Skip to main content

Showing 1–50 of 170 results for author: Miller, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.07778  [pdf, other

    cs.CR cs.AI cs.CL cs.LG

    On Trojans in Refined Language Models

    Authors: Jayaram Raghuram, George Kesidis, David J. Miller

    Abstract: A Trojan in a language model can be inserted when the model is refined for a particular application such as determining the sentiment of product reviews. In this paper, we clarify and empirically explore variations of the data-poisoning threat model. We then empirically assess two simple defenses each for a different defense scenario. Finally, we provide a brief survey of related attacks and defen… ▽ More

    Submitted 11 June, 2024; originally announced June 2024.

  2. arXiv:2405.07278  [pdf, other

    cs.CL cs.LG

    Human-interpretable clustering of short-text using large language models

    Authors: Justin K. Miller, Tristram J. Alexander

    Abstract: Large language models have seen extraordinary growth in popularity due to their human-like content generation capabilities. We show that these models can also be used to successfully cluster human-generated content, with success defined through the measures of distinctiveness and interpretability. This success is validated by both human reviewers and ChatGPT, providing an automated means to close… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

    Comments: Main text: 18 pages, 8 figures. Supplementary: 21 pages, 15 figures, 3 tables

    ACM Class: I.2.7

  3. arXiv:2403.14128  [pdf, other

    cs.DB

    Gen-T: Table Reclamation in Data Lakes

    Authors: Grace Fan, Roee Shraga, Renée J. Miller

    Abstract: We introduce the problem of Table Reclamation. Given a Source Table and a large table repository, reclamation finds a set of tables that, when integrated, reproduce the source table as closely as possible. Unlike query discovery problems like Query-by-Example or by-Target, Table Reclamation focuses on reclaiming the data in the Source Table as fully as possible using real tables that may be incomp… ▽ More

    Submitted 22 March, 2024; v1 submitted 21 March, 2024; originally announced March 2024.

    Comments: to appear at ICDE 2024

  4. arXiv:2403.03896  [pdf, other

    cs.CV cs.LG

    DART: Implicit Doppler Tomography for Radar Novel View Synthesis

    Authors: Tianshu Huang, John Miller, Akarsh Prabhakara, Tao **, Tarana Laroia, Zico Kolter, Anthony Rowe

    Abstract: Simulation is an invaluable tool for radio-frequency system designers that enables rapid prototy** of various algorithms for imaging, target detection, classification, and tracking. However, simulating realistic radar scans is a challenging task that requires an accurate model of the scene, radio frequency material properties, and a corresponding radar synthesis function. Rather than specifying… ▽ More

    Submitted 6 March, 2024; originally announced March 2024.

    Comments: To appear in CVPR 2024; see https://wiselabcmu.github.io/dart/ for our project site

  5. arXiv:2403.03816  [pdf, other

    stat.ML cs.LG

    Targeted Variance Reduction: Robust Bayesian Optimization of Black-Box Simulators with Noise Parameters

    Authors: John Joshua Miller, Simon Mak

    Abstract: The optimization of a black-box simulator over control parameters $\mathbf{x}$ arises in a myriad of scientific applications. In such applications, the simulator often takes the form $f(\mathbf{x},\boldsymbolθ)$, where $\boldsymbolθ$ are parameters that are uncertain in practice. Robust optimization aims to optimize the objective $\mathbb{E}[f(\mathbf{x},\boldsymbolΘ)]$, where… ▽ More

    Submitted 6 March, 2024; originally announced March 2024.

  6. arXiv:2403.02327  [pdf, other

    cs.DB cs.AI

    Model Lakes

    Authors: Koyena Pal, David Bau, Renée J. Miller

    Abstract: Given a set of deep learning models, it can be hard to find models appropriate to a task, understand the models, and characterize how models are different one from another. Currently, practitioners rely on manually-written documentation to understand and choose models. However, not all models have complete and reliable documentation. As the number of machine learning models increases, this issue o… ▽ More

    Submitted 4 March, 2024; originally announced March 2024.

  7. arXiv:2402.09567  [pdf, other

    eess.IV cs.CV

    TAI-GAN: A Temporally and Anatomically Informed Generative Adversarial Network for early-to-late frame conversion in dynamic cardiac PET inter-frame motion correction

    Authors: Xueqi Guo, Luyao Shi, Xiongchao Chen, Qiong Liu, Bo Zhou, Huidong Xie, Yi-Hwa Liu, Richard Palyo, Edward J. Miller, Albert J. Sinusas, Lawrence H. Staib, Bruce Spottiswoode, Chi Liu, Nicha C. Dvornek

    Abstract: Inter-frame motion in dynamic cardiac positron emission tomography (PET) using rubidium-82 (82-Rb) myocardial perfusion imaging impacts myocardial blood flow (MBF) quantification and the diagnosis accuracy of coronary artery diseases. However, the high cross-frame distribution variation due to rapid tracer kinetics poses a considerable challenge for inter-frame motion correction, especially for ea… ▽ More

    Submitted 14 February, 2024; originally announced February 2024.

