title
stringlengths 7
246
| abstract
stringlengths 6
3.31k
|
---|---|
A survey of sparse representation: algorithms and applications | Sparse representation has attracted much attention from researchers in fields
of signal processing, image processing, computer vision and pattern
recognition. Sparse representation also has a good reputation in both
theoretical research and practical applications. Many different algorithms have
been proposed for sparse representation. The main purpose of this article is to
provide a comprehensive study and an updated review on sparse representation
and to supply a guidance for researchers. The taxonomy of sparse representation
methods can be studied from various viewpoints. For example, in terms of
different norm minimizations used in sparsity constraints, the methods can be
roughly categorized into five groups: sparse representation with $l_0$-norm
minimization, sparse representation with $l_p$-norm (0$<$p$<$1) minimization,
sparse representation with $l_1$-norm minimization and sparse representation
with $l_{2,1}$-norm minimization. In this paper, a comprehensive overview of
sparse representation is provided. The available sparse representation
algorithms can also be empirically categorized into four groups: greedy
strategy approximation, constrained optimization, proximity algorithm-based
optimization, and homotopy algorithm-based sparse representation. The
rationales of different algorithms in each category are analyzed and a wide
range of sparse representation applications are summarized, which could
sufficiently reveal the potential nature of the sparse representation theory.
Specifically, an experimentally comparative study of these sparse
representation algorithms was presented. The Matlab code used in this paper can
be available at: http://www.yongxu.org/lunwen.html.
|
Latent Skill Embedding for Personalized Lesson Sequence Recommendation | Students in online courses generate large amounts of data that can be used to
personalize the learning process and improve quality of education. In this
paper, we present the Latent Skill Embedding (LSE), a probabilistic model of
students and educational content that can be used to recommend personalized
sequences of lessons with the goal of helping students prepare for specific
assessments. Akin to collaborative filtering for recommender systems, the
algorithm does not require students or content to be described by features, but
it learns a representation using access traces. We formulate this problem as a
regularized maximum-likelihood embedding of students, lessons, and assessments
from historical student-content interactions. An empirical evaluation on
large-scale data from Knewton, an adaptive learning technology company, shows
that this approach predicts assessment results competitively with benchmark
models and is able to discriminate between lesson sequences that lead to
mastery and failure.
|
Mobile Big Data Analytics Using Deep Learning and Apache Spark | The proliferation of mobile devices, such as smartphones and Internet of
Things (IoT) gadgets, results in the recent mobile big data (MBD) era.
Collecting MBD is unprofitable unless suitable analytics and learning methods
are utilized for extracting meaningful information and hidden patterns from
data. This article presents an overview and brief tutorial of deep learning in
MBD analytics and discusses a scalable learning framework over Apache Spark.
Specifically, a distributed deep learning is executed as an iterative MapReduce
computing on many Spark workers. Each Spark worker learns a partial deep model
on a partition of the overall MBD, and a master deep model is then built by
averaging the parameters of all partial models. This Spark-based framework
speeds up the learning of deep models consisting of many hidden layers and
millions of parameters. We use a context-aware activity recognition application
with a real-world dataset containing millions of samples to validate our
framework and assess its speedup effectiveness.
|
Auditing Black-box Models for Indirect Influence | Data-trained predictive models see widespread use, but for the most part they
are used as black boxes which output a prediction or score. It is therefore
hard to acquire a deeper understanding of model behavior, and in particular how
different features influence the model prediction. This is important when
interpreting the behavior of complex models, or asserting that certain
problematic attributes (like race or gender) are not unduly influencing
decisions.
In this paper, we present a technique for auditing black-box models, which
lets us study the extent to which existing models take advantage of particular
features in the dataset, without knowing how the models work. Our work focuses
on the problem of indirect influence: how some features might indirectly
influence outcomes via other, related features. As a result, we can find
attribute influences even in cases where, upon further direct examination of
the model, the attribute is not referred to by the model at all.
Our approach does not require the black-box model to be retrained. This is
important if (for example) the model is only accessible via an API, and
contrasts our work with other methods that investigate feature influence like
feature selection. We present experimental evidence for the effectiveness of
our procedure using a variety of publicly available datasets and models. We
also validate our procedure using techniques from interpretable learning and
feature selection, as well as against other black-box auditing procedures.
|
An Improved Gap-Dependency Analysis of the Noisy Power Method | We consider the noisy power method algorithm, which has wide applications in
machine learning and statistics, especially those related to principal
component analysis (PCA) under resource (communication, memory or privacy)
constraints. Existing analysis of the noisy power method shows an
unsatisfactory dependency over the "consecutive" spectral gap
$(\sigma_k-\sigma_{k+1})$ of an input data matrix, which could be very small
and hence limits the algorithm's applicability. In this paper, we present a new
analysis of the noisy power method that achieves improved gap dependency for
both sample complexity and noise tolerance bounds. More specifically, we
improve the dependency over $(\sigma_k-\sigma_{k+1})$ to dependency over
$(\sigma_k-\sigma_{q+1})$, where $q$ is an intermediate algorithm parameter and
could be much larger than the target rank $k$. Our proofs are built upon a
novel characterization of proximity between two subspaces that differ from
canonical angle characterizations analyzed in previous works. Finally, we apply
our improved bounds to distributed private PCA and memory-efficient streaming
PCA and obtain bounds that are superior to existing results in the literature.
|
A Streaming Algorithm for Crowdsourced Data Classification | We propose a streaming algorithm for the binary classification of data based
on crowdsourcing. The algorithm learns the competence of each labeller by
comparing her labels to those of other labellers on the same tasks and uses
this information to minimize the prediction error rate on each task. We provide
performance guarantees of our algorithm for a fixed population of independent
labellers. In particular, we show that our algorithm is optimal in the sense
that the cumulative regret compared to the optimal decision with known labeller
error probabilities is finite, independently of the number of tasks to label.
The complexity of the algorithm is linear in the number of labellers and the
number of tasks, up to some logarithmic factors. Numerical experiments
illustrate the performance of our algorithm compared to existing algorithms,
including simple majority voting and expectation-maximization algorithms, on
both synthetic and real datasets.
|
Variational Inference for On-line Anomaly Detection in High-Dimensional
Time Series | Approximate variational inference has shown to be a powerful tool for
modeling unknown complex probability distributions. Recent advances in the
field allow us to learn probabilistic models of sequences that actively exploit
spatial and temporal structure. We apply a Stochastic Recurrent Network (STORN)
to learn robot time series data. Our evaluation demonstrates that we can
robustly detect anomalies both off- and on-line.
|
Submodular Learning and Covering with Response-Dependent Costs | We consider interactive learning and covering problems, in a setting where
actions may incur different costs, depending on the response to the action. We
propose a natural greedy algorithm for response-dependent costs. We bound the
approximation factor of this greedy algorithm in active learning settings as
well as in the general setting. We show that a different property of the cost
function controls the approximation factor in each of these scenarios. We
further show that in both settings, the approximation factor of this greedy
algorithm is near-optimal among all greedy algorithms. Experiments demonstrate
the advantages of the proposed algorithm in the response-dependent cost
setting.
|
Explore First, Exploit Next: The True Shape of Regret in Bandit Problems | We revisit lower bounds on the regret in the case of multi-armed bandit
problems. We obtain non-asymptotic, distribution-dependent bounds and provide
straightforward proofs based only on well-known properties of Kullback-Leibler
divergences. These bounds show in particular that in an initial phase the
regret grows almost linearly, and that the well-known logarithmic growth of the
regret only holds in a final phase. The proof techniques come to the essence of
the information-theoretic arguments used and they are deprived of all
unnecessary complications.
|
Lens depth function and k-relative neighborhood graph: versatile tools
for ordinal data analysis | In recent years it has become popular to study machine learning problems in a
setting of ordinal distance information rather than numerical distance
measurements. By ordinal distance information we refer to binary answers to
distance comparisons such as $d(A,B)<d(C,D)$. For many problems in machine
learning and statistics it is unclear how to solve them in such a scenario. Up
to now, the main approach is to explicitly construct an ordinal embedding of
the data points in the Euclidean space, an approach that has a number of
drawbacks. In this paper, we propose algorithms for the problems of medoid
estimation, outlier identification, classification, and clustering when given
only ordinal data. They are based on estimating the lens depth function and the
$k$-relative neighborhood graph on a data set. Our algorithms are simple, are
much faster than an ordinal embedding approach and avoid some of its drawbacks,
and can easily be parallelized.
|
A Multivariate Biomarker for Parkinson's Disease | In this study, we executed a genomic analysis with the objective of selecting
a set of genes (possibly small) that would help in the detection and
classification of samples from patients affected by Parkinson Disease. We
performed a complete data analysis and during the exploratory phase, we
selected a list of differentially expressed genes. Despite their association
with the diseased state, we could not use them as a biomarker tool. Therefore,
our research was extended to include a multivariate analysis approach resulting
in the identification and selection of a group of 20 genes that showed a clear
potential in detecting and correctly classify Parkinson Disease samples even in
the presence of other neurodegenerative disorders.
|
Search Improves Label for Active Learning | We investigate active learning with access to two distinct oracles: Label
(which is standard) and Search (which is not). The Search oracle models the
situation where a human searches a database to seed or counterexample an
existing solution. Search is stronger than Label while being natural to
implement in many situations. We show that an algorithm using both oracles can
provide exponentially large problem-dependent improvements over Label alone.
|
A Statistical Model for Stroke Outcome Prediction and Treatment Planning | Stroke is a major cause of mortality and long--term disability in the world.
