Sounding Board: A User-Centric and Content-Driven Social Chatbot
We present Sounding Board, a social chatbot that won the 2017 Amazon Alexa Prize. The system architecture consists of several components including spoken language processing, dialogue management, language generation, and content management, with emphasis on user-centric and content-driven design. We also share insights gained from large-scale online logs based on 160,000 conversations with real-world users.
Studying Fake News via Network Analysis: Detection and Mitigation
Social media for news consumption is becoming increasingly popular due to its easy access, fast dissemination, and low cost. However, social media also enable the wide propagation of ‘fake news’, i.e., news with intentionally false information. Fake news on social media poses significant negative societal effects, and also presents unique challenges. To tackle the challenges, many existing works exploit various features, from a network perspective, to detect and mitigate fake news. In essence, news dissemination ecosystem involves three dimensions on social media, i.e., a content dimension, a social dimension, and a temporal dimension. In this chapter, we will review network properties for studying fake news, introduce popular network types and how these networks can be used to detect and mitigation fake news on social media.
Topological Data Analysis for Object Data
Statistical analysis on object data presents many challenges. Basic summaries such as means and variances are difficult to compute. We apply ideas from topology to study object data. We present a framework for using persistence landscapes to vectorize object data and perform statistical analysis. We apply to this pipeline to some biological images that were previously shown to be challenging to study using shape theory. Surprisingly, the most persistent features are shown to be ‘topological noise’ and the statistical analysis depends on the less persistent features which we refer to as the ‘geometric signal’. We also describe the first steps to a new approach to using topology for object data analysis, which applies topology to distributions on object spaces.
Tensor Methods for Nonlinear Matrix Completion
In the low rank matrix completion (LRMC) problem, the low rank assumption means that the columns (or rows) of the matrix to be completed are points on a low-dimensional linear algebraic variety. This paper extends this thinking to cases where the columns are points on a low-dimensional nonlinear algebraic variety, a problem we call Low Algebraic Dimension Matrix Completion (LADMC). Matrices whose columns belong to a union of subspaces (UoS) are an important special case. We propose a LADMC algorithm that leverages existing LRMC methods on a tensorized representation of the data. For example, a second-order tensorization representation is formed by taking the outer product of each column with itself, and we consider higher order tensorizations as well. This approach will succeed in many cases where traditional LRMC is guaranteed to fail because the data are low-rank in the tensorized representation but not in the original representation. We also provide a formal mathematical justification for the success of our method. In particular, we show bounds of the rank of these data in the tensorized representation, and we prove sampling requirements to guarantee uniqueness of the solution. Interestingly, the sampling requirements of our LADMC algorithm nearly match the information theoretic lower bounds for matrix completion under a UoS model. We also provide experimental results showing that the new approach significantly outperforms existing state-of-the-art methods for matrix completion in many situations.
Network Transplanting
This paper focuses on a novel problem, i.e., transplanting a category-and-task-specific neural network to a generic, distributed network without strong supervision. Like playing LEGO blocks, incrementally constructing a generic network by asynchronously merging specific neural networks is a crucial bottleneck for deep learning. Suppose that the pre-trained specific network contains a module
to extract features of the target category, and the generic network has a module
for a target task, which is trained using other categories except for the target category. Instead of using numerous training samples to teach the generic network a new category, we aim to learn a small adapter module to connect
and
to accomplish the task on a target category in a weakly-supervised manner. The core challenge is to efficiently learn feature projections between the two connected modules. We propose a new distillation algorithm, which exhibited superior performance. Our method without training samples even significantly outperformed the baseline with 100 training samples.
From product recommendation to cyber-attack prediction: Generating attack graphs and predicting future attacks
Modern information society depends on reliable functionality of information systems infrastructure, while at the same time the number of cyber-attacks has been increasing over the years and damages have been caused. Furthermore, graphs can be used to show paths than can be exploited by attackers to intrude into systems and gain unauthorized access through vulnerability exploitation. This paper presents a method that builds attack graphs using data supplied from the maritime supply chain infrastructure. The method delivers all possible paths that can be exploited to gain access. Then, a recommendation system is utilized to make predictions about future attack steps within the network. We show that recommender systems can be used in cyber defense by predicting attacks. The goal of this paper is to identify attack paths and show how a recommendation method can be used to classify future cyber-attacks in terms of risk management. The proposed method has been experimentally evaluated and validated, with the results showing that it is both practical and effective.