    Comments: Under revision at Medical Image Analysis

  8. arXiv:2402.08946  [pdf, other

    cs.LG

    Measuring Sharpness in Grokking

    Authors: Jack Miller, Patrick Gleeson, Charles O'Neill, Thang Bui, Noam Levi

    Abstract: Neural networks sometimes exhibit grokking, a phenomenon where perfect or near-perfect performance is achieved on a validation set well after the same performance has been obtained on the corresponding training set. In this workshop paper, we introduce a robust technique for measuring grokking, based on fitting an appropriate functional form. We then use this to investigate the sharpness of transi… ▽ More

    Submitted 14 February, 2024; originally announced February 2024.

  9. arXiv:2402.02034  [pdf, other

    cs.CR cs.LG cs.NE

    Universal Post-Training Reverse-Engineering Defense Against Backdoors in Deep Neural Networks

    Authors: Xi Li, Hang Wang, David J. Miller, George Kesidis

    Abstract: A variety of defenses have been proposed against backdoors attacks on deep neural network (DNN) classifiers. Universal methods seek to reliably detect and/or mitigate backdoors irrespective of the incorporation mechanism used by the attacker, while reverse-engineering methods often explicitly assume one. In this paper, we describe a new detector that: relies on internal feature map of the defended… ▽ More

    Submitted 22 May, 2024; v1 submitted 3 February, 2024; originally announced February 2024.

  10. arXiv:2401.14973  [pdf, other

    stat.ML cs.LG

    Discovering group dynamics in synchronous time series via hierarchical recurrent switching-state models

    Authors: Michael Wojnowicz, Preetish Rath, Eric Miller, Jeffrey Miller, Clifford Hancock, Meghan O'Donovan, Seth Elkin-Frankston, Thaddeus Brunye, Michael C. Hughes

    Abstract: We seek to model a collection of time series arising from multiple entities interacting over the same time period. Recent work focused on modeling individual time series is inadequate for our intended applications, where collective system-level behavior influences the trajectories of individual entities. To address such problems, we present a new hierarchical switching-state model that can be trai… ▽ More

    Submitted 26 January, 2024; originally announced January 2024.

  11. arXiv:2401.13912  [pdf, other

    cs.LG

    A Survey of Deep Learning and Foundation Models for Time Series Forecasting

    Authors: John A. Miller, Mohammed Aldosari, Farah Saeed, Nasid Habib Barna, Subas Rana, I. Budak Arpinar, Ninghao Liu

    Abstract: Deep Learning has been successfully applied to many application domains, yet its advantages have been slow to emerge for time series forecasting. For example, in the well-known Makridakis (M) Competitions, hybrids of traditional statistical or machine learning techniques have only recently become the top performers. With the recent architectural advances in deep learning being applied to time seri… ▽ More

    Submitted 24 January, 2024; originally announced January 2024.

  12. arXiv:2311.12676  [pdf, other

    math.LO cs.LO

    Minimal covers in the Weihrauch degrees

    Authors: Steffen Lempp, Joseph S. Miller, Arno Pauly, Mariya I. Soskova, Manlio Valenti

    Abstract: In this paper, we study the existence of minimal covers and strong minimal covers in the Weihrauch degrees. We characterize when a problem $f$ is a minimal cover or strong minimal cover of a problem $h$. We show that strong minimal covers only exist in the cone below $\mathsf{id}$ and that the Weihrauch lattice above $\mathsf{id}$ is dense. From this, we conclude that the degree of $\mathsf{id}$ i… ▽ More

    Submitted 21 November, 2023; originally announced November 2023.

    MSC Class: 03D30 03D78

  13. arXiv:2311.02019  [pdf, other

    stat.ME cs.LG math.ST stat.ML

    Reproducible Parameter Inference Using Bagged Posteriors

    Authors: Jonathan H. Huggins, Jeffrey W. Miller

    Abstract: Under model misspecification, it is known that Bayesian posteriors often do not properly quantify uncertainty about true or pseudo-true parameters. Even more fundamentally, misspecification leads to a lack of reproducibility in the sense that the same model will yield contradictory posteriors on independent data sets from the true distribution. To define a criterion for reproducible uncertainty qu… ▽ More

    Submitted 3 November, 2023; originally announced November 2023.

    Comments: arXiv admin note: text overlap with arXiv:1912.07104

  14. arXiv:2310.20498  [pdf, other

    cs.LG cond-mat.stat-mech quant-ph stat.ML

    Generative Learning of Continuous Data by Tensor Networks

    Authors: Alex Meiburg, **g Chen, Jacob Miller, Raphaëlle Tihon, Guillaume Rabusseau, Alejandro Perdomo-Ortiz

    Abstract: Beyond their origin in modeling many-body quantum systems, tensor networks have emerged as a promising class of models for solving machine learning problems, notably in unsupervised generative learning. While possessing many desirable features arising from their quantum-inspired nature, tensor network generative models have previously been largely restricted to binary or categorical data, limiting… ▽ More

    Submitted 31 October, 2023; originally announced October 2023.

