continuous representation
of molecules | We report a method to convert discrete representations of molecules to and
from a multidimensional continuous representation. This model allows us to
generate new molecules for efficient exploration and optimization through
open-ended spaces of chemical compounds. A deep neural network was trained on
hundreds of thousands of existing chemical structures to construct three
coupled functions: an encoder, a decoder and a predictor. The encoder converts
the discrete representation of a molecule into a real-valued continuous vector,
and the decoder converts these continuous vectors back to discrete molecular
representations. The predictor estimates chemical properties from the latent
continuous vector representation of the molecule. Continuous representations
allow us to automatically generate novel chemical structures by performing
simple operations in the latent space, such as decoding random vectors,
perturbing known chemical structures, or interpolating between molecules.
Continuous representations also allow the use of powerful gradient-based
optimization to efficiently guide the search for optimized functional
compounds. We demonstrate our method in the domain of drug-like molecules and
also in the set of molecules with fewer that nine heavy atoms.
|
Boost K-Means | Due to its simplicity and versatility, k-means remains popular since it was
proposed three decades ago. The performance of k-means has been enhanced from
different perspectives over the years. Unfortunately, a good trade-off between
quality and efficiency is hardly reached. In this paper, a novel k-means
variant is presented. Different from most of k-means variants, the clustering
procedure is driven by an explicit objective function, which is feasible for
the whole l2-space. The classic egg-chicken loop in k-means has been simplified
to a pure stochastic optimization procedure. The procedure of k-means becomes
simpler and converges to a considerably better local optima. The effectiveness
of this new variant has been studied extensively in different contexts, such as
document clustering, nearest neighbor search and image clustering. Superior
performance is observed across different scenarios.
|
SaberLDA: Sparsity-Aware Learning of Topic Models on GPUs | Latent Dirichlet Allocation (LDA) is a popular tool for analyzing discrete
count data such as text and images. Applications require LDA to handle both
large datasets and a large number of topics. Though distributed CPU systems
have been used, GPU-based systems have emerged as a promising alternative
because of the high computational power and memory bandwidth of GPUs. However,
existing GPU-based LDA systems cannot support a large number of topics because
they use algorithms on dense data structures whose time and space complexity is
linear to the number of topics. In this paper, we propose SaberLDA, a GPU-based
LDA system that implements a sparsity-aware algorithm to achieve sublinear time
complexity and scales well to learn a large number of topics. To address the
challenges introduced by sparsity, we propose a novel data layout, a new
warp-based sampling kernel, and an efficient sparse count matrix updating
algorithm that improves locality, makes efficient utilization of GPU warps, and
reduces memory consumption. Experiments show that SaberLDA can learn from
billions-token-scale data with up to 10,000 topics, which is almost two orders
of magnitude larger than that of the previous GPU-based systems. With a single
GPU card, SaberLDA is able to learn 10,000 topics from a dataset of billions of
tokens in a few hours, which is only achievable with clusters with tens of
machines before.
|
Revisiting Multiple Instance Neural Networks | Recently neural networks and multiple instance learning are both attractive
topics in Artificial Intelligence related research fields. Deep neural networks
have achieved great success in supervised learning problems, and multiple
instance learning as a typical weakly-supervised learning method is effective
for many applications in computer vision, biometrics, nature language
processing, etc. In this paper, we revisit the problem of solving multiple
instance learning problems using neural networks. Neural networks are appealing
for solving multiple instance learning problem. The multiple instance neural
networks perform multiple instance learning in an end-to-end way, which take a
bag with various number of instances as input and directly output bag label.
All of the parameters in a multiple instance network are able to be optimized
via back-propagation. We propose a new multiple instance neural network to
learn bag representations, which is different from the existing multiple
instance neural networks that focus on estimating instance label. In addition,
recent tricks developed in deep learning have been studied in multiple instance
networks, we find deep supervision is effective for boosting bag classification
accuracy. In the experiments, the proposed multiple instance networks achieve
state-of-the-art or competitive performance on several MIL benchmarks.
Moreover, it is extremely fast for both testing and training, e.g., it takes
only 0.0003 second to predict a bag and a few seconds to train on a MIL
datasets on a moderate CPU.
|
Federated Optimization: Distributed Machine Learning for On-Device
Intelligence | We introduce a new and increasingly relevant setting for distributed
optimization in machine learning, where the data defining the optimization are
unevenly distributed over an extremely large number of nodes. The goal is to
train a high-quality centralized model. We refer to this setting as Federated
Optimization. In this setting, communication efficiency is of the utmost
importance and minimizing the number of rounds of communication is the
principal goal.
A motivating example arises when we keep the training data locally on users'
mobile devices instead of logging it to a data center for training. In
federated optimziation, the devices are used as compute nodes performing
computation on their local data in order to update a global model. We suppose
that we have extremely large number of devices in the network --- as many as
the number of users of a given service, each of which has only a tiny fraction
of the total data available. In particular, we expect the number of data points
available locally to be much smaller than the number of devices. Additionally,
since different users generate data with different patterns, it is reasonable
to assume that no device has a representative sample of the overall
distribution.
We show that existing algorithms are not suitable for this setting, and
propose a new algorithm which shows encouraging experimental results for sparse
convex problems. This work also sets a path for future research needed in the
context of \federated optimization.
|
A Gentle Tutorial of Recurrent Neural Network with Error Backpropagation | We describe recurrent neural networks (RNNs), which have attracted great
attention on sequential tasks, such as handwriting recognition, speech
recognition and image to text. However, compared to general feedforward neural
networks, RNNs have feedback loops, which makes it a little hard to understand
the backpropagation step. Thus, we focus on basics, especially the error
backpropagation to compute gradients with respect to model parameters. Further,
we go into detail on how error backpropagation algorithm is applied on long
short-term memory (LSTM) by unfolding the memory unit.
|
A new selection strategy for selective cluster ensemble based on
Diversity and Independency | This research introduces a new strategy in cluster ensemble selection by
using Independency and Diversity metrics. In recent years, Diversity and
Quality, which are two metrics in evaluation procedure, have been used for
selecting basic clustering results in the cluster ensemble selection. Although
quality can improve the final results in cluster ensemble, it cannot control
the procedures of generating basic results, which causes a gap in prediction of
the generated basic results' accuracy. Instead of quality, this paper
introduces Independency as a supplementary method to be used in conjunction
with Diversity. Therefore, this paper uses a heuristic metric, which is based
on the procedure of converting code to graph in Software Testing, in order to
calculate the Independency of two basic clustering algorithms. Moreover, a new
modeling language, which we called as "Clustering Algorithms Independency
Language" (CAIL), is introduced in order to generate graphs which depict
Independency of algorithms. Also, Uniformity, which is a new similarity metric,
has been introduced for evaluating the diversity of basic results. As a
credential, our experimental results on varied different standard data sets
show that the proposed framework improves the accuracy of final results
dramatically in comparison with other cluster ensemble methods.
|
Dataiku's Solution to SPHERE's Activity Recognition Challenge | Our team won the second prize of the Safe Aging with SPHERE Challenge
organized by SPHERE, in conjunction with ECML-PKDD and Driven Data. The goal of
the competition was to recognize activities performed by humans, using sensor
data. This paper presents our solution. It is based on a rich pre-processing
and state of the art machine learning methods. From the raw train data, we
generate a synthetic train set with the same statistical characteristics as the
test set. We then perform feature engineering. The machine learning modeling
part is based on stacking weak learners through a grid searched XGBoost
algorithm. Finally, we use post-processing to smooth our predictions over time.
|
Robust Bayesian Compressed sensing | We consider the problem of robust compressed sensing whose objective is to
recover a high-dimensional sparse signal from compressed measurements corrupted
by outliers. A new sparse Bayesian learning method is developed for robust
compressed sensing. The basic idea of the proposed method is to identify and
remove the outliers from sparse signal recovery. To automatically identify the
outliers, we employ a set of binary indicator hyperparameters to indicate which
observations are outliers. These indicator hyperparameters are treated as
random variables and assigned a beta process prior such that their values are
confined to be binary. In addition, a Gaussian-inverse Gamma prior is imposed
on the sparse signal to promote sparsity. Based on this hierarchical prior
model, we develop a variational Bayesian method to estimate the indicator
hyperparameters as well as the sparse signal. Simulation results show that the
proposed method achieves a substantial performance improvement over existing
robust compressed sensing techniques.
|
Ranking academic institutions on potential paper acceptance in upcoming
conferences | The crux of the problem in KDD Cup 2016 involves developing data mining
techniques to rank research institutions based on publications. Rank importance
of research institutions are derived from predictions on the number of full
research papers that would potentially get accepted in upcoming top-tier
conferences, utilizing public information on the web. This paper describes our
solution to KDD Cup 2016. We used a two step approach in which we first
identify full research papers corresponding to each conference of interest and
then train two variants of exponential smoothing models to make predictions.
