title
stringlengths 7
246
| abstract
stringlengths 6
3.31k
|
---|---|
Predicting Tactical Solutions to Operational Planning Problems under
Imperfect Information
|
This paper offers a methodological contribution at the intersection of
machine learning and operations research. Namely, we propose a methodology to
quickly predict expected tactical descriptions of operational solutions
(TDOSs). The problem we address occurs in the context of two-stage stochastic
programming where the second stage is demanding computationally. We aim to
predict at a high speed the expected TDOS associated with the second stage
problem, conditionally on the first stage variables. This may be used in
support of the solution to the overall two-stage problem by avoiding the online
generation of multiple second stage scenarios and solutions. We formulate the
tactical prediction problem as a stochastic optimal prediction program, whose
solution we approximate with supervised machine learning. The training dataset
consists of a large number of deterministic operational problems generated by
controlled probabilistic sampling. The labels are computed based on solutions
to these problems (solved independently and offline), employing appropriate
aggregation and subselection methods to address uncertainty. Results on our
motivating application on load planning for rail transportation show that deep
learning models produce accurate predictions in very short computing time
(milliseconds or less). The predictive accuracy is close to the lower bounds
calculated based on sample average approximation of the stochastic prediction
programs.
|
Stochastic Gradient Descent with Biased but Consistent Gradient
Estimators
|
Stochastic gradient descent (SGD), which dates back to the 1950s, is one of
the most popular and effective approaches for performing stochastic
optimization. Research on SGD resurged recently in machine learning for
optimizing convex loss functions and training nonconvex deep neural networks.
The theory assumes that one can easily compute an unbiased gradient estimator,
which is usually the case due to the sample average nature of empirical risk
minimization. There exist, however, many scenarios (e.g., graphs) where an
unbiased estimator may be as expensive to compute as the full gradient because
training examples are interconnected. Recently, Chen et al. (2018) proposed
using a consistent gradient estimator as an economic alternative. Encouraged by
empirical success, we show, in a general setting, that consistent estimators
result in the same convergence behavior as do unbiased ones. Our analysis
covers strongly convex, convex, and nonconvex objectives. We verify the results
with illustrative experiments on synthetic and real-world data. This work opens
several new research directions, including the development of more efficient
SGD updates with consistent estimators and the design of efficient training
algorithms for large-scale graphs.
|
End-to-End Physics Event Classification with CMS Open Data: Applying
Image-Based Deep Learning to Detector Data for the Direct Classification of
Collision Events at the LHC
|
This paper describes the construction of novel end-to-end image-based
classifiers that directly leverage low-level simulated detector data to
discriminate signal and background processes in pp collision events at the
Large Hadron Collider at CERN. To better understand what end-to-end classifiers
are capable of learning from the data and to address a number of associated
challenges, we distinguish the decay of the standard model Higgs boson into two
photons from its leading background sources using high-fidelity simulated CMS
Open Data. We demonstrate the ability of end-to-end classifiers to learn from
the angular distribution of the photons recorded as electromagnetic showers,
their intrinsic shapes, and the energy of their constituent hits, even when the
underlying particles are not fully resolved, delivering a clear advantage in
such cases over purely kinematics-based classifiers.
|
Graph-Based Recommendation System
|
In this work, we study recommendation systems modelled as contextual
multi-armed bandit (MAB) problems. We propose a graph-based recommendation
system that learns and exploits the geometry of the user space to create
meaningful clusters in the user domain. This reduces the dimensionality of the
recommendation problem while preserving the accuracy of MAB. We then study the
effect of graph sparsity and clusters size on the MAB performance and provide
exhaustive simulation results both in synthetic and in real-case datasets.
Simulation results show improvements with respect to state-of-the-art MAB
algorithms.
|
On-line Adaptative Curriculum Learning for GANs
|
Generative Adversarial Networks (GANs) can successfully approximate a
probability distribution and produce realistic samples. However, open questions
such as sufficient convergence conditions and mode collapse still persist. In
this paper, we build on existing work in the area by proposing a novel
framework for training the generator against an ensemble of discriminator
networks, which can be seen as a one-student/multiple-teachers setting. We
formalize this problem within the full-information adversarial bandit
framework, where we evaluate the capability of an algorithm to select mixtures
of discriminators for providing the generator with feedback during learning. To
this end, we propose a reward function which reflects the progress made by the
generator and dynamically update the mixture weights allocated to each
discriminator. We also draw connections between our algorithm and stochastic
optimization methods and then show that existing approaches using multiple
discriminators in literature can be recovered from our framework. We argue that
less expressive discriminators are smoother and have a general coarse grained
view of the modes map, which enforces the generator to cover a wide portion of
the data distribution support. On the other hand, highly expressive
discriminators ensure samples quality. Finally, experimental results show that
our approach improves samples quality and diversity over existing baselines by
effectively learning a curriculum. These results also support the claim that
weaker discriminators have higher entropy improving modes coverage. Keywords:
multiple discriminators, curriculum learning, multiple resolutions
discriminators, multi-armed bandits, generative adversarial networks, smooth
discriminators, multi-discriminator gan training, multiple experts.
|
Analyzing Human-Human Interactions: A Survey
|
Many videos depict people, and it is their interactions that inform us of
their activities, relation to one another and the cultural and social setting.
With advances in human action recognition, researchers have begun to address
the automated recognition of these human-human interactions from video. The
main challenges stem from dealing with the considerable variation in recording
setting, the appearance of the people depicted and the coordinated performance
of their interaction. This survey provides a summary of these challenges and
datasets to address these, followed by an in-depth discussion of relevant
vision-based recognition and detection methods. We focus on recent, promising
work based on deep learning and convolutional neural networks (CNNs). Finally,
we outline directions to overcome the limitations of the current
state-of-the-art to analyze and, eventually, understand social human actions.
|
Techniques for Interpretable Machine Learning
|
Interpretable machine learning tackles the important problem that humans
cannot understand the behaviors of complex machine learning models and how
these models arrive at a particular decision. Although many approaches have
been proposed, a comprehensive understanding of the achievements and challenges
is still lacking. We provide a survey covering existing techniques to increase
the interpretability of machine learning models. We also discuss crucial issues
that the community should consider in future work such as designing
user-friendly explanations and developing comprehensive evaluation metrics to
further push forward the area of interpretable machine learning.
|
Scalable Multi-Task Gaussian Process Tensor Regression for Normative
Modeling of Structured Variation in Neuroimaging Data
|
Most brain disorders are very heterogeneous in terms of their underlying
biology and developing analysis methods to model such heterogeneity is a major
challenge. A promising approach is to use probabilistic regression methods to
estimate normative models of brain function using (f)MRI data then use these to
map variation across individuals in clinical populations (e.g., via anomaly
detection). To fully capture individual differences, it is crucial to
statistically model the patterns of correlation across different brain regions
and individuals. However, this is very challenging for neuroimaging data
because of high-dimensionality and highly structured patterns of correlation
across multiple axes. Here, we propose a general and flexible multi-task
learning framework to address this problem. Our model uses a tensor-variate
Gaussian process in a Bayesian mixed-effects model and makes use of Kronecker
algebra and a low-rank approximation to scale efficiently to multi-way
neuroimaging data at the whole brain level. On a publicly available clinical
fMRI dataset, we show that our computationally affordable approach
substantially improves detection sensitivity over both a mass-univariate
normative model and a classifier that --unlike our approach-- has full access
to the clinical labels.
|
Lip-Reading Driven Deep Learning Approach for Speech Enhancement
|
This paper proposes a novel lip-reading driven deep learning framework for
speech enhancement. The proposed approach leverages the complementary strengths
of both deep learning and analytical acoustic modelling (filtering based
approach) as compared to recently published, comparatively simpler benchmark
approaches that rely only on deep learning. The proposed audio-visual (AV)
speech enhancement framework operates at two levels. In the first level, a
novel deep learning-based lip-reading regression model is employed. In the
second level, lip-reading approximated clean-audio features are exploited,
using an enhanced, visually-derived Wiener filter (EVWF), for the clean audio
power spectrum estimation. Specifically, a stacked long-short-term memory
(LSTM) based lip-reading regression model is designed for clean audio features
estimation using only temporal visual features considering different number of
prior visual frames. For clean speech spectrum estimation, a new
filterbank-domain EVWF is formulated, which exploits estimated speech features.
The proposed EVWF is compared with conventional Spectral Subtraction and
Log-Minimum Mean-Square Error methods using both ideal AV mapping and LSTM
driven AV mapping. The potential of the proposed speech enhancement framework
is evaluated under different dynamic real-world commercially-motivated
scenarios (e.g. cafe, public transport, pedestrian area) at different SNR
levels (ranging from low to high SNRs) using benchmark Grid and ChiME3 corpora.
For objective testing, perceptual evaluation of speech quality is used to
evaluate the quality of restored speech. For subjective testing, the standard
mean-opinion-score method is used with inferential statistics. Comparative
simulation results demonstrate significant lip-reading and speech enhancement
improvement in terms of both speech quality and speech intelligibility.
|
A Unified Framework for Joint Mobility Prediction and Object Profiling
of Drones in UAV Networks
|
In recent years, using a network of autonomous and cooperative unmanned
aerial vehicles (UAVs) without command and communication from the ground
station has become more imperative, in particular in search-and-rescue
operations, disaster management, and other applications where human
intervention is limited. In such scenarios, UAVs can make more efficient
decisions if they acquire more information about the mobility, sensing and
actuation capabilities of their neighbor nodes. In this paper, we develop an
unsupervised online learning algorithm for joint mobility prediction and object
profiling of UAVs to facilitate control and communication protocols. The
proposed method not only predicts the future locations of the surrounding
flying objects, but also classifies them into different groups with similar
levels of maneuverability (e.g. rotatory, and fixed-wing UAVs) without prior
knowledge about these classes. This method is flexible in admitting new object
types with unknown mobility profiles, thereby applicable to emerging flying
Ad-hoc networks with heterogeneous nodes.
|
DNN driven Speaker Independent Audio-Visual Mask Estimation for Speech
Separation
|
Human auditory cortex excels at selectively suppressing background noise to
focus on a target speaker. The process of selective attention in the brain is
known to contextually exploit the available audio and visual cues to better
focus on target speaker while filtering out other noises. In this study, we
propose a novel deep neural network (DNN) based audiovisual (AV) mask
estimation model. The proposed AV mask estimation model contextually integrates
the temporal dynamics of both audio and noise-immune visual features for
improved mask estimation and speech separation. For optimal AV features
extraction and ideal binary mask (IBM) estimation, a hybrid DNN architecture is
exploited to leverages the complementary strengths of a stacked long short term
memory (LSTM) and convolution LSTM network. The comparative simulation results
in terms of speech quality and intelligibility demonstrate significant
performance improvement of our proposed AV mask estimation model as compared to
audio-only and visual-only mask estimation approaches for both speaker
dependent and independent scenarios.
|
A Fuzzy-Rough based Binary Shuffled Frog Leaping Algorithm for Feature
Selection
|
Feature selection and attribute reduction are crucial problems, and widely
used techniques in the field of machine learning, data mining and pattern
recognition to overcome the well-known phenomenon of the Curse of
Dimensionality, by either selecting a subset of features or removing unrelated
ones. This paper presents a new feature selection method that efficiently
carries out attribute reduction, thereby selecting the most informative
features of a dataset. It consists of two components: 1) a measure for feature
subset evaluation, and 2) a search strategy. For the evaluation measure, we
have employed the fuzzy-rough dependency degree (FRFDD) in the lower
approximation-based fuzzy-rough feature selection (L-FRFS) due to its
effectiveness in feature selection. As for the search strategy, a new version
of a binary shuffled frog leaping algorithm is proposed (B-SFLA). The new
feature selection method is obtained by hybridizing the B-SFLA with the FRDD.
