Anomaly Detection in Partially Observed Traffic Networks

This paper addresses the problem of detecting anomalous activity in traffic networks where the network is not directly observed. Given knowledge of what the node-to-node traffic in a network should be, any activity that differs significantly from this baseline would be considered anomalous. We propose a Bayesian hierarchical model for estimating the traffic rates and detecting anomalous changes in the network. The probabilistic nature of the model allows us to perform statistical goodness-of-fit tests to detect significant deviations from a baseline network. We show that due to the more defined structure of the hierarchical Bayesian model, such tests perform well even when the empirical models estimated by the EM algorithm are misspecified. We apply our model to both simulated and real datasets to demonstrate its superior performance over existing alternatives.


Where are we now? A large benchmark study of recent symbolic regression methods

In this paper we provide a broad benchmarking of recent genetic programming approaches to symbolic regression in the context of state of the art machine learning approaches. We use a set of nearly 100 regression benchmark problems culled from open source repositories across the web. We conduct a rigorous benchmarking of four recent symbolic regression approaches as well as nine machine learning approaches from scikit-learn. The results suggest that symbolic regression performs strongly compared to state-of-the-art gradient boosting algorithms, although in terms of running times is among the slowest of the available methodologies. We discuss the results in detail and point to future research directions that may allow symbolic regression to gain wider adoption in the machine learning community.


Identifying and Alleviating Concept Drift in Streaming Tensor Decomposition

Tensor decompositions are used in various data mining applications from social network to medical applications and are extremely useful in discovering latent structures or concepts in the data. Many real-world applications are dynamic in nature and so are their data. To deal with this dynamic nature of data, there exist a variety of online tensor decomposition algorithms. A central assumption in all those algorithms is that the number of latent concepts remains fixed throughout the en- tire stream. However, this need not be the case. Every incoming batch in the stream may have a different number of latent concepts, and the difference in latent concepts from one tensor batch to another can provide insights into how our findings in a particular application behave and deviate over time. In this paper, we define ‘concept’ and ‘concept drift’ in the context of streaming tensor decomposition, as the manifestation of the variability of latent concepts throughout the stream. Furthermore, we introduce SeekAndDestroy, an algorithm that detects concept drift in streaming tensor decomposition and is able to produce results robust to that drift. To the best of our knowledge, this is the first work that investigates concept drift in streaming tensor decomposition. We extensively evaluate SeekAndDestroy on synthetic datasets, which exhibit a wide variety of realistic drift. Our experiments demonstrate the effectiveness of SeekAndDestroy, both in the detection of concept drift and in the alleviation of its effects, producing results with similar quality to decomposing the entire tensor in one shot. Additionally, in real datasets, SeekAndDestroy outperforms other streaming baselines, while discovering novel useful components.


Quickest Search for a Change Point

This paper considers a sequence of random variables generated according to a common distribution. The distribution might undergo periods of transient changes at an unknown set of time instants, referred to as change-points. The objective is to sequentially collect measurements from the sequence and design a dynamic decision rule for the quickest identification of one change-point in real time, while, in parallel, the rate of false alarms is controlled. This setting is different from the conventional change-point detection settings in which there exists at most one change-point that can be either persistent or transient. The problem is considered under the minimax setting with a constraint on the false alarm rate before the first change occurs. It is proved that the Shewhart test achieves exact optimality under worst-case change points and also worst-case data realization. Numerical evaluations are also provided to assess the performance of the decision rule characterized.


Seq2Seq-Vis: A Visual Debugging Tool for Sequence-to-Sequence Models

Neural Sequence-to-Sequence models have proven to be accurate and robust for many sequence prediction tasks, and have become the standard approach for automatic translation of text. The models work in a five stage blackbox process that involves encoding a source sequence to a vector space and then decoding out to a new target sequence. This process is now standard, but like many deep learning methods remains quite difficult to understand or debug. In this work, we present a visual analysis tool that allows interaction with a trained sequence-to-sequence model through each stage of the translation process. The aim is to identify which patterns have been learned and to detect model errors. We demonstrate the utility of our tool through several real-world large-scale sequence-to-sequence use cases.


