-
Using Distributional Thesaurus Embedding for Co-hyponymy Detection
Authors:
Abhik Jana,
Nikhil Reddy Varimalla,
Pawan Goyal
Abstract:
Discriminating lexical relations among distributionally similar words has always been a challenge for natural language processing (NLP) community. In this paper, we investigate whether the network embedding of distributional thesaurus can be effectively utilized to detect co-hyponymy relations. By extensive experiments over three benchmark datasets, we show that the vector representation obtained…
▽ More
Discriminating lexical relations among distributionally similar words has always been a challenge for natural language processing (NLP) community. In this paper, we investigate whether the network embedding of distributional thesaurus can be effectively utilized to detect co-hyponymy relations. By extensive experiments over three benchmark datasets, we show that the vector representation obtained by applying node2vec on distributional thesaurus outperforms the state-of-the-art models for binary classification of co-hyponymy vs. hypernymy, as well as co-hyponymy vs. meronymy, by huge margins.
△ Less
Submitted 24 February, 2020;
originally announced February 2020.
-
Operator inference for non-intrusive model reduction of systems with non-polynomial nonlinear terms
Authors:
Peter Benner,
Pawan Goyal,
Boris Kramer,
Benjamin Peherstorfer,
Karen Willcox
Abstract:
This work presents a non-intrusive model reduction method to learn low-dimensional models of dynamical systems with non-polynomial nonlinear terms that are spatially local and that are given in analytic form. In contrast to state-of-the-art model reduction methods that are intrusive and thus require full knowledge of the governing equations and the operators of a full model of the discretized dyna…
▽ More
This work presents a non-intrusive model reduction method to learn low-dimensional models of dynamical systems with non-polynomial nonlinear terms that are spatially local and that are given in analytic form. In contrast to state-of-the-art model reduction methods that are intrusive and thus require full knowledge of the governing equations and the operators of a full model of the discretized dynamical system, the proposed approach requires only the non-polynomial terms in analytic form and learns the rest of the dynamics from snapshots computed with a potentially black-box full-model solver. The proposed method learns operators for the linear and polynomially nonlinear dynamics via a least-squares problem, where the given non-polynomial terms are incorporated in the right-hand side. The least-squares problem is linear and thus can be solved efficiently in practice. The proposed method is demonstrated on three problems governed by partial differential equations, namely the diffusion-reaction Chafee-Infante model, a tubular reactor model for reactive flows, and a batch-chromatography model that describes a chemical separation process. The numerical results provide evidence that the proposed approach learns reduced models that achieve comparable accuracy as models constructed with state-of-the-art intrusive model reduction methods that require full knowledge of the governing equations.
△ Less
Submitted 19 September, 2020; v1 submitted 22 February, 2020;
originally announced February 2020.
-
Exploiting Temporal Coherence for Multi-modal Video Categorization
Authors:
Palash Goyal,
Saurabh Sahu,
Shalini Ghosh,
Chul Lee
Abstract:
Multimodal ML models can process data in multiple modalities (e.g., video, images, audio, text) and are useful for video content analysis in a variety of problems (e.g., object detection, scene understanding). In this paper, we focus on the problem of video categorization by using a multimodal approach. We have developed a novel temporal coherence-based regularization approach, which applies to di…
▽ More
Multimodal ML models can process data in multiple modalities (e.g., video, images, audio, text) and are useful for video content analysis in a variety of problems (e.g., object detection, scene understanding). In this paper, we focus on the problem of video categorization by using a multimodal approach. We have developed a novel temporal coherence-based regularization approach, which applies to different types of models (e.g., RNN, NetVLAD, Transformer). We demonstrate through experiments how our proposed multimodal video categorization models with temporal coherence out-perform strong state-of-the-art baseline models.
△ Less
Submitted 5 June, 2020; v1 submitted 7 February, 2020;
originally announced February 2020.
-
Analysis of Reference and Citation Copying in Evolving Bibliographic Networks
Authors:
Pradumn Kumar Pandey,
Mayank Singh,
Pawan Goyal,
Animesh Mukherjee,
Soumen Chakrabarti
Abstract:
Extensive literature demonstrates how the copying of references (links) can lead to the emergence of various structural properties (e.g., power-law degree distribution and bipartite cores) in bibliographic and other similar directed networks. However, it is also well known that the copying process is incapable of mimicking the number of directed triangles in such networks; neither does it have the…
▽ More
Extensive literature demonstrates how the copying of references (links) can lead to the emergence of various structural properties (e.g., power-law degree distribution and bipartite cores) in bibliographic and other similar directed networks. However, it is also well known that the copying process is incapable of mimicking the number of directed triangles in such networks; neither does it have the power to explain the obsolescence of older papers. In this paper, we propose RefOrCite, a new model that allows for copying of both the references from (i.e., out-neighbors of) as well as the citations to (i.e., in-neighbors of) an existing node. In contrast, the standard copying model (CP) only copies references. While retaining its spirit, RefOrCite differs from the Forest Fire (FF) model in ways that makes RefOrCite amenable to mean-field analysis for degree distribution, triangle count, and densification. Empirically, RefOrCite gives the best overall agreement with observed degree distribution, triangle count, diameter, h-index, and the growth of citations to newer papers.
△ Less
Submitted 26 December, 2019;
originally announced December 2019.
-
Morphology of CMB fields -- effect of weak gravitational lensing
Authors:
Priya Goyal,
Pravabati Chingangbam,
Stephen Appleby
Abstract:
We study the morphology of the cosmic microwave background temperature and polarization fields using the shape and alignment parameters, $β$ and $α$, that are constructed from the contour Minkowski tensor. The primary goal of our paper is to understand the effect of weak gravitational lensing on the morphology of the CMB fields. In order to isolate different physical effects that can be potentiall…
▽ More
We study the morphology of the cosmic microwave background temperature and polarization fields using the shape and alignment parameters, $β$ and $α$, that are constructed from the contour Minkowski tensor. The primary goal of our paper is to understand the effect of weak gravitational lensing on the morphology of the CMB fields. In order to isolate different physical effects that can be potentially confused with the effect of lensing, we first study the effect of varying the cosmology on $α$ and $β$, and show that they are relatively insensitive to variation of cosmological parameters. Next we analyze the signatures of hemispherical anisotropy, and show that information of such anisotropy in $α$ gets washed out at small angular scales and become pronounced only at large angular scales. For $β$ we find characteristic distortions which vary with the field threshold. We then study the effect of weak gravitational lensing using simulations of lensed temperature and $E$ and $B$ modes. We quantify the distortion induced in the fields across different angular scales. We find that lensing makes structures of all fields increasingly more anisotropic as we probe down to smaller scales. We find distinct behaviour of morphological distortions as a function of threshold for the different fields. The effect is small for temperature and $E$ mode, while it is significantly large for $B$ mode. Further, we find that lensing does not induce statistical anisotropy, as expected from the isotropic distribution of large scale structure of matter. We expect that the results obtained in this work will provide insights on the reconstruction of the lensing potential.
△ Less
Submitted 12 November, 2019;
originally announced November 2019.
-
Identification of Port-Hamiltonian Systems from Frequency Response Data
Authors:
Peter Benner,
Pawan Goyal,
Paul Van Dooren
Abstract:
In this paper, we study the identification problem of a passive system from tangential interpolation data. We present a simple construction approach based on the Mayo-Antoulas generalized realization theory that automatically yields a port-Hamiltonian realization for every strictly passive system with simple spectral zeros. Furthermore, we discuss the construction of a frequency-limited port-Hamil…
▽ More
In this paper, we study the identification problem of a passive system from tangential interpolation data. We present a simple construction approach based on the Mayo-Antoulas generalized realization theory that automatically yields a port-Hamiltonian realization for every strictly passive system with simple spectral zeros. Furthermore, we discuss the construction of a frequency-limited port-Hamiltonian realization. We illustrate the proposed method by means of several examples.
△ Less
Submitted 31 October, 2019;
originally announced November 2019.
-
Identification of Dominant Subspaces for Linear Structured Parametric Systems and Model Reduction
Authors:
Peter Benner,
Pawan Goyal,
Igor Pontes Duff
Abstract:
In this paper, we discuss a novel model reduction framework for generalized linear systems. The transfer functions of these systems are assumed to have a special structure, e.g., coming from second-order linear systems and time-delay systems, and they may also have parameter dependencies. Firstly, we investigate the connection between classic interpolation-based model reduction methods with the re…
▽ More
In this paper, we discuss a novel model reduction framework for generalized linear systems. The transfer functions of these systems are assumed to have a special structure, e.g., coming from second-order linear systems and time-delay systems, and they may also have parameter dependencies. Firstly, we investigate the connection between classic interpolation-based model reduction methods with the reachability and observability subspaces of linear structured parametric systems. We show that if enough interpolation points are taken, the projection matrices of interpolation-based model reduction encode these subspaces. As a result, we are able to identify the dominant reachable and observable subspaces of the underlying system. Based on this, we propose a new model reduction algorithm combining these features leading to reduced-order systems. Furthermore, we pay special attention to computational aspects of the approach and discuss its applicability to a large-scale setting. We illustrate the efficiency of the proposed approach with several numerical large-scale benchmark examples.
