title
stringlengths 7
246
| abstract
stringlengths 6
3.31k
|
---|---|
Decentralized Collaborative Learning of Personalized Models over
Networks | We consider a set of learning agents in a collaborative peer-to-peer network,
where each agent learns a personalized model according to its own learning
objective. The question addressed in this paper is: how can agents improve upon
their locally trained model by communicating with other agents that have
similar objectives? We introduce and analyze two asynchronous gossip algorithms
running in a fully decentralized manner. Our first approach, inspired from
label propagation, aims to smooth pre-trained local models over the network
while accounting for the confidence that each agent has in its initial model.
In our second approach, agents jointly learn and propagate their model by
making iterative updates based on both their local dataset and the behavior of
their neighbors. To optimize this challenging objective, our decentralized
algorithm is based on ADMM.
|
BET on Independence | We study the problem of nonparametric dependence detection. Many existing
methods may suffer severe power loss due to non-uniform consistency, which we
illustrate with a paradox. To avoid such power loss, we approach the
nonparametric test of independence through the new framework of binary
expansion statistics (BEStat) and binary expansion testing (BET), which examine
dependence through a novel binary expansion filtration approximation of the
copula. Through a Hadamard transform, we find that the symmetry statistics in
the filtration are complete sufficient statistics for dependence. These
statistics are also uncorrelated under the null. By utilizing symmetry
statistics, the BET avoids the problem of non-uniform consistency and improves
upon a wide class of commonly used methods (a) by achieving the minimax rate in
sample size requirement for reliable power and (b) by providing clear
interpretations of global relationships upon rejection of independence. The
binary expansion approach also connects the symmetry statistics with the
current computing system to facilitate efficient bitwise implementation. We
illustrate the BET with a study of the distribution of stars in the night sky
and with an exploratory data analysis of the TCGA breast cancer data.
|
A probabilistic model for the numerical solution of initial value
problems | Like many numerical methods, solvers for initial value problems (IVPs) on
ordinary differential equations estimate an analytically intractable quantity,
using the results of tractable computations as inputs. This structure is
closely connected to the notion of inference on latent variables in statistics.
We describe a class of algorithms that formulate the solution to an IVP as
inference on a latent path that is a draw from a Gaussian process probability
measure (or equivalently, the solution of a linear stochastic differential
equation). We then show that certain members of this class are connected
precisely to generalized linear methods for ODEs, a number of Runge--Kutta
methods, and Nordsieck methods. This probabilistic formulation of classic
methods is valuable in two ways: analytically, it highlights implicit prior
assumptions favoring certain approximate solutions to the IVP over others, and
gives a precise meaning to the old observation that these methods act like
filters. Practically, it endows the classic solvers with `docking points' for
notions of uncertainty and prior information about the initial value, the value
of the ODE itself, and the solution of the problem.
|
Sequential Learning without Feedback | In many security and healthcare systems a sequence of features/sensors/tests
are used for detection and diagnosis. Each test outputs a prediction of the
latent state, and carries with it inherent costs. Our objective is to {\it
learn} strategies for selecting tests to optimize accuracy \& costs.
Unfortunately it is often impossible to acquire in-situ ground truth
annotations and we are left with the problem of unsupervised sensor selection
(USS). We pose USS as a version of stochastic partial monitoring problem with
an {\it unusual} reward structure (even noisy annotations are unavailable).
Unsurprisingly no learner can achieve sublinear regret without further
assumptions. To this end we propose the notion of weak-dominance. This is a
condition on the joint probability distribution of test outputs and latent
state and says that whenever a test is accurate on an example, a later test in
the sequence is likely to be accurate as well. We empirically verify that weak
dominance holds on real datasets and prove that it is a maximal condition for
achieving sublinear regret. We reduce USS to a special case of multi-armed
bandit problem with side information and develop polynomial time algorithms
that achieve sublinear regret.
|
A Joint Indoor WLAN Localization and Outlier Detection Scheme Using
LASSO and Elastic-Net Optimization Techniques | In this paper, we introduce two indoor Wireless Local Area Network (WLAN)
positioning methods using augmented sparse recovery algorithms. These schemes
render a sparse user's position vector, and in parallel, minimize the distance
between the online measurement and radio map. The overall localization scheme
for both methods consists of three steps: 1) coarse localization, obtained from
comparing the online measurements with clustered radio map. A novel graph-based
method is proposed to cluster the offline fingerprints. In the online phase, a
Region Of Interest (ROI) is selected within which we search for the user's
location; 2) Access Point (AP) selection; and 3) fine localization through the
novel sparse recovery algorithms. Since the online measurements are subject to
inordinate measurement readings, called outliers, the sparse recovery methods
are modified in order to jointly estimate the outliers and user's position
vector. The outlier detection procedure identifies the APs whose readings are
either not available or erroneous. The proposed localization methods have been
tested with Received Signal Strength (RSS) measurements in a typical office
environment and the results show that they can localize the user with
significantly high accuracy and resolution which is superior to the results
from competing WLAN fingerprinting localization methods.
|
Structured Group Sparsity: A Novel Indoor WLAN Localization, Outlier
Detection, and Radio Map Interpolation Scheme | This paper introduces novel schemes for indoor localization, outlier
detection, and radio map interpolation using Wireless Local Area Networks
(WLANs). The localization method consists of a novel multicomponent
optimization technique that minimizes the squared $\ell_{2}$-norm of the
residuals between the radio map and the online Received Signal Strength (RSS)
measurements, the $\ell_{1}$-norm of the user's location vector, and weighted
$\ell_{2}$-norms of layered groups of Reference Points (RPs). RPs are grouped
using a new criterion based on the similarity between the so-called Access
Point (AP) coverage vectors. In addition, since AP readings are prone to
containing inordinate readings, called outliers, an augmented optimization
problem is proposed to detect the outliers and localize the user with cleaned
online measurements. Moreover, a novel scheme to record fingerprints from a
smaller number of RPs and estimate the radio map at RPs without recorded
fingerprints is developed using sparse recovery techniques. All localization
schemes are tested on RSS fingerprints collected from a real environment. The
overall scheme has comparable complexity with competing approaches, while it
performs with high accuracy under a small number of APs and finer granularity
of RPs.
|
Modern WLAN Fingerprinting Indoor Positioning Methods and Deployment
Challenges | Wireless Local Area Network (WLAN) has become a promising choice for indoor
positioning as the only existing and established infrastructure, to localize
the mobile and stationary users indoors. However, since WLAN has been initially
designed for wireless networking and not positioning, the localization task
based on WLAN signals has several challenges. Amongst the WLAN positioning
methods, WLAN fingerprinting localization has recently achieved great attention
due to its promising results. WLAN fingerprinting faces several challenges and
hence, in this paper, our goal is to overview these challenges and the
state-of-the-art solutions. This paper consists of three main parts: 1)
Conventional localization schemes; 2) State-of-the-art approaches; 3) Practical
deployment challenges. Since all the proposed methods in WLAN literature have
been conducted and tested in different settings, the reported results are not
equally comparable. So, we compare some of the main localization schemes in a
single real environment and assess their localization accuracy, positioning
error statistics, and complexity. Our results depict illustrative evaluation of
WLAN localization systems and guide to future improvement opportunities.
|
Provably Good Early Detection of Diseases using Non-Sparse
Covariance-Regularized Linear Discriminant Analysis | To improve the performance of Linear Discriminant Analysis (LDA) for early
detection of diseases using Electronic Health Records (EHR) data, we propose
\TheName{} -- a novel framework for \emph{\underline{E}HR based
\underline{E}arly \underline{D}etection of \underline{D}iseases} on top of
\emph{Covariance-Regularized} LDA models. Specifically, \TheName\ employs a
\emph{non-sparse} inverse covariance matrix (or namely precision matrix)
estimator derived from graphical lasso and incorporates the estimator into LDA
classifiers to improve classification accuracy. Theoretical analysis on
\TheName\ shows that it can bound the expected error rate of LDA
classification, under certain assumptions. Finally, we conducted extensive
experiments using a large-scale real-world EHR dataset -- CHSN. We compared our
solution with other regularized LDA and downstream classifiers. The result
shows \TheName\ outperforms all baselines and backups our theoretical analysis.
|
An Interactive Machine Learning Framework | Machine learning (ML) is believed to be an effective and efficient tool to
build reliable prediction model or extract useful structure from an avalanche
of data. However, ML is also criticized by its difficulty in interpretation and
complicated parameter tuning. In contrast, visualization is able to well
organize and visually encode the entangled information in data and guild
audiences to simpler perceptual inferences and analytic thinking. But large
scale and high dimensional data will usually lead to the failure of many
visualization methods. In this paper, we close a loop between ML and
visualization via interaction between ML algorithm and users, so machine
intelligence and human intelligence can cooperate and improve each other in a
mutually rewarding way. In particular, we propose "transparent boosting tree
(TBT)", which visualizes both the model structure and prediction statistics of
each step in the learning process of gradient boosting tree to user, and
involves user's feedback operations to trees into the learning process. In TBT,
ML is in charge of updating weights in learning model and filtering information
shown to user from the big data, while visualization is in charge of providing
a visual understanding of ML model to facilitate user exploration. It combines
the advantages of both ML in big data statistics and human in decision making
based on domain knowledge. We develop a user friendly interface for this novel
learning method, and apply it to two datasets collected from real applications.
Our study shows that making ML transparent by using interactive visualization
can significantly improve the exploration of ML algorithms, give rise to novel
insights of ML models, and integrates both machine and human intelligence.
|
Federated Learning: Strategies for Improving Communication Efficiency | Federated Learning is a machine learning setting where the goal is to train a
high-quality centralized model while training data remains distributed over a
large number of clients each with unreliable and relatively slow network
connections. We consider learning algorithms for this setting where on each
round, each client independently computes an update to the current model based
on its local data, and communicates this update to a central server, where the
client-side updates are aggregated to compute a new global model. The typical
clients in this setting are mobile phones, and communication efficiency is of
the utmost importance.
