-
SLATE: A Sequence Labeling Approach for Task Extraction from Free-form Inked Content
Authors:
Apurva Gandhi,
Ryan Serrao,
Biyi Fang,
Gilbert Antonius,
Jenna Hong,
Tra My Nguyen,
Sheng Yi,
Ehi Nosakhare,
Irene Shaffer,
Soundararajan Srinivasan,
Vivek Gupta
Abstract:
We present SLATE, a sequence labeling approach for extracting tasks from free-form content such as digitally handwritten (or "inked") notes on a virtual whiteboard. Our approach allows us to create a single, low-latency model to simultaneously perform sentence segmentation and classification of these sentences into task/non-task sentences. SLATE greatly outperforms a baseline two-model (sentence s…
▽ More
We present SLATE, a sequence labeling approach for extracting tasks from free-form content such as digitally handwritten (or "inked") notes on a virtual whiteboard. Our approach allows us to create a single, low-latency model to simultaneously perform sentence segmentation and classification of these sentences into task/non-task sentences. SLATE greatly outperforms a baseline two-model (sentence segmentation followed by classification model) approach, achieving a task F1 score of 84.4%, a sentence segmentation (boundary similarity) score of 88.4% and three times lower latency compared to the baseline. Furthermore, we provide insights into tackling challenges of performing NLP on the inking domain. We release both our code and dataset for this novel task.
△ Less
Submitted 17 November, 2022; v1 submitted 8 November, 2022;
originally announced November 2022.
-
MONAI: An open-source framework for deep learning in healthcare
Authors:
M. Jorge Cardoso,
Wenqi Li,
Richard Brown,
Nic Ma,
Eric Kerfoot,
Yiheng Wang,
Benjamin Murrey,
Andriy Myronenko,
Can Zhao,
Dong Yang,
Vishwesh Nath,
Yufan He,
Ziyue Xu,
Ali Hatamizadeh,
Andriy Myronenko,
Wentao Zhu,
Yun Liu,
Mingxin Zheng,
Yucheng Tang,
Isaac Yang,
Michael Zephyr,
Behrooz Hashemian,
Sachidanand Alle,
Mohammad Zalbagi Darestani,
Charlie Budd
, et al. (32 additional authors not shown)
Abstract:
Artificial Intelligence (AI) is having a tremendous impact across most areas of science. Applications of AI in healthcare have the potential to improve our ability to detect, diagnose, prognose, and intervene on human disease. For AI models to be used clinically, they need to be made safe, reproducible and robust, and the underlying software framework must be aware of the particularities (e.g. geo…
▽ More
Artificial Intelligence (AI) is having a tremendous impact across most areas of science. Applications of AI in healthcare have the potential to improve our ability to detect, diagnose, prognose, and intervene on human disease. For AI models to be used clinically, they need to be made safe, reproducible and robust, and the underlying software framework must be aware of the particularities (e.g. geometry, physiology, physics) of medical data being processed. This work introduces MONAI, a freely available, community-supported, and consortium-led PyTorch-based framework for deep learning in healthcare. MONAI extends PyTorch to support medical data, with a particular focus on imaging, and provide purpose-specific AI model architectures, transformations and utilities that streamline the development and deployment of medical AI models. MONAI follows best practices for software-development, providing an easy-to-use, robust, well-documented, and well-tested software framework. MONAI preserves the simple, additive, and compositional approach of its underlying PyTorch libraries. MONAI is being used by and receiving contributions from research, clinical and industrial teams from around the world, who are pursuing applications spanning nearly every aspect of healthcare.
△ Less
Submitted 4 November, 2022;
originally announced November 2022.
-
Identification and reconstruction of low-energy electrons in the ProtoDUNE-SP detector
Authors:
DUNE Collaboration,
A. Abed Abud,
B. Abi,
R. Acciarri,
M. A. Acero,
M. R. Adames,
G. Adamov,
M. Adamowski,
D. Adams,
M. Adinolfi,
C. Adriano,
A. Aduszkiewicz,
J. Aguilar,
Z. Ahmad,
J. Ahmed,
B. Aimard,
F. Akbar,
K. Allison,
S. Alonso Monsalve,
M. Alrashed,
C. Alt,
A. Alton,
R. Alvarez,
P. Amedo,
J. Anderson
, et al. (1235 additional authors not shown)
Abstract:
Measurements of electrons from $ν_e$ interactions are crucial for the Deep Underground Neutrino Experiment (DUNE) neutrino oscillation program, as well as searches for physics beyond the standard model, supernova neutrino detection, and solar neutrino measurements. This article describes the selection and reconstruction of low-energy (Michel) electrons in the ProtoDUNE-SP detector. ProtoDUNE-SP is…
▽ More
Measurements of electrons from $ν_e$ interactions are crucial for the Deep Underground Neutrino Experiment (DUNE) neutrino oscillation program, as well as searches for physics beyond the standard model, supernova neutrino detection, and solar neutrino measurements. This article describes the selection and reconstruction of low-energy (Michel) electrons in the ProtoDUNE-SP detector. ProtoDUNE-SP is one of the prototypes for the DUNE far detector, built and operated at CERN as a charged particle test beam experiment. A sample of low-energy electrons produced by the decay of cosmic muons is selected with a purity of 95%. This sample is used to calibrate the low-energy electron energy scale with two techniques. An electron energy calibration based on a cosmic ray muon sample uses calibration constants derived from measured and simulated cosmic ray muon events. Another calibration technique makes use of the theoretically well-understood Michel electron energy spectrum to convert reconstructed charge to electron energy. In addition, the effects of detector response to low-energy electron energy scale and its resolution including readout electronics threshold effects are quantified. Finally, the relation between the theoretical and reconstructed low-energy electron energy spectrum is derived and the energy resolution is characterized. The low-energy electron selection presented here accounts for about 75% of the total electron deposited energy. After the addition of lost energy using a Monte Carlo simulation, the energy resolution improves from about 40% to 25% at 50~MeV. These results are used to validate the expected capabilities of the DUNE far detector to reconstruct low-energy electrons.
△ Less
Submitted 31 May, 2023; v1 submitted 2 November, 2022;
originally announced November 2022.
-
Realistic Data Augmentation Framework for Enhancing Tabular Reasoning
Authors:
Dibyakanti Kumar,
Vivek Gupta,
Soumya Sharma,
Shuo Zhang
Abstract:
Existing approaches to constructing training data for Natural Language Inference (NLI) tasks, such as for semi-structured table reasoning, are either via crowdsourcing or fully automatic methods. However, the former is expensive and time-consuming and thus limits scale, and the latter often produces naive examples that may lack complex reasoning. This paper develops a realistic semi-automated fram…
▽ More
Existing approaches to constructing training data for Natural Language Inference (NLI) tasks, such as for semi-structured table reasoning, are either via crowdsourcing or fully automatic methods. However, the former is expensive and time-consuming and thus limits scale, and the latter often produces naive examples that may lack complex reasoning. This paper develops a realistic semi-automated framework for data augmentation for tabular inference. Instead of manually generating a hypothesis for each table, our methodology generates hypothesis templates transferable to similar tables. In addition, our framework entails the creation of rational counterfactual tables based on human written logical constraints and premise paraphrasing. For our case study, we use the InfoTabs, which is an entity-centric tabular inference dataset. We observed that our framework could generate human-like tabular inference examples, which could benefit training data augmentation, especially in the scenario with limited supervision.
△ Less
Submitted 23 October, 2022;
originally announced October 2022.
-
Enhancing Tabular Reasoning with Pattern Exploiting Training
Authors:
Abhilash Reddy Shankarampeta,
Vivek Gupta,
Shuo Zhang
Abstract:
Recent methods based on pre-trained language models have exhibited superior performance over tabular tasks (e.g., tabular NLI), despite showing inherent problems such as not using the right evidence and inconsistent predictions across inputs while reasoning over the tabular data. In this work, we utilize Pattern-Exploiting Training (PET) (i.e., strategic MLM) on pre-trained language models to stre…
▽ More
Recent methods based on pre-trained language models have exhibited superior performance over tabular tasks (e.g., tabular NLI), despite showing inherent problems such as not using the right evidence and inconsistent predictions across inputs while reasoning over the tabular data. In this work, we utilize Pattern-Exploiting Training (PET) (i.e., strategic MLM) on pre-trained language models to strengthen these tabular reasoning models' pre-existing knowledge and reasoning abilities. Our upgraded model exhibits a superior understanding of knowledge facts and tabular reasoning compared to current baselines. Additionally, we demonstrate that such models are more effective for underlying downstream tasks of tabular inference on InfoTabs. Furthermore, we show our model's robustness against adversarial sets generated through various character and word level perturbations.
△ Less
Submitted 21 October, 2022;
originally announced October 2022.
-
Rarefied gas flow past a liquid droplet: interplay between internal and external flows
Authors:
Rahul Bhattacharjee,
Sonu Saini,
Vinay Kumar Gupta,
Anirudh S. Rana
Abstract:
Experimental and theoretical studies on millimetre-sized droplets suggest that at low Reynolds number the difference between the drag force on a circulating water droplet and that on a rigid sphere is very small (less than 1 %) (LeClair et al., J. Atmos. Sci., vol. 29, 1972, pp. 728-740). While the drag force on a spherical liquid droplet at high viscosity ratios (of the liquid to the gas), is app…
▽ More
Experimental and theoretical studies on millimetre-sized droplets suggest that at low Reynolds number the difference between the drag force on a circulating water droplet and that on a rigid sphere is very small (less than 1 %) (LeClair et al., J. Atmos. Sci., vol. 29, 1972, pp. 728-740). While the drag force on a spherical liquid droplet at high viscosity ratios (of the liquid to the gas), is approximately the same as that on a rigid sphere of the same size, the other quantities of interest (e.g. the temperature) in the case of a rarefied gas flow over a liquid droplet differ from the same quantities in the case of a rarefied gas flow over a rigid sphere. The goal of this article is to study the effects of internal motion within a spherical microdroplet/nanodroplet -- such that its diameter is comparable to the mean free path of the surrounding gas -- on the drag force and its overall dynamics. To this end, the problem of a slow rarefied gas flowing over an incompressible liquid droplet is investigated analytically by considering the internal motion of the liquid inside the droplet and also by accounting for kinetic effects in the gas. Detailed results for different values of the Knudsen number, the ratio of the thermal conductivities and the ratio of viscosities are presented for the pressure and temperature profiles inside and outside the liquid droplet. The results for the drag force obtained in the present work are in good agreement with the theoretical and experimental results existing in the literature.