△ Less
Submitted 30 October, 2019;
originally announced October 2019.
-
Weakly-Supervised Deep Learning for Domain Invariant Sentiment Classification
Authors:
Pratik Kayal,
Mayank Singh,
Pawan Goyal
Abstract:
The task of learning a sentiment classification model that adapts well to any target domain, different from the source domain, is a challenging problem. Majority of the existing approaches focus on learning a common representation by leveraging both source and target data during training. In this paper, we introduce a two-stage training procedure that leverages weakly supervised datasets for devel…
▽ More
The task of learning a sentiment classification model that adapts well to any target domain, different from the source domain, is a challenging problem. Majority of the existing approaches focus on learning a common representation by leveraging both source and target data during training. In this paper, we introduce a two-stage training procedure that leverages weakly supervised datasets for develo** simple lift-and-shift-based predictive models without being exposed to the target domain during the training phase. Experimental results show that transfer with weak supervision from a source domain to various target domains provides performance very close to that obtained via supervised training on the target domain itself.
△ Less
Submitted 23 November, 2019; v1 submitted 29 October, 2019;
originally announced October 2019.
-
Data-Driven Identification of Rayleigh-Damped Second-Order Systems
Authors:
Igor Pontes Duff,
Pawan Goyal,
Peter Benner
Abstract:
In this paper, we present a data-driven approach to identify second-order systems, having internal Rayleigh dam**. This means that the dam** matrix is given as a linear combination of the mass and stiffness matrices. These systems typically appear when performing various engineering studies, e.g., vibrational and structural analysis. In an experimental setup, the frequency response of a system…
▽ More
In this paper, we present a data-driven approach to identify second-order systems, having internal Rayleigh dam**. This means that the dam** matrix is given as a linear combination of the mass and stiffness matrices. These systems typically appear when performing various engineering studies, e.g., vibrational and structural analysis. In an experimental setup, the frequency response of a system can be measured via various approaches, for instance, by measuring the vibrations using an accelerometer. As a consequence, given frequency samples, the identification of the underlying system relies on rational approximation. To that aim, we propose an identification of the corresponding second-order system, extending the Loewner framework for this class of systems. The efficiency of the proposed method is demonstrated by means of various numerical benchmarks.
△ Less
Submitted 2 October, 2019;
originally announced October 2019.
-
HateMonitors: Language Agnostic Abuse Detection in Social Media
Authors:
Punyajoy Saha,
Binny Mathew,
Pawan Goyal,
Animesh Mukherjee
Abstract:
Reducing hateful and offensive content in online social media pose a dual problem for the moderators. On the one hand, rigid censorship on social media cannot be imposed. On the other, the free flow of such content cannot be allowed. Hence, we require efficient abusive language detection system to detect such harmful content in social media. In this paper, we present our machine learning model, Ha…
▽ More
Reducing hateful and offensive content in online social media pose a dual problem for the moderators. On the one hand, rigid censorship on social media cannot be imposed. On the other, the free flow of such content cannot be allowed. Hence, we require efficient abusive language detection system to detect such harmful content in social media. In this paper, we present our machine learning model, HateMonitor, developed for Hate Speech and Offensive Content Identification in Indo-European Languages (HASOC), a shared task at FIRE 2019. We have used a Gradient Boosting model, along with BERT and LASER embeddings, to make the system language agnostic. Our model came at First position for the German sub-task A. We have also made our model public at https://github.com/punyajoy/HateMonitors-HASOC .
△ Less
Submitted 27 September, 2019;
originally announced September 2019.
-
Hate begets Hate: A Temporal Study of Hate Speech
Authors:
Binny Mathew,
Anurag Illendula,
Punyajoy Saha,
Soumya Sarkar,
Pawan Goyal,
Animesh Mukherjee
Abstract:
With the ongoing debate on 'freedom of speech' vs. 'hate speech' there is an urgent need to carefully understand the consequences of the inevitable culmination of the two, i.e., 'freedom of hate speech' over time. An ideal scenario to understand this would be to observe the effects of hate speech in an (almost) unrestricted environment. Hence, we perform the first temporal analysis of hate speech…
▽ More
With the ongoing debate on 'freedom of speech' vs. 'hate speech' there is an urgent need to carefully understand the consequences of the inevitable culmination of the two, i.e., 'freedom of hate speech' over time. An ideal scenario to understand this would be to observe the effects of hate speech in an (almost) unrestricted environment. Hence, we perform the first temporal analysis of hate speech on Gab.com, a social media site with very loose moderation policy. We first generate temporal snapshots of Gab from millions of posts and users. Using these temporal snapshots, we compute an activity vector based on DeGroot model to identify hateful users. The amount of hate speech in Gab is steadily increasing and the new users are becoming hateful at an increased and faster rate. Further, our analysis analysis reveals that the hate users are occupying the prominent positions in the Gab network. Also, the language used by the community as a whole seem to correlate more with that of the hateful users as compared to the non-hateful ones. We discuss how, many crucial design questions in CSCW open up from our work.
△ Less
Submitted 3 August, 2020; v1 submitted 24 September, 2019;
originally announced September 2019.
-
Backpressure Flow Control
Authors:
Prateesh Goyal,
Preey Shah,
Kevin Zhao,
Georgios Nikolaidis,
Mohammad Alizadeh,
Thomas E. Anderson
Abstract:
Effective congestion control for data center networks is becoming increasingly challenging with a growing amount of latency sensitive traffic, much fatter links, and extremely bursty traffic. Widely deployed algorithms, such as DCTCP and DCQCN, are still far from optimal in many plausible scenarios, particularly for tail latency. Many operators compensate by running their networks at low average u…
▽ More
Effective congestion control for data center networks is becoming increasingly challenging with a growing amount of latency sensitive traffic, much fatter links, and extremely bursty traffic. Widely deployed algorithms, such as DCTCP and DCQCN, are still far from optimal in many plausible scenarios, particularly for tail latency. Many operators compensate by running their networks at low average utilization, dramatically increasing costs.
In this paper, we argue that we have reached the practical limits of end-to-end congestion control. Instead, we propose, implement, and evaluate a new congestion control architecture called Backpressure Flow Control (BFC). BFC provides per-hop per-flow flow control, but with bounded state, constant-time switch operations, and careful use of buffers. We demonstrate BFC's feasibility by implementing it on Tofino2, a state-of-the-art P4-based programmable hardware switch. In simulation, we show that BFC achieves near optimal throughput and tail latency behavior even under challenging conditions such as high network load and incast cross traffic. Compared to existing end-to-end schemes, BFC achieves 2.3 - 60 X lower tail latency for short flows and 1.6 - 5 X better average completion time for long flows.
△ Less
Submitted 29 March, 2021; v1 submitted 21 September, 2019;
originally announced September 2019.
-
Gramians, Energy Functionals and Balanced Truncation for Linear Dynamical Systems with Quadratic Outputs
Authors:
Peter Benner,
Pawan Goyal,
Igor Pontes Duff
Abstract:
Model order reduction is a technique that is used to construct low-order approximations of large-scale dynamical systems. In this paper, we investigate a balancing based model order reduction method for dynamical systems with a linear dynamical equation and a quadratic output function. To this aim, we propose a new algebraic observability Gramian for the system based on Hilbert space adjoint theor…
▽ More
Model order reduction is a technique that is used to construct low-order approximations of large-scale dynamical systems. In this paper, we investigate a balancing based model order reduction method for dynamical systems with a linear dynamical equation and a quadratic output function. To this aim, we propose a new algebraic observability Gramian for the system based on Hilbert space adjoint theory. We then show the proposed Gramians satisfy a particular type of generalized Lyapunov equations and we investigate their connections to energy functionals, namely, the controllability and observability. This allows us to find the states that are hard to control and hard to observe via an appropriate balancing transformation. Truncation of such states yields reduced-order systems. Finally, based on $\mathcal H_2$ energy considerations, we, furthermore, derive error bounds, depending on the neglected singular values. The efficiency of the proposed method is demonstrated by means of two semi-discretized partial differential equations and is compared with the existing model reduction techniques in the literature.
△ Less
Submitted 10 September, 2019;
originally announced September 2019.
-
ArduCode: Predictive Framework for Automation Engineering
Authors:
Arquimedes Canedo,
Palash Goyal,
Di Huang,
Amit Pandey,
Gustavo Quiros
Abstract:
Automation engineering is the task of integrating, via software, various sensors, actuators, and controls for automating a real-world process. Today, automation engineering is supported by a suite of software tools including integrated development environments (IDE), hardware configurators, compilers, and runtimes. These tools focus on the automation code itself, but leave the automation engineer…
▽ More
Automation engineering is the task of integrating, via software, various sensors, actuators, and controls for automating a real-world process. Today, automation engineering is supported by a suite of software tools including integrated development environments (IDE), hardware configurators, compilers, and runtimes. These tools focus on the automation code itself, but leave the automation engineer unassisted in their decision making. This can lead to increased time for software development because of imperfections in decision making leading to multiple iterations between software and hardware. To address this, this paper defines multiple challenges often faced in automation engineering and propose solutions using machine learning to assist engineers tackle such challenges. We show that machine learning can be leveraged to assist the automation engineer in classifying automation, finding similar code snippets, and reasoning about the hardware selection of sensors and actuators. We validate our architecture on two real datasets consisting of 2,927 Arduino projects, and 683 Programmable Logic Controller (PLC) projects. Our results show that paragraph embedding techniques can be utilized to classify automation using code snippets with precision close to human annotation, giving an F1-score of 72%. Further, we show that such embedding techniques can help us find similar code snippets with high accuracy. Finally, we use autoencoder models for hardware recommendation and achieve a p@3 of 0.79 and p@5 of 0.95.
