id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
2106.12340
Andreea Iana
Andreea Iana, Heiko Paulheim
GraphConfRec: A Graph Neural Network-Based Conference Recommender System
Accepted at the Joint Conference on Digital Libraries (JCDL 2021)
2021 ACM/IEEE Joint Conference on Digital Libraries (JCDL), 2021, pp. 90-99
10.1109/JCDL52503.2021.00021
null
cs.IR cs.DL cs.LG
http://creativecommons.org/licenses/by/4.0/
In today's academic publishing model, especially in Computer Science, conferences commonly constitute the main platforms for releasing the latest peer-reviewed advancements in their respective fields. However, choosing a suitable academic venue for publishing one's research can represent a challenging task considering the plethora of available conferences, particularly for those at the start of their academic careers, or for those seeking to publish outside of their usual domain. In this paper, we propose GraphConfRec, a conference recommender system which combines SciGraph and graph neural networks, to infer suggestions based not only on title and abstract, but also on co-authorship and citation relationships. GraphConfRec achieves a recall@10 of up to 0.580 and a MAP of up to 0.336 with a graph attention network-based recommendation model. A user study with 25 subjects supports the positive results.
[ { "version": "v1", "created": "Wed, 23 Jun 2021 12:10:40 GMT" } ]
2022-03-14T00:00:00
[ [ "Iana", "Andreea", "" ], [ "Paulheim", "Heiko", "" ] ]
new_dataset
0.997538
2110.08518
Lei Cui
Junlong Li, Yiheng Xu, Lei Cui, Furu Wei
MarkupLM: Pre-training of Text and Markup Language for Visually-rich Document Understanding
ACL 2022
null
null
null
cs.CL
http://creativecommons.org/licenses/by-nc-sa/4.0/
Multimodal pre-training with text, layout, and image has made significant progress for Visually Rich Document Understanding (VRDU), especially the fixed-layout documents such as scanned document images. While, there are still a large number of digital documents where the layout information is not fixed and needs to be interactively and dynamically rendered for visualization, making existing layout-based pre-training approaches not easy to apply. In this paper, we propose MarkupLM for document understanding tasks with markup languages as the backbone, such as HTML/XML-based documents, where text and markup information is jointly pre-trained. Experiment results show that the pre-trained MarkupLM significantly outperforms the existing strong baseline models on several document understanding tasks. The pre-trained model and code will be publicly available at https://aka.ms/markuplm.
[ { "version": "v1", "created": "Sat, 16 Oct 2021 09:17:28 GMT" }, { "version": "v2", "created": "Fri, 11 Mar 2022 15:38:07 GMT" } ]
2022-03-14T00:00:00
[ [ "Li", "Junlong", "" ], [ "Xu", "Yiheng", "" ], [ "Cui", "Lei", "" ], [ "Wei", "Furu", "" ] ]
new_dataset
0.982959
2111.00585
Pulkit Verma
Naman Shah, Pulkit Verma, Trevor Angle, Siddharth Srivastava
JEDAI: A System for Skill-Aligned Explainable Robot Planning
AAAMS 2022 (Demonstration Track)
null
null
null
cs.AI cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents JEDAI, an AI system designed for outreach and educational efforts aimed at non-AI experts. JEDAI features a novel synthesis of research ideas from integrated task and motion planning and explainable AI. JEDAI helps users create high-level, intuitive plans while ensuring that they will be executable by the robot. It also provides users customized explanations about errors and helps improve their understanding of AI planning as well as the limits and capabilities of the underlying robot system.
[ { "version": "v1", "created": "Sun, 31 Oct 2021 20:18:45 GMT" }, { "version": "v2", "created": "Sun, 30 Jan 2022 00:01:10 GMT" }, { "version": "v3", "created": "Fri, 11 Mar 2022 08:26:38 GMT" } ]
2022-03-14T00:00:00
[ [ "Shah", "Naman", "" ], [ "Verma", "Pulkit", "" ], [ "Angle", "Trevor", "" ], [ "Srivastava", "Siddharth", "" ] ]
new_dataset
0.998611
2203.01017
Ahmed Nassar
Ahmed Nassar, Nikolaos Livathinos, Maksym Lysak, Peter Staar
TableFormer: Table Structure Understanding with Transformers
null
null
null
null
cs.CV cs.LG
http://creativecommons.org/licenses/by/4.0/
Tables organize valuable content in a concise and compact representation. This content is extremely valuable for systems such as search engines, Knowledge Graph's, etc, since they enhance their predictive capabilities. Unfortunately, tables come in a large variety of shapes and sizes. Furthermore, they can have complex column/row-header configurations, multiline rows, different variety of separation lines, missing entries, etc. As such, the correct identification of the table-structure from an image is a non-trivial task. In this paper, we present a new table-structure identification model. The latter improves the latest end-to-end deep learning model (i.e. encoder-dual-decoder from PubTabNet) in two significant ways. First, we introduce a new object detection decoder for table-cells. In this way, we can obtain the content of the table-cells from programmatic PDF's directly from the PDF source and avoid the training of the custom OCR decoders. This architectural change leads to more accurate table-content extraction and allows us to tackle non-english tables. Second, we replace the LSTM decoders with transformer based decoders. This upgrade improves significantly the previous state-of-the-art tree-editing-distance-score (TEDS) from 91% to 98.5% on simple tables and from 88.7% to 95% on complex tables.
[ { "version": "v1", "created": "Wed, 2 Mar 2022 10:46:24 GMT" }, { "version": "v2", "created": "Fri, 11 Mar 2022 14:03:47 GMT" } ]
2022-03-14T00:00:00
[ [ "Nassar", "Ahmed", "" ], [ "Livathinos", "Nikolaos", "" ], [ "Lysak", "Maksym", "" ], [ "Staar", "Peter", "" ] ]
new_dataset
0.997796
2203.05306
Lei Fan
Lei Fan, Yiwen Ding, Dongdong Fan, Donglin Di, Maurice Pagnucco, Yang Song
GrainSpace: A Large-scale Dataset for Fine-grained and Domain-adaptive Recognition of Cereal Grains
8pages, 6 figures, accepted by CVPR2022 dataset is available at \url{https://github.com/hellodfan/GrainSpace}
null
null
null
cs.CV cs.DB
http://creativecommons.org/licenses/by-nc-nd/4.0/
Cereal grains are a vital part of human diets and are important commodities for people's livelihood and international trade. Grain Appearance Inspection (GAI) serves as one of the crucial steps for the determination of grain quality and grain stratification for proper circulation, storage and food processing, etc. GAI is routinely performed manually by qualified inspectors with the aid of some hand tools. Automated GAI has the benefit of greatly assisting inspectors with their jobs but has been limited due to the lack of datasets and clear definitions of the tasks. In this paper we formulate GAI as three ubiquitous computer vision tasks: fine-grained recognition, domain adaptation and out-of-distribution recognition. We present a large-scale and publicly available cereal grains dataset called GrainSpace. Specifically, we construct three types of device prototypes for data acquisition, and a total of 5.25 million images determined by professional inspectors. The grain samples including wheat, maize and rice are collected from five countries and more than 30 regions. We also develop a comprehensive benchmark based on semi-supervised learning and self-supervised learning techniques. To the best of our knowledge, GrainSpace is the first publicly released dataset for cereal grain inspection.
[ { "version": "v1", "created": "Thu, 10 Mar 2022 11:41:28 GMT" } ]
2022-03-14T00:00:00
[ [ "Fan", "Lei", "" ], [ "Ding", "Yiwen", "" ], [ "Fan", "Dongdong", "" ], [ "Di", "Donglin", "" ], [ "Pagnucco", "Maurice", "" ], [ "Song", "Yang", "" ] ]
new_dataset
0.999882
2203.05321
Dan Ruta
Dan Ruta, Andrew Gilbert, Pranav Aggarwal, Naveen Marri, Ajinkya Kale, Jo Briggs, Chris Speed, Hailin Jin, Baldo Faieta, Alex Filipkowski, Zhe Lin, John Collomosse
StyleBabel: Artistic Style Tagging and Captioning
null
null
null
null
cs.CV cs.CL
http://creativecommons.org/licenses/by/4.0/
We present StyleBabel, a unique open access dataset of natural language captions and free-form tags describing the artistic style of over 135K digital artworks, collected via a novel participatory method from experts studying at specialist art and design schools. StyleBabel was collected via an iterative method, inspired by `Grounded Theory': a qualitative approach that enables annotation while co-evolving a shared language for fine-grained artistic style attribute description. We demonstrate several downstream tasks for StyleBabel, adapting the recent ALADIN architecture for fine-grained style similarity, to train cross-modal embeddings for: 1) free-form tag generation; 2) natural language description of artistic style; 3) fine-grained text search of style. To do so, we extend ALADIN with recent advances in Visual Transformer (ViT) and cross-modal representation learning, achieving a state of the art accuracy in fine-grained style retrieval.
[ { "version": "v1", "created": "Thu, 10 Mar 2022 12:15:55 GMT" }, { "version": "v2", "created": "Fri, 11 Mar 2022 08:51:33 GMT" } ]
2022-03-14T00:00:00
[ [ "Ruta", "Dan", "" ], [ "Gilbert", "Andrew", "" ], [ "Aggarwal", "Pranav", "" ], [ "Marri", "Naveen", "" ], [ "Kale", "Ajinkya", "" ], [ "Briggs", "Jo", "" ], [ "Speed", "Chris", "" ], [ "Jin", "Hailin", "" ], [ "Faieta", "Baldo", "" ], [ "Filipkowski", "Alex", "" ], [ "Lin", "Zhe", "" ], [ "Collomosse", "John", "" ] ]
new_dataset
0.996126
2203.05338
Yusuke Nagata
Yusuke Nagata, Jinki Otao, Daichi Haraguchi, and Seiichi Uchida
TrueType Transformer: Character and Font Style Recognition in Outline Format
DAS 2022
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose TrueType Transformer (T3), which can perform character and font style recognition in an outline format. The outline format, such as TrueType, represents each character as a sequence of control points of stroke contours and is frequently used in born-digital documents. T3 is organized by a deep neural network, so-called Transformer. Transformer is originally proposed for sequential data, such as text, and therefore appropriate for handling the outline data. In other words, T3 directly accepts the outline data without converting it into a bitmap image. Consequently, T3 realizes a resolution-independent classification. Moreover, since the locations of the control points represent the fine and local structures of the font style, T3 is suitable for font style classification, where such structures are very important. In this paper, we experimentally show the applicability of T3 in character and font style recognition tasks, while observing how the individual control points contribute to classification results.
[ { "version": "v1", "created": "Thu, 10 Mar 2022 12:38:13 GMT" }, { "version": "v2", "created": "Fri, 11 Mar 2022 02:03:29 GMT" } ]
2022-03-14T00:00:00
[ [ "Nagata", "Yusuke", "" ], [ "Otao", "Jinki", "" ], [ "Haraguchi", "Daichi", "" ], [ "Uchida", "Seiichi", "" ] ]
new_dataset
0.959887
2203.05602
Osama Shahin R
Rady El Rwelli, Osama R. Shahin, Ahmed I. Taloba
Gesture based Arabic Sign Language Recognition for Impaired People based on Convolution Neural Network
null
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
The Arabic Sign Language has endorsed outstanding research achievements for identifying gestures and hand signs using the deep learning methodology. The term "forms of communication" refers to the actions used by hearing-impaired people to communicate. These actions are difficult for ordinary people to comprehend. The recognition of Arabic Sign Language (ArSL) has become a difficult study subject due to variations in Arabic Sign Language (ArSL) from one territory to another and then within states. The Convolution Neural Network has been encapsulated in the proposed system which is based on the machine learning technique. For the recognition of the Arabic Sign Language, the wearable sensor is utilized. This approach has been used a different system that could suit all Arabic gestures. This could be used by the impaired people of the local Arabic community. The research method has been used with reasonable and moderate accuracy. A deep Convolutional network is initially developed for feature extraction from the data gathered by the sensing devices. These sensors can reliably recognize the Arabic sign language's 30 hand sign letters. The hand movements in the dataset were captured using DG5-V hand gloves with wearable sensors. For categorization purposes, the CNN technique is used. The suggested system takes Arabic sign language hand gestures as input and outputs vocalized speech as output. The results were recognized by 90% of the people.
[ { "version": "v1", "created": "Thu, 10 Mar 2022 19:36:04 GMT" } ]
2022-03-14T00:00:00
[ [ "Rwelli", "Rady El", "" ], [ "Shahin", "Osama R.", "" ], [ "Taloba", "Ahmed I.", "" ] ]
new_dataset
0.954581
2203.05657
Jens Helge Reelfs
Jens Helge Reelfs and Oliver Hohlfeld and Niklas Henckell
Anonymous Hyperlocal Communities: What do they talk about?
Accepted submission to the 12th International Workshop on Location and the Web (LocWeb'22). To appear in WWW'22 Companion proceedings; 9 pages, 5 figures, 3 tables
null
10.1145/3487553.3524644
null
cs.SI
http://creativecommons.org/licenses/by-sa/4.0/
In this paper, we study what users talk about in a plethora of independent hyperlocal and anonymous online communities in a single country: Saudi Arabia (KSA). We base this perspective on performing a content classification of the Jodel network in the KSA. To do so, we first contribute a content classification schema that assesses both the intent (why) and the topic (what) of posts. We use the schema to label 15k randomly sampled posts and further classify the top 1k hashtags. We observe a rich set of benign (yet at times controversial in conservative regimes) intents and topics that dominantly address information requests, entertainment, or dating/flirting. By comparing two large cities (Riyadh and Jeddah), we further show that hyperlocality leads to shifts in topic popularity between local communities. By evaluating votes (content appreciation) and replies (reactions), we show that the communities react differently to different topics; e.g., entertaining posts are much appreciated through votes, receiving the least replies, while beliefs & politics receive similarly few replies but are controversially voted.
[ { "version": "v1", "created": "Thu, 10 Mar 2022 21:48:22 GMT" } ]
2022-03-14T00:00:00
[ [ "Reelfs", "Jens Helge", "" ], [ "Hohlfeld", "Oliver", "" ], [ "Henckell", "Niklas", "" ] ]
new_dataset
0.988423
2203.05875
Mar\'ia Alejandra Cardoza Cer\'on
Maria Alejandra Cardoza Ceron
Using Word Embeddings to Analyze Protests News
null
null
null
null
cs.CL
http://creativecommons.org/licenses/by/4.0/
The first two tasks of the CLEF 2019 ProtestNews events focused on distinguishing between protest and non-protest related news articles and sentences in a binary classification task. Among the submissions, two well performing models have been chosen in order to replace the existing word embeddings word2vec and FastTest with ELMo and DistilBERT. Unlike bag of words or earlier vector approaches, ELMo and DistilBERT represent words as a sequence of vectors by capturing the meaning based on contextual information in the text. Without changing the architecture of the original models other than the word embeddings, the implementation of DistilBERT improved the performance measured on the F1-Score of 0.66 compared to the FastText implementation. DistilBERT also outperformed ELMo in both tasks and models. Cleaning the datasets by removing stopwords and lemmatizing the words has been shown to make the models more generalizable across different contexts when training on a dataset with Indian news articles and evaluating the models on a dataset with news articles from China.
[ { "version": "v1", "created": "Fri, 11 Mar 2022 12:25:59 GMT" } ]
2022-03-14T00:00:00
[ [ "Ceron", "Maria Alejandra Cardoza", "" ] ]
new_dataset
0.981635
2203.05908
Araceli Morales
Araceli Morales, Antonio R. Porras, Marius George Linguraru, Gemma Piella, Federico M. Sukno
BabyNet: Reconstructing 3D faces of babies from uncalibrated photographs
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a 3D face reconstruction system that aims at recovering the 3D facial geometry of babies from uncalibrated photographs, BabyNet. Since the 3D facial geometry of babies differs substantially from that of adults, baby-specific facial reconstruction systems are needed. BabyNet consists of two stages: 1) a 3D graph convolutional autoencoder learns a latent space of the baby 3D facial shape; and 2) a 2D encoder that maps photographs to the 3D latent space based on representative features extracted using transfer learning. In this way, using the pre-trained 3D decoder, we can recover a 3D face from 2D images. We evaluate BabyNet and show that 1) methods based on adult datasets cannot model the 3D facial geometry of babies, which proves the need for a baby-specific method, and 2) BabyNet outperforms classical model-fitting methods even when a baby-specific 3D morphable model, such as BabyFM, is used.
[ { "version": "v1", "created": "Fri, 11 Mar 2022 13:26:25 GMT" } ]
2022-03-14T00:00:00
[ [ "Morales", "Araceli", "" ], [ "Porras", "Antonio R.", "" ], [ "Linguraru", "Marius George", "" ], [ "Piella", "Gemma", "" ], [ "Sukno", "Federico M.", "" ] ]
new_dataset
0.992908
2203.05928
Shiwen Zhang
Shiwen Zhang
TFCNet: Temporal Fully Connected Networks for Static Unbiased Temporal Reasoning
The code and model will be released once accepted
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Temporal Reasoning is one important functionality for vision intelligence. In computer vision research community, temporal reasoning is usually studied in the form of video classification, for which many state-of-the-art Neural Network structures and dataset benchmarks are proposed in recent years, especially 3D CNNs and Kinetics. However, some recent works found that current video classification benchmarks contain strong biases towards static features, thus cannot accurately reflect the temporal modeling ability. New video classification benchmarks aiming to eliminate static biases are proposed, with experiments on these new benchmarks showing that the current clip-based 3D CNNs are outperformed by RNN structures and recent video transformers. In this paper, we find that 3D CNNs and their efficient depthwise variants, when video-level sampling strategy is used, are actually able to beat RNNs and recent vision transformers by significant margins on static-unbiased temporal reasoning benchmarks. Further, we propose Temporal Fully Connected Block (TFC Block), an efficient and effective component, which approximates fully connected layers along temporal dimension to obtain video-level receptive field, enhancing the spatiotemporal reasoning ability. With TFC blocks inserted into Video-level 3D CNNs (V3D), our proposed TFCNets establish new state-of-the-art results on synthetic temporal reasoning benchmark, CATER, and real world static-unbiased dataset, Diving48, surpassing all previous methods.
[ { "version": "v1", "created": "Fri, 11 Mar 2022 13:58:05 GMT" } ]
2022-03-14T00:00:00
[ [ "Zhang", "Shiwen", "" ] ]
new_dataset
0.999422
2203.05943
Dominique Attali
Dominique Attali and Andr\'e Lieutier
Flat Delaunay Complexes for Homeomorphic Manifold Reconstruction
38 pages, 2 figures
null
null
null
cs.CG
http://creativecommons.org/licenses/by/4.0/
Given a smooth submanifold of the Euclidean space, a finite point cloud and a scale parameter, we introduce a construction which we call the flat Delaunay complex (FDC). This is a variant of the tangential Delaunay complex (TDC) introduced by Boissonnat et al.. Building on their work, we provide a short and direct proof that when the point cloud samples sufficiently nicely the submanifold and is sufficiently safe (a notion which we define in the paper), our construction is homeomorphic to the submanifold. Because the proof works even when data points are noisy, this allows us to propose a perturbation scheme that takes as input a point cloud sufficiently nice and returns a point cloud which in addition is sufficiently safe. Equally importantly, our construction provides the framework underlying a variational formulation of the reconstruction problem which we present in a companion paper.
[ { "version": "v1", "created": "Fri, 11 Mar 2022 14:25:03 GMT" } ]
2022-03-14T00:00:00
[ [ "Attali", "Dominique", "" ], [ "Lieutier", "André", "" ] ]
new_dataset
0.99839
2203.05944
Kristian Fischer
Kristian Fischer, Felix Fleckenstein, Christian Herglotz, Andr\'e Kaup
Saliency-Driven Versatile Video Coding for Neural Object Detection
5 pages, 3 figures, 2 tables; Originally submitted at IEEE ICASSP 2021
IEEE ICASSP 2021
10.1109/ICASSP39728.2021.9415048
null
cs.CV eess.IV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Saliency-driven image and video coding for humans has gained importance in the recent past. In this paper, we propose such a saliency-driven coding framework for the video coding for machines task using the latest video coding standard Versatile Video Coding (VVC). To determine the salient regions before encoding, we employ the real-time-capable object detection network You Only Look Once~(YOLO) in combination with a novel decision criterion. To measure the coding quality for a machine, the state-of-the-art object segmentation network Mask R-CNN was applied to the decoded frame. From extensive simulations we find that, compared to the reference VVC with a constant quality, up to 29 % of bitrate can be saved with the same detection accuracy at the decoder side by applying the proposed saliency-driven framework. Besides, we compare YOLO against other, more traditional saliency detection methods.
