A Deep Belief Network Based Machine Learning System for Risky Host Detection

To assure cyber security of an enterprise, typically SIEM (Security Information and Event Management) system is in place to normalize security event from different preventive technologies and flag alerts. Analysts in the security operation center (SOC) investigate the alerts to decide if it is truly malicious or not. However, generally the number of alerts is overwhelming with majority of them being false positive and exceeding the SOC’s capacity to handle all alerts. There is a great need to reduce the false positive rate as much as possible. While most previous research focused on network intrusion detection, we focus on risk detection and propose an intelligent Deep Belief Network machine learning system. The system leverages alert information, various security logs and analysts’ investigation results in a real enterprise environment to flag hosts that have high likelihood of being compromised. Text mining and graph based method are used to generate targets and create features for machine learning. In the experiment, Deep Belief Network is compared with other machine learning algorithms, including multi-layer neural network, random forest, support vector machine and logistic regression. Results on real enterprise data indicate that the deep belief network machine learning system performs better than other algorithms for our problem and is six times more effective than current rule-based system. We also implement the whole system from data collection, label creation, feature engineering to host score generation in a real enterprise production environment.


Deep Reinforcement Learning for List-wise Recommendations

Recommender systems play a crucial role in mitigating the problem of information overload by suggesting users’ personalized items or services. The vast majority of traditional recommender systems consider the recommendation procedure as a static process and make recommendations following a fixed strategy. In this paper, we propose a novel recommender system with the capability of continuously improving its strategies during the interactions with users. We model the sequential interactions between users and a recommender system as a Markov Decision Process (MDP) and leverage Reinforcement Learning (RL) to automatically learn the optimal strategies via recommending trial-and-error items and receiving reinforcements of these items from users’ feedbacks. In particular, we introduce an online user-agent interacting environment simulator, which can pre-train and evaluate model parameters offline before applying the model online. Moreover, we validate the importance of list-wise recommendations during the interactions between users and agent, and develop a novel approach to incorporate them into the proposed framework LIRD for list-wide recommendations. The experimental results based on a real-world e-commerce dataset demonstrate the effectiveness of the proposed framework.


A review of change point detection methods

In this work, methods to detect one or several change points in multivariate time series are reviewed. They include retrospective (off-line) procedure such as maximum likelihood estimation, regression, kernel methods, etc. In this large area of research, applications are numerous and diverse; many different models and operational constraints (on precision, complexity,…) exist. A formal framework for change point detection is introduced to give sens to this significant body of work. Precisely, all methods are described as a collection of three elements: a cost function, a search method and a constraint on the number of changes to detect. For a given method, we detail the assumed signal model, the associated algorithm, theoretical guarantees (if any) and the application domain. This approach is intended to facilitate prototyping of change point detection methods: for a given segmentation task, one can appropriately choose among the described elements to design an algorithm.


Accounting for hidden common causes when infering cause and effect from observational data

Identifying causal relationships from observation data is difficult, in large part, due to the presence of hidden common causes. In some cases, where just the right patterns of conditional independence and dependence lie in the data—for example, Y-structures—it is possible to identify cause and effect. In other cases, the analyst deliberately makes an uncertain assumption that hidden common causes are absent, and infers putative causal relationships to be tested in a randomized trial. Here, we consider a third approach, where there are sufficient clues in the data such that hidden common causes can be inferred.


Private Exploration Primitives for Data Cleaning

Data cleaning, or the process of detecting and repairing inaccurate or corrupt records in the data, is inherently human-driven. State of the art systems assume cleaning experts can access the data (or a sample of it) to tune the cleaning process. However, in many cases, privacy constraints disallow unfettered access to the data. To address this challenge, we observe and provide empirical evidence that data cleaning can be achieved without access to the sensitive data, but with access to a (noisy) query interface that supports a small set of linear counting query primitives. Motivated by this, we present DPClean, a first of a kind system that allows engineers tune data cleaning workflows while ensuring differential privacy. In DPClean, a cleaning engineer can pose sequences of aggregate counting queries with error tolerances. A privacy engine translates each query into a differentially private mechanism that returns an answer with error matching the specified tolerance, and allows the data owner track the overall privacy loss. With extensive experiments using human and simulated cleaning engineers on blocking and matching tasks, we demonstrate that our approach is able to achieve high cleaning quality while ensuring a reasonable privacy loss.


Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey

Deep learning is at the heart of the current rise of machine learning and artificial intelligence. In the field of Computer Vision, it has become the workhorse for applications ranging from self-driving cars to surveillance and security. Whereas deep neural networks have demonstrated phenomenal success (often beyond human capabilities) in solving complex problems, recent studies show that they are vulnerable to adversarial attacks in the form of subtle perturbations to inputs that lead a model to predict incorrect outputs. For images, such perturbations are often too small to be perceptible, yet they completely fool the deep learning models. Adversarial attacks pose a serious threat to the success of deep learning in practice. This fact has lead to a large influx of contributions in this direction. This article presents the first comprehensive survey on adversarial attacks on deep learning in Computer Vision. We review the works that design adversarial attacks, analyze the existence of such attacks and propose defenses against them. To emphasize that adversarial attacks are possible in practical conditions, we separately review the contributions that evaluate adversarial attacks in the real-world scenarios. Finally, we draw on the literature to provide a broader outlook of the research direction.


