### Top 10 Arxiv Papers Today in Machine Learning

###### Phi Vu Tran
We examine two fundamental tasks associated with graph representation learning: link prediction and node classification. We present a new autoencoder architecture capable of learning a joint representation of local graph structure and available node features for the simultaneous multi-task learning of unsupervised link prediction and semi-supervised node classification. Our simple, yet effective and versatile model is efficiently trained end-to-end in a single stage, whereas previous related deep graph embedding methods require multiple training steps that are difficult to optimize. We provide an empirical evaluation of our model on five benchmark relational, graph-structured datasets and demonstrate significant improvement over three strong baselines for graph representation learning. Reference code and data are available at https://github.com/vuptran/graph-representation-learning
more | pdf | html
###### Tweets
BrundageBot: Multi-Task Graph Autoencoders. Phi Vu Tran https://t.co/1fNS78CO5I
arxivml: "Multi-Task Graph Autoencoders", Phi Vu Tran https://t.co/5czBDyY1DX
###### Github

Autoencoders for Link Prediction and Semi-Supervised Node Classification

Repository: graph-representation-learning
User: vuptran
Language: Python
Stargazers: 55
Subscribers: 6
Forks: 15
Open Issues: 1
None.
###### Other stats
Sample Sizes : None.
Authors: 1
Total Words: 3000
Unqiue Words: 1190

###### Yash Sharma, Tien-Dung Le, Moustafa Alzantot
Deep neural networks (DNNs) are vulnerable to adversarial examples, perturbations carefully crafted to fool the targeted DNN, in both the non-targeted and targeted case. In the non-targeted case, the attacker simply aims to induce misclassification. In the targeted case, the attacker aims to induce classification to a specified target class. In addition, it has been observed that strong adversarial examples can transfer to unknown models, yielding a serious security concern. The NIPS 2017 competition was organized to accelerate research in adversarial attacks and defenses, taking place in the realistic setting where submitted adversarial attacks attempt to transfer to submitted defenses. The CAAD 2018 competition took place with nearly identical rules to the NIPS 2017 one. Given the requirement that the NIPS 2017 submissions were to be open-sourced, participants in the CAAD 2018 competition were able to directly build upon previous solutions, and thus improve the state-of-the-art in this setting. Our team participated in the CAAD...
more | pdf | html
None.
###### Tweets
cynicalsecurity: Y. Sharma et al., “CAAD 2018: Generating Transferable Adversarial Examples” https://t.co/DX6veIoHSb
BrundageBot: CAAD 2018: Generating Transferable Adversarial Examples. Yash Sharma, Tien-Dung Le, and Moustafa Alzantot https://t.co/WWgpqfl2yx
m_alzantot: . Check the technical report with the description of our award-winning submissions in the Competition on Adversarial Attacks and Defenses (CAAD 2018). 1st place (targeted ,non-targeted attacks), 3rd place (defense) https://t.co/gbLn2YGfTa @GeekPwn
nmfeeds: [AI] https://t.co/qIRzX7vC39 CAAD 2018: Generating Transferable Adversarial Examples. Deep neural networks (DNNs) are vuln...
nmfeeds: [O] https://t.co/qIRzX7vC39 CAAD 2018: Generating Transferable Adversarial Examples. Deep neural networks (DNNs) are vulne...
pinyuchenTW: Big congrats to Yash. See https://t.co/8wAdzA98vd for more details. https://t.co/vxgEW1Vbwm
biggiobattista: RT @pinyuchenTW: Big congrats to Yash. See https://t.co/8wAdzA98vd for more details. https://t.co/vxgEW1Vbwm
None.
None.
###### Other stats
Sample Sizes : None.
Authors: 3
Total Words: 5335
Unqiue Words: 1651

