Top 10 Arxiv Papers Today in Machine Learning


0.0 Mikeys
#1. Multi-Task Graph Autoencoders
Phi Vu Tran
We examine two fundamental tasks associated with graph representation learning: link prediction and node classification. We present a new autoencoder architecture capable of learning a joint representation of local graph structure and available node features for the simultaneous multi-task learning of unsupervised link prediction and semi-supervised node classification. Our simple, yet effective and versatile model is efficiently trained end-to-end in a single stage, whereas previous related deep graph embedding methods require multiple training steps that are difficult to optimize. We provide an empirical evaluation of our model on five benchmark relational, graph-structured datasets and demonstrate significant improvement over three strong baselines for graph representation learning. Reference code and data are available at https://github.com/vuptran/graph-representation-learning
more | pdf | html
Figures
Tweets
BrundageBot: Multi-Task Graph Autoencoders. Phi Vu Tran https://t.co/1fNS78CO5I
arxivml: "Multi-Task Graph Autoencoders", Phi Vu Tran https://t.co/5czBDyY1DX
Github

Autoencoders for Link Prediction and Semi-Supervised Node Classification

Repository: graph-representation-learning
User: vuptran
Language: Python
Stargazers: 55
Subscribers: 6
Forks: 15
Open Issues: 1
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 1
Total Words: 3000
Unqiue Words: 1190

0.0 Mikeys
#2. CAAD 2018: Generating Transferable Adversarial Examples
Yash Sharma, Tien-Dung Le, Moustafa Alzantot
Deep neural networks (DNNs) are vulnerable to adversarial examples, perturbations carefully crafted to fool the targeted DNN, in both the non-targeted and targeted case. In the non-targeted case, the attacker simply aims to induce misclassification. In the targeted case, the attacker aims to induce classification to a specified target class. In addition, it has been observed that strong adversarial examples can transfer to unknown models, yielding a serious security concern. The NIPS 2017 competition was organized to accelerate research in adversarial attacks and defenses, taking place in the realistic setting where submitted adversarial attacks attempt to transfer to submitted defenses. The CAAD 2018 competition took place with nearly identical rules to the NIPS 2017 one. Given the requirement that the NIPS 2017 submissions were to be open-sourced, participants in the CAAD 2018 competition were able to directly build upon previous solutions, and thus improve the state-of-the-art in this setting. Our team participated in the CAAD...
more | pdf | html
Figures
None.
Tweets
cynicalsecurity: Y. Sharma et al., “CAAD 2018: Generating Transferable Adversarial Examples” https://t.co/DX6veIoHSb
BrundageBot: CAAD 2018: Generating Transferable Adversarial Examples. Yash Sharma, Tien-Dung Le, and Moustafa Alzantot https://t.co/WWgpqfl2yx
m_alzantot: . Check the technical report with the description of our award-winning submissions in the Competition on Adversarial Attacks and Defenses (CAAD 2018). 1st place (targeted ,non-targeted attacks), 3rd place (defense) https://t.co/gbLn2YGfTa @GeekPwn
nmfeeds: [AI] https://t.co/qIRzX7vC39 CAAD 2018: Generating Transferable Adversarial Examples. Deep neural networks (DNNs) are vuln...
nmfeeds: [O] https://t.co/qIRzX7vC39 CAAD 2018: Generating Transferable Adversarial Examples. Deep neural networks (DNNs) are vulne...
SciFi: CAAD 2018: Generating Transferable Adversarial Examples. https://t.co/QX7L1ZZHOT
pinyuchenTW: Big congrats to Yash. See https://t.co/8wAdzA98vd for more details. https://t.co/vxgEW1Vbwm
biggiobattista: RT @pinyuchenTW: Big congrats to Yash. See https://t.co/8wAdzA98vd for more details. https://t.co/vxgEW1Vbwm
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 3
Total Words: 5335
Unqiue Words: 1651

