• Off-Policy Deep Reinforcement Learning with Analogous Disentangled Exploration

    Authors:

    Anji Liu,

    Yitao Liang,

    Guy Van den Broeck

    Abstract:

    Off-policy reinforcement learning (RL) is concerned with learning a rewarding policy by executing another policy that gathers samples of experience. While the former policy (i.e. target policy) is rewarding but in-expressive (in most cases, deterministic), doing well in the latter task, in contrast, requires an expressive policy (i.e. behavior policy) that offers guided and effective exploration.…
    ▽ More

    Submitted 25 February, 2020;
    originally announced February 2020.

  • Mnemonics Training: Multi-Class Incremental Learning without Forgetting

    Authors:

    Yaoyao Liu,

    An-An Liu,

    Yuting Su,

    Bernt Schiele,

    Qianru Sun

    Abstract:

    Multi-Class Incremental Learning (MCIL) aims to learn new concepts by incrementally updating a model trained on previous concepts. However, there is an inherent trade-off to effectively learning new concepts without forgetting previous ones, potentially leading to catastrophic forgetting of previous concepts. To alleviate this issue, it has been proposed to keep around a few examples of the previo…
    ▽ More

    Submitted 24 February, 2020;
    originally announced February 2020.

  • Machine Learning Approaches For Motor Learning: A Short Review

    Authors:

    Baptiste Caramiaux,

    Jules Françoise,

    Abby Wanyu Liu,

    Téo Sanchez,

    Frédéric Bevilacqua

    Abstract:

    The use of machine learning to model motor learning mechanisms is still limited, while it could help to design novel interactive systems for movement learning or rehabilitation. This approach requires to account for the motor variability induced by motor learning mechanisms. This represents specific challenges concerning fast adaptability of the computational models, from small variations to more…
    ▽ More

    Submitted 11 February, 2020;
    originally announced February 2020.

  • What’s Live? Understanding Distributed Consensus

    Authors:

    Saksham Chand,

    Yanhong A Liu

    Abstract:

    Distributed consensus algorithms such as Paxos have been studied extensively. They all use a same definition of safety. Liveness is especially important in practice despite well-known theoretical impossibility results. However, many different liveness properties and assumptions have been stated, and there are no systematic comparisons for better understanding of these properties.
    This paper stud…
    ▽ More

    Submitted 14 January, 2020;
    originally announced January 2020.

  • Power Control for Massive MIMO Systems with Nonorthogonal Pilots

    Authors:

    Xihan Chen,

    Kaiming Shen,

    Hei Victor Cheng,

    An Liu,

    Wei Yu,

    Min-Jian Zhao

    Abstract:

    This letter shows that optimizing the transmit powers along with optimally designed nonorthogonal pilots can significantly reduce pilot contamination and improve the overall throughput of the uplink multi-cell massive multiple-input multiple-output (MIMO) system as compared to the conventional schemes that use orthogonal pilots. Given the optimized nonorthogonal pilots, power control as a function…
    ▽ More

    Submitted 20 December, 2019;
    originally announced December 2019.

  • An Adaptive and Fast Convergent Approach to Differentially Private Deep Learning

    Authors:

    Zhiying Xu,

    Shuyu Shi,

    Alex X. Liu,

    Jun Zhao,

    Lin Chen

    Abstract:

    With the advent of the era of big data, deep learning has become a prevalent building block in a variety of machine learning or data mining tasks, such as signal processing, network modeling and traffic analysis, to name a few. The massive user data crowdsourced plays a crucial role in the success of deep learning models. However, it has been shown that user data may be inferred from trained neura…
    ▽ More

    Submitted 19 December, 2019;
    originally announced December 2019.

  • Enumeration of Minimum Hamming Weight Polar Codewords with Sublinear Complexity

    Authors:

    Fengyi Cheng,

    Aijun Liu,

    Jincheng Dai,

    Kai Niu,

    Xiaohu Liang

    Abstract:

    Polar code, with explicit construction and recursive structure, is the latest breakthrough in channel coding field for its low-complexity and theoretically capacity-achieving property. Since polar codes can approach the maximum likelihood performance under successive cancellation list decoding (SCLD), its decoding performance can be evaluated by Bonferroni-type bounds (e.g., union bound) in which…
    ▽ More

    Submitted 17 December, 2019;
    originally announced December 2019.

