## A Hybrid Approach to Measure Semantic Relatedness in Biomedical Concepts

Concept vectors were generated by encoding concept preferred terms using ELMo, BERT,and Sentence BERT models . We used OntologyKnowledge Free (OKF) models and Ontology Knowledge Injected (OKI) models . Injecting ontology relationship knowledge into concept vectors further enhances their quality and contributes to better relatedness scores .…

## Activation Functions in Artificial Neural Networks A Systematic Overview

Activation functions shape the output of artificial neurons and are integral parts of neural networks . Some activation functions, such as logistic and relu, have been used for many decades . But with deep learning becoming a mainstream research topic, new activation functions have mushroomed .…

## A Review of Graph Neural Networks and Their Applications in Power Systems

Deep neural networks have revolutionized many machine learning tasks in powersystems . Increasing number of applications in power systems where data are collected from non-Euclidean domains . Complexity of graph-structured data has brought significant challenges to the existing deep neural networks defined in Euclidean domain .…

## MICROS Mixed Initiative ConveRsatiOnal Systems Workshop

MICROS@ECIR2021 aims at investigating and collecting novel ideas and contributions in the field of conversational systems . The first edition of the workshop on Mixed-Initiative ConveatiOnal Systems will have a particular focus on mixed-initiative conversationalsystems . The workshop will focus on the way users access online information, thus posing new challenges compared to traditional search and recommendation .…

AdaBelief iterative FastGradient Sign Method (AB-FGSM) proposed to generalize adversarial examples . The transfer rate is 7%-21% higher than latest attack methods . Compared with state-of-the-art attack methods, our proposedmethod can generate adversarial example effectively in the white-box setting,and the transfer rates are 7-21% more than latest methods .…

## A fusion method for multi valued data

In this paper we propose an extension of the notion of deviation-basedaggregation function tailored to aggregate multidimensional data . Our objective is to improve the results obtained by other methods that try to select the best aggregation function for a particular set of data, such as penaltyfunctions .…

## Covering a set of line segments with a few squares

We study three covering problems in the plane . The first is to decide whether agiven set of line segments can be covered by four unit-sized,axis-parallel squares . The second is to build a data structure on a trajectory to efficiently answer whether any query subtrajectory is coverable by up to three square squares.…

## MadDog A Web based System for Acronym Identification and Disambiguation

Acronyms and abbreviations are the short-form of longer phrases . They provide challenges for understanding the text especially if the acronym is not defined in the text or if it is used far from its definition in long texts . The web-based system is publicly available at http://iqcs.uoregon.edu:5000…

## Re imagining Algorithmic Fairness in India and Beyond

Conventional algorithmic fairness is West-centric, as seen in sub-groups,values, and methods . In India, data is notalways reliable due to socio-economic factors, ML makers appear to followdouble standards, and AI evokes unquestioning aspiration . We contend that localising model fairness alone can be window dressing in India, where the distance between models and oppressed communities is large .…

## A Simple Disaster Related Knowledge Base for Intelligent Agents

In this paper, we describe our efforts in establishing a simple knowledgebase by building a semantic network composed of concepts and word relationships in the context of disasters in the Philippines . We let experts from the fields of linguistics,disasters, and weather science evaluate our knowledge base and arrived at anagreeability rate of 64%.…

## The emergence of visual semantics through communication games

In this work, we consider a signalling gamesetting in which a sender’ agent must communicate the information about animage to a receiver’ who must select the correct image from many distractors . We investigate the effect of the feature extractor’s weights and of the task being solved on the visual semantics learned by the models .…

## Diverse Adversaries for Mitigating Bias in Training

Adversarial learning can learn fairer and less biased models of language than standard methods . However, current adversarial techniques only partiallymitigate model bias, added to which their training procedures are often unstable . In this paper, we propose a novel approach to adversarial learning based on the use of multiple diverse discriminators, whereby discriminators are encouraged to learn orthogonal hidden representations from one another .…

## Multi Time Attention Networks for Irregularly Sampled Time Series

Irregular sampling occurs in many time series modeling applications where it presents a significant challenge to standard deep learning models . Multi-Time Attention Networks learn anembedding of continuous-time values and use an attention mechanism to produce afixed-length representation of a time series containing a variable number ofobservations .…

## ECOL R Encouraging Copying in Novel Object Captioning with Reinforcement Learning

Novel Object Captioning is a zero-shot Image Captioning task requiringdescribing objects not seen in training captions . The ECOL-R model (Encouraging Copying ofObject Labels with Reinforced Learning) is encouraged to accurately describe the novel object labels . This isachieved via a specialised reward function in the SCST reinforcement learningframework (Rennie et al.,…