[ { "version": "v1", "created": "Fri, 11 Mar 2022 14:27:43 GMT" } ]
2022-03-14T00:00:00
[ [ "Fischer", "Kristian", "" ], [ "Fleckenstein", "Felix", "" ], [ "Herglotz", "Christian", "" ], [ "Kaup", "André", "" ] ]
new_dataset
0.99917
2203.05949
Rui Liu
Yaowei Wang, Zhouxin Yang, Rui Liu, Deng Li, Yuandu Lai, Leyuan Fang, Yahong Han
Peng Cheng Object Detection Benchmark for Smart City
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Object detection is an algorithm that recognizes and locates the objects in the image and has a wide range of applications in the visual understanding of complex urban scenes. Existing object detection benchmarks mainly focus on a single specific scenario and their annotation attributes are not rich enough, these make the object detection model is not generalized for the smart city scenes. Considering the diversity and complexity of scenes in intelligent city governance, we build a large-scale object detection benchmark for the smart city. Our benchmark contains about 500K images and includes three scenarios: intelligent transportation, intelligent security, and drones. For the complexity of the real scene in the smart city, the diversity of weather, occlusion, and other complex environment diversity attributes of the images in the three scenes are annotated. The characteristics of the benchmark are analyzed and extensive experiments of the current state-of-the-art target detection algorithm are conducted based on our benchmark to show their performance.
[ { "version": "v1", "created": "Fri, 11 Mar 2022 14:39:48 GMT" } ]
2022-03-14T00:00:00
[ [ "Wang", "Yaowei", "" ], [ "Yang", "Zhouxin", "" ], [ "Liu", "Rui", "" ], [ "Li", "Deng", "" ], [ "Lai", "Yuandu", "" ], [ "Fang", "Leyuan", "" ], [ "Han", "Yahong", "" ] ]
new_dataset
0.99946
2203.05967
Yi Fung
Yi R. Fung and Heng Ji
A Weibo Dataset for the 2022 Russo-Ukrainian Crisis
Russia-Ukraine Crisis, Weibo Dataset
null
null
null
cs.SI cs.CL
http://creativecommons.org/licenses/by-nc-sa/4.0/
Online social networks such as Twitter and Weibo play an important role in how people stay informed and exchange reactions. Each crisis encompasses a new opportunity to study the portability of models for various tasks (e.g., information extraction, complex event understanding, misinformation detection, etc.), due to differences in domain, entities, and event types. We present the Russia-Ukraine Crisis Weibo (RUW) dataset, with over 3.5M user posts and comments in the first release. Our data is available at https://github.com/yrf1/RussiaUkraine_weibo_dataset.
[ { "version": "v1", "created": "Wed, 9 Mar 2022 19:06:04 GMT" } ]
2022-03-14T00:00:00
[ [ "Fung", "Yi R.", "" ], [ "Ji", "Heng", "" ] ]
new_dataset
0.999769
2203.06061
Weilu Gao
Yingheng Tang, Princess Tara Zamani, Ruiyang Chen, Jianzhu Ma, Minghao Qi, Cunxi Yu, and Weilu Gao
Device-system Co-design of Photonic Neuromorphic Processor using Reinforcement Learning
30 pages, 4 figures
null
null
null
cs.ET physics.optics
http://creativecommons.org/licenses/by/4.0/
The incorporation of high-performance optoelectronic devices into photonic neuromorphic processors can substantially accelerate computationally intensive operations in machine learning (ML) algorithms. However, the conventional device design wisdom is disconnected with system optimization. We report a device-system co-design methodology to optimize a free-space optical general matrix multiplication (GEMM) hardware accelerator by engineering a spatially reconfigurable array made from chalcogenide phase change materials. With a highly-parallelized hardware emulator constructed based on experimental information, we demonstrate the design of unit device by optimizing GEMM calculation accuracy via reinforcement learning, including deep Q-learning neural network, Bayesian optimization, and their cascaded approach, which show a clear correlation between system performance metrics and physical device specifications. Furthermore, we employ physics-aware training approaches to deploy optimized hardware to the tasks of image classification, materials discovery, and a closed-loop design of optical ML accelerators. The demonstrated framework offers insights into the co-design of optoelectronic devices and systems with reduced human-supervision and domain-knowledge barriers.
[ { "version": "v1", "created": "Wed, 9 Mar 2022 17:18:41 GMT" } ]
2022-03-14T00:00:00
[ [ "Tang", "Yingheng", "" ], [ "Zamani", "Princess Tara", "" ], [ "Chen", "Ruiyang", "" ], [ "Ma", "Jianzhu", "" ], [ "Qi", "Minghao", "" ], [ "Yu", "Cunxi", "" ], [ "Gao", "Weilu", "" ] ]
new_dataset
0.952654
2203.06075
Micha\"el Cadilhac
Corentin Barloy and Micha\"el Cadilhac and Charles Paperman and Thomas Zeume
The Regular Languages of First-Order Logic with One Alternation
11 pages + bibliography, submitted to LICS'22
null
null
null
cs.LO cs.FL
http://creativecommons.org/licenses/by/4.0/
The regular languages with a neutral letter expressible in first-order logic with one alternation are characterized. Specifically, it is shown that if an arbitrary $\Sigma_2$ formula defines a regular language with a neutral letter, then there is an equivalent $\Sigma_2$ formula that only uses the order predicate. This shows that the so-called Central Conjecture of Straubing holds for $\Sigma_2$ over languages with a neutral letter, the first progress on the Conjecture in more than 20 years. To show the characterization, lower bounds against polynomial-size depth-3 Boolean circuits with constant top fan-in are developed. The heart of the combinatorial argument resides in studying how positions within a language are determined from one another, a technique of independent interest.
[ { "version": "v1", "created": "Fri, 11 Mar 2022 16:53:25 GMT" } ]
2022-03-14T00:00:00
[ [ "Barloy", "Corentin", "" ], [ "Cadilhac", "Michaël", "" ], [ "Paperman", "Charles", "" ], [ "Zeume", "Thomas", "" ] ]
new_dataset
0.999626
2203.06082
Fernando Alonso-Fernandez
Pontus Hedman, Vasilios Skepetzis, Kevin Hernandez-Diaz, Josef Bigun, Fernando Alonso-Fernandez
LFW-Beautified: A Dataset of Face Images with Beautification and Augmented Reality Filters
Under consideration at Elsevier Data in Brief
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Selfie images enjoy huge popularity in social media. The same platforms centered around sharing this type of images offer filters to beautify them or incorporate augmented reality effects. Studies suggests that filtered images attract more views and engagement. Selfie images are also in increasing use in security applications due to mobiles becoming data hubs for many transactions. Also, video conference applications, boomed during the pandemic, include such filters. Such filters may destroy biometric features that would allow person recognition or even detection of the face itself, even if such commodity applications are not necessarily used to compromise facial systems. This could also affect subsequent investigations like crimes in social media, where automatic analysis is usually necessary given the amount of information posted in social sites or stored in devices or cloud repositories. To help in counteracting such issues, we contribute with a database of facial images that includes several manipulations. It includes image enhancement filters (which mostly modify contrast and lightning) and augmented reality filters that incorporate items like animal noses or glasses. Additionally, images with sunglasses are processed with a reconstruction network trained to learn to reverse such modifications. This is because obfuscating the eye region has been observed in the literature to have the highest impact on the accuracy of face detection or recognition. We start from the popular Labeled Faces in the Wild (LFW) database, to which we apply different modifications, generating 8 datasets. Each dataset contains 4,324 images of size 64 x 64, with a total of 34,592 images. The use of a public and widely employed face dataset allows for replication and comparison. The created database is available at https://github.com/HalmstadUniversityBiometrics/LFW-Beautified
[ { "version": "v1", "created": "Fri, 11 Mar 2022 17:05:10 GMT" } ]
2022-03-14T00:00:00
[ [ "Hedman", "Pontus", "" ], [ "Skepetzis", "Vasilios", "" ], [ "Hernandez-Diaz", "Kevin", "" ], [ "Bigun", "Josef", "" ], [ "Alonso-Fernandez", "Fernando", "" ] ]
new_dataset
0.999576
2203.06096
Federico Tavella
Federico Tavella and Viktor Schlegel and Marta Romeo and Aphrodite Galata and Angelo Cangelosi
WLASL-LEX: a Dataset for Recognising Phonological Properties in American Sign Language
Accepted at ACL 2022 main conference
null
null
null
cs.CL cs.CV cs.LG
http://creativecommons.org/licenses/by/4.0/
Signed Language Processing (SLP) concerns the automated processing of signed languages, the main means of communication of Deaf and hearing impaired individuals. SLP features many different tasks, ranging from sign recognition to translation and production of signed speech, but has been overlooked by the NLP community thus far. In this paper, we bring to attention the task of modelling the phonology of sign languages. We leverage existing resources to construct a large-scale dataset of American Sign Language signs annotated with six different phonological properties. We then conduct an extensive empirical study to investigate whether data-driven end-to-end and feature-based approaches can be optimised to automatically recognise these properties. We find that, despite the inherent challenges of the task, graph-based neural networks that operate over skeleton features extracted from raw videos are able to succeed at the task to a varying degree. Most importantly, we show that this performance pertains even on signs unobserved during training.
[ { "version": "v1", "created": "Fri, 11 Mar 2022 17:21:24 GMT" } ]
2022-03-14T00:00:00
[ [ "Tavella", "Federico", "" ], [ "Schlegel", "Viktor", "" ], [ "Romeo", "Marta", "" ], [ "Galata", "Aphrodite", "" ], [ "Cangelosi", "Angelo", "" ] ]
new_dataset
0.999853
2203.06117
Yanqing Zhang
Yanqing Zhang, Haoxing Ren, Akshay Sridharan, Brucek Khailany
GATSPI: GPU Accelerated Gate-Level Simulation for Power Improvement
null
null
null
null
cs.LG cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present GATSPI, a novel GPU accelerated logic gate simulator that enables ultra-fast power estimation for industry sized ASIC designs with millions of gates. GATSPI is written in PyTorch with custom CUDA kernels for ease of coding and maintainability. It achieves simulation kernel speedup of up to 1668X on a single-GPU system and up to 7412X on a multiple-GPU system when compared to a commercial gate-level simulator running on a single CPU core. GATSPI supports a range of simple to complex cell types from an industry standard cell library and SDF conditional delay statements without requiring prior calibration runs and produces industry-standard SAIF files from delay-aware gate-level simulation. Finally, we deploy GATSPI in a glitch-optimization flow, achieving a 1.4% power saving with a 449X speedup in turnaround time compared to a similar flow using a commercial simulator.
[ { "version": "v1", "created": "Fri, 11 Mar 2022 17:40:19 GMT" } ]
2022-03-14T00:00:00
[ [ "Zhang", "Yanqing", "" ], [ "Ren", "Haoxing", "" ], [ "Sridharan", "Akshay", "" ], [ "Khailany", "Brucek", "" ] ]
new_dataset
0.999655
2203.06143
Alexandra Weinberger
Oswin Aichholzer and Alfredo Garc\'ia and Javier Tejel and Birgit Vogtenhuber and Alexandra Weinberger
Twisted Ways to Find Plane Structures in Simple Drawings of Complete Graphs
41 pages, 44 figures, this work (without appendix) will be available in the proceedings of the 38th International Symposium on Computational Geometry (SoCG 2022)
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Simple drawings are drawings of graphs in which the edges are Jordan arcs and each pair of edges share at most one point (a proper crossing or a common endpoint). We introduce a special kind of simple drawings that we call generalized twisted drawings. A simple drawing is generalized twisted if there is a point $O$ such that every ray emanating from $O$ crosses every edge of the drawing at most once and there is a ray emanating from $O$ which crosses every edge exactly once. Via this new class of simple drawings, we show that every simple drawing of the complete graph with $n$ vertices contains $\Omega(n^{\frac{1}{2}})$ pairwise disjoint edges and a plane path of length $\Omega(\frac{\log n }{\log \log n})$. Both results improve over previously known best lower bounds. On the way we show several structural results about and properties of generalized twisted drawings. We further present different characterizations of generalized twisted drawings, which might be of independent interest.
[ { "version": "v1", "created": "Fri, 11 Mar 2022 18:15:49 GMT" } ]
2022-03-14T00:00:00
[ [ "Aichholzer", "Oswin", "" ], [ "García", "Alfredo", "" ], [ "Tejel", "Javier", "" ], [ "Vogtenhuber", "Birgit", "" ], [ "Weinberger", "Alexandra", "" ] ]
new_dataset
0.987861
2108.04314
Fangtian Zhong
Fangtian Zhong, Zekai Chen, Minghui Xu, Guoming Zhang, Dongxiao Yu, Xiuzhen Cheng
Malware-on-the-Brain: Illuminating Malware Byte Codes with Images for Malware Classification
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Malware is a piece of software that was written with the intent of doing harm to data, devices, or people. Since a number of new malware variants can be generated by reusing codes, malware attacks can be easily launched and thus become common in recent years, incurring huge losses in businesses, governments, financial institutes, health providers, etc. To defeat these attacks, malware classification is employed, which plays an essential role in anti-virus products. However, existing works that employ either static analysis or dynamic analysis have major weaknesses in complicated reverse engineering and time-consuming tasks. In this paper, we propose a visualized malware classification framework called VisMal, which provides highly efficient categorization with acceptable accuracy. VisMal converts malware samples into images and then applies a contrast-limited adaptive histogram equalization algorithm to enhance the similarity between malware image regions in the same family. We provided a proof-of-concept implementation and carried out an extensive evaluation to verify the performance of our framework. The evaluation results indicate that VisMal can classify a malware sample within 4.0ms and have an average accuracy of 96.0%. Moreover, VisMal provides security engineers with a simple visualization approach to further validate its performance.
[ { "version": "v1", "created": "Mon, 9 Aug 2021 19:18:56 GMT" }, { "version": "v2", "created": "Tue, 8 Mar 2022 15:27:08 GMT" }, { "version": "v3", "created": "Wed, 9 Mar 2022 23:06:02 GMT" } ]
2022-03-11T00:00:00
[ [ "Zhong", "Fangtian", "" ], [ "Chen", "Zekai", "" ], [ "Xu", "Minghui", "" ], [ "Zhang", "Guoming", "" ], [ "Yu", "Dongxiao", "" ], [ "Cheng", "Xiuzhen", "" ] ]
new_dataset
0.9997
2108.05560
Hyungtae Lim
Hyungtae Lim, Minho Oh, Hyun Myung
Patchwork: Concentric Zone-based Region-wise Ground Segmentation with Ground Likelihood Estimation Using a 3D LiDAR Sensor
null
null
null
null
cs.RO cs.CV
http://creativecommons.org/licenses/by-nc-nd/4.0/
Ground segmentation is crucial for terrestrial mobile platforms to perform navigation or neighboring object recognition. Unfortunately, the ground is not flat, as it features steep slopes; bumpy roads; or objects, such as curbs, flower beds, and so forth. To tackle the problem, this paper presents a novel ground segmentation method called \textit{Patchwork}, which is robust for addressing the under-segmentation problem and operates at more than 40 Hz. In this paper, a point cloud is encoded into a Concentric Zone Model-based representation to assign an appropriate density of cloud points among bins in a way that is not computationally complex. This is followed by Region-wise Ground Plane Fitting, which is performed to estimate the partial ground for each bin. Finally, Ground Likelihood Estimation is introduced to dramatically reduce false positives. As experimentally verified on SemanticKITTI and rough terrain datasets, our proposed method yields promising performance compared with the state-of-the-art methods, showing faster speed compared with existing plane fitting--based methods. Code is available: https://github.com/LimHyungTae/patchwork
[ { "version": "v1", "created": "Thu, 12 Aug 2021 06:52:10 GMT" }, { "version": "v2", "created": "Thu, 10 Mar 2022 11:13:23 GMT" } ]
2022-03-11T00:00:00
[ [ "Lim", "Hyungtae", "" ], [ "Oh", "Minho", "" ], [ "Myung", "Hyun", "" ] ]
new_dataset
0.999577
2110.02498
Diqun Yan
Jiahao Chen, Diqun Yan
Adversarial Attacks on Machinery Fault Diagnosis
5 pages, 5 figures. Submitted to Interspeech 2022
null
null
null
cs.CR cs.SD eess.AS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Despite the great progress of neural network-based (NN-based) machinery fault diagnosis methods, their robustness has been largely neglected, for they can be easily fooled through adding imperceptible perturbation to the input. For fault diagnosis problems, in this paper, we reformulate various adversarial attacks and intensively investigate them under untargeted and targeted conditions. Experimental results on six typical NN-based models show that accuracies of the models are greatly reduced by adding small perturbations. We further propose a simple, efficient and universal scheme to protect the victim models. This work provides an in-depth look at adversarial examples of machinery vibration signals for developing protection methods against adversarial attack and improving the robustness of NN-based models.
[ { "version": "v1", "created": "Wed, 6 Oct 2021 04:26:30 GMT" }, { "version": "v2", "created": "Thu, 10 Mar 2022 08:25:52 GMT" } ]
2022-03-11T00:00:00
[ [ "Chen", "Jiahao", "" ], [ "Yan", "Diqun", "" ] ]
new_dataset
0.970182
2111.08492
Xing Li
Xing Li, Qian Huang, Zhijian Wang, Zhenjie Hou, Tianjin Yang
SequentialPointNet: A strong frame-level parallel point cloud sequence network for 3D action recognition
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The point cloud sequence of 3D human actions consists of a set of ordered point cloud frames. Compared to static point clouds, point cloud sequences have huge data sizes proportional to the time dimension. Therefore, developing an efficient and lightweight point cloud sequence model is pivotal for 3D action recognition. In this paper, we propose a strong frame-level parallel point cloud sequence network referred to as SequentialPointNet for 3D action recognition. The key to our approach is to divide the main modeling operations into frame-level units executed in parallel, which greatly improves the efficiency of modeling point cloud sequences.Moreover, we propose to flatten the point cloud sequence into a new point data type named hyperpoint sequence that preserves the complete spatial structure of each frame. Then, a novel Hyperpoint-Mixer module is introduced to mix intra-frame spatial features and inter-frame temporal features of the hyperpoint sequence. By doing so, SequentialPointNet maximizes the appearance encoding ability and extracts sufficient motion information for effective human action recognition. Extensive experiments show that SequentialPointNet achieves up to 10X faster than existing point cloud sequence models. Additionally, our SequentialPointNet surpasses state-of-the-art approaches for human action recognition on both large-scale datasets (i.e., NTU RGB+D 60 and NTU RGB+D 120) and small-scale datasets (i.e., MSR Action3D and UTD-MHAD).
[ { "version": "v1", "created": "Tue, 16 Nov 2021 14:13:32 GMT" }, { "version": "v2", "created": "Thu, 10 Mar 2022 13:55:29 GMT" } ]
2022-03-11T00:00:00
[ [ "Li", "Xing", "" ], [ "Huang", "Qian", "" ], [ "Wang", "Zhijian", "" ], [ "Hou", "Zhenjie", "" ], [ "Yang", "Tianjin", "" ] ]
new_dataset
0.999445
2201.03954
Joshua Joseph
Kasia S. Chmielinski, Sarah Newman, Matt Taylor, Josh Joseph, Kemi Thomas, Jessica Yurkofsky, Yue Chelsea Qiu
The Dataset Nutrition Label (2nd Gen): Leveraging Context to Mitigate Harms in Artificial Intelligence
null
null
null
null
cs.LG cs.AI
http://creativecommons.org/licenses/by/4.0/
As the production of and reliance on datasets to produce automated decision-making systems (ADS) increases, so does the need for processes for evaluating and interrogating the underlying data. After launching the Dataset Nutrition Label in 2018, the Data Nutrition Project has made significant updates to the design and purpose of the Label, and is launching an updated Label in late 2020, which is previewed in this paper. The new Label includes context-specific Use Cases &Alerts presented through an updated design and user interface targeted towards the data scientist profile. This paper discusses the harm and bias from underlying training data that the Label is intended to mitigate, the current state of the work including new datasets being labeled, new and existing challenges, and further directions of the work, as well as Figures previewing the new label.
