id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2302.01223
|
Bram Van Den Akker
|
Bram van den Akker, Olivier Jeunen, Ying Li, Ben London, Zahra Nazari,
Devesh Parekh
|
Practical Bandits: An Industry Perspective
|
Tutorial held at The Web Conference 2023 (formerly known as WWW) in
Austin, Texas (USA), on April 30 - May 4, 2023
| null | null | null |
cs.LG cs.IR
|
http://creativecommons.org/licenses/by-sa/4.0/
|
The bandit paradigm provides a unified modeling framework for problems that
require decision-making under uncertainty. Because many business metrics can be
viewed as rewards (a.k.a. utilities) that result from actions, bandit
algorithms have seen a large and growing interest from industrial applications,
such as search, recommendation and advertising. Indeed, with the bandit lens
comes the promise of direct optimisation for the metrics we care about.
Nevertheless, the road to successfully applying bandits in production is not
an easy one. Even when the action space and rewards are well-defined,
practitioners still need to make decisions regarding multi-arm or contextual
approaches, on- or off-policy setups, delayed or immediate feedback, myopic or
long-term optimisation, etc. To make matters worse, industrial platforms
typically give rise to large action spaces in which existing approaches tend to
break down. The research literature on these topics is broad and vast, but this
can overwhelm practitioners, whose primary aim is to solve practical problems,
and therefore need to decide on a specific instantiation or approach for each
project. This tutorial will take a step towards filling that gap between the
theory and practice of bandits. Our goal is to present a unified overview of
the field and its existing terminology, concepts and algorithms -- with a focus
on problems relevant to industry. We hope our industrial perspective will help
future practitioners who wish to leverage the bandit paradigm for their
application.
|
[
{
"version": "v1",
"created": "Thu, 2 Feb 2023 17:03:40 GMT"
}
] | 2023-02-03T00:00:00 |
[
[
"Akker",
"Bram van den",
""
],
[
"Jeunen",
"Olivier",
""
],
[
"Li",
"Ying",
""
],
[
"London",
"Ben",
""
],
[
"Nazari",
"Zahra",
""
],
[
"Parekh",
"Devesh",
""
]
] |
new_dataset
| 0.996497 |
2302.01229
|
Dominik B\"ar
|
Dominik B\"ar, Nicolas Pr\"ollochs, Stefan Feuerriegel
|
New threats to society from free-speech social media platforms
| null | null | null | null |
cs.SI
|
http://creativecommons.org/licenses/by-nc-nd/4.0/
|
In recent years, several free-speech social media platforms (so-called
"alt-techs") have emerged, such as Parler, Gab, and Telegram. These platforms
market themselves as alternatives to mainstream social media and proclaim
"free-speech" due to the absence of content moderation, which has been
attracting a large base of partisan users, extremists, and supporters of
conspiracy theories. In this comment, we discuss some of the threats that
emerge from such social media platforms and call for more policy efforts
directed at understanding and countering the risks for society.
|
[
{
"version": "v1",
"created": "Thu, 2 Feb 2023 17:08:12 GMT"
}
] | 2023-02-03T00:00:00 |
[
[
"Bär",
"Dominik",
""
],
[
"Pröllochs",
"Nicolas",
""
],
[
"Feuerriegel",
"Stefan",
""
]
] |
new_dataset
| 0.99536 |
2302.01295
|
Cheng-Chun Hsu
|
Cheng-Chun Hsu and Zhenyu Jiang and Yuke Zhu
|
Ditto in the House: Building Articulation Models of Indoor Scenes
through Interactive Perception
|
ICRA 2023. Code and additional results are available at
https://ut-austin-rpl.github.io/HouseDitto/
| null | null | null |
cs.RO cs.AI cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Virtualizing the physical world into virtual models has been a critical
technique for robot navigation and planning in the real world. To foster
manipulation with articulated objects in everyday life, this work explores
building articulation models of indoor scenes through a robot's purposeful
interactions in these scenes. Prior work on articulation reasoning primarily
focuses on siloed objects of limited categories. To extend to room-scale
environments, the robot has to efficiently and effectively explore a
large-scale 3D space, locate articulated objects, and infer their
articulations. We introduce an interactive perception approach to this task.
Our approach, named Ditto in the House, discovers possible articulated objects
through affordance prediction, interacts with these objects to produce
articulated motions, and infers the articulation properties from the visual
observations before and after each interaction. It tightly couples affordance
prediction and articulation inference to improve both tasks. We demonstrate the
effectiveness of our approach in both simulation and real-world scenes. Code
and additional results are available at
https://ut-austin-rpl.github.io/HouseDitto/
|
[
{
"version": "v1",
"created": "Thu, 2 Feb 2023 18:22:00 GMT"
}
] | 2023-02-03T00:00:00 |
[
[
"Hsu",
"Cheng-Chun",
""
],
[
"Jiang",
"Zhenyu",
""
],
[
"Zhu",
"Yuke",
""
]
] |
new_dataset
| 0.991117 |
cs/0611111
|
Tad Hogg
|
Tad Hogg
|
Distributed Control of Microscopic Robots in Biomedical Applications
| null | null |
10.1007/978-1-4471-5113-5_8
| null |
cs.RO cs.MA
| null |
Current developments in molecular electronics, motors and chemical sensors
could enable constructing large numbers of devices able to sense, compute and
act in micron-scale environments. Such microscopic machines, of sizes
comparable to bacteria, could simultaneously monitor entire populations of
cells individually in vivo. This paper reviews plausible capabilities for
microscopic robots and the physical constraints due to operation in fluids at
low Reynolds number, diffusion-limited sensing and thermal noise from Brownian
motion. Simple distributed controls are then presented in the context of
prototypical biomedical tasks, which require control decisions on millisecond
time scales. The resulting behaviors illustrate trade-offs among speed,
accuracy and resource use. A specific example is monitoring for patterns of
chemicals in a flowing fluid released at chemically distinctive sites.
Information collected from a large number of such devices allows estimating
properties of cell-sized chemical sources in a macroscopic volume. The
microscopic devices moving with the fluid flow in small blood vessels can
detect chemicals released by tissues in response to localized injury or
infection. We find the devices can readily discriminate a single cell-sized
chemical source from the background chemical concentration, providing
high-resolution sensing in both time and space. By contrast, such a source
would be difficult to distinguish from background when diluted throughout the
blood volume as obtained with a blood sample.
|
[
{
"version": "v1",
"created": "Tue, 21 Nov 2006 23:22:20 GMT"
}
] | 2023-02-03T00:00:00 |
[
[
"Hogg",
"Tad",
""
]
] |
new_dataset
| 0.999061 |
1808.09141
|
Gaolei Li
|
Gaolei Li, Guangquan Xu, Arun Kumar Sangaiah, Jun Wu, and Jianhua Li
|
EdgeLaaS: Edge Learning as a Service for Knowledge-Centric Connected
Healthcare
|
Accepted by IEEE Network, 2019
|
vol.33, no. 6, 2019 volume={33}, number={6}, pages={37-43},
|
10.1109/MNET.001.1900019
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
By introducing networking technologies and services into healthcare
infrastructures (e.g., multimodal sensors and smart devices) that are deployed
to supervise a person's health condition, the traditional healthcare system is
being revolutionized toward knowledge-centric connected healthcare (KCCH),
where persons will take their own responsibility for their healthcare in a
knowledge-centric way. Due to the volume, velocity, and variety of healthcare
supervision data generated by these healthcare infrastructures, an urgent and
strategic issue is how to efficiently process a person's healthcare supervision
data with the right knowledge of the right guardians (e.g., relatives, nurses,
and doctors) at the right time. To solve this issue, the naming and routing
criterion of medical knowledge is studied. With this offloaded medical
knowledge, we propose an edge learning as a service (EdgeLaaS) framework for
KCCH to locally process health supervision data. In this framework, edge
learning nodes can help the patient choose better advice from the right
guardians in real time when some emergencies occur. Two application cases: 1)
fast self-help and 2) mobile help pre-calling are studied. Performance
evaluations demonstrate the superiority of KCCH and EdgeLaaS, respectively.
|
[
{
"version": "v1",
"created": "Tue, 28 Aug 2018 07:05:13 GMT"
},
{
"version": "v2",
"created": "Wed, 1 Feb 2023 06:40:46 GMT"
}
] | 2023-02-02T00:00:00 |
[
[
"Li",
"Gaolei",
""
],
[
"Xu",
"Guangquan",
""
],
[
"Sangaiah",
"Arun Kumar",
""
],
[
"Wu",
"Jun",
""
],
[
"Li",
"Jianhua",
""
]
] |
new_dataset
| 0.997514 |
1812.04861
|
Alexander Gerasimov
|
Alexander S. Gerasimov
|
A repetition-free hypersequent calculus for first-order rational Pavelka
logic
|
21 pages; corrected a misprint, added an appendix containing errata
to a cited article
| null |
10.33048/semi.2020.17.127
| null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a hypersequent calculus $\text{G}^3\text{\L}\forall$ for
first-order infinite-valued {\L}ukasiewicz logic and for an extension of it,
first-order rational Pavelka logic; the calculus is intended for bottom-up
proof search. In $\text{G}^3\text{\L}\forall$, there are no structural rules,
all the rules are invertible, and designations of multisets of formulas are not
repeated in any premise of the rules. The calculus $\text{G}^3\text{\L}\forall$
proves any sentence that is provable in at least one of the previously known
hypersequent calculi for the given logics. We study proof-theoretic properties
of $\text{G}^3\text{\L}\forall$ and thereby provide foundations for proof
search algorithms.
|
[
{
"version": "v1",
"created": "Wed, 12 Dec 2018 09:17:06 GMT"
},
{
"version": "v2",
"created": "Mon, 28 Jan 2019 13:50:26 GMT"
}
] | 2023-02-02T00:00:00 |
[
[
"Gerasimov",
"Alexander S.",
""
]
] |
new_dataset
| 0.986108 |
2106.10689
|
Peng Wang
|
Peng Wang, Lingjie Liu, Yuan Liu, Christian Theobalt, Taku Komura,
Wenping Wang
|
NeuS: Learning Neural Implicit Surfaces by Volume Rendering for
Multi-view Reconstruction
|
23 pages
| null | null | null |
cs.CV cs.GR
|
http://creativecommons.org/licenses/by/4.0/
|
We present a novel neural surface reconstruction method, called NeuS, for
reconstructing objects and scenes with high fidelity from 2D image inputs.
Existing neural surface reconstruction approaches, such as DVR and IDR, require
foreground mask as supervision, easily get trapped in local minima, and
therefore struggle with the reconstruction of objects with severe
self-occlusion or thin structures. Meanwhile, recent neural methods for novel
view synthesis, such as NeRF and its variants, use volume rendering to produce
a neural scene representation with robustness of optimization, even for highly
complex objects. However, extracting high-quality surfaces from this learned
implicit representation is difficult because there are not sufficient surface
constraints in the representation. In NeuS, we propose to represent a surface
as the zero-level set of a signed distance function (SDF) and develop a new
volume rendering method to train a neural SDF representation. We observe that
the conventional volume rendering method causes inherent geometric errors (i.e.
bias) for surface reconstruction, and therefore propose a new formulation that
is free of bias in the first order of approximation, thus leading to more
accurate surface reconstruction even without the mask supervision. Experiments
on the DTU dataset and the BlendedMVS dataset show that NeuS outperforms the
state-of-the-arts in high-quality surface reconstruction, especially for
objects and scenes with complex structures and self-occlusion.
|
[
{
"version": "v1",
"created": "Sun, 20 Jun 2021 12:59:42 GMT"
},
{
"version": "v2",
"created": "Thu, 16 Dec 2021 11:19:23 GMT"
},
{
"version": "v3",
"created": "Wed, 1 Feb 2023 06:00:21 GMT"
}
] | 2023-02-02T00:00:00 |
[
[
"Wang",
"Peng",
""
],
[
"Liu",
"Lingjie",
""
],
[
"Liu",
"Yuan",
""
],
[
"Theobalt",
"Christian",
""
],
[
"Komura",
"Taku",
""
],
[
"Wang",
"Wenping",
""
]
] |
new_dataset
| 0.991492 |
2201.06365
|
Juan M. Gandarias
|
Alberto Giammarino, Juan M. Gandarias, Pietro Balatti, Mattia Leonori,
Marta Lorenzini, and Arash Ajoudani
|
SUPER-MAN: SUPERnumerary Robotic Bodies for Physical Assistance in
HuMAN-Robot Conjoined Actions
|
16 pages, 14 figures. Associated video: https://youtu.be/_kfhLYQjhvA
| null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a mobile supernumerary robotic approach to physical
assistance in human-robot conjoined actions. The study starts with a
description of the SUPER-MAN concept. The idea is to develop and utilize mobile
collaborative systems that can follow human loco-manipulation commands to
perform industrial tasks through three main components: i) an admittance-type
interface, ii) a human-robot interaction controller, and iii) a supernumerary
robotic body. Next, we present two possible implementations within the
framework from theoretical and hardware perspectives. The first system is
called MOCA-MAN and comprises a redundant torque-controlled robotic arm and an
omnidirectional mobile platform. The second one is called Kairos-MAN, formed by
a high-payload 6-DoF velocity-controlled robotic arm and an omnidirectional
mobile platform. The systems share the same admittance interface, through which
user wrenches are translated to loco-manipulation commands generated by
whole-body controllers of each system. Besides, a thorough user study with
multiple and cross-gender subjects is presented to reveal the quantitative
performance of the two systems in effort-demanding and dexterous tasks.
Moreover, we provide qualitative results from the NASA-TLX questionnaire to
demonstrate the SUPER-MAN approach's potential and its acceptability from the
users' viewpoint.
|
[
{
"version": "v1",
"created": "Mon, 17 Jan 2022 11:54:31 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Jul 2022 09:37:42 GMT"
},
{
"version": "v3",
"created": "Wed, 1 Feb 2023 15:20:58 GMT"
}
] | 2023-02-02T00:00:00 |
[
[
"Giammarino",
"Alberto",
""
],
[
"Gandarias",
"Juan M.",
""
],
[
"Balatti",
"Pietro",
""
],
[
"Leonori",
"Mattia",
""
],
[
"Lorenzini",
"Marta",
""
],
[
"Ajoudani",
"Arash",
""
]
] |
new_dataset
| 0.998771 |
2206.03273
|
Guilong Li
|
Guilong Li, Yixian Chen, Yimin Wang, Zhi Yu, Peilin Nie, Zhaocheng He
|
City-scale synthetic individual-level vehicle trip data
| null | null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Trip data that records each vehicle's trip activity on the road network
describes the operation of urban traffic from the individual perspective, and
it is extremely valuable for transportation research. However, restricted by
data privacy, the trip data of individual-level cannot be opened for all
researchers, while the need for it is very urgent. In this paper, we produce a
city-scale synthetic individual-level vehicle trip dataset by generating for
each individual based on the historical trip data, where the availability and
trip data privacy protection are balanced. Privacy protection inevitably
affects the availability of data. Therefore, we have conducted numerous
experiments to demonstrate the performance and reliability of the synthetic
data in different dimensions and at different granularities to help users
properly judge the tasks it can perform. The result shows that the synthetic
data is consistent with the real data (i.e., historical data) on the aggregated
level and reasonable from the individual perspective.
|
[
{
"version": "v1",
"created": "Thu, 2 Jun 2022 08:08:01 GMT"
},
{
"version": "v2",
"created": "Fri, 19 Aug 2022 07:13:56 GMT"
},
{
"version": "v3",
"created": "Wed, 1 Feb 2023 09:11:57 GMT"
}
] | 2023-02-02T00:00:00 |
[
[
"Li",
"Guilong",
""
],
[
"Chen",
"Yixian",
""
],
[
"Wang",
"Yimin",
""
],
[
"Yu",
"Zhi",
""
],
[
"Nie",
"Peilin",
""
],
[
"He",
"Zhaocheng",
""
]
] |
new_dataset
| 0.999528 |
2206.08182
|
Adrian Pfleiderer
|
Adrian Pfleiderer, Dominik M\"uller, Frank Kramer
|
Nucleus Segmentation and Analysis in Breast Cancer with the MIScnn
Framework
| null | null | null | null |
cs.CV cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The NuCLS dataset contains over 220.000 annotations of cell nuclei in breast
cancers. We show how to use these data to create a multi-rater model with the
MIScnn Framework to automate the analysis of cell nuclei. For the model
creation, we use the widespread U-Net approach embedded in a pipeline. This
pipeline provides besides the high performance convolution neural network,
several preprocessor techniques and a extended data exploration. The final
model is tested in the evaluation phase using a wide variety of metrics with a
subsequent visualization. Finally, the results are compared and interpreted
with the results of the NuCLS study. As an outlook, indications are given which
are important for the future development of models in the context of cell
nuclei.
|
[
{
"version": "v1",
"created": "Thu, 16 Jun 2022 13:51:19 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Nov 2022 09:51:07 GMT"
},
{
"version": "v3",
"created": "Wed, 1 Feb 2023 16:53:32 GMT"
}
] | 2023-02-02T00:00:00 |
[
[
"Pfleiderer",
"Adrian",
""
],
[
"Müller",
"Dominik",
""
],
[
"Kramer",
"Frank",
""
]
] |
new_dataset
| 0.963677 |
2210.06642
|
Eric Ming Chen
|
Eric Ming Chen, Jin Sun, Apoorv Khandelwal, Dani Lischinski, Noah
Snavely, Hadar Averbuch-Elor
|
What's in a Decade? Transforming Faces Through Time
|
Project Page: https://facesthroughtime.github.io
| null | null | null |
cs.CV cs.GR
|
http://creativecommons.org/licenses/by/4.0/
|
How can one visually characterize people in a decade? In this work, we
assemble the Faces Through Time dataset, which contains over a thousand
portrait images from each decade, spanning the 1880s to the present day. Using
our new dataset, we present a framework for resynthesizing portrait images
across time, imagining how a portrait taken during a particular decade might
have looked like, had it been taken in other decades. Our framework optimizes a
family of per-decade generators that reveal subtle changes that differentiate
decade--such as different hairstyles or makeup--while maintaining the identity
of the input portrait. Experiments show that our method is more effective in
resynthesizing portraits across time compared to state-of-the-art
image-to-image translation methods, as well as attribute-based and
language-guided portrait editing models. Our code and data will be available at
https://facesthroughtime.github.io
|
[
{
"version": "v1",
"created": "Thu, 13 Oct 2022 00:48:18 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Oct 2022 03:01:34 GMT"
},
{
"version": "v3",
"created": "Wed, 1 Feb 2023 04:41:44 GMT"
}
] | 2023-02-02T00:00:00 |
[
[
"Chen",
"Eric Ming",
""
],
[
"Sun",
"Jin",
""
],
[
"Khandelwal",
"Apoorv",
""
],
[
"Lischinski",
"Dani",
""
],
[
"Snavely",
"Noah",
""
],
[
"Averbuch-Elor",
"Hadar",
""
]
] |
new_dataset
| 0.975677 |
2210.11743
|
Pietro Tedeschi Dr
|
Eva Wisse and Pietro Tedeschi and Savio Sciancalepore and Roberto Di
Pietro
|
$A^2RID$ -- Anonymous Direct Authentication and Remote Identification of
Commercial Drones
| null | null |
10.1109/JIOT.2023.3240477
| null |
cs.CR cs.NI
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
The recent worldwide introduction of RemoteID (RID) regulations forces all
Unmanned Aircrafts (UAs), a.k.a. drones, to broadcast in plaintext on the
wireless channel their identity and real-time location, for accounting and
monitoring purposes. Although improving drones' monitoring and situational
awareness, the RID rule also generates significant privacy concerns for UAs'
operators, threatened by the ease of tracking of UAs and related
confidentiality and privacy concerns connected with the broadcasting of
plaintext identity information. In this paper, we propose $A^2RID$, a protocol
suite for anonymous direct authentication and remote identification of
heterogeneous commercial UAs. $A^2RID$ integrates and adapts protocols for
anonymous message signing to work in the UA domain, coping with the constraints
of commercial drones and the tight real-time requirements imposed by the RID
regulation. Overall, the protocols in the $A^2RID$ suite allow a UA
manufacturer to pick the configuration that best suits the capabilities and
constraints of the drone, i.e., either a processing-intensive but
memory-lightweight solution (namely, $CS-A^2RID$) or a computationally-friendly
but memory-hungry approach (namely, $DS-A^2RID$). Besides formally defining the
protocols and formally proving their security in our setting, we also implement
and test them on real heterogeneous hardware platforms, i.e., the Holybro X-500
and the ESPcopter, releasing open-source the produced code. For all the
protocols, we demonstrated experimentally the capability of generating
anonymous RemoteID messages well below the time bound of $1$ second required by
RID, while at the same time having quite a limited impact on the energy budget
of the drone.
|
[
{
"version": "v1",
"created": "Fri, 21 Oct 2022 05:43:44 GMT"
},
{
"version": "v2",
"created": "Wed, 1 Feb 2023 05:51:56 GMT"
}
] | 2023-02-02T00:00:00 |
[
[
"Wisse",
"Eva",
""
],
[
"Tedeschi",
"Pietro",
""
],
[
"Sciancalepore",
"Savio",
""
],
[
"Di Pietro",
"Roberto",
""
]
] |
new_dataset
| 0.998862 |
2211.16506
|
Rabindra Lamsal
|
Rabindra Lamsal, Aaron Harwood, Maria Rodriguez Read
|
Where did you tweet from? Inferring the origin locations of tweets based
on contextual information
|
To appear in Proceedings of the IEEE Big Data Conference 2022
| null |
10.1109/BigData55660.2022.10020460
| null |
cs.CL cs.SI
|
http://creativecommons.org/licenses/by-nc-nd/4.0/
|
Public conversations on Twitter comprise many pertinent topics including
disasters, protests, politics, propaganda, sports, climate change,
epidemics/pandemic outbreaks, etc., that can have both regional and global
aspects. Spatial discourse analysis rely on geographical data. However, today
less than 1% of tweets are geotagged; in both cases--point location or bounding
place information. A major issue with tweets is that Twitter users can be at
location A and exchange conversations specific to location B, which we call the
Location A/B problem. The problem is considered solved if location entities can
be classified as either origin locations (Location As) or non-origin locations
(Location Bs). In this work, we propose a simple yet effective framework--the
True Origin Model--to address the problem that uses machine-level natural
language understanding to identify tweets that conceivably contain their origin
location information. The model achieves promising accuracy at country (80%),
state (67%), city (58%), county (56%) and district (64%) levels with support
from a Location Extraction Model as basic as the CoNLL-2003-based RoBERTa. We
employ a tweet contexualizer (locBERT) which is one of the core components of
the proposed model, to investigate multiple tweets' distributions for
understanding Twitter users' tweeting behavior in terms of mentioning origin
and non-origin locations. We also highlight a major concern with the currently
regarded gold standard test set (ground truth) methodology, introduce a new
data set, and identify further research avenues for advancing the area.
|
[
{
"version": "v1",
"created": "Fri, 18 Nov 2022 01:33:01 GMT"
}
] | 2023-02-02T00:00:00 |
[
[
"Lamsal",
"Rabindra",
""
],
[
"Harwood",
"Aaron",
""
],
[
"Read",
"Maria Rodriguez",
""
]
] |
new_dataset
| 0.997695 |
2301.10289
|
Xinghua Lou
|
Ken Kansky, Skanda Vaidyanath, Scott Swingle, Xinghua Lou, Miguel
Lazaro-Gredilla, Dileep George
|
PushWorld: A benchmark for manipulation planning with tools and movable
obstacles
| null | null | null | null |
cs.AI
|
http://creativecommons.org/licenses/by/4.0/
|
While recent advances in artificial intelligence have achieved human-level
performance in environments like Starcraft and Go, many physical reasoning
tasks remain challenging for modern algorithms. To date, few algorithms have
been evaluated on physical tasks that involve manipulating objects when movable
obstacles are present and when tools must be used to perform the manipulation.
