Skip to main content

Showing 1–32 of 32 results for author: Brandt, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.16971  [pdf, other

    cs.DC

    Autonomy Loops for Monitoring, Operational Data Analytics, Feedback, and Response in HPC Operations

    Authors: Francieli Boito, Jim Brandt, Valeria Cardellini, Philip Carns, Florina M. Ciorba, Hilary Egan, Ahmed Eleliemy, Ann Gentile, Thomas Gruber, Jeff Hanson, Utz-Uwe Haus, Kevin Huck, Thomas Ilsche, Thomas Jakobsche, Terry Jones, Sven Karlsson, Abdullah Mueen, Michael Ott, Tapasya Patki, Ivy Peng, Krishnan Raghavan, Stephen Simms, Kathleen Shoga, Michael Showerman, Devesh Tiwari , et al. (2 additional authors not shown)

    Abstract: Many High Performance Computing (HPC) facilities have developed and deployed frameworks in support of continuous monitoring and operational data analytics (MODA) to help improve efficiency and throughput. Because of the complexity and scale of systems and workflows and the need for low-latency response to address dynamic circumstances, automated feedback and response have the potential to be more… ▽ More

    Submitted 30 January, 2024; originally announced January 2024.

  2. arXiv:2312.04590  [pdf, other

    cs.CR cs.AI cs.CV cs.LG

    Reconciling AI Performance and Data Reconstruction Resilience for Medical Imaging

    Authors: Alexander Ziller, Tamara T. Mueller, Simon Stieger, Leonhard Feiner, Johannes Brandt, Rickmer Braren, Daniel Rueckert, Georgios Kaissis

    Abstract: Artificial Intelligence (AI) models are vulnerable to information leakage of their training data, which can be highly sensitive, for example in medical imaging. Privacy Enhancing Technologies (PETs), such as Differential Privacy (DP), aim to circumvent these susceptibilities. DP is the strongest possible protection for training models while bounding the risks of inferring the inclusion of training… ▽ More

    Submitted 5 December, 2023; originally announced December 2023.

  3. arXiv:2309.02578  [pdf, other

    cs.CV cs.LG

    Anatomy-Driven Pathology Detection on Chest X-rays

    Authors: Philip Müller, Felix Meissen, Johannes Brandt, Georgios Kaissis, Daniel Rueckert

    Abstract: Pathology detection and delineation enables the automatic interpretation of medical scans such as chest X-rays while providing a high level of explainability to support radiologists in making informed decisions. However, annotating pathology bounding boxes is a time-consuming task such that large public datasets for this purpose are scarce. Current approaches thus use weakly supervised object dete… ▽ More

    Submitted 5 September, 2023; originally announced September 2023.

    Comments: Accepted at MICCAI 2023

  4. arXiv:2307.06614  [pdf, other

    eess.IV cs.CV

    Interpretable 2D Vision Models for 3D Medical Images

    Authors: Alexander Ziller, Ayhan Can Erdur, Marwa Trigui, Alp Güvenir, Tamara T. Mueller, Philip Müller, Friederike Jungmann, Johannes Brandt, Jan Peeken, Rickmer Braren, Daniel Rueckert, Georgios Kaissis

    Abstract: Training Artificial Intelligence (AI) models on 3D images presents unique challenges compared to the 2D case: Firstly, the demand for computational resources is significantly higher, and secondly, the availability of large datasets for pre-training is often limited, impeding training success. This study proposes a simple approach of adapting 2D networks with an intermediate feature representation… ▽ More

    Submitted 5 December, 2023; v1 submitted 13 July, 2023; originally announced July 2023.