In this paper, we propose two ways to reduce the uplink communication costs:
structured updates, where we directly learn an update from a restricted space
parametrized using a smaller number of variables, e.g. either low-rank or a
random mask; and sketched updates, where we learn a full model update and then
compress it using a combination of quantization, random rotations, and
subsampling before sending it to the server. Experiments on both convolutional
and recurrent networks show that the proposed methods can reduce the
communication cost by two orders of magnitude.
|
Analysis and Implementation of an Asynchronous Optimization Algorithm
for the Parameter Server | This paper presents an asynchronous incremental aggregated gradient algorithm
and its implementation in a parameter server framework for solving regularized
optimization problems. The algorithm can handle both general convex (possibly
non-smooth) regularizers and general convex constraints. When the empirical
data loss is strongly convex, we establish linear convergence rate, give
explicit expressions for step-size choices that guarantee convergence to the
optimum, and bound the associated convergence factors. The expressions have an
explicit dependence on the degree of asynchrony and recover classical results
under synchronous operation. Simulations and implementations on commercial
compute clouds validate our findings.
|
Online Contrastive Divergence with Generative Replay: Experience Replay
without Storing Data | Conceived in the early 1990s, Experience Replay (ER) has been shown to be a
successful mechanism to allow online learning algorithms to reuse past
experiences. Traditionally, ER can be applied to all machine learning paradigms
(i.e., unsupervised, supervised, and reinforcement learning). Recently, ER has
contributed to improving the performance of deep reinforcement learning. Yet,
its application to many practical settings is still limited by the memory
requirements of ER, necessary to explicitly store previous observations. To
remedy this issue, we explore a novel approach, Online Contrastive Divergence
with Generative Replay (OCD_GR), which uses the generative capability of
Restricted Boltzmann Machines (RBMs) instead of recorded past experiences. The
RBM is trained online, and does not require the system to store any of the
observed data points. We compare OCD_GR to ER on 9 real-world datasets,
considering a worst-case scenario (data points arriving in sorted order) as
well as a more realistic one (sequential random-order data points). Our results
show that in 64.28% of the cases OCD_GR outperforms ER and in the remaining
35.72% it has an almost equal performance, while having a considerably reduced
space complexity (i.e., memory usage) at a comparable time complexity.
|
Stylometric Analysis of Early Modern Period English Plays | Function word adjacency networks (WANs) are used to study the authorship of
plays from the Early Modern English period. In these networks, nodes are
function words and directed edges between two nodes represent the relative
frequency of directed co-appearance of the two words. For every analyzed play,
a WAN is constructed and these are aggregated to generate author profile
networks. We first study the similarity of writing styles between Early English
playwrights by comparing the profile WANs. The accuracy of using WANs for
authorship attribution is then demonstrated by attributing known plays among
six popular playwrights. Moreover, the WAN method is shown to outperform other
frequency-based methods on attributing Early English plays. In addition, WANs
are shown to be reliable classifiers even when attributing collaborative plays.
For several plays of disputed co-authorship, a deeper analysis is performed by
attributing every act and scene separately, in which we both corroborate
existing breakdowns and provide evidence of new assignments.
|
Markov Chain Truncation for Doubly-Intractable Inference | Computing partition functions, the normalizing constants of probability
distributions, is often hard. Variants of importance sampling give unbiased
estimates of a normalizer Z, however, unbiased estimates of the reciprocal 1/Z
are harder to obtain. Unbiased estimates of 1/Z allow Markov chain Monte Carlo
sampling of "doubly-intractable" distributions, such as the parameter posterior
for Markov Random Fields or Exponential Random Graphs. We demonstrate how to
construct unbiased estimates for 1/Z given access to black-box importance
sampling estimators for Z. We adapt recent work on random series truncation and
Markov chain coupling, producing estimators with lower variance and a higher
percentage of positive estimates than before. Our debiasing algorithms are
simple to implement, and have some theoretical and empirical advantages over
existing methods.
|
Low-rank and Sparse Soft Targets to Learn Better DNN Acoustic Models | Conventional deep neural networks (DNN) for speech acoustic modeling rely on
Gaussian mixture models (GMM) and hidden Markov model (HMM) to obtain binary
class labels as the targets for DNN training. Subword classes in speech
recognition systems correspond to context-dependent tied states or senones. The
present work addresses some limitations of GMM-HMM senone alignments for DNN
training. We hypothesize that the senone probabilities obtained from a DNN
trained with binary labels can provide more accurate targets to learn better
acoustic models. However, DNN outputs bear inaccuracies which are exhibited as
high dimensional unstructured noise, whereas the informative components are
structured and low-dimensional. We exploit principle component analysis (PCA)
and sparse coding to characterize the senone subspaces. Enhanced probabilities
obtained from low-rank and sparse reconstructions are used as soft-targets for
DNN acoustic modeling, that also enables training with untranscribed data.
Experiments conducted on AMI corpus shows 4.6% relative reduction in word error
rate.
|
Feasibility Based Large Margin Nearest Neighbor Metric Learning | Large margin nearest neighbor (LMNN) is a metric learner which optimizes the
performance of the popular $k$NN classifier. However, its resulting metric
relies on pre-selected target neighbors. In this paper, we address the
feasibility of LMNN's optimization constraints regarding these target points,
and introduce a mathematical measure to evaluate the size of the feasible
region of the optimization problem. We enhance the optimization framework of
LMNN by a weighting scheme which prefers data triplets which yield a larger
feasible region. This increases the chances to obtain a good metric as the
solution of LMNN's problem. We evaluate the performance of the resulting
feasibility-based LMNN algorithm using synthetic and real datasets. The
empirical results show an improved accuracy for different types of datasets in
comparison to regular LMNN.
|
Fast L1-NMF for Multiple Parametric Model Estimation | In this work we introduce a comprehensive algorithmic pipeline for multiple
parametric model estimation. The proposed approach analyzes the information
produced by a random sampling algorithm (e.g., RANSAC) from a machine
learning/optimization perspective, using a \textit{parameterless} biclustering
algorithm based on L1 nonnegative matrix factorization (L1-NMF). The proposed
framework exploits consistent patterns that naturally arise during the RANSAC
execution, while explicitly avoiding spurious inconsistencies. Contrarily to
the main trends in the literature, the proposed technique does not impose
non-intersecting parametric models. A new accelerated algorithm to compute
L1-NMFs allows to handle medium-sized problems faster while also extending the
usability of the algorithm to much larger datasets. This accelerated algorithm
has applications in any other context where an L1-NMF is needed, beyond the
biclustering approach to parameter estimation here addressed. We accompany the
algorithmic presentation with theoretical foundations and numerous and diverse
examples.
|
Deep Amortized Inference for Probabilistic Programs | Probabilistic programming languages (PPLs) are a powerful modeling tool, able
to represent any computable probability distribution. Unfortunately,
probabilistic program inference is often intractable, and existing PPLs mostly
rely on expensive, approximate sampling-based methods. To alleviate this
problem, one could try to learn from past inferences, so that future inferences
run faster. This strategy is known as amortized inference; it has recently been
applied to Bayesian networks and deep generative models. This paper proposes a
system for amortized inference in PPLs. In our system, amortization comes in
the form of a parameterized guide program. Guide programs have similar
structure to the original program, but can have richer data flow, including
neural network components. These networks can be optimized so that the guide
approximately samples from the posterior distribution defined by the original
program. We present a flexible interface for defining guide programs and a
stochastic gradient-based scheme for optimizing guide parameters, as well as
some preliminary results on automatically deriving guide programs. We explore
in detail the common machine learning pattern in which a 'local' model is
specified by 'global' random values and used to generate independent observed
data points; this gives rise to amortized local inference supporting global
model learning.
|
Semi-supervised Knowledge Transfer for Deep Learning from Private
Training Data | Some machine learning applications involve training data that is sensitive,
such as the medical histories of patients in a clinical trial. A model may
inadvertently and implicitly store some of its training data; careful analysis
of the model may therefore reveal sensitive information.
To address this problem, we demonstrate a generally applicable approach to
providing strong privacy guarantees for training data: Private Aggregation of
Teacher Ensembles (PATE). The approach combines, in a black-box fashion,
multiple models trained with disjoint datasets, such as records from different
subsets of users. Because they rely directly on sensitive data, these models
are not published, but instead used as "teachers" for a "student" model. The
student learns to predict an output chosen by noisy voting among all of the
teachers, and cannot directly access an individual teacher or the underlying
data or parameters. The student's privacy properties can be understood both
intuitively (since no single teacher and thus no single dataset dictates the
student's training) and formally, in terms of differential privacy. These
properties hold even if an adversary can not only query the student but also
inspect its internal workings.
Compared with previous work, the approach imposes only weak assumptions on
how teachers are trained: it applies to any model, including non-convex models
like DNNs. We achieve state-of-the-art privacy/utility trade-offs on MNIST and
SVHN thanks to an improved privacy analysis and semi-supervised learning.
|
RedQueen: An Online Algorithm for Smart Broadcasting in Social Networks | Users in social networks whose posts stay at the top of their followers'{}
feeds the longest time are more likely to be noticed. Can we design an online
algorithm to help them decide when to post to stay at the top? In this paper,
we address this question as a novel optimal control problem for jump stochastic
differential equations. For a wide variety of feed dynamics, we show that the
optimal broadcasting intensity for any user is surprisingly simple -- it is
given by the position of her most recent post on each of her follower's feeds.
As a consequence, we are able to develop a simple and highly efficient online
algorithm, RedQueen, to sample the optimal times for the user to post.
Experiments on both synthetic and real data gathered from Twitter show that our
algorithm is able to consistently make a user's posts more visible over time,
is robust to volume changes on her followers' feeds, and significantly
outperforms the state of the art.
|
Modeling the Dynamics of Online Learning Activity | People are increasingly relying on the Web and social media to find solutions
to their problems in a wide range of domains. In this online setting, closely
related problems often lead to the same characteristic learning pattern, in
which people sharing these problems visit related pieces of information,
perform almost identical queries or, more generally, take a series of similar
actions. In this paper, we introduce a novel modeling framework for clustering
continuous-time grouped streaming data, the hierarchical Dirichlet Hawkes
process (HDHP), which allows us to automatically uncover a wide variety of
learning patterns from detailed traces of learning activity. Our model allows
for efficient inference, scaling to millions of actions taken by thousands of
users. Experiments on real data gathered from Stack Overflow reveal that our
framework can recover meaningful learning patterns in terms of both content and
temporal dynamics, as well as accurately track users' interests and goals over
time.
|
Big Batch SGD: Automated Inference using Adaptive Batch Sizes | Classical stochastic gradient methods for optimization rely on noisy gradient
approximations that become progressively less accurate as iterates approach a
solution. The large noise and small signal in the resulting gradients makes it
difficult to use them for adaptive stepsize selection and automatic stopping.
We propose alternative "big batch" SGD schemes that adaptively grow the batch
size over time to maintain a nearly constant signal-to-noise ratio in the
gradient approximation. The resulting methods have similar convergence rates to
classical SGD, and do not require convexity of the objective. The high fidelity
gradients enable automated learning rate selection and do not require stepsize
decay. Big batch methods are thus easily automated and can run with little or
no oversight.
|
Decision Tree Classification on Outsourced Data | This paper proposes a client-server decision tree learning method for
outsourced private data. The privacy model is anatomization/fragmentation: the
server sees data values, but the link between sensitive and identifying
information is encrypted with a key known only to clients. Clients have limited
processing and storage capability. Both sensitive and identifying information
thus are stored on the server. The approach presented also retains most
processing at the server, and client-side processing is amortized over
predictions made by the clients. Experiments on various datasets show that the
method produces decision trees approaching the accuracy of a non-private
decision tree, while substantially reducing the client's computing resource
requirements.
|
Small-footprint Highway Deep Neural Networks for Speech Recognition | State-of-the-art speech recognition systems typically employ neural network
acoustic models. However, compared to Gaussian mixture models, deep neural
network (DNN) based acoustic models often have many more model parameters,
making it challenging for them to be deployed on resource-constrained
platforms, such as mobile devices. In this paper, we study the application of
the recently proposed highway deep neural network (HDNN) for training
small-footprint acoustic models. HDNNs are a depth-gated feedforward neural
network, which include two types of gate functions to facilitate the
information flow through different layers. Our study demonstrates that HDNNs
are more compact than regular DNNs for acoustic modeling, i.e., they can
achieve comparable recognition accuracy with many fewer model parameters.
