Zum Hauptinhalt springen

Showing 1–50 of 78 results for author: Wang, I

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.08853  [pdf, other

    cs.HC

    CPS-TaskForge: Generating Collaborative Problem Solving Environments for Diverse Communication Tasks

    Authors: Nikita Haduong, Irene Wang, Bo-Ru Lu, Prithviraj Ammanabrolu, Noah A. Smith

    Abstract: Teams can outperform individuals; could adding AI teammates further bolster performance of teams solving problems collaboratively? Collaborative problem solving (CPS) research commonly studies teams with two agents (human-human or human-AI), but team research literature finds that, for complex tasks, larger teams are more effective. Progress in studying collaboration with more than two agents, thr… ▽ More

    Submitted 16 August, 2024; originally announced August 2024.

  2. arXiv:2408.03353  [pdf, other

    cs.LG cs.AI cs.HC

    Adversarial Domain Adaptation for Cross-user Activity Recognition Using Diffusion-based Noise-centred Learning

    Authors: Xiaozhou Ye, Kevin I-Kai Wang

    Abstract: Human Activity Recognition (HAR) plays a crucial role in various applications such as human-computer interaction and healthcare monitoring. However, challenges persist in HAR models due to the data distribution differences between training and real-world data distributions, particularly evident in cross-user scenarios. This paper introduces a novel framework, termed Diffusion-based Noise-centered… ▽ More

    Submitted 6 August, 2024; originally announced August 2024.

  3. arXiv:2408.01301  [pdf, other

    stat.ML cs.AI cs.LG

    A Decision-driven Methodology for Designing Uncertainty-aware AI Self-Assessment

    Authors: Gregory Canal, Vladimir Leung, Philip Sage, Eric Heim, I-Jeng Wang

    Abstract: Artificial intelligence (AI) has revolutionized decision-making processes and systems throughout society and, in particular, has emerged as a significant technology in high-impact scenarios of national interest. Yet, despite AI's impressive predictive capabilities in controlled settings, it still suffers from a range of practical setbacks preventing its widespread use in various critical scenarios… ▽ More

    Submitted 2 August, 2024; originally announced August 2024.

  4. arXiv:2407.13143  [pdf, other

    cs.LG cs.AR cs.DC

    Integrated Hardware Architecture and Device Placement Search

    Authors: Irene Wang, Jakub Tarnawski, Amar Phanishayee, Divya Mahajan

    Abstract: Distributed execution of deep learning training involves a dynamic interplay between hardware accelerator architecture and device placement strategy. This is the first work to explore the co-optimization of determining the optimal architecture and device placement strategy through novel algorithms, improving the balance of computational resources, memory usage, and data distribution. Our architect… ▽ More

    Submitted 18 July, 2024; originally announced July 2024.

    Comments: Accepted at the 41st International Conference on Machine Learning (ICML), 2024

  5. arXiv:2406.18569  [pdf, other

    cs.CV cs.AI

    FLOW: Fusing and Shuffling Global and Local Views for Cross-User Human Activity Recognition with IMUs

    Authors: Qi Qiu, Tao Zhu, Furong Duan, Kevin I-Kai Wang, Liming Chen, Mingxing Nie, Mingxing Nie

    Abstract: Inertial Measurement Unit (IMU) sensors are widely employed for Human Activity Recognition (HAR) due to their portability, energy efficiency, and growing research interest. However, a significant challenge for IMU-HAR models is achieving robust generalization performance across diverse users. This limitation stems from substantial variations in data distribution among individual users. One primary… ▽ More

    Submitted 3 June, 2024; originally announced June 2024.

  6. arXiv:2405.06554  [pdf, ps, other

    cs.IT

    Tradeoffs among Action Taking Policies Matter in Active Sequential Multi-Hypothesis Testing: the Optimal Error Exponent Region

    Authors: Chia-Yu Hsu, I-Hsiang Wang

    Abstract: Reliability of sequential hypothesis testing can be greatly improved when decision maker is given the freedom to adaptively take an action that determines the distribution of the current collected sample. Such advantage of sampling adaptivity has been realized since Chernoff's seminal paper in 1959 [1]. While a large body of works have explored and investigated the gain of adaptivity, in the gener… ▽ More

    Submitted 29 August, 2024; v1 submitted 10 May, 2024; originally announced May 2024.

    Comments: Submitted to the IEEE Transactions on Information Theory

  7. arXiv:2403.17958  [pdf, other

    cs.LG cs.AI cs.CV cs.HC

    Deep Generative Domain Adaptation with Temporal Attention for Cross-User Activity Recognition

    Authors: Xiaozhou Ye, Kevin I-Kai Wang

    Abstract: In Human Activity Recognition (HAR), a predominant assumption is that the data utilized for training and evaluation purposes are drawn from the same distribution. It is also assumed that all data samples are independent and identically distributed ($\displaystyle i.i.d.$). Contrarily, practical implementations often challenge this notion, manifesting data distribution discrepancies, especially in… ▽ More

    Submitted 12 March, 2024; originally announced March 2024.

