January 27, 2020

2715 words 13 mins read

Paper Group ANR 1287

Paper Group ANR 1287

Appendix for: Cut-free Calculi and Relational Semantics for Temporal STIT logics. Target-Focused Feature Selection Using a Bayesian Approach. Kernel quadrature with DPPs. Quantum Adversarial Machine Learning. Multi-Objective Autonomous Braking System using Naturalistic Dataset. Perfect reconstruction of sparse signals with piecewise continuous nonc …

Appendix for: Cut-free Calculi and Relational Semantics for Temporal STIT logics

Title Appendix for: Cut-free Calculi and Relational Semantics for Temporal STIT logics
Authors Kees van Berkel, Tim Lyon
Abstract This paper is an appendix to the paper “Cut-free Calculi and Relational Semantics for Temporal STIT logics” by Berkel and Lyon, 2019. It provides the completeness proof for the basic STIT logic Ldm (relative to irreflexive, temporal Kripke STIT frames) as well as gives the derivation of the independence of agents axiom for the logic Xstit.
Tasks
Published 2019-02-18
URL http://arxiv.org/abs/1902.06632v1
PDF http://arxiv.org/pdf/1902.06632v1.pdf
PWC https://paperswithcode.com/paper/appendix-for-cut-free-calculi-and-relational
Repo
Framework

Target-Focused Feature Selection Using a Bayesian Approach

Title Target-Focused Feature Selection Using a Bayesian Approach
Authors Orpaz Goldstein, Mohammad Kachuee, Kimmo Karkkainen, Majid Sarrafzadeh
Abstract In many real-world scenarios where data is high dimensional, test time acquisition of features is a non-trivial task due to costs associated with feature acquisition and evaluating feature value. The need for highly confident models with an extremely frugal acquisition of features can be addressed by allowing a feature selection method to become target aware. We introduce an approach to feature selection that is based on Bayesian learning, allowing us to report target-specific levels of uncertainty, false positive, and false negative rates. In addition, measuring uncertainty lifts the restriction on feature selection being target agnostic, allowing for feature acquisition based on a single target of focus out of many. We show that acquiring features for a specific target is at least as good as common linear feature selection approaches for small non-sparse datasets, and surpasses these when faced with real-world healthcare data that is larger in scale and in sparseness.
Tasks Feature Selection
Published 2019-09-15
URL https://arxiv.org/abs/1909.06772v1
PDF https://arxiv.org/pdf/1909.06772v1.pdf
PWC https://paperswithcode.com/paper/target-focused-feature-selection-using-a
Repo
Framework

Kernel quadrature with DPPs

Title Kernel quadrature with DPPs
Authors Ayoub Belhadji, Rémi Bardenet, Pierre Chainais
Abstract We study quadrature rules for functions from an RKHS, using nodes sampled from a determinantal point process (DPP). DPPs are parametrized by a kernel, and we use a truncated and saturated version of the RKHS kernel. This link between the two kernels, along with DPP machinery, leads to relatively tight bounds on the quadrature error, that depends on the spectrum of the RKHS kernel. Finally, we experimentally compare DPPs to existing kernel-based quadratures such as herding, Bayesian quadrature, or leverage score sampling. Numerical results confirm the interest of DPPs, and even suggest faster rates than our bounds in particular cases.
Tasks
Published 2019-06-18
URL https://arxiv.org/abs/1906.07832v3
PDF https://arxiv.org/pdf/1906.07832v3.pdf
PWC https://paperswithcode.com/paper/kernel-quadrature-with-dpps
Repo
Framework

