Skip to main content

Showing 1–26 of 26 results for author: Levy, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.14837  [pdf, other

    cs.CV

    Osmosis: RGBD Diffusion Prior for Underwater Image Restoration

    Authors: Opher Bar Nathan, Deborah Levy, Tali Treibitz, Dan Rosenbaum

    Abstract: Underwater image restoration is a challenging task because of strong water effects that increase dramatically with distance. This is worsened by lack of ground truth data of clean scenes without water. Diffusion priors have emerged as strong image restoration priors. However, they are often trained with a dataset of the desired restored output, which is not available in our case. To overcome this… ▽ More

    Submitted 21 March, 2024; originally announced March 2024.

  2. arXiv:2402.04821  [pdf, other

    cs.LG

    E(3)-Equivariant Mesh Neural Networks

    Authors: Thuan Trang, Nhat Khang Ngo, Daniel Levy, Thieu N. Vo, Siamak Ravanbakhsh, Truong Son Hy

    Abstract: Triangular meshes are widely used to represent three-dimensional objects. As a result, many recent works have address the need for geometric deep learning on 3D mesh. However, we observe that the complexities in many of these architectures does not translate to practical performance, and simple deep models for geometric graphs are competitive in practice. Motivated by this observation, we minimall… ▽ More

    Submitted 18 February, 2024; v1 submitted 7 February, 2024; originally announced February 2024.

  3. arXiv:2309.03139  [pdf, other

    cs.LG

    Using Multiple Vector Channels Improves E(n)-Equivariant Graph Neural Networks

    Authors: Daniel Levy, Sékou-Oumar Kaba, Carmelo Gonzales, Santiago Miret, Siamak Ravanbakhsh

    Abstract: We present a natural extension to E(n)-equivariant graph neural networks that uses multiple equivariant vectors per node. We formulate the extension and show that it improves performance across different physical systems benchmark tasks, with minimal differences in runtime or number of parameters. The proposed multichannel EGNN outperforms the standard singlechannel EGNN on N-body charged particle… ▽ More

    Submitted 6 September, 2023; originally announced September 2023.

  4. arXiv:2304.07743  [pdf, other

    cs.CV

    SeaThru-NeRF: Neural Radiance Fields in Scattering Media

    Authors: Deborah Levy, Amit Peleg, Naama Pearl, Dan Rosenbaum, Derya Akkaynak, Simon Korman, Tali Treibitz

    Abstract: Research on neural radiance fields (NeRFs) for novel view generation is exploding with new models and extensions. However, a question that remains unanswered is what happens in underwater or foggy scenes where the medium strongly influences the appearance of objects. Thus far, NeRF and its variants have ignored these cases. However, since the NeRF framework is based on volumetric rendering, it has… ▽ More

    Submitted 16 April, 2023; originally announced April 2023.

  5. arXiv:2303.08774  [pdf, other

    cs.CL cs.AI

    GPT-4 Technical Report

    Authors: OpenAI, Josh Achiam, Steven Adler, Sandhini Agarwal, Lama Ahmad, Ilge Akkaya, Florencia Leoni Aleman, Diogo Almeida, Janko Altenschmidt, Sam Altman, Shyamal Anadkat, Red Avila, Igor Babuschkin, Suchir Balaji, Valerie Balcom, Paul Baltescu, Haiming Bao, Mohammad Bavarian, Jeff Belgum, Irwan Bello, Jake Berdine, Gabriel Bernadett-Shapiro, Christopher Berner, Lenny Bogdonoff, Oleg Boiko , et al. (256 additional authors not shown)

    Abstract: We report the development of GPT-4, a large-scale, multimodal model which can accept image and text inputs and produce text outputs. While less capable than humans in many real-world scenarios, GPT-4 exhibits human-level performance on various professional and academic benchmarks, including passing a simulated bar exam with a score around the top 10% of test takers. GPT-4 is a Transformer-based mo… ▽ More

    Submitted 4 March, 2024; v1 submitted 15 March, 2023; originally announced March 2023.