  8. arXiv:2403.15424  [pdf, other

    eess.SP cs.AI cs.CV cs.HC cs.LG

    Cross-user activity recognition using deep domain adaptation with temporal relation information

    Authors: Xiaozhou Ye, Waleed H. Abdulla, Nirmal Nair, Kevin I-Kai Wang

    Abstract: Human Activity Recognition (HAR) is a cornerstone of ubiquitous computing, with promising applications in diverse fields such as health monitoring and ambient assisted living. Despite significant advancements, sensor-based HAR methods often operate under the assumption that training and testing data have identical distributions. However, in many real-world scenarios, particularly in sensor-based H… ▽ More

    Submitted 12 March, 2024; originally announced March 2024.

  9. arXiv:2403.15423  [pdf, other

    eess.SP cs.AI cs.CV cs.HC cs.LG

    Cross-user activity recognition via temporal relation optimal transport

    Authors: Xiaozhou Ye, Kevin I-Kai Wang

    Abstract: Current research on human activity recognition (HAR) mainly assumes that training and testing data are drawn from the same distribution to achieve a generalised model, which means all the data are considered to be independent and identically distributed $\displaystyle (i.i.d.) $. In many real-world applications, this assumption does not hold, and collected training and target testing datasets have… ▽ More

    Submitted 12 March, 2024; originally announced March 2024.

  10. arXiv:2403.15422  [pdf, other

    eess.SP cs.AI cs.HC cs.LG

    Machine Learning Techniques for Sensor-based Human Activity Recognition with Data Heterogeneity -- A Review

    Authors: Xiaozhou Ye, Kouichi Sakurai, Nirmal Nair, Kevin I-Kai Wang

    Abstract: Sensor-based Human Activity Recognition (HAR) is crucial in ubiquitous computing, analysing behaviours through multi-dimensional observations. Despite research progress, HAR confronts challenges, particularly in data distribution assumptions. Most studies often assume uniform data distributions across datasets, contrasting with the varied nature of practical sensor data in human activities. Addres… ▽ More

    Submitted 12 March, 2024; originally announced March 2024.

  11. arXiv:2403.14682  [pdf, other

    cs.CV cs.AI cs.HC cs.LG

    Deep Generative Domain Adaptation with Temporal Relation Knowledge for Cross-User Activity Recognition

    Authors: Xiaozhou Ye, Kevin I-Kai Wang

    Abstract: In human activity recognition (HAR), the assumption that training and testing data are independent and identically distributed (i.i.d.) often fails, particularly in cross-user scenarios where data distributions vary significantly. This discrepancy highlights the limitations of conventional domain adaptation methods in HAR, which typically overlook the inherent temporal relations in time-series dat… ▽ More

    Submitted 12 March, 2024; originally announced March 2024.

  12. arXiv:2402.17613  [pdf, other

    cs.CL

    Neural Automated Writing Evaluation with Corrective Feedback

    Authors: Izia Xiaoxiao Wang, Xihan Wu, Edith Coates, Min Zeng, Jiexin Kuang, Siliang Liu, Mengyang Qiu, Jungyeul Park

    Abstract: The utilization of technology in second language learning and teaching has become ubiquitous. For the assessment of writing specifically, automated writing evaluation (AWE) and grammatical error correction (GEC) have become immensely popular and effective methods for enhancing writing proficiency and delivering instant and individualized feedback to learners. By leveraging the power of natural lan… ▽ More

    Submitted 6 May, 2024; v1 submitted 27 February, 2024; originally announced February 2024.

    Comments: Supported by the SoTL Seed Program at UBC

  13. arXiv:2401.16213  [pdf, other

    cs.IT

    A Unified Study on Sequentiality in Universal Classification with Empirically Observed Statistics

    Authors: Ching-Fang Li, I-Hsiang Wang

    Abstract: In the binary hypothesis testing problem, it is well known that sequentiality in taking samples eradicates the trade-off between two error exponents, yet implementing the optimal test requires the knowledge of the underlying distributions, say $P_0$ and $P_1$. In the scenario where the knowledge of distributions is replaced by empirically observed statistics from the respective distributions, the… ▽ More

    Submitted 8 August, 2024; v1 submitted 29 January, 2024; originally announced January 2024.

    Comments: Submitted to the IEEE Transactions on Information Theory

  14. arXiv:2401.03065  [pdf, other

    cs.SE cs.AI cs.LG

    CRUXEval: A Benchmark for Code Reasoning, Understanding and Execution

    Authors: Alex Gu, Baptiste Rozière, Hugh Leather, Armando Solar-Lezama, Gabriel Synnaeve, Sida I. Wang

    Abstract: We present CRUXEval (Code Reasoning, Understanding, and eXecution Evaluation), a benchmark consisting of 800 Python functions (3-13 lines). Each function comes with an input-output pair, leading to two natural tasks: input prediction and output prediction. First, we propose a generic recipe for generating our execution benchmark which can be used to create future variation of the benchmark. Second… ▽ More

    Submitted 5 January, 2024; originally announced January 2024.

