-
Self-Recognition in Language Models
Authors:
Tim R. Davidson,
Viacheslav Surkov,
Veniamin Veselovsky,
Giuseppe Russo,
Robert West,
Caglar Gulcehre
Abstract:
A rapidly growing number of applications rely on a small set of closed-source language models (LMs). This dependency might introduce novel security risks if LMs develop self-recognition capabilities. Inspired by human identity verification methods, we propose a novel approach for assessing self-recognition in LMs using model-generated "security questions". Our test can be externally administered t…
▽ More
A rapidly growing number of applications rely on a small set of closed-source language models (LMs). This dependency might introduce novel security risks if LMs develop self-recognition capabilities. Inspired by human identity verification methods, we propose a novel approach for assessing self-recognition in LMs using model-generated "security questions". Our test can be externally administered to keep track of frontier models as it does not require access to internal model parameters or output probabilities. We use our test to examine self-recognition in ten of the most capable open- and closed-source LMs currently publicly available. Our extensive experiments found no empirical evidence of general or consistent self-recognition in any examined LM. Instead, our results suggest that given a set of alternatives, LMs seek to pick the "best" answer, regardless of its origin. Moreover, we find indications that preferences about which models produce the best answers are consistent across LMs. We additionally uncover novel insights on position bias considerations for LMs in multiple-choice settings.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
The AI Review Lottery: Widespread AI-Assisted Peer Reviews Boost Paper Scores and Acceptance Rates
Authors:
Giuseppe Russo Latona,
Manoel Horta Ribeiro,
Tim R. Davidson,
Veniamin Veselovsky,
Robert West
Abstract:
Journals and conferences worry that peer reviews assisted by artificial intelligence (AI), in particular, large language models (LLMs), may negatively influence the validity and fairness of the peer-review system, a cornerstone of modern science. In this work, we address this concern with a quasi-experimental study of the prevalence and impact of AI-assisted peer reviews in the context of the 2024…
▽ More
Journals and conferences worry that peer reviews assisted by artificial intelligence (AI), in particular, large language models (LLMs), may negatively influence the validity and fairness of the peer-review system, a cornerstone of modern science. In this work, we address this concern with a quasi-experimental study of the prevalence and impact of AI-assisted peer reviews in the context of the 2024 International Conference on Learning Representations (ICLR), a large and prestigious machine-learning conference. Our contributions are threefold. Firstly, we obtain a lower bound for the prevalence of AI-assisted reviews at ICLR 2024 using the GPTZero LLM detector, estimating that at least $15.8\%$ of reviews were written with AI assistance. Secondly, we estimate the impact of AI-assisted reviews on submission scores. Considering pairs of reviews with different scores assigned to the same paper, we find that in $53.4\%$ of pairs the AI-assisted review scores higher than the human review ($p = 0.002$; relative difference in probability of scoring higher: $+14.4\%$ in favor of AI-assisted reviews). Thirdly, we assess the impact of receiving an AI-assisted peer review on submission acceptance. In a matched study, submissions near the acceptance threshold that received an AI-assisted peer review were $4.9$ percentage points ($p = 0.024$) more likely to be accepted than submissions that did not. Overall, we show that AI-assisted reviews are consequential to the peer-review process and offer a discussion on future implications of current trends
△ Less
Submitted 3 May, 2024;
originally announced May 2024.
-
Evaluating Language Model Agency through Negotiations
Authors:
Tim R. Davidson,
Veniamin Veselovsky,
Martin Josifoski,
Maxime Peyrard,
Antoine Bosselut,
Michal Kosinski,
Robert West
Abstract:
We introduce an approach to evaluate language model (LM) agency using negotiation games. This approach better reflects real-world use cases and addresses some of the shortcomings of alternative LM benchmarks. Negotiation games enable us to study multi-turn, and cross-model interactions, modulate complexity, and side-step accidental evaluation data leakage. We use our approach to test six widely us…
▽ More
We introduce an approach to evaluate language model (LM) agency using negotiation games. This approach better reflects real-world use cases and addresses some of the shortcomings of alternative LM benchmarks. Negotiation games enable us to study multi-turn, and cross-model interactions, modulate complexity, and side-step accidental evaluation data leakage. We use our approach to test six widely used and publicly accessible LMs, evaluating performance and alignment in both self-play and cross-play settings. Noteworthy findings include: (i) only closed-source models tested here were able to complete these tasks; (ii) cooperative bargaining games proved to be most challenging to the models; and (iii) even the most powerful models sometimes "lose" to weaker opponents
△ Less
Submitted 16 March, 2024; v1 submitted 9 January, 2024;
originally announced January 2024.