To promote research on such tasks, we introduce PushWorld, an environment with
simplistic physics that requires manipulation planning with both movable
obstacles and tools. We provide a benchmark of more than 200 PushWorld puzzles
in PDDL and in an OpenAI Gym environment. We evaluate state-of-the-art
classical planning and reinforcement learning algorithms on this benchmark, and
we find that these baseline results are below human-level performance. We then
provide a new classical planning heuristic that solves the most puzzles among
the baselines, and although it is 40 times faster than the best baseline
planner, it remains below human-level performance.
|
[
{
"version": "v1",
"created": "Tue, 24 Jan 2023 20:20:17 GMT"
},
{
"version": "v2",
"created": "Wed, 1 Feb 2023 18:16:19 GMT"
}
] | 2023-02-02T00:00:00 |
[
[
"Kansky",
"Ken",
""
],
[
"Vaidyanath",
"Skanda",
""
],
[
"Swingle",
"Scott",
""
],
[
"Lou",
"Xinghua",
""
],
[
"Lazaro-Gredilla",
"Miguel",
""
],
[
"George",
"Dileep",
""
]
] |
new_dataset
| 0.999592 |
2301.12695
|
Jiahao He
|
Jiahao He, Shuangyin Li, Xinming Wang, Shing-Chi Cheung, Gansen Zhao
and Jinji Yang
|
Neural-FEBI: Accurate Function Identification in Ethereum Virtual
Machine Bytecode
|
19 pages, 13 figures
| null |
10.1016/j.jss.2023.111627
| null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Millions of smart contracts have been deployed onto the Ethereum platform,
posing potential attack subjects. Therefore, analyzing contract binaries is
vital since their sources are unavailable, involving identification comprising
function entry identification and detecting its boundaries. Such boundaries are
critical to many smart contract applications, e.g. reverse engineering and
profiling. Unfortunately, it is challenging to identify functions from these
stripped contract binaries due to the lack of internal function call statements
and the compiler-inducing instruction reshuffling. Recently, several existing
works excessively relied on a set of handcrafted heuristic rules which impose
several faults. To address this issue, we propose a novel neural network-based
framework for EVM bytecode Function Entries and Boundaries Identification
(neural-FEBI) that does not rely on a fixed set of handcrafted rules. Instead,
it used a two-level bi-Long Short-Term Memory network and a Conditional Random
Field network to locate the function entries. The suggested framework also
devises a control flow traversal algorithm to determine the code segments
reachable from the function entry as its boundary. Several experiments on
38,996 publicly available smart contracts collected as binary demonstrate that
neural-FEBI confirms the lowest and highest F1-scores for the function entries
identification task across different datasets of 88.3 to 99.7, respectively.
Its performance on the function boundary identification task is also increased
from 79.4% to 97.1% compared with state-of-the-art. We further demonstrate that
the identified function information can be used to construct more accurate
intra-procedural CFGs and call graphs. The experimental results confirm that
the proposed framework significantly outperforms state-of-the-art, often based
on handcrafted heuristic rules.
|
[
{
"version": "v1",
"created": "Mon, 30 Jan 2023 07:02:44 GMT"
},
{
"version": "v2",
"created": "Wed, 1 Feb 2023 08:53:03 GMT"
}
] | 2023-02-02T00:00:00 |
[
[
"He",
"Jiahao",
""
],
[
"Li",
"Shuangyin",
""
],
[
"Wang",
"Xinming",
""
],
[
"Cheung",
"Shing-Chi",
""
],
[
"Zhao",
"Gansen",
""
],
[
"Yang",
"Jinji",
""
]
] |
new_dataset
| 0.994929 |
2302.00029
|
Mehedi Hasan Raju
|
Mehedi H. Raju, Lee Friedman, Troy M. Bouman, Oleg V. Komogortsev
|
Determining Which Sine Wave Frequencies Correspond to Signal and Which
Correspond to Noise in Eye-Tracking Time-Series
|
Pages-16, Figures-11, Tables-4. arXiv admin note: text overlap with
arXiv:2209.07657
| null | null | null |
cs.HC
|
http://creativecommons.org/licenses/by/4.0/
|
The Fourier theorem proposes that any time-series can be decomposed into a
set of sinusoidal frequencies, each with its own phase and amplitude. The
literature suggests that some of these frequencies are important to reproduce
key qualities of eye-movements (``signal'') and some of these frequencies are
not important (``noise''). To understand what is signal and what is noise, we
analyzed our dataset in three ways: (1) visual inspection of plots of saccade,
microsaccade and smooth pursuit exemplars; (2) an analysis of the percentage of
variance accounted for (PVAF) in each of 1,033 unfiltered saccade trajectories
by each frequency cutoff; (3) an analysis of saccade peak velocity in the
unfiltered and various filtered conditions. Visual inspection suggested that
frequencies up to 75 Hz are required to represent microsaccades. Our PVAF
analysis indicated that data in the 0-25 Hz band are sufficient to account for
nearly 100% of the variance in unfiltered saccade trajectories. Our analysis
also indicated that frequencies below 100 Hz are sufficient to maintain peak
velocities. Therefore, our overall conclusion is that to maintain eye-movement
signal and reduce noise, a cutoff frequency of 100 Hz is appropriate. Our
results have implications for the proposed sampling rate of eye-tracking
recordings. If one is working in the frequency domain and 100 Hz needs to be
preserved, the minimum required sampling rate would be 200 Hz. However, in a
time domain analysis, a minimum 1000 Hz sampling rate is recommended.
|
[
{
"version": "v1",
"created": "Tue, 31 Jan 2023 19:02:17 GMT"
}
] | 2023-02-02T00:00:00 |
[
[
"Raju",
"Mehedi H.",
""
],
[
"Friedman",
"Lee",
""
],
[
"Bouman",
"Troy M.",
""
],
[
"Komogortsev",
"Oleg V.",
""
]
] |
new_dataset
| 0.999746 |
2302.00032
|
Deniz Oktay
|
Deniz Oktay, Mehran Mirramezani, Eder Medina, Ryan P. Adams
|
Neuromechanical Autoencoders: Learning to Couple Elastic and Neural
Network Nonlinearity
|
ICLR 2023 Spotlight
| null | null | null |
cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Intelligent biological systems are characterized by their embodiment in a
complex environment and the intimate interplay between their nervous systems
and the nonlinear mechanical properties of their bodies. This coordination, in
which the dynamics of the motor system co-evolved to reduce the computational
burden on the brain, is referred to as ``mechanical intelligence'' or
``morphological computation''. In this work, we seek to develop machine
learning analogs of this process, in which we jointly learn the morphology of
complex nonlinear elastic solids along with a deep neural network to control
it. By using a specialized differentiable simulator of elastic mechanics
coupled to conventional deep learning architectures -- which we refer to as
neuromechanical autoencoders -- we are able to learn to perform morphological
computation via gradient descent. Key to our approach is the use of mechanical
metamaterials -- cellular solids, in particular -- as the morphological
substrate. Just as deep neural networks provide flexible and
massively-parametric function approximators for perceptual and control tasks,
cellular solid metamaterials are promising as a rich and learnable space for
approximating a variety of actuation tasks. In this work we take advantage of
these complementary computational concepts to co-design materials and neural
network controls to achieve nonintuitive mechanical behavior. We demonstrate in
simulation how it is possible to achieve translation, rotation, and shape
matching, as well as a ``digital MNIST'' task. We additionally manufacture and
evaluate one of the designs to verify its real-world behavior.
|
[
{
"version": "v1",
"created": "Tue, 31 Jan 2023 19:04:28 GMT"
}
] | 2023-02-02T00:00:00 |
[
[
"Oktay",
"Deniz",
""
],
[
"Mirramezani",
"Mehran",
""
],
[
"Medina",
"Eder",
""
],
[
"Adams",
"Ryan P.",
""
]
] |
new_dataset
| 0.980917 |
2302.00164
|
Gerardo Antonio Alvarez-Hernandez
|
Gerardo Antonio Alvarez Hern\'andez, Juan Carlos Olguin, Juan Irving
Vasquez, Abril Valeria Uriarte, Maria Claudia Villica\~na Torres
|
Detection of Tomato Ripening Stages using Yolov3-tiny
| null | null | null | null |
cs.CV cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
One of the most important agricultural products in Mexico is the tomato
(Solanum lycopersicum), which occupies the 4th place national most produced
product . Therefore, it is necessary to improve its production, building
automatic detection system that detect, classify an keep tacks of the fruits is
one way to archieve it. So, in this paper, we address the design of a computer
vision system to detect tomatoes at different ripening stages. To solve the
problem, we use a neural network-based model for tomato classification and
detection. Specifically, we use the YOLOv3-tiny model because it is one of the
lightest current deep neural networks. To train it, we perform two grid
searches testing several combinations of hyperparameters. Our experiments
showed an f1-score of 90.0% in the localization and classification of ripening
stages in a custom dataset.
|
[
{
"version": "v1",
"created": "Wed, 1 Feb 2023 00:57:58 GMT"
}
] | 2023-02-02T00:00:00 |
[
[
"Hernández",
"Gerardo Antonio Alvarez",
""
],
[
"Olguin",
"Juan Carlos",
""
],
[
"Vasquez",
"Juan Irving",
""
],
[
"Uriarte",
"Abril Valeria",
""
],
[
"Torres",
"Maria Claudia Villicaña",
""
]
] |
new_dataset
| 0.998627 |
2302.00190
|
Jingyu Hu
|
Jingyu Hu, Ka-Hei Hui, Zhengzhe Liu, Ruihui Li and Chi-Wing Fu
|
Neural Wavelet-domain Diffusion for 3D Shape Generation, Inversion, and
Manipulation
|
arXiv admin note: substantial text overlap with arXiv:2209.08725
| null | null | null |
cs.CV cs.GR
|
http://creativecommons.org/licenses/by-nc-nd/4.0/
|
This paper presents a new approach for 3D shape generation, inversion, and
manipulation, through a direct generative modeling on a continuous implicit
representation in wavelet domain. Specifically, we propose a compact wavelet
representation with a pair of coarse and detail coefficient volumes to
implicitly represent 3D shapes via truncated signed distance functions and
multi-scale biorthogonal wavelets. Then, we design a pair of neural networks: a
diffusion-based generator to produce diverse shapes in the form of the coarse
coefficient volumes and a detail predictor to produce compatible detail
coefficient volumes for introducing fine structures and details. Further, we
may jointly train an encoder network to learn a latent space for inverting
shapes, allowing us to enable a rich variety of whole-shape and region-aware
shape manipulations. Both quantitative and qualitative experimental results
manifest the compelling shape generation, inversion, and manipulation
capabilities of our approach over the state-of-the-art methods.
|
[
{
"version": "v1",
"created": "Wed, 1 Feb 2023 02:47:53 GMT"
}
] | 2023-02-02T00:00:00 |
[
[
"Hu",
"Jingyu",
""
],
[
"Hui",
"Ka-Hei",
""
],
[
"Liu",
"Zhengzhe",
""
],
[
"Li",
"Ruihui",
""
],
[
"Fu",
"Chi-Wing",
""
]
] |
new_dataset
| 0.955764 |
2302.00268
|
Kaifeng Gao
|
Kaifeng Gao, Long Chen, Hanwang Zhang, Jun Xiao, Qianru Sun
|
Compositional Prompt Tuning with Motion Cues for Open-vocabulary Video
Relation Detection
|
accepted by ICLR 2023
| null | null | null |
cs.CV
|
http://creativecommons.org/licenses/by-nc-nd/4.0/
|
Prompt tuning with large-scale pretrained vision-language models empowers
open-vocabulary predictions trained on limited base categories, e.g., object
classification and detection. In this paper, we propose compositional prompt
tuning with motion cues: an extended prompt tuning paradigm for compositional
predictions of video data. In particular, we present Relation Prompt (RePro)
for Open-vocabulary Video Visual Relation Detection (Open-VidVRD), where
conventional prompt tuning is easily biased to certain subject-object
combinations and motion patterns. To this end, RePro addresses the two
technical challenges of Open-VidVRD: 1) the prompt tokens should respect the
two different semantic roles of subject and object, and 2) the tuning should
account for the diverse spatio-temporal motion patterns of the subject-object
compositions. Without bells and whistles, our RePro achieves a new
state-of-the-art performance on two VidVRD benchmarks of not only the base
training object and predicate categories, but also the unseen ones. Extensive
ablations also demonstrate the effectiveness of the proposed compositional and
multi-mode design of prompts. Code is available at
https://github.com/Dawn-LX/OpenVoc-VidVRD.
|
[
{
"version": "v1",
"created": "Wed, 1 Feb 2023 06:20:54 GMT"
}
] | 2023-02-02T00:00:00 |
[
[
"Gao",
"Kaifeng",
""
],
[
"Chen",
"Long",
""
],
[
"Zhang",
"Hanwang",
""
],
[
"Xiao",
"Jun",
""
],
[
"Sun",
"Qianru",
""
]
] |
new_dataset
| 0.997499 |
2302.00288
|
Hao Yu
|
Hao Yu, Bo Shen, Dezhi Ran, Jiaxin Zhang, Qi Zhang, Yuchi Ma, Guangtai
Liang, Ying Li, Tao Xie, Qianxiang Wang
|
CoderEval: A Benchmark of Pragmatic Code Generation with Generative
Pre-trained Models
| null | null | null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Code generation models based on the pre-training and fine-tuning paradigm
have been increasingly attempted by both academia and industry, resulting in
well-known industrial models such as Codex, CodeGen, and PanGu-Coder. To
validate the performance of these models, multiple existing benchmarks (e.g.,
AiXBench and HumanEval) are proposed, including only cases of generating a
standalone function, i.e., a function that invokes or accesses only built-in
functions and standard libraries. However, standalone functions constitute only
about 30\% of functions from real open-source projects. To assess a model's
performance for pragmatic code generation (i.e., code generation for real
settings of open source or proprietary code), in this paper, we propose a
benchmark named CoderEval of pragmatic code generation with generative
pre-trained models. Compared with the widely-used HumanEval benchmark from
OpenAI, CoderEval can be used to assess the performance of models against
pragmatic code generation beyond just generating standalone functions. Through
the evaluation of three public available models (CodeGen, PanGu-Coder, and
Codex) on CoderEval, we analyze and discuss the current progress and future
directions of pragmatic code generation with a generative pre-trained model.
|
[
{
"version": "v1",
"created": "Wed, 1 Feb 2023 07:39:28 GMT"
}
] | 2023-02-02T00:00:00 |
[
[
"Yu",
"Hao",
""
],
[
"Shen",
"Bo",
""
],
[
"Ran",
"Dezhi",
""
],
[
"Zhang",
"Jiaxin",
""
],
[
"Zhang",
"Qi",
""
],
[
"Ma",
"Yuchi",
""
],
[
"Liang",
"Guangtai",
""
],
[
"Li",
"Ying",
""
],
[
"Xie",
"Tao",
""
],
[
"Wang",
"Qianxiang",
""
]
] |
new_dataset
| 0.99897 |
2302.00338
|
Yousri Daldoul
|
Yousri Daldoul
|
A Robust Certificate Management System to Prevent Evil Twin Attacks in
IEEE 802.11 Networks
| null | null | null | null |
cs.CR cs.NI
|
http://creativecommons.org/licenses/by/4.0/
|
The evil twin attack is a major security threat to WLANs. An evil twin is a
rogue AP installed by a malicious user to impersonate legitimate APs. It
intends to attract victims in order to intercept their credentials, to steal
their sensitive information, to eavesdrop on their data, etc. In this paper, we
study the security mechanisms of wireless networks and we introduce the
different authentication methods, including 802.1X authentication. We show that
802.1X has improved security through the use of digital certificates but does
not define any practical technique for the user to check the network
certificate. Therefore, it remains vulnerable to the evil twin attack. To
repair this vulnerability, we introduce Robust Certificate Management System
(RCMS) which takes advantage of the digital certificates of 802.1X to protect
the users against rogue APs. RCMS defines a new verification code to allow the
user device to check the network certificate. This practical verification
combined with the reliability of digital certificates provides a perfect
protection against rogue APs. RCMS requires a small software update on the user
terminal and does not need any modification of IEEE 802.11. It has a
significant flexibility since trusting a single AP is enough to trust all the
APs of the extended network. This allows the administrators to extend their
networks easily without the need to update any database of trusted APs on the
user devices.
|
[
{
"version": "v1",
"created": "Wed, 1 Feb 2023 09:41:45 GMT"
}
] | 2023-02-02T00:00:00 |
[
[
"Daldoul",
"Yousri",
""
]
] |
new_dataset
| 0.979355 |
2302.00369
|
Pawel Kryszkiewicz
|
Kuldeep S. Gill, Pawel Kryszkiewicz, Pawel Sroka, Adrian Kliks,
Alexander M. Wyglinski
|
Memory Enabled Bumblebee-based Dynamic Spectrum Access for Platooning
Environments
| null | null |
10.1109/TVT.2023.3236035
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we propose a novel memory-enabled non-uniform sampling-based
bumblebee foraging algorithm (MEB) designed for optimal channel selection in a
distributed Vehicular Dynamic Spectrum Access (VDSA) framework employed in a
platoon operating environment. Given how bumblebee behavioral models are
designed to support adaptation in complex and highly time-varying environments,
these models can be employed by connected vehicles to enable their operation
within a dynamically changing network topology and support their selection of
optimal channels possessing low levels of congestion to achieve high
throughput. As a result, the proposed VDSA-based optimal channel selection
employs fundamental concepts from the bumblebee foraging model. In the proposed
approach, the Channel Busy Ratio (CBR) of all channels is computed and stored
in memory to be accessed by the MEB algorithm to make the necessary channel
switching decisions. Two averaging techniques, Sliding Window Average (SWA) and
Exponentially Weighted Moving Average (EWMA), are employed to leverage past
samples and are evaluated against the no-memory case. Due to the high
variability of the environment (e.g., high velocities, changing density of
vehicles on the road), we propose to calculate the CBR by employing non-uniform
channel sampling allocations as well as evaluate it using both simplified
numerical and realistic Vehicle-to-Vehicle (V2V) computer simulations. The
numerical simulation results show that gains in the probability of the best
channel selection can be achieved relative to a uniform sampling allocation
approach. By utilizing memory, we observe an additional increase in the channel
selection performance. Similarly, we see an increase in the probability of
successful reception when utilizing the bumblebee algorithm via a system-level
simulator.
|
[
{
"version": "v1",
"created": "Wed, 1 Feb 2023 10:58:42 GMT"
}
] | 2023-02-02T00:00:00 |
[
[
"Gill",
"Kuldeep S.",
""
],
[
"Kryszkiewicz",
"Pawel",
""
],
[
"Sroka",
"Pawel",
""
],
[
"Kliks",
"Adrian",
""
],
[
"Wyglinski",
"Alexander M.",
""
]
] |
new_dataset
| 0.996178 |
2302.00418
|
Zhuolun Li
|
Zhuolun Li, Alberto Sonnino, Philipp Jovanovic
|
Performance of EdDSA and BLS Signatures in Committee-Based Consensus
| null | null | null | null |
cs.DC cs.CR
|
http://creativecommons.org/licenses/by/4.0/
|
We present the first performance comparison of EdDSA and BLS signatures in
committee-based consensus protocols through large-scale geo-distributed
benchmarks. Contrary to popular beliefs, we find that small deployments (less
than 40 validators) can benefit from the small storage footprint of BLS
multi-signatures while larger deployments should favor EdDSA to improve
performance. As an independent contribution, we present a novel way for
committee-based consensus protocols to verify BLS multi-signed certificates by
manipulating the aggregated public key using pre-computed values.
|
[
{
"version": "v1",
"created": "Wed, 1 Feb 2023 13:07:46 GMT"
}
] | 2023-02-02T00:00:00 |
[
[
"Li",
"Zhuolun",
""
],
[
"Sonnino",
"Alberto",
""
],
[
"Jovanovic",
"Philipp",
""
]
] |
new_dataset
| 0.97414 |
2302.00424
|
Fengqing Hu
|
Fengqing Hu, Huan Yu
|
Safety-Critical Lane-Change Control for CAV Platoons in Mixed Autonomy
Traffic Using Control Barrier Functions
| null | null | null | null |
cs.SY eess.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Platooning can serve as an effective management measure for connected and
autonomous vehicles (CAVs) to ensure overall traffic efficiency. Current study
focus on the longitudinal control of CAV platoons, however it still remains a
challenging problem to stay safe under lane-change scenarios where both
longitudinal and lateral control is required. In this paper, a safety-critical
control method is proposed conduct lane-changing maneuvers for platooning CAVs
using Control Barrier Functions (CBFs). The proposed method is composed of two
layers: a higher-level controller for general lane change decision control and
a lower-level controller for safe kinematics control. Different from
traditional kinematics controllers, this lower-level controller conducts not
only longitudinal safety-critical control but also critically ensures safety
for lateral control during the platooning lane change. To effectively design
this lower-level controller, an optimization problem is solved with constraints
defined by both CBFs and Control Lyapunov Functions (CLFs). A traffic simulator
is used to conduct numerical traffic simulations in four safety-critical
scenarios and showed the effectiveness of the proposed controller.
|
[
{
"version": "v1",
"created": "Wed, 1 Feb 2023 13:16:16 GMT"
}
] | 2023-02-02T00:00:00 |
[
[
"Hu",
"Fengqing",
""
],
[
"Yu",
"Huan",
""
]
] |
new_dataset
| 0.99668 |
2302.00455
|
Attila Nagy
|
Botond Barta, Dorina Lakatos, Attila Nagy, Mil\'an Konor Nyist, Judit
\'Acs
|
HunSum-1: an Abstractive Summarization Dataset for Hungarian
| null | null | null | null |
cs.CL
|
http://creativecommons.org/licenses/by/4.0/
|
We introduce HunSum-1: a dataset for Hungarian abstractive summarization,
consisting of 1.14M news articles. The dataset is built by collecting, cleaning
and deduplicating data from 9 major Hungarian news sites through CommonCrawl.