Furthermore, HDNNs are more controllable than DNNs: the gate functions of an
HDNN can control the behavior of the whole network using a very small number of
model parameters. Finally, we show that HDNNs are more adaptable than DNNs. For
example, simply updating the gate functions using adaptation data can result in
considerable gains in accuracy. We demonstrate these aspects by experiments
using the publicly available AMI corpus, which has around 80 hours of training
data.
|
Statistical Learning Theory Approach for Data Classification with
l-diversity | Corporations are retaining ever-larger corpuses of personal data; the
frequency or breaches and corresponding privacy impact have been rising
accordingly. One way to mitigate this risk is through use of anonymized data,
limiting the exposure of individual data to only where it is absolutely needed.
This would seem particularly appropriate for data mining, where the goal is
generalizable knowledge rather than data on specific individuals. In practice,
corporate data miners often insist on original data, for fear that they might
"miss something" with anonymized or differentially private approaches. This
paper provides a theoretical justification for the use of anonymized data.
Specifically, we show that a support vector classifier trained on anatomized
data satisfying l-diversity should be expected to do as well as on the original
data. Anatomy preserves all data values, but introduces uncertainty in the
mapping between identifying and sensitive values, thus satisfying l-diversity.
The theoretical effectiveness of the proposed approach is validated using
several publicly available datasets, showing that we outperform the state of
the art for support vector classification using training data protected by
k-anonymity, and are comparable to learning on the original data.
|
Membership Inference Attacks against Machine Learning Models | We quantitatively investigate how machine learning models leak information
about the individual data records on which they were trained. We focus on the
basic membership inference attack: given a data record and black-box access to
a model, determine if the record was in the model's training dataset. To
perform membership inference against a target model, we make adversarial use of
machine learning and train our own inference model to recognize differences in
the target model's predictions on the inputs that it trained on versus the
inputs that it did not train on.
We empirically evaluate our inference techniques on classification models
trained by commercial "machine learning as a service" providers such as Google
and Amazon. Using realistic datasets and classification tasks, including a
hospital discharge dataset whose membership is sensitive from the privacy
perspective, we show that these models can be vulnerable to membership
inference attacks. We then investigate the factors that influence this leakage
and evaluate mitigation strategies.
|
CuMF_SGD: Fast and Scalable Matrix Factorization | Matrix factorization (MF) has been widely used in e.g., recommender systems,
topic modeling and word embedding. Stochastic gradient descent (SGD) is popular
in solving MF problems because it can deal with large data sets and is easy to
do incremental learning. We observed that SGD for MF is memory bound.
Meanwhile, single-node CPU systems with caching performs well only for small
data sets; distributed systems have higher aggregated memory bandwidth but
suffer from relatively slow network connection. This observation inspires us to
accelerate MF by utilizing GPUs's high memory bandwidth and fast intra-node
connection. We present cuMF_SGD, a CUDA-based SGD solution for large-scale MF
problems. On a single CPU, we design two workload schedule schemes, i.e.,
batch-Hogwild! and wavefront-update that fully exploit the massive amount of
cores. Especially, batch-Hogwild! as a vectorized version of Hogwild! overcomes
the issue of memory discontinuity. We also develop highly-optimized kernels for
SGD update, leveraging cache, warp-shuffle instructions and half-precision
floats. We also design a partition scheme to utilize multiple GPUs while
addressing the well-known convergence issue when parallelizing SGD. On three
data sets with only one Maxwell or Pascal GPU, cuMF_SGD runs 3.1X-28.2X as fast
compared with state-of-art CPU solutions on 1-64 CPU nodes. Evaluations also
show that cuMF_SGD scales well on multiple GPUs in large data sets.
|
Learning Determinantal Point Processes in Sublinear Time | We propose a new class of determinantal point processes (DPPs) which can be
manipulated for inference and parameter learning in potentially sublinear time
in the number of items. This class, based on a specific low-rank factorization
of the marginal kernel, is particularly suited to a subclass of continuous DPPs
and DPPs defined on exponentially many items. We apply this new class to
modelling text documents as sampling a DPP of sentences, and propose a
conditional maximum likelihood formulation to model topic proportions, which is
made possible with no approximation for our class of DPPs. We present an
application to document summarization with a DPP on $2^{500}$ items.
|
A multi-task learning model for malware classification with useful file
access pattern from API call sequence | Based on API call sequences, semantic-aware and machine learning (ML) based
malware classifiers can be built for malware detection or classification.
Previous works concentrate on crafting and extracting various features from
malware binaries, disassembled binaries or API calls via static or dynamic
analysis and resorting to ML to build classifiers. However, they tend to
involve too much feature engineering and fail to provide interpretability. We
solve these two problems with the recent advances in deep learning: 1)
RNN-based autoencoders (RNN-AEs) can automatically learn low-dimensional
representation of a malware from its raw API call sequence. 2) Multiple
decoders can be trained under different supervisions to give more information,
other than the class or family label of a malware. Inspired by the works of
document classification and automatic sentence summarization, each API call
sequence can be regarded as a sentence. In this paper, we make the first
attempt to build a multi-task malware learning model based on API call
sequences. The model consists of two decoders, one for malware classification
and one for $\emph{file access pattern}$ (FAP) generation given the API call
sequence of a malware. We base our model on the general seq2seq framework.
Experiments show that our model can give competitive classification results as
well as insightful FAP information.
|
Particle Swarm Optimization for Generating Interpretable Fuzzy
Reinforcement Learning Policies | Fuzzy controllers are efficient and interpretable system controllers for
continuous state and action spaces. To date, such controllers have been
constructed manually or trained automatically either using expert-generated
problem-specific cost functions or incorporating detailed knowledge about the
optimal control strategy. Both requirements for automatic training processes
are not found in most real-world reinforcement learning (RL) problems. In such
applications, online learning is often prohibited for safety reasons because
online learning requires exploration of the problem's dynamics during policy
training. We introduce a fuzzy particle swarm reinforcement learning (FPSRL)
approach that can construct fuzzy RL policies solely by training parameters on
world models that simulate real system dynamics. These world models are created
by employing an autonomous machine learning technique that uses previously
generated transition samples of a real system. To the best of our knowledge,
this approach is the first to relate self-organizing fuzzy controllers to
model-based batch RL. Therefore, FPSRL is intended to solve problems in domains
where online learning is prohibited, system dynamics are relatively easy to
model from previously generated default policy transition samples, and it is
expected that a relatively easily interpretable control policy exists. The
efficiency of the proposed approach with problems from such domains is
demonstrated using three standard RL benchmarks, i.e., mountain car, cart-pole
balancing, and cart-pole swing-up. Our experimental results demonstrate
high-performing, interpretable fuzzy policies.
|
K-Nearest Neighbor Classification Using Anatomized Data | This paper analyzes k nearest neighbor classification with training data
anonymized using anatomy. Anatomy preserves all data values, but introduces
uncertainty in the mapping between identifying and sensitive values. We first
study the theoretical effect of the anatomized training data on the k nearest
neighbor error rate bounds, nearest neighbor convergence rate, and Bayesian
error. We then validate the derived bounds empirically. We show that 1)
Learning from anatomized data approaches the limits of learning through the
unprotected data (although requiring larger training data), and 2) nearest
neighbor using anatomized data outperforms nearest neighbor on
generalization-based anonymization.
|
Learning to Learn Neural Networks | Meta-learning consists in learning learning algorithms. We use a Long Short
Term Memory (LSTM) based network to learn to compute on-line updates of the
parameters of another neural network. These parameters are stored in the cell
state of the LSTM. Our framework allows to compare learned algorithms to
hand-made algorithms within the traditional train and test methodology. In an
experiment, we learn a learning algorithm for a one-hidden layer Multi-Layer
Perceptron (MLP) on non-linearly separable datasets. The learned algorithm is
able to update parameters of both layers and generalise well on similar
datasets.
|
Efficiency of active learning for the allocation of workers on
crowdsourced classification tasks | Crowdsourcing has been successfully employed in the past as an effective and
cheap way to execute classification tasks and has therefore attracted the
attention of the research community. However, we still lack a theoretical
understanding of how to collect the labels from the crowd in an optimal way. In
this paper we focus on the problem of worker allocation and compare two active
learning policies proposed in the empirical literature with a uniform
allocation of the available budget. To this end we make a thorough mathematical
analysis of the problem and derive a new bound on the performance of the
system. Furthermore we run extensive simulations in a more realistic scenario
and show that our theoretical results hold in practice.
|
Streaming Normalization: Towards Simpler and More Biologically-plausible
Normalizations for Online and Recurrent Learning | We systematically explored a spectrum of normalization algorithms related to
Batch Normalization (BN) and propose a generalized formulation that
simultaneously solves two major limitations of BN: (1) online learning and (2)
recurrent learning. Our proposal is simpler and more biologically-plausible.
Unlike previous approaches, our technique can be applied out of the box to all
learning scenarios (e.g., online learning, batch learning, fully-connected,
convolutional, feedforward, recurrent and mixed --- recurrent and
convolutional) and compare favorably with existing approaches. We also propose
Lp Normalization for normalizing by different orders of statistical moments. In
particular, L1 normalization is well-performing, simple to implement, fast to
compute, more biologically-plausible and thus ideal for GPU or hardware
implementations.
|
Structured adaptive and random spinners for fast machine learning
computations | We consider an efficient computational framework for speeding up several
machine learning algorithms with almost no loss of accuracy. The proposed
framework relies on projections via structured matrices that we call Structured
Spinners, which are formed as products of three structured matrix-blocks that
incorporate rotations. The approach is highly generic, i.e. i) structured
matrices under consideration can either be fully-randomized or learned, ii) our
structured family contains as special cases all previously considered
structured schemes, iii) the setting extends to the non-linear case where the
projections are followed by non-linear functions, and iv) the method finds
numerous applications including kernel approximations via random feature maps,
dimensionality reduction algorithms, new fast cross-polytope LSH techniques,
deep learning, convex optimization algorithms via Newton sketches, quantization
with random projection trees, and more. The proposed framework comes with
theoretical guarantees characterizing the capacity of the structured model in
reference to its unstructured counterpart and is based on a general theoretical
principle that we describe in the paper. As a consequence of our theoretical
analysis, we provide the first theoretical guarantees for one of the most
efficient existing LSH algorithms based on the HD3HD2HD1 structured matrix
[Andoni et al., 2015]. The exhaustive experimental evaluation confirms the
accuracy and efficiency of structured spinners for a variety of different
applications.
|
Multilevel Anomaly Detection for Mixed Data | Anomalies are those deviating from the norm. Unsupervised anomaly detection
often translates to identifying low density regions. Major problems arise when
data is high-dimensional and mixed of discrete and continuous attributes. We
propose MIXMAD, which stands for MIXed data Multilevel Anomaly Detection, an
ensemble method that estimates the sparse regions across multiple levels of
abstraction of mixed data. The hypothesis is for domains where multiple data
abstractions exist, a data point may be anomalous with respect to the raw
representation or more abstract representations. To this end, our method
sequentially constructs an ensemble of Deep Belief Nets (DBNs) with varying
depths. Each DBN is an energy-based detector at a predefined abstraction level.