Quantum Adversarial Machine Learning

Title Quantum Adversarial Machine Learning
Authors Sirui Lu, Lu-Ming Duan, Dong-Ling Deng
Abstract Adversarial machine learning is an emerging field that focuses on studying vulnerabilities of machine learning approaches in adversarial settings and developing techniques accordingly to make learning robust to adversarial manipulations. It plays a vital role in various machine learning applications and has attracted tremendous attention across different communities recently. In this paper, we explore different adversarial scenarios in the context of quantum machine learning. We find that, similar to traditional classifiers based on classical neural networks, quantum learning systems are likewise vulnerable to crafted adversarial examples, independent of whether the input data is classical or quantum. In particular, we find that a quantum classifier that achieves nearly the state-of-the-art accuracy can be conclusively deceived by adversarial examples obtained via adding imperceptible perturbations to the original legitimate samples. This is explicitly demonstrated with quantum adversarial learning in different scenarios, including classifying real-life images (e.g., handwritten digit images in the dataset MNIST), learning phases of matter (such as, ferromagnetic/paramagnetic orders and symmetry protected topological phases), and classifying quantum data. Furthermore, we show that based on the information of the adversarial examples at hand, practical defense strategies can be designed to fight against a number of different attacks. Our results uncover the notable vulnerability of quantum machine learning systems to adversarial perturbations, which not only reveals a novel perspective in bridging machine learning and quantum physics in theory but also provides valuable guidance for practical applications of quantum classifiers based on both near-term and future quantum technologies.
Tasks Quantum Machine Learning
Published 2019-12-31
URL https://arxiv.org/abs/2001.00030v1
PDF https://arxiv.org/pdf/2001.00030v1.pdf
PWC https://paperswithcode.com/paper/quantum-adversarial-machine-learning
Repo
Framework

Multi-Objective Autonomous Braking System using Naturalistic Dataset

Title Multi-Objective Autonomous Braking System using Naturalistic Dataset
Authors Rafael Vasquez, Bilal Farooq
Abstract A deep reinforcement learning based multi-objective autonomous braking system is presented. The design of the system is formulated in a continuous action space and seeks to maximize both pedestrian safety and perception as well as passenger comfort. The vehicle agent is trained against a large naturalistic dataset containing pedestrian road-crossing trials in which respondents walked across a road under various traffic conditions within an interactive virtual reality environment. The policy for brake control is learned through computer simulation using two reinforcement learning methods i.e. Proximal Policy Optimization and Deep Deterministic Policy Gradient and the efficiency of each are compared. Results show that the system is able to reduce the negative influence on passenger comfort by half while maintaining safe braking operation.
Tasks
Published 2019-04-15
URL https://arxiv.org/abs/1904.07705v2
PDF https://arxiv.org/pdf/1904.07705v2.pdf
PWC https://paperswithcode.com/paper/multi-objective-autonomous-braking-system
Repo
Framework

Perfect reconstruction of sparse signals with piecewise continuous nonconvex penalties and nonconvexity control

Title Perfect reconstruction of sparse signals with piecewise continuous nonconvex penalties and nonconvexity control
Authors Ayaka Sakata, Tomoyuki Obuchi
Abstract We consider compressed sensing formulated as a minimization problem of nonconvex sparse penalties, Smoothly Clipped Absolute deviation (SCAD) and Minimax Concave Penalty (MCP). The nonconvexity of these penalties is controlled by nonconvexity parameters, and L1 penalty is contained as a limit with respect to these parameters. The analytically derived reconstruction limit overcomes that of L1 and the algorithmic limit in the Bayes-optimal setting, when the nonconvexity parameters have suitable values. For the practical usage, we apply the approximate message passing (AMP) to these nonconvex penalties. We show that the performance of AMP is considerably improved by controlling nonconvexity parameters.
Tasks
Published 2019-02-20
URL http://arxiv.org/abs/1902.07436v1
PDF http://arxiv.org/pdf/1902.07436v1.pdf
PWC https://paperswithcode.com/paper/perfect-reconstruction-of-sparse-signals-with
Repo
Framework