Reliability based-design optimization using the directional bat algorithm

Reliability based design optimization (RBDO) problems are important in engineering applications, but it is challenging to solve such problems. In this study, a new resolution method based on the directional Bat Algorithm (dBA) is presented. To overcome the difficulties in the evaluations of probabilistic constraints, the reliable design space concept has been applied to convert the yielded stochastic constrained optimization problem from the RBDO formulation into a deterministic constrained optimization problem. In addition, the constraint handling technique has also been introduced to the dBA so that the algorithm can solve constrained optimization problem effectively. The new method has been applied to several engineering problems and the results show that the new method can solve different varieties of RBDO problems efficiently. In fact, the obtained solutions are consistent with the best results in the literature.


A Visual Distance for WordNet

Measuring the distance between concepts is an important field of study of Natural Language Processing, as it can be used to improve tasks related to the interpretation of those same concepts. WordNet, which includes a wide variety of concepts associated with words (i.e., synsets), is often used as a source for computing those distances. In this paper, we explore a distance for WordNet synsets based on visual features, instead of lexical ones. For this purpose, we extract the graphic features generated within a deep convolutional neural networks trained with ImageNet and use those features to generate a representative of each synset. Based on those representatives, we define a distance measure of synsets, which complements the traditional lexical distances. Finally, we propose some experiments to evaluate its performance and compare it with the current state-of-the-art.


DeepTriangle: A Deep Learning Approach to Loss Reserving

We propose a novel approach for loss reserving based on deep neural networks. The approach allows for jointly modeling of paid losses and claims outstanding, and incorporation of heterogenous inputs. We validate the models on loss reserving data across lines of business, and show that they attain or exceed the predictive accuracy of existing stochastic methods. The models require minimal feature engineering and expert input, and can be automated to produce forecasts at a high frequency.


Generalized Gaussian Kernel Adaptive Filtering

The present paper proposes generalized Gaussian kernel adaptive filtering, where the kernel parameters are adaptive and data-driven. The Gaussian kernel is parametrized by a center vector and a symmetric positive definite (SPD) precision matrix, which is regarded as a generalization of the scalar width parameter. These parameters are adaptively updated on the basis of a proposed least-square-type rule to minimize the estimation error. The main contribution of this paper is to establish update rules for precision matrices on the SPD manifold in order to keep their symmetric positive-definiteness. Different from conventional kernel adaptive filters, the proposed regressor is a superposition of Gaussian kernels with all different parameters, which makes such regressor more flexible. The kernel adaptive filtering algorithm is established together with a l1-regularized least squares to avoid overfitting and the increase of dimensionality of the dictionary. Experimental results confirm the validity of the proposed method.


Learnable Histogram: Statistical Context Features for Deep Neural Networks

Statistical features, such as histogram, Bag-of-Words (BoW) and Fisher Vector, were commonly used with hand-crafted features in conventional classification methods, but attract less attention since the popularity of deep learning methods. In this paper, we propose a learnable histogram layer, which learns histogram features within deep neural networks in end-to-end training. Such a layer is able to back-propagate (BP) errors, learn optimal bin centers and bin widths, and be jointly optimized with other layers in deep networks during training. Two vision problems, semantic segmentation and object detection, are explored by integrating the learnable histogram layer into deep networks, which show that the proposed layer could be well generalized to different applications. In-depth investigations are conducted to provide insights on the newly introduced layer.


