title
stringlengths 7
246
| abstract
stringlengths 6
3.31k
|
---|---|
Boosting the Actor with Dual Critic | This paper proposes a new actor-critic-style algorithm called Dual
Actor-Critic or Dual-AC. It is derived in a principled way from the Lagrangian
dual form of the Bellman optimality equation, which can be viewed as a
two-player game between the actor and a critic-like function, which is named as
dual critic. Compared to its actor-critic relatives, Dual-AC has the desired
property that the actor and dual critic are updated cooperatively to optimize
the same objective function, providing a more transparent way for learning the
critic that is directly related to the objective function of the actor. We then
provide a concrete algorithm that can effectively solve the minimax
optimization problem, using techniques of multi-step bootstrapping, path
regularization, and stochastic dual ascent algorithm. We demonstrate that the
proposed algorithm achieves the state-of-the-art performances across several
benchmarks.
|
SBEED: Convergent Reinforcement Learning with Nonlinear Function
Approximation | When function approximation is used, solving the Bellman optimality equation
with stability guarantees has remained a major open problem in reinforcement
learning for decades. The fundamental difficulty is that the Bellman operator
may become an expansion in general, resulting in oscillating and even divergent
behavior of popular algorithms like Q-learning. In this paper, we revisit the
Bellman equation, and reformulate it into a novel primal-dual optimization
problem using Nesterov's smoothing technique and the Legendre-Fenchel
transformation. We then develop a new algorithm, called Smoothed Bellman Error
Embedding, to solve this optimization problem where any differentiable function
class may be used. We provide what we believe to be the first convergence
guarantee for general nonlinear function approximation, and analyze the
algorithm's sample complexity. Empirically, our algorithm compares favorably to
state-of-the-art baselines in several benchmark control problems.
|
Non-negative Matrix Factorization: Robust Extraction of Extended
Structures | We apply the vectorized Non-negative Matrix Factorization (NMF) method to
post-processing of direct imaging data for exoplanetary systems such as
circumstellar disks. NMF is an iterative approach, which first creates a
non-orthogonal and non-negative basis of components using given reference
images, then models a target with the components. The constructed model is then
rescaled with a factor to compensate for the contribution from a disk. We
compare NMF with existing methods (classical reference differential imaging
method, and the Karhunen-Lo\`eve image projection algorithm) using synthetic
circumstellar disks, and demonstrate the superiority of NMF: with no need for
prior selection of references, NMF can detect fainter circumstellar disks,
better preserve low order disk morphology, and does not require forward
modeling. As an application to a well-known disk example, we process the
archival Hubble Space Telescope (HST) STIS coronagraphic observations of
HD~181327 with different methods and compare them. NMF is able to extract some
circumstellar material inside the primary ring for the first time. In the
appendix, we mathematically investigate the stability of NMF components during
iteration, and the linearity of NMF modeling.
|
CaloGAN: Simulating 3D High Energy Particle Showers in Multi-Layer
Electromagnetic Calorimeters with Generative Adversarial Networks | The precise modeling of subatomic particle interactions and propagation
through matter is paramount for the advancement of nuclear and particle physics
searches and precision measurements. The most computationally expensive step in
the simulation pipeline of a typical experiment at the Large Hadron Collider
(LHC) is the detailed modeling of the full complexity of physics processes that
govern the motion and evolution of particle showers inside calorimeters. We
introduce \textsc{CaloGAN}, a new fast simulation technique based on generative
adversarial networks (GANs). We apply these neural networks to the modeling of
electromagnetic showers in a longitudinally segmented calorimeter, and achieve
speedup factors comparable to or better than existing full simulation
techniques on CPU ($100\times$-$1000\times$) and even faster on GPU (up to
$\sim10^5\times$). There are still challenges for achieving precision across
the entire phase space, but our solution can reproduce a variety of geometric
shower shape properties of photons, positrons and charged pions. This
represents a significant stepping stone toward a full neural network-based
detector simulation that could save significant computing time and enable many
analyses now and in the future.
|
A Deep Belief Network Based Machine Learning System for Risky Host
Detection | To assure cyber security of an enterprise, typically SIEM (Security
Information and Event Management) system is in place to normalize security
event from different preventive technologies and flag alerts. Analysts in the
security operation center (SOC) investigate the alerts to decide if it is truly
malicious or not. However, generally the number of alerts is overwhelming with
majority of them being false positive and exceeding the SOC's capacity to
handle all alerts. There is a great need to reduce the false positive rate as
much as possible. While most previous research focused on network intrusion
detection, we focus on risk detection and propose an intelligent Deep Belief
Network machine learning system. The system leverages alert information,
various security logs and analysts' investigation results in a real enterprise
environment to flag hosts that have high likelihood of being compromised. Text
mining and graph based method are used to generate targets and create features
for machine learning. In the experiment, Deep Belief Network is compared with
other machine learning algorithms, including multi-layer neural network, random
forest, support vector machine and logistic regression. Results on real
enterprise data indicate that the deep belief network machine learning system
performs better than other algorithms for our problem and is six times more
effective than current rule-based system. We also implement the whole system
from data collection, label creation, feature engineering to host score
generation in a real enterprise production environment.
|
f-Divergence constrained policy improvement | To ensure stability of learning, state-of-the-art generalized policy
iteration algorithms augment the policy improvement step with a trust region
constraint bounding the information loss. The size of the trust region is
commonly determined by the Kullback-Leibler (KL) divergence, which not only
captures the notion of distance well but also yields closed-form solutions. In
this paper, we consider a more general class of f-divergences and derive the
corresponding policy update rules. The generic solution is expressed through
the derivative of the convex conjugate function to f and includes the KL
solution as a special case. Within the class of f-divergences, we further focus
on a one-parameter family of $\alpha$-divergences to study effects of the
choice of divergence on policy improvement. Previously known as well as new
policy updates emerge for different values of $\alpha$. We show that every type
of policy update comes with a compatible policy evaluation resulting from the
chosen f-divergence. Interestingly, the mean-squared Bellman error minimization
is closely related to policy evaluation with the Pearson $\chi^2$-divergence
penalty, while the KL divergence results in the soft-max policy update and a
log-sum-exp critic. We carry out asymptotic analysis of the solutions for
different values of $\alpha$ and demonstrate the effects of using different
divergence functions on a multi-armed bandit problem and on common standard
reinforcement learning problems.
|
Dendritic error backpropagation in deep cortical microcircuits | Animal behaviour depends on learning to associate sensory stimuli with the
desired motor command. Understanding how the brain orchestrates the necessary
synaptic modifications across different brain areas has remained a longstanding
puzzle. Here, we introduce a multi-area neuronal network model in which
synaptic plasticity continuously adapts the network towards a global desired
output. In this model synaptic learning is driven by a local dendritic
prediction error that arises from a failure to predict the top-down input given
the bottom-up activities. Such errors occur at apical dendrites of pyramidal
neurons where both long-range excitatory feedback and local inhibitory
predictions are integrated. When local inhibition fails to match excitatory
feedback an error occurs which triggers plasticity at bottom-up synapses at
basal dendrites of the same pyramidal neurons. We demonstrate the learning
capabilities of the model in a number of tasks and show that it approximates
the classical error backpropagation algorithm. Finally, complementing this
cortical circuit with a disinhibitory mechanism enables attention-like stimulus
denoising and generation. Our framework makes several experimental predictions
on the function of dendritic integration and cortical microcircuits, is
consistent with recent observations of cross-area learning, and suggests a
biological implementation of deep learning.
|
Learning Structural Weight Uncertainty for Sequential Decision-Making | Learning probability distributions on the weights of neural networks (NNs)
has recently proven beneficial in many applications. Bayesian methods, such as
Stein variational gradient descent (SVGD), offer an elegant framework to reason
about NN model uncertainty. However, by assuming independent Gaussian priors
for the individual NN weights (as often applied), SVGD does not impose prior
knowledge that there is often structural information (dependence) among
weights. We propose efficient posterior learning of structural weight
uncertainty, within an SVGD framework, by employing matrix variate Gaussian
priors on NN parameters. We further investigate the learned structural
uncertainty in sequential decision-making problems, including contextual
bandits and reinforcement learning. Experiments on several synthetic and real
datasets indicate the superiority of our model, compared with state-of-the-art
methods.
|
Towards automated patient data cleaning using deep learning: A
feasibility study on the standardization of organ labeling | Data cleaning consumes about 80% of the time spent on data analysis for
clinical research projects. This is a much bigger problem in the era of big
data and machine learning in the field of medicine where large volumes of data
are being generated. We report an initial effort towards automated patient data
cleaning using deep learning: the standardization of organ labeling in
radiation therapy. Organs are often labeled inconsistently at different
institutions (sometimes even within the same institution) and at different time
periods, which poses a problem for clinical research, especially for
multi-institutional collaborative clinical research where the acquired patient
data is not being used effectively. We developed a convolutional neural network
(CNN) to automatically identify each organ in the CT image and then label it
with the standardized nomenclature presented at AAPM Task Group 263. We tested
this model on the CT images of 54 patients with prostate and 100 patients with
head and neck cancer who previously received radiation therapy. The model
achieved 100% accuracy in detecting organs and assigning standardized labels
for the patients tested. This work shows the feasibility of using deep learning
in patient data cleaning that enables standardized datasets to be generated for
effective intra- and interinstitutional collaborative clinical research.
|
Parameter-free online learning via model selection | We introduce an efficient algorithmic framework for model selection in online
learning, also known as parameter-free online learning. Departing from previous
work, which has focused on highly structured function classes such as nested
balls in Hilbert space, we propose a generic meta-algorithm framework that
achieves online model selection oracle inequalities under minimal structural
assumptions. We give the first computationally efficient parameter-free
algorithms that work in arbitrary Banach spaces under mild smoothness
assumptions; previous results applied only to Hilbert spaces. We further derive
new oracle inequalities for matrix classes, non-nested convex sets, and
$\mathbb{R}^{d}$ with generic regularizers. Finally, we generalize these
results by providing oracle inequalities for arbitrary non-linear classes in
the online supervised learning model. These results are all derived through a
unified meta-algorithm scheme using a novel "multi-scale" algorithm for
prediction with expert advice based on random playout, which may be of
independent interest.
|
Community Detection in Partially Observable Social Networks | The discovery of community structures in social networks has gained
significant attention since it is a fundamental problem in understanding the
networks' topology and functions. However, most social network data are
collected from partially observable networks with both missing nodes and edges.
In this paper, we address a new problem of detecting overlapping community
structures in the context of such an incomplete network, where communities in
the network are allowed to overlap since nodes belong to multiple communities
at once. To solve this problem, we introduce KroMFac, a new framework that
conducts community detection via regularized nonnegative matrix factorization
(NMF) based on the Kronecker graph model. Specifically, from an inferred
Kronecker generative parameter matrix, we first estimate the missing part of
the network. As our major contribution to the proposed framework, to improve
community detection accuracy, we then characterize and select influential nodes
(which tend to have high degrees) by ranking, and add them to the existing
graph. Finally, we uncover the community structures by solving the regularized
NMF-aided optimization problem in terms of maximizing the likelihood of the
underlying graph. Furthermore, adopting normalized mutual information (NMI), we
empirically show superiority of our KroMFac approach over two baseline schemes
by using both synthetic and real-world networks.
|
PAC-Bayesian Margin Bounds for Convolutional Neural Networks | Recently the generalization error of deep neural networks has been analyzed
through the PAC-Bayesian framework, for the case of fully connected layers. We
adapt this approach to the convolutional setting.
|
Theory of Deep Learning III: explaining the non-overfitting puzzle | A main puzzle of deep networks revolves around the absence of overfitting
despite large overparametrization and despite the large capacity demonstrated
by zero training error on randomly labeled data. In this note, we show that the
dynamics associated to gradient descent minimization of nonlinear networks is
topologically equivalent, near the asymptotically stable minima of the
empirical error, to linear gradient system in a quadratic potential with a
degenerate (for square loss) or almost degenerate (for logistic or crossentropy
loss) Hessian. The proposition depends on the qualitative theory of dynamical
systems and is supported by numerical results. Our main propositions extend to
deep nonlinear networks two properties of gradient descent for linear networks,
that have been recently established (1) to be key to their generalization
properties: 1. Gradient descent enforces a form of implicit regularization
controlled by the number of iterations, and asymptotically converges to the
minimum norm solution for appropriate initial conditions of gradient descent.
