Incentive Compatible Mechanism for Influential Agent Selection

In a self-interested setting, agents may strategically hide some connections to make themselves seem to be more important . In this paper, we study the incentive compatible (IC) selectionmechanism to prevent such manipulations . We propose the Geometric Mechanism, which selects an agent with at least 1/2 of the optimal progeny in expectation under the properties of incentive compatibility and fairness .…

Evaluation of contextual embeddings on less resourced languages

The current dominance of deep neural networks in natural language processing is based on contextual embeddings such as ELMo, BERT, and BERT derivatives . Most existing work focuses on English; in contrast, we present here the firstmultilingual empirical comparison of two ELMo and several monolingual and multilingual BERT models using 14 tasks in nine languages .…

Hodge theoretic reward allocation for generalized cooperative games on graphs

We define cooperative games on general graphs and generalize Lloyd S.Shapley’s celebrated allocation formula for those games in terms of stochasticpath integral driven by the associated Markov chain on each graph . We then show that the value allocation operator, one for each player defined by thestochastic path integral, coincides with the player’s component game which is the solution to the least squares (or Poisson’s) equation .…

Spinning Sequence to Sequence Models with Meta Backdoors

We investigate a new threat to neural sequence-to-sequence (seq2seq) models: training-time attacks that cause models to “spin” their output and support acertain sentiment . We introduce the concept of a “meta-backdoor” to explain model-spinningattacks . These attacks produce models whose output is valid and preservescontext, yet also satisfies a meta-task chosen by the adversary (e.g.,…

Copy and Paste method based on Pose for Re identification

Re-identification (ReID) aims at matching objects in surveillance cameras with different viewpoints . But there is noprocessing method for the ReID task in multiple scenarios at this stage . The CPP is a method based on key point detection, usingcopy and paste, to composite a new semantic image dataset in two different semantic image datasets .…

Kurtosis of von Neumann entanglement entropy

In this work, we study the statistical behavior of entanglement in quantumbipartite systems under the Hilbert-Schmidt ensemble . We make use of newly observed unsimplifiablesummation bases that lead to a complete cancellation . In addition to providing evidence of the conjectured Gaussian limit of the von Neumann entropy, the obtained formula also provides an improved finite-size approximation to the distribution of the distribution .…

Dialogue Object Search

We envision robots that can collaborate and communicate seamlessly with humans . We introduce a new task,dialogue object search: A robot is tasked to search for a target object in a human environment while engaging in a “video call” with a remote human who has additional but inexact knowledge about the target’s location .…

Bandit Quickest Changepoint Detection

Detecting abrupt changes in temporal behavior patterns is of interest in many industrial and security applications . Abrupt changes are often local andobservable primarily through a well-aligned sensing action (e.g., a camera with a narrow field-of-view) Due to resource constraints, continuous monitoring of all of the sensors is impractical .…

Impacts Towards a comprehensive assessment of the book impact by integrating multiple evaluation sources

The surge in the number of books published makes the manual evaluation methods difficult to efficiently evaluate books . The use of books’ citationsand alternative evaluation metrics can assist manual evaluation and reduce the cost of evaluation . However, relying on a single resource for book assessment may lead to the risk that theevaluation results cannot be obtained due to the lack of the evaluation data, especially for newly published books .…

A Logic of Expertise

In this paper we introduce a simple modal logic framework to reason about theexpertise of an information source . In the framework, a source is an expert on a proposition $p$ if they are able to correctly determine the truth value of$p$ in any possible world .…

Did the Cat Drink the Coffee Challenging Transformers with Generalized Event Knowledge

Computational approaches have access to the information about thetypicality of entire events and situations described in language . The evaluation of these models was performed incomparison with SDM, a framework specifically designed to integrate events insentence meaning representations . Our results show that TLMs can reach performances that are comparable to those achieved by SDM .…

Neural Ordinary Differential Equation Model for Evolutionary Subspace Clustering and Its Applications

In multi-dimensional time series analysis, a task is to conductevolutionary subspace clustering, aiming at clustering temporal data according to their evolving low-dimensional subspace structures . We demonstrate that this method can not onlyinterpolate data at any time step, but also achieve higher accuracy than other state-of-the-art evolutionarysubspace-cluing methods .…

FNetAR Mixing Tokens with Autoregressive Fourier Transforms

In this note we examine the autoregressive generalization of the FNetalgorithm . Self-attention layers from the standard Transformerarchitecture are substituted with a trivial sparse-uniformsampling procedure based on Fourier transforms . Using the Wikitext-103 benchmark, FNetAR retains state-of-the-art performance (25.8 ppl) on thetask of causal language modeling .…

Fourier growth of structured mathbb F _2 polynomials and applications

We analyze the Fourier growth of various well-studied classes of “structured”$\mathbb{F}_2$-polynomials . This study is motivated by applications inpseudorandomness, in particular recent results and conjectures due to[CHHL19,CHLT19,CGLSS20] We show that any symmetric degree-$d$ $p$ has $L_1$ Fourier weight at level $k$ and this is tight for any constant $k$.…

MFGNet Dynamic Modality Aware Filter Generation for RGB T Tracking

MFGNet aims to boost the message communication between visible and thermaldata by adaptively adjusting the convolutional kernels for various input images . To address issues caused by heavy occlusion, fast motion, and out-of-view, we propose to conduct a joint local and global search byexploiting a new direction-aware target-driven attention mechanism .…

