We examine two fundamental tasks associated with graph representation
learning: link prediction and node classification. We present a new autoencoder
architecture capable of learning a joint representation of local graph
structure and available node features for the simultaneous multi-task learning
of unsupervised link prediction and semi-supervised node classification. Our
simple, yet effective and versatile model is efficiently trained end-to-end in
a single stage, whereas previous related deep graph embedding methods require
multiple training steps that are difficult to optimize. We provide an empirical
evaluation of our model on five benchmark relational, graph-structured datasets
and demonstrate significant improvement over three strong baselines for graph
representation learning. Reference code and data are available at
https://github.com/vuptran/graph-representation-learning

more |
pdf
| html
BrundageBot:
Multi-Task Graph Autoencoders. Phi Vu Tran https://t.co/1fNS78CO5I

arxivml:
"Multi-Task Graph Autoencoders",
Phi Vu Tran
https://t.co/5czBDyY1DX

Autoencoders for Link Prediction and Semi-Supervised Node Classification

Stargazers: 55

Subscribers: 6

Subscribers: 6

Forks: 15

Open Issues: 1

Open Issues: 1

None.

Sample Sizes : None.

Authors: 1

Total Words: 3000

Unqiue Words: 1190

Deep neural networks (DNNs) are vulnerable to adversarial examples,
perturbations carefully crafted to fool the targeted DNN, in both the
non-targeted and targeted case. In the non-targeted case, the attacker simply
aims to induce misclassification. In the targeted case, the attacker aims to
induce classification to a specified target class. In addition, it has been
observed that strong adversarial examples can transfer to unknown models,
yielding a serious security concern. The NIPS 2017 competition was organized to
accelerate research in adversarial attacks and defenses, taking place in the
realistic setting where submitted adversarial attacks attempt to transfer to
submitted defenses. The CAAD 2018 competition took place with nearly identical
rules to the NIPS 2017 one. Given the requirement that the NIPS 2017
submissions were to be open-sourced, participants in the CAAD 2018 competition
were able to directly build upon previous solutions, and thus improve the
state-of-the-art in this setting. Our team participated in the CAAD...

more |
pdf
| html
None.

cynicalsecurity:
Y. Sharma et al., “CAAD 2018: Generating Transferable Adversarial Examples” https://t.co/DX6veIoHSb

BrundageBot:
CAAD 2018: Generating Transferable Adversarial Examples. Yash Sharma, Tien-Dung Le, and Moustafa Alzantot https://t.co/WWgpqfl2yx

m_alzantot:
. Check the technical report with the description of our award-winning submissions in the Competition on Adversarial Attacks and Defenses (CAAD 2018).
1st place (targeted ,non-targeted attacks), 3rd place (defense)
https://t.co/gbLn2YGfTa
@GeekPwn

nmfeeds:
[AI] https://t.co/qIRzX7vC39 CAAD 2018: Generating Transferable Adversarial Examples. Deep neural networks (DNNs) are vuln...

nmfeeds:
[O] https://t.co/qIRzX7vC39 CAAD 2018: Generating Transferable Adversarial Examples. Deep neural networks (DNNs) are vulne...

SciFi:
CAAD 2018: Generating Transferable Adversarial Examples. https://t.co/QX7L1ZZHOT

pinyuchenTW:
Big congrats to Yash. See https://t.co/8wAdzA98vd for more details. https://t.co/vxgEW1Vbwm

biggiobattista:
RT @pinyuchenTW: Big congrats to Yash. See https://t.co/8wAdzA98vd for more details. https://t.co/vxgEW1Vbwm

None.

None.

Sample Sizes : None.

Authors: 3

Total Words: 5335

Unqiue Words: 1651

Time-continuous emotion prediction has become an increasingly compelling task
in machine learning. Considerable efforts have been made to advance the
performance of these systems. Nonetheless, the main focus has been the
development of more sophisticated models and the incorporation of different
expressive modalities (e. g., speech, face, and physiology). In this paper,
motivated by the benefit of difficulty awareness in a human learning procedure,
we propose a novel machine learning framework, namely, Dynamic Difficulty
Awareness Training (DDAT), which sheds fresh light on the research -- directly
exploiting the difficulties in learning to boost the machine learning process.
The DDAT framework consists of two stages: information retrieval and
information exploitation. In the first stage, we make use of the reconstruction
error of input features or the annotation uncertainty to estimate the
difficulty of learning specific information. The obtained difficulty level is
then used in tandem with original features to update the model...

more |
pdf
| html
arxivml:
"Dynamic Difficulty Awareness Training for Continuous Emotion Prediction",
Zixing Zhang, Jing Han, Eduardo Coutinho…
https://t.co/5Z57l7FATy

nmfeeds:
[AI] https://t.co/70k03WpLT2 Dynamic Difficulty Awareness Training for Continuous Emotion Prediction. Time-continuous emot...

nmfeeds:
[O] https://t.co/70k03WpLT2 Dynamic Difficulty Awareness Training for Continuous Emotion Prediction. Time-continuous emoti...