    Comments: 100 pages; updated authors list; fixed author names and added citation

  6. Automated Identification of Eviction Status from Electronic Health Record Notes

    Authors: Zonghai Yao, Jack Tsai, Weisong Liu, David A. Levy, Emily Druhl, Joel I Reisman, Hong Yu

    Abstract: Objective: Evictions are important social and behavioral determinants of health. Evictions are associated with a cascade of negative events that can lead to unemployment, housing insecurity/homelessness, long-term poverty, and mental health problems. In this study, we developed a natural language processing system to automatically detect eviction status from electronic health record (EHR) notes.… ▽ More

    Submitted 20 May, 2023; v1 submitted 6 December, 2022; originally announced December 2022.

    Comments: This article has been accepted for publication in Journal of the American Medical Informatics Association Published by Oxford University Press. https://doi.org/10.1093/jamia/ocad081

    Journal ref: Journal of the American Medical Informatics Association, ocad081, 2023

  7. arXiv:2210.05875  [pdf, other

    cs.CL

    MedJEx: A Medical Jargon Extraction Model with Wiki's Hyperlink Span and Contextualized Masked Language Model Score

    Authors: Sunjae Kwon, Zonghai Yao, Harmon S. Jordan, David A. Levy, Brian Corner, Hong Yu

    Abstract: This paper proposes a new natural language processing (NLP) application for identifying medical jargon terms potentially difficult for patients to comprehend from electronic health record (EHR) notes. We first present a novel and publicly available dataset with expert-annotated medical jargon terms from 18K+ EHR note sentences ($MedJ$). Then, we introduce a novel medical jargon extraction (… ▽ More

    Submitted 11 October, 2022; originally announced October 2022.

    Comments: Accepted to EMNLP 22

  8. arXiv:2206.04615  [pdf, other

    cs.CL cs.AI cs.CY cs.LG stat.ML

    Beyond the Imitation Game: Quantifying and extrapolating the capabilities of language models

    Authors: Aarohi Srivastava, Abhinav Rastogi, Abhishek Rao, Abu Awal Md Shoeb, Abubakar Abid, Adam Fisch, Adam R. Brown, Adam Santoro, Aditya Gupta, Adrià Garriga-Alonso, Agnieszka Kluska, Aitor Lewkowycz, Akshat Agarwal, Alethea Power, Alex Ray, Alex Warstadt, Alexander W. Kocurek, Ali Safaya, Ali Tazarv, Alice Xiang, Alicia Parrish, Allen Nie, Aman Hussain, Amanda Askell, Amanda Dsouza , et al. (426 additional authors not shown)

    Abstract: Language models demonstrate both quantitative improvement and new qualitative capabilities with increasing scale. Despite their potentially transformative impact, these new capabilities are as yet poorly characterized. In order to inform future research, prepare for disruptive new model capabilities, and ameliorate socially harmful effects, it is vital that we understand the present and near-futur… ▽ More

    Submitted 12 June, 2023; v1 submitted 9 June, 2022; originally announced June 2022.

    Comments: 27 pages, 17 figures + references and appendices, repo: https://github.com/google/BIG-bench

    Journal ref: Transactions on Machine Learning Research, May/2022, https://openreview.net/forum?id=uyTL5Bvosj

  9. arXiv:2109.04020  [pdf, other

    cs.CL cs.AI cs.LG

    Distributionally Robust Multilingual Machine Translation

    Authors: Chunting Zhou, Daniel Levy, Xian Li, Marjan Ghazvininejad, Graham Neubig

    Abstract: Multilingual neural machine translation (MNMT) learns to translate multiple language pairs with a single model, potentially improving both the accuracy and the memory-efficiency of deployed models. However, the heavy data imbalance between languages hinders the model from performing uniformly across language pairs. In this paper, we propose a new learning objective for MNMT based on distributional… ▽ More

    Submitted 8 September, 2021; originally announced September 2021.

