title
stringlengths 7
246
| abstract
stringlengths 6
3.31k
|
---|---|
Deep Portfolio Theory | We construct a deep portfolio theory. By building on Markowitz's classic
risk-return trade-off, we develop a self-contained four-step routine of encode,
calibrate, validate and verify to formulate an automated and general portfolio
selection process. At the heart of our algorithm are deep hierarchical
compositions of portfolios constructed in the encoding step. The calibration
step then provides multivariate payouts in the form of deep hierarchical
portfolios that are designed to target a variety of objective functions. The
validate step trades-off the amount of regularization used in the encode and
calibrate steps. The verification step uses a cross validation approach to
trace out an ex post deep portfolio efficient frontier. We demonstrate all four
steps of our portfolio theory numerically.
|
Adaptive ADMM with Spectral Penalty Parameter Selection | The alternating direction method of multipliers (ADMM) is a versatile tool
for solving a wide range of constrained optimization problems, with
differentiable or non-differentiable objective functions. Unfortunately, its
performance is highly sensitive to a penalty parameter, which makes ADMM often
unreliable and hard to automate for a non-expert user. We tackle this weakness
of ADMM by proposing a method to adaptively tune the penalty parameters to
achieve fast convergence. The resulting adaptive ADMM (AADMM) algorithm,
inspired by the successful Barzilai-Borwein spectral method for gradient
descent, yields fast convergence and relative insensitivity to the initial
stepsize and problem scaling.
|
Interaction Screening: Efficient and Sample-Optimal Learning of Ising
Models | We consider the problem of learning the underlying graph of an unknown Ising
model on p spins from a collection of i.i.d. samples generated from the model.
We suggest a new estimator that is computationally efficient and requires a
number of samples that is near-optimal with respect to previously established
information-theoretic lower-bound. Our statistical estimator has a physical
interpretation in terms of "interaction screening". The estimator is consistent
and is efficiently implemented using convex optimization. We prove that with
appropriate regularization, the estimator recovers the underlying graph using a
number of samples that is logarithmic in the system size p and exponential in
the maximum coupling-intensity and maximum node-degree.
|
Measuring Neural Net Robustness with Constraints | Despite having high accuracy, neural nets have been shown to be susceptible
to adversarial examples, where a small perturbation to an input can cause it to
become mislabeled. We propose metrics for measuring the robustness of a neural
net and devise a novel algorithm for approximating these metrics based on an
encoding of robustness as a linear program. We show how our metrics can be used
to evaluate the robustness of deep neural nets with experiments on the MNIST
and CIFAR-10 datasets. Our algorithm generates more informative estimates of
robustness metrics compared to estimates based on existing algorithms.
Furthermore, we show how existing approaches to improving robustness "overfit"
to adversarial examples generated using a specific algorithm. Finally, we show
that our techniques can be used to additionally improve neural net robustness
both according to the metrics that we propose, but also according to previously
proposed metrics.
|
Matrix Completion has No Spurious Local Minimum | Matrix completion is a basic machine learning problem that has wide
applications, especially in collaborative filtering and recommender systems.
Simple non-convex optimization algorithms are popular and effective in
practice. Despite recent progress in proving various non-convex algorithms
converge from a good initial point, it remains unclear why random or arbitrary
initialization suffices in practice. We prove that the commonly used non-convex
objective function for \textit{positive semidefinite} matrix completion has no
spurious local minima --- all local minima must also be global. Therefore, many
popular optimization algorithms such as (stochastic) gradient descent can
provably solve positive semidefinite matrix completion with \textit{arbitrary}
initialization in polynomial time. The result can be generalized to the setting
when the observed entries contain noise. We believe that our main proof
strategy can be useful for understanding geometric properties of other
statistical problems involving partial or noisy observations.
|
Transferability in Machine Learning: from Phenomena to Black-Box Attacks
using Adversarial Samples | Many machine learning models are vulnerable to adversarial examples: inputs
that are specially crafted to cause a machine learning model to produce an
incorrect output. Adversarial examples that affect one model often affect
another model, even if the two models have different architectures or were
trained on different training sets, so long as both models were trained to
perform the same task. An attacker may therefore train their own substitute
model, craft adversarial examples against the substitute, and transfer them to
a victim model, with very little information about the victim. Recent work has
further developed a technique that uses the victim model as an oracle to label
a synthetic training set for the substitute, so the attacker need not even
collect a training set to mount the attack. We extend these recent techniques
using reservoir sampling to greatly enhance the efficiency of the training
procedure for the substitute model. We introduce new transferability attacks
between previously unexplored (substitute, victim) pairs of machine learning
model classes, most notably SVMs and decision trees. We demonstrate our attacks
on two commercial machine learning classification systems from Amazon (96.19%
misclassification rate) and Google (88.94%) using only 800 queries of the
victim model, thereby showing that existing machine learning approaches are in
general vulnerable to systematic black-box attacks regardless of their
structure.
|
Near-optimal Bayesian Active Learning with Correlated and Noisy Tests | We consider the Bayesian active learning and experimental design problem,
where the goal is to learn the value of some unknown target variable through a
sequence of informative, noisy tests. In contrast to prior work, we focus on
the challenging, yet practically relevant setting where test outcomes can be
conditionally dependent given the hidden target variable. Under such
assumptions, common heuristics, such as greedily performing tests that maximize
the reduction in uncertainty of the target, often perform poorly. In this
paper, we propose ECED, a novel, computationally efficient active learning
algorithm, and prove strong theoretical guarantees that hold with correlated,
noisy tests. Rather than directly optimizing the prediction error, at each
step, ECED picks the test that maximizes the gain in a surrogate objective,
which takes into account the dependencies between tests. Our analysis relies on
an information-theoretic auxiliary function to track the progress of ECED, and
utilizes adaptive submodularity to attain the near-optimal bound. We
demonstrate strong empirical performance of ECED on two problem instances,
including a Bayesian experimental design task intended to distinguish among
economic theories of how people make risky decisions, and an active preference
learning task via pairwise comparisons.
|
Riemannian stochastic variance reduced gradient on Grassmann manifold | Stochastic variance reduction algorithms have recently become popular for
minimizing the average of a large, but finite, number of loss functions. In
this paper, we propose a novel Riemannian extension of the Euclidean stochastic
variance reduced gradient algorithm (R-SVRG) to a compact manifold search
space. To this end, we show the developments on the Grassmann manifold. The key
challenges of averaging, addition, and subtraction of multiple gradients are
addressed with notions like logarithm mapping and parallel translation of
vectors on the Grassmann manifold. We present a global convergence analysis of
the proposed algorithm with decay step-sizes and a local convergence rate
analysis under fixed step-size with some natural assumptions. The proposed
algorithm is applied on a number of problems on the Grassmann manifold like
principal components analysis, low-rank matrix completion, and the Karcher mean
computation. In all these cases, the proposed algorithm outperforms the
standard Riemannian stochastic gradient descent algorithm.
|
Refined Lower Bounds for Adversarial Bandits | We provide new lower bounds on the regret that must be suffered by
adversarial bandit algorithms. The new results show that recent upper bounds
that either (a) hold with high-probability or (b) depend on the total lossof
the best arm or (c) depend on the quadratic variation of the losses, are close
to tight. Besides this we prove two impossibility results. First, the existence
of a single arm that is optimal in every round cannot improve the regret in the
worst case. Second, the regret cannot scale with the effective range of the
losses. In contrast, both results are possible in the full-information setting.
|
Computing Web-scale Topic Models using an Asynchronous Parameter Server | Topic models such as Latent Dirichlet Allocation (LDA) have been widely used
in information retrieval for tasks ranging from smoothing and feedback methods
to tools for exploratory search and discovery. However, classical methods for
inferring topic models do not scale up to the massive size of today's publicly
available Web-scale data sets. The state-of-the-art approaches rely on custom
strategies, implementations and hardware to facilitate their asynchronous,
communication-intensive workloads.
We present APS-LDA, which integrates state-of-the-art topic modeling with
cluster computing frameworks such as Spark using a novel asynchronous parameter
server. Advantages of this integration include convenient usage of existing
data processing pipelines and eliminating the need for disk writes as data can
be kept in memory from start to finish. Our goal is not to outperform highly
customized implementations, but to propose a general high-performance topic
modeling framework that can easily be used in today's data processing
pipelines. We compare APS-LDA to the existing Spark LDA implementations and
show that our system can, on a 480-core cluster, process up to 135 times more
data and 10 times more topics without sacrificing model quality.
|
Hierarchical Memory Networks | Memory networks are neural networks with an explicit memory component that
can be both read and written to by the network. The memory is often addressed
in a soft way using a softmax function, making end-to-end training with
backpropagation possible. However, this is not computationally scalable for
applications which require the network to read from extremely large memories.
On the other hand, it is well known that hard attention mechanisms based on
reinforcement learning are challenging to train successfully. In this paper, we
explore a form of hierarchical memory network, which can be considered as a
hybrid between hard and soft attention memory networks. The memory is organized
in a hierarchical structure such that reading from it is done with less
computation than soft attention over a flat memory, while also being easier to
train than hard attention over a flat memory. Specifically, we propose to
incorporate Maximum Inner Product Search (MIPS) in the training and inference
procedures for our hierarchical memory network. We explore the use of various
state-of-the art approximate MIPS techniques and report results on
SimpleQuestions, a challenging large scale factoid question answering task.
|
Alternating Optimisation and Quadrature for Robust Control | Bayesian optimisation has been successfully applied to a variety of
reinforcement learning problems. However, the traditional approach for learning
optimal policies in simulators does not utilise the opportunity to improve
learning by adjusting certain environment variables: state features that are
unobservable and randomly determined by the environment in a physical setting
but are controllable in a simulator. This paper considers the problem of
finding a robust policy while taking into account the impact of environment
variables. We present Alternating Optimisation and Quadrature (ALOQ), which
uses Bayesian optimisation and Bayesian quadrature to address such settings.
ALOQ is robust to the presence of significant rare events, which may not be
observable under random sampling, but play a substantial role in determining
the optimal policy. Experimental results across different domains show that
ALOQ can learn more efficiently and robustly than existing methods.
|
Leveraging Over Priors for Boosting Control of Prosthetic Hands | The Electromyography (EMG) signal is the electrical activity produced by
cells of skeletal muscles in order to provide a movement. The non-invasive
prosthetic hand works with several electrodes, placed on the stump of an
amputee, that record this signal. In order to favour the control of prosthesis,
the EMG signal is analyzed with algorithms based on machine learning theory to
decide the movement that the subject is going to do. In order to obtain a
significant control of the prosthesis and avoid mismatch between desired and
performed movements, a long training period is needed when we use the
traditional algorithm of machine learning (i.e. Support Vector Machines). An
actual challenge in this field concerns the reduction of the time necessary for
an amputee to learn how to use the prosthesis. Recently, several algorithms
that exploit a form of prior knowledge have been proposed. In general, we refer
to prior knowledge as a past experience available in the form of models. In our
case an amputee, that attempts to perform some movements with the prosthesis,
could use experience from different subjects that are already able to perform
those movements. The aim of this work is to verify, with a computational
investigation, if for an amputee this kind of previous experience is useful in
order to reduce the training time and boost the prosthetic control.
