Skip to main content

Showing 1–23 of 23 results for author: Bonner, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2112.06567  [pdf, other

    cs.LG cs.AI cs.SI q-bio.MN

    Implications of Topological Imbalance for Representation Learning on Biomedical Knowledge Graphs

    Authors: Stephen Bonner, Ufuk Kirik, Ola Engkvist, Jian Tang, Ian P Barrett

    Abstract: Adoption of recently developed methods from machine learning has given rise to creation of drug-discovery knowledge graphs (KG) that utilize the interconnected nature of the domain. Graph-based modelling of the data, combined with KG embedding (KGE) methods, are promising as they provide a more intuitive representation and are suitable for inference tasks such as predicting missing links. One comm… ▽ More

    Submitted 18 March, 2022; v1 submitted 13 December, 2021; originally announced December 2021.

    Comments: Briefings in Bioinformatics, 2022

  2. arXiv:2111.02916  [pdf, other

    cs.LG cs.AI cs.SI

    A Unified View of Relational Deep Learning for Drug Pair Scoring

    Authors: Benedek Rozemberczki, Stephen Bonner, Andriy Nikolov, Michael Ughetto, Sebastian Nilsson, Eliseo Papa

    Abstract: In recent years, numerous machine learning models which attempt to solve polypharmacy side effect identification, drug-drug interaction prediction and combination therapy design tasks have been proposed. Here, we present a unified theoretical view of relational machine learning models which can address these tasks. We provide fundamental definitions, compare existing model architectures and discus… ▽ More

    Submitted 11 December, 2021; v1 submitted 4 November, 2021; originally announced November 2021.

  3. A Knowledge Graph-Enhanced Tensor Factorisation Model for Discovering Drug Targets

    Authors: Cheng Ye, Rowan Swiers, Stephen Bonner, Ian Barrett

    Abstract: The drug discovery and development process is a long and expensive one, costing over 1 billion USD on average per drug and taking 10-15 years. To reduce the high levels of attrition throughout the process, there has been a growing interest in applying machine learning methodologies to various stages of drug discovery and development in the recent decade, especially at the earliest stage identifica… ▽ More

    Submitted 19 August, 2022; v1 submitted 20 May, 2021; originally announced May 2021.

    Comments: 16 pages, 4 figures, IEEE/ACM Transactions on Computational Biology and Bioinformatics

  4. arXiv:2105.10488  [pdf, other

    q-bio.BM cs.AI cs.LG

    Understanding the Performance of Knowledge Graph Embeddings in Drug Discovery

    Authors: Stephen Bonner, Ian P Barrett, Cheng Ye, Rowan Swiers, Ola Engkvist, Charles Tapley Hoyt, William L Hamilton

    Abstract: Knowledge Graphs (KG) and associated Knowledge Graph Embedding (KGE) models have recently begun to be explored in the context of drug discovery and have the potential to assist in key challenges such as target identification. In the drug discovery domain, KGs can be employed as part of a process which can result in lab-based experiments being performed, or impact on other decisions, incurring sign… ▽ More

    Submitted 23 May, 2022; v1 submitted 17 May, 2021; originally announced May 2021.

    Journal ref: Artificial Intelligence in the Life Sciences (2022): 100036

  5. A Review of Biomedical Datasets Relating to Drug Discovery: A Knowledge Graph Perspective

    Authors: Stephen Bonner, Ian P Barrett, Cheng Ye, Rowan Swiers, Ola Engkvist, Andreas Bender, Charles Tapley Hoyt, William L Hamilton

    Abstract: Drug discovery and development is a complex and costly process. Machine learning approaches are being investigated to help improve the effectiveness and speed of multiple stages of the drug discovery pipeline. Of these, those that use Knowledge Graphs (KG) have promise in many tasks, including drug repurposing, drug toxicity prediction and target gene-disease prioritisation. In a drug discovery KG… ▽ More

    Submitted 26 November, 2021; v1 submitted 19 February, 2021; originally announced February 2021.