Predictive outcome models in stroke are valuable for personalized treatment,
rehabilitation planning and in controlled clinical trials. In this paper we
design a new model to predict outcome in the short-term, the putative
therapeutic window for several treatments. Our regression-based model has a
parametric form that is designed to address many challenges common in medical
datasets like highly correlated variables and class imbalance. Empirically our
model outperforms the best--known previous models in predicting short--term
outcomes and in inferring the most effective treatments that improve outcome.
|
Stuck in a What? Adventures in Weight Space | Deep learning researchers commonly suggest that converged models are stuck in
local minima. More recently, some researchers observed that under reasonable
assumptions, the vast majority of critical points are saddle points, not true
minima. Both descriptions suggest that weights converge around a point in
weight space, be it a local optima or merely a critical point. However, it's
possible that neither interpretation is accurate. As neural networks are
typically over-complete, it's easy to show the existence of vast continuous
regions through weight space with equal loss. In this paper, we build on recent
work empirically characterizing the error surfaces of neural networks. We
analyze training paths through weight space, presenting evidence that apparent
convergence of loss does not correspond to weights arriving at critical points,
but instead to large movements through flat regions of weight space. While it's
trivial to show that neural network error surfaces are globally non-convex, we
show that error surfaces are also locally non-convex, even after breaking
symmetry with a random initialization and also after partial training.
|
Sparse Estimation of Multivariate Poisson Log-Normal Models from Count
Data | Modeling data with multivariate count responses is a challenging problem due
to the discrete nature of the responses. Existing methods for univariate count
responses cannot be easily extended to the multivariate case since the
dependency among multiple responses needs to be properly accommodated. In this
paper, we propose a multivariate Poisson log-normal regression model for
multivariate data with count responses. By simultaneously estimating the
regression coefficients and inverse covariance matrix over the latent variables
with an efficient Monte Carlo EM algorithm, the proposed regression model takes
advantages of association among multiple count responses to improve the model
prediction performance. Simulation studies and applications to real world data
are conducted to systematically evaluate the performance of the proposed method
in comparison with conventional methods.
|
On Study of the Binarized Deep Neural Network for Image Classification | Recently, the deep neural network (derived from the artificial neural
network) has attracted many researchers' attention by its outstanding
performance. However, since this network requires high-performance GPUs and
large storage, it is very hard to use it on individual devices. In order to
improve the deep neural network, many trials have been made by refining the
network structure or training strategy. Unlike those trials, in this paper, we
focused on the basic propagation function of the artificial neural network and
proposed the binarized deep neural network. This network is a pure binary
system, in which all the values and calculations are binarized. As a result,
our network can save a lot of computational resource and storage. Therefore, it
is possible to use it on various devices. Moreover, the experimental results
proved the feasibility of the proposed network.
|
Automatic Moth Detection from Trap Images for Pest Management | Monitoring the number of insect pests is a crucial component in
pheromone-based pest management systems. In this paper, we propose an automatic
detection pipeline based on deep learning for identifying and counting pests in
images taken inside field traps. Applied to a commercial codling moth dataset,
our method shows promising performance both qualitatively and quantitatively.
Compared to previous attempts at pest detection, our approach uses no
pest-specific engineering which enables it to adapt to other species and
environments with minimal human effort. It is amenable to implementation on
parallel hardware and therefore capable of deployment in settings where
real-time performance is required.
|
Discrete Distribution Estimation under Local Privacy | The collection and analysis of user data drives improvements in the app and
web ecosystems, but comes with risks to privacy. This paper examines discrete
distribution estimation under local privacy, a setting wherein service
providers can learn the distribution of a categorical statistic of interest
without collecting the underlying data. We present new mechanisms, including
hashed K-ary Randomized Response (KRR), that empirically meet or exceed the
utility of existing mechanisms at all privacy levels. New theoretical results
demonstrate the order-optimality of KRR and the existing RAPPOR mechanism at
different privacy regimes.
|
The Myopia of Crowds: A Study of Collective Evaluation on Stack Exchange | Crowds can often make better decisions than individuals or small groups of
experts by leveraging their ability to aggregate diverse information. Question
answering sites, such as Stack Exchange, rely on the "wisdom of crowds" effect
to identify the best answers to questions asked by users. We analyze data from
250 communities on the Stack Exchange network to pinpoint factors affecting
which answers are chosen as the best answers. Our results suggest that, rather
than evaluate all available answers to a question, users rely on simple
cognitive heuristics to choose an answer to vote for or accept. These cognitive
heuristics are linked to an answer's salience, such as the order in which it is
listed and how much screen space it occupies. While askers appear to depend
more on heuristics, compared to voting users, when choosing an answer to accept
as the most helpful one, voters use acceptance itself as a heuristic: they are
more likely to choose the answer after it is accepted than before that very
same answer was accepted. These heuristics become more important in explaining
and predicting behavior as the number of available answers increases. Our
findings suggest that crowd judgments may become less reliable as the number of
answers grow.
|
Domain Specific Author Attribution Based on Feedforward Neural Network
Language Models | Authorship attribution refers to the task of automatically determining the
author based on a given sample of text. It is a problem with a long history and
has a wide range of application. Building author profiles using language models
is one of the most successful methods to automate this task. New language
modeling methods based on neural networks alleviate the curse of dimensionality
and usually outperform conventional N-gram methods. However, there have not
been much research applying them to authorship attribution. In this paper, we
present a novel setup of a Neural Network Language Model (NNLM) and apply it to
a database of text samples from different authors. We investigate how the NNLM
performs on a task with moderate author set size and relatively limited
training and test data, and how the topics of the text samples affect the
accuracy. NNLM achieves nearly 2.5% reduction in perplexity, a measurement of
fitness of a trained language model to the test data. Given 5 random test
sentences, it also increases the author classification accuracy by 3.43% on
average, compared with the N-gram methods using SRILM tools. An open source
implementation of our methodology is freely available at
https://github.com/zge/authorship-attribution/.
|
Ensuring Rapid Mixing and Low Bias for Asynchronous Gibbs Sampling | Gibbs sampling is a Markov chain Monte Carlo technique commonly used for
estimating marginal distributions. To speed up Gibbs sampling, there has
recently been interest in parallelizing it by executing asynchronously. While
empirical results suggest that many models can be efficiently sampled
asynchronously, traditional Markov chain analysis does not apply to the
asynchronous case, and thus asynchronous Gibbs sampling is poorly understood.
In this paper, we derive a better understanding of the two main challenges of
asynchronous Gibbs: bias and mixing time. We show experimentally that our
theoretical results match practical outcomes.
|
Learning to Generate with Memory | Memory units have been widely used to enrich the capabilities of deep
networks on capturing long-term dependencies in reasoning and prediction tasks,
but little investigation exists on deep generative models (DGMs) which are good
at inferring high-level invariant representations from unlabeled data. This
paper presents a deep generative model with a possibly large external memory
and an attention mechanism to capture the local detail information that is
often lost in the bottom-up abstraction process in representation learning. By
adopting a smooth attention model, the whole network is trained end-to-end by
optimizing a variational bound of data likelihood via auto-encoding variational
Bayesian methods, where an asymmetric recognition network is learnt jointly to
infer high-level invariant representations. The asymmetric architecture can
reduce the competition between bottom-up invariant feature extraction and
top-down generation of instance details. Our experiments on several datasets
demonstrate that memory can significantly boost the performance of DGMs and
even achieve state-of-the-art results on various tasks, including density
estimation, image generation, and missing value imputation.
|
Max-Margin Nonparametric Latent Feature Models for Link Prediction | Link prediction is a fundamental task in statistical network analysis. Recent
advances have been made on learning flexible nonparametric Bayesian latent
feature models for link prediction. In this paper, we present a max-margin
learning method for such nonparametric latent feature relational models. Our
approach attempts to unite the ideas of max-margin learning and Bayesian
nonparametrics to discover discriminative latent features for link prediction.
It inherits the advances of nonparametric Bayesian methods to infer the unknown
latent social dimension, while for discriminative link prediction, it adopts
the max-margin learning principle by minimizing a hinge-loss using the linear
expectation operator, without dealing with a highly nonlinear link likelihood
function. For posterior inference, we develop an efficient stochastic
variational inference algorithm under a truncated mean-field assumption. Our
methods can scale up to large-scale real networks with millions of entities and
tens of millions of positive links. We also provide a full Bayesian
formulation, which can avoid tuning regularization hyper-parameters.
Experimental results on a diverse range of real datasets demonstrate the
benefits inherited from max-margin learning and Bayesian nonparametric
inference.
|
Feature ranking for multi-label classification using Markov Networks | We propose a simple and efficient method for ranking features in multi-label
classification. The method produces a ranking of features showing their
relevance in predicting labels, which in turn allows to choose a final subset
of features. The procedure is based on Markov Networks and allows to model the
dependencies between labels and features in a direct way. In the first step we
build a simple network using only labels and then we test how much adding a
single feature affects the initial network. More specifically, in the first
step we use the Ising model whereas the second step is based on the score
statistic, which allows to test a significance of added features very quickly.
The proposed approach does not require transformation of label space, gives
interpretable results and allows for attractive visualization of dependency
structure. We give a theoretical justification of the procedure by discussing
some theoretical properties of the Ising model and the score statistic. We also
discuss feature ranking procedure based on fitting Ising model using $l_1$
regularized logistic regressions. Numerical experiments show that the proposed
methods outperform the conventional approaches on the considered artificial and
real datasets.
|
Asymptotic consistency and order specification for logistic classifier
chains in multi-label learning | Classifier chains are popular and effective method to tackle a multi-label
classification problem. The aim of this paper is to study the asymptotic
properties of the chain model in which the conditional probabilities are of the
logistic form. In particular we find conditions on the number of labels and the
distribution of feature vector under which the estimated mode of the joint
distribution of labels converges to the true mode. Best of our knowledge, this
important issue has not yet been studied in the context of multi-label
learning. We also investigate how the order of model building in a chain
influences the estimation of the joint distribution of labels. We establish the
link between the problem of incorrect ordering in the chain and incorrect model
specification. We propose a procedure of determining the optimal ordering of
labels in the chain, which is based on using measures of correct specification
and allows to find the ordering such that the consecutive logistic models are
best possibly specified. The other important question raised in this paper is
how accurately can we estimate the joint posterior probability when the
ordering of labels is wrong or the logistic models in the chain are incorrectly
specified. The numerical experiments illustrate the theoretical results.
|
Active Learning from Positive and Unlabeled Data | During recent years, active learning has evolved into a popular paradigm for
utilizing user's feedback to improve accuracy of learning algorithms. Active
learning works by selecting the most informative sample among unlabeled data
and querying the label of that point from user. Many different methods such as
uncertainty sampling and minimum risk sampling have been utilized to select the
most informative sample in active learning. Although many active learning
algorithms have been proposed so far, most of them work with binary or
multi-class classification problems and therefore can not be applied to
problems in which only samples from one class as well as a set of unlabeled
data are available.
Such problems arise in many real-world situations and are known as the
problem of learning from positive and unlabeled data. In this paper we propose
an active learning algorithm that can work when only samples of one class as
well as a set of unlabelled data are available. Our method works by separately
estimating probability desnity of positive and unlabeled points and then
computing expected value of informativeness to get rid of a hyper-parameter and
have a better measure of informativeness./ Experiments and empirical analysis
show promising results compared to other similar methods.
|
A Bayesian Approach to the Data Description Problem | In this paper, we address the problem of data description using a Bayesian
framework. The goal of data description is to draw a boundary around objects of
a certain class of interest to discriminate that class from the rest of the
feature space. Data description is also known as one-class learning and has a
wide range of applications.
The proposed approach uses a Bayesian framework to precisely compute the
class boundary and therefore can utilize domain information in form of prior
knowledge in the framework. It can also operate in the kernel space and
therefore recognize arbitrary boundary shapes. Moreover, the proposed method
can utilize unlabeled data in order to improve accuracy of discrimination.