Shedding some light on Light Up with Artificial Intelligence

The Light-Up puzzle, also known as the AKARI puzzle, has never been solved using modern artificial intelligence (AI) methods . This project is an effort to apply new AI techniques for solving the Light-up puzzle faster and more computationallyefficient . The algorithms explored for producing optimal solutions include hillclimbing, simulated annealing, feed-forward neural network (FNN), and CNN, and an evolutionary theory algorithm .…

Distributed Saddle Point Problems Under Similarity

We study solution methods for (strongly-)convex-(strongly)-concaveSaddle-Point Problems (SPPs) over networks of two type – master/workers (thuscentralized) and meshed (thus decentralized) networks . We establish lower complexity bounds for a fairlygeneral class of algorithms solving the SPP . We then propose algorithms matching the lower bounds over either types of networks (up tolog-factors) We assess the effectiveness of the proposed algorithms on arobust logistic regression problem .…

Fourier Reflexive Partitions Induced by Poset Metric

Let $H$ be the cartesian product of a family of finite abeliangroups indexed by a finite set . A given poset (i.e., partially orderedset) gives rise to a posetmetric on a given set . We prove that if$P} is Fourier-reflexive, then its dualpartition $Lambda$ coincides with the partition of the dual poset of $\mathbf{H$ .…

Typing assumptions improve identification in causal discovery

Under assumptions about the data-generative process, the causal graph can often be identified up to anequivalence class . Proposing new realistic assumptions to circumscribe suchequivalence classes is an active field of research . In this work, we propose anew set of assumptions that constrain possible causal relationships based on the nature of the variables .…

High dimensional expansion implies amplified local testability

In this work we show that high dimensional expansion implies locally testablecode . We define a notion that we callhigh-dimensional-expanding-system (HDE-system) We show that a code that can be modelled over HDE-system islocally testable . This implies that high-dimensional expansion phenomenon solely implies local testability of codes .…

The Optimality of Upgrade Pricing

We consider a multiproduct monopoly pricing model . We provide sufficient conditions under which the optimal mechanism can be implemented via upgradepricing . The first set ofconditions is given by a weak version of monotonicity of types and virtualvalues . The second set of conditions establishes the optimality of upgrade pricing for type spaces withmonotone marginal rates of substitution .…

Distributed Asynchronous Policy Iteration for Sequential Zero Sum Games and Minimax Control

We introduce a contractive abstract dynamic programming framework and relatedpolicy iteration algorithms . These algorithms are specifically designed for sequential zero-sumgames and minimax problems with a general structure . The advantage of our algorithms over alternatives is that they resolve some long-standing convergence difficulties of the “natural” policyiteration algorithm, which have been known since the Pollatschek and Avi-Itzhakmethod [PoA69] for finite-state Markov games .…

Abstract Reasoning via Logic guided Generation

Abstract reasoning, i.e., inferring complicated patterns from givenobservations, is a central building block of artificial general intelligence . We propose logic-guided generation (LoGe), a novelgenerative DNN framework that reduces abstract reasoning as an optimization problem in propositional logic . LoGe is composed of three steps: extractpropositional variables from images, reason the answer variables with a logiclayer, and reconstruct the answer image from the variables .…

Randomized Online Algorithms for Adwords

The general adwords problem has remained largely unresolved . We define asubcase called $k-TYPICAL, $k \in \Zplus$ as follows: the total budgetof all the bidders is sufficient to buy $k$ bids for each bidder . We also giverandomized online algorithms for other special cases of adwords .…

On the Certified Robustness for Ensemble Models and Beyond

Deep neural networks (DNN) are vulnerable to adversarial examples, which aim to mislead DNNs by adding perturbations with small magnitude . In terms of thecertified robustness the standard ensemble models only achieve marginal improvement compared to a single model . Inspired by the theoretical findings, we propose the lightweight Diversity Regularized Training (DRT) to train certifiably robustensemble ML models .…

Improving Polyphonic Sound Event Detection on Multichannel Recordings with the Sørensen Dice Coefficient Loss and Transfer Learning

The S.rensen–Dice Coefficient has recently seen rising popularity as aloss function (also known as Dice loss) due to its robustness in tasks where the number of negative samples significantly exceeds that of positive samples . Conventional training of polyphonic sound event detection systemswith binary cross-entropy loss often results in suboptimal detectionperformance as the training is often overwhelmed by updates from negativesamples .…

Equidistant Linear Codes in Projective Spaces

Linear codes in projective space $mathbb{P}_q(n)$ were first considered by Braun,Etzion and Vardy . We establish that the normalizedminimum distance of a linear code is maximum if and only if it is equidistant . We prove that the upper bound on the size of such class of linear codes is $2^n$ when $q=2$ as conjectured by Braun et al.…

A Framework for Imbalanced Time series Forecasting

Time-series forecasting plays an important role in many domains, such as wind power, stock market fluctuations, or motor overheating . In some of these tasks, some particular moments often are underrepresented in thedataset, resulting in a problem known as imbalanced regression .…

Confidence Aware Scheduled Sampling for Neural Machine Translation

Scheduled sampling is an effective method to alleviate the exposure biasproblem of neural machine translation . It simulates the inference scene by replacing ground-truth target input tokens with predicted ones during training . Despite its success, its critical schedule strategies are merelybased on training steps, ignoring the real-time model competence .…