January 27, 2020

2945 words 14 mins read

Paper Group ANR 1241

Paper Group ANR 1241

Grounded Agreement Games: Emphasizing Conversational Grounding in Visual Dialogue Settings. Real-world Conversational AI for Hotel Bookings. Extract and Edit: An Alternative to Back-Translation for Unsupervised Neural Machine Translation. A Complete Classification of the Complexity and Rewritability of Ontology-Mediated Queries based on the Descrip …

Grounded Agreement Games: Emphasizing Conversational Grounding in Visual Dialogue Settings

Title Grounded Agreement Games: Emphasizing Conversational Grounding in Visual Dialogue Settings
Authors David Schlangen
Abstract Where early work on dialogue in Computational Linguistics put much emphasis on dialogue structure and its relation to the mental states of the dialogue participants (e.g., Allen 1979, Grosz & Sidner 1986), current work mostly reduces dialogue to the task of producing at any one time a next utterance; e.g. in neural chatbot or Visual Dialogue settings. As a methodological decision, this is sound: Even the longest journey is a sequence of steps. It becomes detrimental, however, when the tasks and datasets from which dialogue behaviour is to be learned are tailored too much to this framing of the problem. In this short note, we describe a family of settings which still allow to keep dialogues simple, but add a constraint that makes participants care about reaching mutual understanding. In such agreement games, there is a secondary, but explicit goal besides the task level goal, and that is to reach mutual understanding about whether the task level goal has been reached. As we argue, this naturally triggers meta-semantic interaction and mutual engagement, and hence leads to richer data from which to induce models.
Tasks Chatbot, Visual Dialog
Published 2019-08-29
URL https://arxiv.org/abs/1908.11279v1
PDF https://arxiv.org/pdf/1908.11279v1.pdf
PWC https://paperswithcode.com/paper/grounded-agreement-games-emphasizing
Repo
Framework

Real-world Conversational AI for Hotel Bookings

Title Real-world Conversational AI for Hotel Bookings
Authors Bai Li, Nanyi Jiang, Joey Sham, Henry Shi, Hussein Fazal
Abstract In this paper, we present a real-world conversational AI system to search for and book hotels through text messaging. Our architecture consists of a frame-based dialogue management system, which calls machine learning models for intent classification, named entity recognition, and information retrieval subtasks. Our chatbot has been deployed on a commercial scale, handling tens of thousands of hotel searches every day. We describe the various opportunities and challenges of developing a chatbot in the travel industry.
Tasks Chatbot, Dialogue Management, Information Retrieval, Intent Classification, Named Entity Recognition
Published 2019-08-27
URL https://arxiv.org/abs/1908.10001v1
PDF https://arxiv.org/pdf/1908.10001v1.pdf
PWC https://paperswithcode.com/paper/real-world-conversational-ai-for-hotel
Repo
Framework

Extract and Edit: An Alternative to Back-Translation for Unsupervised Neural Machine Translation

Title Extract and Edit: An Alternative to Back-Translation for Unsupervised Neural Machine Translation
Authors Jiawei Wu, Xin Wang, William Yang Wang
Abstract The overreliance on large parallel corpora significantly limits the applicability of machine translation systems to the majority of language pairs. Back-translation has been dominantly used in previous approaches for unsupervised neural machine translation, where pseudo sentence pairs are generated to train the models with a reconstruction loss. However, the pseudo sentences are usually of low quality as translation errors accumulate during training. To avoid this fundamental issue, we propose an alternative but more effective approach, extract-edit, to extract and then edit real sentences from the target monolingual corpora. Furthermore, we introduce a comparative translation loss to evaluate the translated target sentences and thus train the unsupervised translation systems. Experiments show that the proposed approach consistently outperforms the previous state-of-the-art unsupervised machine translation systems across two benchmarks (English-French and English-German) and two low-resource language pairs (English-Romanian and English-Russian) by more than 2 (up to 3.63) BLEU points.
Tasks Machine Translation, Unsupervised Machine Translation
Published 2019-04-04
URL http://arxiv.org/abs/1904.02331v1
PDF http://arxiv.org/pdf/1904.02331v1.pdf
PWC https://paperswithcode.com/paper/extract-and-edit-an-alternative-to-back
Repo
Framework