0.0 Mikeys
#3. Dynamic Difficulty Awareness Training for Continuous Emotion Prediction
Zixing Zhang, Jing Han, Eduardo Coutinho, Björn Schuller
Time-continuous emotion prediction has become an increasingly compelling task in machine learning. Considerable efforts have been made to advance the performance of these systems. Nonetheless, the main focus has been the development of more sophisticated models and the incorporation of different expressive modalities (e. g., speech, face, and physiology). In this paper, motivated by the benefit of difficulty awareness in a human learning procedure, we propose a novel machine learning framework, namely, Dynamic Difficulty Awareness Training (DDAT), which sheds fresh light on the research -- directly exploiting the difficulties in learning to boost the machine learning process. The DDAT framework consists of two stages: information retrieval and information exploitation. In the first stage, we make use of the reconstruction error of input features or the annotation uncertainty to estimate the difficulty of learning specific information. The obtained difficulty level is then used in tandem with original features to update the model...
more | pdf | html
Figures
Tweets
arxivml: "Dynamic Difficulty Awareness Training for Continuous Emotion Prediction", Zixing Zhang, Jing Han, Eduardo Coutinho… https://t.co/5Z57l7FATy
nmfeeds: [AI] https://t.co/70k03WpLT2 Dynamic Difficulty Awareness Training for Continuous Emotion Prediction. Time-continuous emot...
nmfeeds: [O] https://t.co/70k03WpLT2 Dynamic Difficulty Awareness Training for Continuous Emotion Prediction. Time-continuous emoti...
SciFi: Dynamic Difficulty Awareness Training for Continuous Emotion Prediction. https://t.co/vCBlRjaarY
arxiv_cshc: Dynamic Difficulty Awareness Training for Continuous Emotion Prediction https://t.co/DWYbojb5kK
officialAAAC: RT @SciFi: Dynamic Difficulty Awareness Training for Continuous Emotion Prediction. https://t.co/vCBlRjaarY
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 4
Total Words: 12183
Unqiue Words: 3536

0.0 Mikeys
#4. Thompson Sampling for Cascading Bandits
Wang Chi Cheung, Vincent Y. F. Tan, Zixin Zhong
We design and analyze TS-Cascade, a Thompson sampling algorithm for the cascading bandit problem. In TS-Cascade, Bayesian estimates of the click probability are constructed using a univariate Gaussian; this leads to a more efficient exploration procedure vis-\`a-vis existing UCB-based approaches. We also incorporate the empirical variance of each item's click probability into the Bayesian updates. These two novel features allow us to prove an expected regret bound of the form $\tilde{O}(\sqrt{KLT})$ where $L$ and $K$ are the number of ground items and the number of items in the chosen list respectively and $T\ge L$ is the number of Thompson sampling update steps. This matches the state-of-the-art regret bounds for UCB-based algorithms. More importantly, it is the first theoretical guarantee on a Thompson sampling algorithm for any stochastic combinatorial bandit problem model with partial feedback. Empirical experiments demonstrate superiority of TS-Cascade compared to existing UCB-based procedures in terms of the expected...
more | pdf | html
Figures
None.
Tweets
arxiv_flying: #AISTATS2019 Thompson Sampling for Cascading Bandits. (arXiv:1810.01187v1 [cs\.LG]) https://t.co/PqyXqw5sbL
StatsPapers: Thompson Sampling for Cascading Bandits. https://t.co/ZxFZKUOVRt
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 3
Total Words: 10706
Unqiue Words: 2440