[ { "version": "v1", "created": "Mon, 10 Jan 2022 18:43:47 GMT" }, { "version": "v2", "created": "Thu, 10 Mar 2022 17:45:13 GMT" } ]
2022-03-11T00:00:00
[ [ "Chmielinski", "Kasia S.", "" ], [ "Newman", "Sarah", "" ], [ "Taylor", "Matt", "" ], [ "Joseph", "Josh", "" ], [ "Thomas", "Kemi", "" ], [ "Yurkofsky", "Jessica", "" ], [ "Qiu", "Yue Chelsea", "" ] ]
new_dataset
0.994708
2201.07048
Tianyu Fang
Tianyu Fang, Yijie Mao, Shanpu Shen, Zhencai Zhu, Bruno Clerckx
Fully Connected Reconfigurable Intelligent Surface Aided Rate-Splitting Multiple Access for Multi-User Multi-Antenna Transmission
6 pages, 5figures, conference
null
null
null
cs.IT math.IT
http://creativecommons.org/licenses/by/4.0/
Rate-splitting multiple access (RSMA) has been recognized as a promising and powerful multiple access (MA) scheme, non-orthogonal transmission framework and interference management strategy for 6G. Inspired by the appealing spectral efficiency gain achieved by RSMA over conventional MA schemes in multi-user multi-antenna transmission, in this paper we introduce RSMA to reconfigurable intelligent surface (RIS)-aided multiple-input single-out (MISO) broadcast channel (BC). To further enhance the spectral efficiency, a more generalized RIS architecture called fully connected RIS is considered. By jointly optimizing the scattering matrix of the fully connected RIS and the transmit beamformers to maximize the sum-rate, we show that the proposed fully connected RIS aided RSMA transmission scheme significantly improves the spectral efficiency compared with the conventional single connected RIS schemes and the schemes without RIS. It acts as a new benchmark for linearly precoded multi-user multi-antenna networks.
[ { "version": "v1", "created": "Tue, 18 Jan 2022 15:20:02 GMT" }, { "version": "v2", "created": "Thu, 10 Mar 2022 05:19:47 GMT" } ]
2022-03-11T00:00:00
[ [ "Fang", "Tianyu", "" ], [ "Mao", "Yijie", "" ], [ "Shen", "Shanpu", "" ], [ "Zhu", "Zhencai", "" ], [ "Clerckx", "Bruno", "" ] ]
new_dataset
0.977731
2203.03560
Xudong Zhang
Xudong Zhang, Zan Wang, Jingke Zhao, Lanjun Wang
Targeted Data Poisoning Attack on News Recommendation System by Content Perturbation
null
null
null
null
cs.CR cs.AI cs.IR cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
News Recommendation System(NRS) has become a fundamental technology to many online news services. Meanwhile, several studies show that recommendation systems(RS) are vulnerable to data poisoning attacks, and the attackers have the ability to mislead the system to perform as their desires. A widely studied attack approach, injecting fake users, can be applied on the NRS when the NRS is treated the same as the other systems whose items are fixed. However, in the NRS, as each item (i.e. news) is more informative, we propose a novel approach to poison the NRS, which is to perturb contents of some browsed news that results in the manipulation of the rank of the target news. Intuitively, an attack is useless if it is highly likely to be caught, i.e., exposed. To address this, we introduce a notion of the exposure risk and propose a novel problem of attacking a history news dataset by means of perturbations where the goal is to maximize the manipulation of the target news rank while keeping the risk of exposure under a given budget. We design a reinforcement learning framework, called TDP-CP, which contains a two-stage hierarchical model to reduce the searching space. Meanwhile, influence estimation is also applied to save the time on retraining the NRS for rewards. We test the performance of TDP-CP under three NRSs and on different target news. Our experiments show that TDP-CP can increase the rank of the target news successfully with a limited exposure budget.
[ { "version": "v1", "created": "Fri, 4 Mar 2022 16:01:11 GMT" }, { "version": "v2", "created": "Thu, 10 Mar 2022 04:10:12 GMT" } ]
2022-03-11T00:00:00
[ [ "Zhang", "Xudong", "" ], [ "Wang", "Zan", "" ], [ "Zhao", "Jingke", "" ], [ "Wang", "Lanjun", "" ] ]
new_dataset
0.961953
2203.05043
Alexander Chang
Alexander H. Chang, Patricio A. Vela
In-Place Rotation for Enhancing Snake-like Robot Mobility
8 pages, 5 figures. Submitted to RA-L (IEEE Robotics and Automation Letters) with IROS 2022 Option
null
null
null
cs.RO cs.SY eess.SY
http://creativecommons.org/licenses/by-sa/4.0/
Gaits engineered for snake-like robots to rotate in-place instrumentally fill a gap in the set of locomotive gaits that have traditionally prioritized translation. This paper designs a Turn-in-Place gait and demonstrates the ability of a shape-centric modeling framework to capture the gait's locomotive properties. Shape modeling for turning involves a time-varying continuous body curve described by a standing wave. Presumed viscous robot-ground frictional interactions lead to body dynamics conditioned on the time-varying shape model. The dynamic equations describing the Turn-in-Place gait are validated by an articulated snake-like robot using a physics-based simulator and a physical robot. The results affirm the shape-centric modeling framework's capacity to model a variety of snake-like robot gaits with fundamentally different body-ground contact patterns. As an applied demonstration, example locomotion scenarios partner the shape-centric Turn-in-Place gait with a Rectilinear gait for maneuvering through constrained environments based on a multi-modal locomotive planning strategy. Unified shape-centric modeling facilitates trajectory planning and tracking for a snake-like robot to successfully negotiate non-trivial obstacle configurations.
[ { "version": "v1", "created": "Wed, 9 Mar 2022 20:57:20 GMT" } ]
2022-03-11T00:00:00
[ [ "Chang", "Alexander H.", "" ], [ "Vela", "Patricio A.", "" ] ]
new_dataset
0.994986
2203.05160
Subhash Bhagat
Subhash Bhagat and Andrzej Pelc
Deterministic Rendezvous in Infinite Trees
null
null
null
null
cs.DC
http://creativecommons.org/licenses/by/4.0/
The rendezvous task calls for two mobile agents, starting from different nodes of a network modeled as a graph to meet at the same node. Agents have different labels which are integers from a set $\{1,\dots,L\}$. They wake up at possibly different times and move in synchronous rounds. In each round, an agent can either stay idle or move to an adjacent node. We consider deterministic rendezvous algorithms. The time of such an algorithm is the number of rounds since the wakeup of the earlier agent till the meeting. In this paper we consider rendezvous in infinite trees. Our main goal is to study the impact of orientation of a tree on the time of rendezvous. We first design a rendezvous algorithm working for unoriented regular trees, whose time is in $O(z(D) \log L)$, where $z(D)$ is the size of the ball of radius $D$, i.e, the number of nodes at distance at most $D$ from a given node. The algorithm works for arbitrary delay between waking times of agents and does not require any initial information about parameters $L$ or $D$. Its disadvantage is its complexity: $z(D)$ is exponential in $D$ for any degree $d>2$ of the tree. We prove that this high complexity is inevitable: $\Omega(z(D))$ turns out to be a lower bound on rendezvous time in unoriented regular trees, even for simultaneous start and even when agents know $L$ and $D$. Then we turn attention to oriented trees. While for arbitrary delay between waking times of agents the lower bound $\Omega(z(D))$ still holds, for simultaneous start the time of rendezvous can be dramatically shortened. We show that if agents know either a polynomial upper bound on $L$ or a linear upper bound on $D$, then rendezvous can be accomplished in oriented trees in time $O(D\log L)$, which is optimal. When no such extra knowledge is available, we design an algorithm working in time $O(D^2+\log ^2L)$.
[ { "version": "v1", "created": "Thu, 10 Mar 2022 05:17:09 GMT" } ]
2022-03-11T00:00:00
[ [ "Bhagat", "Subhash", "" ], [ "Pelc", "Andrzej", "" ] ]
new_dataset
0.996267
2203.05173
Satyendra Singh Chouhan
Sanskar Soni, Satyendra Singh Chouhan, and Santosh Singh Rathore
TextConvoNet:A Convolutional Neural Network based Architecture for Text Classification
null
null
null
null
cs.CL cs.AI cs.LG cs.NE
http://creativecommons.org/licenses/by-nc-sa/4.0/
In recent years, deep learning-based models have significantly improved the Natural Language Processing (NLP) tasks. Specifically, the Convolutional Neural Network (CNN), initially used for computer vision, has shown remarkable performance for text data in various NLP problems. Most of the existing CNN-based models use 1-dimensional convolving filters n-gram detectors), where each filter specialises in extracting n-grams features of a particular input word embedding. The input word embeddings, also called sentence matrix, is treated as a matrix where each row is a word vector. Thus, it allows the model to apply one-dimensional convolution and only extract n-gram based features from a sentence matrix. These features can be termed as intra-sentence n-gram features. To the extent of our knowledge, all the existing CNN models are based on the aforementioned concept. In this paper, we present a CNN-based architecture TextConvoNet that not only extracts the intra-sentence n-gram features but also captures the inter-sentence n-gram features in input text data. It uses an alternative approach for input matrix representation and applies a two-dimensional multi-scale convolutional operation on the input. To evaluate the performance of TextConvoNet, we perform an experimental study on five text classification datasets. The results are evaluated by using various performance metrics. The experimental results show that the presented TextConvoNet outperforms state-of-the-art machine learning and deep learning models for text classification purposes.
[ { "version": "v1", "created": "Thu, 10 Mar 2022 06:09:56 GMT" } ]
2022-03-11T00:00:00
[ [ "Soni", "Sanskar", "" ], [ "Chouhan", "Satyendra Singh", "" ], [ "Rathore", "Santosh Singh", "" ] ]
new_dataset
0.990497
2203.05199
Zuohui Chen
Yun Xiang, Qijun Chen, Zhongjin Su, Lu Zhang, Zuohui Chen, Guozhi Zhou, Zhuping Yao, Qi Xuan, and Yuan Cheng
Hyperspectral Imaging for cherry tomato
null
null
null
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cherry tomato (Solanum Lycopersicum) is popular with consumers over the world due to its special flavor. Soluble solids content (SSC) and firmness are two key metrics for evaluating the product qualities. In this work, we develop non-destructive testing techniques for SSC and fruit firmness based on hyperspectral images and a corresponding deep learning regression model. Hyperspectral reflectance images of over 200 tomato fruits are derived with spectrum ranging from 400 to 1000 nm. The acquired hyperspectral images are corrected and the spectral information is extracted. A novel one-dimensional(1D) convolutional ResNet (Con1dResNet) based regression model is prosed and compared with the state of art techniques. Experimental results show that, with a relatively large number of samples our technique is 26.4\% better than state of art technique for SSC and 33.7\% for firmness. The results of this study indicate the application potential of hyperspectral imaging technique in the SSC and firmness detection, which provides a new option for non-destructive testing of cherry tomato fruit quality in the future.
[ { "version": "v1", "created": "Thu, 10 Mar 2022 07:21:50 GMT" } ]
2022-03-11T00:00:00
[ [ "Xiang", "Yun", "" ], [ "Chen", "Qijun", "" ], [ "Su", "Zhongjin", "" ], [ "Zhang", "Lu", "" ], [ "Chen", "Zuohui", "" ], [ "Zhou", "Guozhi", "" ], [ "Yao", "Zhuping", "" ], [ "Xuan", "Qi", "" ], [ "Cheng", "Yuan", "" ] ]
new_dataset
0.999373
2203.05215
Carlos Diego Nascimento Damasceno
Shaghayegh Tavassoli, Carlos Diego Nascimento Damasceno, Mohammad Reza Mousavi, Ramtin Khosravi
A Benchmark for Active Learning of Variability-Intensive Systems
5 pages, 3 figures, Paper accepted in the Challenge Cases Track of the 26th ACM International Systems and Software Product Line Conference (SPLC 2022)
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Behavioral models are the key enablers for behavioral analysis of Software Product Lines (SPL), including testing and model checking. Active model learning comes to the rescue when family behavioral models are non-existent or outdated. A key challenge on active model learning is to detect commonalities and variability efficiently and combine them into concise family models. Benchmarks and their associated metrics will play a key role in shaping the research agenda in this promising field and provide an effective means for comparing and identifying relative strengths and weaknesses in the forthcoming techniques. In this challenge, we seek benchmarks to evaluate the efficiency (e.g., learning time and memory footprint) and effectiveness (e.g., conciseness and accuracy of family models) of active model learning methods in the software product line context. These benchmark sets must contain the structural and behavioral variability models of at least one SPL. Each SPL in a benchmark must contain products that requires more than one round of model learning with respect to the basic active learning $L^{*}$ algorithm. Alternatively, tools supporting the synthesis of artificial benchmark models are also welcome.
[ { "version": "v1", "created": "Thu, 10 Mar 2022 07:47:30 GMT" } ]
2022-03-11T00:00:00
[ [ "Tavassoli", "Shaghayegh", "" ], [ "Damasceno", "Carlos Diego Nascimento", "" ], [ "Mousavi", "Mohammad Reza", "" ], [ "Khosravi", "Ramtin", "" ] ]
new_dataset
0.996926
2203.05256
Joseph Da Silva
Joseph Da Silva
Cyber security and the Leviathan
null
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dedicated cyber-security functions are common in commercial businesses, who are confronted by evolving and pervasive threats of data breaches and other perilous security events. Such businesses are enmeshed with the wider societies in which they operate. Using data gathered from in-depth, semi-structured interviews with 15 Chief Information Security Officers, as well as six senior organisational leaders, we show that the work of political philosopher Thomas Hobbes, particularly Leviathan, offers a useful lens through which to understand the context of these functions and of cyber security in Western society. Our findings indicate that cyber security within these businesses demonstrates a number of Hobbesian features that are further implicated in, and provide significant benefits to, the wider Leviathan-esque state. These include the normalisation of intrusive controls, such as surveillance, and the stimulation of consumption. We conclude by suggesting implications for cyber-security practitioners, in particular, the reflexivity that these perspectives offer, as well as for businesses and other researchers.
[ { "version": "v1", "created": "Thu, 10 Mar 2022 09:35:36 GMT" } ]
2022-03-11T00:00:00
[ [ "Da Silva", "Joseph", "" ] ]
new_dataset
0.999093
2203.05301
Yun Fan
Yun Fan, Hualu Liu
Double Constacyclic Codes over Two Finite Commutative Chain Rings
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many kinds of codes which possess two cycle structures over two special finite commutative chain rings, such as ${\Bbb Z}_2{\Bbb Z}_4$-additive cyclic codes and quasi-cyclic codes of fractional index etc., were proved asymptotically good. In this paper we extend the study in two directions: we consider any two finite commutative chain rings with a surjective homomorphism from one to the other, and consider double constacyclic structures. We construct an extensive kind of double constacyclic codes over two finite commutative chain rings. And, developing a probabilistic method suitable for quasi-cyclic codes over fields, we prove that the double constacyclic codes over two finite commutative chain rings are asymptotically good.
[ { "version": "v1", "created": "Thu, 10 Mar 2022 11:29:15 GMT" } ]
2022-03-11T00:00:00
[ [ "Fan", "Yun", "" ], [ "Liu", "Hualu", "" ] ]
new_dataset
0.998257
2203.05333
Desmond Caulley
Desmond Caulley, Yufeng Yang, David Anderson
EACELEB: An East Asian Language Speaking Celebrity Dataset for Speaker Recognition
null
null
null
null
cs.SD eess.AS
http://creativecommons.org/licenses/by/4.0/
Large datasets are very useful for training speaker recognition systems, and various research groups have constructed several over the years. Voxceleb is a large dataset for speaker recognition that is extracted from Youtube videos. This paper presents an audio-visual method for acquiring audio data from Youtube given the speaker's name as input. The system follows a pipeline similar to that of the Voxceleb data acquisition method. However, our work focuses on fast data acquisition by using face-tracking in subsequent frames once a face has been detected -- this is preferable over face detection for every frame considering its computational cost. We show that applying audio diarization to our data after acquiring it can yield equal error rates comparable to Voxceleb. A secondary set of experiments showed that we could further decrease the error rate by fine-tuning a pre-trained x-vector system with the acquired data. Like Voxceleb, the work here focuses primarily on developing audio for celebrities. However, unlike Voxceleb, our target audio data is from celebrities in East Asian countries. Finally, we set up a speaker verification task to evaluate the accuracy of our acquired data. After diarization and fine-tuning, we achieved an equal error rate of approximately 4\% across our entire dataset.
[ { "version": "v1", "created": "Thu, 10 Mar 2022 12:29:35 GMT" } ]
2022-03-11T00:00:00
[ [ "Caulley", "Desmond", "" ], [ "Yang", "Yufeng", "" ], [ "Anderson", "David", "" ] ]
new_dataset
0.999871
2203.05367
Ishu Gupta
Ishu Gupta and Sloni Mittal and Ankit Tiwari and Priya Agarwal and Ashutosh Kumar Singh
TIDF-DLPM: Term and Inverse Document Frequency based Data Leakage Prevention Model
null
null
null
null
cs.CR
http://creativecommons.org/licenses/by/4.0/
Confidentiality of the data is being endangered as it has been categorized into false categories which might get leaked to an unauthorized party. For this reason, various organizations are mainly implementing data leakage prevention systems (DLPs). Firewalls and intrusion detection systems are being outdated versions of security mechanisms. The data which are being used, in sending state or are rest are being monitored by DLPs. The confidential data is prevented with the help of neighboring contexts and contents of DLPs. In this paper, a semantic-based approach is used to classify data based on the statistical data leakage prevention model. To detect involved private data, statistical analysis is being used to contribute secure mechanisms in the environment of data leakage. The favored Frequency-Inverse Document Frequency (TF-IDF) is the facts and details recapture function to arrange documents under particular topics. The results showcase that a similar statistical DLP approach could appropriately classify documents in case of extent alteration as well as interchanged documents.
[ { "version": "v1", "created": "Thu, 10 Mar 2022 13:37:48 GMT" } ]
2022-03-11T00:00:00
[ [ "Gupta", "Ishu", "" ], [ "Mittal", "Sloni", "" ], [ "Tiwari", "Ankit", "" ], [ "Agarwal", "Priya", "" ], [ "Singh", "Ashutosh Kumar", "" ] ]
new_dataset
0.998242
2203.05516
Grace Li Zhang
Grace Li Zhang and Bing Li and Xing Huang and Xunzhao Yin and Cheng Zhuo and Masanori Hashimoto and Ulf Schlichtmann
VirtualSync+: Timing Optimization with Virtual Synchronization
null
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In digital circuit designs, sequential components such as flip-flops are used to synchronize signal propagations. Logic computations are aligned at and thus isolated by flip-flop stages. Although this fully synchronous style can reduce design efforts significantly, it may affect circuit performance negatively, because sequential components can only introduce delays into signal propagations but never accelerate them. In this paper, we propose a new timing model, VirtualSync+, in which signals, specially those along critical paths, are allowed to propagate through several sequential stages without flip-flops. Timing constraints are still satisfied at the boundary of the optimized circuit to maintain a consistent interface with existing designs. By removing clock-to-q delays and setup time requirements of flip-flops on critical paths, the performance of a circuit can be pushed even beyond the limit of traditional sequential designs. In addition, we further enhance the optimization with VirtualSync+ by fine-tuning with commercial design tools, e.g., Design Compiler from Synopsys, to achieve more accurate result. Experimental results demonstrate that circuit performance can be improved by up to 4% (average 1.5%) compared with that after extreme retiming and sizing, while the increase of area is still negligible. This timing performance is enhanced beyond the limit of traditional sequential designs. It also demonstrates that compared with those after retiming and sizing, the circuits with VirtualSync+ can achieve better timing performance under the same area cost or smaller area cost under the same clock period, respectively.
