Towards an unanimous international regulatory body for responsible use of Artificial Intelligence [UIRB-AI]

Artificial Intelligence (AI), is once again in the phase of drastic advancements. Unarguably, the technology itself can revolutionize the way we live our everyday life. But the exponential growth of technology poses a daunting task for policy researchers and law makers in making amendments to the existing norms. In addition, not everyone in the society is studying the potential socio-economic intricacies and cultural drifts that AI can bring about. It is prudence to reflect from our historical past to propel the development of technology in the right direction. To benefit the society of the present and future, I scientifically explore the societal impact of AI. While there are many public and private partnerships working on similar aspects, here I describe the necessity for an Unanimous International Regulatory Body for all applications of AI (UIRB-AI). I also discuss the benefits and drawbacks of such an organization. To combat any drawbacks in the formation of an UIRB-AI, both idealistic and pragmatic perspectives are discussed alternatively. The paper further advances the discussion by proposing novel policies on how such organization should be structured and how it can bring about a win-win situation for everyone in the society.


Wolf in Sheep’s Clothing – The Downscaling Attack Against Deep Learning Applications

This paper considers security risks buried in the data processing pipeline in common deep learning applications. Deep learning models usually assume a fixed scale for their training and input data. To allow deep learning applications to handle a wide range of input data, popular frameworks, such as Caffe, TensorFlow, and Torch, all provide data scaling functions to resize input to the dimensions used by deep learning models. Image scaling algorithms are intended to preserve the visual features of an image after scaling. However, common image scaling algorithms are not designed to handle human crafted images. Attackers can make the scaling outputs look dramatically different from the corresponding input images. This paper presents a downscaling attack that targets the data scaling process in deep learning applications. By carefully crafting input data that mismatches with the dimension used by deep learning models, attackers can create deceiving effects. A deep learning application effectively consumes data that are not the same as those presented to users. The visual inconsistency enables practical evasion and data poisoning attacks to deep learning applications. This paper presents proof-of-concept attack samples to popular deep-learning-based image classification applications. To address the downscaling attacks, the paper also suggests multiple potential mitigation strategies.


Inferring User Interests in Microblogging Social Networks: A Survey

With the popularity of microblogging services such as Twitter in recent years, an increasing number of users use these services in their daily lives. The huge volume of information generated by users raises new opportunities in various applications and areas. Inferring user interests plays a significant role in providing personalized recommendations on microblogging services, and third-party applications providing social logins via these services, especially in cold-start situations. In this survey, we review user modeling strategies with respect to inferring user interests in previous studies. To this end, we focus on four dimensions of inferring user interest profiles: (1) data collection, (2) representation of user interest profiles, (3) construction and enhancement of user interest profiles, and (4) the evaluation of the constructed profiles. Through this survey, we aim to provide an overview of state-of-the-art user modeling strategies for inferring user interest profiles on microblogging social networks with respect to the four dimensions. For each dimension, we review and summarize previous studies based on specified criteria. Finally, we discuss some challenges and opportunities for future work in this research domain.


PERS: A Personalized and Explainable POI Recommender System

The Location-Based Social Networks (LBSN) (e.g., Facebook) have many factors (for instance, ratings, check-in time, etc.) that play a crucial role for the Point-of-Interest (POI) recommendations. Unlike ratings, the reviews can help users to elaborate their opinion and share the extent of consumption experience in terms of the relevant factors of interest (aspects). Though some of the existing recommendation systems have been using the user reviews, most of them are less transparent and non-interpretable. These reasons have induced considerable attention towards explainable and interpretable recommendation. To the best of our knowledge, this is the first paper to exploit the user reviews to incorporate the sentiment and opinions on different aspects for the personalized and explainable POI recommendation. In this paper, we propose a model termed as PERS (Personalized Explainable POI Recommender System) which models the review-aspect category correlation by exploiting deep neural network, formulates the user-aspect category bipartite relation as a bipartite graph, and models the explainable recommendation using bipartite core-based and ranking-based methods. The major contributions of this paper are: (i) it models users and locations based on the aspects posted by user via reviews, (ii) it exploits a deep neural network to model the review-aspect category correlation, (iii) it provisions the incorporation of multiple contexts (e.g., categorical, spatial, etc.) in the POI recommendation model, (iv) it formulates the preference of users’ on aspect category as a bipartite relation, represents it as a location-aspect category bipartite graph, and models the explainable recommendation with the notion of ordered dense subgraph extraction using bipartite core-based and ranking-based approaches, and (v) it evaluates the generated recommendation with three real-world datasets.


