-
MUGEN: A Playground for Video-Audio-Text Multimodal Understanding and GENeration
Authors:
Thomas Hayes,
Songyang Zhang,
Xi Yin,
Guan Pang,
Sasha Sheng,
Harry Yang,
Songwei Ge,
Qiyuan Hu,
Devi Parikh
Abstract:
Multimodal video-audio-text understanding and generation can benefit from datasets that are narrow but rich. The narrowness allows bite-sized challenges that the research community can make progress on. The richness ensures we are making progress along the core challenges. To this end, we present a large-scale video-audio-text dataset MUGEN, collected using the open-sourced platform game CoinRun […
▽ More
Multimodal video-audio-text understanding and generation can benefit from datasets that are narrow but rich. The narrowness allows bite-sized challenges that the research community can make progress on. The richness ensures we are making progress along the core challenges. To this end, we present a large-scale video-audio-text dataset MUGEN, collected using the open-sourced platform game CoinRun [11]. We made substantial modifications to make the game richer by introducing audio and enabling new interactions. We trained RL agents with different objectives to navigate the game and interact with 13 objects and characters. This allows us to automatically extract a large collection of diverse videos and associated audio. We sample 375K video clips (3.2s each) and collect text descriptions from human annotators. Each video has additional annotations that are extracted automatically from the game engine, such as accurate semantic maps for each frame and templated textual descriptions. Altogether, MUGEN can help progress research in many tasks in multimodal understanding and generation. We benchmark representative approaches on tasks involving video-audio-text retrieval and generation. Our dataset and code are released at: https://mugen-org.github.io/.
△ Less
Submitted 28 April, 2022; v1 submitted 17 April, 2022;
originally announced April 2022.
-
Long Video Generation with Time-Agnostic VQGAN and Time-Sensitive Transformer
Authors:
Songwei Ge,
Thomas Hayes,
Harry Yang,
Xi Yin,
Guan Pang,
David Jacobs,
Jia-Bin Huang,
Devi Parikh
Abstract:
Videos are created to express emotion, exchange information, and share experiences. Video synthesis has intrigued researchers for a long time. Despite the rapid progress driven by advances in visual synthesis, most existing studies focus on improving the frames' quality and the transitions between them, while little progress has been made in generating longer videos. In this paper, we present a me…
▽ More
Videos are created to express emotion, exchange information, and share experiences. Video synthesis has intrigued researchers for a long time. Despite the rapid progress driven by advances in visual synthesis, most existing studies focus on improving the frames' quality and the transitions between them, while little progress has been made in generating longer videos. In this paper, we present a method that builds on 3D-VQGAN and transformers to generate videos with thousands of frames. Our evaluation shows that our model trained on 16-frame video clips from standard benchmarks such as UCF-101, Sky Time-lapse, and Taichi-HD datasets can generate diverse, coherent, and high-quality long videos. We also showcase conditional extensions of our approach for generating meaningful long videos by incorporating temporal information with text and audio. Videos and code can be found at https://songweige.github.io/projects/tats/index.html.
△ Less
Submitted 24 September, 2022; v1 submitted 7 April, 2022;
originally announced April 2022.
-
Catching Both Gray and Black Swans: Open-set Supervised Anomaly Detection
Authors:
Choubo Ding,
Guansong Pang,
Chunhua Shen
Abstract:
Despite most existing anomaly detection studies assume the availability of normal training samples only, a few labeled anomaly examples are often available in many real-world applications, such as defect samples identified during random quality inspection, lesion images confirmed by radiologists in daily medical screening, etc. These anomaly examples provide valuable knowledge about the applicatio…
▽ More
Despite most existing anomaly detection studies assume the availability of normal training samples only, a few labeled anomaly examples are often available in many real-world applications, such as defect samples identified during random quality inspection, lesion images confirmed by radiologists in daily medical screening, etc. These anomaly examples provide valuable knowledge about the application-specific abnormality, enabling significantly improved detection of similar anomalies in some recent models. However, those anomalies seen during training often do not illustrate every possible class of anomaly, rendering these models ineffective in generalizing to unseen anomaly classes. This paper tackles open-set supervised anomaly detection, in which we learn detection models using the anomaly examples with the objective to detect both seen anomalies (`gray swans') and unseen anomalies (`black swans'). We propose a novel approach that learns disentangled representations of abnormalities illustrated by seen anomalies, pseudo anomalies, and latent residual anomalies (i.e., samples that have unusual residuals compared to the normal data in a latent space), with the last two abnormalities designed to detect unseen anomalies. Extensive experiments on nine real-world anomaly detection datasets show superior performance of our model in detecting seen and unseen anomalies under diverse settings. Code and data are available at: https://github.com/choubo/DRA.
△ Less
Submitted 28 March, 2022;
originally announced March 2022.
-
Contrastive Transformer-based Multiple Instance Learning for Weakly Supervised Polyp Frame Detection
Authors:
Yu Tian,
Guansong Pang,
Fengbei Liu,
Yuyuan Liu,
Chong Wang,
Yuanhong Chen,
Johan W Verjans,
Gustavo Carneiro
Abstract:
Current polyp detection methods from colonoscopy videos use exclusively normal (i.e., healthy) training images, which i) ignore the importance of temporal information in consecutive video frames, and ii) lack knowledge about the polyps. Consequently, they often have high detection errors, especially on challenging polyp cases (e.g., small, flat, or partially visible polyps). In this work, we formu…
▽ More
Current polyp detection methods from colonoscopy videos use exclusively normal (i.e., healthy) training images, which i) ignore the importance of temporal information in consecutive video frames, and ii) lack knowledge about the polyps. Consequently, they often have high detection errors, especially on challenging polyp cases (e.g., small, flat, or partially visible polyps). In this work, we formulate polyp detection as a weakly-supervised anomaly detection task that uses video-level labelled training data to detect frame-level polyps. In particular, we propose a novel convolutional transformer-based multiple instance learning method designed to identify abnormal frames (i.e., frames with polyps) from anomalous videos (i.e., videos containing at least one frame with polyp). In our method, local and global temporal dependencies are seamlessly captured while we simultaneously optimise video and snippet-level anomaly scores. A contrastive snippet mining method is also proposed to enable an effective modelling of the challenging polyp cases. The resulting method achieves a detection accuracy that is substantially better than current state-of-the-art approaches on a new large-scale colonoscopy video dataset introduced in this work.
△ Less
Submitted 18 May, 2022; v1 submitted 22 March, 2022;
originally announced March 2022.
-
Unsupervised Anomaly Detection in Medical Images with a Memory-augmented Multi-level Cross-attentional Masked Autoencoder
Authors:
Yu Tian,
Guansong Pang,
Yuyuan Liu,
Chong Wang,
Yuanhong Chen,
Fengbei Liu,
Rajvinder Singh,
Johan W Verjans,
Mengyu Wang,
Gustavo Carneiro
Abstract:
Unsupervised anomaly detection (UAD) aims to find anomalous images by optimising a detector using a training set that contains only normal images. UAD approaches can be based on reconstruction methods, self-supervised approaches, and Imagenet pre-trained models. Reconstruction methods, which detect anomalies from image reconstruction errors, are advantageous because they do not rely on the design…
▽ More
Unsupervised anomaly detection (UAD) aims to find anomalous images by optimising a detector using a training set that contains only normal images. UAD approaches can be based on reconstruction methods, self-supervised approaches, and Imagenet pre-trained models. Reconstruction methods, which detect anomalies from image reconstruction errors, are advantageous because they do not rely on the design of problem-specific pretext tasks needed by self-supervised approaches, and on the unreliable translation of models pre-trained from non-medical datasets. However, reconstruction methods may fail because they can have low reconstruction errors even for anomalous images. In this paper, we introduce a new reconstruction-based UAD approach that addresses this low-reconstruction error issue for anomalous images. Our UAD approach, the memory-augmented multi-level cross-attentional masked autoencoder (MemMC-MAE), is a transformer-based approach, consisting of a novel memory-augmented self-attention operator for the encoder and a new multi-level cross-attention operator for the decoder. MemMCMAE masks large parts of the input image during its reconstruction, reducing the risk that it will produce low reconstruction errors because anomalies are likely to be masked and cannot be reconstructed. However, when the anomaly is not masked, then the normal patterns stored in the encoder's memory combined with the decoder's multi-level cross attention will constrain the accurate reconstruction of the anomaly. We show that our method achieves SOTA anomaly detection and localisation on colonoscopy, pneumonia, and covid-19 chest x-ray datasets.
△ Less
Submitted 21 August, 2023; v1 submitted 22 March, 2022;
originally announced March 2022.
-
Birth and Death Processes in Interactive Random Environments
Authors:
Guodong Pang,
Andrey Sarantsev,
Yuri Suhov
Abstract:
This paper studies birth and death processes in interactive random environments where the birth and death rates and the dynamics of the state of the environment are dependent on each other. Two models of a random environment are considered: a continuous-time Markov chain (finite or countably infinite) and a reflected (jump) diffusion process. The background is determined by a joint Markov process…
▽ More
This paper studies birth and death processes in interactive random environments where the birth and death rates and the dynamics of the state of the environment are dependent on each other. Two models of a random environment are considered: a continuous-time Markov chain (finite or countably infinite) and a reflected (jump) diffusion process. The background is determined by a joint Markov process carrying a specific interactive mechanism, with an explicit invariant measure whose structure is similar to a product form. We discuss a number of queueing and population-growth models and establish conditions under which the above-mentioned invariant measure can be derived.
Next, an analysis of the rate of convergence to stationarity is performed for the models under consideration. We consider two settings leading to either an exponential or a polynomial convergence rate. In both cases we assume that the underlying environmental Markov process has an exponential rate of convergence, but the convergence rate of the joint Markov process is determined by certain conditions on the birth and death rates. To prove these results a coupling method turns out to be useful.
△ Less
Submitted 24 June, 2022; v1 submitted 19 March, 2022;
originally announced March 2022.