We evaluate our method using various real-world datasets and compare it with
other state of the art approaches of data description. Experiments show
promising results and improved performance over other data description and
one-class learning algorithms.
|
Bayesian Exploration: Incentivizing Exploration in Bayesian Games | We consider a ubiquitous scenario in the Internet economy when individual
decision-makers (henceforth, agents) both produce and consume information as
they make strategic choices in an uncertain environment. This creates a
three-way tradeoff between exploration (trying out insufficiently explored
alternatives to help others in the future), exploitation (making optimal
decisions given the information discovered by other agents), and incentives of
the agents (who are myopically interested in exploitation, while preferring the
others to explore). We posit a principal who controls the flow of information
from agents that came before, and strives to coordinate the agents towards a
socially optimal balance between exploration and exploitation, not using any
monetary transfers. The goal is to design a recommendation policy for the
principal which respects agents' incentives and minimizes a suitable notion of
regret.
We extend prior work in this direction to allow the agents to interact with
one another in a shared environment: at each time step, multiple agents arrive
to play a Bayesian game, receive recommendations, choose their actions, receive
their payoffs, and then leave the game forever. The agents now face two sources
of uncertainty: the actions of the other agents and the parameters of the
uncertain game environment.
Our main contribution is to show that the principal can achieve constant
regret when the utilities are deterministic (where the constant depends on the
prior distribution, but not on the time horizon), and logarithmic regret when
the utilities are stochastic. As a key technical tool, we introduce the concept
of explorable actions, the actions which some incentive-compatible policy can
recommend with non-zero probability. We show how the principal can identify
(and explore) all explorable actions, and use the revealed information to
perform optimally.
|
Group Equivariant Convolutional Networks | We introduce Group equivariant Convolutional Neural Networks (G-CNNs), a
natural generalization of convolutional neural networks that reduces sample
complexity by exploiting symmetries. G-CNNs use G-convolutions, a new type of
layer that enjoys a substantially higher degree of weight sharing than regular
convolution layers. G-convolutions increase the expressive capacity of the
network without increasing the number of parameters. Group convolution layers
are easy to use and can be implemented with negligible computational overhead
for discrete groups generated by translations, reflections and rotations.
G-CNNs achieve state of the art results on CIFAR10 and rotated MNIST.
|
A Model of Selective Advantage for the Efficient Inference of Cancer
Clonal Evolution | Recently, there has been a resurgence of interest in rigorous algorithms for
the inference of cancer progression from genomic data. The motivations are
manifold: (i) growing NGS and single cell data from cancer patients, (ii) need
for novel Data Science and Machine Learning algorithms to infer models of
cancer progression, and (iii) a desire to understand the temporal and
heterogeneous structure of tumor to tame its progression by efficacious
therapeutic intervention. This thesis presents a multi-disciplinary effort to
model tumor progression involving successive accumulation of genetic
alterations, each resulting populations manifesting themselves in a cancer
phenotype. The framework presented in this work along with algorithms derived
from it, represents a novel approach for inferring cancer progression, whose
accuracy and convergence rates surpass the existing techniques. The approach
derives its power from several fields including algorithms in machine learning,
theory of causality and cancer biology. Furthermore, a modular pipeline to
extract ensemble-level progression models from sequenced cancer genomes is
proposed. The pipeline combines state-of-the-art techniques for sample
stratification, driver selection, identification of fitness-equivalent
exclusive alterations and progression model inference. Furthermore, the results
are validated by synthetic data with realistic generative models, and
empirically interpreted in the context of real cancer datasets; in the later
case, biologically significant conclusions are also highlighted. Specifically,
it demonstrates the pipeline's ability to reproduce much of the knowledge on
colorectal cancer, as well as to suggest novel hypotheses. Lastly, it also
proves that the proposed framework can be applied to reconstruct the
evolutionary history of cancer clones in single patients, as illustrated by an
example from clear cell renal carcinomas.
|
Noisy population recovery in polynomial time | In the noisy population recovery problem of Dvir et al., the goal is to learn
an unknown distribution $f$ on binary strings of length $n$ from noisy samples.
For some parameter $\mu \in [0,1]$, a noisy sample is generated by flipping
each coordinate of a sample from $f$ independently with probability
$(1-\mu)/2$. We assume an upper bound $k$ on the size of the support of the
distribution, and the goal is to estimate the probability of any string to
within some given error $\varepsilon$. It is known that the algorithmic
complexity and sample complexity of this problem are polynomially related to
each other.
We show that for $\mu > 0$, the sample complexity (and hence the algorithmic
complexity) is bounded by a polynomial in $k$, $n$ and $1/\varepsilon$
improving upon the previous best result of $\mathsf{poly}(k^{\log\log
k},n,1/\varepsilon)$ due to Lovett and Zhang.
Our proof combines ideas from Lovett and Zhang with a \emph{noise attenuated}
version of M\"{o}bius inversion. In turn, the latter crucially uses the
construction of \emph{robust local inverse} due to Moitra and Saks.
|
Online Dual Coordinate Ascent Learning | The stochastic dual coordinate-ascent (S-DCA) technique is a useful
alternative to the traditional stochastic gradient-descent algorithm for
solving large-scale optimization problems due to its scalability to large data
sets and strong theoretical guarantees. However, the available S-DCA
formulation is limited to finite sample sizes and relies on performing multiple
passes over the same data. This formulation is not well-suited for online
implementations where data keep streaming in. In this work, we develop an {\em
online} dual coordinate-ascent (O-DCA) algorithm that is able to respond to
streaming data and does not need to revisit the past data. This feature embeds
the resulting construction with continuous adaptation, learning, and tracking
abilities, which are particularly attractive for online learning scenarios.
|
Learning values across many orders of magnitude | Most learning algorithms are not invariant to the scale of the function that
is being approximated. We propose to adaptively normalize the targets used in
learning. This is useful in value-based reinforcement learning, where the
magnitude of appropriate value approximations can change over time when we
update the policy of behavior. Our main motivation is prior work on learning to
play Atari games, where the rewards were all clipped to a predetermined range.
This clipping facilitates learning across many different games with a single
learning algorithm, but a clipped reward function can result in qualitatively
different behavior. Using the adaptive normalization we can remove this
domain-specific heuristic without diminishing overall performance.
|
Adaptive Learning with Robust Generalization Guarantees | The traditional notion of generalization---i.e., learning a hypothesis whose
empirical error is close to its true error---is surprisingly brittle. As has
recently been noted in [DFH+15b], even if several algorithms have this
guarantee in isolation, the guarantee need not hold if the algorithms are
composed adaptively. In this paper, we study three notions of
generalization---increasing in strength---that are robust to postprocessing and
amenable to adaptive composition, and examine the relationships between them.
We call the weakest such notion Robust Generalization. A second, intermediate,
notion is the stability guarantee known as differential privacy. The strongest
guarantee we consider we call Perfect Generalization. We prove that every
hypothesis class that is PAC learnable is also PAC learnable in a robustly
generalizing fashion, with almost the same sample complexity. It was previously
known that differentially private algorithms satisfy robust generalization. In
this paper, we show that robust generalization is a strictly weaker concept,
and that there is a learning task that can be carried out subject to robust
generalization guarantees, yet cannot be carried out subject to differential
privacy. We also show that perfect generalization is a strictly stronger
guarantee than differential privacy, but that, nevertheless, many learning
tasks can be carried out subject to the guarantees of perfect generalization.
|
A Compressed Sensing Based Decomposition of Electrodermal Activity
Signals | The measurement and analysis of Electrodermal Activity (EDA) offers
applications in diverse areas ranging from market research, to seizure
detection, to human stress analysis. Unfortunately, the analysis of EDA signals
is made difficult by the superposition of numerous components which can obscure
the signal information related to a user's response to a stimulus. We show how
simple pre-processing followed by a novel compressed sensing based
decomposition can mitigate the effects of the undesired noise components and
help reveal the underlying physiological signal. The proposed framework allows
for decomposition of EDA signals with provable bounds on the recovery of user
responses. We test our procedure on both synthetic and real-world EDA signals
from wearable sensors and demonstrate that our approach allows for more
accurate recovery of user responses as compared to the existing techniques.
|
Reinforcement Learning of POMDPs using Spectral Methods | We propose a new reinforcement learning algorithm for partially observable
Markov decision processes (POMDP) based on spectral decomposition methods.
While spectral methods have been previously employed for consistent learning of
(passive) latent variable models such as hidden Markov models, POMDPs are more
challenging since the learner interacts with the environment and possibly
changes the future observations in the process. We devise a learning algorithm
running through episodes, in each episode we employ spectral techniques to
learn the POMDP parameters from a trajectory generated by a fixed policy. At
the end of the episode, an optimization oracle returns the optimal memoryless
planning policy which maximizes the expected reward based on the estimated
POMDP model. We prove an order-optimal regret bound with respect to the optimal
memoryless policy and efficient scaling with respect to the dimensionality of
observation and action spaces.
|
Fast Nonsmooth Regularized Risk Minimization with Continuation | In regularized risk minimization, the associated optimization problem becomes
particularly difficult when both the loss and regularizer are nonsmooth.
Existing approaches either have slow or unclear convergence properties, are
restricted to limited problem subclasses, or require careful setting of a
smoothing parameter. In this paper, we propose a continuation algorithm that is
applicable to a large class of nonsmooth regularized risk minimization
problems, can be flexibly used with a number of existing solvers for the
underlying smoothed subproblem, and with convergence results on the whole
algorithm rather than just one of its subproblems. In particular, when
accelerated solvers are used, the proposed algorithm achieves the fastest known
rates of $O(1/T^2)$ on strongly convex problems, and $O(1/T)$ on general convex
problems. Experiments on nonsmooth classification and regression tasks
demonstrate that the proposed algorithm outperforms the state-of-the-art.
|
Modeling cumulative biological phenomena with Suppes-Bayes Causal
Networks | Several diseases related to cell proliferation are characterized by the
accumulation of somatic DNA changes, with respect to wildtype conditions.