-
AI capabilities can be significantly improved without expensive retraining
Authors:
Tom Davidson,
Jean-Stanislas Denain,
Pablo Villalobos,
Guillem Bas
Abstract:
State-of-the-art AI systems can be significantly improved without expensive retraining via "post-training enhancements"-techniques applied after initial training like fine-tuning the system to use a web browser. We review recent post-training enhancements, categorizing them into five types: tool-use, prompting methods, scaffolding, solution selection, and data generation. Different enhancements im…
▽ More
State-of-the-art AI systems can be significantly improved without expensive retraining via "post-training enhancements"-techniques applied after initial training like fine-tuning the system to use a web browser. We review recent post-training enhancements, categorizing them into five types: tool-use, prompting methods, scaffolding, solution selection, and data generation. Different enhancements improve performance on different tasks, making it hard to compare their significance. So we translate improvements from different enhancements into a common currency, the compute-equivalent gain: how much additional training compute would be needed to improve performance by the same amount as the enhancement. Our non-experimental work shows that post-training enhancements have significant benefits: most surveyed enhancements improve benchmark performance by more than a 5x increase in training compute, some by more than 20x. Post-training enhancements are relatively cheap to develop: fine-tuning costs are typically <1% of the original training cost. Governing the development of capable post-training enhancements may be challenging because frontier models could be enhanced by a wide range of actors.
△ Less
Submitted 12 December, 2023;
originally announced December 2023.
-
COBRA Frames: Contextual Reasoning about Effects and Harms of Offensive Statements
Authors:
Xuhui Zhou,
Hao Zhu,
Akhila Yerukola,
Thomas Davidson,
Jena D. Hwang,
Swabha Swayamdipta,
Maarten Sap
Abstract:
Warning: This paper contains content that may be offensive or upsetting. Understanding the harms and offensiveness of statements requires reasoning about the social and situational context in which statements are made. For example, the utterance "your English is very good" may implicitly signal an insult when uttered by a white man to a non-white colleague, but uttered by an ESL teacher to their s…
▽ More
Warning: This paper contains content that may be offensive or upsetting. Understanding the harms and offensiveness of statements requires reasoning about the social and situational context in which statements are made. For example, the utterance "your English is very good" may implicitly signal an insult when uttered by a white man to a non-white colleague, but uttered by an ESL teacher to their student would be interpreted as a genuine compliment. Such contextual factors have been largely ignored by previous approaches to toxic language detection. We introduce COBRA frames, the first context-aware formalism for explaining the intents, reactions, and harms of offensive or biased statements grounded in their social and situational context. We create COBRACORPUS, a dataset of 33k potentially offensive statements paired with machine-generated contexts and free-text explanations of offensiveness, implied biases, speaker intents, and listener reactions. To study the contextual dynamics of offensiveness, we train models to generate COBRA explanations, with and without access to the context. We find that explanations by context-agnostic models are significantly worse than by context-aware ones, especially in situations where the context inverts the statement's offensiveness (29% accuracy drop). Our work highlights the importance and feasibility of contextualized NLP by modeling social factors.
△ Less
Submitted 8 June, 2023; v1 submitted 2 June, 2023;
originally announced June 2023.
-
Partisan US News Media Representations of Syrian Refugees
Authors:
Keyu Chen,
Marzieh Babaeianjelodar,
Yiwen Shi,
Kamila Janmohamed,
Rupak Sarkar,
Ingmar Weber,
Thomas Davidson,
Munmun De Choudhury,
Jonathan Huang,
Shweta Yadav,
Ashique Khudabukhsh,
Preslav Ivanov Nakov,
Chris Bauch,
Orestis Papakyriakopoulos,
Kaveh Khoshnood,
Navin Kumar
Abstract:
We investigate how representations of Syrian refugees (2011-2021) differ across US partisan news outlets. We analyze 47,388 articles from the online US media about Syrian refugees to detail differences in reporting between left- and right-leaning media. We use various NLP techniques to understand these differences. Our polarization and question answering results indicated that left-leaning media t…
▽ More
We investigate how representations of Syrian refugees (2011-2021) differ across US partisan news outlets. We analyze 47,388 articles from the online US media about Syrian refugees to detail differences in reporting between left- and right-leaning media. We use various NLP techniques to understand these differences. Our polarization and question answering results indicated that left-leaning media tended to represent refugees as child victims, welcome in the US, and right-leaning media cast refugees as Islamic terrorists. We noted similar results with our sentiment and offensive speech scores over time, which detail possibly unfavorable representations of refugees in right-leaning media. A strength of our work is how the different techniques we have applied validate each other. Based on our results, we provide several recommendations. Stakeholders may utilize our findings to intervene around refugee representations, and design communications campaigns that improve the way society sees refugees and possibly aid refugee outcomes.
△ Less
Submitted 17 June, 2022;
originally announced June 2022.