  • The Network-based Candidate Forwarding Set Optimization Approach for Opportunistic Routing in Wireless Sensor Network

    Authors:

    Ning Li,

    Alex X. Liu,

    Jose-Fernan Martinez-Ortega,

    Vicente Hernandez Diaz,

    Xin Yuan

    Abstract:

    In wireless sensor networks (WSNs), the opportunistic routing has better performances on packet delivery probability than the deterministic routing. For reducing the transmission delay and duplicate transmission in opportunistic routing, the candidate forwarding set optimization technology is proposed. This technology is crucial to opportunistic routing. The prior arts have limitations on improvin…
    ▽ More

    Submitted 16 December, 2019;
    originally announced December 2019.

  • Game Theory based Joint Task Offloading and Resources Allocation Algorithm for Mobile Edge Computing

    Authors:

    Jianen Yan,

    Ning Li,

    Zhaoxin Zhang,

    Alex X. Liu,

    Jose Fernan Martinez,

    Xin Yuan

    Abstract:

    Mobile edge computing (MEC) has emerged for reducing energy consumption and latency by allowing mobile users to offload computationally intensive tasks to the MEC server. Due to the spectrum reuse in small cell network, the inter-cell interference has a great effect on MEC performances. In this paper, for reducing the energy consumption and latency of MEC, we propose a game theory based approach t…
    ▽ More

    Submitted 16 December, 2019;
    originally announced December 2019.

  • Pairwise-based Multi-Attribute Decision Making Approach for Wireless Network

    Authors:

    Ning Li,

    Jianen Yan,

    Zhaoxin Zhang,

    Alex X. Liu,

    Xin Yuan

    Abstract:

    In the wireless network applications, such as routing decision, network selection, etc., the Multi-Attribute Decision Making (MADM) has been widely used. The MADM approach can address the multi-objective decision making issues effectively.However, when the parameters vary greatly, the traditionalMADM algorithm is not effective anymore. To solve this problem,in this paper, we propose the pairwise-b…
    ▽ More

    Submitted 23 December, 2019; v1 submitted 16 December, 2019;
    originally announced December 2019.

  • Towards Robust Neural Vocoding for Speech Generation: A Survey

    Authors:

    Po-chun Hsu,

    Chun-hsuan Wang,

    Andy T. Liu,

    Hung-yi Lee

    Abstract:

    Recently, neural vocoders have been widely used in speech synthesis tasks, including text-to-speech and voice conversion. However, in the encounter of data distribution mismatch between training and inference, neural vocoders trained on real data often degrade in voice quality for unseen scenarios. In this paper, we train three commonly used neural vocoders, including WaveNet, WaveRNN, and WaveGlo…
    ▽ More

    Submitted 5 December, 2019;
    originally announced December 2019.

  • Static and Dynamic Fusion for Multi-modal Cross-ethnicity Face Anti-spoofing

    Authors:

    Ajian Liu,

    Zichang Tan,

    Xuan Li,

    Jun Wan,

    Sergio Escalera,

    Guodong Guo,

    Stan Z. Li

    Abstract:

    Regardless of the usage of deep learning and handcrafted methods, the dynamic information from videos and the effect of cross-ethnicity are rarely considered in face anti-spoofing. In this work, we propose a static-dynamic fusion mechanism for multi-modal face anti-spoofing. Inspired by motion divergences between real and fake faces, we incorporate the dynamic image calculated by rank pooling with…
    ▽ More

    Submitted 15 December, 2019; v1 submitted 4 December, 2019;
    originally announced December 2019.