Non-parametric statistical tests are conducted to compare the proposed approach
with several existing methods over twenty two datasets, including nine high
dimensional and large ones, from the UCI repository. The experimental results
demonstrate that the B-SFLA approach significantly outperforms other
metaheuristic methods in terms of the number of selected features and the
classification accuracy.
|
News Session-Based Recommendations using Deep Neural Networks
|
News recommender systems are aimed to personalize users experiences and help
them to discover relevant articles from a large and dynamic search space.
Therefore, news domain is a challenging scenario for recommendations, due to
its sparse user profiling, fast growing number of items, accelerated item's
value decay, and users preferences dynamic shift. Some promising results have
been recently achieved by the usage of Deep Learning techniques on Recommender
Systems, specially for item's feature extraction and for session-based
recommendations with Recurrent Neural Networks. In this paper, it is proposed
an instantiation of the CHAMELEON -- a Deep Learning Meta-Architecture for News
Recommender Systems. This architecture is composed of two modules, the first
responsible to learn news articles representations, based on their text and
metadata, and the second module aimed to provide session-based recommendations
using Recurrent Neural Networks. The recommendation task addressed in this work
is next-item prediction for users sessions: "what is the next most likely
article a user might read in a session?" Users sessions context is leveraged by
the architecture to provide additional information in such extreme cold-start
scenario of news recommendation. Users' behavior and item features are both
merged in an hybrid recommendation approach. A temporal offline evaluation
method is also proposed as a complementary contribution, for a more realistic
evaluation of such task, considering dynamic factors that affect global
readership interests like popularity, recency, and seasonality. Experiments
with an extensive number of session-based recommendation methods were performed
and the proposed instantiation of CHAMELEON meta-architecture obtained a
significant relative improvement in top-n accuracy and ranking metrics (10% on
Hit Rate and 13% on MRR) over the best benchmark methods.
|
Optimal Gradient Checkpoint Search for Arbitrary Computation Graphs
|
Deep Neural Networks(DNNs) require huge GPU memory when training on modern
image/video databases. Unfortunately, the GPU memory is physically finite,
which limits the image resolutions and batch sizes that could be used in
training for better DNN performance. Unlike solutions that require physically
upgrade GPUs, the Gradient CheckPointing(GCP) training trades computation for
more memory beyond existing GPU hardware. GCP only stores a subset of
intermediate tensors, called Gradient Checkpoints (GCs), during forward. Then
during backward, extra local forwards are conducted to compute the missing
tensors. The total training memory cost becomes the sum of (1) the memory cost
of the gradient checkpoints and (2) the maximum memory cost of local forwards.
To achieve maximal memory cut-offs, one needs optimal algorithms to select GCs.
Existing GCP approaches rely on either manual input of GCs or heuristics-based
GC search on Linear Computation Graphs (LCGs), and cannot apply to Arbitrary
Computation Graphs(ACGs). In this paper, we present theories and optimal
algorithms on GC selection that, for the first time, are applicable to ACGs and
achieve the maximal memory cut-offs. Extensive experiments show that our
approach not only outperforms existing approaches (only applicable on LCGs),
and is applicable to a vast family of LCG and ACG networks, such as Alexnet,
VGG, ResNet, Densenet, Inception Net and highly complicated DNNs by Network
Architecture Search. Our work enables GCP training on ACGs, and cuts off up-to
80% of training memory with a moderate time overhead (~30%-50%). Codes are
available
|
Subsampled R\'enyi Differential Privacy and Analytical Moments
Accountant
|
We study the problem of subsampling in differential privacy (DP), a question
that is the centerpiece behind many successful differentially private machine
learning algorithms. Specifically, we provide a tight upper bound on the
R\'enyi Differential Privacy (RDP) (Mironov, 2017) parameters for algorithms
that: (1) subsample the dataset, and then (2) applies a randomized mechanism M
to the subsample, in terms of the RDP parameters of M and the subsampling
probability parameter. Our results generalize the moments accounting technique,
developed by Abadi et al. (2016) for the Gaussian mechanism, to any subsampled
RDP mechanism.
|
Universal Approximation with Quadratic Deep Networks
|
Recently, deep learning has achieved huge successes in many important
applications. In our previous studies, we proposed quadratic/second-order
neurons and deep quadratic neural networks. In a quadratic neuron, the inner
product of a vector of data and the corresponding weights in a conventional
neuron is replaced with a quadratic function. The resultant quadratic neuron
enjoys an enhanced expressive capability over the conventional neuron. However,
how quadratic neurons improve the expressing capability of a deep quadratic
network has not been studied up to now, preferably in relation to that of a
conventional neural network. Regarding this, we ask four basic questions in
this paper: (1) for the one-hidden-layer network structure, is there any
function that a quadratic network can approximate much more efficiently than a
conventional network? (2) for the same multi-layer network structure, is there
any function that can be expressed by a quadratic network but cannot be
expressed with conventional neurons in the same structure? (3) Does a quadratic
network give a new insight into universal approximation? (4) To approximate the
same class of functions with the same error bound, is a quantized quadratic
network able to enjoy a lower number of weights than a quantized conventional
network? Our main contributions are the four interconnected theorems shedding
light upon these four questions and demonstrating the merits of a quadratic
network in terms of expressive efficiency, unique capability, compact
architecture and computational capacity respectively.
|
Probability Calibration Trees
|
Obtaining accurate and well calibrated probability estimates from classifiers
is useful in many applications, for example, when minimising the expected cost
of classifications. Existing methods of calibrating probability estimates are
applied globally, ignoring the potential for improvements by applying a more
fine-grained model. We propose probability calibration trees, a modification of
logistic model trees that identifies regions of the input space in which
different probability calibration models are learned to improve performance. We
compare probability calibration trees to two widely used calibration
methods---isotonic regression and Platt scaling---and show that our method
results in lower root mean squared error on average than both methods, for
estimates produced by a variety of base learners.
|
Learning Stabilizable Dynamical Systems via Control Contraction Metrics
|
We propose a novel framework for learning stabilizable nonlinear dynamical
systems for continuous control tasks in robotics. The key idea is to develop a
new control-theoretic regularizer for dynamics fitting rooted in the notion of
stabilizability, which guarantees that the learned system can be accompanied by
a robust controller capable of stabilizing any open-loop trajectory that the
system may generate. By leveraging tools from contraction theory, statistical
learning, and convex optimization, we provide a general and tractable
semi-supervised algorithm to learn stabilizable dynamics, which can be applied
to complex underactuated systems. We validated the proposed algorithm on a
simulated planar quadrotor system and observed notably improved trajectory
generation and tracking performance with the control-theoretic regularized
model over models learned using traditional regression techniques, especially
when using a small number of demonstration examples. The results presented
illustrate the need to infuse standard model-based reinforcement learning
algorithms with concepts drawn from nonlinear control theory for improved
reliability.
|
EagleEye: Attack-Agnostic Defense against Adversarial Inputs (Technical
Report)
|
Deep neural networks (DNNs) are inherently vulnerable to adversarial inputs:
such maliciously crafted samples trigger DNNs to misbehave, leading to
detrimental consequences for DNN-powered systems. The fundamental challenges of
mitigating adversarial inputs stem from their adaptive and variable nature.
Existing solutions attempt to improve DNN resilience against specific attacks;
yet, such static defenses can often be circumvented by adaptively engineered
inputs or by new attack variants.
Here, we present EagleEye, an attack-agnostic adversarial tampering analysis
engine for DNN-powered systems. Our design exploits the {\em minimality
principle} underlying many attacks: to maximize the attack's evasiveness, the
adversary often seeks the minimum possible distortion to convert genuine inputs
to adversarial ones. We show that this practice entails the distinct
distributional properties of adversarial inputs in the input space. By
leveraging such properties in a principled manner, EagleEye effectively
discriminates adversarial inputs and even uncovers their correct classification
outputs. Through extensive empirical evaluation using a range of benchmark
datasets and DNN models, we validate EagleEye's efficacy. We further
investigate the adversary's possible countermeasures, which implies a difficult
dilemma for her: to evade EagleEye's detection, excessive distortion is
necessary, thereby significantly reducing the attack's evasiveness regarding
other detection mechanisms.
|
A Theory of Dichotomous Valuation with Applications to Variable
Selection
|
An econometric or statistical model may undergo a marginal gain if we admit a
new variable to the model, and a marginal loss if we remove an existing
variable from the model. Assuming equality of opportunity among all candidate
variables, we derive a valuation framework by the expected marginal gain and
marginal loss in all potential modeling scenarios. However, marginal gain and
loss are not symmetric; thus, we introduce three unbiased solutions. When used
in variable selection, our new approaches significantly outperform several
popular methods used in practice. The results also explore some novel traits of
the Shapley value.
|
Speaker Recognition from Raw Waveform with SincNet
|
Deep learning is progressively gaining popularity as a viable alternative to
i-vectors for speaker recognition. Promising results have been recently
obtained with Convolutional Neural Networks (CNNs) when fed by raw speech
samples directly. Rather than employing standard hand-crafted features, the
latter CNNs learn low-level speech representations from waveforms, potentially
allowing the network to better capture important narrow-band speaker
characteristics such as pitch and formants. Proper design of the neural network
is crucial to achieve this goal. This paper proposes a novel CNN architecture,
called SincNet, that encourages the first convolutional layer to discover more
meaningful filters. SincNet is based on parametrized sinc functions, which
implement band-pass filters. In contrast to standard CNNs, that learn all
elements of each filter, only low and high cutoff frequencies are directly
learned from data with the proposed method. This offers a very compact and
efficient way to derive a customized filter bank specifically tuned for the
desired application. Our experiments, conducted on both speaker identification
and speaker verification tasks, show that the proposed architecture converges
faster and performs better than a standard CNN on raw waveforms.
|
Learning Dexterous In-Hand Manipulation
|
We use reinforcement learning (RL) to learn dexterous in-hand manipulation
policies which can perform vision-based object reorientation on a physical
Shadow Dexterous Hand. The training is performed in a simulated environment in
which we randomize many of the physical properties of the system like friction
coefficients and an object's appearance. Our policies transfer to the physical
robot despite being trained entirely in simulation. Our method does not rely on
any human demonstrations, but many behaviors found in human manipulation emerge
naturally, including finger gaiting, multi-finger coordination, and the
controlled use of gravity. Our results were obtained using the same distributed
RL system that was used to train OpenAI Five. We also include a video of our
results: https://youtu.be/jwSbzNHGflM
|
Graph R-CNN for Scene Graph Generation
|
We propose a novel scene graph generation model called Graph R-CNN, that is
both effective and efficient at detecting objects and their relations in
images. Our model contains a Relation Proposal Network (RePN) that efficiently
deals with the quadratic number of potential relations between objects in an
image. We also propose an attentional Graph Convolutional Network (aGCN) that
effectively captures contextual information between objects and relations.