This implies that there is usually an optimum early stopping that avoids
overfitting of the loss. This property, valid for the square loss and many
other loss functions, is relevant especially for regression. 2. For
classification, the asymptotic convergence to the minimum norm solution implies
convergence to the maximum margin solution which guarantees good classification
error for "low noise" datasets. This property holds for loss functions such as
the logistic and cross-entropy loss independently of the initial conditions.
The robustness to overparametrization has suggestive implications for the
robustness of the architecture of deep convolutional networks with respect to
the curse of dimensionality.
|
Deep Reinforcement Learning for List-wise Recommendations | Recommender systems play a crucial role in mitigating the problem of
information overload by suggesting users' personalized items or services. The
vast majority of traditional recommender systems consider the recommendation
procedure as a static process and make recommendations following a fixed
strategy. In this paper, we propose a novel recommender system with the
capability of continuously improving its strategies during the interactions
with users. We model the sequential interactions between users and a
recommender system as a Markov Decision Process (MDP) and leverage
Reinforcement Learning (RL) to automatically learn the optimal strategies via
recommending trial-and-error items and receiving reinforcements of these items
from users' feedbacks. In particular, we introduce an online user-agent
interacting environment simulator, which can pre-train and evaluate model
parameters offline before applying the model online. Moreover, we validate the
importance of list-wise recommendations during the interactions between users
and agent, and develop a novel approach to incorporate them into the proposed
framework LIRD for list-wide recommendations. The experimental results based on
a real-world e-commerce dataset demonstrate the effectiveness of the proposed
framework.
|
Using Deep Neural Network Approximate Bayesian Network | We present a new method to approximate posterior probabilities of Bayesian
Network using Deep Neural Network. Experiment results on several public
Bayesian Network datasets shows that Deep Neural Network is capable of learning
joint probability distri- bution of Bayesian Network by learning from a few
observation and posterior probability distribution pairs with high accuracy.
Compared with traditional approximate method likelihood weighting sampling
algorithm, our method is much faster and gains higher accuracy in medium sized
Bayesian Network. Another advantage of our method is that our method can be
parallelled much easier in GPU without extra effort. We also ex- plored the
connection between the accuracy of our model and the number of training
examples. The result shows that our model saturate as the number of training
examples grow and we don't need many training examples to get reasonably good
result. Another contribution of our work is that we have shown discriminative
model like Deep Neural Network can approximate generative model like Bayesian
Network.
|
Restricted Boltzmann Machines for Robust and Fast Latent Truth Discovery | We address the problem of latent truth discovery, LTD for short, where the
goal is to discover the underlying true values of entity attributes in the
presence of noisy, conflicting or incomplete information. Despite a multitude
of algorithms to address the LTD problem that can be found in literature, only
little is known about their overall performance with respect to effectiveness
(in terms of truth discovery capabilities), efficiency and robustness. A
practical LTD approach should satisfy all these characteristics so that it can
be applied to heterogeneous datasets of varying quality and degrees of
cleanliness.
We propose a novel algorithm for LTD that satisfies the above requirements.
The proposed model is based on Restricted Boltzmann Machines, thus coined
LTD-RBM. In extensive experiments on various heterogeneous and publicly
available datasets, LTD-RBM is superior to state-of-the-art LTD techniques in
terms of an overall consideration of effectiveness, efficiency and robustness.
|
Learning Relevant Features of Data with Multi-scale Tensor Networks | Inspired by coarse-graining approaches used in physics, we show how similar
algorithms can be adapted for data. The resulting algorithms are based on
layered tree tensor networks and scale linearly with both the dimension of the
input and the training set size. Computing most of the layers with an
unsupervised algorithm, then optimizing just the top layer for supervised
classification of the MNIST and fashion-MNIST data sets gives very good
results. We also discuss mixing a prior guess for supervised weights together
with an unsupervised representation of the data, yielding a smaller number of
features nevertheless able to give good performance.
|
Towards Building an Intelligent Anti-Malware System: A Deep Learning
Approach using Support Vector Machine (SVM) for Malware Classification | Effective and efficient mitigation of malware is a long-time endeavor in the
information security community. The development of an anti-malware system that
can counteract an unknown malware is a prolific activity that may benefit
several sectors. We envision an intelligent anti-malware system that utilizes
the power of deep learning (DL) models. Using such models would enable the
detection of newly-released malware through mathematical generalization. That
is, finding the relationship between a given malware $x$ and its corresponding
malware family $y$, $f: x \mapsto y$. To accomplish this feat, we used the
Malimg dataset (Nataraj et al., 2011) which consists of malware images that
were processed from malware binaries, and then we trained the following DL
models 1 to classify each malware family: CNN-SVM (Tang, 2013), GRU-SVM
(Agarap, 2017), and MLP-SVM. Empirical evidence has shown that the GRU-SVM
stands out among the DL models with a predictive accuracy of ~84.92%. This
stands to reason for the mentioned model had the relatively most sophisticated
architecture design among the presented models. The exploration of an even more
optimal DL-SVM model is the next stage towards the engineering of an
intelligent anti-malware system.
|
ZOOpt: Toolbox for Derivative-Free Optimization | Recent advances in derivative-free optimization allow efficient approximation
of the global-optimal solutions of sophisticated functions, such as functions
with many local optima, non-differentiable and non-continuous functions. This
article describes the ZOOpt (Zeroth Order Optimization) toolbox that provides
efficient derivative-free solvers and is designed easy to use. ZOOpt provides
single-machine parallel optimization on the basis of python core and
multi-machine distributed optimization for time-consuming tasks by
incorporating with the Ray framework -- a famous platform for building
distributed applications. ZOOpt particularly focuses on optimization problems
in machine learning, addressing high-dimensional and noisy problems such as
hyper-parameter tuning and direct policy search. The toolbox is maintained
toward a ready-to-use tool in real-world machine learning tasks.
|
Error-Robust Multi-View Clustering | In the era of big data, data may come from multiple sources, known as
multi-view data. Multi-view clustering aims at generating better clusters by
exploiting complementary and consistent information from multiple views rather
than relying on the individual view. Due to inevitable system errors caused by
data-captured sensors or others, the data in each view may be erroneous.
Various types of errors behave differently and inconsistently in each view.
More precisely, error could exhibit as noise and corruptions in reality.
Unfortunately, none of the existing multi-view clustering approaches handle all
of these error types. Consequently, their clustering performance is
dramatically degraded. In this paper, we propose a novel Markov chain method
for Error-Robust Multi-View Clustering (EMVC). By decomposing each view into a
shared transition probability matrix and error matrix and imposing structured
sparsity-inducing norms on error matrices, we characterize and handle typical
types of errors explicitly. To solve the challenging optimization problem, we
propose a new efficient algorithm based on Augmented Lagrangian Multipliers and
prove its convergence rigorously. Experimental results on various synthetic and
real-world datasets show the superiority of the proposed EMVC method over the
baseline methods and its robustness against different types of errors.
|
Theoretical Analysis of Sparse Subspace Clustering with Missing Entries | Sparse Subspace Clustering (SSC) is a popular unsupervised machine learning
method for clustering data lying close to an unknown union of low-dimensional
linear subspaces; a problem with numerous applications in pattern recognition
and computer vision. Even though the behavior of SSC for complete data is by
now well-understood, little is known about its theoretical properties when
applied to data with missing entries. In this paper we give theoretical
guarantees for SSC with incomplete data, and analytically establish that
projecting the zero-filled data onto the observation pattern of the point being
expressed leads to a substantial improvement in performance. The main insight
that stems from our analysis is that even though the projection induces
additional missing entries, this is counterbalanced by the fact that the
projected and zero-filled data are in effect incomplete points associated with
the union of the corresponding projected subspaces, with respect to which the
point being expressed is complete. The significance of this phenomenon
potentially extends to the entire class of self-expressive methods.
|
MACRO: A Meta-Algorithm for Conditional Risk Minimization | We study conditional risk minimization (CRM), i.e. the problem of learning a
hypothesis of minimal risk for prediction at the next step of sequentially
arriving dependent data. Despite it being a fundamental problem, successful
learning in the CRM sense has so far only been demonstrated using theoretical
algorithms that cannot be used for real problems as they would require storing
all incoming data. In this work, we introduce MACRO, a meta-algorithm for CRM
that does not suffer from this shortcoming, but nevertheless offers learning
guarantees. Instead of storing all data it maintains and iteratively updates a
set of learning subroutines. With suitable approximations, MACRO applied to
real data, yielding improved prediction performance compared to traditional
non-conditional learning.
|
Accelerating Deep Learning with Memcomputing | Restricted Boltzmann machines (RBMs) and their extensions, called
'deep-belief networks', are powerful neural networks that have found
applications in the fields of machine learning and artificial intelligence. The
standard way to training these models resorts to an iterative unsupervised
procedure based on Gibbs sampling, called 'contrastive divergence' (CD), and
additional supervised tuning via back-propagation. However, this procedure has
been shown not to follow any gradient and can lead to suboptimal solutions. In
this paper, we show an efficient alternative to CD by means of simulations of
digital memcomputing machines (DMMs). We test our approach on pattern
recognition using a modified version of the MNIST data set. DMMs sample
effectively the vast phase space given by the model distribution of the RBM,
and provide a very good approximation close to the optimum. This efficient
search significantly reduces the number of pretraining iterations necessary to
achieve a given level of accuracy, as well as a total performance gain over CD.
In fact, the acceleration of pretraining achieved by simulating DMMs is
comparable to, in number of iterations, the recently reported hardware
application of the quantum annealing method on the same network and data set.
Notably, however, DMMs perform far better than the reported quantum annealing
results in terms of quality of the training. We also compare our method to
advances in supervised training, like batch-normalization and rectifiers, that
work to reduce the advantage of pretraining. We find that the memcomputing
method still maintains a quality advantage ($>1\%$ in accuracy, and a $20\%$
reduction in error rate) over these approaches. Furthermore, our method is
agnostic about the connectivity of the network. Therefore, it can be extended
to train full Boltzmann machines, and even deep networks at once.
|
Local Causal States and Discrete Coherent Structures | Coherent structures form spontaneously in nonlinear spatiotemporal systems
and are found at all spatial scales in natural phenomena from laboratory
hydrodynamic flows and chemical reactions to ocean, atmosphere, and planetary
climate dynamics. Phenomenologically, they appear as key components that
organize the macroscopic behaviors in such systems. Despite a century of
effort, they have eluded rigorous analysis and empirical prediction, with
progress being made only recently. As a step in this, we present a formal
theory of coherent structures in fully-discrete dynamical field theories. It
builds on the notion of structure introduced by computational mechanics,
generalizing it to a local spatiotemporal setting. The analysis' main tool
employs the \localstates, which are used to uncover a system's hidden
spatiotemporal symmetries and which identify coherent structures as
spatially-localized deviations from those symmetries. The approach is
behavior-driven in the sense that it does not rely on directly analyzing
spatiotemporal equations of motion, rather it considers only the spatiotemporal
fields a system generates. As such, it offers an unsupervised approach to
discover and describe coherent structures. We illustrate the approach by
analyzing coherent structures generated by elementary cellular automata,
comparing the results with an earlier, dynamic-invariant-set approach that
decomposes fields into domains, particles, and particle interactions.
|
A Machine Learning Approach to Adaptive Covariance Localization | Data assimilation plays a key role in large-scale atmospheric weather
forecasting, where the state of the physical system is estimated from model
outputs and observations, and is then used as initial condition to produce
accurate future forecasts. The Ensemble Kalman Filter (EnKF) provides a
practical implementation of the statistical solution of the data assimilation
problem and has gained wide popularity as. This success can be attributed to
its simple formulation and ease of implementation. EnKF is a Monte-Carlo
algorithm that solves the data assimilation problem by sampling the probability
distributions involved in Bayes theorem. Because of this, all flavors of EnKF
are fundamentally prone to sampling errors when the ensemble size is small. In
typical weather forecasting applications, the model state space has dimension
$10^{9}-10^{12}$, while the ensemble size typically ranges between $30-100$
members. Sampling errors manifest themselves as long-range spurious
correlations and have been shown to cause filter divergence. To alleviate this
effect covariance localization dampens spurious correlations between state
variables located at a large distance in the physical space, via an empirical
distance-dependent function. The quality of the resulting analysis and forecast
is greatly influenced by the choice of the localization function parameters,
e.g., the radius of influence. The localization radius is generally tuned
empirically to yield desirable results.This work, proposes two adaptive
algorithms for covariance localization in the EnKF framework, both based on a
machine learning approach. The first algorithm adapts the localization radius
in time, while the second algorithm tunes the localization radius in both time
and space. Numerical experiments carried out with the Lorenz-96 model, and a
quasi-geostrophic model, reveal the potential of the proposed machine learning
approaches.
|
Co-Clustering via Information-Theoretic Markov Aggregation | We present an information-theoretic cost function for co-clustering, i.e.,
for simultaneous clustering of two sets based on similarities between their
elements. By constructing a simple random walk on the corresponding bipartite
graph, our cost function is derived from a recently proposed generalized
framework for information-theoretic Markov chain aggregation. The goal of our
cost function is to minimize relevant information loss, hence it connects to
the information bottleneck formalism. Moreover, via the connection to Markov
aggregation, our cost function is not ad hoc, but inherits its justification
from the operational qualities associated with the corresponding Markov
aggregation problem. We furthermore show that, for appropriate parameter
settings, our cost function is identical to well-known approaches from the
literature, such as Information-Theoretic Co-Clustering of Dhillon et al.