Machine Learning for Partial Identification: Example of Bracketed Data

Partially identified models occur commonly in economic applications. A common problem in this literature is a regression problem with bracketed (interval-censored) outcome variable Y, which creates a set-identified parameter of interest. The recent studies have only considered finite-dimensional linear regression in such context. To incorporate more complex controls into the problem, we consider a partially linear projection of Y on the set functions that are linear in treatment/policy variables and nonlinear in the controls. We characterize the identified set for the linear component of this projection and propose an estimator of its support function. Our estimator converges at parametric rate and has asymptotic normality properties. It may be useful for labor economics applications that involve bracketed salaries and rich, high-dimensional demographic data about the subjects of the study.


Inferring Formal Properties of Production Key-Value Stores

Production distributed systems are challenging to formally verify, in particular when they are based on distributed protocols that are not rigorously described or fully understood. In this paper, we derive models and properties for two core distributed protocols used in eventually consistent production key-value stores such as Riak and Cassandra. We propose a novel modeling called certified program models, where complete distributed systems are captured as programs written in traditional systems languages such as concurrent C. Specifically, we model the read-repair and hinted-handoff recovery protocols as concurrent C programs, test them for conformance with real systems, and then verify that they guarantee eventual consistency, modeling precisely the specification as well as the failure assumptions under which the results hold.


Reinforcement Learning with Analogical Similarity to Guide Schema Induction and Attention

Research in analogical reasoning suggests that higher-order cognitive functions such as abstract reasoning, far transfer, and creativity are founded on recognizing structural similarities among relational systems. Here we integrate theories of analogy with the computational framework of reinforcement learning (RL). We propose a psychology theory that is a computational synergy between analogy and RL, in which analogical comparison provides the RL learning algorithm with a measure of relational similarity, and RL provides feedback signals that can drive analogical learning. Simulation results support the power of this approach.


Significance of Softmax-based Features in Comparison to Distance Metric Learning-based Features

The extraction of useful deep features is important for many computer vision tasks. Deep features extracted from classification networks have proved to perform well in those tasks. To obtain features of greater usefulness, end-to-end distance metric learning (DML) has been applied to train the feature extractor directly. However, in these DML studies, there were no equitable comparisons between features extracted from a DML-based network and those from a softmax-based network. In this paper, by presenting objective comparisons between these two approaches under the same network architecture, we show that the softmax-based features perform competitive, or even better, to the state-of-the-art DML features when the size of the dataset, that is, the number of training samples per class, is large. The results suggest that softmax-based features should be properly taken into account when evaluating the performance of deep features.


A Stochastic Trust Region Algorithm

An algorithm is proposed for solving stochastic and finite sum minimization problems. Based on a trust region methodology, the algorithm employs normalized steps, at least as long as the norms of the stochastic gradient estimates are within a user-defined interval. The complete algorithm—which dynamically chooses whether or not to employ normalized steps—is proved to have convergence guarantees that are similar to those possessed by a traditional stochastic gradient approach under various sets of conditions related to the accuracy of the stochastic gradient estimates and choice of stepsize sequence. The results of numerical experiments are presented when the method is employed to minimize convex and nonconvex machine learning test problems, illustrating that the method can outperform a traditional stochastic gradient approach.


Vector and Matrix Optimal Mass Transport: Theory, Algorithm, and Applications

In many applications such as color image processing, data has more than one piece of information associated with each spatial coordinate, and in such cases the classical optimal mass transport (OMT) must be generalized to handle vector-valued or matrix-valued densities. In this paper, we discuss the vector and matrix optimal mass transport and present three contributions. We first present a rigorous mathematical formulation for these setups and provide analytical results including existence of solutions and strong duality. Next, we present a simple, scalable, and parallelizable methods to solve the vector and matrix-OMT problems. Finally, we implement the proposed methods on a CUDA GPU and present experiments and applications.


A Unified Bayesian Inference Framework for Generalized Linear Models

In this letter, we present a unified Bayesian inference framework for generalized linear models (GLM) which iteratively reduces the GLM problem to a sequence of standard linear model (SLM) problems. This framework provides new perspectives on some established GLM algorithms derived from SLM ones and also suggests novel extensions for some other SLM algorithms. Specific instances elucidated under such framework are the GLM versions of approximate message passing (AMP), vector AMP (VAMP), and sparse Bayesian learning (SBL). It is proved that the resultant GLM version of AMP is equivalent to the well-known generalized approximate message passing (GAMP). Numerical results for 1-bit quantized compressed sensing (CS) demonstrate the effectiveness of this unified framework.


An introduction to Graph Data Management

A graph database is a database where the data structures for the schema and/or instances are modeled as a (labeled)(directed) graph or generalizations of it, and where querying is expressed by graph-oriented operations and type constructors. In this article we present the basic notions of graph databases, give an historical overview of its main development, and study the main current systems that implement them.


Contingency Analysis of Power Networks : A System Theoretic Approach

In this work, we have proposed a system theoretic method to compute sensitivities of different lines for N-k contingency analysis in power network. We have formulated the N-k contingency analysis as the stability problem of power network with uncertain links. We have derived a necessary condition for stochastic stability of the power network with the link uncertainty. The necessary condition is then used to rank order the contingencies. We have shown due to interaction between different uncertainties the ranking can substantially change. The state of the art N-k contingency analysis does not consider the possibility of interference between link uncertainties and rank the links according to the severity of N-1 contingencies. We have presented simulation results for New England 39 bus system as a support of our claim.