Using this dataset, we build abstractive summarizer models based on huBERT and
mT5. We demonstrate the value of the created dataset by performing a
quantitative and qualitative analysis on the models' results. The HunSum-1
dataset, all models used in our experiments and our code are available open
source.
|
[
{
"version": "v1",
"created": "Wed, 1 Feb 2023 13:59:45 GMT"
}
] | 2023-02-02T00:00:00 |
[
[
"Barta",
"Botond",
""
],
[
"Lakatos",
"Dorina",
""
],
[
"Nagy",
"Attila",
""
],
[
"Nyist",
"Milán Konor",
""
],
[
"Ács",
"Judit",
""
]
] |
new_dataset
| 0.999767 |
2302.00461
|
Jiabao Gao
|
Jiabao Gao, Caijun Zhong, Geoffrey Ye Li
|
AMP-SBL Unfolding for Wideband MmWave Massive MIMO Channel Estimation
| null | null | null | null |
cs.IT eess.SP math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In wideband millimeter wave (mmWave) massive multiple-input multiple-output
(MIMO) systems, channel estimation is challenging due to the hybrid
analog-digital architecture, which compresses the received pilot signal and
makes channel estimation a compressive sensing (CS) problem. However, existing
high-performance CS algorithms usually suffer from high complexity. On the
other hand, the beam squint effect caused by huge bandwidth and massive
antennas will deteriorate estimation performance. In this paper,
frequency-dependent angular dictionaries are first adopted to compensate for
beam squint. Then, the expectation-maximization (EM)-based sparse Bayesian
learning (SBL) algorithm is enhanced in two aspects, where the E-step in each
iteration is implemented by approximate message passing (AMP) to reduce
complexity while the M-step is realized by a deep neural network (DNN) to
improve performance. In simulation, the proposed AMP-SBL unfolding-based
channel estimator achieves satisfactory performance with low complexity.
|
[
{
"version": "v1",
"created": "Wed, 1 Feb 2023 14:07:27 GMT"
}
] | 2023-02-02T00:00:00 |
[
[
"Gao",
"Jiabao",
""
],
[
"Zhong",
"Caijun",
""
],
[
"Li",
"Geoffrey Ye",
""
]
] |
new_dataset
| 0.976399 |
2302.00606
|
Bennett Kleinberg
|
Isabelle van der Vegt and Bennett Kleinberg
|
The RW3D: A multi-modal panel dataset to understand the psychological
impact of the pandemic
|
preprint
| null | null | null |
cs.CL
|
http://creativecommons.org/licenses/by/4.0/
|
Besides far-reaching public health consequences, the COVID-19 pandemic had a
significant psychological impact on people around the world. To gain further
insight into this matter, we introduce the Real World Worry Waves Dataset
(RW3D). The dataset combines rich open-ended free-text responses with survey
data on emotions, significant life events, and psychological stressors in a
repeated-measures design in the UK over three years (2020: n=2441, 2021: n=1716
and 2022: n=1152). This paper provides background information on the data
collection procedure, the recorded variables, participants' demographics, and
higher-order psychological and text-based derived variables that emerged from
the data. The RW3D is a unique primary data resource that could inspire new
research questions on the psychological impact of the pandemic, especially
those that connect modalities (here: text data, psychological survey variables
and demographics) over time.
|
[
{
"version": "v1",
"created": "Wed, 1 Feb 2023 17:13:06 GMT"
}
] | 2023-02-02T00:00:00 |
[
[
"van der Vegt",
"Isabelle",
""
],
[
"Kleinberg",
"Bennett",
""
]
] |
new_dataset
| 0.99954 |
2302.00635
|
Sergejs Kozlovi\v{c}s
|
Sergejs Kozlovi\v{c}s
|
Shared SAT Solvers and SAT Memory in Distributed Business Applications
|
This preprint has not undergone peer review or any post-submission
improvements or corrections. The Version of Record of this contribution is
published in CCIS vol. 1598, "Digital Business and Intelligent Systems: 15th
International Baltic Conference, Baltic DB&IS 2022, Riga, Latvia, July 4-6,
2022, Proceedings", pp.201-216, and is available online at
https://doi.org/10.1007/978-3-031-09850-5_14
|
CCIS vol. 1598, "Digital Business and Intelligent Systems: 15th
International Baltic Conference" (proceedings), pp.201-216, Riga, Latvia,
July 4-6, 2022
|
10.1007/978-3-031-09850-5_14
| null |
cs.DC cs.LO
|
http://creativecommons.org/licenses/by/4.0/
|
We propose a software architecture where SAT solvers act as a shared network
resource for distributed business applications. There can be multiple parallel
SAT solvers running either on dedicated hardware (a multi-processor system or a
system with a specific GPU) or in the cloud. In order to avoid complex message
passing between network nodes, we introduce a novel concept of the shared SAT
memory, which can be accessed (in the read/write mode) from multiple different
SAT solvers and modules implementing the business logic. As a result, our
architecture allows for the easy generation, diversification, and solving of
SAT instances from existing high-level programming languages without the need
to think about the network. We demonstrate our architecture on the use case of
transforming the integer factorization problem to SAT.
|
[
{
"version": "v1",
"created": "Tue, 24 Jan 2023 13:06:53 GMT"
}
] | 2023-02-02T00:00:00 |
[
[
"Kozlovičs",
"Sergejs",
""
]
] |
new_dataset
| 0.999325 |
2302.00646
|
Jaesung Huh
|
Jaesung Huh, Jacob Chalk, Evangelos Kazakos, Dima Damen, Andrew
Zisserman
|
Epic-Sounds: A Large-scale Dataset of Actions That Sound
|
6 pages, 4 figures
| null | null | null |
cs.SD cs.AI cs.LG eess.AS
|
http://creativecommons.org/licenses/by/4.0/
|
We introduce EPIC-SOUNDS, a large-scale dataset of audio annotations
capturing temporal extents and class labels within the audio stream of the
egocentric videos. We propose an annotation pipeline where annotators
temporally label distinguishable audio segments and describe the action that
could have caused this sound. We identify actions that can be discriminated
purely from audio, through grouping these free-form descriptions of audio into
classes. For actions that involve objects colliding, we collect human
annotations of the materials of these objects (e.g. a glass object being placed
on a wooden surface), which we verify from visual labels, discarding
ambiguities. Overall, EPIC-SOUNDS includes 78.4k categorised segments of
audible events and actions, distributed across 44 classes as well as 39.2k
non-categorised segments. We train and evaluate two state-of-the-art audio
recognition models on our dataset, highlighting the importance of audio-only
labels and the limitations of current models to recognise actions that sound.
|
[
{
"version": "v1",
"created": "Wed, 1 Feb 2023 18:19:37 GMT"
}
] | 2023-02-02T00:00:00 |
[
[
"Huh",
"Jaesung",
""
],
[
"Chalk",
"Jacob",
""
],
[
"Kazakos",
"Evangelos",
""
],
[
"Damen",
"Dima",
""
],
[
"Zisserman",
"Andrew",
""
]
] |
new_dataset
| 0.999654 |
2302.00654
|
Procheta Sen
|
Procheta Sen, Xi Wang, Ruiqing Xu, Emine Yilmaz
|
Task2KB: A Public Task-Oriented Knowledge Base
| null | null | null | null |
cs.IR
|
http://creativecommons.org/licenses/by/4.0/
|
Search engines and conversational assistants are commonly used to help users
complete their every day tasks such as booking travel, cooking, etc. While
there are some existing datasets that can be used for this purpose, their
coverage is limited to very few domains. In this paper, we propose a novel
knowledge base, 'Task2KB', which is constructed using data crawled from
WikiHow, an online knowledge resource offering instructional articles on a wide
range of tasks. Task2KB encapsulates various types of task-related information
and attributes, such as requirements, detailed step description, and available
methods to complete tasks. Due to its higher coverage compared to existing
related knowledge graphs, Task2KB can be highly useful in the development of
general purpose task completion assistants
|
[
{
"version": "v1",
"created": "Tue, 24 Jan 2023 18:38:09 GMT"
}
] | 2023-02-02T00:00:00 |
[
[
"Sen",
"Procheta",
""
],
[
"Wang",
"Xi",
""
],
[
"Xu",
"Ruiqing",
""
],
[
"Yilmaz",
"Emine",
""
]
] |
new_dataset
| 0.999859 |
2102.10314
|
Giacomo Giuliari
|
Giacomo Giuliari, Marc Wyss, Markus Legner, Adrian Perrig
|
GMA: A Pareto Optimal Distributed Resource-Allocation Algorithm
| null | null |
10.1007/978-3-030-79527-6_14
| null |
cs.NI cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
To address the rising demand for strong packet delivery guarantees in
networking, we study a novel way to perform graph resource allocation. We first
introduce allocation graphs, in which nodes can independently set local
resource limits based on physical constraints or policy decisions. In this
scenario we formalize the distributed path-allocation (PAdist) problem, which
consists in allocating resources to paths considering only local on-path
information -- importantly, not knowing which other paths could have an
allocation -- while at the same time achieving the global property of never
exceeding available resources.
Our core contribution, the global myopic allocation (GMA) algorithm, is a
solution to this problem. We prove that GMA can compute unconditional
allocations for all paths on a graph, while never over-allocating resources.
Further, we prove that GMA is Pareto optimal with respect to the allocation
size, and it has linear complexity in the input size. Finally, we show with
simulations that this theoretical result could be indeed applied to practical
scenarios, as the resulting path allocations are large enough to fit the
requirements of practically relevant applications.
|
[
{
"version": "v1",
"created": "Sat, 20 Feb 2021 11:15:24 GMT"
},
{
"version": "v2",
"created": "Mon, 15 Mar 2021 10:56:53 GMT"
}
] | 2023-02-01T00:00:00 |
[
[
"Giuliari",
"Giacomo",
""
],
[
"Wyss",
"Marc",
""
],
[
"Legner",
"Markus",
""
],
[
"Perrig",
"Adrian",
""
]
] |
new_dataset
| 0.994557 |
2110.08196
|
Yo\`av Montacute
|
Yo\`av Montacute and Nihil Shah
|
The Pebble-Relation Comonad in Finite Model Theory
|
Appears in Logic in Computer Science (LICS) 2022 Proceedings
| null | null | null |
cs.LO math.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The pebbling comonad, introduced by Abramsky, Dawar and Wang, provides a
categorical interpretation for the k-pebble games from finite model theory. The
coKleisli category of the pebbling comonad specifies equivalences under
different fragments and extensions of infinitary k-variable logic. Moreover,
the coalgebras over this pebbling comonad characterise treewidth and correspond
to tree decompositions. In this paper we introduce the pebble-relation comonad,
which characterises pathwidth and whose coalgebras correspond to path
decompositions. We further show that the existence of a coKleisli morphism in
this comonad is equivalent to truth preservation in the restricted conjunction
fragment of k-variable infinitary logic. We do this using Dalmau's
pebble-relation game and an equivalent all-in-one pebble game. We then provide
a similar treatment to the corresponding coKleisli isomorphisms via a bijective
version of the all-in-one pebble game with a hidden pebble placement. Finally,
we show as a consequence a new Lov\'asz-type theorem relating pathwidth to the
restricted conjunction fragment of k-variable infinitary logic with counting
quantifiers.
|
[
{
"version": "v1",
"created": "Fri, 15 Oct 2021 16:52:34 GMT"
},
{
"version": "v2",
"created": "Tue, 31 Jan 2023 12:03:40 GMT"
}
] | 2023-02-01T00:00:00 |
[
[
"Montacute",
"Yoàv",
""
],
[
"Shah",
"Nihil",
""
]
] |
new_dataset
| 0.99876 |
2202.07835
|
Yifeng Zheng
|
Songlei Wang and Yifeng Zheng and Xiaohua Jia
|
SecGNN: Privacy-Preserving Graph Neural Network Training and Inference
as a Cloud Service
|
Accepted in IEEE Transactions on Services Computing (TSC)
| null | null | null |
cs.CR cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Graphs are widely used to model the complex relationships among entities. As
a powerful tool for graph analytics, graph neural networks (GNNs) have recently
gained wide attention due to its end-to-end processing capabilities. With the
proliferation of cloud computing, it is increasingly popular to deploy the
services of complex and resource-intensive model training and inference in the
cloud due to its prominent benefits. However, GNN training and inference
services, if deployed in the cloud, will raise critical privacy concerns about
the information-rich and proprietary graph data (and the resulting model).
While there has been some work on secure neural network training and inference,
they all focus on convolutional neural networks handling images and text rather
than complex graph data with rich structural information. In this paper, we
design, implement, and evaluate SecGNN, the first system supporting
privacy-preserving GNN training and inference services in the cloud. SecGNN is
built from a synergy of insights on lightweight cryptography and machine
learning techniques. We deeply examine the procedure of GNN training and
inference, and devise a series of corresponding secure customized protocols to
support the holistic computation. Extensive experiments demonstrate that SecGNN
achieves comparable plaintext training and inference accuracy, with promising
performance.
|
[
{
"version": "v1",
"created": "Wed, 16 Feb 2022 02:57:10 GMT"
},
{
"version": "v2",
"created": "Tue, 31 Jan 2023 11:29:18 GMT"
}
] | 2023-02-01T00:00:00 |
[
[
"Wang",
"Songlei",
""
],
[
"Zheng",
"Yifeng",
""
],
[
"Jia",
"Xiaohua",
""
]
] |
new_dataset
| 0.996846 |
2202.13468
|
Xiang Guo
|
Xiang Guo, Arash Tavakoli, Erin Robartes, Austin Angulo, T. Donna
Chen, Arsalan Heydarian
|
Roadway Design Matters: Variation in Bicyclists' Psycho-Physiological
Responses in Different Urban Roadway Designs
| null | null |
10.1016/j.trf.2022.11.015
| null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
As a healthier and more sustainable way of mobility, cycling has been
advocated by literature and policy. However, current trends in bicyclist crash
fatalities suggest deficiencies in current roadway design in protecting these
vulnerable road users. The lack of cycling data is a common challenge for
studying bicyclists' safety, behavior, and comfort levels under different
design contexts. To understand bicyclists' behavioral and physiological
responses in an efficient and safe way, this study uses a bicycle simulator
within an immersive virtual environment (IVE). Off-the-shelf sensors are
utilized to evaluate bicyclists' cycling performance (speed and lane position)
and physiological responses (eye tracking and heart rate (HR)). Participants
bike in a simulated virtual environment modeled to scale from a real-world
street with a shared bike lane (sharrow) to evaluate how introduction of a bike
lane and a protected bike lane with pylons may impact perceptions of safety, as
well as behavioral and psycho-physiological responses. Results from 50
participants show that the protected bike lane design received the highest
perceived safety rating and exhibited the lowest average cycling speed.
Furthermore, both the bike lane and the protected bike lane scenarios show a
less dispersed gaze distribution than the as-built sharrow scenario, reflecting
a higher gaze focus among bicyclists on the biking task in the bike lane and
protected bike lane scenarios, compared to when bicyclists share right of way
with vehicles. Additionally, heart rate change point results from the study
suggest that creating dedicated zones for bicyclists (bike lanes or protected
bike lanes) has the potential to reduce bicyclists' stress levels.
|
[
{
"version": "v1",
"created": "Sun, 27 Feb 2022 22:36:10 GMT"
}
] | 2023-02-01T00:00:00 |
[
[
"Guo",
"Xiang",
""
],
[
"Tavakoli",
"Arash",
""
],
[
"Robartes",
"Erin",
""
],
[
"Angulo",
"Austin",
""
],
[
"Chen",
"T. Donna",
""
],
[
"Heydarian",
"Arsalan",
""
]
] |
new_dataset
| 0.987477 |
2204.11245
|
Chao Zhang
|
Chao Zhang, Wenqiang Yi, Yuanwei Liu and Lajos Hanzo
|
Semi-Integrated-Sensing-and-Communication (Semi-ISaC): From OMA to NOMA
|
This paper has been accpeted by IEEE Transactions on Communications.
This paper also has the further content to show the detailed proofs, namely
"The Proofs in the Paper Titled by 'Semi-Integrated-Sensing-and-Communication
(Semi-ISaC): From OMA to NOMA'" followed by the journal version
| null | null | null |
cs.IT eess.SP math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The new concept of semi-integrated-sensing-and-communication (Semi-ISaC) is
proposed for next-generation cellular networks. Compared to the
state-of-the-art, where the total bandwidth is used for integrated sensing and
communication (ISaC), the proposed Semi-ISaC framework provides more freedom as
it allows that a portion of the bandwidth is exclusively used for either
wireless communication or radar detection, while the rest is for ISaC
transmission. To enhance the bandwidth efficiency (BE), we investigate the
evolution of Semi-ISaC networks from orthogonal multiple access (OMA) to
non-orthogonal multiple access (NOMA). First, we evaluate the performance of an
OMA-based Semi-ISaC network. As for the communication signals, we investigate
both the outage probability (OP) and the ergodic rate. As for the radar echoes,
we characterize the ergodic radar estimation information rate (REIR). Then, we
investigate the performance of a NOMA-based Semi-ISaC network, including the OP
and the ergodic rate for communication signals and the ergodic REIR for radar
echoes. The diversity gains of OP and the high signal-to-noise ratio (SNR)
slopes of the ergodic REIR are also evaluated as insights. The analytical
results indicate that: 1) Under a two-user NOMA-based Semi-ISaC scenario, the
diversity order of the near-user is equal to the coefficient of the Nakagami-m
fading channels (m), while that of the far-user is zero; and 2) The high-SNR
slope for the ergodic REIR is based on the ratio of the radar signal's duty
cycle to the pulse duration. Our simulation results show that: 1) Semi-ISaC has
better channel capacity than the conventional ISaC; and 2) The NOMA-based
Semi-ISaC has better channel capacity than the OMA-based Semi-ISaC.
|
[
{
"version": "v1",
"created": "Sun, 24 Apr 2022 11:21:01 GMT"
},
{
"version": "v2",
"created": "Tue, 31 Jan 2023 04:50:30 GMT"
}
] | 2023-02-01T00:00:00 |
[
[
"Zhang",
"Chao",
""
],
[
"Yi",
"Wenqiang",
""
],
[
"Liu",
"Yuanwei",
""
],
[
"Hanzo",
"Lajos",
""
]
] |
new_dataset
| 0.982674 |
2205.12897
|
Iman Vakilinia
|
Iman Vakilinia
|
Cryptocurrency Giveaway Scam with YouTube Live Stream
| null | null |
10.1109/UEMCON54665.2022.9965686
| null |
cs.CR
|
http://creativecommons.org/licenses/by/4.0/
|
This paper investigates the cryptocurrency giveaway scam with the YouTube
live stream carried out on 5/15/2022 and 5/16/2022. In this scam scheme, the
scammer plays a recorded video of a famous person in a YouTube live stream
annotated with a cryptocurrency giveaway announcement. In the annotated
announcement, the victims are directed to the scammer's webpage. The scammer's
webpage is designed intelligently to deceive victims such that they believe the
legitimacy of the giveaway. The scammer claims that whatever donation the
victim sends to a cryptocurrency wallet address, the giveaway scheme will
double the donated amount and immediately send it back to the victim. By
analyzing the scammers' wallet addresses, it can be seen that scammers could
steal a significant amount of money in a short time. After analyzing the
attackers' techniques, tactics, and procedures, this paper discusses the
countermeasures that can be applied to mitigate such a fraudulent activity in
the future.
|
[
{
"version": "v1",
"created": "Wed, 25 May 2022 16:30:55 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Jun 2022 22:48:47 GMT"
}
] | 2023-02-01T00:00:00 |
[
[
"Vakilinia",
"Iman",
""
]
] |
new_dataset
| 0.999876 |
2207.06116
|
Marc Frei
|
Marc Frei and Jonghoon Kwon and Seyedali Tabaeiaghdaei and Marc Wyss
and Christoph Lenzen and Adrian Perrig
|
G-SINC: Global Synchronization Infrastructure for Network Clocks
| null | null |
10.1109/SRDS55811.2022.00021
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Many critical computing applications rely on secure and dependable time which
is reliably synchronized across large distributed systems. Today's time
synchronization architectures are commonly based on global navigation satellite
systems at the considerable risk of being exposed to outages, malfunction, or
attacks against availability and accuracy. This paper describes a practical
instantiation of a new global, Byzantine fault-tolerant clock synchronization
approach that does not place trust in any single entity and is able to tolerate
a fraction of faulty entities while still maintaining synchronization on a
global scale among otherwise sovereign network topologies. Leveraging strong
resilience and security properties provided by the path-aware SCION networking
architecture, the presented design can be implemented as a backward compatible
active standby solution for existing time synchronization deployments. Through
extensive evaluation, we demonstrate that over 94% of time servers reliably
minimize the offset of their local clocks to real-time in the presence of up to
20% malicious nodes, and all time servers remain synchronized with a skew of
only 2 ms even after one year of reference clock outage.
|
[
{
"version": "v1",
"created": "Wed, 13 Jul 2022 10:45:29 GMT"
}
] | 2023-02-01T00:00:00 |
[
[
"Frei",
"Marc",
""
],
[
"Kwon",
"Jonghoon",
""
],
[
"Tabaeiaghdaei",
"Seyedali",
""
],
[
"Wyss",
"Marc",
""
],
[
"Lenzen",
"Christoph",
""
],
[
"Perrig",
"Adrian",
""
]
] |
new_dataset
| 0.987868 |
2209.03726
|
Gabriel Kasmi
|
Gabriel Kasmi, Yves-Marie Saint-Drenan, David Trebosc, Rapha\"el
Jolivet, Jonathan Leloux, Babacar Sarr, Laurent Dubus
|
A crowdsourced dataset of aerial images with annotated solar
photovoltaic arrays and installation metadata
|
12 pages, 3 figures, 7 tables, revised preprint resubmitted to
Scientific Data
| null |
10.1038/s41597-023-01951-4
| null |
cs.CV
|
http://creativecommons.org/licenses/by/4.0/
|
Photovoltaic (PV) energy generation plays a crucial role in the energy
transition. Small-scale PV installations are deployed at an unprecedented pace,
and their integration into the grid can be challenging since public authorities
often lack quality data about them. Overhead imagery is increasingly used to
improve the knowledge of residential PV installations with machine learning
models capable of automatically mapping these installations. However, these
models cannot be easily transferred from one region or data source to another
due to differences in image acquisition. To address this issue known as domain
shift and foster the development of PV array mapping pipelines, we propose a
dataset containing aerial images, annotations, and segmentation masks. We
provide installation metadata for more than 28,000 installations. We provide
ground truth segmentation masks for 13,000 installations, including 7,000 with
annotations for two different image providers. Finally, we provide installation
metadata that matches the annotation for more than 8,000 installations. Dataset
applications include end-to-end PV registry construction, robust PV
installations mapping, and analysis of crowdsourced datasets.
