## Revealing Critical Characteristics of Mobility Patterns in New York City during the Onset of COVID 19 Pandemic

New York has become one of the worst-affected COVID-19 hotspots and apandemic epicenter due to ongoing crisis . The city saw its first case on March 1, 2020, but disruptions in mobility can be seen only after shelter in place orders was put in effect .…

## LinkLouvain Link Aware A B Testing and Its Application on Online Marketing Campaign

Theaverage treatment effect (ATE) of campaign strategies need to be monitored throughout the campaign . A/B testing is usually conducted for such needs, but the existence of user interaction can introduce interference to normal testing . With the help of link prediction, LinkLouvain design a way to minimize graph interference and it gives an accurate andsound estimate of the campaign’s ATE .…

## Temporal Motifs in Smart Grid

The energy consumptionpattern across the appliances, houses, communities and entire cities help energy utility companies and consumers plan their electricity generation and consumption . The edge or connection represents energy flow between two participants of the network, these connections last till the power is being consumed/generated .…

## Quantum Technologies A Review of the Patent Landscape

Quantum Technologies is a term that is getting broader with every passingyear . Nanotechnology and electronics operate in this realm . Here we taxonomizeand analyze 48,577 patents in this area from 2015 to present captured with acomprehensive query in Relecura’s patent database .…

## Report of the Workshop on Program Synthesis for Scientific Computing

Program synthesis is an active research field in academia, national labs, and industry . Yet, work directly applicable to scientific computing has been limited . This report reviews the relevantareas of program synthesis work for scientific computing, discusses successesto date, and outlines opportunities for future work .…

## Agent Incentives A Causal Perspective

We present a framework for analysing agent incentives using causal influencediagrams . We establish that a well-known criterion for value of information iscomplete . We propose a new graphical criterion for the value of control,establishing its soundness and completeness . We also introduce two new concepts: response incentives indicate which changes in theenvironment affect an optimal decision, while instrumental control incentives establish whether an agent can influence its utility via a variable X .…

## The GEM Benchmark Natural Language Generation its Evaluation and Metrics

We introduce GEM, a living benchmark for natural language Generation (NLG),its Evaluation, and Metrics . Measuring progress in NLG relies on a constantlyevolving ecosystem of automated metrics, datasets, and human evaluation standards . GEM provides an environment in which models can easily be applied to a wide set of corpora .…

## Generating images from caption and vice versa via CLIP Guided Generative Latent Space Search

GLaSS is based on the CLIP neural network which given an image and adescriptive caption provides similar embeddings . It takes an image as an input, and generates the image (or an image) whose CLIP embedding is most similar to the input one .…

## Towards Multi agent Reinforcement Learning for Wireless Network Protocol Synthesis

This paper proposes a multi-agent reinforcement learning based medium accessframework for wireless networks . The access problem is formulated as a MarkovDecision Process (MDP), and solved using reinforcement learning with every network node acting as a distributed learning agent . It is shown that by learning to adjust MAC layer transmissionprobabilities, the protocol is not only able to attain theoretical maximumthroughput at an optimal load, but unlike classical approaches, it can alsoretain that maximum throughput at higher loading conditions .…

## Approximately Solving Mean Field Games via Entropy Regularized Deep Reinforcement Learning

The recent mean field game (MFG) formalism facilitates otherwise intractablecomputation of approximate Nash equilibria in many-agent settings . We show that all discrete-time finite MFGs with non-constant fixedpoint operators fail to be contractive as typically assumed in existing MFGliterature . Instead, we incorporate entropy-regularization and Boltzmann policies into the fixed pointiteration .…

## Exploiting Raw Images for Real Scene Super Resolution

Super-resolution is a fundamental problem in computer vision which aims toovercome the spatial limitation of camera sensors . Most algorithms only perform well on synthetic data, which limits their applications in real scenarios . We propose a method to generate more realistictictraining data by mimicking the imaging process of digital cameras .…

## Real time detection of uncalibrated sensors using Neural Networks

An onlinemachine-learning based uncalibration detector for temperature, humidity and pressure sensors was developed . This solution integrates an Artificial NeuralNetwork as main component which learns from the behavior of the sensors undercalibrated conditions . Then, after trained and deployed, it detectsuncalibrations once they take place .…

## Guidance on the Assurance of Machine Learning in Autonomous Systems AMLAS

Machine Learning (ML) is now used in a range of systems with results that arereported to exceed, under certain conditions, human performance . Many of thesesystems in domains such as healthcare , automotive and manufacturing, exhibithigh degrees of autonomy and are safety critical .…