[ { "version": "v1", "created": "Thu, 10 Mar 2022 18:08:57 GMT" } ]
2022-03-11T00:00:00
[ [ "Zhang", "Grace Li", "" ], [ "Li", "Bing", "" ], [ "Huang", "Xing", "" ], [ "Yin", "Xunzhao", "" ], [ "Zhuo", "Cheng", "" ], [ "Hashimoto", "Masanori", "" ], [ "Schlichtmann", "Ulf", "" ] ]
new_dataset
0.999536
2009.00951
Samuel Blake T
Sam Blake
Embedded Blockchains: A Synthesis of Blockchains, Spread Spectrum Watermarking, Perceptual Hashing & Digital Signatures
Going in a different direction with this research
null
null
null
cs.IT cs.CR cs.MM math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we introduce a scheme for detecting manipulated audio and video. The scheme is a synthesis of blockchains, encrypted spread spectrum watermarks, perceptual hashing and digital signatures, which we call an Embedded Blockchain. Within this scheme, we use the blockchain for its data structure of a cryptographically linked list, cryptographic hashing for absolute comparisons, perceptual hashing for flexible comparisons, digital signatures for proof of ownership, and encrypted spread spectrum watermarking to embed the blockchain into the background noise of the media. So each media recording has its own unique blockchain, with each block holding information describing the media segment. The problem of verifying the integrity of the media is recast to traversing the blockchain, block-by-block, and segment-by-segment of the media. If any chain is broken, the difference in the computed and extracted perceptual hash is used to estimate the level of manipulation.
[ { "version": "v1", "created": "Wed, 2 Sep 2020 11:08:43 GMT" }, { "version": "v2", "created": "Thu, 3 Sep 2020 00:46:47 GMT" }, { "version": "v3", "created": "Tue, 17 Nov 2020 01:55:59 GMT" }, { "version": "v4", "created": "Wed, 9 Mar 2022 11:28:01 GMT" } ]
2022-03-10T00:00:00
[ [ "Blake", "Sam", "" ] ]
new_dataset
0.998001
2011.11974
Yang You
Yang You, Wenhai Liu, Yanjie Ze, Yong-Lu Li, Weiming Wang, Cewu Lu
UKPGAN: A General Self-Supervised Keypoint Detector
Accepted to CVPR2022
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Keypoint detection is an essential component for the object registration and alignment. In this work, we reckon keypoint detection as information compression, and force the model to distill out irrelevant points of an object. Based on this, we propose UKPGAN, a general self-supervised 3D keypoint detector where keypoints are detected so that they could reconstruct the original object shape. Two modules: GAN-based keypoint sparsity control and salient information distillation modules are proposed to locate those important keypoints. Extensive experiments show that our keypoints align well with human annotated keypoint labels, and can be applied to SMPL human bodies under various non-rigid deformations. Furthermore, our keypoint detector trained on clean object collections generalizes well to real-world scenarios, thus further improves geometric registration when combined with off-the-shelf point descriptors. Repeatability experiments show that our model is stable under both rigid and non-rigid transformations, with local reference frame estimation. Our code is available on https://github.com/qq456cvb/UKPGAN.
[ { "version": "v1", "created": "Tue, 24 Nov 2020 09:08:21 GMT" }, { "version": "v2", "created": "Thu, 28 Jan 2021 04:04:19 GMT" }, { "version": "v3", "created": "Wed, 9 Mar 2022 05:27:26 GMT" } ]
2022-03-10T00:00:00
[ [ "You", "Yang", "" ], [ "Liu", "Wenhai", "" ], [ "Ze", "Yanjie", "" ], [ "Li", "Yong-Lu", "" ], [ "Wang", "Weiming", "" ], [ "Lu", "Cewu", "" ] ]
new_dataset
0.999125
2105.11888
Saman Ahmadi
Saman Ahmadi, Guido Tack, Daniel Harabor, Philip Kilby
Bi-objective Search with Bi-directional A*
16 pages, 4 figures, in Proceedings of The European Symposium on Algorithms 2021 (ESA21), Changes: including the backward search of BOBA*
null
10.4230/LIPIcs.ESA.2021.3
null
cs.AI cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Bi-objective search is a well-known algorithmic problem, concerned with finding a set of optimal solutions in a two-dimensional domain. This problem has a wide variety of applications such as planning in transport systems or optimal control in energy systems. Recently, bi-objective A*-based search (BOA*) has shown state-of-the-art performance in large networks. This paper develops a bi-directional and parallel variant of BOA*, enriched with several speed-up heuristics. Our experimental results on 1,000 benchmark cases show that our bi-directional A* algorithm for bi-objective search (BOBA*) can optimally solve all of the benchmark cases within the time limit, outperforming the state of the art BOA*, bi-objective Dijkstra and bi-directional bi-objective Dijkstra by an average runtime improvement of a factor of five over all of the benchmark instances.
[ { "version": "v1", "created": "Tue, 25 May 2021 12:46:25 GMT" }, { "version": "v2", "created": "Wed, 21 Jul 2021 04:32:30 GMT" } ]
2022-03-10T00:00:00
[ [ "Ahmadi", "Saman", "" ], [ "Tack", "Guido", "" ], [ "Harabor", "Daniel", "" ], [ "Kilby", "Philip", "" ] ]
new_dataset
0.979312
2106.04284
Bernhard Manfred Gruber
Bernhard Manfred Gruber, Guilherme Amadio, Jakob Blomer, Alexander Matthes, Ren\'e Widera, Michael Bussmann
LLAMA: The Low-Level Abstraction For Memory Access
39 pages, 10 figures, 11 listings
Softw Pract Exper. 2022; 1- 27
10.1002/spe.3077
null
cs.PF
http://creativecommons.org/licenses/by/4.0/
The performance gap between CPU and memory widens continuously. Choosing the best memory layout for each hardware architecture is increasingly important as more and more programs become memory bound. For portable codes that run across heterogeneous hardware architectures, the choice of the memory layout for data structures is ideally decoupled from the rest of a program. This can be accomplished via a zero-runtime-overhead abstraction layer, underneath which memory layouts can be freely exchanged. We present the Low-Level Abstraction of Memory Access (LLAMA), a C++ library that provides such a data structure abstraction layer with example implementations for multidimensional arrays of nested, structured data. LLAMA provides fully C++ compliant methods for defining and switching custom memory layouts for user-defined data types. The library is extensible with third-party allocators. Providing two close-to-life examples, we show that the LLAMA-generated AoS (Array of Structs) and SoA (Struct of Arrays) layouts produce identical code with the same performance characteristics as manually written data structures. Integrations into the SPEC CPU\textsuperscript{\textregistered} lbm benchmark and the particle-in-cell simulation PIConGPU demonstrate LLAMA's abilities in real-world applications. LLAMA's layout-aware copy routines can significantly speed up transfer and reshuffling of data between layouts compared with naive element-wise copying. LLAMA provides a novel tool for the development of high-performance C++ applications in a heterogeneous environment.
[ { "version": "v1", "created": "Tue, 8 Jun 2021 12:23:31 GMT" }, { "version": "v2", "created": "Wed, 24 Nov 2021 14:43:40 GMT" }, { "version": "v3", "created": "Wed, 9 Mar 2022 17:20:17 GMT" } ]
2022-03-10T00:00:00
[ [ "Gruber", "Bernhard Manfred", "" ], [ "Amadio", "Guilherme", "" ], [ "Blomer", "Jakob", "" ], [ "Matthes", "Alexander", "" ], [ "Widera", "René", "" ], [ "Bussmann", "Michael", "" ] ]
new_dataset
0.993395
2107.06075
Umberto Straccia
Giovanni Casini, Umberto Straccia
A Rational Entailment for Expressive Description Logics via Description Logic Programs
null
null
10.1007/978-3-030-95070-5_12
null
cs.LO cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Lehmann and Magidor's rational closure is acknowledged as a landmark in the field of non-monotonic logics and it has also been re-formulated in the context of Description Logics (DLs). We show here how to model a rational form of entailment for expressive DLs, such as SROIQ, providing a novel reasoning procedure that compiles a non-monotone DL knowledge base into a description logic program (dl-program).
[ { "version": "v1", "created": "Mon, 28 Jun 2021 14:35:42 GMT" } ]
2022-03-10T00:00:00
[ [ "Casini", "Giovanni", "" ], [ "Straccia", "Umberto", "" ] ]
new_dataset
0.99855
2108.03815
Yurong Chen Dr
Yurong Chen
P-WAE: Generalized Patch-Wasserstein Autoencoder for Anomaly Screening
I need to revise the paper
null
null
null
cs.CV cs.AI
http://creativecommons.org/licenses/by/4.0/
Anomaly detection plays a pivotal role in numerous real-world scenarios, such as industrial automation and manufacturing intelligence. Recently, variational inference-based anomaly analysis has attracted researchers' and developers' attention. It aims to model the defect-free distribution so that anomalies can be classified as out-of-distribution samples. Nevertheless, there are two disturbing factors that need us to prioritize: (i) the simplistic prior latent distribution inducing limited expressive capability; (ii) the strong probability distance notion results in collapsed features. In this paper, we propose a novel Patch-wise Wasserstein AutoEncoder (P-WAE) architecture to alleviate those challenges. In particular, a patch-wise variational inference model coupled with solving the jigsaw puzzle is designed, which is a simple yet effective way to increase the expressiveness of the latent manifold. This makes using the model on high-dimensional practical data possible. In addition, we leverage a weaker measure, sliced-Wasserstein distance, to achieve the equilibrium between the reconstruction fidelity and generalized representations. Comprehensive experiments, conducted on the MVTec AD dataset, demonstrate the superior performance of our proposed method.
[ { "version": "v1", "created": "Mon, 9 Aug 2021 05:31:45 GMT" }, { "version": "v2", "created": "Tue, 14 Sep 2021 06:43:36 GMT" }, { "version": "v3", "created": "Sat, 18 Sep 2021 00:12:19 GMT" }, { "version": "v4", "created": "Wed, 9 Mar 2022 09:12:48 GMT" } ]
2022-03-10T00:00:00
[ [ "Chen", "Yurong", "" ] ]
new_dataset
0.999308
2108.04750
Songlin Yang
Songlin Yang, Kewei Tu
Headed-Span-Based Projective Dependency Parsing
ACL2022 camera ready
null
null
null
cs.CL
http://creativecommons.org/publicdomain/zero/1.0/
We propose a new method for projective dependency parsing based on headed spans. In a projective dependency tree, the largest subtree rooted at each word covers a contiguous sequence (i.e., a span) in the surface order. We call such a span marked by a root word \textit{headed span}. A projective dependency tree can be represented as a collection of headed spans. We decompose the score of a dependency tree into the scores of the headed spans and design a novel $O(n^3)$ dynamic programming algorithm to enable global training and exact inference. Our model achieves state-of-the-art or competitive results on PTB, CTB, and UD. Our code is publicly available at \url{https://github.com/sustcsonglin/span-based-dependency-parsing}.
[ { "version": "v1", "created": "Tue, 10 Aug 2021 15:27:47 GMT" }, { "version": "v2", "created": "Wed, 9 Mar 2022 11:09:29 GMT" } ]
2022-03-10T00:00:00
[ [ "Yang", "Songlin", "" ], [ "Tu", "Kewei", "" ] ]
new_dataset
0.969088
2109.05788
Tiange Xiang
Tiange Xiang, Yang Song, Chaoyi Zhang, Dongnan Liu, Mei Chen, Fan Zhang, Heng Huang, Lauren O'Donnell, Weidong Cai
DSNet: A Dual-Stream Framework for Weakly-Supervised Gigapixel Pathology Image Analysis
IEEE TMI 2022
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a novel weakly-supervised framework for classifying whole slide images (WSIs). WSIs, due to their gigapixel resolution, are commonly processed by patch-wise classification with patch-level labels. However, patch-level labels require precise annotations, which is expensive and usually unavailable on clinical data. With image-level labels only, patch-wise classification would be sub-optimal due to inconsistency between the patch appearance and image-level label. To address this issue, we posit that WSI analysis can be effectively conducted by integrating information at both high magnification (local) and low magnification (regional) levels. We auto-encode the visual signals in each patch into a latent embedding vector representing local information, and down-sample the raw WSI to hardware-acceptable thumbnails representing regional information. The WSI label is then predicted with a Dual-Stream Network (DSNet), which takes the transformed local patch embeddings and multi-scale thumbnail images as inputs and can be trained by the image-level label only. Experiments conducted on two large-scale public datasets demonstrate that our method outperforms all recent state-of-the-art weakly-supervised WSI classification methods.
[ { "version": "v1", "created": "Mon, 13 Sep 2021 09:10:43 GMT" }, { "version": "v2", "created": "Wed, 9 Mar 2022 08:15:53 GMT" } ]
2022-03-10T00:00:00
[ [ "Xiang", "Tiange", "" ], [ "Song", "Yang", "" ], [ "Zhang", "Chaoyi", "" ], [ "Liu", "Dongnan", "" ], [ "Chen", "Mei", "" ], [ "Zhang", "Fan", "" ], [ "Huang", "Heng", "" ], [ "O'Donnell", "Lauren", "" ], [ "Cai", "Weidong", "" ] ]
new_dataset
0.984964
2201.01367
Won Kyung Do
Won Kyung Do and Monroe Kennedy III
DenseTact: Optical Tactile Sensor for Dense Shape Reconstruction
null
null
null
null
cs.RO cs.CV
http://creativecommons.org/licenses/by-nc-sa/4.0/
Increasing the performance of tactile sensing in robots enables versatile, in-hand manipulation. Vision-based tactile sensors have been widely used as rich tactile feedback has been shown to be correlated with increased performance in manipulation tasks. Existing tactile sensor solutions with high resolution have limitations that include low accuracy, expensive components, or lack of scalability. In this paper, an inexpensive, scalable, and compact tactile sensor with high-resolution surface deformation modeling for surface reconstruction of the 3D sensor surface is proposed. By measuring the image from the fisheye camera, it is shown that the sensor can successfully estimate the surface deformation in real-time (1.8ms) by using deep convolutional neural networks. This sensor in its design and sensing abilities represents a significant step toward better object in-hand localization, classification, and surface estimation all enabled by high-resolution shape reconstruction.
[ { "version": "v1", "created": "Tue, 4 Jan 2022 22:26:14 GMT" }, { "version": "v2", "created": "Tue, 1 Mar 2022 03:59:31 GMT" }, { "version": "v3", "created": "Wed, 2 Mar 2022 19:04:26 GMT" }, { "version": "v4", "created": "Tue, 8 Mar 2022 20:49:26 GMT" } ]
2022-03-10T00:00:00
[ [ "Do", "Won Kyung", "" ], [ "Kennedy", "Monroe", "III" ] ]
new_dataset
0.996558
2201.05671
Alberto Sonnino
Mathieu Baudet, Alberto Sonnino, Mahimna Kelkar, George Danezis
Zef: Low-latency, Scalable, Private Payments
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce Zef, the first Byzantine-Fault Tolerant (BFT) protocol to support payments in anonymous digital coins at arbitrary scale. Zef follows the communication and security model of FastPay: both protocols are asynchronous, low-latency, linearly-scalable, and powered by partially-trusted sharded authorities. Zef further introduces opaque coins represented as off-chain certificates that are bound to user accounts. In order to hide the face values of coins when a payment operation consumes or creates them, Zef uses random commitments and NIZK proofs. Created coins are made unlinkable using the blind and randomizable threshold anonymous credentials of Coconut. To control storage costs associated with coin replay prevention, Zef accounts are designed so that data can be safely removed once an account is deactivated. Besides the specifications and a detailed analysis of the protocol, we are making available an open-source implementation of Zef in Rust. Our extensive benchmarks on AWS confirm textbook linear scalability and demonstrate a confirmation time under one second at nominal capacity. Compared to existing anonymous payment systems based on a blockchain, this represents a latency speedup of three orders of magnitude, with no theoretical limit on throughput.
[ { "version": "v1", "created": "Fri, 14 Jan 2022 21:09:11 GMT" }, { "version": "v2", "created": "Wed, 19 Jan 2022 11:07:13 GMT" }, { "version": "v3", "created": "Thu, 3 Mar 2022 19:13:30 GMT" }, { "version": "v4", "created": "Tue, 8 Mar 2022 21:37:24 GMT" } ]
2022-03-10T00:00:00
[ [ "Baudet", "Mathieu", "" ], [ "Sonnino", "Alberto", "" ], [ "Kelkar", "Mahimna", "" ], [ "Danezis", "George", "" ] ]
new_dataset
0.997237
2203.02225
Yucheng Zhou
Yucheng Zhou, Tao Shen, Xiubo Geng, Guodong Long, Daxin Jiang
ClarET: Pre-training a Correlation-Aware Context-To-Event Transformer for Event-Centric Generation and Classification
ACL 2022 camera-ready version
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Generating new events given context with correlated ones plays a crucial role in many event-centric reasoning tasks. Existing works either limit their scope to specific scenarios or overlook event-level correlations. In this paper, we propose to pre-train a general Correlation-aware context-to-Event Transformer (ClarET) for event-centric reasoning. To achieve this, we propose three novel event-centric objectives, i.e., whole event recovering, contrastive event-correlation encoding and prompt-based event locating, which highlight event-level correlations with effective training. The proposed ClarET is applicable to a wide range of event-centric reasoning scenarios, considering its versatility of (i) event-correlation types (e.g., causal, temporal, contrast), (ii) application formulations (i.e., generation and classification), and (iii) reasoning types (e.g., abductive, counterfactual and ending reasoning). Empirical fine-tuning results, as well as zero- and few-shot learning, on 9 benchmarks (5 generation and 4 classification tasks covering 4 reasoning types with diverse event correlations), verify its effectiveness and generalization ability.
[ { "version": "v1", "created": "Fri, 4 Mar 2022 10:11:15 GMT" }, { "version": "v2", "created": "Wed, 9 Mar 2022 08:55:31 GMT" } ]
2022-03-10T00:00:00
[ [ "Zhou", "Yucheng", "" ], [ "Shen", "Tao", "" ], [ "Geng", "Xiubo", "" ], [ "Long", "Guodong", "" ], [ "Jiang", "Daxin", "" ] ]
new_dataset
0.999075
2203.02797
Jiang Shuyu
Shuyu Jiang, Dengbiao Tu, Xingshu Chen, Rui Tang, Wenxian Wang, Haizhou Wang
ClueGraphSum: Let Key Clues Guide the Cross-Lingual Abstractive Summarization
12 pages,4 figures
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cross-Lingual Summarization (CLS) is the task to generate a summary in one language for an article in a different language. Previous studies on CLS mainly take pipeline methods or train the end-to-end model using the translated parallel data. However, the quality of generated cross-lingual summaries needs more further efforts to improve, and the model performance has never been evaluated on the hand-written CLS dataset. Therefore, we first propose a clue-guided cross-lingual abstractive summarization method to improve the quality of cross-lingual summaries, and then construct a novel hand-written CLS dataset for evaluation. Specifically, we extract keywords, named entities, etc. of the input article as key clues for summarization and then design a clue-guided algorithm to transform an article into a graph with less noisy sentences. One Graph encoder is built to learn sentence semantics and article structures and one Clue encoder is built to encode and translate key clues, ensuring the information of important parts are reserved in the generated summary. These two encoders are connected by one decoder to directly learn cross-lingual semantics. Experimental results show that our method has stronger robustness for longer inputs and substantially improves the performance over the strong baseline, achieving an improvement of 8.55 ROUGE-1 (English-to-Chinese summarization) and 2.13 MoverScore (Chinese-to-English summarization) scores over the existing SOTA.