|
[
{
"version": "v1",
"created": "Thu, 8 Sep 2022 11:42:53 GMT"
},
{
"version": "v2",
"created": "Thu, 8 Dec 2022 13:38:57 GMT"
}
] | 2023-02-01T00:00:00 |
[
[
"Kasmi",
"Gabriel",
""
],
[
"Saint-Drenan",
"Yves-Marie",
""
],
[
"Trebosc",
"David",
""
],
[
"Jolivet",
"Raphaël",
""
],
[
"Leloux",
"Jonathan",
""
],
[
"Sarr",
"Babacar",
""
],
[
"Dubus",
"Laurent",
""
]
] |
new_dataset
| 0.999526 |
2209.06300
|
William Hackett
|
William Hackett, Stefan Trawicki, Zhengxin Yu, Neeraj Suri, Peter
Garraghan
|
PINCH: An Adversarial Extraction Attack Framework for Deep Learning
Models
|
19 pages, 13 figures, 5 tables
| null | null | null |
cs.CR cs.AI cs.LG
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
Adversarial extraction attacks constitute an insidious threat against Deep
Learning (DL) models in-which an adversary aims to steal the architecture,
parameters, and hyper-parameters of a targeted DL model. Existing extraction
attack literature have observed varying levels of attack success for different
DL models and datasets, yet the underlying cause(s) behind their susceptibility
often remain unclear, and would help facilitate creating secure DL systems. In
this paper we present PINCH: an efficient and automated extraction attack
framework capable of designing, deploying, and analyzing extraction attack
scenarios across heterogeneous hardware platforms. Using PINCH, we perform
extensive experimental evaluation of extraction attacks against 21 model
architectures to explore new extraction attack scenarios and further attack
staging. Our findings show (1) key extraction characteristics whereby
particular model configurations exhibit strong resilience against specific
attacks, (2) even partial extraction success enables further staging for other
adversarial attacks, and (3) equivalent stolen models uncover differences in
expressive power, yet exhibit similar captured knowledge.
|
[
{
"version": "v1",
"created": "Tue, 13 Sep 2022 21:08:13 GMT"
},
{
"version": "v2",
"created": "Tue, 31 Jan 2023 15:27:26 GMT"
}
] | 2023-02-01T00:00:00 |
[
[
"Hackett",
"William",
""
],
[
"Trawicki",
"Stefan",
""
],
[
"Yu",
"Zhengxin",
""
],
[
"Suri",
"Neeraj",
""
],
[
"Garraghan",
"Peter",
""
]
] |
new_dataset
| 0.992375 |
2209.14225
|
Poonam Kumari Saha
|
Poonam Kumari Saha (1), Deeksha Arya (1), Ashutosh Kumar (1), Hiroya
Maeda (2), Yoshihide Sekimoto (1) ((1) The University of Tokyo, Japan, (2)
Urban-X Technologies, Inc., Tokyo, Japan)
|
Road Rutting Detection using Deep Learning on Images
|
9 pages, 7 figures
|
2022 IEEE International Conference on Big Data (Big Data), Osaka,
Japan, 2022, pp. 6507-6515
|
10.1109/BigData55660.2022.10020642
| null |
cs.CV
|
http://creativecommons.org/licenses/by-sa/4.0/
|
Road rutting is a severe road distress that can cause premature failure of
road incurring early and costly maintenance costs. Research on road damage
detection using image processing techniques and deep learning are being
actively conducted in the past few years. However, these researches are mostly
focused on detection of cracks, potholes, and their variants. Very few research
has been done on the detection of road rutting. This paper proposes a novel
road rutting dataset comprising of 949 images and provides both object level
and pixel level annotations. Object detection models and semantic segmentation
models were deployed to detect road rutting on the proposed dataset, and
quantitative and qualitative analysis of model predictions were done to
evaluate model performance and identify challenges faced in the detection of
road rutting using the proposed method. Object detection model YOLOX-s achieves
mAP@IoU=0.5 of 61.6% and semantic segmentation model PSPNet (Resnet-50)
achieves IoU of 54.69 and accuracy of 72.67, thus providing a benchmark
accuracy for similar work in future. The proposed road rutting dataset and the
results of our research study will help accelerate the research on detection of
road rutting using deep learning.
|
[
{
"version": "v1",
"created": "Wed, 28 Sep 2022 16:53:05 GMT"
}
] | 2023-02-01T00:00:00 |
[
[
"Saha",
"Poonam Kumari",
""
],
[
"Arya",
"Deeksha",
""
],
[
"Kumar",
"Ashutosh",
""
],
[
"Maeda",
"Hiroya",
""
],
[
"Sekimoto",
"Yoshihide",
""
]
] |
new_dataset
| 0.963075 |
2210.07499
|
Jinchuan Tian
|
Jinchuan Tian, Brian Yan, Jianwei Yu, Chao Weng, Dong Yu, Shinji
Watanabe
|
Bayes risk CTC: Controllable CTC alignment in Sequence-to-Sequence tasks
| null |
International Conference on Learning Representations (ICLR), 2023
| null | null |
cs.CL cs.SD eess.AS
|
http://creativecommons.org/licenses/by-nc-nd/4.0/
|
Sequence-to-Sequence (seq2seq) tasks transcribe the input sequence to a
target sequence. The Connectionist Temporal Classification (CTC) criterion is
widely used in multiple seq2seq tasks. Besides predicting the target sequence,
a side product of CTC is to predict the alignment, which is the most probable
input-long sequence that specifies a hard aligning relationship between the
input and target units. As there are multiple potential aligning sequences
(called paths) that are equally considered in CTC formulation, the choice of
which path will be most probable and become the predicted alignment is always
uncertain. In addition, it is usually observed that the alignment predicted by
vanilla CTC will drift compared with its reference and rarely provides
practical functionalities. Thus, the motivation of this work is to make the CTC
alignment prediction controllable and thus equip CTC with extra
functionalities. The Bayes risk CTC (BRCTC) criterion is then proposed in this
work, in which a customizable Bayes risk function is adopted to enforce the
desired characteristics of the predicted alignment. With the risk function, the
BRCTC is a general framework to adopt some customizable preference over the
paths in order to concentrate the posterior into a particular subset of the
paths. In applications, we explore one particular preference which yields
models with the down-sampling ability and reduced inference costs. By using
BRCTC with another preference for early emissions, we obtain an improved
performance-latency trade-off for online models. Experimentally, the proposed
BRCTC reduces the inference cost of offline models by up to 47% without
performance degradation and cuts down the overall latency of online systems to
an unseen level.
|
[
{
"version": "v1",
"created": "Fri, 14 Oct 2022 03:55:36 GMT"
},
{
"version": "v2",
"created": "Tue, 31 Jan 2023 05:01:51 GMT"
}
] | 2023-02-01T00:00:00 |
[
[
"Tian",
"Jinchuan",
""
],
[
"Yan",
"Brian",
""
],
[
"Yu",
"Jianwei",
""
],
[
"Weng",
"Chao",
""
],
[
"Yu",
"Dong",
""
],
[
"Watanabe",
"Shinji",
""
]
] |
new_dataset
| 0.989891 |
2211.06537
|
Tobias Fiebig
|
Florian Streibelt, Martina Lindorfer, Seda G\"urses, Carlos H.
Ga\~n\'an, Tobias Fiebig
|
Back-to-the-Future Whois: An IP Address Attribution Service for Working
with Historic Datasets
| null | null | null | null |
cs.NI
|
http://creativecommons.org/licenses/by/4.0/
|
Researchers and practitioners often face the issue of having to attribute an
IP address to an organization. For current data this is comparably easy, using
services like whois or other databases. Similarly, for historic data, several
entities like the RIPE NCC provide websites that provide access to historic
records. For large-scale network measurement work, though, researchers often
have to attribute millions of addresses. For current data, Team Cymru provides
a bulk whois service which allows bulk address attribution. However, at the
time of writing, there is no service available that allows historic bulk
attribution of IP addresses. Hence, in this paper, we introduce and evaluate
our 'Back-to-the-Future whois' service, allowing historic bulk attribution of
IP addresses on a daily granularity based on CAIDA Routeviews aggregates. We
provide this service to the community for free, and also share our
implementation so researchers can run instances themselves.
|
[
{
"version": "v1",
"created": "Sat, 12 Nov 2022 01:00:12 GMT"
},
{
"version": "v2",
"created": "Tue, 31 Jan 2023 16:05:13 GMT"
}
] | 2023-02-01T00:00:00 |
[
[
"Streibelt",
"Florian",
""
],
[
"Lindorfer",
"Martina",
""
],
[
"Gürses",
"Seda",
""
],
[
"Gañán",
"Carlos H.",
""
],
[
"Fiebig",
"Tobias",
""
]
] |
new_dataset
| 0.976831 |
2301.04748
|
Zhihua Liu
|
Zhihua Liu, Bin Yang, Yan Shen, Xuejun Ni, Huiyu Zhou
|
LSDM: Long-Short Diffeomorphic Motion for Weakly-Supervised Ultrasound
Landmark Tracking
| null | null | null | null |
cs.CV
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
Accurate tracking of an anatomical landmark over time has been of high
interests for disease assessment such as minimally invasive surgery and tumor
radiation therapy. Ultrasound imaging is a promising modality benefiting from
low-cost and real-time acquisition. However, generating a precise landmark
tracklet is very challenging, as attempts can be easily distorted by different
interference such as landmark deformation, visual ambiguity and partial
observation. In this paper, we propose a long-short diffeomorphic motion
network, which is a multi-task framework with a learnable deformation prior to
search for the plausible deformation of landmark. Specifically, we design a
novel diffeomorphism representation in both long and short temporal domains for
delineating motion margins and reducing long-term cumulative tracking errors.
To further mitigate local anatomical ambiguity, we propose an expectation
maximisation motion alignment module to iteratively optimize both long and
short deformation, aligning to the same directional and spatial representation.
The proposed multi-task system can be trained in a weakly-supervised manner,
which only requires few landmark annotations for tracking and zero annotation
for long-short deformation learning. We conduct extensive experiments on two
ultrasound landmark tracking datasets. Experimental results show that our
proposed method can achieve better or competitive landmark tracking performance
compared with other state-of-the-art tracking methods, with a strong
generalization capability across different scanner types and different
ultrasound modalities.
|
[
{
"version": "v1",
"created": "Wed, 11 Jan 2023 22:57:31 GMT"
},
{
"version": "v2",
"created": "Tue, 31 Jan 2023 12:58:19 GMT"
}
] | 2023-02-01T00:00:00 |
[
[
"Liu",
"Zhihua",
""
],
[
"Yang",
"Bin",
""
],
[
"Shen",
"Yan",
""
],
[
"Ni",
"Xuejun",
""
],
[
"Zhou",
"Huiyu",
""
]
] |
new_dataset
| 0.998966 |
2301.05911
|
XueTao Jiang
|
Xuetao Jiang and Meiyu Jiang and Qingguo Zhou
|
Day-Ahead PV Power Forecasting Based on MSTL-TFT
| null | null | null | null |
cs.LG cs.SY eess.SY
|
http://creativecommons.org/licenses/by/4.0/
|
In recent years, renewable energy resources have accounted for an increasing
share of electricity energy.Among them, photovoltaic (PV) power generation has
received broad attention due to its economic and environmental
benefits.Accurate PV generation forecasts can reduce power dispatch from the
grid, thus increasing the supplier's profit in the day-ahead electricity
market.The power system of a PV site is affected by solar radiation, PV plant
properties and meteorological factors, resulting in uncertainty in its power
output.This study used multiple seasonal-trend decomposition using LOESS (MSTL)
and temporal fusion transformer (TFT) to perform day-ahead PV prediction on the
desert knowledge Australia solar centre (DKASC) dataset.We compare the
decomposition algorithms (VMD, EEMD and VMD-EEMD) and prediction models (BP,
LSTM and XGBoost, etc.) which are commonly used in PV prediction presently.The
results show that the MSTL-TFT method is more accurate than the aforementioned
methods, which have noticeable improvement compared to other recent day-ahead
PV predictions on desert knowledge Australia solar centre (DKASC).
|
[
{
"version": "v1",
"created": "Sat, 14 Jan 2023 12:51:10 GMT"
},
{
"version": "v2",
"created": "Tue, 31 Jan 2023 08:29:22 GMT"
}
] | 2023-02-01T00:00:00 |
[
[
"Jiang",
"Xuetao",
""
],
[
"Jiang",
"Meiyu",
""
],
[
"Zhou",
"Qingguo",
""
]
] |
new_dataset
| 0.97749 |
2301.10894
|
Jenny Zhuoting Zhang
|
Daniel Chee Hian Tan, Jenny Zhang, Michael (Meng Yee) Chuah, Zhibin Li
|
Perceptive Locomotion with Controllable Pace and Natural Gait
Transitions Over Uneven Terrains
| null | null | null | null |
cs.RO
|
http://creativecommons.org/licenses/by-sa/4.0/
|
This work developed a learning framework for perceptive legged locomotion
that combines visual feedback, proprioceptive information, and active gait
regulation of foot-ground contacts. The perception requires only one
forward-facing camera to obtain the heightmap, and the active regulation of
gait paces and traveling velocity are realized through our formulation of
CPG-based high-level imitation of foot-ground contacts. Through this framework,
an end-user has the ability to command task-level inputs to control different
walking speeds and gait frequencies according to the traversal of different
terrains, which enables more reliable negotiation with encountered obstacles.
The results demonstrated that the learned perceptive locomotion policy followed
task-level control inputs with intended behaviors, and was robust in presence
of unseen terrains and external force perturbations. A video demonstration can
be found at https://youtu.be/OTzlWzDfAe8, and the codebase at
https://github.com/jennyzzt/perceptual-locomotion.
|
[
{
"version": "v1",
"created": "Thu, 26 Jan 2023 01:34:41 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Jan 2023 21:59:51 GMT"
}
] | 2023-02-01T00:00:00 |
[
[
"Tan",
"Daniel Chee Hian",
"",
"Meng Yee"
],
[
"Zhang",
"Jenny",
"",
"Meng Yee"
],
[
"Michael",
"",
"",
"Meng Yee"
],
[
"Chuah",
"",
""
],
[
"Li",
"Zhibin",
""
]
] |
new_dataset
| 0.996679 |
2301.12231
|
Vukan Ninkovic
|
Vukan Ninkovic, Dejan Vukobratovic, Christian H\"ager, Henk Wymeersch,
Alexandre Graell i Amat
|
Rateless Autoencoder Codes: Trading off Decoding Delay and Reliability
|
6 pages, 7 figures, to appear at IEEE ICC 2023
| null | null | null |
cs.IT cs.LG eess.SP math.IT
|
http://creativecommons.org/licenses/by/4.0/
|
Most of today's communication systems are designed to target reliable message
recovery after receiving the entire encoded message (codeword). However, in
many practical scenarios, the transmission process may be interrupted before
receiving the complete codeword. This paper proposes a novel rateless
autoencoder (AE)-based code design suitable for decoding the transmitted
message before the noisy codeword is fully received. Using particular dropout
strategies applied during the training process, rateless AE codes allow to
trade off between decoding delay and reliability, providing a graceful
improvement of the latter with each additionally received codeword symbol. The
proposed rateless AEs significantly outperform the conventional AE designs for
scenarios where it is desirable to trade off reliability for lower decoding
delay.
|
[
{
"version": "v1",
"created": "Sat, 28 Jan 2023 15:47:14 GMT"
},
{
"version": "v2",
"created": "Tue, 31 Jan 2023 09:29:19 GMT"
}
] | 2023-02-01T00:00:00 |
[
[
"Ninkovic",
"Vukan",
""
],
[
"Vukobratovic",
"Dejan",
""
],
[
"Häger",
"Christian",
""
],
[
"Wymeersch",
"Henk",
""
],
[
"Amat",
"Alexandre Graell i",
""
]
] |
new_dataset
| 0.997459 |
2301.13244
|
Haonan Chang
|
Haonan Chang, Dhruv Metha Ramesh, Shijie Geng, Yuqiu Gan, Abdeslam
Boularias
|
Mono-STAR: Mono-camera Scene-level Tracking and Reconstruction
|
This paper has been accepted by ICRA2023
| null | null | null |
cs.RO cs.CV
|
http://creativecommons.org/licenses/by/4.0/
|
We present Mono-STAR, the first real-time 3D reconstruction system that
simultaneously supports semantic fusion, fast motion tracking, non-rigid object
deformation, and topological change under a unified framework. The proposed
system solves a new optimization problem incorporating optical-flow-based 2D
constraints to deal with fast motion and a novel semantic-aware deformation
graph (SAD-graph) for handling topology change. We test the proposed system
under various challenging scenes and demonstrate that it significantly
outperforms existing state-of-the-art methods.
|
[
{
"version": "v1",
"created": "Mon, 30 Jan 2023 19:17:03 GMT"
}
] | 2023-02-01T00:00:00 |
[
[
"Chang",
"Haonan",
""
],
[
"Ramesh",
"Dhruv Metha",
""
],
[
"Geng",
"Shijie",
""
],
[
"Gan",
"Yuqiu",
""
],
[
"Boularias",
"Abdeslam",
""
]
] |
new_dataset
| 0.997815 |
2301.13280
|
Jason Wu
|
Jason Wu and Siyan Wang and Siman Shen and Yi-Hao Peng and Jeffrey
Nichols and Jeffrey P. Bigham
|
WebUI: A Dataset for Enhancing Visual UI Understanding with Web
Semantics
|
Accepted to CHI 2023. Dataset, code, and models release coming soon
| null | null | null |
cs.HC
|
http://creativecommons.org/licenses/by/4.0/
|
Modeling user interfaces (UIs) from visual information allows systems to make
inferences about the functionality and semantics needed to support use cases in
accessibility, app automation, and testing. Current datasets for training
machine learning models are limited in size due to the costly and
time-consuming process of manually collecting and annotating UIs. We crawled
the web to construct WebUI, a large dataset of 400,000 rendered web pages
associated with automatically extracted metadata. We analyze the composition of
WebUI and show that while automatically extracted data is noisy, most examples
meet basic criteria for visual UI modeling. We applied several strategies for
incorporating semantics found in web pages to increase the performance of
visual UI understanding models in the mobile domain, where less labeled data is
available: (i) element detection, (ii) screen classification and (iii) screen
similarity.
|
[
{
"version": "v1",
"created": "Mon, 30 Jan 2023 20:47:12 GMT"
}
] | 2023-02-01T00:00:00 |
[
[
"Wu",
"Jason",
""
],
[
"Wang",
"Siyan",
""
],
[
"Shen",
"Siman",
""
],
[
"Peng",
"Yi-Hao",
""
],
[
"Nichols",
"Jeffrey",
""
],
[
"Bigham",
"Jeffrey P.",
""
]
] |
new_dataset
| 0.999852 |
2301.13308
|
Ram Vasudevan
|
Jonathan Michaux, Patrick Holmes, Bohao Zhang, Che Chen, Baiyue Wang,
Shrey Sahgal, Tiancheng Zhang, Sidhartha Dey, Shreyas Kousik, and Ram
Vasudevan
|
Can't Touch This: Real-Time, Safe Motion Planning and Control for
Manipulators Under Uncertainty
|
25 pages, 3 figures
| null | null | null |
cs.RO cs.SY eess.SY math.OC
|
http://creativecommons.org/licenses/by/4.0/
|
A key challenge to the widespread deployment of robotic manipulators is the
need to ensure safety in arbitrary environments while generating new motion
plans in real-time. In particular, one must ensure that a manipulator does not
collide with obstacles, collide with itself, or exceed its joint torque limits.
This challenge is compounded by the need to account for uncertainty in the mass
and inertia of manipulated objects, and potentially the robot itself. The
present work addresses this challenge by proposing Autonomous Robust
Manipulation via Optimization with Uncertainty-aware Reachability (ARMOUR), a
provably-safe, receding-horizon trajectory planner and tracking controller
framework for serial link manipulators. ARMOUR works by first constructing a
robust, passivity-based controller that is proven to enable a manipulator to
track desired trajectories with bounded error despite uncertain dynamics. Next,
ARMOUR uses a novel variation on the Recursive Newton-Euler Algorithm (RNEA) to
compute the set of all possible inputs required to track any trajectory within
a continuum of desired trajectories. Finally, the method computes an
over-approximation to the swept volume of the manipulator; this enables one to
formulate an optimization problem, which can be solved in real-time, to
synthesize provably-safe motion. The proposed method is compared to state of
the art methods and demonstrated on a variety of challenging manipulation
examples in simulation and on real hardware, such as maneuvering a dumbbell
with uncertain mass around obstacles.
|
[
{
"version": "v1",
"created": "Mon, 30 Jan 2023 22:02:40 GMT"
}
] | 2023-02-01T00:00:00 |
[
[
"Michaux",
"Jonathan",
""
],
[
"Holmes",
"Patrick",
""
],
[
"Zhang",
"Bohao",
""
],
[
"Chen",
"Che",
""
],
[
"Wang",
"Baiyue",
""
],
[
"Sahgal",
"Shrey",
""
],
[
"Zhang",
"Tiancheng",
""
],
[
"Dey",
"Sidhartha",
""
],
[
"Kousik",
"Shreyas",
""
],
[
"Vasudevan",
"Ram",
""
]
] |
new_dataset
| 0.99923 |
2301.13382
|
David Noever
|
David Noever, Forrest McKee
|
Numeracy from Literacy: Data Science as an Emergent Skill from Large
Language Models
| null | null | null | null |
cs.CL
|
http://creativecommons.org/licenses/by-sa/4.0/
|
Large language models (LLM) such as OpenAI's ChatGPT and GPT-3 offer unique
testbeds for exploring the translation challenges of turning literacy into
numeracy. Previous publicly-available transformer models from eighteen months
prior and 1000 times smaller failed to provide basic arithmetic. The
statistical analysis of four complex datasets described here combines
arithmetic manipulations that cannot be memorized or encoded by simple rules.
The work examines whether next-token prediction succeeds from sentence
completion into the realm of actual numerical understanding. For example, the
work highlights cases for descriptive statistics on in-memory datasets that the
LLM initially loads from memory or generates randomly using python libraries.