## The Role of Cost in the Integration of Security Features in Integrated Circuits for Smart Cards

This essay investigates the role of cost in the development and production of secure integrated circuits . I also go on to examine potential ways of reducing the cost of production for secure chips . This essay ends with the conclusion that adding security features to chips meant to be used for secure applications is well worth it, because the potential damages and losses caused by such attacks are of comparable amounts to the costs of developing and producing a chip .…

## Unsupervised Key phrase Extraction and Clustering for Classification Scheme in Scientific Publications

Several methods have been explored for automating parts of Systematic Mapping(SM) and Systematic Review (SR) methodologies . In this paper we explore possible ways to automate parts of the SM/SR process, i.e. that of extracting keywords and key-phrases from scientific documents usingunsupervised methods .…

## Camera Invariant Feature Learning for Generalized Face Anti spoofing

There has been an increasing consensus in learning based face anti-spoofingthat the divergence in terms of camera models is causing a large domain gap in real application scenarios . We describe a framework that eliminates the influence of inherent variance from acquisition cameras at the feature level, leading to the generalized face spoofing detection model that could be highlyadaptive to different acquisition devices .…

## GP Context free Grammar Pre training for Text to SQL Parsers

A new method for Text-to-SQL parsing, Grammar Pre-training (GP) is proposed to decode deep relations between question and database . A random value is added behind a questionword which is recognized as a column, and the new sentence serves as the model input .…

## Machine Learning for the Detection and Identification of Internet of Things IoT Devices A Survey

The Internet of Things (IoT) is becoming an indispensable part of everydaylife, enabling a variety of emerging services and applications . The presence of rogue IoT devices has exposed the IoT to untold risks with severeconsequences . Conventional approaches use cryptographicmechanisms to authenticate and verify legitimate devices’ identities .…

## Transferable Interactiveness Knowledge for Human Object Interaction Detection

Human-Object Interaction (HOI) detection is an important problem tounderstand how humans interact with objects . In this paper, we exploreinteractiveness knowledge which indicates whether a human and an objectinteract with each other or not . We found that interactiveness knowledge can belearned across HOI datasets and bridge the gap between diverse HOI category settings .…

## With Measured Words Simple Sentence Selection for Black Box Optimization of Sentence Compression Algorithms

Sentence Compression is the task of generating a shorter, yet grammaticalversion of a given sentence, preserving the essence of the original sentence . This paper proposes a Black-Box Optimizer for Compression (B-BOC) that finds the best candidates for compression in order to maximize both compression rate and quality .…

## Few Shot Website Fingerprinting Attack

This work introduces a novel data augmentation method for few-shot websitefingerprinting (WF) attack where only a handful of training samples per websiteare available for deep learning model optimization . We introduce amodel-agnostic, efficient, and Harmonious Data Augmentation (HDA) method that can improve deep WF attacking methods significantly .…

## TDMSci A Specialized Corpus for Scientific Literature Entity Tagging of Tasks Datasets and Metrics

Tasks, Datasets and Evaluation Metrics are important concepts for understanding experimental scientific papers . In this paper, we present a new corpusthat contains domain expert annotations for Task (T), Dataset (D), Metric (M)entities on 2,000 sentences extracted from NLP papers .…

## EGFI Drug Drug Interaction Extraction and Generation with Fusion of Enriched Entity and Sentence Information

EGFI proposes EGFI for extracting and consolidating drug interactions from large-scale medical literature text data . EGFI consists of two parts: classification and generation . It uses language models BioBERT and BioGRU to fuse multiple semantic information forrigorous context modeling .…

## SpanEmo Casting Multi label Emotion Classification as Span prediction

Emotion recognition (ER) is an important task in Natural Language Processing (NLP) We propose a new model “SpanEmo” castingmulti-label emotion classification as span-prediction . We introduce a loss function focused on modelling multiple co-existing emotions inthe input sentence . Experiments performed on the SemEval2018 multi-labelemotion data over three language sets (i.e.,…

## A Trigger Sense Memory Flow Framework for Joint Entity and Relation Extraction

Joint entity and relation extraction framework constructs a unified model to perform both tasks simultaneously . It can exploit the dependency between the two tasks to mitigate the error propagation problem suffered by the pipeline model . We build a memory module to remember categoryrepresentations learned in entity recognition .…