Furthermore, we want to understand if and how the final results change when the
previous knowledge of intact or amputated subjects is used for a new amputee.
Our experiments indicate that: (1) the use of experience, from other subjects
already trained to perform a task, makes us able to reduce the training time of
about an order of magnitude; (2) it seems that an amputee that tries to learn
to use the prosthesis doesn't reach different results when he/she exploits
previous experience of amputees or intact.
|
Inductive supervised quantum learning | In supervised learning, an inductive learning algorithm extracts general
rules from observed training instances, then the rules are applied to test
instances. We show that this splitting of training and application arises
naturally, in the classical setting, from a simple independence requirement
with a physical interpretation of being non-signalling. Thus, two seemingly
different definitions of inductive learning happen to coincide. This follows
from the properties of classical information that break down in the quantum
setup. We prove a quantum de Finetti theorem for quantum channels, which shows
that in the quantum case, the equivalence holds in the asymptotic setting, that
is, for large number of test instances. This reveals a natural analogy between
classical learning protocols and their quantum counterparts, justifying a
similar treatment, and allowing to inquire about standard elements in
computational learning theory, such as structural risk minimization and sample
complexity.
|
Sequential Neural Models with Stochastic Layers | How can we efficiently propagate uncertainty in a latent state representation
with recurrent neural networks? This paper introduces stochastic recurrent
neural networks which glue a deterministic recurrent neural network and a state
space model together to form a stochastic and sequential neural generative
model. The clear separation of deterministic and stochastic layers allows a
structured variational inference network to track the factorization of the
model's posterior distribution. By retaining both the nonlinear recursive
structure of a recurrent neural network and averaging over the uncertainty in a
latent path, like a state space model, we improve the state of the art results
on the Blizzard and TIMIT speech modeling data sets by a large margin, while
achieving comparable performances to competing methods on polyphonic music
modeling.
|
Recursive Sampling for the Nystr\"om Method | We give the first algorithm for kernel Nystr\"om approximation that runs in
*linear time in the number of training points* and is provably accurate for all
kernel matrices, without dependence on regularity or incoherence conditions.
The algorithm projects the kernel onto a set of $s$ landmark points sampled by
their *ridge leverage scores*, requiring just $O(ns)$ kernel evaluations and
$O(ns^2)$ additional runtime. While leverage score sampling has long been known
to give strong theoretical guarantees for Nystr\"om approximation, by employing
a fast recursive sampling scheme, our algorithm is the first to make the
approach scalable. Empirically we show that it finds more accurate, lower rank
kernel approximations in less time than popular techniques such as uniformly
sampled Nystr\"om approximation and the random Fourier features method.
|
A Consistent Regularization Approach for Structured Prediction | We propose and analyze a regularization approach for structured prediction
problems. We characterize a large class of loss functions that allows to
naturally embed structured outputs in a linear space. We exploit this fact to
design learning algorithms using a surrogate loss approach and regularization
techniques. We prove universal consistency and finite sample bounds
characterizing the generalization properties of the proposed methods.
Experimental results are provided to demonstrate the practical usefulness of
the proposed approach.
|
Adaptive Newton Method for Empirical Risk Minimization to Statistical
Accuracy | We consider empirical risk minimization for large-scale datasets. We
introduce Ada Newton as an adaptive algorithm that uses Newton's method with
adaptive sample sizes. The main idea of Ada Newton is to increase the size of
the training set by a factor larger than one in a way that the minimization
variable for the current training set is in the local neighborhood of the
optimal argument of the next training set. This allows to exploit the quadratic
convergence property of Newton's method and reach the statistical accuracy of
each training set with only one iteration of Newton's method. We show
theoretically and empirically that Ada Newton can double the size of the
training set in each iteration to achieve the statistical accuracy of the full
training set with about two passes over the dataset.
|
On-line Active Reward Learning for Policy Optimisation in Spoken
Dialogue Systems | The ability to compute an accurate reward function is essential for
optimising a dialogue policy via reinforcement learning. In real-world
applications, using explicit user feedback as the reward signal is often
unreliable and costly to collect. This problem can be mitigated if the user's
intent is known in advance or data is available to pre-train a task success
predictor off-line. In practice neither of these apply for most real world
applications. Here we propose an on-line learning framework whereby the
dialogue policy is jointly trained alongside the reward model via active
learning with a Gaussian process model. This Gaussian process operates on a
continuous space dialogue representation generated in an unsupervised fashion
using a recurrent neural network encoder-decoder. The experimental results
demonstrate that the proposed framework is able to significantly reduce data
annotation costs and mitigate noisy user feedback in dialogue policy learning.
|
Communication-Efficient Distributed Statistical Inference | We present a Communication-efficient Surrogate Likelihood (CSL) framework for
solving distributed statistical inference problems. CSL provides a
communication-efficient surrogate to the global likelihood that can be used for
low-dimensional estimation, high-dimensional regularized estimation and
Bayesian inference. For low-dimensional estimation, CSL provably improves upon
naive averaging schemes and facilitates the construction of confidence
intervals. For high-dimensional regularized estimation, CSL leads to a
minimax-optimal estimator with controlled communication cost. For Bayesian
inference, CSL can be used to form a communication-efficient quasi-posterior
distribution that converges to the true posterior. This quasi-posterior
procedure significantly improves the computational efficiency of MCMC
algorithms even in a non-distributed setting. We present both theoretical
analysis and experiments to explore the properties of the CSL approximation.
|
Learning Purposeful Behaviour in the Absence of Rewards | Artificial intelligence is commonly defined as the ability to achieve goals
in the world. In the reinforcement learning framework, goals are encoded as
reward functions that guide agent behaviour, and the sum of observed rewards
provide a notion of progress. However, some domains have no such reward signal,
or have a reward signal so sparse as to appear absent. Without reward feedback,
agent behaviour is typically random, often dithering aimlessly and lacking
intentionality. In this paper we present an algorithm capable of learning
purposeful behaviour in the absence of rewards. The algorithm proceeds by
constructing temporally extended actions (options), through the identification
of purposes that are "just out of reach" of the agent's current behaviour.
These purposes establish intrinsic goals for the agent to learn, ultimately
resulting in a suite of behaviours that encourage the agent to visit different
parts of the state space. Moreover, the approach is particularly suited for
settings where rewards are very sparse, and such behaviours can help in the
exploration of the environment until reward is observed.
|
Deep Structured Energy Based Models for Anomaly Detection | In this paper, we attack the anomaly detection problem by directly modeling
the data distribution with deep architectures. We propose deep structured
energy based models (DSEBMs), where the energy function is the output of a
deterministic deep neural network with structure. We develop novel model
architectures to integrate EBMs with different types of data such as static
data, sequential data, and spatial data, and apply appropriate model
architectures to adapt to the data structure. Our training algorithm is built
upon the recent development of score matching \cite{sm}, which connects an EBM
with a regularized autoencoder, eliminating the need for complicated sampling
method. Statistically sound decision criterion can be derived for anomaly
detection purpose from the perspective of the energy landscape of the data
distribution. We investigate two decision criteria for performing anomaly
detection: the energy score and the reconstruction error. Extensive empirical
studies on benchmark tasks demonstrate that our proposed model consistently
matches or outperforms all the competing methods.
|
Reshaped Wirtinger Flow and Incremental Algorithm for Solving Quadratic
System of Equations | We study the phase retrieval problem, which solves quadratic system of
equations, i.e., recovers a vector $\boldsymbol{x}\in \mathbb{R}^n$ from its
magnitude measurements $y_i=|\langle \boldsymbol{a}_i, \boldsymbol{x}\rangle|,
i=1,..., m$. We develop a gradient-like algorithm (referred to as RWF
representing reshaped Wirtinger flow) by minimizing a nonconvex nonsmooth loss
function. In comparison with existing nonconvex Wirtinger flow (WF) algorithm
\cite{candes2015phase}, although the loss function becomes nonsmooth, it
involves only the second power of variable and hence reduces the complexity. We
show that for random Gaussian measurements, RWF enjoys geometric convergence to
a global optimal point as long as the number $m$ of measurements is on the
order of $n$, the dimension of the unknown $\boldsymbol{x}$. This improves the
sample complexity of WF, and achieves the same sample complexity as truncated
Wirtinger flow (TWF) \cite{chen2015solving}, but without truncation in gradient
loop. Furthermore, RWF costs less computationally than WF, and runs faster
numerically than both WF and TWF. We further develop the incremental
(stochastic) reshaped Wirtinger flow (IRWF) and show that IRWF converges
linearly to the true signal. We further establish performance guarantee of an
existing Kaczmarz method for the phase retrieval problem based on its
connection to IRWF. We also empirically demonstrate that IRWF outperforms
existing ITWF algorithm (stochastic version of TWF) as well as other batch
algorithms.
|
Data Programming: Creating Large Training Sets, Quickly | Large labeled training sets are the critical building blocks of supervised
learning methods and are key enablers of deep learning techniques. For some
applications, creating labeled training sets is the most time-consuming and
expensive part of applying machine learning. We therefore propose a paradigm
for the programmatic creation of training sets called data programming in which
users express weak supervision strategies or domain heuristics as labeling
functions, which are programs that label subsets of the data, but that are
noisy and may conflict. We show that by explicitly representing this training
set labeling process as a generative model, we can "denoise" the generated
training set, and establish theoretically that we can recover the parameters of
these generative models in a handful of settings. We then show how to modify a
discriminative loss function to make it noise-aware, and demonstrate our method
over a range of discriminative models including logistic regression and LSTMs.