    Comments: 21 pages, 15 figures

  15. arXiv:2310.17247  [pdf, other

    cs.LG stat.ML

    Grokking Beyond Neural Networks: An Empirical Exploration with Model Complexity

    Authors: Jack Miller, Charles O'Neill, Thang Bui

    Abstract: In some settings neural networks exhibit a phenomenon known as \textit{grokking}, where they achieve perfect or near-perfect accuracy on the validation set long after the same performance has been achieved on the training set. In this paper, we discover that grokking is not limited to neural networks but occurs in other settings such as Gaussian process (GP) classification, GP regression, linear r… ▽ More

    Submitted 31 March, 2024; v1 submitted 26 October, 2023; originally announced October 2023.

  16. arXiv:2310.02656  [pdf, other

    cs.DB

    Blend: A Unified Data Discovery System

    Authors: Mahdi Esmailoghli, Christoph Schnell, Renée J. Miller, Ziawasch Abedjan

    Abstract: Data discovery is an iterative and incremental process that necessitates the execution of multiple data discovery queries to identify the desired tables from large and diverse data lakes. Current methodologies concentrate on single discovery tasks such as join, correlation, or union discovery. However, in practice, a series of these approaches and their corresponding index structures are necessary… ▽ More

    Submitted 4 October, 2023; originally announced October 2023.

  17. arXiv:2309.16827  [pdf, other

    cs.LG

    Post-Training Overfitting Mitigation in DNN Classifiers

    Authors: Hang Wang, David J. Miller, George Kesidis

    Abstract: Well-known (non-malicious) sources of overfitting in deep neural net (DNN) classifiers include: i) large class imbalances; ii) insufficient training-set diversity; and iii) over-training. In recent work, it was shown that backdoor data-poisoning also induces overfitting, with unusually large classification margins to the attacker's target class, mediated particularly by (unbounded) ReLU activation… ▽ More

    Submitted 28 September, 2023; originally announced September 2023.

  18. arXiv:2309.13050  [pdf, other

    cs.IR cs.LG

    Decoding the Alphabet Soup of Degrees in the United States Postsecondary Education System Through Hybrid Method: Database and Text Mining

    Authors: Sahar Voghoei, James Byars, John A Miller, Khaled Rasheed, Hamid A Arabnia

    Abstract: This paper proposes a model to predict the levels (e.g., Bachelor, Master, etc.) of postsecondary degree awards that have been ambiguously expressed in the student tracking reports of the National Student Clearinghouse (NSC). The model will be the hybrid of two modules. The first module interprets the relevant abbreviatory elements embedded in NSC reports by referring to a comprehensive database t… ▽ More

    Submitted 6 September, 2023; originally announced September 2023.

    Comments: 18 Pages, 8 figures

  19. arXiv:2309.06126  [pdf, other

    astro-ph.IM astro-ph.CO astro-ph.GA astro-ph.HE cs.CL cs.LG

    AstroLLaMA: Towards Specialized Foundation Models in Astronomy

    Authors: Tuan Dung Nguyen, Yuan-Sen Ting, Ioana Ciucă, Charlie O'Neill, Ze-Chang Sun, Maja Jabłońska, Sandor Kruk, Ernest Perkowski, Jack Miller, Jason Li, Josh Peek, Kartheik Iyer, Tomasz Różański, Pranav Khetarpal, Sharaf Zaman, David Brodrick, Sergio J. Rodríguez Méndez, Thang Bui, Alyssa Goodman, Alberto Accomazzi, Jill Naiman, Jesse Cranney, Kevin Schawinski, UniverseTBD

    Abstract: Large language models excel in many human-language tasks but often falter in highly specialized domains like scholarly astronomy. To bridge this gap, we introduce AstroLLaMA, a 7-billion-parameter model fine-tuned from LLaMA-2 using over 300,000 astronomy abstracts from arXiv. Optimized for traditional causal language modeling, AstroLLaMA achieves a 30% lower perplexity than Llama-2, showing marke… ▽ More

    Submitted 12 September, 2023; originally announced September 2023.

    Comments: 6 pages, 3 figures, submitted to IJCNLP-AACL 2023. Comments are welcome. The model can be found on Hugging Face - https://huggingface.co/universeTBD/astrollama

  20. arXiv:2308.16403  [pdf, other

    cs.HC cs.CG cs.LG

    Balancing between the Local and Global Structures (LGS) in Graph Embedding

    Authors: Jacob Miller, Vahan Huroyan, Stephen Kobourov

    Abstract: We present a method for balancing between the Local and Global Structures (LGS) in graph embedding, via a tunable parameter. Some embedding methods aim to capture global structures, while others attempt to preserve local neighborhoods. Few methods attempt to do both, and it is not always possible to capture well both local and global information in two dimensions, which is where most graph drawing… ▽ More

    Submitted 1 September, 2023; v1 submitted 30 August, 2023; originally announced August 2023.