Hence, understanding the influence of this parameter admits a deeper
understanding of the relationship between previously proposed
information-theoretic cost functions. We highlight some strengths and
weaknesses of the cost function for different parameters. We also illustrate
the performance of our cost function, optimized with a simple sequential
heuristic, on several synthetic and real-world data sets, including the
Newsgroup20 and the MovieLens100k data sets.
|
Deep Learning: A Critical Appraisal | Although deep learning has historical roots going back decades, neither the
term "deep learning" nor the approach was popular just over five years ago,
when the field was reignited by papers such as Krizhevsky, Sutskever and
Hinton's now classic (2012) deep network model of Imagenet. What has the field
discovered in the five subsequent years? Against a background of considerable
progress in areas such as speech recognition, image recognition, and game
playing, and considerable enthusiasm in the popular press, I present ten
concerns for deep learning, and suggest that deep learning must be supplemented
by other techniques if we are to reach artificial general intelligence.
|
Character-level Recurrent Neural Networks in Practice: Comparing
Training and Sampling Schemes | Recurrent neural networks are nowadays successfully used in an abundance of
applications, going from text, speech and image processing to recommender
systems. Backpropagation through time is the algorithm that is commonly used to
train these networks on specific tasks. Many deep learning frameworks have
their own implementation of training and sampling procedures for recurrent
neural networks, while there are in fact multiple other possibilities to choose
from and other parameters to tune. In existing literature this is very often
overlooked or ignored. In this paper we therefore give an overview of possible
training and sampling schemes for character-level recurrent neural networks to
solve the task of predicting the next token in a given sequence. We test these
different schemes on a variety of datasets, neural network architectures and
parameter settings, and formulate a number of take-home recommendations. The
choice of training and sampling scheme turns out to be subject to a number of
trade-offs, such as training stability, sampling time, model performance and
implementation effort, but is largely independent of the data. Perhaps the most
surprising result is that transferring hidden states for correctly initializing
the model on subsequences often leads to unstable training behavior depending
on the dataset.
|
High Dimensional Spaces, Deep Learning and Adversarial Examples | In this paper, we analyze deep learning from a mathematical point of view and
derive several novel results. The results are based on intriguing mathematical
properties of high dimensional spaces. We first look at perturbation based
adversarial examples and show how they can be understood using topological and
geometrical arguments in high dimensions. We point out mistake in an argument
presented in prior published literature, and we present a more rigorous,
general and correct mathematical result to explain adversarial examples in
terms of topology of image manifolds. Second, we look at optimization
landscapes of deep neural networks and examine the number of saddle points
relative to that of local minima. Third, we show how multiresolution nature of
images explains perturbation based adversarial examples in form of a stronger
result. Our results state that expectation of $L_2$-norm of adversarial
perturbations is $O\left(\frac{1}{\sqrt{n}}\right)$ and therefore shrinks to 0
as image resolution $n$ becomes arbitrarily large. Finally, by incorporating
the parts-whole manifold learning hypothesis for natural images, we investigate
the working of deep neural networks and root causes of adversarial examples and
discuss how future improvements can be made and how adversarial examples can be
eliminated.
|
Network-Scale Traffic Modeling and Forecasting with Graphical Lasso and
Neural Networks | Traffic flow forecasting, especially the short-term case, is an important
topic in intelligent transportation systems (ITS). This paper does a lot of
research on network-scale modeling and forecasting of short-term traffic flows.
Firstly, we propose the concepts of single-link and multi-link models of
traffic flow forecasting. Secondly, we construct four prediction models by
combining the two models with single-task learning and multi-task learning. The
combination of the multi-link model and multi-task learning not only improves
the experimental efficiency but also the prediction accuracy. Moreover, a new
multi-link single-task approach that combines graphical lasso (GL) with neural
network (NN) is proposed. GL provides a general methodology for solving
problems involving lots of variables. Using L1 regularization, GL builds a
sparse graphical model making use of the sparse inverse covariance matrix. In
addition, Gaussian process regression (GPR) is a classic regression algorithm
in Bayesian machine learning. Although there is wide research on GPR, there are
few applications of GPR in traffic flow forecasting. In this paper, we apply
GPR to traffic flow forecasting and show its potential. Through sufficient
experiments, we compare all of the proposed approaches and make an overall
assessment at last.
|
Deep Learning for Identifying Potential Conceptual Shifts for
Co-creative Drawing | We present a system for identifying conceptual shifts between visual
categories, which will form the basis for a co-creative drawing system to help
users draw more creative sketches. The system recognizes human sketches and
matches them to structurally similar sketches from categories to which they do
not belong. This would allow a co-creative drawing system to produce an
ambiguous sketch that blends features from both categories.
|
Bridging the Gap Between Neural Networks and Neuromorphic Hardware with
A Neural Network Compiler | Different from developing neural networks (NNs) for general-purpose
processors, the development for NN chips usually faces with some
hardware-specific restrictions, such as limited precision of network signals
and parameters, constrained computation scale, and limited types of non-linear
functions.
This paper proposes a general methodology to address the challenges. We
decouple the NN applications from the target hardware by introducing a compiler
that can transform an existing trained, unrestricted NN into an equivalent
network that meets the given hardware's constraints. We propose multiple
techniques to make the transformation adaptable to different kinds of NN chips,
and reliable for restrict hardware constraints.
We have built such a software tool that supports both spiking neural networks
(SNNs) and traditional artificial neural networks (ANNs). We have demonstrated
its effectiveness with a fabricated neuromorphic chip and a
processing-in-memory (PIM) design. Tests show that the inference error caused
by this solution is insignificant and the transformation time is much shorter
than the retraining time. Also, we have studied the parameter-sensitivity
evaluations to explore the tradeoffs between network error and resource
utilization for different transformation strategies, which could provide
insights for co-design optimization of neuromorphic hardware and software.
|
Probabilistic supervised learning | Predictive modelling and supervised learning are central to modern data
science. With predictions from an ever-expanding number of supervised black-box
strategies - e.g., kernel methods, random forests, deep learning aka neural
networks - being employed as a basis for decision making processes, it is
crucial to understand the statistical uncertainty associated with these
predictions.
As a general means to approach the issue, we present an overarching framework
for black-box prediction strategies that not only predict the target but also
their own predictions' uncertainty. Moreover, the framework allows for fair
assessment and comparison of disparate prediction strategies. For this, we
formally consider strategies capable of predicting full distributions from
feature variables, so-called probabilistic supervised learning strategies.
Our work draws from prior work including Bayesian statistics, information
theory, and modern supervised machine learning, and in a novel synthesis leads
to (a) new theoretical insights such as a probabilistic bias-variance
decomposition and an entropic formulation of prediction, as well as to (b) new
algorithms and meta-algorithms, such as composite prediction strategies,
probabilistic boosting and bagging, and a probabilistic predictive independence
test.
Our black-box formulation also leads (c) to a new modular interface view on
probabilistic supervised learning and a modelling workflow API design, which we
have implemented in the newly released skpro machine learning toolbox,
extending the familiar modelling interface and meta-modelling functionality of
sklearn. The skpro package provides interfaces for construction, composition,
and tuning of probabilistic supervised learning strategies, together with
orchestration features for validation and comparison of any such strategy - be
it frequentist, Bayesian, or other.
|
Machine Learning for Building Energy and Indoor Environment: A
Perspective | Machine learning is a promising technique for many practical applications. In
this perspective, we illustrate the development and application for machine
learning. It is indicated that the theories and applications of machine
learning method in the field of energy conservation and indoor environment are
not mature, due to the difficulty of the determination for model structure with
better prediction. In order to significantly contribute to the problems, we
utilize the ANN model to predict the indoor culturable fungi concentration,
which achieves the better accuracy and convenience. The proposal of hybrid
method is further expand the application fields of machine learning method.
Further, ANN model based on HTS was successfully applied for the optimization
of building energy system. We hope that this novel method could capture more
attention from investigators via our introduction and perspective, due to its
potential development with accuracy and reliability. However, its feasibility
in other fields needs to be promoted further.
|
Stratified Transfer Learning for Cross-domain Activity Recognition | In activity recognition, it is often expensive and time-consuming to acquire
sufficient activity labels. To solve this problem, transfer learning leverages
the labeled samples from the source domain to annotate the target domain which
has few or none labels. Existing approaches typically consider learning a
global domain shift while ignoring the intra-affinity between classes, which
will hinder the performance of the algorithms. In this paper, we propose a
novel and general cross-domain learning framework that can exploit the
intra-affinity of classes to perform intra-class knowledge transfer. The
proposed framework, referred to as Stratified Transfer Learning (STL), can
dramatically improve the classification accuracy for cross-domain activity
recognition. Specifically, STL first obtains pseudo labels for the target
domain via majority voting technique. Then, it performs intra-class knowledge
transfer iteratively to transform both domains into the same subspaces.
Finally, the labels of target domain are obtained via the second annotation. To
evaluate the performance of STL, we conduct comprehensive experiments on three
large public activity recognition datasets~(i.e. OPPORTUNITY, PAMAP2, and UCI
DSADS), which demonstrates that STL significantly outperforms other
state-of-the-art methods w.r.t. classification accuracy (improvement of 7.68%).
Furthermore, we extensively investigate the performance of STL across different
degrees of similarities and activity levels between domains. And we also
discuss the potential of STL in other pervasive computing applications to
provide empirical experience for future research.
|
MVG Mechanism: Differential Privacy under Matrix-Valued Query | Differential privacy mechanism design has traditionally been tailored for a
scalar-valued query function. Although many mechanisms such as the Laplace and
Gaussian mechanisms can be extended to a matrix-valued query function by adding
i.i.d. noise to each element of the matrix, this method is often suboptimal as
it forfeits an opportunity to exploit the structural characteristics typically
associated with matrix analysis. To address this challenge, we propose a novel
differential privacy mechanism called the Matrix-Variate Gaussian (MVG)
mechanism, which adds a matrix-valued noise drawn from a matrix-variate
Gaussian distribution, and we rigorously prove that the MVG mechanism preserves
$(\epsilon,\delta)$-differential privacy. Furthermore, we introduce the concept
of directional noise made possible by the design of the MVG mechanism.