##### #3. Dynamic Difficulty Awareness Training for Continuous Emotion Prediction
###### Zixing Zhang, Jing Han, Eduardo Coutinho, Björn Schuller
Time-continuous emotion prediction has become an increasingly compelling task in machine learning. Considerable efforts have been made to advance the performance of these systems. Nonetheless, the main focus has been the development of more sophisticated models and the incorporation of different expressive modalities (e. g., speech, face, and physiology). In this paper, motivated by the benefit of difficulty awareness in a human learning procedure, we propose a novel machine learning framework, namely, Dynamic Difficulty Awareness Training (DDAT), which sheds fresh light on the research -- directly exploiting the difficulties in learning to boost the machine learning process. The DDAT framework consists of two stages: information retrieval and information exploitation. In the first stage, we make use of the reconstruction error of input features or the annotation uncertainty to estimate the difficulty of learning specific information. The obtained difficulty level is then used in tandem with original features to update the model...
more | pdf | html
###### Tweets
arxivml: "Dynamic Difficulty Awareness Training for Continuous Emotion Prediction", Zixing Zhang, Jing Han, Eduardo Coutinho… https://t.co/5Z57l7FATy
nmfeeds: [AI] https://t.co/70k03WpLT2 Dynamic Difficulty Awareness Training for Continuous Emotion Prediction. Time-continuous emot...
nmfeeds: [O] https://t.co/70k03WpLT2 Dynamic Difficulty Awareness Training for Continuous Emotion Prediction. Time-continuous emoti...
SciFi: Dynamic Difficulty Awareness Training for Continuous Emotion Prediction. https://t.co/vCBlRjaarY
arxiv_cshc: Dynamic Difficulty Awareness Training for Continuous Emotion Prediction https://t.co/DWYbojb5kK
officialAAAC: RT @SciFi: Dynamic Difficulty Awareness Training for Continuous Emotion Prediction. https://t.co/vCBlRjaarY
None.
None.
###### Other stats
Sample Sizes : None.
Authors: 4
Total Words: 12183
Unqiue Words: 3536

##### #4. Thompson Sampling for Cascading Bandits
###### Wang Chi Cheung, Vincent Y. F. Tan, Zixin Zhong
We design and analyze TS-Cascade, a Thompson sampling algorithm for the cascading bandit problem. In TS-Cascade, Bayesian estimates of the click probability are constructed using a univariate Gaussian; this leads to a more efficient exploration procedure vis-\`a-vis existing UCB-based approaches. We also incorporate the empirical variance of each item's click probability into the Bayesian updates. These two novel features allow us to prove an expected regret bound of the form $\tilde{O}(\sqrt{KLT})$ where $L$ and $K$ are the number of ground items and the number of items in the chosen list respectively and $T\ge L$ is the number of Thompson sampling update steps. This matches the state-of-the-art regret bounds for UCB-based algorithms. More importantly, it is the first theoretical guarantee on a Thompson sampling algorithm for any stochastic combinatorial bandit problem model with partial feedback. Empirical experiments demonstrate superiority of TS-Cascade compared to existing UCB-based procedures in terms of the expected...
more | pdf | html
None.
###### Tweets
arxiv_flying: #AISTATS2019 Thompson Sampling for Cascading Bandits. (arXiv:1810.01187v1 [cs\.LG]) https://t.co/PqyXqw5sbL
StatsPapers: Thompson Sampling for Cascading Bandits. https://t.co/ZxFZKUOVRt
None.
None.
###### Other stats
Sample Sizes : None.
Authors: 3
Total Words: 10706
Unqiue Words: 2440

##### #5. Streaming Network Embedding through Local Actions
###### Xi Liu, Ping-Chun Hsieh, Nick Duffield, Rui Chen, Muhe Xie, Xidao Wen
Recently, considerable research attention has been paid to network embedding, a popular approach to construct feature vectors of vertices. Due to the curse of dimensionality and sparsity in graphical datasets, this approach has become indispensable for machine learning tasks over large networks. The majority of existing literature has considered this technique under the assumption that the network is static. However, networks in many applications, nodes and edges accrue to a growing network as a streaming. A small number of very recent results have addressed the problem of embedding for dynamic networks. However, they either rely on knowledge of vertex attributes, suffer high-time complexity or need to be re-trained without closed-form expression. Thus the approach of adapting the existing methods to the streaming environment faces non-trivial technical challenges. These challenges motivate developing new approaches to the problems of streaming network embedding. In this paper, We propose a new framework that is able to generate...
more | pdf | html
###### Tweets
arxivml: "Streaming Network Embedding through Local Actions", Xi Liu, Ping-Chun Hsieh, Nick Duffield, Rui Chen, Muhe Xie, Xi… https://t.co/OE84J7ptBT
nmfeeds: [O] https://t.co/4nYgdelKAY Streaming Network Embedding through Local Actions. Recently, considerable research attention h...
ComputerPapers: Streaming Network Embedding through Local Actions. https://t.co/d0OMn7F7Mq
SRoyLee: Streaming Network Embedding through Local Actions - https://t.co/fQtQtgZKNn
None.
None.
###### Other stats
Sample Sizes : None.
Authors: 6
Total Words: 9990
Unqiue Words: 2430