Cancer and HIV are two common examples of such diseases, where the mutational
load in the cancerous/viral population increases over time. In these cases,
selective pressures are often observed along with competition, cooperation and
parasitism among distinct cellular clones. Recently, we presented a
mathematical framework to model these phenomena, based on a combination of
Bayesian inference and Suppes' theory of probabilistic causation, depicted in
graphical structures dubbed Suppes-Bayes Causal Networks (SBCNs). SBCNs are
generative probabilistic graphical models that recapitulate the potential
ordering of accumulation of such DNA changes during the progression of the
disease. Such models can be inferred from data by exploiting likelihood-based
model-selection strategies with regularization. In this paper we discuss the
theoretical foundations of our approach and we investigate in depth the
influence on the model-selection task of: (i) the poset based on Suppes' theory
and (ii) different regularization strategies. Furthermore, we provide an
example of application of our framework to HIV genetic data highlighting the
valuable insights provided by the inferred.
|
Probably Approximately Correct Greedy Maximization with Efficient Bounds
on Information Gain for Sensor Selection | Submodular function maximization finds application in a variety of real-world
decision-making problems. However, most existing methods, based on greedy
maximization, assume it is computationally feasible to evaluate F, the function
being maximized. Unfortunately, in many realistic settings F is too expensive
to evaluate exactly even once. We present probably approximately correct greedy
maximization, which requires access only to cheap anytime confidence bounds on
F and uses them to prune elements. We show that, with high probability, our
method returns an approximately optimal set. We propose novel, cheap confidence
bounds for conditional entropy, which appears in many common choices of F and
for which it is difficult to find unbiased or bounded estimates. Finally,
results on a real-world dataset from a multi-camera tracking system in a
shopping mall demonstrate that our approach performs comparably to existing
methods, but at a fraction of the computational cost.
|
Learning Gaussian Graphical Models With Fractional Marginal
Pseudo-likelihood | We propose a Bayesian approximate inference method for learning the
dependence structure of a Gaussian graphical model. Using pseudo-likelihood, we
derive an analytical expression to approximate the marginal likelihood for an
arbitrary graph structure without invoking any assumptions about
decomposability. The majority of the existing methods for learning Gaussian
graphical models are either restricted to decomposable graphs or require
specification of a tuning parameter that may have a substantial impact on
learned structures. By combining a simple sparsity inducing prior for the graph
structures with a default reference prior for the model parameters, we obtain a
fast and easily applicable scoring function that works well for even
high-dimensional data. We demonstrate the favourable performance of our
approach by large-scale comparisons against the leading methods for learning
non-decomposable Gaussian graphical models. A theoretical justification for our
method is provided by showing that it yields a consistent estimator of the
graph structure.
|
Projected Estimators for Robust Semi-supervised Classification | For semi-supervised techniques to be applied safely in practice we at least
want methods to outperform their supervised counterparts. We study this
question for classification using the well-known quadratic surrogate loss
function. Using a projection of the supervised estimate onto a set of
constraints imposed by the unlabeled data, we find we can safely improve over
the supervised solution in terms of this quadratic loss. Unlike other
approaches to semi-supervised learning, the procedure does not rely on
assumptions that are not intrinsic to the classifier at hand. It is
theoretically demonstrated that, measured on the labeled and unlabeled training
data, this semi-supervised procedure never gives a lower quadratic loss than
the supervised alternative. To our knowledge this is the first approach that
offers such strong, albeit conservative, guarantees for improvement over the
supervised solution. The characteristics of our approach are explicated using
benchmark datasets to further understand the similarities and differences
between the quadratic loss criterion used in the theoretical results and the
classification accuracy often considered in practice.
|
Weight Normalization: A Simple Reparameterization to Accelerate Training
of Deep Neural Networks | We present weight normalization: a reparameterization of the weight vectors
in a neural network that decouples the length of those weight vectors from
their direction. By reparameterizing the weights in this way we improve the
conditioning of the optimization problem and we speed up convergence of
stochastic gradient descent. Our reparameterization is inspired by batch
normalization but does not introduce any dependencies between the examples in a
minibatch. This means that our method can also be applied successfully to
recurrent models such as LSTMs and to noise-sensitive applications such as deep
reinforcement learning or generative models, for which batch normalization is
less well suited. Although our method is much simpler, it still provides much
of the speed-up of full batch normalization. In addition, the computational
overhead of our method is lower, permitting more optimization steps to be taken
in the same amount of time. We demonstrate the usefulness of our method on
applications in supervised image recognition, generative modelling, and deep
reinforcement learning.
|
Thompson Sampling is Asymptotically Optimal in General Environments | We discuss a variant of Thompson sampling for nonparametric reinforcement
learning in a countable classes of general stochastic environments. These
environments can be non-Markov, non-ergodic, and partially observable. We show
that Thompson sampling learns the environment class in the sense that (1)
asymptotically its value converges to the optimal value in mean and (2) given a
recoverability assumption regret is sublinear.
|
How effective can simple ordinal peer grading be? | Ordinal peer grading has been proposed as a simple and scalable solution for
computing reliable information about student performance in massive open online
courses. The idea is to outsource the grading task to the students themselves
as follows. After the end of an exam, each student is asked to rank -- in terms
of quality -- a bundle of exam papers by fellow students. An aggregation rule
then combines the individual rankings into a global one that contains all
students. We define a broad class of simple aggregation rules, which we call
type-ordering aggregation rules, and present a theoretical framework for
assessing their effectiveness. When statistical information about the grading
behaviour of students is available (in terms of a noise matrix that
characterizes the grading behaviour of the average student from a student
population), the framework can be used to compute the optimal rule from this
class with respect to a series of performance objectives that compare the
ranking returned by the aggregation rule to the underlying ground truth
ranking. For example, a natural rule known as Borda is proved to be optimal
when students grade correctly. In addition, we present extensive simulations
that validate our theory and prove it to be extremely accurate in predicting
the performance of aggregation rules even when only rough information about
grading behaviour (i.e., an approximation of the noise matrix) is available.
Both in the application of our theoretical framework and in our simulations, we
exploit data about grading behaviour of students that have been extracted from
two field experiments in the University of Patras.
|
Practical Riemannian Neural Networks | We provide the first experimental results on non-synthetic datasets for the
quasi-diagonal Riemannian gradient descents for neural networks introduced in
[Ollivier, 2015]. These include the MNIST, SVHN, and FACE datasets as well as a
previously unpublished electroencephalogram dataset. The quasi-diagonal
Riemannian algorithms consistently beat simple stochastic gradient gradient
descents by a varying margin. The computational overhead with respect to simple
backpropagation is around a factor $2$. Perhaps more interestingly, these
methods also reach their final performance quickly, thus requiring fewer
training epochs and a smaller total computation time.
We also present an implementation guide to these Riemannian gradient descents
for neural networks, showing how the quasi-diagonal versions can be implemented
with minimal effort on top of existing routines which compute gradients.
|
Meta-learning within Projective Simulation | Learning models of artificial intelligence can nowadays perform very well on
a large variety of tasks. However, in practice different task environments are
best handled by different learning models, rather than a single, universal,
approach. Most non-trivial models thus require the adjustment of several to
many learning parameters, which is often done on a case-by-case basis by an
external party. Meta-learning refers to the ability of an agent to autonomously
and dynamically adjust its own learning parameters, or meta-parameters. In this
work we show how projective simulation, a recently developed model of
artificial intelligence, can naturally be extended to account for meta-learning
in reinforcement learning settings. The projective simulation approach is based
on a random walk process over a network of clips. The suggested meta-learning
scheme builds upon the same design and employs clip networks to monitor the
agent's performance and to adjust its meta-parameters "on the fly". We
distinguish between "reflexive adaptation" and "adaptation through learning",
and show the utility of both approaches. In addition, a trade-off between
flexibility and learning-time is addressed. The extended model is examined on
three different kinds of reinforcement learning tasks, in which the agent has
different optimal values of the meta-parameters, and is shown to perform well,
reaching near-optimal to optimal success rates in all of them, without ever
needing to manually adjust any meta-parameter.
|
PCA/LDA Approach for Text-Independent Speaker Recognition | Various algorithms for text-independent speaker recognition have been
developed through the decades, aiming to improve both accuracy and efficiency.
This paper presents a novel PCA/LDA-based approach that is faster than
traditional statistical model-based methods and achieves competitive results.
First, the performance based on only PCA and only LDA is measured; then a mixed
model, taking advantages of both methods, is introduced. A subset of the TIMIT
corpus composed of 200 male speakers, is used for enrollment, validation and
testing. The best results achieve 100%; 96% and 95% classification rate at
population level 50; 100 and 200, using 39-dimensional MFCC features with delta
and double delta. These results are based on 12-second text-independent speech
for training and 4-second data for test. These are comparable to the
conventional MFCC-GMM methods, but require significantly less time to train and
operate.
|
Hierarchical Conflict Propagation: Sequence Learning in a Recurrent Deep
Neural Network | Recurrent neural networks (RNN) are capable of learning to encode and exploit
activation history over an arbitrary timescale. However, in practice, state of
the art gradient descent based training methods are known to suffer from
difficulties in learning long term dependencies. Here, we describe a novel
training method that involves concurrent parallel cloned networks, each sharing
the same weights, each trained at different stimulus phase and each maintaining
independent activation histories. Training proceeds by recursively performing
batch-updates over the parallel clones as activation history is progressively
increased. This allows conflicts to propagate hierarchically from short-term
contexts towards longer-term contexts until they are resolved. We illustrate
the parallel clones method and hierarchical conflict propagation with a
character-level deep RNN tasked with memorizing a paragraph of Moby Dick (by
Herman Melville).
|
vDNN: Virtualized Deep Neural Networks for Scalable, Memory-Efficient
Neural Network Design | The most widely used machine learning frameworks require users to carefully
tune their memory usage so that the deep neural network (DNN) fits into the
DRAM capacity of a GPU. This restriction hampers a researcher's flexibility to
study different machine learning algorithms, forcing them to either use a less
desirable network architecture or parallelize the processing across multiple
GPUs. We propose a runtime memory manager that virtualizes the memory usage of
DNNs such that both GPU and CPU memory can simultaneously be utilized for
training larger DNNs. Our virtualized DNN (vDNN) reduces the average GPU memory
usage of AlexNet by up to 89%, OverFeat by 91%, and GoogLeNet by 95%, a
significant reduction in memory requirements of DNNs. Similar experiments on
VGG-16, one of the deepest and memory hungry DNNs to date, demonstrate the
memory-efficiency of our proposal. vDNN enables VGG-16 with batch size 256
(requiring 28 GB of memory) to be trained on a single NVIDIA Titan X GPU card
containing 12 GB of memory, with 18% performance loss compared to a
hypothetical, oracular GPU with enough memory to hold the entire DNN.
|
Auto-JacoBin: Auto-encoder Jacobian Binary Hashing | Binary codes can be used to speed up nearest neighbor search tasks in large
scale data sets as they are efficient for both storage and retrieval. In this
paper, we propose a robust auto-encoder model that preserves the geometric
relationships of high-dimensional data sets in Hamming space. This is done by
considering a noise-removing function in a region surrounding the manifold
where the training data points lie. This function is defined with the property
that it projects the data points near the manifold into the manifold wisely,
and we approximate this function by its first order approximation. Experimental
results show that the proposed method achieves better than state-of-the-art
results on three large scale high dimensional data sets.
|
PCA Method for Automated Detection of Mispronounced Words | This paper presents a method for detecting mispronunciations with the aim of
improving Computer Assisted Language Learning (CALL) tools used by foreign
language learners. The algorithm is based on Principle Component Analysis
(PCA). It is hierarchical with each successive step refining the estimate to
classify the test word as being either mispronounced or correct. Preprocessing
before detection, like normalization and time-scale modification, is
implemented to guarantee uniformity of the feature vectors input to the
detection system. The performance using various features including spectrograms
and Mel-Frequency Cepstral Coefficients (MFCCs) are compared and evaluated.