  5. Very high resolution canopy height maps from RGB imagery using self-supervised vision transformer and convolutional decoder trained on Aerial Lidar

    Authors: Jamie Tolan, Hung-I Yang, Ben Nosarzewski, Guillaume Couairon, Huy Vo, John Brandt, Justine Spore, Sayantan Majumdar, Daniel Haziza, Janaki Vamaraju, Theo Moutakanni, Piotr Bojanowski, Tracy Johns, Brian White, Tobias Tiecke, Camille Couprie

    Abstract: Vegetation structure map** is critical for understanding the global carbon cycle and monitoring nature-based approaches to climate adaptation and mitigation. Repeated measurements of these data allow for the observation of deforestation or degradation of existing forests, natural forest regeneration, and the implementation of sustainable agricultural practices like agroforestry. Assessments of t… ▽ More

    Submitted 15 December, 2023; v1 submitted 14 April, 2023; originally announced April 2023.

    Journal ref: Remote Sensing of Environment 300, 113888, 2024

  6. arXiv:2302.00511  [pdf, other

    cs.LG cs.AI

    Iterative Deepening Hyperband

    Authors: Jasmin Brandt, Marcel Wever, Dimitrios Iliadis, Viktor Bengs, Eyke Hüllermeier

    Abstract: Hyperparameter optimization (HPO) is concerned with the automated search for the most appropriate hyperparameter configuration (HPC) of a parameterized machine learning algorithm. A state-of-the-art HPO method is Hyperband, which, however, has its own parameters that influence its performance. One of these parameters, the maximal budget, is especially problematic: If chosen too small, the budget n… ▽ More

    Submitted 6 February, 2023; v1 submitted 1 February, 2023; originally announced February 2023.

  7. arXiv:2212.00333  [pdf, other

    cs.LG cs.DS

    AC-Band: A Combinatorial Bandit-Based Approach to Algorithm Configuration

    Authors: Jasmin Brandt, Elias Schede, Viktor Bengs, Björn Haddenhorst, Eyke Hüllermeier, Kevin Tierney

    Abstract: We study the algorithm configuration (AC) problem, in which one seeks to find an optimal parameter configuration of a given target algorithm in an automated way. Recently, there has been significant progress in designing AC approaches that satisfy strong theoretical guarantees. However, a significant gap still remains between the practical performance of these approaches and state-of-the-art heuri… ▽ More

    Submitted 1 December, 2022; originally announced December 2022.

  8. Detecting Unknown DGAs without Context Information

    Authors: Arthur Drichel, Justus von Brandt, Ulrike Meyer

    Abstract: New malware emerges at a rapid pace and often incorporates Domain Generation Algorithms (DGAs) to avoid blocking the malware's connection to the command and control (C2) server. Current state-of-the-art classifiers are able to separate benign from malicious domains (binary classification) and attribute them with high probability to the DGAs that generated them (multiclass classification). While bi… ▽ More

    Submitted 30 May, 2022; originally announced May 2022.

    Comments: Accepted at The 17th International Conference on Availability, Reliability and Security (ARES 2022)

  9. arXiv:2202.04487  [pdf, other

    cs.LG stat.ML

    Finding Optimal Arms in Non-stochastic Combinatorial Bandits with Semi-bandit Feedback and Finite Budget

    Authors: Jasmin Brandt, Viktor Bengs, Björn Haddenhorst, Eyke Hüllermeier

    Abstract: We consider the combinatorial bandits problem with semi-bandit feedback under finite sampling budget constraints, in which the learner can carry out its action only for a limited number of times specified by an overall budget. The action is to choose a set of arms, whereupon feedback for each arm in the chosen set is received. Unlike existing works, we study this problem in a non-stochastic settin… ▽ More

    Submitted 14 October, 2022; v1 submitted 9 February, 2022; originally announced February 2022.

    MSC Class: 68Q32 (Primary) 68T05; 68W27 (Secondary)

  10. A Survey of Methods for Automated Algorithm Configuration

    Authors: Elias Schede, Jasmin Brandt, Alexander Tornede, Marcel Wever, Viktor Bengs, Eyke Hüllermeier, Kevin Tierney

    Abstract: Algorithm configuration (AC) is concerned with the automated search of the most suitable parameter configuration of a parametrized algorithm. There is currently a wide variety of AC problem variants and methods proposed in the literature. Existing reviews do not take into account all derivatives of the AC problem, nor do they offer a complete classification scheme. To this end, we introduce taxono… ▽ More

    Submitted 13 October, 2022; v1 submitted 3 February, 2022; originally announced February 2022.