△ Less
Submitted 26 January, 2024; v1 submitted 19 October, 2022;
originally announced October 2022.
-
Learning Decentralized Linear Quadratic Regulators with $\sqrt{T}$ Regret
Authors:
Lintao Ye,
Ming Chi,
Ruiquan Liao,
Vijay Gupta
Abstract:
We propose an online learning algorithm that adaptively designs a decentralized linear quadratic regulator when the system model is unknown a priori and new data samples from a single system trajectory become progressively available. The algorithm uses a disturbance-feedback representation of state-feedback controllers coupled with online convex optimization with memory and delayed feedback. Under…
▽ More
We propose an online learning algorithm that adaptively designs a decentralized linear quadratic regulator when the system model is unknown a priori and new data samples from a single system trajectory become progressively available. The algorithm uses a disturbance-feedback representation of state-feedback controllers coupled with online convex optimization with memory and delayed feedback. Under the assumption that the system is stable or given a known stabilizing controller, we show that our controller enjoys an expected regret that scales as $\sqrt{T}$ with the time horizon $T$ for the case of partially nested information pattern. For more general information patterns, the optimal controller is unknown even if the system model is known. In this case, the regret of our controller is shown with respect to a linear sub-optimal controller. We validate our theoretical findings using numerical experiments.
△ Less
Submitted 4 July, 2024; v1 submitted 17 October, 2022;
originally announced October 2022.
-
A lower bound for the smallest eigenvalue of a graph and an application to the associahedron graph
Authors:
Sebastian M. Cioabă,
Vishal Gupta
Abstract:
In this paper, we obtain a lower bound for the smallest eigenvalue of a regular graph containing many copies of a smaller fixed subgraph. This generalizes a result of Aharoni, Alon, and Berger in which the subgraph is a triangle. We apply our results to obtain a lower bound on the smallest eigenvalue of the associahedron graph, and we prove that this bound gives the correct order of magnitude of t…
▽ More
In this paper, we obtain a lower bound for the smallest eigenvalue of a regular graph containing many copies of a smaller fixed subgraph. This generalizes a result of Aharoni, Alon, and Berger in which the subgraph is a triangle. We apply our results to obtain a lower bound on the smallest eigenvalue of the associahedron graph, and we prove that this bound gives the correct order of magnitude of this eigenvalue. We also survey what is known regarding the second-largest eigenvalue of the associahedron graph.
△ Less
Submitted 16 October, 2022;
originally announced October 2022.
-
Understanding the gravitational and magnetic environment of a very long baseline atom interferometer
Authors:
Ali Lezeik,
Dorothee Tell,
Klaus Zipfel,
Vishu Gupta,
Étienne Wodey,
Ernst Rasel,
Christian Schubert,
Dennis Schlippert
Abstract:
By utilizing the quadratic dependency of the interferometry phase on time, the Hannover Very Long Baseline Atom Interferometer facility (VLBAI) aims for sub nm/s$^2$ gravity measurement sensitivity. With its 10 m vertical baseline, VLBAI offers promising prospects in testing fundamental physics at the interface between quantum mechanics and general relativity. Here we discuss the challenges impose…
▽ More
By utilizing the quadratic dependency of the interferometry phase on time, the Hannover Very Long Baseline Atom Interferometer facility (VLBAI) aims for sub nm/s$^2$ gravity measurement sensitivity. With its 10 m vertical baseline, VLBAI offers promising prospects in testing fundamental physics at the interface between quantum mechanics and general relativity. Here we discuss the challenges imposed on controlling VLBAI's magnetic and gravitational environment and report on their effect on the device's accuracy. Within the inner 8 m of the magnetic shield, residual magnetic field gradients expect to cause a bias acceleration of only 6$\times$10$^{-14}$ m/s$^2$ while we evaluate the bias shift due to the facility's non-linear gravity gradient to 2.6 nm/s$^2$. The model allows the VLBAI facility to be a reference to other mobile devices for calibration purposes with an uncertainty below the 10 nm/s$^2$ level.
△ Less
Submitted 19 September, 2022;
originally announced September 2022.
-
Multicalibrated Regression for Downstream Fairness
Authors:
Ira Globus-Harris,
Varun Gupta,
Christopher Jung,
Michael Kearns,
Jamie Morgenstern,
Aaron Roth
Abstract:
We show how to take a regression function $\hat{f}$ that is appropriately ``multicalibrated'' and efficiently post-process it into an approximately error minimizing classifier satisfying a large variety of fairness constraints. The post-processing requires no labeled data, and only a modest amount of unlabeled data and computation. The computational and sample complexity requirements of computing…
▽ More
We show how to take a regression function $\hat{f}$ that is appropriately ``multicalibrated'' and efficiently post-process it into an approximately error minimizing classifier satisfying a large variety of fairness constraints. The post-processing requires no labeled data, and only a modest amount of unlabeled data and computation. The computational and sample complexity requirements of computing $\hat f$ are comparable to the requirements for solving a single fair learning task optimally, but it can in fact be used to solve many different downstream fairness-constrained learning problems efficiently. Our post-processing method easily handles intersecting groups, generalizing prior work on post-processing regression functions to satisfy fairness constraints that only applied to disjoint groups. Our work extends recent work showing that multicalibrated regression functions are ``omnipredictors'' (i.e. can be post-processed to optimally solve unconstrained ERM problems) to constrained optimization.
△ Less
Submitted 15 September, 2022;
originally announced September 2022.
-
Share the Tensor Tea: How Databases can Leverage the Machine Learning Ecosystem
Authors:
Yuki Asada,
Victor Fu,
Apurva Gandhi,
Advitya Gemawat,
Lihao Zhang,
Dong He,
Vivek Gupta,
Ehi Nosakhare,
Dalitso Banda,
Rathijit Sen,
Matteo Interlandi
Abstract:
We demonstrate Tensor Query Processor (TQP): a query processor that automatically compiles relational operators into tensor programs. By leveraging tensor runtimes such as PyTorch, TQP is able to: (1) integrate with ML tools (e.g., Pandas for data ingestion, Tensorboard for visualization); (2) target different hardware (e.g., CPU, GPU) and software (e.g., browser) backends; and (3) end-to-end acce…
▽ More
We demonstrate Tensor Query Processor (TQP): a query processor that automatically compiles relational operators into tensor programs. By leveraging tensor runtimes such as PyTorch, TQP is able to: (1) integrate with ML tools (e.g., Pandas for data ingestion, Tensorboard for visualization); (2) target different hardware (e.g., CPU, GPU) and software (e.g., browser) backends; and (3) end-to-end accelerate queries containing both relational and ML operators. TQP is generic enough to support the TPC-H benchmark, and it provides performance that is comparable to, and often better than, that of specialized CPU and GPU query processors.
△ Less
Submitted 9 September, 2022;
originally announced September 2022.
-
The ultra narrow FRB20191107B, and the origins of FRB scattering
Authors:
Vivek Gupta,
Chris Flynn,
Wael Farah,
Matthew Bailes,
Adam T. Deller,
Cherie K. Day,
Marcus E. Lower
Abstract:
We report the detection of FRB20191107B with the UTMOST radio telescope at a dispersion measure (DM) of 714.9 ${\rm pc~cm^{-3}}$. The burst consists of three components, the brightest of which has an intrinsic width of only 11.3 $μ$s and a scattering tail with an exponentially decaying time-scale of 21.4 $μ$s measured at 835 MHz. We model the sensitivity of UTMOST and other major FRB surveys to su…
▽ More
We report the detection of FRB20191107B with the UTMOST radio telescope at a dispersion measure (DM) of 714.9 ${\rm pc~cm^{-3}}$. The burst consists of three components, the brightest of which has an intrinsic width of only 11.3 $μ$s and a scattering tail with an exponentially decaying time-scale of 21.4 $μ$s measured at 835 MHz. We model the sensitivity of UTMOST and other major FRB surveys to such narrow events. We find that $>60\%$ of FRBs like FRB20191107B are being missed, and that a significant population of very narrow FRBs probably exists and remains underrepresented in these surveys. The high DM and small scattering timescale of FRB20191107B allows us to place an upper limit on the strength of turbulence in the Intergalactic Medium (IGM), quantified as scattering measure (SM), of ${\rm SM_{IGM} < 8.4 \times 10^{-7} ~kpc~m^{-20/3}}$. Almost all UTMOST FRBs have full phase information due to real-time voltage capture which provides us with the largest sample of coherently dedispersed single burst FRBs. Our 10.24 $μ$s time resolution data yields accurately measured FRB scattering timescales. We combine the UTMOST FRBs with 10 FRBs from the literature and find no obvious evidence for a DM-scattering relation, suggesting that IGM is not the dominant source of scattering in FRBs. We support the results of previous studies and identify the local environment of the source in the host galaxy as the most likely region which dominates the observed scattering of our FRBs.
△ Less
Submitted 1 September, 2022;
originally announced September 2022.
-
Modeling Spatial Trajectories using Coarse-Grained Smartphone Logs
Authors:
Vinayak Gupta,
Srikanta Bedathur
Abstract:
Current approaches for points-of-interest (POI) recommendation learn the preferences of a user via the standard spatial features such as the POI coordinates, the social network, etc. These models ignore a crucial aspect of spatial mobility -- every user carries their smartphones wherever they go. In addition, with growing privacy concerns, users refrain from sharing their exact geographical coordi…
▽ More
Current approaches for points-of-interest (POI) recommendation learn the preferences of a user via the standard spatial features such as the POI coordinates, the social network, etc. These models ignore a crucial aspect of spatial mobility -- every user carries their smartphones wherever they go. In addition, with growing privacy concerns, users refrain from sharing their exact geographical coordinates and their social media activity. In this paper, we present REVAMP, a sequential POI recommendation approach that utilizes the user activity on smartphone applications (or apps) to identify their mobility preferences. This work aligns with the recent psychological studies of online urban users, which show that their spatial mobility behavior is largely influenced by the activity of their smartphone apps. In addition, our proposal of coarse-grained smartphone data refers to data logs collected in a privacy-conscious manner, i.e., consisting only of (a) category of the smartphone app and (b) category of check-in location. Thus, REVAMP is not privy to precise geo-coordinates, social networks, or the specific application being accessed. Buoyed by the efficacy of self-attention models, we learn the POI preferences of a user using two forms of positional encodings -- absolute and relative -- with each extracted from the inter-check-in dynamics in the check-in sequence of a user. Extensive experiments across two large-scale datasets from China show the predictive prowess of REVAMP and its ability to predict app- and POI categories.