-
Deep Learning for Hate Speech Detection: A Comparative Study
Authors:
Jitendra Singh Malik,
Hezhe Qiao,
Guansong Pang,
Anton van den Hengel
Abstract:
Automated hate speech detection is an important tool in combating the spread of hate speech, particularly in social media. Numerous methods have been developed for the task, including a recent proliferation of deep-learning based approaches. A variety of datasets have also been developed, exemplifying various manifestations of the hate-speech detection problem. We present here a large-scale empiri…
▽ More
Automated hate speech detection is an important tool in combating the spread of hate speech, particularly in social media. Numerous methods have been developed for the task, including a recent proliferation of deep-learning based approaches. A variety of datasets have also been developed, exemplifying various manifestations of the hate-speech detection problem. We present here a large-scale empirical comparison of deep and shallow hate-speech detection methods, mediated through the three most commonly used datasets. Our goal is to illuminate progress in the area, and identify strengths and weaknesses in the current state-of-the-art. We particularly focus our analysis on measures of practical performance, including detection accuracy, computational efficiency, capability in using pre-trained models, and domain generalization. In doing so we aim to provide guidance as to the use of hate-speech detection in practice, quantify the state-of-the-art, and identify future research directions. Code and dataset are available at https://github.com/jmjmalik22/Hate-Speech-Detection.
△ Less
Submitted 6 December, 2023; v1 submitted 18 February, 2022;
originally announced February 2022.
-
Deep Graph-level Anomaly Detection by Glocal Knowledge Distillation
Authors:
Rongrong Ma,
Guansong Pang,
Ling Chen,
Anton van den Hengel
Abstract:
Graph-level anomaly detection (GAD) describes the problem of detecting graphs that are abnormal in their structure and/or the features of their nodes, as compared to other graphs. One of the challenges in GAD is to devise graph representations that enable the detection of both locally- and globally-anomalous graphs, i.e., graphs that are abnormal in their fine-grained (node-level) or holistic (gra…
▽ More
Graph-level anomaly detection (GAD) describes the problem of detecting graphs that are abnormal in their structure and/or the features of their nodes, as compared to other graphs. One of the challenges in GAD is to devise graph representations that enable the detection of both locally- and globally-anomalous graphs, i.e., graphs that are abnormal in their fine-grained (node-level) or holistic (graph-level) properties, respectively. To tackle this challenge we introduce a novel deep anomaly detection approach for GAD that learns rich global and local normal pattern information by joint random distillation of graph and node representations. The random distillation is achieved by training one GNN to predict another GNN with randomly initialized network weights. Extensive experiments on 16 real-world graph datasets from diverse domains show that our model significantly outperforms seven state-of-the-art models. Code and datasets are available at https://git.io/GLocalKD.
△ Less
Submitted 19 December, 2021;
originally announced December 2021.
-
Pixel-wise Energy-biased Abstention Learning for Anomaly Segmentation on Complex Urban Driving Scenes
Authors:
Yu Tian,
Yuyuan Liu,
Guansong Pang,
Fengbei Liu,
Yuanhong Chen,
Gustavo Carneiro
Abstract:
State-of-the-art (SOTA) anomaly segmentation approaches on complex urban driving scenes explore pixel-wise classification uncertainty learned from outlier exposure, or external reconstruction models. However, previous uncertainty approaches that directly associate high uncertainty to anomaly may sometimes lead to incorrect anomaly predictions, and external reconstruction models tend to be too inef…
▽ More
State-of-the-art (SOTA) anomaly segmentation approaches on complex urban driving scenes explore pixel-wise classification uncertainty learned from outlier exposure, or external reconstruction models. However, previous uncertainty approaches that directly associate high uncertainty to anomaly may sometimes lead to incorrect anomaly predictions, and external reconstruction models tend to be too inefficient for real-time self-driving embedded systems. In this paper, we propose a new anomaly segmentation method, named pixel-wise energy-biased abstention learning (PEBAL), that explores pixel-wise abstention learning (AL) with a model that learns an adaptive pixel-level anomaly class, and an energy-based model (EBM) that learns inlier pixel distribution. More specifically, PEBAL is based on a non-trivial joint training of EBM and AL, where EBM is trained to output high-energy for anomaly pixels (from outlier exposure) and AL is trained such that these high-energy pixels receive adaptive low penalty for being included to the anomaly class. We extensively evaluate PEBAL against the SOTA and show that it achieves the best performance across four benchmarks. Code is available at https://github.com/tianyu0207/PEBAL.
△ Less
Submitted 5 September, 2022; v1 submitted 23 November, 2021;
originally announced November 2021.
-
Multi-patch multi-group epidemic model with varying infectivity
Authors:
Raphaël Forien,
Guodong Pang,
Étienne Pardoux
Abstract:
This paper presents a law of large numbers result, as the size of the population tends to infinity, of SIR stochastic epidemic models, for a population distributed over $L$ distinct patches (with migrations between them) and $K$ distinct groups (possibly age groups). The limit is a set of Volterra-type integral equations, and the result shows the effects of both spatial and population heterogeneit…
▽ More
This paper presents a law of large numbers result, as the size of the population tends to infinity, of SIR stochastic epidemic models, for a population distributed over $L$ distinct patches (with migrations between them) and $K$ distinct groups (possibly age groups). The limit is a set of Volterra-type integral equations, and the result shows the effects of both spatial and population heterogeneity. The novelty of the model is that the infectivity of an infected individual is infection age dependent. More precisely, to each infected individual is attached a random infection-age dependent infectivity function, such that the various random functions attached to distinct individuals are i.i.d.
The proof involves a novel construction of a sequence of i.i.d. processes to invoke the law of large numbers for processes in $D$, by using the solution of a MacKean-Vlasov type Poisson-driven stochastic equation (as in the propagation of chaos theory). We also establish an identity using the Feynman-Kac formula for an adjoint backward ODE. The advantage of this approach is that it assumes much weaker conditions on the random infectivity functions than our earlier work for the homogeneous model in [20], where standard tightness criteria for convergence of stochastic processes were employed. To illustrate this new approach, we first explain the new proof under the weak assumptions for the homogeneous model, and then describe the multipatch-multigroup model and prove the law of large numbers for that model.
△ Less
Submitted 23 June, 2022; v1 submitted 11 November, 2021;
originally announced November 2021.
-
An approximation to steady-state of M/Ph/n+M queue
Authors:
Xinghu **,
Guodong Pang,
Lihu Xu,
Xin Xu
Abstract:
In this paper, we develop a stochastic algorithm based on Euler-Maruyama scheme to approximate the invariant measure of the limiting multidimensional diffusion of the $M/Ph/n+M$ queue. Specifically, we prove a non-asymptotic error bound between the invariant measures of the approximate model from the algorithm and the limiting diffusion of the queueing model. Our result also provides an approximat…
▽ More
In this paper, we develop a stochastic algorithm based on Euler-Maruyama scheme to approximate the invariant measure of the limiting multidimensional diffusion of the $M/Ph/n+M$ queue. Specifically, we prove a non-asymptotic error bound between the invariant measures of the approximate model from the algorithm and the limiting diffusion of the queueing model. Our result also provides an approximation to the steady-state of the diffusion-scaled queueing processes in the Halfin-Whitt regime given the well established interchange of limits property. To establish the error bound, we employ the recently developed Stein's method for multi-dimensional diffusions, in which the regularity of Stein's equation developed by Gurvich \cite{Gur1} plays a crucial role.
We further prove the central limit theorem (CLT) and the moderate deviation principle (MDP) for the occupation measures of the limiting diffusion of the $M/Ph/n+M$ queue and its Euler-Maruyama scheme. In particular, the variance of the CLT of the limiting queue is determined by using Stein's equation and Malliavin calculus.
△ Less
Submitted 19 December, 2021; v1 submitted 8 September, 2021;
originally announced September 2021.
-
Self-supervised Pseudo Multi-class Pre-training for Unsupervised Anomaly Detection and Segmentation in Medical Images
Authors:
Yu Tian,
Fengbei Liu,
Guansong Pang,
Yuanhong Chen,
Yuyuan Liu,
Johan W. Verjans,
Rajvinder Singh,
Gustavo Carneiro
Abstract:
Unsupervised anomaly detection (UAD) methods are trained with normal (or healthy) images only, but during testing, they are able to classify normal and abnormal (or disease) images. UAD is an important medical image analysis (MIA) method to be applied in disease screening problems because the training sets available for those problems usually contain only normal images. However, the exclusive reli…
▽ More
Unsupervised anomaly detection (UAD) methods are trained with normal (or healthy) images only, but during testing, they are able to classify normal and abnormal (or disease) images. UAD is an important medical image analysis (MIA) method to be applied in disease screening problems because the training sets available for those problems usually contain only normal images. However, the exclusive reliance on normal images may result in the learning of ineffective low-dimensional image representations that are not sensitive enough to detect and segment unseen abnormal lesions of varying size, appearance, and shape. Pre-training UAD methods with self-supervised learning, based on computer vision techniques, can mitigate this challenge, but they are sub-optimal because they do not explore domain knowledge for designing the pretext tasks, and their contrastive learning losses do not try to cluster the normal training images, which may result in a sparse distribution of normal images that is ineffective for anomaly detection. In this paper, we propose a new self-supervised pre-training method for MIA UAD applications, named Pseudo Multi-class Strong Augmentation via Contrastive Learning (PMSACL). PMSACL consists of a novel optimisation method that contrasts a normal image class from multiple pseudo classes of synthesised abnormal images, with each class enforced to form a dense cluster in the feature space. In the experiments, we show that our PMSACL pre-training improves the accuracy of SOTA UAD methods on many MIA benchmarks using colonoscopy, fundus screening and Covid-19 Chest X-ray datasets. The code is made publicly available via https://github.com/tianyu0207/PMSACL.
△ Less
Submitted 14 August, 2023; v1 submitted 3 September, 2021;
originally announced September 2021.
-
Infrared Image Super-Resolution via Heterogeneous Convolutional WGAN
Authors:
Yongsong Huang,
Zetao Jiang,
Qingzhong Wang,
Qi Jiang,
Guoming Pang
Abstract:
Image super-resolution is important in many fields, such as surveillance and remote sensing. However, infrared (IR) images normally have low resolution since the optical equipment is relatively expensive. Recently, deep learning methods have dominated image super-resolution and achieved remarkable performance on visible images; however, IR images have received less attention. IR images have fewer…
▽ More
Image super-resolution is important in many fields, such as surveillance and remote sensing. However, infrared (IR) images normally have low resolution since the optical equipment is relatively expensive. Recently, deep learning methods have dominated image super-resolution and achieved remarkable performance on visible images; however, IR images have received less attention. IR images have fewer patterns, and hence, it is difficult for deep neural networks (DNNs) to learn diverse features from IR images. In this paper, we present a framework that employs heterogeneous convolution and adversarial training, namely, heterogeneous kernel-based super-resolution Wasserstein GAN (HetSRWGAN), for IR image super-resolution. The HetSRWGAN algorithm is a lightweight GAN architecture that applies a plug-and-play heterogeneous kernel-based residual block. Moreover, a novel loss function that employs image gradients is adopted, which can be applied to an arbitrary model. The proposed HetSRWGAN achieves consistently better performance in both qualitative and quantitative evaluations. According to the experimental results, the whole training process is more stable.