    ACM Class: I.2.6

    Journal ref: Journal of Artificial Intelligence Research (JAIR) 75 (2022) 425-487

  11. arXiv:2201.00820  [pdf, other

    eess.IV cs.CV cs.LG physics.data-an physics.ins-det physics.optics

    Low dosage 3D volume fluorescence microscopy imaging using compressive sensing

    Authors: Varun Mannam, Jacob Brandt, Cody J. Smith, Scott Howard

    Abstract: Fluorescence microscopy has been a significant tool to observe long-term imaging of embryos (in vivo) growth over time. However, cumulative exposure is phototoxic to such sensitive live samples. While techniques like light-sheet fluorescence microscopy (LSFM) allow for reduced exposure, it is not well suited for deep imaging models. Other computational techniques are computationally expensive and… ▽ More

    Submitted 3 January, 2022; originally announced January 2022.

  12. The More, the Better? A Study on Collaborative Machine Learning for DGA Detection

    Authors: Arthur Drichel, Benedikt Holmes, Justus von Brandt, Ulrike Meyer

    Abstract: Domain generation algorithms (DGAs) prevent the connection between a botnet and its master from being blocked by generating a large number of domain names. Promising single-data-source approaches have been proposed for separating benign from DGA-generated domains. Collaborative machine learning (ML) can be used in order to enhance a classifier's detection rate, reduce its false positive rate (FPR)… ▽ More

    Submitted 24 September, 2021; originally announced September 2021.

    Comments: Accepted at The 3rd Workshop on Cyber-Security Arms Race (CYSARM '21)

  13. arXiv:2109.05160  [pdf, other

    cs.CL

    StreamHover: Livestream Transcript Summarization and Annotation

    Authors: Sangwoo Cho, Franck Dernoncourt, Tim Ganter, Trung Bui, Nedim Lipka, Walter Chang, Hailin **, Jonathan Brandt, Hassan Foroosh, Fei Liu

    Abstract: With the explosive growth of livestream broadcasting, there is an urgent need for new summarization technology that enables us to create a preview of streamed content and tap into this wealth of knowledge. However, the problem is nontrivial due to the informal nature of spoken language. Further, there has been a shortage of annotated datasets that are necessary for transcript summarization. In thi… ▽ More

    Submitted 10 September, 2021; originally announced September 2021.

    Comments: EMNLP 2021 (Long Paper)

  14. Finding Phish in a Haystack: A Pipeline for Phishing Classification on Certificate Transparency Logs

    Authors: Arthur Drichel, Vincent Drury, Justus von Brandt, Ulrike Meyer

    Abstract: Current popular phishing prevention techniques mainly utilize reactive blocklists, which leave a ``window of opportunity'' for attackers during which victims are unprotected. One possible approach to shorten this window aims to detect phishing attacks earlier, during website preparation, by monitoring Certificate Transparency (CT) logs. Previous attempts to work with CT log data for phishing class… ▽ More

    Submitted 23 June, 2021; originally announced June 2021.

    Comments: Accepted at The 16th International Conference on Availability, Reliability and Security (ARES 2021)

  15. arXiv:2012.07755  [pdf, other

    cs.DC cs.NI

    Application-aware Congestion Mitigation for High-Performance Computing Systems

    Authors: Archit Patke, Saurabh Jha, Haoran Qiu, Jim Brandt, Ann Gentile, Joe Greenseid, Zbigniew Kalbarczyk, Ravishankar Iyer

    Abstract: High-performance computing (HPC) systems frequently experience congestion leading to significant application performance variation. However, the impact of congestion on application runtime differs from application to application depending on their network characteristics (such as bandwidth and latency requirements). We leverage this insight to develop Netscope, an automated ML-driven framework tha… ▽ More

    Submitted 3 February, 2021; v1 submitted 14 December, 2020; originally announced December 2020.