Context-aware Path Ranking for Knowledge Base Completion

Knowledge base (KB) completion aims to infer missing facts from existing ones in a KB. Among various approaches, path ranking (PR) algorithms have received increasing attention in recent years. PR algorithms enumerate paths between entity pairs in a KB and use those paths as features to train a model for missing fact prediction. Due to their good performances and high model interpretability, several methods have been proposed. However, most existing methods suffer from scalability (high RAM consumption) and feature explosion (trains on an exponentially large number of features) problems. This paper proposes a Context-aware Path Ranking (C-PR) algorithm to solve these problems by introducing a selective path exploration strategy. C-PR learns global semantics of entities in the KB using word embedding and leverages the knowledge of entity semantics to enumerate contextually relevant paths using bidirectional random walk. Experimental results on three large KBs show that the path features (fewer in number) discovered by C-PR not only improve predictive performance but also are more interpretable than existing baselines.


A Deep Policy Inference Q-Network for Multi-Agent Systems

We present DPIQN, a deep policy inference Q-network that targets multi-agent systems composed of controllable agents, collaborators, and opponents that interact with each other. We focus on one challenging issue in such systems—modeling agents with varying strategies—and propose to employ ‘policy features’ learned from raw observations (e.g., raw images) of collaborators and opponents by inferring their policies. DPIQN incorporates the learned policy features as a hidden vector into its own deep Q-network (DQN), such that it is able to predict better Q values for the controllable agents than the state-of-the-art deep reinforcement learning models. We further propose an enhanced version of DPIQN, called deep recurrent policy inference Q-network (DRPIQN), for handling partial observability. Both DPIQN and DRPIQN are trained by an adaptive training procedure, which adjusts the network’s attention to learn the policy features and its own Q-values at different phases of the training process. We present a comprehensive analysis of DPIQN and DRPIQN, and highlight their effectiveness and generalizability in various multi-agent settings. Our models are evaluated in a classic soccer game involving both competitive and collaborative scenarios. Experimental results performed on 1 vs. 1 and 2 vs. 2 games show that DPIQN and DRPIQN demonstrate superior performance to the baseline DQN and deep recurrent Q-network (DRQN) models. We also explore scenarios in which collaborators or opponents dynamically change their policies, and show that DPIQN and DRPIQN do lead to better overall performance in terms of stability and mean scores.


Non-convex Optimization for Machine Learning

A vast majority of machine learning algorithms train their models and perform inference by solving optimization problems. In order to capture the learning and prediction problems accurately, structural constraints such as sparsity or low rank are frequently imposed or else the objective itself is designed to be a non-convex function. This is especially true of algorithms that operate in high-dimensional spaces or that train non-linear models such as tensor models and deep networks. The freedom to express the learning problem as a non-convex optimization problem gives immense modeling power to the algorithm designer, but often such problems are NP-hard to solve. A popular workaround to this has been to relax non-convex problems to convex ones and use traditional methods to solve the (convex) relaxed optimization problems. However this approach may be lossy and nevertheless presents significant challenges for large scale optimization. On the other hand, direct approaches to non-convex optimization have met with resounding success in several domains and remain the methods of choice for the practitioner, as they frequently outperform relaxation-based techniques – popular heuristics include projected gradient descent and alternating minimization. However, these are often poorly understood in terms of their convergence and other properties. This monograph presents a selection of recent advances that bridge a long-standing gap in our understanding of these heuristics. The monograph will lead the reader through several widely used non-convex optimization techniques, as well as applications thereof. The goal of this monograph is to both, introduce the rich literature in this area, as well as equip the reader with the tools and techniques needed to analyze these simple procedures for non-convex problems.