##### #6. Landmine Detection Using Autoencoders on Multi-polarization GPR Volumetric Data
###### Paolo Bestagini, Federico Lombardi, Maurizio Lualdi, Francesco Picetti, Stefano Tubaro
Buried landmines and unexploded remnants of war are a constant threat for the population of many countries that have been hit by wars in the past years. The huge amount of human lives lost due to this phenomenon has been a strong motivation for the research community toward the development of safe and robust techniques designed for landmine clearance. Nonetheless, being able to detect and localize buried landmines with high precision in an automatic fashion is still considered a challenging task due to the many different boundary conditions that characterize this problem (e.g., several kinds of objects to detect, different soils and meteorological conditions, etc.). In this paper, we propose a novel technique for buried object detection tailored to unexploded landmine discovery. The proposed solution exploits a specific kind of convolutional neural network (CNN) known as autoencoder to analyze volumetric data acquired with ground penetrating radar (GPR) using different polarizations. This method works in an anomaly detection...
more | pdf | html
###### Tweets
StatsPapers: Landmine Detection Using Autoencoders on Multi-polarization GPR Volumetric Data. https://t.co/8dD6JZgq20
RexDouglass: RT @StatsPapers: Landmine Detection Using Autoencoders on Multi-polarization GPR Volumetric Data. https://t.co/8dD6JZgq20
None.
None.
###### Other stats
Sample Sizes : None.
Authors: 5
Total Words: 9881
Unqiue Words: 2860

##### #7. Scalable Bottom-up Subspace Clustering using FP-Trees for High Dimensional Data
###### Minh Tuan Doan, Jianzhong Qi, Sutharshan Rajasegarar, Christopher Leckie
Subspace clustering aims to find groups of similar objects (clusters) that exist in lower dimensional subspaces from a high dimensional dataset. It has a wide range of applications, such as analysing high dimensional sensor data or DNA sequences. However, existing algorithms have limitations in finding clusters in non-disjoint subspaces and scaling to large data, which impinge their applicability in areas such as bioinformatics and the Internet of Things. We aim to address such limitations by proposing a subspace clustering algorithm using a bottom-up strategy. Our algorithm first searches for base clusters in low dimensional subspaces. It then forms clusters in higher-dimensional subspaces using these base clusters, which we formulate as a frequent pattern mining problem. This formulation enables efficient search for clusters in higher-dimensional subspaces, which is done using FP-trees. The proposed algorithm is evaluated against traditional bottom-up clustering algorithms and state-of-the-art subspace clustering algorithms. The...
more | pdf | html
None.
###### Tweets
arxivml: "Scalable Bottom-up Subspace Clustering using FP-Trees for High Dimensional Data", Minh Tuan Doan, Jianzhong Qi, Su… https://t.co/Ksp2FOC8lU
None.
None.
###### Other stats
Sample Sizes : None.
Authors: 4
Total Words: 8889
Unqiue Words: 2364