Best results were obtained using MFCCs, achieving up to 99% accuracy in word
verification and 93% in native/non-native classification. Compared with Hidden
Markov Models (HMMs) which are used pervasively in recognition application,
this particular approach is computational efficient and effective when training
data is limited.
|
Learning to Abstain from Binary Prediction | A binary classifier capable of abstaining from making a label prediction has
two goals in tension: minimizing errors, and avoiding abstaining unnecessarily
often. In this work, we exactly characterize the best achievable tradeoff
between these two goals in a general semi-supervised setting, given an ensemble
of predictors of varying competence as well as unlabeled data on which we wish
to predict or abstain. We give an algorithm for learning a classifier in this
setting which trades off its errors with abstentions in a minimax optimal
manner, is as efficient as linear learning and prediction, and is demonstrably
practical. Our analysis extends to a large class of loss functions and other
scenarios, including ensembles comprised of specialists that can themselves
abstain.
|
Harnessing disordered quantum dynamics for machine learning | Quantum computer has an amazing potential of fast information processing.
However, realisation of a digital quantum computer is still a challenging
problem requiring highly accurate controls and key application strategies. Here
we propose a novel platform, quantum reservoir computing, to solve these issues
successfully by exploiting natural quantum dynamics, which is ubiquitous in
laboratories nowadays, for machine learning. In this framework, nonlinear
dynamics including classical chaos can be universally emulated in quantum
systems. A number of numerical experiments show that quantum systems consisting
of at most seven qubits possess computational capabilities comparable to
conventional recurrent neural networks of 500 nodes. This discovery opens up a
new paradigm for information processing with artificial intelligence powered by
quantum physics.
|
Search by Ideal Candidates: Next Generation of Talent Search at LinkedIn | One key challenge in talent search is how to translate complex criteria of a
hiring position into a search query. This typically requires deep knowledge on
which skills are typically needed for the position, what are their
alternatives, which companies are likely to have such candidates, etc. However,
listing examples of suitable candidates for a given position is a relatively
easy job. Therefore, in order to help searchers overcome this challenge, we
design a next generation of talent search paradigm at LinkedIn: Search by Ideal
Candidates. This new system only needs the searcher to input one or several
examples of suitable candidates for the position. The system will generate a
query based on the input candidates and then retrieve and rank results based on
the query as well as the input candidates. The query is also shown to the
searcher to make the system transparent and to allow the searcher to interact
with it. As the searcher modifies the initial query and makes it deviate from
the ideal candidates, the search ranking function dynamically adjusts an
refreshes the ranking results balancing between the roles of query and ideal
candidates. As of writing this paper, the new system is being launched to our
customers.
|
DeepSpark: A Spark-Based Distributed Deep Learning Framework for
Commodity Clusters | The increasing complexity of deep neural networks (DNNs) has made it
challenging to exploit existing large-scale data processing pipelines for
handling massive data and parameters involved in DNN training. Distributed
computing platforms and GPGPU-based acceleration provide a mainstream solution
to this computational challenge. In this paper, we propose DeepSpark, a
distributed and parallel deep learning framework that exploits Apache Spark on
commodity clusters. To support parallel operations, DeepSpark automatically
distributes workloads and parameters to Caffe/Tensorflow-running nodes using
Spark, and iteratively aggregates training results by a novel lock-free
asynchronous variant of the popular elastic averaging stochastic gradient
descent based update scheme, effectively complementing the synchronized
processing capabilities of Spark. DeepSpark is an on-going project, and the
current release is available at http://deepspark.snu.ac.kr.
|
Scalable and Sustainable Deep Learning via Randomized Hashing | Current deep learning architectures are growing larger in order to learn from
complex datasets. These architectures require giant matrix multiplication
operations to train millions of parameters. Conversely, there is another
growing trend to bring deep learning to low-power, embedded devices. The matrix
operations, associated with both training and testing of deep networks, are
very expensive from a computational and energy standpoint. We present a novel
hashing based technique to drastically reduce the amount of computation needed
to train and test deep networks. Our approach combines recent ideas from
adaptive dropouts and randomized hashing for maximum inner product search to
select the nodes with the highest activation efficiently. Our new algorithm for
deep learning reduces the overall computational cost of forward and
back-propagation by operating on significantly fewer (sparse) nodes. As a
consequence, our algorithm uses only 5% of the total multiplications, while
keeping on average within 1% of the accuracy of the original model. A unique
property of the proposed hashing based back-propagation is that the updates are
always sparse. Due to the sparse gradient updates, our algorithm is ideally
suited for asynchronous and parallel training leading to near linear speedup
with increasing number of cores. We demonstrate the scalability and
sustainability (energy efficiency) of our proposed algorithm via rigorous
experimental evaluations on several real datasets.
|
Architectural Complexity Measures of Recurrent Neural Networks | In this paper, we systematically analyze the connecting architectures of
recurrent neural networks (RNNs). Our main contribution is twofold: first, we
present a rigorous graph-theoretic framework describing the connecting
architectures of RNNs in general. Second, we propose three architecture
complexity measures of RNNs: (a) the recurrent depth, which captures the RNN's
over-time nonlinear complexity, (b) the feedforward depth, which captures the
local input-output nonlinearity (similar to the "depth" in feedforward neural
networks (FNNs)), and (c) the recurrent skip coefficient which captures how
rapidly the information propagates over time. We rigorously prove each
measure's existence and computability. Our experimental results show that RNNs
might benefit from larger recurrent depth and feedforward depth. We further
demonstrate that increasing recurrent skip coefficient offers performance
boosts on long term dependency problems.
|
Multimodal Emotion Recognition Using Multimodal Deep Learning | To enhance the performance of affective models and reduce the cost of
acquiring physiological signals for real-world applications, we adopt
multimodal deep learning approach to construct affective models from multiple
physiological signals. For unimodal enhancement task, we indicate that the best
recognition accuracy of 82.11% on SEED dataset is achieved with shared
representations generated by Deep AutoEncoder (DAE) model. For multimodal
facilitation tasks, we demonstrate that the Bimodal Deep AutoEncoder (BDAE)
achieves the mean accuracies of 91.01% and 83.25% on SEED and DEAP datasets,
respectively, which are much superior to the state-of-the-art approaches. For
cross-modal learning task, our experimental results demonstrate that the mean
accuracy of 66.34% is achieved on SEED dataset through shared representations
generated by EEG-based DAE as training samples and shared representations
generated by eye-based DAE as testing sample, and vice versa.
|
Theoretical Analysis of the $k$-Means Algorithm - A Survey | The $k$-means algorithm is one of the most widely used clustering heuristics.
Despite its simplicity, analyzing its running time and quality of approximation
is surprisingly difficult and can lead to deep insights that can be used to
improve the algorithm. In this paper we survey the recent results in this
direction as well as several extension of the basic $k$-means method.
|
Bounded Rational Decision-Making in Feedforward Neural Networks | Bounded rational decision-makers transform sensory input into motor output
under limited computational resources. Mathematically, such decision-makers can
be modeled as information-theoretic channels with limited transmission rate.
Here, we apply this formalism for the first time to multilayer feedforward
neural networks. We derive synaptic weight update rules for two scenarios,
where either each neuron is considered as a bounded rational decision-maker or
the network as a whole. In the update rules, bounded rationality translates
into information-theoretically motivated types of regularization in weight
space. In experiments on the MNIST benchmark classification task for
handwritten digits, we show that such information-theoretic regularization
successfully prevents overfitting across different architectures and attains
results that are competitive with other recent techniques like dropout,
dropconnect and Bayes by backprop, for both ordinary and convolutional neural
networks.
|
Large-Scale Detection of Non-Technical Losses in Imbalanced Data Sets | Non-technical losses (NTL) such as electricity theft cause significant harm
to our economies, as in some countries they may range up to 40% of the total
electricity distributed. Detecting NTLs requires costly on-site inspections.
Accurate prediction of NTLs for customers using machine learning is therefore
crucial. To date, related research largely ignore that the two classes of
regular and non-regular customers are highly imbalanced, that NTL proportions
may change and mostly consider small data sets, often not allowing to deploy
the results in production. In this paper, we present a comprehensive approach
to assess three NTL detection models for different NTL proportions in large
real world data sets of 100Ks of customers: Boolean rules, fuzzy logic and
Support Vector Machine. This work has resulted in appreciable results that are
about to be deployed in a leading industry solution. We believe that the
considerations and observations made in this contribution are necessary for
future smart meter research in order to report their effectiveness on
imbalanced and large real world data sets.
|
Simple Bayesian Algorithms for Best Arm Identification | This paper considers the optimal adaptive allocation of measurement effort
for identifying the best among a finite set of options or designs. An
experimenter sequentially chooses designs to measure and observes noisy signals
of their quality with the goal of confidently identifying the best design after
a small number of measurements. This paper proposes three simple and intuitive
Bayesian algorithms for adaptively allocating measurement effort, and
formalizes a sense in which these seemingly naive rules are the best possible.
One proposal is top-two probability sampling, which computes the two designs
with the highest posterior probability of being optimal, and then randomizes to
select among these two. One is a variant of top-two sampling which considers
not only the probability a design is optimal, but the expected amount by which
its quality exceeds that of other designs. The final algorithm is a modified
version of Thompson sampling that is tailored for identifying the best design.
We prove that these simple algorithms satisfy a sharp optimality property. In a
frequentist setting where the true quality of the designs is fixed, one hopes
the posterior definitively identifies the optimal design, in the sense that
that the posterior probability assigned to the event that some other design is
optimal converges to zero as measurements are collected. We show that under the
proposed algorithms this convergence occurs at an exponential rate, and the
corresponding exponent is the best possible among all allocation
|
A Single Model Explains both Visual and Auditory Precortical Coding | Precortical neural systems encode information collected by the senses, but
the driving principles of the encoding used have remained a subject of debate.
We present a model of retinal coding that is based on three constraints:
information preservation, minimization of the neural wiring, and response
equalization. The resulting novel version of sparse principal components
analysis successfully captures a number of known characteristics of the retinal
coding system, such as center-surround receptive fields, color opponency
channels, and spatiotemporal responses that correspond to magnocellular and
parvocellular pathways. Furthermore, when trained on auditory data, the same
model learns receptive fields well fit by gammatone filters, commonly used to
model precortical auditory coding. This suggests that efficient coding may be a
unifying principle of precortical encoding across modalities.
|
Lie Access Neural Turing Machine | Following the recent trend in explicit neural memory structures, we present a
new design of an external memory, wherein memories are stored in an Euclidean
key space $\mathbb R^n$. An LSTM controller performs read and write via
specialized read and write heads. It can move a head by either providing a new
address in the key space (aka random access) or moving from its previous
position via a Lie group action (aka Lie access). In this way, the "L" and "R"
instructions of a traditional Turing Machine are generalized to arbitrary
elements of a fixed Lie group action. For this reason, we name this new model
the Lie Access Neural Turing Machine, or LANTM.