Learning Structural Weight Uncertainty for Sequential Decision-Making

Learning probability distributions on the weights of neural networks (NNs) has recently proven beneficial in many applications. Bayesian methods, such as Stein variational gradient descent (SVGD), offer an elegant framework to reason about NN model uncertainty. However, by assuming independent Gaussian priors for the individual NN weights (as often applied), SVGD does not impose prior knowledge that there is often structural information (dependence) among weights. We propose efficient posterior learning of structural weight uncertainty, within an SVGD framework, by employing matrix variate Gaussian priors on NN parameters. We further investigate the learned structural uncertainty in sequential decision-making problems, including contextual bandits and reinforcement learning. Experiments on several synthetic and real datasets indicate the superiority of our model, compared with state-of-the-art methods.


Parameter-free online learning via model selection

We introduce an efficient algorithmic framework for model selection in online learning, also known as parameter-free online learning. Departing from previous work, which has focused on highly structured function classes such as nested balls in Hilbert space, we propose a generic meta-algorithm framework that achieves online model selection oracle inequalities under minimal structural assumptions. We give the first computationally efficient parameter-free algorithms that work in arbitrary Banach spaces under mild smoothness assumptions; previous results applied only to Hilbert spaces. We further derive new oracle inequalities for matrix classes, non-nested convex sets, and \mathbb{R}^{d} with generic regularizers. Finally, we generalize these results by providing oracle inequalities for arbitrary non-linear classes in the online supervised learning model. These results are all derived through a unified meta-algorithm scheme using a novel ‘multi-scale’ algorithm for prediction with expert advice based on random playout, which may be of independent interest.


Community Detection in Partially Observable Social Networks

The discovery of community structures in social networks has gained significant attention since it is a fundamental problem in understanding the networks’ topology and functions. However, most social network data are collected from partially observable networks with both missing nodes and edges. In this paper, we address a new problem of detecting overlapping community structures in the context of such an incomplete network, where communities in the network are allowed to overlap since nodes belong to multiple communities at once. To solve this problem, we introduce KroMFac, a new framework that conducts community detection via regularized nonnegative matrix factorization (NMF) based on the Kronecker graph model. Specifically, from a generative parameter matrix acquired by the expectation-maximization (EM) algorithm, we first estimate the missing part of the network. As our major contribution to the proposed framework, to improve community detection accuracy, we then characterize and select influential nodes (which tend to have high degrees) by ranking, and add them to the existing graph. Finally, we uncover the community structures by solving the regularized NMF-aided optimization problem in terms of maximizing the likelihood of the underlying graph. Furthermore, adopting normalized mutual information (NMI), we empirically show superiority of our KroMFac approach over two baseline schemes.


Theory of Deep Learning III: explaining the non-overfitting puzzle

A main puzzle of deep networks revolves around the absence of overfitting despite overparametrization and despite the large capacity demonstrated by zero training error on randomly labeled data. In this note, we show that the dynamical systems associated with gradient descent minimization of nonlinear networks behave near zero stable minima of the empirical error as gradient system in a quadratic potential with degenerate Hessian. The proposition is supported by theoretical and numerical results, under the assumption of stable minima of the gradient. Our proposition provides the extension to deep networks of key properties of gradient descent methods for linear networks, that as, suggested in (1), can be the key to understand generalization. Gradient descent enforces a form of implicit regularization controlled by the number of iterations, and asymptotically converging to the minimum norm solution. This implies that there is usually an optimum early stopping that avoids overfitting of the loss (this is relevant mainly for regression). For classification, the asymptotic convergence to the minimum norm solution implies convergence to the maximum margin solution which guarantees good classification error for ‘low noise’ datasets. The implied robustness to overparametrization has suggestive implications for the robustness of deep hierarchically local networks to variations of the architecture with respect to the curse of dimensionality.


Learning Relevant Features of Data with Multi-scale Tensor Networks

Inspired by coarse-graining approaches used in physics, we show how similar algorithms can be adapted for data. The resulting algorithms are based on layered tree tensor networks and scale linearly with both the dimension of the input and the training set size. Computing most of the layers with an unsupervised algorithm, then optimizing just the top layer for supervised classification of the MNIST and fashion-MNIST data sets gives very good results. We also discuss mixing a prior guess for supervised weights together with an unsupervised representation of the data, yielding a smaller number of features nevertheless able to give good performance.


Blackboard Meets Dijkstra for Optimization of Web Service Workflows

This paper presents the integration of Dijkstra’s algorithm within a Blackboard framework to optimize the selection of web services from service providers. In addition, methods are presented how dynamic changes during the workflow execution can be handled; specifically, how changes of the service parameters have effects on the system. For justification of our approach, and to show practical feasibility, a sample implementation is presented.


Users Constraints in Itemset Mining

Discovering significant itemsets is one of the fundamental problems in data mining. It has recently been shown that constraint programming is a flexible way to tackle data mining tasks. With a constraint programming approach, we can easily express and efficiently answer queries with users constraints on items. However, in many practical cases it is possible that queries also express users constraints on the dataset itself. For instance, asking for a particular itemset in a particular part of the dataset. This paper presents a general constraint programming model able to handle any kind of query on the items or the dataset for itemset mining.


