Software Ethology: An Accurate and Resilient Semantic Binary Analysis Framework

When reverse engineering a binary, the analyst must first understand thesemantics of the binary's functions through either manual or automaticanalysis. Manual semantic analysis is... | Continue reading


@arxiv.org | 4 years ago

Selecting the Metric in Hamiltonian Monte Carlo

We present a selection criterion for the Euclidean metric adapted duringwarmup in a Hamiltonian Monte Carlo sampler that makes it possible for asampler to automatically pick the metric based on... | Continue reading


@arxiv.org | 4 years ago

Selfie: Self-Supervised Pretraining for Image Embedding

We introduce a pretraining technique called Selfie, which stands forSELF-supervised Image Embedding. Selfie generalizes the concept of maskedlanguage modeling to continuous data, such as images.... | Continue reading


@arxiv.org | 4 years ago

On the physical (im)possibility of lightsabers

In this paper, we use a science fiction theme (i.e. the iconic lightsaberfrom the Star Wars universe) as a pedagogical tool to introduce aspects ofnonlinear electrodynamics due to the quantum... | Continue reading


@arxiv.org | 4 years ago

Transferable Multi-Domain State Generator for Task-Oriented Dialogue Systems

Over-dependence on domain ontology and lack of knowledge sharing acrossdomains are two practical and yet less studied problems of dialogue statetracking. Existing approaches generally fall short... | Continue reading


@arxiv.org | 4 years ago

Graph Processing on FPGAs: Taxonomy, Survey, Challenges (2019)

Graph processing has become an important part of various areas, such asmachine learning, computational sciences, medical applications, social networkanalysis, and many others. Various graphs,... | Continue reading


@arxiv.org | 4 years ago

A Role for Dependent Types in Haskell (Extended Version)

Modern Haskell supports zero-cost coercions, a mechanism where types thatshare the same run-time representation may be freely converted between. To makesure such conversions are safe and... | Continue reading


@arxiv.org | 4 years ago

Butterfly Transform: An Efficient FFT Based Neural Architecture Design

In this paper, we introduce the Butterfly Transform (BFT), a light weightchannel fusion method that reduces the computational complexity of point-wiseconvolutions from O(n^2) of conventional... | Continue reading


@arxiv.org | 4 years ago

Outrageously Large Neural Networks: The Sparsely-Gated Mixture-of-Experts Layer

The capacity of a neural network to absorb information is limited by itsnumber of parameters. Conditional computation, where parts of the network areactive on a per-example basis, has been... | Continue reading


@arxiv.org | 4 years ago

Graph Signal Processing: Overview, Challenges and Applications [pdf]

Research in Graph Signal Processing (GSP) aims to develop tools forprocessing data defined on irregular graph domains. In this paper we firstprovide an overview of core ideas in GSP and their... | Continue reading


@arxiv.org | 4 years ago

Finding friend and foe ā€“ Human-level performance in The Resistance: Avalon

Recent breakthroughs in AI for multi-agent games like Go, Poker, and Dota,have seen great strides in recent years. Yet none of these games address thereal-life challenge of cooperation in the... | Continue reading


@arxiv.org | 4 years ago

Ara: A 1 GHz+ Scalable and Energy-Efficient RISC-V Vector Processor

In this paper, we present Ara, a 64-bit vector processor based on the version0.5 draft of RISC-V's vector extension, implemented in GlobalFoundries 22FDXFD-SOI technology. Ara's... | Continue reading


@arxiv.org | 4 years ago

Does Object Recognition Work for Everyone?

The paper analyzes the accuracy of publicly available object-recognitionsystems on a geographically diverse dataset. This dataset contains householditems and was designed to have a more... | Continue reading


@arxiv.org | 4 years ago

Bialgebraic Semantics for String Diagrams

Turi and Plotkin's bialgebraic semantics is an abstract approach tospecifying the operational semantics of a system, by means of a distributivelaw between its syntax (encoded as a monad) and its... | Continue reading


@arxiv.org | 4 years ago

Autonomous Reinforcement Learning of Multiple Interrelated Tasks

Autonomous multiple tasks learning is a fundamental capability to developversatile artificial agents that can act in complex environments. In real-worldscenarios, tasks may be interrelated (or... | Continue reading


@arxiv.org | 4 years ago

Transferable Neural Projection Representations

Neural word representations are at the core of many state-of-the-art naturallanguage processing models. A widely used approach is to pre-train, store andlook up word or character embedding... | Continue reading