## Facilitating Terminology Translation with Target Lemma Annotations

Most of the recent work on terminology integration in machine translation has assumed that terminology translations are given already inflected in forms that are suitable for the target language sentence . In day-to-day work of professional translators, however, it is seldom the case as translators work with bilingual glossaries where terms are given in their dictionary forms; finding the right target language form is part of the translation process .…

## Understanding and Achieving Efficient Robustness with Adversarial Contrastive Learning

Contrastive learning (CL) has recently emerged as an effective approach to learning representation in a range of downstream tasks . Central to this approach is the selection of positive (similar) and negative (dissimilar) setsto provide the model the opportunity to `contrast’ between data and classrepresentation in the latent space .…

## CHOLAN A Modular Approach for Neural Entity Linking on Wikipedia and Wikidata

CHOLAN is a modular approach to target end-to-endentity linking (EL) over knowledge bases . It consists of a pipeline of twotransformer-based models integrated sequentially to accomplish the task . The empirical study was conducted on two well-known knowledge bases (i.e., Wikidata and Wikipedia) The empirical results suggest that CHOLan outperforms state-of-the-art approaches on standarddatasets such as CoNLL-AIDA, MSNBC, AQUAINT, ACE2004, and T-REx.…

## Open Mindedness and Style Coordination in Argumentative Discussions

Linguistic accommodation is the process in which speakers adjust their language according to the style of one another . Previous research has shown how linguisticaccommodation correlates with gaps in the power and status of the speakers and the way it promotes approval and discussion efficiency .…

## Cyber Physical Energy Systems Security Threat Modeling Risk Assessment Resources Metrics and Case Studies

Cyber-physical systems (CPS) are interconnected architectures that employanalog, digital, and communication resources for their interaction with thephysical environment . CPS are the backbone of enterprise, industrial, and critical infrastructure . Attackstargeting cyber-physical energy systems (CPES) can have disastrous consequences . The security of CPES can be enhancedleveraging testbed capabilities to replicate power systems operation, discovervulnerabilities, develop security countermeasures, and evaluate grid operation under fault-induced or maliciously constructed scenarios .…

## Reinforcement Learning Based Temporal Logic Control with Soft Constraints Using Limit deterministic Büchi Automata

The uncertainties are considered in robot motion and environmentproperties, giving rise to the probabilistic labeled Markov decision process . A model-free reinforcement learning (RL) is developed to generate afinite-memory control policy to satisfy high-level tasks expressed in lineartemporal logic (LTL) formulas .…

## Identity aware Graph Neural Networks

Message passing Graph Neural Networks (GNNs) provide a powerful modelingframework for relational data . The expressive power of existing GNNsis upper-bounded by the 1-Weisfeiler-Lehman (1-WL) graph isomorphism test . Here we develop a class of message passing GNNs, named Identity-awareGraph Neural Networks .…

## RelWalk A Latent Variable Model Approach to Knowledge Graph Embedding

Paper extends the random walk model of word embeddings to Knowledge Graph Embeddings (KGEs) to derive a scoring function that evaluates the strength of a relation R betweentwo entities h (head) and t (tail) Using the derived objective, accurate KGEs are learnt from FB15K237 and WN18RR benchmark datasets .…

## PAWLS PDF Annotation With Labels and Structure

PDF Annotation with Labels and Structure(PAWLS) is a new annotation tool designed specifically for the PDF documentformat . PAWLS is particularly suited for mixed-mode annotation and scenarios inwhich annotators require extended context to annotate accurately . The tool supports span-based textual annotation, N-ary relations and freeform,non-textual bounding boxes, all of which can be exported in convenient formats .…

## Personalization Paradox in Behavior Change Apps Lessons from a Social Comparison Based Personalized App for Physical Activity

Social comparison-based features are widely used in social computing apps . Most existing apps are not grounded in social comparison theories . This paper is among the first to automatically personalize socialcomparison targets . In the context of an m-health app for physical activity, we use artificial intelligence (AI) techniques of multi-armed bandits.…

## Applications of Deep Learning in Fundus Images A Review

The use of fundus images for the early screening of eye diseases is of great clinical importance . Deep learning is becoming more popular in related applications, such as lesion segmentation,biomarkers segmentation and disease diagnosis . We will also release and regularly update the state-of-the-art results and newly-released datasets at https://://github.com/nkicsl/Fundus…