    Comments: Long paper accepted by EMNLP2021 main conference

  10. arXiv:2108.02391  [pdf, other

    cs.LG cs.CR math.OC stat.ML

    Adapting to Function Difficulty and Growth Conditions in Private Optimization

    Authors: Hilal Asi, Daniel Levy, John Duchi

    Abstract: We develop algorithms for private stochastic convex optimization that adapt to the hardness of the specific function we wish to optimize. While previous work provide worst-case bounds for arbitrary convex functions, it is often the case that the function at hand belongs to a smaller class that enjoys faster rates. Concretely, we show that for functions exhibiting $κ$-growth around the optimum, i.e… ▽ More

    Submitted 5 August, 2021; originally announced August 2021.

    Comments: 28 pages

  11. arXiv:2102.11845  [pdf, other

    cs.LG cs.CR math.OC stat.ML

    Learning with User-Level Privacy

    Authors: Daniel Levy, Ziteng Sun, Kareem Amin, Satyen Kale, Alex Kulesza, Mehryar Mohri, Ananda Theertha Suresh

    Abstract: We propose and analyze algorithms to solve a range of learning tasks under user-level differential privacy constraints. Rather than guaranteeing only the privacy of individual samples, user-level DP protects a user's entire contribution ($m \ge 1$ samples), providing more stringent but more realistic protection against information leaks. We show that for high-dimensional mean estimation, empirical… ▽ More

    Submitted 3 December, 2021; v1 submitted 23 February, 2021; originally announced February 2021.

    Comments: NeurIPS 2021. 43 pages, 0 figure

  12. arXiv:2010.05893  [pdf, other

    math.OC cs.LG stat.ML

    Large-Scale Methods for Distributionally Robust Optimization

    Authors: Daniel Levy, Yair Carmon, John C. Duchi, Aaron Sidford

    Abstract: We propose and analyze algorithms for distributionally robust optimization of convex losses with conditional value at risk (CVaR) and $χ^2$ divergence uncertainty sets. We prove that our algorithms require a number of gradient evaluations independent of training set size and number of parameters, making them suitable for large-scale applications. For $χ^2$ uncertainty sets these are the first such… ▽ More

    Submitted 10 December, 2020; v1 submitted 12 October, 2020; originally announced October 2020.

    Comments: 63 pages, NeurIPS 2020

  13. arXiv:1909.10455  [pdf, other

    math.OC cs.IT cs.LG stat.ML

    Necessary and Sufficient Geometries for Gradient Methods

    Authors: Daniel Levy, John C. Duchi

    Abstract: We study the impact of the constraint set and gradient geometry on the convergence of online and stochastic methods for convex optimization, providing a characterization of the geometries for which stochastic gradient and adaptive gradient methods are (minimax) optimal. In particular, we show that when the constraint set is quadratically convex, diagonally pre-conditioned stochastic gradient metho… ▽ More

    Submitted 28 October, 2019; v1 submitted 23 September, 2019; originally announced September 2019.

    Comments: 23 pages. To appear at NeurIPS 2019

  14. arXiv:1811.09953  [pdf, other

    cs.CR

    Faster CryptoNets: Leveraging Sparsity for Real-World Encrypted Inference

    Authors: Edward Chou, Josh Beal, Daniel Levy, Serena Yeung, Albert Haque, Li Fei-Fei

    Abstract: Homomorphic encryption enables arbitrary computation over data while it remains encrypted. This privacy-preserving feature is attractive for machine learning, but requires significant computational time due to the large overhead of the encryption scheme. We present Faster CryptoNets, a method for efficient encrypted inference using neural networks. We develop a pruning and quantization approach th… ▽ More

    Submitted 25 November, 2018; originally announced November 2018.

  15. arXiv:1811.01343  [pdf, other

    cs.CV

    Underwater Single Image Color Restoration Using Haze-Lines and a New Quantitative Dataset

    Authors: Dana Berman, Deborah Levy, Shai Avidan, Tali Treibitz

    Abstract: Underwater images suffer from color distortion and low contrast, because light is attenuated while it propagates through water. Attenuation under water varies with wavelength, unlike terrestrial images where attenuation is assumed to be spectrally uniform. The attenuation depends both on the water body and the 3D structure of the scene, making color restoration difficult. Unlike existing single… ▽ More

    Submitted 24 March, 2019; v1 submitted 4 November, 2018; originally announced November 2018.

