Tradeoff Btween Utility and Risk of Location Data & Implications for Public Good

High-resolution individual geolocation data passively collected from mobilephones is increasingly sold in private markets and shared with researchers.This data poses significant security,... | Continue reading


@arxiv.org | 4 years ago

The action and the physical scale of field theory

The action of the field theory is a generating functional for the equationsof physics. It is introduced axiomatically by the kernel of the evolutionequation. Mathematical consistency requires... | Continue reading


@arxiv.org | 4 years ago

Deep learning can now prove half of what expert mathematicians can

This paper presents the first use of graph neural networks (GNNs) forhigher-order proof search and demonstrates that GNNs can improve uponstate-of-the-art results in this domain. Interactive,... | Continue reading


@arxiv.org | 4 years ago

Why Mathematics Works So Well [pdf]

A major question in philosophy of science involves the unreasonableeffectiveness of mathematics in physics. Why should mathematics, created ordiscovered, with nothing empirical in mind be so... | Continue reading


@arxiv.org | 4 years ago

Network Deconvolution (a strong alternative to BatchNorm, with code)

Convolution is a central operation in Convolutional Neural Networks (CNNs),which applies a kernel or mask to overlapping regions shifted across the image.In this work we show that the underlying... | Continue reading


@arxiv.org | 4 years ago

Cerberus: A Multi-Headed Derenderer

To generalize to novel visual scenes with new viewpoints and new objectposes, a visual system needs representations of the shapes of the parts of anobject that are invariant to changes in... | Continue reading


@arxiv.org | 4 years ago

Fair Is Better Than Sensational:Man Is to Doctor as Woman Is to Doctor [pdf]

Analogies such as man is to king as woman is to X are often used toillustrate the amazing power of word embeddings. Concurrently, they have alsoexposed how strongly human biases are encoded in... | Continue reading


@arxiv.org | 4 years ago

Reinforcement Leaning in Feature Space: Matrix Bandit, Kernels, and Regret Bound

Exploration in reinforcement learning (RL) suffers from the curse ofdimensionality when the state-action space is large. A common practice is toparameterize the high-dimensional value and policy... | Continue reading


@arxiv.org | 4 years ago

Robot folding towels after training in simulation using Deep RL

We have seen much recent progress in rigid object manipulation, butinteraction with deformable objects has notably lagged behind. Due to the largeconfiguration space of deformable objects,... | Continue reading


@arxiv.org | 4 years ago

On fast probabilistic consensus in the Byzantine setting

In this paper we discuss a leaderless protocol of low communicationalcomplexity which allows a set of nodes to come to a consensus on a value of abit. In addition, we assume that part of the... | Continue reading


@arxiv.org | 4 years ago

Bandwidth-Efficient Transaction Relay

Bitcoin is a top-ranked cryptocurrency that has experienced huge growth andsurvived numerous attacks. The protocols making up Bitcoin must thereforeaccommodate the growth of the network and... | Continue reading


@arxiv.org | 4 years ago

Disentangling Style and Content in Anime Illustrations

Existing methods for AI-generated artworks still struggle with generatinghigh-quality stylized content, where high-level semantics are preserved, orseparating fine-grained styles from various... | Continue reading


@arxiv.org | 4 years ago

From Here to There: Video Inbetweening Using Direct 3D Convolutions

We consider the problem of generating plausible and diverse video sequences,when we are only given a start and an end frame. This task is also known asinbetweening, and it belongs to the broader... | Continue reading


@arxiv.org | 4 years ago

SpecFuzz – How to make Spectre visible to fuzzers

SpecFuzz is the first tool that enables dynamic testing for speculativeexecution vulnerabilities (e.g., Spectre). The key is the concept ofspeculation exposure: The program is instrumented to... | Continue reading


@arxiv.org | 4 years ago

In-DRAM Bulk Bitwise Execution Engine

Many applications heavily use bitwise operations on large bitvectors as partof their computation. In existing systems, performing such bulk bitwiseoperations requires the processor to transfer a... | Continue reading


@arxiv.org | 4 years ago

Locating Patterns in the De Bruijn Torus (2015) [pdf]

The de Bruijn torus (or grid) problem looks to find an $n$-by-$m$ binarymatrix in which every possible $j$-by-$k$ submatrix appears exactly once. Theexistence and construction of these binary... | Continue reading