    Comments: 71 pages, 29 figures

  15. arXiv:2307.02623  [pdf, other

    cs.LG cs.DC

    FLuID: Mitigating Stragglers in Federated Learning using Invariant Dropout

    Authors: Irene Wang, Prashant J. Nair, Divya Mahajan

    Abstract: Federated Learning (FL) allows machine learning models to train locally on individual mobile devices, synchronizing model updates via a shared server. This approach safeguards user privacy; however, it also generates a heterogeneous training environment due to the varying performance capabilities across devices. As a result, straggler devices with lower performance often dictate the overall traini… ▽ More

    Submitted 26 September, 2023; v1 submitted 5 July, 2023; originally announced July 2023.

    Comments: Accepted at the 37th Conference on Neural Information Processing Systems (NeurIPS), 2023

  16. arXiv:2305.17300  [pdf, other

    cs.NE cs.AI cs.LG

    Exploiting Large Neuroimaging Datasets to Create Connectome-Constrained Approaches for more Robust, Efficient, and Adaptable Artificial Intelligence

    Authors: Erik C. Johnson, Brian S. Robinson, Gautam K. Vallabha, Justin Joyce, Jordan K. Matelsky, Raphael Norman-Tenazas, Isaac Western, Marisel Villafañe-Delgado, Martha Cervantes, Michael S. Robinette, Arun V. Reddy, Lindsey Kitchell, Patricia K. Rivlin, Elizabeth P. Reilly, Nathan Drenkow, Matthew J. Roos, I-Jeng Wang, Brock A. Wester, William R. Gray-Roncal, Joan A. Hoffmann

    Abstract: Despite the progress in deep learning networks, efficient learning at the edge (enabling adaptable, low-complexity machine learning solutions) remains a critical need for defense and commercial applications. We envision a pipeline to utilize large neuroimaging datasets, including maps of the brain which capture neuron and synapse connectivity, to improve machine learning approaches. We have pursue… ▽ More

    Submitted 26 May, 2023; originally announced May 2023.

    Comments: 11 pages, 4 figures

  17. arXiv:2305.14200  [pdf, other

    cs.CL cs.LG

    Accessing Higher Dimensions for Unsupervised Word Translation

    Authors: Sida I. Wang

    Abstract: The striking ability of unsupervised word translation has been demonstrated with the help of word vectors / pretraining; however, they require large amounts of data and usually fails if the data come from different domains. We propose coocmap, a method that can use either high-dimensional co-occurrence counts or their lower-dimensional approximations. Freed from the limits of low dimensions, we sh… ▽ More

    Submitted 23 May, 2023; originally announced May 2023.

    ACM Class: I.2.7

  18. arXiv:2305.08195  [pdf, other

    cs.CL

    Learning to Simulate Natural Language Feedback for Interactive Semantic Parsing

    Authors: Hao Yan, Saurabh Srivastava, Yintao Tai, Sida I. Wang, Wen-tau Yih, Ziyu Yao

    Abstract: Interactive semantic parsing based on natural language (NL) feedback, where users provide feedback to correct the parser mistakes, has emerged as a more practical scenario than the traditional one-shot semantic parsing. However, prior work has heavily relied on human-annotated feedback data to train the interactive semantic parser, which is prohibitively expensive and not scalable. In this work, w… ▽ More

    Submitted 4 June, 2023; v1 submitted 14 May, 2023; originally announced May 2023.

    Comments: Accepted to ACL 2023. 18 pages, 6 figures

  19. arXiv:2303.06032  [pdf, other

    cs.LG cs.CR cs.CV eess.IV

    Exploring Adversarial Attacks on Neural Networks: An Explainable Approach

    Authors: Justus Renkhoff, Wenkai Tan, Alvaro Velasquez, illiam Yichen Wang, Yongxin Liu, Jian Wang, Shuteng Niu, Lejla Begic Fazlic, Guido Dartmann, Houbing Song

    Abstract: Deep Learning (DL) is being applied in various domains, especially in safety-critical applications such as autonomous driving. Consequently, it is of great significance to ensure the robustness of these methods and thus counteract uncertain behaviors caused by adversarial attacks. In this paper, we use gradient heatmaps to analyze the response characteristics of the VGG-16 model when the input ima… ▽ More

    Submitted 8 March, 2023; originally announced March 2023.