  16. arXiv:1711.09268  [pdf, other

    stat.ML cs.AI cs.LG

    Generalizing Hamiltonian Monte Carlo with Neural Networks

    Authors: Daniel Levy, Matthew D. Hoffman, Jascha Sohl-Dickstein

    Abstract: We present a general-purpose method to train Markov chain Monte Carlo kernels, parameterized by deep neural networks, that converge and mix quickly to their target distribution. Our method generalizes Hamiltonian Monte Carlo and is trained to maximize expected squared jumped distance, a proxy for mixing speed. We demonstrate large empirical gains on a collection of simple but challenging distribut… ▽ More

    Submitted 2 March, 2018; v1 submitted 25 November, 2017; originally announced November 2017.

    Comments: ICLR 2018

  17. arXiv:1711.08068  [pdf, other

    cs.AI cs.LG

    Deterministic Policy Optimization by Combining Pathwise and Score Function Estimators for Discrete Action Spaces

    Authors: Daniel Levy, Stefano Ermon

    Abstract: Policy optimization methods have shown great promise in solving complex reinforcement and imitation learning tasks. While model-free methods are broadly applicable, they often require many samples to optimize complex policies. Model-based methods greatly improve sample-efficiency but at the cost of poor generalization, requiring a carefully handcrafted model of the system dynamics for each task. R… ▽ More

    Submitted 21 November, 2017; originally announced November 2017.

    Comments: In AAAI 2018 proceedings

  18. arXiv:1707.03372  [pdf, other

    cs.LG stat.ML

    Fast Amortized Inference and Learning in Log-linear Models with Randomly Perturbed Nearest Neighbor Search

    Authors: Stephen Mussmann, Daniel Levy, Stefano Ermon

    Abstract: Inference in log-linear models scales linearly in the size of output space in the worst-case. This is often a bottleneck in natural language processing and computer vision tasks when the output space is feasibly enumerable but very large. We propose a method to perform inference in log-linear models with sublinear amortized cost. Our idea hinges on using Gumbel random variable perturbations and a… ▽ More

    Submitted 11 July, 2017; originally announced July 2017.

    Comments: In UAI proceedings

  19. arXiv:1703.02573  [pdf, other

    cs.LG cs.CL

    Data Noising as Smoothing in Neural Network Language Models

    Authors: Ziang Xie, Sida I. Wang, Jiwei Li, Daniel Lévy, Aiming Nie, Dan Jurafsky, Andrew Y. Ng

    Abstract: Data noising is an effective technique for regularizing neural network models. While noising is widely adopted in application domains such as vision and speech, commonly used noising primitives have not been developed for discrete sequence-level settings such as language modeling. In this paper, we derive a connection between input noising in neural network language models and smoothing in $n$-gra… ▽ More

    Submitted 7 March, 2017; originally announced March 2017.

    Comments: ICLR 2017

  20. arXiv:1612.00542  [pdf, other

    cs.CV cs.LG

    Breast Mass Classification from Mammograms using Deep Convolutional Neural Networks

    Authors: Daniel Lévy, Arzav Jain

    Abstract: Mammography is the most widely used method to screen breast cancer. Because of its mostly manual nature, variability in mass appearance, and low signal-to-noise ratio, a significant number of breast masses are missed or misdiagnosed. In this work, we present how Convolutional Neural Networks can be used to directly classify pre-segmented breast masses in mammograms as benign or malignant, using a… ▽ More

    Submitted 1 December, 2016; originally announced December 2016.

    Comments: NIPS 2016 ML4HC Workshop

  21. Intrusion Detection System for Applications using Linux Containers

    Authors: Amr S. Abed, Charles Clancy, David S. Levy

    Abstract: Linux containers are gaining increasing traction in both individual and industrial use, and as these containers get integrated into mission-critical systems, real-time detection of malicious cyber attacks becomes a critical operational requirement. This paper introduces a real-time host-based intrusion detection system that can be used to passively detect malfeasance against applications within Li… ▽ More

    Submitted 9 November, 2016; originally announced November 2016.