  • Triply Robust Off-Policy Evaluation

    Authors:

    Anqi Liu,

    Hao Liu,

    Anima Anandkumar,

    Yisong Yue

    Abstract:

    We propose a robust regression approach to off-policy evaluation (OPE) for contextual bandits. We frame OPE as a covariate-shift problem and leverage modern robust regression tools. Ours is a general approach that can be used to augment any existing OPE method that utilizes the direct method. When augmenting doubly robust methods, we call the resulting method Triply Robust. We prove upper bounds o…
    ▽ More

    Submitted 15 November, 2019; v1 submitted 13 November, 2019;
    originally announced November 2019.

  • Finding Social Media Trolls: Dynamic Keyword Selection Methods for Rapidly-Evolving Online Debates

    Authors:

    Anqi Liu,

    Maya Srikanth,

    Nicholas Adams-Cohen,

    R. Michael Alvarez,

    Anima Anandkumar

    Abstract:

    Online harassment is a significant social problem. Prevention of online harassment requires rapid detection of harassing, offensive, and negative social media posts. In this paper, we propose the use of word embedding models to identify offensive and harassing social media messages in two aspects: detecting fast-changing topics for more effective data collection and representing word semantics in…
    ▽ More

    Submitted 15 November, 2019; v1 submitted 13 November, 2019;
    originally announced November 2019.

  • Sequence-to-sequence Automatic Speech Recognition with Word Embedding Regularization and Fused Decoding

    Authors:

    Alexander H. Liu,

    Tzu-Wei Sung,

    Shun-Po Chuang,

    Hung-yi Lee,

    Lin-shan Lee

    Abstract:

    In this paper, we investigate the benefit that off-the-shelf word embedding can bring to the sequence-to-sequence (seq-to-seq) automatic speech recognition (ASR). We first introduced the word embedding regularization by maximizing the cosine similarity between a transformed decoder feature and the target word embedding. Based on the regularized decoder, we further proposed the fused decoding mecha…
    ▽ More

    Submitted 5 February, 2020; v1 submitted 28 October, 2019;
    originally announced October 2019.

  • Towards Unsupervised Speech Recognition and Synthesis with Quantized Speech Representation Learning

    Authors:

    Alexander H. Liu,

    Tao Tu,

    Hung-yi Lee,

    Lin-shan Lee

    Abstract:

    In this paper we propose a Sequential Representation Quantization AutoEncoder (SeqRQ-AE) to learn from primarily unpaired audio data and produce sequences of representations very close to phoneme sequences of speech utterances. This is achieved by proper temporal segmentation to make the representations phoneme-synchronized, and proper phonetic clustering to have total number of distinct represent…
    ▽ More

    Submitted 5 February, 2020; v1 submitted 28 October, 2019;
    originally announced October 2019.

  • Mockingjay: Unsupervised Speech Representation Learning with Deep Bidirectional Transformer Encoders

    Authors:

    Andy T. Liu,

    Shu-wen Yang,

    Po-Han Chi,

    Po-chun Hsu,

    Hung-yi Lee

    Abstract:

    We present Mockingjay as a new speech representation learning approach, where bidirectional Transformer encoders are pre-trained on a large amount of unlabeled speech. Previous speech representation methods learn through conditioning on past frames and predicting information about future frames. Whereas Mockingjay is designed to predict the current frame through jointly conditioning on both past a…
    ▽ More

    Submitted 2 February, 2020; v1 submitted 24 October, 2019;
    originally announced October 2019.

  • Model selection for deep audio source separation via clustering analysis

    Authors:

    Alisa Liu,

    Prem Seetharaman,

    Bryan Pardo

    Abstract:

    Audio source separation is the process of separating a mixture (e.g. a pop band recording) into isolated sounds from individual sources (e.g. just the lead vocals). Deep learning models are the state-of-the-art in source separation, given that the mixture to be separated is similar to the mixtures the deep model was trained on. This requires the end user to know enough about each model’s training…
    ▽ More

    Submitted 23 October, 2019;
    originally announced October 2019.