Directional noise allows the impact of the noise on the utility of the
matrix-valued query function to be moderated. Finally, we experimentally
demonstrate the performance of our mechanism using three matrix-valued queries
on three privacy-sensitive datasets. We find that the MVG mechanism notably
outperforms four previous state-of-the-art approaches, and provides comparable
utility to the non-private baseline.
|
Optimal Bayesian Transfer Learning | Transfer learning has recently attracted significant research attention, as
it simultaneously learns from different source domains, which have plenty of
labeled data, and transfers the relevant knowledge to the target domain with
limited labeled data to improve the prediction performance. We propose a
Bayesian transfer learning framework where the source and target domains are
related through the joint prior density of the model parameters. The modeling
of joint prior densities enables better understanding of the "transferability"
between domains. We define a joint Wishart density for the precision matrices
of the Gaussian feature-label distributions in the source and target domains to
act like a bridge that transfers the useful information of the source domain to
help classification in the target domain by improving the target posteriors.
Using several theorems in multivariate statistics, the posteriors and posterior
predictive densities are derived in closed forms with hypergeometric functions
of matrix argument, leading to our novel closed-form and fast Optimal Bayesian
Transfer Learning (OBTL) classifier. Experimental results on both synthetic and
real-world benchmark data confirm the superb performance of the OBTL compared
to the other state-of-the-art transfer learning and domain adaptation methods.
|
Learning from Mutants: Using Code Mutation to Learn and Monitor
Invariants of a Cyber-Physical System | Cyber-physical systems (CPS) consist of sensors, actuators, and controllers
all communicating over a network; if any subset becomes compromised, an
attacker could cause significant damage. With access to data logs and a model
of the CPS, the physical effects of an attack could potentially be detected
before any damage is done. Manually building a model that is accurate enough in
practice, however, is extremely difficult. In this paper, we propose a novel
approach for constructing models of CPS automatically, by applying supervised
machine learning to data traces obtained after systematically seeding their
software components with faults ("mutants"). We demonstrate the efficacy of
this approach on the simulator of a real-world water purification plant,
presenting a framework that automatically generates mutants, collects data
traces, and learns an SVM-based model. Using cross-validation and statistical
model checking, we show that the learnt model characterises an invariant
physical property of the system. Furthermore, we demonstrate the usefulness of
the invariant by subjecting the system to 55 network and code-modification
attacks, and showing that it can detect 85% of them from the data logs
generated at runtime.
|
Neural Networks in Adversarial Setting and Ill-Conditioned Weight Space | Recently, Neural networks have seen a huge surge in its adoption due to their
ability to provide high accuracy on various tasks. On the other hand, the
existence of adversarial examples have raised suspicions regarding the
generalization capabilities of neural networks. In this work, we focus on the
weight matrix learnt by the neural networks and hypothesize that ill
conditioned weight matrix is one of the contributing factors in neural
network's susceptibility towards adversarial examples. For ensuring that the
learnt weight matrix's condition number remains sufficiently low, we suggest
using orthogonal regularizer. We show that this indeed helps in increasing the
adversarial accuracy on MNIST and F-MNIST datasets.
|
Particle Clustering Machine: A Dynamical System Based Approach | Identification of the clusters from an unlabeled data set is one of the most
important problems in Unsupervised Machine Learning. The state of the art
clustering algorithms are based on either the statistical properties or the
geometric properties of the data set. In this work, we propose a novel method
to cluster the data points using dynamical systems theory. After constructing a
gradient dynamical system using interaction potential, we prove that the
asymptotic dynamics of this system will determine the cluster centers, when the
dynamical system is initialized at the data points. Most of the existing
heuristic-based clustering techniques suffer from a disadvantage, namely the
stochastic nature of the solution. Whereas, the proposed algorithm is
deterministic, and the outcome would not change over multiple runs of the
proposed algorithm with the same input data. Another advantage of the proposed
method is that the number of clusters, which is difficult to determine in
practice, does not have to be specified in advance. Simulation results with are
presented, and comparisons are made with the existing methods.
|
Proteomics Analysis of FLT3-ITD Mutation in Acute Myeloid Leukemia Using
Deep Learning Neural Network | Deep Learning can significantly benefit cancer proteomics and genomics. In
this study, we attempt to determine a set of critical proteins that are
associated with the FLT3-ITD mutation in newly-diagnosed acute myeloid leukemia
patients. A Deep Learning network consisting of autoencoders forming a
hierarchical model from which high-level features are extracted without labeled
training data. Dimensional reduction reduced the number of critical proteins
from 231 to 20. Deep Learning found an excellent correlation between FLT3-ITD
mutation with the levels of these 20 critical proteins (accuracy 97%,
sensitivity 90%, specificity 100%). Our Deep Learning network could hone in on
20 proteins with the strongest association with FLT3-ITD. The results of this
study allow a novel approach to determine critical protein pathways in the
FLT3-ITD mutation, and provide proof-of-concept for an accurate approach to
model big data in cancer proteomics and genomics.
|
Polynomial-based rotation invariant features | One of basic difficulties of machine learning is handling unknown rotations
of objects, for example in image recognition. A related problem is evaluation
of similarity of shapes, for example of two chemical molecules, for which
direct approach requires costly pairwise rotation alignment and comparison.
Rotation invariants are useful tools for such purposes, allowing to extract
features describing shape up to rotation, which can be used for example to
search for similar rotated patterns, or fast evaluation of similarity of shapes
e.g. for virtual screening, or machine learning including features directly
describing shape. A standard approach are rotationally invariant cylindrical or
spherical harmonics, which can be seen as based on polynomials on sphere,
however, they provide very few invariants - only one per degree of polynomial.
There will be discussed a general approach to construct arbitrarily large sets
of rotation invariants of polynomials, for degree $D$ in $\mathbb{R}^n$ up to
$O(n^D)$ independent invariants instead of $O(D)$ offered by standard
approaches, possibly also a complete set: providing not only necessary, but
also sufficient condition for differing only by rotation (and reflectional
symmetry).
|
Intrinsic Gaussian processes on complex constrained domains | We propose a class of intrinsic Gaussian processes (in-GPs) for
interpolation, regression and classification on manifolds with a primary focus
on complex constrained domains or irregular shaped spaces arising as subsets or
submanifolds of R, R2, R3 and beyond. For example, in-GPs can accommodate
spatial domains arising as complex subsets of Euclidean space. in-GPs respect
the potentially complex boundary or interior conditions as well as the
intrinsic geometry of the spaces. The key novelty of the proposed approach is
to utilise the relationship between heat kernels and the transition density of
Brownian motion on manifolds for constructing and approximating valid and
computationally feasible covariance kernels. This enables in-GPs to be
practically applied in great generality, while existing approaches for
smoothing on constrained domains are limited to simple special cases. The broad
utilities of the in-GP approach is illustrated through simulation studies and
data examples.
|
Learning from Pseudo-Randomness With an Artificial Neural Network - Does
God Play Pseudo-Dice? | Inspired by the fact that the neural network, as the mainstream for machine
learning, has brought successes in many application areas, here we propose to
use this approach for decoding hidden correlation among pseudo-random data and
predicting events accordingly. With a simple neural network structure and a
typical training procedure, we demonstrate the learning and prediction power of
the neural network in extremely random environment. Finally, we postulate that
the high sensitivity and efficiency of the neural network may allow to
critically test if there could be any fundamental difference between quantum
randomness and pseudo randomness, which is equivalent to the question: Does God
play dice?
|
Predicting Chronic Disease Hospitalizations from Electronic Health
Records: An Interpretable Classification Approach | Urban living in modern large cities has significant adverse effects on
health, increasing the risk of several chronic diseases. We focus on the two
leading clusters of chronic disease, heart disease and diabetes, and develop
data-driven methods to predict hospitalizations due to these conditions. We
base these predictions on the patients' medical history, recent and more
distant, as described in their Electronic Health Records (EHR). We formulate
the prediction problem as a binary classification problem and consider a
variety of machine learning methods, including kernelized and sparse Support
Vector Machines (SVM), sparse logistic regression, and random forests. To
strike a balance between accuracy and interpretability of the prediction, which
is important in a medical setting, we propose two novel methods: K-LRT, a
likelihood ratio test-based method, and a Joint Clustering and Classification
(JCC) method which identifies hidden patient clusters and adapts classifiers to
each cluster. We develop theoretical out-of-sample guarantees for the latter
method. We validate our algorithms on large datasets from the Boston Medical
Center, the largest safety-net hospital system in New England.
|
Approximate Ranking from Pairwise Comparisons | A common problem in machine learning is to rank a set of n items based on
pairwise comparisons. Here ranking refers to partitioning the items into sets
of pre-specified sizes according to their scores, which includes identification
of the top-k items as the most prominent special case. The score of a given
item is defined as the probability that it beats a randomly chosen other item.
Finding an exact ranking typically requires a prohibitively large number of
comparisons, but in practice, approximate rankings are often adequate.
Accordingly, we study the problem of finding approximate rankings from pairwise
comparisons. We analyze an active ranking algorithm that counts the number of
comparisons won, and decides whether to stop or which pair of items to compare
next, based on confidence intervals computed from the data collected in
previous steps. We show that this algorithm succeeds in recovering approximate
rankings using a number of comparisons that is close to optimal up to
logarithmic factors. We also present numerical results, showing that in
practice, approximation can drastically reduce the number of comparisons
required to estimate a ranking.
|
Deep Learning Reconstruction for 9-View Dual Energy CT Baggage Scanner | For homeland and transportation security applications, 2D X-ray explosive
detection system (EDS) have been widely used, but they have limitations in
recognizing 3D shape of the hidden objects. Among various types of 3D computed
tomography (CT) systems to address this issue, this paper is interested in a
stationary CT using fixed X-ray sources and detectors. However, due to the
limited number of projection views, analytic reconstruction algorithms produce
severe streaking artifacts. Inspired by recent success of deep learning
approach for sparse view CT reconstruction, here we propose a novel image and
sinogram domain deep learning architecture for 3D reconstruction from very
sparse view measurement. The algorithm has been tested with the real data from
a prototype 9-view dual energy stationary CT EDS carry-on baggage scanner
developed by GEMSS Medical Systems, Korea, which confirms the superior
reconstruction performance over the existing approaches.
|
DeepTriage: Exploring the Effectiveness of Deep Learning for Bug
Triaging | For a given software bug report, identifying an appropriate developer who
could potentially fix the bug is the primary task of a bug triaging process. A
bug title (summary) and a detailed description is present in most of the bug
tracking systems. Automatic bug triaging algorithm can be formulated as a
classification problem, with the bug title and description as the input,
mapping it to one of the available developers (classes). The major challenge is
that the bug description usually contains a combination of free unstructured
text, code snippets, and stack trace making the input data noisy. The existing
bag-of-words (BOW) feature models do not consider the syntactical and
sequential word information available in the unstructured text. We propose a
novel bug report representation algorithm using an attention based deep
bidirectional recurrent neural network (DBRNN-A) model that learns a syntactic
and semantic feature from long word sequences in an unsupervised manner.
Instead of BOW features, the DBRNN-A based bug representation is then used for
training the classifier. Using an attention mechanism enables the model to
learn the context representation over a long word sequence, as in a bug report.
To provide a large amount of data to learn the feature learning model, the
unfixed bug reports (~70% bugs in an open source bug tracking system) are
leveraged, which were completely ignored in the previous studies. Another
contribution is to make this research reproducible by making the source code
available and creating a public benchmark dataset of bug reports from three
open source bug tracking system: Google Chromium (383,104 bug reports), Mozilla
Core (314,388 bug reports), and Mozilla Firefox (162,307 bug reports).
Experimentally we compare our approach with BOW model and machine learning
approaches and observe that DBRNN-A provides a higher rank-10 average accuracy.
|
Object segmentation in depth maps with one user click and a
synthetically trained fully convolutional network | With more and more household objects built on planned obsolescence and
consumed by a fast-growing population, hazardous waste recycling has become a
critical challenge. Given the large variability of household waste, current
recycling platforms mostly rely on human operators to analyze the scene,
typically composed of many object instances piled up in bulk. Helping them by
robotizing the unitary extraction is a key challenge to speed up this tedious
process. Whereas supervised deep learning has proven very efficient for such
object-level scene understanding, e.g., generic object detection and
segmentation in everyday scenes, it however requires large sets of per-pixel
labeled images, that are hardly available for numerous application contexts,
including industrial robotics. We thus propose a step towards a practical
interactive application for generating an object-oriented robotic grasp,
requiring as inputs only one depth map of the scene and one user click on the
next object to extract. More precisely, we address in this paper the middle
issue of object seg-mentation in top views of piles of bulk objects given a
pixel location, namely seed, provided interactively by a human operator. We
propose a twofold framework for generating edge-driven instance segments.
