Voice of Optimization (2018) Explain optimal strategies

We introduce the idea that using optimal classification trees (OCTs) andoptimal classification trees with-hyperplanes (OCT-Hs), interpretable machinelearning algorithms developed in [BD17,... | Continue reading


@arxiv.org | 4 years ago

Semi-Supervised Domain Adaptation via Minimax Entropy

Contemporary domain adaptation methods are very effective at aligning featuredistributions of source and target domains without any target supervision.However, we show that these techniques... | Continue reading


@arxiv.org | 4 years ago

Complexity of Linear Regions in Deep Networks

It is well-known that the expressivity of a neural network depends on itsarchitecture, with deeper networks expressing more complex functions. In thecase of networks that compute piecewise... | Continue reading


@arxiv.org | 4 years ago

Multi-Instance Multi-Scale CNN for Medical Image Classification

Deep learning for medical image classification faces three major challenges:1) the number of annotated medical images for training are usually small; 2)regions of interest (ROIs) are relatively... | Continue reading


@arxiv.org | 4 years ago

Guided Image Generation with Conditional Invertible Neural Networks

In this work, we address the task of natural image generation guided by aconditioning input. We introduce a new architecture called conditionalinvertible neural network (cINN). The cINN combines... | Continue reading


@arxiv.org | 4 years ago

Believe It or Not, We Know What You Are Looking At

By borrowing the wisdom of human in gaze following, we propose a two-stagesolution for gaze point prediction of the target persons in a scene.Specifically, in the first stage, both head image... | Continue reading


@arxiv.org | 4 years ago

Deep Saliency Models: The Quest for the Loss Function

Recent advances in deep learning have pushed the performances of visualsaliency models way further than it has ever been. Numerous models in theliterature present new ways to design neural... | Continue reading


@arxiv.org | 4 years ago

Synthesize Lecture Video from Audio

We present LumièreNet, a simple, modular, and completely deep-learningbased architecture that synthesizes, high quality, full-pose headshot lecturevideos from instructor's new audio narration... | Continue reading


@arxiv.org | 4 years ago

Tackling Climate Change with Machine Learning

Climate change is one of the greatest challenges facing humanity, and we, asmachine learning experts, may wonder how we can help. Here we describe howmachine learning can be a powerful tool in... | Continue reading


@arxiv.org | 4 years ago

Edge-Aware Deep Image Deblurring

Image deblurring is a fundamental and challenging low-level vision problem.Previous vision research indicates that edge structure in natural scenes is oneof the most important factors to... | Continue reading


@arxiv.org | 4 years ago

Searching for Apparel Products from Images in the Wild

In this age of social media, people often look at what others are wearing. Inparticular, Instagram and Twitter influencers often provide images ofthemselves wearing different outfits and their... | Continue reading


@arxiv.org | 4 years ago

Rfbtd: RFB Text Detector

Text detection plays a critical role in the whole procedure of textualinformation extraction and understanding. On a high note, recent years haveseen a surge in the high recall text detectors in... | Continue reading


@arxiv.org | 4 years ago

Towards Automated Application-Specific Software Stacks

Software complexity has increased over the years. One common way to tacklethis complexity during development is to encapsulate features into a sharedlibrary. This allows developers to reuse... | Continue reading


@arxiv.org | 4 years ago

Video Crowd Counting via Dynamic Temporal Modeling

Crowd counting aims to count the number of instantaneous people in a crowdedspace, which plays an increasingly important role in the field of publicsafety. More and more researchers have already... | Continue reading


@arxiv.org | 4 years ago

Slim-CNN: A Light-Weight CNN for Face Attribute Prediction

We introduce a computationally-efficient CNN micro-architecture Slim Moduleto design a lightweight deep neural network Slim-Net for face attributeprediction. Slim Modules are constructed by... | Continue reading


@arxiv.org | 4 years ago

The Indirect Convolution Algorithm

Deep learning frameworks commonly implement convolution operators withGEMM-based algorithms. In these algorithms, convolution is implemented on topof matrix-matrix multiplication (GEMM)... | Continue reading