Our solution achieves an overall score of 0.7508, while the winning submission
scored 0.7656 in the overall results.
|
Heuristic Approaches for Generating Local Process Models through Log
Projections | Local Process Model (LPM) discovery is focused on the mining of a set of
process models where each model describes the behavior represented in the event
log only partially, i.e. subsets of possible events are taken into account to
create so-called local process models. Often such smaller models provide
valuable insights into the behavior of the process, especially when no adequate
and comprehensible single overall process model exists that is able to describe
the traces of the process from start to end. The practical application of LPM
discovery is however hindered by computational issues in the case of logs with
many activities (problems may already occur when there are more than 17 unique
activities). In this paper, we explore three heuristics to discover subsets of
activities that lead to useful log projections with the goal of speeding up LPM
discovery considerably while still finding high-quality LPMs. We found that a
Markov clustering approach to create projection sets results in the largest
improvement of execution time, with discovered LPMs still being better than
with the use of randomly generated activity sets of the same size. Another
heuristic, based on log entropy, yields a more moderate speedup, but enables
the discovery of higher quality LPMs. The third heuristic, based on the
relative information gain, shows unstable performance: for some data sets the
speedup and LPM quality are higher than with the log entropy based method,
while for other data sets there is no speedup at all.
|
Personalizing a Dialogue System with Transfer Reinforcement Learning | It is difficult to train a personalized task-oriented dialogue system because
the data collected from each individual is often insufficient. Personalized
dialogue systems trained on a small dataset can overfit and make it difficult
to adapt to different user needs. One way to solve this problem is to consider
a collection of multiple users' data as a source domain and an individual
user's data as a target domain, and to perform a transfer learning from the
source to the target domain. By following this idea, we propose
"PETAL"(PErsonalized Task-oriented diALogue), a transfer-learning framework
based on POMDP to learn a personalized dialogue system. The system first learns
common dialogue knowledge from the source domain and then adapts this knowledge
to the target user. This framework can avoid the negative transfer problem by
considering differences between source and target users. The policy in the
personalized POMDP can learn to choose different actions appropriately for
different users. Experimental results on a real-world coffee-shopping data and
simulation data show that our personalized dialogue system can choose different
optimal actions for different users, and thus effectively improve the dialogue
quality under the personalized setting.
|
A General Framework for Content-enhanced Network Representation Learning | This paper investigates the problem of network embedding, which aims at
learning low-dimensional vector representation of nodes in networks. Most
existing network embedding methods rely solely on the network structure, i.e.,
the linkage relationships between nodes, but ignore the rich content
information associated with it, which is common in real world networks and
beneficial to describing the characteristics of a node. In this paper, we
propose content-enhanced network embedding (CENE), which is capable of jointly
leveraging the network structure and the content information. Our approach
integrates text modeling and structure modeling in a general framework by
treating the content information as a special kind of node. Experiments on
several real world net- works with application to node classification show that
our models outperform all existing network embedding methods, demonstrating the
merits of content information and joint learning.
|
Distributed Convex Optimization with Many Convex Constraints | We address the problem of solving convex optimization problems with many
convex constraints in a distributed setting. Our approach is based on an
extension of the alternating direction method of multipliers (ADMM) that
recently gained a lot of attention in the Big Data context. Although it has
been invented decades ago, ADMM so far can be applied only to unconstrained
problems and problems with linear equality or inequality constraints. Our
extension can handle arbitrary inequality constraints directly. It combines the
ability of ADMM to solve convex optimization problems in a distributed setting
with the ability of the Augmented Lagrangian method to solve constrained
optimization problems, and as we show, it inherits the convergence guarantees
of ADMM and the Augmented Lagrangian method.
|
Linear Hypothesis Testing in Dense High-Dimensional Linear Models | We propose a methodology for testing linear hypothesis in high-dimensional
linear models. The proposed test does not impose any restriction on the size of
the model, i.e. model sparsity or the loading vector representing the
hypothesis. Providing asymptotically valid methods for testing general linear
functions of the regression parameters in high-dimensions is extremely
challenging -- especially without making restrictive or unverifiable
assumptions on the number of non-zero elements. We propose to test the moment
conditions related to the newly designed restructured regression, where the
inputs are transformed and augmented features. These new features incorporate
the structure of the null hypothesis directly. The test statistics are
constructed in such a way that lack of sparsity in the original model parameter
does not present a problem for the theoretical justification of our procedures.
We establish asymptotically exact control on Type I error without imposing any
sparsity assumptions on model parameter or the vector representing the linear
hypothesis. Our method is also shown to achieve certain optimality in detecting
deviations from the null hypothesis. We demonstrate the favorable finite-sample
performance of the proposed methods, via a number of numerical and a real data
example.
|
Extrapolation and learning equations | In classical machine learning, regression is treated as a black box process
of identifying a suitable function from a hypothesis set without attempting to
gain insight into the mechanism connecting inputs and outputs. In the natural
sciences, however, finding an interpretable function for a phenomenon is the
prime goal as it allows to understand and generalize results. This paper
proposes a novel type of function learning network, called equation learner
(EQL), that can learn analytical expressions and is able to extrapolate to
unseen domains. It is implemented as an end-to-end differentiable feed-forward
network and allows for efficient gradient based training. Due to sparsity
regularization concise interpretable expressions can be obtained. Often the
true underlying source expression is identified.
|
Fully Character-Level Neural Machine Translation without Explicit
Segmentation | Most existing machine translation systems operate at the level of words,
relying on explicit segmentation to extract tokens. We introduce a neural
machine translation (NMT) model that maps a source character sequence to a
target character sequence without any segmentation. We employ a character-level
convolutional network with max-pooling at the encoder to reduce the length of
source representation, allowing the model to be trained at a speed comparable
to subword-level models while capturing local regularities. Our
character-to-character model outperforms a recently proposed baseline with a
subword-level encoder on WMT'15 DE-EN and CS-EN, and gives comparable
performance on FI-EN and RU-EN. We then demonstrate that it is possible to
share a single character-level encoder across multiple languages by training a
model on a many-to-one translation task. In this multilingual setting, the
character-level encoder significantly outperforms the subword-level encoder on
all the language pairs. We observe that on CS-EN, FI-EN and RU-EN, the quality
of the multilingual character-level translation even surpasses the models
specifically trained on that language pair alone, both in terms of BLEU score
and human judgment.
|
Latent Sequence Decompositions | We present the Latent Sequence Decompositions (LSD) framework. LSD decomposes
sequences with variable lengthed output units as a function of both the input
sequence and the output sequence. We present a training algorithm which samples
valid extensions and an approximate decoding algorithm. We experiment with the
Wall Street Journal speech recognition task. Our LSD model achieves 12.9% WER
compared to a character baseline of 14.8% WER. When combined with a
convolutional network on the encoder, we achieve 9.6% WER.
|
Sketching Meets Random Projection in the Dual: A Provable Recovery
Algorithm for Big and High-dimensional Data | Sketching techniques have become popular for scaling up machine learning
algorithms by reducing the sample size or dimensionality of massive data sets,
while still maintaining the statistical power of big data. In this paper, we
study sketching from an optimization point of view: we first show that the
iterative Hessian sketch is an optimization process with preconditioning, and
develop accelerated iterative Hessian sketch via the searching the conjugate
direction; we then establish primal-dual connections between the Hessian sketch
and dual random projection, and apply the preconditioned conjugate gradient
approach on the dual problem, which leads to the accelerated iterative dual
random projection methods. Finally to tackle the challenges from both large
sample size and high-dimensionality, we propose the primal-dual sketch, which
iteratively sketches the primal and dual formulations. We show that using a
logarithmic number of calls to solvers of small scale problem, primal-dual
sketch is able to recover the optimum of the original problem up to arbitrary
precision. The proposed algorithms are validated via extensive experiments on
synthetic and real data sets which complements our theoretical results.
|
Dynamic Metric Learning from Pairwise Comparisons | Recent work in distance metric learning has focused on learning
transformations of data that best align with specified pairwise similarity and
dissimilarity constraints, often supplied by a human observer. The learned
transformations lead to improved retrieval, classification, and clustering
algorithms due to the better adapted distance or similarity measures. Here, we
address the problem of learning these transformations when the underlying
constraint generation process is nonstationary. This nonstationarity can be due
to changes in either the ground-truth clustering used to generate constraints
or changes in the feature subspaces in which the class structure is apparent.
We propose Online Convex Ensemble StrongLy Adaptive Dynamic Learning (OCELAD),
a general adaptive, online approach for learning and tracking optimal metrics
as they change over time that is highly robust to a variety of nonstationary
behaviors in the changing metric. We apply the OCELAD framework to an ensemble
of online learners. Specifically, we create a retro-initialized composite
objective mirror descent (COMID) ensemble (RICE) consisting of a set of
parallel COMID learners with different learning rates, demonstrate RICE-OCELAD
on both real and synthetic data sets and show significant performance
improvements relative to previously proposed batch and online distance metric
learning algorithms.
|
Supervised Term Weighting Metrics for Sentiment Analysis in Short Text | Term weighting metrics assign weights to terms in order to discriminate the
important terms from the less crucial ones. Due to this characteristic, these
metrics have attracted growing attention in text classification and recently in
sentiment analysis. Using the weights given by such metrics could lead to more
accurate document representation which may improve the performance of the
classification. While previous studies have focused on proposing or comparing
different weighting metrics at two-classes document level sentiment analysis,
this study propose to analyse the results given by each metric in order to find
out the characteristics of good and bad weighting metrics. Therefore we present
an empirical study of fifteen global supervised weighting metrics with four
local weighting metrics adopted from information retrieval, we also give an
analysis to understand the behavior of each metric by observing and analysing
how each metric distributes the terms and deduce some characteristics which may
distinguish the good and bad metrics. The evaluation has been done using
Support Vector Machine on three different datasets: Twitter, restaurant and
laptop reviews.
|
Context-Aware Online Learning for Course Recommendation of MOOC Big Data | The Massive Open Online Course (MOOC) has expanded significantly in recent
years. With the widespread of MOOC, the opportunity to study the fascinating
courses for free has attracted numerous people of diverse educational
backgrounds all over the world. In the big data era, a key research topic for
MOOC is how to mine the needed courses in the massive course databases in cloud
for each individual student accurately and rapidly as the number of courses is
increasing fleetly. In this respect, the key challenge is how to realize
personalized course recommendation as well as to reduce the computing and
storage costs for the tremendous course data. In this paper, we propose a big
data-supported, context-aware online learning-based course recommender system
that could handle the dynamic and infinitely massive datasets, which recommends
courses by using personalized context information and historical statistics.