    Journal ref: Briefings in Bioinformatics, 2022

  6. arXiv:2010.12635  [pdf, other

    cs.LG cs.PF

    Not Half Bad: Exploring Half-Precision in Graph Convolutional Neural Networks

    Authors: John Brennan, Stephen Bonner, Amir Atapour-Abarghouei, Philip T Jackson, Boguslaw Obara, Andrew Stephen McGough

    Abstract: With the growing significance of graphs as an effective representation of data in numerous applications, efficient graph analysis using modern machine learning is receiving a growing level of attention. Deep learning approaches often operate over the entire adjacency matrix -- as the input and intermediate network layers are all designed in proportion to the size of the adjacency matrix -- leading… ▽ More

    Submitted 23 October, 2020; originally announced October 2020.

  7. arXiv:2009.05160  [pdf, other

    cs.CL cs.LG

    Rank over Class: The Untapped Potential of Ranking in Natural Language Processing

    Authors: Amir Atapour-Abarghouei, Stephen Bonner, Andrew Stephen McGough

    Abstract: Text classification has long been a staple within Natural Language Processing (NLP) with applications spanning across diverse areas such as sentiment analysis, recommender systems and spam detection. With such a powerful solution, it is often tempting to use it as the go-to tool for all NLP problems since when you are holding a hammer, everything looks like a nail. However, we argue here that many… ▽ More

    Submitted 3 December, 2021; v1 submitted 10 September, 2020; originally announced September 2020.

    Comments: 2021 IEEE International Conference on Big Data (IEEE BigData 2021)

  8. BLOB : A Probabilistic Model for Recommendation that Combines Organic and Bandit Signals

    Authors: Otmane Sakhi, Stephen Bonner, David Rohde, Flavian Vasile

    Abstract: A common task for recommender systems is to build a pro le of the interests of a user from items in their browsing history and later to recommend items to the user from the same catalog. The users' behavior consists of two parts: the sequence of items that they viewed without intervention (the organic part) and the sequences of items recommended to them and their outcome (the bandit part). In this… ▽ More

    Submitted 28 August, 2020; originally announced August 2020.

    Comments: 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Aug 2020, San Diego, United States

  9. arXiv:2007.08574  [pdf, other

    cs.CV

    Camera Bias in a Fine Grained Classification Task

    Authors: Philip T. Jackson, Stephen Bonner, Ning Jia, Christopher Holder, Jon Stonehouse, Boguslaw Obara

    Abstract: We show that correlations between the camera used to acquire an image and the class label of that image can be exploited by convolutional neural networks (CNN), resulting in a model that "cheats" at an image classification task by recognizing which camera took the image and inferring the class label from the camera. We show that models trained on a dataset with camera / label correlations do not g… ▽ More

    Submitted 16 July, 2020; originally announced July 2020.

  10. arXiv:1911.08364  [pdf, other

    cs.CR

    Volenti non fit injuria: Ransomware and its Victims

    Authors: Amir Atapour-Abarghouei, Stephen Bonner, Andrew Stephen McGough

    Abstract: With the recent growth in the number of malicious activities on the internet, cybersecurity research has seen a boost in the past few years. However, as certain variants of malware can provide highly lucrative opportunities for bad actors, significant resources are dedicated to innovations and improvements by vast criminal organisations. Among these forms of malware, ransomware has experienced a s… ▽ More

    Submitted 19 November, 2019; originally announced November 2019.

    Comments: 2019 IEEE International Conference on Big Data 2019

  11. arXiv:1910.00877  [pdf, other

    stat.ML cs.LG

    Reconsidering Analytical Variational Bounds for Output Layers of Deep Networks

    Authors: Otmane Sakhi, Stephen Bonner, David Rohde, Flavian Vasile

    Abstract: The combination of the re-parameterization trick with the use of variational auto-encoders has caused a sensation in Bayesian deep learning, allowing the training of realistic generative models of images and has considerably increased our ability to use scalable latent variable models. The re-parameterization trick is necessary for models in which no analytical variational bound is available and a… ▽ More

    Submitted 3 October, 2019; v1 submitted 2 October, 2019; originally announced October 2019.

    Comments: 8 pages 2 figures

  12. arXiv:1908.08402  [pdf, other

    cs.SI

    Temporal Neighbourhood Aggregation: Predicting Future Links in Temporal Graphs via Recurrent Variational Graph Convolutions

    Authors: Stephen Bonner, Amir Atapour-Abarghouei, Philip T Jackson, John Brennan, Ibad Kureshi, Georgios Theodoropoulos, Andrew Stephen McGough, Boguslaw Obara

    Abstract: Graphs have become a crucial way to represent large, complex and often temporal datasets across a wide range of scientific disciplines. However, when graphs are used as input to machine learning models, this rich temporal information is frequently disregarded during the learning process, resulting in suboptimal performance on certain temporal infernce tasks. To combat this, we introduce Temporal N… ▽ More

    Submitted 21 November, 2019; v1 submitted 21 August, 2019; originally announced August 2019.