[ { "version": "v1", "created": "Sat, 5 Mar 2022 18:01:11 GMT" }, { "version": "v2", "created": "Wed, 9 Mar 2022 08:01:15 GMT" } ]
2022-03-10T00:00:00
[ [ "Jiang", "Shuyu", "" ], [ "Tu", "Dengbiao", "" ], [ "Chen", "Xingshu", "" ], [ "Tang", "Rui", "" ], [ "Wang", "Wenxian", "" ], [ "Wang", "Haizhou", "" ] ]
new_dataset
0.998904
2203.03175
Said Varlioglu
Said Varlioglu, Nelly Elsayed, Zag ElSayed, Murat Ozer
The Dangerous Combo: Fileless Malware and Cryptojacking
9 Pages - Accepted to be published in SoutheastCon 2022 IEEE Region 3 Technical, Professional, and Student Conference. Mobile, Alabama, USA. Mar 31st to Apr 03rd 2022. https://ieeesoutheastcon.org/
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Fileless malware and cryptojacking attacks have appeared independently as the new alarming threats in 2017. After 2020, fileless attacks have been devastating for victim organizations with low-observable characteristics. Also, the amount of unauthorized cryptocurrency mining has increased after 2019. Adversaries have started to merge these two different cyberattacks to gain more invisibility and profit under "Fileless Cryptojacking." This paper aims to provide a literature review in academic papers and industry reports for this new threat. Additionally, we present a new threat hunting-oriented DFIR approach with the best practices derived from field experience as well as the literature. Last, this paper reviews the fundamentals of the fileless threat that can also help ransomware researchers examine similar patterns.
[ { "version": "v1", "created": "Mon, 7 Mar 2022 07:03:43 GMT" }, { "version": "v2", "created": "Wed, 9 Mar 2022 08:38:04 GMT" } ]
2022-03-10T00:00:00
[ [ "Varlioglu", "Said", "" ], [ "Elsayed", "Nelly", "" ], [ "ElSayed", "Zag", "" ], [ "Ozer", "Murat", "" ] ]
new_dataset
0.995163
2203.04142
Latif Salum
Latif Salum
A Reply to "On Salum's Algorithm for X3SAT"
null
null
null
null
cs.CC
http://creativecommons.org/licenses/by/4.0/
This paper is a reply to "On Salum's Algorithm for X3SAT" (arXiv:2104.02886)
[ { "version": "v1", "created": "Mon, 6 Dec 2021 11:46:20 GMT" }, { "version": "v2", "created": "Wed, 9 Mar 2022 13:21:28 GMT" } ]
2022-03-10T00:00:00
[ [ "Salum", "Latif", "" ] ]
new_dataset
0.95474
2203.04358
Hemant Surale
Hemant Bhaskar Surale, Yu Jiang Tham, Brian A. Smith, Rajan Vaish
ARcall: Real-Time AR Communication using Smartphones and Smartglasses
19 pages, 6 figures, Augmented Humans 2022 March 13-15th, 2022, Munich, Germany
null
null
null
cs.HC cs.SI
http://creativecommons.org/licenses/by-nc-sa/4.0/
Augmented Reality (AR) smartglasses are increasingly regarded as the next generation personal computing platform. However, there is a lack of understanding about how to design communication systems using them. We present ARcall, a novel Augmented Reality-based real-time communication system that enables an immersive, delightful, and privacy-preserving experience between a smartphone user and a smartglasses wearer. ARcall allows a remote friend (Friend) to send and project AR content to a smartglasses wearer (Wearer). The ARcall system was designed with the practical limits of existing AR glasses in mind, including shorter battery life and a reduced field of view. We conduct a qualitative evaluation of the three main components of ARcall: Drop-In, ARaction, and Micro-Chat. Our results provide novel insights for building future AR-based communication methods, including, the importance of context priming, user control over AR content placement, and the feeling of co-presence while conversing.
[ { "version": "v1", "created": "Tue, 8 Mar 2022 19:32:16 GMT" } ]
2022-03-10T00:00:00
[ [ "Surale", "Hemant Bhaskar", "" ], [ "Tham", "Yu Jiang", "" ], [ "Smith", "Brian A.", "" ], [ "Vaish", "Rajan", "" ] ]
new_dataset
0.996731
2203.04410
Rayan El Helou
Rayan El Helou, Kiyeob Lee, Dongqi Wu, Le Xie, Srinivas Shakkottai, Vijay Subramanian
OpenGridGym: An Open-Source AI-Friendly Toolkit for Distribution Market Simulation
null
null
null
null
cs.AI cs.SY eess.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents OpenGridGym, an open-source Python-based package that allows for seamless integration of distribution market simulation with state-of-the-art artificial intelligence (AI) decision-making algorithms. We present the architecture and design choice for the proposed framework, elaborate on how users interact with OpenGridGym, and highlight its value by providing multiple cases to demonstrate its use. Four modules are used in any simulation: (1) the physical grid, (2) market mechanisms, (3) a set of trainable agents which interact with the former two modules, and (4) environment module that connects and coordinates the above three. We provide templates for each of those four, but they are easily interchangeable with custom alternatives. Several case studies are presented to illustrate the capability and potential of this toolkit in helping researchers address key design and operational questions in distribution electricity markets.
[ { "version": "v1", "created": "Sun, 6 Mar 2022 07:03:05 GMT" } ]
2022-03-10T00:00:00
[ [ "Helou", "Rayan El", "" ], [ "Lee", "Kiyeob", "" ], [ "Wu", "Dongqi", "" ], [ "Xie", "Le", "" ], [ "Shakkottai", "Srinivas", "" ], [ "Subramanian", "Vijay", "" ] ]
new_dataset
0.998947
2203.04412
Maura Pintor
Maura Pintor, Daniele Angioni, Angelo Sotgiu, Luca Demetrio, Ambra Demontis, Battista Biggio, Fabio Roli
ImageNet-Patch: A Dataset for Benchmarking Machine Learning Robustness against Adversarial Patches
null
null
null
null
cs.CR cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Adversarial patches are optimized contiguous pixel blocks in an input image that cause a machine-learning model to misclassify it. However, their optimization is computationally demanding, and requires careful hyperparameter tuning, potentially leading to suboptimal robustness evaluations. To overcome these issues, we propose ImageNet-Patch, a dataset to benchmark machine-learning models against adversarial patches. It consists of a set of patches, optimized to generalize across different models, and readily applicable to ImageNet data after preprocessing them with affine transformations. This process enables an approximate yet faster robustness evaluation, leveraging the transferability of adversarial perturbations. We showcase the usefulness of this dataset by testing the effectiveness of the computed patches against 127 models. We conclude by discussing how our dataset could be used as a benchmark for robustness, and how our methodology can be generalized to other domains. We open source our dataset and evaluation code at https://github.com/pralab/ImageNet-Patch.
[ { "version": "v1", "created": "Mon, 7 Mar 2022 17:22:30 GMT" } ]
2022-03-10T00:00:00
[ [ "Pintor", "Maura", "" ], [ "Angioni", "Daniele", "" ], [ "Sotgiu", "Angelo", "" ], [ "Demetrio", "Luca", "" ], [ "Demontis", "Ambra", "" ], [ "Biggio", "Battista", "" ], [ "Roli", "Fabio", "" ] ]
new_dataset
0.999811
2203.04440
Kshitiz Bansal
Kshitiz Bansal, Keshav Rungta, Siyuan Zhu, Dinesh Bharadia
Pointillism: Accurate 3D bounding box estimation with multi-radars
Accepted in SenSys '20. Dataset has been made publicly available
Proceedings of the 18th Conference on Embedded Networked Sensor Systems. Pages 340-353, 2020
10.1145/3384419.3430783
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
Autonomous perception requires high-quality environment sensing in the form of 3D bounding boxes of dynamic objects. The primary sensors used in automotive systems are light-based cameras and LiDARs. However, they are known to fail in adverse weather conditions. Radars can potentially solve this problem as they are barely affected by adverse weather conditions. However, specular reflections of wireless signals cause poor performance of radar point clouds. We introduce Pointillism, a system that combines data from multiple spatially separated radars with an optimal separation to mitigate these problems. We introduce a novel concept of Cross Potential Point Clouds, which uses the spatial diversity induced by multiple radars and solves the problem of noise and sparsity in radar point clouds. Furthermore, we present the design of RP-net, a novel deep learning architecture, designed explicitly for radar's sparse data distribution, to enable accurate 3D bounding box estimation. The spatial techniques designed and proposed in this paper are fundamental to radars point cloud distribution and would benefit other radar sensing applications.
[ { "version": "v1", "created": "Tue, 8 Mar 2022 23:09:58 GMT" } ]
2022-03-10T00:00:00
[ [ "Bansal", "Kshitiz", "" ], [ "Rungta", "Keshav", "" ], [ "Zhu", "Siyuan", "" ], [ "Bharadia", "Dinesh", "" ] ]
new_dataset
0.997503
2203.04448
Jordan Samhi
Jordan Samhi, Tegawend\'e F. Bissyand\'e, Jacques Klein
TriggerZoo: A Dataset of Android Applications Automatically Infected with Logic Bombs
In the proceedings of the 19th International Conference on Mining Software Repositories, Data Showcase, (MSR 2022)
null
null
null
cs.CR cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many Android apps analyzers rely, among other techniques, on dynamic analysis to monitor their runtime behavior and detect potential security threats. However, malicious developers use subtle, though efficient, techniques to bypass dynamic analyzers. Logic bombs are examples of popular techniques where the malicious code is triggered only under specific circumstances, challenging comprehensive dynamic analyses. The research community has proposed various approaches and tools to detect logic bombs. Unfortunately, rigorous assessment and fair comparison of state-of-the-art techniques are impossible due to the lack of ground truth. In this paper, we present TriggerZoo, a new dataset of 406 Android apps containing logic bombs and benign trigger-based behavior that we release only to the research community using authenticated API. These apps are real-world apps from Google Play that have been automatically infected by our tool AndroBomb. The injected pieces of code implementing the logic bombs cover a large pallet of realistic logic bomb types that we have manually characterized from a set of real logic bombs. Researchers can exploit this dataset as ground truth to assess their approaches and provide comparisons against other tools.
[ { "version": "v1", "created": "Tue, 8 Mar 2022 23:43:26 GMT" } ]
2022-03-10T00:00:00
[ [ "Samhi", "Jordan", "" ], [ "Bissyandé", "Tegawendé F.", "" ], [ "Klein", "Jacques", "" ] ]
new_dataset
0.999825
2203.04472
Qige Song
Qige Song, Yongzheng Zhang, Linshu Ouyang, Yige Chen
BinMLM: Binary Authorship Verification with Flow-aware Mixture-of-Shared Language Model
12 pages, 8 figures, 5 tables, accepted by Research Track of 29th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER 2022), the camera-ready version
null
null
null
cs.SE
http://creativecommons.org/licenses/by/4.0/
Binary authorship analysis is a significant problem in many software engineering applications. In this paper, we formulate a binary authorship verification task to accurately reflect the real-world working process of software forensic experts. It aims to determine whether an anonymous binary is developed by a specific programmer with a small set of support samples, and the actual developer may not belong to the known candidate set but from the wild. We propose an effective binary authorship verification framework, BinMLM. BinMLM trains the RNN language model on consecutive opcode traces extracted from the control-flow-graph (CFG) to characterize the candidate developers' programming styles. We build a mixture-of-shared architecture with multiple shared encoders and author-specific gate layers, which can learn the developers' combination preferences of universal programming patterns and alleviate the problem of low training resources. Through an optimization pipeline of external pre-training, joint training, and fine-tuning, our framework can eliminate additional noise and accurately distill developers' unique styles. Extensive experiments show that BinMLM achieves promising results on Google Code Jam (GCJ) and Codeforces datasets with different numbers of programmers and supporting samples. It significantly outperforms the baselines built on the state-of-the-art feature set (4.73% to 19.46% improvement) and remains robust in multi-author collaboration scenarios. Furthermore, BinMLM can perform organization-level verification on a real-world APT malware dataset, which can provide valuable auxiliary information for exploring the group behind the APT attack.
[ { "version": "v1", "created": "Wed, 9 Mar 2022 01:24:23 GMT" } ]
2022-03-10T00:00:00
[ [ "Song", "Qige", "" ], [ "Zhang", "Yongzheng", "" ], [ "Ouyang", "Linshu", "" ], [ "Chen", "Yige", "" ] ]
new_dataset
0.984152
2203.04478
Rajeev Yasarla
Rajeev Yasarla, Renliang Weng, Wongun Choi, Vishal Patel, and Amir Sadeghian
3SD: Self-Supervised Saliency Detection With No Labels
null
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
We present a conceptually simple self-supervised method for saliency detection. Our method generates and uses pseudo-ground truth labels for training. The generated pseudo-GT labels don't require any kind of human annotations (e.g., pixel-wise labels or weak labels like scribbles). Recent works show that features extracted from classification tasks provide important saliency cues like structure and semantic information of salient objects in the image. Our method, called 3SD, exploits this idea by adding a branch for a self-supervised classification task in parallel with salient object detection, to obtain class activation maps (CAM maps). These CAM maps along with the edges of the input image are used to generate the pseudo-GT saliency maps to train our 3SD network. Specifically, we propose a contrastive learning-based training on multiple image patches for the classification task. We show the multi-patch classification with contrastive loss improves the quality of the CAM maps compared to naive classification on the entire image. Experiments on six benchmark datasets demonstrate that without any labels, our 3SD method outperforms all existing weakly supervised and unsupervised methods, and its performance is on par with the fully-supervised methods. Code is available at :https://github.com/rajeevyasarla/3SD
[ { "version": "v1", "created": "Wed, 9 Mar 2022 01:40:28 GMT" } ]
2022-03-10T00:00:00
[ [ "Yasarla", "Rajeev", "" ], [ "Weng", "Renliang", "" ], [ "Choi", "Wongun", "" ], [ "Patel", "Vishal", "" ], [ "Sadeghian", "Amir", "" ] ]
new_dataset
0.998826
2203.04637
Haoyu Liu
Haoyu Liu, Yang Liu, Hongkai He and Hangfang Yang
LEBP -- Language Expectation & Binding Policy: A Two-Stream Framework for Embodied Vision-and-Language Interaction Task Learning Agents
6 pages
null
null
null
cs.AI cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
People always desire an embodied agent that can perform a task by understanding language instruction. Moreover, they also want to monitor and expect agents to understand commands the way they expected. But, how to build such an embodied agent is still unclear. Recently, people can explore this problem with the Vision-and-Language Interaction benchmark ALFRED, which requires an agent to perform complicated daily household tasks following natural language instructions in unseen scenes. In this paper, we propose LEBP -- Language Expectation and Binding Policy Module to tackle the ALFRED. The LEBP contains a two-stream process: 1) It first conducts a language expectation module to generate an expectation describing how to perform tasks by understanding the language instruction. The expectation consists of a sequence of sub-steps for the task (e.g., Pick an apple). The expectation allows people to access and check the understanding results of instructions before the agent takes actual actions, in case the task might go wrong. 2) Then, it uses the binding policy module to bind sub-steps in expectation to actual actions to specific scenarios. Actual actions include navigation and object manipulation. Experimental results suggest our approach achieves comparable performance to currently published SOTA methods and can avoid large decay from seen scenarios to unseen scenarios.
[ { "version": "v1", "created": "Wed, 9 Mar 2022 10:47:10 GMT" } ]
2022-03-10T00:00:00
[ [ "Liu", "Haoyu", "" ], [ "Liu", "Yang", "" ], [ "He", "Hongkai", "" ], [ "Yang", "Hangfang", "" ] ]
new_dataset
0.998222
2203.04645
Marcos Faundez-Zanuy
Elsa Fernandez, Jordi Sole-Casals, Pilar M. Calvo, Marcos Faundez-Zanuy, Karmele Lopez-de-Ipina
HAIDA: Biometric technological therapy tools for neurorehabilitation of Cognitive Impairment
2 pages
In: Masia L., Micera S., Akay M., Pons J. (eds) Converging Clinical and Engineering Research on Neurorehabilitation III. ICNR 2018. Biosystems & Biorobotics, vol 21. Springer, Cham
10.1007/978-3-030-01845-0_148
null
cs.LG
http://creativecommons.org/licenses/by-nc-nd/4.0/
Dementia, and specially Alzheimer s disease (AD) and Mild Cognitive Impairment (MCI) are one of the most important diseases suffered by elderly population. Music therapy is one of the most widely used non-pharmacological treatment in the field of cognitive impairments, given that music influences their mood, behavior, the decrease of anxiety, as well as facilitating reminiscence, emotional expressions and movement. In this work we present HAIDA, a multi-platform support system for Musical Therapy oriented to cognitive impairment, which includes not only therapy tools but also non-invasive biometric analysis, speech, activity and hand activity. At this moment the system is on use and recording the first sets of data.
[ { "version": "v1", "created": "Wed, 9 Mar 2022 11:13:39 GMT" } ]
2022-03-10T00:00:00
[ [ "Fernandez", "Elsa", "" ], [ "Sole-Casals", "Jordi", "" ], [ "Calvo", "Pilar M.", "" ], [ "Faundez-Zanuy", "Marcos", "" ], [ "Lopez-de-Ipina", "Karmele", "" ] ]
new_dataset
0.966185
2203.04699
Boris Shminke
Boris Shminke
Gym-saturation: an OpenAI Gym environment for saturation provers
6 pages, 1 figure
Journal of Open Source Software, 7(71), 3849, 2022
10.21105/joss.03849
null
cs.AI
http://creativecommons.org/licenses/by/4.0/
`gym-saturation` is an OpenAI Gym environment for reinforcement learning (RL) agents capable of proving theorems. Currently, only theorems written in a formal language of the Thousands of Problems for Theorem Provers (TPTP) library in clausal normal form (CNF) are supported. `gym-saturation` implements the 'given clause' algorithm (similar to the one used in Vampire and E Prover). Being written in Python, `gym-saturation` was inspired by PyRes. In contrast to the monolithic architecture of a typical Automated Theorem Prover (ATP), `gym-saturation` gives different agents opportunities to select clauses themselves and train from their experience. Combined with a particular agent, `gym-saturation` can work as an ATP. Even with a non trained agent based on heuristics, `gym-saturation` can find refutations for 688 (of 8257) CNF problems from TPTP v7.5.0.
[ { "version": "v1", "created": "Wed, 9 Mar 2022 13:22:15 GMT" } ]
2022-03-10T00:00:00
[ [ "Shminke", "Boris", "" ] ]
new_dataset
0.999503
2203.04765
V\'ictor Mayoral Vilches
V\'ictor Mayoral-Vilches
Robot Hacking Manual (RHM)
null
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Robots are often shipped insecure and in some cases fully unprotected. The rationale behind is fourfold: first, defensive security mechanisms for robots are still on their early stages, not covering the complete threat landscape. Second, the inherent complexity of robotic systems makes their protection costly, both technically and economically. Third, robot vendors do not generally take responsibility in a timely manner, extending the zero-days exposure window (time until mitigation of a zero-day) to several years on average. Fourth, contrary to the common-sense expectations in 21st century and similar to Ford in the 1920s with cars, most robot manufacturers oppose or difficult robot repairs. The Robot Hacking Manual (RHM) is an introductory series about cybersecurity for robots, with an attempt to provide comprehensive case studies and step-by-step tutorials with the intent to raise awareness in the field and highlight the importance of taking a security-first approach. The material available here is also a personal learning attempt and it's disconnected from any particular organization. Content is provided as is and by no means it's encouraged or promoted the unauthorized tampering of robotic systems or related technologies.
[ { "version": "v1", "created": "Fri, 7 Jan 2022 17:34:15 GMT" } ]
2022-03-10T00:00:00
[ [ "Mayoral-Vilches", "Víctor", "" ] ]
new_dataset
0.99271
2203.04776
Carlos Ganan
Antoine d'Estalenx and Carlos H. Ga\~n\'an
NURSE: eNd-UseR IoT malware detection tool for Smart homEs
null
null
10.1145/3494322.3494340
null
cs.CR cs.NI
http://creativecommons.org/licenses/by-nc-sa/4.0/
Traditional techniques to detect malware infections were not meant to be used by the end-user and current malware removal tools and security software cannot handle the heterogeneity of IoT devices. In this paper, we design, develop and evaluate a tool, called NURSE, to fill this information gap, i.e., enabling end-users to detect IoT-malware infections in their home networks. NURSE follows a modular approach to analyze IoT traffic as captured by means of an ARP spoofing technique which does not require any network modification or specific hardware. Thus, NURSE provides zero-configuration IoT traffic analysis within everybody's reach. After testing NURSE in 83 different IoT network scenarios with a wide variety of IoT device types, results show that NURSE identifies malware-infected IoT devices with high accuracy (86.7%) using device network behavior and contacted destinations.