A Complete Classification of the Complexity and Rewritability of Ontology-Mediated Queries based on the Description Logic EL

Title A Complete Classification of the Complexity and Rewritability of Ontology-Mediated Queries based on the Description Logic EL
Authors Carsten Lutz, Leif Sabellek
Abstract We provide an ultimately fine-grained analysis of the data complexity and rewritability of ontology-mediated queries (OMQs) based on an EL ontology and a conjunctive query (CQ). Our main results are that every such OMQ is in AC0, NL-complete, or PTime-complete and that containment in NL coincides with rewritability into linear Datalog (whereas containment in AC0 coincides with rewritability into first-order logic). We establish natural characterizations of the three cases in terms of bounded depth and (un)bounded pathwidth, and show that every of the associated meta problems such as deciding wether a given OMQ is rewritable into linear Datalog is ExpTime-complete. We also give a way to construct linear Datalog rewritings when they exist and prove that there is no constant Datalog rewritings.
Tasks
Published 2019-04-29
URL http://arxiv.org/abs/1904.12533v1
PDF http://arxiv.org/pdf/1904.12533v1.pdf
PWC https://paperswithcode.com/paper/a-complete-classification-of-the-complexity
Repo
Framework

Improvement of Multiparametric MR Image Segmentation by Augmenting the Data with Generative Adversarial Networks for Glioma Patients

Title Improvement of Multiparametric MR Image Segmentation by Augmenting the Data with Generative Adversarial Networks for Glioma Patients
Authors Eric Carver, Zhenzhen Dai, Evan Liang, James Snyder, Ning Wen
Abstract Every year thousands of patients are diagnosed with a glioma, a type of malignant brain tumor. Physicians use MR images as a key tool in the diagnosis and treatment of these patients. Neural networks show great potential to aid physicians in the medical image analysis. This study investigates the use of varying amounts of synthetic brain T1-weighted (T1), post-contrast T1-weighted (T1Gd), T2-weighted (T2), and T2 Fluid Attenuated Inversion Recovery (FLAIR) MR images created by a generative adversarial network to overcome the lack of annotated medical image data in training separate 2D U-Nets to segment enhancing tumor, peritumoral edema, and necrosis (non-enhancing tumor core) regions on gliomas. These synthetic MR images were assessed quantitively (SSIM=0.79) and qualitatively by a physician who found that the synthetic images seem stronger for delineation of structural boundaries but struggle more when gradient is significant, (e.g. edema signal in T2 modalities). Multiple 2D U-Nets were trained with original BraTS data and differing subsets of a quarter, half, three-quarters, and all synthetic MR images. There was not an obvious correlation between the improvement of values of the metrics in separate validation dataset for each structure and amount of synthetic data added, there is a strong correlation between the amount of synthetic data added and the number of best overall validation metrics. In summary, this study showed ability to generate high quality synthetic Flair, T2, T1, and T1CE MR images using the GAN. Using the synthetic MR images showed encouraging results to improve the U-Net segmentation performance which has the potential to address the scarcity of readily available medical images.
Tasks Semantic Segmentation
Published 2019-10-01
URL https://arxiv.org/abs/1910.00696v1
PDF https://arxiv.org/pdf/1910.00696v1.pdf
PWC https://paperswithcode.com/paper/improvement-of-multiparametric-mr-image
Repo
Framework

Embedded Deep Learning for Sleep Staging

Title Embedded Deep Learning for Sleep Staging
Authors Engin Türetken, Jérôme Van Zaen, Ricard Delgado-Gonzalo
Abstract The rapidly-advancing technology of deep learning (DL) into the world of the Internet of Things (IoT) has not fully entered in the fields of m-Health yet. Among the main reasons are the high computational demands of DL algorithms and the inherent resource-limitation of wearable devices. In this paper, we present initial results for two deep learning architectures used to diagnose and analyze sleep patterns, and we compare them with a previously presented hand-crafted algorithm. The algorithms are designed to be reliable for consumer healthcare applications and to be integrated into low-power wearables with limited computational resources.
Tasks
Published 2019-06-18
URL https://arxiv.org/abs/1906.09905v1
PDF https://arxiv.org/pdf/1906.09905v1.pdf
PWC https://paperswithcode.com/paper/embedded-deep-learning-for-sleep-staging
Repo
Framework