## On Robustness of Neural Semantic Parsers

Semantic parsing maps natural language (NL) utterances into logical forms (LFs) underpins many advanced NLP problems . Semantic parsers gain performance boosts with deep neural networks, but inherit vulnerabilities against adversarial examples . A scalable methodology is proposed to construct robustness testsets based on existing benchmark corpora.…

## Metrics and continuity in reinforcement learning

In most practical applications of reinforcement learning, it is untenable tomaintain direct estimates for individual states . Instead, researchers often leverage state similarity to build models that can generalize well from alimited set of samples . The notion of state similarity used, and theneighbourhoods and topologies they induce, is crucial importance .…

## An Abstraction based Method to Verify Multi Agent Deep Reinforcement Learning Behaviours

Multi-agent reinforcement learning (RL) often struggles to ensure the safebehaviours of learning agents . The approach we propose expresses the constraints to verify inProbabilistic Computation Tree Logic (PCTL) and builds an abstractrepresentation of the system . The abstract model allows for model checking techniques to identify a set ofabstract policies that meet the safety constraints expressed in PCTL .…

## Predicting the Time Until a Vehicle Changes the Lane Using LSTM based Recurrent Neural Networks

To plan safe and comfortable trajectories for automated vehicles on highways,accurate predictions of traffic situations are needed . This paper dealswith the development of a system that accurately predicts the time to the next lane change on highways using long short-termmemory-based recurrent neural networks .…

## Graph Classification Based on Skeleton and Component Features

GraphCSC is a novel graph embedding algorithm that realizes classification based on skeleton information using fixed-order structures learned in anonymous random walksmanner . Two graphs are similar if their skeletons and components are both similar, thus in our model, we integrate both of them together into embeddings as graph homogeneitycharacterization .…

## Clustering with Penalty for Joint Occurrence of Objects Computational Aspects

The method of Hol\’y, Sokol and \v{C.ern\’y (Applied Soft Computing, 2017, Vol. 60, p. 752-762) clusters objects based on their incidence in a largenumber of given sets . The idea is to minimize the occurrence of multipleobjects from the same cluster in the same set .…

## Unassisted Noise Reduction of Chemical Reaction Data Sets

Existing deep learning models applied to reaction prediction in organicchemistry can reach high levels of accuracy (90% for Natural LanguageProcessing-based ones). With no chemical knowledge embedded than theinformation learnt from reaction data, the quality of the data sets plays acrucial role in the performance of the prediction models .…

## Facial Manipulation Detection Based on the Color Distribution Analysis in Edge Region

Most of the contemporary facial manipulation methods involve pixel correction procedures for reducing awkwardness of pixelvalue differences along the facial boundary in a synthesized image . We present a generalized and robust facial manipulation detection method based on color distribution analysis of the vertical region ofedge in a manipulated image .…

## Recent Advances in Adversarial Training for Adversarial Robustness

Adversarial examples for fooling deep learning models have been studied for several years . Many new theories and understandings of adversarial training have been proposed . We review the recent progress on adversarial learning for the first time, categorized by different improvements .…

## Subdimensional Expansion for Multi objective Multi agent Path Finding

Conventional multi-agent path planners typically determine a path thatoptimizes a single objective, such as path length . Many applications may require multiple objectives, say time-to-completion and fuel use, to besimultaneously optimized in the planning process . The size of the space of possiblesolutions, i.e.,…

## Graph Coarsening with Neural Networks

Graph coarsening is one popular technique to reduce the size of agraph while maintaining essential properties . It generalizes to graphs of larger size ($25\times$ of training graphs), is adaptive to different losses (differentiable andnon-differentiable) and scales to much larger graphs than previous work .…

## Modular approach to data preprocessing in ALOHA and application to a smart industry use case

The paper addresses a modular approach, integrated into the ALOHA tool flow, to support the datapreprocessing and transformation pipeline . This is realized throughcustomizable plugins and allows the easy extension of the tool flow toencompass new use cases . To demonstrate the effectiveness of the approach, we present some experimental results related to a keyword spotting use case and weoutline possible extensions to different use cases.…

## QoS Aware Power Minimization of Distributed Many Core Servers using Transfer Q Learning

AQoS-aware runtime controller using horizontal scaling (node allocation) and vertical scaling (resource allocation within nodes) methods synergistically toprovide adaptation to workloads while minimizing the power consumption under QoS constraint . TransferQ-learning, which further tunes power/performance based on workload profile, reduces exploration time and QoS violations compared to model-free Q-learning .…

