Skip to content

New submissions for Mon, 26 Jun 23 #382

@e-tornike

Description

@e-tornike

Keyword: abstract meaning representation

Incorporating Graph Information in Transformer-based AMR Parsing

Authors: Pavlo Vasylenko, Pere-Lluís Huguet Cabot, Abelardo Carlos Martínez Lorenzo, Roberto Navigli
Arxiv: https://arxiv.org/abs/2306.13467
TLDR: Abstract Meaning Representation (AMR) is a Semantic Parsing formalism that aims at providing a semantic graph abstraction representing a given text. Current approaches are based on autoregressive language models such as BART or T5, fine-tuned through Teacher Forcing to obtain a linearized version of the AMR graph from a sentence. In this paper, we present LeakDistill, a model and method that explores a modification to the Transformer architecture, using structural adapters
Repo: None

Keyword: contrastive

A Reference-less Quality Metric for Automatic Speech Recognition via Contrastive-Learning of a Multi-Language Model with Self-Supervision

Authors: Kamer Ali Yuksel, Thiago Ferreira, Ahmet Gunduz, Mohamed Al-Badrashiny, Golara Javadi
Arxiv: https://arxiv.org/abs/2306.13114
TLDR: The common standard for quality evaluation of automatic speech recognition (ASR) systems is reference-based metrics such as the Word Error Rate (WER), computed using manual ground-truth transcriptions that are time-consuming and expensive to obtain. This work proposes a multi-language referenceless quality metric, which allows comparing the performance of different ASR models on a speech dataset without ground truth transcriptions. To estimate the quality of ASR hypotheses, a pre-trained language model (LM)
Repo: https://github.com/aixplain/NoRefER

TACO: Temporal Latent Action-Driven Contrastive Loss for Visual Reinforcement Learning

Authors: Ruijie Zheng, Xiyao Wang, Yanchao Sun, Shuang Ma, Jieyu Zhao, Huazhe Xu, Hal Daumé III, Furong Huang
Arxiv: https://arxiv.org/abs/2306.13229
TLDR: Despite recent progress in reinforcement learning (RL) from raw pixel data, sample inefficiency continues to present a substantial obstacle. Prior works have attempted to address this challenge by creating self-supervised auxiliary tasks, aiming to enrich the agent's learned representations with control-relevant information for future state prediction. However, these objectives are often insufficient to learn representations that can represent the optimal policy or value function, and they often consider tasks with small, abstract discrete action spaces and thus overlook the importance of
Repo: None

Patch-Level Contrasting without Patch Correspondence for Accurate and Dense Contrastive Representation Learning

Authors: Shaofeng Zhang, Feng Zhu, Rui Zhao, Junchi Yan
Arxiv: https://arxiv.org/abs/2306.13337
TLDR: We propose ADCLR: A ccurate and D ense Contrastive Representation Learning, a novel self-supervised learning framework for learning accurate and dense vision representation. To extract spatial-sensitive information, ADCLr introduces query patches for contrasting in addition with global contrasting. Compared with previous dense contrasting methods, AD CLR mainly enjoys three merits: i) achieving both global-discriminative and spatial-ensitive representation, ii) model-efficient (no extra parameters in
Repo: None

Manifold Contrastive Learning with Variational Lie Group Operators

Authors: Kion Fallah, Alec Helbling, Kyle A. Johnsen, Christopher J. Rozell
Arxiv: https://arxiv.org/abs/2306.13544
TLDR: Self-supervised learning of deep neural networks has become a prevalent paradigm for learning representations that transfer to a variety of downstream tasks. Similar to proposed models of the ventral stream of biological vision, it is observed that these networks lead to a separation of category manifolds in the representations of the penultimate layer. Although this observation matches the manifold hypothesis of representation learning, current self-supervisory approaches are limited in their ability to explicitly model this manifold. Indeed, current approaches often only apply
Repo: None