At the bottom level of each DBN, there is a Mixed-variate Restricted Boltzmann
Machine that models the density of mixed data. Predictions across the ensemble
are finally combined via rank aggregation. The proposed MIXMAD is evaluated on
high-dimensional realworld datasets of different characteristics. The results
demonstrate that for anomaly detection, (a) multilevel abstraction of
high-dimensional and mixed data is a sensible strategy, and (b) empirically,
MIXMAD is superior to popular unsupervised detection methods for both
homogeneous and mixed data.
|
DeepGraph: Graph Structure Predicts Network Growth | The topological (or graph) structures of real-world networks are known to be
predictive of multiple dynamic properties of the networks. Conventionally, a
graph structure is represented using an adjacency matrix or a set of
hand-crafted structural features. These representations either fail to
highlight local and global properties of the graph or suffer from a severe loss
of structural information. There lacks an effective graph representation, which
hinges the realization of the predictive power of network structures.
In this study, we propose to learn the represention of a graph, or the
topological structure of a network, through a deep learning model. This
end-to-end prediction model, named DeepGraph, takes the input of the raw
adjacency matrix of a real-world network and outputs a prediction of the growth
of the network. The adjacency matrix is first represented using a graph
descriptor based on the heat kernel signature, which is then passed through a
multi-column, multi-resolution convolutional neural network. Extensive
experiments on five large collections of real-world networks demonstrate that
the proposed prediction model significantly improves the effectiveness of
existing methods, including linear or nonlinear regressors that use
hand-crafted features, graph kernels, and competing deep learning methods.
|
Using Fast Weights to Attend to the Recent Past | Until recently, research on artificial neural networks was largely restricted
to systems with only two types of variable: Neural activities that represent
the current or recent input and weights that learn to capture regularities
among inputs, outputs and payoffs. There is no good reason for this
restriction. Synapses have dynamics at many different time-scales and this
suggests that artificial neural networks might benefit from variables that
change slower than activities but much faster than the standard weights. These
"fast weights" can be used to store temporary memories of the recent past and
they provide a neurally plausible way of implementing the type of attention to
the past that has recently proved very helpful in sequence-to-sequence models.
By using fast weights we can avoid the need to store copies of neural activity
patterns.
|
Modeling Scalability of Distributed Machine Learning | Present day machine learning is computationally intensive and processes large
amounts of data. It is implemented in a distributed fashion in order to address
these scalability issues. The work is parallelized across a number of computing
nodes. It is usually hard to estimate in advance how many nodes to use for a
particular workload. We propose a simple framework for estimating the
scalability of distributed machine learning algorithms. We measure the
scalability by means of the speedup an algorithm achieves with more nodes. We
propose time complexity models for gradient descent and graphical model
inference. We validate our models with experiments on deep learning training
and belief propagation. This framework was used to study the scalability of
machine learning algorithms in Apache Spark.
|
Deep Neural Networks for Improved, Impromptu Trajectory Tracking of
Quadrotors | Trajectory tracking control for quadrotors is important for applications
ranging from surveying and inspection, to film making. However, designing and
tuning classical controllers, such as proportional-integral-derivative (PID)
controllers, to achieve high tracking precision can be time-consuming and
difficult, due to hidden dynamics and other non-idealities. The Deep Neural
Network (DNN), with its superior capability of approximating abstract,
nonlinear functions, proposes a novel approach for enhancing trajectory
tracking control. This paper presents a DNN-based algorithm as an add-on module
that improves the tracking performance of a classical feedback controller.
Given a desired trajectory, the DNNs provide a tailored reference input to the
controller based on their gained experience. The input aims to achieve a unity
map between the desired and the output trajectory. The motivation for this work
is an interactive "fly-as-you-draw" application, in which a user draws a
trajectory on a mobile device, and a quadrotor instantly flies that trajectory
with the DNN-enhanced control system. Experimental results demonstrate that the
proposed approach improves the tracking precision for user-drawn trajectories
after the DNNs are trained on selected periodic trajectories, suggesting the
method's potential in real-world applications. Tracking errors are reduced by
around 40-50% for both training and testing trajectories from users,
highlighting the DNNs' capability of generalizing knowledge.
|
A Growing Long-term Episodic & Semantic Memory | The long-term memory of most connectionist systems lies entirely in the
weights of the system. Since the number of weights is typically fixed, this
bounds the total amount of knowledge that can be learned and stored. Though
this is not normally a problem for a neural network designed for a specific
task, such a bound is undesirable for a system that continually learns over an
open range of domains. To address this, we describe a lifelong learning system
that leverages a fast, though non-differentiable, content-addressable memory
which can be exploited to encode both a long history of sequential episodic
knowledge and semantic knowledge over many episodes for an unbounded number of
domains. This opens the door for investigation into transfer learning, and
leveraging prior knowledge that has been learned over a lifetime of experiences
to new domains.
|
Mixed Neural Network Approach for Temporal Sleep Stage Classification | This paper proposes a practical approach to addressing limitations posed by
use of single active electrodes in applications for sleep stage classification.
Electroencephalography (EEG)-based characterizations of sleep stage progression
contribute the diagnosis and monitoring of the many pathologies of sleep.
Several prior reports have explored ways of automating the analysis of sleep
EEG and of reducing the complexity of the data needed for reliable
discrimination of sleep stages in order to make it possible to perform sleep
studies at lower cost in the home (rather than only in specialized clinical
facilities). However, these reports have involved recordings from electrodes
placed on the cranial vertex or occiput, which can be uncomfortable or
difficult for subjects to position. Those that have utilized single EEG
channels which contain less sleep information, have showed poor classification
performance. We have taken advantage of Rectifier Neural Network for feature
detection and Long Short-Term Memory (LSTM) network for sequential data
learning to optimize classification performance with single electrode
recordings. After exploring alternative electrode placements, we found a
comfortable configuration of a single-channel EEG on the forehead and have
shown that it can be integrated with additional electrodes for simultaneous
recording of the electroocuolgram (EOG). Evaluation of data from 62 people
(with 494 hours sleep) demonstrated better performance of our analytical
algorithm for automated sleep classification than existing approaches using
vertex or occipital electrode placements. Use of this recording configuration
with neural network deconvolution promises to make clinically indicated home
sleep studies practical.
|
Kernel Alignment for Unsupervised Transfer Learning | The ability of a human being to extrapolate previously gained knowledge to
other domains inspired a new family of methods in machine learning called
transfer learning. Transfer learning is often based on the assumption that
objects in both target and source domains share some common feature and/or data
space. In this paper, we propose a simple and intuitive approach that minimizes
iteratively the distance between source and target task distributions by
optimizing the kernel target alignment (KTA). We show that this procedure is
suitable for transfer learning by relating it to Hilbert-Schmidt Independence
Criterion (HSIC) and Quadratic Mutual Information (QMI) maximization. We run
our method on benchmark computer vision data sets and show that it can
outperform some state-of-art methods.
|
Regularized Optimal Transport and the Rot Mover's Distance | This paper presents a unified framework for smooth convex regularization of
discrete optimal transport problems. In this context, the regularized optimal
transport turns out to be equivalent to a matrix nearness problem with respect
to Bregman divergences. Our framework thus naturally generalizes a previously
proposed regularization based on the Boltzmann-Shannon entropy related to the
Kullback-Leibler divergence, and solved with the Sinkhorn-Knopp algorithm. We
call the regularized optimal transport distance the rot mover's distance in
reference to the classical earth mover's distance. We develop two generic
schemes that we respectively call the alternate scaling algorithm and the
non-negative alternate scaling algorithm, to compute efficiently the
regularized optimal plans depending on whether the domain of the regularizer
lies within the non-negative orthant or not. These schemes are based on
Dykstra's algorithm with alternate Bregman projections, and further exploit the
Newton-Raphson method when applied to separable divergences. We enhance the
separable case with a sparse extension to deal with high data dimensions. We
also instantiate our proposed framework and discuss the inherent specificities
for well-known regularizers and statistical divergences in the machine learning
and information geometry communities. Finally, we demonstrate the merits of our
methods with experiments using synthetic data to illustrate the effect of
different regularizers and penalties on the solutions, as well as real-world
data for a pattern recognition application to audio scene classification.
|
Change-point Detection Methods for Body-Worn Video | Body-worn video (BWV) cameras are increasingly utilized by police departments
to provide a record of police-public interactions. However, large-scale BWV
deployment produces terabytes of data per week, necessitating the development
of effective computational methods to identify salient changes in video. In
work carried out at the 2016 RIPS program at IPAM, UCLA, we present a novel
two-stage framework for video change-point detection. First, we employ
state-of-the-art machine learning methods including convolutional neural
networks and support vector machines for scene classification. We then develop
and compare change-point detection algorithms utilizing mean squared-error
minimization, forecasting methods, hidden Markov models, and maximum likelihood
estimation to identify noteworthy changes. We test our framework on detection
of vehicle exits and entrances in a BWV data set provided by the Los Angeles
Police Department and achieve over 90% recall and nearly 70% precision --
demonstrating robustness to rapid scene changes, extreme luminance differences,
and frequent camera occlusions.
|
Utilization of Deep Reinforcement Learning for saccadic-based object
visual search | The paper focuses on the problem of learning saccades enabling visual object
search. The developed system combines reinforcement learning with a neural
network for learning to predict the possible outcomes of its actions. We
validated the solution in three types of environment consisting of
(pseudo)-randomly generated matrices of digits. The experimental verification
is followed by the discussion regarding elements required by systems mimicking
the fovea movement and possible further research directions.
|
ChoiceRank: Identifying Preferences from Node Traffic in Networks | Understanding how users navigate in a network is of high interest in many
applications. We consider a setting where only aggregate node-level traffic is
observed and tackle the task of learning edge transition probabilities. We cast
it as a preference learning problem, and we study a model where choices follow
Luce's axiom. In this case, the $O(n)$ marginal counts of node visits are a
sufficient statistic for the $O(n^2)$ transition probabilities. We show how to
make the inference problem well-posed regardless of the network's structure,
and we present ChoiceRank, an iterative algorithm that scales to networks that
contains billions of nodes and edges. We apply the model to two clickstream
datasets and show that it successfully recovers the transition probabilities
using only the network structure and marginal (node-level) traffic data.
Finally, we also consider an application to mobility networks and apply the
model to one year of rides on New York City's bicycle-sharing system.
|
Autonomous Racing using Learning Model Predictive Control | A novel learning Model Predictive Control technique is applied to the
autonomous racing problem. The goal of the controller is to minimize the time
to complete a lap. The proposed control strategy uses the data from previous
laps to improve its performance while satisfying safety requirements. Moreover,
a system identification technique is proposed to estimate the vehicle dynamics.
Simulation results with the high fidelity simulator software CarSim show the
effectiveness of the proposed control scheme.
|
Combinatorial Multi-Armed Bandit with General Reward Functions | In this paper, we study the stochastic combinatorial multi-armed bandit
(CMAB) framework that allows a general nonlinear reward function, whose
expected value may not depend only on the means of the input random variables
but possibly on the entire distributions of these variables. Our framework
enables a much larger class of reward functions such as the $\max()$ function
and nonlinear utility functions. Existing techniques relying on accurate
estimations of the means of random variables, such as the upper confidence
bound (UCB) technique, do not work directly on these functions. We propose a
new algorithm called stochastically dominant confidence bound (SDCB), which
estimates the distributions of underlying random variables and their
stochastically dominant confidence bounds. We prove that SDCB can achieve
$O(\log{T})$ distribution-dependent regret and $\tilde{O}(\sqrt{T})$
distribution-independent regret, where $T$ is the time horizon. We apply our
results to the $K$-MAX problem and expected utility maximization problems. In
particular, for $K$-MAX, we provide the first polynomial-time approximation
scheme (PTAS) for its offline problem, and give the first $\tilde{O}(\sqrt T)$
bound on the $(1-\epsilon)$-approximation regret of its online problem, for any
$\epsilon>0$.
|
Novelty Learning via Collaborative Proximity Filtering | The vast majority of recommender systems model preferences as static or
slowly changing due to observable user experience. However, spontaneous changes
in user preferences are ubiquitous in many domains like media consumption and
key factors that drive changes in preferences are not directly observable.