    Comments: Appears in the Proceedings of the 31st International Symposium on Graph Drawing and Network Visualization (GD 2023)

  21. arXiv:2308.13768  [pdf, other

    cs.CL cs.LG

    Adversarial Fine-Tuning of Language Models: An Iterative Optimisation Approach for the Generation and Detection of Problematic Content

    Authors: Charles O'Neill, Jack Miller, Ioana Ciuca, Yuan-Sen Ting, Thang Bui

    Abstract: In this paper, we tackle the emerging challenge of unintended harmful content generation in Large Language Models (LLMs) with a novel dual-stage optimisation technique using adversarial fine-tuning. Our two-pronged approach employs an adversarial model, fine-tuned to generate potentially harmful prompts, and a judge model, iteratively optimised to discern these prompts. In this adversarial cycle,… ▽ More

    Submitted 26 August, 2023; originally announced August 2023.

  22. arXiv:2308.12443  [pdf, other

    eess.IV cs.CV cs.LG

    TAI-GAN: Temporally and Anatomically Informed GAN for early-to-late frame conversion in dynamic cardiac PET motion correction

    Authors: Xueqi Guo, Luyao Shi, Xiongchao Chen, Bo Zhou, Qiong Liu, Huidong Xie, Yi-Hwa Liu, Richard Palyo, Edward J. Miller, Albert J. Sinusas, Bruce Spottiswoode, Chi Liu, Nicha C. Dvornek

    Abstract: The rapid tracer kinetics of rubidium-82 ($^{82}$Rb) and high variation of cross-frame distribution in dynamic cardiac positron emission tomography (PET) raise significant challenges for inter-frame motion correction, particularly for the early frames where conventional intensity-based image registration techniques are not applicable. Alternatively, a promising approach utilizes generative methods… ▽ More

    Submitted 23 August, 2023; originally announced August 2023.

    Comments: Accepted by Simulation and Synthesis in Medical Imaging (SASHIMI 2023, MICCAI workshop), preprint version

  23. arXiv:2308.09850  [pdf, other

    cs.LG cs.CR

    Backdoor Mitigation by Correcting the Distribution of Neural Activations

    Authors: Xi Li, Zhen Xiang, David J. Miller, George Kesidis

    Abstract: Backdoor (Trojan) attacks are an important type of adversarial exploit against deep neural networks (DNNs), wherein a test instance is (mis)classified to the attacker's target class whenever the attacker's backdoor trigger is present. In this paper, we reveal and analyze an important property of backdoor attacks: a successful attack causes an alteration in the distribution of internal layer activa… ▽ More

    Submitted 18 August, 2023; originally announced August 2023.

  24. arXiv:2308.07645  [pdf, other

    cs.CL

    Steering Language Generation: Harnessing Contrastive Expert Guidance and Negative Prompting for Coherent and Diverse Synthetic Data Generation

    Authors: Charles O'Neill, Yuan-Sen Ting, Ioana Ciuca, Jack Miller, Thang Bui

    Abstract: Large Language Models (LLMs) hold immense potential to generate synthetic data of high quality and utility, which has numerous applications from downstream model training to practical data utilisation. However, contemporary models, despite their impressive capacities, consistently struggle to produce both coherent and diverse data. To address the coherency issue, we introduce contrastive expert gu… ▽ More

    Submitted 17 August, 2023; v1 submitted 15 August, 2023; originally announced August 2023.

  25. arXiv:2308.06378  [pdf, other

    cs.AI cs.CV cs.LG

    DCNFIS: Deep Convolutional Neuro-Fuzzy Inference System

    Authors: Mojtaba Yeganejou, Kimia Honari, Ryan Kluzinski, Scott Dick, Michael Lipsett, James Miller

    Abstract: A key challenge in eXplainable Artificial Intelligence is the well-known tradeoff between the transparency of an algorithm (i.e., how easily a human can directly understand the algorithm, as opposed to receiving a post-hoc explanation), and its accuracy. We report on the design of a new deep network that achieves improved transparency without sacrificing accuracy. We design a deep convolutional ne… ▽ More

    Submitted 17 March, 2024; v1 submitted 11 August, 2023; originally announced August 2023.

  26. arXiv:2308.04617  [pdf, other

    cs.LG cs.CR

    Improved Activation Clip** for Universal Backdoor Mitigation and Test-Time Detection

    Authors: Hang Wang, Zhen Xiang, David J. Miller, George Kesidis

    Abstract: Deep neural networks are vulnerable to backdoor attacks (Trojans), where an attacker poisons the training set with backdoor triggers so that the neural network learns to classify test-time triggers to the attacker's designated target class. Recent work shows that backdoor poisoning induces over-fitting (abnormally large activations) in the attacked model, which motivates a general, post-training c… ▽ More

    Submitted 8 August, 2023; originally announced August 2023.