## Fast Exploration of Weight Sharing Opportunities for CNN Compression

The computational workload involved in Convolutional Neural Networks (CNNs) is typically out of reach for low-power embedded devices . There are a largenumber of approximation techniques to address this problem . These methods havehyper-parameters that need to be optimized for each CNNs using design spaceexploration (DSE) The goal of this work is to demonstrate that the DSE phasetime can easily explode for state of the art CNN .…

## Benchmarking Quantized Neural Networks on FPGAs with FINN

The ever-growing cost of training and inference for state-of-the-art neural networks has brought literature to look upon ways to cut off resources with a minimal impact on accuracy . Using lower precision comes at the cost of negligible loss in accuracy .…

## pseudo Bayesian Neural Networks for detecting Out of Distribution Inputs

Conventional Bayesian Neural Networks (BNNs) are known to be capable of providing multiple outputs for a single input . We modify the cost function of conventional BNNs and use it to learn parameters for the purpose of injecting random perturbations to each of the weights of a neural network with point estimate .…

## Neural Data Augmentation via Example Extrapolation

In many applications of machine learning, certain categories of examples maybe underrepresented in training data, causing systems to underperform on such “few-shot” cases at test time . We propose a data augmentation approach that performs neural ExampleExtrapolation (Ex2) Given a handful of exemplars sampled from somedistribution, Ex2 synthesizes new examples that also belong to the samedistribution .…

## Anomaly Detection of Time Series with Smoothness Inducing Sequential Variational Auto Encoder

Deep generative models have demonstrated their effectiveness in learninglatent representation and modeling complex dependencies of time series . In thispaper, we present a Smoothness-Inducing Sequential Variational Auto-Encoder(SISVAE) model for robust estimation and anomaly detection of multi-dimensionaltime series . The proposed prior works as a regularizer that places penalty atnon-smooth reconstructions.…

## Gaze based dual resolution deep imitation learning for high precision dexterous robot manipulation

A deep imitationlearning based method, inspired by the gaze-based dual resolution visuomotorcontrol system in humans, can solve the needle threading task . The proposed method enables precisemanipulation tasks using a general-purpose robot manipulator and improvescomputational efficiency . The experimental resultsobtained in this study demonstrate that the proposed method enabled .…

## Detection of Racial Bias from Physiological Responses

This paper investigates whether we can reliably detect racial bias from physiological responses from heartrate, conductive skin response, skin temperature, and micro-body movements . Our machine learning and statistical analysis show that implicit bias can be predicted from physiological signals with 76.1% accuracy .…

## Evaluating the Interpretability of Generative Models by Interactive Reconstruction

Many have argued that machine learning models must be human-interpretable . However, despite increasing interest in interpretability, there remains no firm consensus on how to measure it . This is especially true in representationlearning, where interpretability research has focused on “disentanglement” measures only applicable to synthetic datasets and not grounded in human factors .…

## Sub Linear Point Counting for Variable Separated Curves over Prime Power Rings

Let $k,p\in \mathbb{N}$ with $p$ prime and let $f\in\mathbb {Z}[x_1,x_2]$ be abivariate polynomial with degree $d$ and all coefficients of absolute value atmost $p^k$. Our Las Vegas randomized algorithm works in time\$(dk\log p)^{O(1)\sqrt{p) and admits a quantum version for smooth curves .…

## SPEAK WITH YOUR HANDS Using Continuous Hand Gestures to control Articulatory Speech Synthesizer

This work presents our advancements in controlling an articulatory speechsynthesis engine, \textit{viz.}, Pink Trombone, with hand gestures . We use Cyberglove II with 18 sensors to capture the kinematicinformation of the wrist and the individual fingers, in order to control avirtual tongue .…

## CTC based Compression for Direct Speech Translation

Previous studies demonstrated that a dynamic phone-informed compression of the input audio is beneficial for speech translation . We exploit the Connectionist Temporal Classification (CTC) to compress the input sequence according to its phonetic characteristics . Our experiments demonstrate that our solution brings a 1.3-1.5 BLEU improvement over a strong baseline on two language pairs (English-Italian and English-German), contextually reducing the memory footprint by more than 10% .…

## WeNet Production First and Production Ready End to End Speech Recognition Toolkit

WeNet is a new open source, production first and productionready end-to-end (E2E) speech recognition toolkit named WeNet . WeNet provides an efficient way to ship ASRapplications in several real-world scenarios, which is the main difference andadvantage to other open source E2E speech-recognition toolkits .…