First, we repurpose a state-of-the-art fully convolutional object contour
detector for seed-based instance segmentation by introducing the notion of
edge-mask duality with a novel patch-free and contour-oriented loss function.
Second, we train one model using only synthetic scenes, instead of manually
labeled training data. Our experimental results show that considering edge-mask
duality for training an encoder-decoder network, as we suggest, outperforms a
state-of-the-art patch-based network in the present application context.
|
Soft Actor-Critic: Off-Policy Maximum Entropy Deep Reinforcement
Learning with a Stochastic Actor | Model-free deep reinforcement learning (RL) algorithms have been demonstrated
on a range of challenging decision making and control tasks. However, these
methods typically suffer from two major challenges: very high sample complexity
and brittle convergence properties, which necessitate meticulous hyperparameter
tuning. Both of these challenges severely limit the applicability of such
methods to complex, real-world domains. In this paper, we propose soft
actor-critic, an off-policy actor-critic deep RL algorithm based on the maximum
entropy reinforcement learning framework. In this framework, the actor aims to
maximize expected reward while also maximizing entropy. That is, to succeed at
the task while acting as randomly as possible. Prior deep RL methods based on
this framework have been formulated as Q-learning methods. By combining
off-policy updates with a stable stochastic actor-critic formulation, our
method achieves state-of-the-art performance on a range of continuous control
benchmark tasks, outperforming prior on-policy and off-policy methods.
Furthermore, we demonstrate that, in contrast to other off-policy algorithms,
our approach is very stable, achieving very similar performance across
different random seeds.
|
Learning automata based SVM for intrusion detection | As an indispensable defensive measure of network security, the intrusion
detection is a process of monitoring the events occurring in a computer system
or network and analyzing them for signs of possible incidents. It is a
classifier to judge the event is normal or malicious. The information used for
intrusion detection contains some redundant features which would increase the
difficulty of training the classifier for intrusion detection and increase the
time of making predictions. To simplify the training process and improve the
efficiency of the classifier, it is necessary to remove these dispensable
features. in this paper, we propose a novel LA-SVM scheme to automatically
remove redundant features focusing on intrusion detection. This is the first
application of learning automata for solving dimension reduction problems. The
simulation results indicate that the LA-SVM scheme achieves a higher accuracy
and is more efficient in making predictions compared with traditional SVM.
|
Demystifying MMD GANs | We investigate the training and performance of generative adversarial
networks using the Maximum Mean Discrepancy (MMD) as critic, termed MMD GANs.
As our main theoretical contribution, we clarify the situation with bias in GAN
loss functions raised by recent work: we show that gradient estimators used in
the optimization process for both MMD GANs and Wasserstein GANs are unbiased,
but learning a discriminator based on samples leads to biased gradients for the
generator parameters. We also discuss the issue of kernel choice for the MMD
critic, and characterize the kernel corresponding to the energy distance used
for the Cramer GAN critic. Being an integral probability metric, the MMD
benefits from training strategies recently developed for Wasserstein GANs. In
experiments, the MMD GAN is able to employ a smaller critic network than the
Wasserstein GAN, resulting in a simpler and faster-training algorithm with
matching performance. We also propose an improved measure of GAN convergence,
the Kernel Inception Distance, and show how to use it to dynamically adapt
learning rates during GAN training.
|
Overcoming catastrophic forgetting with hard attention to the task | Catastrophic forgetting occurs when a neural network loses the information
learned in a previous task after training on subsequent tasks. This problem
remains a hurdle for artificial intelligence systems with sequential learning
capabilities. In this paper, we propose a task-based hard attention mechanism
that preserves previous tasks' information without affecting the current task's
learning. A hard attention mask is learned concurrently to every task, through
stochastic gradient descent, and previous masks are exploited to condition such
learning. We show that the proposed mechanism is effective for reducing
catastrophic forgetting, cutting current rates by 45 to 80%. We also show that
it is robust to different hyperparameter choices, and that it offers a number
of monitoring capabilities. The approach features the possibility to control
both the stability and compactness of the learned knowledge, which we believe
makes it also attractive for online learning or network compression
applications.
|
Jointly Learning to Construct and Control Agents using Deep
Reinforcement Learning | The physical design of a robot and the policy that controls its motion are
inherently coupled, and should be determined according to the task and
environment. In an increasing number of applications, data-driven and
learning-based approaches, such as deep reinforcement learning, have proven
effective at designing control policies. For most tasks, the only way to
evaluate a physical design with respect to such control policies is
empirical--i.e., by picking a design and training a control policy for it.
Since training these policies is time-consuming, it is computationally
infeasible to train separate policies for all possible designs as a means to
identify the best one. In this work, we address this limitation by introducing
a method that performs simultaneous joint optimization of the physical design
and control network. Our approach maintains a distribution over designs and
uses reinforcement learning to optimize a control policy to maximize expected
reward over the design distribution. We give the controller access to design
parameters to allow it to tailor its policy to each design in the distribution.
Throughout training, we shift the distribution towards higher-performing
designs, eventually converging to a design and control policy that are jointly
optimal. We evaluate our approach in the context of legged locomotion, and
demonstrate that it discovers novel designs and walking gaits, outperforming
baselines in both performance and efficiency.
|
Reducing Deep Network Complexity with Fourier Transform Methods | We propose a novel way that uses shallow densely connected neuron network
architectures to achieve superior performance to convolution based neural
networks (CNNs) approaches with the added benefits of lower computation burden
requiring dramatically less training examples to achieve high prediction
accuracy ($>98\%$). The advantages of our proposed method is demonstrated in
results on benchmark datasets which show significant performance gain over
existing state-of-the-art results on MNIST, CIFAR-10 and CIFAR-100. By Fourier
transforming the inputs, each point in the training sample then has a
representational energy of all the weighted information from every other point.
The consequence of using this input is a reduced complexity neuron network,
reduced computation load and the lifting of the requirement for a large number
of training examples to achieve high classification accuracy.
|
Adaptive kNN using Expected Accuracy for Classification of Geo-Spatial
Data | The k-Nearest Neighbor (kNN) classification approach is conceptually simple -
yet widely applied since it often performs well in practical applications.
However, using a global constant k does not always provide an optimal solution,
e.g., for datasets with an irregular density distribution of data points. This
paper proposes an adaptive kNN classifier where k is chosen dynamically for
each instance (point) to be classified, such that the expected accuracy of
classification is maximized. We define the expected accuracy as the accuracy of
a set of structurally similar observations. An arbitrary similarity function
can be used to find these observations. We introduce and evaluate different
similarity functions. For the evaluation, we use five different classification
tasks based on geo-spatial data. Each classification task consists of (tens of)
thousands of items. We demonstrate, that the presented expected accuracy
measures can be a good estimator for kNN performance, and the proposed adaptive
kNN classifier outperforms common kNN and previously introduced adaptive kNN
algorithms. Also, we show that the range of considered k can be significantly
reduced to speed up the algorithm without negative influence on classification
accuracy.
|
Clustering of Data with Missing Entries | The analysis of large datasets is often complicated by the presence of
missing entries, mainly because most of the current machine learning algorithms
are designed to work with full data. The main focus of this work is to
introduce a clustering algorithm, that will provide good clustering even in the
presence of missing data. The proposed technique solves an $\ell_0$ fusion
penalty based optimization problem to recover the clusters. We theoretically
analyze the conditions needed for the successful recovery of the clusters. We
also propose an algorithm to solve a relaxation of this problem using
saturating non-convex fusion penalties. The method is demonstrated on simulated
and real datasets, and is observed to perform well in the presence of large
fractions of missing entries.
|
An Implementation of Back-Propagation Learning on GF11, a Large SIMD
Parallel Computer | Current connectionist simulations require huge computational resources. We
describe a neural network simulator for the IBM GF11, an experimental SIMD
machine with 566 processors and a peak arithmetic performance of 11 Gigaflops.
We present our parallel implementation of the backpropagation learning
algorithm, techniques for increasing efficiency, performance measurements on
the NetTalk text-to-speech benchmark, and a performance model for the
simulator. Our simulator currently runs the back-propagation learning algorithm
at 900 million connections per second, where each "connection per second"
includes both a forward and backward pass. This figure was obtained on the
machine when only 356 processors were working; with all 566 processors
operational, our simulation will run at over one billion connections per
second. We conclude that the GF11 is well-suited to neural network simulation,
and we analyze our use of the machine to determine which features are the most
important for high performance.
|
A practical tutorial on autoencoders for nonlinear feature fusion:
Taxonomy, models, software and guidelines | Many of the existing machine learning algorithms, both supervised and
unsupervised, depend on the quality of the input characteristics to generate a
good model. The amount of these variables is also important, since performance
tends to decline as the input dimensionality increases, hence the interest in
using feature fusion techniques, able to produce feature sets that are more
compact and higher level. A plethora of procedures to fuse original variables
for producing new ones has been developed in the past decades. The most basic
ones use linear combinations of the original variables, such as PCA (Principal
Component Analysis) and LDA (Linear Discriminant Analysis), while others find
manifold embeddings of lower dimensionality based on non-linear combinations,
such as Isomap or LLE (Linear Locally Embedding) techniques.
More recently, autoencoders (AEs) have emerged as an alternative to manifold
learning for conducting nonlinear feature fusion. Dozens of AE models have been
proposed lately, each with its own specific traits. Although many of them can
be used to generate reduced feature sets through the fusion of the original
ones, there also AEs designed with other applications in mind.
The goal of this paper is to provide the reader with a broad view of what an
AE is, how they are used for feature fusion, a taxonomy gathering a broad range
of models, and how they relate to other classical techniques. In addition, a
set of didactic guidelines on how to choose the proper AE for a given task is
supplied, together with a discussion of the software tools available. Finally,
two case studies illustrate the usage of AEs with datasets of handwritten
digits and breast cancer.
|
SpectralNet: Spectral Clustering using Deep Neural Networks | Spectral clustering is a leading and popular technique in unsupervised data
analysis. Two of its major limitations are scalability and generalization of
the spectral embedding (i.e., out-of-sample-extension). In this paper we
introduce a deep learning approach to spectral clustering that overcomes the
above shortcomings. Our network, which we call SpectralNet, learns a map that
embeds input data points into the eigenspace of their associated graph
Laplacian matrix and subsequently clusters them. We train SpectralNet using a
procedure that involves constrained stochastic optimization. Stochastic
optimization allows it to scale to large datasets, while the constraints, which
are implemented using a special-purpose output layer, allow us to keep the
network output orthogonal. Moreover, the map learned by SpectralNet naturally
generalizes the spectral embedding to unseen data points. To further improve
the quality of the clustering, we replace the standard pairwise Gaussian
affinities with affinities leaned from unlabeled data using a Siamese network.
Additional improvement can be achieved by applying the network to code
representations produced, e.g., by standard autoencoders. Our end-to-end
learning procedure is fully unsupervised. In addition, we apply VC dimension
theory to derive a lower bound on the size of SpectralNet. State-of-the-art
clustering results are reported on the Reuters dataset. Our implementation is
publicly available at https://github.com/kstant0725/SpectralNet .
|
Differentially Private Releasing via Deep Generative Model (Technical
Report) | Privacy-preserving releasing of complex data (e.g., image, text, audio)
represents a long-standing challenge for the data mining research community.