  • Knowledge of Uncertain Worlds: Programming with Logical Constraints

    Authors:

    Yanhong A. Liu,

    Scott D. Stoller

    Abstract:

    Programming with logic for sophisticated applications must deal with recursion and negation, which have created significant challenges in logic, leading to many different, conflicting semantics of rules. This paper describes a unified language, DA logic, for design and analysis logic, based on the unifying founded semantics and constraint semantics, that support the power and ease of programming w…
    ▽ More

    Submitted 23 October, 2019;
    originally announced October 2019.

  • Parallel Stochastic Optimization Framework for Large-Scale Non-Convex Stochastic Problems

    Authors:

    Naeimeh Omidvar,

    An Liu,

    Vincent Lau,

    Danny H. K. Tsang,

    Mohammad Reza Pakravan

    Abstract:

    In this paper, we consider the problem of stochastic optimization, where the objective function is in terms of the expectation of a (possibly non-convex) cost function that is parametrized by a random variable. While the convergence speed is critical for many emerging applications, most existing stochastic optimization methods suffer from slow convergence. Furthermore, the emerging technology of p…
    ▽ More

    Submitted 22 October, 2019;
    originally announced October 2019.

  • Spatial Strength Centrality and the Effect of Spatial Embeddings on Network Architecture

    Authors:

    Andrew Liu,

    Mason A. Porter

    Abstract:

    For many networks, it is useful to think of their nodes as being embedded in a latent space, and such embeddings can affect the probability of whether nodes are adjacent to each other. In this paper, we extend existing models of synthetic networks to spatial network models by incorporating deterrence functions. We start by extending a geographical fitness model by employing Gaussian-distributed fi…
    ▽ More

    Submitted 2 October, 2019;
    originally announced October 2019.

  • Region-wise Generative Adversarial ImageInpainting for Large Missing Areas

    Authors:

    Yuqing Ma,

    Xianglong Liu,

    Shihao Bai,

    Lei Wang,

    Aishan Liu,

    Dacheng Tao,

    Edwin Hancock

    Abstract:

    Recently deep neutral networks have achieved promising performance for filling large missing regions in image inpainting tasks. They usually adopted the standard convolutional architecture over the corrupted image, leading to meaningless contents, such as color discrepancy, blur and artifacts. Moreover, most inpainting approaches cannot well handle the large continuous missing area cases. To addre…
    ▽ More

    Submitted 27 September, 2019;
    originally announced September 2019.

  • Focus Your Attention: A Bidirectional Focal Attention Network for Image-Text Matching

    Authors:

    Chunxiao Liu,

    Zhendong Mao,

    An-An Liu,

    Tianzhu Zhang,

    Bin Wang,

    Yongdong Zhang

    Abstract:

    Learning semantic correspondence between image and text is significant as it bridges the semantic gap between vision and language. The key challenge is to accurately find and correlate shared semantics in image and text. Most existing methods achieve this goal by representing the shared semantic as a weighted combination of all the fragments (image regions or text words), where fragments relevant…
    ▽ More

    Submitted 25 September, 2019;
    originally announced September 2019.

  • Trust Assessment in Online Social Networks

    Authors:

    Guangchi Liu,

    Qing Yang,

    Honggang Wang,

    Alex X. Liu

    Abstract:

    Assessing trust in online social networks (OSNs) is critical for many applications such as online marketing and network security. It is a challenging problem, however, due to the difficulties of handling complex social network topologies and conducting accurate assessment in these topologies. To address these challenges, we model trust by proposing the three-valued subjective logic (3VSL) model. 3…
    ▽ More

    Submitted 22 September, 2019;
    originally announced September 2019.

  • Multi-sense Definition Modeling using Word Sense Decompositions

    Authors:

    Ruimin Zhu,

    Thanapon Noraset,

    Alisa Liu,

    Wenxin Jiang,

    Doug Downey

    Abstract:

    Word embeddings capture syntactic and semantic information about words. Definition modeling aims to make the semantic content in each embedding explicit, by outputting a natural language definition based on the embedding. However, existing definition models are limited in their ability to generate accurate definitions for different senses of the same word. In this paper, we introduce a new method…
    ▽ More

    Submitted 18 September, 2019;
    originally announced September 2019.