-
Learning for Unconstrained Space-Time Video Super-Resolution
Authors:
Zhihao Shi,
Xiaohong Liu,
Chengqi Li,
Linhui Dai,
Jun Chen,
Timothy N. Davidson,
Jiying Zhao
Abstract:
Recent years have seen considerable research activities devoted to video enhancement that simultaneously increases temporal frame rate and spatial resolution. However, the existing methods either fail to explore the intrinsic relationship between temporal and spatial information or lack flexibility in the choice of final temporal/spatial resolution. In this work, we propose an unconstrained space-…
▽ More
Recent years have seen considerable research activities devoted to video enhancement that simultaneously increases temporal frame rate and spatial resolution. However, the existing methods either fail to explore the intrinsic relationship between temporal and spatial information or lack flexibility in the choice of final temporal/spatial resolution. In this work, we propose an unconstrained space-time video super-resolution network, which can effectively exploit space-time correlation to boost performance. Moreover, it has complete freedom in adjusting the temporal frame rate and spatial resolution through the use of the optical flow technique and a generalized pixelshuffle operation. Our extensive experiments demonstrate that the proposed method not only outperforms the state-of-the-art, but also requires far fewer parameters and less running time.
△ Less
Submitted 31 August, 2021; v1 submitted 25 February, 2021;
originally announced February 2021.
-
Aggregate-Driven Trace Visualizations for Performance Debugging
Authors:
Vaastav Anand,
Matheus Stolet,
Thomas Davidson,
Ivan Beschastnikh,
Tamara Munzner,
Jonathan Mace
Abstract:
Performance issues in cloud systems are hard to debug. Distributed tracing is a widely adopted approach that gives engineers visibility into cloud systems. Existing trace analysis approaches focus on debugging single request correctness issues but not debugging single request performance issues. Diagnosing a performance issue in a given request requires comparing the performance of the offending r…
▽ More
Performance issues in cloud systems are hard to debug. Distributed tracing is a widely adopted approach that gives engineers visibility into cloud systems. Existing trace analysis approaches focus on debugging single request correctness issues but not debugging single request performance issues. Diagnosing a performance issue in a given request requires comparing the performance of the offending request with the aggregate performance of typical requests. Effective and efficient debugging of such issues faces three challenges: (i) identifying the correct aggregate data for diagnosis; (ii) visualizing the aggregated data; and (iii) efficiently collecting, storing, and processing trace data.
We present TraVista, a tool designed for debugging performance issues in a single trace that addresses these challenges. TraVista extends the popular single trace Gantt chart visualization with three types of aggregate data - metric, temporal, and structure data, to contextualize the performance of the offending trace across all traces.
△ Less
Submitted 26 October, 2020;
originally announced October 2020.
-
Examining Racial Bias in an Online Abuse Corpus with Structural Topic Modeling
Authors:
Thomas Davidson,
Debasmita Bhattacharya
Abstract:
We use structural topic modeling to examine racial bias in data collected to train models to detect hate speech and abusive language in social media posts. We augment the abusive language dataset by adding an additional feature indicating the predicted probability of the tweet being written in African-American English. We then use structural topic modeling to examine the content of the tweets and…
▽ More
We use structural topic modeling to examine racial bias in data collected to train models to detect hate speech and abusive language in social media posts. We augment the abusive language dataset by adding an additional feature indicating the predicted probability of the tweet being written in African-American English. We then use structural topic modeling to examine the content of the tweets and how the prevalence of different topics is related to both abusiveness annotation and dialect prediction. We find that certain topics are disproportionately racialized and considered abusive. We discuss how topic modeling may be a useful approach for identifying bias in annotated data.
△ Less
Submitted 26 May, 2020;
originally announced May 2020.
-
Increasing Expressivity of a Hyperspherical VAE
Authors:
Tim R. Davidson,
Jakub M. Tomczak,
Efstratios Gavves
Abstract:
Learning suitable latent representations for observed, high-dimensional data is an important research topic underlying many recent advances in machine learning. While traditionally the Gaussian normal distribution has been the go-to latent parameterization, recently a variety of works have successfully proposed the use of manifold-valued latents. In one such work (Davidson et al., 2018), the autho…
▽ More
Learning suitable latent representations for observed, high-dimensional data is an important research topic underlying many recent advances in machine learning. While traditionally the Gaussian normal distribution has been the go-to latent parameterization, recently a variety of works have successfully proposed the use of manifold-valued latents. In one such work (Davidson et al., 2018), the authors empirically show the potential benefits of using a hyperspherical von Mises-Fisher (vMF) distribution in low dimensionality. However, due to the unique distributional form of the vMF, expressivity in higher dimensional space is limited as a result of its scalar concentration parameter leading to a 'hyperspherical bottleneck'. In this work we propose to extend the usability of hyperspherical parameterizations to higher dimensions using a product-space instead, showing improved results on a selection of image datasets.
△ Less
Submitted 7 October, 2019;
originally announced October 2019.
-
Racial Bias in Hate Speech and Abusive Language Detection Datasets
Authors:
Thomas Davidson,
Debasmita Bhattacharya,
Ingmar Weber
Abstract:
Technologies for abusive language detection are being developed and applied with little consideration of their potential biases. We examine racial bias in five different sets of Twitter data annotated for hate speech and abusive language. We train classifiers on these datasets and compare the predictions of these classifiers on tweets written in African-American English with those written in Stand…
▽ More
Technologies for abusive language detection are being developed and applied with little consideration of their potential biases. We examine racial bias in five different sets of Twitter data annotated for hate speech and abusive language. We train classifiers on these datasets and compare the predictions of these classifiers on tweets written in African-American English with those written in Standard American English. The results show evidence of systematic racial bias in all datasets, as classifiers trained on them tend to predict that tweets written in African-American English are abusive at substantially higher rates. If these abusive language detection systems are used in the field they will therefore have a disproportionate negative impact on African-American social media users. Consequently, these systems may discriminate against the groups who are often the targets of the abuse we are trying to detect.