△ Less
Submitted 28 August, 2022;
originally announced August 2022.
-
Fair Coflow Scheduling via Controlled Slowdown
Authors:
Francesco De Pellegrini,
Vaibhav Kumar Gupta,
Rachid El Azouzi,
Serigne Gueye,
Cedric Richier,
Jeremie Leguay
Abstract:
The average coflow completion time (CCT) is the standard performance metric in coflow scheduling. However, standard CCT minimization may introduce unfairness between the data transfer phase of different computing jobs. Thus, while progress guarantees have been introduced in the literature to mitigate this fairness issue, the trade-off between fairness and efficiency of data transfer is hard to con…
▽ More
The average coflow completion time (CCT) is the standard performance metric in coflow scheduling. However, standard CCT minimization may introduce unfairness between the data transfer phase of different computing jobs. Thus, while progress guarantees have been introduced in the literature to mitigate this fairness issue, the trade-off between fairness and efficiency of data transfer is hard to control. This paper introduces a fairness framework for coflow scheduling based on the concept of slowdown, i.e., the performance loss of a coflow compared to isolation. By controlling the slowdown it is possible to enforce a target coflow progress while minimizing the average CCT. In the proposed framework, the minimum slowdown for a batch of coflows can be determined in polynomial time. By showing the equivalence with Gaussian elimination, slowdown constraints are introduced into primal-dual iterations of the CoFair algorithm. The algorithm extends the class of the sigma-order schedulers to solve the fair coflow scheduling problem in polynomial time. It provides a 4-approximation of the average CCT w.r.t. an optimal scheduler. Extensive numerical results demonstrate that this approach can trade off average CCT for slowdown more efficiently than existing state of the art schedulers.
△ Less
Submitted 12 August, 2022;
originally announced August 2022.
-
Cooperative Actor-Critic via TD Error Aggregation
Authors:
Martin Figura,
Yixuan Lin,
Ji Liu,
Vijay Gupta
Abstract:
In decentralized cooperative multi-agent reinforcement learning, agents can aggregate information from one another to learn policies that maximize a team-average objective function. Despite the willingness to cooperate with others, the individual agents may find direct sharing of information about their local state, reward, and value function undesirable due to privacy issues. In this work, we int…
▽ More
In decentralized cooperative multi-agent reinforcement learning, agents can aggregate information from one another to learn policies that maximize a team-average objective function. Despite the willingness to cooperate with others, the individual agents may find direct sharing of information about their local state, reward, and value function undesirable due to privacy issues. In this work, we introduce a decentralized actor-critic algorithm with TD error aggregation that does not violate privacy issues and assumes that communication channels are subject to time delays and packet dropouts. The cost we pay for making such weak assumptions is an increased communication burden for every agent as measured by the dimension of the transmitted data. Interestingly, the communication burden is only quadratic in the graph size, which renders the algorithm applicable in large networks. We provide a convergence analysis under diminishing step size to verify that the agents maximize the team-average objective function.
△ Less
Submitted 25 July, 2022;
originally announced July 2022.
-
Moore-Penrose inverse of distance Laplacians of trees are Z matrices
Authors:
R. Balaji,
Vinayak Gupta
Abstract:
We show that all off-diagonal entries in the Moore-Penrose inverse of the distance Laplacian matrix of a tree are non-positive.
We show that all off-diagonal entries in the Moore-Penrose inverse of the distance Laplacian matrix of a tree are non-positive.
△ Less
Submitted 23 July, 2022;
originally announced July 2022.
-
Estimating Emotion Contagion on Social Media via Localized Diffusion in Dynamic Graphs
Authors:
Trisha Mittal,
Puneet Mathur,
Rohan Chandra,
Apurva Bhatt,
Vikram Gupta,
Debdoot Mukherjee,
Aniket Bera,
Dinesh Manocha
Abstract:
We present a computational approach for estimating emotion contagion on social media networks. Built on a foundation of psychology literature, our approach estimates the degree to which the perceivers' emotional states (positive or negative) start to match those of the expressors, based on the latter's content. We use a combination of deep learning and social network analysis to model emotion cont…
▽ More
We present a computational approach for estimating emotion contagion on social media networks. Built on a foundation of psychology literature, our approach estimates the degree to which the perceivers' emotional states (positive or negative) start to match those of the expressors, based on the latter's content. We use a combination of deep learning and social network analysis to model emotion contagion as a diffusion process in dynamic social network graphs, taking into consideration key aspects like causality, homophily, and interference. We evaluate our approach on user behavior data obtained from a popular social media platform for sharing short videos. We analyze the behavior of 48 users over a span of 8 weeks (over 200k audio-visual short posts analyzed) and estimate how contagious the users with whom they engage with are on social media. As per the theory of diffusion, we account for the videos a user watches during this time (inflow) and the daily engagements; liking, sharing, downloading or creating new videos (outflow) to estimate contagion. To validate our approach and analysis, we obtain human feedback on these 48 social media platform users with an online study by collecting responses of about 150 participants. We report users who interact with more number of creators on the platform are 12% less prone to contagion, and those who consume more content of `negative' sentiment are 23% more prone to contagion. We will publicly release our code upon acceptance.
△ Less
Submitted 14 July, 2022;
originally announced July 2022.
-
Reconstruction of interactions in the ProtoDUNE-SP detector with Pandora
Authors:
DUNE Collaboration,
A. Abed Abud,
B. Abi,
R. Acciarri,
M. A. Acero,
M. R. Adames,
G. Adamov,
M. Adamowski,
D. Adams,
M. Adinolfi,
C. Adriano,
A. Aduszkiewicz,
J. Aguilar,
Z. Ahmad,
J. Ahmed,
B. Aimard,
F. Akbar,
B. Ali-Mohammadzadeh,
K. Allison,
S. Alonso Monsalve,
M. AlRashed,
C. Alt,
A. Alton,
R. Alvarez,
P. Amedo
, et al. (1203 additional authors not shown)
Abstract:
The Pandora Software Development Kit and algorithm libraries provide pattern-recognition logic essential to the reconstruction of particle interactions in liquid argon time projection chamber detectors. Pandora is the primary event reconstruction software used at ProtoDUNE-SP, a prototype for the Deep Underground Neutrino Experiment far detector. ProtoDUNE-SP, located at CERN, is exposed to a char…
▽ More
The Pandora Software Development Kit and algorithm libraries provide pattern-recognition logic essential to the reconstruction of particle interactions in liquid argon time projection chamber detectors. Pandora is the primary event reconstruction software used at ProtoDUNE-SP, a prototype for the Deep Underground Neutrino Experiment far detector. ProtoDUNE-SP, located at CERN, is exposed to a charged-particle test beam. This paper gives an overview of the Pandora reconstruction algorithms and how they have been tailored for use at ProtoDUNE-SP. In complex events with numerous cosmic-ray and beam background particles, the simulated reconstruction and identification efficiency for triggered test-beam particles is above 80% for the majority of particle type and beam momentum combinations. Specifically, simulated 1 GeV/$c$ charged pions and protons are correctly reconstructed and identified with efficiencies of 86.1$\pm0.6$% and 84.1$\pm0.6$%, respectively. The efficiencies measured for test-beam data are shown to be within 5% of those predicted by the simulation.
△ Less
Submitted 17 July, 2023; v1 submitted 29 June, 2022;
originally announced June 2022.
-
Modeling Continuous Time Sequences with Intermittent Observations using Marked Temporal Point Processes
Authors:
Vinayak Gupta,
Srikanta Bedathur,
Sourangshu Bhattacharya,
Abir De
Abstract:
A large fraction of data generated via human activities such as online purchases, health records, spatial mobility etc. can be represented as a sequence of events over a continuous-time. Learning deep learning models over these continuous-time event sequences is a non-trivial task as it involves modeling the ever-increasing event timestamps, inter-event time gaps, event types, and the influences b…
▽ More
A large fraction of data generated via human activities such as online purchases, health records, spatial mobility etc. can be represented as a sequence of events over a continuous-time. Learning deep learning models over these continuous-time event sequences is a non-trivial task as it involves modeling the ever-increasing event timestamps, inter-event time gaps, event types, and the influences between different events within and across different sequences. In recent years neural enhancements to marked temporal point processes (MTPP) have emerged as a powerful framework to model the underlying generative mechanism of asynchronous events localized in continuous time. However, most existing models and inference methods in the MTPP framework consider only the complete observation scenario i.e. the event sequence being modeled is completely observed with no missing events -- an ideal setting that is rarely applicable in real-world applications. A recent line of work which considers missing events while training MTPP utilizes supervised learning techniques that require additional knowledge of missing or observed label for each event in a sequence, which further restricts its practicability as in several scenarios the details of missing events is not known apriori. In this work, we provide a novel unsupervised model and inference method for learning MTPP in presence of event sequences with missing events. Specifically, we first model the generative processes of observed events and missing events using two MTPP, where the missing events are represented as latent random variables. Then, we devise an unsupervised training method that jointly learns both the MTPP by means of variational inference. Such a formulation can effectively impute the missing data among the observed events and can identify the optimal position of missing events in a sequence.
△ Less
Submitted 23 June, 2022;
originally announced June 2022.