0.0 Mikeys
#5. Streaming Network Embedding through Local Actions
Xi Liu, Ping-Chun Hsieh, Nick Duffield, Rui Chen, Muhe Xie, Xidao Wen
Recently, considerable research attention has been paid to network embedding, a popular approach to construct feature vectors of vertices. Due to the curse of dimensionality and sparsity in graphical datasets, this approach has become indispensable for machine learning tasks over large networks. The majority of existing literature has considered this technique under the assumption that the network is static. However, networks in many applications, nodes and edges accrue to a growing network as a streaming. A small number of very recent results have addressed the problem of embedding for dynamic networks. However, they either rely on knowledge of vertex attributes, suffer high-time complexity or need to be re-trained without closed-form expression. Thus the approach of adapting the existing methods to the streaming environment faces non-trivial technical challenges. These challenges motivate developing new approaches to the problems of streaming network embedding. In this paper, We propose a new framework that is able to generate...
more | pdf | html
Figures
Tweets
arxivml: "Streaming Network Embedding through Local Actions", Xi Liu, Ping-Chun Hsieh, Nick Duffield, Rui Chen, Muhe Xie, Xi… https://t.co/OE84J7ptBT
nmfeeds: [O] https://t.co/4nYgdelKAY Streaming Network Embedding through Local Actions. Recently, considerable research attention h...
ComputerPapers: Streaming Network Embedding through Local Actions. https://t.co/d0OMn7F7Mq
SRoyLee: Streaming Network Embedding through Local Actions - https://t.co/fQtQtgZKNn
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 6
Total Words: 9990
Unqiue Words: 2430

0.0 Mikeys
#6. Landmine Detection Using Autoencoders on Multi-polarization GPR Volumetric Data
Paolo Bestagini, Federico Lombardi, Maurizio Lualdi, Francesco Picetti, Stefano Tubaro
Buried landmines and unexploded remnants of war are a constant threat for the population of many countries that have been hit by wars in the past years. The huge amount of human lives lost due to this phenomenon has been a strong motivation for the research community toward the development of safe and robust techniques designed for landmine clearance. Nonetheless, being able to detect and localize buried landmines with high precision in an automatic fashion is still considered a challenging task due to the many different boundary conditions that characterize this problem (e.g., several kinds of objects to detect, different soils and meteorological conditions, etc.). In this paper, we propose a novel technique for buried object detection tailored to unexploded landmine discovery. The proposed solution exploits a specific kind of convolutional neural network (CNN) known as autoencoder to analyze volumetric data acquired with ground penetrating radar (GPR) using different polarizations. This method works in an anomaly detection...
more | pdf | html
Figures
Tweets
StatsPapers: Landmine Detection Using Autoencoders on Multi-polarization GPR Volumetric Data. https://t.co/8dD6JZgq20
RexDouglass: RT @StatsPapers: Landmine Detection Using Autoencoders on Multi-polarization GPR Volumetric Data. https://t.co/8dD6JZgq20
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 5
Total Words: 9881
Unqiue Words: 2860

0.0 Mikeys
#7. Scalable Bottom-up Subspace Clustering using FP-Trees for High Dimensional Data
Minh Tuan Doan, Jianzhong Qi, Sutharshan Rajasegarar, Christopher Leckie
Subspace clustering aims to find groups of similar objects (clusters) that exist in lower dimensional subspaces from a high dimensional dataset. It has a wide range of applications, such as analysing high dimensional sensor data or DNA sequences. However, existing algorithms have limitations in finding clusters in non-disjoint subspaces and scaling to large data, which impinge their applicability in areas such as bioinformatics and the Internet of Things. We aim to address such limitations by proposing a subspace clustering algorithm using a bottom-up strategy. Our algorithm first searches for base clusters in low dimensional subspaces. It then forms clusters in higher-dimensional subspaces using these base clusters, which we formulate as a frequent pattern mining problem. This formulation enables efficient search for clusters in higher-dimensional subspaces, which is done using FP-trees. The proposed algorithm is evaluated against traditional bottom-up clustering algorithms and state-of-the-art subspace clustering algorithms. The...
more | pdf | html
Figures
None.
Tweets
arxivml: "Scalable Bottom-up Subspace Clustering using FP-Trees for High Dimensional Data", Minh Tuan Doan, Jianzhong Qi, Su… https://t.co/Ksp2FOC8lU
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 4
Total Words: 8889
Unqiue Words: 2364