Experimentally, on the 2014 TAC-KBP Slot Filling challenge, we show that data
programming would have led to a new winning score, and also show that applying
data programming to an LSTM model leads to a TAC-KBP score almost 6 F1 points
over a state-of-the-art LSTM baseline (and into second place in the
competition). Additionally, in initial user studies we observed that data
programming may be an easier way for non-experts to create machine learning
models when training data is limited or unavailable.
|
Adversarial Training Methods for Semi-Supervised Text Classification | Adversarial training provides a means of regularizing supervised learning
algorithms while virtual adversarial training is able to extend supervised
learning algorithms to the semi-supervised setting. However, both methods
require making small perturbations to numerous entries of the input vector,
which is inappropriate for sparse high-dimensional inputs such as one-hot word
representations. We extend adversarial and virtual adversarial training to the
text domain by applying perturbations to the word embeddings in a recurrent
neural network rather than to the original input itself. The proposed method
achieves state of the art results on multiple benchmark semi-supervised and
purely supervised tasks. We provide visualizations and analysis showing that
the learned word embeddings have improved in quality and that while training,
the model is less prone to overfitting. Code is available at
https://github.com/tensorflow/models/tree/master/research/adversarial_text.
|
Learning Multiagent Communication with Backpropagation | Many tasks in AI require the collaboration of multiple agents. Typically, the
communication protocol between agents is manually specified and not altered
during training. In this paper we explore a simple neural model, called
CommNet, that uses continuous communication for fully cooperative tasks. The
model consists of multiple agents and the communication between them is learned
alongside their policy. We apply this model to a diverse set of tasks,
demonstrating the ability of the agents to learn to communicate amongst
themselves, yielding improved performance over non-communicative agents and
baselines. In some cases, it is possible to interpret the language devised by
the agents, revealing simple but effective strategies for solving the task at
hand.
|
NESTT: A Nonconvex Primal-Dual Splitting Method for Distributed and
Stochastic Optimization | We study a stochastic and distributed algorithm for nonconvex problems whose
objective consists of a sum of $N$ nonconvex $L_i/N$-smooth functions, plus a
nonsmooth regularizer. The proposed NonconvEx primal-dual SpliTTing (NESTT)
algorithm splits the problem into $N$ subproblems, and utilizes an augmented
Lagrangian based primal-dual scheme to solve it in a distributed and stochastic
manner. With a special non-uniform sampling, a version of NESTT achieves
$\epsilon$-stationary solution using
$\mathcal{O}((\sum_{i=1}^N\sqrt{L_i/N})^2/\epsilon)$ gradient evaluations,
which can be up to $\mathcal{O}(N)$ times better than the (proximal) gradient
descent methods. It also achieves Q-linear convergence rate for nonconvex
$\ell_1$ penalized quadratic problems with polyhedral constraints. Further, we
reveal a fundamental connection between primal-dual based methods and a few
primal only methods such as IAG/SAG/SAGA.
|
Generalized Mirror Descents in Congestion Games | Different types of dynamics have been studied in repeated game play, and one
of them which has received much attention recently consists of those based on
"no-regret" algorithms from the area of machine learning. It is known that
dynamics based on generic no-regret algorithms may not converge to Nash
equilibria in general, but to a larger set of outcomes, namely coarse
correlated equilibria. Moreover, convergence results based on generic no-regret
algorithms typically use a weaker notion of convergence: the convergence of the
average plays instead of the actual plays. Some work has been done showing that
when using a specific no-regret algorithm, the well-known multiplicative
updates algorithm, convergence of actual plays to equilibria can be shown and
better quality of outcomes in terms of the price of anarchy can be reached for
atomic congestion games and load balancing games. Are there more cases of
natural no-regret dynamics that perform well in suitable classes of games in
terms of convergence and quality of outcomes that the dynamics converge to?
We answer this question positively in the bulletin-board model by showing
that when employing the mirror-descent algorithm, a well-known generic
no-regret algorithm, the actual plays converge quickly to equilibria in
nonatomic congestion games. Furthermore, the bandit model considers a probably
more realistic and prevalent setting with only partial information, in which at
each time step each player only knows the cost of her own currently played
strategy, but not any costs of unplayed strategies. For the class of atomic
congestion games, we propose a family of bandit algorithms based on the
mirror-descent algorithms previously presented, and show that when each player
individually adopts such a bandit algorithm, their joint (mixed) strategy
profile quickly converges with implications.
|
Neural Universal Discrete Denoiser | We present a new framework of applying deep neural networks (DNN) to devise a
universal discrete denoiser. Unlike other approaches that utilize supervised
learning for denoising, we do not require any additional training data. In such
setting, while the ground-truth label, i.e., the clean data, is not available,
we devise "pseudo-labels" and a novel objective function such that DNN can be
trained in a same way as supervised learning to become a discrete denoiser. We
experimentally show that our resulting algorithm, dubbed as Neural DUDE,
significantly outperforms the previous state-of-the-art in several applications
with a systematic rule of choosing the hyperparameter, which is an attractive
feature in practice.
|
Fast Algorithms for Robust PCA via Gradient Descent | We consider the problem of Robust PCA in the fully and partially observed
settings. Without corruptions, this is the well-known matrix completion
problem. From a statistical standpoint this problem has been recently
well-studied, and conditions on when recovery is possible (how many
observations do we need, how many corruptions can we tolerate) via
polynomial-time algorithms is by now understood. This paper presents and
analyzes a non-convex optimization approach that greatly reduces the
computational complexity of the above problems, compared to the best available
algorithms. In particular, in the fully observed case, with $r$ denoting rank
and $d$ dimension, we reduce the complexity from
$\mathcal{O}(r^2d^2\log(1/\varepsilon))$ to
$\mathcal{O}(rd^2\log(1/\varepsilon))$ -- a big savings when the rank is big.
For the partially observed case, we show the complexity of our algorithm is no
more than $\mathcal{O}(r^4d \log d \log(1/\varepsilon))$. Not only is this the
best-known run-time for a provable algorithm under partial observation, but in
the setting where $r$ is small compared to $d$, it also allows for
near-linear-in-$d$ run-time that can be exploited in the fully-observed case as
well, by simply running our algorithm on a subset of the observations.
|
Geometry-aware stationary subspace analysis | In many real-world applications data exhibits non-stationarity, i.e., its
distribution changes over time. One approach to handling non-stationarity is to
remove or minimize it before attempting to analyze the data. In the context of
brain computer interface (BCI) data analysis this may be done by means of
stationary subspace analysis (SSA). The classic SSA method finds a matrix that
projects the data onto a stationary subspace by optimizing a cost function
based on a matrix divergence. In this work we present an alternative method for
SSA based on a symmetrized version of this matrix divergence. We show that this
frames the problem in terms of distances between symmetric positive definite
(SPD) matrices, suggesting a geometric interpretation of the problem. Stemming
from this geometric viewpoint, we introduce and analyze a method which utilizes
the geometry of the SPD matrix manifold and the invariance properties of its
metrics. Most notably we show that these invariances alleviate the need to
whiten the input matrices, a common step in many SSA methods which often
introduces errors. We demonstrate the usefulness of our technique in
experiments on both synthesized and real-world data.
|
Learning Moore Machines from Input-Output Traces | The problem of learning automata from example traces (but no equivalence or
membership queries) is fundamental in automata learning theory and practice. In
this paper we study this problem for finite state machines with inputs and
outputs, and in particular for Moore machines. We develop three algorithms for
solving this problem: (1) the PTAP algorithm, which transforms a set of
input-output traces into an incomplete Moore machine and then completes the
machine with self-loops; (2) the PRPNI algorithm, which uses the well-known
RPNI algorithm for automata learning to learn a product of automata encoding a
Moore machine; and (3) the MooreMI algorithm, which directly learns a Moore
machine using PTAP extended with state merging. We prove that MooreMI has the
fundamental identification in the limit property. We also compare the
algorithms experimentally in terms of the size of the learned machine and
several notions of accuracy, introduced in this paper. Finally, we compare with
OSTIA, an algorithm that learns a more general class of transducers, and find
that OSTIA generally does not learn a Moore machine, even when fed with a
characteristic sample.
|
Action Classification via Concepts and Attributes | Classes in natural images tend to follow long tail distributions. This is
problematic when there are insufficient training examples for rare classes.
This effect is emphasized in compound classes, involving the conjunction of
several concepts, such as those appearing in action-recognition datasets. In
this paper, we propose to address this issue by learning how to utilize common
visual concepts which are readily available. We detect the presence of
prominent concepts in images and use them to infer the target labels instead of
using visual features directly, combining tools from vision and
natural-language processing. We validate our method on the recently introduced
HICO dataset reaching a mAP of 31.54\% and on the Stanford-40 Actions dataset,
where the proposed method outperforms that obtained by direct visual features,
obtaining an accuracy 83.12\%. Moreover, the method provides for each class a
semantically meaningful list of keywords and relevant image regions relating it
to its constituent concepts.
|
Effective Blind Source Separation Based on the Adam Algorithm | In this paper, we derive a modified InfoMax algorithm for the solution of
Blind Signal Separation (BSS) problems by using advanced stochastic methods.
The proposed approach is based on a novel stochastic optimization approach
known as the Adaptive Moment Estimation (Adam) algorithm. The proposed BSS
solution can benefit from the excellent properties of the Adam approach. In
order to derive the new learning rule, the Adam algorithm is introduced in the
derivation of the cost function maximization in the standard InfoMax algorithm.
The natural gradient adaptation is also considered. Finally, some experimental
results show the effectiveness of the proposed approach.
|
Review Networks for Caption Generation | We propose a novel extension of the encoder-decoder framework, called a
review network. The review network is generic and can enhance any existing
encoder- decoder model: in this paper, we consider RNN decoders with both CNN
and RNN encoders. The review network performs a number of review steps with
attention mechanism on the encoder hidden states, and outputs a thought vector
after each review step; the thought vectors are used as the input of the
attention mechanism in the decoder. We show that conventional encoder-decoders
are a special case of our framework. Empirically, we show that our framework
improves over state-of- the-art encoder-decoder systems on the tasks of image
captioning and source code captioning.
|
On Fast Convergence of Proximal Algorithms for SQRT-Lasso Optimization:
Don't Worry About Its Nonsmooth Loss Function | Many machine learning techniques sacrifice convenient computational
structures to gain estimation robustness and modeling flexibility. However, by
exploring the modeling structures, we find these "sacrifices" do not always
require more computational efforts. To shed light on such a "free-lunch"
phenomenon, we study the square-root-Lasso (SQRT-Lasso) type regression
problem. Specifically, we show that the nonsmooth loss functions of SQRT-Lasso
type regression ease tuning effort and gain adaptivity to inhomogeneous noise,
but is not necessarily more challenging than Lasso in computation. We can
directly apply proximal algorithms (e.g. proximal gradient descent, proximal
Newton, and proximal Quasi-Newton algorithms) without worrying the
nonsmoothness of the loss function. Theoretically, we prove that the proximal
algorithms combined with the pathwise optimization scheme enjoy fast
convergence guarantees with high probability. Numerical results are provided to
support our theory.
|
Adaptive Neural Compilation | This paper proposes an adaptive neural-compilation framework to address the
problem of efficient program learning. Traditional code optimisation strategies
used in compilers are based on applying pre-specified set of transformations
that make the code faster to execute without changing its semantics. In
contrast, our work involves adapting programs to make them more efficient while
considering correctness only on a target input distribution. Our approach is
inspired by the recent works on differentiable representations of programs. We
show that it is possible to compile programs written in a low-level language to
a differentiable representation. We also show how programs in this
representation can be optimised to make them efficient on a target distribution
of inputs. Experimental results demonstrate that our approach enables learning
specifically-tuned algorithms for given data distributions with a high success
rate.
|
Efficient Distributed Learning with Sparsity | We propose a novel, efficient approach for distributed sparse learning in
high-dimensions, where observations are randomly partitioned across machines.