We tested two different configurations of LANTM against an LSTM baseline in
several basic experiments. We found the right configuration of LANTM to
outperform the baseline in all of our experiments. In particular, we trained
LANTM on addition of $k$-digit numbers for $2 \le k \le 16$, but it was able to
generalize almost perfectly to $17 \le k \le 32$, all with the number of
parameters 2 orders of magnitude below the LSTM baseline.
|
A Structured Variational Auto-encoder for Learning Deep Hierarchies of
Sparse Features | In this note we present a generative model of natural images consisting of a
deep hierarchy of layers of latent random variables, each of which follows a
new type of distribution that we call rectified Gaussian. These rectified
Gaussian units allow spike-and-slab type sparsity, while retaining the
differentiability necessary for efficient stochastic gradient variational
inference. To learn the parameters of the new model, we approximate the
posterior of the latent variables with a variational auto-encoder. Rather than
making the usual mean-field assumption however, the encoder parameterizes a new
type of structured variational approximation that retains the prior
dependencies of the generative model. Using this structured posterior
approximation, we are able to perform joint training of deep models with many
layers of latent random variables, without having to resort to stacking or
other layerwise training procedures.
|
Resource Constrained Structured Prediction | We study the problem of structured prediction under test-time budget
constraints. We propose a novel approach applicable to a wide range of
structured prediction problems in computer vision and natural language
processing. Our approach seeks to adaptively generate computationally costly
features during test-time in order to reduce the computational cost of
prediction while maintaining prediction performance. We show that training the
adaptive feature generation system can be reduced to a series of structured
learning problems, resulting in efficient training using existing structured
learning algorithms. This framework provides theoretical justification for
several existing heuristic approaches found in literature. We evaluate our
proposed adaptive system on two structured prediction tasks, optical character
recognition (OCR) and dependency parsing and show strong performance in
reduction of the feature costs without degrading accuracy.
|
Investigating practical linear temporal difference learning | Off-policy reinforcement learning has many applications including: learning
from demonstration, learning multiple goal seeking policies in parallel, and
representing predictive knowledge. Recently there has been an proliferation of
new policy-evaluation algorithms that fill a longstanding algorithmic void in
reinforcement learning: combining robustness to off-policy sampling, function
approximation, linear complexity, and temporal difference (TD) updates. This
paper contains two main contributions. First, we derive two new hybrid TD
policy-evaluation algorithms, which fill a gap in this collection of
algorithms. Second, we perform an empirical comparison to elicit which of these
new linear TD methods should be preferred in different situations, and make
concrete suggestions about practical use.
|
Does quantification without adjustments work? | Classification is the task of predicting the class labels of objects based on
the observation of their features. In contrast, quantification has been defined
as the task of determining the prevalences of the different sorts of class
labels in a target dataset. The simplest approach to quantification is Classify
& Count where a classifier is optimised for classification on a training set
and applied to the target dataset for the prediction of class labels. In the
case of binary quantification, the number of predicted positive labels is then
used as an estimate of the prevalence of the positive class in the target
dataset. Since the performance of Classify & Count for quantification is known
to be inferior its results typically are subject to adjustments. However, some
researchers recently have suggested that Classify & Count might actually work
without adjustments if it is based on a classifer that was specifically trained
for quantification. We discuss the theoretical foundation for this claim and
explore its potential and limitations with a numerical example based on the
binormal model with equal variances. In order to identify an optimal quantifier
in the binormal setting, we introduce the concept of local Bayes optimality. As
a side remark, we present a complete proof of a theorem by Ye et al. (2012).
|
Iterative Aggregation Method for Solving Principal Component Analysis
Problems | Motivated by the previously developed multilevel aggregation method for
solving structural analysis problems a novel two-level aggregation approach for
efficient iterative solution of Principal Component Analysis (PCA) problems is
proposed. The course aggregation model of the original covariance matrix is
used in the iterative solution of the eigenvalue problem by a power iterations
method. The method is tested on several data sets consisting of large number of
text documents.
|
Collaborative Learning of Stochastic Bandits over a Social Network | We consider a collaborative online learning paradigm, wherein a group of
agents connected through a social network are engaged in playing a stochastic
multi-armed bandit game. Each time an agent takes an action, the corresponding
reward is instantaneously observed by the agent, as well as its neighbours in
the social network. We perform a regret analysis of various policies in this
collaborative learning setting. A key finding of this paper is that natural
extensions of widely-studied single agent learning policies to the network
setting need not perform well in terms of regret. In particular, we identify a
class of non-altruistic and individually consistent policies, and argue by
deriving regret lower bounds that they are liable to suffer a large regret in
the networked setting. We also show that the learning performance can be
substantially improved if the agents exploit the structure of the network, and
develop a simple learning algorithm based on dominating sets of the network.
Specifically, we first consider a star network, which is a common motif in
hierarchical social networks, and show analytically that the hub agent can be
used as an information sink to expedite learning and improve the overall
regret. We also derive networkwide regret bounds for the algorithm applied to
general networks. We conduct numerical experiments on a variety of networks to
corroborate our analytical results.
|
High-Dimensional $L_2$Boosting: Rate of Convergence | Boosting is one of the most significant developments in machine learning.
This paper studies the rate of convergence of $L_2$Boosting, which is tailored
for regression, in a high-dimensional setting. Moreover, we introduce so-called
\textquotedblleft post-Boosting\textquotedblright. This is a post-selection
estimator which applies ordinary least squares to the variables selected in the
first stage by $L_2$Boosting. Another variant is \textquotedblleft Orthogonal
Boosting\textquotedblright\ where after each step an orthogonal projection is
conducted. We show that both post-$L_2$Boosting and the orthogonal boosting
achieve the same rate of convergence as LASSO in a sparse, high-dimensional
setting. We show that the rate of convergence of the classical $L_2$Boosting
depends on the design matrix described by a sparse eigenvalue constant. To show
the latter results, we derive new approximation results for the pure greedy
algorithm, based on analyzing the revisiting behavior of $L_2$Boosting. We also
introduce feasible rules for early stopping, which can be easily implemented
and used in applied work. Our results also allow a direct comparison between
LASSO and boosting which has been missing from the literature. Finally, we
present simulation studies and applications to illustrate the relevance of our
theoretical results and to provide insights into the practical aspects of
boosting. In these simulation studies, post-$L_2$Boosting clearly outperforms
LASSO.
|
Representation of linguistic form and function in recurrent neural
networks | We present novel methods for analyzing the activation patterns of RNNs from a
linguistic point of view and explore the types of linguistic structure they
learn. As a case study, we use a multi-task gated recurrent network
architecture consisting of two parallel pathways with shared word embeddings
trained on predicting the representations of the visual scene corresponding to
an input sentence, and predicting the next word in the same sentence. Based on
our proposed method to estimate the amount of contribution of individual tokens
in the input to the final prediction of the networks we show that the image
prediction pathway: a) is sensitive to the information structure of the
sentence b) pays selective attention to lexical categories and grammatical
functions that carry semantic information c) learns to treat the same input
token differently depending on its grammatical functions in the sentence. In
contrast the language model is comparatively more sensitive to words with a
syntactic function. Furthermore, we propose methods to ex- plore the function
of individual hidden units in RNNs and show that the two pathways of the
architecture in our case study contain specialized units tuned to patterns
informative for the task, some of which can carry activations to later time
steps to encode long-term dependencies.
|
Even Trolls Are Useful: Efficient Link Classification in Signed Networks | We address the problem of classifying the links of signed social networks
given their full structural topology. Motivated by a binary user behaviour
assumption, which is supported by decades of research in psychology, we develop
an efficient and surprisingly simple approach to solve this classification
problem. Our methods operate both within the active and batch settings. We
demonstrate that the algorithms we developed are extremely fast in both
theoretical and practical terms. Within the active setting, we provide a new
complexity measure and a rigorous analysis of our methods that hold for
arbitrary signed networks. We validate our theoretical claims carrying out a
set of experiments on three well known real-world datasets, showing that our
methods outperform the competitors while being much faster.
|
Beyond CCA: Moment Matching for Multi-View Models | We introduce three novel semi-parametric extensions of probabilistic
canonical correlation analysis with identifiability guarantees. We consider
moment matching techniques for estimation in these models. For that, by drawing
explicit links between the new models and a discrete version of independent
component analysis (DICA), we first extend the DICA cumulant tensors to the new
discrete version of CCA. By further using a close connection with independent
component analysis, we introduce generalized covariance matrices, which can
replace the cumulant tensors in the moment matching framework, and, therefore,
improve sample complexity and simplify derivations and algorithms
significantly. As the tensor power method or orthogonal joint diagonalization
are not applicable in the new setting, we use non-orthogonal joint
diagonalization techniques for matching the cumulants. We demonstrate
performance of the proposed models and estimation techniques on experiments
with both synthetic and real datasets.
|
Easy Monotonic Policy Iteration | A key problem in reinforcement learning for control with general function
approximators (such as deep neural networks and other nonlinear functions) is
that, for many algorithms employed in practice, updates to the policy or
$Q$-function may fail to improve performance---or worse, actually cause the
policy performance to degrade. Prior work has addressed this for policy
iteration by deriving tight policy improvement bounds; by optimizing the lower
bound on policy improvement, a better policy is guaranteed. However, existing
approaches suffer from bounds that are hard to optimize in practice because
they include sup norm terms which cannot be efficiently estimated or
differentiated. In this work, we derive a better policy improvement bound where
the sup norm of the policy divergence has been replaced with an average
divergence; this leads to an algorithm, Easy Monotonic Policy Iteration, that
generates sequences of policies with guaranteed non-decreasing returns and is
easy to implement in a sample-based framework.
|
Learning, Visualizing, and Exploiting a Model for the Intrinsic Value of
a Batted Ball | We present an algorithm for learning the intrinsic value of a batted ball in
baseball. This work addresses the fundamental problem of separating the value
of a batted ball at contact from factors such as the defense, weather, and
ballpark that can affect its observed outcome. The algorithm uses a Bayesian
model to construct a continuous mapping from a vector of batted ball parameters
to an intrinsic measure defined as the expected value of a linear weights
representation for run value. A kernel method is used to build nonparametric
estimates for the component probability density functions in Bayes theorem from
a set of over one hundred thousand batted ball measurements recorded by the
HITf/x system during the 2014 major league baseball (MLB) season.