Using the Open Meta Kaggle Dataset to Evaluate Tripartite Recommendations in Data Markets

Title Using the Open Meta Kaggle Dataset to Evaluate Tripartite Recommendations in Data Markets
Authors Dominik Kowald, Matthias Traub, Dieter Theiler, Heimo Gursch, Emanuel Lacic, Stefanie Lindstaedt, Roman Kern, Elisabeth Lex
Abstract This work addresses the problem of providing and evaluating recommendations in data markets. Since most of the research in recommender systems is focused on the bipartite relationship between users and items (e.g., movies), we extend this view to the tripartite relationship between users, datasets and services, which is present in data markets. Between these entities, we identify four use cases for recommendations: (i) recommendation of datasets for users, (ii) recommendation of services for users, (iii) recommendation of services for datasets, and (iv) recommendation of datasets for services. Using the open Meta Kaggle dataset, we evaluate the recommendation accuracy of a popularity-based as well as a collaborative filtering-based algorithm for these four use cases and find that the recommendation accuracy strongly depends on the given use case. The presented work contributes to the tripartite recommendation problem in general and to the under-researched portfolio of evaluating recommender systems for data markets in particular.
Tasks Recommendation Systems
Published 2019-08-12
URL https://arxiv.org/abs/1908.04017v2
PDF https://arxiv.org/pdf/1908.04017v2.pdf
PWC https://paperswithcode.com/paper/using-the-open-meta-kaggle-dataset-to
Repo
Framework

SkeletonNet: Shape Pixel to Skeleton Pixel

Title SkeletonNet: Shape Pixel to Skeleton Pixel
Authors Sabari Nathan, Priya Kansal
Abstract Deep Learning for Geometric Shape Understating has organized a challenge for extracting different kinds of skeletons from the images of different objects. This competition is organized in association with CVPR 2019. There are three different tracks of this competition. The present manuscript describes the method used to train the model for the dataset provided in the first track. The first track aims to extract skeleton pixels from the shape pixels of 89 different objects. For the purpose of extracting the skeleton, a U-net model which is comprised of an encoder-decoder structure has been used. In our proposed architecture, unlike the plain decoder in the traditional Unet, we have designed the decoder in the format of HED architecture, wherein we have introduced 4 side layers and fused them to one dilation convolutional layer to connect the broken links of the skeleton. Our proposed architecture achieved the F1 score of 0.77 on test data.
Tasks
Published 2019-07-02
URL https://arxiv.org/abs/1907.01683v1
PDF https://arxiv.org/pdf/1907.01683v1.pdf
PWC https://paperswithcode.com/paper/skeletonnet-shape-pixel-to-skeleton-pixel
Repo
Framework

Machine Learning and the future of Supernova Cosmology

Title Machine Learning and the future of Supernova Cosmology
Authors Emille E. O. Ishida
Abstract Machine Learning methods will play a fundamental role in our ability to optimize the science output from the next generation of large scale surveys. Given the peculiarities of astronomical data, it is crucial that algorithms are adapted to the data situation at hand. In this comment, I review the recent efforts towards the development of automatic systems to identify and classify supernova with the goal of enabling their use as cosmological standard candles.
Tasks
Published 2019-08-06
URL https://arxiv.org/abs/1908.02315v1
PDF https://arxiv.org/pdf/1908.02315v1.pdf
PWC https://paperswithcode.com/paper/machine-learning-and-the-future-of-supernova
Repo
Framework