Computationally, at each round our method only requires the master machine to
solve a shifted ell_1 regularized M-estimation problem, and other workers to
compute the gradient. In respect of communication, the proposed approach
provably matches the estimation error bound of centralized methods within
constant rounds of communications (ignoring logarithmic factors). We conduct
extensive experiments on both simulated and real world datasets, and
demonstrate encouraging performances on high-dimensional regression and
classification tasks.
|
Toward a general, scaleable framework for Bayesian teaching with
applications to topic models | Machines, not humans, are the world's dominant knowledge accumulators but
humans remain the dominant decision makers. Interpreting and disseminating the
knowledge accumulated by machines requires expertise, time, and is prone to
failure. The problem of how best to convey accumulated knowledge from computers
to humans is a critical bottleneck in the broader application of machine
learning. We propose an approach based on human teaching where the problem is
formalized as selecting a small subset of the data that will, with high
probability, lead the human user to the correct inference. This approach,
though successful for modeling human learning in simple laboratory experiments,
has failed to achieve broader relevance due to challenges in formulating
general and scalable algorithms. We propose general-purpose teaching via
pseudo-marginal sampling and demonstrate the algorithm by teaching topic
models. Simulation results show our sampling-based approach: effectively
approximates the probability where ground-truth is possible via enumeration,
results in data that are markedly different from those expected by random
sampling, and speeds learning especially for small amounts of data. Application
to movie synopsis data illustrates differences between teaching and random
sampling for teaching distributions and specific topics, and demonstrates gains
in scalability and applicability to real-world problems.
|
Tight Complexity Bounds for Optimizing Composite Objectives | We provide tight upper and lower bounds on the complexity of minimizing the
average of $m$ convex functions using gradient and prox oracles of the
component functions. We show a significant gap between the complexity of
deterministic vs randomized optimization. For smooth functions, we show that
accelerated gradient descent (AGD) and an accelerated variant of SVRG are
optimal in the deterministic and randomized settings respectively, and that a
gradient oracle is sufficient for the optimal rate. For non-smooth functions,
having access to prox oracles reduces the complexity and we present optimal
methods based on smoothing that improve over methods using just gradient
accesses.
|
A PAC RL Algorithm for Episodic POMDPs | Many interesting real world domains involve reinforcement learning (RL) in
partially observable environments. Efficient learning in such domains is
important, but existing sample complexity bounds for partially observable RL
are at least exponential in the episode length. We give, to our knowledge, the
first partially observable RL algorithm with a polynomial bound on the number
of episodes on which the algorithm may not achieve near-optimal performance.
Our algorithm is suitable for an important class of episodic POMDPs. Our
approach builds on recent advances in method of moments for latent variable
model estimation.
|
Deep Predictive Coding Networks for Video Prediction and Unsupervised
Learning | While great strides have been made in using deep learning algorithms to solve
supervised learning tasks, the problem of unsupervised learning - leveraging
unlabeled examples to learn about the structure of a domain - remains a
difficult unsolved challenge. Here, we explore prediction of future frames in a
video sequence as an unsupervised learning rule for learning about the
structure of the visual world. We describe a predictive neural network
("PredNet") architecture that is inspired by the concept of "predictive coding"
from the neuroscience literature. These networks learn to predict future frames
in a video sequence, with each layer in the network making local predictions
and only forwarding deviations from those predictions to subsequent network
layers. We show that these networks are able to robustly learn to predict the
movement of synthetic (rendered) objects, and that in doing so, the networks
learn internal representations that are useful for decoding latent object
parameters (e.g. pose) that support object recognition with fewer training
views. We also show that these networks can scale to complex natural image
streams (car-mounted camera videos), capturing key aspects of both egocentric
movement and the movement of objects in the visual scene, and the
representation learned in this setting is useful for estimating the steering
angle. Altogether, these results suggest that prediction represents a powerful
framework for unsupervised learning, allowing for implicit learning of object
and scene structure.
|
FLAG n' FLARE: Fast Linearly-Coupled Adaptive Gradient Methods | We consider first order gradient methods for effectively optimizing a
composite objective in the form of a sum of smooth and, potentially, non-smooth
functions. We present accelerated and adaptive gradient methods, called FLAG
and FLARE, which can offer the best of both worlds. They can achieve the
optimal convergence rate by attaining the optimal first-order oracle complexity
for smooth convex optimization. Additionally, they can adaptively and
non-uniformly re-scale the gradient direction to adapt to the limited curvature
available and conform to the geometry of the domain. We show theoretically and
empirically that, through the compounding effects of acceleration and
adaptivity, FLAG and FLARE can be highly effective for many data fitting and
machine learning applications.
|
Video Summarization with Long Short-term Memory | We propose a novel supervised learning technique for summarizing videos by
automatically selecting keyframes or key subshots. Casting the problem as a
structured prediction problem on sequential data, our main idea is to use Long
Short-Term Memory (LSTM), a special type of recurrent neural networks to model
the variable-range dependencies entailed in the task of video summarization.
Our learning models attain the state-of-the-art results on two benchmark video
datasets. Detailed analysis justifies the design of the models. In particular,
we show that it is crucial to take into consideration the sequential structures
in videos and model them. Besides advances in modeling techniques, we introduce
techniques to address the need of a large number of annotated data for training
complex learning models. There, our main idea is to exploit the existence of
auxiliary annotated video datasets, albeit heterogeneous in visual styles and
contents. Specifically, we show domain adaptation techniques can improve
summarization by reducing the discrepancies in statistical properties across
those datasets.
|
Highly-Smooth Zero-th Order Online Optimization Vianney Perchet | The minimization of convex functions which are only available through partial
and noisy information is a key methodological problem in many disciplines. In
this paper we consider convex optimization with noisy zero-th order
information, that is noisy function evaluations at any desired point. We focus
on problems with high degrees of smoothness, such as logistic regression. We
show that as opposed to gradient-based algorithms, high-order smoothness may be
used to improve estimation rates, with a precise dependence of our upper-bounds
on the degree of smoothness. In particular, we show that for infinitely
differentiable functions, we recover the same dependence on sample size as
gradient-based algorithms, with an extra dimension-dependent factor. This is
done for both convex and strongly-convex functions, with finite horizon and
anytime algorithms. Finally, we also recover similar results in the online
optimization setting.
|
Adiabatic Persistent Contrastive Divergence Learning | This paper studies the problem of parameter learning in probabilistic
graphical models having latent variables, where the standard approach is the
expectation maximization algorithm alternating expectation (E) and maximization
(M) steps. However, both E and M steps are computationally intractable for high
dimensional data, while the substitution of one step to a faster surrogate for
combating against intractability can often cause failure in convergence. We
propose a new learning algorithm which is computationally efficient and
provably ensures convergence to a correct optimum. Its key idea is to run only
a few cycles of Markov Chains (MC) in both E and M steps. Such an idea of
running incomplete MC has been well studied only for M step in the literature,
called Contrastive Divergence (CD) learning. While such known CD-based schemes
find approximated gradients of the log-likelihood via the mean-field approach
in E step, our proposed algorithm does exact ones via MC algorithms in both
steps due to the multi-time-scale stochastic approximation theory. Despite its
theoretical guarantee in convergence, the proposed scheme might suffer from the
slow mixing of MC in E step. To tackle it, we also propose a hybrid approach
applying both mean-field and MC approximation in E step, where the hybrid
approach outperforms the bare mean-field CD scheme in our experiments on
real-world datasets.
|
Learning Multivariate Log-concave Distributions | We study the problem of estimating multivariate log-concave probability
density functions. We prove the first sample complexity upper bound for
learning log-concave densities on $\mathbb{R}^d$, for all $d \geq 1$. Prior to
our work, no upper bound on the sample complexity of this learning problem was
known for the case of $d>3$. In more detail, we give an estimator that, for any
$d \ge 1$ and $\epsilon>0$, draws $\tilde{O}_d \left( (1/\epsilon)^{(d+5)/2}
\right)$ samples from an unknown target log-concave density on $\mathbb{R}^d$,
and outputs a hypothesis that (with high probability) is $\epsilon$-close to
the target, in total variation distance. Our upper bound on the sample
complexity comes close to the known lower bound of $\Omega_d \left(
(1/\epsilon)^{(d+1)/2} \right)$ for this problem.
|
Stochastic Variance Reduced Riemannian Eigensolver | We study the stochastic Riemannian gradient algorithm for matrix
eigen-decomposition. The state-of-the-art stochastic Riemannian algorithm
requires the learning rate to decay to zero and thus suffers from slow
convergence and sub-optimal solutions. In this paper, we address this issue by
deploying the variance reduction (VR) technique of stochastic gradient descent
(SGD). The technique was originally developed to solve convex problems in the
Euclidean space. We generalize it to Riemannian manifolds and realize it to
solve the non-convex eigen-decomposition problem. We are the first to propose
and analyze the generalization of SVRG to Riemannian manifolds. Specifically,
we propose the general variance reduction form, SVRRG, in the framework of the
stochastic Riemannian gradient optimization. It's then specialized to the
problem with eigensolvers and induces the SVRRG-EIGS algorithm. We provide a
novel and elegant theoretical analysis on this algorithm. The theory shows that
a fixed learning rate can be used in the Riemannian setting with an exponential
global convergence rate guaranteed. The theoretical results make a significant
improvement over existing studies, with the effectiveness empirically verified.
|
Neighborhood Sensitive Mapping for Zero-Shot Classification using
Independently Learned Semantic Embeddings | In a traditional setting, classifiers are trained to approximate a target
function $f:X \rightarrow Y$ where at least a sample for each $y \in Y$ is
presented to the training algorithm. In a zero-shot setting we have a subset of
the labels $\hat{Y} \subset Y$ for which we do not observe any corresponding
training instance. Still, the function $f$ that we train must be able to
correctly assign labels also on $\hat{Y}$. In practice, zero-shot problems are
very important especially when the label set is large and the cost of
editorially label samples for all possible values in the label set might be
prohibitively high. Most recent approaches to zero-shot learning are based on
finding and exploiting relationships between labels using semantic embeddings.