Finally, we introduce a new evaluation metric that is more holistic and
realistic than existing metrics. We report state-of-the-art performance on
scene graph generation as evaluated using both existing and our proposed
metrics.
|
Reinforced Evolutionary Neural Architecture Search
|
Neural Architecture Search (NAS) is an important yet challenging task in
network design due to its high computational consumption. To address this
issue, we propose the Reinforced Evolutionary Neural Architecture Search (RE-
NAS), which is an evolutionary method with the reinforced mutation for NAS. Our
method integrates reinforced mutation into an evolution algorithm for neural
architecture exploration, in which a mutation controller is introduced to learn
the effects of slight modifications and make mutation actions. The reinforced
mutation controller guides the model population to evolve efficiently.
Furthermore, as child models can inherit parameters from their parents during
evolution, our method requires very limited computational resources. In
experiments, we conduct the proposed search method on CIFAR-10 and obtain a
powerful network architecture, RENASNet. This architecture achieves a
competitive result on CIFAR-10. The explored network architecture is
transferable to ImageNet and achieves a new state-of-the-art accuracy, i.e.,
75.7% top-1 accuracy with 5.36M parameters on mobile ImageNet. We further test
its performance on semantic segmentation with DeepLabv3 on the PASCAL VOC.
RENASNet outperforms MobileNet-v1, MobileNet-v2 and NASNet. It achieves 75.83%
mIOU without being pre-trained on COCO.
|
Manifold: A Model-Agnostic Framework for Interpretation and Diagnosis of
Machine Learning Models
|
Interpretation and diagnosis of machine learning models have gained renewed
interest in recent years with breakthroughs in new approaches. We present
Manifold, a framework that utilizes visual analysis techniques to support
interpretation, debugging, and comparison of machine learning models in a more
transparent and interactive manner. Conventional techniques usually focus on
visualizing the internal logic of a specific model type (i.e., deep neural
networks), lacking the ability to extend to a more complex scenario where
different model types are integrated. To this end, Manifold is designed as a
generic framework that does not rely on or access the internal logic of the
model and solely observes the input (i.e., instances or features) and the
output (i.e., the predicted result and probability distribution). We describe
the workflow of Manifold as an iterative process consisting of three major
phases that are commonly involved in the model development and diagnosis
process: inspection (hypothesis), explanation (reasoning), and refinement
(verification). The visual components supporting these tasks include a
scatterplot-based visual summary that overviews the models' outcome and a
customizable tabular view that reveals feature discrimination. We demonstrate
current applications of the framework on the classification and regression
tasks and discuss other potential machine learning use scenarios where Manifold
can be applied.
|
MaxMin Linear Initialization for Fuzzy C-Means
|
Clustering is an extensive research area in data science. The aim of
clustering is to discover groups and to identify interesting patterns in
datasets. Crisp (hard) clustering considers that each data point belongs to one
and only one cluster. However, it is inadequate as some data points may belong
to several clusters, as is the case in text categorization. Thus, we need more
flexible clustering. Fuzzy clustering methods, where each data point can belong
to several clusters, are an interesting alternative. Yet, seeding iterative
fuzzy algorithms to achieve high quality clustering is an issue. In this paper,
we propose a new linear and efficient initialization algorithm MaxMin Linear to
deal with this problem. Then, we validate our theoretical results through
extensive experiments on a variety of numerical real-world and artificial
datasets. We also test several validity indices, including a new validity index
that we propose, Transformed Standardized Fuzzy Difference (TSFD).
|
Towards Machine Learning on data from Professional Cyclists
|
Professional sports are developing towards increasingly scientific training
methods with increasing amounts of data being collected from laboratory tests,
training sessions and competitions. In cycling, it is standard to equip
bicycles with small computers recording data from sensors such as power-meters,
in addition to heart-rate, speed, altitude etc. Recently, machine learning
techniques have provided huge success in a wide variety of areas where large
amounts of data (big data) is available. In this paper, we perform a pilot
experiment on machine learning to model physical response in elite cyclists. As
a first experiment, we show that it is possible to train a LSTM machine
learning algorithm to predict the heart-rate response of a cyclist during a
training session. This work is a promising first step towards developing more
elaborate models based on big data and machine learning to capture performance
aspects of athletes.
|
Anomaly Detection via Minimum Likelihood Generative Adversarial Networks
|
Anomaly detection aims to detect abnormal events by a model of normality. It
plays an important role in many domains such as network intrusion detection,
criminal activity identity and so on. With the rapidly growing size of
accessible training data and high computation capacities, deep learning based
anomaly detection has become more and more popular. In this paper, a new
domain-based anomaly detection method based on generative adversarial networks
(GAN) is proposed. Minimum likelihood regularization is proposed to make the
generator produce more anomalies and prevent it from converging to normal data
distribution. Proper ensemble of anomaly scores is shown to improve the
stability of discriminator effectively. The proposed method has achieved
significant improvement than other anomaly detection methods on Cifar10 and UCI
datasets.
|
Binarized Convolutional Neural Networks for Efficient Inference on GPUs
|
Convolutional neural networks have recently achieved significant
breakthroughs in various image classification tasks. However, they are
computationally expensive,which can make their feasible mplementation on
embedded and low-power devices difficult. In this paper convolutional neural
network binarization is implemented on GPU-based platforms for real-time
inference on resource constrained devices. In binarized networks, all weights
and intermediate computations between layers are quantized to +1 and -1,
allowing multiplications and additions to be replaced with bit-wise operations
between 32-bit words. This representation completely eliminates the need for
floating point multiplications and additions and decreases both the
computational load and the memory footprint compared to a full-precision
network implemented in floating point, making it well-suited for
resource-constrained environments. We compare the performance of our
implementation with an equivalent floating point implementation on one desktop
and two embedded GPU platforms. Our implementation achieves a maximum speed up
of 7. 4X with only 4.4% loss in accuracy compared to a reference
implementation.
|
Off-Policy Evaluation and Learning from Logged Bandit Feedback: Error
Reduction via Surrogate Policy
|
When learning from a batch of logged bandit feedback, the discrepancy between
the policy to be learned and the off-policy training data imposes statistical
and computational challenges. Unlike classical supervised learning and online
learning settings, in batch contextual bandit learning, one only has access to
a collection of logged feedback from the actions taken by a historical policy,
and expect to learn a policy that takes good actions in possibly unseen
contexts. Such a batch learning setting is ubiquitous in online and interactive
systems, such as ad platforms and recommendation systems. Existing approaches
based on inverse propensity weights, such as Inverse Propensity Scoring (IPS)
and Policy Optimizer for Exponential Models (POEM), enjoy unbiasedness but
often suffer from large mean squared error. In this work, we introduce a new
approach named Maximum Likelihood Inverse Propensity Scoring (MLIPS) for batch
learning from logged bandit feedback. Instead of using the given historical
policy as the proposal in inverse propensity weights, we estimate a maximum
likelihood surrogate policy based on the logged action-context pairs, and then
use this surrogate policy as the proposal. We prove that MLIPS is
asymptotically unbiased, and moreover, has a smaller nonasymptotic mean squared
error than IPS. Such an error reduction phenomenon is somewhat surprising as
the estimated surrogate policy is less accurate than the given historical
policy. Results on multi-label classification problems and a large- scale ad
placement dataset demonstrate the empirical effectiveness of MLIPS.
Furthermore, the proposed surrogate policy technique is complementary to
existing error reduction techniques, and when combined, is able to consistently
boost the performance of several widely used approaches.
|
Robbins-Monro conditions for persistent exploration learning strategies
|
We formulate simple assumptions, implying the Robbins-Monro conditions for
the $Q$-learning algorithm with the local learning rate, depending on the
number of visits of a particular state-action pair (local clock) and the number
of iteration (global clock). It is assumed that the Markov decision process is
communicating and the learning policy ensures the persistent exploration. The
restrictions are imposed on the functional dependence of the learning rate on
the local and global clocks. The result partially confirms the conjecture of
Bradkte (1994).
|
A Review on the Application of Natural Computing in Environmental
Informatics
|
Natural computing offers new opportunities to understand, model and analyze
the complexity of the physical and human-created environment. This paper
examines the application of natural computing in environmental informatics, by
investigating related work in this research field. Various nature-inspired
techniques are presented, which have been employed to solve different relevant
problems. Advantages and disadvantages of these techniques are discussed,
together with analysis of how natural computing is generally used in
environmental research.
|
Interpretable Visual Question Answering by Visual Grounding from
Attention Supervision Mining
|
A key aspect of VQA models that are interpretable is their ability to ground
their answers to relevant regions in the image. Current approaches with this
capability rely on supervised learning and human annotated groundings to train
attention mechanisms inside the VQA architecture. Unfortunately, obtaining
human annotations specific for visual grounding is difficult and expensive. In
this work, we demonstrate that we can effectively train a VQA architecture with
grounding supervision that can be automatically obtained from available region
descriptions and object annotations. We also show that our model trained with
this mined supervision generates visual groundings that achieve a higher
correlation with respect to manually-annotated groundings, meanwhile achieving
state-of-the-art VQA accuracy.
|
Learning Visual Question Answering by Bootstrapping Hard Attention
|
Attention mechanisms in biological perception are thought to select subsets
of perceptual information for more sophisticated processing which would be
prohibitive to perform on all sensory inputs. In computer vision, however,
there has been relatively little exploration of hard attention, where some
information is selectively ignored, in spite of the success of soft attention,
where information is re-weighted and aggregated, but never filtered out. Here,
we introduce a new approach for hard attention and find it achieves very
competitive performance on a recently-released visual question answering
datasets, equalling and in some cases surpassing similar soft attention
architectures while entirely ignoring some features. Even though the hard
attention mechanism is thought to be non-differentiable, we found that the
feature magnitudes correlate with semantic relevance, and provide a useful
signal for our mechanism's attentional selection criterion. Because hard
attention selects important features of the input information, it can also be
more efficient than analogous soft attention mechanisms. This is especially
important for recent approaches that use non-local pairwise operations, whereby
computational and memory costs are quadratic in the size of the set of
features.
|
Model-order selection in statistical shape models
|
Statistical shape models enhance machine learning algorithms providing prior
information about deformation. A Point Distribution Model (PDM) is a popular
landmark-based statistical shape model for segmentation. It requires choosing a
model order, which determines how much of the variation seen in the training
data is accounted for by the PDM. A good choice of the model order depends on
the number of training samples and the noise level in the training data set.
Yet the most common approach for choosing the model order simply keeps a
predetermined percentage of the total shape variation. In this paper, we
present a technique for choosing the model order based on information-theoretic
criteria, and we show empirical evidence that the model order chosen by this
technique provides a good trade-off between over- and underfitting.
|
SEA: A Combined Model for Heat Demand Prediction
|
Heat demand prediction is a prominent research topic in the area of
intelligent energy networks. It has been well recognized that periodicity is
one of the important characteristics of heat demand. Seasonal-trend
decomposition based on LOESS (STL) algorithm can analyze the periodicity of a
heat demand series, and decompose the series into seasonal and trend
components. Then, predicting the seasonal and trend components respectively,
and combining their predictions together as the heat demand prediction is a
possible way to predict heat demand. In this paper, STL-ENN-ARIMA (SEA), a
combined model, was proposed based on the combination of the Elman neural
network (ENN) and the autoregressive integrated moving average (ARIMA) model,
which are commonly applied to heat demand prediction. ENN and ARIMA are used to
predict seasonal and trend components, respectively. Experimental results
demonstrate that the proposed SEA model has a promising performance.
|
The Importance of Context When Recommending TV Content: Dataset and
Algorithms
|
Home entertainment systems feature in a variety of usage scenarios with one
or more simultaneous users, for whom the complexity of choosing media to
consume has increased rapidly over the last decade. Users' decision processes
are complex and highly influenced by contextual settings, but data supporting
the development and evaluation of context-aware recommender systems are scarce.