[ { "version": "v1", "created": "Wed, 9 Mar 2022 14:52:26 GMT" } ]
2022-03-10T00:00:00
[ [ "d'Estalenx", "Antoine", "" ], [ "Gañán", "Carlos H.", "" ] ]
new_dataset
0.969768
2203.04803
Roy Friedman
Roy Friedman and Or Goaz and Dor Hovav
Limited Associativity Caching in the Data Plane
null
null
null
null
cs.NI cs.OS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In-network caching promises to improve the performance of networked and edge applications as it shortens the paths data need to travel. This is by storing so-called hot items in the network switches on-route between clients who access the data and the storage servers who maintain it. Since the data flows through those switches in any case, it is natural to cache hot items there. Most software-managed caches treat the cache as a fully associative region. Alas, a fully associative design seems to be at odds with programmable switches' goal of handling packets in a short bounded amount of time, as well as their restricted programming model. In this work, we present PKache, a generic limited associativity cache implementation in the programmable switches' domain-specific P4 language, and demonstrate its utility by realizing multiple popular cache management schemes.
[ { "version": "v1", "created": "Wed, 9 Mar 2022 15:32:40 GMT" } ]
2022-03-10T00:00:00
[ [ "Friedman", "Roy", "" ], [ "Goaz", "Or", "" ], [ "Hovav", "Dor", "" ] ]
new_dataset
0.951426
1907.04826
Holger Dell
Holger Dell, John Lapinskas, Kitty Meeks
Approximately counting and sampling small witnesses using a colourful decision oracle
null
null
10.1137/1.9781611975994.135
null
cs.DS cs.CC
http://creativecommons.org/licenses/by-nc-sa/4.0/
In this paper, we design efficient algorithms to approximately count the number of edges of a given $k$-hypergraph, and to sample an approximately uniform random edge. The hypergraph is not given explicitly, and can be accessed only through its colourful independence oracle: The colourful independence oracle returns yes or no depending on whether a given subset of the vertices contains an edge that is colourful with respect to a given vertex-colouring. Our results extend and/or strengthen recent results in the graph oracle literature due to Beame et al. (ITCS 2018), Dell and Lapinskas (STOC 2018), and Bhattacharya et al. (ISAAC 2019). Our results have consequences for approximate counting/sampling: We can turn certain kinds of decision algorithms into approximate counting/sampling algorithms without causing much overhead in the running time. We apply this approximate-counting/sampling-to-decision reduction to key problems in fine-grained complexity (such as $k$-SUM, $k$-OV and weighted $k$-Clique) and parameterised complexity (such as induced subgraphs of size $k$ or weight-$k$ solutions to CSPs).
[ { "version": "v1", "created": "Wed, 10 Jul 2019 17:11:58 GMT" }, { "version": "v2", "created": "Mon, 7 Mar 2022 19:01:01 GMT" } ]
2022-03-09T00:00:00
[ [ "Dell", "Holger", "" ], [ "Lapinskas", "John", "" ], [ "Meeks", "Kitty", "" ] ]
new_dataset
0.954091
2005.04990
Luigi De Simone
Domenico Cotroneo, Luigi De Simone, Pietro Liguori, Roberto Natella
ProFIPy: Programmable Software Fault Injection as-a-Service
50th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2020)
null
10.1109/DSN48063.2020.00052
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a new fault injection tool (ProFIPy) for Python software. The tool is designed to be programmable, in order to enable users to specify their software fault model, using a domain-specific language (DSL) for fault injection. Moreover, to achieve better usability, ProFIPy is provided as software-as-a-service and supports the user through the configuration of the faultload and workload, failure data analysis, and full automation of the experiments using container-based virtualization and parallelization.
[ { "version": "v1", "created": "Mon, 11 May 2020 10:45:49 GMT" } ]
2022-03-09T00:00:00
[ [ "Cotroneo", "Domenico", "" ], [ "De Simone", "Luigi", "" ], [ "Liguori", "Pietro", "" ], [ "Natella", "Roberto", "" ] ]
new_dataset
0.999423
2005.07997
Warut Suksompong
Florian Brandl, Felix Brandt, Matthias Greger, Dominik Peters, Christian Stricker, Warut Suksompong
Funding Public Projects: A Case for the Nash Product Rule
null
Journal of Mathematical Economics, 99:102585 (2022)
10.1016/j.jmateco.2021.102585
null
cs.GT econ.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study a mechanism design problem where a community of agents wishes to fund public projects via voluntary monetary contributions by the community members. This serves as a model for public expenditure without an exogenously available budget, such as participatory budgeting or voluntary tax programs, as well as donor coordination when interpreting charities as public projects and donations as contributions. Our aim is to identify a mutually beneficial distribution of the individual contributions. In the preference aggregation problem that we study, agents report linear utility functions over projects together with the amount of their contributions, and the mechanism determines a socially optimal distribution of the money. We identify a specific mechanism -- the Nash product rule -- which picks the distribution that maximizes the product of the agents' utilities. This rule is Pareto efficient, and we prove that it satisfies attractive incentive properties: it spends each agent's contribution only on projects the agent finds acceptable, and agents are strongly incentivized to participate.
[ { "version": "v1", "created": "Sat, 16 May 2020 14:17:00 GMT" }, { "version": "v2", "created": "Mon, 11 Oct 2021 13:40:39 GMT" } ]
2022-03-09T00:00:00
[ [ "Brandl", "Florian", "" ], [ "Brandt", "Felix", "" ], [ "Greger", "Matthias", "" ], [ "Peters", "Dominik", "" ], [ "Stricker", "Christian", "" ], [ "Suksompong", "Warut", "" ] ]
new_dataset
0.969149
2006.06131
Zhiyi Zhang
Zhiyi Zhang, Tianyuan Yu, Xinyu Ma, Yu Guan, Philipp Moll, Lixia Zhang
Sovereign: User-Controlled Smart Homes
null
IEEE Internet of Things Journal, 2022
10.1109/JIOT.2022.3144980
null
cs.NI cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent years have witnessed the rapid deployment of smart homes; most of them are controlled by remote servers in the cloud. Such designs raise security and privacy concerns for end users. In this paper, we describe the design of Sovereign, a home IoT system framework that provides end users complete control of their home IoT systems. Sovereign lets home IoT devices and applications communicate via application-named data and secures data directly. This enables direct, secure, one-to-one and one-to-many device-to-device communication over wireless broadcast media. Sovereign utilizes semantic names to construct usable security solutions. We implement Sovereign as a publish-subscribe-based development platform together with a prototype home IoT controller. Our preliminary evaluation shows that Sovereign provides a systematic, easy-to-use solution to user-controlled, self-contained smart homes running on existing IoT hardware without imposing noticeable overhead.
[ { "version": "v1", "created": "Thu, 11 Jun 2020 00:44:09 GMT" }, { "version": "v2", "created": "Fri, 12 Jun 2020 18:38:55 GMT" }, { "version": "v3", "created": "Sun, 1 Aug 2021 20:00:08 GMT" } ]
2022-03-09T00:00:00
[ [ "Zhang", "Zhiyi", "" ], [ "Yu", "Tianyuan", "" ], [ "Ma", "Xinyu", "" ], [ "Guan", "Yu", "" ], [ "Moll", "Philipp", "" ], [ "Zhang", "Lixia", "" ] ]
new_dataset
0.998603
2007.06795
Hiram H. L\'opez
Taylor Ball, Eduardo Camps, Henry Chimal-Dzul, Delio Jaramillo-Velez, Hiram H. L\'opez, Nathan Nichols, Matthew Perkins, Ivan Soprunov, German Vera-Mart\'inez, Gwyn Whieldon
Coding theory package for Macaulay2
null
J. Softw. Alg. Geom. 11 (2021) 113-122
10.2140/jsag.2021.11.113
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this Macaulay2 \cite{M2} package we define an object called {\it linear code}. We implement functions that compute basic parameters and objects associated with a linear code, such as generator and parity check matrices, the dual code, length, dimension, and minimum distance, among others. We define an object {\it evaluation code}, a construction which allows to study linear codes using tools of algebraic geometry and commutative algebra. We implement functions to generate important families of linear codes such as Hamming codes, cyclic codes, Reed--Solomon codes, Reed--Muller codes, Cartesian codes, monomial--Cartesian codes, and toric codes. In addition, we define functions for the syndrome decoding algorithm and locally recoverable code construction, which are important tools in applications of linear codes. The package \textit{CodingTheory.m2} is available at \url{https://github.com/Macaulay2/Workshop-2020-Cleveland/tree/CodingTheory/CodingTheory}
[ { "version": "v1", "created": "Tue, 14 Jul 2020 03:38:29 GMT" } ]
2022-03-09T00:00:00
[ [ "Ball", "Taylor", "" ], [ "Camps", "Eduardo", "" ], [ "Chimal-Dzul", "Henry", "" ], [ "Jaramillo-Velez", "Delio", "" ], [ "López", "Hiram H.", "" ], [ "Nichols", "Nathan", "" ], [ "Perkins", "Matthew", "" ], [ "Soprunov", "Ivan", "" ], [ "Vera-Martínez", "German", "" ], [ "Whieldon", "Gwyn", "" ] ]
new_dataset
0.996934
2102.02959
Fakrul Islam Tushar
Vincent M. D'Anniballe, Fakrul Islam Tushar, Khrystyna Faryna, Songyue Han, Maciej A. Mazurowski, Geoffrey D. Rubin, Joseph Y. Lo
Multi-Label Annotation of Chest Abdomen Pelvis Computed Tomography Text Reports Using Deep Learning
null
null
null
null
cs.AI cs.CL cs.LG
http://creativecommons.org/licenses/by/4.0/
Purpose: To develop high throughput multi-label annotators for body (chest, abdomen, and pelvis) Computed Tomography (CT) reports that can be applied across a variety of abnormalities, organs, and disease states. Approach: We used a dictionary approach to develop rule-based algorithms (RBA) for extraction of disease labels from radiology text reports. We targeted three organ systems (lungs/pleura, liver/gallbladder, kidneys/ureters) with four diseases per system based on their prevalence in our dataset. To expand the algorithms beyond pre-defined keywords, attention-guided recurrent neural networks (RNN) were trained using the RBA-extracted labels to classify reports as being positive for one or more diseases or normal for each organ system. Confounding effects on model performance were evaluated using random initialization or pre-trained embedding as well as different sizes of training datasets. Performance was evaluated using the receiver operating characteristic (ROC) area under the curve (AUC) against 2,158 manually obtained labels. Results: Our models extracted disease labels from 261,229 radiology reports of 112,501 unique subjects. Pre-trained models outperformed random initialization across all diseases. As the training dataset size was reduced, performance was robust except for a few diseases with relatively small number of cases. Pre-trained classification AUCs achieved > 0.95 for all five disease outcomes across all three organ systems. Conclusions: Our label-extracting pipeline was able to encompass a variety of cases and diseases by generalizing beyond strict rules with exceptional accuracy. This method can be easily adapted to enable automated labeling of hospital-scale medical data sets for training image-based disease classifiers.
[ { "version": "v1", "created": "Fri, 5 Feb 2021 02:07:39 GMT" }, { "version": "v2", "created": "Thu, 25 Feb 2021 03:12:11 GMT" }, { "version": "v3", "created": "Sun, 30 May 2021 09:37:37 GMT" }, { "version": "v4", "created": "Sat, 12 Jun 2021 11:38:33 GMT" }, { "version": "v5", "created": "Tue, 8 Mar 2022 02:13:44 GMT" } ]
2022-03-09T00:00:00
[ [ "D'Anniballe", "Vincent M.", "" ], [ "Tushar", "Fakrul Islam", "" ], [ "Faryna", "Khrystyna", "" ], [ "Han", "Songyue", "" ], [ "Mazurowski", "Maciej A.", "" ], [ "Rubin", "Geoffrey D.", "" ], [ "Lo", "Joseph Y.", "" ] ]
new_dataset
0.996115
2106.08074
Todd Schmid
Todd Schmid (UCL, London, UK), Jurriaan Rot (Radboud University, Nijmegen, The Netherlands), Alexandra Silva (UCL, London, UK)
On Star Expressions and Coalgebraic Completeness Theorems
In Proceedings MFPS 2021, arXiv:2112.13746
EPTCS 351, 2021, pp. 242-259
10.4204/EPTCS.351.15
null
cs.LO cs.FL
http://creativecommons.org/licenses/by/4.0/
An open problem posed by Milner asks for a proof that a certain axiomatisation, which Milner showed is sound with respect to bisimilarity for regular expressions, is also complete. One of the main difficulties of the problem is the lack of a full Kleene theorem, since there are automata that can not be specified, up to bisimilarity, by an expression. Grabmayer and Fokkink (2020) characterise those automata that can be expressed by regular expressions without the constant 1, and use this characterisation to give a positive answer to Milner's question for this subset of expressions. In this paper, we analyse Grabmayer and Fokkink's proof of completeness from the perspective of universal coalgebra, and thereby give an abstract account of their proof method. We then compare this proof method to another approach to completeness proofs from coalgebraic language theory. This culminates in two abstract proof methods for completeness, what we call the local and global approaches, and a description of when one method can be used in place of the other.
[ { "version": "v1", "created": "Tue, 15 Jun 2021 12:04:32 GMT" }, { "version": "v2", "created": "Tue, 28 Dec 2021 09:10:14 GMT" }, { "version": "v3", "created": "Tue, 8 Mar 2022 15:06:52 GMT" } ]
2022-03-09T00:00:00
[ [ "Schmid", "Todd", "", "UCL, London, UK" ], [ "Rot", "Jurriaan", "", "Radboud University,\n Nijmegen, The Netherlands" ], [ "Silva", "Alexandra", "", "UCL, London, UK" ] ]
new_dataset
0.976863
2108.11557
Zhifeng Huang
Yuhang Li, Yuhao Zhou, Junbin Huang, Zijun Wang, Shunjie Zhu, Kairong Wu, Li Zheng, Jiajin Luo, Rui Cao, Yun Zhang, and Zhifeng Huang
Design of a Flying Humanoid Robot Based on Thrust Vector Control
The article has been submitted to IEEE Robotics and Automation Letters (RA-L) with ICRA 2022 conference option. Supporting video: https://youtu.be/Z5xm8um8Sv8&ab_channel=JetPowerandHumanoidRobotLab
IEEE Robotics and Automation Letters, vol. 7, no. 2, pp. 4590-4597, April 2022
10.1109/LRA.2022.3152231
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Achieving short-distance flight helps improve the efficiency of humanoid robots moving in complex environments (e.g., crossing large obstacles or reaching high places) for rapid emergency missions. This study proposes a design of a flying humanoid robot named Jet-HR2. The robot has 10 joints driven by brushless motors and harmonic drives for locomotion. To overcome the challenge of the stable-attitude takeoff in small thrust-to-weight conditions, the robot was designed based on the concept of thrust vectoring. The propulsion system consists of four ducted fans, that is, two fixed on the waist of the robot and the other two mounted on the feet, for thrust vector control. The thrust vector is controlled by adjusting the attitude of the foot during the flight. A simplified model and control strategies are proposed to solve the problem of attitude instability caused by mass errors and joint position errors during takeoff. The experimental results show that the robot's spin and dive behaviors during takeoff were effectively suppressed by controlling the thrust vector of the ducted fan on the foot. The robot successfully achieved takeoff at a thrust-to-weight ratio of 1.17 (17 kg / 20 kg) and maintained a stable attitude, reaching a takeoff height of over 1000 mm.
[ { "version": "v1", "created": "Thu, 26 Aug 2021 02:31:21 GMT" } ]
2022-03-09T00:00:00
[ [ "Li", "Yuhang", "" ], [ "Zhou", "Yuhao", "" ], [ "Huang", "Junbin", "" ], [ "Wang", "Zijun", "" ], [ "Zhu", "Shunjie", "" ], [ "Wu", "Kairong", "" ], [ "Zheng", "Li", "" ], [ "Luo", "Jiajin", "" ], [ "Cao", "Rui", "" ], [ "Zhang", "Yun", "" ], [ "Huang", "Zhifeng", "" ] ]
new_dataset
0.983549
2110.05145
Antonella Barisic
Antonella Barisic and Frano Petric and Stjepan Bogdan
Sim2Air - Synthetic aerial dataset for UAV monitoring
null
IEEE Robotics and Automation Letters (vol. 7, no. 2, pp. 3757-3764, April 2022)
10.1109/LRA.2022.3147337
null
cs.CV cs.RO
http://creativecommons.org/licenses/by-nc-sa/4.0/
In this paper we propose a novel approach to generate a synthetic aerial dataset for application in UAV monitoring. We propose to accentuate shape-based object representation by applying texture randomization. A diverse dataset with photorealism in all parameters such as shape, pose, lighting, scale, viewpoint, etc. except for atypical textures is created in a 3D modelling software Blender. Our approach specifically targets two conditions in aerial images where texture of objects is difficult to detect, namely challenging illumination and objects occupying only a small portion of the image. Experimental evaluation of YOLO and Faster R-CNN detectors trained on synthetic data with randomized textures confirmed our approach by increasing the mAP value (17 and 3.7 percentage points for YOLO; 20 and 1.1 percentage points for Faster R-CNN) on two test datasets of real images, both containing UAV-to-UAV images with motion blur. Testing on different domains, we conclude that the more the generalisation ability is put to the test, the more apparent are the advantages of the shape-based representation.
[ { "version": "v1", "created": "Mon, 11 Oct 2021 10:36:33 GMT" }, { "version": "v2", "created": "Tue, 8 Mar 2022 06:20:18 GMT" } ]
2022-03-09T00:00:00
[ [ "Barisic", "Antonella", "" ], [ "Petric", "Frano", "" ], [ "Bogdan", "Stjepan", "" ] ]
new_dataset
0.99972
2112.08162
Stefano Di Carlo
Franco Oberti, Alessandro Savino, Ernesto Sanchez, Filippo Parisi, Stefano Di Carlo
EXT-TAURUM P2T: an Extended Secure CAN-FD Architecture for Road Vehicles
null
null
10.1109/TDMR.2022.3157000
null
cs.CR
http://creativecommons.org/licenses/by-nc-nd/4.0/
The automobile industry is no longer relying on pure mechanical systems; instead, it benefits from advanced Electronic Control Units (ECUs) in order to provide new and complex functionalities in the effort to move toward fully connected cars. However, connected cars provide a dangerous playground for hackers. Vehicles are becoming increasingly vulnerable to cyber attacks as they come equipped with more connected features and control systems. This situation may expose strategic assets in the automotive value chain. In this scenario, the Controller Area Network (CAN) is the most widely used communication protocol in the automotive domain. However, this protocol lacks encryption and authentication. Consequently, any malicious/hijacked node can cause catastrophic accidents and financial loss. Starting from the analysis of the vulnerability connected to the CAN communication protocol in the automotive domain, this paper proposes EXT-TAURUM P2T a new low-cost secure CAN-FD architecture for the automotive domain implementing secure communication among ECUs, a novel key provisioning strategy, intelligent throughput management, and hardware signature mechanisms. The proposed architecture has been implemented, resorting to a commercial Multi-Protocol Vehicle Interface module, and the obtained results experimentally demonstrate the approach's feasibility.
