October 18, 2019

2664 words 13 mins read

Paper Group ANR 601

Paper Group ANR 601

An Anchor-Free Region Proposal Network for Faster R-CNN based Text Detection Approaches. Model-based active learning to detect isometric deformable objects in the wild with deep architectures. Reservoir Computing Universality With Stochastic Inputs. Learning Paths from Signature Tensors. Tourist Navigation in Android Smartphone by using Emotion Gen …

An Anchor-Free Region Proposal Network for Faster R-CNN based Text Detection Approaches

Title An Anchor-Free Region Proposal Network for Faster R-CNN based Text Detection Approaches
Authors Zhuoyao Zhong, Lei Sun, Qiang Huo
Abstract The anchor mechanism of Faster R-CNN and SSD framework is considered not effective enough to scene text detection, which can be attributed to its IoU based matching criterion between anchors and ground-truth boxes. In order to better enclose scene text instances of various shapes, it requires to design anchors of various scales, aspect ratios and even orientations manually, which makes anchor-based methods sophisticated and inefficient. In this paper, we propose a novel anchor-free region proposal network (AF-RPN) to replace the original anchor-based RPN in the Faster R-CNN framework to address the above problem. Compared with a vanilla RPN and FPN-RPN, AF-RPN can get rid of complicated anchor design and achieve higher recall rate on large-scale COCO-Text dataset. Owing to the high-quality text proposals, our Faster R-CNN based two-stage text detection approach achieves state-of-the-art results on ICDAR-2017 MLT, ICDAR-2015 and ICDAR-2013 text detection benchmarks when using single-scale and single-model (ResNet50) testing only.
Tasks Scene Text Detection
Published 2018-04-24
URL http://arxiv.org/abs/1804.09003v1
PDF http://arxiv.org/pdf/1804.09003v1.pdf
PWC https://paperswithcode.com/paper/an-anchor-free-region-proposal-network-for
Repo
Framework

Model-based active learning to detect isometric deformable objects in the wild with deep architectures

Title Model-based active learning to detect isometric deformable objects in the wild with deep architectures
Authors Shrinivasan Sankar, Adrien Bartoli
Abstract In the recent past, algorithms based on Convolutional Neural Networks (CNNs) have achieved significant milestones in object recognition. With large examples of each object class, standard datasets train well for inter-class variability. However, gathering sufficient data to train for a particular instance of an object within a class is impractical. Furthermore, quantitatively assessing the imaging conditions for each image in a given dataset is not feasible. By generating sufficient images with known imaging conditions, we study to what extent CNNs can cope with hard imaging conditions for instance-level recognition in an active learning regime. Leveraging powerful rendering techniques to achieve instance-level detection, we present results of training three state-of-the-art object detection algorithms namely, Fast R-CNN, Faster R-CNN and YOLO9000, for hard imaging conditions imposed into the scene by rendering. Our extensive experiments produce a mean Average Precision score of 0.92 on synthetic images and 0.83 on real images using the best performing Faster R-CNN. We show for the first time how well detection algorithms based on deep architectures fare for each hard imaging condition studied.
Tasks Active Learning, Object Detection, Object Recognition
Published 2018-06-07
URL http://arxiv.org/abs/1806.02850v1
PDF http://arxiv.org/pdf/1806.02850v1.pdf
PWC https://paperswithcode.com/paper/model-based-active-learning-to-detect
Repo
Framework

Reservoir Computing Universality With Stochastic Inputs

Title Reservoir Computing Universality With Stochastic Inputs
Authors Lukas Gonon, Juan-Pablo Ortega
Abstract The universal approximation properties with respect to $L ^p $-type criteria of three important families of reservoir computers with stochastic discrete-time semi-infinite inputs is shown. First, it is proved that linear reservoir systems with either polynomial or neural network readout maps are universal. More importantly, it is proved that the same property holds for two families with linear readouts, namely, trigonometric state-affine systems and echo state networks, which are the most widely used reservoir systems in applications. The linearity in the readouts is a key feature in supervised machine learning applications. It guarantees that these systems can be used in high-dimensional situations and in the presence of large datasets. The $L ^p $ criteria used in this paper allow the formulation of universality results that do not necessarily impose almost sure uniform boundedness in the inputs or the fading memory property in the filter that needs to be approximated.
Tasks
Published 2018-07-07
URL http://arxiv.org/abs/1807.02621v1
PDF http://arxiv.org/pdf/1807.02621v1.pdf
PWC https://paperswithcode.com/paper/reservoir-computing-universality-with
Repo
Framework