Adaptive Sensing for Learning Nonstationary Environment Models
Most environmental phenomena, such as wind profiles, ozone concentration and sunlight distribution under a forest canopy, exhibit nonstationary dynamics i.e. phenomenon variation change depending on the location and time of occurrence. Non-stationary dynamics pose both theoretical and practical challenges to statistical machine learning algorithms aiming to accurately capture the complexities governing the evolution of such processes. In this paper, we address the sampling aspects of the problem of learning nonstationary spatio-temporal models, and propose an efficient yet simple algorithm – LISAL. The core idea in LISAL is to learn two models using Gaussian processes (GPs) wherein the first is a nonstationary GP directly modeling the phenomenon. The second model uses a stationary GP representing a latent space corresponding to changes in dynamics, or the nonstationarity characteristics of the first model. LISAL involves adaptively sampling the latent space dynamics using information theory quantities to reduce the computational cost during the learning phase. The relevance of LISAL is extensively validated using multiple real world datasets.
Distributed Differentially-Private Algorithms for Matrix and Tensor Factorization
In many signal processing and machine learning applications, datasets containing private information are held at different locations, requiring the development of distributed privacy-preserving algorithms. Tensor and matrix factorizations are key components of many processing pipelines. In the distributed setting, differentially private algorithms suffer because they introduce noise to guarantee privacy. This paper designs new and improved distributed and differentially private algorithms for two popular matrix and tensor factorization methods: principal component analysis (PCA) and orthogonal tensor decomposition (OTD). The new algorithms employ a correlated noise design scheme to alleviate the effects of noise and can achieve the same noise level as the centralized scenario. Experiments on synthetic and real data illustrate the regimes in which the correlated noise allows performance matching with the centralized setting, outperforming previous methods and demonstrating that meaningful utility is possible while guaranteeing differential privacy.
A Regularized Vector Autoregressive Hidden Semi-Markov Model, with Application to Multivariate Financial Data
A regularized vector autoregressive hidden semi-Markov model is developed to analyze multivariate financial time series with switching data generating regimes. Furthermore, an augmented EM algorithm is proposed for parameter estimation by embedding regularized estimators for the state-dependent covariance matrices and autoregression matrices in the M-step. The performance of the proposed regularized estimators is evaluated both in the simulation experiments and on the New York Stock Exchange financial portfolio data.
Efficiently Learning Nonstationary Gaussian Processes
Most real world phenomena such as sunlight distribution under a forest canopy, minerals concentration, stock valuation, exhibit nonstationary dynamics i.e. phenomenon variation changes depending on the locality. Nonstationary dynamics pose both theoretical and practical challenges to statistical machine learning algorithms that aim to accurately capture the complexities governing the evolution of such processes. Typically the nonstationary dynamics are modeled using nonstationary Gaussian Process models (NGPS) that employ local latent dynamics parameterization to correspondingly model the nonstationary real observable dynamics. Recently, an approach based on most likely induced latent dynamics representation attracted research community’s attention for a while. The approach could not be employed for large scale real world applications because learning a most likely latent dynamics representation involves maximization of marginal likelihood of the observed real dynamics that becomes intractable as the number of induced latent points grows with problem size. We have established a direct relationship between informativeness of the induced latent dynamics and the marginal likelihood of the observed real dynamics. This opens up the possibility of maximizing marginal likelihood of observed real dynamics indirectly by near optimally maximizing entropy or mutual information gain on the induced latent dynamics using greedy algorithms. Therefore, for an efficient yet accurate inference, we propose to build an induced latent dynamics representation using a novel algorithm LISAL that adaptively maximizes entropy or mutual information on the induced latent dynamics and marginal likelihood of observed real dynamics in an iterative manner. The relevance of LISAL is validated using real world sensing datasets.
Event Forecasting with Pattern Markov Chains
We present a system for online probabilistic event forecasting. We assume that a user is interested in detecting and forecasting event patterns, given in the form of regular expressions. Our system can consume streams of events and forecast when the pattern is expected to be fully matched. As more events are consumed, the system revises its forecasts to reflect possible changes in the state of the pattern. The framework of Pattern Markov Chains is used in order to learn a probabilistic model for the pattern, with which forecasts with guaranteed precision may be produced, in the form of intervals within which a full match is expected. Experimental results from real-world datasets are shown and the quality of the produced forecasts is explored, using both precision scores and two other metrics: spread, which refers to the ‘focusing resolution’ of a forecast (interval length), and distance, which captures how early a forecast is reported.