[ { "version": "v1", "created": "Wed, 15 Dec 2021 14:34:04 GMT" }, { "version": "v2", "created": "Mon, 7 Mar 2022 08:43:24 GMT" } ]
2022-03-09T00:00:00
[ [ "Oberti", "Franco", "" ], [ "Savino", "Alessandro", "" ], [ "Sanchez", "Ernesto", "" ], [ "Parisi", "Filippo", "" ], [ "Di Carlo", "Stefano", "" ] ]
new_dataset
0.999361
2201.03331
Christian Ponte-Fern\'andez
Christian Ponte-Fern\'andez (1), Jorge Gonz\'alez-Dom\'inguez (1) and Mar\'ia J. Mart\'in (1) ((1) Universidade da Coru\~na, CITIC, Computer Architecture Group, A Coru\~na, Spain)
Fiuncho: a program for any-order epistasis detection in CPU clusters
Submitted to The Journal of Supercomputing. Source code available at https://github.com/UDC-GAC/fiuncho
null
null
null
cs.DC cs.CE
http://creativecommons.org/licenses/by-nc-nd/4.0/
Epistasis can be defined as the statistical interaction of genes during the expression of a phenotype. It is believed that it plays a fundamental role in gene expression, as individual genetic variants have reported a very small increase in disease risk in previous Genome-Wide Association Studies. The most successful approach to epistasis detection is the exhaustive method, although its exponential time complexity requires a highly parallel implementation in order to be used. This work presents Fiuncho, a program that exploits all levels of parallelism present in \textit{x86\_64} CPU clusters in order to mitigate the complexity of this approach. It supports epistasis interactions of any order, and when compared with other exhaustive methods, it is on average 358, 7 and 3 times faster than MDR, MPI3SNP and BitEpi, respectively.
[ { "version": "v1", "created": "Mon, 10 Jan 2022 13:19:31 GMT" }, { "version": "v2", "created": "Mon, 7 Mar 2022 16:22:12 GMT" }, { "version": "v3", "created": "Tue, 8 Mar 2022 17:07:11 GMT" } ]
2022-03-09T00:00:00
[ [ "Ponte-Fernández", "Christian", "" ], [ "González-Domínguez", "Jorge", "" ], [ "Martín", "María J.", "" ] ]
new_dataset
0.992294
2201.10865
Steffen Urban
Steffen Urban, Thomas Lindemeier, David Dobbelstein, Matthias Haenel
On the Issues of TrueDepth Sensor Data for Computer Vision Tasks Across Different iPad Generations
17 pages
null
null
null
cs.CV cs.RO
http://creativecommons.org/licenses/by-nc-nd/4.0/
In 2017 Apple introduced the TrueDepth sensor with the iPhone X release. Although its primary use case is biometric face recognition, the exploitation of accurate depth data for other computer vision tasks like segmentation, portrait image generation and metric 3D reconstruction seems natural and lead to the development of various applications. In this report, we investigate the reliability of TrueDepth data - accessed through two different APIs - on various devices including different iPhone and iPad generations and reveal two different and significant issues on all tested iPads.
[ { "version": "v1", "created": "Wed, 26 Jan 2022 10:53:54 GMT" }, { "version": "v2", "created": "Tue, 8 Mar 2022 11:31:29 GMT" } ]
2022-03-09T00:00:00
[ [ "Urban", "Steffen", "" ], [ "Lindemeier", "Thomas", "" ], [ "Dobbelstein", "David", "" ], [ "Haenel", "Matthias", "" ] ]
new_dataset
0.98645
2202.03755
Pietro Liguori
Pietro Liguori, Erfan Al-Hossami, Domenico Cotroneo, Roberto Natella, Bojan Cukic, Samira Shaikh
Can We Generate Shellcodes via Natural Language? An Empirical Study
33 pages, 5 figures, 9 tables. To be published in Automated Software Engineering journal
null
10.1007/s10515-022-00331-3
null
cs.SE cs.LG
http://creativecommons.org/licenses/by/4.0/
Writing software exploits is an important practice for offensive security analysts to investigate and prevent attacks. In particular, shellcodes are especially time-consuming and a technical challenge, as they are written in assembly language. In this work, we address the task of automatically generating shellcodes, starting purely from descriptions in natural language, by proposing an approach based on Neural Machine Translation (NMT). We then present an empirical study using a novel dataset (Shellcode_IA32), which consists of 3,200 assembly code snippets of real Linux/x86 shellcodes from public databases, annotated using natural language. Moreover, we propose novel metrics to evaluate the accuracy of NMT at generating shellcodes. The empirical analysis shows that NMT can generate assembly code snippets from the natural language with high accuracy and that in many cases can generate entire shellcodes with no errors.
[ { "version": "v1", "created": "Tue, 8 Feb 2022 09:57:34 GMT" } ]
2022-03-09T00:00:00
[ [ "Liguori", "Pietro", "" ], [ "Al-Hossami", "Erfan", "" ], [ "Cotroneo", "Domenico", "" ], [ "Natella", "Roberto", "" ], [ "Cukic", "Bojan", "" ], [ "Shaikh", "Samira", "" ] ]
new_dataset
0.998411
2202.11042
Michail Gkagkos
Michail Gkagkos, Krishna R. Narayanan, Jean-Francois Chamberland, Costas N. Georghiades
FASURA: A Scheme for Quasi-Static Massive MIMO Unsourced Random Access Channels
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article considers the massive MIMO unsourced random access problem on a quasi-static Rayleigh fading channel. Given a fixed message length and a prescribed number of channel uses, the objective is to construct a coding scheme that minimizes the energy-per-bit subject to a fixed probability of error. The proposed scheme differs from other state-of-the-art schemes in that it blends activity detection, single-user coding, pilot-aided and temporary decisions-aided iterative channel estimation and decoding, minimum-mean squared error (MMSE) estimation, and successive interference cancellation (SIC). We show that an appropriate combination of these ideas can substantially outperform state-of-the-art coding schemes when the number of active users is more than 100, making this the best performing scheme known for this regime.
[ { "version": "v1", "created": "Tue, 22 Feb 2022 17:19:06 GMT" }, { "version": "v2", "created": "Tue, 8 Mar 2022 17:43:07 GMT" } ]
2022-03-09T00:00:00
[ [ "Gkagkos", "Michail", "" ], [ "Narayanan", "Krishna R.", "" ], [ "Chamberland", "Jean-Francois", "" ], [ "Georghiades", "Costas N.", "" ] ]
new_dataset
0.999404
2202.11684
Dan Saattrup Nielsen
Dan Saattrup Nielsen and Ryan McConville
MuMiN: A Large-Scale Multilingual Multimodal Fact-Checked Misinformation Social Network Dataset
9+3 pages
null
null
null
cs.LG cs.CL cs.CY cs.IR cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Misinformation is becoming increasingly prevalent on social media and in news articles. It has become so widespread that we require algorithmic assistance utilising machine learning to detect such content. Training these machine learning models require datasets of sufficient scale, diversity and quality. However, datasets in the field of automatic misinformation detection are predominantly monolingual, include a limited amount of modalities and are not of sufficient scale and quality. Addressing this, we develop a data collection and linking system (MuMiN-trawl), to build a public misinformation graph dataset (MuMiN), containing rich social media data (tweets, replies, users, images, articles, hashtags) spanning 21 million tweets belonging to 26 thousand Twitter threads, each of which have been semantically linked to 13 thousand fact-checked claims across dozens of topics, events and domains, in 41 different languages, spanning more than a decade. The dataset is made available as a heterogeneous graph via a Python package (mumin). We provide baseline results for two node classification tasks related to the veracity of a claim involving social media, and demonstrate that these are challenging tasks, with the highest macro-average F1-score being 62.55% and 61.45% for the two tasks, respectively. The MuMiN ecosystem is available at https://mumin-dataset.github.io/, including the data, documentation, tutorials and leaderboards.
[ { "version": "v1", "created": "Wed, 23 Feb 2022 18:47:34 GMT" }, { "version": "v2", "created": "Tue, 8 Mar 2022 12:30:03 GMT" } ]
2022-03-09T00:00:00
[ [ "Nielsen", "Dan Saattrup", "" ], [ "McConville", "Ryan", "" ] ]
new_dataset
0.999821
2203.01063
Konstantinos Kogkalidis
Konstantinos Kogkalidis and Gijs Wijnholds
Discontinuous Constituency and BERT: A Case Study of Dutch
8 pages plus references. To appear in Findings of the Association for Computational Linguistics 2022
null
null
null
cs.CL cs.LG
http://creativecommons.org/licenses/by/4.0/
In this paper, we set out to quantify the syntactic capacity of BERT in the evaluation regime of non-context free patterns, as occurring in Dutch. We devise a test suite based on a mildly context-sensitive formalism, from which we derive grammars that capture the linguistic phenomena of control verb nesting and verb raising. The grammars, paired with a small lexicon, provide us with a large collection of naturalistic utterances, annotated with verb-subject pairings, that serve as the evaluation test bed for an attention-based span selection probe. Our results, backed by extensive analysis, suggest that the models investigated fail in the implicit acquisition of the dependencies examined.
[ { "version": "v1", "created": "Wed, 2 Mar 2022 12:30:21 GMT" }, { "version": "v2", "created": "Tue, 8 Mar 2022 09:27:31 GMT" } ]
2022-03-09T00:00:00
[ [ "Kogkalidis", "Konstantinos", "" ], [ "Wijnholds", "Gijs", "" ] ]
new_dataset
0.995863
2203.03704
Jeff Delaune
Jeff Delaune, Jacob Izraelevitz, Samuel Sirlin, David Sternberg, Louis Giersch, L. Phillipe Tosi, Evgeniy Skliyanskiy, Larry Young, Michael Mischna, Shannah Withrow-Maser, Juergen Mueller, Joshua Bowman, Mark S Wallace, Havard F. Grip, Larry Matthies, Wayne Johnson, Matthew Keennon, Benjamin Pipenberg, Harsh Patel, Christopher Lim, Aaron Schutte, Marcel Veismann, Haley Cummings, Sarah Conley, Jonathan Bapst, Theodore Tzanetos, Roland Brockers, Abhinandan Jain, David Bayard, Art Chmielewski, Olivier Toupet, Joel Burdick, Morteza Gharib and J. (Bob) Balaram
Mid-Air Helicopter Delivery at Mars Using a Jetpack
Accepted in 2022 IEEE Aerospace Conference
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mid-Air Helicopter Delivery (MAHD) is a new Entry, Descent and Landing (EDL) architecture to enable in situ mobility for Mars science at lower cost than previous missions. It uses a jetpack to slow down a Mars Science Helicopter (MSH) after separation from the backshell, and reach aerodynamic conditions suitable for helicopter take-off in mid air. For given aeroshell dimensions, only MAHD's lander-free approach leaves enough room in the aeroshell to accommodate the largest rotor option for MSH. This drastically improves flight performance, notably allowing +150\% increased science payload mass. Compared to heritage EDL approaches, the simpler MAHD architecture is also likely to reduce cost, and enables access to more hazardous and higher-elevation terrains on Mars. This paper introduces a design for the MAHD system architecture and operations. We present a mechanical configuration that fits both MSH and the jetpack within the 2.65-m Mars heritage aeroshell, and a jetpack control architecture which fully leverages the available helicopter avionics. We discuss preliminary numerical models of the flow dynamics resulting from the interaction between the jets, the rotors and the side winds. We define a force-torque sensing architecture capable of handling the wind and trimming the rotors to prepare for safe take-off. Finally, we analyze the dynamic environment and closed-loop control simulation results to demonstrate the preliminary feasibility of MAHD.
[ { "version": "v1", "created": "Mon, 7 Mar 2022 21:07:56 GMT" } ]
2022-03-09T00:00:00
[ [ "Delaune", "Jeff", "", "Bob" ], [ "Izraelevitz", "Jacob", "", "Bob" ], [ "Sirlin", "Samuel", "", "Bob" ], [ "Sternberg", "David", "", "Bob" ], [ "Giersch", "Louis", "", "Bob" ], [ "Tosi", "L. Phillipe", "", "Bob" ], [ "Skliyanskiy", "Evgeniy", "", "Bob" ], [ "Young", "Larry", "", "Bob" ], [ "Mischna", "Michael", "", "Bob" ], [ "Withrow-Maser", "Shannah", "", "Bob" ], [ "Mueller", "Juergen", "", "Bob" ], [ "Bowman", "Joshua", "", "Bob" ], [ "Wallace", "Mark S", "", "Bob" ], [ "Grip", "Havard F.", "", "Bob" ], [ "Matthies", "Larry", "", "Bob" ], [ "Johnson", "Wayne", "", "Bob" ], [ "Keennon", "Matthew", "", "Bob" ], [ "Pipenberg", "Benjamin", "", "Bob" ], [ "Patel", "Harsh", "", "Bob" ], [ "Lim", "Christopher", "", "Bob" ], [ "Schutte", "Aaron", "", "Bob" ], [ "Veismann", "Marcel", "", "Bob" ], [ "Cummings", "Haley", "", "Bob" ], [ "Conley", "Sarah", "", "Bob" ], [ "Bapst", "Jonathan", "", "Bob" ], [ "Tzanetos", "Theodore", "", "Bob" ], [ "Brockers", "Roland", "", "Bob" ], [ "Jain", "Abhinandan", "", "Bob" ], [ "Bayard", "David", "", "Bob" ], [ "Chmielewski", "Art", "", "Bob" ], [ "Toupet", "Olivier", "", "Bob" ], [ "Burdick", "Joel", "", "Bob" ], [ "Gharib", "Morteza", "", "Bob" ], [ "J.", "", "", "Bob" ], [ "Balaram", "", "" ] ]
new_dataset
0.999676
2203.03759
Gabriele Sarti
Gabriele Sarti, Malvina Nissim
IT5: Large-scale Text-to-text Pretraining for Italian Language Understanding and Generation
13 pages, 7 tables, 1 figure. Code and checkpoints available: https://github.com/gsarti/it5
null
null
null
cs.CL
http://creativecommons.org/licenses/by-sa/4.0/
The T5 model and its unified text-to-text paradigm contributed in advancing the state-of-the-art for many natural language processing tasks. While some multilingual variants of the T5 model have recently been introduced, their performances were found to provide suboptimal performances for languages other than English if compared to monolingual variants. We are motivated by these findings to introduce IT5, the first family of encoder-decoder transformer models pretrained specifically on Italian. We perform a thorough cleaning of a web-crawled Italian corpus including more than 40 billion words and use it to pretrain three IT5 models of different sizes. The performance of IT5 models and their multilingual counterparts is then evaluated on a broad range of natural language understanding and generation benchmarks for Italian. We find the monolingual IT5 models to provide the best scale-to-performance ratio across tested models, consistently outperforming their multilingual counterparts and setting a new state-of-the-art for most Italian conditional language generation tasks.
[ { "version": "v1", "created": "Mon, 7 Mar 2022 22:39:01 GMT" } ]
2022-03-09T00:00:00
[ [ "Sarti", "Gabriele", "" ], [ "Nissim", "Malvina", "" ] ]
new_dataset
0.98456
2203.03797
Junchi Liang
Junchi Liang, Bowen Wen, Kostas Bekris and Abdeslam Boularias
Learning Sensorimotor Primitives of Sequential Manipulation Tasks from Visual Demonstrations
null
null
null
null
cs.RO cs.LG
http://creativecommons.org/licenses/by/4.0/
This work aims to learn how to perform complex robot manipulation tasks that are composed of several, consecutively executed low-level sub-tasks, given as input a few visual demonstrations of the tasks performed by a person. The sub-tasks consist of moving the robot's end-effector until it reaches a sub-goal region in the task space, performing an action, and triggering the next sub-task when a pre-condition is met. Most prior work in this domain has been concerned with learning only low-level tasks, such as hitting a ball or reaching an object and grasping it. This paper describes a new neural network-based framework for learning simultaneously low-level policies as well as high-level policies, such as deciding which object to pick next or where to place it relative to other objects in the scene. A key feature of the proposed approach is that the policies are learned directly from raw videos of task demonstrations, without any manual annotation or post-processing of the data. Empirical results on object manipulation tasks with a robotic arm show that the proposed network can efficiently learn from real visual demonstrations to perform the tasks, and outperforms popular imitation learning algorithms.
[ { "version": "v1", "created": "Tue, 8 Mar 2022 01:36:48 GMT" } ]
2022-03-09T00:00:00
[ [ "Liang", "Junchi", "" ], [ "Wen", "Bowen", "" ], [ "Bekris", "Kostas", "" ], [ "Boularias", "Abdeslam", "" ] ]
new_dataset
0.987427
2203.03856
Bowen Xing
Bowen Xing and Ivor W. Tsang
DARER: Dual-task Temporal Relational Recurrent Reasoning Network for Joint Dialog Sentiment Classification and Act Recognition
Long paper; ACL 2022 (Findings)
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The task of joint dialog sentiment classification (DSC) and act recognition (DAR) aims to simultaneously predict the sentiment label and act label for each utterance in a dialog. In this paper, we put forward a new framework which models the explicit dependencies via integrating \textit{prediction-level interactions} other than semantics-level interactions, more consistent with human intuition. Besides, we propose a speaker-aware temporal graph (SATG) and a dual-task relational temporal graph (DRTG) to introduce \textit{temporal relations} into dialog understanding and dual-task reasoning. To implement our framework, we propose a novel model dubbed DARER, which first generates the context-, speaker- and temporal-sensitive utterance representations via modeling SATG, then conducts recurrent dual-task relational reasoning on DRTG, in which process the estimated label distributions act as key clues in prediction-level interactions. Experiment results show that DARER outperforms existing models by large margins while requiring much less computation resource and costing less training time. Remarkably, on DSC task in Mastodon, DARER gains a relative improvement of about 25% over previous best model in terms of F1, with less than 50% parameters and about only 60% required GPU memory.
[ { "version": "v1", "created": "Tue, 8 Mar 2022 05:19:18 GMT" } ]
2022-03-09T00:00:00
[ [ "Xing", "Bowen", "" ], [ "Tsang", "Ivor W.", "" ] ]
new_dataset
0.998127
2203.03859
Arda Mavi
Arda Mavi and Zeynep Dikle
A New 27 Class Sign Language Dataset Collected from 173 Individuals
5 pages, 1 figure
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
After the interviews, it has been comprehended that speech-impaired individuals who use sign languages have difficulty communicating with other people who do not know sign language. Due to the communication problems, the sense of independence of speech-impaired individuals could be damaged and lead them to socialize less with society. To contribute to the development of technologies, that can reduce the communication problems of speech-impaired persons, a new dataset was presented with this paper. The dataset was created by processing American Sign Language-based photographs collected from 173 volunteers, published as 27 Class Sign Language Dataset on the Kaggle Datasets web page.
[ { "version": "v1", "created": "Tue, 8 Mar 2022 05:30:03 GMT" } ]
2022-03-09T00:00:00
[ [ "Mavi", "Arda", "" ], [ "Dikle", "Zeynep", "" ] ]
new_dataset
0.998524
2203.04021
Vittorio Lippi
Vittorio Lippi, Alessandro Filippeschi, Cristian Camardella, Francesco Porcini, Christoph Maurer, Lucia Lencioni
EXOSMOOTH: Test of Innovative EXOskeleton Control for SMOOTH Assistance, With and Without Ankle Actuation
null
null
10.5555/3523760.3523899
null
cs.RO
http://creativecommons.org/licenses/by/4.0/
This work presents a description of the EXOSMOOTH project, oriented to the benchmarking of lower limb exoskeletons performance. In the field of assisted walking by powered lower limb exoskeletons, the EXOSMOOTH project proposes an experiment that targets two scientific questions. The first question is related to the effectiveness of a novel control strategy for smooth assistance. Current assist strategies are based on controllers that switch the assistance level based on the gait segmentation provided by a finite state machine. The proposed strategy aims at managing phase transitions to provide a smoother assistance to the user, thus increasing the device transparency and comfort for the user. The second question is the role of the actuation at the ankle joint in assisted walking. Many novel exoskeletons devised for industrial applications do not feature an actuated ankle joint. In the EXOSMOOTH project, the ankle joint actuation will be one experimental factor to have a direct assessment of the role of an actuated joint in assisted walking. Preliminary results of 15 healthy subjects walking at different speeds while wearing a lower limb exoskeleton supported the rationale behind this question: having an actuated ankle joint could potentially reduce the torques applied by the user by a maximum value of 85 Nm. The two aforementioned questions will be investigated in a protocol that includes walking on a treadmill and on flat ground, with or without slope, and with a load applied on the back. In addition, the interaction forces measured at the exoskeleton harnesses will be used to assess the comfort of the user and the effectiveness of the control strategy to improve transparency.