In this paper we present a dataset of self-reported TV consumption enriched
with contextual information of viewing situations. We show how choice of genre
associates with, among others, the number of present users and users' attention
levels. Furthermore, we evaluate the performance of predicting chosen genres
given different configurations of contextual information, and compare the
results to contextless predictions. The results suggest that including
contextual features in the prediction cause notable improvements, and both
temporal and social context show significant contributions.
|
Structured Differential Learning for Automatic Threshold Setting
|
We introduce a technique that can automatically tune the parameters of a
rule-based computer vision system comprised of thresholds, combinational logic,
and time constants. This lets us retain the flexibility and perspicacity of a
conventionally structured system while allowing us to perform approximate
gradient descent using labeled data. While this is only a heuristic procedure,
as far as we are aware there is no other efficient technique for tuning such
systems. We describe the components of the system and the associated supervised
learning mechanism. We also demonstrate the utility of the algorithm by
comparing its performance versus hand tuning for an automotive headlight
controller. Despite having over 100 parameters, the method is able to
profitably adjust the system values given just the desired output for a number
of videos.
|
A Differentially Private Kernel Two-Sample Test
|
Kernel two-sample testing is a useful statistical tool in determining whether
data samples arise from different distributions without imposing any parametric
assumptions on those distributions. However, raw data samples can expose
sensitive information about individuals who participate in scientific studies,
which makes the current tests vulnerable to privacy breaches. Hence, we design
a new framework for kernel two-sample testing conforming to differential
privacy constraints, in order to guarantee the privacy of subjects in the data.
Unlike existing differentially private parametric tests that simply add noise
to data, kernel-based testing imposes a challenge due to a complex dependence
of test statistics on the raw data, as these statistics correspond to
estimators of distances between representations of probability measures in
Hilbert spaces. Our approach considers finite dimensional approximations to
those representations. As a result, a simple chi-squared test is obtained,
where a test statistic depends on a mean and covariance of empirical
differences between the samples, which we perturb for a privacy guarantee. We
investigate the utility of our framework in two realistic settings and conclude
that our method requires only a relatively modest increase in sample size to
achieve a similar level of power to the non-private tests in both settings.
|
Just Interpolate: Kernel "Ridgeless" Regression Can Generalize
|
In the absence of explicit regularization, Kernel "Ridgeless" Regression with
nonlinear kernels has the potential to fit the training data perfectly. It has
been observed empirically, however, that such interpolated solutions can still
generalize well on test data. We isolate a phenomenon of implicit
regularization for minimum-norm interpolated solutions which is due to a
combination of high dimensionality of the input data, curvature of the kernel
function, and favorable geometric properties of the data such as an eigenvalue
decay of the empirical covariance and kernel matrices. In addition to deriving
a data-dependent upper bound on the out-of-sample error, we present
experimental evidence suggesting that the phenomenon occurs in the MNIST
dataset.
|
Geometry of energy landscapes and the optimizability of deep neural
networks
|
Deep neural networks are workhorse models in machine learning with multiple
layers of non-linear functions composed in series. Their loss function is
highly non-convex, yet empirically even gradient descent minimisation is
sufficient to arrive at accurate and predictive models. It is hitherto unknown
why are deep neural networks easily optimizable. We analyze the energy
landscape of a spin glass model of deep neural networks using random matrix
theory and algebraic geometry. We analytically show that the multilayered
structure holds the key to optimizability: Fixing the number of parameters and
increasing network depth, the number of stationary points in the loss function
decreases, minima become more clustered in parameter space, and the tradeoff
between the depth and width of minima becomes less severe. Our analytical
results are numerically verified through comparison with neural networks
trained on a set of classical benchmark datasets. Our model uncovers generic
design principles of machine learning models.
|
Stock Chart Pattern recognition with Deep Learning
|
This study evaluates the performances of CNN and LSTM for recognizing common
charts patterns in a stock historical data. It presents two common patterns,
the method used to build the training set, the neural networks architectures
and the accuracies obtained.
|
Seq2Seq and Multi-Task Learning for joint intent and content extraction
for domain specific interpreters
|
This study evaluates the performances of an LSTM network for detecting and
extracting the intent and content of com- mands for a financial chatbot. It
presents two techniques, sequence to sequence learning and Multi-Task Learning,
which might improve on the previous task.
|
Matrix completion and extrapolation via kernel regression
|
Matrix completion and extrapolation (MCEX) are dealt with here over
reproducing kernel Hilbert spaces (RKHSs) in order to account for prior
information present in the available data. Aiming at a faster and
low-complexity solver, the task is formulated as a kernel ridge regression. The
resultant MCEX algorithm can also afford online implementation, while the class
of kernel functions also encompasses several existing approaches to MC with
prior information. Numerical tests on synthetic and real datasets show that the
novel approach performs faster than widespread methods such as alternating
least squares (ALS) or stochastic gradient descent (SGD), and that the recovery
error is reduced, especially when dealing with noisy data.
|
SlimNets: An Exploration of Deep Model Compression and Acceleration
|
Deep neural networks have achieved increasingly accurate results on a wide
variety of complex tasks. However, much of this improvement is due to the
growing use and availability of computational resources (e.g use of GPUs, more
layers, more parameters, etc). Most state-of-the-art deep networks, despite
performing well, over-parameterize approximate functions and take a significant
amount of time to train. With increased focus on deploying deep neural networks
on resource constrained devices like smart phones, there has been a push to
evaluate why these models are so resource hungry and how they can be made more
efficient. This work evaluates and compares three distinct methods for deep
model compression and acceleration: weight pruning, low rank factorization, and
knowledge distillation. Comparisons on VGG nets trained on CIFAR10 show that
each of the models on their own are effective, but that the true power lies in
combining them. We show that by combining pruning and knowledge distillation
methods we can create a compressed network 85 times smaller than the original,
all while retaining 96% of the original model's accuracy.
|
A Learning-Based Framework for Two-Dimensional Vehicle Maneuver
Prediction over V2V Networks
|
Situational awareness in vehicular networks could be substantially improved
utilizing reliable trajectory prediction methods. More precise situational
awareness, in turn, results in notably better performance of critical safety
applications, such as Forward Collision Warning (FCW), as well as comfort
applications like Cooperative Adaptive Cruise Control (CACC). Therefore,
vehicle trajectory prediction problem needs to be deeply investigated in order
to come up with an end to end framework with enough precision required by the
safety applications' controllers. This problem has been tackled in the
literature using different methods. However, machine learning, which is a
promising and emerging field with remarkable potential for time series
prediction, has not been explored enough for this purpose. In this paper, a
two-layer neural network-based system is developed which predicts the future
values of vehicle parameters, such as velocity, acceleration, and yaw rate, in
the first layer and then predicts the two-dimensional, i.e. longitudinal and
lateral, trajectory points based on the first layer's outputs. The performance
of the proposed framework has been evaluated in realistic cut-in scenarios from
Safety Pilot Model Deployment (SPMD) dataset and the results show a noticeable
improvement in the prediction accuracy in comparison with the kinematics model
which is the dominant employed model by the automotive industry. Both ideal and
nonideal communication circumstances have been investigated for our system
evaluation. For non-ideal case, an estimation step is included in the framework
before the parameter prediction block to handle the drawbacks of packet drops
or sensor failures and reconstruct the time series of vehicle parameters at a
desirable frequency.
|
Mod-DeepESN: Modular Deep Echo State Network
|
Neuro-inspired recurrent neural network algorithms, such as echo state
networks, are computationally lightweight and thereby map well onto untethered
devices. The baseline echo state network algorithms are shown to be efficient
in solving small-scale spatio-temporal problems. However, they underperform for
complex tasks that are characterized by multi-scale structures. In this
research, an intrinsic plasticity-infused modular deep echo state network
architecture is proposed to solve complex and multiple timescale temporal
tasks. It outperforms state-of-the-art for time series prediction tasks.
|
The impact of imbalanced training data on machine learning for author
name disambiguation
|
In supervised machine learning for author name disambiguation, negative
training data are often dominantly larger than positive training data. This
paper examines how the ratios of negative to positive training data can affect
the performance of machine learning algorithms to disambiguate author names in
bibliographic records. On multiple labeled datasets, three classifiers -
Logistic Regression, Na\"ive Bayes, and Random Forest - are trained through
representative features such as coauthor names, and title words extracted from
the same training data but with various positive-negative training data ratios.
Results show that increasing negative training data can improve disambiguation
performance but with a few percent of performance gains and sometimes degrade
it. Logistic Regression and Na\"ive Bayes learn optimal disambiguation models
even with a base ratio (1:1) of positive and negative training data. Also, the
performance improvement by Random Forest tends to quickly saturate roughly
after 1:10 ~ 1:15. These findings imply that contrary to the common practice
using all training data, name disambiguation algorithms can be trained using
part of negative training data without degrading much disambiguation
performance while increasing computational efficiency. This study calls for
more attention from author name disambiguation scholars to methods for machine
learning from imbalanced data.
|
Inference of Users Demographic Attributes based on Homophily in
Communication Networks
|
Over the past decade, mobile phones have become prevalent in all parts of the
world, across all demographic backgrounds. Mobile phones are used by men and
women across a wide age range in both developed and developing countries.
Consequently, they have become one of the most important mechanisms for social
interaction within a population, making them an increasingly important source
of information to understand human demographics and human behaviour.
In this work we combine two sources of information: communication logs from a
major mobile operator in a Latin American country, and information on the
demographics of a subset of the users population. This allows us to perform an
observational study of mobile phone usage, differentiated by age groups
categories. This study is interesting in its own right, since it provides
knowledge on the structure and demographics of the mobile phone market in the
studied country.