  27. arXiv:2308.03890  [pdf, other

    cs.HC

    On the Perception of Small Sub-graphs

    Authors: Jacob Miller, Mohammad Ghoniem, Hsiang-Yun Wu, Helen C. Purchase

    Abstract: Interpreting a node-link graph is enhanced if similar subgraphs (or motifs) are depicted in a similar manner; that is, they have the same visual form. Small motifs within graphs may be perceived to be identical when they are structurally dissimilar, or may be perceived to be dissimilar when they are identical. This issue primarily relates to the Gestalt principle of similarity, but may also includ… ▽ More

    Submitted 9 August, 2023; v1 submitted 7 August, 2023; originally announced August 2023.

    Comments: Appears in the Proceedings of the 31st International Symposium on Graph Drawing and Network Visualization (GD 2023)

  28. arXiv:2308.03883  [pdf, other

    cs.DB cs.CL cs.LG

    Generative Benchmark Creation for Table Union Search

    Authors: Koyena Pal, Aamod Khatiwada, Roee Shraga, Renée J. Miller

    Abstract: Data management has traditionally relied on synthetic data generators to generate structured benchmarks, like the TPC suite, where we can control important parameters like data size and its distribution precisely. These benchmarks were central to the success and adoption of database management systems. But more and more, data management problems are of a semantic nature. An important example is fi… ▽ More

    Submitted 7 August, 2023; originally announced August 2023.

  29. arXiv:2307.12158  [pdf, other

    cs.LG cs.AI cs.HC

    DIP-RL: Demonstration-Inferred Preference Learning in Minecraft

    Authors: Ellen Novoseller, Vinicius G. Goecks, David Watkins, Josh Miller, Nicholas Waytowich

    Abstract: In machine learning for sequential decision-making, an algorithmic agent learns to interact with an environment while receiving feedback in the form of a reward signal. However, in many unstructured real-world settings, such a reward signal is unknown and humans cannot reliably craft a reward signal that correctly captures desired behavior. To solve tasks in such unstructured and open-ended enviro… ▽ More

    Submitted 22 July, 2023; originally announced July 2023.

    Comments: Paper accepted at The Many Facets of Preference Learning Workshop at the International Conference on Machine Learning (ICML), Honolulu, Hawaii, USA, 2023

    ACM Class: I.2.6; G.3

  30. arXiv:2307.06871  [pdf, other

    cs.LG cs.CY

    Identifying Early Help Referrals For Local Authorities With Machine Learning And Bias Analysis

    Authors: Eufrásio de A. Lima Neto, Jonathan Bailiss, Axel Finke, Jo Miller, Georgina Cosma

    Abstract: Local authorities in England, such as Leicestershire County Council (LCC), provide Early Help services that can be offered at any point in a young person's life when they experience difficulties that cannot be supported by universal services alone, such as schools. This paper investigates the utilisation of machine learning (ML) to assist experts in identifying families that may need to be referre… ▽ More

    Submitted 13 July, 2023; originally announced July 2023.

  31. DIALITE: Discover, Align and Integrate Open Data Tables

    Authors: Aamod Khatiwada, Roee Shraga, Renée J. Miller

    Abstract: We demonstrate a novel table discovery pipeline called DIALITE that allows users to discover, integrate and analyze open data tables. DIALITE has three main stages. First, it allows users to discover tables from open data platforms using state-of-the-art table discovery techniques. Second, DIALITE integrates the discovered tables to produce an integrated table. Finally, it allows users to analyze… ▽ More

    Submitted 17 April, 2023; originally announced April 2023.

    Comments: SIGMOD 2023

  32. arXiv:2304.05345  [pdf, other

    cs.CV

    FIR-based Future Trajectory Prediction in Nighttime Autonomous Driving

    Authors: Alireza Rahimpour, Navid Fallahinia, Devesh Upadhyay, Justin Miller

    Abstract: The performance of the current collision avoidance systems in Autonomous Vehicles (AV) and Advanced Driver Assistance Systems (ADAS) can be drastically affected by low light and adverse weather conditions. Collisions with large animals such as deer in low light cause significant cost and damage every year. In this paper, we propose the first AI-based method for future trajectory prediction of larg… ▽ More

    Submitted 31 March, 2023; originally announced April 2023.