##### #8. Multi-View Network Embedding Via Graph Factorization Clustering and Co-Regularized Multi-View Agreement
###### Yiwei Sun, Ngot Bu, Tsung-Yu Hsieh, Vasant Honavar
Real-world social networks and digital platforms are comprised of individuals (nodes) that are linked to other individuals or entities through multiple types of relationships (links). Sub-networks of such a network based on each type of link correspond to distinct views of the underlying network. In real-world applications, each node is typically linked to only a small subset of other nodes. Hence, practical approaches to problems such as node labeling have to cope with the resulting sparse networks. While low-dimensional network embeddings offer a promising approach to this problem, most of the current network embedding methods focus primarily on single view networks. We introduce a novel multi-view network embedding (MVNE) algorithm for constructing low-dimensional node embeddings from multi-view networks. MVNE adapts and extends an approach to single view network embedding (SVNE) using graph factorization clustering (GFC) to the multi-view setting using an objective function that maximizes the agreement between views based on...
more | pdf | html
None.
###### Tweets
arxivml: "Multi-View Network Embedding Via Graph Factorization Clustering and Co-Regularized Multi-View Agreement", Yiwei Su… https://t.co/U35IuESBAj
None.
None.
###### Other stats
Sample Sizes : None.
Authors: 4
Total Words: 6905
Unqiue Words: 2148

##### #9. A Deep Learning Approach to the Inversion of Borehole Resistivity Measurements
###### M. Shahriari, D. Pardo, A. Picón, A. Galdrán, J. Del Ser, C. Torres-Verdín
We use borehole resistivity measurements to map the electrical properties of the subsurface and to increase the productivity of a reservoir. When used for geosteering purposes, it becomes essential to invert them in real time. In this work, we explore the possibility of using Deep Neural Network (DNN) to perform a rapid inversion of borehole resistivity measurements. Herein, we build a DNN that approximates the following inverse problem: given a set of borehole resistivity measurements, the DNN is designed to deliver a physically meaningful and data-consistent piecewise one-dimensional layered model of the surrounding subsurface. Once the DNN is built, we can perform the actual inversion of the field measurements in real time. We illustrate the performance of DNN of logging-while-drilling measurements acquired on high-angle wells via synthetic data.
more | pdf | html
###### Tweets
arxivml: "A Deep Learning Approach to the Inversion of Borehole Resistivity Measurements", M． Shahriari, D． Pardo, A． Picón,… https://t.co/mjz7jMmaKP
Memoirs: A Deep Learning Approach to the Inversion of Borehole Resistivity Measurements. https://t.co/saIN35SpSP
None.
None.
###### Other stats
Sample Sizes : None.
Authors: 6
Total Words: 9232
Unqiue Words: 2451

##### #10. META-DES: A Dynamic Ensemble Selection Framework using Meta-Learning
###### Rafael M. O. Cruz, Robert Sabourin, George D. C. Cavalcanti, Tsang Ing Ren
Dynamic ensemble selection systems work by estimating the level of competence of each classifier from a pool of classifiers. Only the most competent ones are selected to classify a given test sample. This is achieved by defining a criterion to measure the level of competence of a base classifier, such as, its accuracy in local regions of the feature space around the query instance. However, using only one criterion about the behavior of a base classifier is not sufficient to accurately estimate its level of competence. In this paper, we present a novel dynamic ensemble selection framework using meta-learning. We propose five distinct sets of meta-features, each one corresponding to a different criterion to measure the level of competence of a classifier for the classification of input samples. The meta-features are extracted from the training data and used to train a meta-classifier to predict whether or not a base classifier is competent enough to classify an input instance. During the generalization phase, the meta-features are...
more | pdf | html
None.
None.
###### Other stats
Sample Sizes : None.
Authors: 4
Total Words: 9906
Unqiue Words: 2425

Assert is a website where the best academic papers on arXiv (computer science, math, physics), bioRxiv (biology), BITSS (reproducibility), EarthArXiv (earth science), engrXiv (engineering), LawArXiv (law), PsyArXiv (psychology), SocArXiv (social science), and SportRxiv (sport research) bubble to the top each day.

Papers are scored (in real-time) based on how verifiable they are (as determined by their Github repos) and how interesting they are (based on Twitter).

To see top papers, follow us on twitter @assertpub_ (arXiv), @assert_pub (bioRxiv), and @assertpub_dev (everything else).

To see beautiful figures extracted from papers, follow us on Instagram.

Tracking 72,893 papers.

###### Search
Sort results based on if they are interesting or reproducible.
Interesting
Reproducible
Online
###### Stats
Tracking 72,893 papers.