△ Less
Submitted 6 July, 2020; v1 submitted 6 September, 2019;
originally announced September 2019.
-
Competing Topic Naming Conventions in Quora: Predicting Appropriate Topic Merges and Winning Topics from Millions of Topic Pairs
Authors:
Binny Mathew,
Suman Kalyan Maity,
Pawan Goyal,
Animesh Mukherjee
Abstract:
Quora is a popular Q&A site which provides users with the ability to tag questions with multiple relevant topics which helps to attract quality answers. These topics are not predefined but user-defined conventions and it is not so rare to have multiple such conventions present in the Quora ecosystem describing exactly the same concept. In almost all such cases, users (or Quora moderators) manually…
▽ More
Quora is a popular Q&A site which provides users with the ability to tag questions with multiple relevant topics which helps to attract quality answers. These topics are not predefined but user-defined conventions and it is not so rare to have multiple such conventions present in the Quora ecosystem describing exactly the same concept. In almost all such cases, users (or Quora moderators) manually merge the topic pair into one of the either topics, thus selecting one of the competing conventions. An important application for the site therefore is to identify such competing conventions early enough that should merge in future. In this paper, we propose a two-step approach that uniquely combines the anomaly detection and the supervised classification frameworks to predict whether two topics from among millions of topic pairs are indeed competing conventions, and should merge, achieving an F-score of 0.711. We also develop a model to predict the direction of the topic merge, i.e., the winning convention, achieving an F-score of 0.898. Our system is also able to predict ~ 25% of the correct case of merges within the first month of the merge and ~ 40% of the cases within a year. This is an encouraging result since Quora users on average take 936 days to identify such a correct merge. Human judgment experiments show that our system is able to predict almost all the correct cases that humans can predict plus 37.24% correct cases which the humans are not able to identify at all.
△ Less
Submitted 10 September, 2019;
originally announced September 2019.
-
Graph Representation Ensemble Learning
Authors:
Palash Goyal,
Di Huang,
Sujit Rokka Chhetri,
Arquimedes Canedo,
Jaya Shree,
Evan Patterson
Abstract:
Representation learning on graphs has been gaining attention due to its wide applicability in predicting missing links, and classifying and recommending nodes. Most embedding methods aim to preserve certain properties of the original graph in the low dimensional space. However, real world graphs have a combination of several properties which are difficult to characterize and capture by a single ap…
▽ More
Representation learning on graphs has been gaining attention due to its wide applicability in predicting missing links, and classifying and recommending nodes. Most embedding methods aim to preserve certain properties of the original graph in the low dimensional space. However, real world graphs have a combination of several properties which are difficult to characterize and capture by a single approach. In this work, we introduce the problem of graph representation ensemble learning and provide a first of its kind framework to aggregate multiple graph embedding methods efficiently. We provide analysis of our framework and analyze -- theoretically and empirically -- the dependence between state-of-the-art embedding methods. We test our models on the node classification task on four real world graphs and show that proposed ensemble approaches can outperform the state-of-the-art methods by up to 8% on macro-F1. We further show that the approach is even more beneficial for underrepresented classes providing an improvement of up to 12%.
△ Less
Submitted 12 September, 2019; v1 submitted 6 September, 2019;
originally announced September 2019.
-
Incorporating Domain Knowledge into Medical NLI using Knowledge Graphs
Authors:
Soumya Sharma,
Bishal Santra,
Abhik Jana,
T. Y. S. S. Santosh,
Niloy Ganguly,
Pawan Goyal
Abstract:
Recently, biomedical version of embeddings obtained from language models such as BioELMo have shown state-of-the-art results for the textual inference task in the medical domain. In this paper, we explore how to incorporate structured domain knowledge, available in the form of a knowledge graph (UMLS), for the Medical NLI task. Specifically, we experiment with fusing embeddings obtained from knowl…
▽ More
Recently, biomedical version of embeddings obtained from language models such as BioELMo have shown state-of-the-art results for the textual inference task in the medical domain. In this paper, we explore how to incorporate structured domain knowledge, available in the form of a knowledge graph (UMLS), for the Medical NLI task. Specifically, we experiment with fusing embeddings obtained from knowledge graph with the state-of-the-art approaches for NLI task (ESIM model). We also experiment with fusing the domain-specific sentiment information for the task. Experiments conducted on MedNLI dataset clearly show that this strategy improves the baseline BioELMo architecture for the Medical NLI task.
△ Less
Submitted 31 August, 2019;
originally announced September 2019.
-
Benchmarks for Graph Embedding Evaluation
Authors:
Palash Goyal,
Di Huang,
Ankita Goswami,
Sujit Rokka Chhetri,
Arquimedes Canedo,
Emilio Ferrara
Abstract:
Graph embedding is the task of representing nodes of a graph in a low-dimensional space and its applications for graph tasks have gained significant traction in academia and industry. The primary difference among the many recently proposed graph embedding methods is the way they preserve the inherent properties of the graphs. However, in practice, comparing these methods is very challenging. The m…
▽ More
Graph embedding is the task of representing nodes of a graph in a low-dimensional space and its applications for graph tasks have gained significant traction in academia and industry. The primary difference among the many recently proposed graph embedding methods is the way they preserve the inherent properties of the graphs. However, in practice, comparing these methods is very challenging. The majority of methods report performance boosts on few selected real graphs. Therefore, it is difficult to generalize these performance improvements to other types of graphs. Given a graph, it is currently impossible to quantify the advantages of one approach over another. In this work, we introduce a principled framework to compare graph embedding methods. Our goal is threefold: (i) provide a unifying framework for comparing the performance of various graph embedding methods, (ii) establish a benchmark with real-world graphs that exhibit different structural properties, and (iii) provide users with a tool to identify the best graph embedding method for their data. This paper evaluates 4 of the most influential graph embedding methods and 4 traditional link prediction methods against a corpus of 100 real-world networks with varying properties. We organize the 100 networks in terms of their properties to get a better understanding of the embedding performance of these popular methods. We use the comparisons on our 100 benchmark graphs to define GFS-score, that can be applied to any embedding method to quantify its performance. We rank the state-of-the-art embedding approaches using the GFS-score and show that it can be used to understand and evaluate novel embedding approaches. We envision that the proposed framework (https://www.github.com/palash1992/GEM-Benchmark) will serve the community as a benchmarking platform to test and compare the performance of future graph embedding techniques.
△ Less
Submitted 26 August, 2019; v1 submitted 18 August, 2019;
originally announced August 2019.
-
The rise and rise of interdisciplinary research: Understanding the interaction dynamics of three major fields -- Physics, Mathematics & Computer Science
Authors:
Rima Hazra,
Mayank Singh,
Pawan Goyal,
Bibhas Adhikari,
Animesh Mukherjee
Abstract:
The distinction between sciences is becoming increasingly more artificial -- an approach from one area can be easily applied to the other. More exciting research nowadays is happening perhaps at the interfaces of disciplines like Physics, Mathematics and Computer Science. How do these interfaces emerge and interact? For instance, is there a specific pattern in which these fields cite each other? I…
▽ More
The distinction between sciences is becoming increasingly more artificial -- an approach from one area can be easily applied to the other. More exciting research nowadays is happening perhaps at the interfaces of disciplines like Physics, Mathematics and Computer Science. How do these interfaces emerge and interact? For instance, is there a specific pattern in which these fields cite each other? In this article, we investigate a collection of more than 1.2 million papers from three different scientific disciplines -- Physics, Mathematics, and Computer Science. We show how over a timescale the citation patterns from the core science fields (Physics, Mathematics) to the applied and fast-growing field of Computer Science have drastically increased. Further, we observe how certain subfields in these disciplines are shrinking while others are becoming tremendously popular. For instance, an intriguing observation is that citations from Mathematics to the subfield of machine learning in Computer Science in recent times are exponentially increasing.
△ Less
Submitted 10 August, 2019;
originally announced August 2019.