  • Training Robust Deep Neural Networks via Adversarial Noise Propagation

    Authors:

    Aishan Liu,

    Xianglong Liu,

    Chongzhi Zhang,

    Hang Yu,

    Qiang Liu,

    Junfeng He

    Abstract:

    Deep neural networks have been found vulnerable to noises like adversarial examples and corruption in practice. A number of adversarial defense methods have been developed, which indeed improve the model robustness towards adversarial examples in practice. However, only relying on training with the data mixed with noises, most of them still fail to defend the generalized types of noises. Motivated…
    ▽ More

    Submitted 19 September, 2019;
    originally announced September 2019.

  • Extended Magic for Negation: Efficient Demand-Driven Evaluation of Stratified Datalog with Precise Complexity Guarantees

    Authors:

    K. Tuncay Tekle,

    Yanhong A. Liu

    Abstract:

    Given a set of Datalog rules, facts, and a query, answers to the query can be inferred bottom-up starting from the facts or top-down starting from the query. For efficiency, top-down evaluation is extended with memoization of inferred facts, and bottom-up evaluation is performed after transformations to make rules driven by the demand from the query. Prior work has shown their precise complexity a…
    ▽ More

    Submitted 18 September, 2019;
    originally announced September 2019.

  • Interpreting and Improving Adversarial Robustness of Deep Neural Networks with Neuron Sensitivity

    Authors:

    Chongzhi Zhang,

    Aishan Liu,

    Xianglong Liu,

    Yitao Xu,

    Hang Yu,

    Yuqing Ma,

    Tianlin Li

    Abstract:

    Deep neural networks (DNNs) are vulnerable to adversarial examples where inputs with imperceptible perturbations mislead DNNs to incorrect results. Despite the potential risk they bring, adversarial examples are also valuable for providing insights into the weakness and blind-spots of DNNs. Thus, the interpretability of a DNN in the adversarial setting aims to explain the rationale behind its deci…
    ▽ More

    Submitted 19 November, 2019; v1 submitted 16 September, 2019;
    originally announced September 2019.

  • PDA: Progressive Data Augmentation for General Robustness of Deep Neural Networks

    Authors:

    Hang Yu,

    Aishan Liu,

    Xianglong Liu,

    Gengchao Li,

    Ping Luo,

    Ran Cheng,

    Jichen Yang,

    Chongzhi Zhang

    Abstract:

    Adversarial images are designed to mislead deep neural networks (DNNs), attracting great attention in recent years. Although several defense strategies achieved encouraging robustness against adversarial samples, most of them fail to improve the robustness on common corruptions such as noise, blur, and weather/digital effects (e.g. frost, pixelate). To address this problem, we propose a simple yet…
    ▽ More

    Submitted 24 February, 2020; v1 submitted 10 September, 2019;
    originally announced September 2019.

  • Semantic Correlation Promoted Shape-Variant Context for Segmentation

    Authors:

    Henghui Ding,

    Xudong Jiang,

    Bing Shuai,

    Ai Qun Liu,

    Gang Wang

    Abstract:

    Context is essential for semantic segmentation. Due to the diverse shapes of objects and their complex layout in various scene images, the spatial scales and shapes of contexts for different objects have very large variation. It is thus ineffective or inefficient to aggregate various context information from a predefined fixed region. In this work, we propose to generate a scale- and shape-variant…
    ▽ More

    Submitted 5 September, 2019;
    originally announced September 2019.

  • Boundary-Aware Feature Propagation for Scene Segmentation

    Authors:

    Henghui Ding,

    Xudong Jiang,

    Ai Qun Liu,

    Nadia Magnenat Thalmann,

    Gang Wang

    Abstract:

    In this work, we address the challenging issue of scene segmentation. To increase the feature similarity of the same object while keeping the feature discrimination of different objects, we explore to propagate information throughout the image under the control of objects’ boundaries. To this end, we first propose to learn the boundary as an additional semantic class to enable the network to be aw…
    ▽ More

    Submitted 31 August, 2019;
    originally announced September 2019.