-
ProActive: Self-Attentive Temporal Point Process Flows for Activity Sequences
Authors:
Vinayak Gupta,
Srikanta Bedathur
Abstract:
Any human activity can be represented as a temporal sequence of actions performed to achieve a certain goal. Unlike machine-made time series, these action sequences are highly disparate as the time taken to finish a similar action might vary between different persons. Therefore, understanding the dynamics of these sequences is essential for many downstream tasks such as activity length prediction,…
▽ More
Any human activity can be represented as a temporal sequence of actions performed to achieve a certain goal. Unlike machine-made time series, these action sequences are highly disparate as the time taken to finish a similar action might vary between different persons. Therefore, understanding the dynamics of these sequences is essential for many downstream tasks such as activity length prediction, goal prediction, etc. Existing neural approaches that model an activity sequence are either limited to visual data or are task specific, i.e., limited to next action or goal prediction. In this paper, we present ProActive, a neural marked temporal point process (MTPP) framework for modeling the continuous-time distribution of actions in an activity sequence while simultaneously addressing three high-impact problems -- next action prediction, sequence-goal prediction, and end-to-end sequence generation. Specifically, we utilize a self-attention module with temporal normalizing flows to model the influence and the inter-arrival times between actions in a sequence. Moreover, for time-sensitive prediction, we perform an early detection of sequence goal via a constrained margin-based optimization procedure. This in-turn allows ProActive to predict the sequence goal using a limited number of actions. Extensive experiments on sequences derived from three activity recognition datasets show the significant accuracy boost of ProActive over the state-of-the-art in terms of action and goal prediction, and the first-ever application of end-to-end action sequence generation.
△ Less
Submitted 10 June, 2022;
originally announced June 2022.
-
Gate-tunable anomalous Hall effect in a 3D topological insulator/2D magnet van der Waals heterostructure
Authors:
Vishakha Gupta,
Rakshit Jain,
Yafei Ren,
Xiyue S. Zhang,
Husain F. Alnaser,
Amit Vashist,
Vikram V. Deshpande,
David A. Muller,
Di Xiao,
Taylor D. Sparks,
Daniel C. Ralph
Abstract:
We demonstrate advantages of samples made by mechanical stacking of exfoliated van der Waals materials for controlling the topological surface state of a 3-dimensional topological insulator (TI) via interaction with an adjacent magnet layer. We assemble bilayers with pristine interfaces using exfoliated flakes of the TI BiSbTeSe2 and the magnet Cr2Ge2Te6, thereby avoiding problems caused by interd…
▽ More
We demonstrate advantages of samples made by mechanical stacking of exfoliated van der Waals materials for controlling the topological surface state of a 3-dimensional topological insulator (TI) via interaction with an adjacent magnet layer. We assemble bilayers with pristine interfaces using exfoliated flakes of the TI BiSbTeSe2 and the magnet Cr2Ge2Te6, thereby avoiding problems caused by interdiffusion that can affect interfaces made by top-down deposition methods. The samples exhibit an anomalous Hall effect (AHE) with abrupt hysteretic switching. For the first time in samples composed of a TI and a separate ferromagnetic layer, we demonstrate that the amplitude of the AHE can be tuned via gate voltage with a strong peak near the Dirac point. This is the signature expected for the AHE due to Berry curvature associated with an exchange gap induced by interaction between the topological surface state and an out-of-plane-oriented magnet.
△ Less
Submitted 6 June, 2022;
originally announced June 2022.
-
Practical Adversarial Multivalid Conformal Prediction
Authors:
Osbert Bastani,
Varun Gupta,
Christopher Jung,
Georgy Noarov,
Ramya Ramalingam,
Aaron Roth
Abstract:
We give a simple, generic conformal prediction method for sequential prediction that achieves target empirical coverage guarantees against adversarially chosen data. It is computationally lightweight -- comparable to split conformal prediction -- but does not require having a held-out validation set, and so all data can be used for training models from which to derive a conformal score. It gives s…
▽ More
We give a simple, generic conformal prediction method for sequential prediction that achieves target empirical coverage guarantees against adversarially chosen data. It is computationally lightweight -- comparable to split conformal prediction -- but does not require having a held-out validation set, and so all data can be used for training models from which to derive a conformal score. It gives stronger than marginal coverage guarantees in two ways. First, it gives threshold calibrated prediction sets that have correct empirical coverage even conditional on the threshold used to form the prediction set from the conformal score. Second, the user can specify an arbitrary collection of subsets of the feature space -- possibly intersecting -- and the coverage guarantees also hold conditional on membership in each of these subsets. We call our algorithm MVP, short for MultiValid Prediction. We give both theory and an extensive set of empirical evaluations.
△ Less
Submitted 2 June, 2022;
originally announced June 2022.
-
BITE: Textual Backdoor Attacks with Iterative Trigger Injection
Authors:
Jun Yan,
Vansh Gupta,
Xiang Ren
Abstract:
Backdoor attacks have become an emerging threat to NLP systems. By providing poisoned training data, the adversary can embed a "backdoor" into the victim model, which allows input instances satisfying certain textual patterns (e.g., containing a keyword) to be predicted as a target label of the adversary's choice. In this paper, we demonstrate that it is possible to design a backdoor attack that i…
▽ More
Backdoor attacks have become an emerging threat to NLP systems. By providing poisoned training data, the adversary can embed a "backdoor" into the victim model, which allows input instances satisfying certain textual patterns (e.g., containing a keyword) to be predicted as a target label of the adversary's choice. In this paper, we demonstrate that it is possible to design a backdoor attack that is both stealthy (i.e., hard to notice) and effective (i.e., has a high attack success rate). We propose BITE, a backdoor attack that poisons the training data to establish strong correlations between the target label and a set of "trigger words". These trigger words are iteratively identified and injected into the target-label instances through natural word-level perturbations. The poisoned training data instruct the victim model to predict the target label on inputs containing trigger words, forming the backdoor. Experiments on four text classification datasets show that our proposed attack is significantly more effective than baseline methods while maintaining decent stealthiness, raising alarm on the usage of untrusted training data. We further propose a defense method named DeBITE based on potential trigger word removal, which outperforms existing methods in defending against BITE and generalizes well to handling other backdoor attacks.
△ Less
Submitted 29 May, 2023; v1 submitted 25 May, 2022;
originally announced May 2022.
-
Medical Scientific Table-to-Text Generation with Human-in-the-Loop under the Data Sparsity Constraint
Authors:
Heng-Yi Wu,
Jingqing Zhang,
Julia Ive,
Tong Li,
Vibhor Gupta,
Bingyuan Chen,
Yike Guo
Abstract:
Structured (tabular) data in the preclinical and clinical domains contains valuable information about individuals and an efficient table-to-text summarization system can drastically reduce manual efforts to condense this data into reports. However, in practice, the problem is heavily impeded by the data paucity, data sparsity and inability of the state-of-the-art natural language generation models…
▽ More
Structured (tabular) data in the preclinical and clinical domains contains valuable information about individuals and an efficient table-to-text summarization system can drastically reduce manual efforts to condense this data into reports. However, in practice, the problem is heavily impeded by the data paucity, data sparsity and inability of the state-of-the-art natural language generation models (including T5, PEGASUS and GPT-Neo) to produce accurate and reliable outputs. In this paper, we propose a novel table-to-text approach and tackle these problems with a novel two-step architecture which is enhanced by auto-correction, copy mechanism and synthetic data augmentation. The study shows that the proposed approach selects salient biomedical entities and values from structured data with improved precision (up to 0.13 absolute increase) of copying the tabular values to generate coherent and accurate text for assay validation reports and toxicology reports. Moreover, we also demonstrate a light-weight adaptation of the proposed system to new datasets by fine-tuning with as little as 40\% training examples. The outputs of our model are validated by human experts in the Human-in-the-Loop scenario.
△ Less
Submitted 13 July, 2022; v1 submitted 24 May, 2022;
originally announced May 2022.
-
A Scalable Workflow to Build Machine Learning Classifiers with Clinician-in-the-Loop to Identify Patients in Specific Diseases
Authors:
Jingqing Zhang,
Atri Sharma,
Luis Bolanos,
Tong Li,
Ashwani Tanwar,
Vibhor Gupta,
Yike Guo
Abstract:
Clinicians may rely on medical coding systems such as International Classification of Diseases (ICD) to identify patients with diseases from Electronic Health Records (EHRs). However, due to the lack of detail and specificity as well as a probability of miscoding, recent studies suggest the ICD codes often cannot characterise patients accurately for specific diseases in real clinical practice, and…
▽ More
Clinicians may rely on medical coding systems such as International Classification of Diseases (ICD) to identify patients with diseases from Electronic Health Records (EHRs). However, due to the lack of detail and specificity as well as a probability of miscoding, recent studies suggest the ICD codes often cannot characterise patients accurately for specific diseases in real clinical practice, and as a result, using them to find patients for studies or trials can result in high failure rates and missing out on uncoded patients. Manual inspection of all patients at scale is not feasible as it is highly costly and slow.
This paper proposes a scalable workflow which leverages both structured data and unstructured textual notes from EHRs with techniques including NLP, AutoML and Clinician-in-the-Loop mechanism to build machine learning classifiers to identify patients at scale with given diseases, especially those who might currently be miscoded or missed by ICD codes.
Case studies in the MIMIC-III dataset were conducted where the proposed workflow demonstrates a higher classification performance in terms of F1 scores compared to simply using ICD codes on gold testing subset to identify patients with Ovarian Cancer (0.901 vs 0.814), Lung Cancer (0.859 vs 0.828), Cancer Cachexia (0.862 vs 0.650), and Lupus Nephritis (0.959 vs 0.855). Also, the proposed workflow that leverages unstructured notes consistently outperforms the baseline that uses structured data only with an increase of F1 (Ovarian Cancer 0.901 vs 0.719, Lung Cancer 0.859 vs 0.787, Cancer Cachexia 0.862 vs 0.838 and Lupus Nephritis 0.959 vs 0.785). Experiments on the large testing set also demonstrate the proposed workflow can find more patients who are miscoded or missed by ICD codes. Moreover, interpretability studies are also conducted to clinically validate the top impact features of the classifiers.
△ Less
Submitted 18 May, 2022;
originally announced May 2022.