@arxiv.org | 4 years ago

Embedded hyper-parameter tuning by Simulated Annealing

We propose a new metaheuristic training scheme that combines StochasticGradient Descent (SGD) and Discrete Optimization in an unconventional way. Ouridea is to define a discrete neighborhood of... | Continue reading


@arxiv.org | 4 years ago

Deep Reasoning Networks: Thinking Fast and Slow

We introduce Deep Reasoning Networks (DRNets), an end-to-end framework thatcombines deep learning with reasoning for solving complex tasks, typically inan unsupervised or weakly-supervised... | Continue reading


@arxiv.org | 4 years ago

On the Impact of Programming Languages on Code Quality

This paper is a reproduction of work by Ray et al. which claimed to haveuncovered a statistically significant association between eleven programminglanguages and software defects in projects... | Continue reading


@arxiv.org | 4 years ago

Stochastic Computing for Hardware Implementation of Binarized Neural Networks

Binarized Neural Networks, a recently discovered class of neural networkswith minimal memory requirements and no reliance on multiplication, are afantastic opportunity for the realization of... | Continue reading


@arxiv.org | 4 years ago

Lecture Notes on Cāˆ—-Algebras, Hilbert Cāˆ—-Modules, and Quantum Mechanics

This is a graduate-level introduction to C*-algebras, Hilbert C*-modules,vector bundles, and induced representations of groups and C*-algebras, withapplications to quantization theory, phase... | Continue reading


@arxiv.org | 4 years ago

Studying Cultural Differences Using Emojis and Word2Vec

Global acceptance of Emojis suggests a cross-cultural, normative use ofEmojis. Meanwhile, nuances in Emoji use across cultures may also exist due tolinguistic differences in expressing emotions... | Continue reading


@arxiv.org | 4 years ago

Clustering Without Over-Representation (AI Research from Google)

In this paper we consider clustering problems in which each point is endowedwith a color. The goal is to cluster the points to minimize the classicalclustering cost but with the additional... | Continue reading


@arxiv.org | 4 years ago

A Topology Layer for Machine Learning (Stanford)

Topology applied to real world data using persistent homology has started tofind applications within machine learning, including deep learning. We presenta differentiable topology layer that... | Continue reading


@arxiv.org | 4 years ago

Instant Quantization of NN's Using Monte Carlo

Low bit-width integer weights and activations are very important forefficient inference, especially with respect to lower power consumption. Wepropose Monte Carlo methods to quantize the weights... | Continue reading


@arxiv.org | 4 years ago

SATNet: Bridging deep learning and logical reasoning with differentiable SAT

Integrating logical reasoning within deep learning architectures has been amajor goal of modern AI systems. In this paper, we propose a new directiontoward this goal by introducing a... | Continue reading


@arxiv.org | 4 years ago

Review of Deep Learning with Special Emphasis on Applications and Recent Trends

Deep learning (DL) has solved a problem that as little as five years ago wasthought by many to be intractable - the automatic recognition of patterns indata; and it can do so with accuracy that... | Continue reading


@arxiv.org | 4 years ago

GANs for Mitigating Bias in ML Systems

In this paper, we propose a new framework for mitigating biases in machinelearning systems. The problem of the existing mitigation approaches is thatthey are model-oriented in the sense that... | Continue reading


@arxiv.org | 4 years ago

Natural Compression for Deep Learning Networks

Due to their hunger for big data, modern deep learning models are trained inparallel, often in distributed environments, where communication of modelupdates is the bottleneck. Various update... | Continue reading


@arxiv.org | 4 years ago

How Often Do Single-Statement Bugs Occur? The ManySStuBs4J Dataset

Program repair is an important but difficult software engineering problem.One way to achieve a "sweet spot" of low false positive rates, whilemaintaining high enough recall to be usable, is to... | Continue reading


@arxiv.org | 4 years ago

Segmentation Is All You Need

Region proposal mechanisms are essential for existing deep learningapproaches to object detection in images. Although they can generally achieve agood detection performance under normal... | Continue reading


@arxiv.org | 4 years ago

The Role of Bot Squads in the Political Propaganda on Twitter

Social Media are nowadays the privileged channel for information spreadingand news checking. Unexpectedly for most of the users, automated accounts, alsoknown as social bots, contribute more and... | Continue reading