Due to rich semantics of the data and lack of a priori knowledge about the
analysis task, excessive sanitization is often necessary to ensure privacy,
leading to significant loss of the data utility. In this paper, we present
dp-GAN, a general private releasing framework for semantic-rich data. Instead
of sanitizing and then releasing the data, the data curator publishes a deep
generative model which is trained using the original data in a differentially
private manner; with the generative model, the analyst is able to produce an
unlimited amount of synthetic data for arbitrary analysis tasks. In contrast of
alternative solutions, dp-GAN highlights a set of key features: (i) it provides
theoretical privacy guarantee via enforcing the differential privacy principle;
(ii) it retains desirable utility in the released model, enabling a variety of
otherwise impossible analyses; and (iii) most importantly, it achieves
practical training scalability and stability by employing multi-fold
optimization strategies. Through extensive empirical evaluation on benchmark
datasets and analyses, we validate the efficacy of dp-GAN.
|
Combination of Hyperband and Bayesian Optimization for Hyperparameter
Optimization in Deep Learning | Deep learning has achieved impressive results on many problems. However, it
requires high degree of expertise or a lot of experience to tune well the
hyperparameters, and such manual tuning process is likely to be biased.
Moreover, it is not practical to try out as many different hyperparameter
configurations in deep learning as in other machine learning scenarios, because
evaluating each single hyperparameter configuration in deep learning would mean
training a deep neural network, which usually takes quite long time. Hyperband
algorithm achieves state-of-the-art performance on various hyperparameter
optimization problems in the field of deep learning. However, Hyperband
algorithm does not utilize history information of previous explored
hyperparameter configurations, thus the solution found is suboptimal. We
propose to combine Hyperband algorithm with Bayesian optimization (which does
not ignore history when sampling next trial configuration). Experimental
results show that our combination approach is superior to other hyperparameter
optimization approaches including Hyperband algorithm.
|
Learning $3$D-FilterMap for Deep Convolutional Neural Networks | We present a novel and compact architecture for deep Convolutional Neural
Networks (CNNs) in this paper, termed $3$D-FilterMap Convolutional Neural
Networks ($3$D-FM-CNNs). The convolution layer of $3$D-FM-CNN learns a compact
representation of the filters, named $3$D-FilterMap, instead of a set of
independent filters in the conventional convolution layer. The filters are
extracted from the $3$D-FilterMap as overlapping $3$D submatrics with weight
sharing among nearby filters, and these filters are convolved with the input to
generate the output of the convolution layer for $3$D-FM-CNN. Due to the weight
sharing scheme, the parameter size of the $3$D-FilterMap is much smaller than
that of the filters to be learned in the conventional convolution layer when
$3$D-FilterMap generates the same number of filters. Our work is fundamentally
different from the network compression literature that reduces the size of a
learned large network in the sense that a small network is directly learned
from scratch. Experimental results demonstrate that $3$D-FM-CNN enjoys a small
parameter space by learning compact $3$D-FilterMaps, while achieving
performance compared to that of the baseline CNNs which learn the same number
of filters as that generated by the corresponding $3$D-FilterMap.
|
VulDeePecker: A Deep Learning-Based System for Vulnerability Detection | The automatic detection of software vulnerabilities is an important research
problem. However, existing solutions to this problem rely on human experts to
define features and often miss many vulnerabilities (i.e., incurring high false
negative rate). In this paper, we initiate the study of using deep
learning-based vulnerability detection to relieve human experts from the
tedious and subjective task of manually defining features. Since deep learning
is motivated to deal with problems that are very different from the problem of
vulnerability detection, we need some guiding principles for applying deep
learning to vulnerability detection. In particular, we need to find
representations of software programs that are suitable for deep learning. For
this purpose, we propose using code gadgets to represent programs and then
transform them into vectors, where a code gadget is a number of (not
necessarily consecutive) lines of code that are semantically related to each
other. This leads to the design and implementation of a deep learning-based
vulnerability detection system, called Vulnerability Deep Pecker
(VulDeePecker). In order to evaluate VulDeePecker, we present the first
vulnerability dataset for deep learning approaches. Experimental results show
that VulDeePecker can achieve much fewer false negatives (with reasonable false
positives) than other approaches. We further apply VulDeePecker to 3 software
products (namely Xen, Seamonkey, and Libav) and detect 4 vulnerabilities, which
are not reported in the National Vulnerability Database but were "silently"
patched by the vendors when releasing later versions of these products; in
contrast, these vulnerabilities are almost entirely missed by the other
vulnerability detection systems we experimented with.
|
Negative Binomial Matrix Factorization for Recommender Systems | We introduce negative binomial matrix factorization (NBMF), a matrix
factorization technique specially designed for analyzing over-dispersed count
data. It can be viewed as an extension of Poisson matrix factorization (PF)
perturbed by a multiplicative term which models exposure. This term brings a
degree of freedom for controlling the dispersion, making NBMF more robust to
outliers. We show that NBMF allows to skip traditional pre-processing stages,
such as binarization, which lead to loss of information. Two estimation
approaches are presented: maximum likelihood and variational Bayes inference.
We test our model with a recommendation task and show its ability to predict
user tastes with better precision than PF.
|
Nonparametric Stochastic Contextual Bandits | We analyze the $K$-armed bandit problem where the reward for each arm is a
noisy realization based on an observed context under mild nonparametric
assumptions. We attain tight results for top-arm identification and a sublinear
regret of $\widetilde{O}\Big(T^{\frac{1+D}{2+D}}\Big)$, where $D$ is the
context dimension, for a modified UCB algorithm that is simple to implement
($k$NN-UCB). We then give global intrinsic dimension dependent and ambient
dimension independent regret bounds. We also discuss recovering topological
structures within the context space based on expected bandit performance and
provide an extension to infinite-armed contextual bandits. Finally, we
experimentally show the improvement of our algorithm over existing multi-armed
bandit approaches for both simulated tasks and MNIST image classification.
|
Deep Learning for Forecasting Stock Returns in the Cross-Section | Many studies have been undertaken by using machine learning techniques,
including neural networks, to predict stock returns. Recently, a method known
as deep learning, which achieves high performance mainly in image recognition
and speech recognition, has attracted attention in the machine learning field.
This paper implements deep learning to predict one-month-ahead stock returns in
the cross-section in the Japanese stock market and investigates the performance
of the method. Our results show that deep neural networks generally outperform
shallow neural networks, and the best networks also outperform representative
machine learning models. These results indicate that deep learning shows
promise as a skillful machine learning method to predict stock returns in the
cross-section.
|
Closed-form Marginal Likelihood in Gamma-Poisson Matrix Factorization | We present novel understandings of the Gamma-Poisson (GaP) model, a
probabilistic matrix factorization model for count data. We show that GaP can
be rewritten free of the score/activation matrix. This gives us new insights
about the estimation of the topic/dictionary matrix by maximum marginal
likelihood estimation. In particular, this explains the robustness of this
estimator to over-specified values of the factorization rank, especially its
ability to automatically prune irrelevant dictionary columns, as empirically
observed in previous work. The marginalization of the activation matrix leads
in turn to a new Monte Carlo Expectation-Maximization algorithm with favorable
properties.
|
Near Optimal Coded Data Shuffling for Distributed Learning | Data shuffling between distributed cluster of nodes is one of the critical
steps in implementing large-scale learning algorithms. Randomly shuffling the
data-set among a cluster of workers allows different nodes to obtain fresh data
assignments at each learning epoch. This process has been shown to provide
improvements in the learning process. However, the statistical benefits of
distributed data shuffling come at the cost of extra communication overhead
from the master node to worker nodes, and can act as one of the major
bottlenecks in the overall time for computation. There has been significant
recent interest in devising approaches to minimize this communication overhead.
One approach is to provision for extra storage at the computing nodes. The
other emerging approach is to leverage coded communication to minimize the
overall communication overhead.
The focus of this work is to understand the fundamental trade-off between the
amount of storage and the communication overhead for distributed data
shuffling. In this work, we first present an information theoretic formulation
for the data shuffling problem, accounting for the underlying problem
parameters (number of workers, $K$, number of data points, $N$, and the
available storage, $S$ per node). We then present an information theoretic
lower bound on the communication overhead for data shuffling as a function of
these parameters. We next present a novel coded communication scheme and show
that the resulting communication overhead of the proposed scheme is within a
multiplicative factor of at most $\frac{K}{K-1}$ from the information-theoretic
lower bound. Furthermore, we present the aligned coded shuffling scheme for
some storage values, which achieves the optimal storage vs communication
trade-off for $K<5$, and further reduces the maximum multiplicative gap down to
$\frac{K-\frac{1}{3}}{K-1}$, for $K\geq 5$.
|
Clustering with Outlier Removal | Cluster analysis and outlier detection are strongly coupled tasks in data
mining area. Cluster structure can be easily destroyed by few outliers; on the
contrary, outliers are defined by the concept of cluster, which are recognized
as the points belonging to none of the clusters. Unfortunately, most existing
studies do not notice the coupled relationship between these two task and
handle them separately. In light of this, we consider the joint cluster
analysis and outlier detection problem, and propose the Clustering with Outlier
Removal (COR) algorithm. Generally speaking, the original space is transformed
into the binary space via generating basic partitions in order to define
clusters. Then an objective function based Holoentropy is designed to enhance
the compactness of each cluster with a few outliers removed. With further
analyses on the objective function, only partial of the problem can be handled
by K-means optimization. To provide an integrated solution, an auxiliary binary
matrix is nontrivally introduced so that COR completely and efficiently solves
the challenging problem via a unified K-means-- with theoretical supports.
Extensive experimental results on numerous data sets in various domains
demonstrate the effectiveness and efficiency of COR significantly over
state-of-the-art methods in terms of cluster validity and outlier detection.
Some key factors in COR are further analyzed for practical use. Finally, an
application on flight trajectory is provided to demonstrate the effectiveness
of COR in the real-world scenario.
|
Knowledge-based Word Sense Disambiguation using Topic Models | Word Sense Disambiguation is an open problem in Natural Language Processing
which is particularly challenging and useful in the unsupervised setting where
all the words in any given text need to be disambiguated without using any
labeled data. Typically WSD systems use the sentence or a small window of words
around the target word as the context for disambiguation because their
computational complexity scales exponentially with the size of the context. In
this paper, we leverage the formalism of topic model to design a WSD system
that scales linearly with the number of words in the context. As a result, our
system is able to utilize the whole document as the context for a word to be
disambiguated. The proposed method is a variant of Latent Dirichlet Allocation
in which the topic proportions for a document are replaced by synset
proportions. We further utilize the information in the WordNet by assigning a
non-uniform prior to synset distribution over words and a logistic-normal prior
for document distribution over synsets. We evaluate the proposed method on
Senseval-2, Senseval-3, SemEval-2007, SemEval-2013 and SemEval-2015 English
All-Word WSD datasets and show that it outperforms the state-of-the-art
unsupervised knowledge-based WSD system by a significant margin.
|
Audio Adversarial Examples: Targeted Attacks on Speech-to-Text | We construct targeted audio adversarial examples on automatic speech
recognition. Given any audio waveform, we can produce another that is over
99.9% similar, but transcribes as any phrase we choose (recognizing up to 50
characters per second of audio). We apply our white-box iterative
optimization-based attack to Mozilla's implementation DeepSpeech end-to-end,
and show it has a 100% success rate. The feasibility of this attack introduce a
new domain to study adversarial examples.
|
Generating Neural Networks with Neural Networks | Hypernetworks are neural networks that generate weights for another neural
network. We formulate the hypernetwork training objective as a compromise
between accuracy and diversity, where the diversity takes into account trivial
symmetry transformations of the target network. We explain how this simple
formulation generalizes variational inference. We use multi-layered perceptrons
to form the mapping from the low dimensional input random vector to the high
dimensional weight space, and demonstrate how to reduce the number of
parameters in this mapping by parameter sharing. We perform experiments and
show that the generated weights are diverse and lie on a non-trivial manifold.
|
Adversarial Perturbation Intensity Achieving Chosen Intra-Technique
Transferability Level for Logistic Regression | Machine Learning models have been shown to be vulnerable to adversarial
examples, ie. the manipulation of data by a attacker to defeat a defender's
classifier at test time. We present a novel probabilistic definition of
adversarial examples in perfect or limited knowledge setting using prior
probability distributions on the defender's classifier. Using the asymptotic
properties of the logistic regression, we derive a closed-form expression of
the intensity of any adversarial perturbation, in order to achieve a given
expected misclassification rate. This technique is relevant in a threat model
of known model specifications and unknown training data. To our knowledge, this
is the first method that allows an attacker to directly choose the probability
of attack success. We evaluate our approach on two real-world datasets.
|
Frame-based Sparse Analysis and Synthesis Signal Representations and
Parseval K-SVD | Frames are the foundation of the linear operators used in the decomposition
and reconstruction of signals, such as the discrete Fourier transform, Gabor,
wavelets, and curvelet transforms. The emergence of sparse representation
models has shifted of the emphasis in frame theory toward sparse
l1-minimization problems. In this paper, we apply frame theory to the sparse
representation of signals in which a synthesis dictionary is used for a frame
and an analysis dictionary is used for a dual frame. We sought to formulate a
novel dual frame design in which the sparse vector obtained through the
decomposition of any signal is also the sparse solution representing signals
based on a reconstruction frame. Our findings demonstrate that this type of
dual frame cannot be constructed for over-complete frames, thereby precluding
the use of any linear analysis operator in driving the sparse synthesis
coefficient for signal representation. Nonetheless, the best approximation to
the sparse synthesis solution can be derived from the analysis coefficient
using the canonical dual frame. In this study, we developed a novel dictionary
learning algorithm (called Parseval K-SVD) to learn a tight-frame dictionary.