The context-awareness takes the personal preferences into consideration, making
the recommendation suitable for people with different backgrounds. Besides, the
algorithm achieves the sublinear regret performance, which means it can
gradually recommend the mostly preferred and matched courses to students. In
addition, our storage module is expanded to the distributed-connected storage
nodes, where the devised algorithm can handle massive course storage problems
from heterogeneous sources of course datasets. Comparing to existing
algorithms, our proposed algorithms achieve the linear time complexity and
space complexity. Experiment results verify the superiority of our algorithms
when comparing with existing ones in the MOOC big data setting.
|
Navigational Instruction Generation as Inverse Reinforcement Learning
with Neural Machine Translation | Modern robotics applications that involve human-robot interaction require
robots to be able to communicate with humans seamlessly and effectively.
Natural language provides a flexible and efficient medium through which robots
can exchange information with their human partners. Significant advancements
have been made in developing robots capable of interpreting free-form
instructions, but less attention has been devoted to endowing robots with the
ability to generate natural language. We propose a navigational guide model
that enables robots to generate natural language instructions that allow humans
to navigate a priori unknown environments. We first decide which information to
share with the user according to their preferences, using a policy trained from
human demonstrations via inverse reinforcement learning. We then "translate"
this information into a natural language instruction using a neural
sequence-to-sequence model that learns to generate free-form instructions from
natural language corpora. We evaluate our method on a benchmark route
instruction dataset and achieve a BLEU score of 72.18% when compared to
human-generated reference instructions. We additionally conduct navigation
experiments with human participants that demonstrate that our method generates
instructions that people follow as accurately and easily as those produced by
humans.
|
Error Asymmetry in Causal and Anticausal Regression | It is generally difficult to make any statements about the expected
prediction error in an univariate setting without further knowledge about how
the data were generated. Recent work showed that knowledge about the real
underlying causal structure of a data generation process has implications for
various machine learning settings. Assuming an additive noise and an
independence between data generating mechanism and its input, we draw a novel
connection between the intrinsic causal relationship of two variables and the
expected prediction error. We formulate the theorem that the expected error of
the true data generating function as prediction model is generally smaller when
the effect is predicted from its cause and, on the contrary, greater when the
cause is predicted from its effect. The theorem implies an asymmetry in the
error depending on the prediction direction. This is further corroborated with
empirical evaluations in artificial and real-world data sets.
|
Safe, Multi-Agent, Reinforcement Learning for Autonomous Driving | Autonomous driving is a multi-agent setting where the host vehicle must apply
sophisticated negotiation skills with other road users when overtaking, giving
way, merging, taking left and right turns and while pushing ahead in
unstructured urban roadways. Since there are many possible scenarios, manually
tackling all possible cases will likely yield a too simplistic policy.
Moreover, one must balance between unexpected behavior of other
drivers/pedestrians and at the same time not to be too defensive so that normal
traffic flow is maintained.
In this paper we apply deep reinforcement learning to the problem of forming
long term driving strategies. We note that there are two major challenges that
make autonomous driving different from other robotic tasks. First, is the
necessity for ensuring functional safety - something that machine learning has
difficulty with given that performance is optimized at the level of an
expectation over many instances. Second, the Markov Decision Process model
often used in robotics is problematic in our case because of unpredictable
behavior of other agents in this multi-agent scenario. We make three
contributions in our work. First, we show how policy gradient iterations can be
used without Markovian assumptions. Second, we decompose the problem into a
composition of a Policy for Desires (which is to be learned) and trajectory
planning with hard constraints (which is not learned). The goal of Desires is
to enable comfort of driving, while hard constraints guarantees the safety of
driving. Third, we introduce a hierarchical temporal abstraction we call an
"Option Graph" with a gating mechanism that significantly reduces the effective
horizon and thereby reducing the variance of the gradient estimation even
further.
|
A Greedy Approach for Budgeted Maximum Inner Product Search | Maximum Inner Product Search (MIPS) is an important task in many machine
learning applications such as the prediction phase of a low-rank matrix
factorization model for a recommender system. There have been some works on how
to perform MIPS in sub-linear time recently. However, most of them do not have
the flexibility to control the trade-off between search efficient and search
quality. In this paper, we study the MIPS problem with a computational budget.
By carefully studying the problem structure of MIPS, we develop a novel
Greedy-MIPS algorithm, which can handle budgeted MIPS by design. While simple
and intuitive, Greedy-MIPS yields surprisingly superior performance compared to
state-of-the-art approaches. As a specific example, on a candidate set
containing half a million vectors of dimension 200, Greedy-MIPS runs 200x
faster than the naive approach while yielding search results with the top-5
precision greater than 75\%.
|
From phonemes to images: levels of representation in a recurrent neural
model of visually-grounded language learning | We present a model of visually-grounded language learning based on stacked
gated recurrent neural networks which learns to predict visual features given
an image description in the form of a sequence of phonemes. The learning task
resembles that faced by human language learners who need to discover both
structure and meaning from noisy and ambiguous data across modalities. We show
that our model indeed learns to predict features of the visual context given
phonetically transcribed image descriptions, and show that it represents
linguistic information in a hierarchy of levels: lower layers in the stack are
comparatively more sensitive to form, whereas higher layers are more sensitive
to meaning.
|
Maximum entropy models capture melodic styles | We introduce a Maximum Entropy model able to capture the statistics of
melodies in music. The model can be used to generate new melodies that emulate
the style of the musical corpus which was used to train it. Instead of using
the $n-$body interactions of $(n-1)-$order Markov models, traditionally used in
automatic music generation, we use a $k-$nearest neighbour model with pairwise
interactions only. In that way, we keep the number of parameters low and avoid
over-fitting problems typical of Markov models. We show that long-range musical
phrases don't need to be explicitly enforced using high-order Markov
interactions, but can instead emerge from multiple, competing, pairwise
interactions. We validate our Maximum Entropy model by contrasting how much the
generated sequences capture the style of the original corpus without
plagiarizing it. To this end we use a data-compression approach to discriminate
the levels of borrowing and innovation featured by the artificial sequences.
The results show that our modelling scheme outperforms both fixed-order and
variable-order Markov models. This shows that, despite being based only on
pairwise interactions, this Maximum Entropy scheme opens the possibility to
generate musically sensible alterations of the original phrases, providing a
way to generate innovation.
|
Deep Variational Canonical Correlation Analysis | We present deep variational canonical correlation analysis (VCCA), a deep
multi-view learning model that extends the latent variable model interpretation
of linear CCA to nonlinear observation models parameterized by deep neural
networks. We derive variational lower bounds of the data likelihood by
parameterizing the posterior probability of the latent variables from the view
that is available at test time. We also propose a variant of VCCA called
VCCA-private that can, in addition to the "common variables" underlying both
views, extract the "private variables" within each view, and disentangles the
shared and private information for multi-view data without hard supervision.
Experimental results on real-world datasets show that our methods are
competitive across domains.
|
Learning in Implicit Generative Models | Generative adversarial networks (GANs) provide an algorithmic framework for
constructing generative models with several appealing properties: they do not
require a likelihood function to be specified, only a generating procedure;
they provide samples that are sharp and compelling; and they allow us to
harness our knowledge of building highly accurate neural network classifiers.