The resulting exploratory data analysis showcases the model's capabilities to
group by or pivot categorical sums, infer feature importance, derive
correlations, and predict unseen test cases using linear regression. To extend
the model's testable range, the research deletes and appends random rows such
that recall alone cannot explain emergent numeracy.
|
[
{
"version": "v1",
"created": "Tue, 31 Jan 2023 03:14:57 GMT"
}
] | 2023-02-01T00:00:00 |
[
[
"Noever",
"David",
""
],
[
"McKee",
"Forrest",
""
]
] |
new_dataset
| 0.984221 |
2301.13385
|
ChungI Huang
|
Chung-I Huang, Wei-Yu Chen, Wei Jan Ko, Jih-Sheng Chang, Chen-Kai Sun,
Hui Hung Yu, Fang-Pang Lin
|
Fisheye traffic data set of point center markers
|
https://youtu.be/sjUQ-Ayxxtk
| null | null | null |
cs.CV eess.IV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This study presents an open data-market platform and a dataset containing
160,000 markers and 18,000 images. We hope that this dataset will bring more
new data value and applications In this paper, we introduce the format and
usage of the dataset, and we show a demonstration of deep learning vehicle
detection trained by this dataset.
|
[
{
"version": "v1",
"created": "Tue, 31 Jan 2023 03:31:43 GMT"
}
] | 2023-02-01T00:00:00 |
[
[
"Huang",
"Chung-I",
""
],
[
"Chen",
"Wei-Yu",
""
],
[
"Ko",
"Wei Jan",
""
],
[
"Chang",
"Jih-Sheng",
""
],
[
"Sun",
"Chen-Kai",
""
],
[
"Yu",
"Hui Hung",
""
],
[
"Lin",
"Fang-Pang",
""
]
] |
new_dataset
| 0.982835 |
2301.13413
|
Shilin Shan
|
Shilin Shan, Quang-Cuong Pham
|
Fine Robotic Manipulation without Force/Torque Sensor
| null | null | null | null |
cs.RO cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Force Sensing and Force Control are essential to many industrial
applications. Typically, a 6-axis Force/Torque (F/T) sensor is mounted between
the robot's wrist and the end-effector in order to measure the forces and
torques exerted by the environment onto the robot (the external wrench).
Although a typical 6-axis F/T sensor can provide highly accurate measurements,
it is expensive and vulnerable to drift and external impacts. Existing methods
aiming at estimating the external wrench using only the robot's internal
signals are limited in scope: for example, wrench estimation accuracy was
mostly validated in free-space motions and simple contacts as opposed to tasks
like assembly that require high-precision force control. Here we present a
Neural Network based method and argue that by devoting particular attention to
the training data structure, it is possible to accurately estimate the external
wrench in a wide range of scenarios based solely on internal signals. As an
illustration, we demonstrate a pin insertion experiment with 100-micron
clearance and a hand-guiding experiment, both performed without external F/T
sensors or joint torque sensors. Our result opens the possibility of equipping
the existing 2.7 million industrial robots with Force Sensing and Force Control
capabilities without any additional hardware.
|
[
{
"version": "v1",
"created": "Tue, 31 Jan 2023 05:06:04 GMT"
}
] | 2023-02-01T00:00:00 |
[
[
"Shan",
"Shilin",
""
],
[
"Pham",
"Quang-Cuong",
""
]
] |
new_dataset
| 0.997704 |
2301.13455
|
Xuange Cui
|
Xuange Cui, Wei Xiong, Songlin Wang
|
ZhichunRoad at Amazon KDD Cup 2022: MultiTask Pre-Training for
E-Commerce Product Search
|
KDD Cup Workshop @ KDD 2022
| null | null | null |
cs.CL
|
http://creativecommons.org/licenses/by/4.0/
|
In this paper, we propose a robust multilingual model to improve the quality
of search results. Our model not only leverage the processed class-balanced
dataset, but also benefit from multitask pre-training that leads to more
general representations. In pre-training stage, we adopt mlm task,
classification task and contrastive learning task to achieve considerably
performance. In fine-tuning stage, we use confident learning, exponential
moving average method (EMA), adversarial training (FGM) and regularized dropout
strategy (R-Drop) to improve the model's generalization and robustness.
Moreover, we use a multi-granular semantic unit to discover the queries and
products textual metadata for enhancing the representation of the model. Our
approach obtained competitive results and ranked top-8 in three tasks. We
release the source code and pre-trained models associated with this work.
|
[
{
"version": "v1",
"created": "Tue, 31 Jan 2023 07:31:34 GMT"
}
] | 2023-02-01T00:00:00 |
[
[
"Cui",
"Xuange",
""
],
[
"Xiong",
"Wei",
""
],
[
"Wang",
"Songlin",
""
]
] |
new_dataset
| 0.952001 |
2301.13576
|
Pierre-Etienne Martin
|
Pierre-Etienne Martin (MPI-EVA), Jordan Calandre (MIA), Boris
Mansencal (LaBRI), Jenny Benois-Pineau (LaBRI), Renaud P\'eteri (MIA),
Laurent Mascarilla (MIA), Julien Morlier
|
Sport Task: Fine Grained Action Detection and Classification of Table
Tennis Strokes from Videos for MediaEval 2022
|
MediaEval 2022 Workshop, Jan 2023, Bergen, Norway. arXiv admin note:
substantial text overlap with arXiv:2112.11384
| null | null | null |
cs.AI cs.CV cs.HC cs.LG cs.MM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Sports video analysis is a widespread research topic. Its applications are
very diverse, like events detection during a match, video summary, or
fine-grained movement analysis of athletes. As part of the MediaEval 2022
benchmarking initiative, this task aims at detecting and classifying subtle
movements from sport videos. We focus on recordings of table tennis matches.
Conducted since 2019, this task provides a classification challenge from
untrimmed videos recorded under natural conditions with known temporal
boundaries for each stroke. Since 2021, the task also provides a stroke
detection challenge from unannotated, untrimmed videos. This year, the
training, validation, and test sets are enhanced to ensure that all strokes are
represented in each dataset. The dataset is now similar to the one used in [1,
2]. This research is intended to build tools for coaches and athletes who want
to further evaluate their sport performances.
|
[
{
"version": "v1",
"created": "Tue, 31 Jan 2023 12:03:59 GMT"
}
] | 2023-02-01T00:00:00 |
[
[
"Martin",
"Pierre-Etienne",
"",
"MPI-EVA"
],
[
"Calandre",
"Jordan",
"",
"MIA"
],
[
"Mansencal",
"Boris",
"",
"LaBRI"
],
[
"Benois-Pineau",
"Jenny",
"",
"LaBRI"
],
[
"Péteri",
"Renaud",
"",
"MIA"
],
[
"Mascarilla",
"Laurent",
"",
"MIA"
],
[
"Morlier",
"Julien",
""
]
] |
new_dataset
| 0.999634 |
2301.13626
|
Venkata Sai Praneeth Karempudi
|
Venkata Sai Praneeth Karempudi, Sairam Sri Vatsavai, Ishan Thakkar and
Jeffrey Todd Hastings
|
A Polymorphic Electro-Optic Logic Gate for High-Speed Reconfigurable
Computing Circuits
| null | null | null | null |
cs.ET physics.optics
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the wake of dwindling Moore's law, integrated electro-optic (E-O)
computing circuits have shown revolutionary potential to provide progressively
faster and more efficient hardware for computing. The E-O circuits for
computing from the literature can operate with minimal latency at high
bit-rates. However, they face shortcomings due to their operand handling
complexity, non-amortizable high area and static power overheads, and general
unsuitability for large-scale integration on reticle-limited chips. To
alleviate these shortcomings, in this paper, we present a microring resonator
(MRR) based polymorphic E-O logic gate (MRR-PEOLG) that can be dynamically
programmed to implement different logic functions at different times. Our
MRR-PEOLG can provide compactness and polymorphism to E-O circuits, to
consequently improve their operand handling and amortization of area and static
power overheads. We model our MRR-PEOLG using photonics foundry-validated tools
to perform frequency and time-domain analysis of its polymorphic logic
functions. Our evaluation shows that the use of our MRR-PEOLG in two E-O
circuits from prior works can reduce their area-energy-delay product by up to
82.6$\times$. A tutorial on the modeling and simulation of our MRR-PEOLG, along
with related codes and files, is available on
https://github.com/uky-UCAT/MRR-PEOLG.
|
[
{
"version": "v1",
"created": "Mon, 30 Jan 2023 05:11:17 GMT"
}
] | 2023-02-01T00:00:00 |
[
[
"Karempudi",
"Venkata Sai Praneeth",
""
],
[
"Vatsavai",
"Sairam Sri",
""
],
[
"Thakkar",
"Ishan",
""
],
[
"Hastings",
"Jeffrey Todd",
""
]
] |
new_dataset
| 0.993272 |
2301.13769
|
Clara Schneidewind
|
Sebastian Holler, Sebastian Biewer, Clara Schneidewind
|
HoRStify: Sound Security Analysis of Smart Contracts
|
Accepted for CSF 2023
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The cryptocurrency Ethereum is the most widely used execution platform for
smart contracts. Smart contracts are distributed applications, which govern
financial assets and, hence, can implement advanced financial instruments, such
as decentralized exchanges or autonomous organizations (DAOs). Their financial
nature makes smart contracts an attractive attack target, as demonstrated by
numerous exploits on popular contracts resulting in financial damage of
millions of dollars. This omnipresent attack hazard motivates the need for
sound static analysis tools, which assist smart contract developers in
eliminating contract vulnerabilities a priori to deployment. Vulnerability
assessment that is sound and insightful for EVM contracts is a formidable
challenge because contracts execute low-level bytecode in a largely unknown and
potentially hostile execution environment. So far, there exists no provably
sound automated analyzer that allows for the verification of security
properties based on program dependencies, even though prevalent attack classes
fall into this category. In this work, we present HoRStify, the first automated
analyzer for dependency properties of Ethereum smart contracts based on sound
static analysis. HoRStify grounds its soundness proof on a formal proof
framework for static program slicing that we instantiate to the semantics of
EVM bytecode. We demonstrate that HoRStify is flexible enough to soundly verify
the absence of famous attack classes such as timestamp dependency and, at the
same time, performant enough to analyze real-world smart contracts.
|
[
{
"version": "v1",
"created": "Tue, 31 Jan 2023 17:08:12 GMT"
}
] | 2023-02-01T00:00:00 |
[
[
"Holler",
"Sebastian",
""
],
[
"Biewer",
"Sebastian",
""
],
[
"Schneidewind",
"Clara",
""
]
] |
new_dataset
| 0.997317 |
2301.13771
|
Nailia Mirzakhmedova
|
Nailia Mirzakhmedova, Johannes Kiesel, Milad Alshomary, Maximilian
Heinrich, Nicolas Handke, Xiaoni Cai, Barriere Valentin, Doratossadat
Dastgheib, Omid Ghahroodi, Mohammad Ali Sadraei, Ehsaneddin Asgari, Lea
Kawaletz, Henning Wachsmuth, Benno Stein
|
The Touch\'e23-ValueEval Dataset for Identifying Human Values behind
Arguments
| null | null | null | null |
cs.CL
|
http://creativecommons.org/licenses/by/4.0/
|
We present the Touch\'e23-ValueEval Dataset for Identifying Human Values
behind Arguments. To investigate approaches for the automated detection of
human values behind arguments, we collected 9324 arguments from 6 diverse
sources, covering religious texts, political discussions, free-text arguments,
newspaper editorials, and online democracy platforms. Each argument was
annotated by 3 crowdworkers for 54 values. The Touch\'e23-ValueEval dataset
extends the Webis-ArgValues-22. In comparison to the previous dataset, the
effectiveness of a 1-Baseline decreases, but that of an out-of-the-box BERT
model increases. Therefore, though the classification difficulty increased as
per the label distribution, the larger dataset allows for training better
models.
|
[
{
"version": "v1",
"created": "Tue, 31 Jan 2023 17:15:33 GMT"
}
] | 2023-02-01T00:00:00 |
[
[
"Mirzakhmedova",
"Nailia",
""
],
[
"Kiesel",
"Johannes",
""
],
[
"Alshomary",
"Milad",
""
],
[
"Heinrich",
"Maximilian",
""
],
[
"Handke",
"Nicolas",
""
],
[
"Cai",
"Xiaoni",
""
],
[
"Valentin",
"Barriere",
""
],
[
"Dastgheib",
"Doratossadat",
""
],
[
"Ghahroodi",
"Omid",
""
],
[
"Sadraei",
"Mohammad Ali",
""
],
[
"Asgari",
"Ehsaneddin",
""
],
[
"Kawaletz",
"Lea",
""
],
[
"Wachsmuth",
"Henning",
""
],
[
"Stein",
"Benno",
""
]
] |
new_dataset
| 0.999526 |
2301.13779
|
Harshit Joshi
|
Harshit Joshi, Abishai Ebenezer, Jos\'e Cambronero, Sumit Gulwani,
Aditya Kanade, Vu Le, Ivan Radi\v{c}ek, Gust Verbruggen
|
FLAME: A small language model for spreadsheet formulas
| null | null | null | null |
cs.PL cs.AI cs.SE
|
http://creativecommons.org/licenses/by/4.0/
|
The widespread use of spreadsheet environments by billions of users presents
a unique opportunity for formula-authoring assistance. Although large language
models, such as Codex, can assist in general-purpose languages, they are
expensive to train and challenging to deploy due to their large model sizes (up
to billions of parameters). Moreover, they require hundreds of gigabytes of
training data. We present FLAME, a T5-based model trained on Excel formulas
that leverages domain insights to achieve competitive performance with a
substantially smaller model (60M parameters) and two orders of magnitude less
training data. We curate a training dataset using sketch deduplication,
introduce an Excel-specific formula tokenizer for our model, and use
domain-specific versions of masked span prediction and noisy auto-encoding as
pretraining objectives. We evaluate FLAME on formula repair, formula
auto-completion, and a novel task called syntax reconstruction. FLAME (60M) can
outperform much larger models, such as Codex-Davinci (175B), Codex-Cushman
(12B), and CodeT5 (220M), in 6 out of 10 settings.
|
[
{
"version": "v1",
"created": "Tue, 31 Jan 2023 17:29:43 GMT"
}
] | 2023-02-01T00:00:00 |
[
[
"Joshi",
"Harshit",
""
],
[
"Ebenezer",
"Abishai",
""
],
[
"Cambronero",
"José",
""
],
[
"Gulwani",
"Sumit",
""
],
[
"Kanade",
"Aditya",
""
],
[
"Le",
"Vu",
""
],
[
"Radiček",
"Ivan",
""
],
[
"Verbruggen",
"Gust",
""
]
] |
new_dataset
| 0.981412 |
2301.13868
|
Jordan Juravsky
|
Jordan Juravsky, Yunrong Guo, Sanja Fidler, Xue Bin Peng
|
PADL: Language-Directed Physics-Based Character Control
| null | null |
10.1145/3550469.3555391
| null |
cs.LG cs.AI cs.CL cs.GR
|
http://creativecommons.org/licenses/by/4.0/
|
Developing systems that can synthesize natural and life-like motions for
simulated characters has long been a focus for computer animation. But in order
for these systems to be useful for downstream applications, they need not only
produce high-quality motions, but must also provide an accessible and versatile
interface through which users can direct a character's behaviors. Natural
language provides a simple-to-use and expressive medium for specifying a user's
intent. Recent breakthroughs in natural language processing (NLP) have
demonstrated effective use of language-based interfaces for applications such
as image generation and program synthesis. In this work, we present PADL, which
leverages recent innovations in NLP in order to take steps towards developing
language-directed controllers for physics-based character animation. PADL
allows users to issue natural language commands for specifying both high-level
tasks and low-level skills that a character should perform. We present an
adversarial imitation learning approach for training policies to map high-level
language commands to low-level controls that enable a character to perform the
desired task and skill specified by a user's commands. Furthermore, we propose
a multi-task aggregation method that leverages a language-based multiple-choice
question-answering approach to determine high-level task objectives from
language commands. We show that our framework can be applied to effectively
direct a simulated humanoid character to perform a diverse array of complex
motor skills.
|
[
{
"version": "v1",
"created": "Tue, 31 Jan 2023 18:59:22 GMT"
}
] | 2023-02-01T00:00:00 |
[
[
"Juravsky",
"Jordan",
""
],
[
"Guo",
"Yunrong",
""
],
[
"Fidler",
"Sanja",
""
],
[
"Peng",
"Xue Bin",
""
]
] |
new_dataset
| 0.999747 |
1904.01509
|
Jian Xue
|
Yanfu Yan, Ke Lu, Jian Xue, Pengcheng Gao, Jiayi Lyu
|
FEAFA: A Well-Annotated Dataset for Facial Expression Analysis and 3D
Facial Animation
|
9 pages, 7 figures
|
2019 IEEE International Conference on Multimedia & Expo Workshops
(ICMEW)
|
10.1109/ICMEW.2019.0-104
| null |
cs.LG cs.CV cs.GR eess.IV stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Facial expression analysis based on machine learning requires large number of
well-annotated data to reflect different changes in facial motion. Publicly
available datasets truly help to accelerate research in this area by providing
a benchmark resource, but all of these datasets, to the best of our knowledge,
are limited to rough annotations for action units, including only their
absence, presence, or a five-level intensity according to the Facial Action
Coding System. To meet the need for videos labeled in great detail, we present
a well-annotated dataset named FEAFA for Facial Expression Analysis and 3D
Facial Animation. One hundred and twenty-two participants, including children,
young adults and elderly people, were recorded in real-world conditions. In
addition, 99,356 frames were manually labeled using Expression Quantitative
Tool developed by us to quantify 9 symmetrical FACS action units, 10
asymmetrical (unilateral) FACS action units, 2 symmetrical FACS action
descriptors and 2 asymmetrical FACS action descriptors, and each action unit or
action descriptor is well-annotated with a floating point number between 0 and
1. To provide a baseline for use in future research, a benchmark for the
regression of action unit values based on Convolutional Neural Networks are
presented. We also demonstrate the potential of our FEAFA dataset for 3D facial
animation. Almost all state-of-the-art algorithms for facial animation are
achieved based on 3D face reconstruction. We hence propose a novel method that
drives virtual characters only based on action unit value regression of the 2D
video frames of source actors.
|
[
{
"version": "v1",
"created": "Tue, 2 Apr 2019 15:50:11 GMT"
}
] | 2023-01-31T00:00:00 |
[
[
"Yan",
"Yanfu",
""
],
[
"Lu",
"Ke",
""
],
[
"Xue",
"Jian",
""
],
[
"Gao",
"Pengcheng",
""
],
[
"Lyu",
"Jiayi",
""
]
] |
new_dataset
| 0.999772 |
2003.12359
|
Yuan Zhou
|
Kun Cheng, Yuan Zhou, Bihuan Chen, Rui Wang, Yuebin Bai and Yang Liu
|
Guardauto: A Decentralized Runtime Protection System for Autonomous
Driving
| null |
IEEE Transactions on Computers, Volume: 70, Issue: 10, 01 October
2021
|
10.1109/TC.2020.3018329
| null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Due to the broad attack surface and the lack of runtime protection, potential
safety and security threats hinder the real-life adoption of autonomous
vehicles. Although efforts have been made to mitigate some specific attacks,
there are few works on the protection of the self-driving system. This paper
presents a decentralized self-protection framework called Guardauto to protect
the self-driving system against runtime threats. First, Guardauto proposes an
isolation model to decouple the self-driving system and isolate its components
with a set of partitions. Second, Guardauto provides self-protection mechanisms
for each target component, which combines different methods to monitor the
target execution and plan adaption actions accordingly. Third, Guardauto
provides cooperation among local self-protection mechanisms to identify the
root-cause component in the case of cascading failures affecting multiple
components. A prototype has been implemented and evaluated on the open-source
autonomous driving system Autoware. Results show that Guardauto could
effectively mitigate runtime failures and attacks, and protect the control
system with acceptable performance overhead.
|
[
{
"version": "v1",
"created": "Sun, 22 Mar 2020 09:28:23 GMT"
}
] | 2023-01-31T00:00:00 |
[
[
"Cheng",
"Kun",
""
],
[
"Zhou",
"Yuan",
""
],
[
"Chen",
"Bihuan",
""
],
[
"Wang",
"Rui",
""
],
[
"Bai",
"Yuebin",
""
],
[
"Liu",
"Yang",
""
]
] |
new_dataset
| 0.999717 |
2104.02598
|
Dima Kagan
|
Dima Kagan, Galit Fuhrmann Alpert, Michael Fire
|
Automatic Large Scale Detection of Red Palm Weevil Infestation using
Aerial and Street View Images
| null | null |
10.1016/j.isprsjprs.2021.10.004
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The spread of the Red Palm Weevil has dramatically affected date growers,
homeowners and governments, forcing them to deal with a constant threat to
their palm trees. Early detection of palm tree infestation has been proven to
be critical in order to allow treatment that may save trees from irreversible
damage, and is most commonly performed by local physical access for individual
tree monitoring. Here, we present a novel method for surveillance of Red Palm
Weevil infested palm trees utilizing state-of-the-art deep learning algorithms,
with aerial and street-level imagery data. To detect infested palm trees we
analyzed over 100,000 aerial and street-images, mapping the location of palm
trees in urban areas. Using this procedure, we discovered and verified infested
palm trees at various locations.
|
[
{
"version": "v1",
"created": "Tue, 6 Apr 2021 15:35:26 GMT"
},
{
"version": "v2",
"created": "Fri, 9 Apr 2021 05:35:50 GMT"
}
] | 2023-01-31T00:00:00 |
[
[
"Kagan",
"Dima",
""
],
[
"Alpert",
"Galit Fuhrmann",
""
],
[
"Fire",
"Michael",
""
]
] |
new_dataset
| 0.990037 |
2105.11992
|
Danish Kashaev
|
Danish Kashaev, Richard Santiago
|
A Simple Optimal Contention Resolution Scheme for Uniform Matroids
| null |
Theoretical Computer Science 940 (2023), 81-96
|
10.1016/j.tcs.2022.10.042
| null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Contention resolution schemes (or CR schemes), introduced by Chekuri, Vondrak
and Zenklusen, are a class of randomized rounding algorithms for converting a
fractional solution to a relaxation for a down-closed constraint family into an
integer solution. A CR scheme takes a fractional point $x$ in a relaxation
polytope, rounds each coordinate $x_i$ independently to get a possibly
non-feasible set, and then drops some elements in order to satisfy the
constraints. Intuitively, a contention resolution scheme is $c$-balanced if
every element $i$ is selected with probability at least $c \cdot x_i$.