Improvements to Inference Compilation for Probabilistic Programming in Large-Scale Scientific Simulators

We consider the problem of Bayesian inference in the family of probabilistic models implicitly defined by stochastic generative models of data. In scientific fields ranging from population biology to cosmology, low-level mechanistic components are composed to create complex generative models. These models lead to intractable likelihoods and are typically non-differentiable, which poses challenges for traditional approaches to inference. We extend previous work in ‘inference compilation’, which combines universal probabilistic programming and deep learning methods, to large-scale scientific simulators, and introduce a C++ based probabilistic programming library called CPProb. We successfully use CPProb to interface with SHERPA, a large code-base used in particle physics. Here we describe the technical innovations realized and planned for this library.


A Deep Reinforcement Learning-Based Framework for Content Caching

Content caching at the edge nodes is a promising technique to reduce the data traffic in next-generation wireless networks. Inspired by the success of Deep Reinforcement Learning (DRL) in solving complicated control problems, this work presents a DRL-based framework with Wolpertinger architecture for content caching at the base station. The proposed framework is aimed at maximizing the long-term cache hit rate, and it requires no knowledge of the content popularity distribution. To evaluate the proposed framework, we compare the performance with other caching algorithms, including Least Recently Used (LRU), Least Frequently Used (LFU), and First-In First-Out (FIFO) caching strategies. Meanwhile, since the Wolpertinger architecture can effectively limit the action space size, we also compare the performance with Deep Q-Network to identify the impact of dropping a portion of the actions. Our results show that the proposed framework can achieve improved short-term cache hit rate and improved and stable long-term cache hit rate in comparison with LRU, LFU, and FIFO schemes. Additionally, the performance is shown to be competitive in comparison to Deep Q-learning, while the proposed framework can provide significant savings in runtime.