Named Entities troubling your Neural Methods? Build NE-Table: A neural approach for handling Named Entities
QANet: Combining Local Convolution with Global Self-Attention for Reading Comprehension
The Future of Prosody: It’s about Time
Cooperative Routing for an Air-Ground Vehicle Team — Exact Algorithm, Transformation Method, and Heuristics
On the Secrecy Capacity of a Full-Duplex Wirelessly Powered Communication System in the Presence of a Passive Eavesdropper
Lagrangian formulation for mixed traffic flow including two-wheelers
Automatic speech recognition for launch control center communication using recurrent neural networks with data augmentation and custom language model
Stochastic Conditional Gradient Methods: From Convex Minimization to Submodular Maximization
Robust Video Content Alignment and Compensation for Clear Vision Through the Rain
Feedback Synthesis For Underactuated Systems Using Sequential Second-Order Needle Variations
MaskFusion: Real-Time Recognition, Tracking and Reconstruction of Multiple Moving Objects
The quantitative measure and statistical distribution of fame
The Convergence rate of the Gibbs sampler for the 2-D Ising model by geometric bound
Automated Mouse Organ Segmentation: A Deep Learning Based Solution
Secrecy Analysis of Physical Layer over $κ-μ$ Shadowed Fading Scenarios
On the construction of sparse matrices from expander graphs
Unified approaches based effective capacity analysis over composite $α-η-μ$/gamma fading channels
On Learning Sparsely Used Dictionaries from Incomplete Samples
Useful Criteria on Limit Theorems for Certain Markov Chains
ImVerde: Vertex-Diminished Random Walk for Learning Network Representation from Imbalanced Data
Hybrid LISA for Wideband Multiuser Millimeter Wave Communication Systems under Beam Squint
How Diverse Users and Activities Trigger Connective Action via Social Media: Lessons from the Twitter Hashtag Campaign #ILookLikeAnEngineer
Post-processing multi-ensemble temperature and precipitation forecasts through an Exchangeable Gamma Normal model and its Tobit extension
Fine-grained Video Classification and Captioning
A Sparse Coding Multi-Scale Precise-Timing Machine Learning Algorithm for Neuromorphic Event-Based Sensors
Semi-Supervised Learning with Declaratively Specified Entropy Constraints
Reconfiguration of graph minors
Modelling corporate defaults: A Markov-switching Poisson log-linear autoregressive model
Commonsense mining as knowledge base completion? A study on the impact of novelty
Reference Governors and Maximal Output Admissible Sets for Linear Periodic Systems
BlendCAC: A BLockchain-ENabled Decentralized Capability-based Access Control for IoTs
Opening the black box of neural nets: case studies in stop/top discrimination
Segmentation-Free Approaches for Handwritten Numeral String Recognition
Test for Incremental Value of New Biomarkers Based on OR Rules
Economic inequality and Islamic Charity: An exploratory agent-based modeling approach
Estimation and inference of domain means subject to shape constraints
A Closer Look at Weak Label Learning for Audio Events
The set of dimensions for which there are no linear perfect 2-error-correcting Lee codes has positive density
An Extragradient-type Algorithm for Variational Inequality on Hadamard Manifolds
Joint Channel Estimation and User Grouping for FDD-Massive MIMO Systems
Recent Progresses in Deep Learning based Acoustic Models (Updated)
Gender Bias in Coreference Resolution
Disentangling and Assessing Uncertainties in Multiperiod Corporate Default Risk Predictions
Real-Time Inference of User Types to Assist with More Inclusive Social Media Activism Campaigns
Cross-Entropy Based Importance Sampling for Stochastic Simulation Models
Ambient Backscatter Systems: Exact Average Bit Error Rate under Fading Channels
Vulnerability Analysis of Smart Grids to GPS Spoofing
Calibrated zero-norm regularized LS estimator for high-dimensional error-in-variables regression
Deep Learning for Predicting Asset Returns
Extending Drawings of Graphs to Arrangements of Pseudolines
Hierarchical RNN for Information Extraction from Lawsuit Documents