Learning Paths from Signature Tensors

Title Learning Paths from Signature Tensors
Authors Max Pfeffer, Anna Seigal, Bernd Sturmfels
Abstract Matrix congruence extends naturally to the setting of tensors. We apply methods from tensor decomposition, algebraic geometry and numerical optimization to this group action. Given a tensor in the orbit of another tensor, we compute a matrix which transforms one to the other. Our primary application is an inverse problem from stochastic analysis: the recovery of paths from their third order signature tensors. We establish identifiability results, both exact and numerical, for piecewise linear paths, polynomial paths, and generic dictionaries. Numerical optimization is applied for recovery from inexact data. We also compute the shortest path with a given signature tensor.
Tasks
Published 2018-09-05
URL http://arxiv.org/abs/1809.01588v2
PDF http://arxiv.org/pdf/1809.01588v2.pdf
PWC https://paperswithcode.com/paper/learning-paths-from-signature-tensors
Repo
Framework

Tourist Navigation in Android Smartphone by using Emotion Generating Calculations and Mental State Transition Networks

Title Tourist Navigation in Android Smartphone by using Emotion Generating Calculations and Mental State Transition Networks
Authors Takumi Ichimura, Kosuke Tanabe, Issei Tachibana
Abstract Mental State Transition Network which consists of mental states connected to each other is a basic concept of approximating to human psychological and mental responses. It can represent transition from an emotional state to other one with stimulus by calculating Emotion Generating Calculations method. A computer agent can transit a mental state in MSTN based on analysis of emotion by EGC method. In this paper, the Andorid EGC which the agent works in Android smartphone can evaluate the feelings in the conversation. The tourist navigation system with the proposed technique in this paper will be expected to be an emotional oriented interface in Android smartphone.
Tasks
Published 2018-04-08
URL http://arxiv.org/abs/1805.00307v1
PDF http://arxiv.org/pdf/1805.00307v1.pdf
PWC https://paperswithcode.com/paper/tourist-navigation-in-android-smartphone-by
Repo
Framework

Generative Adversarial Networks for Recovering Missing Spectral Information

Title Generative Adversarial Networks for Recovering Missing Spectral Information
Authors Dung N. Tran, Trac D. Tran, Lam Nguyen
Abstract Ultra-wideband (UWB) radar systems nowadays typical operate in the low frequency spectrum to achieve penetration capability. However, this spectrum is also shared by many others communication systems, which causes missing information in the frequency bands. To recover this missing spectral information, we propose a generative adversarial network, called SARGAN, that learns the relationship between original and missing band signals by observing these training pairs in a clever way. Initial results shows that this approach is promising in tackling this challenging missing band problem.
Tasks
Published 2018-12-11
URL http://arxiv.org/abs/1812.04744v2
PDF http://arxiv.org/pdf/1812.04744v2.pdf
PWC https://paperswithcode.com/paper/generative-adversarial-networks-for
Repo
Framework

Goldbach’s Function Approximation Using Deep Learning

Title Goldbach’s Function Approximation Using Deep Learning
Authors Avigail Stekel, Merav Chkroun, Amos Azaria
Abstract Goldbach conjecture is one of the most famous open mathematical problems. It states that every even number, bigger than two, can be presented as a sum of 2 prime numbers. % In this work we present a deep learning based model that predicts the number of Goldbach partitions for a given even number. Surprisingly, our model outperforms all state-of-the-art analytically derived estimations for the number of couples, while not requiring prime factorization of the given number. We believe that building a model that can accurately predict the number of couples brings us one step closer to solving one of the world most famous open problems. To the best of our knowledge, this is the first attempt to consider machine learning based data-driven methods to approximate open mathematical problems in the field of number theory, and hope that this work will encourage such attempts.
Tasks
Published 2018-03-25
URL http://arxiv.org/abs/1803.09237v1
PDF http://arxiv.org/pdf/1803.09237v1.pdf
PWC https://paperswithcode.com/paper/goldbachs-function-approximation-using-deep
Repo
Framework

Characterizing Audio Adversarial Examples Using Temporal Dependency

Title Characterizing Audio Adversarial Examples Using Temporal Dependency
Authors Zhuolin Yang, Bo Li, Pin-Yu Chen, Dawn Song
Abstract Recent studies have highlighted adversarial examples as a ubiquitous threat to different neural network models and many downstream applications. Nonetheless, as unique data properties have inspired distinct and powerful learning principles, this paper aims to explore their potentials towards mitigating adversarial inputs. In particular, our results reveal the importance of using the temporal dependency in audio data to gain discriminate power against adversarial examples. Tested on the automatic speech recognition (ASR) tasks and three recent audio adversarial attacks, we find that (i) input transformation developed from image adversarial defense provides limited robustness improvement and is subtle to advanced attacks; (ii) temporal dependency can be exploited to gain discriminative power against audio adversarial examples and is resistant to adaptive attacks considered in our experiments. Our results not only show promising means of improving the robustness of ASR systems, but also offer novel insights in exploiting domain-specific data properties to mitigate negative effects of adversarial examples.
Tasks Adversarial Defense, Speech Recognition
Published 2018-09-28
URL https://arxiv.org/abs/1809.10875v2
PDF https://arxiv.org/pdf/1809.10875v2.pdf
PWC https://paperswithcode.com/paper/characterizing-audio-adversarial-examples
Repo
Framework