• The Intelligent ICU Pilot Study: Using Artificial Intelligence Technology for Autonomous Patient Monitoring
• Linear $(2,p,p)$-AONTs do Exist
• Using Machine Learning to Improve Cylindrical Algebraic Decomposition
• End-to-End Speech Separation with Unfolded Iterative Phase Reconstruction
• Communication over an Arbitrarily Varying Channel under a State-Myopic Encoder
• A generator approach to stochastic monotonicity and propagation of order
• Sparse Persistent RNNs: Squeezing Large Recurrent Networks On-Chip
• Temporal Answer Set Programming on Finite Traces
• A Bridge Between Past and Present: Exchange and Conditional Gradient Methods are Equivalent
• Experimenting with robotic intra-logistics domains
• Gaps and and interleaving of point processes in sampling from a residual allocation model
• From Principal Subspaces to Principal Components with Linear Autoencoders
• Optimal Procedures for Multiple Testing Problems
• On the averaged Green’s function of an elliptic equation with random coefficients
• Nonlinearity in stock networks
• Dismantling Efficiency and Network Fractality
• Pushing the Limits of Unconstrained Face Detection: a Challenge Dataset and Baseline Results
• In-field Remote Fingerprint Authentication using Human Body Communication and On-Hub Analytics
• Two boundary Hecke Algebras and combinatorics of type C
• Success Probability and Area Spectral Efficiency of a VANET Modeled as a Cox Process
• Universal approximations of invariant maps by neural networks
• On Basing One-way Permutations on NP-hard Problems under Quantum Reductions
• Emergence of complex institutions in a large population of self-governing communities
• CompNet: Neural networks growing via the compact network morphism
• Decoding Reed-Muller Codes Using Minimum-Weight Parity Checks
• Classification of auditory stimuli from EEG signals with a regulated recurrent neural network reservoir
• Adversarial Training of Variational Auto-encoders for High Fidelity Image Generation
• Scalable Bilinear $π$ Learning Using State and Action Features
• Rateless Codes for Near-Perfect Load Balancing in Distributed Matrix-Vector Multiplication
• Sim-to-Real: Learning Agile Locomotion For Quadruped Robots
• Deep Learning Coordinated Beamforming for Highly-Mobile Millimeter Wave Systems
• Communication, Computing and Caching for Mobile VR Delivery: Modeling and Trade-off
• There are no Cubic Graphs on 26 Vertices with Crossing Number 11
• Latent Fingerprint Recognition: Role of Texture Template
• Stacked U-Nets: A No-Frills Approach to Natural Image Segmentation
• Nonlinear System Identification using Neural Networks and Trajectory-Based Optimization
• Computing a Subgame Perfect Equilibrium of a Sequential Matching Game
• History-Preserving Bisimulations on Reversible Calculus of Communicating Systems
• The edge spectrum of $K_4^-$-saturated graphs
• An Element Sensitive Saliency Model with Position Prior Learning for Web Pages
• SaC2Vec: Information Network Representation with Structure and Content
• Online Convolutional Sparse Coding with Sample-Dependent Dictionary
• Explicit lower bounds on strong quantum simulation
• Refined enumerations of alternating sign triangles
• dhSegment: A generic deep-learning approach for document segmentation
• Splitting gradient algorithms for solving monotone equilibrium problems
• Differentiability Properties of a Parametric Consumer Problem
• Riemannian optimal system identification method of linear continuous-time systems with symmetry
• Local module identification in dynamic networks: do more inputs guarantee smaller variance?