△ Less
Submitted 29 May, 2019;
originally announced May 2019.
-
Reparameterizing Distributions on Lie Groups
Authors:
Luca Falorsi,
Pim de Haan,
Tim R. Davidson,
Patrick Forré
Abstract:
Reparameterizable densities are an important way to learn probability distributions in a deep learning setting. For many distributions it is possible to create low-variance gradient estimators by utilizing a `reparameterization trick'. Due to the absence of a general reparameterization trick, much research has recently been devoted to extend the number of reparameterizable distributional families.…
▽ More
Reparameterizable densities are an important way to learn probability distributions in a deep learning setting. For many distributions it is possible to create low-variance gradient estimators by utilizing a `reparameterization trick'. Due to the absence of a general reparameterization trick, much research has recently been devoted to extend the number of reparameterizable distributional families. Unfortunately, this research has primarily focused on distributions defined in Euclidean space, ruling out the usage of one of the most influential class of spaces with non-trivial topologies: Lie groups. In this work we define a general framework to create reparameterizable densities on arbitrary Lie groups, and provide a detailed practitioners guide to further the ease of usage. We demonstrate how to create complex and multimodal distributions on the well known oriented group of 3D rotations, $\operatorname{SO}(3)$, using normalizing flows. Our experiments on applying such distributions in a Bayesian setting for pose estimation on objects with discrete and continuous symmetries, showcase their necessity in achieving realistic uncertainty estimates.
△ Less
Submitted 7 March, 2019;
originally announced March 2019.
-
Uplink Resource Allocation for Multiple Access Computational Offloading (Extended Version)
Authors:
Mahsa Salmani,
Timothy N. Davidson
Abstract:
The mobile edge computing framework offers the opportunity to reduce the energy that devices must expend to complete computational tasks. The extent of that energy reduction depends on the nature of the tasks, and on the choice of the multiple access scheme. In this paper, we first address the uplink communication resource allocation for offloading systems that exploit the full capabilities of the…
▽ More
The mobile edge computing framework offers the opportunity to reduce the energy that devices must expend to complete computational tasks. The extent of that energy reduction depends on the nature of the tasks, and on the choice of the multiple access scheme. In this paper, we first address the uplink communication resource allocation for offloading systems that exploit the full capabilities of the multiple access channel (FullMA). For indivisible tasks we provide a closed-form optimal solution of the energy minimization problem when a given set of users with different latency constraints are offloading, and a tailored greedy search algorithm for finding a good set of offloading users. For divisible tasks we develop a low-complexity algorithm to find a stationary solution. To highlight the impact of the choice of multiple access scheme, we also consider the TDMA scheme, which, in general, cannot exploit the full capabilities of the channel, and we develop low-complexity optimal resource allocation algorithms for indivisible and divisible tasks under that scheme. The energy reduction facilitated by FullMA is illustrated in our numerical experiments. Further, those results show that the proposed algorithms outperform existing algorithms in terms of energy consumption and computational cost.
△ Less
Submitted 29 April, 2019; v1 submitted 19 September, 2018;
originally announced September 2018.
-
Explorations in Homeomorphic Variational Auto-Encoding
Authors:
Luca Falorsi,
Pim de Haan,
Tim R. Davidson,
Nicola De Cao,
Maurice Weiler,
Patrick Forré,
Taco S. Cohen
Abstract:
The manifold hypothesis states that many kinds of high-dimensional data are concentrated near a low-dimensional manifold. If the topology of this data manifold is non-trivial, a continuous encoder network cannot embed it in a one-to-one manner without creating holes of low density in the latent space. This is at odds with the Gaussian prior assumption typically made in Variational Auto-Encoders (V…
▽ More
The manifold hypothesis states that many kinds of high-dimensional data are concentrated near a low-dimensional manifold. If the topology of this data manifold is non-trivial, a continuous encoder network cannot embed it in a one-to-one manner without creating holes of low density in the latent space. This is at odds with the Gaussian prior assumption typically made in Variational Auto-Encoders (VAEs), because the density of a Gaussian concentrates near a blob-like manifold.
In this paper we investigate the use of manifold-valued latent variables. Specifically, we focus on the important case of continuously differentiable symmetry groups (Lie groups), such as the group of 3D rotations $\operatorname{SO}(3)$. We show how a VAE with $\operatorname{SO}(3)$-valued latent variables can be constructed, by extending the reparameterization trick to compact connected Lie groups. Our experiments show that choosing manifold-valued latent variables that match the topology of the latent data manifold, is crucial to preserve the topological structure and learn a well-behaved latent space.
△ Less
Submitted 12 July, 2018;
originally announced July 2018.