We then tackle the problem of inferring the age group for all users in the
network. We present here an exclusively graph-based inference method relying
solely on the topological structure of the mobile network, together with a
topological analysis of the performance of the algorithm. The equations for our
algorithm can be described as a diffusion process with two added properties:
(i) memory of its initial state, and (ii) the information is propagated as a
probability vector for each node attribute (instead of the value of the
attribute itself). Our algorithm can successfully infer different age groups
within the network population given known values for a subset of nodes (seed
nodes). Most interestingly, we show that by carefully analysing the topological
relationships between correctly predicted nodes and the seed nodes, we can
characterize particular subsets of nodes for which our inference method has
significantly higher accuracy.
|
Open Category Detection with PAC Guarantees
|
Open category detection is the problem of detecting "alien" test instances
that belong to categories or classes that were not present in the training
data. In many applications, reliably detecting such aliens is central to
ensuring the safety and accuracy of test set predictions. Unfortunately, there
are no algorithms that provide theoretical guarantees on their ability to
detect aliens under general assumptions. Further, while there are algorithms
for open category detection, there are few empirical results that directly
report alien detection rates. Thus, there are significant theoretical and
empirical gaps in our understanding of open category detection. In this paper,
we take a step toward addressing this gap by studying a simple, but
practically-relevant variant of open category detection. In our setting, we are
provided with a "clean" training set that contains only the target categories
of interest and an unlabeled "contaminated" training set that contains a
fraction $\alpha$ of alien examples. Under the assumption that we know an upper
bound on $\alpha$, we develop an algorithm with PAC-style guarantees on the
alien detection rate, while aiming to minimize false alarms. Empirical results
on synthetic and standard benchmark datasets demonstrate the regimes in which
the algorithm can be effective and provide a baseline for further advancements.
|
Novel Compressible Adaptive Spectral Mixture Kernels for Gaussian
Processes with Sparse Time and Phase Delay Structures
|
Spectral mixture (SM) kernels comprise a powerful class of kernels for
Gaussian processes (GPs) capable of discovering structurally complex patterns
and modeling negative covariances. Being a linear superposition of
quasi-periodical kernel components, the state-of-the-art SM kernel does not
consider component compression and dependency structures between components. In
this paper, we investigate the benefits of component compression and modeling
of both time and phase delay structures between basis components in the SM
kernel. By verifying the presence of dependencies between function components
using Gaussian conditionals and posterior covariance, we first propose a new SM
kernel variant with a time and phase delay dependency structure (SMD) and then
provide a structure adaptation (SA) algorithm for the SMD. The SMD kernel is
constructed in two steps: first, time delay and phase delay are incorporated
into each basis component; next, cross-convolution between a basis component
and the reversed complex conjugate of another basis component is performed,
which yields a complex-valued and positive definite kernel incorporating
dependency structures between basis components. The model compression and
dependency sparsity of the SMD kernel can be obtained by using automatic
pruning in SA. We perform a thorough comparative experimental analysis of the
SMD on both synthetic and real-life datasets. The results corroborate the
efficacy of the dependency structure and SA in the SMD.
|
Data Augmentation for Robust Keyword Spotting under Playback
Interference
|
Accurate on-device keyword spotting (KWS) with low false accept and false
reject rate is crucial to customer experience for far-field voice control of
conversational agents. It is particularly challenging to maintain low false
reject rate in real world conditions where there is (a) ambient noise from
external sources such as TV, household appliances, or other speech that is not
directed at the device (b) imperfect cancellation of the audio playback from
the device, resulting in residual echo, after being processed by the Acoustic
Echo Cancellation (AEC) system. In this paper, we propose a data augmentation
strategy to improve keyword spotting performance under these challenging
conditions. The training set audio is artificially corrupted by mixing in music
and TV/movie audio, at different signal to interference ratios. Our results
show that we get around 30-45% relative reduction in false reject rates, at a
range of false alarm rates, under audio playback from such devices.
|
Towards fully automated protein structure elucidation with NMR
spectroscopy
|
Nuclear magnetic resonance (NMR) spectroscopy is one of the leading
techniques for protein studies. The method features a number of properties,
allowing to explain macromolecular interactions mechanistically and resolve
structures with atomic resolution. However, due to laborious data analysis, a
full potential of NMR spectroscopy remains unexploited. Here we present an
approach aiming at automation of two major bottlenecks in the analysis
pipeline, namely, peak picking and chemical shift assignment. Our approach
combines deep learning, non-parametric models and combinatorial optimization,
and is able to detect signals of interest in a multidimensional NMR data with
high accuracy and match them with atoms in medium-length protein sequences,
which is a preliminary step to solve protein spatial structure.
|
MLCapsule: Guarded Offline Deployment of Machine Learning as a Service
|
With the widespread use of machine learning (ML) techniques, ML as a service
has become increasingly popular. In this setting, an ML model resides on a
server and users can query it with their data via an API. However, if the
user's input is sensitive, sending it to the server is undesirable and
sometimes even legally not possible. Equally, the service provider does not
want to share the model by sending it to the client for protecting its
intellectual property and pay-per-query business model.
In this paper, we propose MLCapsule, a guarded offline deployment of machine
learning as a service. MLCapsule executes the model locally on the user's side
and therefore the data never leaves the client. Meanwhile, MLCapsule offers the
service provider the same level of control and security of its model as the
commonly used server-side execution. In addition, MLCapsule is applicable to
offline applications that require local execution. Beyond protecting against
direct model access, we couple the secure offline deployment with defenses
against advanced attacks on machine learning models such as model stealing,
reverse engineering, and membership inference.
|
Classification of Building Information Model (BIM) Structures with Deep
Learning
|
In this work we study an application of machine learning to the construction
industry and we use classical and modern machine learning methods to categorize
images of building designs into three classes: Apartment building, Industrial
building or Other. No real images are used, but only images extracted from
Building Information Model (BIM) software, as these are used by the
construction industry to store building designs. For this task, we compared
four different methods: the first is based on classical machine learning, where
Histogram of Oriented Gradients (HOG) was used for feature extraction and a
Support Vector Machine (SVM) for classification; the other three methods are
based on deep learning, covering common pre-trained networks as well as ones
designed from scratch. To validate the accuracy of the models, a database of
240 images was used. The accuracy achieved is 57% for the HOG + SVM model, and
above 89% for the neural networks.
|
Mixture Matrix Completion
|
Completing a data matrix X has become an ubiquitous problem in modern data
science, with applications in recommender systems, computer vision, and
networks inference, to name a few. One typical assumption is that X is
low-rank. A more general model assumes that each column of X corresponds to one
of several low-rank matrices. This paper generalizes these models to what we
call mixture matrix completion (MMC): the case where each entry of X
corresponds to one of several low-rank matrices. MMC is a more accurate model
for recommender systems, and brings more flexibility to other completion and
clustering problems. We make four fundamental contributions about this new
model. First, we show that MMC is theoretically possible (well-posed). Second,
we give its precise information-theoretic identifiability conditions. Third, we
derive the sample complexity of MMC. Finally, we give a practical algorithm for
MMC with performance comparable to the state-of-the-art for simpler related
problems, both on synthetic and real data.
|
Fusion Subspace Clustering: Full and Incomplete Data
|
Modern inference and learning often hinge on identifying low-dimensional
structures that approximate large scale data. Subspace clustering achieves this
through a union of linear subspaces. However, in contemporary applications data
is increasingly often incomplete, rendering standard (full-data) methods
inapplicable. On the other hand, existing incomplete-data methods present major
drawbacks, like lifting an already high-dimensional problem, or requiring a
super polynomial number of samples. Motivated by this, we introduce a new
subspace clustering algorithm inspired by fusion penalties. The main idea is to
permanently assign each datum to a subspace of its own, and minimize the
distance between the subspaces of all data, so that subspaces of the same
cluster get fused together. Our approach is entirely new to both, full and
missing data, and unlike other methods, it directly allows noise, it requires
no liftings, it allows low, high, and even full-rank data, it approaches
optimal (information-theoretic) sampling rates, and it does not rely on other
methods such as low-rank matrix completion to handle missing data. Furthermore,
our extensive experiments on both real and synthetic data show that our
approach performs comparably to the state-of-the-art with complete data, and
dramatically better if data is missing.
|
Induction of Non-Monotonic Logic Programs to Explain Boosted Tree Models
Using LIME
|
We present a heuristic based algorithm to induce \textit{nonmonotonic} logic
programs that will explain the behavior of XGBoost trained classifiers. We use
the technique based on the LIME approach to locally select the most important
features contributing to the classification decision. Then, in order to explain
the model's global behavior, we propose the LIME-FOLD algorithm ---a
heuristic-based inductive logic programming (ILP) algorithm capable of learning
non-monotonic logic programs---that we apply to a transformed dataset produced
by LIME. Our proposed approach is agnostic to the choice of the ILP algorithm.
Our experiments with UCI standard benchmarks suggest a significant improvement
in terms of classification evaluation metrics. Meanwhile, the number of induced
rules dramatically decreases compared to ALEPH, a state-of-the-art ILP system.
|
Deep Learning for Radio Resource Allocation in Multi-Cell Networks
|
Increased complexity and heterogeneity of emerging 5G and beyond 5G (B5G)
wireless networks will require a paradigm shift from traditional resource
allocation mechanisms. Deep learning (DL) is a powerful tool where a
multi-layer neural network can be trained to model a resource management
algorithm using network data.Therefore, resource allocation decisions can be
obtained without intensive online computations which would be required
otherwise for the solution of resource allocation problems. In this context,
this article focuses on the application of DL to obtain solutions for the radio
resource allocation problems in multi-cell networks. Starting with a brief
overview of a deep neural network (DNN) as a DL model, relevant DNN
architectures and the data training procedure, we provide an overview of
existing state-of-the-art applying DL in the context of radio resource
allocation. A qualitative comparison is provided in terms of their objectives,
inputs/outputs, learning and data training methods. Then, we present a
supervised DL model to solve the sub-band and power allocation problem in a
multi-cell network. Using the data generated by a genetic algorithm, we first
train the model and then test the accuracy of the proposed model in predicting
the resource allocation solutions. Simulation results show that the trained DL
model is able to provide the desired optimal solution 86.3% of time.
|
On the achievability of blind source separation for high-dimensional
nonlinear source mixtures
|
For many years, a combination of principal component analysis (PCA) and
independent component analysis (ICA) has been used for blind source separation
(BSS). However, it remains unclear why these linear methods work well with
real-world data that involve nonlinear source mixtures. This work theoretically
validates that a cascade of linear PCA and ICA can solve a nonlinear BSS
problem accurately -- when the sensory inputs are generated from hidden sources
via nonlinear mappings with sufficient dimensionality. Our proposed theorem,
termed the asymptotic linearization theorem, theoretically guarantees that
applying linear PCA to the inputs can reliably extract a subspace spanned by
the linear projections from every hidden source as the major components -- and
thus projecting the inputs onto their major eigenspace can effectively recover
a linear transformation of the hidden sources. Then, subsequent application of
linear ICA can separate all the true independent hidden sources accurately.
Zero-element-wise-error nonlinear BSS is asymptotically attained when the
source dimensionality is large and the input dimensionality is sufficiently
larger than the source dimensionality. Our proposed theorem is validated
analytically and numerically. Moreover, the same computation can be performed
by using Hebbian-like plasticity rules, implying the biological plausibility of
this nonlinear BSS strategy. Our results highlight the utility of linear PCA
and ICA for accurately and reliably recovering nonlinearly mixed sources -- and
further suggest the importance of employing sensors with sufficient
dimensionality to identify true hidden sources of real-world data.
|
RecoGym: A Reinforcement Learning Environment for the problem of Product
Recommendation in Online Advertising
|
Recommender Systems are becoming ubiquitous in many settings and take many
forms, from product recommendation in e-commerce stores, to query suggestions
in search engines, to friend recommendation in social networks. Current
research directions which are largely based upon supervised learning from
historical data appear to be showing diminishing returns with a lot of
practitioners report a discrepancy between improvements in offline metrics for
supervised learning and the online performance of the newly proposed models.
One possible reason is that we are using the wrong paradigm: when looking at
the long-term cycle of collecting historical performance data, creating a new
version of the recommendation model, A/B testing it and then rolling it out. We
see that there a lot of commonalities with the reinforcement learning (RL)
setup, where the agent observes the environment and acts upon it in order to
change its state towards better states (states with higher rewards). To this
end we introduce RecoGym, an RL environment for recommendation, which is
defined by a model of user traffic patterns on e-commerce and the users
response to recommendations on the publisher websites. We believe that this is
an important step forward for the field of recommendation systems research,
that could open up an avenue of collaboration between the recommender systems
and reinforcement learning communities and lead to better alignment between
offline and online performance metrics.
|
Online Aggregation of Unbounded Losses Using Shifting Experts with
Confidence
|
We develop the setting of sequential prediction based on shifting experts and
on a "smooth" version of the method of specialized experts. To aggregate
experts predictions, we use the AdaHedge algorithm, which is a version of the
Hedge algorithm with adaptive learning rate, and extend it by the
meta-algorithm Fixed Share. Due to this, we combine the advantages of both
algorithms: (1) we use the shifting regret which is a more optimal
characteristic of the algorithm; (2) regret bounds are valid in the case of
signed unbounded losses of the experts. Also, (3) we incorporate in this scheme
a "smooth" version of the method of specialized experts which allows us to make
more flexible and accurate predictions. All results are obtained in the
adversarial setting -- no assumptions are made about the nature of data source.