  20. arXiv:2302.08468  [pdf, other

    cs.LG cs.CL cs.PL cs.SE

    LEVER: Learning to Verify Language-to-Code Generation with Execution

    Authors: Ansong Ni, Srini Iyer, Dragomir Radev, Ves Stoyanov, Wen-tau Yih, Sida I. Wang, Xi Victoria Lin

    Abstract: The advent of large language models trained on code (code LLMs) has led to significant progress in language-to-code generation. State-of-the-art approaches in this area combine LLM decoding with sample pruning and reranking using test cases or heuristics based on the execution results. However, it is challenging to obtain test cases for many real-world language-to-code applications, and heuristics… ▽ More

    Submitted 1 September, 2023; v1 submitted 16 February, 2023; originally announced February 2023.

    Comments: ICML'23; code available at https://github.com/niansong1996/lever

  21. arXiv:2301.06727  [pdf

    cs.ET physics.app-ph

    Roadmap for Unconventional Computing with Nanotechnology

    Authors: Giovanni Finocchio, Jean Anne C. Incorvia, Joseph S. Friedman, Qu Yang, Anna Giordano, Julie Grollier, Hyunsoo Yang, Florin Ciubotaru, Andrii Chumak, Azad J. Naeemi, Sorin D. Cotofana, Riccardo Tomasello, Christos Panagopoulos, Mario Carpentieri, Peng Lin, Gang Pan, J. Joshua Yang, Aida Todri-Sanial, Gabriele Boschetto, Kremena Makasheva, Vinod K. Sangwan, Amit Ranjan Trivedi, Mark C. Hersam, Kerem Y. Camsari, Peter L. McMahon , et al. (26 additional authors not shown)

    Abstract: In the "Beyond Moore's Law" era, with increasing edge intelligence, domain-specific computing embracing unconventional approaches will become increasingly prevalent. At the same time, adopting a variety of nanotechnologies will offer benefits in energy cost, computational speed, reduced footprint, cyber resilience, and processing power. The time is ripe for a roadmap for unconventional computing w… ▽ More

    Submitted 27 February, 2024; v1 submitted 17 January, 2023; originally announced January 2023.

    Comments: 80 pages accepted in Nano Futures

    Journal ref: Nano Futures (2024)

  22. arXiv:2301.05938  [pdf

    cs.CV cs.LG q-bio.QM

    Deep Learning Provides Rapid Screen for Breast Cancer Metastasis with Sentinel Lymph Nodes

    Authors: Kareem Allam, Xiaohong Iris Wang, Songlin Zhang, Jianmin Ding, Kevin Chiu, Karan Saluja, Amer Wahed, Hongxia Sun, Andy N. D. Nguyen

    Abstract: Deep learning has been shown to be useful to detect breast cancer metastases by analyzing whole slide images of sentinel lymph nodes. However, it requires extensive scanning and analysis of all the lymph nodes slides for each case. Our deep learning study focuses on breast cancer screening with only a small set of image patches from any sentinel lymph node, positive or negative for metastasis, to… ▽ More

    Submitted 14 January, 2023; originally announced January 2023.

    Comments: 9 pages, 3 figures, 5 tables

  23. arXiv:2211.16490  [pdf, other

    cs.LG cs.CL cs.PL cs.SE

    Coder Reviewer Reranking for Code Generation

    Authors: Tianyi Zhang, Tao Yu, Tatsunori B. Hashimoto, Mike Lewis, Wen-tau Yih, Daniel Fried, Sida I. Wang

    Abstract: Sampling diverse programs from a code language model and reranking with model likelihood is a popular method for code generation but it is prone to preferring degenerate solutions. Inspired by collaborative programming, we propose Coder-Reviewer reranking. We augment Coder language models from past work, which generate programs given language instructions, with Reviewer models, which evaluate the… ▽ More

    Submitted 29 November, 2022; originally announced November 2022.

  24. arXiv:2208.14808  [pdf, other

    cs.LG

    Reducing Impacts of System Heterogeneity in Federated Learning using Weight Update Magnitudes

    Authors: Irene Wang

    Abstract: The widespread adoption of handheld devices have fueled rapid growth in new applications. Several of these new applications employ machine learning models to train on user data that is typically private and sensitive. Federated Learning enables machine learning models to train locally on each handheld device while only synchronizing their neuron updates with a server. While this enables user priva… ▽ More

    Submitted 29 August, 2022; originally announced August 2022.

    Comments: Undergraduate thesis completed under advisor Dr. Prashant Nair and committee member Dr. Divya Mahajan

  25. A Risk-Sensitive Approach to Policy Optimization

    Authors: Jared Markowitz, Ryan W. Gardner, Ashley Llorens, Raman Arora, I-Jeng Wang

    Abstract: Standard deep reinforcement learning (DRL) aims to maximize expected reward, considering collected experiences equally in formulating a policy. This differs from human decision-making, where gains and losses are valued differently and outlying outcomes are given increased consideration. It also fails to capitalize on opportunities to improve safety and/or performance through the incorporation of d… ▽ More

    Submitted 15 November, 2023; v1 submitted 18 August, 2022; originally announced August 2022.