    Comments: IEEE International Conference on Big Data 2019

  13. arXiv:1908.06750  [pdf, other

    cs.CV cs.CR cs.LG

    A Kings Ransom for Encryption: Ransomware Classification using Augmented One-Shot Learning and Bayesian Approximation

    Authors: Amir Atapour-Abarghouei, Stephen Bonner, Andrew Stephen McGough

    Abstract: Newly emerging variants of ransomware pose an ever-growing threat to computer systems governing every aspect of modern life through the handling and analysis of big data. While various recent security-based approaches have focused on detecting and classifying ransomware at the network or system level, easy-to-use post-infection ransomware classification for the lay user has not been attempted befo… ▽ More

    Submitted 19 August, 2019; originally announced August 2019.

    Comments: Submitted to 2019 IEEE International Conference on Big Data

  14. arXiv:1904.10784  [pdf, other

    cs.IR cs.LG

    Latent Variable Session-Based Recommendation

    Authors: David Rohde, Stephen Bonner

    Abstract: Session based recommendation provides an attractive alternative to the traditional feature engineering approach to recommendation. Feature engineering approaches require hand tuned features of the users history to be created to produce a context vector. In contrast a session based approach is able to dynamically model the users state as they act. We present a probabilistic framework for session ba… ▽ More

    Submitted 17 September, 2019; v1 submitted 24 April, 2019; originally announced April 2019.

  15. arXiv:1904.05165  [pdf, other

    cs.IR

    Causal Embeddings for Recommendation: An Extended Abstract

    Authors: Stephen Bonner, Flavian Vasile

    Abstract: Recommendations are commonly used to modify user's natural behavior, for example, increasing product sales or the time spent on a website. This results in a gap between the ultimate business objective and the classical setup where recommendations are optimized to be coherent with past user behavior. To bridge this gap, we propose a new learning setup for recommendation that optimizes for the Incre… ▽ More

    Submitted 21 May, 2019; v1 submitted 10 April, 2019; originally announced April 2019.

    Comments: Accepted to the International Joint Conferences on Artificial Intelligence (IJCAI) Sister Conference Best Paper Track

  16. arXiv:1811.11880  [pdf, other

    cs.LG cs.AI stat.ML

    Predicting the Computational Cost of Deep Learning Models

    Authors: Daniel Justus, John Brennan, Stephen Bonner, Andrew Stephen McGough

    Abstract: Deep learning is rapidly becoming a go-to tool for many artificial intelligence problems due to its ability to outperform other approaches and even humans at many problems. Despite its popularity we are still unable to accurately predict the time it will take to train a deep learning network to solve a given problem. This training time can be seen as the product of the training time per epoch and… ▽ More

    Submitted 28 November, 2018; originally announced November 2018.

    Comments: Accepted for publication at the IEEE International Conference on Big Data, (C) IEEE

  17. arXiv:1811.08366  [pdf, other

    cs.SI cs.LG

    Temporal Graph Offset Reconstruction: Towards Temporally Robust Graph Representation Learning

    Authors: Stephen Bonner, John Brennan, Ibad Kureshi, Georgios Theodoropoulos, Andrew Stephen McGough, Boguslaw Obara

    Abstract: Graphs are a commonly used construct for representing relationships between elements in complex high dimensional datasets. Many real-world phenomenon are dynamic in nature, meaning that any graph used to represent them is inherently temporal. However, many of the machine learning models designed to capture knowledge about the structure of these graphs ignore this rich temporal information when cre… ▽ More

    Submitted 20 November, 2018; originally announced November 2018.

    Comments: Accepted as a workshop paper at IEEE Big Data 2018

  18. arXiv:1810.08675  [pdf, other

    cs.DC cs.LG

    Using Machine Learning to reduce the energy wasted in Volunteer Computing Environments

    Authors: A. Stephen McGough, Matthew Forshaw, John Brennan, Noura Al Moubayed, Stephen Bonner

    Abstract: High Throughput Computing (HTC) provides a convenient mechanism for running thousands of tasks. Many HTC systems exploit computers which are provisioned for other purposes by utilising their idle time - volunteer computing. This has great advantages as it gives access to vast quantities of computational power for little or no cost. The downside is that running tasks are sacrificed if the computer… ▽ More

    Submitted 19 October, 2018; originally announced October 2018.