-
Tracking Temporal Evolution of Graphs using Non-Timestamped Data
Authors:
Sujit Rokka Chhetri,
Palash Goyal,
Arquimedes Canedo
Abstract:
Datasets to study the temporal evolution of graphs are scarce. To encourage the research of novel dynamic graph learning algorithms we introduce YoutubeGraph-Dyn (available at https://github.com/palash1992/YoutubeGraph-Dyn), an evolving graph dataset generated from YouTube real-world interactions. YoutubeGraph-Dyn provides intra-day time granularity (with 416 snapshots taken every 6 hours for a pe…
▽ More
Datasets to study the temporal evolution of graphs are scarce. To encourage the research of novel dynamic graph learning algorithms we introduce YoutubeGraph-Dyn (available at https://github.com/palash1992/YoutubeGraph-Dyn), an evolving graph dataset generated from YouTube real-world interactions. YoutubeGraph-Dyn provides intra-day time granularity (with 416 snapshots taken every 6 hours for a period of 104 days), multi-modal relationships that capture different aspects of the data, multiple attributes including timestamped, non-timestamped, word embeddings, and integers. Our data collection methodology emphasizes the creation of time evolving graphs from non-timestamped data. In this paper, we provide various graph statistics of YoutubeGraph-Dyn and test state-of-the-art graph clustering algorithms to detect community migration, and time series analysis and recurrent neural network algorithms to forecast non-timestamped data.
△ Less
Submitted 4 July, 2019;
originally announced July 2019.
-
Pykg2vec: A Python Library for Knowledge Graph Embedding
Authors:
Shih Yuan Yu,
Sujit Rokka Chhetri,
Arquimedes Canedo,
Palash Goyal,
Mohammad Abdullah Al Faruque
Abstract:
Pykg2vec is an open-source Python library for learning the representations of the entities and relations in knowledge graphs. Pykg2vec's flexible and modular software architecture currently implements 16 state-of-the-art knowledge graph embedding algorithms, and is designed to easily incorporate new algorithms. The goal of pykg2vec is to provide a practical and educational platform to accelerate r…
▽ More
Pykg2vec is an open-source Python library for learning the representations of the entities and relations in knowledge graphs. Pykg2vec's flexible and modular software architecture currently implements 16 state-of-the-art knowledge graph embedding algorithms, and is designed to easily incorporate new algorithms. The goal of pykg2vec is to provide a practical and educational platform to accelerate research in knowledge graph representation learning. Pykg2vec is built on top of TensorFlow and Python's multiprocessing framework and provides modules for batch generation, Bayesian hyperparameter optimization, mean rank evaluation, embedding, and result visualization. Pykg2vec is released under the MIT License and is also available in the Python Package Index (PyPI). The source code of pykg2vec is available at https://github.com/Sujit-O/pykg2vec.
△ Less
Submitted 4 June, 2019;
originally announced June 2019.
-
On the Compositionality Prediction of Noun Phrases using Poincaré Embeddings
Authors:
Abhik Jana,
Dmitry Puzyrev,
Alexander Panchenko,
Pawan Goyal,
Chris Biemann,
Animesh Mukherjee
Abstract:
The compositionality degree of multiword expressions indicates to what extent the meaning of a phrase can be derived from the meaning of its constituents and their grammatical relations. Prediction of (non)-compositionality is a task that has been frequently addressed with distributional semantic models. We introduce a novel technique to blend hierarchical information with distributional informati…
▽ More
The compositionality degree of multiword expressions indicates to what extent the meaning of a phrase can be derived from the meaning of its constituents and their grammatical relations. Prediction of (non)-compositionality is a task that has been frequently addressed with distributional semantic models. We introduce a novel technique to blend hierarchical information with distributional information for predicting compositionality. In particular, we use hypernymy information of the multiword and its constituents encoded in the form of the recently introduced Poincaré embeddings in addition to the distributional information to detect compositionality for noun phrases. Using a weighted average of the distributional similarity and a Poincaré similarity function, we obtain consistent and substantial, statistically significant improvement across three gold standard datasets over state-of-the-art models based on distributional information only. Unlike traditional approaches that solely use an unsupervised setting, we have also framed the problem as a supervised task, obtaining comparable improvements. Further, we publicly release our Poincaré embeddings, which are trained on the output of handcrafted lexical-syntactic patterns on a large corpus.
△ Less
Submitted 7 June, 2019;
originally announced June 2019.
-
ABC: A Simple Explicit Congestion Controller for Wireless Networks
Authors:
Prateesh Goyal,
Anup Agarwal,
Ravi Netravali,
Mohammad Alizadeh,
Hari Balakrishnan
Abstract:
We propose Accel-Brake Control (ABC), a simple and deployable explicit congestion control protocol for network paths with time-varying wireless links. ABC routers mark each packet with an "accelerate" or "brake", which causes senders to slightly increase or decrease their congestion windows. Routers use this feedback to quickly guide senders towards a desired target rate. ABC requires no changes t…
▽ More
We propose Accel-Brake Control (ABC), a simple and deployable explicit congestion control protocol for network paths with time-varying wireless links. ABC routers mark each packet with an "accelerate" or "brake", which causes senders to slightly increase or decrease their congestion windows. Routers use this feedback to quickly guide senders towards a desired target rate. ABC requires no changes to header formats or user devices, but achieves better performance than XCP. ABC is also incrementally deployable; it operates correctly when the bottleneck is a non-ABC router, and can coexist with non-ABC traffic sharing the same bottleneck link. We evaluate ABC using a Wi-Fi implementation and trace-driven emulation of cellular links. ABC achieves 30-40% higher throughput than Cubic+Codel for similar delays, and 2.2X lower delays than BBR on a Wi-Fi path. On cellular network paths, ABC achieves 50% higher throughput than Cubic+Codel.
△ Less
Submitted 17 March, 2021; v1 submitted 8 May, 2019;
originally announced May 2019.
-
Scaling and Benchmarking Self-Supervised Visual Representation Learning
Authors:
Priya Goyal,
Dhruv Mahajan,
Abhinav Gupta,
Ishan Misra
Abstract:
Self-supervised learning aims to learn representations from the data itself without explicit manual supervision. Existing efforts ignore a crucial aspect of self-supervised learning - the ability to scale to large amount of data because self-supervision requires no manual labels. In this work, we revisit this principle and scale two popular self-supervised approaches to 100 million images. We show…
▽ More
Self-supervised learning aims to learn representations from the data itself without explicit manual supervision. Existing efforts ignore a crucial aspect of self-supervised learning - the ability to scale to large amount of data because self-supervision requires no manual labels. In this work, we revisit this principle and scale two popular self-supervised approaches to 100 million images. We show that by scaling on various axes (including data size and problem 'hardness'), one can largely match or even exceed the performance of supervised pre-training on a variety of tasks such as object detection, surface normal estimation (3D) and visual navigation using reinforcement learning. Scaling these methods also provides many interesting insights into the limitations of current self-supervised techniques and evaluations. We conclude that current self-supervised methods are not 'hard' enough to take full advantage of large scale data and do not seem to learn effective high level semantic representations. We also introduce an extensive benchmark across 9 different datasets and tasks. We believe that such a benchmark along with comparable evaluation settings is necessary to make meaningful progress. Code is at: https://github.com/facebookresearch/fair_self_supervision_benchmark.
△ Less
Submitted 6 June, 2019; v1 submitted 3 May, 2019;
originally announced May 2019.
-
Interpolation-Based Model Order Reduction for Polynomial Parametric Systems
Authors:
Peter Benner,
Pawan Goyal
Abstract:
In this work, we investigate a model order reduction scheme for polynomial parametric systems. We begin with defining the generalized multivariate transfer functions for the system. Based on this, we aim at constructing a reduced-order system, interpolating the defined generalized transfer functions at a given set of interpolation points. Furthermore, we provide a method, inspired by the Loewner a…
▽ More
In this work, we investigate a model order reduction scheme for polynomial parametric systems. We begin with defining the generalized multivariate transfer functions for the system. Based on this, we aim at constructing a reduced-order system, interpolating the defined generalized transfer functions at a given set of interpolation points. Furthermore, we provide a method, inspired by the Loewner approach for linear and (quadratic-)bilinear systems, to determine a good-quality reduced-order system in an automatic way. We also discuss the computational issues related to the proposed method and a potential application of CUR matrix approximation in order to further speed-up simulations of reduced-order systems. We test the efficiency of the proposed methods via several numerical examples.
△ Less
Submitted 26 April, 2019;
originally announced April 2019.
-
DeepTagRec: A Content-cum-User based Tag Recommendation Framework for Stack Overflow
Authors:
Suman Kalyan Maity,
Abhishek Panigrahi,
Sayan Ghosh,
Arundhati Banerjee,
Pawan Goyal,
Animesh Mukherjee
Abstract:
In this paper, we develop a content-cum-user based deep learning framework DeepTagRec to recommend appropriate question tags on Stack Overflow. The proposed system learns the content representation from question title and body. Subsequently, the learnt representation from heterogeneous relationship between user and tags is fused with the content representation for the final tag prediction. On a ve…
▽ More
In this paper, we develop a content-cum-user based deep learning framework DeepTagRec to recommend appropriate question tags on Stack Overflow. The proposed system learns the content representation from question title and body. Subsequently, the learnt representation from heterogeneous relationship between user and tags is fused with the content representation for the final tag prediction. On a very large-scale dataset comprising half a million question posts, DeepTagRec beats all the baselines; in particular, it significantly outperforms the best performing baseline T agCombine achieving an overall gain of 60.8% and 36.8% in precision@3 and recall@10 respectively. DeepTagRec also achieves 63% and 33.14% maximum improvement in exact-k accuracy and top-k accuracy respectively over TagCombine
△ Less
Submitted 10 March, 2019;
originally announced March 2019.