  • A Decomposition Method for Large-scale Convex Quadratically Constrained Quadratic Programs

    Authors:

    Run Chen,

    Andrew L. Liu

    Abstract:

    We consider solving a convex quadratically constrained quadratic program (QCQP), which has a wide range of applications, including machine learning, data analysis and signal processing. While small to mid-sized convex QCQPs can be solved efficiently by interior-point algorithms, large-scale problems pose significant challenges to traditional centralized algorithms, since the exploding volume of da…
    ▽ More

    Submitted 16 October, 2019; v1 submitted 30 August, 2019;
    originally announced September 2019.

  • CASIA-SURF: A Large-scale Multi-modal Benchmark for Face Anti-spoofing

    Authors:

    Shifeng Zhang,

    Ajian Liu,

    Jun Wan,

    Yanyan Liang,

    Guogong Guo,

    Sergio Escalera,

    Hugo Jair Escalante,

    Stan Z. Li

    Abstract:

    Face anti-spoofing is essential to prevent face recognition systems from a security breach. Much of the progresses have been made by the availability of face anti-spoofing benchmark datasets in recent years. However, existing face anti-spoofing benchmarks have limited number of subjects ($lenegmedspace170$) and modalities ($leqnegmedspace2$), which hinder the further development of the academi…
    ▽ More

    Submitted 4 February, 2020; v1 submitted 28 August, 2019;
    originally announced August 2019.

  • Mixed-Timescale Beamforming and Power Splitting for Massive MIMO Aided SWIPT IoT Network

    Authors:

    Xihan Chen,

    Hei Victor Cheng,

    An Liu,

    Kaiming Shen,

    Min-Jian Zhao

    Abstract:

    Traditional simultaneous wireless information and power transfer (SWIPT) with power splitting assumes perfect channel state information (CSI), which is difficult to obtain especially in the massive multiple-input-multiple-output (MIMO) regime. In this letter, we consider a mixed-timescale joint beamforming and power splitting (MJBP) scheme to maximize general utility functions under a power constr…
    ▽ More

    Submitted 20 August, 2019;
    originally announced August 2019.

  • Tracking Paths in Planar Graphs

    Authors:

    David Eppstein,

    Michael T. Goodrich,

    James A. Liu,

    Pedro Matias

    Abstract:

    We consider the NP-complete problem of tracking paths in a graph, first introduced by Banik et. al. [3]. Given an undirected graph with a source $s$ and a destination $t$, find the smallest subset of vertices whose intersection with any $s-t$ path results in a unique sequence. In this paper, we show that this problem remains NP-complete when the graph is planar and we give a 4-approximation algori…
    ▽ More

    Submitted 28 September, 2019; v1 submitted 15 August, 2019;
    originally announced August 2019.

  • Further Results on Stability-Preserving Mechanisms for School Choice

    Authors:

    Karthik Gajulapalli,

    James A. Liu,

    Vijay V. Vazirani

    Abstract:

    We build on the stability-preserving school choice model introduced and studied recently in [MV18]. We settle several of their open problems and we define and solve a couple of new ones.


    Submitted 29 June, 2019; v1 submitted 27 June, 2019;
    originally announced June 2019.

  • Robust Regression for Safe Exploration in Control

    Authors:

    Anqi Liu,

    Guanya Shi,

    Soon-Jo Chung,

    Anima Anandkumar,

    Yisong Yue

    Abstract:

    We study the problem of safe learning and exploration in sequential control problems. The goal is to safely collect data samples from an operating environment to learn an optimal controller. A central challenge in this setting is how to quantify uncertainty in order to choose provably-safe actions that allow us to collect useful data and reduce uncertainty, thereby achieving both improved safety a…
    ▽ More

    Submitted 13 June, 2019;
    originally announced June 2019.

  • Modeling and Interpreting Real-world Human Risk Decision Making with Inverse Reinforcement Learning

    Authors:

    Quanying Liu,

    Haiyan Wu,

    Anqi Liu

    Abstract:

    We model human decision-making behaviors in a risk-taking task using inverse reinforcement learning (IRL) for the purposes of understanding real human decision making under risk. To the best of our knowledge, this is the first work applying IRL to reveal the implicit reward function in human risk-taking decision making and to interpret risk-prone and risk-averse decision-making policies. We hypoth…
    ▽ More

    Submitted 13 June, 2019;
    originally announced June 2019.