-
Multiple Access Computational Offloading: Communication Resource Allocation in the Two-User Case (Extended Version)
Authors:
Mahsa Salmani,
Timothy N. Davidson
Abstract:
By offering shared computational facilities to which mobile devices can offload their computational tasks, the mobile edge computing framework is expanding the scope of applications that can be provided on resource-constrained devices. When multiple devices seek to use such a facility simultaneously, both the available computational resources and the available communication resources need to be ap…
▽ More
By offering shared computational facilities to which mobile devices can offload their computational tasks, the mobile edge computing framework is expanding the scope of applications that can be provided on resource-constrained devices. When multiple devices seek to use such a facility simultaneously, both the available computational resources and the available communication resources need to be appropriately allocated. In this manuscript, we seek insight into the impact of the choice of the multiple access scheme by develo** solutions to the mobile energy minimization problem in the two-user case with plentiful shared computational resources. In that setting, the allocation of communication resources is constrained by the latency constraints of the applications, the computational capabilities and the transmission power constraints of the devices, and the achievable rate region of the chosen multiple access scheme. For both indivisible tasks and the limiting case of tasks that can be infinitesimally partitioned, we provide a closed-form and quasi-closed-form solution, respectively, for systems that can exploit the full capabilities of the multiple access channel, and for systems based on time-division multiple access (TDMA). For indivisible tasks, we also provide quasi-closed-form solutions for systems that employ sequential decoding without time sharing or independent decoding. Analyses of our results show that when the channel gains are equal and the transmission power budgets are larger than a threshold, TDMA (and the suboptimal multiple access schemes that we have considered) can achieve an optimal solution. However, when the channel gains of each user are significantly different and the latency constraints are tight, systems that take advantage of the full capabilities of the multiple access channel can substantially reduce the energy required to offload.
△ Less
Submitted 14 October, 2018; v1 submitted 13 May, 2018;
originally announced May 2018.
-
Hyperspherical Variational Auto-Encoders
Authors:
Tim R. Davidson,
Luca Falorsi,
Nicola De Cao,
Thomas Kipf,
Jakub M. Tomczak
Abstract:
The Variational Auto-Encoder (VAE) is one of the most used unsupervised machine learning models. But although the default choice of a Gaussian distribution for both the prior and posterior represents a mathematically convenient distribution often leading to competitive results, we show that this parameterization fails to model data with a latent hyperspherical structure. To address this issue we p…
▽ More
The Variational Auto-Encoder (VAE) is one of the most used unsupervised machine learning models. But although the default choice of a Gaussian distribution for both the prior and posterior represents a mathematically convenient distribution often leading to competitive results, we show that this parameterization fails to model data with a latent hyperspherical structure. To address this issue we propose using a von Mises-Fisher (vMF) distribution instead, leading to a hyperspherical latent space. Through a series of experiments we show how such a hyperspherical VAE, or $\mathcal{S}$-VAE, is more suitable for capturing data with a hyperspherical latent structure, while outperforming a normal, $\mathcal{N}$-VAE, in low dimensions on other data types. Code at http://github.com/nicola-decao/s-vae-tf and https://github.com/nicola-decao/s-vae-pytorch
△ Less
Submitted 27 September, 2022; v1 submitted 3 April, 2018;
originally announced April 2018.
-
Offset-Based Beamforming: A New Approach to Robust Downlink Transmission
Authors:
Mostafa Medra,
Yongwei Huang,
Timothy N. Davidson
Abstract:
The design of a set of beamformers for the multiuser multiple-input single-output (MISO) downlink that provides the receivers with prespecified levels of quality-of-service (QoS) can be quite challenging when the channel state information is not perfectly known at the base station. The constraint of having the SINR meet or exceed a given threshold with high probability is intractable in general, w…
▽ More
The design of a set of beamformers for the multiuser multiple-input single-output (MISO) downlink that provides the receivers with prespecified levels of quality-of-service (QoS) can be quite challenging when the channel state information is not perfectly known at the base station. The constraint of having the SINR meet or exceed a given threshold with high probability is intractable in general, which results in problems that are fundamentally hard to solve. In this paper, we will develop a high quality approximation of the SINR outage constraint that, along with a semidefinite relaxation, enables us to formulate the beamformer design problem as a convex optimization problem that can be efficiently solved. For systems in which the uncertainty size is small, a further approximation yields algorithms based on iterative evaluations of closed-form expressions that have substantially lower computational cost. Since finding the beamforming directions incurs most of the computational load of these algorithms, analogous power loading algorithms for predefined beamforming directions are developed and their performance is shown to be close to optimal. When the system contains a large number of antennas, the proposed power loading can be obtained at a computational cost that grows only linearly in the number of antennas. The proposed power loading algorithm provides an explicit relationship between the outage probability required and the power consumed, which allows us to precisely control the power consumption, and automatically identifies users who are consuming most of the power resources. The flexibility of the proposed approach is illustrated by develo** a power loading technique that minimizes an average notion of outage.
△ Less
Submitted 26 October, 2017;
originally announced October 2017.