Cross-validation is used to determine the optimal vector of smoothing
parameters for the density estimates. Properties of the mapping are visualized
by considering reduced-dimension subsets of the batted ball parameter space. We
use the mapping to derive statistics for intrinsic quality of contact for
batters and pitchers which have the potential to improve the accuracy of player
models and forecasting systems. We also show that the new approach leads to a
simple automated measure of contact-adjusted defense and provides insight into
the impact of environmental variables on batted balls.
|
Characterizing Diseases from Unstructured Text: A Vocabulary Driven
Word2vec Approach | Traditional disease surveillance can be augmented with a wide variety of
real-time sources such as, news and social media. However, these sources are in
general unstructured and, construction of surveillance tools such as
taxonomical correlations and trace mapping involves considerable human
supervision. In this paper, we motivate a disease vocabulary driven word2vec
model (Dis2Vec) to model diseases and constituent attributes as word embeddings
from the HealthMap news corpus. We use these word embeddings to automatically
create disease taxonomies and evaluate our model against corresponding human
annotated taxonomies. We compare our model accuracies against several
state-of-the art word2vec methods. Our results demonstrate that Dis2Vec
outperforms traditional distributed vector representations in its ability to
faithfully capture taxonomical attributes across different class of diseases
such as endemic, emerging and rare.
|
On Tie Strength Augmented Social Correlation for Inferring Preference of
Mobile Telco Users | For mobile telecom operators, it is critical to build preference profiles of
their customers and connected users, which can help operators make better
marketing strategies, and provide more personalized services. With the
deployment of deep packet inspection (DPI) in telecom networks, it is possible
for the telco operators to obtain user online preference. However, DPI has its
limitations and user preference derived only from DPI faces sparsity and cold
start problems. To better infer the user preference, social correlation in
telco users network derived from Call Detailed Records (CDRs) with regard to
online preference is investigated. Though widely verified in several online
social networks, social correlation between online preference of users in
mobile telco networks, where the CDRs derived relationship are of less social
properties and user mobile internet surfing activities are not visible to
neighbourhood, has not been explored at a large scale. Based on a real world
telecom dataset including CDRs and preference of more than $550K$ users for
several months, we verified that correlation does exist between online
preference in such \textit{ambiguous} social network. Furthermore, we found
that the stronger ties that users build, the more similarity between their
preference may have. After defining the preference inferring task as a Top-$K$
recommendation problem, we incorporated Matrix Factorization Collaborative
Filtering model with social correlation and tie strength based on call patterns
to generate Top-$K$ preferred categories for users. The proposed Tie Strength
Augmented Social Recommendation (TSASoRec) model takes data sparsity and cold
start user problems into account, considering both the recorded and missing
recorded category entries. The experiment on real dataset shows the proposed
model can better infer user preference, especially for cold start users.
|
Convolutional Rectifier Networks as Generalized Tensor Decompositions | Convolutional rectifier networks, i.e. convolutional neural networks with
rectified linear activation and max or average pooling, are the cornerstone of
modern deep learning. However, despite their wide use and success, our
theoretical understanding of the expressive properties that drive these
networks is partial at best. On the other hand, we have a much firmer grasp of
these issues in the world of arithmetic circuits. Specifically, it is known
that convolutional arithmetic circuits possess the property of "complete depth
efficiency", meaning that besides a negligible set, all functions that can be
implemented by a deep network of polynomial size, require exponential size in
order to be implemented (or even approximated) by a shallow network. In this
paper we describe a construction based on generalized tensor decompositions,
that transforms convolutional arithmetic circuits into convolutional rectifier
networks. We then use mathematical tools available from the world of arithmetic
circuits to prove new results. First, we show that convolutional rectifier
networks are universal with max pooling but not with average pooling. Second,
and more importantly, we show that depth efficiency is weaker with
convolutional rectifier networks than it is with convolutional arithmetic
circuits. This leads us to believe that developing effective methods for
training convolutional arithmetic circuits, thereby fulfilling their expressive
potential, may give rise to a deep learning architecture that is provably
superior to convolutional rectifier networks but has so far been overlooked by
practitioners.
|
Segmental Recurrent Neural Networks for End-to-end Speech Recognition | We study the segmental recurrent neural network for end-to-end acoustic
modelling. This model connects the segmental conditional random field (CRF)
with a recurrent neural network (RNN) used for feature extraction. Compared to
most previous CRF-based acoustic models, it does not rely on an external system
to provide features or segmentation boundaries. Instead, this model
marginalises out all the possible segmentations, and features are extracted
from the RNN trained together with the segmental CRF. In essence, this model is
self-contained and can be trained end-to-end. In this paper, we discuss
practical training and decoding issues as well as the method to speed up the
training in the context of speech recognition. We performed experiments on the
TIMIT dataset. We achieved 17.3 phone error rate (PER) from the first-pass
decoding --- the best reported result using CRFs, despite the fact that we only
used a zeroth-order CRF and without using any language model.
|
Noisy Activation Functions | Common nonlinear activation functions used in neural networks can cause
training difficulties due to the saturation behavior of the activation
function, which may hide dependencies that are not visible to vanilla-SGD
(using first order gradients only). Gating mechanisms that use softly
saturating activation functions to emulate the discrete switching of digital
logic circuits are good examples of this. We propose to exploit the injection
of appropriate noise so that the gradients may flow easily, even if the
noiseless application of the activation function would yield zero gradient.
Large noise will dominate the noise-free gradient and allow stochastic gradient
descent toexplore more. By adding noise only to the problematic parts of the
activation function, we allow the optimization procedure to explore the
boundary between the degenerate (saturating) and the well-behaved parts of the
activation function. We also establish connections to simulated annealing, when
the amount of noise is annealed down, making it easier to optimize hard
objective functions. We find experimentally that replacing such saturating
activation functions by noisy variants helps training in many contexts,
yielding state-of-the-art or competitive results on different datasets and
task, especially when training seems to be the most difficult, e.g., when
curriculum learning is necessary to obtain good results.
|
A Nonlinear Adaptive Filter Based on the Model of Simple Multilinear
Functionals | Nonlinear adaptive filtering allows for modeling of some additional aspects
of a general system and usually relies on highly complex algorithms, such as
those based on the Volterra series. Through the use of the Kronecker product
and some basic facts of tensor algebra, we propose a simple model of
nonlinearity, one that can be interpreted as a product of the outputs of K FIR
linear filters, and compute its cost function together with its gradient, which
allows for some analysis of the optimization problem. We use these results it
in a stochastic gradient framework, from which we derive an LMS-like algorithm
and investigate the problems of multi-modality in the mean-square error surface
and the choice of adequate initial conditions. Its computational complexity is
calculated. The new algorithm is tested in a system identification setup and is
compared with other polynomial algorithms from the literature, presenting
favorable convergence and/or computational complexity.
|
Crowdsourcing On-street Parking Space Detection | As the number of vehicles continues to grow, parking spaces are at a premium
in city streets. Additionally, due to the lack of knowledge about street
parking spaces, heuristic circling the blocks not only costs drivers' time and
fuel, but also increases city congestion. In the wake of recent trend to build
convenient, green and energy-efficient smart cities, we rethink common
techniques adopted by high-profile smart parking systems, and present a
user-engaged (crowdsourcing) and sonar-based prototype to identify urban
on-street parking spaces. The prototype includes an ultrasonic sensor, a GPS
receiver and associated Arduino micro-controllers. It is mounted on the
passenger side of a car to measure the distance from the vehicle to the nearest
roadside obstacle. Multiple road tests are conducted around Wheatley, Oxford to
gather results and emulate the crowdsourcing approach. By extracting parked
vehicles' features from the collected trace, a supervised learning algorithm is
developed to estimate roadside parking occupancy and spot illegal parking
vehicles. A quantity estimation model is derived to calculate the required
number of sensing units to cover urban streets. The estimation is
quantitatively compared to a fixed sensing solution. The results show that the
crowdsourcing way would need substantially fewer sensors compared to the fixed
sensing system.
|
Guided Cost Learning: Deep Inverse Optimal Control via Policy
Optimization | Reinforcement learning can acquire complex behaviors from high-level
specifications. However, defining a cost function that can be optimized
effectively and encodes the correct task is challenging in practice. We explore
how inverse optimal control (IOC) can be used to learn behaviors from
demonstrations, with applications to torque control of high-dimensional robotic
systems. Our method addresses two key challenges in inverse optimal control:
first, the need for informative features and effective regularization to impose
structure on the cost, and second, the difficulty of learning the cost function
under unknown dynamics for high-dimensional continuous systems. To address the
former challenge, we present an algorithm capable of learning arbitrary
nonlinear cost functions, such as neural networks, without meticulous feature
engineering. To address the latter challenge, we formulate an efficient
sample-based approximation for MaxEnt IOC. We evaluate our method on a series
of simulated tasks and real-world robotic manipulation problems, demonstrating
substantial improvement over prior methods both in terms of task complexity and
sample efficiency.
|
Solving Combinatorial Games using Products, Projections and
Lexicographically Optimal Bases | In order to find Nash-equilibria for two-player zero-sum games where each
player plays combinatorial objects like spanning trees, matchings etc, we
consider two online learning algorithms: the online mirror descent (OMD)
algorithm and the multiplicative weights update (MWU) algorithm. The OMD
algorithm requires the computation of a certain Bregman projection, that has
closed form solutions for simple convex sets like the Euclidean ball or the
simplex. However, for general polyhedra one often needs to exploit the general
machinery of convex optimization. We give a novel primal-style algorithm for
computing Bregman projections on the base polytopes of polymatroids. Next, in
the case of the MWU algorithm, although it scales logarithmically in the number
of pure strategies or experts $N$ in terms of regret, the algorithm takes time
polynomial in $N$; this especially becomes a problem when learning
combinatorial objects. We give a general recipe to simulate the multiplicative
weights update algorithm in time polynomial in their natural dimension. This is
useful whenever there exists a polynomial time generalized counting oracle
(even if approximate) over these objects. Finally, using the combinatorial
structure of symmetric Nash-equilibria (SNE) when both players play bases of
matroids, we show that these can be found with a single projection or convex
minimization (without using online learning).
|
LOFS: Library of Online Streaming Feature Selection | As an emerging research direction, online streaming feature selection deals
with sequentially added dimensions in a feature space while the number of data
instances is fixed. Online streaming feature selection provides a new,
complementary algorithmic methodology to enrich online feature selection,
especially targets to high dimensionality in big data analytics. This paper
introduces the first comprehensive open-source library for use in MATLAB that
implements the state-of-the-art algorithms of online streaming feature
selection. The library is designed to facilitate the development of new
algorithms in this exciting research direction and make comparisons between the
new methods and existing ones available.
|
Asymptotic behavior of $\ell_p$-based Laplacian regularization in
semi-supervised learning | Given a weighted graph with $N$ vertices, consider a real-valued regression
problem in a semi-supervised setting, where one observes $n$ labeled vertices,
and the task is to label the remaining ones. We present a theoretical study of
$\ell_p$-based Laplacian regularization under a $d$-dimensional geometric
random graph model. We provide a variational characterization of the
performance of this regularized learner as $N$ grows to infinity while $n$
stays constant, the associated optimality conditions lead to a partial
differential equation that must be satisfied by the associated function
estimate $\hat{f}$. From this formulation we derive several predictions on the
limiting behavior the $d$-dimensional function $\hat{f}$, including (a) a phase
transition in its smoothness at the threshold $p = d + 1$, and (b) a tradeoff
between smoothness and sensitivity to the underlying unlabeled data
distribution $P$. Thus, over the range $p \leq d$, the function estimate
$\hat{f}$ is degenerate and "spiky," whereas for $p\geq d+1$, the function
estimate $\hat{f}$ is smooth. We show that the effect of the underlying density
vanishes monotonically with $p$, such that in the limit $p = \infty$,
corresponding to the so-called Absolutely Minimal Lipschitz Extension, the
estimate $\hat{f}$ is independent of the distribution $P$. Under the assumption
of semi-supervised smoothness, ignoring $P$ can lead to poor statistical
performance, in particular, we construct a specific example for $d=1$ to
demonstrate that $p=2$ has lower risk than $p=\infty$ due to the former penalty
adapting to $P$ and the latter ignoring it. We also provide simulations that
verify the accuracy of our predictions for finite sample sizes. Together, these
properties show that $p = d+1$ is an optimal choice, yielding a function
estimate $\hat{f}$ that is both smooth and non-degenerate, while remaining
maximally sensitive to $P$.
|
Without-Replacement Sampling for Stochastic Gradient Methods:
Convergence Results and Application to Distributed Optimization | Stochastic gradient methods for machine learning and optimization problems
are usually analyzed assuming data points are sampled \emph{with} replacement.