△ Less
Submitted 2 September, 2021;
originally announced September 2021.
-
Explainable Deep Few-shot Anomaly Detection with Deviation Networks
Authors:
Guansong Pang,
Choubo Ding,
Chunhua Shen,
Anton van den Hengel
Abstract:
Existing anomaly detection paradigms overwhelmingly focus on training detection models using exclusively normal data or unlabeled data (mostly normal samples). One notorious issue with these approaches is that they are weak in discriminating anomalies from normal samples due to the lack of the knowledge about the anomalies. Here, we study the problem of few-shot anomaly detection, in which we aim…
▽ More
Existing anomaly detection paradigms overwhelmingly focus on training detection models using exclusively normal data or unlabeled data (mostly normal samples). One notorious issue with these approaches is that they are weak in discriminating anomalies from normal samples due to the lack of the knowledge about the anomalies. Here, we study the problem of few-shot anomaly detection, in which we aim at using a few labeled anomaly examples to train sample-efficient discriminative detection models. To address this problem, we introduce a novel weakly-supervised anomaly detection framework to train detection models without assuming the examples illustrating all possible classes of anomaly.
Specifically, the proposed approach learns discriminative normality (regularity) by leveraging the labeled anomalies and a prior probability to enforce expressive representations of normality and unbounded deviated representations of abnormality. This is achieved by an end-to-end optimization of anomaly scores with a neural deviation learning, in which the anomaly scores of normal samples are imposed to approximate scalar scores drawn from the prior while that of anomaly examples is enforced to have statistically significant deviations from these sampled scores in the upper tail. Furthermore, our model is optimized to learn fine-grained normality and abnormality by top-K multiple-instance-learning-based feature subspace deviation learning, allowing more generalized representations. Comprehensive experiments on nine real-world image anomaly detection benchmarks show that our model is substantially more sample-efficient and robust, and performs significantly better than state-of-the-art competing methods in both closed-set and open-set settings. Our model can also offer explanation capability as a result of its prior-driven anomaly score learning. Code and datasets are available at: https://git.io/DevNet.
△ Less
Submitted 1 August, 2021;
originally announced August 2021.
-
Recent Advances in Epidemic Modeling: Non-Markov Stochastic Models and their Scaling Limits
Authors:
Raphael Forien,
Guodong Pang,
Etienne Pardoux
Abstract:
In this survey paper, we review the recent advances in individual based non--Markovian epidemic models. They include epidemic models with a constant infectivity rate, varying infectivity rate or infection-age dependent infectivity, infection-age recovery rate (or equivalently, general law of infectious period), as well as varying susceptibility/immunity. We focus on the scaling limits with a large…
▽ More
In this survey paper, we review the recent advances in individual based non--Markovian epidemic models. They include epidemic models with a constant infectivity rate, varying infectivity rate or infection-age dependent infectivity, infection-age recovery rate (or equivalently, general law of infectious period), as well as varying susceptibility/immunity. We focus on the scaling limits with a large population, functional law of large numbers (FLLN) and functional central limit theorems (FCLT), while the large and moderate deviations for some Markovian epidemic models are also reviewed. In the FLLN, the limits are a set of Volterra integral equations, and in the FCLT, the limits are stochastic Volterra integral equations driven by Gaussian processes. We relate our deterministic limits to the results in the seminal papers by Kermack and McKendrick published in 1927, 1932 and 1933, where the varying infectivity and susceptibility/immunity were already considered. We also discuss some extensions, including models with heterogeneous population, spatial models and control problems, as well as open problems.
△ Less
Submitted 22 September, 2022; v1 submitted 15 June, 2021;
originally announced June 2021.
-
TextStyleBrush: Transfer of Text Aesthetics from a Single Example
Authors:
Praveen Krishnan,
Rama Kovvuri,
Guan Pang,
Boris Vassilev,
Tal Hassner
Abstract:
We present a novel approach for disentangling the content of a text image from all aspects of its appearance. The appearance representation we derive can then be applied to new content, for one-shot transfer of the source style to new content. We learn this disentanglement in a self-supervised manner. Our method processes entire word boxes, without requiring segmentation of text from background, p…
▽ More
We present a novel approach for disentangling the content of a text image from all aspects of its appearance. The appearance representation we derive can then be applied to new content, for one-shot transfer of the source style to new content. We learn this disentanglement in a self-supervised manner. Our method processes entire word boxes, without requiring segmentation of text from background, per-character processing, or making assumptions on string lengths. We show results in different text domains which were previously handled by specialized methods, e.g., scene text, handwritten text. To these ends, we make a number of technical contributions: (1) We disentangle the style and content of a textual image into a non-parametric, fixed-dimensional vector. (2) We propose a novel approach inspired by StyleGAN but conditioned over the example style at different resolution and content. (3) We present novel self-supervised training criteria which preserve both source style and target content using a pre-trained font classifier and text recognizer. Finally, (4) we also introduce Imgur5K, a new challenging dataset for handwritten word images. We offer numerous qualitative photo-realistic results of our method. We further show that our method surpasses previous work in quantitative tests on scene text and handwriting datasets, as well as in a user study.
△ Less
Submitted 15 June, 2021;
originally announced June 2021.
-
Functional law of large numbers and PDEs for epidemic models with infection-age dependent infectivity
Authors:
Guodong Pang,
Etienne Pardoux
Abstract:
We study epidemic models where the infectivity of each individual is a random function of the infection age (the elapsed time of infection). To describe the epidemic evolution dynamics, we use a stochastic process that tracks the number of individuals at each time that have been infected for less than or equal to a certain amount of time, together with the aggregate infectivity process. We establi…
▽ More
We study epidemic models where the infectivity of each individual is a random function of the infection age (the elapsed time of infection). To describe the epidemic evolution dynamics, we use a stochastic process that tracks the number of individuals at each time that have been infected for less than or equal to a certain amount of time, together with the aggregate infectivity process. We establish the functional law of large numbers (FLLN) for the stochastic processes that describe the epidemic dynamics. The limits are described by a set of deterministic integral equations, which has a further characterization using PDEs under some regularity conditions. The solutions are characterized with boundary conditions that are given by a system of Volterra equations. We also characterize the equilibrium points for the PDEs in the SIS model with infection-age dependent infectivity. To establish the FLLNs, we employ a useful criterion for weak convergence for the two-parameter processes together with useful representations for the relevant processes via Poisson random measures.
△ Less
Submitted 28 December, 2022; v1 submitted 7 June, 2021;
originally announced June 2021.
-
TextOCR: Towards large-scale end-to-end reasoning for arbitrary-shaped scene text
Authors:
Amanpreet Singh,
Guan Pang,
Mandy Toh,
**g Huang,
Wojciech Galuba,
Tal Hassner
Abstract:
A crucial component for the scene text based reasoning required for TextVQA and TextCaps datasets involve detecting and recognizing text present in the images using an optical character recognition (OCR) system. The current systems are crippled by the unavailability of ground truth text annotations for these datasets as well as lack of scene text detection and recognition datasets on real images d…
▽ More
A crucial component for the scene text based reasoning required for TextVQA and TextCaps datasets involve detecting and recognizing text present in the images using an optical character recognition (OCR) system. The current systems are crippled by the unavailability of ground truth text annotations for these datasets as well as lack of scene text detection and recognition datasets on real images disallowing the progress in the field of OCR and evaluation of scene text based reasoning in isolation from OCR systems. In this work, we propose TextOCR, an arbitrary-shaped scene text detection and recognition with 900k annotated words collected on real images from TextVQA dataset. We show that current state-of-the-art text-recognition (OCR) models fail to perform well on TextOCR and that training on TextOCR helps achieve state-of-the-art performance on multiple other OCR datasets as well. We use a TextOCR trained OCR model to create PixelM4C model which can do scene text based reasoning on an image in an end-to-end fashion, allowing us to revisit several design choices to achieve new state-of-the-art performance on TextVQA dataset.
△ Less
Submitted 12 May, 2021;
originally announced May 2021.
-
DRAM Failure Prediction in AIOps: Empirical Evaluation, Challenges and Opportunities
Authors:
Zhiyue Wu,
Hongzuo Xu,
Guansong Pang,
Fengyuan Yu,
Yijie Wang,
Songlei Jian,
Yongjun Wang
Abstract:
DRAM failure prediction is a vital task in AIOps, which is crucial to maintain the reliability and sustainable service of large-scale data centers. However, limited work has been done on DRAM failure prediction mainly due to the lack of public available datasets. This paper presents a comprehensive empirical evaluation of diverse machine learning techniques for DRAM failure prediction using a larg…
▽ More
DRAM failure prediction is a vital task in AIOps, which is crucial to maintain the reliability and sustainable service of large-scale data centers. However, limited work has been done on DRAM failure prediction mainly due to the lack of public available datasets. This paper presents a comprehensive empirical evaluation of diverse machine learning techniques for DRAM failure prediction using a large-scale multi-source dataset, including more than three millions of records of kernel, address, and mcelog data, provided by Alibaba Cloud through PAKDD 2021 competition. Particularly, we first formulate the problem as a multi-class classification task and exhaustively evaluate seven popular/state-of-the-art classifiers on both the individual and multiple data sources. We then formulate the problem as an unsupervised anomaly detection task and evaluate three state-of-the-art anomaly detectors. Further, based on the empirical results and our experience of attending this competition, we discuss major challenges and present future research opportunities in this task.
△ Less
Submitted 3 May, 2021; v1 submitted 30 April, 2021;
originally announced April 2021.
-
A Multiplexed Network for End-to-End, Multilingual OCR
Authors:
**g Huang,
Guan Pang,
Rama Kovvuri,
Mandy Toh,
Kevin J Liang,
Praveen Krishnan,
Xi Yin,
Tal Hassner
Abstract:
Recent advances in OCR have shown that an end-to-end (E2E) training pipeline that includes both detection and recognition leads to the best results. However, many existing methods focus primarily on Latin-alphabet languages, often even only case-insensitive English characters. In this paper, we propose an E2E approach, Multiplexed Multilingual Mask TextSpotter, that performs script identification…
▽ More
Recent advances in OCR have shown that an end-to-end (E2E) training pipeline that includes both detection and recognition leads to the best results. However, many existing methods focus primarily on Latin-alphabet languages, often even only case-insensitive English characters. In this paper, we propose an E2E approach, Multiplexed Multilingual Mask TextSpotter, that performs script identification at the word level and handles different scripts with different recognition heads, all while maintaining a unified loss that simultaneously optimizes script identification and multiple recognition heads. Experiments show that our method outperforms the single-head model with similar number of parameters in end-to-end recognition tasks, and achieves state-of-the-art results on MLT17 and MLT19 joint text detection and script identification benchmarks. We believe that our work is a step towards the end-to-end trainable and scalable multilingual multi-purpose OCR system. Our code and model will be released.