-
Understanding Abuse: A Typology of Abusive Language Detection Subtasks
Authors:
Zeerak Waseem,
Thomas Davidson,
Dana Warmsley,
Ingmar Weber
Abstract:
As the body of research on abusive language detection and analysis grows, there is a need for critical consideration of the relationships between different subtasks that have been grouped under this label. Based on work on hate speech, cyberbullying, and online abuse we propose a typology that captures central similarities and differences between subtasks and we discuss its implications for data a…
▽ More
As the body of research on abusive language detection and analysis grows, there is a need for critical consideration of the relationships between different subtasks that have been grouped under this label. Based on work on hate speech, cyberbullying, and online abuse we propose a typology that captures central similarities and differences between subtasks and we discuss its implications for data annotation and feature construction. We emphasize the practical actions that can be taken by researchers to best approach their abusive language detection subtask of interest.
△ Less
Submitted 30 May, 2017; v1 submitted 28 May, 2017;
originally announced May 2017.
-
Low-Complexity Robust MISO Downlink Precoder Design With Per-Antenna Power Constraints
Authors:
Mostafa Medra,
Timothy N. Davidson
Abstract:
This paper considers the design of the beamformers for a multiple-input single-output (MISO) downlink system that seeks to mitigate the impact of the imperfections in the channel state information (CSI) that is available at the base station (BS). The goal of the design is to minimize the outage probability of specified signal-to-interference-and-noise ratio (SINR) targets, while satisfying per-ant…
▽ More
This paper considers the design of the beamformers for a multiple-input single-output (MISO) downlink system that seeks to mitigate the impact of the imperfections in the channel state information (CSI) that is available at the base station (BS). The goal of the design is to minimize the outage probability of specified signal-to-interference-and-noise ratio (SINR) targets, while satisfying per-antenna power constraints (PAPCs), and to do so at a low computational cost. Based on insights from the offset maximization technique for robust beamforming, and observations regarding the structure of the optimality conditions, low-complexity iterative algorithms that involve the evaluation of closed-form expressions are developed. To further reduce the computational cost, algorithms are developed for per-antenna power-constrained variants of the zero-forcing (ZF) and maximum ratio transmission (MRT) beamforming directions. In the MRT case, our low-complexity version for systems with a large number of antennas may be of independent interest. The proposed algorithms are extended to systems with both PAPCs and a total power constraint. Simulation results show that the proposed robust designs can provide substantial gains in the outage probability while satisfying the PAPCs.
△ Less
Submitted 25 April, 2017;
originally announced April 2017.
-
Automated Hate Speech Detection and the Problem of Offensive Language
Authors:
Thomas Davidson,
Dana Warmsley,
Michael Macy,
Ingmar Weber
Abstract:
A key challenge for automatic hate-speech detection on social media is the separation of hate speech from other instances of offensive language. Lexical detection methods tend to have low precision because they classify all messages containing particular terms as hate speech and previous work using supervised learning has failed to distinguish between the two categories. We used a crowd-sourced ha…
▽ More
A key challenge for automatic hate-speech detection on social media is the separation of hate speech from other instances of offensive language. Lexical detection methods tend to have low precision because they classify all messages containing particular terms as hate speech and previous work using supervised learning has failed to distinguish between the two categories. We used a crowd-sourced hate speech lexicon to collect tweets containing hate speech keywords. We use crowd-sourcing to label a sample of these tweets into three categories: those containing hate speech, only offensive language, and those with neither. We train a multi-class classifier to distinguish between these different categories. Close analysis of the predictions and the errors shows when we can reliably separate hate speech from other offensive language and when this differentiation is more difficult. We find that racist and homophobic tweets are more likely to be classified as hate speech but that sexist tweets are generally classified as offensive. Tweets without explicit hate keywords are also more difficult to classify.
△ Less
Submitted 11 March, 2017;
originally announced March 2017.
-
Coordinate Update Algorithms for Robust Power Loading for the MU-MISO Downlink with Outage Constraints
Authors:
Foad Sohrabi,
Timothy N. Davidson
Abstract:
We consider the problem of power allocation for the single-cell multi-user (MU) multiple-input single-output (MISO) downlink with quality-of-service (QoS) constraints. The base station acquires an estimate of the channels and, for a given beamforming structure, designs the power allocation so as to minimize the total transmission power required to ensure that target signal-to-interference-and-nois…
▽ More
We consider the problem of power allocation for the single-cell multi-user (MU) multiple-input single-output (MISO) downlink with quality-of-service (QoS) constraints. The base station acquires an estimate of the channels and, for a given beamforming structure, designs the power allocation so as to minimize the total transmission power required to ensure that target signal-to-interference-and-noise ratios at the receivers are met, subject to a specified outage probability. We consider scenarios in which the errors in the base station's channel estimates can be modelled as being zero-mean and Gaussian. Such a model is particularly suitable for time division duplex (TDD) systems with quasi-static channels, in which the base station estimates the channel during the uplink phase. Under that model, we employ a precise deterministic characterization of the outage probability to transform the chance-constrained formulation to a deterministic one. Although that deterministic formulation is not convex, we develop a coordinate descent algorithm that can be shown to converge to a globally optimal solution when the starting point is feasible. Insight into the structure of the deterministic formulation yields approximations that result in coordinate update algorithms with good performance and significantly lower computational cost. The proposed algorithms provide better performance than existing robust power loading algorithms that are based on tractable conservative approximations, and can even provide better performance than robust precoding algorithms based on such approximations.