Adversarial Defense via Data Dependent Activation Function and Total Variation Minimization

Title Adversarial Defense via Data Dependent Activation Function and Total Variation Minimization
Authors Bao Wang, Alex T. Lin, Zuoqiang Shi, Wei Zhu, Penghang Yin, Andrea L. Bertozzi, Stanley J. Osher
Abstract We improve the robustness of deep neural nets to adversarial attacks by using an interpolating function as the output activation. This data-dependent activation remarkably improves both generalization and robustness towards adversarial attacks. In the CIFAR10 benchmark, we raise the accuracy of the Projected Gradient Descent adversarial training from $\sim 46%$ to $\sim 69%$ for ResNet20. When we combine this data-dependent activation with total variation minimization on adversarial images and training data augmentation, we achieve an improvement in accuracy by 38.9$%$ for ResNet56 under the strongest attack of the Iterative Fast Gradient Sign Method. We further provide an intuitive explanation of our defense by analyzing the geometry of the feature space. For reproducibility, the code is made available at \url{https://github.com/BaoWangMath/DNN-DataDependentActivation}.
Tasks Adversarial Defense, Data Augmentation
Published 2018-09-23
URL http://arxiv.org/abs/1809.08516v2
PDF http://arxiv.org/pdf/1809.08516v2.pdf
PWC https://paperswithcode.com/paper/adversarial-defense-via-data-dependent
Repo
Framework

Defense Against Adversarial Attacks with Saak Transform

Title Defense Against Adversarial Attacks with Saak Transform
Authors Sibo Song, Yueru Chen, Ngai-Man Cheung, C. -C. Jay Kuo
Abstract Deep neural networks (DNNs) are known to be vulnerable to adversarial perturbations, which imposes a serious threat to DNN-based decision systems. In this paper, we propose to apply the lossy Saak transform to adversarially perturbed images as a preprocessing tool to defend against adversarial attacks. Saak transform is a recently-proposed state-of-the-art for computing the spatial-spectral representations of input images. Empirically, we observe that outputs of the Saak transform are very discriminative in differentiating adversarial examples from clean ones. Therefore, we propose a Saak transform based preprocessing method with three steps: 1) transforming an input image to a joint spatial-spectral representation via the forward Saak transform, 2) apply filtering to its high-frequency components, and, 3) reconstructing the image via the inverse Saak transform. The processed image is found to be robust against adversarial perturbations. We conduct extensive experiments to investigate various settings of the Saak transform and filtering functions. Without harming the decision performance on clean images, our method outperforms state-of-the-art adversarial defense methods by a substantial margin on both the CIFAR-10 and ImageNet datasets. Importantly, our results suggest that adversarial perturbations can be effectively and efficiently defended using state-of-the-art frequency analysis.
Tasks Adversarial Defense
Published 2018-08-06
URL http://arxiv.org/abs/1808.01785v1
PDF http://arxiv.org/pdf/1808.01785v1.pdf
PWC https://paperswithcode.com/paper/defense-against-adversarial-attacks-with-saak
Repo
Framework

Off the Beaten Track: Using Deep Learning to Interpolate Between Music Genres

Title Off the Beaten Track: Using Deep Learning to Interpolate Between Music Genres
Authors Tijn Borghuis, Alessandro Tibo, Simone Conforti, Luca Canciello, Lorenzo Brusci, Paolo Frasconi
Abstract We describe a system based on deep learning that generates drum patterns in the electronic dance music domain. Experimental results reveal that generated patterns can be employed to produce musically sound and creative transitions between different genres, and that the process of generation is of interest to practitioners in the field.
Tasks
Published 2018-04-25
URL http://arxiv.org/abs/1804.09808v2
PDF http://arxiv.org/pdf/1804.09808v2.pdf
PWC https://paperswithcode.com/paper/off-the-beaten-track-using-deep-learning-to
Repo
Framework