We present results of numerical experiments for short-term forecasting of
electricity consumption based on a real data.
|
Robust Attentional Aggregation of Deep Feature Sets for Multi-view 3D
Reconstruction
|
We study the problem of recovering an underlying 3D shape from a set of
images. Existing learning based approaches usually resort to recurrent neural
nets, e.g., GRU, or intuitive pooling operations, e.g., max/mean poolings, to
fuse multiple deep features encoded from input images. However, GRU based
approaches are unable to consistently estimate 3D shapes given different
permutations of the same set of input images as the recurrent unit is
permutation variant. It is also unlikely to refine the 3D shape given more
images due to the long-term memory loss of GRU. Commonly used pooling
approaches are limited to capturing partial information, e.g., max/mean values,
ignoring other valuable features. In this paper, we present a new feed-forward
neural module, named AttSets, together with a dedicated training algorithm,
named FASet, to attentively aggregate an arbitrarily sized deep feature set for
multi-view 3D reconstruction. The AttSets module is permutation invariant,
computationally efficient and flexible to implement, while the FASet algorithm
enables the AttSets based network to be remarkably robust and generalize to an
arbitrary number of input images. We thoroughly evaluate FASet and the
properties of AttSets on multiple large public datasets. Extensive experiments
show that AttSets together with FASet algorithm significantly outperforms
existing aggregation approaches.
|
The Quest for the Golden Activation Function
|
Deep Neural Networks have been shown to be beneficial for a variety of tasks,
in particular allowing for end-to-end learning and reducing the requirement for
manual design decisions. However, still many parameters have to be chosen in
advance, also raising the need to optimize them. One important, but often
ignored system parameter is the selection of a proper activation function.
Thus, in this paper we target to demonstrate the importance of activation
functions in general and show that for different tasks different activation
functions might be meaningful. To avoid the manual design or selection of
activation functions, we build on the idea of genetic algorithms to learn the
best activation function for a given task. In addition, we introduce two new
activation functions, ELiSH and HardELiSH, which can easily be incorporated in
our framework. In this way, we demonstrate for three different image
classification benchmarks that different activation functions are learned, also
showing improved results compared to typically used baselines.
|
Mobile big data analysis with machine learning
|
This paper investigates to identify the requirement and the development of
machine learning-based mobile big data analysis through discussing the insights
of challenges in the mobile big data (MBD). Furthermore, it reviews the
state-of-the-art applications of data analysis in the area of MBD. Firstly, we
introduce the development of MBD. Secondly, the frequently adopted methods of
data analysis are reviewed. Three typical applications of MBD analysis, namely
wireless channel modeling, human online and offline behavior analysis, and
speech recognition in the internet of vehicles, are introduced respectively.
Finally, we summarize the main challenges and future development directions of
mobile big data analysis.
|
Classification of EEG Signal based on non-Gaussian Neutral Vector
|
In the design of brain-computer interface systems, classification of
Electroencephalogram (EEG) signals is the essential part and a challenging
task. Recently, as the marginalized discrete wavelet transform (mDWT)
representations can reveal features related to the transient nature of the EEG
signals, the mDWT coefficients have been frequently used in EEG signal
classification. In our previous work, we have proposed a super-Dirichlet
distribution-based classifier, which utilized the nonnegative and sum-to-one
properties of the mDWT coefficients. The proposed classifier performed better
than the state-of-the-art support vector machine-based classifier. In this
paper, we further study the neutrality of the mDWT coefficients. Assuming the
mDWT vector coefficients to be a neutral vector, we transform them non-linearly
into a set of independent scalar coefficients. Feature selection strategy is
proposed on the transformed feature domain. Experimental results show that the
feature selection strategy helps improving the classification accuracy.
|
Dirichlet Mixture Model based VQ Performance Prediction for Line
Spectral Frequency
|
In this paper, we continue our previous work on the Dirichlet mixture model
(DMM)-based VQ to derive the performance bound of the LSF VQ. The LSF
parameters are transformed into the $\Delta$LSF domain and the underlying
distribution of the $\Delta$LSF parameters are modelled by a DMM with finite
number of mixture components. The quantization distortion, in terms of the mean
squared error (MSE), is calculated with the high rate theory. The mapping
relation between the perceptually motivated log spectral distortion (LSD) and
the MSE is empirically approximated by a polynomial. With this mapping
function, the minimum required bit rate for transparent coding of the LSF is
estimated.
|
Efficient Bayesian Inference of Sigmoidal Gaussian Cox Processes
|
We present an approximate Bayesian inference approach for estimating the
intensity of an inhomogeneous Poisson process, where the intensity function is
modelled using a Gaussian process (GP) prior via a sigmoid link function.
Augmenting the model using a latent marked Poisson process and P\'olya--Gamma
random variables we obtain a representation of the likelihood which is
conjugate to the GP prior. We estimate the posterior using a variational
free--form mean field optimisation together with the framework of sparse GPs.
Furthermore, as alternative approximation we suggest a sparse Laplace's method
for the posterior, for which an efficient expectation--maximisation algorithm
is derived to find the posterior's mode. Both algorithms compare well against
exact inference obtained by a Markov Chain Monte Carlo sampler and standard
variational Gauss approach solving the same model, while being one order of
magnitude faster. Furthermore, the performance and speed of our method is
competitive with that of another recently proposed Poisson process model based
on a quadratic link function, while not being limited to GPs with squared
exponential kernels and rectangular domains.
|
RGB Video Based Tennis Action Recognition Using a Deep Historical Long
Short-Term Memory
|
Action recognition has attracted increasing attention from RGB input in
computer vision partially due to potential applications on somatic simulation
and statistics of sport such as virtual tennis game and tennis techniques and
tactics analysis by video. Recently, deep learning based methods have achieved
promising performance for action recognition. In this paper, we propose
weighted Long Short-Term Memory adopted with convolutional neural network
representations for three dimensional tennis shots recognition. First, the
local two-dimensional convolutional neural network spatial representations are
extracted from each video frame individually using a pre-trained Inception
network. Then, a weighted Long Short-Term Memory decoder is introduced to take
the output state at time t and the historical embedding feature at time t-1 to
generate feature vector using a score weighting scheme. Finally, we use the
adopted CNN and weighted LSTM to map the original visual features into a vector
space to generate the spatial-temporal semantical description of visual
sequences and classify the action video content. Experiments on the benchmark
demonstrate that our method using only simple raw RGB video can achieve better
performance than the state-of-the-art baselines for tennis shot recognition.
|
Normalization Before Shaking Toward Learning Symmetrically Distributed
Representation Without Margin in Speech Emotion Recognition
|
Regularization is crucial to the success of many practical deep learning
models, in particular in a more often than not scenario where there are only a
few to a moderate number of accessible training samples. In addition to weight
decay, data augmentation and dropout, regularization based on multi-branch
architectures, such as Shake-Shake regularization, has been proven successful
in many applications and attracted more and more attention. However, beyond
model-based representation augmentation, it is unclear how Shake-Shake
regularization helps to provide further improvement on classification tasks,
let alone the baffling interaction between batch normalization and shaking. In
this work, we present our investigation on Shake-Shake regularization, drawing
connections to the vicinal risk minimization principle and discriminative
feature learning in verification tasks. Furthermore, we identify a strong
resemblance between batch normalized residual blocks and batch normalized
recurrent neural networks, where both of them share a similar convergence
behavior, which could be mitigated by a proper initialization of batch
normalization. Based on the findings, our experiments on speech emotion
recognition demonstrate simultaneously an improvement on the classification
accuracy and a reduction on the generalization gap both with statistical
significance.
|
Supervised classification for object identification in urban areas using
satellite imagery
|
This paper presents a useful method to achieve classification in satellite
imagery. The approach is based on pixel level study employing various features
such as correlation, homogeneity, energy and contrast. In this study gray-scale
images are used for training the classification model. For supervised
classification, two classification techniques are employed namely the Support
Vector Machine (SVM) and the Naive Bayes. With textural features used for
gray-scale images, Naive Bayes performs better with an overall accuracy of 76%
compared to 68% achieved by SVM. The computational time is evaluated while
performing the experiment with two different window sizes i.e., 50x50 and
70x70. The required computational time on a single image is found to be 27
seconds for a window size of 70x70 and 45 seconds for a window size of 50x50.
|
Semi-blind source separation with multichannel variational autoencoder
|
This paper proposes a multichannel source separation technique called the
multichannel variational autoencoder (MVAE) method, which uses a conditional
VAE (CVAE) to model and estimate the power spectrograms of the sources in a
mixture. By training the CVAE using the spectrograms of training examples with
source-class labels, we can use the trained decoder distribution as a universal
generative model capable of generating spectrograms conditioned on a specified
class label. By treating the latent space variables and the class label as the
unknown parameters of this generative model, we can develop a
convergence-guaranteed semi-blind source separation algorithm that consists of
iteratively estimating the power spectrograms of the underlying sources as well
as the separation matrices. In experimental evaluations, our MVAE produced
better separation performance than a baseline method.
|
Detector monitoring with artificial neural networks at the CMS
experiment at the CERN Large Hadron Collider
|
Reliable data quality monitoring is a key asset in delivering collision data
suitable for physics analysis in any modern large-scale High Energy Physics
experiment. This paper focuses on the use of artificial neural networks for
supervised and semi-supervised problems related to the identification of
anomalies in the data collected by the CMS muon detectors. We use deep neural
networks to analyze LHC collision data, represented as images organized
geographically. We train a classifier capable of detecting the known anomalous
behaviors with unprecedented efficiency and explore the usage of convolutional
autoencoders to extend anomaly detection capabilities to unforeseen failure
modes. A generalization of this strategy could pave the way to the automation
of the data quality assessment process for present and future high-energy
physics experiments.
|
The Lyapunov Neural Network: Adaptive Stability Certification for Safe
Learning of Dynamical Systems
|
Learning algorithms have shown considerable prowess in simulation by allowing
robots to adapt to uncertain environments and improve their performance.
However, such algorithms are rarely used in practice on safety-critical
systems, since the learned policy typically does not yield any safety
guarantees. That is, the required exploration may cause physical harm to the
robot or its environment. In this paper, we present a method to learn accurate
safety certificates for nonlinear, closed-loop dynamical systems. Specifically,
we construct a neural network Lyapunov function and a training algorithm that
adapts it to the shape of the largest safe region in the state space. The
algorithm relies only on knowledge of inputs and outputs of the dynamics,
rather than on any specific model structure. We demonstrate our method by
learning the safe region of attraction for a simulated inverted pendulum.
Furthermore, we discuss how our method can be used in safe learning algorithms
together with statistical models of dynamical systems.
|
Learning Actionable Representations from Visual Observations
|
In this work we explore a new approach for robots to teach themselves about
the world simply by observing it. In particular we investigate the
effectiveness of learning task-agnostic representations for continuous control
tasks. We extend Time-Contrastive Networks (TCN) that learn from visual
observations by embedding multiple frames jointly in the embedding space as
opposed to a single frame. We show that by doing so, we are now able to encode
both position and velocity attributes significantly more accurately. We test
the usefulness of this self-supervised approach in a reinforcement learning
setting. We show that the representations learned by agents observing
themselves take random actions, or other agents perform tasks successfully, can
enable the learning of continuous control policies using algorithms like
Proximal Policy Optimization (PPO) using only the learned embeddings as input.
