Skip to main content

Showing 1–9 of 9 results for author: Kent, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2303.13691  [pdf, other

    cs.NE cs.CV

    Learning and generalization of compositional representations of visual scenes

    Authors: E. Paxon Frady, Spencer Kent, Quinn Tran, Pentti Kanerva, Bruno A. Olshausen, Friedrich T. Sommer

    Abstract: Complex visual scenes that are composed of multiple objects, each with attributes, such as object name, location, pose, color, etc., are challenging to describe in order to train neural networks. Usually,deep learning networks are trained supervised by categorical scene descriptions. The common categorical description of a scene contains the names of individual objects but lacks information about… ▽ More

    Submitted 23 March, 2023; originally announced March 2023.

    Comments: 10 pages, 6 figures

  2. arXiv:2212.04351  [pdf, other

    cs.LG

    Designing with Non-Finite Output Dimension via Fourier Coefficients of Neural Waveforms

    Authors: Jonathan S. Kent

    Abstract: Ordinary Deep Learning models require having the dimension of their outputs determined by a human practitioner prior to training and operation. For design tasks, this places a hard limit on the maximum complexity of any designs produced by a neural network, which is disadvantageous if a greater allowance for complexity would result in better designs. In this paper, we introduce a methodology for t… ▽ More

    Submitted 17 August, 2022; originally announced December 2022.

    Comments: 3 pages, 4 figures

    MSC Class: 68T07; 42A16

  3. arXiv:2210.13235  [pdf, other

    cs.LG cs.CR math.DS

    Chaos Theory and Adversarial Robustness

    Authors: Jonathan S. Kent

    Abstract: Neural networks, being susceptible to adversarial attacks, should face a strict level of scrutiny before being deployed in critical or adversarial applications. This paper uses ideas from Chaos Theory to explain, analyze, and quantify the degree to which neural networks are susceptible to or robust against adversarial attacks. To this end, we present a new metric, the "susceptibility ratio," given… ▽ More

    Submitted 5 July, 2023; v1 submitted 19 October, 2022; originally announced October 2022.

    Comments: 14 pages, 6 figures

    MSC Class: 37N99 ACM Class: I.2.6; G.3; I.6.0

  4. arXiv:2206.12252  [pdf, other

    cs.LG cs.AI cs.LO

    Indecision Trees: Learning Argument-Based Reasoning under Quantified Uncertainty

    Authors: Jonathan S. Kent, David H. Menager

    Abstract: Using Machine Learning systems in the real world can often be problematic, with inexplicable black-box models, the assumed certainty of imperfect measurements, or providing a single classification instead of a probability distribution. This paper introduces Indecision Trees, a modification to Decision Trees which learn under uncertainty, can perform inference under uncertainty, provide a robust… ▽ More

    Submitted 8 July, 2023; v1 submitted 23 June, 2022; originally announced June 2022.

    Comments: 12 pages, 1 figure

    MSC Class: 62P30; 68T27 ACM Class: G.3; I.2.6

    Journal ref: Proc. SPIE 12529, Synthetic Data for Artificial Intelligence and Machine Learning: Tools, Techniques, and Applications, 1252915 (13 June 2023)

  5. arXiv:2109.13237  [pdf, other

    cs.LG cs.CV stat.ML

    DOODLER: Determining Out-Of-Distribution Likelihood from Encoder Reconstructions

    Authors: Jonathan S. Kent, Bo Li

    Abstract: Deep Learning models possess two key traits that, in combination, make their use in the real world a risky prospect. One, they do not typically generalize well outside of the distribution for which they were trained, and two, they tend to exhibit confident behavior regardless of whether or not they are producing meaningful outputs. While Deep Learning possesses immense power to solve realistic, hi… ▽ More

    Submitted 27 September, 2021; originally announced September 2021.

    Comments: 20 pages, 8 figures, Undergraduate Thesis

    MSC Class: 68T07 (Primary) 62D10 (Secondary) ACM Class: I.2.6; I.5.4; G.3

  6. Unsupervised Learning for Target Tracking and Background Subtraction in Satellite Imagery

    Authors: Jonathan S. Kent, Charles C. Wamsley, Davin Flateau, Amber Ferguson

    Abstract: This paper describes an unsupervised machine learning methodology capable of target tracking and background suppression via a novel dual-model approach. ``Jekyll`` produces a video bit-mask describing an estimate of the locations of moving objects, and ``Hyde`` outputs a pseudo-background frame to subtract from the original input image sequence. These models were trained with a custom-modified ver… ▽ More

    Submitted 13 August, 2021; originally announced September 2021.

    Comments: 10 pages

    ACM Class: I.4.6

    Journal ref: Conference: SPIE 2021, Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications III. Volume: 11746. Pages: 117460H. Year: 2021. Organization: International Society for Optics and Photonics

  7. Vector Symbolic Architectures as a Computing Framework for Emerging Hardware

    Authors: Denis Kleyko, Mike Davies, E. Paxon Frady, Pentti Kanerva, Spencer J. Kent, Bruno A. Olshausen, Evgeny Osipov, Jan M. Rabaey, Dmitri A. Rachkovskij, Abbas Rahimi, Friedrich T. Sommer

    Abstract: This article reviews recent progress in the development of the computing framework vector symbolic architectures (VSA) (also known as hyperdimensional computing). This framework is well suited for implementation in stochastic, emerging hardware, and it naturally expresses the types of cognitive operations required for artificial intelligence (AI). We demonstrate in this article that the field-like… ▽ More

    Submitted 20 July, 2023; v1 submitted 9 June, 2021; originally announced June 2021.

    Comments: 31 pages, 15 figures, 4 Tables

    Journal ref: Proceedings of the IEEE (2022), vol. 110, no. 10

  8. arXiv:2007.03748  [pdf, other

    cs.CV cs.NE

    Resonator networks for factoring distributed representations of data structures

    Authors: E. Paxon Frady, Spencer Kent, Bruno A. Olshausen, Friedrich T. Sommer

    Abstract: The ability to encode and manipulate data structures with distributed neural representations could qualitatively enhance the capabilities of traditional neural networks by supporting rule-based symbolic reasoning, a central property of cognition. Here we show how this may be accomplished within the framework of Vector Symbolic Architectures (VSA) (Plate, 1991; Gayler, 1998; Kanerva, 1996), whereby… ▽ More

    Submitted 7 July, 2020; originally announced July 2020.

    Comments: 20 pages, 5 figures, to appear in Neural Computation 2020 with companion paper: arXiv:1906.11684

  9. arXiv:1906.11684  [pdf, other

    cs.NE cs.LG stat.ML

    Resonator Networks outperform optimization methods at solving high-dimensional vector factorization

    Authors: Spencer J. Kent, E. Paxon Frady, Friedrich T. Sommer, Bruno A. Olshausen

    Abstract: We develop theoretical foundations of Resonator Networks, a new type of recurrent neural network introduced in Frady et al. (2020) to solve a high-dimensional vector factorization problem arising in Vector Symbolic Architectures. Given a composite vector formed by the Hadamard product between a discrete set of high-dimensional vectors, a Resonator Network can efficiently decompose the composite in… ▽ More

    Submitted 14 July, 2020; v1 submitted 19 June, 2019; originally announced June 2019.

    Comments: arXiv's LaTeX compiler contains a compatibility issue with the subcaption package, screwing up the placement of Figure 6 (and subsequent figures) in V3. This update simply remedies that issue