We then leveraged the analysis and synthesis perspectives of signal
representation with frames to derive optimization formulations for problems
pertaining to image recovery. Our preliminary, results demonstrate that the
images recovered using this approach are correlated to the frame bounds of
dictionaries, thereby demonstrating the importance of using different
dictionaries for different applications.
|
Faster Deep Q-learning using Neural Episodic Control | The research on deep reinforcement learning which estimates Q-value by deep
learning has been attracted the interest of researchers recently. In deep
reinforcement learning, it is important to efficiently learn the experiences
that an agent has collected by exploring environment. We propose NEC2DQN that
improves learning speed of a poor sample efficiency algorithm such as DQN by
using good one such as NEC at the beginning of learning. We show it is able to
learn faster than Double DQN or N-step DQN in the experiments of Pong.
|
A Note on the Inception Score | Deep generative models are powerful tools that have produced impressive
results in recent years. These advances have been for the most part empirically
driven, making it essential that we use high quality evaluation metrics. In
this paper, we provide new insights into the Inception Score, a recently
proposed and widely used evaluation metric for generative models, and
demonstrate that it fails to provide useful guidance when comparing models. We
discuss both suboptimalities of the metric itself and issues with its
application. Finally, we call for researchers to be more systematic and careful
when evaluating and comparing generative models, as the advancement of the
field depends upon it.
|
Competitive Multi-agent Inverse Reinforcement Learning with Sub-optimal
Demonstrations | This paper considers the problem of inverse reinforcement learning in
zero-sum stochastic games when expert demonstrations are known to be not
optimal. Compared to previous works that decouple agents in the game by
assuming optimality in expert strategies, we introduce a new objective function
that directly pits experts against Nash Equilibrium strategies, and we design
an algorithm to solve for the reward function in the context of inverse
reinforcement learning with deep neural networks as model approximations. In
our setting the model and algorithm do not decouple by agent. In order to find
Nash Equilibrium in large-scale games, we also propose an adversarial training
algorithm for zero-sum stochastic games, and show the theoretical appeal of
non-existence of local optima in its objective function. In our numerical
experiments, we demonstrate that our Nash Equilibrium and inverse reinforcement
learning algorithms address games that are not amenable to previous approaches
using tabular representations. Moreover, with sub-optimal expert demonstrations
our algorithms recover both reward functions and strategies with good quality.
|
Threshold Auto-Tuning Metric Learning | It has been reported repeatedly that discriminative learning of distance
metric boosts the pattern recognition performance. A weak point of ITML-based
methods is that the distance threshold for similarity/dissimilarity constraints
must be determined manually and it is sensitive to generalization performance,
although the ITML-based methods enjoy an advantage that the Bregman projection
framework can be applied for optimization of distance metric. In this paper, we
present a new formulation of metric learning algorithm in which the distance
threshold is optimized together. Since the optimization is still in the Bregman
projection framework, the Dykstra algorithm can be applied for optimization. A
nonlinear equation has to be solved to project the solution onto a half-space
in each iteration. Na\"{i}ve method takes $O(LMn^{3})$ computational time to
solve the nonlinear equation. In this study, an efficient technique that can
solve the nonlinear equation in $O(Mn^{3})$ has been discovered. We have proved
that the root exists and is unique. We empirically show that the accuracy of
pattern recognition for the proposed metric learning algorithm is comparable to
the existing metric learning methods, yet the distance threshold is
automatically tuned for the proposed metric learning algorithm.
|
Deep Bidirectional and Unidirectional LSTM Recurrent Neural Network for
Network-wide Traffic Speed Prediction | Short-term traffic forecasting based on deep learning methods, especially
long short-term memory (LSTM) neural networks, has received much attention in
recent years. However, the potential of deep learning methods in traffic
forecasting has not yet fully been exploited in terms of the depth of the model
architecture, the spatial scale of the prediction area, and the predictive
power of spatial-temporal data. In this paper, a deep stacked bidirectional and
unidirectional LSTM (SBU- LSTM) neural network architecture is proposed, which
considers both forward and backward dependencies in time series data, to
predict network-wide traffic speed. A bidirectional LSTM (BDLSM) layer is
exploited to capture spatial features and bidirectional temporal dependencies
from historical data. To the best of our knowledge, this is the first time that
BDLSTMs have been applied as building blocks for a deep architecture model to
measure the backward dependency of traffic data for prediction. The proposed
model can handle missing values in input data by using a masking mechanism.
Further, this scalable model can predict traffic speed for both freeway and
complex urban traffic networks. Comparisons with other classical and
state-of-the-art models indicate that the proposed SBU-LSTM neural network
achieves superior prediction performance for the whole traffic network in both
accuracy and robustness.
|
Covariant Compositional Networks For Learning Graphs | Most existing neural networks for learning graphs address permutation
invariance by conceiving of the network as a message passing scheme, where each
node sums the feature vectors coming from its neighbors. We argue that this
imposes a limitation on their representation power, and instead propose a new
general architecture for representing objects consisting of a hierarchy of
parts, which we call Covariant Compositional Networks (CCNs). Here, covariance
means that the activation of each neuron must transform in a specific way under
permutations, similarly to steerability in CNNs. We achieve covariance by
making each activation transform according to a tensor representation of the
permutation group, and derive the corresponding tensor aggregation rules that
each neuron must implement. Experiments show that CCNs can outperform competing
methods on standard graph learning benchmarks.
|
Applying an Ensemble Learning Method for Improving Multi-label
Classification Performance | In recent years, multi-label classification problem has become a
controversial issue. In this kind of classification, each sample is associated
with a set of class labels. Ensemble approaches are supervised learning
algorithms in which an operator takes a number of learning algorithms, namely
base-level algorithms and combines their outcomes to make an estimation. The
simplest form of ensemble learning is to train the base-level algorithms on
random subsets of data and then let them vote for the most popular
classifications or average the predictions of the base-level algorithms. In
this study, an ensemble learning method is proposed for improving multi-label
classification evaluation criteria. We have compared our method with well-known
base-level algorithms on some data sets. Experiment results show the proposed
approach outperforms the base well-known classifiers for the multi-label
classification problem.
|
Approximate FPGA-based LSTMs under Computation Time Constraints | Recurrent Neural Networks and in particular Long Short-Term Memory (LSTM)
networks have demonstrated state-of-the-art accuracy in several emerging
Artificial Intelligence tasks. However, the models are becoming increasingly
demanding in terms of computational and memory load. Emerging latency-sensitive
applications including mobile robots and autonomous vehicles often operate
under stringent computation time constraints. In this paper, we address the
challenge of deploying computationally demanding LSTMs at a constrained time
budget by introducing an approximate computing scheme that combines iterative
low-rank compression and pruning, along with a novel FPGA-based LSTM
architecture. Combined in an end-to-end framework, the approximation method's
parameters are optimised and the architecture is configured to address the
problem of high-performance LSTM execution in time-constrained applications.
Quantitative evaluation on a real-life image captioning application indicates
that the proposed methods required up to 6.5x less time to achieve the same
application-level accuracy compared to a baseline method, while achieving an
average of 25x higher accuracy under the same computation time constraints.
|
Building Generalizable Agents with a Realistic and Rich 3D Environment | Teaching an agent to navigate in an unseen 3D environment is a challenging
task, even in the event of simulated environments. To generalize to unseen
environments, an agent needs to be robust to low-level variations (e.g. color,
texture, object changes), and also high-level variations (e.g. layout changes
of the environment). To improve overall generalization, all types of variations
in the environment have to be taken under consideration via different level of
data augmentation steps. To this end, we propose House3D, a rich, extensible
and efficient environment that contains 45,622 human-designed 3D scenes of
visually realistic houses, ranging from single-room studios to multi-storied
houses, equipped with a diverse set of fully labeled 3D objects, textures and
scene layouts, based on the SUNCG dataset (Song et.al.). The diversity in
House3D opens the door towards scene-level augmentation, while the label-rich
nature of House3D enables us to inject pixel- & task-level augmentations such
as domain randomization (Toubin et. al.) and multi-task training. Using a
subset of houses in House3D, we show that reinforcement learning agents trained
with an enhancement of different levels of augmentations perform much better in
unseen environments than our baselines with raw RGB input by over 8% in terms
of navigation success rate. House3D is publicly available at
http://github.com/facebookresearch/House3D.
|
Gradient Layer: Enhancing the Convergence of Adversarial Training for
Generative Models | We propose a new technique that boosts the convergence of training generative
adversarial networks. Generally, the rate of training deep models reduces
severely after multiple iterations. A key reason for this phenomenon is that a
deep network is expressed using a highly non-convex finite-dimensional model,
and thus the parameter gets stuck in a local optimum. Because of this, methods
often suffer not only from degeneration of the convergence speed but also from
limitations in the representational power of the trained network. To overcome
this issue, we propose an additional layer called the gradient layer to seek a
descent direction in an infinite-dimensional space. Because the layer is
constructed in the infinite-dimensional space, we are not restricted by the
specific model structure of finite-dimensional models. As a result, we can get
out of the local optima in finite-dimensional models and move towards the
global optimal function more directly. In this paper, this phenomenon is
explained from the functional gradient method perspective of the gradient
layer. Interestingly, the optimization procedure using the gradient layer
naturally constructs the deep structure of the network. Moreover, we
demonstrate that this procedure can be regarded as a discretization method of
the gradient flow that naturally reduces the objective function. Finally, the
method is tested using several numerical experiments, which show its fast
convergence.
|
Graph Autoencoder-Based Unsupervised Feature Selection with Broad and
Local Data Structure Preservation | Feature selection is a dimensionality reduction technique that selects a
subset of representative features from high dimensional data by eliminating
irrelevant and redundant features. Recently, feature selection combined with
sparse learning has attracted significant attention due to its outstanding
performance compared with traditional feature selection methods that ignores
correlation between features. These works first map data onto a low-dimensional
subspace and then select features by posing a sparsity constraint on the
transformation matrix. However, they are restricted by design to linear data
transformation, a potential drawback given that the underlying correlation
structures of data are often non-linear. To leverage a more sophisticated
embedding, we propose an autoencoder-based unsupervised feature selection
approach that leverages a single-layer autoencoder for a joint framework of
feature selection and manifold learning. More specifically, we enforce column
sparsity on the weight matrix connecting the input layer and the hidden layer,
as in previous work. Additionally, we include spectral graph analysis on the
projected data into the learning process to achieve local data geometry
preservation from the original data space to the low-dimensional feature space.
Extensive experiments are conducted on image, audio, text, and biological data.