    Comments: Conference: IEEE Intelligent Vehicles 2023 (IEEE IV 2023)

  33. arXiv:2303.13512  [pdf, other

    cs.AI

    Towards Solving Fuzzy Tasks with Human Feedback: A Retrospective of the MineRL BASALT 2022 Competition

    Authors: Stephanie Milani, Anssi Kanervisto, Karolis Ramanauskas, Sander Schulhoff, Brandon Houghton, Sharada Mohanty, Byron Galbraith, Ke Chen, Yan Song, Tianze Zhou, Bingquan Yu, He Liu, Kai Guan, Yu**g Hu, Tangjie Lv, Federico Malato, Florian Leopold, Amogh Raut, Ville Hautamäki, Andrew Melnik, Shu Ishida, João F. Henriques, Robert Klassert, Walter Laurito, Ellen Novoseller , et al. (5 additional authors not shown)

    Abstract: To facilitate research in the direction of fine-tuning foundation models from human feedback, we held the MineRL BASALT Competition on Fine-Tuning from Human Feedback at NeurIPS 2022. The BASALT challenge asks teams to compete to develop algorithms to solve tasks with hard-to-specify reward functions in Minecraft. Through this competition, we aimed to promote the development of algorithms that use… ▽ More

    Submitted 23 March, 2023; originally announced March 2023.

  34. arXiv:2302.00189  [pdf, other

    cs.CL

    Detecting Lexical Borrowings from Dominant Languages in Multilingual Wordlists

    Authors: John E. Miller, Johann-Mattis List

    Abstract: Language contact is a pervasive phenomenon reflected in the borrowing of words from donor to recipient languages. Most computational approaches to borrowing detection treat all languages under study as equally important, even though dominant languages have a stronger impact on heritage languages than vice versa. We test new methods for lexical borrowing detection in contact situations where domina… ▽ More

    Submitted 21 February, 2023; v1 submitted 31 January, 2023; originally announced February 2023.

    Comments: To appear at The 17th Conference of the European Chapter of the Association for Computational Linguistics. See https://www.aclweb.org/portal/content/17th-conference-european-chapter-association-computational-linguistics

  35. arXiv:2301.13095  [pdf, other

    cs.DB

    Explaining Dataset Changes for Semantic Data Versioning with Explain-Da-V (Technical Report)

    Authors: Roee Shraga, Renée J. Miller

    Abstract: In multi-user environments in which data science and analysis is collaborative, multiple versions of the same datasets are generated. While managing and storing data versions has received some attention in the research literature, the semantic nature of such changes has remained under-explored. In this work, we introduce \texttt{Explain-Da-V}, a framework aiming to explain changes between two give… ▽ More

    Submitted 30 January, 2023; originally announced January 2023.

    Comments: To appear in VLDB 2023

  36. The Role of Heuristics and Biases During Complex Choices with an AI Teammate

    Authors: Nikolos Gurney, John H. Miller, David V. Pynadath

    Abstract: Behavioral scientists have classically documented aversion to algorithmic decision aids, from simple linear models to AI. Sentiment, however, is changing and possibly accelerating AI helper usage. AI assistance is, arguably, most valuable when humans must make complex choices. We argue that classic experimental methods used to study heuristics and biases are insufficient for studying complex choic… ▽ More

    Submitted 14 January, 2023; originally announced January 2023.

    Comments: AAAI 2023

  37. arXiv:2212.12086  [pdf, other

    cs.LG math.DS

    Eigenvalue initialisation and regularisation for Koopman autoencoders

    Authors: Jack W. Miller, Charles O'Neill, Navid C. Constantinou, Omri Azencot

    Abstract: Regularising the parameter matrices of neural networks is ubiquitous in training deep models. Typical regularisation approaches suggest initialising weights using small random values, and to penalise weights to promote sparsity. However, these widely used techniques may be less effective in certain scenarios. Here, we study the Koopman autoencoder model which includes an encoder, a Koopman operato… ▽ More

    Submitted 25 December, 2022; v1 submitted 22 December, 2022; originally announced December 2022.

    Comments: 18 pages

  38. arXiv:2212.07495  [pdf, other

    cs.CV

    SAIF: Sparse Adversarial and Imperceptible Attack Framework

    Authors: Tooba Imtiaz, Morgan Kohler, Jared Miller, Zifeng Wang, Mario Sznaier, Octavia Camps, Jennifer Dy

    Abstract: Adversarial attacks hamper the decision-making ability of neural networks by perturbing the input signal. The addition of calculated small distortion to images, for instance, can deceive a well-trained image classification network. In this work, we propose a novel attack technique called Sparse Adversarial and Interpretable Attack Framework (SAIF). Specifically, we design imperceptible attacks tha… ▽ More

    Submitted 6 December, 2023; v1 submitted 14 December, 2022; originally announced December 2022.

  39. arXiv:2211.00241  [pdf, other

    cs.LG cs.AI cs.CR stat.ML

    Adversarial Policies Beat Superhuman Go AIs

    Authors: Tony T. Wang, Adam Gleave, Tom Tseng, Kellin Pelrine, Nora Belrose, Joseph Miller, Michael D. Dennis, Yawen Duan, Viktor Pogrebniak, Sergey Levine, Stuart Russell

    Abstract: We attack the state-of-the-art Go-playing AI system KataGo by training adversarial policies against it, achieving a >97% win rate against KataGo running at superhuman settings. Our adversaries do not win by playing Go well. Instead, they trick KataGo into making serious blunders. Our attack transfers zero-shot to other superhuman Go-playing AIs, and is comprehensible to the extent that human exper… ▽ More

    Submitted 13 July, 2023; v1 submitted 31 October, 2022; originally announced November 2022.