Here, we develop our understanding of GANs with the aim of forming a rich view
of this growing area of machine learning---to build connections to the diverse
set of statistical thinking on this topic, of which much can be gained by a
mutual exchange of ideas. We frame GANs within the wider landscape of
algorithms for learning in implicit generative models--models that only specify
a stochastic procedure with which to generate data--and relate these ideas to
modelling problems in related fields, such as econometrics and approximate
Bayesian computation. We develop likelihood-free inference methods and
highlight hypothesis testing as a principle for learning in implicit generative
models, using which we are able to derive the objective function used by GANs,
and many other related objectives. The testing viewpoint directs our focus to
the general problem of density ratio estimation. There are four approaches for
density ratio estimation, one of which is a solution using classifiers to
distinguish real from generated data. Other approaches such as divergence
minimisation and moment matching have also been explored in the GAN literature,
and we synthesise these views to form an understanding in terms of the
relationships between them and the wider literature, highlighting avenues for
future exploration and cross-pollination.
|
Transfer from Simulation to Real World through Learning Deep Inverse
Dynamics Model | Developing control policies in simulation is often more practical and safer
than directly running experiments in the real world. This applies to policies
obtained from planning and optimization, and even more so to policies obtained
from reinforcement learning, which is often very data demanding. However, a
policy that succeeds in simulation often doesn't work when deployed on a real
robot. Nevertheless, often the overall gist of what the policy does in
simulation remains valid in the real world. In this paper we investigate such
settings, where the sequence of states traversed in simulation remains
reasonable for the real world, even if the details of the controls are not, as
could be the case when the key differences lie in detailed friction, contact,
mass and geometry properties. During execution, at each time step our approach
computes what the simulation-based control policy would do, but then, rather
than executing these controls on the real robot, our approach computes what the
simulation expects the resulting next state(s) will be, and then relies on a
learned deep inverse dynamics model to decide which real-world action is most
suitable to achieve those next states. Deep models are only as good as their
training data, and we also propose an approach for data collection to
(incrementally) learn the deep inverse dynamics model. Our experiments shows
our approach compares favorably with various baselines that have been developed
for dealing with simulation to real world model discrepancy, including output
error control and Gaussian dynamics adaptation.
|
Minimax Filter: Learning to Preserve Privacy from Inference Attacks | Preserving privacy of continuous and/or high-dimensional data such as images,
videos and audios, can be challenging with syntactic anonymization methods
which are designed for discrete attributes. Differential privacy, which
provides a more formal definition of privacy, has shown more success in
sanitizing continuous data. However, both syntactic and differential privacy
are susceptible to inference attacks, i.e., an adversary can accurately infer
sensitive attributes from sanitized data. The paper proposes a novel
filter-based mechanism which preserves privacy of continuous and
high-dimensional attributes against inference attacks. Finding the optimal
utility-privacy tradeoff is formulated as a min-diff-max optimization problem.
The paper provides an ERM-like analysis of the generalization error and also a
practical algorithm to perform the optimization. In addition, the paper
proposes an extension that combines minimax filter and differentially-private
noisy mechanism. Advantages of the method over purely noisy mechanisms is
explained and demonstrated with examples. Experiments with several real-world
tasks including facial expression classification, speech emotion
classification, and activity classification from motion, show that the minimax
filter can simultaneously achieve similar or better target task accuracy and
lower inference accuracy, often significantly lower than previous methods.
|
On statistical learning via the lens of compression | This work continues the study of the relationship between sample compression
schemes and statistical learning, which has been mostly investigated within the
framework of binary classification. The central theme of this work is
establishing equivalences between learnability and compressibility, and
utilizing these equivalences in the study of statistical learning theory.
We begin with the setting of multiclass categorization (zero/one loss). We
prove that in this case learnability is equivalent to compression of
logarithmic sample size, and that uniform convergence implies compression of
constant size.
We then consider Vapnik's general learning setting: we show that in order to
extend the compressibility-learnability equivalence to this case, it is
necessary to consider an approximate variant of compression.
Finally, we provide some applications of the compressibility-learnability
equivalences:
(i) Agnostic-case learnability and realizable-case learnability are
equivalent in multiclass categorization problems (in terms of sample
complexity).
(ii) This equivalence between agnostic-case learnability and realizable-case
learnability does not hold for general learning problems: There exists a
learning problem whose loss function takes just three values, under which
agnostic-case and realizable-case learnability are not equivalent.
(iii) Uniform convergence implies compression of constant size in multiclass
categorization problems. Part of the argument includes an analysis of the
uniform convergence rate in terms of the graph dimension, in which we improve
upon previous bounds.
(iv) A dichotomy for sample compression in multiclass categorization
problems: If a non-trivial compression exists then a compression of logarithmic
size exists.
(v) A compactness theorem for multiclass categorization problems.
|
Optimizing Memory Efficiency for Deep Convolutional Neural Networks on
GPUs | Leveraging large data sets, deep Convolutional Neural Networks (CNNs) achieve
state-of-the-art recognition accuracy. Due to the substantial compute and
memory operations, however, they require significant execution time. The
massive parallel computing capability of GPUs make them as one of the ideal
platforms to accelerate CNNs and a number of GPU-based CNN libraries have been
developed. While existing works mainly focus on the computational efficiency of
CNNs, the memory efficiency of CNNs have been largely overlooked. Yet CNNs have
intricate data structures and their memory behavior can have significant impact
on the performance. In this work, we study the memory efficiency of various CNN
layers and reveal the performance implication from both data layouts and memory
access patterns. Experiments show the universal effect of our proposed
optimizations on both single layers and various networks, with up to 27.9x for
a single layer and up to 5.6x on the whole networks.
|
RetiNet: Automatic AMD identification in OCT volumetric data | Optical Coherence Tomography (OCT) provides a unique ability to image the eye
retina in 3D at micrometer resolution and gives ophthalmologist the ability to
visualize retinal diseases such as Age-Related Macular Degeneration (AMD).
While visual inspection of OCT volumes remains the main method for AMD
identification, doing so is time consuming as each cross-section within the
volume must be inspected individually by the clinician. In much the same way,
acquiring ground truth information for each cross-section is expensive and time
consuming. This fact heavily limits the ability to acquire large amounts of
ground truth, which subsequently impacts the performance of learning-based
methods geared at automatic pathology identification. To avoid this burden, we
propose a novel strategy for automatic analysis of OCT volumes where only
volume labels are needed. That is, we train a classifier in a semi-supervised
manner to conduct this task. Our approach uses a novel Convolutional Neural
Network (CNN) architecture, that only needs volume-level labels to be trained
to automatically asses whether an OCT volume is healthy or contains AMD. Our
architecture involves first learning a cross-section pathology classifier using
pseudo-labels that could be corrupted and then leverage these towards a more
accurate volume-level classification. We then show that our approach provides
excellent performances on a publicly available dataset and outperforms a number
of existing automatic techniques.
|
Deep Fruit Detection in Orchards | An accurate and reliable image based fruit detection system is critical for
supporting higher level agriculture tasks such as yield mapping and robotic
harvesting. This paper presents the use of a state-of-the-art object detection
framework, Faster R-CNN, in the context of fruit detection in orchards,
including mangoes, almonds and apples. Ablation studies are presented to better
understand the practical deployment of the detection network, including how
much training data is required to capture variability in the dataset. Data
augmentation techniques are shown to yield significant performance gains,
resulting in a greater than two-fold reduction in the number of training images
required. In contrast, transferring knowledge between orchards contributed to
negligible performance gain over initialising the Deep Convolutional Neural
Network directly from ImageNet features. Finally, to operate over orchard data
containing between 100-1000 fruit per image, a tiling approach is introduced
for the Faster R-CNN framework. The study has resulted in the best yet
detection performance for these orchards relative to previous works, with an
F1-score of >0.9 achieved for apples and mangoes.
|
Optimistic Semi-supervised Least Squares Classification | The goal of semi-supervised learning is to improve supervised classifiers by
using additional unlabeled training examples. In this work we study a simple
self-learning approach to semi-supervised learning applied to the least squares
classifier. We show that a soft-label and a hard-label variant of self-learning
can be derived by applying block coordinate descent to two related but slightly
different objective functions. The resulting soft-label approach is related to
an idea about dealing with missing data that dates back to the 1930s. We show
that the soft-label variant typically outperforms the hard-label variant on
benchmark datasets and partially explain this behaviour by studying the
relative difficulty of finding good local minima for the corresponding
objective functions.
|
Exploring the Entire Regularization Path for the Asymmetric Cost Linear
Support Vector Machine | We propose an algorithm for exploring the entire regularization path of
asymmetric-cost linear support vector machines. Empirical evidence suggests the
predictive power of support vector machines depends on the regularization
parameters of the training algorithms. The algorithms exploring the entire
regularization paths have been proposed for single-cost support vector machines
thereby providing the complete knowledge on the behavior of the trained model
over the hyperparameter space. Considering the problem in two-dimensional
hyperparameter space though enables our algorithm to maintain greater
flexibility in dealing with special cases and sheds light on problems
encountered by algorithms building the paths in one-dimensional spaces. We
demonstrate two-dimensional regularization paths for linear support vector
machines that we train on synthetic and real data.
|
Detecting Unseen Falls from Wearable Devices using Channel-wise Ensemble
of Autoencoders | A fall is an abnormal activity that occurs rarely, so it is hard to collect
real data for falls. It is, therefore, difficult to use supervised learning
methods to automatically detect falls. Another challenge in using machine
learning methods to automatically detect falls is the choice of engineered
features. In this paper, we propose to use an ensemble of autoencoders to
extract features from different channels of wearable sensor data trained only
on normal activities. We show that the traditional approach of choosing a
threshold as the maximum of the reconstruction error on the training normal
data is not the right way to identify unseen falls. We propose two methods for
automatic tightening of reconstruction error from only the normal activities
for better identification of unseen falls. We present our results on two
activity recognition datasets and show the efficacy of our proposed method
against traditional autoencoder models and two standard one-class
classification methods.
|
Parallelizing Stochastic Gradient Descent for Least Squares Regression:
mini-batching, averaging, and model misspecification | This work characterizes the benefits of averaging schemes widely used in
conjunction with stochastic gradient descent (SGD). In particular, this work
provides a sharp analysis of: (1) mini-batching, a method of averaging many
samples of a stochastic gradient to both reduce the variance of the stochastic
gradient estimate and for parallelizing SGD and (2) tail-averaging, a method
involving averaging the final few iterates of SGD to decrease the variance in
SGD's final iterate. This work presents non-asymptotic excess risk bounds for
these schemes for the stochastic approximation problem of least squares
regression.