## Clickbait Headline Detection in Indonesian News Sites using Multilingual Bidirectional Encoder Representations from Transformers M BERT

A neural network with a pre-trained language model M-BERT that acted as a embedding layer is combined with a 100 nodes hidden layer and topped with a sigmoidclassifier was trained to detect clickbait headlines . With a total of 6632headlines as a training dataset, the classifier performed remarkably well .…

## MAUVE Human Machine Divergence Curves for Evaluating Open Ended Text Generation

MAUVE — ametric for open-ended text generation — compares the distribution of machine-generated text to that of human language . The metric measures the meanarea under the divergence curve for the two distributions, exploring the trade-off between two types of errors: those arising from parts of the humandistribution that the model distribution approximates well, and those it doesn’t .…

## Two Demonstrations of the Machine Translation Applications to Historical Documents

We present our demonstration of two machine translation applications tohistorical documents . The first task consists in generating a new version of ahistorical document written in the modern version of its original language . The second application is limited to a document’s orthography .…

## An Improved Baseline for Sentence level Relation Extraction

Sentence-level relation extraction (RE) aims at identifying the relationship between two entities in a sentence . In this paper, we revisit two aspects of RE models that are not studied, namely entity representation and NA instance prediction . Our improved baseline model, incorporated with entity representations with typemarkers and confidence-based classification for enhanced NA instance detection, significantly outperforms previous SOTA methods .…

## The Hitachi JHU DIHARD III System Competitive End to End Neural Diarization and X Vector Clustering Systems Combined by DOVER Lap

This paper provides a detailed description of the Hitachi-JHU system that was submitted to the Third DIHARD Speech Diarization Challenge . The system outputsthe ensemble results of the five subsystems: two x-vector-based subsystems, twoend-to-end neural diarization-based . subsystems are competitive and complementary .…

## MultiTalk A Highly Branching Dialog Testbed for Diverse Conversations

We present the MultiTalk Dataset, a corpus of over 320,000sentences of written conversational dialog that balances a high branchingfactor (10) with several conversation turns (6) through selective branchcontinuation . We make multiple contributions to study dialog generation in the highly branching setting .…

## The impact of external innovation on new drug approvals A retrospective analysis

Pharmaceutical companies are relying more often on external sources of innovation to boost their discovery research productivity . We analyzed the pre-approval publicationhistories for FDA-approved new molecular entities (NMEs) and new biologicentities (NBEs) launched by 13 top research pharma companies during the lastdecade (2006-2016) We found academic institutions contributed themajority of publications and that publication subject matter isclosely aligned with the strengths of the respective innovator .…

## Symmetric Boolean Factor Analysis with Applications to InstaHide

In this work we examine the security of InstaHide, a recently proposed schemefor distributed learning (Huang et al.) We give a simple O(m^{\omega + 1) time algorithm for the above matrix factorizationproblem . Our algorithm, based on tensor decomposition, only requires m to be atleast quasi-linear in r .…

## PatternMonitor a whole pipeline with a much higher level of automation for guessing Android lock pattern based on videos

Pattern lock is a general technique used to realize identity authenticationand access authorization on mobile terminal devices such as Android platform devices . It is vulnerable to the attack proposed by recent researches that exploit information leaked by users while drawing patterns .…

## VPT Privacy Preserving Energy Trading and Block Mining Mechanism for Blockchain based Virtual Power Plants

The desire to overcome reliability issues of distributed energy resources (DERs) lead researchers to development of a novel concept named as virtualpower plant (VPP) VPPs are supposed to carry out intelligent, secure, and smart energy trading among prosumers, buyers, and generating stations .…

## Differentially Private Demand Side Management for Incentivized Dynamic Pricing in Smart Grid

In order to efficiently provide demand side management (DSM) in smart grid, carrying out pricing on the basis of real-time energy usage is considered to bethe most vital tool because it is directly linked with the finances associated with smart meters .…

## TAPInspector Safety and Liveness Verification of Concurrent Trigger Action IoT Systems

Trigger-action programming (TAP) is a popular end-user programming framework that can simplify the Internet of Things (IoT) automation with simple trigger-action rules . TAPInspector is a novel system to detect vulnerabilities in concurrentTAP-based IoT systems using model checking . It automatically extracts TAP rules from IoT apps, translates them into a hybrid model with model slicing and statecompression, and performs model checking with various safety and livenessproperties .…