Fast Locality Sensitive Hashing for Beam Search on GPU

Title Fast Locality Sensitive Hashing for Beam Search on GPU
Authors Xing Shi, Shizhen Xu, Kevin Knight
Abstract We present a GPU-based Locality Sensitive Hashing (LSH) algorithm to speed up beam search for sequence models. We utilize the winner-take-all (WTA) hash, which is based on relative ranking order of hidden dimensions and thus resilient to perturbations in numerical values. Our algorithm is designed by fully considering the underling architecture of CUDA-enabled GPUs (Algorithm/Architecture Co-design): 1) A parallel Cuckoo hash table is applied for LSH code lookup (guaranteed O(1) lookup time); 2) Candidate lists are shared across beams to maximize the parallelism; 3) Top frequent words are merged into candidate lists to improve performance. Experiments on 4 large-scale neural machine translation models demonstrate that our algorithm can achieve up to 4x speedup on softmax module, and 2x overall speedup without hurting BLEU on GPU.
Tasks Machine Translation
Published 2018-06-02
URL http://arxiv.org/abs/1806.00588v1
PDF http://arxiv.org/pdf/1806.00588v1.pdf
PWC https://paperswithcode.com/paper/fast-locality-sensitive-hashing-for-beam
Repo
Framework

Generative Adversarial Networks for Realistic Synthesis of Hyperspectral Samples

Title Generative Adversarial Networks for Realistic Synthesis of Hyperspectral Samples
Authors Nicolas Audebert, Bertrand Le Saux, Sébastien Lefèvre
Abstract This work addresses the scarcity of annotated hyperspectral data required to train deep neural networks. Especially, we investigate generative adversarial networks and their application to the synthesis of consistent labeled spectra. By training such networks on public datasets, we show that these models are not only able to capture the underlying distribution, but also to generate genuine-looking and physically plausible spectra. Moreover, we experimentally validate that the synthetic samples can be used as an effective data augmentation strategy. We validate our approach on several public hyper-spectral datasets using a variety of deep classifiers.
Tasks Data Augmentation
Published 2018-06-07
URL http://arxiv.org/abs/1806.02583v1
PDF http://arxiv.org/pdf/1806.02583v1.pdf
PWC https://paperswithcode.com/paper/generative-adversarial-networks-for-realistic
Repo
Framework

Exploring the importance of context and embeddings in neural NER models for task-oriented dialogue systems

Title Exploring the importance of context and embeddings in neural NER models for task-oriented dialogue systems
Authors Pratik Jayarao, Chirag Jain, Aman Srivastava
Abstract Named Entity Recognition (NER), a classic sequence labelling task, is an essential component of natural language understanding (NLU) systems in task-oriented dialog systems for slot filling. For well over a decade, different methods from lookup using gazetteers and domain ontology, classifiers over handcrafted features to end-to-end systems involving neural network architectures have been evaluated mostly in language-independent non-conversational settings. In this paper, we evaluate a modified version of the recent state of the art neural architecture in a conversational setting where messages are often short and noisy. We perform an array of experiments with different combinations of including the previous utterance in the dialogue as a source of additional features and using word and character level embeddings trained on a larger external corpus. All methods are evaluated on a combined dataset formed from two public English task-oriented conversational datasets belonging to travel and restaurant domains respectively. For additional evaluation, we also repeat some of our experiments after adding automatically translated and transliterated (from translated) versions to the English only dataset.
Tasks Named Entity Recognition, Slot Filling, Task-Oriented Dialogue Systems
Published 2018-12-06
URL http://arxiv.org/abs/1812.02370v1
PDF http://arxiv.org/pdf/1812.02370v1.pdf
PWC https://paperswithcode.com/paper/exploring-the-importance-of-context-and
Repo
Framework

Customizing an Adversarial Example Generator with Class-Conditional GANs

Title Customizing an Adversarial Example Generator with Class-Conditional GANs
Authors Shih-hong Tsai
Abstract Adversarial examples are intentionally crafted data with the purpose of deceiving neural networks into misclassification. When we talk about strategies to create such examples, we usually refer to perturbation-based methods that fabricate adversarial examples by applying invisible perturbations onto normal data. The resulting data reserve their visual appearance to human observers, yet can be totally unrecognizable to DNN models, which in turn leads to completely misleading predictions. In this paper, however, we consider crafting adversarial examples from existing data as a limitation to example diversity. We propose a non-perturbation-based framework that generates native adversarial examples from class-conditional generative adversarial networks.As such, the generated data will not resemble any existing data and thus expand example diversity, raising the difficulty in adversarial defense. We then extend this framework to pre-trained conditional GANs, in which we turn an existing generator into an “adversarial-example generator”. We conduct experiments on our approach for MNIST and CIFAR10 datasets and have satisfactory results, showing that this approach can be a potential alternative to previous attack strategies.
Tasks Adversarial Defense
Published 2018-06-27
URL http://arxiv.org/abs/1806.10496v1
PDF http://arxiv.org/pdf/1806.10496v1.pdf
PWC https://paperswithcode.com/paper/customizing-an-adversarial-example-generator
Repo
Framework
comments powered by Disqus