  • Attractive versus truncated repulsive supercooled liquids: The dynamics is encoded in the pair correlation function

    Authors:

    François P. Landes,

    Giulio Biroli,

    Olivier Dauchot,

    Andrea J. Liu,

    David R. Reichman

    Abstract:

    We compare glassy dynamics in two liquids that differ in the form of their interaction potentials. Both systems have the same repulsive interactions but one has also an attractive part in the potential. These two systems exhibit very different dynamics despite having nearly identical pair correlation functions. We demonstrate that a properly weighted integral of the pair correlation function, whic…
    ▽ More

    Submitted 14 January, 2020; v1 submitted 3 June, 2019;
    originally announced June 2019.

  • Sparse Bayesian Learning Approach for Discrete Signal Reconstruction

    Authors:

    Jisheng Dai,

    An Liu,

    Hing Cheung So

    Abstract:

    This study addresses the problem of discrete signal reconstruction from the perspective of sparse Bayesian learning (SBL). Generally, it is intractable to perform the Bayesian inference with the ideal discretization prior under the SBL framework. To overcome this challenge, we introduce a novel discretization enforcing prior to exploit the knowledge of the discrete nature of the signal-of-interest…
    ▽ More

    Submitted 1 June, 2019;
    originally announced June 2019.

  • Unsupervised End-to-End Learning of Discrete Linguistic Units for Voice Conversion

    Authors:

    Andy T. Liu,

    Po-chun Hsu,

    Hung-yi Lee

    Abstract:

    We present an unsupervised end-to-end training scheme where we discover discrete subword units from speech without using any labels. The discrete subword units are learned under an ASR-TTS autoencoder reconstruction setting, where an ASR-Encoder is trained to discover a set of common linguistic units given a variety of speakers, and a TTS-Decoder trained to project the discovered units back to the…
    ▽ More

    Submitted 20 June, 2019; v1 submitted 27 May, 2019;
    originally announced May 2019.

  • Algorithm Diversity for Resilient Systems

    Authors:

    Scott D. Stoller,

    Yanhong A. Liu

    Abstract:

    Diversity can significantly increase the resilience of systems, by reducing the prevalence of shared vulnerabilities and making vulnerabilities harder to exploit. Work on software diversity for security typically creates variants of a program using low-level code transformations. This paper is the first to study algorithm diversity for resilience. We first describe how a method based on high-level…
    ▽ More

    Submitted 28 April, 2019;
    originally announced April 2019.

  • Learning to Customize and Combine Deep Learners for Few-Shot Learning

    Authors:

    Yaoyao Liu,

    Yuting Su,

    An-An Liu,

    Jianqiang Huang,

    Tat-Seng Chua,

    Bernt Schiele,

    Qianru Sun

    Abstract:

    Meta-learning has been shown to be an effective strategy for few-shot learning. The key idea is to leverage a large number of similar few-shot tasks in order to meta-learn how to best initiate a (single) base-learner for novel few-shot tasks. While meta-learning how to initialize a base-learner has shown promising results, it is well-known that hyperparameter settings such as the learning rate and…
    ▽ More

    Submitted 23 December, 2019; v1 submitted 17 April, 2019;
    originally announced April 2019.

  • Differential Privacy for Eye-Tracking Data

    Authors:

    Ao Liu,

    Lirong Xia,

    Andrew Duchowski,

    Reynold Bailey,

    Kenneth Holmqvist,

    Eakta Jain

    Abstract:

    As large eye-tracking datasets are created, data privacy is a pressing concern for the eye-tracking community. De-identifying data does not guarantee privacy because multiple datasets can be linked for inferences. A common belief is that aggregating individuals’ data into composite representations such as heatmaps protects the individual. However, we analytically examine the privacy of (noise-free…
    ▽ More

    Submitted 14 April, 2019;
    originally announced April 2019.