△ Less
Submitted 29 March, 2021;
originally announced March 2021.
-
Homophily Outlier Detection in Non-IID Categorical Data
Authors:
Guansong Pang,
Longbing Cao,
Ling Chen
Abstract:
Most of existing outlier detection methods assume that the outlier factors (i.e., outlierness scoring measures) of data entities (e.g., feature values and data objects) are Independent and Identically Distributed (IID). This assumption does not hold in real-world applications where the outlierness of different entities is dependent on each other and/or taken from different probability distribution…
▽ More
Most of existing outlier detection methods assume that the outlier factors (i.e., outlierness scoring measures) of data entities (e.g., feature values and data objects) are Independent and Identically Distributed (IID). This assumption does not hold in real-world applications where the outlierness of different entities is dependent on each other and/or taken from different probability distributions (non-IID). This may lead to the failure of detecting important outliers that are too subtle to be identified without considering the non-IID nature. The issue is even intensified in more challenging contexts, e.g., high-dimensional data with many noisy features. This work introduces a novel outlier detection framework and its two instances to identify outliers in categorical data by capturing non-IID outlier factors. Our approach first defines and incorporates distribution-sensitive outlier factors and their interdependence into a value-value graph-based representation. It then models an outlierness propagation process in the value graph to learn the outlierness of feature values. The learned value outlierness allows for either direct outlier detection or outlying feature selection. The graph representation and mining approach is employed here to well capture the rich non-IID characteristics. Our empirical results on 15 real-world data sets with different levels of data complexities show that (i) the proposed outlier detection methods significantly outperform five state-of-the-art methods at the 95%/99% confidence level, achieving 10%-28% AUC improvement on the 10 most complex data sets; and (ii) the proposed feature selection methods significantly outperform three competing methods in enabling subsequent outlier detection of two different existing detectors.
△ Less
Submitted 21 March, 2021;
originally announced March 2021.
-
Constrained Contrastive Distribution Learning for Unsupervised Anomaly Detection and Localisation in Medical Images
Authors:
Yu Tian,
Guansong Pang,
Fengbei Liu,
Yuanhong chen,
Seon Ho Shin,
Johan W. Verjans,
Rajvinder Singh,
Gustavo Carneiro
Abstract:
Unsupervised anomaly detection (UAD) learns one-class classifiers exclusively with normal (i.e., healthy) images to detect any abnormal (i.e., unhealthy) samples that do not conform to the expected normal patterns. UAD has two main advantages over its fully supervised counterpart. Firstly, it is able to directly leverage large datasets available from health screening programs that contain mostly n…
▽ More
Unsupervised anomaly detection (UAD) learns one-class classifiers exclusively with normal (i.e., healthy) images to detect any abnormal (i.e., unhealthy) samples that do not conform to the expected normal patterns. UAD has two main advantages over its fully supervised counterpart. Firstly, it is able to directly leverage large datasets available from health screening programs that contain mostly normal image samples, avoiding the costly manual labelling of abnormal samples and the subsequent issues involved in training with extremely class-imbalanced data. Further, UAD approaches can potentially detect and localise any type of lesions that deviate from the normal patterns. One significant challenge faced by UAD methods is how to learn effective low-dimensional image representations to detect and localise subtle abnormalities, generally consisting of small lesions. To address this challenge, we propose a novel self-supervised representation learning method, called Constrained Contrastive Distribution learning for anomaly detection (CCD), which learns fine-grained feature representations by simultaneously predicting the distribution of augmented data and image contexts using contrastive learning with pretext constraints. The learned representations can be leveraged to train more anomaly-sensitive detection models. Extensive experiment results show that our method outperforms current state-of-the-art UAD approaches on three different colonoscopy and fundus screening datasets. Our code is available at https://github.com/tianyu0207/CCD.
△ Less
Submitted 30 June, 2021; v1 submitted 4 March, 2021;
originally announced March 2021.
-
Nodeless superconductivity in Lu$_{5-x}$Rh$_6$Sn$_{18+x}$ with broken time reversal symmetry
Authors:
A. Wang,
Z. Y. Nie,
F. Du,
G. M. Pang,
N. Kase,
J. Akimitsu,
Y. Chen,
M. J. Gutmann,
D. T. Adroja,
R. S. Perry,
C. Cao,
M. Smidman,
H. Q. Yuan
Abstract:
Evidence for broken time reversal symmetry (TRS) has been found in the superconducting states of the $R_5$Rh$_6$Sn$_{18}$ (R = Sc, Y, Lu) compounds with a centrosymmetric caged crystal structure, but the origin of this phenomenon is unresolved. Here we report neutron diffraction measurements of single crystals with $R$=Lu, as well as measurements of the temperature dependence of the magnetic penet…
▽ More
Evidence for broken time reversal symmetry (TRS) has been found in the superconducting states of the $R_5$Rh$_6$Sn$_{18}$ (R = Sc, Y, Lu) compounds with a centrosymmetric caged crystal structure, but the origin of this phenomenon is unresolved. Here we report neutron diffraction measurements of single crystals with $R$=Lu, as well as measurements of the temperature dependence of the magnetic penetration depth using a self-induced tunnel diode-oscillator (TDO) based technique, together with band structure calculations using density functional theory. Neutron diffraction measurements reveal that the system crystallizes in a tetragonal caged structure, and that one of nominal Lu sites in the Lu$_5$Rh$_6$Sn$_{18}$ structure is occupied by Sn, yielding a composition Lu$_{5-x}$Rh$_6$Sn$_{18+x}$ ($x=1$). The low temperature penetration depth shift $Δλ(T)$ exhibits an exponential temperature dependence below around $0.3T_c$, giving clear evidence for fully gapped superconductivity. The derived superfluid density is reasonably well accounted for by a single gap $s$-wave model, whereas agreement cannot be found for models of TRS breaking states with two-component order parameters. Moreover, band structure calculations reveal multiple bands crossing the Fermi level, and indicate that the aforementioned TRS breaking states would be expected to have nodes on the Fermi surface, in constrast to the observations.
△ Less
Submitted 26 January, 2021;
originally announced January 2021.
-
Deep One-Class Classification via Interpolated Gaussian Descriptor
Authors:
Yuanhong Chen,
Yu Tian,
Guansong Pang,
Gustavo Carneiro
Abstract:
One-class classification (OCC) aims to learn an effective data description to enclose all normal training samples and detect anomalies based on the deviation from the data description. Current state-of-the-art OCC models learn a compact normality description by hyper-sphere minimisation, but they often suffer from overfitting the training data, especially when the training set is small or contamin…
▽ More
One-class classification (OCC) aims to learn an effective data description to enclose all normal training samples and detect anomalies based on the deviation from the data description. Current state-of-the-art OCC models learn a compact normality description by hyper-sphere minimisation, but they often suffer from overfitting the training data, especially when the training set is small or contaminated with anomalous samples. To address this issue, we introduce the interpolated Gaussian descriptor (IGD) method, a novel OCC model that learns a one-class Gaussian anomaly classifier trained with adversarially interpolated training samples. The Gaussian anomaly classifier differentiates the training samples based on their distance to the Gaussian centre and the standard deviation of these distances, offering the model a discriminability w.r.t. the given samples during training. The adversarial interpolation is enforced to consistently learn a smooth Gaussian descriptor, even when the training data is small or contaminated with anomalous samples. This enables our model to learn the data description based on the representative normal samples rather than fringe or anomalous samples, resulting in significantly improved normality description. In extensive experiments on diverse popular benchmarks, including MNIST, Fashion MNIST, CIFAR10, MVTec AD and two medical datasets, IGD achieves better detection accuracy than current state-of-the-art models. IGD also shows better robustness in problems with small or contaminated training sets. Code is available at https://github.com/tianyu0207/IGD.
△ Less
Submitted 24 March, 2022; v1 submitted 25 January, 2021;
originally announced January 2021.
-
Weakly-supervised Video Anomaly Detection with Robust Temporal Feature Magnitude Learning
Authors:
Yu Tian,
Guansong Pang,
Yuanhong Chen,
Rajvinder Singh,
Johan W. Verjans,
Gustavo Carneiro
Abstract:
Anomaly detection with weakly supervised video-level labels is typically formulated as a multiple instance learning (MIL) problem, in which we aim to identify snippets containing abnormal events, with each video represented as a bag of video snippets. Although current methods show effective detection performance, their recognition of the positive instances, i.e., rare abnormal snippets in the abno…
▽ More
Anomaly detection with weakly supervised video-level labels is typically formulated as a multiple instance learning (MIL) problem, in which we aim to identify snippets containing abnormal events, with each video represented as a bag of video snippets. Although current methods show effective detection performance, their recognition of the positive instances, i.e., rare abnormal snippets in the abnormal videos, is largely biased by the dominant negative instances, especially when the abnormal events are subtle anomalies that exhibit only small differences compared with normal events. This issue is exacerbated in many methods that ignore important video temporal dependencies. To address this issue, we introduce a novel and theoretically sound method, named Robust Temporal Feature Magnitude learning (RTFM), which trains a feature magnitude learning function to effectively recognise the positive instances, substantially improving the robustness of the MIL approach to the negative instances from abnormal videos. RTFM also adapts dilated convolutions and self-attention mechanisms to capture long- and short-range temporal dependencies to learn the feature magnitude more faithfully. Extensive experiments show that the RTFM-enabled MIL model (i) outperforms several state-of-the-art methods by a large margin on four benchmark data sets (ShanghaiTech, UCF-Crime, XD-Violence and UCSD-Peds) and (ii) achieves significantly improved subtle anomaly discriminability and sample efficiency. Code is available at https://github.com/tianyu0207/RTFM.
△ Less
Submitted 5 August, 2021; v1 submitted 25 January, 2021;
originally announced January 2021.