Text2Math: End-to-end Parsing Text into Math Expressions

Title Text2Math: End-to-end Parsing Text into Math Expressions
Authors Yanyan Zou, Wei Lu
Abstract We propose Text2Math, a model for semantically parsing text into math expressions. The model can be used to solve different math related problems including arithmetic word problems and equation parsing problems. Unlike previous approaches, we tackle the problem from an end-to-end structured prediction perspective where our algorithm aims to predict the complete math expression at once as a tree structure, where minimal manual efforts are involved in the process. Empirical results on benchmark datasets demonstrate the efficacy of our approach.
Tasks Structured Prediction
Published 2019-10-15
URL https://arxiv.org/abs/1910.06571v1
PDF https://arxiv.org/pdf/1910.06571v1.pdf
PWC https://paperswithcode.com/paper/text2math-end-to-end-parsing-text-into-math
Repo
Framework

Improving Visual Recognition using Ambient Sound for Supervision

Title Improving Visual Recognition using Ambient Sound for Supervision
Authors Rohan Mahadev, Hongyu Lu
Abstract Our brains combine vision and hearing to create a more elaborate interpretation of the world. When the visual input is insufficient, a rich panoply of sounds can be used to describe our surroundings. Since more than 1,000 hours of videos are uploaded to the internet everyday, it is arduous, if not impossible, to manually annotate these videos. Therefore, incorporating audio along with visual data without annotations is crucial for leveraging this explosion of data for recognizing and understanding objects and scenes. Owens,et.al suggest that a rich representation of the physical world can be learned by using a convolutional neural network to predict sound textures associated with a given video frame. We attempt to reproduce the claims from their experiments, of which the code is not publicly available. In addition, we propose improvements in the pretext task that result in better performance in other downstream computer vision tasks.
Tasks
Published 2019-12-25
URL https://arxiv.org/abs/1912.11659v1
PDF https://arxiv.org/pdf/1912.11659v1.pdf
PWC https://paperswithcode.com/paper/improving-visual-recognition-using-ambient
Repo
Framework

Non-rigid Registration Method between 3D CT Liver Data and 2D Ultrasonic Images based on Demons Model

Title Non-rigid Registration Method between 3D CT Liver Data and 2D Ultrasonic Images based on Demons Model
Authors Shuo Huang, Ke wu, Xiaolin Meng, Cheng Li
Abstract The non-rigid registration between CT data and ultrasonic images of liver can facilitate the diagnosis and treatment, which has been widely studied in recent years. To improve the registration accuracy of the Demons model on the non-rigid registration between 3D CT liver data and 2D ultrasonic images, a novel boundary extraction and enhancement method based on radial directional local intuitionistic fuzzy entropy in the polar coordinates has been put forward, and a new registration workflow has been provided. Experiments show that our method can acquire high-accuracy registration results. Experiments also show that the accuracy of the results of our method is higher than that of the original Demons method and the Demons method using simulated ultrasonic image by Field II. The operation time of our registration workflow is about 30 seconds, and it can be used in the surgery.
Tasks
Published 2019-12-31
URL https://arxiv.org/abs/2001.00035v1
PDF https://arxiv.org/pdf/2001.00035v1.pdf
PWC https://paperswithcode.com/paper/non-rigid-registration-method-between-3d-ct
Repo
Framework

Destination-aware Adaptive Traffic Flow Rule Aggregation in Software-Defined Networks

