We propose a novel method, atommodeling, that can discretize a continuous latent space by drawing an analogybetween a data point and an atom, which is naturally spaced away from other data points with distances depending on their intra structures.
Specifically, we model each data point as an atom composed of electrons, protons, and neutrons and minimize the potential energy caused by the interatomic force among datapoints.
Reproducibility is an increasing concern in Artificial Intelligence (AI),
particularly in the area of Deep Learning (DL). Being able to reproduce DL
models is crucial for AI-based systems, as it is cl
There is currently a burgeoning demand for deploying deep learning (DL)
models on ubiquitous edge Internet of Things devices attributing to their low
latency and high privacy preservation. However, DL
We investigate a new method for injecting backdoors into machine learning
models, based on poisoning the loss computation in the model-training code. Our
attack is \emph{blind}: the attacker cannot mo
This paper investigates the problem of forecasting multivariate aggregated human mobility while preserving the privacy of the individuals concerned.
Differentially privacy, a state-of-the-art formal notion, has been used as the privacy guarantee in two different and independent steps when training deeplearning models.
We propose a probe for the analysis of deep learning architectures that is based on machine learning and approximation theoretical principles.
Given a deep learning architecture and a training set, during or after training, the sparsity probe allows to analyze the performance of intermediate layers by quantifying the geometrical features of representations of the training set.
Modern image files are usually progressively transmitted and provide a
preview before downloading the entire image for improved user experience to
cope with a slow network connection. In this paper, w
Handwritten text recognition is an open problem of great interest in the area
of automatic document image analysis. The transcription of handwritten content
present in digitized documents is significa
The necessity of deep learning for tabular data is still an unanswered
question addressed by a large number of research efforts. The recent literature
on tabular DL proposes several deep architectures
Adversarial robustness studies the worst-case performance of a machine
learning model to ensure safety and reliability. With the proliferation of
deep-learning based technology, the potential risks as
Solomonoff's general theory of inference and the Minimum Description Length
principle formalize Occam's razor, and hold that a good model of data is a
model that is good at losslessly compressing the
The graph neural networking challenge 2021 brings a practical limitation of existing solutions for networking : the lack of generalization to larger networks including higher link capacities and aggregated traffic on links.
This paper approaches the scaling problem by presenting a graph neural network-based solution that can effectively scale to larger networks including higher link capacities and aggregated traffic on links.
Today's proliferation of powerful facial recognition models poses a real threat to personal privacy. As Clearview.ai demonstrated, anyone can canvas the Internet for data, and train highly accurate fa
It is difficult for humans to distinguish the true and false of rumors, but
current deep learning models can surpass humans and achieve excellent accuracy
on many rumor datasets. In this paper, we inv
Crucial for building trust in deep learning models for critical real-world
applications is efficient and theoretically sound uncertainty quantification, a
task that continues to be challenging. Useful
Time Series Forecasting (TSF) is used to predict the target variables at a
future time point based on the learning from previous time points. To keep the
problem tractable, learning methods use data f
We explore the use of multiple deep learning models for detecting flaws in
software programs. Current, standard approaches for flaw detection rely on a
single representation of a software program (e.g
With the availability of large databases and recent improvements in deep
learning methodology, the performance of AI systems is reaching or even
exceeding the human level on an increasing number of co
In this paper, we propose a novel design for protecting deeplearning model structure and parameters.
It hides communication address, layer parametersand operations, and forward as well as backward message flows among nonadjacent layers using the ideas from mix networks.