    Comments: The final publication is available at http://link.springer.com/chapter/10.1007%2F978-3-319-24858-5_8. arXiv admin note: substantial text overlap with arXiv:1611.03053

    Journal ref: STM 2015. LNCS, vol. 9331, pp. 123-135. Springer, Heidelberg (2015)

  22. Applying Bag of System Calls for Anomalous Behavior Detection of Applications in Linux Containers

    Authors: Amr S. Abed, T. Charles Clancy, David S. Levy

    Abstract: In this paper, we present the results of using bags of system calls for learning the behavior of Linux containers for use in anomaly-detection based intrusion detection system. By using system calls of the containers monitored from the host kernel for anomaly detection, the system does not require any prior knowledge of the container nature, neither does it require altering the container or the ho… ▽ More

    Submitted 9 November, 2016; originally announced November 2016.

    Comments: Published version available on IEEE Xplore (http://ieeexplore.ieee.org/document/7414047/) arXiv admin note: substantial text overlap with arXiv:1611.03056

    Journal ref: 2015 IEEE Globecom Workshops (GC Wkshps), San Diego, CA, 2015, pp. 1-5

  23. arXiv:1506.03072  [pdf, other

    cs.LG cond-mat.stat-mech stat.ML

    Clustering by transitive propagation

    Authors: Vijay Kumar, Dan Levy

    Abstract: We present a global optimization algorithm for clustering data given the ratio of likelihoods that each pair of data points is in the same cluster or in different clusters. To define a clustering solution in terms of pairwise relationships, a necessary and sufficient condition is that belonging to the same cluster satisfies transitivity. We define a global objective function based on pairwise like… ▽ More

    Submitted 9 June, 2015; originally announced June 2015.

    Comments: 13 pages + 2 appendices, figures

  24. arXiv:1307.2380  [pdf

    cs.DC

    A Taxonomy of Performance Prediction Systems in the Parallel and Distributed Computing Grids

    Authors: Sena Seneviratne, David C. Levy, Rajkumar Buyya

    Abstract: As Grids are loosely-coupled congregations of geographically distributed heterogeneous resources, the efficient utilization of the resources requires the support of a sound Performance Prediction System (PPS). The performance prediction of grid resources is helpful for both Resource Management Systems and grid users to make optimized resource usage decisions. There have been many PPS projects that… ▽ More

    Submitted 12 July, 2013; v1 submitted 9 July, 2013; originally announced July 2013.

    Comments: 35 pages,4 figures,2 tables

  25. arXiv:cs/0607135  [pdf, ps, other

    cs.CC cs.DM

    A polynomial-time approximation algorithm for the number of k-matchings in bipartite graphs

    Authors: Shmuel Friedland, Daniel Levy

    Abstract: We show that the number of $k$-matching in a given undirected graph $G$ is equal to the number of perfect matching of the corresponding graph $G_k$ on an even number of vertices divided by a suitable factor. If $G$ is bipartite then one can construct a bipartite $G_k$. For bipartite graphs this result implies that the number of $k$-matching has a polynomial-time approximation algorithm. The… ▽ More

    Submitted 28 July, 2006; originally announced July 2006.

    Comments: 6 pages

  26. arXiv:cs/0602041  [pdf, ps, other

    cs.DS cs.DM

    Why neighbor-joining works

    Authors: Radu Mihaescu, Dan Levy, Lior Pachter

    Abstract: We show that the neighbor-joining algorithm is a robust quartet method for constructing trees from distances. This leads to a new performance guarantee that contains Atteson's optimal radius bound as a special case and explains many cases where neighbor-joining is successful even when Atteson's criterion is not satisfied. We also provide a proof for Atteson's conjecture on the optimal edge radiu… ▽ More

    Submitted 17 June, 2007; v1 submitted 10 February, 2006; originally announced February 2006.

    Comments: Revision 2

    ACM Class: F.2.0