Help Me Find a Job: A Graph-based Approach for Job Recommendation at Scale

Online job boards are one of the central components of modern recruitment industry. With millions of candidates browsing through job postings everyday, the need for accurate, effective, meaningful, and transparent job recommendations is apparent more than ever. While recommendation systems are successfully advancing in variety of online domains by creating social and commercial value, the job recommendation domain is less explored. Existing systems are mostly focused on content analysis of resumes and job descriptions, relying heavily on the accuracy and coverage of the semantic analysis and modeling of the content in which case, they end up usually suffering from rigidity and the lack of implicit semantic relations that are uncovered from users’ behavior and could be captured by Collaborative Filtering (CF) methods. Few works which utilize CF do not address the scalability challenges of real-world systems and the problem of cold-start. In this paper, we propose a scalable item-based recommendation system for online job recommendations. Our approach overcomes the major challenges of sparsity and scalability by leveraging a directed graph of jobs connected by multi-edges representing various behavioral and contextual similarity signals. The short lived nature of the items (jobs) in the system and the rapid rate in which new users and jobs enter the system make the cold-start a serious problem hindering CF methods. We address this problem by harnessing the power of deep learning in addition to user behavior to serve hybrid recommendations. Our technique has been leveraged by CareerBuilder.com which is one of the largest job boards in the world to generate high-quality recommendations for millions of users.


Error-Robust Multi-View Clustering

In the era of big data, data may come from multiple sources, known as multi-view data. Multi-view clustering aims at generating better clusters by exploiting complementary and consistent information from multiple views rather than relying on the individual view. Due to inevitable system errors caused by data-captured sensors or others, the data in each view may be erroneous. Various types of errors behave differently and inconsistently in each view. More precisely, error could exhibit as noise and corruptions in reality. Unfortunately, none of the existing multi-view clustering approaches handle all of these error types. Consequently, their clustering performance is dramatically degraded. In this paper, we propose a novel Markov chain method for Error-Robust Multi-View Clustering (EMVC). By decomposing each view into a shared transition probability matrix and error matrix and imposing structured sparsity-inducing norms on error matrices, we characterize and handle typical types of errors explicitly. To solve the challenging optimization problem, we propose a new efficient algorithm based on Augmented Lagrangian Multipliers and prove its convergence rigorously. Experimental results on various synthetic and real-world datasets show the superiority of the proposed EMVC method over the baseline methods and its robustness against different types of errors.


Beyond Word Embeddings: Learning Entity and Concept Representations from Large Scale Knowledge Bases

Text representation using neural word embeddings has proven efficacy in many NLP applications. Recently, a lot of research interest goes beyond word embeddings by adapting the traditional word embedding models to learn vectors of multiword expressions (concepts/entities). However, current methods are limited to textual knowledge bases only (e.g., Wikipedia). In this paper, we propose a novel approach for learning concept vectors from two large scale knowledge bases (Wikipedia, and Probase). We adapt the skip-gram model to seamlessly learn from the knowledge in Wikipedia text and Probase concept graph. We evaluate our concept embedding models intrinsically on two tasks: 1) analogical reasoning where we achieve a state-of-the-art performance of 91% on semantic analogies, 2) concept categorization where we achieve a state-of-the-art performance on two benchmark datasets achieving categorization accuracy of 100% on one and 98% on the other. Additionally, we present a case study to extrinsically evaluate our model on unsupervised argument type identification for neural semantic parsing. We demonstrate the competitive accuracy of our unsupervised method and its ability to better generalize to out of vocabulary entity mentions compared to the tedious and error prone methods which depend on gazetteers and regular expressions.


Accelerating Deep Learning with Memcomputing

Restricted Boltzmann machines (RBMs) and their extensions, often called ‘deep-belief networks’, are very powerful neural networks that have found widespread applicability in the fields of machine learning and big data. The standard way to training these models resorts to an iterative unsupervised procedure based on Gibbs sampling, called ‘contrastive divergence’, and additional supervised tuning via back-propagation. However, this procedure has been shown not to follow any gradient and can lead to suboptimal solutions. In this paper, we show a very efficient alternative to contrastive divergence by means of simulations of digital memcomputing machines (DMMs). We test our approach on pattern recognition using the standard MNIST data set of hand-written numbers. DMMs sample very effectively the vast phase space defined by the probability distribution of RBMs over the test sample inputs, and provide a very good approximation close to the optimum. This efficient search significantly reduces the number of generative pre-training iterations necessary to achieve a given level of accuracy in the MNIST data set, as well as a total performance gain over the traditional approaches. In fact, the acceleration of the pre-training achieved by simulating DMMs is comparable to, in number of iterations, the recently reported hardware application of the quantum annealing method on the same network and data set. Notably, however, DMMs perform far better than the reported quantum annealing results in terms of quality of the training. Our approach is agnostic about the connectivity of the network. Therefore, it can be extended to train full Boltzmann machines, and even deep networks at once.


Learning Multimodal Word Representation via Dynamic Fusion Methods

Multimodal models have been proven to outperform text-based models on learning semantic word representations. Almost all previous multimodal models typically treat the representations from different modalities equally. However, it is obvious that information from different modalities contributes differently to the meaning of words. This motivates us to build a multimodal model that can dynamically fuse the semantic representations from different modalities according to different types of words. To that end, we propose three novel dynamic fusion methods to assign importance weights to each modality, in which weights are learned under the weak supervision of word association pairs. The extensive experiments have demonstrated that the proposed methods outperform strong unimodal baselines and state-of-the-art multimodal models.


Deep Learning: A Critical Appraisal

Although deep learning has historical roots going back decades, neither the term ‘deep learning’ nor the approach was popular just over five years ago, when the field was reignited by papers such as Krizhevsky, Sutskever and Hinton’s now classic (2012) deep network model of Imagenet. What has the field discovered in the five subsequent years? Against a background of considerable progress in areas such as speech recognition, image recognition, and game playing, and considerable enthusiasm in the popular press, I present ten concerns for deep learning, and suggest that deep learning must be supplemented by other techniques if we are to reach artificial general intelligence.