-
img2pose: Face Alignment and Detection via 6DoF, Face Pose Estimation
Authors:
Vítor Albiero,
Xingyu Chen,
Xi Yin,
Guan Pang,
Tal Hassner
Abstract:
We propose real-time, six degrees of freedom (6DoF), 3D face pose estimation without face detection or landmark localization. We observe that estimating the 6DoF rigid transformation of a face is a simpler problem than facial landmark detection, often used for 3D face alignment. In addition, 6DoF offers more information than face bounding box labels. We leverage these observations to make multiple…
▽ More
We propose real-time, six degrees of freedom (6DoF), 3D face pose estimation without face detection or landmark localization. We observe that estimating the 6DoF rigid transformation of a face is a simpler problem than facial landmark detection, often used for 3D face alignment. In addition, 6DoF offers more information than face bounding box labels. We leverage these observations to make multiple contributions: (a) We describe an easily trained, efficient, Faster R-CNN--based model which regresses 6DoF pose for all faces in the photo, without preliminary face detection. (b) We explain how pose is converted and kept consistent between the input photo and arbitrary crops created while training and evaluating our model. (c) Finally, we show how face poses can replace detection bounding box training labels. Tests on AFLW2000-3D and BIWI show that our method runs at real-time and outperforms state of the art (SotA) face pose estimators. Remarkably, our method also surpasses SotA models of comparable complexity on the WIDER FACE detection benchmark, despite not been optimized on bounding box labels.
△ Less
Submitted 18 May, 2021; v1 submitted 14 December, 2020;
originally announced December 2020.
-
Deep Depression Prediction on Longitudinal Data via Joint Anomaly Ranking and Classification
Authors:
Guansong Pang,
Ngoc Thien Anh Pham,
Emma Baker,
Rebecca Bentley,
Anton van den Hengel
Abstract:
A wide variety of methods have been developed for identifying depression, but they focus primarily on measuring the degree to which individuals are suffering from depression currently. In this work we explore the possibility of predicting future depression using machine learning applied to longitudinal socio-demographic data. In doing so we show that data such as housing status, and the details of…
▽ More
A wide variety of methods have been developed for identifying depression, but they focus primarily on measuring the degree to which individuals are suffering from depression currently. In this work we explore the possibility of predicting future depression using machine learning applied to longitudinal socio-demographic data. In doing so we show that data such as housing status, and the details of the family environment, can provide cues for predicting future psychiatric disorders. To this end, we introduce a novel deep multi-task recurrent neural network to learn time-dependent depression cues. The depression prediction task is jointly optimized with two auxiliary anomaly ranking tasks, including contrastive one-class feature ranking and deviation ranking. The auxiliary tasks address two key challenges of the problem: 1) the high within class variance of depression samples: they enable the learning of representations that are robust to highly variant in-class distribution of the depression samples; and 2) the small labeled data volume: they significantly enhance the sample efficiency of the prediction model, which reduces the reliance on large depression-labeled datasets that are difficult to collect in practice. Extensive empirical results on large-scale child depression data show that our model is sample-efficient and can accurately predict depression 2-4 years before the illness occurs, substantially outperforming eight representative comparators.
△ Less
Submitted 20 March, 2022; v1 submitted 5 December, 2020;
originally announced December 2020.
-
Semimartingale properties of a generalized fractional Brownian motion and its mixtures with applications in asset pricing
Authors:
Tomoyuki Ichiba,
Guodong Pang,
Murad S. Taqqu
Abstract:
We study the semimartingale properties for the generalized fractional Brownian motion (GFBM) introduced by Pang and Taqqu (2019) and discuss the applications of the GFBM and its mixtures to financial asset pricing. The GFBM is self-similar and has non-stationary increments, whose Hurst index $H \in (0,1)$ is determined by two parameters. We identify the regions of these two parameter values where…
▽ More
We study the semimartingale properties for the generalized fractional Brownian motion (GFBM) introduced by Pang and Taqqu (2019) and discuss the applications of the GFBM and its mixtures to financial asset pricing. The GFBM is self-similar and has non-stationary increments, whose Hurst index $H \in (0,1)$ is determined by two parameters. We identify the regions of these two parameter values where the GFBM is a semimartingale. Specifically, in one region resulting in $H\in (1/2,1)$, it is in fact a process of finite variation and differentiable, and in another region also resulting in $H\in (1/2,1)$ it is not a semimartingale. For regions resulting in $H \in (0,1/2]$ except a line segment resulting in the standard Brownian motion and time-changed Brownian motion cases, the GFBM is also not a semimartingale.
We next show that the mixed process made up of an independent BM and a GFBM is a semimartingale when the parameters lie in the two regions aforementioned resulting in $H \in (1/2,1)$ for the GFBM, as well as when the parameters lie in the line segment resulting in a standard BM or time-changed BM with $H \in (0,1/2]$ for the GFBM. We derive the associated equivalent Brownian measure in the cases when $H\in (1/2,1)$. } This result is in great contrast with the mixed FBM with $H \in \{1/2\}\cup(3/4,1]$ proved by Cheridito (2001) and shows the significance of the additional parameter introduced in the GFBM.
We then study the semimartingale asset pricing theory with the mixed GFBM, in presence of long range dependence, and discuss the implications of using GFBM on arbitrage theory.
△ Less
Submitted 27 August, 2023; v1 submitted 2 December, 2020;
originally announced December 2020.
-
Functional central limit theorems for epidemic models with varying infectivity
Authors:
Guodong Pang,
Etienne Pardoux
Abstract:
In this paper, we prove functional central limit theorems (FCLTs) for a stochastic epidemic model with varying infectivity and general infectious periods recently introduced in Forien, Pang and Pardoux (2020).The infectivity process (total force of infection at each time) is composed of the independent infectivity random functions of each infectious individual, which starts at the time of infectio…
▽ More
In this paper, we prove functional central limit theorems (FCLTs) for a stochastic epidemic model with varying infectivity and general infectious periods recently introduced in Forien, Pang and Pardoux (2020).The infectivity process (total force of infection at each time) is composed of the independent infectivity random functions of each infectious individual, which starts at the time of infection. These infectivity random functions induce the infectious periods (as well as exposed, recovered or immune periods in full generality), whose probability distributions can be very general. The epidemic model includes the generalized non-Markovian SIR, SEIR, SIS, SIRS models with infection-age dependent infectivity. In the FCLTs for the generalized SIR and SEIR models, the limits of the diffusion-scaled fluctuations of the infectivity and susceptible processes are a unique solution to a two-dimensional Gaussian-driven stochastic Volterra integral equations, and then given these solutions, the limits for the infected (exposed/infectious) and recovered processes are Gaussian processes expressed in terms of the solutions to those stochastic Volterra integral equations. We also present the FCLTs for the generalized SIS and SIRS models.
△ Less
Submitted 11 September, 2022; v1 submitted 24 September, 2020;
originally announced September 2020.
-
Beyond Triplet Loss: Person Re-identification with Fine-grained Difference-aware Pairwise Loss
Authors:
Cheng Yan,
Guansong Pang,
Xiao Bai,
Jun Zhou,
Lin Gu
Abstract:
Person Re-IDentification (ReID) aims at re-identifying persons from different viewpoints across multiple cameras. Capturing the fine-grained appearance differences is often the key to accurate person ReID, because many identities can be differentiated only when looking into these fine-grained differences. However, most state-of-the-art person ReID approaches, typically driven by a triplet loss, fa…
▽ More
Person Re-IDentification (ReID) aims at re-identifying persons from different viewpoints across multiple cameras. Capturing the fine-grained appearance differences is often the key to accurate person ReID, because many identities can be differentiated only when looking into these fine-grained differences. However, most state-of-the-art person ReID approaches, typically driven by a triplet loss, fail to effectively learn the fine-grained features as they are focused more on differentiating large appearance differences. To address this issue, we introduce a novel pairwise loss function that enables ReID models to learn the fine-grained features by adaptively enforcing an exponential penalization on the images of small differences and a bounded penalization on the images of large differences. The proposed loss is generic and can be used as a plugin to replace the triplet loss to significantly enhance different types of state-of-the-art approaches. Experimental results on four benchmark datasets show that the proposed loss substantially outperforms a number of popular loss functions by large margins; and it also enables significantly improved data efficiency.
△ Less
Submitted 21 September, 2020;
originally announced September 2020.
-
Path Properties of a Generalized Fractional Brownian Motion
Authors:
Tomoyuki Ichiba,
Guodong Pang,
Murad S. Taqqu
Abstract:
The generalized fractional Brownian motion is a Gaussian self-similar process whose increments are not necessarily stationary. It appears in applications as the scaling limit of a shot noise process with a power law shape function and non-stationary noises with a power-law variance function. In this paper we study sample path properties of the generalized fractional Brownian motion, including Hold…
▽ More
The generalized fractional Brownian motion is a Gaussian self-similar process whose increments are not necessarily stationary. It appears in applications as the scaling limit of a shot noise process with a power law shape function and non-stationary noises with a power-law variance function. In this paper we study sample path properties of the generalized fractional Brownian motion, including Holder continuity, path differentiability/non-differentiability, and functional and local Law of the Iterated Logarithms.
△ Less
Submitted 30 November, 2020; v1 submitted 16 September, 2020;
originally announced September 2020.
-
Toward Deep Supervised Anomaly Detection: Reinforcement Learning from Partially Labeled Anomaly Data
Authors:
Guansong Pang,
Anton van den Hengel,
Chunhua Shen,
Longbing Cao
Abstract:
We consider the problem of anomaly detection with a small set of partially labeled anomaly examples and a large-scale unlabeled dataset. This is a common scenario in many important applications. Existing related methods either exclusively fit the limited anomaly examples that typically do not span the entire set of anomalies, or proceed with unsupervised learning from the unlabeled data. We propos…
▽ More
We consider the problem of anomaly detection with a small set of partially labeled anomaly examples and a large-scale unlabeled dataset. This is a common scenario in many important applications. Existing related methods either exclusively fit the limited anomaly examples that typically do not span the entire set of anomalies, or proceed with unsupervised learning from the unlabeled data. We propose here instead a deep reinforcement learning-based approach that enables an end-to-end optimization of the detection of both labeled and unlabeled anomalies. This approach learns the known abnormality by automatically interacting with an anomaly-biased simulation environment, while continuously extending the learned abnormality to novel classes of anomaly (i.e., unknown anomalies) by actively exploring possible anomalies in the unlabeled data. This is achieved by jointly optimizing the exploitation of the small labeled anomaly data and the exploration of the rare unlabeled anomalies. Extensive experiments on 48 real-world datasets show that our model significantly outperforms five state-of-the-art competing methods.
△ Less
Submitted 10 June, 2021; v1 submitted 14 September, 2020;
originally announced September 2020.