    Comments: Accepted for publication at THE 9th international Green and sustainable computing Conference, Technically Co-sponsored by IEEE Computer Society & STC Sustainable Computing, October 22-24, Pittsburgh, PA, USA

  19. arXiv:1809.05375  [pdf, other

    cs.CV

    Style Augmentation: Data Augmentation via Style Randomization

    Authors: Philip T. Jackson, Amir Atapour-Abarghouei, Stephen Bonner, Toby Breckon, Boguslaw Obara

    Abstract: We introduce style augmentation, a new form of data augmentation based on random style transfer, for improving the robustness of convolutional neural networks (CNN) over both classification and regression based tasks. During training, our style augmentation randomizes texture, contrast and color, while preserving shape and semantic content. This is accomplished by adapting an arbitrary style trans… ▽ More

    Submitted 12 April, 2019; v1 submitted 14 September, 2018; originally announced September 2018.

  20. arXiv:1808.00720  [pdf, other

    cs.IR cs.LG

    RecoGym: A Reinforcement Learning Environment for the problem of Product Recommendation in Online Advertising

    Authors: David Rohde, Stephen Bonner, Travis Dunlop, Flavian Vasile, Alexandros Karatzoglou

    Abstract: Recommender Systems are becoming ubiquitous in many settings and take many forms, from product recommendation in e-commerce stores, to query suggestions in search engines, to friend recommendation in social networks. Current research directions which are largely based upon supervised learning from historical data appear to be showing diminishing returns with a lot of practitioners report a discrep… ▽ More

    Submitted 14 September, 2018; v1 submitted 2 August, 2018; originally announced August 2018.

    Comments: Accepted at the REVEAL workshop at the Twelfth ACM Conference on Recommender Systems (RecSys '18), October 2--7, 2018, Vancouver, BC, Canada

  21. arXiv:1806.07464  [pdf, other

    cs.LG stat.ML

    Exploring the Semantic Content of Unsupervised Graph Embeddings: An Empirical Study

    Authors: Stephen Bonner, Ibad Kureshi, John Brennan, Georgios Theodoropoulos, Andrew Stephen McGough, Boguslaw Obara

    Abstract: Graph embeddings have become a key and widely used technique within the field of graph mining, proving to be successful across a broad range of domains including social, citation, transportation and biological. Graph embedding techniques aim to automatically create a low-dimensional representation of a given graph, which captures key structural elements in the resulting embedding space. However, t… ▽ More

    Submitted 19 June, 2018; originally announced June 2018.

  22. arXiv:1805.04157  [pdf, other

    cs.HC eess.SP q-bio.NC

    On the Classification of SSVEP-Based Dry-EEG Signals via Convolutional Neural Networks

    Authors: Nik Khadijah Nik Aznan, Stephen Bonner, Jason D. Connolly, Noura Al Moubayed, Toby P. Breckon

    Abstract: In this paper, we propose a novel Convolutional Neural Network (CNN) approach for the classification of raw dry-EEG signals without any data pre-processing. To illustrate the effectiveness of our approach, we utilise the Steady State Visual Evoked Potential (SSVEP) paradigm as our use case. SSVEP can be utilised to allow people with severe physical disabilities such as Complete Locked-In Syndrome… ▽ More

    Submitted 2 August, 2018; v1 submitted 10 May, 2018; originally announced May 2018.

    Comments: Accepted as a full paper at the 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC2018)

  23. Causal Embeddings for Recommendation

    Authors: Stephen Bonner, Flavian Vasile

    Abstract: Many current applications use recommendations in order to modify the natural user behavior, such as to increase the number of sales or the time spent on a website. This results in a gap between the final recommendation objective and the classical setup where recommendation candidates are evaluated by their coherence with past user behavior, by predicting either the missing entries in the user-item… ▽ More

    Submitted 3 August, 2018; v1 submitted 23 June, 2017; originally announced June 2017.

    Comments: Accepted as a long paper at the Twelfth ACM Conference on Recommender Systems (RecSys '18), October 2--7, 2018, Vancouver, BC, Canada