Probing Neural Network Comprehension of Natural Language Arguments

We are surprised to find that BERT's peak performance of 77% on the ArgumentReasoning Comprehension Task reaches just three points below the averageuntrained human baseline. However, we show... | Continue reading


@arxiv.org | 4 years ago

Helen: Maliciously Secure Coopetitive Learning for Linear Models

Many organizations wish to collaboratively train machine learning models ontheir combined datasets for a common benefit (e.g., better medical research, orfraud detection). However, they often... | Continue reading


@arxiv.org | 4 years ago

Are We Making Much Progress with Neural Networks?

Deep learning techniques have become the method of choice for researchersworking on algorithmic aspects of recommender systems. With the stronglyincreased interest in machine learning in... | Continue reading


@arxiv.org | 4 years ago

Raytracer.jl: Differentiable Renderer That Supports Parameter Optimization

In this paper, we present RayTracer.jl, a renderer in Julia that is fullydifferentiable using source-to-source Automatic Differentiation (AD). Thismeans that RayTracer not only renders 2D images... | Continue reading


@arxiv.org | 4 years ago

On the Tour Towards Dpll(mapf) and Beyond

We discuss milestones on the tour towards DPLL(MAPF), a multi-agent pathfinding (MAPF) solver fully integrated with the Davis-Putnam-Logemann-Loveland(DPLL) propositional satisfiability testing... | Continue reading


@arxiv.org | 4 years ago

CLaRO: A Data-Driven CNL for Specifying Competency Questions

Competency Questions (CQs) for an ontology and similar artefacts aim toprovide insights into the contents of an ontology and to demarcate its scope.The absence of a controlled natural language,... | Continue reading


@arxiv.org | 4 years ago

Low-supervision urgency detection and transfer in short crisis messages

Humanitarian disasters have been on the rise in recent years due to theeffects of climate change and socio-political situations such as the refugeecrisis. Technology can be used to best mobilize... | Continue reading


@arxiv.org | 4 years ago

Natural Adversarial Examples [pdf]

We introduce natural adversarial examples -- real-world, unmodified, andnaturally occurring examples that cause classifier accuracy to significantlydegrade. We curate 7,500 natural adversarial... | Continue reading


@arxiv.org | 4 years ago

Keeping the Smart Home Private with Smart(er) IoT Traffic Shaping [pdf]

The proliferation of smart home Internet of Things (IoT) devices presentsunprecedented challenges for preserving privacy within the home. In this paper,we demonstrate that a passive network... | Continue reading


@arxiv.org | 4 years ago

Determination of the Hubble Constant Based on the Tip of the Red Giant Branch

We present a new and independent determination of the local value of theHubble constant based on a calibration of the Tip of the Red Giant Branch(TRGB) applied to Type Ia supernovae (SNeIa). We... | Continue reading


@arxiv.org | 4 years ago

Executable formal semantics for the Posix shell

The POSIX shell is a widely deployed, powerful tool for managing computersystems. The shell is the expert's control panel, a necessary tool forconfiguring, compiling, installing, maintaining,... | Continue reading


@arxiv.org | 4 years ago

Towards Near-Imperceptible Steganographic Text

We show that the imperceptibility of several existing linguisticsteganographic systems (Fang et al., 2017; Yang et al., 2018) relies onimplicit assumptions on statistical behaviors of fluent... | Continue reading


@arxiv.org | 4 years ago

Hydrodynamic Simulations Using Gpgpu Architectures

Simulating the flow of different fluids can be a highly computationalintensive process, which requires large amounts of resources. Recently therehas been a lot of research effort directed... | Continue reading


@arxiv.org | 4 years ago

Logic Conditionals, Supervenience, and Selection Tasks

Principles of cognitive economy would require that concepts about objects,properties and relations should be introduced only if they simplify theconceptualisation of a domain. Unexpectedly,... | Continue reading


@arxiv.org | 4 years ago

Cross-Lingual Transfer Learning for Question Answering

Deep learning based question answering (QA) on English documents has achievedsuccess because there is a large amount of English training examples. However,for most languages, training examples... | Continue reading


@arxiv.org | 4 years ago

The Many AI Challenges of Hearthstone

Games have benchmarked AI methods since the inception of the field, withclassic board games such as Chess and Go recently leaving room for video gameswith related yet different sets of... | Continue reading