Furthermore, this work establishes a precise problem-dependent extent to
which mini-batch SGD yields provable near-linear parallelization speedups over
SGD with batch size one. This allows for understanding learning rate versus
batch size tradeoffs for the final iterate of an SGD method. These results are
then utilized in providing a highly parallelizable SGD method that obtains the
minimax risk with nearly the same number of serial updates as batch gradient
descent, improving significantly over existing SGD methods. A non-asymptotic
analysis of communication efficient parallelization schemes such as
model-averaging/parameter mixing methods is then provided.
Finally, this work sheds light on some fundamental differences in SGD's
behavior when dealing with agnostic noise in the (non-realizable) least squares
regression problem. In particular, the work shows that the stepsizes that
ensure minimax risk for the agnostic case must be a function of the noise
properties.
This paper builds on the operator view of analyzing SGD methods, introduced
by Defossez and Bach (2015), followed by developing a novel analysis in
bounding these operators to characterize the excess risk. These techniques are
of broader interest in analyzing computational aspects of stochastic
approximation.
|
Introduction to the "Industrial Benchmark" | A novel reinforcement learning benchmark, called Industrial Benchmark, is
introduced. The Industrial Benchmark aims at being be realistic in the sense,
that it includes a variety of aspects that we found to be vital in industrial
applications. It is not designed to be an approximation of any real system, but
to pose the same hardness and complexity.
|
Generalization bound for kernel similarity learning | Similarity learning has received a large amount of interest and is an
important tool for many scientific and industrial applications. In this
framework, we wish to infer the distance (similarity) between points with
respect to an arbitrary distance function $d$. Here, we formulate the problem
as a regression from a feature space $\mathcal{X}$ to an arbitrary vector space
$\mathcal{Y}$, where the Euclidean distance is proportional to $d$. We then
give Rademacher complexity bounds on the generalization error. We find that
with high probability, the complexity is bounded by the maximum of the radius
of $\mathcal{X}$ and the radius of $\mathcal{Y}$.
|
Mapping Between fMRI Responses to Movies and their Natural Language
Annotations | Several research groups have shown how to correlate fMRI responses to the
meanings of presented stimuli. This paper presents new methods for doing so
when only a natural language annotation is available as the description of the
stimulus. We study fMRI data gathered from subjects watching an episode of BBCs
Sherlock [1], and learn bidirectional mappings between fMRI responses and
natural language representations. We show how to leverage data from multiple
subjects watching the same movie to improve the accuracy of the mappings,
allowing us to succeed at a scene classification task with 72% accuracy (random
guessing would give 4%) and at a scene ranking task with average rank in the
top 4% (random guessing would give 50%). The key ingredients are (a) the use of
the Shared Response Model (SRM) and its variant SRM-ICA [2, 3] to aggregate
fMRI data from multiple subjects, both of which are shown to be superior to
standard PCA in producing low-dimensional representations for the tasks in this
paper; (b) a sentence embedding technique adapted from the natural language
processing (NLP) literature [4] that produces semantic vector representation of
the annotations; (c) using previous timestep information in the featurization
of the predictor data.
|
Compressing Neural Language Models by Sparse Word Representations | Neural networks are among the state-of-the-art techniques for language
modeling. Existing neural language models typically map discrete words to
distributed, dense vector representations. After information processing of the
preceding context words by hidden layers, an output layer estimates the
probability of the next word. Such approaches are time- and memory-intensive
because of the large numbers of parameters for word embeddings and the output
layer. In this paper, we propose to compress neural language models by sparse
word representations. In the experiments, the number of parameters in our model
increases very slowly with the growth of the vocabulary size, which is almost
imperceptible. Moreover, our approach not only reduces the parameter space to a
large extent, but also improves the performance in terms of the perplexity
measure.
|
Dictionary Update for NMF-based Voice Conversion Using an
Encoder-Decoder Network | In this paper, we propose a dictionary update method for Nonnegative Matrix
Factorization (NMF) with high dimensional data in a spectral conversion (SC)
task. Voice conversion has been widely studied due to its potential
applications such as personalized speech synthesis and speech enhancement.
Exemplar-based NMF (ENMF) emerges as an effective and probably the simplest
choice among all techniques for SC, as long as a source-target parallel speech
corpus is given. ENMF-based SC systems usually need a large amount of bases
(exemplars) to ensure the quality of the converted speech. However, a small and
effective dictionary is desirable but hard to obtain via dictionary update, in
particular when high-dimensional features such as STRAIGHT spectra are used.
Therefore, we propose a dictionary update framework for NMF by means of an
encoder-decoder reformulation. Regarding NMF as an encoder-decoder network
makes it possible to exploit the whole parallel corpus more effectively and
efficiently when applied to SC. Our experiments demonstrate significant gains
of the proposed system with small dictionaries over conventional ENMF-based
systems with dictionaries of same or much larger size.
|
Semi-Supervised Active Learning for Support Vector Machines: A Novel
Approach that Exploits Structure Information in Data | In our today's information society more and more data emerges, e.g.~in social
networks, technical applications, or business applications. Companies try to
commercialize these data using data mining or machine learning methods. For
this purpose, the data are categorized or classified, but often at high
(monetary or temporal) costs. An effective approach to reduce these costs is to
apply any kind of active learning (AL) methods, as AL controls the training
process of a classifier by specific querying individual data points (samples),
which are then labeled (e.g., provided with class memberships) by a domain
expert. However, an analysis of current AL research shows that AL still has
some shortcomings. In particular, the structure information given by the
spatial pattern of the (un)labeled data in the input space of a classification
model (e.g.,~cluster information), is used in an insufficient way. In addition,
many existing AL techniques pay too little attention to their practical
applicability. To meet these challenges, this article presents several
techniques that together build a new approach for combining AL and
semi-supervised learning (SSL) for support vector machines (SVM) in
classification tasks. Structure information is captured by means of
probabilistic models that are iteratively improved at runtime when label
information becomes available. The probabilistic models are considered in a
selection strategy based on distance, density, diversity, and distribution (4DS
strategy) information for AL and in a kernel function (Responsibility Weighted
Mahalanobis kernel) for SVM. The approach fuses generative and discriminative
modeling techniques. With 20 benchmark data sets and with the MNIST data set it
is shown that our new solution yields significantly better results than
state-of-the-art methods.
|
Bank Card Usage Prediction Exploiting Geolocation Information | We describe the solution of team ISMLL for the ECML-PKDD 2016 Discovery
Challenge on Bank Card Usage for both tasks. Our solution is based on three
pillars. Gradient boosted decision trees as a strong regression and
classification model, an intensive search for good hyperparameter
configurations and strong features that exploit geolocation information. This
approach achieved the best performance on the public leaderboard for the first
task and a decent fourth position for the second task.
|
Voice Conversion from Non-parallel Corpora Using Variational
Auto-encoder | We propose a flexible framework for spectral conversion (SC) that facilitates
training with unaligned corpora. Many SC frameworks require parallel corpora,
phonetic alignments, or explicit frame-wise correspondence for learning
conversion functions or for synthesizing a target spectrum with the aid of
alignments. However, these requirements gravely limit the scope of practical
applications of SC due to scarcity or even unavailability of parallel corpora.
We propose an SC framework based on variational auto-encoder which enables us
to exploit non-parallel corpora. The framework comprises an encoder that learns
speaker-independent phonetic representations and a decoder that learns to
reconstruct the designated speaker. It removes the requirement of parallel
corpora or phonetic alignments to train a spectral conversion system. We report
objective and subjective evaluations to validate our proposed method and
compare it to SC methods that have access to aligned corpora.
|
Predicting the dynamics of 2d objects with a deep residual network | We investigate how a residual network can learn to predict the dynamics of
interacting shapes purely as an image-to-image regression task.
With a simple 2d physics simulator, we generate short sequences composed of
rectangles put in motion by applying a pulling force at a point picked at
random. The network is trained with a quadratic loss to predict the image of
the resulting configuration, given the image of the starting configuration and
an image indicating the point of grasping.