-
Inverse formula for distance matrices of gear graphs
Authors:
R. Balaji,
Vinayak Gupta
Abstract:
Distance matrices of some star like graphs are investigated in \cite{JAK}. These graphs are trees which are stars, wheel graphs, helm graphs and gear graphs. Except for gear graphs in the above list of star like graphs, there are precise formulas available in the literature to compute the inverse/Moore-Penrose inverse of their distance matrices. These formulas tell that if $D$ is the distance matr…
▽ More
Distance matrices of some star like graphs are investigated in \cite{JAK}. These graphs are trees which are stars, wheel graphs, helm graphs and gear graphs. Except for gear graphs in the above list of star like graphs, there are precise formulas available in the literature to compute the inverse/Moore-Penrose inverse of their distance matrices. These formulas tell that if $D$ is the distance matrix of $G$, then $D^\dagger = -\frac{1}{2}L+uu'$, where $L$ is a Laplacian-like matrix which is positive semidefinite and all row sums equal to zero. The matrix $L$ and the vector $u$ depend only on the degree and number of vertices in $G$ and hence, can be written directly from $G$. The earliest formula obtained is for distance matrices of trees in Graham and Lovász \cite{GL}. In this paper, we obtain an elegant formula of this kind to compute the Moore-Penrose inverse of the distance matrix of a gear graph.
△ Less
Submitted 3 May, 2022;
originally announced May 2022.
-
Unsupervised Numerical Reasoning to Extract Phenotypes from Clinical Text by Leveraging External Knowledge
Authors:
Ashwani Tanwar,
Jingqing Zhang,
Julia Ive,
Vibhor Gupta,
Yike Guo
Abstract:
Extracting phenotypes from clinical text has been shown to be useful for a variety of clinical use cases such as identifying patients with rare diseases. However, reasoning with numerical values remains challenging for phenotyping in clinical text, for example, temperature 102F representing Fever. Current state-of-the-art phenotyping models are able to detect general phenotypes, but perform poorly…
▽ More
Extracting phenotypes from clinical text has been shown to be useful for a variety of clinical use cases such as identifying patients with rare diseases. However, reasoning with numerical values remains challenging for phenotyping in clinical text, for example, temperature 102F representing Fever. Current state-of-the-art phenotyping models are able to detect general phenotypes, but perform poorly when they detect phenotypes requiring numerical reasoning. We present a novel unsupervised methodology leveraging external knowledge and contextualized word embeddings from ClinicalBERT for numerical reasoning in a variety of phenotypic contexts. Comparing against unsupervised benchmarks, it shows a substantial performance improvement with absolute gains on generalized Recall and F1 scores up to 79% and 71%, respectively. In the supervised setting, it also surpasses the performance of alternative approaches with absolute gains on generalized Recall and F1 scores up to 70% and 44%, respectively.
△ Less
Submitted 19 April, 2022;
originally announced April 2022.
-
IndicXNLI: Evaluating Multilingual Inference for Indian Languages
Authors:
Divyanshu Aggarwal,
Vivek Gupta,
Anoop Kunchukuttan
Abstract:
While Indic NLP has made rapid advances recently in terms of the availability of corpora and pre-trained models, benchmark datasets on standard NLU tasks are limited. To this end, we introduce IndicXNLI, an NLI dataset for 11 Indic languages. It has been created by high-quality machine translation of the original English XNLI dataset and our analysis attests to the quality of IndicXNLI. By finetun…
▽ More
While Indic NLP has made rapid advances recently in terms of the availability of corpora and pre-trained models, benchmark datasets on standard NLU tasks are limited. To this end, we introduce IndicXNLI, an NLI dataset for 11 Indic languages. It has been created by high-quality machine translation of the original English XNLI dataset and our analysis attests to the quality of IndicXNLI. By finetuning different pre-trained LMs on this IndicXNLI, we analyze various cross-lingual transfer techniques with respect to the impact of the choice of language models, languages, multi-linguality, mix-language input, etc. These experiments provide us with useful insights into the behaviour of pre-trained models for a diverse set of languages.
△ Less
Submitted 19 April, 2022;
originally announced April 2022.
-
SwapMix: Diagnosing and Regularizing the Over-Reliance on Visual Context in Visual Question Answering
Authors:
Vipul Gupta,
Zhuowan Li,
Adam Kortylewski,
Chenyu Zhang,
Yingwei Li,
Alan Yuille
Abstract:
While Visual Question Answering (VQA) has progressed rapidly, previous works raise concerns about robustness of current VQA models. In this work, we study the robustness of VQA models from a novel perspective: visual context. We suggest that the models over-rely on the visual context, i.e., irrelevant objects in the image, to make predictions. To diagnose the model's reliance on visual context and…
▽ More
While Visual Question Answering (VQA) has progressed rapidly, previous works raise concerns about robustness of current VQA models. In this work, we study the robustness of VQA models from a novel perspective: visual context. We suggest that the models over-rely on the visual context, i.e., irrelevant objects in the image, to make predictions. To diagnose the model's reliance on visual context and measure their robustness, we propose a simple yet effective perturbation technique, SwapMix. SwapMix perturbs the visual context by swapping features of irrelevant context objects with features from other objects in the dataset. Using SwapMix we are able to change answers to more than 45 % of the questions for a representative VQA model. Additionally, we train the models with perfect sight and find that the context over-reliance highly depends on the quality of visual representations. In addition to diagnosing, SwapMix can also be applied as a data augmentation strategy during training in order to regularize the context over-reliance. By swapping the context object features, the model reliance on context can be suppressed effectively. Two representative VQA models are studied using SwapMix: a co-attention model MCAN and a large-scale pretrained model LXMERT. Our experiments on the popular GQA dataset show the effectiveness of SwapMix for both diagnosing model robustness and regularizing the over-reliance on visual context. The code for our method is available at https://github.com/vipulgupta1011/swapmix
△ Less
Submitted 5 April, 2022;
originally announced April 2022.
-
Multilingual and Multimodal Abuse Detection
Authors:
Rini Sharon,
Heet Shah,
Debdoot Mukherjee,
Vikram Gupta
Abstract:
The presence of abusive content on social media platforms is undesirable as it severely impedes healthy and safe social media interactions. While automatic abuse detection has been widely explored in textual domain, audio abuse detection still remains unexplored. In this paper, we attempt abuse detection in conversational audio from a multimodal perspective in a multilingual social media setting.…
▽ More
The presence of abusive content on social media platforms is undesirable as it severely impedes healthy and safe social media interactions. While automatic abuse detection has been widely explored in textual domain, audio abuse detection still remains unexplored. In this paper, we attempt abuse detection in conversational audio from a multimodal perspective in a multilingual social media setting. Our key hypothesis is that along with the modelling of audio, incorporating discriminative information from other modalities can be highly beneficial for this task. Our proposed method, MADA, explicitly focuses on two modalities other than the audio itself, namely, the underlying emotions expressed in the abusive audio and the semantic information encapsulated in the corresponding textual form. Observations prove that MADA demonstrates gains over audio-only approaches on the ADIMA dataset. We test the proposed approach on 10 different languages and observe consistent gains in the range 0.6%-5.2% by leveraging multiple modalities. We also perform extensive ablation experiments for studying the contributions of every modality and observe the best results while leveraging all the modalities together. Additionally, we perform experiments to empirically confirm that there is a strong correlation between underlying emotions and abusive behaviour.
△ Less
Submitted 3 April, 2022;
originally announced April 2022.
-
Model-free Learning for Risk-constrained Linear Quadratic Regulator with Structured Feedback in Networked Systems
Authors:
Kyung-bin Kwon,
Lintao Ye,
Vijay Gupta,
Hao Zhu
Abstract:
We develop a model-free learning algorithm for the infinite-horizon linear quadratic regulator (LQR) problem. Specifically, (risk) constraints and structured feedback are considered, in order to reduce the state deviation while allowing for a sparse communication graph in practice. By reformulating the dual problem as a nonconvex-concave minimax problem, we adopt the gradient descent max-oracle (G…
▽ More
We develop a model-free learning algorithm for the infinite-horizon linear quadratic regulator (LQR) problem. Specifically, (risk) constraints and structured feedback are considered, in order to reduce the state deviation while allowing for a sparse communication graph in practice. By reformulating the dual problem as a nonconvex-concave minimax problem, we adopt the gradient descent max-oracle (GDmax), and for modelfree setting, the stochastic (S)GDmax using zero-order policy gradient. By bounding the Lipschitz and smoothness constants of the LQR cost using specifically defined sublevel sets, we can design the stepsize and related parameters to establish convergence to a stationary point (at a high probability). Numerical tests in a networked microgrid control problem have validated the convergence of our proposed SGDmax algorithm while demonstrating the effectiveness of risk constraints. The SGDmax algorithm has attained a satisfactory optimality gap compared to the classical LQR control, especially for the full feedback case.
△ Less
Submitted 4 April, 2022;
originally announced April 2022.
-
Separation of track- and shower-like energy deposits in ProtoDUNE-SP using a convolutional neural network
Authors:
DUNE Collaboration,
A. Abed Abud,
B. Abi,
R. Acciarri,
M. A. Acero,
M. R. Adames,
G. Adamov,
M. Adamowski,
D. Adams,
M. Adinolfi,
A. Aduszkiewicz,
J. Aguilar,
Z. Ahmad,
J. Ahmed,
B. Aimard,
B. Ali-Mohammadzadeh,
T. Alion,
K. Allison,
S. Alonso Monsalve,
M. AlRashed,
C. Alt,
A. Alton,
R. Alvarez,
P. Amedo,
J. Anderson
, et al. (1204 additional authors not shown)
Abstract:
Liquid argon time projection chamber detector technology provides high spatial and calorimetric resolutions on the charged particles traversing liquid argon. As a result, the technology has been used in a number of recent neutrino experiments, and is the technology of choice for the Deep Underground Neutrino Experiment (DUNE). In order to perform high precision measurements of neutrinos in the det…
▽ More
Liquid argon time projection chamber detector technology provides high spatial and calorimetric resolutions on the charged particles traversing liquid argon. As a result, the technology has been used in a number of recent neutrino experiments, and is the technology of choice for the Deep Underground Neutrino Experiment (DUNE). In order to perform high precision measurements of neutrinos in the detector, final state particles need to be effectively identified, and their energy accurately reconstructed. This article proposes an algorithm based on a convolutional neural network to perform the classification of energy deposits and reconstructed particles as track-like or arising from electromagnetic cascades. Results from testing the algorithm on data from ProtoDUNE-SP, a prototype of the DUNE far detector, are presented. The network identifies track- and shower-like particles, as well as Michel electrons, with high efficiency. The performance of the algorithm is consistent between data and simulation.