@arxiv.org | 4 years ago

A Neural Turing~Machine for Conditional Transition Graph Modeling

Graphs are an essential part of many machine learning problems such asanalysis of parse trees, social networks, knowledge graphs, transportationsystems, and molecular structures. Applying... | Continue reading


@arxiv.org | 4 years ago

Comprehensive Process Drift Detection with Visual Analytics

Recent research has introduced ideas from concept drift into process miningto enable the analysis of changes in business processes over time. This streamof research, however, has not yet... | Continue reading


@arxiv.org | 4 years ago

Mystery of universe's expansion rate deepens with new Hubble data

We present an improved determination of the Hubble constant (H0) from HubbleSpace Telescope (HST) observations of 70 long-period Cepheids in the LargeMagellanic Cloud. These were obtained with... | Continue reading


@arxiv.org | 4 years ago

Representing Attitudes Towards Ambiguity in Managerial Decisions

We provide here a general mathematical framework to model attitudes towardsambiguity which uses the formalism of quantum theory as a "purely mathematicalformalism, detached from any physical... | Continue reading


@arxiv.org | 4 years ago

Automated Gaming Pommerman: FFA

Our game Pommerman is based on the console game Bommerman. The game starts onan 11 by 11 platform. Pommerman is a multi-agent environment and is made up ofa set of different situations and... | Continue reading


@arxiv.org | 4 years ago

Learning Neural Networks with Adaptive Regularization

Feed-forward neural networks can be understood as a combination of anintermediate representation and a linear hypothesis. While most previous worksaim to diversify the representations, we... | Continue reading


@arxiv.org | 4 years ago

What does it mean to understand a neural network?

We can define a neural network that can learn to recognize objects in lessthan 100 lines of code. However, after training, it is characterized bymillions of weights that contain the knowledge... | Continue reading


@arxiv.org | 4 years ago

Neural Networks as Explicit Word-Based Rules

Filters of convolutional networks used in computer vision are oftenvisualized as image patches that maximize the response of the filter. We usethe same approach to interpret weight matrices in... | Continue reading


@arxiv.org | 4 years ago

Sentimental Analysis Challenges in Persian Language [pdf]

Continue reading


@arxiv.org | 4 years ago

Neural News Recommendation with Attentive Multi-View Learning

Personalized news recommendation is very important for online news platformsto help users find interested news and improve user experience. News and userrepresentation learning is critical for... | Continue reading


@arxiv.org | 4 years ago

A Review of Automatic Differentiation and Its Efficient Implementation

Derivatives play a critical role in computational statistics, examples beingBayesian inference using Hamiltonian Monte Carlo sampling and the training ofneural networks. Automatic... | Continue reading


@arxiv.org | 4 years ago

Solving Hard Coreference Problems

Coreference resolution is a key problem in natural language understandingthat still escapes reliable solutions. One fundamental difficulty has been thatof resolving instances involving pronouns... | Continue reading


@arxiv.org | 4 years ago

Adaptive Thompson Sampling Stacks for Memory Bounded Open-Loop Planning

We propose Stable Yet Memory Bounded Open-Loop (SYMBOL) planning, a generalmemory bounded approach to partially observable open-loop planning. SYMBOLmaintains an adaptive stack of Thompson... | Continue reading


@arxiv.org | 4 years ago

Learning an Urban Air Mobility Encounter Model from Expert Preferences

Airspace models have played an important role in the development andevaluation of aircraft collision avoidance systems for both manned and unmannedaircraft. As Urban Air Mobility (UAM) systems... | Continue reading


@arxiv.org | 4 years ago

StackVault: Protection from Untrusted Functions

Data exfiltration attacks have led to huge data breaches. Recently, theEquifax attack affected 147M users and a third-party library - Apache Struts -was alleged to be responsible for it. These... | Continue reading


@arxiv.org | 4 years ago

Learning Key-Value Store Design

We introduce the concept of design continuums for the data layout ofkey-value stores. A design continuum unifies major distinct data structuredesigns under the same model. The critical insight... | Continue reading


@arxiv.org | 4 years ago

Grounding Value Alignment with Ethical Principles

An important step in the development of value alignment (VA) systems in AI isunderstanding how values can interrelate with facts. Designers of future VAsystems will need to utilize a hybrid... | Continue reading