Experiments show that the network learns to predict accurately the resulting
image, which implies in particular that (1) it segments rectangles as distinct
components, (2) it infers which one contains the grasping point, (3) it models
properly the dynamic of a single rectangle, including the torque, (4) it
detects and handles collisions to some extent, and (5) it re-synthesizes
properly the entire scene with displaced rectangles.
|
Generalized Online Transfer Learning for Climate Control in Residential
Buildings | This paper presents an online transfer learning framework for improving
temperature predictions in residential buildings. In transfer learning,
prediction models trained under a set of available data from a target domain
(e.g., house with limited data) can be improved through the use of data
generated from similar source domains (e.g., houses with rich data). Given also
the need for prediction models that can be trained online (e.g., as part of a
model-predictive-control implementation), this paper introduces the generalized
online transfer learning algorithm (GOTL). It employs a weighted combination of
the available predictors (i.e., the target and source predictors) and
guarantees convergence to the best weighted predictor. Furthermore, the use of
Transfer Component Analysis (TCA) allows for using more than a single source
domains, since it may facilitate the fit of a single model on more than one
source domains (houses). This allows GOTL to transfer knowledge from more than
one source domains. We further validate our results through experiments in
climate control for residential buildings and show that GOTL may lead to
non-negligible energy savings for given comfort levels.
|
Unorganized Malicious Attacks Detection | Recommender system has attracted much attention during the past decade. Many
attack detection algorithms have been developed for better recommendations,
mostly focusing on shilling attacks, where an attack organizer produces a large
number of user profiles by the same strategy to promote or demote an item. This
work considers a different attack style: unorganized malicious attacks, where
attackers individually utilize a small number of user profiles to attack
different items without any organizer. This attack style occurs in many real
applications, yet relevant study remains open. We first formulate the
unorganized malicious attacks detection as a matrix completion problem, and
propose the Unorganized Malicious Attacks detection (UMA) approach, a proximal
alternating splitting augmented Lagrangian method. We verify, both
theoretically and empirically, the effectiveness of our proposed approach.
|
An Information Theoretic Feature Selection Framework for Big Data under
Apache Spark | With the advent of extremely high dimensional datasets, dimensionality
reduction techniques are becoming mandatory. Among many techniques, feature
selection has been growing in interest as an important tool to identify
relevant features on huge datasets --both in number of instances and
features--. The purpose of this work is to demonstrate that standard feature
selection methods can be parallelized in Big Data platforms like Apache Spark,
boosting both performance and accuracy. We thus propose a distributed
implementation of a generic feature selection framework which includes a wide
group of well-known Information Theoretic methods. Experimental results on a
wide set of real-world datasets show that our distributed framework is capable
of dealing with ultra-high dimensional datasets as well as those with a huge
number of samples in a short period of time, outperforming the sequential
version in all the cases studied.
|
Why Deep Neural Networks for Function Approximation? | Recently there has been much interest in understanding why deep neural
networks are preferred to shallow networks. We show that, for a large class of
piecewise smooth functions, the number of neurons needed by a shallow network
to approximate a function is exponentially larger than the corresponding number
of neurons needed by a deep network for a given degree of function
approximation. First, we consider univariate functions on a bounded interval
and require a neural network to achieve an approximation error of $\varepsilon$
uniformly over the interval. We show that shallow networks (i.e., networks
whose depth does not depend on $\varepsilon$) require
$\Omega(\text{poly}(1/\varepsilon))$ neurons while deep networks (i.e.,
networks whose depth grows with $1/\varepsilon$) require
$\mathcal{O}(\text{polylog}(1/\varepsilon))$ neurons. We then extend these
results to certain classes of important multivariate functions. Our results are
derived for neural networks which use a combination of rectifier linear units
(ReLUs) and binary step units, two of the most popular type of activation
functions. Our analysis builds on a simple observation: the multiplication of
two bits can be represented by a ReLU.
|
Tensorial Mixture Models | Casting neural networks in generative frameworks is a highly sought-after
endeavor these days. Contemporary methods, such as Generative Adversarial
Networks, capture some of the generative capabilities, but not all. In
particular, they lack the ability of tractable marginalization, and thus are
not suitable for many tasks. Other methods, based on arithmetic circuits and
sum-product networks, do allow tractable marginalization, but their performance
is challenged by the need to learn the structure of a circuit. Building on the
tractability of arithmetic circuits, we leverage concepts from tensor analysis,
and derive a family of generative models we call Tensorial Mixture Models
(TMMs). TMMs assume a simple convolutional network structure, and in addition,
lend themselves to theoretical analyses that allow comprehensive understanding
of the relation between their structure and their expressive properties. We
thus obtain a generative model that is tractable on one hand, and on the other
hand, allows effective representation of rich distributions in an easily
controlled manner. These two capabilities are brought together in the task of
classification under missing data, where TMMs deliver state of the art
accuracies with seamless implementation and design.
|
Phase Retrieval Meets Statistical Learning Theory: A Flexible Convex
Relaxation | We propose a flexible convex relaxation for the phase retrieval problem that
operates in the natural domain of the signal. Therefore, we avoid the
prohibitive computational cost associated with "lifting" and semidefinite
programming (SDP) in methods such as PhaseLift and compete with recently
developed non-convex techniques for phase retrieval. We relax the quadratic
equations for phaseless measurements to inequality constraints each of which
representing a symmetric "slab". Through a simple convex program, our proposed
estimator finds an extreme point of the intersection of these slabs that is
best aligned with a given anchor vector. We characterize geometric conditions
that certify success of the proposed estimator. Furthermore, using classic
results in statistical learning theory, we show that for random measurements
the geometric certificates hold with high probability at an optimal sample
complexity. Phase transition of our estimator is evaluated through simulations.
Our numerical experiments also suggest that the proposed method can solve phase
retrieval problems with coded diffraction measurements as well.
|
Sim-to-Real Robot Learning from Pixels with Progressive Nets | Applying end-to-end learning to solve complex, interactive, pixel-driven
control tasks on a robot is an unsolved problem. Deep Reinforcement Learning
algorithms are too slow to achieve performance on a real robot, but their
potential has been demonstrated in simulated environments. We propose using
progressive networks to bridge the reality gap and transfer learned policies
from simulation to the real world. The progressive net approach is a general
framework that enables reuse of everything from low-level visual features to
high-level policies for transfer to new tasks, enabling a compositional, yet
simple, approach to building complex skills. We present an early demonstration
of this approach with a number of experiments in the domain of robot
manipulation that focus on bridging the reality gap. Unlike other proposed
approaches, our real-world experiments demonstrate successful task learning
from raw visual input on a fully actuated robot manipulator. Moreover, rather
than relying on model-based trajectory optimisation, the task learning is
accomplished using only deep reinforcement learning and sparse rewards.
|
Approximate Counting, the Lovasz Local Lemma and Inference in Graphical
Models | In this paper we introduce a new approach for approximately counting in
bounded degree systems with higher-order constraints. Our main result is an
algorithm to approximately count the number of solutions to a CNF formula
$\Phi$ when the width is logarithmic in the maximum degree. This closes an
exponential gap between the known upper and lower bounds.
Moreover our algorithm extends straightforwardly to approximate sampling,
which shows that under Lov\'asz Local Lemma-like conditions it is not only
possible to find a satisfying assignment, it is also possible to generate one
approximately uniformly at random from the set of all satisfying assignments.
Our approach is a significant departure from earlier techniques in approximate
counting, and is based on a framework to bootstrap an oracle for computing
marginal probabilities on individual variables. Finally, we give an application
of our results to show that it is algorithmically possible to sample from the
posterior distribution in an interesting class of graphical models.
|
MML is not consistent for Neyman-Scott | Strict Minimum Message Length (SMML) is an information-theoretic statistical
inference method widely cited (but only with informal arguments) as providing
estimations that are consistent for general estimation problems. It is,
however, almost invariably intractable to compute, for which reason only
approximations of it (known as MML algorithms) are ever used in practice. Using
novel techniques that allow for the first time direct, non-approximated
analysis of SMML solutions, we investigate the Neyman-Scott estimation problem,
an oft-cited showcase for the consistency of MML, and show that even with a
natural choice of prior neither SMML nor its popular approximations are
consistent for it, thereby providing a counterexample to the general claim.
This is the first known explicit construction of an SMML solution for a
natural, high-dimensional problem.
|
Spectral Inference Methods on Sparse Graphs: Theory and Applications | In an era of unprecedented deluge of (mostly unstructured) data, graphs are
proving more and more useful, across the sciences, as a flexible abstraction to
capture complex relationships between complex objects. One of the main
challenges arising in the study of such networks is the inference of
macroscopic, large-scale properties affecting a large number of objects, based
solely on the microscopic interactions between their elementary constituents.
Statistical physics, precisely created to recover the macroscopic laws of
thermodynamics from an idealized model of interacting particles, provides
significant insight to tackle such complex networks.
In this dissertation, we use methods derived from the statistical physics of
disordered systems to design and study new algorithms for inference on graphs.
Our focus is on spectral methods, based on certain eigenvectors of carefully
chosen matrices, and sparse graphs, containing only a small amount of
information. We develop an original theory of spectral inference based on a
relaxation of various mean-field free energy optimizations. Our approach is
therefore fully probabilistic, and contrasts with more traditional motivations
based on the optimization of a cost function. We illustrate the efficiency of
our approach on various problems, including community detection, randomized
similarity-based clustering, and matrix completion.
|
Semi-supervised Graph Embedding Approach to Dynamic Link Prediction | We propose a simple discrete time semi-supervised graph embedding approach to
link prediction in dynamic networks. The learned embedding reflects information
from both the temporal and cross-sectional network structures, which is
performed by defining the loss function as a weighted sum of the supervised
loss from past dynamics and the unsupervised loss of predicting the
neighborhood context in the current network. Our model is also capable of
learning different embeddings for both formation and dissolution dynamics.