    Comments: Accepted to ICML 2023, see paper for changelog

    ACM Class: I.2.6

  40. arXiv:2210.10272  [pdf, other

    cs.LG cs.CR cs.CV

    Training set cleansing of backdoor poisoning by self-supervised representation learning

    Authors: H. Wang, S. Karami, O. Dia, H. Ritter, E. Emamjomeh-Zadeh, J. Chen, Z. Xiang, D. J. Miller, G. Kesidis

    Abstract: A backdoor or Trojan attack is an important type of data poisoning attack against deep neural network (DNN) classifiers, wherein the training dataset is poisoned with a small number of samples that each possess the backdoor pattern (usually a pattern that is either imperceptible or innocuous) and which are mislabeled to the attacker's target class. When trained on a backdoor-poisoned dataset, a DN… ▽ More

    Submitted 14 March, 2023; v1 submitted 18 October, 2022; originally announced October 2022.

  41. arXiv:2209.13589  [pdf, other

    cs.DB

    SANTOS: Relationship-based Semantic Table Union Search

    Authors: Aamod Khatiwada, Grace Fan, Roee Shraga, Zixuan Chen, Wolfgang Gatterbauer, Renée J. Miller, Mirek Riedewald

    Abstract: Existing techniques for unionable table search define unionability using metadata (tables must have the same or similar schemas) or column-based metrics (for example, the values in a table should be drawn from the same domain). In this work, we introduce the use of semantic relationships between pairs of columns in a table to improve the accuracy of union search. Consequently, we introduce a new n… ▽ More

    Submitted 27 September, 2022; originally announced September 2022.

    Comments: 15 pages, 10 figures, to appear at SIGMOD 2023

  42. arXiv:2209.00191  [pdf, other

    cs.CG

    Spherical Graph Drawing by Multi-dimensional Scaling

    Authors: Jacob Miller, Vahan Huroyan, Stephen Kobourov

    Abstract: We describe an efficient and scalable spherical graph embedding method. The method uses a generalization of the Euclidean stress function for Multi-Dimensional Scaling adapted to spherical space, where geodesic pairwise distances are employed instead of Euclidean distances. The resulting spherical stress function is optimized by means of stochastic gradient descent. Quantitative and qualitative ev… ▽ More

    Submitted 31 August, 2022; originally announced September 2022.

    Comments: Appears in the Proceedings of the 30th International Symposium on Graph Drawing and Network Visualization (GD 2022)

  43. arXiv:2208.13284  [pdf, other

    cs.CG math.CO math.MG

    Distinct Angles and Angle Chains in Three Dimensions

    Authors: Ruben Ascoli, Livia Betti, Jacob Lehmann Duke, Xuyan Liu, Wyatt Milgrim, Steven J. Miller, Eyvindur A. Palsson, Francisco Romero Acosta, Santiago Velazquez Iannuzzelli

    Abstract: In 1946, Erdős posed the distinct distance problem, which seeks to find the minimum number of distinct distances between pairs of points selected from any configuration of $n$ points in the plane. The problem has since been explored along with many variants, including ones that extend it into higher dimensions. Less studied but no less intriguing is Erdős' distinct angle problem, which seeks to fi… ▽ More

    Submitted 19 February, 2023; v1 submitted 28 August, 2022; originally announced August 2022.

    Comments: 16 pages, 7 figures

    Journal ref: Discrete Mathematics & Theoretical Computer Science, vol. 25:1, Combinatorics (February 27, 2023) dmtcs:10037

  44. arXiv:2207.14624  [pdf, other

    cs.DM cs.CV

    Post-processing of coronary and myocardial spatial data

    Authors: Jay Aodh Mackenzie, Megan Jeanne Miller, Nicholas Hill, Mette Olufsen

    Abstract: Numerical simulations of real-world phenomenon are implemented with at least two parts: the computational scheme and the computational domain. In the context of hemodynamics, the computational domain of a simulation represents the blood vessel network through which blood flows. Such blood vessel networks can contain millions of individual vessels that are joined together to form a in series and pa… ▽ More

    Submitted 15 April, 2024; v1 submitted 29 July, 2022; originally announced July 2022.

    Comments: 21 pages, 22 figures

  45. arXiv:2207.11767  [pdf, other

    cs.SE

    Snapshot Metrics Are Not Enough: Analyzing Software Repositories with Longitudinal Metrics

    Authors: Nicholas Synovic, Matt Hyatt, Rohan Sethi, Sohini Thota, Shilpika, Allan J. Miller, Wenxin Jiang, Emmanuel S. Amobi, Austin Pinderski, Konstantin Läufer, Nicholas J. Hayward, Neil Klingensmith, James C. Davis, George K. Thiruvathukal

    Abstract: Software metrics capture information about software development processes and products. These metrics support decision-making, e.g., in team management or dependency selection. However, existing metrics tools measure only a snapshot of a software project. Little attention has been given to enabling engineers to reason about metric trends over time -- longitudinal metrics that give insight about pr… ▽ More

    Submitted 24 July, 2022; originally announced July 2022.