It is known that general matroids admit a $(1-1/e)$-balanced CR scheme, and
that this is (asymptotically) optimal. This is in particular true for the
special case of uniform matroids of rank one. In this work, we provide a simple
and explicit monotone CR scheme for uniform matroids of rank $k$ on $n$
elements with a balancedness of $1 -
\binom{n}{k}\:\left(1-\frac{k}{n}\right)^{n+1-k}\:\left(\frac{k}{n}\right)^k$,
and show that this is optimal. As $n$ grows, this expression converges from
above to $1 - e^{-k}k^k/k!$. While this asymptotic bound can be obtained by
combining previously known results, these require defining an exponential-sized
linear program, as well as using random sampling and the ellipsoid algorithm.
Our procedure, on the other hand, has the advantage of being simple and
explicit. This scheme extends naturally into an optimal CR scheme for partition
matroids.
|
[
{
"version": "v1",
"created": "Tue, 25 May 2021 14:55:37 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Jun 2021 15:29:22 GMT"
},
{
"version": "v3",
"created": "Tue, 27 Jul 2021 13:33:32 GMT"
},
{
"version": "v4",
"created": "Thu, 25 Nov 2021 11:53:07 GMT"
},
{
"version": "v5",
"created": "Mon, 30 Jan 2023 12:56:40 GMT"
}
] | 2023-01-31T00:00:00 |
[
[
"Kashaev",
"Danish",
""
],
[
"Santiago",
"Richard",
""
]
] |
new_dataset
| 0.994099 |
2105.12882
|
Yu-Shun Hsiao
|
Yu-Shun Hsiao, Zishen Wan, Tianyu Jia, Radhika Ghosal, Abdulrahman
Mahmoud, Arijit Raychowdhury, David Brooks, Gu-Yeon Wei, Vijay Janapa Reddi
|
MAVFI: An End-to-End Fault Analysis Framework with Anomaly Detection and
Recovery for Micro Aerial Vehicles
|
6 pages, 9 figures; The first two authors have equal contributions;
Accepted as a conference paper in DATE 2023
| null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Safety and resilience are critical for autonomous unmanned aerial vehicles
(UAVs). We introduce MAVFI, the micro aerial vehicles (MAVs) resilience
analysis methodology to assess the effect of silent data corruption (SDC) on
UAVs' mission metrics, such as flight time and success rate, for accurately
measuring system resilience. To enhance the safety and resilience of robot
systems bound by size, weight, and power (SWaP), we offer two low-overhead
anomaly-based SDC detection and recovery algorithms based on Gaussian
statistical models and autoencoder neural networks. Our anomaly error
protection techniques are validated in numerous simulated environments. We
demonstrate that the autoencoder-based technique can recover up to all failure
cases in our studied scenarios with a computational overhead of no more than
0.0062%. Our application-aware resilience analysis framework, MAVFI, can be
utilized to comprehensively test the resilience of other Robot Operating System
(ROS)-based applications and is publicly available at
https://github.com/harvard-edge/MAVBench/tree/mavfi.
|
[
{
"version": "v1",
"created": "Thu, 27 May 2021 00:03:27 GMT"
},
{
"version": "v2",
"created": "Tue, 17 Jan 2023 00:14:31 GMT"
},
{
"version": "v3",
"created": "Mon, 30 Jan 2023 18:04:00 GMT"
}
] | 2023-01-31T00:00:00 |
[
[
"Hsiao",
"Yu-Shun",
""
],
[
"Wan",
"Zishen",
""
],
[
"Jia",
"Tianyu",
""
],
[
"Ghosal",
"Radhika",
""
],
[
"Mahmoud",
"Abdulrahman",
""
],
[
"Raychowdhury",
"Arijit",
""
],
[
"Brooks",
"David",
""
],
[
"Wei",
"Gu-Yeon",
""
],
[
"Reddi",
"Vijay Janapa",
""
]
] |
new_dataset
| 0.997222 |
2110.05266
|
William Gilpin
|
William Gilpin
|
Chaos as an interpretable benchmark for forecasting and data-driven
modelling
|
10 pages, 4 figures, plus appendices
|
NeurIPS (Neural Information Processing Systems) 2021
| null | null |
cs.LG eess.SP nlin.CD
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The striking fractal geometry of strange attractors underscores the
generative nature of chaos: like probability distributions, chaotic systems can
be repeatedly measured to produce arbitrarily-detailed information about the
underlying attractor. Chaotic systems thus pose a unique challenge to modern
statistical learning techniques, while retaining quantifiable mathematical
properties that make them controllable and interpretable as benchmarks. Here,
we present a growing database currently comprising 131 known chaotic dynamical
systems spanning fields such as astrophysics, climatology, and biochemistry.
Each system is paired with precomputed multivariate and univariate time series.
Our dataset has comparable scale to existing static time series databases;
however, our systems can be re-integrated to produce additional datasets of
arbitrary length and granularity. Our dataset is annotated with known
mathematical properties of each system, and we perform feature analysis to
broadly categorize the diverse dynamics present across the collection. Chaotic
systems inherently challenge forecasting models, and across extensive
benchmarks we correlate forecasting performance with the degree of chaos
present. We also exploit the unique generative properties of our dataset in
several proof-of-concept experiments: surrogate transfer learning to improve
time series classification, importance sampling to accelerate model training,
and benchmarking symbolic regression algorithms.
|
[
{
"version": "v1",
"created": "Mon, 11 Oct 2021 13:39:41 GMT"
},
{
"version": "v2",
"created": "Sun, 29 Jan 2023 08:19:43 GMT"
}
] | 2023-01-31T00:00:00 |
[
[
"Gilpin",
"William",
""
]
] |
new_dataset
| 0.999233 |
2111.02751
|
Jian Xue
|
Wei Gan, Jian Xue, Ke Lu, Yanfu Yan, Pengcheng Gao, Jiayi Lyu
|
FEAFA+: An Extended Well-Annotated Dataset for Facial Expression
Analysis and 3D Facial Animation
| null |
Proc. SPIE 12342, Fourteenth International Conference on Digital
Image Processing (ICDIP 2022), 1234211 (12 October 2022)
|
10.1117/12.2643588
| null |
cs.CV cs.GR cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Nearly all existing Facial Action Coding System-based datasets that include
facial action unit (AU) intensity information annotate the intensity values
hierarchically using A--E levels. However, facial expressions change
continuously and shift smoothly from one state to another. Therefore, it is
more effective to regress the intensity value of local facial AUs to represent
whole facial expression changes, particularly in the fields of expression
transfer and facial animation. We introduce an extension of FEAFA in
combination with the relabeled DISFA database, which is available at
https://www.iiplab.net/feafa+/ now. Extended FEAFA (FEAFA+) includes 150 video
sequences from FEAFA and DISFA, with a total of 230,184 frames being manually
annotated on floating-point intensity value of 24 redefined AUs using the
Expression Quantitative Tool. We also list crude numerical results for posed
and spontaneous subsets and provide a baseline comparison for the AU intensity
regression task.
|
[
{
"version": "v1",
"created": "Thu, 4 Nov 2021 11:03:19 GMT"
}
] | 2023-01-31T00:00:00 |
[
[
"Gan",
"Wei",
""
],
[
"Xue",
"Jian",
""
],
[
"Lu",
"Ke",
""
],
[
"Yan",
"Yanfu",
""
],
[
"Gao",
"Pengcheng",
""
],
[
"Lyu",
"Jiayi",
""
]
] |
new_dataset
| 0.999577 |
2203.10583
|
Abdullah Ozbay
|
Abdullah Ozbay, Kemal Bicakci
|
Should Users Trust Their Android Devices? A Scoring System for Assessing
Security and Privacy Risks of Pre-Installed Applications
|
16 pages, 9 figures
| null | null | null |
cs.CR
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
Android devices are equipped with many pre-installed applications which have
the capability of tracking and monitoring users. Although applications coming
pre-installed pose a great danger to user security and privacy, they have
received little attention so far among researchers in the field. In this study,
we collect a dataset comprising such applications and make it publicly
available. Using this dataset, we analyze tracker SDKs, manifest files and the
use of cloud services and report our results. We also conduct a user survey to
understand concerns and perceptions of users. Last but not least, we present a
risk scoring system which assigns scores for smart phones consolidating our
findings based on carefully weighted criteria. With this scoring system, users
could give their own trust decisions based on the available concise information
about the security and privacy impacts of applications pre-installed on their
Android devices.
|
[
{
"version": "v1",
"created": "Sun, 20 Mar 2022 15:38:52 GMT"
},
{
"version": "v2",
"created": "Sat, 28 Jan 2023 16:15:24 GMT"
}
] | 2023-01-31T00:00:00 |
[
[
"Ozbay",
"Abdullah",
""
],
[
"Bicakci",
"Kemal",
""
]
] |
new_dataset
| 0.999079 |
2205.04382
|
Harry Zhang Mr.
|
Ben Eisner, Harry Zhang, David Held
|
FlowBot3D: Learning 3D Articulation Flow to Manipulate Articulated
Objects
|
Accepted to Robotics Science and Systems (RSS) 2022, Best Paper
Finalist
| null | null | null |
cs.RO cs.AI cs.CV
|
http://creativecommons.org/licenses/by/4.0/
|
We explore a novel method to perceive and manipulate 3D articulated objects
that generalizes to enable a robot to articulate unseen classes of objects. We
propose a vision-based system that learns to predict the potential motions of
the parts of a variety of articulated objects to guide downstream motion
planning of the system to articulate the objects. To predict the object
motions, we train a neural network to output a dense vector field representing
the point-wise motion direction of the points in the point cloud under
articulation. We then deploy an analytical motion planner based on this vector
field to achieve a policy that yields maximum articulation. We train the vision
system entirely in simulation, and we demonstrate the capability of our system
to generalize to unseen object instances and novel categories in both
simulation and the real world, deploying our policy on a Sawyer robot with no
finetuning. Results show that our system achieves state-of-the-art performance
in both simulated and real-world experiments.
|
[
{
"version": "v1",
"created": "Mon, 9 May 2022 15:35:33 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Jul 2022 11:38:59 GMT"
},
{
"version": "v3",
"created": "Tue, 20 Sep 2022 21:55:06 GMT"
},
{
"version": "v4",
"created": "Wed, 26 Oct 2022 16:52:04 GMT"
},
{
"version": "v5",
"created": "Sun, 29 Jan 2023 21:02:02 GMT"
}
] | 2023-01-31T00:00:00 |
[
[
"Eisner",
"Ben",
""
],
[
"Zhang",
"Harry",
""
],
[
"Held",
"David",
""
]
] |
new_dataset
| 0.988152 |
2206.00447
|
Mai Su
|
Rongfei Zeng, Mai Su, Ruiyun Yu, Xingwei Wang
|
CD$^2$: Fine-grained 3D Mesh Reconstruction With Twice Chamfer Distance
|
Just accepted by TOMM
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Monocular 3D reconstruction is to reconstruct the shape of object and its
other information from a single RGB image. In 3D reconstruction, polygon mesh,
with detailed surface information and low computational cost, is the most
prevalent expression form obtained from deep learning models. However, the
state-of-the-art schemes fail to directly generate well-structured meshes, and
we identify that most meshes have severe Vertices Clustering (VC) and Illegal
Twist (IT) problems. By analyzing the mesh deformation process, we pinpoint
that the inappropriate usage of Chamfer Distance (CD) loss is a root cause of
VC and IT problems in deep learning model. In this paper, we initially
demonstrate these two problems induced by CD loss with visual examples and
quantitative analyses. Then, we propose a fine-grained reconstruction method
CD$^2$ by employing Chamfer distance twice to perform a plausible and adaptive
deformation. Extensive experiments on two 3D datasets and comparisons with five
latest schemes demonstrate that our CD$^2$ directly generates a well-structured
mesh and outperforms others in terms of several quantitative metrics.
|
[
{
"version": "v1",
"created": "Wed, 1 Jun 2022 12:29:25 GMT"
},
{
"version": "v2",
"created": "Thu, 3 Nov 2022 15:28:03 GMT"
},
{
"version": "v3",
"created": "Sun, 29 Jan 2023 16:02:20 GMT"
}
] | 2023-01-31T00:00:00 |
[
[
"Zeng",
"Rongfei",
""
],
[
"Su",
"Mai",
""
],
[
"Yu",
"Ruiyun",
""
],
[
"Wang",
"Xingwei",
""
]
] |
new_dataset
| 0.98153 |
2206.06669
|
Sam Maesschalck
|
Sam Maesschalck, Alexander Staves, Richard Derbyshire, Benjamin Green,
David Hutchison
|
Walking Under the Ladder Logic: PLC-VBS, a PLC Control Logic
Vulnerability Discovery Tool
| null | null | null | null |
cs.CR
|
http://creativecommons.org/licenses/by/4.0/
|
Cyber security risk assessments provide a pivotal starting point towards the
understanding of existing risk exposure, through which suitable mitigation
strategies can be formed. Where risk is viewed as a product of threat,
vulnerability, and impact, understanding each element is of equal importance.
This can be a challenge in Industrial Control System (ICS) environments, where
adopted technologies are typically not only bespoke, but interact directly with
the physical world. To date, existing vulnerability identification has focused
on traditional vulnerability categories. While this provides risk assessors
with a baseline understanding, and the ability to hypothesize on potential
resulting impacts, it is high level, operating at a level of abstraction that
would be viewed as incomplete within a traditional information system context.
The work presented in this paper takes the understanding of ICS device
vulnerabilities one step further. It offers a tool, PLC-VBS, that helps
identify Programmable Logic Controller (PLC) vulnerabilities, specifically
within logic used to monitor, control, and automate operational processes.
PLC-VBS gives risk assessors a more coherent picture about the potential impact
should the identified vulnerabilities be exploited; this applies specifically
to operational process elements.
|
[
{
"version": "v1",
"created": "Tue, 14 Jun 2022 07:57:28 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Aug 2022 22:38:25 GMT"
},
{
"version": "v3",
"created": "Mon, 30 Jan 2023 09:43:13 GMT"
}
] | 2023-01-31T00:00:00 |
[
[
"Maesschalck",
"Sam",
""
],
[
"Staves",
"Alexander",
""
],
[
"Derbyshire",
"Richard",
""
],
[
"Green",
"Benjamin",
""
],
[
"Hutchison",
"David",
""
]
] |
new_dataset
| 0.991484 |
2206.11519
|
Luciano Freitas
|
Luciano Freitas, Andrei Tonkikh, Adda-Akram Bendoukha, Sara
Tucci-Piergiovanni, Renaud Sirdey, Oana Stan, Petr Kuznetsov
|
Homomorphic Sortition -- Secret Leader Election for PoS Blockchains
| null | null | null | null |
cs.CR cs.DC
|
http://creativecommons.org/licenses/by/4.0/
|
In a single secret leader election protocol (SSLE), one of the system
participants is chosen and, unless it decides to reveal itself, no other
participant can identify it. SSLE has a great potential in protecting
blockchain consensus protocols against denial of service (DoS) attacks.
However, all existing solutions either make strong synchrony assumptions or
have expiring registration, meaning that they require elected processes to
re-register themselves before they can be re-elected again. This, in turn,
prohibits the use of these SSLE protocols to elect leaders in
partially-synchronous consensus protocols as there may be long periods of
network instability when no new blocks are decided and, thus, no new
registrations (or re-registrations) are possible. In this paper, we propose
Homomorphic Sortition -- the first asynchronous SSLE protocol with non-expiring
registration, making it the first solution compatible with
partially-synchronous leader-based consensus protocols.
Homomorphic Sortition relies on Threshold Fully Homomorphic Encryption
(ThFHE) and is tailored to proof-of-stake (PoS) blockchains, with several
important optimizations with respect to prior proposals. In particular, unlike
most existing SSLE protocols, it works with arbitrary stake distributions and
does not require a user with multiple coins to be registered multiple times.
Our protocol is highly parallelizable and can be run completely off-chain after
setup.
Some blockchains require a sequence of rounds to have non-repeating leaders.
We define a generalization of SSLE, called Secret Leader Permutation (SLP) in
which the application can choose how many non-repeating leaders should be
output in a sequence of rounds and we show how Homomorphic Sortition also
solves this problem.
|
[
{
"version": "v1",
"created": "Thu, 23 Jun 2022 08:04:44 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Jan 2023 08:51:27 GMT"
}
] | 2023-01-31T00:00:00 |
[
[
"Freitas",
"Luciano",
""
],
[
"Tonkikh",
"Andrei",
""
],
[
"Bendoukha",
"Adda-Akram",
""
],
[
"Tucci-Piergiovanni",
"Sara",
""
],
[
"Sirdey",
"Renaud",
""
],
[
"Stan",
"Oana",
""
],
[
"Kuznetsov",
"Petr",
""
]
] |
new_dataset
| 0.971079 |
2207.07774
|
Lucas Aimaretto
|
Lucas Aimaretto (1), Diego Dujovne (2) ((1) Facultad de Ciencias
Exactas, F\'isicas y Naturales, Universidad Nacional de C\'ordoba, (2)
Escuela de Inform\'atica y Telecomunicaciones, Universidad Diego Portales)
|
BDPC: Controlling Application Delay in 6TiSCH networks for the
Industrial Internet of Things
|
This work has been submitted to Elsevier for possible publication.
Copyright may be transferred without notice, after which this version may no
longer be accessible
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
One of the essential requirements of wireless industrial Internet of Things
(IoT) systems is to have an extremely high packet delivery rate, generally over
99.9% and comply wih realtime deadline constraints. In industrial IoT networks,
packets arriving after the deadline become part of packet loss and lose meaning
when they arrive late. However, currently available industial IoT proposals aim
to minimize End-to-End delay without taking into account simultaneous realtime
and reliability constraints. In this paper, we propose a new mechanism, called
BDPC (Bounded Delay Packet Control) to tackle this challenge. BDPC combines the
knowledge of a node's traffic delay to the destination (root) with the time
budget of a data packet traversing the industrial IoT network, to allocate
network resources to comply the system maximum delay requirements using an
adaptive and distributed algorithm. Unlike the general aim to minimze
end-to-end delay, we propose that data packets must arrive before the deadline,
but not faster. Our results show, for example, that by using BDPC, the number
of packets arriving before the deadline can be improved more than 2.6 times
compared to the case when using the default Minimal Scheduling Function from
the standard. As a further advantage, BDPC involves minor modifications to the
6TiSCH protocol stack, which makes it compatible with current implementations.
|
[
{
"version": "v1",
"created": "Fri, 15 Jul 2022 22:44:16 GMT"
},
{
"version": "v2",
"created": "Wed, 31 Aug 2022 12:39:35 GMT"
},
{
"version": "v3",
"created": "Sun, 29 Jan 2023 01:37:39 GMT"
}
] | 2023-01-31T00:00:00 |
[
[
"Aimaretto",
"Lucas",
""
],
[
"Dujovne",
"Diego",
""
]
] |
new_dataset
| 0.998903 |
2208.01508
|
Meiziniu Li
|
Meiziniu Li, Jialun Cao, Yongqiang Tian, Tsz On Li, Ming Wen,
Shing-Chi Cheung
|
COMET: Coverage-guided Model Generation For Deep Learning Library
Testing
|
34 pages, 12 figures
| null | null | null |
cs.SE cs.AI
|
http://creativecommons.org/licenses/by/4.0/
|
Recent deep learning (DL) applications are mostly built on top of DL
libraries. The quality assurance of these libraries is critical to the
dependable deployment of DL applications. Techniques have been proposed to
generate various DL models and apply them to test these libraries. However,
their test effectiveness is constrained by the diversity of layer API calls in
their generated DL models. Our study reveals that these techniques can cover at
most 34.1% layer inputs, 25.9% layer parameter values, and 15.6% layer
sequences. As a result, we find that many bugs arising from specific layer API
calls (i.e., specific layer inputs, parameter values, or layer sequences) can
be missed by existing techniques. Because of this limitation, we propose COMET
to effectively generate DL models with diverse layer API calls for DL library
testing. COMET: (1) designs a set of mutation operators and a coverage-based
search algorithm to diversify layer inputs, layer parameter values, and layer
sequences in DL models. (2) proposes a model synthesis method to boost the test
efficiency without compromising the layer API call diversity. Our evaluation
result shows that COMET outperforms baselines by covering twice as many layer
inputs (69.7% vs. 34.1%), layer parameter values (50.2% vs. 25.9%), and layer
sequences (39.0% vs. 15.6%) as those by the state-of-the-art. Moreover, COMET
covers 3.4% more library branches than those by existing techniques. Finally,
COMET detects 32 new bugs in the latest version of eight popular DL libraries,
including TensorFlow and MXNet, with 21 of them confirmed by DL library
developers and 7 of those confirmed bugs have been fixed by developers.
|
[
{
"version": "v1",
"created": "Tue, 2 Aug 2022 14:53:02 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Jan 2023 12:01:23 GMT"
}
] | 2023-01-31T00:00:00 |
[
[
"Li",
"Meiziniu",
""
],
[
"Cao",
"Jialun",
""
],
[
"Tian",
"Yongqiang",
""
],
[
"Li",
"Tsz On",
""
],
[
"Wen",
"Ming",
""
],
[
"Cheung",
"Shing-Chi",
""
]
] |
new_dataset
| 0.95863 |
2208.05697
|
Ang Lv
|
Ang Lv, Xu Tan, Tao Qin, Tie-Yan Liu, Rui Yan
|
Re-creation of Creations: A New Paradigm for Lyric-to-Melody Generation
| null | null | null | null |
cs.SD cs.AI cs.MM eess.AS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Lyric-to-melody generation is an important task in songwriting, and is also
quite challenging due to its unique characteristics: the generated melodies
should not only follow good musical patterns, but also align with features in
lyrics such as rhythms and structures. These characteristics cannot be well
handled by neural generation models that learn lyric-to-melody mapping in an
end-to-end way, due to several issues: (1) lack of aligned lyric-melody
training data to sufficiently learn lyric-melody feature alignment; (2) lack of
controllability in generation to better and explicitly align the lyric-melody
features. In this paper, we propose Re-creation of Creations (ROC), a new
paradigm for lyric-to-melody generation. ROC generates melodies according to
given lyrics and also conditions on user-designated chord progression. It
addresses the above issues through a generation-retrieval pipeline.