We also demonstrate significant improvements on the real-world Pouring dataset
with a relative error reduction of 39.4% for motion attributes and 11.1% for
static attributes compared to the single-frame baseline. Video results are
available at https://sites.google.com/view/actionablerepresentations .
|
Machine Learning of Space-Fractional Differential Equations
|
Data-driven discovery of "hidden physics" -- i.e., machine learning of
differential equation models underlying observed data -- has recently been
approached by embedding the discovery problem into a Gaussian Process
regression of spatial data, treating and discovering unknown equation
parameters as hyperparameters of a modified "physics informed" Gaussian Process
kernel. This kernel includes the parametrized differential operators applied to
a prior covariance kernel. We extend this framework to linear space-fractional
differential equations. The methodology is compatible with a wide variety of
fractional operators in $\mathbb{R}^d$ and stationary covariance kernels,
including the Matern class, and can optimize the Matern parameter during
training. We provide a user-friendly and feasible way to perform fractional
derivatives of kernels, via a unified set of d-dimensional Fourier integral
formulas amenable to generalized Gauss-Laguerre quadrature.
The implementation of fractional derivatives has several benefits. First, it
allows for discovering fractional-order PDEs for systems characterized by heavy
tails or anomalous diffusion, bypassing the analytical difficulty of fractional
calculus. Data sets exhibiting such features are of increasing prevalence in
physical and financial domains. Second, a single fractional-order archetype
allows for a derivative of arbitrary order to be learned, with the order itself
being a parameter in the regression. This is advantageous even when used for
discovering integer-order equations; the user is not required to assume a
"dictionary" of derivatives of various orders, and directly controls the
parsimony of the models being discovered. We illustrate on several examples,
including fractional-order interpolation of advection-diffusion and modeling
relative stock performance in the S&P 500 with alpha-stable motion via a
fractional diffusion equation.
|
Streaming Kernel PCA with $\tilde{O}(\sqrt{n})$ Random Features
|
We study the statistical and computational aspects of kernel principal
component analysis using random Fourier features and show that under mild
assumptions, $O(\sqrt{n} \log n)$ features suffices to achieve
$O(1/\epsilon^2)$ sample complexity. Furthermore, we give a memory efficient
streaming algorithm based on classical Oja's algorithm that achieves this rate.
|
Inferring Parameters Through Inverse Multiobjective Optimization
|
Given a set of human's decisions that are observed, inverse optimization has
been developed and utilized to infer the underlying decision making problem.
The majority of existing studies assumes that the decision making problem is
with a single objective function, and attributes data divergence to noises,
errors or bounded rationality, which, however, could lead to a corrupted
inference when decisions are tradeoffs among multiple criteria. In this paper,
we take a data-driven approach and design a more sophisticated inverse
optimization formulation to explicitly infer parameters of a multiobjective
decision making problem from noisy observations. This framework, together with
our mathematical analyses and advanced algorithm developments, demonstrates a
strong capacity in estimating critical parameters, decoupling "interpretable"
components from noises or errors, deriving the denoised \emph{optimal}
decisions, and ensuring statistical significance. In particular, for the whole
decision maker population, if suitable conditions hold, we will be able to
understand the overall diversity and the distribution of their preferences over
multiple criteria, which is important when a precise inference on every single
decision maker is practically unnecessary or infeasible. Numerical results on a
large number of experiments are reported to confirm the effectiveness of our
unique inverse optimization model and the computational efficacy of the
developed algorithms.
|
Impacts of Weather Conditions on District Heat System
|
Using artificial neural network for the prediction of heat demand has
attracted more and more attention. Weather conditions, such as ambient
temperature, wind speed and direct solar irradiance, have been identified as
key input parameters. In order to further improve the model accuracy, it is of
great importance to understand the influence of different parameters. Based on
an Elman neural network (ENN), this paper investigates the impact of direct
solar irradiance and wind speed on predicting the heat demand of a district
heating network. Results show that including wind speed can generally result in
a lower overall mean absolute percentage error (MAPE) (6.43%) than including
direct solar irradiance (6.47%); while including direct solar irradiance can
achieve a lower maximum absolute deviation (71.8%) than including wind speed
(81.53%). In addition, even though including both wind speed and direct solar
irradiance shows the best overall performance (MAPE=6.35%).
|
Likelihood-free inference with an improved cross-entropy estimator
|
We extend recent work (Brehmer, et. al., 2018) that use neural networks as
surrogate models for likelihood-free inference. As in the previous work, we
exploit the fact that the joint likelihood ratio and joint score, conditioned
on both observed and latent variables, can often be extracted from an implicit
generative model or simulator to augment the training data for these surrogate
models. We show how this augmented training data can be used to provide a new
cross-entropy estimator, which provides improved sample efficiency compared to
previous loss functions exploiting this augmented training data.
|
A Hybrid Variational Autoencoder for Collaborative Filtering
|
In today's day and age when almost every industry has an online presence with
users interacting in online marketplaces, personalized recommendations have
become quite important. Traditionally, the problem of collaborative filtering
has been tackled using Matrix Factorization which is linear in nature. We
extend the work of [11] on using variational autoencoders (VAEs) for
collaborative filtering with implicit feedback by proposing a hybrid,
multi-modal approach. Our approach combines movie embeddings (learned from a
sibling VAE network) with user ratings from the Movielens 20M dataset and
applies it to the task of movie recommendation. We empirically show how the VAE
network is empowered by incorporating movie embeddings. We also visualize movie
and user embeddings by clustering their latent representations obtained from a
VAE.
|
Prosodic-Enhanced Siamese Convolutional Neural Networks for Cross-Device
Text-Independent Speaker Verification
|
In this paper a novel cross-device text-independent speaker verification
architecture is proposed. Majority of the state-of-the-art deep architectures
that are used for speaker verification tasks consider Mel-frequency cepstral
coefficients. In contrast, our proposed Siamese convolutional neural network
architecture uses Mel-frequency spectrogram coefficients to benefit from the
dependency of the adjacent spectro-temporal features. Moreover, although
spectro-temporal features have proved to be highly reliable in speaker
verification models, they only represent some aspects of short-term acoustic
level traits of the speaker's voice. However, the human voice consists of
several linguistic levels such as acoustic, lexicon, prosody, and phonetics,
that can be utilized in speaker verification models. To compensate for these
inherited shortcomings in spectro-temporal features, we propose to enhance the
proposed Siamese convolutional neural network architecture by deploying a
multilayer perceptron network to incorporate the prosodic, jitter, and shimmer
features. The proposed end-to-end verification architecture performs feature
extraction and verification simultaneously. This proposed architecture displays
significant improvement over classical signal processing approaches and deep
algorithms for forensic cross-device speaker verification.
|
Variational Information Bottleneck on Vector Quantized Autoencoders
|
In this paper, we provide an information-theoretic interpretation of the
Vector Quantized-Variational Autoencoder (VQ-VAE). We show that the loss
function of the original VQ-VAE can be derived from the variational
deterministic information bottleneck (VDIB) principle. On the other hand, the
VQ-VAE trained by the Expectation Maximization (EM) algorithm can be viewed as
an approximation to the variational information bottleneck(VIB) principle.
|
Helix: Accelerating Human-in-the-loop Machine Learning
|
Data application developers and data scientists spend an inordinate amount of
time iterating on machine learning (ML) workflows -- by modifying the data
pre-processing, model training, and post-processing steps -- via
trial-and-error to achieve the desired model performance. Existing work on
accelerating machine learning focuses on speeding up one-shot execution of
workflows, failing to address the incremental and dynamic nature of typical ML
development. We propose Helix, a declarative machine learning system that
accelerates iterative development by optimizing workflow execution end-to-end
and across iterations. Helix minimizes the runtime per iteration via program
analysis and intelligent reuse of previous results, which are selectively
materialized -- trading off the cost of materialization for potential future
benefits -- to speed up future iterations. Additionally, Helix offers a
graphical interface to visualize workflow DAGs and compare versions to
facilitate iterative development. Through two ML applications, in
classification and in structured prediction, attendees will experience the
succinctness of Helix programming interface and the speed and ease of iterative
development using Helix. In our evaluations, Helix achieved up to an order of
magnitude reduction in cumulative run time compared to state-of-the-art machine
learning tools.
|
Information-Theoretic Scoring Rules to Learn Additive Bayesian Network
Applied to Epidemiology
|
Bayesian network modelling is a well adapted approach to study messy and
highly correlated datasets which are very common in, e.g., systems
epidemiology. A popular approach to learn a Bayesian network from an
observational datasets is to identify the maximum a posteriori network in a
search-and-score approach. Many scores have been proposed both Bayesian or
frequentist based. In an applied perspective, a suitable approach would allow
multiple distributions for the data and is robust enough to run autonomously. A
promising framework to compute scores are generalized linear models. Indeed,
there exists fast algorithms for estimation and many tailored solutions to
common epidemiological issues. The purpose of this paper is to present an R
package abn that has an implementation of multiple frequentist scores and some
realistic simulations that show its usability and performance. It includes
features to deal efficiently with data separation and adjustment which are very
common in systems epidemiology.
|
PHI Scrubber: A Deep Learning Approach
|
Confidentiality of patient information is an essential part of Electronic
Health Record System. Patient information, if exposed, can cause a serious
damage to the privacy of individuals receiving healthcare. Hence it is
important to remove such details from physician notes. A system is proposed
which consists of a deep learning model where a de-convolutional neural network
and bi-directional LSTM-CNN is used along with regular expressions to recognize
and eliminate the individually identifiable information. This information is
then removed from a medical practitioner's data which further allows the fair
usage of such information among researchers and in clinical trials.
|
Multitask Gaussian Process with Hierarchical Latent Interactions
|
Multitask Gaussian process (MTGP) is powerful for joint learning of multiple
tasks with complicated correlation patterns. However, due to the assembling of
additive independent latent functions, all current MTGPs including the salient
linear model of coregionalization (LMC) and convolution frameworks cannot
effectively represent and learn the hierarchical latent interactions between
its latent functions. In this paper, we further investigate the interactions in
LMC of MTGP and then propose a novel kernel representation of the hierarchical
interactions, which ameliorates both the expressiveness and the
interpretability of MTGP. Specifically, we express the interaction as a product
of function interaction and coefficient interaction. The function interaction
is modeled by using cross convolution of latent functions. The coefficient
interaction between the LMCs is described as a cross coregionalization term. We
validate that considering the interactions can promote knowledge transferring
in MTGP and compare our approach with some state-of-the-art MTGPs on both
synthetic- and real-world datasets.
|
Hoeffding Trees with nmin adaptation
|
Machine learning software accounts for a significant amount of energy
consumed in data centers. These algorithms are usually optimized towards
predictive performance, i.e. accuracy, and scalability. This is the case of
data stream mining algorithms. Although these algorithms are adaptive to the
incoming data, they have fixed parameters from the beginning of the execution.
We have observed that having fixed parameters lead to unnecessary computations,
thus making the algorithm energy inefficient. In this paper we present the nmin
adaptation method for Hoeffding trees. This method adapts the value of the nmin
parameter, which significantly affects the energy consumption of the algorithm.