-
Using Natural Language for Reward Sha** in Reinforcement Learning
Authors:
Prasoon Goyal,
Scott Niekum,
Raymond J. Mooney
Abstract:
Recent reinforcement learning (RL) approaches have shown strong performance in complex domains such as Atari games, but are often highly sample inefficient. A common approach to reduce interaction time with the environment is to use reward sha**, which involves carefully designing reward functions that provide the agent intermediate rewards for progress towards the goal. However, designing appro…
▽ More
Recent reinforcement learning (RL) approaches have shown strong performance in complex domains such as Atari games, but are often highly sample inefficient. A common approach to reduce interaction time with the environment is to use reward sha**, which involves carefully designing reward functions that provide the agent intermediate rewards for progress towards the goal. However, designing appropriate sha** rewards is known to be difficult as well as time-consuming. In this work, we address this problem by using natural language instructions to perform reward sha**. We propose the LanguagE-Action Reward Network (LEARN), a framework that maps free-form natural language instructions to intermediate rewards based on actions taken by the agent. These intermediate language-based rewards can seamlessly be integrated into any standard reinforcement learning algorithm. We experiment with Montezuma's Revenge from the Atari Learning Environment, a popular benchmark in RL. Our experiments on a diverse set of 15 tasks demonstrate that, for the same number of interactions with the environment, language-based rewards lead to successful completion of the task 60% more often on average, compared to learning without language.
△ Less
Submitted 31 May, 2019; v1 submitted 5 March, 2019;
originally announced March 2019.
-
Observation of Chiral Surface Excitons in a Topological Insulator Bi$_2$Se$_3$
Authors:
H. -H. Kung,
A. P. Goyal,
D. L. Maslov,
X. Wang,
A. Lee,
A. F. Kemper,
S. -W. Cheong,
G. Blumberg
Abstract:
The protected electron states at the boundaries or on the surfaces of topological insulators (TIs) have been the subject of intense theoretical and experimental investigations. Such states are enforced by very strong spin-orbit interaction in solids composed of heavy elements. Here, we study the composite particles -- chiral excitons -- formed by the Coulomb attraction between electrons and holes…
▽ More
The protected electron states at the boundaries or on the surfaces of topological insulators (TIs) have been the subject of intense theoretical and experimental investigations. Such states are enforced by very strong spin-orbit interaction in solids composed of heavy elements. Here, we study the composite particles -- chiral excitons -- formed by the Coulomb attraction between electrons and holes residing on the surface of an archetypical three-dimensional topological insulator (TI), Bi$_2$Se$_3$. Photoluminescence (PL) emission arising due to recombination of excitons in conventional semiconductors is usually unpolarized because of scattering by phonons and other degrees of freedom during exciton thermalization. On the contrary, we observe almost perfectly polarization-preserving PL emission from chiral excitons. We demonstrate that the chiral excitons can be optically oriented with circularly polarized light in a broad range of excitation energies, even when the latter deviate from the (apparent) optical band gap by hundreds of meVs, and that the orientation remains preserved even at room temperature. Based on the dependences of the PL spectra on the energy and polarization of incident photons, we propose that chiral excitons are made from massive holes and massless (Dirac) electrons, both with chiral spin textures enforced by strong spin-orbit coupling. A theoretical model based on such proposal describes quantitatively the experimental observations. The optical orientation of composite particles, the chiral excitons, emerges as a general result of strong spin-orbit coupling in a 2D electron system. Our findings can potentially expand applications of TIs in photonics and optoelectronics.
△ Less
Submitted 5 March, 2019;
originally announced March 2019.
-
Misleading Metadata Detection on YouTube
Authors:
Priyank Palod,
Ayush Patwari,
Sudhanshu Bahety,
Saurabh Bagchi,
Pawan Goyal
Abstract:
YouTube is the leading social media platform for sharing videos. As a result, it is plagued with misleading content that includes staged videos presented as real footages from an incident, videos with misrepresented context and videos where audio/video content is morphed. We tackle the problem of detecting such misleading videos as a supervised classification task. We develop UCNet - a deep networ…
▽ More
YouTube is the leading social media platform for sharing videos. As a result, it is plagued with misleading content that includes staged videos presented as real footages from an incident, videos with misrepresented context and videos where audio/video content is morphed. We tackle the problem of detecting such misleading videos as a supervised classification task. We develop UCNet - a deep network to detect fake videos and perform our experiments on two datasets - VAVD created by us and publicly available FVC [8]. We achieve a macro averaged F-score of 0.82 while training and testing on a 70:30 split of FVC, while the baseline model scores 0.36. We find that the proposed model generalizes well when trained on one dataset and tested on the other.
△ Less
Submitted 25 January, 2019;
originally announced January 2019.
-
Hateminers : Detecting Hate speech against Women
Authors:
Punyajoy Saha,
Binny Mathew,
Pawan Goyal,
Animesh Mukherjee
Abstract:
With the online proliferation of hate speech, there is an urgent need for systems that can detect such harmful content. In this paper, We present the machine learning models developed for the Automatic Misogyny Identification (AMI) shared task at EVALITA 2018. We generate three types of features: Sentence Embeddings, TF-IDF Vectors, and BOW Vectors to represent each tweet. These features are then…
▽ More
With the online proliferation of hate speech, there is an urgent need for systems that can detect such harmful content. In this paper, We present the machine learning models developed for the Automatic Misogyny Identification (AMI) shared task at EVALITA 2018. We generate three types of features: Sentence Embeddings, TF-IDF Vectors, and BOW Vectors to represent each tweet. These features are then concatenated and fed into the machine learning models. Our model came First for the English Subtask A and Fifth for the English Subtask B. We release our winning model for public use and it's available at https://github.com/punyajoy/Hateminers-EVALITA.
△ Less
Submitted 17 December, 2018;
originally announced December 2018.
-
Detecting Reliable Novel Word Senses: A Network-Centric Approach
Authors:
Abhik Jana,
Animesh Mukherjee,
Pawan Goyal
Abstract:
In this era of Big Data, due to expeditious exchange of information on the web, words are being used to denote newer meanings, causing linguistic shift. With the recent availability of large amounts of digitized texts, an automated analysis of the evolution of language has become possible. Our study mainly focuses on improving the detection of new word senses. This paper presents a unique proposal…
▽ More
In this era of Big Data, due to expeditious exchange of information on the web, words are being used to denote newer meanings, causing linguistic shift. With the recent availability of large amounts of digitized texts, an automated analysis of the evolution of language has become possible. Our study mainly focuses on improving the detection of new word senses. This paper presents a unique proposal based on network features to improve the precision of new word sense detection. For a candidate word where a new sense (birth) has been detected by comparing the sense clusters induced at two different time points, we further compare the network properties of the subgraphs induced from novel sense cluster across these two time points. Using the mean fractional change in edge density, structural similarity and average path length as features in an SVM classifier, manual evaluation gives precision values of 0.86 and 0.74 for the task of new sense detection, when tested on 2 distinct time-point pairs, in comparison to the precision values in the range of 0.23-0.32, when the proposed scheme is not used. The outlined method can therefore be used as a new post-hoc step to improve the precision of novel word sense detection in a robust and reliable way where the underlying framework uses a graph structure. Another important observation is that even though our proposal is a post-hoc step, it can be used in isolation and that itself results in a very decent performance achieving a precision of 0.54-0.62. Finally, we show that our method is able to detect the well-known historical shifts in 80% cases.
△ Less
Submitted 14 December, 2018;
originally announced December 2018.
-
Analyzing the hate and counter speech accounts on Twitter
Authors:
Binny Mathew,
Navish Kumar,
Ravina,
Pawan Goyal,
Animesh Mukherjee
Abstract:
The online hate speech is proliferating with several organization and countries implementing laws to ban such harmful speech. While these restrictions might reduce the amount of such hateful content, it does so by restricting freedom of speech. Thus, an promising alternative supported by several organizations is to counter such hate speech with more speech. In this paper, We analyze hate speech an…
▽ More
The online hate speech is proliferating with several organization and countries implementing laws to ban such harmful speech. While these restrictions might reduce the amount of such hateful content, it does so by restricting freedom of speech. Thus, an promising alternative supported by several organizations is to counter such hate speech with more speech. In this paper, We analyze hate speech and the corresponding counters (aka counterspeech) on Twitter. We perform several lexical, linguistic and psycholinguistic analysis on these user accounts and obverse that counter speakers employ several strategies depending on the target community. The hateful accounts express more negative sentiments and are more profane. We also find that the hate tweets by verified accounts have much more virality as compared to a tweet by a non-verified account. While the hate users seem to use words more about envy, hate, negative emotion, swearing terms, ugliness, the counter users use more words related to government, law, leader. We also build a supervised model for classifying the hateful and counterspeech accounts on Twitter and obtain an F-score of 0.77. We also make our dataset public to help advance the research on hate speech.
△ Less
Submitted 6 December, 2018;
originally announced December 2018.