@arxiv.org | 4 years ago

Onion Curve: A Space Filling Curve with Near-Optimal Clustering [pdf]

Space filling curves (SFCs) are widely used in the design of indexes forspatial and temporal data. Clustering is a key metric for an SFC, that measureshow well the curve preserves locality in... | Continue reading


@arxiv.org | 4 years ago

Speech2Face: Learning the Face Behind a Voice [pdf]

How much can we infer about a person's looks from the way they speak? In thispaper, we study the task of reconstructing a facial image of a person from ashort audio recording of that person... | Continue reading


@arxiv.org | 4 years ago

Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking

Browser fingerprinting is a relatively new method of uniquely identifyingbrowsers that can be used to track web users. In some ways it is moreprivacy-threatening than tracking via cookies, as... | Continue reading


@arxiv.org | 4 years ago

Speech2Face: Learning the Face Behind a Voice

How much can we infer about a person's looks from the way they speak? In thispaper, we study the task of reconstructing a facial image of a person from ashort audio recording of that person... | Continue reading


@arxiv.org | 4 years ago

Practical Lossless Compression with Latent Variables Using Bits Back Coding [pdf]

Deep latent variable models have seen recent success in many data domains.Lossless compression is an application of these models which, despite havingthe potential to be highly useful, has yet... | Continue reading


@arxiv.org | 4 years ago

Supernova signals of light dark matter

Dark matter direct detection experiments have poor sensitivity to a galacticpopulation of dark matter with mass below the GeV scale. However, such darkmatter can be produced copiously in... | Continue reading


@arxiv.org | 4 years ago

Interference of Clocks: A Quantum Twin Paradox

The phase of matter waves depends on proper time and is therefore susceptibleto special-relativistic (kinematic) and gravitational time dilation (redshift).Hence, it is conceivable that atom... | Continue reading


@arxiv.org | 4 years ago

Black Holes in the Quantum Universe

A succinct summary is given of the problem of reconciling observation ofblack hole-like objects with quantum mechanics. If quantum black holes behavelike subsystems, and also decay, their... | Continue reading


@arxiv.org | 4 years ago

How to factor 2048 bit RSA integers in 8 hours using 20M noisy qubits

We significantly reduce the cost of factoring integers and computing discretelogarithms over finite fields on a quantum computer by combining techniquesfrom Griffiths-Niu 1996, Zalka 2006,... | Continue reading


@arxiv.org | 4 years ago

Towards Neural Decompilation

We address the problem of automatic decompilation, converting a program inlow-level representation back to a higher-level human-readable programminglanguage. The problem of decompilation is... | Continue reading


@arxiv.org | 4 years ago

Yoshua Bengio: Unsupervised Learning of Influential Trajectories

Unsupervised exploration and representation learning become increasinglyimportant when learning in diverse and sparse environments. Theinformation-theoretic principle of empowerment formalizes... | Continue reading


@arxiv.org | 4 years ago

Hey Google, What Do Your Security Patches Tell Us?

In this paper, we perform a comprehensive study of 2,470 patched Androidvulnerabilities that we collect from different data sources such as Androidsecurity bulletins, CVEDetails, Qualcomm Code... | Continue reading


@arxiv.org | 4 years ago

Instructions' Latencies Characterization for Nvidia GPGPUs

The last decade has seen a shift in the computer systems industry whereheterogeneous computing has become prevalent. Nowadays, Graphics ProcessingUnits (GPUs) are in a variety of systems from... | Continue reading


@arxiv.org | 4 years ago

The Convolutional Tsetlin Machine Peaks at 99.51% Accuracy on Mnist

Deep neural networks have obtained astounding successes for important patternrecognition tasks, but they suffer from high computational complexity and thelack of interpretability. The recent... | Continue reading


@arxiv.org | 4 years ago

Few-Shot Adversarial Learning of Realistic Neural Talking Head Models

Several recent works have shown how highly realistic human head images can beobtained by training convolutional neural networks to generate them. In orderto create a personalized talking head... | Continue reading


@arxiv.org | 4 years ago

ConTExT: Leakage-Free Transient Execution

Out-of-order execution and speculative execution are among the biggestcontributors to performance and efficiency of modern processors. However, theyare inconsiderate, leaking secret data during... | Continue reading


