Skip to main content

Showing 1–9 of 9 results for author: Collins, J

Searching in archive stat. Search in all archives.
.
  1. arXiv:2505.09197  [pdf, ps, other

    stat.AP eess.IV

    Generalizing imaging biomarker repeatability studies using Bayesian inference: Applications in detecting heterogeneous treatment response in whole-body diffusion-weighted MRI of metastatic prostate cancer

    Authors: Matthew D Blackledge, Konstantinos Zormpas-Petridis, Ricardo Donners, Antonio Candito, David J Collins, Johann de Bono, Chris Parker, Dow-Mu Koh, Nina Tunariu

    Abstract: The assessment of imaging biomarkers is critical for advancing precision medicine and improving disease characterization. Despite the availability of methods to derive disease heterogeneity metrics in imaging studies, a robust framework for evaluating measurement uncertainty remains underdeveloped. To address this gap, we propose a novel Bayesian framework to assess the precision of disease hetero… ▽ More

    Submitted 14 May, 2025; originally announced May 2025.

    MSC Class: 62P10 (Primary) ACM Class: I.4.7; I.4.9

  2. arXiv:2206.08353  [pdf, other

    cs.LG stat.ML

    Towards Understanding How Machines Can Learn Causal Overhypotheses

    Authors: Eliza Kosoy, David M. Chan, Adrian Liu, Jasmine Collins, Bryanna Kaufmann, Sandy Han Huang, Jessica B. Hamrick, John Canny, Nan Rosemary Ke, Alison Gopnik

    Abstract: Recent work in machine learning and cognitive science has suggested that understanding causal information is essential to the development of intelligence. The extensive literature in cognitive science using the ``blicket detector'' environment shows that children are adept at many kinds of causal inference and learning. We propose to adapt that environment for machine learning agents. One of the k… ▽ More

    Submitted 16 June, 2022; originally announced June 2022.

  3. arXiv:2104.02092  [pdf, other

    hep-ph hep-ex physics.data-an stat.ML

    Comparing Weak- and Unsupervised Methods for Resonant Anomaly Detection

    Authors: Jack H. Collins, Pablo Martín-Ramiro, Benjamin Nachman, David Shih

    Abstract: Anomaly detection techniques are growing in importance at the Large Hadron Collider (LHC), motivated by the increasing need to search for new physics in a model-agnostic way. In this work, we provide a detailed comparative study between a well-studied unsupervised method called the autoencoder (AE) and a weakly-supervised approach based on the Classification Without Labels (CWoLa) technique. We ex… ▽ More

    Submitted 5 April, 2021; originally announced April 2021.

    Comments: 39 pages, 17 figures

  4. arXiv:2006.14137  [pdf

    physics.soc-ph stat.AP

    Estimating Road Network Accessibility during a Hurricane Evacuation: A Case Study of Hurricane Irma in Florida

    Authors: Yi-Jie Zhu, Yujie Hu, Jennifer M. Collins

    Abstract: Understanding the spatiotemporal road network accessibility during a hurricane evacuation, the level of ease of residents in an area in reaching evacuation destination sites through the road network, is a critical component of emergency management. While many studies have attempted to measure road accessibility (either in the scope of evacuation or beyond), few have considered both dynamic evacuat… ▽ More

    Submitted 24 June, 2020; originally announced June 2020.

    Journal ref: Transportation Research Part D: Transport and Environment, 83, 102334 (2020)

  5. arXiv:2002.03924  [pdf, ps, other

    cs.LG stat.ML

    Playing to Learn Better: Repeated Games for Adversarial Learning with Multiple Classifiers

    Authors: Prithviraj Dasgupta, Joseph B. Collins, Michael McCarrick

    Abstract: We consider the problem of prediction by a machine learning algorithm, called learner, within an adversarial learning setting. The learner's task is to correctly predict the class of data passed to it as a query. However, along with queries containing clean data, the learner could also receive malicious or adversarial queries from an adversary. The objective of the adversary is to evade the learne… ▽ More

    Submitted 10 February, 2020; originally announced February 2020.

    Comments: Presented at Artificial Intelligence for Cyber Security (AICS) 2020 workshop (non-archival), New York, NY. February 8, 2020

    Report number: NRL/CP/5580--19-0044 ACM Class: I.2.6

  6. arXiv:1912.02258  [pdf, ps, other

    cs.CR cs.AI cs.LG stat.ML

    A Survey of Game Theoretic Approaches for Adversarial Machine Learning in Cybersecurity Tasks

    Authors: Prithviraj Dasgupta, Joseph B. Collins

    Abstract: Machine learning techniques are currently used extensively for automating various cybersecurity tasks. Most of these techniques utilize supervised learning algorithms that rely on training the algorithm to classify incoming data into different categories, using data encountered in the relevant domain. A critical vulnerability of these algorithms is that they are susceptible to adversarial attacks… ▽ More

    Submitted 4 December, 2019; originally announced December 2019.

    Comments: 13 pages, 2 figures, 1 table

    MSC Class: 68T05

    Journal ref: AI Magazine, 40(2), 31-43 (2019)

  7. arXiv:1903.00925  [pdf, other

    cs.LG cs.AI cs.CV stat.ML

    Accelerating Training of Deep Neural Networks with a Standardization Loss

    Authors: Jasmine Collins, Johannes Balle, Jonathon Shlens

    Abstract: A significant advance in accelerating neural network training has been the development of normalization methods, permitting the training of deep models both faster and with better accuracy. These advances come with practical challenges: for instance, batch normalization ties the prediction of individual examples with other examples within a batch, resulting in a network that is heavily dependent o… ▽ More

    Submitted 3 March, 2019; originally announced March 2019.

    Comments: Technical report. Results presented at WiML 2018

  8. arXiv:1611.09913  [pdf, other

    stat.ML cs.AI cs.LG cs.NE

    Capacity and Trainability in Recurrent Neural Networks

    Authors: Jasmine Collins, Jascha Sohl-Dickstein, David Sussillo

    Abstract: Two potential bottlenecks on the expressiveness of recurrent neural networks (RNNs) are their ability to store information about the task in their parameters, and to store information about the input history in their units. We show experimentally that all common RNN architectures achieve nearly the same per-task and per-unit capacity bounds with careful training, for a variety of tasks and stackin… ▽ More

    Submitted 3 March, 2017; v1 submitted 29 November, 2016; originally announced November 2016.

    Comments: Published as a conference paper at ICLR 2017

  9. arXiv:1410.4355  [pdf, other

    cs.SI cs.LG stat.ML

    Multi-Level Anomaly Detection on Time-Varying Graph Data

    Authors: Robert A. Bridges, John Collins, Erik M. Ferragut, Jason Laska, Blair D. Sullivan

    Abstract: This work presents a novel modeling and analysis framework for graph sequences which addresses the challenge of detecting and contextualizing anomalies in labelled, streaming graph data. We introduce a generalization of the BTER model of Seshadhri et al. by adding flexibility to community structure, and use this model to perform multi-scale graph anomaly detection. Specifically, probability models… ▽ More

    Submitted 20 April, 2015; v1 submitted 16 October, 2014; originally announced October 2014.

    Comments: 8 pages. Updated paper to address reviewer comments