@arxiv.org | 4 years ago

Accelerating Gradient Boosting Machine

Gradient Boosting Machine (GBM) is an extremely powerful supervised learningalgorithm that is widely used in practice. GBM routinely features as a leadingalgorithm in machine learning... | Continue reading


@arxiv.org | 4 years ago

Connections Between Adaptive Control and Optimization in Machine Learning

This paper demonstrates many immediate connections between adaptive controland optimization methods commonly employed in machine learning. Starting fromcommon output error formulations,... | Continue reading


@arxiv.org | 4 years ago

An Explicitly Relational Neural Network Architecture

With a view to bridging the gap between deep learning and symbolic AI, wepresent a novel end-to-end neural network architecture that learns to formpropositional representations with an... | Continue reading


@arxiv.org | 4 years ago

Brown Dwarf Atmospheres as Potential Sites for Life

We show that the total habitable volume in the atmospheres of cool browndwarfs with effective temperatures of $\sim 250$-$350$ K is possibly larger bytwo orders of magnitude than that of... | Continue reading


@arxiv.org | 4 years ago

Cold Case: The Lost Mnist Digits

Although the popular MNIST dataset [LeCun et al., 1994] is derived from theNIST database [Grother and Hanaoka, 1995], the precise processing steps forthis derivation have been lost to time. We... | Continue reading


@arxiv.org | 4 years ago

Sparse Architecture Search for CNNs on Resource-Constrained Microcontrollers

The vast majority of processors in the world are actually microcontrollerunits (MCUs), which find widespread use performing simple control tasks inapplications ranging from automobiles to... | Continue reading


@arxiv.org | 4 years ago

Exploiting Uncertainty of Loss Landscape for Stochastic Optimization

We introduce novel variants of momentum by incorporating the variance of thestochastic loss function. The variance characterizes the confidence oruncertainty of the local features of the... | Continue reading


@arxiv.org | 4 years ago

Defect-Free Assembly of 2D Clusters of More Than 100 Single-Atom Quantum [pdf]

We demonstrate the defect-free assembly of versatile target patterns of up111 neutral atoms, building on a 361-site subset of a micro-opticalarchitecture that readily provides thousands of sites... | Continue reading


@arxiv.org | 4 years ago

The Bloom Clock

The bloom clock is a space-efficient, probabilistic data structure designedto determine the partial order of events in highly distributed systems. Thebloom clock, like the vector clock, can... | Continue reading


@arxiv.org | 4 years ago

Fallout: Reading Kernel Writes from User Space

Recently, out-of-order execution, an important performance optimization inmodern high-end processors, has been revealed to pose a significant securitythreat, allowing information leaks across... | Continue reading


@arxiv.org | 4 years ago

One SQL to Rule Them All: Management of Streams and Tables

Real-time data analysis and management are increasingly critical for today`sbusinesses. SQL is the de facto lingua franca for these endeavors, yet supportfor robust streaming analysis and... | Continue reading


@arxiv.org | 4 years ago

AI Feynman: A Physics-Inspired Method for Symbolic Regression

A core challenge for both physics and artificial intellicence (AI) issymbolic regression: finding a symbolic expression that matches data from anunknown function. Although this problem is likely... | Continue reading


@arxiv.org | 4 years ago

Fast Reciprocal Collision Avoidance Under Measurement Uncertainty

We present a fully distributed collision avoidance algorithm based on convexoptimization for a team of mobile robots. This method addresses the practicalcase in which agents sense each other via... | Continue reading


@arxiv.org | 4 years ago

Defending Against Neural Fake News (Using GPT to Generate Fake News and Demo)

Recent progress in natural language generation has raised dual-use concerns.While applications like summarization and translation are positive, theunderlying technology also might enable... | Continue reading


@arxiv.org | 4 years ago

EfficientNet: Rethinking Model Scaling for Convolutional Neural Networks

Convolutional Neural Networks (ConvNets) are commonly developed at a fixedresource budget, and then scaled up for better accuracy if more resources areavailable. In this paper, we systematically... | Continue reading


@arxiv.org | 4 years ago

Emergence of Exploitation as Symmetry Breaking in Iterated Prisoner's Dilemma

In society, mutual cooperation, defection, and asymmetric exploitativerelationships are common. Whereas cooperation and defection are studiedextensively in the literature on game theory,... | Continue reading


@arxiv.org | 4 years ago