△ Less
Submitted 30 June, 2022; v1 submitted 31 March, 2022;
originally announced March 2022.
-
Scintillation light detection in the 6-m drift-length ProtoDUNE Dual Phase liquid argon TPC
Authors:
DUNE Collaboration,
A. Abed Abud,
B. Abi,
R. Acciarri,
M. A. Acero,
M. R. Adames,
G. Adamov,
M. Adamowski,
D. Adams,
M. Adinolfi,
A. Aduszkiewicz,
J. Aguilar,
Z. Ahmad,
J. Ahmed,
B. Aimard,
B. Ali-Mohammadzadeh,
T. Alion,
K. Allison,
S. Alonso Monsalve,
M. AlRashed,
C. Alt,
A. Alton,
R. Alvarez,
P. Amedo,
J. Anderson
, et al. (1202 additional authors not shown)
Abstract:
DUNE is a dual-site experiment for long-baseline neutrino oscillation studies, neutrino astrophysics and nucleon decay searches. ProtoDUNE Dual Phase (DP) is a 6x6x6m3 liquid argon time-projection-chamber (LArTPC) that recorded cosmic-muon data at the CERN Neutrino Platform in 2019-2020 as a prototype of the DUNE Far Detector. Charged particles propagating through the LArTPC produce ionization and…
▽ More
DUNE is a dual-site experiment for long-baseline neutrino oscillation studies, neutrino astrophysics and nucleon decay searches. ProtoDUNE Dual Phase (DP) is a 6x6x6m3 liquid argon time-projection-chamber (LArTPC) that recorded cosmic-muon data at the CERN Neutrino Platform in 2019-2020 as a prototype of the DUNE Far Detector. Charged particles propagating through the LArTPC produce ionization and scintillation light. The scintillation light signal in these detectors can provide the trigger for non-beam events. In addition, it adds precise timing capabilities and improves the calorimetry measurements. In ProtoDUNE-DP, scintillation and electroluminescence light produced by cosmic muons in the LArTPC is collected by photomultiplier tubes placed up to 7 m away from the ionizing track. In this paper, the ProtoDUNE-DP photon detection system performance is evaluated with a particular focus on the different wavelength shifters, such as PEN and TPB, and the use of Xe-doped LAr, considering its future use in giant LArTPCs. The scintillation light production and propagation processes are analyzed and a comparison of simulation to data is performed, improving understanding of the liquid argon properties
△ Less
Submitted 3 June, 2022; v1 submitted 30 March, 2022;
originally announced March 2022.
-
3MASSIV: Multilingual, Multimodal and Multi-Aspect dataset of Social Media Short Videos
Authors:
Vikram Gupta,
Trisha Mittal,
Puneet Mathur,
Vaibhav Mishra,
Mayank Maheshwari,
Aniket Bera,
Debdoot Mukherjee,
Dinesh Manocha
Abstract:
We present 3MASSIV, a multilingual, multimodal and multi-aspect, expertly-annotated dataset of diverse short videos extracted from short-video social media platform - Moj. 3MASSIV comprises of 50k short videos (20 seconds average duration) and 100K unlabeled videos in 11 different languages and captures popular short video trends like pranks, fails, romance, comedy expressed via unique audio-visua…
▽ More
We present 3MASSIV, a multilingual, multimodal and multi-aspect, expertly-annotated dataset of diverse short videos extracted from short-video social media platform - Moj. 3MASSIV comprises of 50k short videos (20 seconds average duration) and 100K unlabeled videos in 11 different languages and captures popular short video trends like pranks, fails, romance, comedy expressed via unique audio-visual formats like self-shot videos, reaction videos, lip-synching, self-sung songs, etc. 3MASSIV presents an opportunity for multimodal and multilingual semantic understanding on these unique videos by annotating them for concepts, affective states, media types, and audio language. We present a thorough analysis of 3MASSIV and highlight the variety and unique aspects of our dataset compared to other contemporary popular datasets with strong baselines. We also show how the social media content in 3MASSIV is dynamic and temporal in nature, which can be used for semantic understanding tasks and cross-lingual analysis.
△ Less
Submitted 27 March, 2022;
originally announced March 2022.
-
Continual Learning for Multivariate Time Series Tasks with Variable Input Dimensions
Authors:
Vibhor Gupta,
Jyoti Narwariya,
Pankaj Malhotra,
Lovekesh Vig,
Gautam Shroff
Abstract:
We consider a sequence of related multivariate time series learning tasks, such as predicting failures for different instances of a machine from time series of multi-sensor data, or activity recognition tasks over different individuals from multiple wearable sensors. We focus on two under-explored practical challenges arising in such settings: (i) Each task may have a different subset of sensors,…
▽ More
We consider a sequence of related multivariate time series learning tasks, such as predicting failures for different instances of a machine from time series of multi-sensor data, or activity recognition tasks over different individuals from multiple wearable sensors. We focus on two under-explored practical challenges arising in such settings: (i) Each task may have a different subset of sensors, i.e., providing different partial observations of the underlying 'system'. This restriction can be due to different manufacturers in the former case, and people wearing more or less measurement devices in the latter (ii) We are not allowed to store or re-access data from a task once it has been observed at the task level. This may be due to privacy considerations in the case of people, or legal restrictions placed by machine owners. Nevertheless, we would like to (a) improve performance on subsequent tasks using experience from completed tasks as well as (b) continue to perform better on past tasks, e.g., update the model and improve predictions on even the first machine after learning from subsequently observed ones. We note that existing continual learning methods do not take into account variability in input dimensions arising due to different subsets of sensors being available across tasks, and struggle to adapt to such variable input dimensions (VID) tasks. In this work, we address this shortcoming of existing methods. To this end, we learn task-specific generative models and classifiers, and use these to augment data for target tasks. Since the input dimensions across tasks vary, we propose a novel conditioning module based on graph neural networks to aid a standard recurrent neural network. We evaluate the efficacy of the proposed approach on three publicly available datasets corresponding to two activity recognition tasks (classification) and one prognostics task (regression).
△ Less
Submitted 14 March, 2022;
originally announced March 2022.
-
A Gaseous Argon-Based Near Detector to Enhance the Physics Capabilities of DUNE
Authors:
A. Abed Abud,
B. Abi,
R. Acciarri,
M. A. Acero,
M. R. Adames,
G. Adamov,
M. Adamowski,
D. Adams,
M. Adinolfi,
C. Adriano,
A. Aduszkiewicz,
J. Aguilar,
Z. Ahmad,
J. Ahmed,
B. Aimard,
F. Akbar,
B. Ali-Mohammadzadeh,
T. Alion,
K. Allison,
S. Alonso Monsalve,
M. AlRashed,
C. Alt,
A. Alton,
R. Alvarez,
P. Amedo
, et al. (1220 additional authors not shown)
Abstract:
This document presents the concept and physics case for a magnetized gaseous argon-based detector system (ND-GAr) for the Deep Underground Neutrino Experiment (DUNE) Near Detector. This detector system is required in order for DUNE to reach its full physics potential in the measurement of CP violation and in delivering precision measurements of oscillation parameters. In addition to its critical r…
▽ More
This document presents the concept and physics case for a magnetized gaseous argon-based detector system (ND-GAr) for the Deep Underground Neutrino Experiment (DUNE) Near Detector. This detector system is required in order for DUNE to reach its full physics potential in the measurement of CP violation and in delivering precision measurements of oscillation parameters. In addition to its critical role in the long-baseline oscillation program, ND-GAr will extend the overall physics program of DUNE. The LBNF high-intensity proton beam will provide a large flux of neutrinos that is sampled by ND-GAr, enabling DUNE to discover new particles and search for new interactions and symmetries beyond those predicted in the Standard Model.
△ Less
Submitted 11 March, 2022;
originally announced March 2022.
-
Snowmass Neutrino Frontier: DUNE Physics Summary
Authors:
DUNE Collaboration,
A. Abed Abud,
B. Abi,
R. Acciarri,
M. A. Acero,
M. R. Adames,
G. Adamov,
M. Adamowski,
D. Adams,
M. Adinolfi,
C. Adriano,
A. Aduszkiewicz,
J. Aguilar,
Z. Ahmad,
J. Ahmed,
B. Aimard,
F. Akbar,
B. Ali-Mohammadzadeh,
T. Alion,
K. Allison,
S. Alonso Monsalve,
M. AlRashed,
C. Alt,
A. Alton,
R. Alvarez
, et al. (1221 additional authors not shown)
Abstract:
The Deep Underground Neutrino Experiment (DUNE) is a next-generation long-baseline neutrino oscillation experiment with a primary physics goal of observing neutrino and antineutrino oscillation patterns to precisely measure the parameters governing long-baseline neutrino oscillation in a single experiment, and to test the three-flavor paradigm. DUNE's design has been developed by a large, internat…
▽ More
The Deep Underground Neutrino Experiment (DUNE) is a next-generation long-baseline neutrino oscillation experiment with a primary physics goal of observing neutrino and antineutrino oscillation patterns to precisely measure the parameters governing long-baseline neutrino oscillation in a single experiment, and to test the three-flavor paradigm. DUNE's design has been developed by a large, international collaboration of scientists and engineers to have unique capability to measure neutrino oscillation as a function of energy in a broadband beam, to resolve degeneracy among oscillation parameters, and to control systematic uncertainty using the exquisite imaging capability of massive LArTPC far detector modules and an argon-based near detector. DUNE's neutrino oscillation measurements will unambiguously resolve the neutrino mass ordering and provide the sensitivity to discover CP violation in neutrinos for a wide range of possible values of $δ_{CP}$. DUNE is also uniquely sensitive to electron neutrinos from a galactic supernova burst, and to a broad range of physics beyond the Standard Model (BSM), including nucleon decays. DUNE is anticipated to begin collecting physics data with Phase I, an initial experiment configuration consisting of two far detector modules and a minimal suite of near detector components, with a 1.2 MW proton beam. To realize its extensive, world-leading physics potential requires the full scope of DUNE be completed in Phase II. The three Phase II upgrades are all necessary to achieve DUNE's physics goals: (1) addition of far detector modules three and four for a total FD fiducial mass of at least 40 kt, (2) upgrade of the proton beam power from 1.2 MW to 2.4 MW, and (3) replacement of the near detector's temporary muon spectrometer with a magnetized, high-pressure gaseous argon TPC and calorimeter.