Robust Anomaly-Based Ship Proposals Detection from Pan-sharpened High-Resolution Satellite Image
Object Tracking in Satellite Videos Based on a Multi-Frame Optical Flow Tracker
Processing Database Joins over a Shared-Nothing System of Multicore Machines
Multi-focus Noisy Image Fusion using Low-Rank Representation
Jointly Robust Prior for Gaussian Stochastic Process in Emulation, Calibration and Variable Selection
Spanning trees with at most 4 leaves in $K_{1,5}-$free graphs
Wireless Quantization Index Modulation: Enabling Communication Through Existing Signals
Learning a Discriminative Feature Network for Semantic Segmentation
A Note on Roman \{2\}-domination problem in graphs
Distribution-based objectives for Markov Decision Processes
Adaptation and Re-Identification Network: An Unsupervised Deep Transfer Learning Approach to Person Re-Identification
Stability Properties of Systems of Linear Stochastic Differential Equations with Random Coefficients
Maximum incremental (minimum decremental) ratio and one-sided RTS in FDH production technologies
Age-Optimal Trajectory Planning for UAV-Assisted Data Collection
Analysis of Indoor Uplink Optical Communication Positioning System Exploiting Multipath Reflections
Energy Internet: Enablers and Building Blocks
Driving Policy Transfer via Modularity and Abstraction
Iterative thresholding algorithm based on non-convex method for modified lp-norm regularization minimization
A quasi linear-time b-Matching algorithm on distance-hereditary graphs and bounded split-width graphs
Transient Stability Analysis of Grid- Connected Converters with Power Synchronization Control
Quantitative Susceptibility Map Reconstruction Using Annihilating Filter-based Low-Rank Hankel Matrix Approach
Convolutional Generative Adversarial Networks with Binary Neurons for Polyphonic Music Generation
3D Consistent & Robust Segmentation of Cardiac Images by Deep Learning with Spatial Propagation
Generative Temporal Models with Spatial Memory for Partially Observed Environments
On nonparametric inference for spatial regression models under domain expanding and infill observations
Probabilistic Plant Modeling via Multi-View Image-to-Image Translation
The use of a pruned modular decomposition for Maximum Matching algorithms on some graph classes
Stable-Matching Voronoi Diagrams: Combinatorial Complexity and Algorithms
Movie Question Answering: Remembering the Textual Cues for Layered Visual Contents
A Note on Kernel Methods for Multiscale Systems with Critical Transitions
Path-dependent Martingale Problems and Additive Functionals
The Dispersion of the Gauss-Markov Source
Compositional Equivalence with actor attributes: Positional analysis of the the Florentine Families network
Weakly-Supervised Learning-Based Feature Localization in Confocal Laser Endomicroscopy Glioma Images
Optimal control of an age-structured problem modelling mosquito plasticity
Der Trusted Connector im Industrial Data Space
Extensor-Coding
Normal edge-colorings of cubic graphs
Critical properties of the antiferromagnetic Ising model on rewired square lattices
Gastineau-Hills’ quasi-Clifford algebras and plug-in constructions for Hadamard matrices
Nonnegative Polynomials and Circuit Polynomials
Dynamic Few-Shot Visual Learning without Forgetting
Analytical Modeling of Vanishing Points and Curves in Catadioptric Cameras
Structured Deep Neural Network Pruning by Varying Regularization Parameters
A simplicial groupoid for plethysm
Optimized Resource Provisioning and Operation Control for Low-power Wide-area IoT Networks
Intelligent Physiotherapy Through Procedural Content Generation
Zigzag Learning for Weakly Supervised Object Detection
Price of Anarchy for Mechanisms with Risk-Averse Agents
Recovery of spectrum from estimated covariance matrices and statistical kernels for machine learning and big data
Stratified Negation in Limit Datalog Programs
Bribery Games on Interdependent Complex Networks
Information diffusion backbones in temporal networks
Congruences on sums of super Catalan numbers
RIFT: Multi-modal Image Matching Based on Radiation-invariant Feature Transform
On Optimizing Distributed Tucker Decomposition for Sparse Tensors