@arxiv.org | 4 years ago

Diffprivlib: The IBM Differential Privacy Library

Since its conception in 2006, differential privacy has emerged as thede-facto standard in data privacy, owing to its robust mathematical guarantees,generalised applicability and rich body of... | Continue reading


@arxiv.org | 4 years ago

Products, coproducts and singular value decomposition (2004) [pdf]

Products and coproducts may be recognized as morphisms in a monoidal tensorcategory of vector spaces. To gain invariant data of these morphisms, we canuse singular value decomposition which... | Continue reading


@arxiv.org | 4 years ago

Key Event Receipt Infrastructure (KERI)

A decentralized key management infrastructure (DKMI) that uses the designprinciple of minimally sufficient means is presented. The primary keymanagement operation is key rotation via a novel key... | Continue reading


@arxiv.org | 4 years ago

Model Checking a C++ Software Framework, a Case Study

This paper presents a case study on applying two model checkers, SPIN andDIVINE, to verify key properties of a C++ software framework, known as ADAPRO,originally developed at CERN. SPIN was used... | Continue reading


@arxiv.org | 4 years ago

On Privacy Risks of Public WiFi Captive Portals

Open access WiFi hotspots are widely deployed in many public places,including restaurants, parks, coffee shops, shopping malls, trains, airports,hotels, and libraries. While these hotspots... | Continue reading


@arxiv.org | 4 years ago

Multi-Task Learning for Coherence Modeling

We address the task of assessing discourse coherence, an aspect of textquality that is essential for many NLP tasks, such as summarization andlanguage assessment. We propose a hierarchical... | Continue reading


@arxiv.org | 4 years ago

Morphological Word Embeddings

Linguistic similarity is multi-faceted. For instance, two words may besimilar with respect to semantics, syntax, or morphology inter alia. Continuousword-embeddings have been shown to capture... | Continue reading


@arxiv.org | 4 years ago

Use of Owl and Semantic Web Technologies at Pinterest

Pinterest is a popular Web application that has over 250 million activeusers. It is a visual discovery engine for finding ideas for recipes, fashion,weddings, home decoration, and much more. In... | Continue reading


@arxiv.org | 4 years ago

Few-Shot Adversarial Learning of Realistic Neural Talking Head Models

Several recent works have shown how highly realistic human head images can beobtained by training convolutional neural networks to generate them. In orderto create a personalized talking head... | Continue reading


@arxiv.org | 4 years ago

Learning Multi-Party Turn-Taking Models from Dialogue Logs

This paper investigates the application of machine learning (ML) techniquesto enable intelligent systems to learn multi-party turn-taking models fromdialogue logs. The specific ML task consists... | Continue reading


@arxiv.org | 4 years ago

Neural Image Captioning

In recent years, the biggest advances in major Computer Vision tasks, such asobject recognition, handwritten-digit identification, facial recognition, andmany others., have all come through the... | Continue reading


@arxiv.org | 4 years ago

Uncovering Information Flow Policy Violations in C Programs

Programmers of cryptographic applications written in C need to avoid commonmistakes such as sending private data over public channels, modifying trusteddata with untrusted functions, or... | Continue reading


@arxiv.org | 4 years ago

MagneticSpy: Exploiting Magnetometer for Website and Application Fingerprinting

Recent studies have shown that aggregate CPU usage and power consumptiontraces on smartphones can leak information about applications running on thesystem or websites visited. In response,... | Continue reading


@arxiv.org | 4 years ago

On Open-Universe Causal Reasoning

We extend two kinds of causal models, structural equation models andsimulation models, to infinite variable spaces. This enables a semantics forconditionals founded on a calculus of... | Continue reading


@arxiv.org | 4 years ago

Fooling a Real Car with Adversarial Traffic Signs [pdf]

Continue reading


@arxiv.org | 4 years ago

Online Meta-Learning

A central capability of intelligent systems is the ability to continuouslybuild upon previous experiences to speed up and enhance learning of new tasks.Two distinct research paradigms have... | Continue reading


@arxiv.org | 4 years ago

Reparameterizable Subset Sampling via Continuous Relaxations

Many machine learning tasks require sampling a subset of items from acollection based on a parameterized distribution. The Gumbel-softmax trick canbe used to sample a single item, and allows for... | Continue reading