-
Spread of hate speech in online social media
Authors:
Binny Mathew,
Ritam Dutt,
Pawan Goyal,
Animesh Mukherjee
Abstract:
The present online social media platform is afflicted with several issues, with hate speech being on the predominant forefront. The prevalence of online hate speech has fueled horrific real-world hate-crime such as the mass-genocide of Rohingya Muslims, communal violence in Colombo and the recent massacre in the Pittsburgh synagogue. Consequently, It is imperative to understand the diffusion of su…
▽ More
The present online social media platform is afflicted with several issues, with hate speech being on the predominant forefront. The prevalence of online hate speech has fueled horrific real-world hate-crime such as the mass-genocide of Rohingya Muslims, communal violence in Colombo and the recent massacre in the Pittsburgh synagogue. Consequently, It is imperative to understand the diffusion of such hateful content in an online setting. We conduct the first study that analyses the flow and dynamics of posts generated by hateful and non-hateful users on Gab (gab.com) over a massive dataset of 341K users and 21M posts. Our observations confirms that hateful content diffuse farther, wider and faster and have a greater outreach than those of non-hateful users. A deeper inspection into the profiles and network of hateful and non-hateful users reveals that the former are more influential, popular and cohesive. Thus, our research explores the interesting facets of diffusion dynamics of hateful users and broadens our understanding of hate speech in the online world.
△ Less
Submitted 4 December, 2018;
originally announced December 2018.
-
DynamicGEM: A Library for Dynamic Graph Embedding Methods
Authors:
Palash Goyal,
Sujit Rokka Chhetri,
Ninareh Mehrabi,
Emilio Ferrara,
Arquimedes Canedo
Abstract:
DynamicGEM is an open-source Python library for learning node representations of dynamic graphs. It consists of state-of-the-art algorithms for defining embeddings of nodes whose connections evolve over time. The library also contains the evaluation framework for four downstream tasks on the network: graph reconstruction, static and temporal link prediction, node classification, and temporal visua…
▽ More
DynamicGEM is an open-source Python library for learning node representations of dynamic graphs. It consists of state-of-the-art algorithms for defining embeddings of nodes whose connections evolve over time. The library also contains the evaluation framework for four downstream tasks on the network: graph reconstruction, static and temporal link prediction, node classification, and temporal visualization. We have implemented various metrics to evaluate the state-of-the-art methods, and examples of evolving networks from various domains. We have easy-to-use functions to call and evaluate the methods and have extensive usage documentation. Furthermore, DynamicGEM provides a template to add new algorithms with ease to facilitate further research on the topic.
△ Less
Submitted 26 November, 2018;
originally announced November 2018.
-
Characterizing the spread of exaggerated news content over social media
Authors:
Jasabanta Patro,
Sabyasachee Baruah,
Vivek Gupta,
Monojit Choudhury,
Pawan Goyal,
Animesh Mukherjee
Abstract:
In this paper, we consider a dataset comprising press releases about health research from different universities in the UK along with a corresponding set of news articles. First, we do an exploratory analysis to understand how the basic information published in the scientific journals get exaggerated as they are reported in these press releases or news articles. This initial analysis shows that so…
▽ More
In this paper, we consider a dataset comprising press releases about health research from different universities in the UK along with a corresponding set of news articles. First, we do an exploratory analysis to understand how the basic information published in the scientific journals get exaggerated as they are reported in these press releases or news articles. This initial analysis shows that some news agencies exaggerate almost 60\% of the articles they publish in the health domain; more than 50\% of the press releases from certain universities are exaggerated; articles in topics like lifestyle and childhood are heavily exaggerated. Motivated by the above observation we set the central objective of this paper to investigate how exaggerated news spreads over an online social network like Twitter. The LIWC analysis points to a remarkable observation these late tweets are essentially laden in words from opinion and realize categories which indicates that, given sufficient time, the wisdom of the crowd is actually able to tell apart the exaggerated news. As a second step we study the characteristics of the users who never or rarely post exaggerated news content and compare them with those who post exaggerated news content more frequently. We observe that the latter class of users have less retweets or mentions per tweet, have significantly more number of followers, use more slang words, less hyperbolic words and less word contractions. We also observe that the LIWC categories like bio, health, body and negative emotion are more pronounced in the tweets posted by the users in the latter class. As a final step we use these observations as features and automatically classify the two groups achieving an F1 score of 0.83.
△ Less
Submitted 19 November, 2018;
originally announced November 2018.
-
Deep Dive into Anonymity: A Large Scale Analysis of Quora Questions
Authors:
Binny Mathew,
Ritam Dutt,
Suman Kalyan Maity,
Pawan Goyal,
Animesh Mukherjee
Abstract:
Anonymity forms an integral and important part of our digital life. It enables us to express our true selves without the fear of judgment. In this paper, we investigate the different aspects of anonymity in the social Q&A site Quora. The choice of Quora is motivated by the fact that this is one of the rare social Q&A sites that allow users to explicitly post anonymous questions and such activity i…
▽ More
Anonymity forms an integral and important part of our digital life. It enables us to express our true selves without the fear of judgment. In this paper, we investigate the different aspects of anonymity in the social Q&A site Quora. The choice of Quora is motivated by the fact that this is one of the rare social Q&A sites that allow users to explicitly post anonymous questions and such activity in this forum has become normative rather than a taboo. Through an analysis of 5.1 million questions, we observe that at a global scale almost no difference manifests between the linguistic structure of the anonymous and the non-anonymous questions. We find that topical mixing at the global scale to be the primary reason for the absence. However, the differences start to feature once we "deep dive" and (topically) cluster the questions and compare the clusters that have high volumes of anonymous questions with those that have low volumes of anonymous questions. In particular, we observe that the choice to post the question as anonymous is dependent on the user's perception of anonymity and they often choose to speak about depression, anxiety, social ties and personal issues under the guise of anonymity. We further perform personality trait analysis and observe that the anonymous group of users has positive correlation with extraversion, agreeableness, and negative correlation with openness. Subsequently, to gain further insights, we build an anonymity grid to identify the differences in the perception on anonymity of the user posting the question and the community of users answering it. We also look into the first response time of the questions and observe that it is lowest for topics which talk about personal and sensitive issues, which hints toward a higher degree of community support and user engagement.
△ Less
Submitted 17 November, 2018;
originally announced November 2018.
-
Persistence and Nonpersistence as Complementary Models of Identical Quantum Particles
Authors:
Philip Goyal
Abstract:
According to our understanding of the everyday physical world, observable phenomena are underpinned by persistent objects that can be reidentified (or tracked) across time by observation of their distinctive properties. This understanding is reflected in classical mechanics, which posits that matter consists of persistent, reidentifiable particles. However, the mathematical symmetrization procedur…
▽ More
According to our understanding of the everyday physical world, observable phenomena are underpinned by persistent objects that can be reidentified (or tracked) across time by observation of their distinctive properties. This understanding is reflected in classical mechanics, which posits that matter consists of persistent, reidentifiable particles. However, the mathematical symmetrization procedures used to describe identical particles within the quantum formalism have led to the widespread belief that identical quantum particles lack either persistence or reidentifiability. However, it has proved difficult to reconcile these assertions with the fact that identical particles are routinely assumed to be reidentifiable in particular circumstances.
Moreover, neither of these assertions accounts for the mathematical form of the symmetrization procedures used to describe identical particles within the quantum framework, leaving open theoretical possibilities other than bosonic and fermionic behavior, such as paraparticles, which do not appear to be realized in nature. Here we propose the novel idea that both persistence and nonpersistence models must be employed in order to fully account for the behaviour of identical particles. Thus, identical particles are neither persistent nor nonpersistent. We prove the viability of this viewpoint by showing how Feynman's and Dirac's symmetrization procedures arise through a synthesis of a quantum treatment of these models, and by showing how reidentifiability emerges in a context-dependent manner. We further show that the persistence and nonpersistence models satisfy the key characteristics of Bohr's concept of complementarity, and thereby propose that the behavior of identical particles is a manifestation of a persistence-nonpersistence complementarity, analogous to Bohr's wave-particle complementarity for individual particles.
△ Less
Submitted 31 October, 2018;
originally announced October 2018.
-
Global Attractor For Weakly Damped, Forced Mkdv Equation Below Energy Space
Authors:
Prashant Goyal
Abstract:
We prove the existence of the global attractor in $ \dot H^s$, $s > 11/12$ for the weakly damped and forced mKdV on the one dimensional torus. The existence of global attractor below the energy space has not been known, though the global well-posedness below the energy space is established. We directly apply the I-method to the damped and forced mKdV, because the Miura transformation does not work…
▽ More
We prove the existence of the global attractor in $ \dot H^s$, $s > 11/12$ for the weakly damped and forced mKdV on the one dimensional torus. The existence of global attractor below the energy space has not been known, though the global well-posedness below the energy space is established. We directly apply the I-method to the damped and forced mKdV, because the Miura transformation does not work for the mKdV with dam** and forcing terms. We need to make a close investigation into the trilinear estimates involving resonant frequencies, which are different from the bilinear estimates corresponding to the KdV.
△ Less
Submitted 25 September, 2018;
originally announced September 2018.