△ Less
Submitted 26 February, 2016;
originally announced February 2016.
-
Analysis of a Quantum Error Correcting Code using Quantum Process Calculus
Authors:
Timothy A. S. Davidson,
Simon J. Gay,
Rajagopal Nagarajan,
Ittoop Vergheese Puthoor
Abstract:
We describe the use of quantum process calculus to describe and analyze quantum communication protocols, following the successful field of formal methods from classical computer science. The key idea is to define two systems, one modelling a protocol and one expressing a specification, and prove that they are behaviourally equivalent. We summarize the necessary theory in the process calculus CQP,…
▽ More
We describe the use of quantum process calculus to describe and analyze quantum communication protocols, following the successful field of formal methods from classical computer science. The key idea is to define two systems, one modelling a protocol and one expressing a specification, and prove that they are behaviourally equivalent. We summarize the necessary theory in the process calculus CQP, including the crucial result that equivalence is a congruence, meaning that it is preserved by embedding in any context. We illustrate the approach by analyzing two versions of a quantum error correction system.
△ Less
Submitted 1 October, 2012;
originally announced October 2012.
-
Formal Analysis of Quantum Systems using Process Calculus
Authors:
Timothy A. S. Davidson,
Simon J. Gay,
Rajagopal Nagarajan
Abstract:
Quantum communication and cryptographic protocols are well on the way to becoming an important practical technology. Although a large amount of successful research has been done on proving their correctness, most of this work does not make use of familiar techniques from formal methods, such as formal logics for specification, formal modelling languages, separation of levels of abstraction, and co…
▽ More
Quantum communication and cryptographic protocols are well on the way to becoming an important practical technology. Although a large amount of successful research has been done on proving their correctness, most of this work does not make use of familiar techniques from formal methods, such as formal logics for specification, formal modelling languages, separation of levels of abstraction, and compositional analysis. We argue that these techniques will be necessary for the analysis of large-scale systems that combine quantum and classical components, and summarize the results of initial investigation using behavioural equivalence in process calculus. This paper is a summary of Simon Gay's invited talk at ICE'11.
△ Less
Submitted 1 August, 2011;
originally announced August 2011.
-
The capacity region of a product of two unmatched Gaussian broadcast channels with three particular messages and a common message
Authors:
Ramy H. Gohary,
Timothy N. Davidson
Abstract:
This paper considers a Gaussian broadcast channel with two unmatched degraded components, three particular messages, and a common message that is intended for all three receivers. It is shown that for this channel superposition coding and Gaussian signalling is sufficient to achieve every point in the capacity region.
This paper considers a Gaussian broadcast channel with two unmatched degraded components, three particular messages, and a common message that is intended for all three receivers. It is shown that for this channel superposition coding and Gaussian signalling is sufficient to achieve every point in the capacity region.
△ Less
Submitted 3 November, 2009;
originally announced November 2009.
-
A Design Framework for Limited Feedback MIMO Systems with Zero-Forcing DFE
Authors:
Michael Botros Shenouda,
Timothy Davidson
Abstract:
We consider the design of multiple-input multiple-output communication systems with a linear precoder at the transmitter, zero-forcing decision feedback equalization (ZF-DFE) at the receiver, and a low-rate feedback channel that enables communication from the receiver to the transmitter. The channel state information (CSI) available at the receiver is assumed to be perfect, and based on this inf…
▽ More
We consider the design of multiple-input multiple-output communication systems with a linear precoder at the transmitter, zero-forcing decision feedback equalization (ZF-DFE) at the receiver, and a low-rate feedback channel that enables communication from the receiver to the transmitter. The channel state information (CSI) available at the receiver is assumed to be perfect, and based on this information the receiver selects a suitable precoder from a codebook and feeds back the index of this precoder to the transmitter. Our approach to the design of the components of this limited feedback scheme is based on the development, herein, of a unified framework for the joint design of the precoder and the ZF-DFE under the assumption that perfect CSI is available at both the transmitter and the receiver. The framework is general and embraces a wide range of design criteria. This framework enables us to characterize the statistical distribution of the optimal precoder in a standard Rayleigh fading environment. Using this distribution, we show that codebooks constructed from Grassmann packings minimize an upper bound on an average distortion measure, and hence are natural candidates for the codebook in limited feedback systems. We also show that for any given codebook the performance of the proposed limited feedback schemes is an upper bound on the corresponding schemes with linear zero-forcing receivers. Our simulation studies show that the proposed limited feedback scheme can provide significantly better performance at a lower feedback rate than existing schemes in which the detection order is fed back to the transmitter.