△ Less
Submitted 11 March, 2022;
originally announced March 2022.
-
M5-brane prongs, string soliton bound states and wall-crossing
Authors:
Varun Gupta,
K. Narayan
Abstract:
We study abelian M5-brane field configurations representing BPS bound states of self-dual string solitons whose locations correspond to the endlines of M2-branes ending on the M5-branes. The BPS equations are obtained from appropriate Bogomolny completion of the effective abelian low energy functional with two transverse scalars, using two vectors representing the directions along which these endl…
▽ More
We study abelian M5-brane field configurations representing BPS bound states of self-dual string solitons whose locations correspond to the endlines of M2-branes ending on the M5-branes. The BPS equations are obtained from appropriate Bogomolny completion of the effective abelian low energy functional with two transverse scalars, using two vectors representing the directions along which these endline strings extend. Then we impose boundary conditions on the scalars near the string soliton cores. This leads to a molecule-like equilibrium structure of two non-parallel string solitons at fixed transverse separations, with the M5-brane "prong" deformations comprising two "spikes", each shaped like a ridge. The resulting picture becomes increasingly accurate as one approaches the wall of marginal stability, on which these states decay. There are various parallels with wall-crossing phenomena for string web configurations obtained from D3-brane deformations.
△ Less
Submitted 24 May, 2024; v1 submitted 7 March, 2022;
originally announced March 2022.
-
Unfreezing Social Navigation: Dynamical Systems based Compliance for Contact Control in Robot Navigation
Authors:
Diego Paez-Granados,
Vaibhav Gupta,
Aude Billard
Abstract:
Large efforts have focused on ensuring that the controllers for mobile service robots follow proxemics and other social rules to ensure both safe and socially acceptable distance to pedestrians. Nonetheless, involuntary contact may be unavoidable when the robot travels in crowded areas or when encountering adversarial pedestrians. Freezing the robot in response to contact might be detrimental to b…
▽ More
Large efforts have focused on ensuring that the controllers for mobile service robots follow proxemics and other social rules to ensure both safe and socially acceptable distance to pedestrians. Nonetheless, involuntary contact may be unavoidable when the robot travels in crowded areas or when encountering adversarial pedestrians. Freezing the robot in response to contact might be detrimental to bystanders' safety and prevents it from achieving its task. Unavoidable contacts must hence be controlled to ensure the safe and smooth travelling of robots in pedestrian alleys. We present a force-limited and obstacle avoidance controller integrated into a time-invariant dynamical system (DS) in a closed-loop force controller that let the robot react instantaneously to contact or to the sudden appearance of pedestrians. Mitigating the risk of collision is done by modulating the velocity commands upon detecting a contact and by absorbing part of the contact force through active compliant control when the robot bumps inadvertently against a pedestrian. We evaluated our method with a personal mobility robot -- Qolo -- showing contact mitigation with passive and active compliance. We showed the robot able to overcome an adversarial pedestrian within 9 N of the set limit contact force for speeds under 1 m/s. Moreover, we evaluated integrated obstacle avoidance proving the ability to advance without incurring any other collision.
△ Less
Submitted 2 March, 2022;
originally announced March 2022.
-
Foraging with MUSHROOMS: A Mixed-Integer Linear Programming Scheduler for Multimessenger Target of Opportunity Searches with the Zwicky Transient Facility
Authors:
B. Parazin,
Michael W. Coughlin,
Leo P. Singer,
Vaidehi Gupta,
Shreya Anand
Abstract:
Electromagnetic follow-up of gravitational wave detections is very resource intensive, taking up hours of limited observation time on dozens of telescopes. Creating more efficient schedules for follow-up will lead to a commensurate increase in counterpart location efficiency without using more telescope time. Widely used in operations research and telescope scheduling, mixed integer linear program…
▽ More
Electromagnetic follow-up of gravitational wave detections is very resource intensive, taking up hours of limited observation time on dozens of telescopes. Creating more efficient schedules for follow-up will lead to a commensurate increase in counterpart location efficiency without using more telescope time. Widely used in operations research and telescope scheduling, mixed integer linear programming (MILP) is a strong candidate to produce these higher-efficiency schedules, as it can make use of powerful commercial solvers that find globally optimal solutions to provided problems . We detail a new target of opportunity scheduling algorithm designed with Zwicky Transient Facility in mind that uses mixed integer linear programming. We compare its performance to \texttt{gwemopt}, the tuned heuristic scheduler used by the Zwicky Transient Facility and other facilities during the third LIGO-Virgo gravitational wave observing run. This new algorithm uses variable-length observing blocks to enforce cadence requirements and ensure field observability, along with having a secondary optimization step to minimize slew time. \blue{We show that by employing a hybrid method utilizing both this scheduler and \texttt{gwemopt}, the previous scheduler used, in concert, we can achieve an average improvement in detection efficiency of 3\%-11\% over \texttt{gwemopt} alone} for a simulated binary neutron star merger data set consistent with LIGO-Virgo's third observing run, highlighting the potential of mixed integer target of opportunity schedulers for future multimessenger follow-up surveys.
△ Less
Submitted 11 July, 2022; v1 submitted 28 February, 2022;
originally announced March 2022.
-
Systematic upper limits on the size of missing pulsar glitches in the first UTMOST open data release
Authors:
L. Dunn,
A. Melatos,
S. Suvorova,
W. Moran,
R. J. Evans,
S. Osłowski,
M. E. Lower,
M. Bailes,
C. Flynn,
V. Gupta
Abstract:
A systematic, semi-automated search for pulsar glitches in the first UTMOST public data release is presented. The search is carried out using a hidden Markov model which incorporates both glitches and timing noise into the model of the assumed phase evolution of the pulsar. Glitches are detected through Bayesian model selection between models with and without glitches present with minimal human in…
▽ More
A systematic, semi-automated search for pulsar glitches in the first UTMOST public data release is presented. The search is carried out using a hidden Markov model which incorporates both glitches and timing noise into the model of the assumed phase evolution of the pulsar. Glitches are detected through Bayesian model selection between models with and without glitches present with minimal human intervention. Nine glitches are detected among seven objects, all of which have been previously reported. No new glitches were detected. Injection studies are used to place 90\% frequentist upper limits on the size of undetected glitches in each of the 282 objects searched. The mean upper limit obtained is $Δf^{90\%}/f = 1.9 \times 10^{-8}$, with a range of $4.1 \times 10^{-11} \leq Δf^{90\%}/f \leq 2.7 \times 10^{-7}$, assuming step events with no post-glitch recoveries. It is demonstrated that including glitch recovery has a mild effect, in most cases increasing the upper limit by a factor of $\lesssim 5$ conservatively assuming complete recovery on a timescale of $100\,\mathrm{d}$.
△ Less
Submitted 24 February, 2022;
originally announced February 2022.
-
Learning Temporal Point Processes for Efficient Retrieval of Continuous Time Event Sequences
Authors:
Vinayak Gupta,
Srikanta Bedathur,
Abir De
Abstract:
Recent developments in predictive modeling using marked temporal point processes (MTPP) have enabled an accurate characterization of several real-world applications involving continuous-time event sequences (CTESs). However, the retrieval problem of such sequences remains largely unaddressed in literature. To tackle this, we propose NEUROSEQRET which learns to retrieve and rank a relevant set of c…
▽ More
Recent developments in predictive modeling using marked temporal point processes (MTPP) have enabled an accurate characterization of several real-world applications involving continuous-time event sequences (CTESs). However, the retrieval problem of such sequences remains largely unaddressed in literature. To tackle this, we propose NEUROSEQRET which learns to retrieve and rank a relevant set of continuous-time event sequences for a given query sequence, from a large corpus of sequences. More specifically, NEUROSEQRET first applies a trainable unwarping function on the query sequence, which makes it comparable with corpus sequences, especially when a relevant query-corpus pair has individually different attributes. Next, it feeds the unwarped query sequence and the corpus sequence into MTPP guided neural relevance models. We develop two variants of the relevance model which offer a tradeoff between accuracy and efficiency. We also propose an optimization framework to learn binary sequence embeddings from the relevance scores, suitable for the locality-sensitive hashing leading to a significant speedup in returning top-K results for a given query sequence. Our experiments with several datasets show the significant accuracy boost of NEUROSEQRET beyond several baselines, as well as the efficacy of our hashing mechanism.
△ Less
Submitted 17 February, 2022;
originally announced February 2022.
-
Communication-Efficient Algorithms for Solving Pressure Poisson Equation for Multiphase Flows using Parallel Computers
Authors:
Soumyadip Ghosh,
Jiacai Lu,
Vijay Gupta,
Gretar Tryggvason
Abstract:
Numerical solution of partial differential equations on parallel computers using domain decomposition usually requires synchronization and communication among the processors. These operations often have a significant overhead in terms of time and energy. In this paper, we propose communication-efficient parallel algorithms for solving partial differential equations that alleviate this overhead. Fi…
▽ More
Numerical solution of partial differential equations on parallel computers using domain decomposition usually requires synchronization and communication among the processors. These operations often have a significant overhead in terms of time and energy. In this paper, we propose communication-efficient parallel algorithms for solving partial differential equations that alleviate this overhead. First, we describe an asynchronous algorithm that removes the requirement of synchronization and checks for termination in a distributed fashion while maintaining the provision to restart iterations if necessary. Then, we build on the asynchronous algorithm to propose an event-triggered communication algorithm that communicates the boundary values to neighboring processors only at certain iterations, thereby reducing the number of messages while maintaining similar accuracy of solution. We demonstrate our algorithms on a successive over-relaxation solver for the Pressure Poisson equation arising from variable density incompressible multiphase flows in 3-D and show that our algorithms improve time and energy efficiency.
△ Less
Submitted 21 February, 2022;
originally announced February 2022.