  16. arXiv:2006.03104  [pdf

    cs.DC

    Portability of Scientific Workflows in NGS Data Analysis: A Case Study

    Authors: Christopher Schiefer, Marc Bux, Joergen Brandt, Clemens Messerschmidt, Knut Reinert, Dieter Beule, Ulf Leser

    Abstract: The analysis of next-generation sequencing (NGS) data requires complex computational workflows consisting of dozens of autonomously developed yet interdependent processing steps. Whenever large amounts of data need to be processed, these workflows must be executed on a parallel and/or distributed systems to ensure reasonable runtime. Porting a workflow developed for a particular system on a partic… ▽ More

    Submitted 4 June, 2020; originally announced June 2020.

  17. A global method to identify trees outside of closed-canopy forests with medium-resolution satellite imagery

    Authors: John Brandt, Fred Stolle

    Abstract: Scattered trees outside of dense, closed-canopy forests are very important for carbon sequestration, supporting livelihoods, maintaining ecosystem integrity, and climate change adaptation and mitigation. In contrast to trees inside of closed-canopy forests, not much is known about the spatial extent and distribution of scattered trees at a global scale. Due to the cost of high-resolution satellite… ▽ More

    Submitted 24 July, 2020; v1 submitted 13 May, 2020; originally announced May 2020.

  18. arXiv:1908.02425  [pdf, other

    cs.IR cs.CL

    Text mining policy: Classifying forest and landscape restoration policy agenda with neural information retrieval

    Authors: John Brandt

    Abstract: Dozens of countries have committed to restoring the ecological functionality of 350 million hectares of land by 2030. In order to achieve such wide-scale implementation of restoration, the values and priorities of multi-sectoral stakeholders must be aligned and integrated with national level commitments and other development agenda. Although misalignment across scales of policy and between stakeho… ▽ More

    Submitted 6 August, 2019; originally announced August 2019.

    Comments: In FEED 19 Workshop at KDD 2019. Anchorage, AK, USA, 5 pages

  19. arXiv:1907.05312  [pdf, other

    cs.DC cs.NI

    A Study of Network Congestion in Two Supercomputing High-Speed Interconnects

    Authors: Saurabh Jha, Archit Patke, Jim Brandt, Ann Gentile, Mike Showerman, Eric Roman, Zbigniew T. Kalbarczyk, William T. Kramer, Ravishankar K. Iyer

    Abstract: Network congestion in high-speed interconnects is a major source of application run time performance variation. Recent years have witnessed a surge of interest from both academia and industry in the development of novel approaches for congestion control at the network level and in application placement, map**, and scheduling at the system-level. However, these studies are based on proxy applicat… ▽ More

    Submitted 11 July, 2019; originally announced July 2019.

    Comments: Accepted for HOTI2019

  20. arXiv:1907.01019  [pdf, other

    cs.DC

    Understanding Fault Scenarios and Impacts through Fault Injection Experiments in Cielo

    Authors: Valerio Formicola, Saurabh Jha, Daniel Chen, Fei Deng, Amanda Bonnie, Mike Mason, Jim Brandt, Ann Gentile, Larry Kaplan, Jason Repik, Jeremy Enos, Mike Showerman, Annette Greiner, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Bill Krammer

    Abstract: We present a set of fault injection experiments performed on the ACES (LANL/SNL) Cray XE supercomputer Cielo. We use this experimental campaign to improve the understanding of failure causes and propagation that we observed in the field failure data analysis of NCSA's Blue Waters. We use the data collected from the logs and from network performance counter data 1) to characterize the fault-error-f… ▽ More

    Submitted 1 July, 2019; originally announced July 2019.

    Comments: Presented at Cray User Group 2017

  21. arXiv:1906.06841  [pdf, other

    cs.LG cs.AI cs.CV

    LPaintB: Learning to Paint from Self-Supervision

    Authors: Biao Jia, Jonathan Brandt, Radomir Mech, Byungmoon Kim, Dinesh Manocha

    Abstract: We present a novel reinforcement learning-based natural media painting algorithm. Our goal is to reproduce a reference image using brush strokes and we encode the objective through observations. Our formulation takes into account that the distribution of the reward in the action space is sparse and training a reinforcement learning algorithm from scratch can be difficult. We present an approach th… ▽ More

    Submitted 21 September, 2019; v1 submitted 17 June, 2019; originally announced June 2019.