-
Probing the multi-scale dynamical interaction between heavy quarks and the QGP using JETSCAPE
Authors:
W. Fan,
G. Vujanovic,
A. Angerami,
S. A. Bass,
S. Cao,
Y. Chen,
J. Coleman,
L. Cunqueiro,
T. Dai,
L. Du,
R. Ehlers,
H. Elfner,
D. Everett,
R. Fries,
C. Gale,
F. Garza,
Y. He,
M. Heffernan,
U. Heinz,
B. V. Jacak,
P. M. Jacobs,
S. Jeon,
W. Ke,
E. Khalaj,
B. Kim
, et al. (25 additional authors not shown)
Abstract:
The dynamics of shower development for a jet traveling through the QGP involves a variety of scales, one of them being the heavy quark mass. Even though the mass of the heavy quarks plays a subdominant role during the high virtuality portion of the jet evolution, it does affect longitudinal drag and diffusion, stimulating additional radiation from heavy quarks. These emissions partially compensate…
▽ More
The dynamics of shower development for a jet traveling through the QGP involves a variety of scales, one of them being the heavy quark mass. Even though the mass of the heavy quarks plays a subdominant role during the high virtuality portion of the jet evolution, it does affect longitudinal drag and diffusion, stimulating additional radiation from heavy quarks. These emissions partially compensate the reduction in radiation from the dead cone effect. In the lower virtuality part of the shower, when the mass is comparable to the transverse momenta of the partons, scattering and radiation processes off heavy quarks differ from those off light quarks. All these factors result in a different nuclear modification factor for heavy versus light flavors and thus for heavy-flavor tagged jets.
In this study, the heavy quark shower evolution and the fluid dynamical medium are modeled on an event by event basis using the JETSCAPE Framework. We present a multi-stage calculation that explores the differences between various heavy quark energy-loss mechanisms within a realistically expanding quark-gluon plasma (QGP). Inside the QGP, the highly virtual and energetic portion of the shower is modeled using the MATTER generator, while the LBT generator models the showers induced by energetic and close-to-on-shell heavy quarks. Energy-momentum exchange with the medium, essential for the study of jet modification, proceeds using a weak coupling recoil approach. The JETSCAPE framework allows for transitions, on the level of individual partons, from one energy-loss prescription to the other depending on the parton's energy and virtuality and the local density. This allows us to explore the effect and interplay between the different regimes of energy loss on the propagation and radiation from hard heavy quarks in a dense medium.
△ Less
Submitted 9 August, 2022; v1 submitted 10 September, 2020;
originally announced September 2020.
-
Photon-jet correlations in p-p and Pb-Pb collisions using JETSCAPE framework
Authors:
C. Sirimanna,
A. Angerami,
S. A. Bass,
S. Cao,
Y. Chen,
J. Coleman,
L. Cunqueiro,
T. Dai,
L. Du,
R. Ehlers,
H. Elfner,
D. Everett,
W. Fan,
R. Fries,
C. Gale,
F. Garza,
Y. He,
M. Heffernan,
U. Heinz,
B. V. Jacak,
P. M. Jacobs,
S. Jeon,
W. Ke,
E. Khalaj,
B. Kim
, et al. (25 additional authors not shown)
Abstract:
It is now well established that jet modification is a multistage effect; hence a single model alone cannot describe all facets of jet modification. The JETSCAPE framework is a multistage framework that uses several modules to simulate different stages of jet propagation through the QGP medium. These simulations require a set of parameters to ensure a smooth transition between stages. We fine tune…
▽ More
It is now well established that jet modification is a multistage effect; hence a single model alone cannot describe all facets of jet modification. The JETSCAPE framework is a multistage framework that uses several modules to simulate different stages of jet propagation through the QGP medium. These simulations require a set of parameters to ensure a smooth transition between stages. We fine tune these parameters to successfully describe a variety of observables, such as the nuclear modification factors of leading hadrons and jets, jet shape, and jet fragmentation function. Photons can be produced in the hard scattering or as radiation from quarks inside jets. In this work, we study photon-jet transverse momentum imbalance and azimuthal correlation for both $p-p$ and $Pb-Pb$ collision systems. All the photons produced in each event, including the photons from hard scattering, radiation from the parton shower, and radiation from hadronization are considered with an isolation cut to directly compare with experimental data. The simulations are conducted using the same set of tuned parameters as used for the jet analysis. No new parameters are introduced or tuned. We demonstrate a significantly improved agreement with photons from $Pb-Pb$ collisions compared to prior efforts. This work provides an independent, parameter free verification of the multistage evolution framework.
△ Less
Submitted 9 September, 2020;
originally announced September 2020.
-
First results from Hybrid Hadronization in small and large systems
Authors:
M. Kordell II,
A. Angerami,
S. A. Bass,
S. Cao,
Y. Chen,
J. Coleman,
L. Cunqueiro,
T. Dai,
L. Du,
R. Ehlers,
H. Elfner,
D. Everett,
W. Fan,
R. Fries,
C. Gale,
F. Garza,
Y. He,
M. Heffernan,
U. Heinz,
B. V. Jacak,
P. M. Jacobs,
S. Jeon,
W. Ke,
E. Khalaj,
B. Kim
, et al. (25 additional authors not shown)
Abstract:
"Hybrid Hadronization" is a new Monte Carlo package to hadronize systems of partons. It smoothly combines quark recombination applicable when distances between partons in phase space are small, and string fragmentation appropriate for dilute parton systems, following the picture outlined by Han et al. [PRC 93, 045207 (2016)]. Hybrid Hadronization integrates with PYTHIA 8 and can be applied to a va…
▽ More
"Hybrid Hadronization" is a new Monte Carlo package to hadronize systems of partons. It smoothly combines quark recombination applicable when distances between partons in phase space are small, and string fragmentation appropriate for dilute parton systems, following the picture outlined by Han et al. [PRC 93, 045207 (2016)]. Hybrid Hadronization integrates with PYTHIA 8 and can be applied to a variety of systems from $e^++e^-$ to $A+A$ collisions. It takes systems of partons and their color flow information, for example from a Monte Carlo parton shower generator, as input. In addition, if for $A+A$ collisions a thermal background medium is provided, the package allows sampling thermal partons that contribute to hadronization. Hybrid Hadronization is available for use as a standalone code and is also part of JETSCAPE since the 2.0 release. In these proceedings we review the physics concepts underlying Hybrid Hadronization and demonstrate how users can use the code with various parton shower Monte Carlos. We present calculations of hadron chemistry and fragmentation functions in small and large systems when Hybrid Hadronization is combined with parton shower Monte Carlos MATTER and LBT. In particular, we discuss observable effects of the recombination of shower partons with thermal partons.
△ Less
Submitted 11 September, 2020; v1 submitted 8 September, 2020;
originally announced September 2020.
-
Constraints on jet quenching from a multi-stage energy-loss approach
Authors:
C. Park,
A. Angerami,
S. A. Bass,
S. Cao,
Y. Chen,
J. Coleman,
L. Cunqueiro,
T. Dai,
L. Du,
R. Ehlers,
H. Elfner,
D. Everett,
W. Fan,
R. Fries,
C. Gale,
F. Garza,
Y. He,
M. Heffernan,
U. Heinz,
B. V. Jacak,
P. M. Jacobs,
S. Jeon,
W. Ke,
E. Khalaj,
B. Kim
, et al. (25 additional authors not shown)
Abstract:
We present a multi-stage model for jet evolution through a quark-gluon plasma within the JETSCAPE framework. The multi-stage approach in JETSCAPE provides a unified description of distinct phases in jet shower contingent on the virtuality. We demonstrate a simultaneous description of leading hadron and integrated jet observables as well as jet $v_n$ using tuned parameters. Medium response to the j…
▽ More
We present a multi-stage model for jet evolution through a quark-gluon plasma within the JETSCAPE framework. The multi-stage approach in JETSCAPE provides a unified description of distinct phases in jet shower contingent on the virtuality. We demonstrate a simultaneous description of leading hadron and integrated jet observables as well as jet $v_n$ using tuned parameters. Medium response to the jet quenching is implemented based on a weakly-coupled recoil prescription. We also explore the cone-size dependence of jet energy loss inside the plasma.
△ Less
Submitted 11 September, 2020; v1 submitted 4 September, 2020;
originally announced September 2020.
-
On system-wide safety staffing of large-scale parallel server networks
Authors:
Hassan Hmedi,
Ari Arapostathis,
Guodong Pang
Abstract:
We introduce a "system-wide safety staffing" (SWSS) parameter for multiclass multi-pool networks of any tree topology, Markovian or non-Markovian, in the Halfin-Whitt regime. This parameter can be regarded as the optimal reallocation of the capacity fluctuations (positive or negative) of order $\sqrt{n}$ when each server pool employs a square-root staffing rule. We provide an explicit form of the…
▽ More
We introduce a "system-wide safety staffing" (SWSS) parameter for multiclass multi-pool networks of any tree topology, Markovian or non-Markovian, in the Halfin-Whitt regime. This parameter can be regarded as the optimal reallocation of the capacity fluctuations (positive or negative) of order $\sqrt{n}$ when each server pool employs a square-root staffing rule. We provide an explicit form of the SWSS as a function of the system parameters, which is derived using a graph theoretic approach based on Gaussian elimination.
For Markovian networks, we give an equivalent characterization of the SWSS parameter via the drift parameters of the limiting diffusion. We show that if the SWSS parameter is negative, the limiting diffusion and the diffusion-scaled queueing processes are transient under any Markov control, and cannot have a stationary distribution when this parameter is zero. If it is positive, we show that the diffusion-scaled queueing processes are uniformly stabilizable, that is, there exists a scheduling policy under which the stationary distributions of the controlled processes are tight over the size of the network. In addition, there exists a control under which the limiting controlled diffusion is exponentially ergodic. Thus we have identified a necessary and sufficient condition for the uniform stabilizability of such networks in the Halfin-Whitt regime.
We use a constant control resulting from the leaf elimination algorithm to stabilize the limiting controlled diffusion, while a family of Markov scheduling policies which are easy to compute are used to stabilize the diffusion-scaled processes. Finally, we show that under these controls the processes are exponentially ergodic and the stationary distributions have exponential tails.
△ Less
Submitted 15 June, 2021; v1 submitted 3 September, 2020;
originally announced September 2020.