    Comments: 16 pages, 13 figures. AAAI 2023 (Special Track on Safe and Robust AI)

  26. arXiv:2204.11454  [pdf, other

    cs.CL cs.SE

    Natural Language to Code Translation with Execution

    Authors: Freda Shi, Daniel Fried, Marjan Ghazvininejad, Luke Zettlemoyer, Sida I. Wang

    Abstract: Generative models of code, pretrained on large corpora of programs, have shown great success in translating natural language to code (Chen et al., 2021; Austin et al., 2021; Li et al., 2022, inter alia). While these models do not explicitly incorporate program semantics (i.e., execution results) during training, they are able to generate correct solutions for many problems. However, choosing a sin… ▽ More

    Submitted 1 November, 2022; v1 submitted 25 April, 2022; originally announced April 2022.

    Comments: EMNLP 2022

  27. arXiv:2201.05966  [pdf, other

    cs.CL

    UnifiedSKG: Unifying and Multi-Tasking Structured Knowledge Grounding with Text-to-Text Language Models

    Authors: Tianbao Xie, Chen Henry Wu, Peng Shi, Ruiqi Zhong, Torsten Scholak, Michihiro Yasunaga, Chien-Sheng Wu, Ming Zhong, Pengcheng Yin, Sida I. Wang, Victor Zhong, Bailin Wang, Chengzu Li, Connor Boyle, Ansong Ni, Ziyu Yao, Dragomir Radev, Caiming Xiong, Lingpeng Kong, Rui Zhang, Noah A. Smith, Luke Zettlemoyer, Tao Yu

    Abstract: Structured knowledge grounding (SKG) leverages structured knowledge to complete user requests, such as semantic parsing over databases and question answering over knowledge bases. Since the inputs and outputs of SKG tasks are heterogeneous, they have been studied separately by different communities, which limits systematic and compatible research on SKG. In this paper, we overcome this limitation… ▽ More

    Submitted 18 October, 2022; v1 submitted 15 January, 2022; originally announced January 2022.

    Comments: EMNLP 2022

  28. arXiv:2111.06787  [pdf, other

    cs.CL

    BitextEdit: Automatic Bitext Editing for Improved Low-Resource Machine Translation

    Authors: Eleftheria Briakou, Sida I. Wang, Luke Zettlemoyer, Marjan Ghazvininejad

    Abstract: Mined bitexts can contain imperfect translations that yield unreliable training signals for Neural Machine Translation (NMT). While filtering such pairs out is known to improve final model quality, we argue that it is suboptimal in low-resource conditions where even mined data can be limited. In our work, we propose instead, to refine the mined bitexts via automatic editing: given a sentence in a… ▽ More

    Submitted 30 May, 2022; v1 submitted 12 November, 2021; originally announced November 2021.

  29. arXiv:2110.10661  [pdf, other

    cs.CL cs.AI cs.LG

    SILG: The Multi-environment Symbolic Interactive Language Grounding Benchmark

    Authors: Victor Zhong, Austin W. Hanjie, Sida I. Wang, Karthik Narasimhan, Luke Zettlemoyer

    Abstract: Existing work in language grounding typically study single environments. How do we build unified models that apply across multiple environments? We propose the multi-environment Symbolic Interactive Language Grounding benchmark (SILG), which unifies a collection of diverse grounded language learning environments under a common interface. SILG consists of grid-world environments that require genera… ▽ More

    Submitted 24 January, 2022; v1 submitted 20 October, 2021; originally announced October 2021.

    Comments: NeurIPS 2021. 14 pages, 8 figures

  30. Using Machine Learning to Predict Game Outcomes Based on Player-Champion Experience in League of Legends

    Authors: Tiffany D. Do, Seong Ioi Wang, Dylan S. Yu, Matthew G. McMillian, Ryan P. McMahan

    Abstract: League of Legends (LoL) is the most widely played multiplayer online battle arena (MOBA) game in the world. An important aspect of LoL is competitive ranked play, which utilizes a skill-based matchmaking system to form fair teams. However, players' skill levels vary widely depending on which champion, or hero, that they choose to play as. In this paper, we propose a method for predicting game outc… ▽ More

    Submitted 5 August, 2021; originally announced August 2021.

    Comments: 5 pages, In The 16th International Conference on the Foundations of Digital Games (FDG) 2021

  31. Content Delivery over Broadcast Erasure Channels with Distributed Random Cache

    Authors: Alireza Vahid, Shih-Chun Lin, I-Hsiang Wang, Yi-Chun Lai

    Abstract: We study the content delivery problem between a transmitter and two receivers through erasure links, when each receiver has access to some random side-information about the files requested by the other user. The random side-information is cached at the receiver via the decentralized content placement. The distributed nature of receiving terminals may also make the erasure state of two links and in… ▽ More

    Submitted 1 May, 2021; originally announced May 2021.