These latent sources of preference change pose new challenges. When systems do
not track and adapt to users' tastes, users lose confidence and trust,
increasing the risk of user churn. We meet these challenges by developing a
model of novelty preferences that learns and tracks latent user tastes. We
combine three innovations: a new measure of item similarity based on patterns
of consumption co-occurrence; model for {\em spontaneous} changes in
preferences; and a learning agent that tracks each user's dynamic preferences
and learns individualized policies for variety. The resulting framework
adaptively provides users with novelty tailored to their preferences for change
per se.
|
Single Pass PCA of Matrix Products | In this paper we present a new algorithm for computing a low rank
approximation of the product $A^TB$ by taking only a single pass of the two
matrices $A$ and $B$. The straightforward way to do this is to (a) first sketch
$A$ and $B$ individually, and then (b) find the top components using PCA on the
sketch. Our algorithm in contrast retains additional summary information about
$A,B$ (e.g. row and column norms etc.) and uses this additional information to
obtain an improved approximation from the sketches. Our main analytical result
establishes a comparable spectral norm guarantee to existing two-pass methods;
in addition we also provide results from an Apache Spark implementation that
shows better computational and statistical performance on real-world and
synthetic evaluation datasets.
|
Stochastic Gradient MCMC with Stale Gradients | Stochastic gradient MCMC (SG-MCMC) has played an important role in
large-scale Bayesian learning, with well-developed theoretical convergence
properties. In such applications of SG-MCMC, it is becoming increasingly
popular to employ distributed systems, where stochastic gradients are computed
based on some outdated parameters, yielding what are termed stale gradients.
While stale gradients could be directly used in SG-MCMC, their impact on
convergence properties has not been well studied. In this paper we develop
theory to show that while the bias and MSE of an SG-MCMC algorithm depend on
the staleness of stochastic gradients, its estimation variance (relative to the
expected estimate, based on a prescribed number of samples) is independent of
it. In a simple Bayesian distributed system with SG-MCMC, where stale gradients
are computed asynchronously by a set of workers, our theory indicates a linear
speedup on the decrease of estimation variance w.r.t. the number of workers.
Experiments on synthetic data and deep neural networks validate our theory,
demonstrating the effectiveness and scalability of SG-MCMC with stale
gradients.
|
End-to-End Training Approaches for Discriminative Segmental Models | Recent work on discriminative segmental models has shown that they can
achieve competitive speech recognition performance, using features based on
deep neural frame classifiers. However, segmental models can be more
challenging to train than standard frame-based approaches. While some segmental
models have been successfully trained end to end, there is a lack of
understanding of their training under different settings and with different
losses.
We investigate a model class based on recent successful approaches,
consisting of a linear model that combines segmental features based on an LSTM
frame classifier. Similarly to hybrid HMM-neural network models, segmental
models of this class can be trained in two stages (frame classifier training
followed by linear segmental model weight training), end to end (joint training
of both frame classifier and linear weights), or with end-to-end fine-tuning
after two-stage training.
We study segmental models trained end to end with hinge loss, log loss,
latent hinge loss, and marginal log loss. We consider several losses for the
case where training alignments are available as well as where they are not.
We find that in general, marginal log loss provides the most consistent
strong performance without requiring ground-truth alignments. We also find that
training with dropout is very important in obtaining good performance with
end-to-end training. Finally, the best results are typically obtained by a
combination of two-stage training and fine-tuning.
|
Maximally Divergent Intervals for Anomaly Detection | We present new methods for batch anomaly detection in multivariate time
series. Our methods are based on maximizing the Kullback-Leibler divergence
between the data distribution within and outside an interval of the time
series. An empirical analysis shows the benefits of our algorithms compared to
methods that treat each time step independently from each other without
optimizing with respect to all possible intervals.
|
Modular Deep Q Networks for Sim-to-real Transfer of Visuo-motor Policies | While deep learning has had significant successes in computer vision thanks
to the abundance of visual data, collecting sufficiently large real-world
datasets for robot learning can be costly. To increase the practicality of
these techniques on real robots, we propose a modular deep reinforcement
learning method capable of transferring models trained in simulation to a
real-world robotic task. We introduce a bottleneck between perception and
control, enabling the networks to be trained independently, but then merged and
fine-tuned in an end-to-end manner to further improve hand-eye coordination. On
a canonical, planar visually-guided robot reaching task a fine-tuned accuracy
of 1.6 pixels is achieved, a significant improvement over naive transfer (17.5
pixels), showing the potential for more complicated and broader applications.
Our method provides a technique for more efficient learning and transfer of
visuo-motor policies for real robotic systems without relying entirely on large
real-world robot datasets.
|
Robust training on approximated minimal-entropy set | In this paper, we propose a general framework to learn a robust large-margin
binary classifier when corrupt measurements, called anomalies, caused by sensor
failure might be present in the training set. The goal is to minimize the
generalization error of the classifier on non-corrupted measurements while
controlling the false alarm rate associated with anomalous samples. By
incorporating a non-parametric regularizer based on an empirical entropy
estimator, we propose a Geometric-Entropy-Minimization regularized Maximum
Entropy Discrimination (GEM-MED) method to learn to classify and detect
anomalies in a joint manner. We demonstrate using simulated data and a real
multimodal data set. Our GEM-MED method can yield improved performance over
previous robust classification methods in terms of both classification accuracy
and anomaly detection rate.
|
Convex Formulation for Kernel PCA and its Use in Semi-Supervised
Learning | In this paper, Kernel PCA is reinterpreted as the solution to a convex
optimization problem. Actually, there is a constrained convex problem for each
principal component, so that the constraints guarantee that the principal
component is indeed a solution, and not a mere saddle point. Although these
insights do not imply any algorithmic improvement, they can be used to further
understand the method, formulate possible extensions and properly address them.
As an example, a new convex optimization problem for semi-supervised
classification is proposed, which seems particularly well-suited whenever the
number of known labels is small. Our formulation resembles a Least Squares SVM
problem with a regularization parameter multiplied by a negative sign, combined
with a variational principle for Kernel PCA. Our primal optimization principle
for semi-supervised learning is solved in terms of the Lagrange multipliers.
Numerical experiments in several classification tasks illustrate the
performance of the proposed model in problems with only a few labeled data.
|
An Efficient Minibatch Acceptance Test for Metropolis-Hastings | We present a novel Metropolis-Hastings method for large datasets that uses
small expected-size minibatches of data. Previous work on reducing the cost of
Metropolis-Hastings tests yield variable data consumed per sample, with only
constant factor reductions versus using the full dataset for each sample. Here
we present a method that can be tuned to provide arbitrarily small batch sizes,
by adjusting either proposal step size or temperature. Our test uses the
noise-tolerant Barker acceptance test with a novel additive correction
variable. The resulting test has similar cost to a normal SGD update. Our
experiments demonstrate several order-of-magnitude speedups over previous work.
|
Learning to Protect Communications with Adversarial Neural Cryptography | We ask whether neural networks can learn to use secret keys to protect
information from other neural networks. Specifically, we focus on ensuring
confidentiality properties in a multiagent system, and we specify those
properties in terms of an adversary. Thus, a system may consist of neural
networks named Alice and Bob, and we aim to limit what a third neural network
named Eve learns from eavesdropping on the communication between Alice and Bob.
We do not prescribe specific cryptographic algorithms to these neural networks;
instead, we train end-to-end, adversarially. We demonstrate that the neural
networks can learn how to perform forms of encryption and decryption, and also
how to apply these operations selectively in order to meet confidentiality
goals.
|
Bit-pragmatic Deep Neural Network Computing | We quantify a source of ineffectual computations when processing the
multiplications of the convolutional layers in Deep Neural Networks (DNNs) and
propose Pragmatic (PRA), an architecture that exploits it improving performance
and energy efficiency. The source of these ineffectual computations is best
understood in the context of conventional multipliers which generate internally
multiple terms, that is, products of the multiplicand and powers of two, which
added together produce the final product [1]. At runtime, many of these terms
are zero as they are generated when the multiplicand is combined with the
zero-bits of the multiplicator. While conventional bit-parallel multipliers
calculate all terms in parallel to reduce individual product latency, PRA
calculates only the non-zero terms using a) on-the-fly conversion of the
multiplicator representation into an explicit list of powers of two, and b)
hybrid bit-parallel multplicand/bit-serial multiplicator processing units. PRA
exploits two sources of ineffectual computations: 1) the aforementioned zero
product terms which are the result of the lack of explicitness in the
multiplicator representation, and 2) the excess in the representation precision
used for both multiplicants and multiplicators, e.g., [2]. Measurements
demonstrate that for the convolutional layers, a straightforward variant of PRA
improves performance by 2.6x over the DaDiaNao (DaDN) accelerator [3] and by
1.4x over STR [4]. Similarly, PRA improves energy efficiency by 28% and 10% on
average compared to DaDN and STR. An improved cross lane synchronication scheme
boosts performance improvements to 3.1x over DaDN. Finally, Pragmatic benefits
persist even with an 8-bit quantized representation [5].
|
Safety Verification of Deep Neural Networks | Deep neural networks have achieved impressive experimental results in image
classification, but can surprisingly be unstable with respect to adversarial
perturbations, that is, minimal changes to the input image that cause the
network to misclassify it. With potential applications including perception
modules and end-to-end controllers for self-driving cars, this raises concerns
about their safety. We develop a novel automated verification framework for
feed-forward multi-layer neural networks based on Satisfiability Modulo Theory
(SMT). We focus on safety of image classification decisions with respect to
image manipulations, such as scratches or changes to camera angle or lighting
conditions that would result in the same class being assigned by a human, and
define safety for an individual decision in terms of invariance of the
classification within a small neighbourhood of the original image. We enable
exhaustive search of the region by employing discretisation, and propagate the
analysis layer by layer. Our method works directly with the network code and,
in contrast to existing methods, can guarantee that adversarial examples, if
they exist, are found for the given region and family of manipulations. If
found, adversarial examples can be shown to human testers and/or used to
fine-tune the network. We implement the techniques using Z3 and evaluate them
on state-of-the-art networks, including regularised and deep learning networks.