Matching with Text Data: An Experimental Evaluation of Methods for Matching Documents and of Measuring Match Quality

How should one perform matching in observational studies when the units are text documents? The lack of randomized assignment of documents into treatment and control groups may lead to systematic differences between groups on high-dimensional and latent features of text such as topical content and sentiment. Standard balance metrics, used to measure the quality of a matching method, fail in this setting. We decompose text matching methods into two parts: (1) a text representation, and (2) a distance metric, and present a framework for measuring the quality of text matches experimentally using human subjects. We consider 28 potential methods, and find that representing text as term vectors and matching on cosine distance significantly outperform alternative representations and distance metrics. We apply our chosen method to a substantive debate in the study of media bias using a novel data set of front page news articles from thirteen news sources. Media bias is composed of topic selection bias and presentation bias; using our matching method to control for topic selection, we find that both components contribute significantly to media bias, though some news sources rely on one component more than the other.


Probabilistic supervised learning

Predictive modelling and supervised learning are central to modern data science. With predictions from an ever-expanding number of supervised black-box strategies – e.g., kernel methods, random forests, deep learning aka neural networks – being employed as a basis for decision making processes, it is crucial to understand the statistical uncertainty associated with these predictions. As a general means to approach the issue, we present an overarching framework for black-box prediction strategies that not only predict the target but also their own predictions’ uncertainty. Moreover, the framework allows for fair assessment and comparison of disparate prediction strategies. For this, we formally consider strategies capable of predicting full distributions from feature variables, so-called probabilistic supervised learning strategies. Our work draws from prior work including Bayesian statistics, information theory, and modern supervised machine learning, and in a novel synthesis leads to (a) new theoretical insights such as a probabilistic bias-variance decomposition and an entropic formulation of prediction, as well as to (b) new algorithms and meta-algorithms, such as composite prediction strategies, probabilistic boosting and bagging, and a probabilistic predictive independence test. Our black-box formulation also leads (c) to a new modular interface view on probabilistic supervised learning and a modelling workflow API design, which we have implemented in the newly released skpro machine learning toolbox, extending the familiar modelling interface and meta-modelling functionality of sklearn. The skpro package provides interfaces for construction, composition, and tuning of probabilistic supervised learning strategies, together with orchestration features for validation and comparison of any such strategy – be it frequentist, Bayesian, or other.