0.0 Mikeys
#8. Multi-View Network Embedding Via Graph Factorization Clustering and Co-Regularized Multi-View Agreement
Yiwei Sun, Ngot Bu, Tsung-Yu Hsieh, Vasant Honavar
Real-world social networks and digital platforms are comprised of individuals (nodes) that are linked to other individuals or entities through multiple types of relationships (links). Sub-networks of such a network based on each type of link correspond to distinct views of the underlying network. In real-world applications, each node is typically linked to only a small subset of other nodes. Hence, practical approaches to problems such as node labeling have to cope with the resulting sparse networks. While low-dimensional network embeddings offer a promising approach to this problem, most of the current network embedding methods focus primarily on single view networks. We introduce a novel multi-view network embedding (MVNE) algorithm for constructing low-dimensional node embeddings from multi-view networks. MVNE adapts and extends an approach to single view network embedding (SVNE) using graph factorization clustering (GFC) to the multi-view setting using an objective function that maximizes the agreement between views based on...
more | pdf | html
Figures
None.
Tweets
arxivml: "Multi-View Network Embedding Via Graph Factorization Clustering and Co-Regularized Multi-View Agreement", Yiwei Su… https://t.co/U35IuESBAj
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 4
Total Words: 6905
Unqiue Words: 2148

0.0 Mikeys
#9. A Deep Learning Approach to the Inversion of Borehole Resistivity Measurements
M. Shahriari, D. Pardo, A. Picón, A. Galdrán, J. Del Ser, C. Torres-Verdín
We use borehole resistivity measurements to map the electrical properties of the subsurface and to increase the productivity of a reservoir. When used for geosteering purposes, it becomes essential to invert them in real time. In this work, we explore the possibility of using Deep Neural Network (DNN) to perform a rapid inversion of borehole resistivity measurements. Herein, we build a DNN that approximates the following inverse problem: given a set of borehole resistivity measurements, the DNN is designed to deliver a physically meaningful and data-consistent piecewise one-dimensional layered model of the surrounding subsurface. Once the DNN is built, we can perform the actual inversion of the field measurements in real time. We illustrate the performance of DNN of logging-while-drilling measurements acquired on high-angle wells via synthetic data.
more | pdf | html
Figures
Tweets
arxivml: "A Deep Learning Approach to the Inversion of Borehole Resistivity Measurements", M. Shahriari, D. Pardo, A. Picón,… https://t.co/mjz7jMmaKP
Memoirs: A Deep Learning Approach to the Inversion of Borehole Resistivity Measurements. https://t.co/saIN35SpSP
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 6
Total Words: 9232
Unqiue Words: 2451

0.0 Mikeys
#10. META-DES: A Dynamic Ensemble Selection Framework using Meta-Learning
Rafael M. O. Cruz, Robert Sabourin, George D. C. Cavalcanti, Tsang Ing Ren
Dynamic ensemble selection systems work by estimating the level of competence of each classifier from a pool of classifiers. Only the most competent ones are selected to classify a given test sample. This is achieved by defining a criterion to measure the level of competence of a base classifier, such as, its accuracy in local regions of the feature space around the query instance. However, using only one criterion about the behavior of a base classifier is not sufficient to accurately estimate its level of competence. In this paper, we present a novel dynamic ensemble selection framework using meta-learning. We propose five distinct sets of meta-features, each one corresponding to a different criterion to measure the level of competence of a classifier for the classification of input samples. The meta-features are extracted from the training data and used to train a meta-classifier to predict whether or not a base classifier is competent enough to classify an input instance. During the generalization phase, the meta-features are...
more | pdf | html
Figures
Tweets
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 4
Total Words: 9906
Unqiue Words: 2425

About

Assert is a website where the best academic papers on arXiv (computer science, math, physics), bioRxiv (biology), BITSS (reproducibility), EarthArXiv (earth science), engrXiv (engineering), LawArXiv (law), PsyArXiv (psychology), SocArXiv (social science), and SportRxiv (sport research) bubble to the top each day.

Papers are scored (in real-time) based on how verifiable they are (as determined by their Github repos) and how interesting they are (based on Twitter).

To see top papers, follow us on twitter @assertpub_ (arXiv), @assert_pub (bioRxiv), and @assertpub_dev (everything else).

To see beautiful figures extracted from papers, follow us on Instagram.

Tracking 72,893 papers.