We also compare against existing techniques to search for adversarial examples
and estimate network robustness.
|
Learning Cost-Effective Treatment Regimes using Markov Decision
Processes | Decision makers, such as doctors and judges, make crucial decisions such as
recommending treatments to patients, and granting bails to defendants on a
daily basis. Such decisions typically involve weighting the potential benefits
of taking an action against the costs involved. In this work, we aim to
automate this task of learning \emph{cost-effective, interpretable and
actionable treatment regimes}. We formulate this as a problem of learning a
decision list -- a sequence of if-then-else rules -- which maps characteristics
of subjects (eg., diagnostic test results of patients) to treatments. We
propose a novel objective to construct a decision list which maximizes outcomes
for the population, and minimizes overall costs. We model the problem of
learning such a list as a Markov Decision Process (MDP) and employ a variant of
the Upper Confidence Bound for Trees (UCT) strategy which leverages customized
checks for pruning the search space effectively. Experimental results on real
world observational data capturing judicial bail decisions and treatment
recommendations for asthma patients demonstrate the effectiveness of our
approach.
|
Ranking of classification algorithms in terms of mean-standard deviation
using A-TOPSIS | In classification problems when multiples algorithms are applied to different
benchmarks a difficult issue arises, i.e., how can we rank the algorithms? In
machine learning it is common run the algorithms several times and then a
statistic is calculated in terms of means and standard deviations. In order to
compare the performance of the algorithms, it is very common to employ
statistical tests. However, these tests may also present limitations, since
they consider only the means and not the standard deviations of the obtained
results. In this paper, we present the so called A-TOPSIS, based on TOPSIS
(Technique for Order Preference by Similarity to Ideal Solution), to solve the
problem of ranking and comparing classification algorithms in terms of means
and standard deviations. We use two case studies to illustrate the A-TOPSIS for
ranking classification algorithms and the results show the suitability of
A-TOPSIS to rank the algorithms. The presented approach is general and can be
applied to compare the performance of stochastic algorithms in machine
learning. Finally, to encourage researchers to use the A-TOPSIS for ranking
algorithms we also presented in this work an easy-to-use A-TOPSIS web
framework.
|
Exercise Motion Classification from Large-Scale Wearable Sensor Data
Using Convolutional Neural Networks | The ability to accurately identify human activities is essential for
developing automatic rehabilitation and sports training systems. In this paper,
large-scale exercise motion data obtained from a forearm-worn wearable sensor
are classified with a convolutional neural network (CNN). Time-series data
consisting of accelerometer and orientation measurements are formatted as
images, allowing the CNN to automatically extract discriminative features. A
comparative study on the effects of image formatting and different CNN
architectures is also presented. The best performing configuration classifies
50 gym exercises with 92.1% accuracy.
|
Online Classification with Complex Metrics | We present a framework and analysis of consistent binary classification for
complex and non-decomposable performance metrics such as the F-measure and the
Jaccard measure. The proposed framework is general, as it applies to both batch
and online learning, and to both linear and non-linear models. Our work follows
recent results showing that the Bayes optimal classifier for many complex
metrics is given by a thresholding of the conditional probability of the
positive class. This manuscript extends this thresholding characterization --
showing that the utility is strictly locally quasi-concave with respect to the
threshold for a wide range of models and performance metrics. This, in turn,
motivates simple normalized gradient ascent updates for threshold estimation.
We present a finite-sample regret analysis for the resulting procedure. In
particular, the risk for the batch case converges to the Bayes risk at the same
rate as that of the underlying conditional probability estimation, and the risk
of proposed online algorithm converges at a rate that depends on the
conditional probability estimation risk. For instance, in the special case
where the conditional probability model is logistic regression, our procedure
achieves $O(\frac{1}{\sqrt{n}})$ sample complexity, both for batch and online
training. Empirical evaluation shows that the proposed algorithms out-perform
alternatives in practice, with comparable or better prediction performance and
reduced run time for various metrics and datasets.
|
Cross Device Matching for Online Advertising with Neural Feature
Ensembles : First Place Solution at CIKM Cup 2016 | We describe the 1st place winning approach for the CIKM Cup 2016 Challenge.
In this paper, we provide an approach to reasonably identify same users across
multiple devices based on browsing logs. Our approach regards a candidate
ranking problem as pairwise classification and utilizes an unsupervised neural
feature ensemble approach to learn latent features of users. Combined with
traditional hand crafted features, each user pair feature is fed into a
supervised classifier in order to perform pairwise classification. Lastly, we
propose supervised and unsupervised inference techniques.
|
How to be Fair and Diverse? | Due to the recent cases of algorithmic bias in data-driven decision-making,
machine learning methods are being put under the microscope in order to
understand the root cause of these biases and how to correct them. Here, we
consider a basic algorithmic task that is central in machine learning:
subsampling from a large data set. Subsamples are used both as an end-goal in
data summarization (where fairness could either be a legal, political or moral
requirement) and to train algorithms (where biases in the samples are often a
source of bias in the resulting model). Consequently, there is a growing effort
to modify either the subsampling methods or the algorithms themselves in order
to ensure fairness. However, in doing so, a question that seems to be
overlooked is whether it is possible to produce fair subsamples that are also
adequately representative of the feature space of the data set - an important
and classic requirement in machine learning. Can diversity and fairness be
simultaneously ensured? We start by noting that, in some applications,
guaranteeing one does not necessarily guarantee the other, and a new approach
is required. Subsequently, we present an algorithmic framework which allows us
to produce both fair and diverse samples. Our experimental results on an image
summarization task show marked improvements in fairness without compromising
feature diversity by much, giving us the best of both the worlds.
|
Learning Deep Architectures for Interaction Prediction in
Structure-based Virtual Screening | We introduce a deep learning architecture for structure-based virtual
screening that generates fixed-sized fingerprints of proteins and small
molecules by applying learnable atom convolution and softmax operations to each
compound separately. These fingerprints are further transformed non-linearly,
their inner-product is calculated and used to predict the binding potential.
Moreover, we show that widely used benchmark datasets may be insufficient for
testing structure-based virtual screening methods that utilize machine
learning. Therefore, we introduce a new benchmark dataset, which we constructed
based on DUD-E and PDBBind databases.
|
Representation Learning with Deconvolution for Multivariate Time Series
Classification and Visualization | We propose a new model based on the deconvolutional networks and SAX
discretization to learn the representation for multivariate time series.
Deconvolutional networks fully exploit the advantage the powerful
expressiveness of deep neural networks in the manner of unsupervised learning.
We design a network structure specifically to capture the cross-channel
correlation with deconvolution, forcing the pooling operation to perform the
dimension reduction along each position in the individual channel.
Discretization based on Symbolic Aggregate Approximation is applied on the
feature vectors to further extract the bag of features. We show how this
representation and bag of features helps on classification. A full comparison
with the sequence distance based approach is provided to demonstrate the
effectiveness of our approach on the standard datasets. We further build the
Markov matrix from the discretized representation from the deconvolution to
visualize the time series as complex networks, which show more class-specific
statistical properties and clear structures with respect to different labels.
|
Encoding Temporal Markov Dynamics in Graph for Visualizing and Mining
Time Series | Time series and signals are attracting more attention across statistics,
machine learning and pattern recognition as it appears widely in the industry
especially in sensor and IoT related research and applications, but few
advances has been achieved in effective time series visual analytics and
interaction due to its temporal dimensionality and complex dynamics. Inspired
by recent effort on using network metrics to characterize time series for
classification, we present an approach to visualize time series as complex
networks based on the first order Markov process in its temporal ordering. In
contrast to the classical bar charts, line plots and other statistics based
graph, our approach delivers more intuitive visualization that better preserves
both the temporal dependency and frequency structures. It provides a natural
inverse operation to map the graph back to raw signals, making it possible to
use graph statistics to characterize time series for better visual exploration
and statistical analysis. Our experimental results suggest the effectiveness on
various tasks such as pattern discovery and classification on both synthetic
and the real time series and sensor data.
|
Truncated Variance Reduction: A Unified Approach to Bayesian
Optimization and Level-Set Estimation | We present a new algorithm, truncated variance reduction (TruVaR), that
treats Bayesian optimization (BO) and level-set estimation (LSE) with Gaussian
processes in a unified fashion. The algorithm greedily shrinks a sum of
truncated variances within a set of potential maximizers (BO) or unclassified
points (LSE), which is updated based on confidence bounds. TruVaR is effective
in several important settings that are typically non-trivial to incorporate
into myopic algorithms, including pointwise costs and heteroscedastic noise. We
provide a general theoretical guarantee for TruVaR covering these aspects, and
use it to recover and strengthen existing results on BO and LSE. Moreover, we
provide a new result for a setting where one can select from a number of noise
levels having associated costs. We demonstrate the effectiveness of the
algorithm on both synthetic and real-world data sets.
|
Using Machine Learning to Detect Noisy Neighbors in 5G Networks | 5G networks are expected to be more dynamic and chaotic in their structure
than current networks. With the advent of Network Function Virtualization
(NFV), Network Functions (NF) will no longer be tightly coupled with the
hardware they are running on, which poses new challenges in network management.
Noisy neighbor is a term commonly used to describe situations in NFV
infrastructure where an application experiences degradation in performance due
to the fact that some of the resources it needs are occupied by other
applications in the same cloud node. These situations cannot be easily
identified using straightforward approaches, which calls for the use of
sophisticated methods for NFV infrastructure management. In this paper we
demonstrate how Machine Learning (ML) techniques can be used to identify such
events. Through experiments using data collected at real NFV infrastructure, we
show that standard models for automated classification can detect the noisy
neighbor phenomenon with an accuracy of more than 90% in a simple scenario.
|
A Framework for Parallel and Distributed Training of Neural Networks | The aim of this paper is to develop a general framework for training neural
networks (NNs) in a distributed environment, where training data is partitioned
over a set of agents that communicate with each other through a sparse,
possibly time-varying, connectivity pattern. In such distributed scenario, the
training problem can be formulated as the (regularized) optimization of a
non-convex social cost function, given by the sum of local (non-convex) costs,
where each agent contributes with a single error term defined with respect to
its local dataset. To devise a flexible and efficient solution, we customize a
recently proposed framework for non-convex optimization over networks, which
hinges on a (primal) convexification-decomposition technique to handle
non-convexity, and a dynamic consensus procedure to diffuse information among
the agents. Several typical choices for the training criterion (e.g., squared
loss, cross entropy, etc.) and regularization (e.g., $\ell_2$ norm, sparsity
inducing penalties, etc.) are included in the framework and explored along the
paper. Convergence to a stationary solution of the social non-convex problem is
guaranteed under mild assumptions. Additionally, we show a principled way
allowing each agent to exploit a possible multi-core architecture (e.g., a
local cloud) in order to parallelize its local optimization step, resulting in
strategies that are both distributed (across the agents) and parallel (inside
each agent) in nature. A comprehensive set of experimental results validate the
proposed approach.
|
A Variational Bayesian Approach for Image Restoration. Application to
Image Deblurring with Poisson-Gaussian Noise | In this paper, a methodology is investigated for signal recovery in the
presence of non-Gaussian noise. In contrast with regularized minimization
approaches often adopted in the literature, in our algorithm the regularization
parameter is reliably estimated from the observations. As the posterior density
of the unknown parameters is analytically intractable, the estimation problem
is derived in a variational Bayesian framework where the goal is to provide a
good approximation to the posterior distribution in order to compute posterior
mean estimates. Moreover, a majorization technique is employed to circumvent
the difficulties raised by the intricate forms of the non-Gaussian likelihood
and of the prior density. We demonstrate the potential of the proposed approach
through comparisons with state-of-the-art techniques that are specifically
tailored to signal recovery in the presence of mixed Poisson-Gaussian noise.