## Accumulating Risk Capital Through Investing in Cooperation

Recent work on promoting cooperation in multi-agent learning has resulted in many methods which successfully promote cooperation at the cost of becoming more vulnerable to exploitation by malicious actors . We show that this is anunavoidable trade-off and propose an objective which balances these concerns, Promoting both safety and long-term cooperation .…

## Process Level Representation of Scientific Protocols with Interactive Annotation

Process Execution Graphs~(PEG) is a document-level representation of real-world wet lab biochemistry protocols . We manually annotate PEGs in a corpus of complex lab protocols with a novel interactive textual simulator . We use this data to developgraph-prediction models, finding them to be good at entity identification and local relation extraction, while our corpus facilitates further exploration of long-range relations .…

## Solving a Multi resource Partial ordering Flexible Variant of the Job shop Scheduling Problem with Hybrid ASP

The problem is modeled using Answer Set Programming (ASP) in which the timeassignments are efficiently done using Difference Logic . We suggest two multi-shot solving strategies aiming at the identification of the timebounds allowing for the solution of the schedule optimization problem .…

## Emergent Communication under Competition

The literature in modern machine learning has only negative results for learning to communicate between competitive agents using standard RL . We use a modified sender-receiver game to study the spectrum ofpartially-competitive scenarios . We show communication can indeed emerge in a competitive setting .…

## Cognitive Perspectives on Context based Decisions and Explanations

When human cognition is modeled in Philosophy and Cognitive Science, there is a pervasive idea that humans employ mental representations in order to navigatethe world and make predictions about outcomes of future actions . We show that the Contextual Importanceand Utility method for XAI share an overlap with the current new wave ofaction-oriented predictive representational structures, in ways that makes CIUa reliable tool for creating explanations that humans can relate to and trust .…

## Black Feminist Musings on Algorithmic Oppression

This paper unapologetically reflects on the critical role that Black feminism can and should play in abolishing algorithmic oppression . Positioningalgorithmic oppression in the broader field of feminist science and technologystudies . I discuss what it means to call fordiversity as a solution to algorithmic violence, and I critique dialectics of the fairness, accountability, and transparency community .…

## On maximum likelihood estimation in the all or nothing regime

We study the problem of estimating a rank-1 additive deformation of aGaussian tensor . The analysis is carried out in the sparse setting, where the underlying signal has a support that scales sublinearly with the total number of dimensions . We show that for Bernoulli distributed signals, the MLE undergoes an\emph{all-or-nothing} (AoN) phase transition, already established for theminimum mean-square-error estimator (MMSE) The result follows from two main technical points: (i) the connection established betweenthe MLE and the MMSE, using the first and second-moment methods in theconstrained signal space .…

## Learning From Revisions Quality Assessment of Claims in Argumentation at Scale

Assessing the quality of arguments and of the claims the arguments are composed of has become a key task in computational argumentation . However, even if different claims share the same stance on the same topic, their assessment depends on the prior perception and weighting of the different aspects of the topic being discussed .…

## UniToPatho a labeled histopathological dataset for colorectal polyps classification and adenoma dysplasia grading

Colorectal polyps characterizationrelies on the histological analysis of tissue samples to determine the polypsmalignancy and dysplasia grade . We introduce UniToPatho, an annotated dataset of9536 hematoxylin and eosin (H&E) stained patches extracted from 292 whole-slideimages, meant for training deep neural networks .…

## Parameterized Complexity of Finding Subgraphs with Hereditary Properties on Hereditary Graph Classes

We investigate the parameterized complexity of finding subgraphs withhereditary properties on graphs belonging to a hereditary graph class . We show that: $P(G,\Pi,k)$ is solvable in polynomial time when the graph $G$ is co-bipartite and the property of being planar, bipartite or triangle-free .…

## Multi view Integration Learning for Irregularly sampled Clinical Time Series

Electronic health record (EHR) data is sparse and irregular as it is recorded at irregular time intervals . In this work, we propose a multi-view featuresintegration learning from irregular multivariate time series data by self-attention mechanism in an imputation-free manner .…

## Probabilistic Robustness Analysis for DNNs based on PAC Learning

This paper proposes a black box based approach for analysing deep neuralnetworks . We view a DNN as a function from inputs to outputs, and consider the local robustness property for a given input . We learn the scoredifference function $f_i-f__\ell$ with respect to the target label $ell$ and the attacking label $i$.…

## Cost limited reachability a new problem in reachability analysis

The classic definition of backward reachable tube is a set of system state that can be driven into the target set within a given time horizon . In this paper, we generalize the definition of the definition . The running cost is a scalar function of the system state and control input .…