  22. arXiv:1904.10130  [pdf, other

    cs.LG cs.CV stat.ML

    Spatio-temporal crop classification of low-resolution satellite imagery with capsule layers and distributed attention

    Authors: John Brandt

    Abstract: Land use classification of low resolution spatial imagery is one of the most extensively researched fields in remote sensing. Despite significant advancements in satellite technology, high resolution imagery lacks global coverage and can be prohibitively expensive to procure for extended time periods. Accurately classifying land use change without high resolution imagery offers the potential to mo… ▽ More

    Submitted 22 April, 2019; originally announced April 2019.

  23. arXiv:1904.02201  [pdf, other

    cs.CV

    PaintBot: A Reinforcement Learning Approach for Natural Media Painting

    Authors: Biao Jia, Chen Fang, Jonathan Brandt, Byungmoon Kim, Dinesh Manocha

    Abstract: We propose a new automated digital painting framework, based on a painting agent trained through reinforcement learning. To synthesize an image, the agent selects a sequence of continuous-valued actions representing primitive painting strokes, which are accumulated on a digital canvas. Action selection is guided by a given reference image, which the agent attempts to replicate subject to the limit… ▽ More

    Submitted 3 April, 2019; originally announced April 2019.

  24. arXiv:1903.06963  [pdf, other

    cs.CL

    Imbalanced multi-label classification using multi-task learning with extractive summarization

    Authors: John Brandt

    Abstract: Extractive summarization and imbalanced multi-label classification often require vast amounts of training data to avoid overfitting. In situations where training data is expensive to generate, leveraging information between tasks is an attractive approach to increasing the amount of available information. This paper employs multi-task training of an extractive summarizer and an RNN-based classifie… ▽ More

    Submitted 16 March, 2019; originally announced March 2019.

  25. arXiv:1901.11397  [pdf, other

    cs.CV cs.LG stat.ML

    Hotels-50K: A Global Hotel Recognition Dataset

    Authors: Abby Stylianou, Hong Xuan, Maya Shende, Jonathan Brandt, Richard Souvenir, Robert Pless

    Abstract: Recognizing a hotel from an image of a hotel room is important for human trafficking investigations. Images directly link victims to places and can help verify where victims have been trafficked, and where their traffickers might move them or others in the future. Recognizing the hotel from images is challenging because of low image quality, uncommon camera perspectives, large occlusions (often th… ▽ More

    Submitted 26 January, 2019; originally announced January 2019.

  26. arXiv:1810.05977  [pdf, other

    cs.CV

    Learning to Sketch with Deep Q Networks and Demonstrated Strokes

    Authors: Tao Zhou, Chen Fang, Zhaowen Wang, Jimei Yang, Byungmoon Kim, Zhili Chen, Jonathan Brandt, Demetri Terzopoulos

    Abstract: Doodling is a useful and common intelligent skill that people can learn and master. In this work, we propose a two-stage learning framework to teach a machine to doodle in a simulated painting environment via Stroke Demonstration and deep Q-learning (SDQ). The developed system, Doodle-SDQ, generates a sequence of pen actions to reproduce a reference drawing and mimics the behavior of human painter… ▽ More

    Submitted 14 October, 2018; originally announced October 2018.

  27. arXiv:1608.00507  [pdf, other

    cs.CV

    Top-down Neural Attention by Excitation Backprop

    Authors: Jianming Zhang, Zhe Lin, Jonathan Brandt, Xiaohui Shen, Stan Sclaroff

    Abstract: We aim to model the top-down attention of a Convolutional Neural Network (CNN) classifier for generating task-specific attention maps. Inspired by a top-down human visual attention model, we propose a new backpropagation scheme, called Excitation Backprop, to pass along top-down signals downwards in the network hierarchy via a probabilistic Winner-Take-All process. Furthermore, we introduce the co… ▽ More

    Submitted 1 August, 2016; originally announced August 2016.