Results show that the proposed approach is efficient and achieves performance
comparable with other methods where the regularization parameter is manually
tuned from the ground truth.
|
Nonlinear Adaptive Algorithms on Rank-One Tensor Models | This work proposes a low complexity nonlinearity model and develops adaptive
algorithms over it. The model is based on the decomposable---or rank-one, in
tensor language---Volterra kernels. It may also be described as a product of
FIR filters, which explains its low-complexity. The rank-one model is also
interesting because it comes from a well-posed problem in approximation theory.
The paper uses such model in an estimation theory context to develop an exact
gradient-type algorithm, from which adaptive algorithms such as the least mean
squares (LMS) filter and its data-reuse version---the TRUE-LMS---are derived.
Stability and convergence issues are addressed. The algorithms are then tested
in simulations, which show its good performance when compared to other
nonlinear processing algorithms in the literature.
|
On Multiplicative Multitask Feature Learning | We investigate a general framework of multiplicative multitask feature
learning which decomposes each task's model parameters into a multiplication of
two components. One of the components is used across all tasks and the other
component is task-specific. Several previous methods have been proposed as
special cases of our framework. We study the theoretical properties of this
framework when different regularization conditions are applied to the two
decomposed components. We prove that this framework is mathematically
equivalent to the widely used multitask feature learning methods that are based
on a joint regularization of all model parameters, but with a more general form
of regularizers. Further, an analytical formula is derived for the across-task
component as related to the task-specific component for all these regularizers,
leading to a better understanding of the shrinkage effect. Study of this
framework motivates new multitask learning algorithms. We propose two new
learning formulations by varying the parameters in the proposed framework.
Empirical studies have revealed the relative advantages of the two new
formulations by comparing with the state of the art, which provides instructive
insights into the feature learning problem with multiple tasks.
|
Geometry of Polysemy | Vector representations of words have heralded a transformational approach to
classical problems in NLP; the most popular example is word2vec. However, a
single vector does not suffice to model the polysemous nature of many
(frequent) words, i.e., words with multiple meanings. In this paper, we propose
a three-fold approach for unsupervised polysemy modeling: (a) context
representations, (b) sense induction and disambiguation and (c) lexeme (as a
word and sense pair) representations. A key feature of our work is the finding
that a sentence containing a target word is well represented by a low rank
subspace, instead of a point in a vector space. We then show that the subspaces
associated with a particular sense of the target word tend to intersect over a
line (one-dimensional subspace), which we use to disambiguate senses using a
clustering algorithm that harnesses the Grassmannian geometry of the
representations. The disambiguation algorithm, which we call $K$-Grassmeans,
leads to a procedure to label the different senses of the target word in the
corpus -- yielding lexeme vector representations, all in an unsupervised manner
starting from a large (Wikipedia) corpus in English. Apart from several
prototypical target (word,sense) examples and a host of empirical studies to
intuit and justify the various geometric representations, we validate our
algorithms on standard sense induction and disambiguation datasets and present
new state-of-the-art results.
|
Learning a Probabilistic Latent Space of Object Shapes via 3D
Generative-Adversarial Modeling | We study the problem of 3D object generation. We propose a novel framework,
namely 3D Generative Adversarial Network (3D-GAN), which generates 3D objects
from a probabilistic space by leveraging recent advances in volumetric
convolutional networks and generative adversarial nets. The benefits of our
model are three-fold: first, the use of an adversarial criterion, instead of
traditional heuristic criteria, enables the generator to capture object
structure implicitly and to synthesize high-quality 3D objects; second, the
generator establishes a mapping from a low-dimensional probabilistic space to
the space of 3D objects, so that we can sample objects without a reference
image or CAD models, and explore the 3D object manifold; third, the adversarial
discriminator provides a powerful 3D shape descriptor which, learned without
supervision, has wide applications in 3D object recognition. Experiments
demonstrate that our method generates high-quality 3D objects, and our
unsupervisedly learned features achieve impressive performance on 3D object
recognition, comparable with those of supervised learning methods.
|
A Learned Representation For Artistic Style | The diversity of painting styles represents a rich visual vocabulary for the
construction of an image. The degree to which one may learn and parsimoniously
capture this visual vocabulary measures our understanding of the higher level
features of paintings, if not images in general. In this work we investigate
the construction of a single, scalable deep network that can parsimoniously
capture the artistic style of a diversity of paintings. We demonstrate that
such a network generalizes across a diversity of artistic styles by reducing a
painting to a point in an embedding space. Importantly, this model permits a
user to explore new painting styles by arbitrarily combining the styles learned
from individual paintings. We hope that this work provides a useful step
towards building rich models of paintings and offers a window on to the
structure of the learned representation of artistic style.
|
A Theoretical Analysis of Noisy Sparse Subspace Clustering on
Dimensionality-Reduced Data | Subspace clustering is the problem of partitioning unlabeled data points into
a number of clusters so that data points within one cluster lie approximately
on a low-dimensional linear subspace. In many practical scenarios, the
dimensionality of data points to be clustered are compressed due to constraints
of measurement, computation or privacy. In this paper, we study the theoretical
properties of a popular subspace clustering algorithm named sparse subspace
clustering (SSC) and establish formal success conditions of SSC on
dimensionality-reduced data. Our analysis applies to the most general fully
deterministic model where both underlying subspaces and data points within each
subspace are deterministically positioned, and also a wide range of
dimensionality reduction techniques (e.g., Gaussian random projection, uniform
subsampling, sketching) that fall into a subspace embedding framework (Meng &
Mahoney, 2013; Avron et al., 2014). Finally, we apply our analysis to a
differentially private SSC algorithm and established both privacy and utility
guarantees of the proposed method.
|
Predicting Counterfactuals from Large Historical Data and Small
Randomized Trials | When a new treatment is considered for use, whether a pharmaceutical drug or
a search engine ranking algorithm, a typical question that arises is, will its
performance exceed that of the current treatment? The conventional way to
answer this counterfactual question is to estimate the effect of the new
treatment in comparison to that of the conventional treatment by running a
controlled, randomized experiment. While this approach theoretically ensures an
unbiased estimator, it suffers from several drawbacks, including the difficulty
in finding representative experimental populations as well as the cost of
running such trials. Moreover, such trials neglect the huge quantities of
available control-condition data which are often completely ignored.
In this paper we propose a discriminative framework for estimating the
performance of a new treatment given a large dataset of the control condition
and data from a small (and possibly unrepresentative) randomized trial
comparing new and old treatments. Our objective, which requires minimal
assumptions on the treatments, models the relation between the outcomes of the
different conditions. This allows us to not only estimate mean effects but also
to generate individual predictions for examples outside the randomized sample.
We demonstrate the utility of our approach through experiments in three
areas: Search engine operation, treatments to diabetes patients, and market
value estimation for houses. Our results demonstrate that our approach can
reduce the number and size of the currently performed randomized controlled
experiments, thus saving significant time, money and effort on the part of
practitioners.
|
Surprisal-Driven Zoneout | We propose a novel method of regularization for recurrent neural networks
called suprisal-driven zoneout. In this method, states zoneout (maintain their
previous value rather than updating), when the suprisal (discrepancy between
the last state's prediction and target) is small. Thus regularization is
adaptive and input-driven on a per-neuron basis. We demonstrate the
effectiveness of this idea by achieving state-of-the-art bits per character of
1.31 on the Hutter Prize Wikipedia dataset, significantly reducing the gap to
the best known highly-engineered compression methods.
|
A Bayesian Ensemble for Unsupervised Anomaly Detection | Methods for unsupervised anomaly detection suffer from the fact that the data
is unlabeled, making it difficult to assess the optimality of detection
algorithms. Ensemble learning has shown exceptional results in classification
and clustering problems, but has not seen as much research in the context of
outlier detection. Existing methods focus on combining output scores of
individual detectors, but this leads to outputs that are not easily
interpretable. In this paper, we introduce a theoretical foundation for
combining individual detectors with Bayesian classifier combination. Not only
are posterior distributions easily interpreted as the probability distribution
of anomalies, but bias, variance, and individual error rates of detectors are
all easily obtained. Performance on real-world datasets shows high accuracy
across varied types of time series data.
|
Co-Occuring Directions Sketching for Approximate Matrix Multiply | We introduce co-occurring directions sketching, a deterministic algorithm for
approximate matrix product (AMM), in the streaming model. We show that
co-occuring directions achieves a better error bound for AMM than other
randomized and deterministic approaches for AMM. Co-occurring directions gives
a $1 + \epsilon$ -approximation of the optimal low rank approximation of a
matrix product. Empirically our algorithm outperforms competing methods for
AMM, for a small sketch size. We validate empirically our theoretical findings
and algorithms
|
Distributed and parallel time series feature extraction for industrial
big data applications | The all-relevant problem of feature selection is the identification of all
strongly and weakly relevant attributes. This problem is especially hard to
solve for time series classification and regression in industrial applications
such as predictive maintenance or production line optimization, for which each
label or regression target is associated with several time series and
meta-information simultaneously. Here, we are proposing an efficient, scalable
feature extraction algorithm for time series, which filters the available
features in an early stage of the machine learning pipeline with respect to
their significance for the classification or regression task, while controlling
the expected percentage of selected but irrelevant features. The proposed
algorithm combines established feature extraction methods with a feature
importance filter. It has a low computational complexity, allows to start on a
problem with only limited domain knowledge available, can be trivially
parallelized, is highly scalable and based on well studied non-parametric
hypothesis tests. We benchmark our proposed algorithm on all binary
classification problems of the UCR time series classification archive as well
as time series from a production line optimization project and simulated
stochastic processes with underlying qualitative change of dynamics.
|
Sparse Hierarchical Tucker Factorization and its Application to
Healthcare | We propose a new tensor factorization method, called the Sparse
Hierarchical-Tucker (Sparse H-Tucker), for sparse and high-order data tensors.
Sparse H-Tucker is inspired by its namesake, the classical Hierarchical Tucker
method, which aims to compute a tree-structured factorization of an input data
set that may be readily interpreted by a domain expert. However, Sparse
H-Tucker uses a nested sampling technique to overcome a key scalability problem
in Hierarchical Tucker, which is the creation of an unwieldy intermediate dense
core tensor; the result of our approach is a faster, more space-efficient, and
more accurate method. We extensively test our method on a real healthcare
dataset, which is collected from 30K patients and results in an 18th order
sparse data tensor. Unlike competing methods, Sparse H-Tucker can analyze the
full data set on a single multi-threaded machine. It can also do so more
accurately and in less time than the state-of-the-art: on a 12th order subset
of the input data, Sparse H-Tucker is 18x more accurate and 7.5x faster than a
previously state-of-the-art method. Even for analyzing low order tensors (e.g.,
4-order), our method requires close to an order of magnitude less time and over
two orders of magnitude less memory, as compared to traditional tensor
factorization methods such as CP and Tucker. Moreover, we observe that Sparse
H-Tucker scales nearly linearly in the number of non-zero tensor elements. The
resulting model also provides an interpretable disease hierarchy, which is
confirmed by a clinical expert.
|
Approximate cross-validation formula for Bayesian linear regression | Cross-validation (CV) is a technique for evaluating the ability of
statistical models/learning systems based on a given data set. Despite its wide
applicability, the rather heavy computational cost can prevent its use as the
system size grows. To resolve this difficulty in the case of Bayesian linear
regression, we develop a formula for evaluating the leave-one-out CV error
approximately without actually performing CV. The usefulness of the developed
formula is tested by statistical mechanical analysis for a synthetic model.