    Journal ref: IEEE Journal on Selected Areas in Information Theory 2021

  32. arXiv:2104.02799  [pdf, other

    cs.RO

    Out-of-Distribution Robustness with Deep Recursive Filters

    Authors: Kapil D. Katyal, I-Jeng Wang, Gregory D. Hager

    Abstract: Accurate state and uncertainty estimation is imperative for mobile robots and self driving vehicles to achieve safe navigation in pedestrian rich environments. A critical component of state and uncertainty estimation for robot navigation is to perform robustly under out-of-distribution noise. Traditional methods of state estimation decouple perception and state estimation making it difficult to op… ▽ More

    Submitted 6 April, 2021; originally announced April 2021.

  33. arXiv:2101.12653  [pdf, other

    cs.IT

    Non-adaptive Combinatorial Quantitative Group Testing with Adversarially Perturbed Measurements

    Authors: Yun-Han Li, I-Hsiang Wang

    Abstract: In this paper, combinatorial quantitative group testing (QGT) with noisy measurements is studied. The goal of QGT is to detect defective items from a data set of size $n$ with counting measurements, each of which counts the number of defects in a selected pool of items. While most literatures consider either probabilistic QGT with random noise or combinatorial QGT with noiseless measurements, our… ▽ More

    Submitted 30 January, 2022; v1 submitted 29 January, 2021; originally announced January 2021.

  34. arXiv:2101.00148  [pdf, other

    cs.CL

    Bilingual Lexicon Induction via Unsupervised Bitext Construction and Word Alignment

    Authors: Haoyue Shi, Luke Zettlemoyer, Sida I. Wang

    Abstract: Bilingual lexicons map words in one language to their translations in another, and are typically induced by learning linear projections to align monolingual word embedding spaces. In this paper, we show it is possible to produce much higher quality lexicons with methods that combine (1) unsupervised bitext mining and (2) unsupervised word alignment. Directly applying a pipeline that uses recent al… ▽ More

    Submitted 12 June, 2021; v1 submitted 31 December, 2020; originally announced January 2021.

    Comments: ACL-IJCNLP 2021 camera-ready version, with full supplementary material

  35. arXiv:2012.12291  [pdf, other

    cs.RO cs.HC cs.LG

    Learning a Group-Aware Policy for Robot Navigation

    Authors: Kapil Katyal, Yuxiang Gao, Jared Markowitz, Sara Pohland, Corban Rivera, I-Jeng Wang, Chien-Ming Huang

    Abstract: Human-aware robot navigation promises a range of applications in which mobile robots bring versatile assistance to people in common human environments. While prior research has mostly focused on modeling pedestrians as independent, intentional individuals, people move in groups; consequently, it is imperative for mobile robots to respect human groups when navigating around people. This paper explo… ▽ More

    Submitted 29 July, 2022; v1 submitted 22 December, 2020; originally announced December 2020.

    Comments: 8 pages, 4 figures

  36. arXiv:2010.10081  [pdf, ps, other

    cs.IT

    Robust Privatization with Non-Specific Tasks and the Optimal Privacy-Utility Tradeoff

    Authors: Ta-Yuan Liu, I-Hsiang Wang

    Abstract: Fundamental limits and optimal mechanisms of privacy-preserving data release that aim to minimize the privacy leakage under utility constraints of non-specific tasks are investigated. While the private feature is typically determined and known by the users who release their data, the specific task in which the released data is utilized is usually unknown. To address the lack of information of the… ▽ More

    Submitted 30 August, 2021; v1 submitted 20 October, 2020; originally announced October 2020.

    Comments: Submitted for publication

  37. arXiv:2009.07396  [pdf, other

    cs.CL cs.AI cs.DB cs.LG

    Grounded Adaptation for Zero-shot Executable Semantic Parsing

    Authors: Victor Zhong, Mike Lewis, Sida I. Wang, Luke Zettlemoyer

    Abstract: We propose Grounded Adaptation for Zero-shot Executable Semantic Parsing (GAZP) to adapt an existing semantic parser to new environments (e.g. new database schemas). GAZP combines a forward semantic parser with a backward utterance generator to synthesize data (e.g. utterances and SQL queries) in the new environment, then selects cycle-consistent examples to adapt the parser. Unlike data-augmentat… ▽ More

    Submitted 1 February, 2021; v1 submitted 15 September, 2020; originally announced September 2020.

    Comments: EMNLP 2020 long paper. 14 pages, 5 figures

  38. Using Collaborative Filtering to Recommend Champions in League of Legends

    Authors: Tiffany D. Do, Dylan S. Yu, Salman Anwer, Seong Ioi Wang

    Abstract: League of Legends (LoL), one of the most widely played computer games in the world, has over 140 playable characters known as champions that have highly varying play styles. However, there is not much work on providing champion recommendations to a player in LoL. In this paper, we propose that a recommendation system based on a collaborative filtering approach using singular value decomposition pr… ▽ More

    Submitted 17 June, 2020; originally announced June 2020.