The method reduces unnecessary computations and memory accesses, thus reducing
the energy, while the accuracy is only marginally affected. We experimentally
compared VFDT (Very Fast Decision Tree, the first Hoeffding tree algorithm) and
CVFDT (Concept-adapting VFDT) with the VFDT-nmin (VFDT with nmin adaptation).
The results show that VFDT-nmin consumes up to 27% less energy than the
standard VFDT, and up to 92% less energy than CVFDT, trading off a few percent
of accuracy in a few datasets.
|
Ask, Acquire, and Attack: Data-free UAP Generation using Class
Impressions
|
Deep learning models are susceptible to input specific noise, called
adversarial perturbations. Moreover, there exist input-agnostic noise, called
Universal Adversarial Perturbations (UAP) that can affect inference of the
models over most input samples. Given a model, there exist broadly two
approaches to craft UAPs: (i) data-driven: that require data, and (ii)
data-free: that do not require data samples. Data-driven approaches require
actual samples from the underlying data distribution and craft UAPs with high
success (fooling) rate. However, data-free approaches craft UAPs without
utilizing any data samples and therefore result in lesser success rates. In
this paper, for data-free scenarios, we propose a novel approach that emulates
the effect of data samples with class impressions in order to craft UAPs using
data-driven objectives. Class impression for a given pair of category and model
is a generic representation (in the input space) of the samples belonging to
that category. Further, we present a neural network based generative model that
utilizes the acquired class impressions to learn crafting UAPs. Experimental
evaluation demonstrates that the learned generative model, (i) readily crafts
UAPs via simple feed-forwarding through neural network layers, and (ii)
achieves state-of-the-art success rates for data-free scenario and closer to
that for data-driven setting without actually utilizing any data samples.
|
Generalization Error in Deep Learning
|
Deep learning models have lately shown great performance in various fields
such as computer vision, speech recognition, speech translation, and natural
language processing. However, alongside their state-of-the-art performance, it
is still generally unclear what is the source of their generalization ability.
Thus, an important question is what makes deep neural networks able to
generalize well from the training set to new data. In this article, we provide
an overview of the existing theory and bounds for the characterization of the
generalization error of deep neural networks, combining both classical and more
recent theoretical and empirical results.
|
Content-driven, unsupervised clustering of news articles through
multiscale graph partitioning
|
The explosion in the amount of news and journalistic content being generated
across the globe, coupled with extended and instantaneous access to information
through online media, makes it difficult and time-consuming to monitor news
developments and opinion formation in real time. There is an increasing need
for tools that can pre-process, analyse and classify raw text to extract
interpretable content; specifically, identifying topics and content-driven
groupings of articles. We present here such a methodology that brings together
powerful vector embeddings from Natural Language Processing with tools from
Graph Theory that exploit diffusive dynamics on graphs to reveal natural
partitions across scales. Our framework uses a recent deep neural network text
analysis methodology (Doc2vec) to represent text in vector form and then
applies a multi-scale community detection method (Markov Stability) to
partition a similarity graph of document vectors. The method allows us to
obtain clusters of documents with similar content, at different levels of
resolution, in an unsupervised manner. We showcase our approach with the
analysis of a corpus of 9,000 news articles published by Vox Media over one
year. Our results show consistent groupings of documents according to content
without a priori assumptions about the number or type of clusters to be found.
The multilevel clustering reveals a quasi-hierarchy of topics and subtopics
with increased intelligibility and improved topic coherence as compared to
external taxonomy services and standard topic detection methods.
|
Robust Spectral Filtering and Anomaly Detection
|
We consider a setting, where the output of a linear dynamical system (LDS)
is, with an unknown but fixed probability, replaced by noise. There, we present
a robust method for the prediction of the outputs of the LDS and identification
of the samples of noise, and prove guarantees on its statistical performance.
One application lies in anomaly detection: the samples of noise, unlikely to
have been generated by the dynamics, can be flagged to operators of the system
for further study.
|
Structured Neural Network Dynamics for Model-based Control
|
We present a structured neural network architecture that is inspired by
linear time-varying dynamical systems. The network is designed to mimic the
properties of linear dynamical systems which makes analysis and control simple.
The architecture facilitates the integration of learned system models with
gradient-based model predictive control algorithms, and removes the requirement
of computing potentially costly derivatives online. We demonstrate the efficacy
of this modeling technique in computing autonomous control policies through
evaluation in a variety of standard continuous control domains.
|
Generation Meets Recommendation: Proposing Novel Items for Groups of
Users
|
Consider a movie studio aiming to produce a set of new movies for summer
release: What types of movies it should produce? Who would the movies appeal
to? How many movies should it make? Similar issues are encountered by a variety
of organizations, e.g., mobile-phone manufacturers and online magazines, who
have to create new (non-existent) items to satisfy groups of users with
different preferences. In this paper, we present a joint problem formalization
of these interrelated issues, and propose generative methods that address these
questions simultaneously. Specifically, we leverage the latent space obtained
by training a deep generative model---the Variational Autoencoder (VAE)---via a
loss function that incorporates both rating performance and item reconstruction
terms. We then apply a greedy search algorithm that utilizes this learned
latent space to jointly obtain K plausible new items, and user groups that
would find the items appealing. An evaluation of our methods on a synthetic
dataset indicates that our approach is able to generate novel items similar to
highly-desirable unobserved items. As case studies on real-world data, we
applied our method on the MART abstract art and Movielens Tag Genome dataset,
which resulted in promising results: small and diverse sets of novel items.
|
Learning Overparameterized Neural Networks via Stochastic Gradient
Descent on Structured Data
|
Neural networks have many successful applications, while much less
theoretical understanding has been gained. Towards bridging this gap, we study
the problem of learning a two-layer overparameterized ReLU neural network for
multi-class classification via stochastic gradient descent (SGD) from random
initialization. In the overparameterized setting, when the data comes from
mixtures of well-separated distributions, we prove that SGD learns a network
with a small generalization error, albeit the network has enough capacity to
fit arbitrary labels. Furthermore, the analysis provides interesting insights
into several aspects of learning neural networks and can be verified based on
empirical studies on synthetic data and on the MNIST dataset.
|
Geared Rotationally Identical and Invariant Convolutional Neural Network
Systems
|
Theorems and techniques to form different types of transformationally
invariant processing and to produce the same output quantitatively based on
either transformationally invariant operators or symmetric operations have
recently been introduced by the authors. In this study, we further propose to
compose a geared rotationally identical CNN system (GRI-CNN) with a small step
angle by connecting networks of participated processes at the first flatten
layer. Using an ordinary CNN structure as a base, requirements for constructing
a GRI-CNN include the use of either symmetric input vector or kernels with an
angle increment that can form a complete cycle as a "gearwheel". Four basic
GRI-CNN structures were studied. Each of them can produce quantitatively
identical output results when a rotation angle of the input vector is evenly
divisible by the step angle of the gear. Our study showed when an input vector
rotated with an angle does not match to a step angle, the GRI-CNN can also
produce a highly consistent result. With a design of using an ultra-fine
gear-tooth step angle (e.g., 1 degree or 0.1 degree), all four GRI-CNN systems
can be constructed virtually isotropically.
|
Investigating the performance of multi-objective optimization when
learning Bayesian Networks
|
Bayesian Networks have been widely used in the last decades in many fields,
to describe statistical dependencies among random variables. In general,
learning the structure of such models is a problem with considerable
theoretical interest that poses many challenges. On the one hand, it is a
well-known NP-complete problem, practically hardened by the huge search space
of possible solutions. On the other hand, the phenomenon of I-equivalence,
i.e., different graphical structures underpinning the same set of statistical
dependencies, may lead to multimodal fitness landscapes further hindering
maximum likelihood approaches to solve the task. In particular, we exploit the
NSGA-II multi-objective optimization procedure in order to explicitly account
for both the likelihood of a solution and the number of selected arcs, by
setting these as the two objective functions of the method. The aim of this
work is to investigate the behavior of NSGA-II and analyse the quality of its
solutions. We thus thoroughly examined the optimization results obtained on a
wide set of simulated data, by considering both the goodness of the inferred
solutions in terms of the objective functions values achieved, and by comparing
the retrieved structures with the ground truth, i.e., the networks used to
generate the target data. Our results show that NSGA-II can converge to
solutions characterized by better likelihood and less arcs than classic
approaches, although paradoxically characterized in many cases by a lower
similarity with the target network.
|
Deep convolutional recurrent autoencoders for learning low-dimensional
feature dynamics of fluid systems
|
Model reduction of high-dimensional dynamical systems alleviates
computational burdens faced in various tasks from design optimization to model
predictive control. One popular model reduction approach is based on projecting
the governing equations onto a subspace spanned by basis functions obtained
from the compression of a dataset of solution snapshots. However, this method
is intrusive since the projection requires access to the system operators.
Further, some systems may require special treatment of nonlinearities to ensure
computational efficiency or additional modeling to preserve stability. In this
work we propose a deep learning-based strategy for nonlinear model reduction
that is inspired by projection-based model reduction where the idea is to
identify some optimal low-dimensional representation and evolve it in time. Our
approach constructs a modular model consisting of a deep convolutional
autoencoder and a modified LSTM network. The deep convolutional autoencoder
returns a low-dimensional representation in terms of coordinates on some
expressive nonlinear data-supporting manifold. The dynamics on this manifold
are then modeled by the modified LSTM network in a computationally efficient
manner. An offline unsupervised training strategy that exploits the model
modularity is also developed. We demonstrate our model on three illustrative
examples each highlighting the model's performance in prediction tasks for
fluid systems with large parameter-variations and its stability in long-term
prediction.
|
A Deep Learning based Joint Segmentation and Classification Framework
for Glaucoma Assesment in Retinal Color Fundus Images
|
Automated Computer Aided diagnostic tools can be used for the early detection
of glaucoma to prevent irreversible vision loss. In this work, we present a
Multi-task Convolutional Neural Network (CNN) that jointly segments the Optic
Disc (OD), Optic Cup (OC) and predicts the presence of glaucoma in color fundus
images. The CNN utilizes a combination of image appearance features and
structural features obtained from the OD-OC segmentation to obtain a robust
prediction. The use of fewer network parameters and the sharing of the CNN
features for multiple related tasks ensures the good generalizability of the
architecture, allowing it to be trained on small training sets. The
cross-testing performance of the proposed method on an independent validation
set acquired using a different camera and image resolution was found to be good
with an average dice score of 0.92 for OD, 0.84 for OC and AUC of 0.95 on the
task of glaucoma classification illustrating its potential as a mass screening
tool for the early detection of glaucoma.
|
A recurrent multi-scale approach to RBG-D Object Recognition
|
Technological development aims to produce generations of increasingly
efficient robots able to perform complex tasks. This requires considerable
efforts, from the scientific community, to find new algorithms that solve
computer vision problems, such as object recognition. The diffusion of RGB-D
cameras directed the study towards the research of new architectures able to
exploit the RGB and Depth information. The project that is developed in this
thesis concerns the realization of a new end-to-end architecture for the
recognition of RGB-D objects called RCFusion. Our method generates compact and
highly discriminative multi-modal features by combining complementary RGB and
depth information representing different levels of abstraction. We evaluate our
method on standard object recognition datasets, RGB-D Object Dataset and
JHUIT-50. The experiments performed show that our method outperforms the
existing approaches and establishes new state-of-the-art results for both
datasets.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.