This is confirmed by application to a real-world supernova data set as well.
|
Big Models for Big Data using Multi objective averaged one dependence
estimators | Even though, many researchers tried to explore the various possibilities on
multi objective feature selection, still it is yet to be explored with best of
its capabilities in data mining applications rather than going for developing
new ones. In this paper, multi-objective evolutionary algorithm ENORA is used
to select the features in a multi-class classification problem. The fusion of
AnDE (averaged n-dependence estimators) with n=1, a variant of naive Bayes with
efficient feature selection by ENORA is performed in order to obtain a fast
hybrid classifier which can effectively learn from big data. This method aims
at solving the problem of finding optimal feature subset from full data which
at present still remains to be a difficult problem. The efficacy of the
obtained classifier is extensively evaluated with a range of most popular 21
real world dataset, ranging from small to big. The results obtained are
encouraging in terms of time, Root mean square error, zero-one loss and
classification accuracy.
|
Frank-Wolfe Algorithms for Saddle Point Problems | We extend the Frank-Wolfe (FW) optimization algorithm to solve constrained
smooth convex-concave saddle point (SP) problems. Remarkably, the method only
requires access to linear minimization oracles. Leveraging recent advances in
FW optimization, we provide the first proof of convergence of a FW-type saddle
point solver over polytopes, thereby partially answering a 30 year-old
conjecture. We also survey other convergence results and highlight gaps in the
theoretical underpinnings of FW-style algorithms. Motivating applications
without known efficient alternatives are explored through structured prediction
with combinatorial penalties as well as games over matching polytopes involving
an exponential number of constraints.
|
Hybrid clustering-classification neural network in the medical
diagnostics of reactive arthritis | The hybrid clustering-classification neural network is proposed. This network
allows increasing a quality of information processing under the condition of
overlapping classes due to the rational choice of a learning rate parameter and
introducing a special procedure of fuzzy reasoning in the clustering process,
which occurs both with an external learning signal (supervised) and without the
one (unsupervised). As similarity measure neighborhood function or membership
one, cosine structures are used, which allow to provide a high flexibility due
to self-learning-learning process and to provide some new useful properties.
Many realized experiments have confirmed the efficiency of proposed hybrid
clustering-classification neural network; also, this network was used for
solving diagnostics task of reactive arthritis.
|
Generalization Bounds for Weighted Automata | This paper studies the problem of learning weighted automata from a finite
labeled training sample. We consider several general families of weighted
automata defined in terms of three different measures: the norm of an
automaton's weights, the norm of the function computed by an automaton, or the
norm of the corresponding Hankel matrix. We present new data-dependent
generalization guarantees for learning weighted automata expressed in terms of
the Rademacher complexity of these families. We further present upper bounds on
these Rademacher complexities, which reveal key new data-dependent terms
related to the complexity of learning weighted automata.
|
A statistical framework for fair predictive algorithms | Predictive modeling is increasingly being employed to assist human
decision-makers. One purported advantage of replacing human judgment with
computer models in high stakes settings-- such as sentencing, hiring, policing,
college admissions, and parole decisions-- is the perceived "neutrality" of
computers. It is argued that because computer models do not hold personal
prejudice, the predictions they produce will be equally free from prejudice.
There is growing recognition that employing algorithms does not remove the
potential for bias, and can even amplify it, since training data were
inevitably generated by a process that is itself biased. In this paper, we
provide a probabilistic definition of algorithmic bias. We propose a method to
remove bias from predictive models by removing all information regarding
protected variables from the permitted training data. Unlike previous work in
this area, our framework is general enough to accommodate arbitrary data types,
e.g. binary, continuous, etc. Motivated by models currently in use in the
criminal justice system that inform decisions on pre-trial release and
paroling, we apply our proposed method to a dataset on the criminal histories
of individuals at the time of sentencing to produce "race-neutral" predictions
of re-arrest. In the process, we demonstrate that the most common approach to
creating "race-neutral" models-- omitting race as a covariate-- still results
in racially disparate predictions. We then demonstrate that the application of
our proposed method to these data removes racial disparities from predictions
with minimal impact on predictive accuracy.
|
Image Segmentation for Fruit Detection and Yield Estimation in Apple
Orchards | Ground vehicles equipped with monocular vision systems are a valuable source
of high resolution image data for precision agriculture applications in
orchards. This paper presents an image processing framework for fruit detection
and counting using orchard image data. A general purpose image segmentation
approach is used, including two feature learning algorithms; multi-scale
Multi-Layered Perceptrons (MLP) and Convolutional Neural Networks (CNN). These
networks were extended by including contextual information about how the image
data was captured (metadata), which correlates with some of the appearance
variations and/or class distributions observed in the data. The pixel-wise
fruit segmentation output is processed using the Watershed Segmentation (WS)
and Circular Hough Transform (CHT) algorithms to detect and count individual
fruits. Experiments were conducted in a commercial apple orchard near
Melbourne, Australia. The results show an improvement in fruit segmentation
performance with the inclusion of metadata on the previously benchmarked MLP
network. We extend this work with CNNs, bringing agrovision closer to the
state-of-the-art in computer vision, where although metadata had negligible
influence, the best pixel-wise F1-score of $0.791$ was achieved. The WS
algorithm produced the best apple detection and counting results, with a
detection F1-score of $0.858$. As a final step, image fruit counts were
accumulated over multiple rows at the orchard and compared against the
post-harvest fruit counts that were obtained from a grading and counting
machine. The count estimates using CNN and WS resulted in the best performance
for this dataset, with a squared correlation coefficient of $r^2=0.826$.
|
Socratic Learning: Augmenting Generative Models to Incorporate Latent
Subsets in Training Data | A challenge in training discriminative models like neural networks is
obtaining enough labeled training data. Recent approaches use generative models
to combine weak supervision sources, like user-defined heuristics or knowledge
bases, to label training data. Prior work has explored learning accuracies for
these sources even without ground truth labels, but they assume that a single
accuracy parameter is sufficient to model the behavior of these sources over
the entire training set. In particular, they fail to model latent subsets in
the training data in which the supervision sources perform differently than on
average. We present Socratic learning, a paradigm that uses feedback from a
corresponding discriminative model to automatically identify these subsets and
augments the structure of the generative model accordingly. Experimentally, we
show that without any ground truth labels, the augmented generative model
reduces error by up to 56.06% for a relation extraction task compared to a
state-of-the-art weak supervision technique that utilizes generative models.
|
Fast Bayesian Non-Negative Matrix Factorisation and Tri-Factorisation | We present a fast variational Bayesian algorithm for performing non-negative
matrix factorisation and tri-factorisation. We show that our approach achieves
faster convergence per iteration and timestep (wall-clock) than Gibbs sampling
and non-probabilistic approaches, and do not require additional samples to
estimate the posterior. We show that in particular for matrix tri-factorisation
convergence is difficult, but our variational Bayesian approach offers a fast
solution, allowing the tri-factorisation approach to be used more effectively.
|
Automatic measurement of vowel duration via structured prediction | A key barrier to making phonetic studies scalable and replicable is the need
to rely on subjective, manual annotation. To help meet this challenge, a
machine learning algorithm was developed for automatic measurement of a widely
used phonetic measure: vowel duration. Manually-annotated data were used to
train a model that takes as input an arbitrary length segment of the acoustic
signal containing a single vowel that is preceded and followed by consonants
and outputs the duration of the vowel. The model is based on the structured
prediction framework. The input signal and a hypothesized set of a vowel's
onset and offset are mapped to an abstract vector space by a set of acoustic
feature functions. The learning algorithm is trained in this space to minimize
the difference in expectations between predicted and manually-measured vowel
durations. The trained model can then automatically estimate vowel durations
without phonetic or orthographic transcription. Results comparing the model to
three sets of manually annotated data suggest it out-performed the current gold
standard for duration measurement, an HMM-based forced aligner (which requires
orthographic or phonetic transcription as an input).
|
Word Embeddings and Their Use In Sentence Classification Tasks | This paper have two parts. In the first part we discuss word embeddings. We
discuss the need for them, some of the methods to create them, and some of
their interesting properties. We also compare them to image embeddings and see
how word embedding and image embedding can be combined to perform different
tasks. In the second part we implement a convolutional neural network trained
on top of pre-trained word vectors. The network is used for several
sentence-level classification tasks, and achieves state-of-art (or comparable)
results, demonstrating the great power of pre-trainted word embeddings over
random ones.
|
Things Bayes can't do | The problem of forecasting conditional probabilities of the next event given
the past is considered in a general probabilistic setting. Given an arbitrary
(large, uncountable) set C of predictors, we would like to construct a single
predictor that performs asymptotically as well as the best predictor in C, on
any data. Here we show that there are sets C for which such predictors exist,
but none of them is a Bayesian predictor with a prior concentrated on C. In
other words, there is a predictor with sublinear regret, but every Bayesian
predictor must have a linear regret. This negative finding is in sharp contrast
with previous results that establish the opposite for the case when one of the
predictors in $C$ achieves asymptotically vanishing error. In such a case, if
there is a predictor that achieves asymptotically vanishing error for any
measure in C, then there is a Bayesian predictor that also has this property,
and whose prior is concentrated on (a countable subset of) C.
|
Universality of Bayesian mixture predictors | The problem is that of sequential probability forecasting for finite-valued
time series. The data is generated by an unknown probability distribution over
the space of all one-way infinite sequences. It is known that this measure
belongs to a given set C, but the latter is completely arbitrary (uncountably
infinite, without any structure given). The performance is measured with
asymptotic average log loss. In this work it is shown that the minimax
asymptotic performance is always attainable, and it is attained by a convex
combination of a countably many measures from the set C (a Bayesian mixture).
This was previously only known for the case when the best achievable asymptotic
error is 0. This also contrasts previous results that show that in the
non-realizable case all Bayesian mixtures may be suboptimal, while there is a
predictor that achieves the optimal performance.
|
An Improved Approach for Prediction of Parkinson's Disease using Machine
Learning Techniques | Parkinson's disease (PD) is one of the major public health problems in the
world. It is a well-known fact that around one million people suffer from
Parkinson's disease in the United States whereas the number of people suffering
from Parkinson's disease worldwide is around 5 million. Thus, it is important
to predict Parkinson's disease in early stages so that early plan for the
necessary treatment can be made. People are mostly familiar with the motor
symptoms of Parkinson's disease, however, an increasing amount of research is
being done to predict the Parkinson's disease from non-motor symptoms that
precede the motor ones. If an early and reliable prediction is possible then a
patient can get a proper treatment at the right time. Nonmotor symptoms
considered are Rapid Eye Movement (REM) sleep Behaviour Disorder (RBD) and
olfactory loss. Developing machine learning models that can help us in
predicting the disease can play a vital role in early prediction. In this
paper, we extend a work which used the non-motor features such as RBD and
olfactory loss. Along with this the extended work also uses important
biomarkers. In this paper, we try to model this classifier using different
machine learning models that have not been used before. We developed automated
diagnostic models using Multilayer Perceptron, BayesNet, Random Forest and
Boosted Logistic Regression. It has been observed that Boosted Logistic
Regression provides the best performance with an impressive accuracy of 97.159
% and the area under the ROC curve was 98.9%. Thus, it is concluded that these
models can be used for early prediction of Parkinson's disease.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.