SciFi:
Dynamic Difficulty Awareness Training for Continuous Emotion Prediction. https://t.co/vCBlRjaarY

arxiv_cshc:
Dynamic Difficulty Awareness Training for Continuous Emotion Prediction https://t.co/DWYbojb5kK

officialAAAC:
RT @SciFi: Dynamic Difficulty Awareness Training for Continuous Emotion Prediction. https://t.co/vCBlRjaarY

None.

None.

Sample Sizes : None.

Authors: 4

Total Words: 12183

Unqiue Words: 3536

We design and analyze TS-Cascade, a Thompson sampling algorithm for the
cascading bandit problem. In TS-Cascade, Bayesian estimates of the click
probability are constructed using a univariate Gaussian; this leads to a more
efficient exploration procedure vis-\`a-vis existing UCB-based approaches. We
also incorporate the empirical variance of each item's click probability into
the Bayesian updates. These two novel features allow us to prove an expected
regret bound of the form $\tilde{O}(\sqrt{KLT})$ where $L$ and $K$ are the
number of ground items and the number of items in the chosen list respectively
and $T\ge L$ is the number of Thompson sampling update steps. This matches the
state-of-the-art regret bounds for UCB-based algorithms. More importantly, it
is the first theoretical guarantee on a Thompson sampling algorithm for any
stochastic combinatorial bandit problem model with partial feedback. Empirical
experiments demonstrate superiority of TS-Cascade compared to existing
UCB-based procedures in terms of the expected...

more |
pdf
| html
None.

arxiv_flying:
#AISTATS2019 Thompson Sampling for Cascading Bandits. (arXiv:1810.01187v1 [cs\.LG]) https://t.co/PqyXqw5sbL

StatsPapers:
Thompson Sampling for Cascading Bandits. https://t.co/ZxFZKUOVRt

None.

None.

Sample Sizes : None.

Authors: 3

Total Words: 10706

Unqiue Words: 2440

Recently, considerable research attention has been paid to network embedding,
a popular approach to construct feature vectors of vertices. Due to the curse
of dimensionality and sparsity in graphical datasets, this approach has become
indispensable for machine learning tasks over large networks. The majority of
existing literature has considered this technique under the assumption that the
network is static. However, networks in many applications, nodes and edges
accrue to a growing network as a streaming. A small number of very recent
results have addressed the problem of embedding for dynamic networks. However,
they either rely on knowledge of vertex attributes, suffer high-time complexity
or need to be re-trained without closed-form expression. Thus the approach of
adapting the existing methods to the streaming environment faces non-trivial
technical challenges.
These challenges motivate developing new approaches to the problems of
streaming network embedding. In this paper, We propose a new framework that is
able to generate...

more |
pdf
| html
arxivml:
"Streaming Network Embedding through Local Actions",
Xi Liu, Ping-Chun Hsieh, Nick Duffield, Rui Chen, Muhe Xie, Xi…
https://t.co/OE84J7ptBT

nmfeeds:
[O] https://t.co/4nYgdelKAY Streaming Network Embedding through Local Actions. Recently, considerable research attention h...

ComputerPapers:
Streaming Network Embedding through Local Actions. https://t.co/d0OMn7F7Mq

SRoyLee:
Streaming Network Embedding through Local Actions - https://t.co/fQtQtgZKNn

None.

None.

Sample Sizes : None.

Authors: 6

Total Words: 9990

Unqiue Words: 2430

Buried landmines and unexploded remnants of war are a constant threat for the
population of many countries that have been hit by wars in the past years. The
huge amount of human lives lost due to this phenomenon has been a strong
motivation for the research community toward the development of safe and robust
techniques designed for landmine clearance. Nonetheless, being able to detect
and localize buried landmines with high precision in an automatic fashion is
still considered a challenging task due to the many different boundary
conditions that characterize this problem (e.g., several kinds of objects to
detect, different soils and meteorological conditions, etc.). In this paper, we
propose a novel technique for buried object detection tailored to unexploded
landmine discovery. The proposed solution exploits a specific kind of
convolutional neural network (CNN) known as autoencoder to analyze volumetric
data acquired with ground penetrating radar (GPR) using different
polarizations. This method works in an anomaly detection...

more |
pdf
| html
StatsPapers:
Landmine Detection Using Autoencoders on Multi-polarization GPR Volumetric Data. https://t.co/8dD6JZgq20

RexDouglass:
RT @StatsPapers: Landmine Detection Using Autoencoders on Multi-polarization GPR Volumetric Data. https://t.co/8dD6JZgq20

None.

None.

Sample Sizes : None.