Keyword: knowledge graph

A Decade of Scholarly Research on Open Knowledge Graphs

Authors: Houcemeddine Turki, Abraham Toluwase Owodunni, Mohamed Ali Hadj Taieb, René Fabrice Bile, Mohamed Ben Aouicha, Vilém Zouhar
Arxiv: https://arxiv.org/abs/2306.13186
TLDR: The proliferation of open knowledge graphs has led to a surge in scholarly research on the topic over the past decade. This paper presents a bibliometric analysis of the scholarly literature on open knowledge nodes published between 2013 and 2023. The study aims to identify the trends, patterns, and impact of research in this field, as well as the key topics and research questions that have emerged. The work uses bibliographic techniques to analyze a sample of 4445 scholarly articles retrieved from Scopus.
Repo: None

Mutually Guided Few-shot Learning for Relational Triple Extraction

Authors: Chengmei Yang, Shuai Jiang, Bowei He, Chen Ma, Lianghua He
Arxiv: https://arxiv.org/abs/2306.13310
TLDR: Knowledge graphs (KGs), containing many entity-relation-entity triples, provide rich information for downstream applications. Although extracting triples from unstructured texts has been widely explored, most of them require a large number of labeled instances. The performance will drop dramatically when only few labeled data are available. To tackle this problem, we propose the Mutually Guided Few-shot learning framework for Relational Triple Extraction (MG-FTE). Specifically, our method consists of
Repo: https://github.com/ycm094/mg-fte-main

Knowledge-Infused Self Attention Transformers

Authors: Kaushik Roy, Yuxin Zi, Vignesh Narayanan, Manas Gaur, Amit Sheth
Arxiv: https://arxiv.org/abs/2306.13501
TLDR: Transformer-based language models have achieved impressive success in various natural language processing tasks due to their ability to capture complex dependencies and contextual information using self-attention mechanisms. However, they are not without limitations. These limitations include hallucinations, where they produce incorrect outputs with high confidence, and alignment issues, where it generate unhelpful and unsafe outputs for human users. These shortcomings stem from the absence of implicit and missing context in the data alone. To address this, researchers have explored augment
Repo: None

Keyword: legal

ovla: Neural Network Ownership Verification using Latent Watermarks

Authors: Feisi Fu, Wenchao Li
Arxiv: https://arxiv.org/abs/2306.13215
TLDR: Ownership verification for neural networks is important for protecting these models from illegal copying, free-riding, re-distribution and other intellectual property misuse. We present a novel methodology for neural network ownership verification based on the notion of latent watermarks. Existing ownership verification methods either modify or introduce constraints to the neural network parameters, which are accessible to an attacker in a white-box attack and can be harmful to the network's normal operation, or train the network to respond to specific
Repo: None

Preventing EFail Attacks with Client-Side WebAssembly: The Case of Swiss Post's IncaMail

Authors: Pascal Gerig, Jämes Ménétrey, Baptiste Lanoix, Florian Stoller, Pascal Felber, Marcelo Pasin, Valerio Schiavoni
Arxiv: https://arxiv.org/abs/2306.13388
TLDR: Traditional email encryption schemes are vulnerable to EFail attacks, which exploit the lack of message authentication by manipulating ciphertexts and exfiltrating plaintext via HTML backchannels. Swiss Post's IncaMail, a secure email service for transmitting legally binding, encrypted, and verifiable emails, counters EFail Attacks using an authenticated-encryption with associated data (AEAD) encryption scheme to ensure message privacy and authentication between servers. Inca Mail relies on a trusted infrastructure backend and
Repo: None

Keyword: multi-task

Multi-objective optimization based network control principles for identifying personalized drug targets with cancer

Authors: Jing Liang, Zhuo Hu, Zong-Wei Li, Kang-Jia Qiao, Wei-Feng Guo
Arxiv: https://arxiv.org/abs/2306.13349
TLDR: It is a big challenge to develop efficient models for identifying personalized drug targets (PDTs) from high-dimensional personalized genomic profile of individual patients. Recent structural network control principles have introduced a new approach to discover PDTs by selecting an optimal set of driver genes in personalized gene interaction network (PGIN). However, most of current methods only focus on controlling the system through a minimum driver-node set and ignore the existence of multiple candidate driver- node sets for therapeutic drug target identification in PG
Repo: None