The promising experimental results validate the superiority of the proposed
method.
|
Theory of Deep Learning IIb: Optimization Properties of SGD | In Theory IIb we characterize with a mix of theory and experiments the
optimization of deep convolutional networks by Stochastic Gradient Descent. The
main new result in this paper is theoretical and experimental evidence for the
following conjecture about SGD: SGD concentrates in probability -- like the
classical Langevin equation -- on large volume, "flat" minima, selecting flat
minimizers which are with very high probability also global minimizers
|
Denoising Dictionary Learning Against Adversarial Perturbations | We propose denoising dictionary learning (DDL), a simple yet effective
technique as a protection measure against adversarial perturbations. We
examined denoising dictionary learning on MNIST and CIFAR10 perturbed under two
different perturbation techniques, fast gradient sign (FGSM) and jacobian
saliency maps (JSMA). We evaluated it against five different deep neural
networks (DNN) representing the building blocks of most recent architectures
indicating a successive progression of model complexity of each other. We show
that each model tends to capture different representations based on their
architecture. For each model we recorded its accuracy both on the perturbed
test data previously misclassified with high confidence and on the denoised one
after the reconstruction using dictionary learning. The reconstruction quality
of each data point is assessed by means of PSNR (Peak Signal to Noise Ratio)
and Structure Similarity Index (SSI). We show that after applying (DDL) the
reconstruction of the original data point from a noisy
|
Anatomical Data Augmentation For CNN based Pixel-wise Classification | In this work we propose a method for anatomical data augmentation that is
based on using slices of computed tomography (CT) examinations that are
adjacent to labeled slices as another resource of labeled data for training the
network. The extended labeled data is used to train a U-net network for a
pixel-wise classification into different hepatic lesions and normal liver
tissues. Our dataset contains CT examinations from 140 patients with 333 CT
images annotated by an expert radiologist. We tested our approach and compared
it to the conventional training process. Results indicate superiority of our
method. Using the anatomical data augmentation we achieved an improvement of 3%
in the success rate, 5% in the classification accuracy, and 4% in Dice.
|
Sample-Efficient Reinforcement Learning through Transfer and
Architectural Priors | Recent work in deep reinforcement learning has allowed algorithms to learn
complex tasks such as Atari 2600 games just from the reward provided by the
game, but these algorithms presently require millions of training steps in
order to learn, making them approximately five orders of magnitude slower than
humans. One reason for this is that humans build robust shared representations
that are applicable to collections of problems, making it much easier to
assimilate new variants. This paper first introduces the idea of
automatically-generated game sets to aid in transfer learning research, and
then demonstrates the utility of shared representations by showing that models
can substantially benefit from the incorporation of relevant architectural
priors. This technique affords a remarkable 50x positive transfer on a toy
problem-set.
|
Learning Tree-based Deep Model for Recommender Systems | Model-based methods for recommender systems have been studied extensively in
recent years. In systems with large corpus, however, the calculation cost for
the learnt model to predict all user-item preferences is tremendous, which
makes full corpus retrieval extremely difficult. To overcome the calculation
barriers, models such as matrix factorization resort to inner product form
(i.e., model user-item preference as the inner product of user, item latent
factors) and indexes to facilitate efficient approximate k-nearest neighbor
searches. However, it still remains challenging to incorporate more expressive
interaction forms between user and item features, e.g., interactions through
deep neural networks, because of the calculation cost.
In this paper, we focus on the problem of introducing arbitrary advanced
models to recommender systems with large corpus. We propose a novel tree-based
method which can provide logarithmic complexity w.r.t. corpus size even with
more expressive models such as deep neural networks. Our main idea is to
predict user interests from coarse to fine by traversing tree nodes in a
top-down fashion and making decisions for each user-node pair. We also show
that the tree structure can be jointly learnt towards better compatibility with
users' interest distribution and hence facilitate both training and prediction.
Experimental evaluations with two large-scale real-world datasets show that the
proposed method significantly outperforms traditional methods. Online A/B test
results in Taobao display advertising platform also demonstrate the
effectiveness of the proposed method in production environments.
|
HeNet: A Deep Learning Approach on Intel$^\circledR$ Processor Trace for
Effective Exploit Detection | This paper presents HeNet, a hierarchical ensemble neural network, applied to
classify hardware-generated control flow traces for malware detection. Deep
learning-based malware detection has so far focused on analyzing executable
files and runtime API calls. Static code analysis approaches face challenges
due to obfuscated code and adversarial perturbations. Behavioral data collected
during execution is more difficult to obfuscate but recent research has shown
successful attacks against API call based malware classifiers. We investigate
control flow based characterization of a program execution to build robust deep
learning malware classifiers. HeNet consists of a low-level behavior model and
a top-level ensemble model. The low-level model is a per-application behavior
model, trained via transfer learning on a time-series of images generated from
control flow trace of an execution. We use Intel$^\circledR$ Processor Trace
enabled processor for low overhead execution tracing and design a lightweight
image conversion and segmentation of the control flow trace. The top-level
ensemble model aggregates the behavior classification of all the trace segments
and detects an attack. The use of hardware trace adds portability to our system
and the use of deep learning eliminates the manual effort of feature
engineering. We evaluate HeNet against real-world exploitations of PDF readers.
HeNet achieves 100\% accuracy and 0\% false positive on test set, and higher
classification accuracy compared to classical machine learning algorithms.
|
Log-Scale Shrinkage Priors and Adaptive Bayesian Global-Local Shrinkage
Estimation | Global-local shrinkage hierarchies are an important innovation in Bayesian
estimation. We propose the use of log-scale distributions as a novel basis for
generating familes of prior distributions for local shrinkage hyperparameters.
By varying the scale parameter one may vary the degree to which the prior
distribution promotes sparsity in the coefficient estimates. By examining the
class of distributions over the logarithm of the local shrinkage parameter that
have log-linear, or sub-log-linear tails, we show that many standard prior
distributions for local shrinkage parameters can be unified in terms of the
tail behaviour and concentration properties of their corresponding marginal
distributions over the coefficients $\beta_j$. We derive upper bounds on the
rate of concentration around $|\beta_j|=0$, and the tail decay as $|\beta_j|
\to \infty$, achievable by this wide class of prior distributions.
We then propose a new type of ultra-heavy tailed prior, called the log-$t$
prior with the property that, irrespective of the choice of associated scale
parameter, the marginal distribution always diverges at $\beta_j = 0$, and
always possesses super-Cauchy tails. We develop results demonstrating when
prior distributions with (sub)-log-linear tails attain Kullback--Leibler
super-efficiency and prove that the log-$t$ prior distribution is always
super-efficient. We show that the log-$t$ prior is less sensitive to
misspecification of the global shrinkage parameter than the horseshoe or lasso
priors. By incorporating the scale parameter of the log-scale prior
distributions into the Bayesian hierarchy we derive novel adaptive shrinkage
procedures. Simulations show that the adaptive log-$t$ procedure appears to
always perform well, irrespective of the level of sparsity or signal-to-noise
ratio of the underlying model.
|
Deep Nearest Class Mean Model for Incremental Odor Classification | In recent years, more machine learning algorithms have been applied to odor
classification. These odor classification algorithms usually assume that the
training datasets are static. However, for some odor recognition tasks, new
odor classes continually emerge. That is, the odor datasets are dynamically
growing while both training samples and number of classes are increasing over
time. Motivated by this concern, this paper proposes a Deep Nearest Class Mean
(DNCM) model based on the deep learning framework and nearest class mean
method. The proposed model not only leverages deep neural network to extract
deep features, but is also able to dynamically integrate new classes over time.
In our experiments, the DNCM model was initially trained with 10 classes, then
25 new classes are integrated. Experiment results demonstrate that the proposed
model is very efficient for incremental odor classification, especially for new
classes with only a small number of training examples.
|
Evaluation of Machine Learning Algorithms for Intrusion Detection System | Intrusion detection system (IDS) is one of the implemented solutions against
harmful attacks. Furthermore, attackers always keep changing their tools and
techniques. However, implementing an accepted IDS system is also a challenging
task. In this paper, several experiments have been performed and evaluated to
assess various machine learning classifiers based on KDD intrusion dataset. It
succeeded to compute several performance metrics in order to evaluate the
selected classifiers. The focus was on false negative and false positive
performance metrics in order to enhance the detection rate of the intrusion
detection system. The implemented experiments demonstrated that the decision
table classifier achieved the lowest value of false negative while the random
forest classifier has achieved the highest average accuracy rate.
|
Efficient and Effective Quantum Compiling for Entanglement-based Machine
Learning on IBM Q Devices | Quantum compiling means fast, device-aware implementation of quantum
algorithms (i.e., quantum circuits, in the quantum circuit model of
computation). In this paper, we present a strategy for compiling IBM Q -aware,
low-depth quantum circuits that generate Greenberger-Horne-Zeilinger (GHZ)
entangled states. The resulting compiler can replace the QISKit compiler for
the specific purpose of obtaining improved GHZ circuits. It is well known that
GHZ states have several practical applications, including quantum machine
learning. We illustrate our experience in implementing and querying a uniform
quantum example oracle based on the GHZ circuit, for solving the classically
hard problem of learning parity with noise.
|
Attacking Speaker Recognition With Deep Generative Models | In this paper we investigate the ability of generative adversarial networks
(GANs) to synthesize spoofing attacks on modern speaker recognition systems. We
first show that samples generated with SampleRNN and WaveNet are unable to fool
a CNN-based speaker recognition system. We propose a modification of the
Wasserstein GAN objective function to make use of data that is real but not
from the class being learned. Our semi-supervised learning method is able to
perform both targeted and untargeted attacks, raising questions related to
security in speaker authentication systems.
|
An Analysis of Two Common Reference Points for EEGs | Clinical electroencephalographic (EEG) data varies significantly depending on
a number of operational conditions (e.g., the type and placement of electrodes,
the type of electrical grounding used). This investigation explores the
statistical differences present in two different referential montages: Linked
Ear (LE) and Averaged Reference (AR). Each of these accounts for approximately
45% of the data in the TUH EEG Corpus. In this study, we explore the impact
this variability has on machine learning performance. We compare the
statistical properties of features generated using these two montages, and
explore the impact of performance on our standard Hidden Markov Model (HMM)
based classification system. We show that a system trained on LE data
significantly outperforms one trained only on AR data (77.2% vs. 61.4%). We
also demonstrate that performance of a system trained on both data sets is
somewhat compromised (71.4% vs. 77.2%). A statistical analysis of the data
suggests that mean, variance and channel normalization should be considered.
However, cepstral mean subtraction failed to produce an improvement in
performance, suggesting that the impact of these statistical differences is
subtler.
|
Semi-automated Annotation of Signal Events in Clinical EEG Data | To be effective, state of the art machine learning technology needs large
amounts of annotated data. There are numerous compelling applications in
healthcare that can benefit from high performance automated decision support
systems provided by deep learning technology, but they lack the comprehensive
data resources required to apply sophisticated machine learning models.
Further, for economic reasons, it is very difficult to justify the creation of
large annotated corpora for these applications. Hence, automated annotation
techniques become increasingly important. In this study, we investigated the
effectiveness of using an active learning algorithm to automatically annotate a
large EEG corpus. The algorithm is designed to annotate six types of EEG
events. Two model training schemes, namely threshold-based and volume-based,
are evaluated. In the threshold-based scheme the threshold of confidence scores
is optimized in the initial training iteration, whereas for the volume-based
scheme only a certain amount of data is preserved after each iteration.
Recognition performance is improved 2% absolute and the system is capable of
automatically annotating previously unlabeled data. Given that the
interpretation of clinical EEG data is an exceedingly difficult task, this
study provides some evidence that the proposed method is a viable alternative
to expensive manual annotation.
|
Weighted Contrastive Divergence | Learning algorithms for energy based Boltzmann architectures that rely on
gradient descent are in general computationally prohibitive, typically due to
the exponential number of terms involved in computing the partition function.
In this way one has to resort to approximation schemes for the evaluation of
the gradient. This is the case of Restricted Boltzmann Machines (RBM) and its
learning algorithm Contrastive Divergence (CD). It is well-known that CD has a
number of shortcomings, and its approximation to the gradient has several
drawbacks. Overcoming these defects has been the basis of much research and new
algorithms have been devised, such as persistent CD. In this manuscript we
propose a new algorithm that we call Weighted CD (WCD), built from small
modifications of the negative phase in standard CD. However small these
modifications may be, experimental work reported in this paper suggest that WCD
provides a significant improvement over standard CD and persistent CD at a
small additional computational cost.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.