Putin’s peaks: Russian election data revisited
Estimation with Low-Rank Time-Frequency Synthesis Models
Fault Detection and Isolation of Satellite Gyroscopes Using Relative Positions in Formation Flying
Stochastic spikes and Poisson Approximation of one-dimensional stochastic differential equations with applications to continuously measured Quantum Systems
Unsupervised Disentangled Representation Learning with Analogical Relations
Generalized Fast Decoding of Polar Codes
A new lower bound for the size of an affine blocking set
Fair Division Under Cardinality Constraints
Strong Baselines for Neural Semi-supervised Learning under Domain Shift
Divergence of non-random fluctuation in First Passage Percolation
Hand Pose Estimation via Latent 2.5D Heatmap Regression
Deep Convolutional AutoEncoder-based Lossy Image Compression
Fast parallel multidimensional FFT using advanced MPI
Cross-media Multi-level Alignment with Relation Attention Network
Applying Faster R-CNN for Object Detection on Malaria Images
SegMap: 3D Segment Mapping using Data-Driven Descriptors
On the characterization of the controllability property for linear control systems on nonnilpotent, solvable three-dimensional Lie groups
Symmetric Bilinear Regression for Signal Subgraph Estimation
The Intermediate Disorder Regime for Brownian Directed Polymers in Poisson Environment
Intermittent collective dynamics of domain walls in the creep regime
On some generalized equations with metrically C-increasing mappings: solvability and error bounds with applications to optimization
Unsupervised Domain Adaptation with Adversarial Residual Transform Networks
Evaluating Low-Power Wireless Cyber-Physical Systems
Linear System Identification in a Nonlinear Setting – Nonparametric analysis of the nonlinear distortions and their impact on the best linear approximation
Estimating the Expected Value of Sample Information across Different Sample Sizes using Moment Matching and Non-Linear Regression
Speaker-independent raw waveform model for glottal excitation
Structures in Additive Sequences
On The Complexity of Sparse Label Propagation
When is there a Representer Theorem? Nondifferentiable Regularisers and Banach spaces
t-DCF: a Detection Cost Function for the Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification
Charades-Ego: A Large-Scale Dataset of Paired Third and First Person Videos
Actor and Observer: Joint Modeling of First and Third-Person Videos
Convergence guarantees for a class of non-convex and non-smooth optimization problems
A Dataset of Peer Reviews (PeerRead): Collection, Insights and NLP Applications
Structure Discrimination in Block-Oriented Models Using Linear Approximations: A Theoretic Framework
A note on the efficiency of position mechanisms with budget constraints
Automatic Cropping Fingermarks: Latent Fingerprint Segmentation
Personalized Language Model for Query Auto-Completion
DisguiseNet : A Contrastive Approach for Disguised Face Verification in the Wild
Artificial Intelligence-Based Techniques for Emerging Robotics Communication: A Survey and Future Perspectives
Flow Equilibria via Online Surge Pricing
Improved Algorithms for Adaptive Compressed Sensing
Optimal Virtualization Framework for Cellular Networks with Downlink Rate Coverage Probability Constraints
Energy-based Stabilization of Network Flows in Multi-machine Power Systems
The small-mass limit and white-noise limit of an infinite dimensional Generalized Langevin Equation
Power of $d$ Choices with Simple Tabulation
Joint Energy and SINR Coverage in Spatially Clustered RF-powered IoT Network
Fast View Synthesis with Deep Stereo Vision
Surveillance Face Recognition Challenge
Factors Influencing the Surprising Instability of Word Embeddings
Towards Fast Computation of Certified Robustness for ReLU Networks
Automorphism related parameters of a graph associated to a finite vector space
Memory effect and phase transition in a hierarchical trap model for spin glass
Transitive PSL(2,11)-invariant k-arcs in PG(4,q)
A Combinatorial Approach to Rauzy-type Dynamics III: The Sliding Dynamics, Diameter and Algorithm

Advertisements