We show in this paper that semantic embeddings, despite being very good at
capturing relationships between labels, are not very good at capturing the
relationships among labels in a data-dependent manner. For this reason, we
propose a novel two-step process for learning a zero-shot classifier. In the
first step, we learn what we call a \emph{property embedding space} capturing
the "\emph{learnable}" features of the label set. Then, we exploit the learned
properties in order to reduce the generalization error for a linear nearest
neighbor-based classifier.
|
cvpaper.challenge in 2015 - A review of CVPR2015 and DeepSurvey | The "cvpaper.challenge" is a group composed of members from AIST, Tokyo Denki
Univ. (TDU), and Univ. of Tsukuba that aims to systematically summarize papers
on computer vision, pattern recognition, and related fields. For this
particular review, we focused on reading the ALL 602 conference papers
presented at the CVPR2015, the premier annual computer vision event held in
June 2015, in order to grasp the trends in the field. Further, we are proposing
"DeepSurvey" as a mechanism embodying the entire process from the reading
through all the papers, the generation of ideas, and to the writing of paper.
|
Robust Large Margin Deep Neural Networks | The generalization error of deep neural networks via their classification
margin is studied in this work. Our approach is based on the Jacobian matrix of
a deep neural network and can be applied to networks with arbitrary
non-linearities and pooling layers, and to networks with different
architectures such as feed forward networks and residual networks. Our analysis
leads to the conclusion that a bounded spectral norm of the network's Jacobian
matrix in the neighbourhood of the training samples is crucial for a deep
neural network of arbitrary depth and width to generalize well. This is a
significant improvement over the current bounds in the literature, which imply
that the generalization error grows with either the width or the depth of the
network. Moreover, it shows that the recently proposed batch normalization and
weight normalization re-parametrizations enjoy good generalization properties,
and leads to a novel network regularizer based on the network's Jacobian
matrix. The analysis is supported with experimental results on the MNIST,
CIFAR-10, LaRED and ImageNet datasets.
|
Low-rank tensor completion: a Riemannian manifold preconditioning
approach | We propose a novel Riemannian manifold preconditioning approach for the
tensor completion problem with rank constraint. A novel Riemannian metric or
inner product is proposed that exploits the least-squares structure of the cost
function and takes into account the structured symmetry that exists in Tucker
decomposition. The specific metric allows to use the versatile framework of
Riemannian optimization on quotient manifolds to develop preconditioned
nonlinear conjugate gradient and stochastic gradient descent algorithms for
batch and online setups, respectively. Concrete matrix representations of
various optimization-related ingredients are listed. Numerical comparisons
suggest that our proposed algorithms robustly outperform state-of-the-art
algorithms across different synthetic and real-world datasets.
|
Discrete Deep Feature Extraction: A Theory and New Architectures | First steps towards a mathematical theory of deep convolutional neural
networks for feature extraction were made---for the continuous-time case---in
Mallat, 2012, and Wiatowski and B\"olcskei, 2015. This paper considers the
discrete case, introduces new convolutional neural network architectures, and
proposes a mathematical framework for their analysis. Specifically, we
establish deformation and translation sensitivity results of local and global
nature, and we investigate how certain structural properties of the input
signal are reflected in the corresponding feature vectors. Our theory applies
to general filters and general Lipschitz-continuous non-linearities and pooling
operators. Experiments on handwritten digit classification and facial landmark
detection---including feature importance evaluation---complement the
theoretical findings.
|
Theano-MPI: a Theano-based Distributed Training Framework | We develop a scalable and extendable training framework that can utilize GPUs
across nodes in a cluster and accelerate the training of deep learning models
based on data parallelism. Both synchronous and asynchronous training are
implemented in our framework, where parameter exchange among GPUs is based on
CUDA-aware MPI. In this report, we analyze the convergence and capability of
the framework to reduce training time when scaling the synchronous training of
AlexNet and GoogLeNet from 2 GPUs to 8 GPUs. In addition, we explore novel ways
to reduce the communication overhead caused by exchanging parameters. Finally,
we release the framework as open-source for further research on distributed
deep learning
|
No bad local minima: Data independent training error guarantees for
multilayer neural networks | We use smoothed analysis techniques to provide guarantees on the training
loss of Multilayer Neural Networks (MNNs) at differentiable local minima.
Specifically, we examine MNNs with piecewise linear activation functions,
quadratic loss and a single output, under mild over-parametrization. We prove
that for a MNN with one hidden layer, the training error is zero at every
differentiable local minimum, for almost every dataset and dropout-like noise
realization. We then extend these results to the case of more than one hidden
layer. Our theoretical guarantees assume essentially nothing on the training
data, and are verified numerically. These results suggest why the highly
non-convex loss of such MNNs can be easily optimized using local updates (e.g.,
stochastic gradient descent), as observed empirically.
|
Provable Efficient Online Matrix Completion via Non-convex Stochastic
Gradient Descent | Matrix completion, where we wish to recover a low rank matrix by observing a
few entries from it, is a widely studied problem in both theory and practice
with wide applications. Most of the provable algorithms so far on this problem
have been restricted to the offline setting where they provide an estimate of
the unknown matrix using all observations simultaneously. However, in many
applications, the online version, where we observe one entry at a time and
dynamically update our estimate, is more appealing. While existing algorithms
are efficient for the offline setting, they could be highly inefficient for the
online setting.
In this paper, we propose the first provable, efficient online algorithm for
matrix completion. Our algorithm starts from an initial estimate of the matrix
and then performs non-convex stochastic gradient descent (SGD). After every
observation, it performs a fast update involving only one row of two tall
matrices, giving near linear total runtime. Our algorithm can be naturally used
in the offline setting as well, where it gives competitive sample complexity
and runtime to state of the art algorithms. Our proofs introduce a general
framework to show that SGD updates tend to stay away from saddle surfaces and
could be of broader interests for other non-convex problems to prove tight
rates.
|
Kronecker Determinantal Point Processes | Determinantal Point Processes (DPPs) are probabilistic models over all
subsets a ground set of $N$ items. They have recently gained prominence in
several applications that rely on "diverse" subsets. However, their
applicability to large problems is still limited due to the $\mathcal O(N^3)$
complexity of core tasks such as sampling and learning. We enable efficient
sampling and learning for DPPs by introducing KronDPP, a DPP model whose kernel
matrix decomposes as a tensor product of multiple smaller kernel matrices. This
decomposition immediately enables fast exact sampling. But contrary to what one
may expect, leveraging the Kronecker product structure for speeding up DPP
learning turns out to be more difficult. We overcome this challenge, and derive
batch and stochastic optimization algorithms for efficiently learning the
parameters of a KronDPP.
|
Generalization Properties and Implicit Regularization for Multiple
Passes SGM | We study the generalization properties of stochastic gradient methods for
learning with convex loss functions and linearly parameterized functions. We
show that, in the absence of penalizations or constraints, the stability and
approximation properties of the algorithm can be controlled by tuning either
the step-size or the number of passes over the data. In this view, these
parameters can be seen to control a form of implicit regularization. Numerical
results complement the theoretical findings.
|
Suppressing Background Radiation Using Poisson Principal Component
Analysis | Performance of nuclear threat detection systems based on gamma-ray
spectrometry often strongly depends on the ability to identify the part of
measured signal that can be attributed to background radiation. We have
successfully applied a method based on Principal Component Analysis (PCA) to
obtain a compact null-space model of background spectra using PCA projection
residuals to derive a source detection score. We have shown the method's
utility in a threat detection system using mobile spectrometers in urban scenes
(Tandon et al 2012). While it is commonly assumed that measured photon counts
follow a Poisson process, standard PCA makes a Gaussian assumption about the
data distribution, which may be a poor approximation when photon counts are
low. This paper studies whether and in what conditions PCA with a Poisson-based
loss function (Poisson PCA) can outperform standard Gaussian PCA in modeling
background radiation to enable more sensitive and specific nuclear threat
detection.
|
Model-Free Imitation Learning with Policy Optimization | In imitation learning, an agent learns how to behave in an environment with
an unknown cost function by mimicking expert demonstrations. Existing imitation
learning algorithms typically involve solving a sequence of planning or
reinforcement learning problems. Such algorithms are therefore not directly
applicable to large, high-dimensional environments, and their performance can
significantly degrade if the planning problems are not solved to optimality.
Under the apprenticeship learning formalism, we develop alternative model-free
algorithms for finding a parameterized stochastic policy that performs at least
as well as an expert policy on an unknown cost function, based on sample
trajectories from the expert. Our approach, based on policy gradients, scales
to large continuous environments with guaranteed convergence to local minima.
|
Open Problem: Best Arm Identification: Almost Instance-Wise Optimality
and the Gap Entropy Conjecture | The best arm identification problem (BEST-1-ARM) is the most basic pure
exploration problem in stochastic multi-armed bandits. The problem has a long
history and attracted significant attention for the last decade. However, we do
not yet have a complete understanding of the optimal sample complexity of the
problem: The state-of-the-art algorithms achieve a sample complexity of
$O(\sum_{i=2}^{n} \Delta_{i}^{-2}(\ln\delta^{-1} + \ln\ln\Delta_i^{-1}))$
($\Delta_{i}$ is the difference between the largest mean and the $i^{th}$
mean), while the best known lower bound is $\Omega(\sum_{i=2}^{n}
\Delta_{i}^{-2}\ln\delta^{-1})$ for general instances and $\Omega(\Delta^{-2}
\ln\ln \Delta^{-1})$ for the two-arm instances. We propose to study the
instance-wise optimality for the BEST-1-ARM problem. Previous work has proved
that it is impossible to have an instance optimal algorithm for the 2-arm
problem. However, we conjecture that modulo the additive term
$\Omega(\Delta_2^{-2} \ln\ln \Delta_2^{-1})$ (which is an upper bound and worst
case lower bound for the 2-arm problem), there is an instance optimal algorithm
for BEST-1-ARM. Moreover, we introduce a new quantity, called the gap entropy
for a best-arm problem instance, and conjecture that it is the instance-wise
lower bound. Hence, resolving this conjecture would provide a final answer to
the old and basic problem.
|
Provable Algorithms for Inference in Topic Models | Recently, there has been considerable progress on designing algorithms with
provable guarantees -- typically using linear algebraic methods -- for
parameter learning in latent variable models. But designing provable algorithms
for inference has proven to be more challenging. Here we take a first step
towards provable inference in topic models. We leverage a property of topic
models that enables us to construct simple linear estimators for the unknown
topic proportions that have small variance, and consequently can work with
short documents. Our estimators also correspond to finding an estimate around
which the posterior is well-concentrated. We show lower bounds that for shorter
documents it can be information theoretically impossible to find the hidden
topics. Finally, we give empirical results that demonstrate that our algorithm
works on realistic topic models. It yields good solutions on synthetic data and
runs in time comparable to a {\em single} iteration of Gibbs sampling.
|
Universum Learning for SVM Regression | This paper extends the idea of Universum learning [18, 19] to regression
problems. We propose new Universum-SVM formulation for regression problems that
incorporates a priori knowledge in the form of additional data samples. These
additional data samples or Universum belong to the same application domain as
the training samples, but they follow a different distribution. Several
empirical comparisons are presented to illustrate the utility of the proposed
approach.
|
Local Region Sparse Learning for Image-on-Scalar Regression | Identification of regions of interest (ROI) associated with certain disease
has a great impact on public health. Imposing sparsity of pixel values and
extracting active regions simultaneously greatly complicate the image analysis.