    Comments: 4 pages, in proceedings of 2020 IEEE Conference on Games, COG 2020

    Journal ref: 2020 IEEE Conference on Games (CoG)

  39. arXiv:2005.14383  [pdf, other

    cs.IT

    Erasure Broadcast Channels with Intermittent Feedback

    Authors: Alireza Vahid, Shih-Chun Lin, I-Hsiang Wang

    Abstract: Achievable data rates in wireless systems rely heavily on the available channel state information (CSI) throughout the network. However, feedback links, which provide this information, are scarce, unreliable, and subject to security threats. In this work, we study the impact of having intermittent feedback links on the capacity region of the canonical two-user erasure broadcast channels. In our mo… ▽ More

    Submitted 5 February, 2021; v1 submitted 29 May, 2020; originally announced May 2020.

    Comments: Submitted

  40. arXiv:2005.00656  [pdf, other

    cs.CV cs.CR cs.LG

    Jacks of All Trades, Masters Of None: Addressing Distributional Shift and Obtrusiveness via Transparent Patch Attacks

    Authors: Neil Fendley, Max Lennon, I-Jeng Wang, Philippe Burlina, Nathan Drenkow

    Abstract: We focus on the development of effective adversarial patch attacks and -- for the first time -- jointly address the antagonistic objectives of attack success and obtrusiveness via the design of novel semi-transparent patches. This work is motivated by our pursuit of a systematic performance analysis of patch attack robustness with regard to geometric transformations. Specifically, we first elucida… ▽ More

    Submitted 1 May, 2020; originally announced May 2020.

  41. arXiv:2002.11174  [pdf, other

    cs.AI cs.MA

    TanksWorld: A Multi-Agent Environment for AI Safety Research

    Authors: Corban G. Rivera, Olivia Lyons, Arielle Summitt, Ayman Fatima, Ji Pak, William Shao, Robert Chalmers, Aryeh Englander, Edward W. Staley, I-Jeng Wang, Ashley J. Llorens

    Abstract: The ability to create artificial intelligence (AI) capable of performing complex tasks is rapidly outpacing our ability to ensure the safe and assured operation of AI-enabled systems. Fortunately, a landscape of AI safety research is emerging in response to this asymmetry and yet there is a long way to go. In particular, recent simulation environments created to illustrate AI safety risks are rela… ▽ More

    Submitted 25 February, 2020; originally announced February 2020.

  42. arXiv:2002.11169  [pdf, ps, other

    cs.CV

    Unsupervised Discovery, Control, and Disentanglement of Semantic Attributes with Applications to Anomaly Detection

    Authors: William Paul, I-Jeng Wang, Fady Alajaji, Philippe Burlina

    Abstract: Our work focuses on unsupervised and generative methods that address the following goals: (a) learning unsupervised generative representations that discover latent factors controlling image semantic attributes, (b) studying how this ability to control attributes formally relates to the issue of latent factor disentanglement, clarifying related but dissimilar concepts that had been confounded in th… ▽ More

    Submitted 7 June, 2021; v1 submitted 25 February, 2020; originally announced February 2020.

    Comments: MIT Neural Computation 2021, Vol 33(3), pp. 802--826

  43. arXiv:1910.05912  [pdf, other

    cs.IT

    Capacity Region of Erasure Broadcast Channels with Common Message and Feedback

    Authors: Alireza Vahid, Shih-Chun Lin, I-Hsiang Wang

    Abstract: Jolfaei et al. used feedback to create transmit signals that are simultaneously useful for multiple users in a broadcast channel. Later, Georgiadis and Tassiulas studied erasure broadcast channels with feedback, and presented the capacity region under certain assumptions. These results provided the fundamental ideas used in communication protocols for networks with delayed channel state informatio… ▽ More

    Submitted 15 May, 2020; v1 submitted 14 October, 2019; originally announced October 2019.

    Comments: Technical report, 2020

  44. In-network Congestion-aware Load Balancing at Transport Layer

    Authors: Ashkan Aghdai, Michael I. -C. Wang, Yang Xu, Charles H. -P. Wen, H. Jonathan Chao

    Abstract: Load balancing at transport layer is an important function in data centers, content delivery networks, and mobile networks, where per-connection consistency (PCC) has to be met for optimal performance. Cloud-native L4 load balancers are commonly deployed as virtual network functions (VNFs) and are a critical forwarding element in modern cloud infrastructure. We identify load imbalance among servic… ▽ More

    Submitted 13 June, 2019; v1 submitted 23 November, 2018; originally announced November 2018.