Tracking Temporal Evolution of Network Activity for Botnet Detection

Title Tracking Temporal Evolution of Network Activity for Botnet Detection
Authors Kapil Sinha, Arun Viswanathan, Julian Bunn
Abstract Botnets are becoming increasingly prevalent as the primary enabling technology in a variety of malicious campaigns such as email spam, click fraud, distributed denial-of-service (DDoS) attacks, and cryptocurrency mining. Botnet technology has continued to evolve rapidly making detection a very challenging problem. There is a fundamental need for robust detection methods that are insensitive to characteristics of a specific botnet and are generalizable across different botnet types. We propose a novel supervised approach to detect malicious botnet hosts by tracking a host’s network activity over time using a Long Short-Term Memory (LSTM) based neural network architecture. We build a prototype to demonstrate the feasibility of our approach, evaluate it on the CTU-13 dataset, and compare our performance against existing detection methods. We show that our approach results in a more generalizable, botnet-agnostic detection methodology, is amenable to real-time implementation, and performs well compared to existing approaches, with an overall accuracy score of 96.2%.
Tasks
Published 2019-08-09
URL https://arxiv.org/abs/1908.03443v1
PDF https://arxiv.org/pdf/1908.03443v1.pdf
PWC https://paperswithcode.com/paper/tracking-temporal-evolution-of-network
Repo
Framework

RTbust: Exploiting Temporal Patterns for Botnet Detection on Twitter

Title RTbust: Exploiting Temporal Patterns for Botnet Detection on Twitter
Authors Michele Mazza, Stefano Cresci, Marco Avvenuti, Walter Quattrociocchi, Maurizio Tesconi
Abstract Within OSNs, many of our supposedly online friends may instead be fake accounts called social bots, part of large groups that purposely re-share targeted content. Here, we study retweeting behaviors on Twitter, with the ultimate goal of detecting retweeting social bots. We collect a dataset of 10M retweets. We design a novel visualization that we leverage to highlight benign and malicious patterns of retweeting activity. In this way, we uncover a ‘normal’ retweeting pattern that is peculiar of human-operated accounts, and 3 suspicious patterns related to bot activities. Then, we propose a bot detection technique that stems from the previous exploration of retweeting behaviors. Our technique, called Retweet-Buster (RTbust), leverages unsupervised feature extraction and clustering. An LSTM autoencoder converts the retweet time series into compact and informative latent feature vectors, which are then clustered with a hierarchical density-based algorithm. Accounts belonging to large clusters characterized by malicious retweeting patterns are labeled as bots. RTbust obtains excellent detection results, with F1 = 0.87, whereas competitors achieve F1 < 0.76. Finally, we apply RTbust to a large dataset of retweets, uncovering 2 previously unknown active botnets with hundreds of accounts.
Tasks Time Series
Published 2019-02-12
URL http://arxiv.org/abs/1902.04506v1
PDF http://arxiv.org/pdf/1902.04506v1.pdf
PWC https://paperswithcode.com/paper/rtbust-exploiting-temporal-patterns-for
Repo
Framework

ASNM Datasets: A Collection of Network Traffic Features for Testing of Adversarial Classifiers and Network Intrusion Detectors

Title ASNM Datasets: A Collection of Network Traffic Features for Testing of Adversarial Classifiers and Network Intrusion Detectors
Authors Ivan Homoliak, Petr Hanacek
Abstract In this paper, we present three datasets that have been built from network traffic traces using ASNM features, designed in our previous work. The first dataset was built using a state-of-the-art dataset called CDX 2009, while the remaining two datasets were collected by us in 2015 and 2018, respectively. These two datasets contain several adversarial obfuscation techniques that were applied onto malicious as well as legitimate traffic samples during the execution of particular TCP network connections. Adversarial obfuscation techniques were used for evading machine learning-based network intrusion detection classifiers. Further, we showed that the performance of such classifiers can be improved when partially augmenting their training data by samples obtained from obfuscation techniques. In detail, we utilized tunneling obfuscation in HTTP(S) protocol and non-payload-based obfuscations modifying various properties of network traffic by, e.g., TCP segmentation, re-transmissions, corrupting and reordering of packets, etc. To the best of our knowledge, this is the first collection of network traffic metadata that contains adversarial techniques and is intended for non-payload-based network intrusion detection and adversarial classification. Provided datasets enable testing of the evasion resistance of arbitrary classifier that is using ASNM features.
Tasks Intrusion Detection, Network Intrusion Detection
Published 2019-10-23
URL https://arxiv.org/abs/1910.10528v1
PDF https://arxiv.org/pdf/1910.10528v1.pdf
PWC https://paperswithcode.com/paper/asnm-datasets-a-collection-of-network-traffic
Repo
Framework