Specifically, our paradigm has two stages: (1) creation stage, where a huge
amount of music fragments generated by a neural melody language model are
indexed in a database through several key features (e.g., chords, tonality,
rhythm, and structural information); (2) re-creation stage, where melodies are
re-created by retrieving music fragments from the database according to the key
features from lyrics and concatenating best music fragments based on
composition guidelines and melody language model scores. ROC has several
advantages: (1) It only needs unpaired melody data to train melody language
model, instead of paired lyric-melody data in previous models. (2) It achieves
good lyric-melody feature alignment in lyric-to-melody generation. Tested by
English and Chinese lyrics, ROC outperforms previous neural based
lyric-to-melody generation models on both objective and subjective metrics.
|
[
{
"version": "v1",
"created": "Thu, 11 Aug 2022 08:44:47 GMT"
},
{
"version": "v2",
"created": "Fri, 12 Aug 2022 03:22:37 GMT"
},
{
"version": "v3",
"created": "Thu, 18 Aug 2022 08:33:48 GMT"
},
{
"version": "v4",
"created": "Sat, 28 Jan 2023 09:43:42 GMT"
}
] | 2023-01-31T00:00:00 |
[
[
"Lv",
"Ang",
""
],
[
"Tan",
"Xu",
""
],
[
"Qin",
"Tao",
""
],
[
"Liu",
"Tie-Yan",
""
],
[
"Yan",
"Rui",
""
]
] |
new_dataset
| 0.998874 |
2208.10925
|
Hai Li
|
Hai Li, Xingrui Yang, Hongjia Zhai, Yuqian Liu, Hujun Bao, Guofeng
Zhang
|
Vox-Surf: Voxel-based Implicit Surface Representation
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Virtual content creation and interaction play an important role in modern 3D
applications such as AR and VR. Recovering detailed 3D models from real scenes
can significantly expand the scope of its applications and has been studied for
decades in the computer vision and computer graphics community. We propose
Vox-Surf, a voxel-based implicit surface representation. Our Vox-Surf divides
the space into finite bounded voxels. Each voxel stores geometry and appearance
information in its corner vertices. Vox-Surf is suitable for almost any
scenario thanks to sparsity inherited from voxel representation and can be
easily trained from multiple view images. We leverage the progressive training
procedure to extract important voxels gradually for further optimization so
that only valid voxels are preserved, which greatly reduces the number of
sampling points and increases rendering speed.The fine voxels can also be
considered as the bounding volume for collision detection.The experiments show
that Vox-Surf representation can learn delicate surface details and accurate
color with less memory and faster rendering speed than other methods.We also
show that Vox-Surf can be more practical in scene editing and AR applications.
|
[
{
"version": "v1",
"created": "Sun, 21 Aug 2022 18:02:55 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Jan 2023 09:30:07 GMT"
}
] | 2023-01-31T00:00:00 |
[
[
"Li",
"Hai",
""
],
[
"Yang",
"Xingrui",
""
],
[
"Zhai",
"Hongjia",
""
],
[
"Liu",
"Yuqian",
""
],
[
"Bao",
"Hujun",
""
],
[
"Zhang",
"Guofeng",
""
]
] |
new_dataset
| 0.994941 |
2209.10655
|
Xuezhe Ma
|
Xuezhe Ma, Chunting Zhou, Xiang Kong, Junxian He, Liangke Gui, Graham
Neubig, Jonathan May, Luke Zettlemoyer
|
Mega: Moving Average Equipped Gated Attention
|
Accepted by ICLR 2023. Final version (updating MT results). 13 pages,
4 figures and 7 tables
| null | null | null |
cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The design choices in the Transformer attention mechanism, including weak
inductive bias and quadratic computational complexity, have limited its
application for modeling long sequences. In this paper, we introduce Mega, a
simple, theoretically grounded, single-head gated attention mechanism equipped
with (exponential) moving average to incorporate inductive bias of
position-aware local dependencies into the position-agnostic attention
mechanism. We further propose a variant of Mega that offers linear time and
space complexity yet yields only minimal quality loss, by efficiently splitting
the whole sequence into multiple chunks with fixed length. Extensive
experiments on a wide range of sequence modeling benchmarks, including the Long
Range Arena, neural machine translation, auto-regressive language modeling, and
image and speech classification, show that Mega achieves significant
improvements over other sequence models, including variants of Transformers and
recent state space models.
|
[
{
"version": "v1",
"created": "Wed, 21 Sep 2022 20:52:17 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Sep 2022 06:23:38 GMT"
},
{
"version": "v3",
"created": "Sat, 28 Jan 2023 06:33:20 GMT"
}
] | 2023-01-31T00:00:00 |
[
[
"Ma",
"Xuezhe",
""
],
[
"Zhou",
"Chunting",
""
],
[
"Kong",
"Xiang",
""
],
[
"He",
"Junxian",
""
],
[
"Gui",
"Liangke",
""
],
[
"Neubig",
"Graham",
""
],
[
"May",
"Jonathan",
""
],
[
"Zettlemoyer",
"Luke",
""
]
] |
new_dataset
| 0.971168 |
2211.12136
|
Laurent Viennot
|
Filippo Brunelli (UPCit\'e, IRIF (UMR\_8243)), Laurent Viennot
(UPCit\'e, IRIF (UMR\_8243))
|
Minimum-Cost Temporal Walks under Waiting-Time Constraints in Linear
Time
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In a temporal graph, each edge is available at specific points in time. Such
an availability point is often represented by a ''temporal edge'' that can be
traversed from its tail only at a specific departure time, for arriving in its
head after a specific travel time. In such a graph, the connectivity from one
node to another is naturally captured by the existence of a temporal path where
temporal edges can be traversed one after the other. When imposing constraints
on how much time it is possible to wait at a node in-between two temporal
edges, it then becomes interesting to consider temporal walks where it is
allowed to visit several times the same node, possibly at different times. We
study the complexity of computing minimum-cost temporal walks from a single
source under waiting-time constraints in a temporal graph, and ask under which
conditions this problem can be solved in linear time. Our main result is a
linear time algorithm when the input temporal graph is given by its (classical)
space-time representation. We use an algebraic framework for manipulating
abstract costs, enabling the optimization of a large variety of criteria or
even combinations of these. It allows to improve previous results for several
criteria such as number of edges or overall waiting time even without waiting
constraints. It saves a logarithmic factor for all criteria under waiting
constraints. Interestingly, we show that a logarithmic factor in the time
complexity appears to be necessary with a more basic input consisting of a
single ordered list of temporal edges (sorted either by arrival times or
departure times). We indeed show equivalence between the space-time
representation and a representation with two ordered lists.
|
[
{
"version": "v1",
"created": "Tue, 22 Nov 2022 10:11:56 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Jan 2023 13:45:53 GMT"
}
] | 2023-01-31T00:00:00 |
[
[
"Brunelli",
"Filippo",
"",
"UPCité, IRIF"
],
[
"Viennot",
"Laurent",
"",
"UPCité, IRIF"
]
] |
new_dataset
| 0.991978 |
2212.14565
|
Ahmed Elhadeedy
|
Ahmed Elhadeedy, Jeremy Daily
|
Using Ethernet or A Wireless Harness and Named Data Networking in
Autonomous Tractor-Trailer Communication
| null | null | null | null |
cs.NI
|
http://creativecommons.org/licenses/by/4.0/
|
Autonomous truck and trailer configurations face challenges when operating in
reverse due to the lack of sensing on the trailer. It is anticipated that
sensor packages will be installed on existing trailers to extend autonomous
operations while operating in reverse in uncontrolled environments, like a
customer's loading dock. Power Line Communication (PLC) between the trailer and
the tractor cannot support high bandwidth and low latency communication. This
paper explores the impact of using Ethernet or a wireless medium for commercial
trailer-tractor communication on the lifecycle and operation of trailer
electronic control units (ECUs) from a Systems Engineering perspective to
address system requirements, integration, and security. Additionally,
content-based and host-based networking approaches for in-vehicle
communication, such as Named Data Networking (NDN) and IP-based networking are
compared. Implementation, testing and evaluation of prototype trailer ECU
communication with the tractor ECUs over Ethernet is shown by transmitting
different data types simultaneously. The implementation is tested with two
networking approaches, Named Data Networking, and Data Distribution Service
(DDS) and the test indicated that NDN over TCP is an efficient approach that is
capable of meeting automotive communication requirements. Using Ethernet or a
wireless harness and NDN for commercial trailer Anti-Lock Braking System (ABS)
ECU provides adequate resources for the operation of autonomous trucks and the
expansion of its capabilities, and at the same time significantly reduces the
complexities compared to when new features are added to legacy communication
systems. Using a wireless medium for tractor-trailer communication will bring
new cybersecurity challenges and requirements which requires new development
and lifecycle considerations.
|
[
{
"version": "v1",
"created": "Fri, 30 Dec 2022 06:45:18 GMT"
},
{
"version": "v2",
"created": "Sun, 29 Jan 2023 08:40:03 GMT"
}
] | 2023-01-31T00:00:00 |
[
[
"Elhadeedy",
"Ahmed",
""
],
[
"Daily",
"Jeremy",
""
]
] |
new_dataset
| 0.993122 |
2301.01181
|
John Nay
|
John J. Nay
|
Large Language Models as Corporate Lobbyists
|
Our open-source code available here:
https://github.com/JohnNay/llm-lobbyist
| null | null | null |
cs.CL cs.CY
|
http://creativecommons.org/licenses/by/4.0/
|
We demonstrate a proof-of-concept of a large language model conducting
corporate lobbying related activities. An autoregressive large language model
(OpenAI's text-davinci-003) determines if proposed U.S. Congressional bills are
relevant to specific public companies and provides explanations and confidence
levels. For the bills the model deems as relevant, the model drafts a letter to
the sponsor of the bill in an attempt to persuade the congressperson to make
changes to the proposed legislation. We use hundreds of novel ground-truth
labels of the relevance of a bill to a company to benchmark the performance of
the model. It outperforms the baseline of predicting the most common outcome of
irrelevance. We also benchmark the performance of the previous OpenAI GPT-3
model (text-davinci-002), which was the state-of-the-art model on many academic
natural language tasks until text-davinci-003 was recently released. The
performance of text-davinci-002 is worse than the simple baseline. Longer-term,
if AI begins to influence law in a manner that is not a direct extension of
human intentions, this threatens the critical role that law as information
could play in aligning AI with humans. Initially, AI is being used to simply
augment human lobbyists for a small portion of their daily tasks. However,
firms have an incentive to use less and less human oversight over automated
assessments of policy ideas and the written communication to regulatory
agencies and Congressional staffers. The core question raised is where to draw
the line between human-driven and AI-driven policy influence.
|
[
{
"version": "v1",
"created": "Tue, 3 Jan 2023 16:25:52 GMT"
},
{
"version": "v2",
"created": "Wed, 4 Jan 2023 16:55:35 GMT"
},
{
"version": "v3",
"created": "Thu, 5 Jan 2023 15:06:58 GMT"
},
{
"version": "v4",
"created": "Sun, 8 Jan 2023 13:54:05 GMT"
},
{
"version": "v5",
"created": "Thu, 12 Jan 2023 20:49:46 GMT"
},
{
"version": "v6",
"created": "Tue, 17 Jan 2023 14:32:05 GMT"
},
{
"version": "v7",
"created": "Sat, 28 Jan 2023 20:49:33 GMT"
}
] | 2023-01-31T00:00:00 |
[
[
"Nay",
"John J.",
""
]
] |
new_dataset
| 0.995334 |
2301.02453
|
Shuangyang Li
|
Shuangyang Li, Jinhong Yuan, Paul Fitzpatrick, Taka Sakurai, and
Giuseppe Caire
|
Delay-Doppler Domain Tomlinson-Harashima Precoding for OTFS-based
Downlink MU-MIMO Transmissions: Linear Complexity Implementation and Scaling
Law Analysis
|
submitted to IEEE Transactions on Communications
| null | null | null |
cs.IT math.IT
|
http://creativecommons.org/licenses/by-sa/4.0/
|
Orthogonal time frequency space (OTFS) modulation is a recently proposed
delay-Doppler (DD) domain communication scheme, which has shown promising
performance in general wireless communications, especially over high-mobility
channels. In this paper, we investigate DD domain Tomlinson-Harashima precoding
(THP) for downlink multiuser multiple-input and multiple-output OTFS
(MU-MIMO-OTFS) transmissions. Instead of directly applying THP based on the
huge equivalent channel matrix, we propose a simple implementation of THP that
does not require any matrix decomposition or inversion. Such a simple
implementation is enabled by the DD domain channel property, i.e., different
resolvable paths do not share the same delay and Doppler shifts, which makes it
possible to pre-cancel all the DD domain interference in a symbol-by-symbol
manner. We also study the achievable rate performance for the proposed scheme
by leveraging the information-theoretical equivalent models. In particular, we
show that the proposed scheme can achieve a near optimal performance in the
high signal-to-noise ratio (SNR) regime. More importantly, scaling laws for
achievable rates with respect to number of antennas and users are derived,
which indicate that the achievable rate increases logarithmically with the
number of antennas and linearly with the number of users. Our numerical results
align well with our findings and also demonstrate a significant improvement
compared to existing MU-MIMO schemes on OTFS and orthogonal frequency-division
multiplexing (OFDM).
|
[
{
"version": "v1",
"created": "Fri, 6 Jan 2023 10:32:01 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Jan 2023 07:12:51 GMT"
}
] | 2023-01-31T00:00:00 |
[
[
"Li",
"Shuangyang",
""
],
[
"Yuan",
"Jinhong",
""
],
[
"Fitzpatrick",
"Paul",
""
],
[
"Sakurai",
"Taka",
""
],
[
"Caire",
"Giuseppe",
""
]
] |
new_dataset
| 0.99932 |
2301.04630
|
Abhishek Cauligi
|
Abhishek Cauligi and R. Michael Swan and Masahiro Ono and Shreyansh
Daftry and John Elliott and Larry Matthies and Deegan Atha
|
ShadowNav: Crater-Based Localization for Nighttime and Permanently
Shadowed Region Lunar Navigation
|
IEEE Aerospace Conference 2023
| null | null | null |
cs.RO cs.CV
|
http://creativecommons.org/licenses/by/4.0/
|
There has been an increase in interest in missions that drive significantly
longer distances per day than what has currently been performed. Further, some
of these proposed missions require autonomous driving and absolute localization
in darkness. For example, the Endurance A mission proposes to drive 1200km of
its total traverse at night. The lack of natural light available during such
missions limits what can be used as visual landmarks and the range at which
landmarks can be observed. In order for planetary rovers to traverse long
ranges, onboard absolute localization is critical to the ability of the rover
to maintain its planned trajectory and avoid known hazardous regions.
Currently, to accomplish absolute localization, a ground in the loop (GITL)
operation is performed wherein a human operator matches local maps or images
from onboard with orbital images and maps. This GITL operation limits the
distance that can be driven in a day to a few hundred meters, which is the
distance that the rover can maintain acceptable localization error via relative
methods. Previous work has shown that using craters as landmarks is a promising
approach for performing absolute localization on the moon during the day. In
this work we present a method of absolute localization that utilizes craters as
landmarks and matches detected crater edges on the surface with known craters
in orbital maps. We focus on a localization method based on a perception system
which has an external illuminator and a stereo camera. We evaluate (1) both
monocular and stereo based surface crater edge detection techniques, (2)
methods of scoring the crater edge matches for optimal localization, and (3)
localization performance on simulated Lunar surface imagery at night. We
demonstrate that this technique shows promise for maintaining absolute
localization error of less than 10m required for most planetary rover missions.
|
[
{
"version": "v1",
"created": "Wed, 11 Jan 2023 18:35:31 GMT"
}
] | 2023-01-31T00:00:00 |
[
[
"Cauligi",
"Abhishek",
""
],
[
"Swan",
"R. Michael",
""
],
[
"Ono",
"Masahiro",
""
],
[
"Daftry",
"Shreyansh",
""
],
[
"Elliott",
"John",
""
],
[
"Matthies",
"Larry",
""
],
[
"Atha",
"Deegan",
""
]
] |
new_dataset
| 0.998023 |
2301.05842
|
Ross Greer
|
Ross Greer, Lulua Rakla, Samveed Desai, Afnan Alofi, Akshay
Gopalkrishnan, Mohan Trivedi
|
CHAMP: Crowdsourced, History-Based Advisory of Mapped Pedestrians for
Safer Driver Assistance Systems
| null | null | null | null |
cs.CV
|
http://creativecommons.org/licenses/by-nc-nd/4.0/
|
Vehicles are constantly approaching and sharing the road with pedestrians,
and as a result it is critical for vehicles to prevent any collisions with
pedestrians. Current methods for pedestrian collision prevention focus on
integrating visual pedestrian detectors with Automatic Emergency Braking (AEB)
systems which can trigger warnings and apply brakes as a pedestrian enters a
vehicle's path. Unfortunately, pedestrian-detection-based systems can be
hindered in certain situations such as nighttime or when pedestrians are
occluded. Our system, CHAMP (Crowdsourced, History-based Advisories of Mapped
Pedestrians), addresses such issues using an online, map-based pedestrian
detection system where pedestrian locations are aggregated into a dataset after
repeated passes of locations. Using this dataset, we are able to learn
pedestrian zones and generate advisory notices when a vehicle is approaching a
pedestrian despite challenges like dark lighting or pedestrian occlusion. We
collected and carefully annotated pedestrian data in La Jolla, CA to construct
training and test sets of pedestrian locations. Moreover, we use the number of
correct advisories, false advisories, and missed advisories to define precision
and recall performance metrics to evaluate CHAMP. This approach can be tuned
such that we achieve a maximum of 100% precision and 75% recall on the
experimental dataset, with performance enhancement options through further data
collection.
|
[
{
"version": "v1",
"created": "Sat, 14 Jan 2023 07:28:05 GMT"
},
{
"version": "v2",
"created": "Wed, 18 Jan 2023 19:45:51 GMT"
},
{
"version": "v3",
"created": "Mon, 30 Jan 2023 02:00:31 GMT"
}
] | 2023-01-31T00:00:00 |
[
[
"Greer",
"Ross",
""
],
[
"Rakla",
"Lulua",
""
],
[
"Desai",
"Samveed",
""
],
[
"Alofi",
"Afnan",
""
],
[
"Gopalkrishnan",
"Akshay",
""
],
[
"Trivedi",
"Mohan",
""
]
] |
new_dataset
| 0.997669 |
2301.10172
|
Archan Ghosh
|
Archan Ghosh, Debgandhar Ghosh, Madhurima Maji, Suchinta Chanda,
Kalporup Goswami
|
MTTN: Multi-Pair Text to Text Narratives for Prompt Generation
| null | null | null | null |
cs.CL cs.LG
|
http://creativecommons.org/licenses/by-sa/4.0/
|
The increased interest in diffusion models has opened up opportunities for
advancements in generative text modeling. These models can produce impressive
images when given a well-crafted prompt, but creating a powerful or meaningful
prompt can be hit-or-miss. To address this, we have created a large-scale
dataset that is derived and synthesized from real prompts and indexed with
popular image-text datasets such as MS-COCO and Flickr. We have also
implemented stages that gradually reduce context and increase complexity, which
will further enhance the output due to the complex annotations created. The
dataset, called MTTN, includes over 2.4 million sentences divided into 5
stages, resulting in a total of over 12 million pairs, and a vocabulary of over
300,000 unique words, providing ample variation. The original 2.4 million pairs
are designed to reflect the way language is used on the internet globally,
making the dataset more robust for any model trained on it.
|
[
{
"version": "v1",
"created": "Sat, 21 Jan 2023 06:55:44 GMT"
},
{
"version": "v2",
"created": "Sun, 29 Jan 2023 18:03:44 GMT"
}
] | 2023-01-31T00:00:00 |
[
[
"Ghosh",
"Archan",
""
],
[
"Ghosh",
"Debgandhar",
""
],
[
"Maji",
"Madhurima",
""
],
[
"Chanda",
"Suchinta",
""
],
[
"Goswami",
"Kalporup",
""
]
] |
new_dataset
| 0.999841 |
2301.10966
|
Xuan Quang Ngo
|
Thai Nguyen Chau, Xuan Quang Ngo, Van Tu Duong, Trong Trung Nguyen,
Huy Hung Nguyen, Tan Tien Nguyen
|
Design of Mobile Manipulator for Fire Extinguisher Testing. Part II:
Design and Simulation
|
10 pages, 15 figures, the 7th International Conference on Advanced
Engineering, Theory and Applications
| null | null | null |
cs.RO cs.SY eess.SY
|
http://creativecommons.org/licenses/by/4.0/
|
All flames are extinguished as early as possible, or fire services have to
deal with major conflagrations. This leads to the fact that the quality of fire
extinguishers has become a very sensitive and important issue in firefighting.
Inspired by the development of automatic fire fighting systems, this paper
presents a mobile manipulator to evaluate the power of fire extinguishers,
which is designed according to the standard of fire extinguishers named as ISO
7165:2009 and ISO 11601:2008. A detailed discussion on key specifications
solutions and mechanical design of the chassis of the mobile manipulator has
been presented in Part I: Key Specifications and Conceptual Design. The focus
of this part is on the rest of the mechanical design and controller de-sign of
the mobile manipulator.
|
[
{
"version": "v1",
"created": "Thu, 26 Jan 2023 07:19:20 GMT"
}
] | 2023-01-31T00:00:00 |
[
[
"Chau",
"Thai Nguyen",
""
],
[
"Ngo",
"Xuan Quang",
""
],
[
"Duong",
"Van Tu",
""
],
[
"Nguyen",
"Trong Trung",
""
],
[
"Nguyen",
"Huy Hung",
""
],
[
"Nguyen",
"Tan Tien",
""
]
] |
new_dataset
| 0.999129 |
2301.11806
|
Arup Kumar Sarker
|
Arup Kumar Sarker, Farzana Yasmin Ahmad and Matthew B. Dwyer
|
PCV: A Point Cloud-Based Network Verifier
|
11 pages, 12 figures
| null | null | null |
cs.CV cs.SE
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
3D vision with real-time LiDAR-based point cloud data became a vital part of
autonomous system research, especially perception and prediction modules use
for object classification, segmentation, and detection. Despite their success,
point cloud-based network models are vulnerable to multiple adversarial
attacks, where the certain factor of changes in the validation set causes
significant performance drop in well-trained networks. Most of the existing
verifiers work perfectly on 2D convolution. Due to complex architecture,
dimension of hyper-parameter, and 3D convolution, no verifiers can perform the
basic layer-wise verification. It is difficult to conclude the robustness of a
3D vision model without performing the verification. Because there will be
always corner cases and adversarial input that can compromise the model's
effectiveness.
In this project, we describe a point cloud-based network verifier that
successfully deals state of the art 3D classifier PointNet verifies the
robustness by generating adversarial inputs. We have used extracted properties
from the trained PointNet and changed certain factors for perturbation input.