We address these challenges by introducing a novel region-selection penalty in
the framework of image-on-scalar regression. Our penalty combines the Smoothly
Clipped Absolute Deviation (SCAD) regularization, enforcing sparsity, and the
SCAD of total variation (TV) regularization, enforcing spatial contiguity, into
one group, which segments contiguous spatial regions against zero-valued
background. Efficient algorithm is based on the alternative direction method of
multipliers (ADMM) which decomposes the non-convex problem into two iterative
optimization problems with explicit solutions. Another virtue of the proposed
method is that a divide and conquer learning algorithm is developed, thereby
allowing scaling to large images. Several examples are presented and the
experimental results are compared with other state-of-the-art approaches.
|
SNN: Stacked Neural Networks | It has been proven that transfer learning provides an easy way to achieve
state-of-the-art accuracies on several vision tasks by training a simple
classifier on top of features obtained from pre-trained neural networks. The
goal of this work is to generate better features for transfer learning from
multiple publicly available pre-trained neural networks. To this end, we
propose a novel architecture called Stacked Neural Networks which leverages the
fast training time of transfer learning while simultaneously being much more
accurate. We show that using a stacked NN architecture can result in up to 8%
improvements in accuracy over state-of-the-art techniques using only one
pre-trained network for transfer learning. A second aim of this work is to make
network fine- tuning retain the generalizability of the base network to unseen
tasks. To this end, we propose a new technique called "joint fine-tuning" that
is able to give accuracies comparable to finetuning the same network
individually over two datasets. We also show that a jointly finetuned network
generalizes better to unseen tasks when compared to a network finetuned over a
single task.
|
Stochastic Optimization for Large-scale Optimal Transport | Optimal transport (OT) defines a powerful framework to compare probability
distributions in a geometrically faithful way. However, the practical impact of
OT is still limited because of its computational burden. We propose a new class
of stochastic optimization algorithms to cope with large-scale problems
routinely encountered in machine learning applications. These methods are able
to manipulate arbitrary distributions (either discrete or continuous) by simply
requiring to be able to draw samples from them, which is the typical setup in
high-dimensional learning problems. This alleviates the need to discretize
these densities, while giving access to provably convergent methods that output
the correct distance without discretization error. These algorithms rely on two
main ideas: (a) the dual OT problem can be re-cast as the maximization of an
expectation ; (b) entropic regularization of the primal OT problem results in a
smooth dual optimization optimization which can be addressed with algorithms
that have a provably faster convergence. We instantiate these ideas in three
different setups: (i) when comparing a discrete distribution to another, we
show that incremental stochastic optimization schemes can beat Sinkhorn's
algorithm, the current state-of-the-art finite dimensional OT solver; (ii) when
comparing a discrete distribution to a continuous density, a semi-discrete
reformulation of the dual program is amenable to averaged stochastic gradient
descent, leading to better performance than approximately solving the problem
by discretization ; (iii) when dealing with two continuous densities, we
propose a stochastic gradient descent over a reproducing kernel Hilbert space
(RKHS). This is currently the only known method to solve this problem, apart
from computing OT on finite samples. We backup these claims on a set of
discrete, semi-discrete and continuous benchmark problems.
|
Deep API Learning | Developers often wonder how to implement a certain functionality (e.g., how
to parse XML files) using APIs. Obtaining an API usage sequence based on an
API-related natural language query is very helpful in this regard. Given a
query, existing approaches utilize information retrieval models to search for
matching API sequences. These approaches treat queries and APIs as bag-of-words
(i.e., keyword matching or word-to-word alignment) and lack a deep
understanding of the semantics of the query.
We propose DeepAPI, a deep learning based approach to generate API usage
sequences for a given natural language query. Instead of a bags-of-words
assumption, it learns the sequence of words in a query and the sequence of
associated APIs. DeepAPI adapts a neural language model named RNN
Encoder-Decoder. It encodes a word sequence (user query) into a fixed-length
context vector, and generates an API sequence based on the context vector. We
also augment the RNN Encoder-Decoder by considering the importance of
individual APIs. We empirically evaluate our approach with more than 7 million
annotated code snippets collected from GitHub. The results show that our
approach generates largely accurate API sequences and outperforms the related
approaches.
|
Variational Bayesian Inference for Hidden Markov Models With
Multivariate Gaussian Output Distributions | Hidden Markov Models (HMM) have been used for several years in many time
series analysis or pattern recognitions tasks. HMM are often trained by means
of the Baum-Welch algorithm which can be seen as a special variant of an
expectation maximization (EM) algorithm. Second-order training techniques such
as Variational Bayesian Inference (VI) for probabilistic models regard the
parameters of the probabilistic models as random variables and define
distributions over these distribution parameters, hence the name of this
technique. VI can also bee regarded as a special case of an EM algorithm. In
this article, we bring both together and train HMM with multivariate Gaussian
output distributions with VI. The article defines the new training technique
for HMM. An evaluation based on some case studies and a comparison to related
approaches is part of our ongoing work.
|
PAC-Bayesian Theory Meets Bayesian Inference | We exhibit a strong link between frequentist PAC-Bayesian risk bounds and the
Bayesian marginal likelihood. That is, for the negative log-likelihood loss
function, we show that the minimization of PAC-Bayesian generalization risk
bounds maximizes the Bayesian marginal likelihood. This provides an alternative
explanation to the Bayesian Occam's razor criteria, under the assumption that
the data is generated by an i.i.d distribution. Moreover, as the negative
log-likelihood is an unbounded loss function, we motivate and propose a
PAC-Bayesian theorem tailored for the sub-gamma loss family, and we show that
our approach is sound on classical Bayesian linear regression tasks.
|
An optimal algorithm for the Thresholding Bandit Problem | We study a specific \textit{combinatorial pure exploration stochastic bandit
problem} where the learner aims at finding the set of arms whose means are
above a given threshold, up to a given precision, and \textit{for a fixed time
horizon}. We propose a parameter-free algorithm based on an original heuristic,
and prove that it is optimal for this problem by deriving matching upper and
lower bounds. To the best of our knowledge, this is the first non-trivial pure
exploration setting with \textit{fixed budget} for which optimal strategies are
constructed.
|
An algorithm with nearly optimal pseudo-regret for both stochastic and
adversarial bandits | We present an algorithm that achieves almost optimal pseudo-regret bounds
against adversarial and stochastic bandits. Against adversarial bandits the
pseudo-regret is $O(K\sqrt{n \log n})$ and against stochastic bandits the
pseudo-regret is $O(\sum_i (\log n)/\Delta_i)$. We also show that no algorithm
with $O(\log n)$ pseudo-regret against stochastic bandits can achieve
$\tilde{O}(\sqrt{n})$ expected regret against adaptive adversarial bandits.
This complements previous results of Bubeck and Slivkins (2012) that show
$\tilde{O}(\sqrt{n})$ expected adversarial regret with $O((\log n)^2)$
stochastic pseudo-regret.
|
Faster Eigenvector Computation via Shift-and-Invert Preconditioning | We give faster algorithms and improved sample complexities for estimating the
top eigenvector of a matrix $\Sigma$ -- i.e. computing a unit vector $x$ such
that $x^T \Sigma x \ge (1-\epsilon)\lambda_1(\Sigma)$:
Offline Eigenvector Estimation: Given an explicit $A \in \mathbb{R}^{n \times
d}$ with $\Sigma = A^TA$, we show how to compute an $\epsilon$ approximate top
eigenvector in time $\tilde O([nnz(A) + \frac{d*sr(A)}{gap^2} ]* \log
1/\epsilon )$ and $\tilde O([\frac{nnz(A)^{3/4} (d*sr(A))^{1/4}}{\sqrt{gap}} ]
* \log 1/\epsilon )$. Here $nnz(A)$ is the number of nonzeros in $A$, $sr(A)$
is the stable rank, $gap$ is the relative eigengap. By separating the $gap$
dependence from the $nnz(A)$ term, our first runtime improves upon the
classical power and Lanczos methods. It also improves prior work using fast
subspace embeddings [AC09, CW13] and stochastic optimization [Sha15c], giving
significantly better dependencies on $sr(A)$ and $\epsilon$. Our second running
time improves these further when $nnz(A) \le \frac{d*sr(A)}{gap^2}$.
Online Eigenvector Estimation: Given a distribution $D$ with covariance
matrix $\Sigma$ and a vector $x_0$ which is an $O(gap)$ approximate top
eigenvector for $\Sigma$, we show how to refine to an $\epsilon$ approximation
using $ O(\frac{var(D)}{gap*\epsilon})$ samples from $D$. Here $var(D)$ is a
natural notion of variance. Combining our algorithm with previous work to
initialize $x_0$, we obtain improved sample complexity and runtime results
under a variety of assumptions on $D$.
We achieve our results using a general framework that we believe is of
independent interest. We give a robust analysis of the classic method of
shift-and-invert preconditioning to reduce eigenvector computation to
approximately solving a sequence of linear systems. We then apply fast
stochastic variance reduced gradient (SVRG) based system solvers to achieve our
claims.
|
Stacking With Auxiliary Features | Ensembling methods are well known for improving prediction accuracy. However,
they are limited in the sense that they cannot discriminate among component
models effectively. In this paper, we propose stacking with auxiliary features
that learns to fuse relevant information from multiple systems to improve
performance. Auxiliary features enable the stacker to rely on systems that not
just agree on an output but also the provenance of the output. We demonstrate
our approach on three very different and difficult problems -- the Cold Start
Slot Filling, the Tri-lingual Entity Discovery and Linking and the ImageNet
object detection tasks. We obtain new state-of-the-art results on the first two
tasks and substantial improvements on the detection task, thus verifying the
power and generality of our approach.
|
Asymptotic Analysis of Objectives based on Fisher Information in Active
Learning | Obtaining labels can be costly and time-consuming. Active learning allows a
learning algorithm to intelligently query samples to be labeled for efficient
learning. Fisher information ratio (FIR) has been used as an objective for
selecting queries in active learning. However, little is known about the theory
behind the use of FIR for active learning. There is a gap between the
underlying theory and the motivation of its usage in practice. In this paper,
we attempt to fill this gap and provide a rigorous framework for analyzing
existing FIR-based active learning methods. In particular, we show that FIR can
be asymptotically viewed as an upper bound of the expected variance of the
log-likelihood ratio. Additionally, our analysis suggests a unifying framework
that not only enables us to make theoretical comparisons among the existing
querying methods based on FIR, but also allows us to give insight into the
development of new active learning approaches based on this objective.
|
Density estimation using Real NVP | Unsupervised learning of probabilistic models is a central yet challenging
problem in machine learning. Specifically, designing models with tractable
learning, sampling, inference and evaluation is crucial in solving this task.
We extend the space of such models using real-valued non-volume preserving
(real NVP) transformations, a set of powerful invertible and learnable
transformations, resulting in an unsupervised learning algorithm with exact
log-likelihood computation, exact sampling, exact inference of latent
variables, and an interpretable latent space. We demonstrate its ability to
model natural images on four datasets through sampling, log-likelihood
evaluation and latent variable manipulations.
|
Muffled Semi-Supervised Learning | We explore a novel approach to semi-supervised learning. This approach is
contrary to the common approach in that the unlabeled examples serve to
"muffle," rather than enhance, the guidance provided by the labeled examples.