Authors: 5

Total Words: 9881

Unqiue Words: 2860

Subspace clustering aims to find groups of similar objects (clusters) that
exist in lower dimensional subspaces from a high dimensional dataset. It has a
wide range of applications, such as analysing high dimensional sensor data or
DNA sequences. However, existing algorithms have limitations in finding
clusters in non-disjoint subspaces and scaling to large data, which impinge
their applicability in areas such as bioinformatics and the Internet of Things.
We aim to address such limitations by proposing a subspace clustering algorithm
using a bottom-up strategy. Our algorithm first searches for base clusters in
low dimensional subspaces. It then forms clusters in higher-dimensional
subspaces using these base clusters, which we formulate as a frequent pattern
mining problem. This formulation enables efficient search for clusters in
higher-dimensional subspaces, which is done using FP-trees. The proposed
algorithm is evaluated against traditional bottom-up clustering algorithms and
state-of-the-art subspace clustering algorithms. The...

more |
pdf
| html
None.

arxivml:
"Scalable Bottom-up Subspace Clustering using FP-Trees for High Dimensional Data",
Minh Tuan Doan, Jianzhong Qi, Su…
https://t.co/Ksp2FOC8lU

None.

None.

Sample Sizes : None.

Authors: 4

Total Words: 8889

Unqiue Words: 2364

Real-world social networks and digital platforms are comprised of individuals
(nodes) that are linked to other individuals or entities through multiple types
of relationships (links). Sub-networks of such a network based on each type of
link correspond to distinct views of the underlying network. In real-world
applications, each node is typically linked to only a small subset of other
nodes. Hence, practical approaches to problems such as node labeling have to
cope with the resulting sparse networks. While low-dimensional network
embeddings offer a promising approach to this problem, most of the current
network embedding methods focus primarily on single view networks. We introduce
a novel multi-view network embedding (MVNE) algorithm for constructing
low-dimensional node embeddings from multi-view networks. MVNE adapts and
extends an approach to single view network embedding (SVNE) using graph
factorization clustering (GFC) to the multi-view setting using an objective
function that maximizes the agreement between views based on...

more |
pdf
| html
None.

arxivml:
"Multi-View Network Embedding Via Graph Factorization Clustering and Co-Regularized Multi-View Agreement",
Yiwei Su…
https://t.co/U35IuESBAj

None.

None.

Sample Sizes : None.

Authors: 4

Total Words: 6905

Unqiue Words: 2148

We use borehole resistivity measurements to map the electrical properties of
the subsurface and to increase the productivity of a reservoir. When used for
geosteering purposes, it becomes essential to invert them in real time. In this
work, we explore the possibility of using Deep Neural Network (DNN) to perform
a rapid inversion of borehole resistivity measurements. Herein, we build a DNN
that approximates the following inverse problem: given a set of borehole
resistivity measurements, the DNN is designed to deliver a physically
meaningful and data-consistent piecewise one-dimensional layered model of the
surrounding subsurface. Once the DNN is built, we can perform the actual
inversion of the field measurements in real time. We illustrate the performance
of DNN of logging-while-drilling measurements acquired on high-angle wells via
synthetic data.

more |
pdf
| html
arxivml:
"A Deep Learning Approach to the Inversion of Borehole Resistivity Measurements",
M． Shahriari, D． Pardo, A． Picón,…
https://t.co/mjz7jMmaKP

Memoirs:
A Deep Learning Approach to the Inversion of Borehole Resistivity Measurements. https://t.co/saIN35SpSP

None.

None.

Sample Sizes : None.

Authors: 6

Total Words: 9232

Unqiue Words: 2451

Dynamic ensemble selection systems work by estimating the level of competence
of each classifier from a pool of classifiers. Only the most competent ones are
selected to classify a given test sample. This is achieved by defining a
criterion to measure the level of competence of a base classifier, such as, its
accuracy in local regions of the feature space around the query instance.
However, using only one criterion about the behavior of a base classifier is
not sufficient to accurately estimate its level of competence. In this paper,
we present a novel dynamic ensemble selection framework using meta-learning. We
propose five distinct sets of meta-features, each one corresponding to a
different criterion to measure the level of competence of a classifier for the
classification of input samples. The meta-features are extracted from the
training data and used to train a meta-classifier to predict whether or not a
base classifier is competent enough to classify an input instance. During the
generalization phase, the meta-features are...

more |
pdf
| html
None.

None.

Sample Sizes : None.

Authors: 4

Total Words: 9906

Unqiue Words: 2425

Assert is a website where the best academic papers on arXiv (computer science, math, physics), bioRxiv (biology), BITSS (reproducibility), EarthArXiv (earth science), engrXiv (engineering), LawArXiv (law), PsyArXiv (psychology), SocArXiv (social science), and SportRxiv (sport research) bubble to the top each day.

Papers are scored (in real-time) based on how verifiable they are (as determined by their Github repos) and how interesting they are (based on Twitter).

To see top papers, follow us on twitter @assertpub_ (arXiv), @assert_pub (bioRxiv), and @assertpub_dev (everything else).

To see beautiful figures extracted from papers, follow us on Instagram.

*Tracking 72,893 papers.*

Sort results based on if they are interesting or reproducible.

Interesting

Reproducible