-
A multi-reconstruction study of breast density estimation using Deep Learning
Authors:
Vikash Gupta,
Mutlu Demirer,
Robert W. Maxwell,
Richard D. White,
Barbaros Selnur Erdal
Abstract:
Breast density estimation is one of the key tasks in recognizing individuals predisposed to breast cancer. It is often challenging because of low contrast and fluctuations in mammograms' fatty tissue background. Most of the time, the breast density is estimated manually where a radiologist assigns one of the four density categories decided by the Breast Imaging and Reporting Data Systems (BI-RADS)…
▽ More
Breast density estimation is one of the key tasks in recognizing individuals predisposed to breast cancer. It is often challenging because of low contrast and fluctuations in mammograms' fatty tissue background. Most of the time, the breast density is estimated manually where a radiologist assigns one of the four density categories decided by the Breast Imaging and Reporting Data Systems (BI-RADS). There have been efforts in the direction of automating a breast density classification pipeline.
Breast density estimation is one of the key tasks performed during a screening exam. Dense breasts are more susceptible to breast cancer. The density estimation is challenging because of low contrast and fluctuations in mammograms' fatty tissue background. Traditional mammograms are being replaced by tomosynthesis and its other low radiation dose variants (for example Hologic' Intelligent 2D and C-View). Because of the low-dose requirement, increasingly more screening centers are favoring the Intelligent 2D view and C-View. Deep-learning studies for breast density estimation use only a single modality for training a neural network. However, doing so restricts the number of images in the dataset. In this paper, we show that a neural network trained on all the modalities at once performs better than a neural network trained on any single modality. We discuss these results using the area under the receiver operator characteristics curves.
△ Less
Submitted 10 October, 2022; v1 submitted 16 February, 2022;
originally announced February 2022.
-
ADIMA: Abuse Detection In Multilingual Audio
Authors:
Vikram Gupta,
Rini Sharon,
Ramit Sawhney,
Debdoot Mukherjee
Abstract:
Abusive content detection in spoken text can be addressed by performing Automatic Speech Recognition (ASR) and leveraging advancements in natural language processing. However, ASR models introduce latency and often perform sub-optimally for profane words as they are underrepresented in training corpora and not spoken clearly or completely. Exploration of this problem entirely in the audio domain h…
▽ More
Abusive content detection in spoken text can be addressed by performing Automatic Speech Recognition (ASR) and leveraging advancements in natural language processing. However, ASR models introduce latency and often perform sub-optimally for profane words as they are underrepresented in training corpora and not spoken clearly or completely. Exploration of this problem entirely in the audio domain has largely been limited by the lack of audio datasets. Building on these challenges, we propose ADIMA, a novel, linguistically diverse, ethically sourced, expert annotated and well-balanced multilingual profanity detection audio dataset comprising of 11,775 audio samples in 10 Indic languages spanning 65 hours and spoken by 6,446 unique users. Through quantitative experiments across monolingual and cross-lingual zero-shot settings, we take the first step in democratizing audio based content moderation in Indic languages and set forth our dataset to pave future work.
△ Less
Submitted 16 February, 2022;
originally announced February 2022.
-
Online Actuator Selection and Controller Design for Linear Quadratic Regulation with Unknown System Model
Authors:
Lintao Ye,
Ming Chi,
Zhi-Wei Liu,
Vijay Gupta
Abstract:
We study the simultaneous actuator selection and controller design problem for linear quadratic regulation with Gaussian noise over a finite horizon of length $T$ and unknown system model. We consider both episodic and non-episodic settings of the problem and propose online algorithms that specify both the sets of actuators to be utilized under a cardinality constraint and the controls correspondi…
▽ More
We study the simultaneous actuator selection and controller design problem for linear quadratic regulation with Gaussian noise over a finite horizon of length $T$ and unknown system model. We consider both episodic and non-episodic settings of the problem and propose online algorithms that specify both the sets of actuators to be utilized under a cardinality constraint and the controls corresponding to the sets of selected actuators. In the episodic setting, the interaction with the system breaks into $N$ episodes, each of which restarts from a given initial condition and has length $T$. In the non-episodic setting, the interaction goes on continuously. Our online algorithms leverage a multiarmed bandit algorithm to select the sets of actuators and a certainty equivalence approach to design the corresponding controls. We show that our online algorithms yield $\sqrt{N}$-regret for the episodic setting and $T^{2/3}$-regret for the non-episodic setting. We extend our algorithm design and analysis to show scalability with respect to both the total number of candidate actuators and the cardinality constraint. We numerically validate our theoretical results.
△ Less
Submitted 13 September, 2024; v1 submitted 25 January, 2022;
originally announced January 2022.
-
Doing More with Less: Overcoming Data Scarcity for POI Recommendation via Cross-Region Transfer
Authors:
Vinayak Gupta,
Srikanta Bedathur
Abstract:
Variability in social app usage across regions results in a high skew of the quantity and the quality of check-in data collected, which in turn is a challenge for effective location recommender systems. In this paper, we present Axolotl (Automated cross Location-network Transfer Learning), a novel method aimed at transferring location preference models learned in a data-rich region to significantl…
▽ More
Variability in social app usage across regions results in a high skew of the quantity and the quality of check-in data collected, which in turn is a challenge for effective location recommender systems. In this paper, we present Axolotl (Automated cross Location-network Transfer Learning), a novel method aimed at transferring location preference models learned in a data-rich region to significantly boost the quality of recommendations in a data-scarce region. Axolotl predominantly deploys two channels for information transfer, (1) a meta-learning based procedure learned using location recommendation as well as social predictions, and (2) a lightweight unsupervised cluster-based transfer across users and locations with similar preferences. Both of these work together synergistically to achieve improved accuracy of recommendations in data-scarce regions without any prerequisite of overlapping users and with minimal fine-tuning. We build Axolotl on top of a twin graph-attention neural network model used for capturing the user- and location-conditioned influences in a user-mobility graph for each region. We conduct extensive experiments on 12 user mobility datasets across the U.S., Japan, and Germany, using 3 as source regions and 9 of them (that have much sparsely recorded mobility data) as target regions. Empirically, we show that Axolotl achieves up to 18% better recommendation performance than the existing state-of-the-art methods across all metrics.
△ Less
Submitted 16 January, 2022;
originally announced January 2022.
-
Wannier Function Methods for Topological Modes in 1D Photonic Crystals
Authors:
Vaibhav Gupta,
Barry Bradlyn
Abstract:
In this work, we use Wannier functions to analyze topological phase transitions in one dimensional photonic crystals. We first review the construction of exponentially localized Wannier functions in one dimension, and show how to numerically construct them for photonic systems. We then apply these tools to study a photonic analog of the Su-Schrieffer-Heeger model. We use photonic Wannier functions…
▽ More
In this work, we use Wannier functions to analyze topological phase transitions in one dimensional photonic crystals. We first review the construction of exponentially localized Wannier functions in one dimension, and show how to numerically construct them for photonic systems. We then apply these tools to study a photonic analog of the Su-Schrieffer-Heeger model. We use photonic Wannier functions to construct a quantitatively accurate approximate model for the topological phase transition, and compute the localization of topological defect states. Finally, we discuss the implications of our work for the study of band representations for photonic crystals.
△ Less
Submitted 6 June, 2022; v1 submitted 14 January, 2022;
originally announced January 2022.
-
Greedy Algorithm for Multiway Matching with Bounded Regret
Authors:
Varun Gupta
Abstract:
In this paper we prove the efficacy of a simple greedy algorithm for a finite horizon online resource allocation/matching problem, when the corresponding static planning linear program (SPP) exhibits a non-degeneracy condition called the general position gap (GPG). The key intuition that we formalize is that the solution of the reward maximizing SPP is the same as a feasibility Linear Program rest…
▽ More
In this paper we prove the efficacy of a simple greedy algorithm for a finite horizon online resource allocation/matching problem, when the corresponding static planning linear program (SPP) exhibits a non-degeneracy condition called the general position gap (GPG). The key intuition that we formalize is that the solution of the reward maximizing SPP is the same as a feasibility Linear Program restricted to the optimal basic activities, and under GPG this solution can be tracked with bounded regret by a greedy algorithm, i.e., without the commonly used technique of periodically resolving the SPP.
The goal of the decision maker is to combine resources (from a finite set of resource types) into configurations (from a finite set of feasible configurations) where each configuration is specified by the number of resources consumed of each type and a reward. The resources are further subdivided into three types - offline (whose quantity is known and available at time 0), online-queueable (which arrive online and can be stored in a buffer), and online-nonqueueable (which arrive online and must be matched on arrival or lost). Under GRG we prove that, (i) our greedy algorithm gets bounded any-time regret of $\mathcal{O}(1/ε_0)$ for matching reward ($ε_0$ is a measure of the GPG) when no configuration contains both an online-queueable and an online-nonqueueable resource, and (ii) $\mathcal{O}(\log t)$ expected any-time regret otherwise (we also prove a matching lower bound). By considering the three types of resources, our matching framework encompasses several well-studied problems such as dynamic multi-sided matching, network revenue management, online stochastic packing, and multiclass queueing systems.
△ Less
Submitted 24 July, 2022; v1 submitted 8 December, 2021;
originally announced December 2021.
-
Robustness against Adversarial Attacks in Neural Networks using Incremental Dissipativity
Authors:
Bernardo Aquino,
Arash Rahnama,
Peter Seiler,
Lizhen Lin,
Vijay Gupta
Abstract:
Adversarial examples can easily degrade the classification performance in neural networks. Empirical methods for promoting robustness to such examples have been proposed, but often lack both analytical insights and formal guarantees. Recently, some robustness certificates have appeared in the literature based on system theoretic notions. This work proposes an incremental dissipativity-based robust…
▽ More
Adversarial examples can easily degrade the classification performance in neural networks. Empirical methods for promoting robustness to such examples have been proposed, but often lack both analytical insights and formal guarantees. Recently, some robustness certificates have appeared in the literature based on system theoretic notions. This work proposes an incremental dissipativity-based robustness certificate for neural networks in the form of a linear matrix inequality for each layer. We also propose an equivalent spectral norm bound for this certificate which is scalable to neural networks with multiple layers. We demonstrate the improved performance against adversarial attacks on a feed-forward neural network trained on MNIST and an Alexnet trained using CIFAR-10.
△ Less
Submitted 13 February, 2022; v1 submitted 24 November, 2021;
originally announced November 2021.