@arxiv.org | 4 years ago

Your display contents may be traced by the sound of it using ordinary microphone

We show that subtle acoustic noises emanating from within computer screenscan be used to detect the content displayed on the screens. This sound can bepicked up by ordinary microphones built... | Continue reading


@arxiv.org | 4 years ago

FastSpeech: Fast, Robust and Controllable Text to Speech

Neural network based end-to-end text to speech (TTS) has significantlyimproved the quality of synthesized speech. Prominent methods (e.g., Tacotron2) usually first generate mel-spectrogram from... | Continue reading


@arxiv.org | 4 years ago

The Sparse Manifold Transform

We present a signal representation framework called the sparse manifoldtransform that combines key ideas from sparse coding, manifold learning, andslow feature analysis. It turns non-linear... | Continue reading


@arxiv.org | 4 years ago

A Bayesian Approach to Robust Reinforcement Learning

Robust Markov Decision Processes (RMDPs) intend to ensure robustness withrespect to changing or adversarial system behavior. In this framework,transitions are modeled as arbitrary elements of a... | Continue reading


@arxiv.org | 4 years ago

PaperRobot: Incremental Draft Generation of Scientific Ideas

We present a PaperRobot who performs as an automatic research assistant by(1) conducting deep understanding of a large collection of human-written papersin a target domain and constructing... | Continue reading


@arxiv.org | 4 years ago

A Case Study: Exploiting Neural Machine Translation to Translate CUDA to OpenCL

The sequence-to-sequence (seq2seq) model for neural machine translation hassignificantly improved the accuracy of language translation. There have beennew efforts to use this seq2seq model for... | Continue reading


@arxiv.org | 4 years ago

Integrating Artificial Intelligence into Weapon Systems

The integration of Artificial Intelligence (AI) into weapon systems is one ofthe most consequential tactical and strategic decisions in the history ofwarfare. Current AI development is a... | Continue reading


@arxiv.org | 4 years ago

Deep Compressed Sensing

Compressed sensing (CS) provides an elegant framework for recovering sparsesignals from compressed measurements. For example, CS can exploit the structureof natural images and recover an image... | Continue reading


@arxiv.org | 4 years ago

An interdisciplinary survey of network similarity methods

Comparative graph and network analysis play an important role in both systemsbiology and pattern recognition, but existing surveys on the topic havehistorically ignored or underserved one or the... | Continue reading


@arxiv.org | 4 years ago

Parallel decompression of gzip-compressed files

Decompressing a file made by the gzip program at an arbitrary location is inprinciple impossible, due to the nature of the DEFLATE compression algorithm.Consequently, no existing program can... | Continue reading


@arxiv.org | 4 years ago

Detecting Stealthy Attacks Using Group Anomaly Detection

Advanced attack campaigns span across multiple stages and stay stealthy forlong time periods. There is a growing trend of attackers using off-the-shelftools and pre-installed system applications... | Continue reading


@arxiv.org | 4 years ago

Generate High-Fidelity Pedestrian Images for Training Deeply-Learned Models

Person re-identification (re-id) remains challenging due to significantintra-class variations across different cameras. Recently, there has been agrowing interest in using generative models to... | Continue reading


@arxiv.org | 4 years ago

FPGA-Based Binocular Image Feature Extraction and Matching System

Image feature extraction and matching is a fundamental but computationintensive task in machine vision. This paper proposes a novel FPGA-basedembedded system to accelerate feature extraction and... | Continue reading


@arxiv.org | 4 years ago

Why (and How) networks should run themselves?

The proliferation of networked devices, systems, and applications that wedepend on every day makes managing networks more important than ever. Theincreasing security, availability, and... | Continue reading


@arxiv.org | 4 years ago

When will we have a quantum computer? [pdf]

At a given moment, the state of the hypothetical quantum computer with Nqubits is characterized by 2^N quantum amplitudes, which are complex continuousvariables restricted by the normalization... | Continue reading


@arxiv.org | 4 years ago

When Deep Learning Met Code Search (FB Research)

There have been multiple recent proposals on using deep neural networks forcode search using natural language. Common across these proposals is the ideaof $\mathit{embedding}$ code and natural... | Continue reading


@arxiv.org | 4 years ago