Title Destination-aware Adaptive Traffic Flow Rule Aggregation in Software-Defined Networks
Authors Trung V. Phan, Mehrdad Hajizadeh, Nguyen Tuan Khai, Thomas Bauschert
Abstract In this paper, we propose a destination-aware adaptive traffic flow rule aggregation (DATA) mechanism for facilitating traffic flow monitoring in SDN-based networks. This method adapts the number of flow table entries in SDN switches according to the level of detail of traffic flow information that other mechanisms (e.g. for traffic engineering, traffic monitoring, intrusion detection) require. It also prevents performance degradation of the SDN switches by keeping the number of flow table entries well below a critical level. This level is not preset as a hard threshold but learned during operation by using a machine-learning based algorithm. The DATA method is implemented within a RESTful application (DATA App) which monitors and analyzes the ongoing network traffic and provides instructions to the SDN controller to adapt the traffic flow matching strategies accordingly. A thorough performance evaluation of DATA is conducted in an SDN emulation environment. The results show that—compared to the default behavior of common SDN controllers—the proposed DATA approach yields significant SDN switch performance improvements while still providing detailed traffic flow information on demand.
Tasks Intrusion Detection
Published 2019-09-07
URL https://arxiv.org/abs/1909.03059v1
PDF https://arxiv.org/pdf/1909.03059v1.pdf
PWC https://paperswithcode.com/paper/destination-aware-adaptive-traffic-flow-rule
Repo
Framework

Analysis of SparseHash: an efficient embedding of set-similarity via sparse projections

Title Analysis of SparseHash: an efficient embedding of set-similarity via sparse projections
Authors Diego Valsesia, Sophie Marie Fosson, Chiara Ravazzi, Tiziano Bianchi, Enrico Magli
Abstract Embeddings provide compact representations of signals in order to perform efficient inference in a wide variety of tasks. In particular, random projections are common tools to construct Euclidean distance-preserving embeddings, while hashing techniques are extensively used to embed set-similarity metrics, such as the Jaccard coefficient. In this letter, we theoretically prove that a class of random projections based on sparse matrices, called SparseHash, can preserve the Jaccard coefficient between the supports of sparse signals, which can be used to estimate set similarities. Moreover, besides the analysis, we provide an efficient implementation and we test the performance in several numerical experiments, both on synthetic and real datasets.
Tasks
Published 2019-09-02
URL https://arxiv.org/abs/1909.01802v1
PDF https://arxiv.org/pdf/1909.01802v1.pdf
PWC https://paperswithcode.com/paper/analysis-of-sparsehash-an-efficient-embedding
Repo
Framework

Adversarial Deep Learning for Over-the-Air Spectrum Poisoning Attacks

Title Adversarial Deep Learning for Over-the-Air Spectrum Poisoning Attacks
Authors Yalin E. Sagduyu, Yi Shi, Tugba Erpek
Abstract An adversarial deep learning approach is presented to launch over-the-air spectrum poisoning attacks. A transmitter applies deep learning on its spectrum sensing results to predict idle time slots for data transmission. In the meantime, an adversary learns the transmitter’s behavior (exploratory attack) by building another deep neural network to predict when transmissions will succeed. The adversary falsifies (poisons) the transmitter’s spectrum sensing data over the air by transmitting during the short spectrum sensing period of the transmitter. Depending on whether the transmitter uses the sensing results as test data to make transmit decisions or as training data to retrain its deep neural network, either it is fooled into making incorrect decisions (evasion attack), or the transmitter’s algorithm is retrained incorrectly for future decisions (causative attack). Both attacks are energy efficient and hard to detect (stealth) compared to jamming the long data transmission period, and substantially reduce the throughput. A dynamic defense is designed for the transmitter that deliberately makes a small number of incorrect transmissions (selected by the confidence score on channel classification) to manipulate the adversary’s training data. This defense effectively fools the adversary (if any) and helps the transmitter sustain its throughput with or without an adversary present.
Tasks
Published 2019-11-01
URL https://arxiv.org/abs/1911.00500v1
PDF https://arxiv.org/pdf/1911.00500v1.pdf
PWC https://paperswithcode.com/paper/adversarial-deep-learning-for-over-the-air
Repo
Framework

TEST: an End-to-End Network Traffic Examination and Identification Framework Based on Spatio-Temporal Features Extraction