Piecewise constant reconstruction of damaged color images
A spatially explicit capture recapture model for partially identified individuals when trap detection rate is less than one
Discriminative and Geometry Aware Unsupervised Domain Adaptation
Robust Covariate Shift Prediction with General Losses and Feature Views
Kernel Robust Bias-Aware Prediction under Covariate Shift
On Stein’s Method for Infinitely Divisible Laws With Finite First Moment
Nearly linear time encodable codes beating the Gilbert-Varshamov bound
Corpus specificity in LSA and Word2vec: the role of out-of-domain documents
Arrow of time and its reversal on IBM quantum computer
Multi-timescale memory dynamics in a reinforcement learning network with attention-gated memory
Extended and improved criss-cross algorithms for computing the spectral value set abscissa and radius
On the Intriguing Problem of Counting (n+1,n+2)-Core Partitions into Odd Parts
Low-Level Augmented Bayesian Optimization for Finding the Best Cloud VM
Application of Convolutional Neural Network to Predict Airfoil Lift Coefficient
Limited Feedback Channel Estimation in Massive MIMO with Non-uniform Directional Dictionaries
Finite-sample risk bounds for maximum likelihood estimation with arbitrary penalties
Blind Identification of Fully Observed Discrete-Time Linear Time-Varying Systems via Sparse Recovery
Optimizing Wirelessly Powered Crowd Sensing: Trading energy for data
Finite-sample bounds for the multivariate Behrens-Fisher distribution with proportional covariances
Objective evaluation metrics for automatic classification of EEG events
Beyond Keywords and Relevance: A Personalized Ad Retrieval Framework in E-Commerce Sponsored Search
An Efficient and Fair Multi-Resource Allocation Mechanism for Heterogeneous Servers
Remarks on $p$-monotone operators
Decomposing the Quantile Ratio Index with applications to Australian income and wealth data
The number of inversions of permutations with fixed shape
Rowmotion in slow motion
The height distribution in root systems
Structured decentralized control of positive systems with applications to combination drug therapy and leader selection in directed networks
Sparse Polynomial Chaos Expansions via Compressed Sensing and D-optimal Design
The Multilinear Structure of ReLU Networks
Learning Deep and Compact Models for Gesture Recognition
Enumeration of Unsensed Orientable Maps on Surfaces of a Given Genus
Secure Transmission and Self-Energy Recycling for Wireless-Powered Relay Systems with Partial Eavesdropper Channel State Information
Exploring the significance of using perceptually relevant image decolorization method for scene classification
Secret Sharing for Cloud Data Security
Non-linear motor control by local learning in spiking neural networks
Estimation under group actions: recovering orbits from invariants
Polyp detection inside the capsule endoscopy: an approach for power consumption reduction
Diffusion-approximation for a kinetic equation with perturbed velocity redistribution process
RedDwarfData: a simplified dataset of StarCraft matches
Nonlinear Opinion Dynamics in Systems with Leadership Effect
Controlled trapping of single particle states on a periodic substrate by deterministic stubbing
Detecting Cross-Lingual Plagiarism Using Simulated Word Embeddings
Ratchet Effect in the Quantum Kicked Rotor and its Destruction by Anderson Localization
Quantum Lower Bound for a Tripartite Version of the Hidden Shift Problem
Interesting Paths in the Mapper
The graphs of projective codes
Asymptotic period of an aperiodic Markov chain
Metascheduling of HPC Jobs in Day-Ahead Electricity Markets
Dense Fully Convolutional Network for Skin Lesion Segmentation
Learning Deep Similarity Models with Focus Ranking for Fabric Image Retrieval
ScanComplete: Large-Scale Scene Completion and Semantic Segmentation for 3D Scans
Fluctuation symmetry leads to GENERIC equations with non-quadratic dissipation
On Asymptotic Analysis of Zero-Delay Energy-Distortion Tradeoff Under Additive White Gaussian Noise
Quantum secret sharing for a multipartite system under energy dissipation
How to Charge Lightning
Scalable Multi-Domain Dialogue State Tracking
Deep Learning Interior Tomography for Region-of-Interest Reconstruction
Spectral analysis for non-stationary audio
Second order BSDE under monotonicity condition and liquidation problem under uncertainty *
A new McKean-Vlasov stochastic interpretation of the parabolic-parabolic Keller-Segel model: The one-dimensional case
Optimal Lower Bounds for Sketching Graph Cuts
The flow equations of linear resistive electrical networks
Improved Online Algorithm for Weighted Flow Time
Time-periodic Evans approach to weak KAM theory
Boosting the Actor with Dual Critic
Large-Scale Experiment on the Importance of Social Learning and Unimodality in the Wisdom of the Crowd
Smoothed Dual Embedding Control
Communications and Control for Wireless Drone-Based Antenna Array
Compute–Forward Multiple Access (CFMA): Practical Code Design
Wiretap and Gelfand-Pinsker Channels Analogy and its Applications
Methods for Detecting Paraphrase Plagiarism
Graded Expectations: Betti numbers and anti-lecture hall compositions of random threshold graphs
Mean field matching and TSP in pseudo-dimension 1
Identifiability of two-component skew normal mixtures with one known component
Network Deployment for Maximal Energy Efficiency in Uplink with Multislope Path Loss
Cyclic descents for near-hook and two-row shapes
Characterizing optimal hierarchical policy inference on graphs via non-equilibrium thermodynamics
Personal Names in Modern Turkey
Deep Reinforcement Learning for Unsupervised Video Summarization with Diversity-Representativeness Reward
Deformable GANs for Pose-based Human Image Generation
f-Divergence constrained policy improvement
A simple mathematical model for unemployment: a case study in Portugal with optimal control
The CAPIO 2017 Conversational Speech Recognition System
Dendritic error backpropagation in deep cortical microcircuits
Normally hyperbolic surfaces based finite-time transient stability monitoring of power system dynamics
Sum of squares certificates for stability of planar, homogeneous, and switched systems
Bidirectional Attention for SQL Generation
Face Synthesis from Visual Attributes via Sketch using Conditional VAEs and GANs
On optimal periodic dividend and capital injection strategies for spectrally negative Lévy models
Towards automated patient data cleaning using deep learning: A feasibility study on the standardization of organ labeling
A PDE-based log-agnostic illumination correction algorithm
A Compare-Propagate Architecture with Alignment Factorization for Natural Language Inference
An ISIS screening approach involving threshold/partition for variable selection in linear regression
Content Placement in Cache Networks Using Graph-Coloring