@arxiv.org | 4 years ago

Benchmarking Model-Based Reinforcement Learning

Model-based reinforcement learning (MBRL) is widely seen as having thepotential to be significantly more sample efficient than model-free RL.However, research in model-based RL has not been very... | Continue reading


@arxiv.org | 4 years ago

Perspective Taking in Deep Reinforcement Learning Agents

Perspective taking is the ability to take the point of view of another agent.This skill is not unique to humans as it is also displayed by other animalslike chimpanzees. It is an essential... | Continue reading


@arxiv.org | 4 years ago

Recommendations on Designing Practical Interval Type-2 Fuzzy Systems

Interval type-2 (IT2) fuzzy systems have become increasingly popular in thelast 20 years. They have demonstrated superior performance in manyapplications. However, the operation of an IT2 fuzzy... | Continue reading


@arxiv.org | 4 years ago

On Conflicting and Conflicting Values

Values are things that are important to us. Actions activate values - theyeither go against our values or they promote our values. Values themselves caneither be conforming or conflicting... | Continue reading


@arxiv.org | 4 years ago

Weighing the Sun with Five Photographs

With only five photographs of the Sun at different dates we show that themass of Sun can be calculated by using a telescope, a camera, and the thirdKepler's law. With the photographs we are able... | Continue reading


@arxiv.org | 4 years ago

Rule Applicability on RDF Triplestore Schemas

Rule-based systems play a critical role in health and safety, where policiescreated by experts are usually formalised as rules. When dealing withincreasingly large and dynamic sources of data,... | Continue reading


@arxiv.org | 4 years ago

Discrete Cycloids from Convex Symmetric Polygons [pdf]

Cycloids, hipocycloids and epicycloids have an often forgotten commonproperty: they are homothetic to their evolutes. But what if use convexsymmetric polygons as unit balls, can we define... | Continue reading


@arxiv.org | 4 years ago

Evolving the Hearthstone Meta

Balancing an ever growing strategic game of high complexity, such asHearthstone is a complex task. The target of making strategies diverse andcustomizable results in a delicate intricate system.... | Continue reading


@arxiv.org | 4 years ago

E-Sports Talent Scouting Based on Multimodal Twitch Stream Data

We propose and investigate feasibility of a novel task that consists infinding e-sports talent using multimodal Twitch chat and video stream data. Inthat, we focus on predicting the ranks of... | Continue reading


@arxiv.org | 4 years ago

Dynamics-Aware Unsupervised Discovery of Skills

Conventionally, model-based reinforcement learning (MBRL) aims to learn aglobal model for the dynamics of the environment. A good model can potentiallyenable planning algorithms to generate a... | Continue reading


@arxiv.org | 4 years ago

Elementary Iterated Revision and the Levi Identity

Recent work has considered the problem of extending to the case of iteratedbelief change the so-called `Harper Identity' (HI), which defines single-shotcontraction in terms of single-shot... | Continue reading


@arxiv.org | 4 years ago

Representation, Exploration and Recommendation of Music Playlists

Playlists have become a significant part of our listening experience becauseof the digital cloud-based services such as Spotify, Pandora, Apple Music.Owing to the meteoric rise in the usage of... | Continue reading


@arxiv.org | 4 years ago

A Semi-Supervised Self-Organizing Map with Adaptive Local Thresholds

In the recent years, there is a growing interest in semi-supervised learning,since, in many learning tasks, there is a plentiful supply of unlabeled data,but insufficient labeled ones. Hence,... | Continue reading


@arxiv.org | 4 years ago

A Semi-Supervised Self-Organizing Map for Clustering and Classification

There has been an increasing interest in semi-supervised learning in therecent years because of the great number of datasets with a large number ofunlabeled data but only a few labeled samples.... | Continue reading


@arxiv.org | 4 years ago

Extremes and Records

These are lecture notes from a course offered at the Bangalore School onStatistical Physics - X, during 17-28 June 2019, [https://www.icts.res.in/program/bssp2019 ] at International centre... | Continue reading


@arxiv.org | 4 years ago