    Comments: A shorter version of this paper is accepted at ECCV, 2016 (oral)

  28. arXiv:1507.03196  [pdf, other

    cs.CV

    DeepFont: Identify Your Font from An Image

    Authors: Zhangyang Wang, Jianchao Yang, Hailin **, Eli Shechtman, Aseem Agarwala, Jonathan Brandt, Thomas S. Huang

    Abstract: As font is one of the core design concepts, automatic font identification and similar font suggestion from an image or photo has been on the wish list of many designers. We study the Visual Font Recognition (VFR) problem, and advance the state-of-the-art remarkably by develo** the DeepFont system. First of all, we build up the first available large-scale VFR dataset, named AdobeVFR, consisting o… ▽ More

    Submitted 12 July, 2015; originally announced July 2015.

    Comments: To Appear in ACM Multimedia as a full paper

  29. arXiv:1504.00028  [pdf, other

    cs.CV cs.LG

    Real-World Font Recognition Using Deep Network and Domain Adaptation

    Authors: Zhangyang Wang, Jianchao Yang, Hailin **, Eli Shechtman, Aseem Agarwala, Jonathan Brandt, Thomas S. Huang

    Abstract: We address a challenging fine-grain classification problem: recognizing a font style from an image of text. In this task, it is very easy to generate lots of rendered font examples but very hard to obtain real-world labeled images. This real-to-synthetic domain gap caused poor generalization to new real data in previous methods (Chen et al. (2014)). In this paper, we refer to Convolutional Neural… ▽ More

    Submitted 31 March, 2015; originally announced April 2015.

  30. arXiv:1412.5758   

    cs.CV

    Decomposition-Based Domain Adaptation for Real-World Font Recognition

    Authors: Zhangyang Wang, Jianchao Yang, Hailin **, Eli Shechtman, Aseem Agarwala, Jonathan Brandt, Thomas S. Huang

    Abstract: We present a domain adaption framework to address a domain mismatch between synthetic training and real-world testing data. We demonstrate our method on a challenging fine-grain classification problem: recognizing a font style from an image of text. In this task, it is very easy to generate lots of rendered font examples but very hard to obtain real-world labeled images. This real-to-synthetic dom… ▽ More

    Submitted 1 April, 2015; v1 submitted 18 December, 2014; originally announced December 2014.

    Comments: This paper has been withdrawn by the author due to project concerns

  31. arXiv:1404.6272  [pdf, ps, other

    cs.CV cs.LG

    Scalable Similarity Learning using Large Margin Neighborhood Embedding

    Authors: Zhaowen Wang, Jianchao Yang, Zhe Lin, Jonathan Brandt, Shiyu Chang, Thomas Huang

    Abstract: Classifying large-scale image data into object categories is an important problem that has received increasing research attention. Given the huge amount of data, non-parametric approaches such as nearest neighbor classifiers have shown promising results, especially when they are underpinned by a learned distance or similarity measurement. Although metric learning has been well studied in the past… ▽ More

    Submitted 24 April, 2014; originally announced April 2014.

  32. arXiv:1204.2995  [pdf, other

    cs.SI cs.HC physics.soc-ph

    Analytic Methods for Optimizing Realtime Crowdsourcing

    Authors: Michael S. Bernstein, David R. Karger, Robert C. Miller, Joel Brandt

    Abstract: Realtime crowdsourcing research has demonstrated that it is possible to recruit paid crowds within seconds by managing a small, fast-reacting worker pool. Realtime crowds enable crowd-powered systems that respond at interactive speeds: for example, cameras, robots and instant opinion polls. So far, these techniques have mainly been proof-of-concept prototypes: research has not yet attempted to und… ▽ More

    Submitted 13 April, 2012; originally announced April 2012.

    Comments: Presented at Collective Intelligence conference, 2012

    Report number: CollectiveIntelligence/2012/12