These key aspects contributes to the predictive performance of our model and we
provide experiments with three real--world dynamic networks showing that our
method is comparable to state of the art methods in link formation prediction
and outperforms state of the art baseline methods in link dissolution
prediction.
|
Theoretical Analysis of Domain Adaptation with Optimal Transport | Domain adaptation (DA) is an important and emerging field of machine learning
that tackles the problem occurring when the distributions of training (source
domain) and test (target domain) data are similar but different. Current
theoretical results show that the efficiency of DA algorithms depends on their
capacity of minimizing the divergence between source and target probability
distributions. In this paper, we provide a theoretical study on the advantages
that concepts borrowed from optimal transportation theory can bring to DA. In
particular, we show that the Wasserstein metric can be used as a divergence
measure between distributions to obtain generalization guarantees for three
different learning settings: (i) classic DA with unsupervised target data (ii)
DA combining source and target labeled data, (iii) multiple source DA. Based on
the obtained results, we provide some insights showing when this analysis can
be tighter than other existing frameworks.
|
Amortised MAP Inference for Image Super-resolution | Image super-resolution (SR) is an underdetermined inverse problem, where a
large number of plausible high-resolution images can explain the same
downsampled image. Most current single image SR methods use empirical risk
minimisation, often with a pixel-wise mean squared error (MSE) loss. However,
the outputs from such methods tend to be blurry, over-smoothed and generally
appear implausible. A more desirable approach would employ Maximum a Posteriori
(MAP) inference, preferring solutions that always have a high probability under
the image prior, and thus appear more plausible. Direct MAP estimation for SR
is non-trivial, as it requires us to build a model for the image prior from
samples. Furthermore, MAP inference is often performed via optimisation-based
iterative algorithms which don't compare well with the efficiency of
neural-network-based alternatives. Here we introduce new methods for amortised
MAP inference whereby we calculate the MAP estimate directly using a
convolutional neural network. We first introduce a novel neural network
architecture that performs a projection to the affine subspace of valid SR
solutions ensuring that the high resolution output of the network is always
consistent with the low resolution input. We show that, using this
architecture, the amortised MAP inference problem reduces to minimising the
cross-entropy between two distributions, similar to training generative models.
We propose three methods to solve this optimisation problem: (1) Generative
Adversarial Networks (GAN) (2) denoiser-guided SR which backpropagates
gradient-estimates from denoising to train the network, and (3) a baseline
method using a maximum-likelihood-trained image prior. Our experiments show
that the GAN based approach performs best on real image data. Lastly, we
establish a connection between GANs and amortised variational inference as in
e.g. variational autoencoders.
|
The End of Optimism? An Asymptotic Analysis of Finite-Armed Linear
Bandits | Stochastic linear bandits are a natural and simple generalisation of
finite-armed bandits with numerous practical applications. Current approaches
focus on generalising existing techniques for finite-armed bandits, notably the
optimism principle and Thompson sampling. While prior work has mostly been in
the worst-case setting, we analyse the asymptotic instance-dependent regret and
show matching upper and lower bounds on what is achievable. Surprisingly, our
results show that no algorithm based on optimism or Thompson sampling will ever
achieve the optimal rate, and indeed, can be arbitrarily far from optimal, even
in very simple cases. This is a disturbing result because these techniques are
standard tools that are widely used for sequential optimisation. For example,
for generalised linear bandits and reinforcement learning.
|
Generalization Error of Invariant Classifiers | This paper studies the generalization error of invariant classifiers. In
particular, we consider the common scenario where the classification task is
invariant to certain transformations of the input, and that the classifier is
constructed (or learned) to be invariant to these transformations. Our approach
relies on factoring the input space into a product of a base space and a set of
transformations. We show that whereas the generalization error of a
non-invariant classifier is proportional to the complexity of the input space,
the generalization error of an invariant classifier is proportional to the
complexity of the base space. We also derive a set of sufficient conditions on
the geometry of the base space and the set of transformations that ensure that
the complexity of the base space is much smaller than the complexity of the
input space. Our analysis applies to general classifiers such as convolutional
neural networks. We demonstrate the implications of the developed theory for
such classifiers with experiments on the MNIST and CIFAR-10 datasets.
|
Kernel Alignment Inspired Linear Discriminant Analysis | Kernel alignment measures the degree of similarity between two kernels. In
this paper, inspired from kernel alignment, we propose a new Linear
Discriminant Analysis (LDA) formulation, kernel alignment LDA (kaLDA). We first
define two kernels, data kernel and class indicator kernel. The problem is to
find a subspace to maximize the alignment between subspace-transformed data
kernel and class indicator kernel. Surprisingly, the kernel alignment induced
kaLDA objective function is very similar to classical LDA and can be expressed
using between-class and total scatter matrices. This can be extended to
multi-label data. We use a Stiefel-manifold gradient descent algorithm to solve
this problem. We perform experiments on 8 single-label and 6 multi-label data
sets. Results show that kaLDA has very good performance on many single-label
and multi-label problems.
|
Improved Strongly Adaptive Online Learning using Coin Betting | This paper describes a new parameter-free online learning algorithm for
changing environments. In comparing against algorithms with the same time
complexity as ours, we obtain a strongly adaptive regret bound that is a factor
of at least $\sqrt{\log(T)}$ better, where $T$ is the time horizon. Empirical
results show that our algorithm outperforms state-of-the-art methods in
learning with expert advice and metric learning scenarios.
|
Data-Driven Threshold Machine: Scan Statistics, Change-Point Detection,
and Extreme Bandits | We present a novel distribution-free approach, the data-driven threshold
machine (DTM), for a fundamental problem at the core of many learning tasks:
choose a threshold for a given pre-specified level that bounds the tail
probability of the maximum of a (possibly dependent but stationary) random
sequence. We do not assume data distribution, but rather relying on the
asymptotic distribution of extremal values, and reduce the problem to estimate
three parameters of the extreme value distributions and the extremal index. We
specially take care of data dependence via estimating extremal index since in
many settings, such as scan statistics, change-point detection, and extreme
bandits, where dependence in the sequence of statistics can be significant. Key
features of our DTM also include robustness and the computational efficiency,
and it only requires one sample path to form a reliable estimate of the
threshold, in contrast to the Monte Carlo sampling approach which requires
drawing a large number of sample paths. We demonstrate the good performance of
DTM via numerical examples in various dependent settings.
|
Simultaneous Learning of Trees and Representations for Extreme
Classification and Density Estimation | We consider multi-class classification where the predictor has a hierarchical
structure that allows for a very large number of labels both at train and test
time. The predictive power of such models can heavily depend on the structure
of the tree, and although past work showed how to learn the tree structure, it
expected that the feature vectors remained static. We provide a novel algorithm
to simultaneously perform representation learning for the input data and
learning of the hierarchi- cal predictor. Our approach optimizes an objec- tive
function which favors balanced and easily- separable multi-way node partitions.
We theoret- ically analyze this objective, showing that it gives rise to a
boosting style property and a bound on classification error. We next show how
to extend the algorithm to conditional density estimation. We empirically
validate both variants of the al- gorithm on text classification and language
mod- eling, respectively, and show that they compare favorably to common
baselines in terms of accu- racy and running time.
|
A Closed Form Solution to Multi-View Low-Rank Regression | Real life data often includes information from different channels. For
example, in computer vision, we can describe an image using different image
features, such as pixel intensity, color, HOG, GIST feature, SIFT features,
etc.. These different aspects of the same objects are often called multi-view
(or multi-modal) data. Low-rank regression model has been proved to be an
effective learning mechanism by exploring the low-rank structure of real life
data. But previous low-rank regression model only works on single view data. In
this paper, we propose a multi-view low-rank regression model by imposing
low-rank constraints on multi-view regression model. Most importantly, we
provide a closed-form solution to the multi-view low-rank regression model.
Extensive experiments on 4 multi-view datasets show that the multi-view
low-rank regression model outperforms single-view regression model and reveals
that multi-view low-rank structure is very helpful.
|
Generalization of metric classification algorithms for sequences
classification and labelling | The article deals with the issue of modification of metric classification
algorithms. In particular, it studies the algorithm k-Nearest Neighbours for
its application to sequential data. A method of generalization of metric
classification algorithms is proposed. As a part of it, there has been
developed an algorithm for solving the problem of classification and labelling
of sequential data. The advantages of the developed algorithm of classification
in comparison with the existing one are also discussed in the article. There is
a comparison of the effectiveness of the proposed algorithm with the algorithm
of CRF in the task of chunking in the open data set CoNLL2000.
|
An Adaptive Test of Independence with Analytic Kernel Embeddings | A new computationally efficient dependence measure, and an adaptive
statistical test of independence, are proposed. The dependence measure is the
difference between analytic embeddings of the joint distribution and the
product of the marginals, evaluated at a finite set of locations (features).
These features are chosen so as to maximize a lower bound on the test power,
resulting in a test that is data-efficient, and that runs in linear time (with
respect to the sample size n). The optimized features can be interpreted as
evidence to reject the null hypothesis, indicating regions in the joint domain
where the joint distribution and the product of the marginals differ most.