Title TEST: an End-to-End Network Traffic Examination and Identification Framework Based on Spatio-Temporal Features Extraction
Authors Yi Zeng, Zihao Qi, Wencheng Chen, Yanzhe Huang, Xingxin Zheng, Han Qiu
Abstract With more encrypted network traffic gets involved in the Internet, how to effectively identify network traffic has become a top priority in the field. Accurate identification of the network traffic is the footstone of basic network services, say QoE, bandwidth allocation, and IDS. Previous identification methods either cannot deal with encrypted traffics or require experts to select tons of features to attain a relatively decent accuracy.In this paper, we present a Deep Learning based end-to-end network traffic identification framework, termed TEST, to avoid the aforementioned problems. CNN and LSTM are combined and implemented to help the machine automatically extract features from both special and time-related features of the raw traffic. The presented framework has two layers of structure, which made it possible to attain a remarkable accuracy on both encrypted traffic classification and intrusion detection tasks. The experimental results demonstrate that our model can outperform previous methods with a state-of-the-art accuracy of 99.98%.
Tasks Intrusion Detection
Published 2019-08-26
URL https://arxiv.org/abs/1908.10271v1
PDF https://arxiv.org/pdf/1908.10271v1.pdf
PWC https://paperswithcode.com/paper/test-an-end-to-end-network-traffic
Repo
Framework

Surreal: Complex-Valued Deep Learning as Principled Transformations on a Rotational Lie Group

Title Surreal: Complex-Valued Deep Learning as Principled Transformations on a Rotational Lie Group
Authors Rudrasis Chakraborty, Yifei Xing, Stella Yu
Abstract Complex-valued deep learning has attracted increasing attention in recent years, due to its versatility and ability to capture more information. However, the lack of well-defined complex-valued operations remains a bottleneck for further advancement. In this work, we propose a geometric way to define deep neural networks on the space of complex numbers by utilizing weighted Fr'echet mean. We mathematically prove the viability of our algorithm. We also define basic building blocks such as convolution, non-linearity, and residual connections tailored for the space of complex numbers. To demonstrate the effectiveness of our proposed model, we compare our complex-valued network comprehensively with its real state-of-the-art counterpart on the MSTAR classification task and achieve better performance, while utilizing less than 1% of the parameters.
Tasks
Published 2019-10-18
URL https://arxiv.org/abs/1910.11334v1
PDF https://arxiv.org/pdf/1910.11334v1.pdf
PWC https://paperswithcode.com/paper/surreal-complex-valued-deep-learning-as
Repo
Framework

Automatic Relevance Determination Bayesian Neural Networks for Credit Card Default Modelling

Title Automatic Relevance Determination Bayesian Neural Networks for Credit Card Default Modelling
Authors Rendani Mbuvha, Illyes Boulkaibet, Tshilidzi Marwala
Abstract Credit risk modelling is an integral part of the global financial system. While there has been great attention paid to neural network models for credit default prediction, such models often lack the required interpretation mechanisms and measures of the uncertainty around their predictions. This work develops and compares Bayesian Neural Networks(BNNs) for credit card default modelling. This includes a BNNs trained by Gaussian approximation and the first implementation of BNNs trained by Hybrid Monte Carlo(HMC) in credit risk modelling. The results on the Taiwan Credit Dataset show that BNNs with Automatic Relevance Determination(ARD) outperform normal BNNs without ARD. The results also show that BNNs trained by Gaussian approximation display similar predictive performance to those trained by the HMC. The results further show that BNN with ARD can be used to draw inferences about the relative importance of different features thus critically aiding decision makers in explaining model output to consumers. The robustness of this result is reinforced by high levels of congruence between the features identified as important using the two different approaches for training BNNs.
Tasks
Published 2019-06-14
URL https://arxiv.org/abs/1906.06382v1
PDF https://arxiv.org/pdf/1906.06382v1.pdf
PWC https://paperswithcode.com/paper/automatic-relevance-determination-bayesian
Repo
Framework
comments powered by Disqus