-
Mask TextSpotter v3: Segmentation Proposal Network for Robust Scene Text Spotting
Authors:
Minghui Liao,
Guan Pang,
**g Huang,
Tal Hassner,
Xiang Bai
Abstract:
Recent end-to-end trainable methods for scene text spotting, integrating detection and recognition, showed much progress. However, most of the current arbitrary-shape scene text spotters use region proposal networks (RPN) to produce proposals. RPN relies heavily on manually designed anchors and its proposals are represented with axis-aligned rectangles. The former presents difficulties in handling…
▽ More
Recent end-to-end trainable methods for scene text spotting, integrating detection and recognition, showed much progress. However, most of the current arbitrary-shape scene text spotters use region proposal networks (RPN) to produce proposals. RPN relies heavily on manually designed anchors and its proposals are represented with axis-aligned rectangles. The former presents difficulties in handling text instances of extreme aspect ratios or irregular shapes, and the latter often includes multiple neighboring instances into a single proposal, in cases of densely oriented text. To tackle these problems, we propose Mask TextSpotter v3, an end-to-end trainable scene text spotter that adopts a Segmentation Proposal Network (SPN) instead of an RPN. Our SPN is anchor-free and gives accurate representations of arbitrary-shape proposals. It is therefore superior to RPN in detecting text instances of extreme aspect ratios or irregular shapes. Furthermore, the accurate proposals produced by SPN allow masked RoI features to be used for decoupling neighboring text instances. As a result, our Mask TextSpotter v3 can handle text instances of extreme aspect ratios or irregular shapes, and its recognition accuracy won't be affected by nearby text or background noise. Specifically, we outperform state-of-the-art methods by 21.9 percent on the Rotated ICDAR 2013 dataset (rotation robustness), 5.9 percent on the Total-Text dataset (shape robustness), and achieve state-of-the-art performance on the MSRA-TD500 dataset (aspect ratio robustness). Code is available at: https://github.com/MhLiao/MaskTextSpotterV3
△ Less
Submitted 18 July, 2020;
originally announced July 2020.
-
Deep Learning for Anomaly Detection: A Review
Authors:
Guansong Pang,
Chunhua Shen,
Longbing Cao,
Anton van den Hengel
Abstract:
Anomaly detection, a.k.a. outlier detection or novelty detection, has been a lasting yet active research area in various research communities for several decades. There are still some unique problem complexities and challenges that require advanced approaches. In recent years, deep learning enabled anomaly detection, i.e., deep anomaly detection, has emerged as a critical direction. This paper sur…
▽ More
Anomaly detection, a.k.a. outlier detection or novelty detection, has been a lasting yet active research area in various research communities for several decades. There are still some unique problem complexities and challenges that require advanced approaches. In recent years, deep learning enabled anomaly detection, i.e., deep anomaly detection, has emerged as a critical direction. This paper surveys the research of deep anomaly detection with a comprehensive taxonomy, covering advancements in three high-level categories and 11 fine-grained categories of the methods. We review their key intuitions, objective functions, underlying assumptions, advantages and disadvantages, and discuss how they address the aforementioned challenges. We further discuss a set of possible future opportunities and new perspectives on addressing the challenges.
△ Less
Submitted 4 December, 2020; v1 submitted 5 July, 2020;
originally announced July 2020.
-
Epidemic models with varying infectivity
Authors:
Raphael Forien,
Guodong Pang,
Etienne Pardoux
Abstract:
We introduce an epidemic model with varying infectivity and general exposed and infectious periods, where the infectivity of each individual is a random function of the elapsed time since infection, those function being i.i.d. for the various individuals in the population. This approach models infection-age dependent infectivity, and extends the classical SIR and SEIR models. We focus on the infec…
▽ More
We introduce an epidemic model with varying infectivity and general exposed and infectious periods, where the infectivity of each individual is a random function of the elapsed time since infection, those function being i.i.d. for the various individuals in the population. This approach models infection-age dependent infectivity, and extends the classical SIR and SEIR models. We focus on the infectivity process (total force of infection at each time), and prove a functional law of large number (FLLN). In the deterministic limit of this LLN, the infectivity process and the susceptible process are determined by a two-dimensional deterministic integral equation. From its solutions, we then derive the exposed, infectious and recovered processes, again using integral equations. For the early phase, we study the stochastic model directly by using an approximate (non--Markovian) branching process, and show that the epidemic grows at an exponential rate on the event of non-extinction, which matches the rate of growth derived from the deterministic linearized equations. We also use these equations to derive the basic reproduction number $R_0$ during the early stage of an epidemic, in terms of the average individual infectivity function and the exponential rate of growth of the epidemic.
△ Less
Submitted 28 May, 2021; v1 submitted 27 June, 2020;
originally announced June 2020.
-
Multi-patch epidemic models with general exposed and infectious periods
Authors:
Guodong Pang,
Etienne Pardoux
Abstract:
We study multi-patch epidemic models where individuals may migrate from one patch to another in either of the susceptible, exposed/latent, infectious and recovered states. We assume that infections occur both locally with a rate that depends on the patch as well as "from distance" from all the other patches. The exposed and infectious periods have general distributions, and are not affected by the…
▽ More
We study multi-patch epidemic models where individuals may migrate from one patch to another in either of the susceptible, exposed/latent, infectious and recovered states. We assume that infections occur both locally with a rate that depends on the patch as well as "from distance" from all the other patches. The exposed and infectious periods have general distributions, and are not affected by the possible migrations of the individuals. The migration processes in either of the three states are assumed to be Markovian, and independent of the exposed and infectious periods. We establish a functional law of large number (FLLN) and a function central limit theorem (FCLT) for the susceptible, exposed/latent, infectious and recovered processes. In the FLLN, the limit is determined by a set of Volterra integral equations. In the special case of deterministic exposed and infectious periods, the limit becomes a system of ODEs with delays. In the FCLT, the limit is given by a set of stochastic Volterra integral equations driven by a sum of independent Brownian motions and continuous Gaussian processes with an explicit covariance structure.
△ Less
Submitted 29 August, 2022; v1 submitted 25 June, 2020;
originally announced June 2020.
-
Simultaneous Nodal Superconductivity and Time-Reversal Symmetry Breaking in the Noncentrosymmetric Superconductor CaPtAs
Authors:
T. Shang,
M. Smidman,
A. Wang,
L. -J. Chang,
C. Baines,
M. K. Lee,
Z. Y. Nie,
G. M. Pang,
W. Xie,
W. B. Jiang,
M. Shi,
M. Medarde,
T. Shiroka,
H. Q. Yuan
Abstract:
By employing a series of experimental techniques, we provide clear evidence that CaPtAs represents a rare example of a noncentrosymmetric superconductor which simultaneously exhibits nodes in the superconducting gap and broken time-reversal symmetry (TRS) in its superconducting state (below $T_c$ $\approx$ 1.5 K). Unlike in fully-gapped superconductors, the magnetic penetration depth $λ(T)$ does n…
▽ More
By employing a series of experimental techniques, we provide clear evidence that CaPtAs represents a rare example of a noncentrosymmetric superconductor which simultaneously exhibits nodes in the superconducting gap and broken time-reversal symmetry (TRS) in its superconducting state (below $T_c$ $\approx$ 1.5 K). Unlike in fully-gapped superconductors, the magnetic penetration depth $λ(T)$ does not saturate at low temperatures, but instead it shows a $T^2$-dependence, characteristic of gap nodes. Both the superfluid density and the electronic specific heat are best described by a two-gap model comprising of a nodeless gap and a gap with nodes, rather than by single-band models. At the same time, zero-field muon-spin spectra exhibit increased relaxation rates below the onset of superconductivity, implying that TRS is broken in the superconducting state of CaPtAs, hence indicating its unconventional nature. Our observations suggest CaPtAs to be a new remarkable material which links two apparently disparate classes, that of TRS-breaking correlated magnetic superconductors with nodal gaps and the weakly-correlated noncentrosymmetric superconductors with broken TRS, normally exhibiting only a fully-gapped behavior.
△ Less
Submitted 22 April, 2020;
originally announced April 2020.
-
nPINNs: nonlocal Physics-Informed Neural Networks for a parametrized nonlocal universal Laplacian operator. Algorithms and Applications
Authors:
Guofei Pang,
Marta D'Elia,
Michael Parks,
George E. Karniadakis
Abstract:
Physics-informed neural networks (PINNs) are effective in solving inverse problems based on differential and integral equations with sparse, noisy, unstructured, and multi-fidelity data. PINNs incorporate all available information into a loss function, thus recasting the original problem into an optimization problem. In this paper, we extend PINNs to parameter and function inference for integral e…
▽ More
Physics-informed neural networks (PINNs) are effective in solving inverse problems based on differential and integral equations with sparse, noisy, unstructured, and multi-fidelity data. PINNs incorporate all available information into a loss function, thus recasting the original problem into an optimization problem. In this paper, we extend PINNs to parameter and function inference for integral equations such as nonlocal Poisson and nonlocal turbulence models, and we refer to them as nonlocal PINNs (nPINNs). The contribution of the paper is three-fold. First, we propose a unified nonlocal operator, which converges to the classical Laplacian as one of the operator parameters, the nonlocal interaction radius $δ$ goes to zero, and to the fractional Laplacian as $δ$ goes to infinity. This universal operator forms a super-set of classical Laplacian and fractional Laplacian operators and, thus, has the potential to fit a broad spectrum of data sets. We provide theoretical convergence rates with respect to $δ$ and verify them via numerical experiments. Second, we use nPINNs to estimate the two parameters, $δ$ and $α$. The strong non-convexity of the loss function yielding multiple (good) local minima reveals the occurrence of the operator mimicking phenomenon: different pairs of estimated parameters could produce multiple solutions of comparable accuracy. Third, we propose another nonlocal operator with spatially variable order $α(y)$, which is more suitable for modeling turbulent Couette flow. Our results show that nPINNs can jointly infer this function as well as $δ$. Also, these parameters exhibit a universal behavior with respect to the Reynolds number, a finding that contributes to our understanding of nonlocal interactions in wall-bounded turbulence.
△ Less
Submitted 8 April, 2020;
originally announced April 2020.