@arxiv.org | 4 years ago

Generative Modeling by Estimating Gradients of the Data Distribution

We introduce a new generative model where samples are produced via Langevindynamics using gradients of the data distribution estimated with scorematching. Because gradients might be ill-defined... | Continue reading


@arxiv.org | 4 years ago

The Dynamic Embedded Topic Model

Topic modeling analyzes documents to learn meaningful patterns of words.Dynamic topic models capture how these patterns vary over time for a set ofdocuments that were collected over a large time... | Continue reading


@arxiv.org | 4 years ago

Neural Decipherment via Minimum-Cost Flow: From Ugaritic to Linear B

In this paper we propose a novel neural approach for automatic deciphermentof lost languages. To compensate for the lack of strong supervision signal, ourmodel design is informed by patterns in... | Continue reading


@arxiv.org | 4 years ago

Diverse Trajectory Forecasting with Determinantal Point Processes

The ability to forecast a set of likely yet diverse possible future behaviorsof an agent (e.g., future trajectories of a pedestrian) is essential forsafety-critical perception systems (e.g.,... | Continue reading


@arxiv.org | 4 years ago

Fully Convolutional Networks for Handwriting Recognition

Handwritten text recognition is challenging because of the virtually infiniteways a human can write the same message. Our fully convolutional handwritingmodel takes in a handwriting sample of... | Continue reading


@arxiv.org | 4 years ago

Challenges and Directions for Authentication in Pervasive Computing

We quickly approach a "pervasive future" where pervasive computing is thenorm. In this scenario, humans are surrounded by a multitude of heterogeneousdevices that assist them in almost every... | Continue reading


@arxiv.org | 4 years ago

Measuring Long-Term Causal Impact of Ads on LinkedIn Users

Organic updates (from a member's network) and sponsored updates (or ads, fromadvertisers) together form the newsfeed on LinkedIn. The newsfeed, the defaulthomepage for members, attracts them to... | Continue reading


@arxiv.org | 4 years ago

Supply chain malware targets SGX: Take care of what you sign

Malware attacks represent a significant part of today's security threats.Software guard extensions (SGX) are a set of hardware instructions introducedby Intel in their recent lines of processors... | Continue reading


@arxiv.org | 4 years ago

On Analysis of the Bitcoin and Prism Backbone Protocols

Bitcoin is a peer-to-peer payment system proposed by Nakamoto in 2008.Properties of the bitcoin backbone protocol have been investigated in somedepth: the blockchain growth property quantifies... | Continue reading


@arxiv.org | 4 years ago

Conditional Analysis for Key-Value Data with Local Differential Privacy

Local differential privacy (LDP) has been deemed as the de facto measure forprivacy-preserving distributed data collection and analysis. Recently,researchers have extended LDP to the basic data... | Continue reading


@arxiv.org | 4 years ago

Heard More Than Heard: An Audio Steganography Method Based on GAN

Audio steganography is a collection of techniques for concealing theexistence of information by embedding it within a non-secret audio, which isreferred to as carrier. Distinct from... | Continue reading


@arxiv.org | 4 years ago

Incrementalizing RASA's Open-Source Natural Language Understanding Pipeline

As spoken dialogue systems and chatbots are gaining more widespread adoption,commercial and open-sourced services for natural language understanding areemerging. In this paper, we explain how we... | Continue reading


@arxiv.org | 4 years ago

A Modular Task-Oriented Dialogue System Using a Neural Mixture-of-Experts

End-to-end Task-oriented Dialogue Systems (TDSs) have attracted a lot ofattention for their superiority (e.g., in terms of global optimization) overpipeline modularized TDSs. Previous studies on... | Continue reading


@arxiv.org | 4 years ago

Semantic Parsing with Dual Learning

Semantic parsing converts natural language queries into structured logicalforms. The paucity of annotated training samples is a fundamental challenge inthis field. In this work, we develop a... | Continue reading


@arxiv.org | 4 years ago

To Tune or Not to Tune? How About the Best of Both Worlds?

The introduction of pre-trained language models has revolutionized naturallanguage research communities. However, researchers still know relativelylittle regarding their theoretical and... | Continue reading


@arxiv.org | 4 years ago