We calculate the impact on model accuracy versus property factor and can test
PointNet network's robustness against a small collection of perturbing input
states resulting from adversarial attacks like the suggested hybrid reverse
signed attack. The experimental results reveal that the resilience property of
PointNet is affected by our hybrid reverse signed perturbation strategy
|
[
{
"version": "v1",
"created": "Fri, 27 Jan 2023 15:58:54 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Jan 2023 16:07:57 GMT"
}
] | 2023-01-31T00:00:00 |
[
[
"Sarker",
"Arup Kumar",
""
],
[
"Ahmad",
"Farzana Yasmin",
""
],
[
"Dwyer",
"Matthew B.",
""
]
] |
new_dataset
| 0.998446 |
2301.11927
|
Paul Diac
|
Andrei Arhire and Paul Diac
|
PACE Solver Description: A Heuristic Directed Feedback Vertex Set
Problem Algorithm
|
Second best student submission of Heuristic Track of the Feedback
Vertex Set Challenge at PACE 2022, https://pacechallenge.org/
https://github.com/AndreiiArhire/PACE2022
| null | null | null |
cs.DM
|
http://creativecommons.org/licenses/by/4.0/
|
A feedback vertex set of a graph is a set of nodes with the property that
every cycle contains at least one vertex from the set i.e. the removal of all
vertices from a feedback vertex set leads to an acyclic graph. In this short
paper, we describe the algorithm for finding a minimum directed feedback vertex
set used by the _UAIC_ANDREIARHIRE_ solver, submitted to the heuristic track of
the 2022 PACE challenge.
|
[
{
"version": "v1",
"created": "Thu, 26 Jan 2023 03:16:14 GMT"
}
] | 2023-01-31T00:00:00 |
[
[
"Arhire",
"Andrei",
""
],
[
"Diac",
"Paul",
""
]
] |
new_dataset
| 0.999232 |
2301.11932
|
Muhammad Al-Barham
|
Muhammad Al-Barham and Adham Alsharkawi and Musa Al-Yaman and Mohammad
Al-Fetyani and Ashraf Elnagar and Ahmad Abu SaAleek and Mohammad Al-Odat
|
RGB Arabic Alphabets Sign Language Dataset
|
Reference for the dataset that has inspired us to create our dataset:
https://data.mendeley.com/datasets/y7pckrw6z2/1
| null | null | null |
cs.CV
|
http://creativecommons.org/licenses/by/4.0/
|
This paper introduces the RGB Arabic Alphabet Sign Language (AASL) dataset.
AASL comprises 7,856 raw and fully labelled RGB images of the Arabic sign
language alphabets, which to our best knowledge is the first publicly available
RGB dataset. The dataset is aimed to help those interested in developing
real-life Arabic sign language classification models. AASL was collected from
more than 200 participants and with different settings such as lighting,
background, image orientation, image size, and image resolution. Experts in the
field supervised, validated and filtered the collected images to ensure a
high-quality dataset. AASL is made available to the public on Kaggle.
|
[
{
"version": "v1",
"created": "Mon, 30 Jan 2023 10:21:09 GMT"
}
] | 2023-01-31T00:00:00 |
[
[
"Al-Barham",
"Muhammad",
""
],
[
"Alsharkawi",
"Adham",
""
],
[
"Al-Yaman",
"Musa",
""
],
[
"Al-Fetyani",
"Mohammad",
""
],
[
"Elnagar",
"Ashraf",
""
],
[
"SaAleek",
"Ahmad Abu",
""
],
[
"Al-Odat",
"Mohammad",
""
]
] |
new_dataset
| 0.999833 |
2301.11975
|
Nathan Fradet
|
Nathan Fradet, Jean-Pierre Briot, Fabien Chhel, Amal El Fallah
Seghrouchni, Nicolas Gutowski
|
Byte Pair Encoding for Symbolic Music
|
Source code at https://github.com/Natooz/BPE-Symbolic-Music
| null | null | null |
cs.LG cs.AI cs.SD eess.AS
|
http://creativecommons.org/licenses/by/4.0/
|
The symbolic music modality is nowadays mostly represented as discrete and
used with sequential models such as Transformers, for deep learning tasks.
Recent research put efforts on the tokenization, i.e. the conversion of data
into sequences of integers intelligible to such models. This can be achieved by
many ways as music can be composed of simultaneous tracks, of simultaneous
notes with several attributes. Until now, the proposed tokenizations are based
on small vocabularies describing the note attributes and time events, resulting
in fairly long token sequences. In this paper, we show how Byte Pair Encoding
(BPE) can improve the results of deep learning models while improving its
performances. We experiment on music generation and composer classification,
and study the impact of BPE on how models learn the embeddings, and show that
it can help to increase their isotropy, i.e., the uniformity of the variance of
their positions in the space.
|
[
{
"version": "v1",
"created": "Fri, 27 Jan 2023 20:22:18 GMT"
}
] | 2023-01-31T00:00:00 |
[
[
"Fradet",
"Nathan",
""
],
[
"Briot",
"Jean-Pierre",
""
],
[
"Chhel",
"Fabien",
""
],
[
"Seghrouchni",
"Amal El Fallah",
""
],
[
"Gutowski",
"Nicolas",
""
]
] |
new_dataset
| 0.997462 |
2301.11995
|
Randy Kuang
|
Randy Kuang and Maria Perepechaenko and Ryan Toth
|
A New Symmetric Homomorphic Functional Encryption over a Hidden Ring for
Polynomial Public Key Encapsulations
|
21 pages, 1 figure
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper proposes a new homomorphic functional encryption using modular
multiplications over a hidden ring. Unlike traditional homomorphic encryption
where users can only passively perform ciphertext addition or multiplication,
the homomorphic functional encryption retains homomorphic addition and scalar
multiplication properties, but also allows for the user's inputs through
polynomial variables. The proposed homomorphic encryption can be applied to any
polynomials over a finite field, with their coefficients considered as their
privacy. We denote the polynomials before homomorphic encryption as plain
polynomials and after homomorphic encryption as cipher polynomials. A cipher
polynomial can be evaluated with variables from the finite field, GF(p), by
calculating the monomials of variables modulo a prime p. These properties allow
functional homomorphic encryption to be used for public key encryption of
certain asymmetric cryptosystems to hide the structure of its central map
construction. We propose a new variant of MPKC with homomorphic encryption of
its public key. We propose to use a single plaintext vector and a noise vector
of multiple variables to be associated with the central map, in place of the
secret plaintext vector to be encrypted in MPKC. We call this variant of
encrypted MPKC, a Homomorphic Polynomial Public Key algorithm or HPPK
algorithm. The HPPK algorithm holds the property of indistinguishability under
the chosen-plaintext attacks or IND-CPA. The overall classical complexity to
crack the HPPK algorithm is exponential in the size of the prime field GF(p).
We briefly report on benchmarking performance results using the SUPERCOP
toolkit. Benchmarking results demonstrate that HPPK offers rather fast
performance, which is comparable and in some cases outperforms the NIST PQC
finalists for key generation, encryption, and decryption.
|
[
{
"version": "v1",
"created": "Fri, 27 Jan 2023 21:23:44 GMT"
}
] | 2023-01-31T00:00:00 |
[
[
"Kuang",
"Randy",
""
],
[
"Perepechaenko",
"Maria",
""
],
[
"Toth",
"Ryan",
""
]
] |
new_dataset
| 0.998485 |
2301.12023
|
Wonho Bae
|
Wonho Bae, Mohamed Osama Ahmed, Frederick Tung, Gabriel L. Oliveira
|
Meta Temporal Point Processes
|
Accepted to ICLR2023
| null | null | null |
cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A temporal point process (TPP) is a stochastic process where its realization
is a sequence of discrete events in time. Recent work in TPPs model the process
using a neural network in a supervised learning framework, where a training set
is a collection of all the sequences. In this work, we propose to train TPPs in
a meta learning framework, where each sequence is treated as a different task,
via a novel framing of TPPs as neural processes (NPs). We introduce context
sets to model TPPs as an instantiation of NPs. Motivated by attentive NP, we
also introduce local history matching to help learn more informative features.
We demonstrate the potential of the proposed method on popular public benchmark
datasets and tasks, and compare with state-of-the-art TPP methods.
|
[
{
"version": "v1",
"created": "Fri, 27 Jan 2023 23:21:07 GMT"
}
] | 2023-01-31T00:00:00 |
[
[
"Bae",
"Wonho",
""
],
[
"Ahmed",
"Mohamed Osama",
""
],
[
"Tung",
"Frederick",
""
],
[
"Oliveira",
"Gabriel L.",
""
]
] |
new_dataset
| 0.95712 |
2301.12032
|
Ali Borji
|
Ali Borji
|
BinaryVQA: A Versatile Test Set to Evaluate the Out-of-Distribution
Generalization of VQA Models
| null | null | null | null |
cs.CV cs.AI
|
http://creativecommons.org/licenses/by/4.0/
|
We introduce a new test set for visual question answering (VQA) called
BinaryVQA to push the limits of VQA models. Our dataset includes 7,800
questions across 1,024 images and covers a wide variety of objects, topics, and
concepts. For easy model evaluation, we only consider binary questions.
Questions and answers are formulated and verified carefully and manually.
Around 63% of the questions have positive answers. The median number of
questions per image and question length are 7 and 5, respectively. The state of
the art OFA model achieves 75% accuracy on BinaryVQA dataset, which is
significantly lower than its performance on the VQA v2 test-dev dataset
(94.7%). We also analyze the model behavior along several dimensions including:
a) performance over different categories such as text, counting and gaze
direction, b) model interpretability, c) the effect of question length on
accuracy, d) bias of models towards positive answers and introduction of a new
score called the ShuffleAcc, and e) sensitivity to spelling and grammar errors.
Our investigation demonstrates the difficulty of our dataset and shows that it
can challenge VQA models for next few years. Data and code are publicly
available at: DATA and CODE.
|
[
{
"version": "v1",
"created": "Sat, 28 Jan 2023 00:03:44 GMT"
}
] | 2023-01-31T00:00:00 |
[
[
"Borji",
"Ali",
""
]
] |
new_dataset
| 0.996747 |
2301.12055
|
Abhinit Kumar Ambastha
|
Abhinit Kumar Ambastha, Leong Tze Yun
|
TIDo: Source-free Task Incremental Learning in Non-stationary
Environments
| null | null | null | null |
cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This work presents an incremental learning approach for autonomous agents to
learn new tasks in a non-stationary environment. Updating a DNN model-based
agent to learn new target tasks requires us to store past training data and
needs a large labeled target task dataset. Few-shot task incremental learning
methods overcome the limitation of labeled target datasets by adapting trained
models to learn private target classes using a few labeled representatives and
a large unlabeled target dataset. However, the methods assume that the source
and target tasks are stationary. We propose a one-shot task incremental
learning approach that can adapt to non-stationary source and target tasks. Our
approach minimizes adversarial discrepancy between the model's feature space
and incoming incremental data to learn an updated hypothesis. We also use
distillation loss to reduce catastrophic forgetting of previously learned
tasks. Finally, we use Gaussian prototypes to generate exemplar instances
eliminating the need to store past training data. Unlike current work in task
incremental learning, our model can learn both source and target task updates
incrementally. We evaluate our method on various problem settings for
incremental object detection and disease prediction model update. We evaluate
our approach by measuring the performance of shared class and target private
class prediction. Our results show that our approach achieved improved
performance compared to existing state-of-the-art task incremental learning
methods.
|
[
{
"version": "v1",
"created": "Sat, 28 Jan 2023 02:19:45 GMT"
}
] | 2023-01-31T00:00:00 |
[
[
"Ambastha",
"Abhinit Kumar",
""
],
[
"Yun",
"Leong Tze",
""
]
] |
new_dataset
| 0.994963 |
2301.12135
|
Yu Chen
|
Yu Chen, Zihao Yu, Shu Song, Tianning Yu, Jianming Li, Gim Hee Lee
|
AdaSfM: From Coarse Global to Fine Incremental Adaptive Structure from
Motion
|
accepted by ICRA 2023
| null | null | null |
cs.CV cs.DC
|
http://creativecommons.org/licenses/by/4.0/
|
Despite the impressive results achieved by many existing Structure from
Motion (SfM) approaches, there is still a need to improve the robustness,
accuracy, and efficiency on large-scale scenes with many outlier matches and
sparse view graphs. In this paper, we propose AdaSfM: a coarse-to-fine adaptive
SfM approach that is scalable to large-scale and challenging datasets. Our
approach first does a coarse global SfM which improves the reliability of the
view graph by leveraging measurements from low-cost sensors such as Inertial
Measurement Units (IMUs) and wheel encoders. Subsequently, the view graph is
divided into sub-scenes that are refined in parallel by a fine local
incremental SfM regularised by the result from the coarse global SfM to improve
the camera registration accuracy and alleviate scene drifts. Finally, our
approach uses a threshold-adaptive strategy to align all local reconstructions
to the coordinate frame of global SfM. Extensive experiments on large-scale
benchmark datasets show that our approach achieves state-of-the-art accuracy
and efficiency.
|
[
{
"version": "v1",
"created": "Sat, 28 Jan 2023 09:06:50 GMT"
}
] | 2023-01-31T00:00:00 |
[
[
"Chen",
"Yu",
""
],
[
"Yu",
"Zihao",
""
],
[
"Song",
"Shu",
""
],
[
"Yu",
"Tianning",
""
],
[
"Li",
"Jianming",
""
],
[
"Lee",
"Gim Hee",
""
]
] |
new_dataset
| 0.99941 |
2301.12271
|
Aitazaz Raja
|
Aitazaz Ali Raja and Sergio Grammatico
|
Bilateral Peer-to-Peer Energy Trading via Coalitional Games
| null | null | null | null |
cs.GT cs.SY eess.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we propose a bilateral peer-to-peer (P2P) energy trading
scheme under single-contract and multi-contract market setups, both as an
assignment game, and a special class of coalitional games. {The proposed market
formulation allows for efficient computation of a market equilibrium while
keeping the desired economic properties offered by the coalitional games.
Furthermore, our market model allows buyers to have heterogeneous preferences
(product differentiation) over the energy sellers, which can be economic,
social, or environmental. To address the problem of scalability in coalitional
games, we design a novel distributed negotiation mechanism that utilizes the
geometric structure of the equilibrium solution to improve the convergence
speed. Our algorithm enables market participants (prosumers) to reach a
consensus on a set of ``stable" and ``fair" bilateral contracts which
encourages prosumer participation.} The negotiation process is executed with
virtually minimal information requirements on a time-varying communication
network that in turn preserves privacy. We use operator-theoretic tools to
rigorously prove its convergence. Numerical simulations illustrate the benefits
of our negotiation protocol and show that the average execution time of a
negotiation step is much faster than the benchmark.
|
[
{
"version": "v1",
"created": "Sat, 28 Jan 2023 19:10:24 GMT"
}
] | 2023-01-31T00:00:00 |
[
[
"Raja",
"Aitazaz Ali",
""
],
[
"Grammatico",
"Sergio",
""
]
] |
new_dataset
| 0.996021 |
2301.12293
|
Jian Wu
|
Zeba Karishma, Shaurya Rohatgi, Kavya Shrinivas Puranik, Jian Wu, C.
Lee Giles
|
ACL-Fig: A Dataset for Scientific Figure Classification
|
6 pages, 4 figures, accepted by the AAAI-23 Workshop on Scientific
Document Understanding
| null | null | null |
cs.AI cs.CV cs.DL
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
Most existing large-scale academic search engines are built to retrieve
text-based information. However, there are no large-scale retrieval services
for scientific figures and tables. One challenge for such services is
understanding scientific figures' semantics, such as their types and purposes.
A key obstacle is the need for datasets containing annotated scientific figures
and tables, which can then be used for classification, question-answering, and
auto-captioning. Here, we develop a pipeline that extracts figures and tables
from the scientific literature and a deep-learning-based framework that
classifies scientific figures using visual features. Using this pipeline, we
built the first large-scale automatically annotated corpus, ACL-Fig, consisting
of 112,052 scientific figures extracted from ~56K research papers in the ACL
Anthology. The ACL-Fig-Pilot dataset contains 1,671 manually labeled scientific
figures belonging to 19 categories. The dataset is accessible at
https://huggingface.co/datasets/citeseerx/ACL-fig under a CC BY-NC license.
|
[
{
"version": "v1",
"created": "Sat, 28 Jan 2023 20:27:35 GMT"
}
] | 2023-01-31T00:00:00 |
[
[
"Karishma",
"Zeba",
""
],
[
"Rohatgi",
"Shaurya",
""
],
[
"Puranik",
"Kavya Shrinivas",
""
],
[
"Wu",
"Jian",
""
],
[
"Giles",
"C. Lee",
""
]
] |
new_dataset
| 0.999703 |
2301.12316
|
Akshay Mathur
|
Akshay Mathur (1) and Ella Atkins (2) ((1) University of Michigan, (2)
Virginia Tech)
|
Wind Tunnel Testing and Aerodynamic Characterization of a QuadPlane
Uncrewed Aircraft System
|
38 pages, 24 figures and 14 tables
| null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Electric Vertical Takeoff and Landing (eVTOL) vehicles will open new
opportunities in aviation. This paper describes the design and wind tunnel
analysis of an eVTOL uncrewed aircraft system (UAS) prototype with a
traditional aircraft wing, tail, and puller motor along with four vertical
thrust pusher motors. Vehicle design and construction are summarized. Dynamic
thrust from propulsion modules is experimentally determined at different
airspeeds over a large sweep of propeller angles of attack. Wind tunnel tests
with the vehicle prototype cover a suite of hover, transition and cruise flight
conditions. Net aerodynamic forces and moments are distinctly computed and
compared for plane, quadrotor and hybrid flight modes. Coefficient-based models
are developed. Polynomial curve fits accurately capture observed data over all
test configurations. To our knowledge, the presented wind tunnel experimental
analysis for a multi-mode eVTOL platform is novel. Increased drag and reduced
dynamic thrust likely due to flow interactions will be important to address in
future designs.
|
[
{
"version": "v1",
"created": "Sun, 29 Jan 2023 00:32:57 GMT"
}
] | 2023-01-31T00:00:00 |
[
[
"Mathur",
"Akshay",
""
],
[
"Atkins",
"Ella",
""
]
] |
new_dataset
| 0.999599 |
2301.12354
|
Christopher Tralie
|
Christopher J. Tralie
|
Artistic Curve Steganography Carried by Musical Audio
|
18 pages, 14 figures, in Proceedings of EvoMUSART 2023
| null | null | null |
cs.SD cs.IR cs.MM eess.AS
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
In this work, we create artistic closed loop curves that trace out images and
3D shapes, which we then hide in musical audio as a form of steganography. We
use traveling salesperson art to create artistic plane loops to trace out image
contours, and we use Hamiltonian cycles on triangle meshes to create artistic
space loops that fill out 3D surfaces. Our embedding scheme is designed to
faithfully preserve the geometry of these loops after lossy compression, while
keeping their presence undetectable to the audio listener. To accomplish this,
we hide each dimension of the curve in a different frequency, and we perturb a
sliding window sum of the magnitude of that frequency to best match the target
curve at that dimension, while hiding scale information in that frequency's
phase. In the process, we exploit geometric properties of the curves to help to
more effectively hide and recover them. Our scheme is simple and encoding
happens efficiently with a nonnegative least squares framework, while decoding
is trivial. We validate our technique quantitatively on large datasets of
images and audio, and we show results of a crowd sourced listening test that
validate that the hidden information is indeed unobtrusive.
|
[
{
"version": "v1",
"created": "Sun, 29 Jan 2023 04:15:57 GMT"
}
] | 2023-01-31T00:00:00 |
[
[
"Tralie",
"Christopher J.",
""
]
] |
new_dataset
| 0.997549 |
2301.12360
|
Abdurrahman Elmaghbub Mr
|
Abdurrahman Elmaghbub, Bechir Hamdaoui and Weng-Keen Wong
|
ADL-ID: Adversarial Disentanglement Learning for Wireless Device
Fingerprinting Temporal Domain Adaptation
|
The paper has been accepted at IEEE ICC'23 - MWN Symposium
| null | null | null |
cs.LG cs.CR eess.SP
|
http://creativecommons.org/licenses/by/4.0/
|
As the journey of 5G standardization is coming to an end, academia and
industry have already begun to consider the sixth-generation (6G) wireless
networks, with an aim to meet the service demands for the next decade. Deep
learning-based RF fingerprinting (DL-RFFP) has recently been recognized as a
potential solution for enabling key wireless network applications and services,
such as spectrum policy enforcement and network access control. The
state-of-the-art DL-RFFP frameworks suffer from a significant performance drop
when tested with data drawn from a domain that is different from that used for
training data. In this paper, we propose ADL-ID, an unsupervised domain
adaption framework that is based on adversarial disentanglement representation
to address the temporal domain adaptation for the RFFP task. Our framework has
been evaluated on real LoRa and WiFi datasets and showed about 24% improvement
in accuracy when compared to the baseline CNN network on short-term temporal
adaptation. It also improves the classification accuracy by up to 9% on
long-term temporal adaptation. Furthermore, we release a 5-day, 2.1TB,
large-scale WiFi 802.11b dataset collected from 50 Pycom devices to support the
research community efforts in developing and validating robust RFFP methods.
|
[
{
"version": "v1",
"created": "Sun, 29 Jan 2023 04:52:41 GMT"
}
] | 2023-01-31T00:00:00 |
[
[
"Elmaghbub",
"Abdurrahman",
""
],
[
"Hamdaoui",
"Bechir",
""
],
[
"Wong",
"Weng-Keen",
""
]
] |
new_dataset
| 0.99629 |
2301.12394
|
Milan \v{S}ulc
|
\v{S}t\v{e}p\'an \v{S}imsa, Milan \v{S}ulc, Maty\'a\v{s} Skalick\'y,
Yash Patel, Ahmed Hamdi
|
DocILE 2023 Teaser: Document Information Localization and Extraction
|
Accepted to ECIR 2023
| null | null | null |
cs.LG cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The lack of data for information extraction (IE) from semi-structured
business documents is a real problem for the IE community. Publications relying
on large-scale datasets use only proprietary, unpublished data due to the
sensitive nature of such documents. Publicly available datasets are mostly
small and domain-specific. The absence of a large-scale public dataset or
benchmark hinders the reproducibility and cross-evaluation of published
methods. The DocILE 2023 competition, hosted as a lab at the CLEF 2023
conference and as an ICDAR 2023 competition, will run the first major benchmark
for the tasks of Key Information Localization and Extraction (KILE) and Line
Item Recognition (LIR) from business documents. With thousands of annotated
real documents from open sources, a hundred thousand of generated synthetic
documents, and nearly a million unlabeled documents, the DocILE lab comes with
the largest publicly available dataset for KILE and LIR. We are looking forward
to contributions from the Computer Vision, Natural Language Processing,
Information Retrieval, and other communities. The data, baselines, code and
up-to-date information about the lab and competition are available at
https://docile.rossum.ai/.
|
[
{
"version": "v1",
"created": "Sun, 29 Jan 2023 09:08:58 GMT"
}
] | 2023-01-31T00:00:00 |
[
[
"Šimsa",
"Štěpán",
""
],
[
"Šulc",
"Milan",
""
],
[
"Skalický",
"Matyáš",
""
],
[
"Patel",
"Yash",
""
],
[
"Hamdi",
"Ahmed",
""
]
] |
new_dataset
| 0.997702 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.