-
Viral Pneumonia Screening on Chest X-ray Images Using Confidence-Aware Anomaly Detection
Authors:
Jianpeng Zhang,
Yutong Xie,
Guansong Pang,
Zhibin Liao,
Johan Verjans,
Wenxin Li,
Zongji Sun,
Jian He,
Yi Li,
Chunhua Shen,
Yong Xia
Abstract:
Cluster of viral pneumonia occurrences during a short period of time may be a harbinger of an outbreak or pandemic, like SARS, MERS, and recent COVID-19. Rapid and accurate detection of viral pneumonia using chest X-ray can be significantly useful in large-scale screening and epidemic prevention, particularly when other chest imaging modalities are less available. Viral pneumonia often have divers…
▽ More
Cluster of viral pneumonia occurrences during a short period of time may be a harbinger of an outbreak or pandemic, like SARS, MERS, and recent COVID-19. Rapid and accurate detection of viral pneumonia using chest X-ray can be significantly useful in large-scale screening and epidemic prevention, particularly when other chest imaging modalities are less available. Viral pneumonia often have diverse causes and exhibit notably different visual appearances on X-ray images. The evolution of viruses and the emergence of novel mutated viruses further result in substantial dataset shift, which greatly limits the performance of classification approaches. In this paper, we formulate the task of differentiating viral pneumonia from non-viral pneumonia and healthy controls into an one-class classification-based anomaly detection problem, and thus propose the confidence-aware anomaly detection (CAAD) model, which consists of a shared feature extractor, an anomaly detection module, and a confidence prediction module. If the anomaly score produced by the anomaly detection module is large enough or the confidence score estimated by the confidence prediction module is small enough, we accept the input as an anomaly case (i.e., viral pneumonia). The major advantage of our approach over binary classification is that we avoid modeling individual viral pneumonia classes explicitly and treat all known viral pneumonia cases as anomalies to reinforce the one-class model. The proposed model outperforms binary classification models on the clinical X-VIRAL dataset that contains 5,977 viral pneumonia (no COVID-19) cases, 18,619 non-viral pneumonia cases, and 18,774 healthy controls.
△ Less
Submitted 1 December, 2020; v1 submitted 27 March, 2020;
originally announced March 2020.
-
Self-trained Deep Ordinal Regression for End-to-End Video Anomaly Detection
Authors:
Guansong Pang,
Cheng Yan,
Chunhua Shen,
Anton van den Hengel,
Xiao Bai
Abstract:
Video anomaly detection is of critical practical importance to a variety of real applications because it allows human attention to be focused on events that are likely to be of interest, in spite of an otherwise overwhelming volume of video. We show that applying self-trained deep ordinal regression to video anomaly detection overcomes two key limitations of existing methods, namely, 1) being high…
▽ More
Video anomaly detection is of critical practical importance to a variety of real applications because it allows human attention to be focused on events that are likely to be of interest, in spite of an otherwise overwhelming volume of video. We show that applying self-trained deep ordinal regression to video anomaly detection overcomes two key limitations of existing methods, namely, 1) being highly dependent on manually labeled normal training data; and 2) sub-optimal feature learning. By formulating a surrogate two-class ordinal regression task we devise an end-to-end trainable video anomaly detection approach that enables joint representation learning and anomaly scoring without manually labeled normal/abnormal data. Experiments on eight real-world video scenes show that our proposed method outperforms state-of-the-art methods that require no labeled training data by a substantial margin, and enables easy and accurate localization of the identified anomalies. Furthermore, we demonstrate that our method offers effective human-in-the-loop anomaly detection which can be critical in applications where anomalies are rare and the false-negative cost is high.
△ Less
Submitted 15 March, 2020;
originally announced March 2020.
-
Functional Limit Theorems for Non-Markovian Epidemic Models
Authors:
Guodong Pang,
Etienne Pardoux
Abstract:
We study non-Markovian stochastic epidemic models (SIS, SIR, SIRS, and SEIR), in which the infectious (and latent/exposing, immune) periods have a general distribution. We provide a representation of the evolution dynamics using the time epochs of infection (and latency/exposure, immunity). Taking the limit as the size of the population tends to infinity, we prove both a functional law of large nu…
▽ More
We study non-Markovian stochastic epidemic models (SIS, SIR, SIRS, and SEIR), in which the infectious (and latent/exposing, immune) periods have a general distribution. We provide a representation of the evolution dynamics using the time epochs of infection (and latency/exposure, immunity). Taking the limit as the size of the population tends to infinity, we prove both a functional law of large number (FLLN) and a functional central limit theorem (FCLT) for the processes of interest in these models. In the FLLN, the limits are a unique solution to a system of deterministic Volterra integral equations, while in the FCLT, the limit processes are multidimensional Gaussian solutions of linear Volterra stochastic integral equations. In the proof of the FCLT, we provide an important Poisson random measures representation of the diffusion-scaled processes converging to Gaussian components driving the limit process.
△ Less
Submitted 23 June, 2021; v1 submitted 6 March, 2020;
originally announced March 2020.
-
Exact artificial boundary conditions of 1D semi-discretized peridynamics
Authors:
Songsong Ji,
Gang Pang,
Jiwei Zhang,
Yibo Yang,
Paris Perdikaris
Abstract:
The peridynamic theory reformulates the equations of continuum mechanics in terms of integro-differential equations instead of partial differential equations. It is not trivial to directly apply naive approach in artificial boundary conditions for continua to peridynamics modeling, because it usually involves semi-discretization scheme. In this paper, we present a new way to construct exact bounda…
▽ More
The peridynamic theory reformulates the equations of continuum mechanics in terms of integro-differential equations instead of partial differential equations. It is not trivial to directly apply naive approach in artificial boundary conditions for continua to peridynamics modeling, because it usually involves semi-discretization scheme. In this paper, we present a new way to construct exact boundary conditions for semi-discretized peridynamics using kernel functions and recursive relations. Specially, kernel functions are used to characterize one single source are combined to construct the exact boundary conditions. The recursive relationships between the kernel functions are proposed, therefore the kernel functions can be computed through the ordinary differential system and integral system with high precision. The numerical results demonstrate that the boundary condition has high accuracy. The proposed method can be applied to modeling of wave propagation of other nonlocal theories and high dimensional cases.
△ Less
Submitted 24 February, 2020;
originally announced February 2020.
-
Hydrodynamic response to jets with a source based on causal diffusion
Authors:
Y. Tachibana,
A. Angerami,
S. A. Bass,
S. Cao,
Y. Chen,
J. Coleman,
L. Cunqueiro,
T. Dai,
L. Du,
R. Ehlers,
H. Elfner,
D. Everett,
W. Fan,
R. Fries,
C. Gale,
Y. He,
M. Heffernan,
U. Heinz,
B. V. Jacak,
P. M. Jacobs,
S. Jeon,
K. Kauder,
W. Ke,
E. Khalaj,
M. Kordell II
, et al. (25 additional authors not shown)
Abstract:
We study the medium response to jet evolution in the quark-gluon plasma within the JETSCAPE framework. Recoil partons' medium response in the weakly coupled description is implemented in the multi-stage jet energy-loss model in the framework. As a further extension, the hydrodynamic description is rearranged to include in-medium jet transport based on a strong-coupling picture. To interface hydrod…
▽ More
We study the medium response to jet evolution in the quark-gluon plasma within the JETSCAPE framework. Recoil partons' medium response in the weakly coupled description is implemented in the multi-stage jet energy-loss model in the framework. As a further extension, the hydrodynamic description is rearranged to include in-medium jet transport based on a strong-coupling picture. To interface hydrodynamics with jet energy-loss models, the hydrodynamic source term is modeled by a causal formulation employing the relativistic diffusion equation. The jet shape and fragmentation function are studied via realistic simulations with weakly coupled recoils. We also demonstrate modifications in the medium caused by the hydrodynamic response.
△ Less
Submitted 27 February, 2020;
originally announced February 2020.
-
Jet quenching in a multi-stage Monte Carlo approach
Authors:
A. Kumar,
A. Angerami,
S. A. Bass,
S. Cao,
Y. Chen,
J. Coleman,
L. Cunqueiro,
T. Dai,
L. Du,
R. Ehlers,
H. Elfner,
D. Everett,
W. Fan,
R. Fries,
C. Gale,
Y. He,
M. Heffernan,
U. Heinz,
B. V. Jacak,
P. M. Jacobs,
S. Jeon,
K. Kauder,
W. Ke,
E. Khalaj,
M. Kordell II
, et al. (25 additional authors not shown)
Abstract:
We present a jet quenching model within a unified multi-stage framework and demonstrate for the first time a simultaneous description of leading hadrons, inclusive jets, and elliptic flow observables which spans multiple centralities and collision energies. This highlights one of the major successes of the JETSCAPE framework in providing a tool for setting up an effective parton evolution that inc…
▽ More
We present a jet quenching model within a unified multi-stage framework and demonstrate for the first time a simultaneous description of leading hadrons, inclusive jets, and elliptic flow observables which spans multiple centralities and collision energies. This highlights one of the major successes of the JETSCAPE framework in providing a tool for setting up an effective parton evolution that includes a high-virtuality radiation dominated energy loss phase (MATTER), followed by a low-virtuality scattering dominated (LBT) energy loss phase. Measurements of jet and charged-hadron $R_{AA}$ set strong constraints on the jet quenching model. Jet-medium response is also included through a weakly-coupled transport description.
△ Less
Submitted 17 February, 2020;
originally announced February 2020.
-
Multi-stage evolution of heavy quarks in the quark-gluon plasma
Authors:
G. Vujanovic,
A. Angerami,
S. A. Bass,
S. Cao,
Y. Chen,
J. Coleman,
L. Cunqueiro,
T. Dai,
L. Du,
R. Ehlers,
H. Elfner,
D. Everett,
W. Fan,
R. Fries,
C. Gale,
Y. He,
M. Heffernan,
U. Heinz,
B. V. Jacak,
P. M. Jacobs,
S. Jeon,
K. Kauder,
W. Ke,
E. Khalaj,
M. Kordell II
, et al. (25 additional authors not shown)
Abstract:
The interaction of heavy flavor with the quark-gluon plasma (QGP) in relativistic heavy-ion collisions is studied using JETSCAPE, a publicly available software package containing a framework for Monte Carlo event generators. Multi-stage (and multi-model) evolution of heavy quarks within JETSCAPE provides a cohesive description of heavy flavor quenching inside the QGP. As the parton shower develops…
▽ More
The interaction of heavy flavor with the quark-gluon plasma (QGP) in relativistic heavy-ion collisions is studied using JETSCAPE, a publicly available software package containing a framework for Monte Carlo event generators. Multi-stage (and multi-model) evolution of heavy quarks within JETSCAPE provides a cohesive description of heavy flavor quenching inside the QGP. As the parton shower develops, a model becomes active as soon as its kinematic region of validity is reached. Two combinations of heavy-flavor energy-loss models are explored within a realistic QGP medium, using parameters which were tuned to describe {\it light-flavor} partonic energy-loss.
△ Less
Submitted 16 February, 2020;
originally announced February 2020.