△ Less
Submitted 15 April, 2008; v1 submitted 15 April, 2008;
originally announced April 2008.
-
Non-linear and Linear Broadcasting with QoS Requirements: Tractable Approaches for Bounded Channel Uncertainties
Authors:
Michael Botros Shenouda,
Timothy N. Davidson
Abstract:
We consider the downlink of a cellular system in which the base station employs multiple transmit antennas, each receiver has a single antenna, and the users specify. We consider communication schemes in which the users have certain Quality of Service (QoS) requirements. We study the design of robust broadcasting schemes that minimize the transmission power necessary to guarantee that the QoS re…
▽ More
We consider the downlink of a cellular system in which the base station employs multiple transmit antennas, each receiver has a single antenna, and the users specify. We consider communication schemes in which the users have certain Quality of Service (QoS) requirements. We study the design of robust broadcasting schemes that minimize the transmission power necessary to guarantee that the QoS requirements are satisfied for all channels within bounded uncertainty regions around the transmitter's estimate of each user's channel. Each user's QoS requirement is formulated as a constraint on the mean square error (MSE) in its received signal, and we show that these MSE constraints imply constraints on the received SINR. Using the MSE constraints, we present a unified design approach for robust linear and non-linear transceivers with QoS requirements. The proposed designs overcome the limitations of existing approaches that provide conservative designs or are only applicable to the case of linear precoding. Furthermore, we provide computationally-efficient design formulations for a rather general model of channel uncertainty that subsumes many natural choices for the uncertainty region. We also consider the problem of the robust counterpart to precoding schemes that maximize the fidelity of the weakest user's signal subject to a power constraint. For this problem, we provide quasi-convex formulations, for both linear and non-linear transceivers, that can be efficiently solved using a one-dimensional bisection search. Our numerical results demonstrate that in the presence of CSI uncertainty, the proposed designs provide guarantees for a larger range of QoS requirements than the existing approaches, and consume require less transmission power in providing these guarantees.
△ Less
Submitted 11 December, 2007;
originally announced December 2007.
-
A Framework for Designing MIMO systems with Decision Feedback Equalization or Tomlinson-Harashima Precoding
Authors:
Michael Botros Shenouda,
T. N. Davidson
Abstract:
We consider joint transceiver design for general Multiple-Input Multiple-Output communication systems that implement interference (pre-)subtraction, such as those based on Decision Feedback Equalization (DFE) or Tomlinson-Harashima precoding (THP). We develop a unified framework for joint transceiver design by considering design criteria that are expressed as functions of the Mean Square Error (…
▽ More
We consider joint transceiver design for general Multiple-Input Multiple-Output communication systems that implement interference (pre-)subtraction, such as those based on Decision Feedback Equalization (DFE) or Tomlinson-Harashima precoding (THP). We develop a unified framework for joint transceiver design by considering design criteria that are expressed as functions of the Mean Square Error (MSE) of the individual data streams. By deriving two inequalities that involve the logarithms of the individual MSEs, we obtain optimal designs for two classes of communication objectives, namely those that are Schur-convex and Schur-concave functions of these logarithms. For Schur-convex objectives, the optimal design results in data streams with equal MSEs. This design simultaneously minimizes the total MSE and maximizes the mutual information for the DFE-based model. For Schur-concave objectives, the optimal DFE design results in linear equalization and the optimal THP design results in linear precoding. The proposed framework embraces a wide range of design objectives and can be regarded as a counterpart of the existing framework of linear transceiver design.
△ Less
Submitted 27 January, 2007; v1 submitted 25 January, 2007;
originally announced January 2007.
-
Design of Block Transceivers with Decision Feedback Detection
Authors:
Fang Xu,
Tim Davidson,
Jian-Kang Zhang,
K. Max Wong
Abstract:
This paper presents a method for jointly designing the transmitter-receiver pair in a block-by-block communication system that employs (intra-block) decision feedback detection. We provide closed-form expressions for transmitter-receiver pairs that simultaneously minimize the arithmetic mean squared error (MSE) at the decision point (assuming perfect feedback), the geometric MSE, and the bit err…
▽ More
This paper presents a method for jointly designing the transmitter-receiver pair in a block-by-block communication system that employs (intra-block) decision feedback detection. We provide closed-form expressions for transmitter-receiver pairs that simultaneously minimize the arithmetic mean squared error (MSE) at the decision point (assuming perfect feedback), the geometric MSE, and the bit error rate of a uniformly bit-loaded system at moderate-to-high signal-to-noise ratios. Separate expressions apply for the ``zero-forcing'' and ``minimum MSE'' (MMSE) decision feedback structures. In the MMSE case, the proposed design also maximizes the Gaussian mutual information and suggests that one can approach the capacity of the block transmission system using (independent instances of) the same (Gaussian) code for each element of the block. Our simulation studies indicate that the proposed transceivers perform significantly better than standard transceivers, and that they retain their performance advantages in the presence of error propagation.
△ Less
Submitted 5 April, 2005;
originally announced April 2005.