In practice, however, sampling \emph{without} replacement is very common,
easier to implement in many cases, and often performs better. In this paper, we
provide competitive convergence guarantees for without-replacement sampling,
under various scenarios, for three types of algorithms: Any algorithm with
online regret guarantees, stochastic gradient descent, and SVRG. A useful
application of our SVRG analysis is a nearly-optimal algorithm for regularized
least squares in a distributed setting, in terms of both communication
complexity and runtime complexity, when the data is randomly partitioned and
the condition number can be as large as the data size per machine (up to
logarithmic factors). Our proof techniques combine ideas from stochastic
optimization, adversarial online learning, and transductive learning theory,
and can potentially be applied to other stochastic optimization and learning
problems.
|
Distributed Estimation of Dynamic Parameters : Regret Analysis | This paper addresses the estimation of a time- varying parameter in a
network. A group of agents sequentially receive noisy signals about the
parameter (or moving target), which does not follow any particular dynamics.
The parameter is not observable to an individual agent, but it is globally
identifiable for the whole network. Viewing the problem with an online
optimization lens, we aim to provide the finite-time or non-asymptotic analysis
of the problem. To this end, we use a notion of dynamic regret which suits the
online, non-stationary nature of the problem. In our setting, dynamic regret
can be recognized as a finite-time counterpart of stability in the mean- square
sense. We develop a distributed, online algorithm for tracking the moving
target. Defining the path-length as the consecutive differences between target
locations, we express an upper bound on regret in terms of the path-length of
the target and network errors. We further show the consistency of the result
with static setting and noiseless observations.
|
PLATO: Policy Learning using Adaptive Trajectory Optimization | Policy search can in principle acquire complex strategies for control of
robots and other autonomous systems. When the policy is trained to process raw
sensory inputs, such as images and depth maps, it can also acquire a strategy
that combines perception and control. However, effectively processing such
complex inputs requires an expressive policy class, such as a large neural
network. These high-dimensional policies are difficult to train, especially
when learning to control safety-critical systems. We propose PLATO, an
algorithm that trains complex control policies with supervised learning, using
model-predictive control (MPC) to generate the supervision, hence never in need
of running a partially trained and potentially unsafe policy. PLATO uses an
adaptive training method to modify the behavior of MPC to gradually match the
learned policy in order to generate training samples at states that are likely
to be visited by the learned policy. PLATO also maintains the MPC cost as an
objective to avoid highly undesirable actions that would result from strictly
following the learned policy before it has been fully trained. We prove that
this type of adaptive MPC expert produces supervision that leads to good
long-horizon performance of the resulting policy. We also empirically
demonstrate that MPC can still avoid dangerous on-policy actions in unexpected
situations during training. Our empirical results on a set of challenging
simulated aerial vehicle tasks demonstrate that, compared to prior methods,
PLATO learns faster, experiences substantially fewer catastrophic failures
(crashes) during training, and often converges to a better policy.
|
Probabilistic Relational Model Benchmark Generation | The validation of any database mining methodology goes through an evaluation
process where benchmarks availability is essential. In this paper, we aim to
randomly generate relational database benchmarks that allow to check
probabilistic dependencies among the attributes. We are particularly interested
in Probabilistic Relational Models (PRMs), which extend Bayesian Networks (BNs)
to a relational data mining context and enable effective and robust reasoning
over relational data. Even though a panoply of works have focused, separately ,
on the generation of random Bayesian networks and relational databases, no work
has been identified for PRMs on that track. This paper provides an algorithmic
approach for generating random PRMs from scratch to fill this gap. The proposed
method allows to generate PRMs as well as synthetic relational data from a
randomly generated relational schema and a random set of probabilistic
dependencies. This can be of interest not only for machine learning researchers
to evaluate their proposals in a common framework, but also for databases
designers to evaluate the effectiveness of the components of a database
management system.
|
Continuous Deep Q-Learning with Model-based Acceleration | Model-free reinforcement learning has been successfully applied to a range of
challenging problems, and has recently been extended to handle large neural
network policies and value functions. However, the sample complexity of
model-free algorithms, particularly when using high-dimensional function
approximators, tends to limit their applicability to physical systems. In this
paper, we explore algorithms and representations to reduce the sample
complexity of deep reinforcement learning for continuous control tasks. We
propose two complementary techniques for improving the efficiency of such
algorithms. First, we derive a continuous variant of the Q-learning algorithm,
which we call normalized adantage functions (NAF), as an alternative to the
more commonly used policy gradient and actor-critic methods. NAF representation
allows us to apply Q-learning with experience replay to continuous tasks, and
substantially improves performance on a set of simulated robotic control tasks.
To further improve the efficiency of our approach, we explore the use of
learned models for accelerating model-free reinforcement learning. We show that
iteratively refitted local linear models are especially effective for this, and
demonstrate substantially faster learning on domains where such models are
applicable.
|
Equity forecast: Predicting long term stock price movement using machine
learning | Long term investment is one of the major investment strategies. However,
calculating intrinsic value of some company and evaluating shares for long term
investment is not easy, since analyst have to care about a large number of
financial indicators and evaluate them in a right manner. So far, little help
in predicting the direction of the company value over the longer period of time
has been provided from the machines. In this paper we present a machine
learning aided approach to evaluate the equity's future price over the long
time. Our method is able to correctly predict whether some company's value will
be 10% higher or not over the period of one year in 76.5% of cases.
|
Automatic Differentiation Variational Inference | Probabilistic modeling is iterative. A scientist posits a simple model, fits
it to her data, refines it according to her analysis, and repeats. However,
fitting complex models to large data is a bottleneck in this process. Deriving
algorithms for new models can be both mathematically and computationally
challenging, which makes it difficult to efficiently cycle through the steps.
To this end, we develop automatic differentiation variational inference (ADVI).
Using our method, the scientist only provides a probabilistic model and a
dataset, nothing else. ADVI automatically derives an efficient variational
inference algorithm, freeing the scientist to refine and explore many models.
ADVI supports a broad class of models-no conjugacy assumptions are required. We
study ADVI across ten different models and apply it to a dataset with millions
of observations. ADVI is integrated into Stan, a probabilistic programming
system; it is available for immediate use.
|
Character-based Neural Machine Translation | Neural Machine Translation (MT) has reached state-of-the-art results.
However, one of the main challenges that neural MT still faces is dealing with
very large vocabularies and morphologically rich languages. In this paper, we
propose a neural MT system using character-based embeddings in combination with
convolutional and highway layers to replace the standard lookup-based word
representations. The resulting unlimited-vocabulary and affix-aware source word
embeddings are tested in a state-of-the-art neural MT based on an
attention-based bidirectional recurrent neural network. The proposed MT scheme
provides improved results even when the source language is not morphologically
rich. Improvements up to 3 BLEU points are obtained in the German-English WMT
task.
|
Shallow and Deep Convolutional Networks for Saliency Prediction | The prediction of salient areas in images has been traditionally addressed
with hand-crafted features based on neuroscience principles. This paper,
however, addresses the problem with a completely data-driven approach by
training a convolutional neural network (convnet). The learning process is
formulated as a minimization of a loss function that measures the Euclidean
distance of the predicted saliency map with the provided ground truth. The
recent publication of large datasets of saliency prediction has provided enough
data to train end-to-end architectures that are both fast and accurate. Two
designs are proposed: a shallow convnet trained from scratch, and a another
deeper solution whose first three layers are adapted from another network
trained for classification. To the authors knowledge, these are the first
end-to-end CNNs trained and tested for the purpose of saliency prediction.
|
Molecular Graph Convolutions: Moving Beyond Fingerprints | Molecular "fingerprints" encoding structural information are the workhorse of
cheminformatics and machine learning in drug discovery applications. However,
fingerprint representations necessarily emphasize particular aspects of the
molecular structure while ignoring others, rather than allowing the model to
make data-driven decisions. We describe molecular "graph convolutions", a
machine learning architecture for learning from undirected graphs, specifically
small molecules. Graph convolutions use a simple encoding of the molecular
graph---atoms, bonds, distances, etc.---which allows the model to take greater
advantage of information in the graph structure. Although graph convolutions do
not outperform all fingerprint-based methods, they (along with other
graph-based methods) represent a new paradigm in ligand-based virtual screening
with exciting opportunities for future improvement.
|
Counter-fitting Word Vectors to Linguistic Constraints | In this work, we present a novel counter-fitting method which injects
antonymy and synonymy constraints into vector space representations in order to
improve the vectors' capability for judging semantic similarity. Applying this
method to publicly available pre-trained word vectors leads to a new state of
the art performance on the SimLex-999 dataset. We also show how the method can
be used to tailor the word vector space for the downstream task of dialogue
state tracking, resulting in robust improvements across different dialogue
domains.
|
Super Mario as a String: Platformer Level Generation Via LSTMs | The procedural generation of video game levels has existed for at least 30
years, but only recently have machine learning approaches been used to generate
levels without specifying the rules for generation. A number of these have
looked at platformer levels as a sequence of characters and performed
generation using Markov chains. In this paper we examine the use of Long
Short-Term Memory recurrent neural networks (LSTMs) for the purpose of
generating levels trained from a corpus of Super Mario Brothers levels. We
analyze a number of different data representations and how the generated levels
fit into the space of human authored Super Mario Brothers levels.
|
Training Input-Output Recurrent Neural Networks through Spectral Methods | We consider the problem of training input-output recurrent neural networks
(RNN) for sequence labeling tasks. We propose a novel spectral approach for
learning the network parameters. It is based on decomposition of the
cross-moment tensor between the output and a non-linear transformation of the
input, based on score functions. We guarantee consistent learning with
polynomial sample and computational complexity under transparent conditions
such as non-degeneracy of model parameters, polynomial activations for the
neurons, and a Markovian evolution of the input sequence. We also extend our
results to Bidirectional RNN which uses both previous and future information to
output the label at each time point, and is employed in many NLP tasks such as
POS tagging.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.