Continual Learning in Deep Neural Network by Using a Kalman Optimiser

Title Continual Learning in Deep Neural Network by Using a Kalman Optimiser
Authors Honglin Li, Shirin Enshaeifar, Frieder Ganz, Payam Barnaghi
Abstract Learning and adapting to new distributions or learning new tasks sequentially without forgetting the previously learned knowledge is a challenging phenomenon in continual learning models. Most of the conventional deep learning models are not capable of learning new tasks sequentially in one model without forgetting the previously learned ones. We address this issue by using a Kalman Optimiser. The Kalman Optimiser divides the neural network into two parts: the long-term and short-term memory units. The long-term memory unit is used to remember the learned tasks and the short-term memory unit is to adapt to the new task. We have evaluated our method on MNIST, CIFAR10, CIFAR100 datasets and compare our results with state-of-the-art baseline models. The results show that our approach enables the model to continually learn and adapt to the new changes without forgetting the previously learned tasks.
Tasks Continual Learning
Published 2019-05-20
URL https://arxiv.org/abs/1905.08119v3
PDF https://arxiv.org/pdf/1905.08119v3.pdf
PWC https://paperswithcode.com/paper/continual-learning-in-deep-neural-networks-by
Repo
Framework

Draining the Water Hole: Mitigating Social Engineering Attacks with CyberTWEAK

Title Draining the Water Hole: Mitigating Social Engineering Attacks with CyberTWEAK
Authors Zheyuan Ryan Shi, Aaron Schlenker, Brian Hay, Daniel Bittleston, Siyu Gao, Emily Peterson, John Trezza, Fei Fang
Abstract Cyber adversaries have increasingly leveraged social engineering attacks to breach large organizations and threaten the well-being of today’s online users. One clever technique, the “watering hole” attack, compromises a legitimate website to execute drive-by download attacks by redirecting users to another malicious domain. We introduce a game-theoretic model that captures the salient aspects for an organization protecting itself from a watering hole attack by altering the environment information in web traffic so as to deceive the attackers. Our main contributions are (1) a novel Social Engineering Deception (SED) game model that features a continuous action set for the attacker, (2) an in-depth analysis of the SED model to identify computationally feasible real-world cases, and (3) the CyberTWEAK algorithm which solves for the optimal protection policy. To illustrate the potential use of our framework, we built a browser extension based on our algorithms which is now publicly available online. The CyberTWEAK extension will be vital to the continued development and deployment of countermeasures for social engineering.
Tasks
Published 2019-01-03
URL https://arxiv.org/abs/1901.00586v3
PDF https://arxiv.org/pdf/1901.00586v3.pdf
PWC https://paperswithcode.com/paper/towards-thwarting-social-engineering-attacks
Repo
Framework

On training deep networks for satellite image super-resolution

Title On training deep networks for satellite image super-resolution
Authors Michal Kawulok, Szymon Piechaczek, Krzysztof Hrynczenko, Pawel Benecki, Daniel Kostrzewa, Jakub Nalepa
Abstract The capabilities of super-resolution reconstruction (SRR)—techniques for enhancing image spatial resolution—have been recently improved significantly by the use of deep convolutional neural networks. Commonly, such networks are learned using huge training sets composed of original images alongside their low-resolution counterparts, obtained with bicubic downsampling. In this paper, we investigate how the SRR performance is influenced by the way such low-resolution training data are obtained, which has not been explored up to date. Our extensive experimental study indicates that the training data characteristics have a large impact on the reconstruction accuracy, and the widely-adopted approach is not the most effective for dealing with satellite images. Overall, we argue that developing better training data preparation routines may be pivotal in making SRR suitable for real-world applications.
Tasks Image Super-Resolution, Super-Resolution
Published 2019-06-16
URL https://arxiv.org/abs/1906.06697v1
PDF https://arxiv.org/pdf/1906.06697v1.pdf
PWC https://paperswithcode.com/paper/on-training-deep-networks-for-satellite-image
Repo
Framework
comments powered by Disqus