Finite field analogue of restriction theorem for general measures
Inverting non-invertible trees
Towards co-evolution of fitness predictors and Deep Neural Networks
Asymptotic expansion of Skorohod integrals
Resource Allocation for Downlink NOMA Systems: Key Techniques and Open Issues
Transversal magnetotransport in Weyl semimetals: Exact numerical approach
On the structure of zero-sum free set with minimum subset sums in abelian groups
Frequency-driven market mechanisms for optimal dispatch in power networks
Gaining power in multiple testing of interval hypotheses via conditionalization
Dynamic Interference Steering in Heterogeneous Cellular Networks
Inverse Exponential Decay: Stochastic Fixed Point Equation and ARMA Models
Adaptive Sign Error Control
On the uniqueness of solutions to quadratic BSDEs with non-convex generators
Does the Cross-Talk Between Nonlinear Modes Limit the Performance of NFDM Systems?
On the cone of $f$-vectors of cubical polytopes
The origins of Zipf’s meaning-frequency law
Robust Multistage Optimization under Regime Switching
PAC-Bayesian Margin Bounds for Convolutional Neural Networks – Technical Report
The Allocation of a Variable Series Reactor Considering AC Constraints and Contingencies
New robust confidence intervals for the mean under dependence
n-Arc Connected Graphs
A Real-time and Registration-free Framework for Dynamic Shape Instantiation
Point Divergence Gain and Multidimensional Data Sequences Analysis
A dynamic network model with persistent links and node-specific latent variables, with an application to the interbank market
Fractional Local Neighborhood Intensity Pattern for Image Retrieval using Genetic Algorithm
Coefficients of Gaussian Polynomials Modulo $N$
A Unified Method for First and Third Person Action Recognition
Efficiently Enumerating all Maximal Cliques with Bit-Parallelism
Molecular enhanced sampling with autoencoders: On-the-fly collective variable discovery and accelerated free energy landscape exploration
The $Z$-Dirac and massive Laplacian operators in the $Z$-invariant Ising model
Spatio-temporal models with space-time interaction and their applications to air pollution data
Benford’s Law Beyond Independence: Tracking Benford Behavior in Copula Models
Learning Continuous User Representations through Hybrid Filtering with doc2vec
Crowd Simulation Model Integrating ‘Physiology-Psychology-Physics’ Factors
Game-theoretic Network Centrality: A Review
Limitation of SDMA in Ultra-Dense Small Cell Networks
Integrating semi-supervised label propagation and random forests for multi-atlas based hippocampus segmentation
Transfer learning for diagnosis of congenital abnormalities of the kidney and urinary tract in children based on Ultrasound imaging data
On the maximum of the permanent of (I-A)
Mean-Square Approximation of Multiple Ito and Stratonovich Stochastic Integrals from the Taylor-Ito and Taylor-Stratonovich Expansions, Using Legendre Polynomials
Stabilization of the weakly coupled wave-plate system with one internal damping
Unstable modes in projection-based reduced-order models: How many can there be, and what do they tell you?
Deterministic Computations on a PRAM with Static Processor and Memory Faults
Uniform modular lattice and Euclidean building
A Robust Bayesian Exponentially Tilted Empirical Likelihood Method
GPU Acceleration of a High-Order Discontinuous Galerkin Incompressible Flow Solver
Tiling enumeration of doubly-intruded halved hexagons
A New Approach for Measuring Sentiment Orientation based on Multi-Dimensional Vector Space
Context aware saliency map generation using semantic segmentation
Distributed Observers Design for Leader-Following Control of Multi-Agent Networks (Extended Version)
PolicySpace: a modeling platform
First-Order Primal-Dual Augmented Lagrangian Method for Nonlinear Cone Constrained Composite Convex Optimization
Interactive Video Object Segmentation in the Wild
A Hierarchical Multivariate Spatio-Temporal Model for Large Clustered Climate data with Annual Cycles
Partial quasi likelihood analysis
Using Deep Neural Network Approximate Bayesian Network
Restricted Boltzmann Machines for Robust and Fast Latent Truth Discovery
Boolean Dimension, Components and Blocks
Deep Stacked Networks with Residual Polishing for Image Inpainting
A generalized Bartholdi zeta function formula for simple graphs with bounded degree
Graph cubeahedra and graph associahedra in toric topology
Time-Aware Publish/Subscribe for Networks of Mobile Devices
On Binary Distributed Hypothesis Testing
Approximating Node-Weighted k-MST on Planar Graphs
Symmetric double bubbles in the Grushin plane
Pull and Push&Pull in Random Evolving Graphs
Towards Building an Intelligent Anti-Malware System: A Deep Learning Approach using Support Vector Machine (SVM) for Malware Classification
Low-Cost Bayesian Inference for Additive Approximate Gaussian Process
Blockers for Triangulations of a Convex Polygon and a Geometric Maker-Breaker Game
Construction of the quasi-potential for linear SDEs using false quasi-potentials and a geometric recursion
Reconstruction of the Path Graph
ZOOpt/ZOOjl: Toolbox for Derivative-Free Optimization
Confidence set for group membership
Quickest drift change detection in Lévy-type force of mortality model
Limit points of subsequences
To Wait or Not to Wait: Two-way Functional Hazards Model for Understanding Waiting in Call Centers
Adversarial Generative Nets: Neural Network Attacks on State-of-the-Art Face Recognition
How will the Internet of Things enable Augmented Personalized Health?
SenseNet: 3D Objects Database and Tactile Simulator
Estimation and Inference of Treatment Effects with $L_2$-Boosting in High-Dimensional Settings
Broadcasting Spanning Forests on a Multiple-Access Channel
Tropical geometry of genus two curves
Ensemble Estimation of Large Sparse Covariance Matrix Based on Modified Cholesky Decomposition
A clustering method for misaligned curves
Diversity Analysis of Millimeter-Wave Massive MIMO Systems
Rate of convergence in periodic homogenization of Hamilton-Jacobi equations: the convex setting
Theoretical Analysis of Sparse Subspace Clustering with Missing Entries
Generalized Compression Strategy for the Downlink Cloud Radio Access Network
Scalable Hash-Based Estimation of Divergence Measures
Computation of Maximal Determinants of Binary Circulant Matrices
Value Functions and Optimality Conditions for Nonconvex Variational Problems with an Infinite Horizon in Banach Spaces
Reduced Dimensional Optimal Vector Linear Index Codes for Index Coding Problems with Symmetric Neighboring and Consecutive Side-information
PronouncUR: An Urdu Pronunciation Lexicon Generator
Enhanced ${q}$-Least Mean Square
Hitting Time Quasi-metric and Related Metric Structures
Semantic Segmentation of Human Thigh Quadriceps Muscle in Magnetic Resonance Images
Permutations with small maximal $k$-consecutve sums