PKC-PC: A Variant of the McEliece Public Key Cryptosystem based on Polar Codes
Self-attracting self-avoiding walk
A comprehensive statistical study of metabolic and protein-protein interaction network properties
Pseudorehearsal in actor-critic agents with neural network function approximation
A diagram associated with the subconstituent algebra of a distance-regular graph
Adversarial Synthesis Learning Enables Segmentation Without Target Modality Ground Truth
Renaissance: Self-Stabilizing Distributed SDN Control Plane
A problematic family of dyadic matroids
Universality from disorder in the random-bond Blume-Capel model
Unsupervised learning of dynamical and molecular similarity using variance minimization
Computing Optimal Repairs for Functional Dependencies
An Order Preserving Bilinear Model for Person Detection in Multi-Modal Data
Throttling for the game of Cops and Robbers on graphs
Chaos-based Potentials in the One-dimensional Tight-binding Model Probed by the Inverse Participation Ratio
Enhance Visual Recognition under Adverse Conditions via Deep Networks
A Unified Asymptotic Analysis of Area Spectral Efficiency in Ultradense Cellular Networks
Mechanism Design for Demand Response Programs
Approximate Bayesian Forecasting
Error-Free Communication Over State-Dependent Channels with Variable-Length Feedback
Automatic Estimation of Ice Bottom Surfaces from Radar Imagery
Wave function representation of probability distributions
Many $K_t$’s; No Large Cliques or Stars
Bit-Vector Model Counting using Statistical Estimation
Controlled Information Fusion with Risk-Averse CVaR Social Sensors
Local optima of the Sherrington-Kirkpatrick Hamiltonian
Context-Aware Semantic Inpainting
On the Outage Analysis and Finite SNR Diversity-Multiplexing Tradeoff of Hybrid-Duplex Systems for Aeronautical Communications
Skew cyclic codes over $\mathbb{F}_{p}+u\mathbb{F}_{p}$
Deep Unsupervised Clustering Using Mixture of Autoencoders
The use of adversaries for optimal neural network training
An Adaptive Passivity-Based Controller of a Buck-Boost Converter With a Constant Power Load
The Character Thinks Ahead: creative writing with deep learning nets and its stylistic assessment
Deep learning for predicting refractive error from retinal fundus images
Towards a Deep Improviser: a prototype deep learning post-tonal free music generator
Model-Based Clustering of Nonparametric Weighted Networks
Density Estimation with Contaminated Data: Minimax Rates and Theory of Adaptation
Optimal Equilibria for Time-Inconsistent Stopping Problems in Continuous Time
Fault Tolerance of Random Graphs with respect to Connectivity: Phase Transition in Logarithmic Average Degree
Predicting Surgery Duration from a New Perspective: Evaluation from a Database on Thoracic Surgery
Interference Steering to Manage Interference
Multi-dimensional Graph Fourier Transform
Cyclic Sieving of Matchings
Indoor Sound Source Localization with Probabilistic Neural Network
Geometrical Insights for Implicit Generative Modeling
Tilings of hyperbolic $(2\times n)$-board with colored squares and dominoes
DropMax: Adaptive Stochastic Softmax
Exploring Models and Data for Remote Sensing Image Caption Generation
Memory-induced mechanism for self-sustaining activity in networks
Interference Exploitation Precoding Made Practical: Closed-Form Solutions with Optimal Performance
Bisymmetric and quasitrivial operations: characterizations and enumerations
PHOEG Helps Obtaining Extremal Graphs
Hyperspectral image unmixing with LiDAR data-aided spatial regularization
On the Information Dimension of Multivariate Gaussian Processes
Smallest snarks with oddness 4 and cyclic connectivity 4 have order 44
On the expected total cost with unbounded returns for Markov decision processes
Survivability of a metapopulation under local extinctions
A probabilistic interpretation of replicator-mutator dynamics
Enumeration Complexity of Conjunctive Queries with Functional Dependencies
Simulating Patho-realistic Ultrasound Images using Deep Generative Networks with Adversarial Learning
Maximally Distant Cross Domain Generators for Estimating Per-Sample Error
Multiagent-based Participatory Urban Simulation through Inverse Reinforcement Learning
A Recursive Construction of Permutation Polynomials over $\mathbb{F}_{q^2}$ with Odd Characteristic from Rédei Functions
Bounds on the Entropy of a Function of a Random Variable and their Applications
Constrained Optimal Consensus in Multi-agent Systems with First and Second Order Dynamics
A Note on Flips in Diagonal Rectangulations
Track, then Decide: Category-Agnostic Vision-based Multi-Object Tracking
Encoding CNN Activations for Writer Recognition
A continuous framework for fairness
Duality of nonconvex optimization with positively homogeneous functions
Eco-Evolutionary Dynamics of a Population with Randomly Switching Carrying Capacity
Mott’s law for the critical conductance of Miller-Abrahams random resistor network
Interpolation Macdonald operators at infinity
Risk-Based Distributionally Robust Optimal Power Flow With Dynamic Line Rating
Interpolation Macdonald polynomials and Cauchy-type identities
Lozenge tilings of doubly-intruded hexagons
Possible Universal Relation Between Short time $β$-relaxation and Long time $α$-relaxation in Glass-forming Liquids
Siamese Neural Networks for One-shot detection of Railway Track Switches
Autism Classification Using Brain Functional Connectivity Dynamics and Machine Learning
Efficient multicut enumeration of k-out-of-n:F and consecutive k-out-of-n:F systems
Model selection for Gaussian processes utilizing sensitivity of posterior predictive distribution
On Long Memory Origins and Forecast Horizons
A brain signature highly predictive of future progression to Alzheimer’s dementia
Note on Attacking Object Detectors with Adversarial Stickers
A general construction of permutation polynomials of the form $ (x^{2^m}+x+δ)^{i(2^m-1)+1}+x$ over $\F_{2^{2m}}$
Overview of the Triple Scoring Task at the WSDM Cup 2017
AVEID: Automatic Video System for Measuring Engagement In Dementia
Learning Intelligent Dialogs for Bounding Box Annotation
Multiview Deep Learning for Predicting Twitter Users’ Location
General criteria for the study of quasi-stationarity
Rigidity of cones with bounded Ricci curvature
Random Schrödinger operators with a background potential
Limit theorems for assortativity and clustering in the configuration model with scale-free degrees
Branching Brownian motion with decay of mass and the non-local Fisher-KPP equation
Profit Driven Decision Trees for Churn Prediction
Truncated Variational Sampling for ‘Black Box’ Optimization of Generative Models
A Deep Learning Interpretable Classifier for Diabetic Retinopathy Disease Grading
Optimal Error Correcting Delivery Scheme for Coded Caching with Symmetric Batch Prefetching
Unifying Map and Landmark Based Representations for Visual Navigation
Magnificent Four
A Fast Algorithm for Separated Sparsity via Perturbed Lagrangians
Tight Hardness for Shortest Cycles and Paths in Sparse Graphs
Two quadrature rules for stochastic Itō-integrals with fractional Sobolev regularity

Advertisements