Search
Sort results based on if they are interesting or reproducible.
Interesting
Reproducible
Categories
All
Astrophysics
Cosmology and Nongalactic Astrophysics
Earth and Planetary Astrophysics
Astrophysics of Galaxies
High Energy Astrophysical Phenomena
Instrumentation and Methods for Astrophysics
Solar and Stellar Astrophysics
Condensed Matter
Disordered Systems and Neural Networks
Mesoscale and Nanoscale Physics
Materials Science
Other Condensed Matter
Quantum Gases
Soft Condensed Matter
Statistical Mechanics
Strongly Correlated Electrons
Superconductivity
Computer Science
Artificial Intelligence
Hardware Architecture
Computational Complexity
Computational Engineering, Finance, and Science
Computational Geometry
Computation and Language
Cryptography and Security
Computer Vision and Pattern Recognition
Computers and Society
Databases
Distributed, Parallel, and Cluster Computing
Digital Libraries
Discrete Mathematics
Data Structures and Algorithms
Emerging Technologies
Formal Languages and Automata Theory
General Literature
Graphics
Computer Science and Game Theory
Human-Computer Interaction
Information Retrieval
Information Theory
Machine Learning
Logic in Computer Science
Multiagent Systems
Multimedia
Mathematical Software
Numerical Analysis
Neural and Evolutionary Computing
Networking and Internet Architecture
Other Computer Science
Operating Systems
Performance
Programming Languages
Robotics
Symbolic Computation
Sound
Software Engineering
Social and Information Networks
Systems and Control
Economics
Econometrics
General Economics
Theoretical Economics
Electrical Engineering and Systems Science
Audio and Speech Processing
Image and Video Processing
Signal Processing
General Relativity and Quantum Cosmology
General Relativity and Quantum Cosmology
High Energy Physics - Experiment
High Energy Physics - Experiment
High Energy Physics - Lattice
High Energy Physics - Lattice
High Energy Physics - Phenomenology
High Energy Physics - Phenomenology
High Energy Physics - Theory
High Energy Physics - Theory
Mathematics
Commutative Algebra
Algebraic Geometry
Analysis of PDEs
Algebraic Topology
Classical Analysis and ODEs
Combinatorics
Category Theory
Complex Variables
Differential Geometry
Dynamical Systems
Functional Analysis
General Mathematics
General Topology
Group Theory
Geometric Topology
History and Overview
Information Theory
K-Theory and Homology
Logic
Metric Geometry
Mathematical Physics
Numerical Analysis
Number Theory
Operator Algebras
Optimization and Control
Probability
Quantum Algebra
Rings and Algebras
Representation Theory
Symplectic Geometry
Spectral Theory
Statistics Theory
Mathematical Physics
Mathematical Physics
Nonlinear Sciences
Adaptation and Self-Organizing Systems
Chaotic Dynamics
Cellular Automata and Lattice Gases
Pattern Formation and Solitons
Exactly Solvable and Integrable Systems
Nuclear Experiment
Nuclear Experiment
Nuclear Theory
Nuclear Theory
Physics
Accelerator Physics
Atmospheric and Oceanic Physics
Applied Physics
Atomic and Molecular Clusters
Atomic Physics
Biological Physics
Chemical Physics
Classical Physics
Computational Physics
Data Analysis, Statistics and Probability
Physics Education
Fluid Dynamics
General Physics
Geophysics
History and Philosophy of Physics
Instrumentation and Detectors
Medical Physics
Optics
Plasma Physics
Popular Physics
Physics and Society
Space Physics
Quantitative Biology
Biomolecules
Cell Behavior
Genomics
Molecular Networks
Neurons and Cognition
Other Quantitative Biology
Populations and Evolution
Quantitative Methods
Subcellular Processes
Tissues and Organs
Quantitative Finance
Computational Finance
Economics
General Finance
Mathematical Finance
Portfolio Management
Pricing of Securities
Risk Management
Statistical Finance
Trading and Market Microstructure
Quantum Physics
Quantum Physics
Statistics
Applications
Computation
Methodology
Machine Learning
Other Statistics
Statistics Theory
Feedback
Online
Stats
Tracking 72,893 papers.