Directional Modulation Design Based on Crossed-Dipole Arrays for Two Signals With Orthogonal Polarisations
Sanskrit Sandhi Splitting using $\pmb{seq2(seq)^2}$
Ultra-Reliable Cooperative Short-Packet Communications with Wireless Energy Transfer
Inference on Weibull Parameters Under a Balanced Two Sample Type-II Progressive Censoring Scheme
Analysis and Code Design for the Binary CEO Problem under Logarithmic Loss
On eigenfunctions and maximal cliques of Paley graphs of square order
UAV-Enabled Aerial Base Station (BS) III/III: Capacity Characterization of UAV-Enabled Two-User Broadcast Channel
UAV-Enabled Aerial Base Station (BS) II/III: Common Throughput Maximization in UAV-Enabled Multiuser OFDMA Systems with Delay Consideration
Facial emotion recognition using min-max similarity classifier
Automated rating of recorded classroom presentations using speech analysis in kazakh
Quality assessment metrics for edge detection and edge-aware filtering: A tutorial review
Automated image segmentation for detecting cell spreading for metastasizing assessments of cancer development
Kramers-Kronig relations and the properties of conductivity and permittivity in heterogeneous media
Phase Transition in Taxi Dynamics and Impact of Ridesharing
Comparative Analysis of Human Movement Prediction: Space Syntax and Inverse Reinforcement Learning
An approximate Jerusalem square whose side equals a Pell number
Script Identification in Natural Scene Image and Video Frame using Attention based Convolutional-LSTM Network
Anti-Ramsey Multiplicities
Aggregated Channels Network for Real-Time Pedestrian Detection
The Cyclic Douglas-Rachford Algorithm with r-sets-Douglas-Rachford Operators
Rigorous results for the distribution of money on connected graphs
On the tensor rank of $3\times 3$ permanent and determinant
Hereditary Semiorders and Enumeration of Semiorders by Dimension
Structure of the flow and Yamada polynomials of cubic graphs
Optimal Stochastic Management of Distributed Energy Storage Embedded with Wind Farms
On the strong ratio limit property for random walks
Towards Practical Conditional Risk Minimization
Depth-Adaptive Computational Policies for Efficient Visual Tracking
An elementary derivation of the Chinese restaurant process from Sethuraman’s stick-breaking process
Local Causal States and Discrete Coherent Structures
Statistical and Computational Limits for Sparse Matrix Detection
Robust comparisons of variation using ratios of interquantile ranges
Learning Deep Structured Multi-Scale Features using Attention-Gated CRFs for Contour Prediction
Freeform Assembly Planning
Bayesian Tabulation Audits: Explained and Extended
M2: Malleable Metal as a Service
Approximations and Limit Theorems for Discrete-Time Occupancy Processes
Unsupervised Object-Level Video Summarization with Online Motion Auto-Encoder
A Machine Learning Approach to Adaptive Covariance Localization
Sketching and Clustering Metric Measure Spaces
Performance Limits with Additive Error Metrics in Noisy Multi-Measurement Vector Problem
Did you hear that? Adversarial Examples Against Automatic Speech Recognition
A modified subgradient extragradient method for solving the variational inequality problem
Block Diagonalization Type Precoding Algorithms for IEEE 802.11ac Systems
Parameter estimation with a class of outer probability measures
Detection and estimation of partially-observed dynamical systems: an outer-measure approach
Tail empirical process and a weighted extreme value index estimator for randomly right-censored data
The variational discretizaton of the constrained higher-order Lagrange-Poincaré equations
A Hopf-Lax splitting approximation for semilinear parabolic PDEs with convex and quadratic growth gradients
Co-Clustering via Information-Theoretic Markov Aggregation
Unions of Orthogonal Arrays and their aberrations via Hilbert bases
Performance Analysis of Dynamic Channel Bonding in Spatially Distributed High Density WLANs
Accurate reconstruction of image stimuli from human fMRI based on the decoding model with capsule network architecture
Scene-Adapted Plug-and-Play Algorithm with Guaranteed Convergence: Applications to Data Fusion in Imaging
Secrecy Capacity-Memory Tradeoff of Erasure Broadcast Channels
Interactive Decomposition Multi-Objective Optimization via Progressively Learned Value Functions
Skewed Lorentzian pulses and exponential frequency power spectra
On Nim-like games whose Sprague-Grundy functions are the same
Input to State Stability of Bipedal Walking Robots: Application to DURUS
FKG (and other inequalities) via (generalized) FK representation (and iterated folding)
Observability of Boolean Networks via Set Controllability Approach
An Attentive Sequence Model for Adverse Drug Event Extraction from Biomedical Text
Character-level Recurrent Neural Networks in Practice: Comparing Training and Sampling Schemes
High Dimensional Spaces, Deep Learning and Adversarial Examples
Image denoising through bivariate shrinkage function in framelet domain
Transferable neural networks for enhanced sampling of protein dynamics
Triangle-mapping Analysis on Spatial Competition and Cooperation of Chinese Cities
Distributed Control and Stabilization for Discrete-time Large Scale Systems With Imposed Constraints
Heat kernels of non-symmetric jump processes with exponentially decaying jumping kernel
A Sharp Estimate for Probability Distributions
Random Euler Complex-Valued Nonlinear Filters
A novel improved fuzzy support vector machine based stock price trend forecast model
The sequential loss of allelic diversity
Risk minimization in life-cycle oil production optimization
Learning audio and image representations with bio-inspired trainable feature extractors
DeepMind Control Suite
Denoising Adversarial Autoencoders: Classifying Skin Lesions Using Limited Labelled Training Data
Restricted Deformable Convolution based Road Scene Semantic Segmentation Using Surround View Cameras
Exact Soft-Covering Exponent
Computing Hitting Set Kernels By AC^0-Circuits
A crossing lemma for multigraphs
Deep Learning for Identifying Potential Conceptual Shifts for Co-creative Drawing
Subdifferential formulae for the supremum of an arbitrary family of functions
Forcing Brushes
Complexity Theory, Game Theory, and Economics
Variable selection in Functional Additive Regression Models
Even cycle creating paths
Large Flocks of Small Birds: On the Minimal Size of Population Protocols
Um Sistema Multiagente no Combate ao Braqueamento de Capitais
Simplicial faces of the set of correlation matrices
Fundamental Latency Limits for D2D-Aided Content Delivery in Fog Wireless Networks
The cover time of a biased random walk on a random cubic graph
Singular perturbations of Ornstein-Uhlenbeck processes: integral estimates and Girsanov densities
Cautionary note on ‘Semiparametric modeling of grouped current duration data with preferential reporting”

Advertisements