-
dyngraph2vec: Capturing Network Dynamics using Dynamic Graph Representation Learning
Authors:
Palash Goyal,
Sujit Rokka Chhetri,
Arquimedes Canedo
Abstract:
Learning graph representations is a fundamental task aimed at capturing various properties of graphs in vector space. The most recent methods learn such representations for static networks. However, real world networks evolve over time and have varying dynamics. Capturing such evolution is key to predicting the properties of unseen networks. To understand how the network dynamics affect the predic…
▽ More
Learning graph representations is a fundamental task aimed at capturing various properties of graphs in vector space. The most recent methods learn such representations for static networks. However, real world networks evolve over time and have varying dynamics. Capturing such evolution is key to predicting the properties of unseen networks. To understand how the network dynamics affect the prediction performance, we propose an embedding approach which learns the structure of evolution in dynamic graphs and can predict unseen links with higher precision. Our model, dyngraph2vec, learns the temporal transitions in the network using a deep architecture composed of dense and recurrent layers. We motivate the need of capturing dynamics for prediction on a toy data set created using stochastic block models. We then demonstrate the efficacy of dyngraph2vec over existing state-of-the-art methods on two real world data sets. We observe that learning dynamics can improve the quality of embedding and yield better performance in link prediction.
△ Less
Submitted 2 July, 2019; v1 submitted 7 September, 2018;
originally announced September 2018.
-
Upcycle Your OCR: Reusing OCRs for Post-OCR Text Correction in Romanised Sanskrit
Authors:
Amrith Krishna,
Bodhisattwa Prasad Majumder,
Rajesh Shreedhar Bhat,
Pawan Goyal
Abstract:
We propose a post-OCR text correction approach for digitising texts in Romanised Sanskrit. Owing to the lack of resources our approach uses OCR models trained for other languages written in Roman. Currently, there exists no dataset available for Romanised Sanskrit OCR. So, we bootstrap a dataset of 430 images, scanned in two different settings and their corresponding ground truth. For training, we…
▽ More
We propose a post-OCR text correction approach for digitising texts in Romanised Sanskrit. Owing to the lack of resources our approach uses OCR models trained for other languages written in Roman. Currently, there exists no dataset available for Romanised Sanskrit OCR. So, we bootstrap a dataset of 430 images, scanned in two different settings and their corresponding ground truth. For training, we synthetically generate training images for both the settings. We find that the use of copying mechanism (Gu et al., 2016) yields a percentage increase of 7.69 in Character Recognition Rate (CRR) than the current state of the art model in solving monotone sequence-to-sequence tasks (Schnober et al., 2016). We find that our system is robust in combating OCR-prone errors, as it obtains a CRR of 87.01% from an OCR output with CRR of 35.76% for one of the dataset settings. A human judgment survey performed on the models shows that our proposed model results in predictions which are faster to comprehend and faster to improve for a human than the other systems.
△ Less
Submitted 6 September, 2018;
originally announced September 2018.
-
Free as in Free Word Order: An Energy Based Model for Word Segmentation and Morphological Tagging in Sanskrit
Authors:
Amrith Krishna,
Bishal Santra,
Sasi Prasanth Bandaru,
Gaurav Sahu,
Vishnu Dutt Sharma,
Pavankumar Satuluri,
Pawan Goyal
Abstract:
The configurational information in sentences of a free word order language such as Sanskrit is of limited use. Thus, the context of the entire sentence will be desirable even for basic processing tasks such as word segmentation. We propose a structured prediction framework that jointly solves the word segmentation and morphological tagging tasks in Sanskrit. We build an energy based model where we…
▽ More
The configurational information in sentences of a free word order language such as Sanskrit is of limited use. Thus, the context of the entire sentence will be desirable even for basic processing tasks such as word segmentation. We propose a structured prediction framework that jointly solves the word segmentation and morphological tagging tasks in Sanskrit. We build an energy based model where we adopt approaches generally employed in graph based parsing techniques (McDonald et al., 2005a; Carreras, 2007). Our model outperforms the state of the art with an F-Score of 96.92 (percentage improvement of 7.06%) while using less than one-tenth of the task-specific training data. We find that the use of a graph based ap- proach instead of a traditional lattice-based sequential labelling approach leads to a percentage gain of 12.6% in F-Score for the segmentation task.
△ Less
Submitted 25 October, 2018; v1 submitted 5 September, 2018;
originally announced September 2018.
-
Opinion Conflicts: An Effective Route to Detect Incivility in Twitter
Authors:
Suman Kalyan Maity,
Aishik Chakraborty,
Pawan Goyal,
Animesh Mukherjee
Abstract:
In Twitter, there is a rising trend in abusive behavior which often leads to incivility. This trend is affecting users mentally and as a result they tend to leave Twitter and other such social networking sites thus depleting the active user base. In this paper, we study factors associated with incivility. We observe that the act of incivility is highly correlated with the opinion differences betwe…
▽ More
In Twitter, there is a rising trend in abusive behavior which often leads to incivility. This trend is affecting users mentally and as a result they tend to leave Twitter and other such social networking sites thus depleting the active user base. In this paper, we study factors associated with incivility. We observe that the act of incivility is highly correlated with the opinion differences between the account holder (i.e., the user writing the incivil tweet) and the target (i.e., the user for whom the incivil tweet is meant for or targeted), toward a named entity. We introduce a character level CNN model and incorporate the entity-specific sentiment information for efficient incivility detection which significantly outperforms multiple baseline methods achieving an impressive accuracy of 93.3% (4.9% improvement over the best baseline). In a post-hoc analysis, we also study the behavioral aspects of the targets and account holders and try to understand the reasons behind the incivility incidents. Interestingly, we observe that there are strong signals of repetitions in incivil behavior. In particular, we find that there are a significant fraction of account holders who act as repeat offenders - attacking the targets even more than 10 times. Similarly, there are also targets who get targeted multiple times. In general, the targets are found to have higher reputation scores than the account holders.
△ Less
Submitted 2 September, 2018;
originally announced September 2018.
-
Future Automation Engineering using Structural Graph Convolutional Neural Networks
Authors:
Jiang Wan,
Blake S. Pollard,
Sujit Rokka Chhetri,
Palash Goyal,
Mohammad Abdullah Al Faruque,
Arquimedes Canedo
Abstract:
The digitalization of automation engineering generates large quantities of engineering data that is interlinked in knowledge graphs. Classifying and clustering subgraphs according to their functionality is useful to discover functionally equivalent engineering artifacts that exhibit different graph structures. This paper presents a new graph learning algorithm designed to classify engineering data…
▽ More
The digitalization of automation engineering generates large quantities of engineering data that is interlinked in knowledge graphs. Classifying and clustering subgraphs according to their functionality is useful to discover functionally equivalent engineering artifacts that exhibit different graph structures. This paper presents a new graph learning algorithm designed to classify engineering data artifacts -- represented in the form of graphs -- according to their structure and neighborhood features. Our Structural Graph Convolutional Neural Network (SGCNN) is capable of learning graphs and subgraphs with a novel graph invariant convolution kernel and downsampling/pooling algorithm. On a realistic engineering-related dataset, we show that SGCNN is capable of achieving ~91% classification accuracy.
△ Less
Submitted 24 August, 2018;
originally announced August 2018.
-
Thou shalt not hate: Countering Online Hate Speech
Authors:
Binny Mathew,
Punyajoy Saha,
Hardik Tharad,
Subham Rajgaria,
Prajwal Singhania,
Suman Kalyan Maity,
Pawan Goyal,
Animesh Mukherje
Abstract:
Hate content in social media is ever-increasing. While Facebook, Twitter, Google have attempted to take several steps to tackle the hateful content, they have mostly been unsuccessful. Counterspeech is seen as an effective way of tackling the online hate without any harm to the freedom of speech. Thus, an alternative strategy for these platforms could be to promote counterspeech as a defense again…
▽ More
Hate content in social media is ever-increasing. While Facebook, Twitter, Google have attempted to take several steps to tackle the hateful content, they have mostly been unsuccessful. Counterspeech is seen as an effective way of tackling the online hate without any harm to the freedom of speech. Thus, an alternative strategy for these platforms could be to promote counterspeech as a defense against hate content. However, in order to have a successful promotion of such counterspeech, one has to have a deep understanding of its dynamics in the online world. Lack of carefully curated data largely inhibits such understanding. In this paper, we create and release the first ever dataset for counterspeech using comments from YouTube. The data contains 13,924 manually annotated comments where the labels indicate whether a comment is a counterspeech or not. This data allows us to perform a rigorous measurement study characterizing the linguistic structure of counterspeech for the first time. This analysis results in various interesting insights such as: the counterspeech comments receive much more likes as compared to the non-counterspeech comments, for certain communities majority of the non-counterspeech comments tend to be hate speech, the different types of counterspeech are not all equally effective and the language choice of users posting counterspeech is largely different from those posting non-counterspeech as revealed by a detailed psycholinguistic analysis. Finally, we build a set of machine learning models that are able to automatically detect counterspeech in YouTube videos with an F1-score of 0.71. We also build multilabel models that can detect different types of counterspeech in a comment with an F1-score of 0.60.
△ Less
Submitted 4 April, 2019; v1 submitted 13 August, 2018;
originally announced August 2018.