  • Knowledge-Augmented Language Model and its Application to Unsupervised Named-Entity Recognition

    Authors:

    Angli Liu,

    Jingfei Du,

    Veselin Stoyanov

    Abstract:

    Traditional language models are unable to efficiently model entity names observed in text. All but the most popular named entities appear infrequently in text providing insufficient context. Recent efforts have recognized that context can be generalized between entity names that share the same type (e.g., emph{person} or emph{location}) and have equipped language models with access to an externa…
    ▽ More

    Submitted 24 June, 2019; v1 submitted 9 April, 2019;
    originally announced April 2019.

  • CODAH: An Adversarially Authored Question-Answer Dataset for Common Sense

    Authors:

    Michael Chen,

    Mike D’Arcy,

    Alisa Liu,

    Jared Fernandez,

    Doug Downey

    Abstract:

    Commonsense reasoning is a critical AI capability, but it is difficult to construct challenging datasets that test common sense. Recent neural question answering systems, based on large pre-trained models of language, have already achieved near-human-level performance on commonsense knowledge benchmarks. These systems do not possess human-level common sense, but are able to exploit limitations of…
    ▽ More

    Submitted 26 July, 2019; v1 submitted 8 April, 2019;
    originally announced April 2019.

  • Regularized Learning for Domain Adaptation under Label Shifts

    Authors:

    Kamyar Azizzadenesheli,

    Anqi Liu,

    Fanny Yang,

    Animashree Anandkumar

    Abstract:

    We propose Regularized Learning under Label shifts (RLLS), a principled and a practical domain-adaptation algorithm to correct for shifts in the label distribution between a source and a target domain. We first estimate importance weights using labeled source data and unlabeled target data, and then train a classifier on the weighted source samples. We derive a generalization bound for the classif…
    ▽ More

    Submitted 22 March, 2019;
    originally announced March 2019.

  • Two-Timescale Hybrid Compression and Forward for Massive MIMO Aided C-RAN

    Authors:

    An Liu,

    Xihan Chen,

    Wei Yu,

    Vincent Lau,

    Min-Jian Zhao

    Abstract:

    We consider the uplink of a cloud radio access network (C-RAN), where massive MIMO remote radio heads (RRHs) serve as relays between users and a centralized baseband unit (BBU). Although employing massive MIMO at RRHs can improve the spectral efficiency, it also significantly increases the amount of data transported over the fronthaul links between RRHs and BBU, which becomes a performance bottlen…
    ▽ More

    Submitted 11 March, 2019;
    originally announced March 2019.

  • Fourier and Circulant Matrices are Not Rigid

    Authors:

    Zeev Dvir,

    Allen Liu

    Abstract:

    The concept of matrix rigidity was first introduced by Valiant in cite{rigidity}. Roughly speaking, a matrix is rigid if its rank cannot be reduced significantly by changing a small number of entries. There has been extensive interest in rigid matrices as Valiant showed in cite{rigidity} that rigidity can be used to prove arithmetic circuit lower bounds.
    In a surprising result, Alman and Willi…
    ▽ More

    Submitted 13 September, 2019; v1 submitted 19 February, 2019;
    originally announced February 2019.

  • Consistent Robust Adversarial Prediction for General Multiclass Classification

    Authors:

    Rizal Fathony,

    Kaiser Asif,

    Anqi Liu,

    Mohammad Ali Bashiri,

    Wei Xing,

    Sima Behpour,

    Xinhua Zhang,

    Brian D. Ziebart

    Abstract:

    We propose a robust adversarial prediction framework for general multiclass classification. Our method seeks predictive distributions that robustly optimize non-convex and non-continuous multiclass loss metrics against the worst-case conditional label distributions (the adversarial distributions) that (approximately) match the statistics of the training data. Although the optimized loss metrics ar…
    ▽ More

    Submitted 20 November, 2019; v1 submitted 18 December, 2018;
    originally announced December 2018.



  • Source link

    Write a comment:
    *

    Your email address will not be published.