Keyword: robustness

Evaluating the Robustness of Text-to-image Diffusion Models against Real-world Attacks

Authors: Hongcheng Gao, Hao Zhang, Yinpeng Dong, Zhijie Deng
Arxiv: https://arxiv.org/abs/2306.13103
TLDR: Text-to-image (T2I) diffusion models (DMs) have shown promise in generating high-quality images from textual descriptions. The real-world applications of these models require particular attention to their safety and fidelity, but this has not been sufficiently explored. One fundamental question is whether existing T2I DMs are robust against variations over input texts. To answer it, this work provides the first robustness evaluation of T2 I DMs. Unlike prior studies that focus
Repo: None

Anticipatory Thinking Challenges in Open Worlds: Risk Management

Authors: Adam Amos-Binks, Dustin Dannenhauer, Leilani H. Gilpin
Arxiv: https://arxiv.org/abs/2306.13157
TLDR: Anticipatory thinking drives our ability to manage risk - identification and mitigation - in everyday life, from bringing an umbrella when it might rain to buying car insurance. As AI systems become part of everyday life. As autonomous vehicles log millions of miles, StarCraft and Go agents have similar capabilities to humans, implicitly managing risks presented by their opponents. To further increase performance in these tasks, out-of-distribution evaluation can characterize a model's bias, what we view as a type of risk
Repo: None

Pruning for Better Domain Generalizability

Authors: Xinglong Sun
Arxiv: https://arxiv.org/abs/2306.13237
TLDR: In this paper, we investigate whether we could use pruning as a reliable method to boost the generalization ability of the model. We found that existing pruning method like L2 can already offer small improvement on the target domain performance. We further propose a novel pruning scoring method, called DSS, designed not to maintain source accuracy as typical pruning work, but to directly enhance the robustness of the models. We conduct empirical experiments to validate our method and demonstrate that it can
Repo: https://github.com/alexsunnik/pruning-for-better-domain-generalizability

GICI-LIB: A GNSS/INS/Camera Integrated Navigation Library

Authors: Cheng Chi, Xin Zhang, Jiahui Liu, Yulong Sun, Zihao Zhang, Xingqun Zhan
Arxiv: https://arxiv.org/abs/2306.13268
TLDR: Accurate navigation is essential for autonomous robots and vehicles. In recent years, the integration of the Global Navigation Satellite System (GNSS), Inertial Navigation System (INS), and camera has garnered considerable attention due to its robustness and high accuracy in diverse environments. In such systems, fully utilizing the role of GNSS is cumbersome because of the diverse choices of formulations, error models, satellite constellations, signal frequencies, and service types, which lead to different precision, robustness
Repo: None

Robustness of Segment Anything Model (SAM) for Autonomous Driving in Adverse Weather Conditions

Authors: Xinru Shan, Chaoning Zhang
Arxiv: https://arxiv.org/abs/2306.13290
TLDR: Segment Analysis Model (SAM) has gained considerable interest in recent times for its remarkable performance and has emerged as a foundational model in computer vision. It has been integrated in diverse downstream tasks, showcasing its strong zero-shot transfer capabilities. Given its impressive performance, there is a strong desire to apply SAM in autonomous driving to improve the performance of vision tasks, particularly in challenging scenarios such as driving under adverse weather conditions. However, its robustness under adverse conditions remains uncertain. In this work
Repo: None

Stress Testing BERT Anaphora Resolution Models for Reaction Extraction in Chemical Patents

Authors: Chieling Yueh, Evangelos Kanoulas, Bruno Martins, Camilo Thorne, Saber Akhondi
Arxiv: https://arxiv.org/abs/2306.13379
TLDR: The high volume of published chemical patents and the importance of a timely acquisition of their information gives rise to automating information extraction from chemical patents. Anaphora resolution is an important component of comprehensive information extraction, and is critical for extracting reactions. In chemical patents, there are five anaphoric relations of interest: co-reference, transformed, reaction associated, work up, and contained. Our goal is to investigate how the performance of anaphoraresolution models for reaction texts in chemical patents
Repo: None