We provide several variants of the basic algorithm and show experimentally that
they can achieve significantly higher AUC than boosted trees, random forests
and logistic regression when unlabeled examples are available.
|
Dueling Bandits with Dependent Arms | We study dueling bandits with weak utility-based regret when preferences over
arms have a total order and carry observable feature vectors. The order is
assumed to be determined by these feature vectors, an unknown preference
vector, and a known utility function. This structure introduces dependence
between preferences for pairs of arms, and allows learning about the preference
over one pair of arms from the preference over another pair of arms. We propose
an algorithm for this setting called Comparing The Best (CTB), which we show
has constant expected cumulative weak utility-based regret. We provide a
Bayesian interpretation for CTB, an implementation appropriate for a small
number of arms, and an alternate implementation for many arms that can be used
when the input parameters satisfy a decomposability condition. We demonstrate
through numerical experiments that CTB with appropriate input parameters
outperforms all benchmarks considered.
|
Online Bayesian Collaborative Topic Regression | Collaborative Topic Regression (CTR) combines ideas of probabilistic matrix
factorization (PMF) and topic modeling (e.g., LDA) for recommender systems,
which has gained increasing successes in many applications. Despite enjoying
many advantages, the existing CTR algorithms have some critical limitations.
First of all, they are often designed to work in a batch learning manner,
making them unsuitable to deal with streaming data or big data in real-world
recommender systems. Second, the document-specific topic proportions of LDA are
fed to the downstream PMF, but not reverse, which is sub-optimal as the rating
information is not exploited in discovering the low-dimensional representation
of documents and thus can result in a sub-optimal representation for
prediction. In this paper, we propose a novel scheme of Online Bayesian
Collaborative Topic Regression (OBCTR) which is efficient and scalable for
learning from data streams. Particularly, we {\it jointly} optimize the
combined objective function of both PMF and LDA in an online learning fashion,
in which both PMF and LDA tasks can be reinforced each other during the online
learning process. Our encouraging experimental results on real-world data
validate the effectiveness of the proposed method.
|
Optimal Rates for Multi-pass Stochastic Gradient Methods | We analyze the learning properties of the stochastic gradient method when
multiple passes over the data and mini-batches are allowed. We study how
regularization properties are controlled by the step-size, the number of passes
and the mini-batch size. In particular, we consider the square loss and show
that for a universal step-size choice, the number of passes acts as a
regularization parameter, and optimal finite sample bounds can be achieved by
early-stopping. Moreover, we show that larger step-sizes are allowed when
considering mini-batches. Our analysis is based on a unifying approach,
encompassing both batch and stochastic gradient methods as special cases. As a
byproduct, we derive optimal convergence results for batch gradient methods
(even in the non-attainable cases).
|
On Explore-Then-Commit Strategies | We study the problem of minimising regret in two-armed bandit problems with
Gaussian rewards. Our objective is to use this simple setting to illustrate
that strategies based on an exploration phase (up to a stopping time) followed
by exploitation are necessarily suboptimal. The results hold regardless of
whether or not the difference in means between the two arms is known. Besides
the main message, we also refine existing deviation inequalities, which allow
us to design fully sequential strategies with finite-time regret guarantees
that are (a) asymptotically optimal as the horizon grows and (b) order-optimal
in the minimax sense. Furthermore we provide empirical evidence that the theory
also holds in practice and discuss extensions to non-gaussian and
multiple-armed case.
|
Tight (Lower) Bounds for the Fixed Budget Best Arm Identification Bandit
Problem | We consider the problem of \textit{best arm identification} with a
\textit{fixed budget $T$}, in the $K$-armed stochastic bandit setting, with
arms distribution defined on $[0,1]$. We prove that any bandit strategy, for at
least one bandit problem characterized by a complexity $H$, will misidentify
the best arm with probability lower bounded by
$$\exp\Big(-\frac{T}{\log(K)H}\Big),$$ where $H$ is the sum for all sub-optimal
arms of the inverse of the squared gaps. Our result disproves formally the
general belief - coming from results in the fixed confidence setting - that
there must exist an algorithm for this problem whose probability of error is
upper bounded by $\exp(-T/H)$. This also proves that some existing strategies
based on the Successive Rejection of the arms are optimal - closing therefore
the current gap between upper and lower bounds for the fixed budget best arm
identification problem.
|
TripleSpin - a generic compact paradigm for fast machine learning
computations | We present a generic compact computational framework relying on structured
random matrices that can be applied to speed up several machine learning
algorithms with almost no loss of accuracy. The applications include new fast
LSH-based algorithms, efficient kernel computations via random feature maps,
convex optimization algorithms, quantization techniques and many more. Certain
models of the presented paradigm are even more compressible since they apply
only bit matrices. This makes them suitable for deploying on mobile devices.
All our findings come with strong theoretical guarantees. In particular, as a
byproduct of the presented techniques and by using relatively new
Berry-Esseen-type CLT for random vectors, we give the first theoretical
guarantees for one of the most efficient existing LSH algorithms based on the
$\textbf{HD}_{3}\textbf{HD}_{2}\textbf{HD}_{1}$ structured matrix ("Practical
and Optimal LSH for Angular Distance"). These guarantees as well as theoretical
results for other aforementioned applications follow from the same general
theoretical principle that we present in the paper. Our structured family
contains as special cases all previously considered structured schemes,
including the recently introduced $P$-model. Experimental evaluation confirms
the accuracy and efficiency of TripleSpin matrices.
|
Recycling Randomness with Structure for Sublinear time Kernel Expansions | We propose a scheme for recycling Gaussian random vectors into structured
matrices to approximate various kernel functions in sublinear time via random
embeddings. Our framework includes the Fastfood construction as a special case,
but also extends to Circulant, Toeplitz and Hankel matrices, and the broader
family of structured matrices that are characterized by the concept of
low-displacement rank. We introduce notions of coherence and graph-theoretic
structural constants that control the approximation quality, and prove
unbiasedness and low-variance properties of random feature maps that arise
within our framework. For the case of low-displacement matrices, we show how
the degree of structure and randomness can be controlled to reduce statistical
variance at the cost of increased computation and storage requirements.
Empirical results strongly support our theory and justify the use of a broader
family of structured matrices for scaling up kernel methods using random
features.
|
Distributed Asynchronous Dual Free Stochastic Dual Coordinate Ascent | The primal-dual distributed optimization methods have broad large-scale
machine learning applications. Previous primal-dual distributed methods are not
applicable when the dual formulation is not available, e.g. the
sum-of-non-convex objectives. Moreover, these algorithms and theoretical
analysis are based on the fundamental assumption that the computing speeds of
multiple machines in a cluster are similar. However, the straggler problem is
an unavoidable practical issue in the distributed system because of the
existence of slow machines. Therefore, the total computational time of the
distributed optimization methods is highly dependent on the slowest machine. In
this paper, we address these two issues by proposing distributed asynchronous
dual free stochastic dual coordinate ascent algorithm for distributed
optimization. Our method does not need the dual formulation of the target
problem in the optimization. We tackle the straggler problem through
asynchronous communication and the negative effect of slow machines is
significantly alleviated. We also analyze the convergence rate of our method
and prove the linear convergence rate even if the individual functions in
objective are non-convex. Experiments on both convex and non-convex loss
functions are used to validate our statements.
|
A budget-constrained inverse classification framework for smooth
classifiers | Inverse classification is the process of manipulating an instance such that
it is more likely to conform to a specific class. Past methods that address
such a problem have shortcomings. Greedy methods make changes that are overly
radical, often relying on data that is strictly discrete. Other methods rely on
certain data points, the presence of which cannot be guaranteed. In this paper
we propose a general framework and method that overcomes these and other
limitations. The formulation of our method can use any differentiable
classification function. We demonstrate the method by using logistic regression
and Gaussian kernel SVMs. We constrain the inverse classification to occur on
features that can actually be changed, each of which incurs an individual cost.
We further subject such changes to fall within a certain level of cumulative
change (budget). Our framework can also accommodate the estimation of
(indirectly changeable) features whose values change as a consequence of
actions taken. Furthermore, we propose two methods for specifying feature-value
ranges that result in different algorithmic behavior. We apply our method, and
a proposed sensitivity analysis-based benchmark method, to two freely available
datasets: Student Performance from the UCI Machine Learning Repository and a
real world cardiovascular disease dataset. The results obtained demonstrate the
validity and benefits of our framework and method.
|
Spectral Methods for Correlated Topic Models | In this paper, we propose guaranteed spectral methods for learning a broad
range of topic models, which generalize the popular Latent Dirichlet Allocation
(LDA). We overcome the limitation of LDA to incorporate arbitrary topic
correlations, by assuming that the hidden topic proportions are drawn from a
flexible class of Normalized Infinitely Divisible (NID) distributions. NID
distributions are generated through the process of normalizing a family of
independent Infinitely Divisible (ID) random variables. The Dirichlet
distribution is a special case obtained by normalizing a set of Gamma random
variables. We prove that this flexible topic model class can be learned via
spectral methods using only moments up to the third order, with (low order)
polynomial sample and computational complexity. The proof is based on a key new
technique derived here that allows us to diagonalize the moments of the NID
distribution through an efficient procedure that requires evaluating only
univariate integrals, despite the fact that we are handling high dimensional
multivariate moments. In order to assess the performance of our proposed Latent
NID topic model, we use two real datasets of articles collected from New York
Times and Pubmed. Our experiments yield improved perplexity on both datasets
compared with the baseline.
|
One-Pass Learning with Incremental and Decremental Features | In many real tasks the features are evolving, with some features being
vanished and some other features augmented. For example, in environment
monitoring some sensors expired whereas some new ones deployed; in mobile game
recommendation some games dropped whereas some new ones added. Learning with
such incremental and decremental features is crucial but rarely studied,
particularly when the data coming like a stream and thus it is infeasible to
keep the whole data for optimization. In this paper, we study this challenging
problem and present the OPID approach. Our approach attempts to compress
important information of vanished features into functions of survived features,
and then expand to include the augmented features. It is the one-pass learning
approach, which only needs to scan each instance once and does not need to
store the whole data, and thus satisfy the evolving streaming data nature. The
effectiveness of our approach is validated theoretically and empirically.
|
Stochastic Function Norm Regularization of Deep Networks | Deep neural networks have had an enormous impact on image analysis.