  45. arXiv:1811.02668  [pdf

    cs.CV cs.LG stat.ML

    Automated Diagnosis of Lymphoma with Digital Pathology Images Using Deep Learning

    Authors: Hanadi El Achi, Tatiana Belousova, Lei Chen, Amer Wahed, Iris Wang, Zhihong Hu, Zeyad Kanaan, Adan Rios, Andy N. D. Nguyen

    Abstract: Recent studies have shown promising results in using Deep Learning to detect malignancy in whole slide imaging. However, they were limited to just predicting positive or negative finding for a specific neoplasm. We attempted to use Deep Learning with a convolutional neural network algorithm to build a lymphoma diagnostic model for four diagnostic categories: benign lymph node, diffuse large B cell… ▽ More

    Submitted 30 October, 2018; originally announced November 2018.

    Comments: 13 pages, 2 figures, 2 tables

  46. arXiv:1810.13247  [pdf

    cs.LG q-bio.QM stat.ML

    Application of Deep Learning on Predicting Prognosis of Acute Myeloid Leukemia with Cytogenetics, Age, and Mutations

    Authors: Mei Lin, Vanya Jaitly, Iris Wang, Zhihong Hu, Lei Chen, Md. Amer Wahed, Zeyad Kanaan, Adan Rios, Andy N. D. Nguyen

    Abstract: We explore how Deep Learning (DL) can be utilized to predict prognosis of acute myeloid leukemia (AML). Out of TCGA (The Cancer Genome Atlas) database, 94 AML cases are used in this study. Input data include age, 10 common cytogenetic and 23 most common mutation results; output is the prognosis (diagnosis to death, DTD). In our DL network, autoencoders are stacked to form a hierarchical DL model f… ▽ More

    Submitted 30 October, 2018; originally announced October 2018.

    Comments: 11 pages, 1 table, 1 figure. arXiv admin note: substantial text overlap with arXiv:1801.01019

  47. arXiv:1805.10997  [pdf, other

    cs.CV

    Adversarial Examples in Remote Sensing

    Authors: Wojciech Czaja, Neil Fendley, Michael Pekala, Christopher Ratto, I-Jeng Wang

    Abstract: This paper considers attacks against machine learning algorithms used in remote sensing applications, a domain that presents a suite of challenges that are not fully addressed by current research focused on natural image data such as ImageNet. In particular, we present a new study of adversarial examples in the context of satellite image classification problems. Using a recently curated data set a… ▽ More

    Submitted 28 May, 2018; originally announced May 2018.

  48. arXiv:1805.03554  [pdf, other

    cs.IT math.ST

    Anonymous Heterogeneous Distributed Detection: Optimal Decision Rules, Error Exponents, and the Price of Anonymity

    Authors: Wei-Ning Chen, I-Hsiang Wang

    Abstract: We explore the fundamental limits of heterogeneous distributed detection in an anonymous sensor network with n sensors and a single fusion center. The fusion center collects the single observation from each of the n sensors to detect a binary parameter. The sensors are clustered into multiple groups, and different groups follow different distributions under a given hypothesis. The key challenge fo… ▽ More

    Submitted 29 July, 2018; v1 submitted 9 May, 2018; originally announced May 2018.

    Comments: Submitted to IEEE Transactions on Information Theory. Parts of this paper was presented at ISIT 2018

  49. arXiv:1805.02527  [pdf, other

    cs.IT

    Degrees of Freedom of the Bursty MIMO X Channel with Instantaneous Topological Information

    Authors: Shih-Yi Yeh, I-Hsiang Wang

    Abstract: We study the effects of instantaneous feedback of channel topology on the degrees of freedom (DoF) of the bursty MIMO X channel, where the four transmitter-receiver links are intermittently on-and-off, governed by four independent Bernoulli $(p)$ random sequences, and each transmitter and receiver are equipped with $M$ and $N$ antennas, respectively. We partially characterize this channel: The sum… ▽ More

    Submitted 7 May, 2018; originally announced May 2018.

    Comments: This is the full version of the paper accepted by IEEE International Symposium on Information Theory (ISIT) 2018

  50. arXiv:1802.00926  [pdf, ps, other

    cs.IT math.ST stat.ML

    On the Minimax Misclassification Ratio of Hypergraph Community Detection

    Authors: I Chien, Chung-Yi Lin, I-Hsiang Wang

    Abstract: Community detection in hypergraphs is explored. Under a generative hypergraph model called "d-wise hypergraph stochastic block model" (d-hSBM) which naturally extends the Stochastic Block Model from graphs to d-uniform hypergraphs, the asymptotic minimax mismatch ratio is characterized. For proving the achievability, we propose a two-step polynomial time algorithm that achieves the fundamental lim… ▽ More

    Submitted 3 February, 2018; originally announced February 2018.

    Comments: Submitted to IEEE Transactions on Information Theory. Parts of this paper was presented at ISIT 2017 and to appear at AISTATS 2018