Solving a class of multi-scale elliptic PDEs by means of Fourier-based mixed physics informed neural networks

Authors: Xi'an Li, Jinran Wu, Zhi-Qin John Xu, You-Gan Wang
Arxiv: https://arxiv.org/abs/2306.13385
TLDR: Deep neural networks have received significant attention due to their simplicity and flexibility in the fields of engineering and scientific calculation. In this work, we probe into solving a class of elliptic PDEs with multiple scales by means of Fourier-based mixed physics-informed neural networks (called FMPINN), and its solver is configured as a multi-scale DNN model. Unlike the classical PINN method, a dual (flux) variable about the rough coefficient of PDE
Repo: None

Preventing EFail Attacks with Client-Side WebAssembly: The Case of Swiss Post's IncaMail

Authors: Pascal Gerig, Jämes Ménétrey, Baptiste Lanoix, Florian Stoller, Pascal Felber, Marcelo Pasin, Valerio Schiavoni
Arxiv: https://arxiv.org/abs/2306.13388
TLDR: Traditional email encryption schemes are vulnerable to EFail attacks, which exploit the lack of message authentication by manipulating ciphertexts and exfiltrating plaintext via HTML backchannels. Swiss Post's IncaMail, a secure email service for transmitting legally binding, encrypted, and verifiable emails, counters EFail Attacks using an authenticated-encryption with associated data (AEAD) encryption scheme to ensure message privacy and authentication between servers. Inca Mail relies on a trusted infrastructure backend and
Repo: None

A Robustness Analysis to Structured Channel Tampering Over Secure-by-Design Consensus Networks

Authors: Marco Fabris, Daniel Zelazo
Arxiv: https://arxiv.org/abs/2306.13427
TLDR: This work addresses multi-agent consensus networks where adverse attackers affect the convergence performances of the protocol by manipulating the edge weights. We generalize (Fabris and Zelazo, 2022) and provide guarantees on the agents' agreement in the presence of attacks on multiple links in the network. A stability analysis is conducted to show the robustness to channel tampering in the scenario where part of the codeword, corresponding to the value of the edges weights, is corrupted. Exploiting the built
Repo: None

Bridging the Performance Gap between DETR and R-CNN for Graphical Object Detection in Document Images

Authors: Tahira Shehzadi, Khurram Azeem Hashmi, Didier Stricker, Marcus Liwicki, Muhammad Zeshan Afzal
Arxiv: https://arxiv.org/abs/2306.13526
TLDR: This paper takes an important step in bridging the performance gap between DETR and R-CNN for graphical objects detection. Existing graphical object detection approaches have enjoyed recent enhancements in CNN-based object detection methods, achieving remarkable progress. Recently, Transformer-based detectors have considerably boosted the generic object detection performance, eliminating the need for hand-crafted features or post-processing steps such as Non-Maximum Suppression (NMS) using object queries. However, the effectiveness of such enhanced
Repo: None

Revisiting the Optimal PMU Placement Problem in Multi-Machine Power Networks

Authors: Mohamad H. Kazma, Ahmad F. Taha
Arxiv: https://arxiv.org/abs/2306.13584
TLDR: To provide real-time visibility of physics-based states, phasor measurement units (PMUs) are deployed throughout power networks. PMU data enable real -time grid monitoring and control -- and is essential in transitioning to smarter grids. Various considerations are taken into account when determining the geographic, optimal PMU placements (OPP). This paper focuses on the control-theoretic, observability aspect of OPP. A myriad of studies have investigated observability-based formulations
Repo: None