State-of-the-art training methods, based on weight decay and DropOut, result in
impressive performance when a very large training set is available. However,
they tend to have large problems overfitting to small data sets. Indeed, the
available regularization methods deal with the complexity of the network
function only indirectly. In this paper, we study the feasibility of directly
using the $L_2$ function norm for regularization. Two methods to integrate this
new regularization in the stochastic backpropagation are proposed. Moreover,
the convergence of these new algorithms is studied. We finally show that they
outperform the state-of-the-art methods in the low sample regime on benchmark
datasets (MNIST and CIFAR10). The obtained results demonstrate very clear
improvement, especially in the context of small sample regimes with data laying
in a low dimensional manifold. Source code of the method can be found at
\url{https://github.com/AmalRT/DNN_Reg}.
|
The Bayesian Linear Information Filtering Problem | We present a Bayesian sequential decision-making formulation of the
information filtering problem, in which an algorithm presents items (news
articles, scientific papers, tweets) arriving in a stream, and learns relevance
from user feedback on presented items. We model user preferences using a
Bayesian linear model, similar in spirit to a Bayesian linear bandit. We
compute a computational upper bound on the value of the optimal policy, which
allows computing an optimality gap for implementable policies. We then use this
analysis as motivation in introducing a pair of new Decompose-Then-Decide (DTD)
heuristic policies, DTD-Dynamic-Programming (DTD-DP) and
DTD-Upper-Confidence-Bound (DTD-UCB). We compare DTD-DP and DTD-UCB against
several benchmarks on real and simulated data, demonstrating significant
improvement, and show that the achieved performance is close to the upper
bound.
|
ParMAC: distributed optimisation of nested functions, with application
to learning binary autoencoders | Many powerful machine learning models are based on the composition of
multiple processing layers, such as deep nets, which gives rise to nonconvex
objective functions. A general, recent approach to optimise such "nested"
functions is the method of auxiliary coordinates (MAC). MAC introduces an
auxiliary coordinate for each data point in order to decouple the nested model
into independent submodels. This decomposes the optimisation into steps that
alternate between training single layers and updating the coordinates. It has
the advantage that it reuses existing single-layer algorithms, introduces
parallelism, and does not need to use chain-rule gradients, so it works with
nondifferentiable layers. With large-scale problems, or when distributing the
computation is necessary for faster training, the dataset may not fit in a
single machine. It is then essential to limit the amount of communication
between machines so it does not obliterate the benefit of parallelism. We
describe a general way to achieve this, ParMAC. ParMAC works on a cluster of
processing machines with a circular topology and alternates two steps until
convergence: one step trains the submodels in parallel using stochastic
updates, and the other trains the coordinates in parallel. Only submodel
parameters, no data or coordinates, are ever communicated between machines.
ParMAC exhibits high parallelism, low communication overhead, and facilitates
data shuffling, load balancing, fault tolerance and streaming data processing.
We study the convergence of ParMAC and propose a theoretical model of its
runtime and parallel speedup. We develop ParMAC to learn binary autoencoders
for fast, approximate image retrieval. We implement it in MPI in a distributed
system and demonstrate nearly perfect speedups in a 128-processor cluster with
a training set of 100 million high-dimensional points.
|
Control of Memory, Active Perception, and Action in Minecraft | In this paper, we introduce a new set of reinforcement learning (RL) tasks in
Minecraft (a flexible 3D world). We then use these tasks to systematically
compare and contrast existing deep reinforcement learning (DRL) architectures
with our new memory-based DRL architectures. These tasks are designed to
emphasize, in a controllable manner, issues that pose challenges for RL methods
including partial observability (due to first-person visual observations),
delayed rewards, high-dimensional visual observations, and the need to use
active perception in a correct manner so as to perform well in the tasks. While
these tasks are conceptually simple to describe, by virtue of having all of
these challenges simultaneously they are difficult for current DRL
architectures. Additionally, we evaluate the generalization performance of the
architectures on environments not used during training. The experimental
results show that our new architectures generalize to unseen environments
better than existing DRL architectures.
|
Classification under Streaming Emerging New Classes: A Solution using
Completely Random Trees | This paper investigates an important problem in stream mining, i.e.,
classification under streaming emerging new classes or SENC. The common
approach is to treat it as a classification problem and solve it using either a
supervised learner or a semi-supervised learner. We propose an alternative
approach by using unsupervised learning as the basis to solve this problem. The
SENC problem can be decomposed into three sub problems: detecting emerging new
classes, classifying for known classes, and updating models to enable
classification of instances of the new class and detection of more emerging new
classes. The proposed method employs completely random trees which have been
shown to work well in unsupervised learning and supervised learning
independently in the literature. This is the first time, as far as we know,
that completely random trees are used as a single common core to solve all
three sub problems: unsupervised learning, supervised learning and model update
in data streams. We show that the proposed unsupervised-learning-focused method
often achieves significantly better outcomes than existing
classification-focused methods.
|
Hyperspectral Image Classification with Support Vector Machines on
Kernel Distribution Embeddings | We propose a novel approach for pixel classification in hyperspectral images,
leveraging on both the spatial and spectral information in the data. The
introduced method relies on a recently proposed framework for learning on
distributions -- by representing them with mean elements in reproducing kernel
Hilbert spaces (RKHS) and formulating a classification algorithm therein. In
particular, we associate each pixel to an empirical distribution of its
neighbouring pixels, a judicious representation of which in an RKHS, in
conjunction with the spectral information contained in the pixel itself, give a
new explicit set of features that can be fed into a suite of standard
classification techniques -- we opt for a well-established framework of support
vector machines (SVM). Furthermore, the computational complexity is reduced via
random Fourier features formalism. We study the consistency and the convergence
rates of the proposed method and the experiments demonstrate strong performance
on hyperspectral data with gains in comparison to the state-of-the-art results.
|
Does Multimodality Help Human and Machine for Translation and Image
Captioning? | This paper presents the systems developed by LIUM and CVC for the WMT16
Multimodal Machine Translation challenge. We explored various comparative
methods, namely phrase-based systems and attentional recurrent neural networks
models trained using monomodal or multimodal data. We also performed a human
evaluation in order to estimate the usefulness of multimodal data for human
machine translation and image description generation. Our systems obtained the
best results for both tasks according to the automatic evaluation metrics BLEU
and METEOR.
|
Forest Floor Visualizations of Random Forests | We propose a novel methodology, forest floor, to visualize and interpret
random forest (RF) models. RF is a popular and useful tool for non-linear
multi-variate classification and regression, which yields a good trade-off
between robustness (low variance) and adaptiveness (low bias). Direct
interpretation of a RF model is difficult, as the explicit ensemble model of
hundreds of deep trees is complex. Nonetheless, it is possible to visualize a
RF model fit by its mapping from feature space to prediction space. Hereby the
user is first presented with the overall geometrical shape of the model
structure, and when needed one can zoom in on local details. Dimensional
reduction by projection is used to visualize high dimensional shapes. The
traditional method to visualize RF model structure, partial dependence plots,
achieve this by averaging multiple parallel projections. We suggest to first
use feature contributions, a method to decompose trees by splitting features,
and then subsequently perform projections. The advantages of forest floor over
partial dependence plots is that interactions are not masked by averaging. As a
consequence, it is possible to locate interactions, which are not visualized in
a given projection. Furthermore, we introduce: a goodness-of-visualization
measure, use of colour gradients to identify interactions and an out-of-bag
cross validated variant of feature contributions.
|
Deep Reinforcement Learning Radio Control and Signal Detection with
KeRLym, a Gym RL Agent | This paper presents research in progress investigating the viability and
adaptation of reinforcement learning using deep neural network based function
approximation for the task of radio control and signal detection in the
wireless domain. We demonstrate a successful initial method for radio control
which allows naive learning of search without the need for expert features,
heuristics, or search strategies. We also introduce Kerlym, an open Keras based
reinforcement learning agent collection for OpenAI's Gym.
|
Learning Combinatorial Functions from Pairwise Comparisons | A large body of work in machine learning has focused on the problem of
learning a close approximation to an underlying combinatorial function, given a
small set of labeled examples. However, for real-valued functions, cardinal
labels might not be accessible, or it may be difficult for an expert to
consistently assign real-valued labels over the entire set of examples. For
instance, it is notoriously hard for consumers to reliably assign values to
bundles of merchandise. Instead, it might be much easier for a consumer to
report which of two bundles she likes better. With this motivation in mind, we
consider an alternative learning model, wherein the algorithm must learn the
underlying function up to pairwise comparisons, from pairwise comparisons. In
this model, we present a series of novel algorithms that learn over a wide
variety of combinatorial function classes. These range from graph functions to
broad classes of valuation functions that are fundamentally important in
microeconomic theory, the analysis of social networks, and machine learning,
such as coverage, submodular, XOS, and subadditive functions, as well as
functions with sparse Fourier support.
|
Tradeoffs between Convergence Speed and Reconstruction Accuracy in
Inverse Problems | Solving inverse problems with iterative algorithms is popular, especially for
large data. Due to time constraints, the number of possible iterations is
usually limited, potentially affecting the achievable accuracy. Given an error
one is willing to tolerate, an important question is whether it is possible to
modify the original iterations to obtain faster convergence to a minimizer
achieving the allowed error without increasing the computational cost of each
iteration considerably. Relying on recent recovery techniques developed for
settings in which the desired signal belongs to some low-dimensional set, we
show that using a coarse estimate of this set may lead to faster convergence at
the cost of an additional reconstruction error related to the accuracy of the
set approximation. Our theory ties to recent advances in sparse recovery,
compressed sensing, and deep learning. Particularly, it may provide a possible
explanation to the successful approximation of the l1-minimization solution by
neural networks with layers representing iterations, as practiced in the
learned iterative shrinkage-thresholding algorithm (LISTA).
|
Internal Guidance for Satallax | We propose a new internal guidance method for automated theorem provers based
on the given-clause algorithm. Our method influences the choice of unprocessed
clauses using positive and negative examples from previous proofs. To this end,
we present an efficient scheme for Naive Bayesian classification by
generalising label occurrences to types with monoid structure. This makes it
possible to extend existing fast classifiers, which consider only positive
examples, with negative ones. We implement the method in the higher-order logic
prover Satallax, where we modify the delay with which propositions are
processed. We evaluated our method on a simply-typed higher-order logic version
of the Flyspeck project, where it solves 26% more problems than Satallax
without internal guidance.
|
k2-means for fast and accurate large scale clustering | We propose k^2-means, a new clustering method which efficiently copes with
large numbers of clusters and achieves low energy solutions. k^2-means builds
upon the standard k-means (Lloyd's algorithm) and combines a new strategy to
accelerate the convergence with a new low time complexity divisive
initialization. The accelerated convergence is achieved through only looking at
k_n nearest clusters and using triangle inequality bounds in the assignment
step while the divisive initialization employs an optimal 2-clustering along a
direction. The worst-case time complexity per iteration of our k^2-means is
O(nk_nd+k^2d), where d is the dimension of the n data points and k is the
number of clusters and usually n << k << k_n. Compared to k-means' O(nkd)
complexity, our k^2-means complexity is significantly lower, at the expense of
slightly increasing the memory complexity by O(nk_n+k^2). In our extensive
experiments k^2-means is order(s) of magnitude faster than standard methods in
computing accurate clusterings on several standard datasets and settings with
hundreds of clusters and high dimensional data. Moreover, the proposed divisive
initialization generally leads to clustering energies comparable to those
achieved with the standard k-means++ initialization, while being significantly
faster.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.