-
Secure Incentivization for Decentralized Content Delivery
Authors:
Prateesh Goyal,
Ravi Netravali,
Mohammad Alizadeh,
Hari Balakrishnan
Abstract:
Prior research has proposed technical solutions to use peer-to-peer (P2P) content delivery to serve Internet video, showing that it can reduce costs to content providers. Yet, such methods have not become widespread except for a few niche instances. An important challenge is incentivization: what tangible benefits does P2P content delivery offer users who bring resources to the table? In this pape…
▽ More
Prior research has proposed technical solutions to use peer-to-peer (P2P) content delivery to serve Internet video, showing that it can reduce costs to content providers. Yet, such methods have not become widespread except for a few niche instances. An important challenge is incentivization: what tangible benefits does P2P content delivery offer users who bring resources to the table? In this paper, we ask whether monetary incentives can help attract peers in P2P content delivery systems. We commissioned a professional survey of people around theUnited States to answer several relevant questions. We found that 51% of the 876 respondents--substantially larger than our expectations--answered "yes" to whether they would participate for suitable financial incentives. Encouraged by the results of the survey, we propose Gringotts, a system to structure incentives and securely incorporate P2P delivery into content delivery systems. Gringotts provides a novel Proof of Delivery mechanism that allows content providers to verify correct delivery of their files, and shows how to use cryptocurrency to pay peers while guarding against liars and Sybil attacks.
△ Less
Submitted 2 August, 2018;
originally announced August 2018.
-
WikiRef: Wikilinks as a route to recommending appropriate references for scientific Wikipedia pages
Authors:
Abhik Jana,
Pranjal Kanojiya,
Pawan Goyal,
Animesh Mukherjee
Abstract:
The exponential increase in the usage of Wikipedia as a key source of scientific knowledge among the researchers is making it absolutely necessary to metamorphose this knowledge repository into an integral and self-contained source of information for direct utilization. Unfortunately, the references which support the content of each Wikipedia entity page, are far from complete. Why are the referen…
▽ More
The exponential increase in the usage of Wikipedia as a key source of scientific knowledge among the researchers is making it absolutely necessary to metamorphose this knowledge repository into an integral and self-contained source of information for direct utilization. Unfortunately, the references which support the content of each Wikipedia entity page, are far from complete. Why are the reference section ill-formed for most Wikipedia pages? Is this section edited as frequently as the other sections of a page? Can there be appropriate surrogates that can automatically enhance the reference section? In this paper, we propose a novel two step approach -- WikiRef -- that (i) leverages the wikilinks present in a scientific Wikipedia target page and, thereby, (ii) recommends highly relevant references to be included in that target page appropriately and automatically borrowed from the reference section of the wikilinks. In the first step, we build a classifier to ascertain whether a wikilink is a potential source of reference or not. In the following step, we recommend references to the target page from the reference section of the wikilinks that are classified as potential sources of references in the first step. We perform an extensive evaluation of our approach on datasets from two different domains -- Computer Science and Physics. For Computer Science we achieve a notably good performance with a precision@1 of 0.44 for reference recommendation as opposed to 0.38 obtained from the most competitive baseline. For the Physics dataset, we obtain a similar performance boost of 10% with respect to the most competitive baseline.
△ Less
Submitted 15 June, 2018; v1 submitted 11 June, 2018;
originally announced June 2018.
-
Discovering Signals from Web Sources to Predict Cyber Attacks
Authors:
Palash Goyal,
KSM Tozammel Hossain,
Ashok Deb,
Nazgol Tavabi,
Nathan Bartley,
Andr'es Abeliuk,
Emilio Ferrara,
Kristina Lerman
Abstract:
Cyber attacks are growing in frequency and severity. Over the past year alone we have witnessed massive data breaches that stole personal information of millions of people and wide-scale ransomware attacks that paralyzed critical infrastructure of several countries. Combating the rising cyber threat calls for a multi-pronged strategy, which includes predicting when these attacks will occur. The in…
▽ More
Cyber attacks are growing in frequency and severity. Over the past year alone we have witnessed massive data breaches that stole personal information of millions of people and wide-scale ransomware attacks that paralyzed critical infrastructure of several countries. Combating the rising cyber threat calls for a multi-pronged strategy, which includes predicting when these attacks will occur. The intuition driving our approach is this: during the planning and preparation stages, hackers leave digital traces of their activities on both the surface web and dark web in the form of discussions on platforms like hacker forums, social media, blogs and the like. These data provide predictive signals that allow anticipating cyber attacks. In this paper, we describe machine learning techniques based on deep neural networks and autoregressive time series models that leverage external signals from publicly available Web sources to forecast cyber attacks. Performance of our framework across ground truth data over real-world forecasting tasks shows that our methods yield a significant lift or increase of F1 for the top signals on predicted cyber attacks. Our results suggest that, when deployed, our system will be able to provide an effective line of defense against various types of targeted cyber attacks.
△ Less
Submitted 8 June, 2018;
originally announced June 2018.
-
DynGEM: Deep Embedding Method for Dynamic Graphs
Authors:
Palash Goyal,
Nitin Kamra,
Xinran He,
Yan Liu
Abstract:
Embedding large graphs in low dimensional spaces has recently attracted significant interest due to its wide applications such as graph visualization, link prediction and node classification. Existing methods focus on computing the embedding for static graphs. However, many graphs in practical applications are dynamic and evolve constantly over time. Naively applying existing embedding algorithms…
▽ More
Embedding large graphs in low dimensional spaces has recently attracted significant interest due to its wide applications such as graph visualization, link prediction and node classification. Existing methods focus on computing the embedding for static graphs. However, many graphs in practical applications are dynamic and evolve constantly over time. Naively applying existing embedding algorithms to each snapshot of dynamic graphs independently usually leads to unsatisfactory performance in terms of stability, flexibility and efficiency. In this work, we present an efficient algorithm DynGEM based on recent advances in deep autoencoders for graph embeddings, to address this problem. The major advantages of DynGEM include: (1) the embedding is stable over time, (2) it can handle growing dynamic graphs, and (3) it has better running time than using static embedding methods on each snapshot of a dynamic graph. We test DynGEM on a variety of tasks including graph visualization, graph reconstruction, link prediction and anomaly detection (on both synthetic and real datasets). Experimental results demonstrate the superior stability and scalability of our approach.
△ Less
Submitted 29 May, 2018;
originally announced May 2018.
-
Deep Neural Networks for Optimal Team Composition
Authors:
Anna Sapienza,
Palash Goyal,
Emilio Ferrara
Abstract:
Cooperation is a fundamental social mechanism, whose effects on human performance have been investigated in several environments. Online games are modern-days natural settings in which cooperation strongly affects human behavior. Every day, millions of players connect and play together in team-based games: the patterns of cooperation can either foster or hinder individual skill learning and perfor…
▽ More
Cooperation is a fundamental social mechanism, whose effects on human performance have been investigated in several environments. Online games are modern-days natural settings in which cooperation strongly affects human behavior. Every day, millions of players connect and play together in team-based games: the patterns of cooperation can either foster or hinder individual skill learning and performance. This work has three goals: (i) identifying teammates' influence on players' performance in the short and long term, (ii) designing a computational framework to recommend teammates to improve players' performance, and (iii) setting to demonstrate that such improvements can be predicted via deep learning. We leverage a large dataset from Dota 2, a popular Multiplayer Online Battle Arena game. We generate a directed co-play network, whose links' weights depict the effect of teammates on players' performance. Specifically, we propose a measure of network influence that captures skill transfer from player to player over time. We then use such framing to design a recommendation system to suggest new teammates based on a modified deep neural autoencoder and we demonstrate its state-of-the-art recommendation performance. We finally provide insights into skill transfer effects: our experimental results demonstrate that such dynamics can be predicted using deep neural networks.
△ Less
Submitted 8 May, 2018;
originally announced May 2018.
-
Capturing Edge Attributes via Network Embedding
Authors:
Palash Goyal,
Homa Hosseinmardi,
Emilio Ferrara,
Aram Galstyan
Abstract:
Network embedding, which aims to learn low-dimensional representations of nodes, has been used for various graph related tasks including visualization, link prediction and node classification. Most existing embedding methods rely solely on network structure. However, in practice we often have auxiliary information about the nodes and/or their interactions, e.g., content of scientific papers in co-…
▽ More
Network embedding, which aims to learn low-dimensional representations of nodes, has been used for various graph related tasks including visualization, link prediction and node classification. Most existing embedding methods rely solely on network structure. However, in practice we often have auxiliary information about the nodes and/or their interactions, e.g., content of scientific papers in co-authorship networks, or topics of communication in Twitter mention networks. Here we propose a novel embedding method that uses both network structure and edge attributes to learn better network representations. Our method jointly minimizes the reconstruction error for higher-order node neighborhood, social roles and edge attributes using a deep architecture that can adequately capture highly non-linear interactions. We demonstrate the efficacy of our model over existing state-of-the-art methods on a variety of real-world networks including collaboration networks, and social networks. We also observe that using edge attributes to inform network embedding yields better performance in downstream tasks such as link prediction and node classification.
△ Less
Submitted 22 May, 2018; v1 submitted 8 May, 2018;
originally announced May 2018.