Consistency of the independence test is established, for an appropriate choice
of features. In real-world benchmarks, independence tests using the optimized
features perform comparably to the state-of-the-art quadratic-time HSIC test,
and outperform competing O(n) and O(n log n) tests.
|
Similarity Learning for Time Series Classification | Multivariate time series naturally exist in many fields, like energy,
bioinformatics, signal processing, and finance. Most of these applications need
to be able to compare these structured data. In this context, dynamic time
warping (DTW) is probably the most common comparison measure. However, not much
research effort has been put into improving it by learning. In this paper, we
propose a novel method for learning similarities based on DTW, in order to
improve time series classification. Making use of the uniform stability
framework, we provide the first theoretical guarantees in the form of a
generalization bound for linear classification. The experimental study shows
that the proposed approach is efficient, while yielding sparse classifiers.
|
Towards K-means-friendly Spaces: Simultaneous Deep Learning and
Clustering | Most learning approaches treat dimensionality reduction (DR) and clustering
separately (i.e., sequentially), but recent research has shown that optimizing
the two tasks jointly can substantially improve the performance of both. The
premise behind the latter genre is that the data samples are obtained via
linear transformation of latent representations that are easy to cluster; but
in practice, the transformation from the latent space to the data can be more
complicated. In this work, we assume that this transformation is an unknown and
possibly nonlinear function. To recover the `clustering-friendly' latent
representations and to better cluster the data, we propose a joint DR and
K-means clustering approach in which DR is accomplished via learning a deep
neural network (DNN). The motivation is to keep the advantages of jointly
optimizing the two tasks, while exploiting the deep neural network's ability to
approximate any nonlinear function. This way, the proposed approach can work
well for a broad class of generative models. Towards this end, we carefully
design the DNN structure and the associated joint optimization criterion, and
propose an effective and scalable algorithm to handle the formulated
optimization problem. Experiments using different real datasets are employed to
showcase the effectiveness of the proposed approach.
|
Sample Efficient Optimization for Learning Controllers for Bipedal
Locomotion | Learning policies for bipedal locomotion can be difficult, as experiments are
expensive and simulation does not usually transfer well to hardware. To counter
this, we need al- gorithms that are sample efficient and inherently safe.
Bayesian Optimization is a powerful sample-efficient tool for optimizing
non-convex black-box functions. However, its performance can degrade in higher
dimensions. We develop a distance metric for bipedal locomotion that enhances
the sample-efficiency of Bayesian Optimization and use it to train a 16
dimensional neuromuscular model for planar walking. This distance metric
reflects some basic gait features of healthy walking and helps us quickly
eliminate a majority of unstable controllers. With our approach we can learn
policies for walking in less than 100 trials for a range of challenging
settings. In simulation, we show results on two different costs and on various
terrains including rough ground and ramps, sloping upwards and downwards. We
also perturb our models with unknown inertial disturbances analogous with
differences between simulation and hardware. These results are promising, as
they indicate that this method can potentially be used to learn control
policies on hardware.
|
Dynamic Stacked Generalization for Node Classification on Networks | We propose a novel stacked generalization (stacking) method as a dynamic
ensemble technique using a pool of heterogeneous classifiers for node label
classification on networks. The proposed method assigns component models a set
of functional coefficients, which can vary smoothly with certain topological
features of a node. Compared to the traditional stacking model, the proposed
method can dynamically adjust the weights of individual models as we move
across the graph and provide a more versatile and significantly more accurate
stacking model for label prediction on a network. We demonstrate the benefits
of the proposed model using both a simulation study and real data analysis.
|
Convergence rate of stochastic k-means | We analyze online and mini-batch k-means variants. Both scale up the widely
used Lloyd 's algorithm via stochastic approximation, and have become popular
for large-scale clustering and unsupervised feature learning. We show, for the
first time, that they have global convergence towards local optima at
$O(\frac{1}{t})$ rate under general conditions. In addition, we show if the
dataset is clusterable, with suitable initialization, mini-batch k-means
converges to an optimal k-means solution with $O(\frac{1}{t})$ convergence rate
with high probability. The k-means objective is non-convex and
non-differentiable: we exploit ideas from non-convex gradient-based
optimization by providing a novel characterization of the trajectory of k-means
algorithm on its solution space, and circumvent its non-differentiability via
geometric insights about k-means update.
|
Probabilistic Dimensionality Reduction via Structure Learning | We propose a novel probabilistic dimensionality reduction framework that can
naturally integrate the generative model and the locality information of data.
Based on this framework, we present a new model, which is able to learn a
smooth skeleton of embedding points in a low-dimensional space from
high-dimensional noisy data. The formulation of the new model can be
equivalently interpreted as two coupled learning problem, i.e., structure
learning and the learning of projection matrix. This interpretation motivates
the learning of the embedding points that can directly form an explicit graph
structure. We develop a new method to learn the embedding points that form a
spanning tree, which is further extended to obtain a discriminative and compact
feature representation for clustering problems. Unlike traditional clustering
methods, we assume that centers of clusters should be close to each other if
they are connected in a learned graph, and other cluster centers should be
distant. This can greatly facilitate data visualization and scientific
discovery in downstream analysis. Extensive experiments are performed that
demonstrate that the proposed framework is able to obtain discriminative
feature representations, and correctly recover the intrinsic structures of
various real-world datasets.
|
Wind ramp event prediction with parallelized Gradient Boosted Regression
Trees | Accurate prediction of wind ramp events is critical for ensuring the
reliability and stability of the power systems with high penetration of wind
energy. This paper proposes a classification based approach for estimating the
future class of wind ramp event based on certain thresholds. A parallelized
gradient boosted regression tree based technique has been proposed to
accurately classify the normal as well as rare extreme wind power ramp events.
The model has been validated using wind power data obtained from the National
Renewable Energy Laboratory database. Performance comparison with several
benchmark techniques indicates the superiority of the proposed technique in
terms of superior classification accuracy.
|
Encoding the Local Connectivity Patterns of fMRI for Cognitive State
Classification | In this work, we propose a novel framework to encode the local connectivity
patterns of brain, using Fisher Vectors (FV), Vector of Locally Aggregated
Descriptors (VLAD) and Bag-of-Words (BoW) methods. We first obtain local
descriptors, called Mesh Arc Descriptors (MADs) from fMRI data, by forming
local meshes around anatomical regions, and estimating their relationship
within a neighborhood. Then, we extract a dictionary of relationships, called
\textit{brain connectivity dictionary} by fitting a generative Gaussian mixture
model (GMM) to a set of MADs, and selecting the codewords at the mean of each
component of the mixture. Codewords represent the connectivity patterns among
anatomical regions. We also encode MADs by VLAD and BoW methods using the
k-Means clustering.
We classify the cognitive states of Human Connectome Project (HCP) task fMRI
dataset, where we train support vector machines (SVM) by the encoded MADs.
Results demonstrate that, FV encoding of MADs can be successfully employed for
classification of cognitive tasks, and outperform the VLAD and BoW
representations. Moreover, we identify the significant Gaussians in mixture
models by computing energy of their corresponding FV parts, and analyze their
effect on classification accuracy. Finally, we suggest a new method to
visualize the codewords of brain connectivity dictionary.
|
Efficient Metric Learning for the Analysis of Motion Data | We investigate metric learning in the context of dynamic time warping (DTW),
the by far most popular dissimilarity measure used for the comparison and
analysis of motion capture data. While metric learning enables a
problem-adapted representation of data, the majority of methods has been
proposed for vectorial data only. In this contribution, we extend the popular
principle offered by the large margin nearest neighbors learner (LMNN) to DTW
by treating the resulting component-wise dissimilarity values as features. We
demonstrate that this principle greatly enhances the classification accuracy in
several benchmarks. Further, we show that recent auxiliary concepts such as
metric regularization can be transferred from the vectorial case to
component-wise DTW in a similar way. We illustrate that metric regularization
constitutes a crucial prerequisite for the interpretation of the resulting
relevance profiles.
|
Lazifying Conditional Gradient Algorithms | Conditional gradient algorithms (also often called Frank-Wolfe algorithms)
are popular due to their simplicity of only requiring a linear optimization
oracle and more recently they also gained significant traction for online
learning. While simple in principle, in many cases the actual implementation of
the linear optimization oracle is costly. We show a general method to lazify
various conditional gradient algorithms, which in actual computations leads to
several orders of magnitude of speedup in wall-clock time. This is achieved by
using a faster separation oracle instead of a linear optimization oracle,
relying only on few linear optimization oracle calls.
|
Risk-Aware Algorithms for Adversarial Contextual Bandits | In this work we consider adversarial contextual bandits with risk
constraints. At each round, nature prepares a context, a cost for each arm, and
additionally a risk for each arm. The learner leverages the context to pull an
arm and then receives the corresponding cost and risk associated with the
pulled arm. In addition to minimizing the cumulative cost, the learner also
needs to satisfy long-term risk constraints -- the average of the cumulative
risk from all pulled arms should not be larger than a pre-defined threshold. To
address this problem, we first study the full information setting where in each
round the learner receives an adversarial convex loss and a convex constraint.
We develop a meta algorithm leveraging online mirror descent for the full
information setting and extend it to contextual bandit with risk constraints
setting using expert advice. Our algorithms can achieve near-optimal regret in
terms of minimizing the total cost, while successfully maintaining a sublinear
growth of cumulative risk constraint violation.
|
The Peaking Phenomenon in Semi-supervised Learning | For the supervised least squares classifier, when the number of training
objects is smaller than the dimensionality of the data, adding more data to the
training set may first increase the error rate before decreasing it. This,
possibly counterintuitive, phenomenon is known as peaking. In this work, we
observe that a similar but more pronounced version of this phenomenon also
occurs in the semi-supervised setting, where instead of labeled objects,
unlabeled objects are added to the training set. We explain why the learning
curve has a more steep incline and a more gradual decline in this setting
through simulation studies and by applying an approximation of the learning
curve based on the work by Raudys & Duin.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.