Adversarial Robustness Certification for Bayesian Neural Networks

Authors: Matthew Wicker, Andrea Patane, Luca Laurenti, Marta Kwiatkowska
Arxiv: https://arxiv.org/abs/2306.13614
TLDR: We study the problem of certifying the robustness of Bayesian neural networks (BNNs) to adversarial input perturbations. Given a compact set of input points $T \subseteq \mathbb{R}^m$ and a set of output points $S \subsetseq \x$ and $T$ the output of a BNN sampled from the posterior is in $S$ and the output point is in the output set $T$. Given
Repo: https://github.com/matthewwicker/adversarialrobustnesscertificationforbnns

Keyword: scholarly

A Decade of Scholarly Research on Open Knowledge Graphs

Authors: Houcemeddine Turki, Abraham Toluwase Owodunni, Mohamed Ali Hadj Taieb, René Fabrice Bile, Mohamed Ben Aouicha, Vilém Zouhar
Arxiv: https://arxiv.org/abs/2306.13186
TLDR: The proliferation of open knowledge graphs has led to a surge in scholarly research on the topic over the past decade. This paper presents a bibliometric analysis of the scholarly literature on open knowledge nodes published between 2013 and 2023. The study aims to identify the trends, patterns, and impact of research in this field, as well as the key topics and research questions that have emerged. The work uses bibliographic techniques to analyze a sample of 4445 scholarly articles retrieved from Scopus.
Repo: None

Keyword: summarization

An overview on the evaluated video retrieval tasks at TRECVID 2022

Authors: George Awad, Keith Curtis, Asad Butt, Jonathan Fiscus, Afzal Godil, Yooyoung Lee, Andrew Delgado, Eliot Godard, Lukas Diduch, Jeffrey Liu, Yvette Graham, Georges Quenot
Arxiv: https://arxiv.org/abs/2306.13118
TLDR: The TREC Video Retrieval Evaluation (TRECVID) is a TREC-style video analysis and retrieval evaluation with the goal of promoting progress in research and development of content-based exploitation and retrieval of information from digital video via open, tasks-based evaluation supported by metrology. Over the last twenty-one years this effort has yielded a better understanding of how systems can effectively accomplish such processing and how one can reliably benchmark their performance. TRECVID has been funded by N
Repo: None

Key Frame Extraction with Attention Based Deep Neural Networks

Authors: Samed Arslan, Senem Tanberk
Arxiv: https://arxiv.org/abs/2306.13176
TLDR: Automatic keyframe detection from videos is an exercise in selecting scenes that can best summarize the content for long videos. Providing a summary of the video is an important task to facilitate quick browsing and content summarization. The resulting photos are used for automated works (e.g. summarizing security footage, detecting different scenes used in music clips) in different industries. In addition, processing high-volume videos in advanced machine learning methods also creates resource costs. Keyframes obtained; It can
Repo: None

Abstractive Text Summarization for Resumes With Cutting Edge NLP Transformers and LSTM

Authors: Öykü Berfin Mercan, Sena Nur Cavsak, Aysu Deliahmetoglu (Intern), Senem Tanberk
Arxiv: https://arxiv.org/abs/2306.13315
TLDR: Text summarization is a fundamental task in natural language processing that aims to condense large amounts of textual information into concise and coherent summaries. With the exponential growth of content and the need to extract key information efficiently, text summarization has gained significant attention in recent years. In this study, LSTM and pre-trained T5, Pegasus, BART and BART-Large model performances were evaluated on the open source dataset (Xsum, CNN/Daily Mail, Amazon Fine Food Review
Repo: None

GKD: Generalized Knowledge Distillation for Auto-regressive Sequence Models

Authors: Rishabh Agarwal, Nino Vieillard, Piotr Stanczyk, Sabela Ramos, Matthieu Geist, Olivier Bachem
Arxiv: https://arxiv.org/abs/2306.13649
TLDR: Knowledge distillation is commonly used for compressing neural networks to reduce their inference cost and memory footprint. However, current distillation methods for auto-regressive models, such as generative language models (LMs), suffer from two key issues: (1) distribution mismatch between output sequences during training and the sequences generated by the student during its deployment, and (2) model under-specification, where the student model may not be expressive enough to fit the teacher's distribution.
Repo: None