    Comments: Accepted at ASE 2022 Tool Demonstrations

  46. arXiv:2206.13776  [pdf, other

    cs.DC

    A Scalable Blockchain-based Smart Contract Model for Decentralized Voltage Stability Using Sharding Technique

    Authors: Kimia Honari, Xiaotian Zhou, Sara Rouhani, Scott Dick, Hao Liang, James Miller Li, James Miller

    Abstract: Blockchain technologies are one possible avenue for increasing the resilience of the Smart Grid, by decentralizing the monitoring and control of system-level objectives such as voltage stability protection. They furthermore offer benefits in data immutability and traceability, as blockchains are cryptographically secured. However, the performance of blockchain-based systems in real-time grid monit… ▽ More

    Submitted 28 June, 2022; originally announced June 2022.

    Comments: 8 pages

  47. Adversarial Scrutiny of Evidentiary Statistical Software

    Authors: Rediet Abebe, Moritz Hardt, Angela **, John Miller, Ludwig Schmidt, Rebecca Wexler

    Abstract: The U.S. criminal legal system increasingly relies on software output to convict and incarcerate people. In a large number of cases each year, the government makes these consequential decisions based on evidence from statistical software -- such as probabilistic genoty**, environmental audio detection, and toolmark analysis tools -- that defense counsel cannot fully cross-examine or scrutinize.… ▽ More

    Submitted 30 September, 2022; v1 submitted 18 June, 2022; originally announced June 2022.

    Comments: Typos corrected, appendix B removed

    ACM Class: K.4.1; I.2.1; G.3; D.2.5

  48. arXiv:2206.08957  [pdf, other

    physics.comp-ph cs.PF math.NA

    Not-Quite Transcendental Functions and their Applications

    Authors: Jonah M. Miller, Joshua C. Dolence, Daniel Holladay

    Abstract: Transcendental functions, such as exponentials and logarithms, appear in a broad array of computational domains: from simulations in curvilinear coordinates, to interpolation, to machine learning. Unfortunately they are typically expensive to compute accurately. In this note, we argue that in many cases, the properties of the function matters more than the exact functional form. We present new fun… ▽ More

    Submitted 17 June, 2022; originally announced June 2022.

    Comments: Submitted as a short note to the journal of computational physics

    Report number: LA-UR-22-25573

  49. arXiv:2206.04615  [pdf, other

    cs.CL cs.AI cs.CY cs.LG stat.ML

    Beyond the Imitation Game: Quantifying and extrapolating the capabilities of language models

    Authors: Aarohi Srivastava, Abhinav Rastogi, Abhishek Rao, Abu Awal Md Shoeb, Abubakar Abid, Adam Fisch, Adam R. Brown, Adam Santoro, Aditya Gupta, Adrià Garriga-Alonso, Agnieszka Kluska, Aitor Lewkowycz, Akshat Agarwal, Alethea Power, Alex Ray, Alex Warstadt, Alexander W. Kocurek, Ali Safaya, Ali Tazarv, Alice Xiang, Alicia Parrish, Allen Nie, Aman Hussain, Amanda Askell, Amanda Dsouza , et al. (426 additional authors not shown)

    Abstract: Language models demonstrate both quantitative improvement and new qualitative capabilities with increasing scale. Despite their potentially transformative impact, these new capabilities are as yet poorly characterized. In order to inform future research, prepare for disruptive new model capabilities, and ameliorate socially harmful effects, it is vital that we understand the present and near-futur… ▽ More

    Submitted 12 June, 2023; v1 submitted 9 June, 2022; originally announced June 2022.

    Comments: 27 pages, 17 figures + references and appendices, repo: https://github.com/google/BIG-bench

    Journal ref: Transactions on Machine Learning Research, May/2022, https://openreview.net/forum?id=uyTL5Bvosj

  50. arXiv:2206.04367  [pdf, ps, other

    cs.CG math.CO math.MG

    Distinct Angles in General Position

    Authors: Henry L. Fleischmann, Sergei V. Konyagin, Steven J. Miller, Eyvindur A. Palsson, Ethan Pesikoff, Charles Wolf

    Abstract: The Erdős distinct distance problem is a ubiquitous problem in discrete geometry. Somewhat less well known is Erdős' distinct angle problem, the problem of finding the minimum number of distinct angles between $n$ non-collinear points in the plane. Recent work has introduced bounds on a wide array of variants of this problem, inspired by similar variants in the distance setting. In this short no… ▽ More

    Submitted 13 June, 2022; v1 submitted 9 June, 2022; originally announced June 2022.

    Comments: Former Corollary 4.1 upgraded to Theorem 1.2 with improved bounds

    MSC Class: 52C10