[ { "version": "v1", "created": "Tue, 8 Mar 2022 11:27:09 GMT" } ]
2022-03-09T00:00:00
[ [ "Lippi", "Vittorio", "" ], [ "Filippeschi", "Alessandro", "" ], [ "Camardella", "Cristian", "" ], [ "Porcini", "Francesco", "" ], [ "Maurer", "Christoph", "" ], [ "Lencioni", "Lucia", "" ] ]
new_dataset
0.997076
2203.04024
Weiwei Wan
Ruishuang Liu, Weiwei Wan, Emiko Isomura, Kensuke Harada
Metal Wire Manipulation Planning for 3D Curving -- How a Low Payload Robot Can Use a Bending Machine to Bend Stiff Metal Wire
null
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a combined task and motion planner for a robot arm to carry out 3D metal wire curving tasks by collaborating with a bending machine. We assume a collaborative robot that is safe to work in a human environment but has a weak payload to bend objects with large stiffness, and developed a combined planner for the robot to use a bending machine. Our method converts a 3D curve to a bending set and generates the feasible bending sequence, machine usage, robotic grasp poses, and pick-and-place arm motion considering the combined task and motion level constraints. Compared with previous deformable linear object shaping work that relied on forces provided by robotic arms, the proposed method is suitable for the material with high stiffness. We evaluate the system using different tasks. The results show that the proposed system is flexible and robust to generate robotic motion to corporate with the designed bending machine.
[ { "version": "v1", "created": "Tue, 8 Mar 2022 11:39:48 GMT" } ]
2022-03-09T00:00:00
[ [ "Liu", "Ruishuang", "" ], [ "Wan", "Weiwei", "" ], [ "Isomura", "Emiko", "" ], [ "Harada", "Kensuke", "" ] ]
new_dataset
0.997304
2203.04079
Shaolin Yu
Shaolin Yu, Jihong Zhu, Jiali Yang, Wei Lu
A New Fault-Tolerant Synchronization Scheme with Anonymous Pulses
19 pages, 5 figures
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Robust pulse synchronization is fundamental in constructing reliable synchronous applications in wired and wireless distributed systems. In wired systems, self-stabilizing Byzantine pulse synchronization aims for synchronizing fault-prone distributed components with arbitrary initial states in bounded-delay message-passing systems. In wireless systems, fault-tolerant synchronization of pulse-coupled oscillators is also built for a similar goal but often works under specific system restrictions, such as low computation power, low message complexity, and anonymous physical pulses whose senders cannot be identified by the receivers. These restrictions often prevent us from constructing high-reliable wireless synchronous applications. This paper tries to break barriers between bounded-delay message-passing systems and classical pulse-coupled oscillators by introducing a new fault-tolerant synchronization scheme for the so-called anonymous bounded-delay pulsing systems in the presence of indeterministic communication delays and inconsistent faults. For low computation power and low message complexity, instead of involving in consensus-based primitives, the proposed synchronization scheme integrates the so-called discrete mean-fields, planar random walks, and some additional easy operations in utilizing only sparsely generated anonymous pulses. For fault-tolerance, we show that a square-root number of faulty oscillators can be tolerated by utilizing planar random walks in anonymous pulse synchronization. For self-stabilization, we show that the stabilization can be reached in an expected constant number of observing windows in anonymous bounded-delay pulsing systems with the pulsing-frequency restriction.
[ { "version": "v1", "created": "Tue, 8 Mar 2022 13:48:34 GMT" } ]
2022-03-09T00:00:00
[ [ "Yu", "Shaolin", "" ], [ "Zhu", "Jihong", "" ], [ "Yang", "Jiali", "" ], [ "Lu", "Wei", "" ] ]
new_dataset
0.999565
2203.04111
Shubham Kumar Nigam
Shubham Kumar Nigam and Mosab Shaheen
Plumeria at SemEval-2022 Task 6: Robust Approaches for Sarcasm Detection for English and Arabic Using Transformers and Data Augmentation
SemEval-2022 workshop paper, submitted in NAACL-2022 conference. 8 figures and 29 tables. 8 main pages, 4 appendix pages
null
null
null
cs.CL cs.AI cs.LG
http://creativecommons.org/licenses/by/4.0/
This paper describes our submission to SemEval-2022 Task 6 on sarcasm detection and its five subtasks for English and Arabic. Sarcasm conveys a meaning which contradicts the literal meaning, and it is mainly found on social networks. It has a significant role in understanding the intention of the user. For detecting sarcasm, we used deep learning techniques based on transformers due to its success in the field of Natural Language Processing (NLP) without the need for feature engineering. The datasets were taken from tweets. We created new datasets by augmenting with external data or by using word embeddings and repetition of instances. Experiments were done on the datasets with different types of preprocessing because it is crucial in this task. The rank of our team was consistent across four subtasks (fourth rank in three subtasks and sixth rank in one subtask); whereas other teams might be in the top ranks for some subtasks but rank drastically less in other subtasks. This implies the robustness and stability of the models and the techniques we used.
[ { "version": "v1", "created": "Tue, 8 Mar 2022 14:33:45 GMT" } ]
2022-03-09T00:00:00
[ [ "Nigam", "Shubham Kumar", "" ], [ "Shaheen", "Mosab", "" ] ]
new_dataset
0.99915
2203.04129
Yongxiang Gu
Yongxiang Gu, Xingbin Liao and Xiaolin Qin
YouTube-GDD: A challenging gun detection dataset with rich contextual information
4 pages, 1 figure
null
null
null
cs.CV cs.AI
http://creativecommons.org/licenses/by/4.0/
An automatic gun detection system can detect potential gun-related violence at an early stage that is of paramount importance for citizens security. In the whole system, object detection algorithm is the key to perceive the environment so that the system can detect dangerous objects such as pistols and rifles. However, mainstream deep learning-based object detection algorithms depend heavily on large-scale high-quality annotated samples, and the existing gun datasets are characterized by low resolution, little contextual information and little data volume. To promote the development of security, this work presents a new challenging dataset called YouTube Gun Detection Dataset (YouTube-GDD). Our dataset is collected from 343 high-definition YouTube videos and contains 5000 well-chosen images, in which 16064 instances of gun and 9046 instances of person are annotated. Compared to other datasets, YouTube-GDD is "dynamic", containing rich contextual information and recording shape changes of the gun during shooting. To build a baseline for gun detection, we evaluate YOLOv5 on YouTube-GDD and analyze the influence of additional related annotated information on gun detection. YouTube-GDD and subsequent updates will be released at https://github.com/UCAS-GYX/YouTube-GDD.
[ { "version": "v1", "created": "Tue, 8 Mar 2022 14:55:10 GMT" } ]
2022-03-09T00:00:00
[ [ "Gu", "Yongxiang", "" ], [ "Liao", "Xingbin", "" ], [ "Qin", "Xiaolin", "" ] ]
new_dataset
0.999806
2203.04130
Ziyu Wang
Ziyu Wang, Wei Yang, Junming Cao, Lan Xu, Junqing Yu, Jingyi Yu
NeReF: Neural Refractive Field for Fluid Surface Reconstruction and Implicit Representation
null
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
Existing neural reconstruction schemes such as Neural Radiance Field (NeRF) are largely focused on modeling opaque objects. We present a novel neural refractive field(NeReF) to recover wavefront of transparent fluids by simultaneously estimating the surface position and normal of the fluid front. Unlike prior arts that treat the reconstruction target as a single layer of the surface, NeReF is specifically formulated to recover a volumetric normal field with its corresponding density field. A query ray will be refracted by NeReF according to its accumulated refractive point and normal, and we employ the correspondences and uniqueness of refracted ray for NeReF optimization. We show NeReF, as a global optimization scheme, can more robustly tackle refraction distortions detrimental to traditional methods for correspondence matching. Furthermore, the continuous NeReF representation of wavefront enables view synthesis as well as normal integration. We validate our approach on both synthetic and real data and show it is particularly suitable for sparse multi-view acquisition. We hence build a small light field array and experiment on various surface shapes to demonstrate high fidelity NeReF reconstruction.
[ { "version": "v1", "created": "Tue, 8 Mar 2022 14:56:16 GMT" } ]
2022-03-09T00:00:00
[ [ "Wang", "Ziyu", "" ], [ "Yang", "Wei", "" ], [ "Cao", "Junming", "" ], [ "Xu", "Lan", "" ], [ "Yu", "Junqing", "" ], [ "Yu", "Jingyi", "" ] ]
new_dataset
0.998572
2203.04225
Vahid Jamali
Vahid Jamali, Helene M. Loos, Andrea Buettner, Robert Schober, and H. Vincent Poor
Olfaction-inspired MCs: Molecule Mixture Shift Keying and Cross-Reactive Receptor Arrays
null
null
null
null
cs.IT math.IT
http://creativecommons.org/licenses/by/4.0/
In this paper, we propose a novel concept for engineered molecular communication (MC) systems inspired by animal olfaction. We focus on a multi-user scenario where several transmitters wish to communicate with a central receiver. We assume that each transmitter employs a unique mixture of different types of signaling molecules to represent its message and the receiver is equipped with an array comprising $R$ different types of receptors in order to detect the emitted molecule mixtures. The design of an MC system based on \textit{orthogonal} molecule-receptor pairs implies that the hardware complexity of the receiver linearly scales with the number of signaling molecule types $Q$ (i.e., $R=Q$). Natural olfaction systems avoid such high complexity by employing arrays of \textit{cross-reactive} receptors, where each type of molecule activates multiple types of receptors and each type of receptor is predominantly activated by multiple types of molecules albeit with different activation strengths. For instance, the human olfactory system is believed to discriminate several thousands of chemicals using only a few hundred receptor types, i.e., $Q\gg R$. Motivated by this observation, we first develop an end-to-end MC channel model that accounts for the key properties of olfaction. Subsequently, we present the proposed transmitter and receiver designs. In particular, given a set of signaling molecules, we develop algorithms that allocate molecules to different transmitters and optimize the mixture alphabet for communication. Moreover, we formulate the molecule mixture recovery as a convex compressive sensing problem which can be efficiently solved via available numerical solvers.
[ { "version": "v1", "created": "Tue, 8 Mar 2022 17:45:24 GMT" } ]
2022-03-09T00:00:00
[ [ "Jamali", "Vahid", "" ], [ "Loos", "Helene M.", "" ], [ "Buettner", "Andrea", "" ], [ "Schober", "Robert", "" ], [ "Poor", "H. Vincent", "" ] ]
new_dataset
0.971828
2203.04250
Vitor de Luca
Vitor T. F. de Luca, Mar\'ia P\'ia Mazzoleni, Fabiano S. Oliveira, Tanilson D. Santos, Jayme L. Szwarcfiter
Edge Intersection Graphs of Paths on a Triangular Grid
19 pages, 12 figures
null
null
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a new class of intersection graphs, the edge intersection graphs of paths on a triangular grid, called EPGt graphs. We show similarities and differences from this new class to the well-known class of EPG graphs. A turn of a path at a grid point is called a bend. An EPGt representation in which every path has at most $k$ bends is called a B$_k$-EPGt representation and the corresponding graphs are called B$_k$-EPGt graphs. We provide examples of B$_{2}$-EPG graphs that are B$_{1}$-EPGt. We characterize the representation of cliques with three vertices and chordless 4-cycles in B$_{1}$-EPGt representations. We also prove that B$_{1}$-EPGt graphs have Strong Helly number $3$. Furthermore, we prove that B$_{1}$-EPGt graphs are $7$-clique colorable.
[ { "version": "v1", "created": "Tue, 8 Mar 2022 18:09:15 GMT" } ]
2022-03-09T00:00:00
[ [ "de Luca", "Vitor T. F.", "" ], [ "Mazzoleni", "María Pía", "" ], [ "Oliveira", "Fabiano S.", "" ], [ "Santos", "Tanilson D.", "" ], [ "Szwarcfiter", "Jayme L.", "" ] ]
new_dataset
0.98838
1603.02080
Mikkel Abrahamsen
Mikkel Abrahamsen and Mikkel Thorup
How to Cut Corners and Get Bounded Convex Curvature
This version has been accepted for publication in Discrete & Computational Geometry. A preliminary version was presented at SoCG 2016
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe an algorithm for solving an important geometric problem arising in computer-aided manufacturing. When cutting away a region from a solid piece of material -- such as steel, wood, ceramics, or plastic -- using a rough tool in a milling machine, sharp convex corners of the region cannot be done properly, but have to be left for finer tools that are more expensive to use. We want to determine a toolpath that maximizes the use of the rough tool. In order to formulate the problem in mathematical terms, we introduce the notion of bounded convex curvature. A region of points in the plane $Q$ has \emph{bounded convex curvature} if for any point $x\in\partial Q$, there is a unit disk $U$ and $\varepsilon>0$ such that $x\in \partial U$ and all points in $U$ within distance $\varepsilon$ from $x$ are in $Q$. This translates to saying that as we traverse the boundary $\partial Q$ with the interior of $Q$ on the left side, then $\partial Q$ turns to the left with curvature at most $1$. There is no bound on the curvature where $\partial Q$ turns to the right. Given a region of points $P$ in the plane, we are now interested in computing the maximum subset $Q\subseteq P$ of bounded convex curvature. The difference in the requirement to left- and right-curvature is a natural consequence of different conditions when machining convex and concave areas of $Q$. We devise an algorithm to compute the unique maximum such set $Q$, when the boundary of $P$ consists of $n$ line segments and circular arcs of arbitrary radii. In the general case where $P$ may have holes, the algorithm runs in time $O(n^2)$ and uses $O(n)$ space. If $P$ is simply-connected, we describe a faster $O(n\log n)$ time algorithm.
[ { "version": "v1", "created": "Mon, 7 Mar 2016 14:18:53 GMT" }, { "version": "v2", "created": "Mon, 8 Mar 2021 16:11:04 GMT" }, { "version": "v3", "created": "Sat, 5 Mar 2022 07:20:53 GMT" } ]
2022-03-08T00:00:00
[ [ "Abrahamsen", "Mikkel", "" ], [ "Thorup", "Mikkel", "" ] ]
new_dataset
0.980761
1903.09711
Mouhyemen Khan
Mouhyemen Khan, Munzir Zafar, Abhijit Chatterjee
Barrier Functions in Cascaded Controller: Safe Quadrotor Control
Submitted to ACC 2020, 8 pages, 7 figures
null
10.23919/ACC45564.2020.9147864
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Safe control for inherently unstable systems such as quadrotors is crucial. Imposing multiple dynamic constraints simultaneously on the states for safety regulation can be a challenging problem. In this paper, we propose a quadratic programming (QP) based approach on a cascaded control architecture for quadrotors to enforce safety. Safety regions are constructed using control barrier functions (CBF) while explicitly considering the nonlinear underactuated dynamics of the quadrotor. The safety regions constructed using CBFs establish a non-conservative forward invariant safe region for quadrotor navigation. Barriers imposed across the cascaded architecture allows independent safety regulation in quadrotor's altitude and lateral domains. Despite barriers appearing in a cascaded fashion, we show preservation of safety for quadrotor motion in SE(3). We demonstrate the feasibility of our method on a quadrotor in simulation with static and dynamic constraints enforced on position and velocity spaces simultaneously.
[ { "version": "v1", "created": "Fri, 22 Mar 2019 21:13:22 GMT" }, { "version": "v2", "created": "Mon, 17 Feb 2020 15:59:35 GMT" } ]
2022-03-08T00:00:00
[ [ "Khan", "Mouhyemen", "" ], [ "Zafar", "Munzir", "" ], [ "Chatterjee", "Abhijit", "" ] ]
new_dataset
0.986658
2007.04584
Dazhen Deng
Dazhen Deng, Yihong Wu, Xinhuan Shu, Jiang Wu, Siwei Fu, Weiwei Cui, Yingcai Wu
VisImages: A Fine-Grained Expert-Annotated Visualization Dataset
null
null
10.1109/TVCG.2022.3155440
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
Images in visualization publications contain rich information, e.g., novel visualization designs and implicit design patterns of visualizations. A systematic collection of these images can contribute to the community in many aspects, such as literature analysis and automated tasks for visualization. In this paper, we build and make public a dataset, VisImages, which collects 12,267 images with captions from 1,397 papers in IEEE InfoVis and VAST. Built upon a comprehensive visualization taxonomy, the dataset includes 35,096 visualizations and their bounding boxes in the images.We demonstrate the usefulness of VisImages through three use cases: 1) investigating the use of visualizations in the publications with VisImages Explorer, 2) training and benchmarking models for visualization classification, and 3) localizing visualizations in the visual analytics systems automatically.
[ { "version": "v1", "created": "Thu, 9 Jul 2020 06:47:49 GMT" }, { "version": "v2", "created": "Fri, 10 Jul 2020 02:22:28 GMT" }, { "version": "v3", "created": "Wed, 20 Jan 2021 03:44:16 GMT" }, { "version": "v4", "created": "Thu, 10 Jun 2021 11:29:09 GMT" }, { "version": "v5", "created": "Sun, 6 Mar 2022 13:02:40 GMT" } ]
2022-03-08T00:00:00
[ [ "Deng", "Dazhen", "" ], [ "Wu", "Yihong", "" ], [ "Shu", "Xinhuan", "" ], [ "Wu", "Jiang", "" ], [ "Fu", "Siwei", "" ], [ "Cui", "Weiwei", "" ], [ "Wu", "Yingcai", "" ] ]
new_dataset
0.998707
2011.06996
Markus Grassl
Markus Grassl
Algebraic Quantum Codes: Linking Quantum Mechanics and Discrete Mathematics
19 pages; written for both mathematicians and physicists
International Journal of Computer Mathematics: Computer Systems Theory, vol. 6, no. 4, pp. 243-250, 2021
10.1080/23799927.2020.1850530
null
cs.IT math.CO math.IT quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a general framework of quantum error-correcting codes (QECCs) as a subspace of a complex Hilbert space and the corresponding error models. Then we illustrate how QECCs can be constructed using techniques from algebraic coding theory. Additionally, we discuss secondary constructions for QECCs, leading to propagation rules for the parameters of QECCs.
[ { "version": "v1", "created": "Fri, 13 Nov 2020 16:25:31 GMT" } ]
2022-03-08T00:00:00
[ [ "Grassl", "Markus", "" ] ]
new_dataset
0.954062
2012.09221
Yucel Aydin
Yucel Aydin, Gunes Karabulut Kurt, Enver Ozdemir, Halim Yanikomeroglu
Group Handover for Drone Base Stations
Published in IEEE Internet of Things Journal 2021
IEEE Internet of Things Journal 2021
10.1109/JIOT.2021.3068297
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The widespread use of new technologies such as the Internet of things (IoT) and machine type communication(MTC) forces an increase on the number of user equipments(UEs) and MTC devices that are connecting to mobile networks. Inherently, as the number of UEs inside a base station's (BS) coverage area surges, the quality of service (QoS) tends to decline. The use of drone-mounted BS (UxNB) is a solution in places where UEs are densely populated, such as stadiums. UxNB emerges as a promising technology that can be used for capacity injection purposes in the future due to its fast deployment. However, this emerging technology introduces a new security issue. Mutual authentication, creating a communication channel between terrestrial BS and UxNB, and fast handover operations may cause security issues in the use of UxNB for capacity injection. This new protocol also suggests performing UE handover from terrestrial to UxNB as a group. To the best of the authors' knowledge, there is no authentication solution between BSs according to LTE and 5G standards. The proposed scheme provides a solution for the authentication of UxNB by the terrestrial BS. Additionally, a credential sharing phase for each UE in handover is not required in the proposed method. The absence of a credential sharing step saves resources by reducing the number of communications between BSs. Moreover, many UE handover operations are completed in concise time within the proposed group handover method.
[ { "version": "v1", "created": "Wed, 16 Dec 2020 19:28:48 GMT" }, { "version": "v2", "created": "Thu, 4 Mar 2021 18:07:13 GMT" }, { "version": "v3", "created": "Sun, 21 Mar 2021 09:42:13 GMT" }, { "version": "v4", "created": "Fri, 4 Mar 2022 23:26:38 GMT" } ]
2022-03-08T00:00:00
[ [ "Aydin", "Yucel", "" ], [ "Kurt", "Gunes Karabulut", "" ], [ "Ozdemir", "Enver", "" ], [ "Yanikomeroglu", "Halim", "" ] ]
new_dataset
0.995095