• Automatic classification of trees using a UAV onboard camera and deep learning
• An adaptive self-organizing fuzzy logic controller in a serious game for motor impairment rehabilitation
• Average Case Analysis of Leaf-Centric Binary Tree Sources
• Implicit Copulas from Bayesian Regularized Regression Smoothers
• Information and Statistical Efficiency When Quantizing Noisy DC Values
• Random constructions for translates of non-negative functions
• Automation Of Road Intersections Using Consensus-based Auction Algorithms
• On Cyber Risk Management of Blockchain Networks: A Game Theoretic Approach
• Extracting Parallel Paragraphs from Common Crawl
• Exploiting the Superposition Property of Wireless Communication For Average Consensus Problems in Multi-Agent Systems
• Adaptive Non-Rigid Inpainting of 3D Point Cloud Geometry
• Open Set Domain Adaptation by Backpropagation
• Localized Traffic Sign Detection with Multi-scale Deconvolution Networks
• Scattering for stochastic nonlinear Schrödinger equations
• Variational Regularization of Inverse Problems for Manifold-Valued Data
• Regularized Nonparametric Volterra Kernel Estimation
• Routing Driverless Transport Vehicles in Car Assembly with Answer Set Programming
• Adaptive Transmission in Cellular Networks: Do Physical Layer Rateless Codes Supersede Power Control?
• Generalized Logical Operations among Conditional Events
• Bound and Conquer: Improving Triangulation by Enforcing Consistency
• Generalized Feller processes and Markovian lifts of stochastic Volterra processes: the affine case
• Method to assess the functional role of noisy brain signals by mining envelope dynamics
• Sufficient connectivity conditions for rigidity of symmetric frameworks
• The overlap gap between left-infinite and right-infinite words
• A generalizable approach for multi-view 3D human pose regression
• Interaction-Aware Probabilistic Behavior Prediction in Urban Environments
• Disentangling Factors of Variation with Cycle-Consistent Variational Auto-Encoders
• Intersecting edge distinguishing colorings of hypergraphs
• On the maximum number of minimum total dominating sets in forests
• Interactive Medical Image Segmentation via Point-Based Interaction and Sequential Patch Learning
• Mean-field anticipated BSDEs driven by fractional Brownian motion and related stochastic control problem
• A Graph-Theoretic Approach to the $\mathcal{H}_{\infty}$ Performance of Dynamical Systems on Directed and Undirected Networks
• Crossbar-Net: A Novel Convolutional Network for Kidney Tumor Segmentation in CT Images
• Offline Evaluation of Ranking Policies with Click Models
• Weaver: Deep Co-Encoding of Questions and Documents for Machine Reading
• Deep Reinforcement Learning to Acquire Navigation Skills for Wheel-Legged Robots in Complex Environments
• Probabilistic Verification for Obviously Strategyproof Mechanisms
• The Markov-quantile process attached to a family of Marginals
• Rate-Splitting Multiple Access for Cooperative Multi-Cell Networks
• Detecting and modeling worst-case dependence structures between random inputs of computational reliability models
• Learning Non-Stationary Space-Time Models for Environmental Monitoring
• Cayley sums and Minkowski sums of $2$-convex-normal lattice polytopes
• A theory of linear typings as flows on 3-valent graphs
• A matrix-free approach to parallel and memory-efficient deformable image registration
• Persistent Monitoring of Stochastic Spatio-temporal Phenomena with a Small Team of Robots
• Maximal discrete sparsity in parabolic optimal control with measures
• Random Asynchronous Iterations in Distributed Coordination Algorithms
• Convergence and Concentration of Empirical Measures under Wasserstein Distance in Unbounded Functional Spaces
• Quantum Walk Search on Kronecker Graphs
• Certified Graph View Maintenance with Regular Datalog
• Geometry and temperature chaos in mixed spherical spin glasses at low temperature – the perturbative regime
• Decoupled Parallel Backpropagation with Convergence Guarantee
• The Estimation Lie Algebra Associated with Quantum Filters
• Free energy landscapes in spherical spin glasses
• Alleviating partisan gerrymandering: can math and computers help to eliminate wasted votes?
• Approximating Nash Equilibria for Black-Box Games: A Bayesian Optimization Approach
• An improvement of the convergence proof of the ADAM-Optimizer
• Quantum Algorithms for Connectivity and Related Problems
• Recoverable Consensus in Shared Memory
• Stabilization of port-Hamiltonian systems by nonlinear boundary control in the presence of disturbances
• Scaling property of the statistical Two-Sample Energy Test
• Expectation Optimization with Probabilistic Guarantees in POMDPs with Discounted-sum Objectives
• Fractional networks, the new structure
• On the Estimation of Latent Distances Using Graph Distances
• Improving Coverage and Runtime Complexity for Exact Inference in Non-Projective Transition-Based Dependency Parsers
Like this:
Like Loading...