Skip to main content

Showing 1–50 of 285 results for author: Mueller, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.01264  [pdf, other

    cs.CL

    SignCLIP: Connecting Text and Sign Language by Contrastive Learning

    Authors: Zifan Jiang, Gerard Sant, Amit Moryossef, Mathias Müller, Rico Sennrich, Sarah Ebling

    Abstract: We present SignCLIP, which re-purposes CLIP (Contrastive Language-Image Pretraining) to project spoken language text and sign language videos, two classes of natural languages of distinct modalities, into the same space. SignCLIP is an efficient method of learning useful visual representations for sign language processing from large-scale, multilingual video-text pairs, without directly optimizing… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

  2. arXiv:2406.16629  [pdf

    cs.IR stat.AP

    Meta-experiments: Improving experimentation through experimentation

    Authors: Melanie J. I. Müller

    Abstract: A/B testing is widexly used in the industry to optimize customer facing websites. Many companies employ experimentation specialists to facilitate and improve the process of A/B testing. Here, we present the application of A/B testing to this improvement effort itself, by running experiments on the experimentation process, which we call 'meta-experiments'. We discuss the challenges of this approach… ▽ More

    Submitted 24 June, 2024; originally announced June 2024.

    Comments: 6 pages, 2 figures, 1 table

  3. arXiv:2406.14719  [pdf, other

    cs.PL

    Grokking the Sequent Calculus (Functional Pearl)

    Authors: David Binder, Marco Tzschentke, Marius Müller, Klaus Ostermann

    Abstract: The sequent calculus is a proof system which was designed as a more symmetric alternative to natural deduction. The λμμ-calculus is a term assignment system for the sequent calculus and a great foundation for compiler intermediate languages due to its first-class representation of evaluation contexts. Unfortunately, only experts of the sequent calculus can appreciate its beauty. To remedy this, we… ▽ More

    Submitted 20 June, 2024; originally announced June 2024.

    Comments: Preprint of the paper accepted at ICFP '24

  4. arXiv:2406.13433  [pdf, other

    cs.LG cs.AI

    Certificates of Differential Privacy and Unlearning for Gradient-Based Training

    Authors: Matthew Wicker, Philip Sosnin, Adrianna Janik, Mark N. Müller, Adrian Weller, Calvin Tsay

    Abstract: Proper data stewardship requires that model owners protect the privacy of individuals' data used during training. Whether through anonymization with differential privacy or the use of unlearning in non-anonymized settings, the gold-standard techniques for providing privacy guarantees can come with significant performance penalties or be too weak to provide practical assurances. In part, this is du… ▽ More

    Submitted 19 June, 2024; originally announced June 2024.

    Comments: 15 pages, 14 figures

  5. arXiv:2406.13256  [pdf, other

    cs.RO

    Winning Through Simplicity: Autonomous Car Design for Formula Student

    Authors: Tobias Friedrich, Marco Müller, Adrian Bauske, Simon Härtl, Johannes Herrmann, David Förster, Tobias Tietze, Sebastian Sartor

    Abstract: This paper presents the design of an autonomous race car that is self-designed, self-developed, and self-built by the Elefant Racing team at the University of Bayreuth. The system is created to compete in the Formula Student Driverless competition. Its primary focus is on the Acceleration track, a straight 75-meter-long course, and the Skidpad track, which comprises two circles forming an eight. A… ▽ More

    Submitted 19 June, 2024; originally announced June 2024.

  6. arXiv:2406.12952  [pdf, other

    cs.SE cs.AI cs.LG

    Code Agents are State of the Art Software Testers

    Authors: Niels Mündler, Mark Niklas Müller, **gxuan He, Martin Vechev

    Abstract: Rigorous software testing is crucial for develo** and maintaining high-quality code, making automated test generation a promising avenue for both improving software quality and boosting the effectiveness of code generation methods. However, while code generation with Large Language Models (LLMs) is an extraordinarily active research area, test generation remains relatively unexplored. We address… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

    Comments: 20 pages, 14 figures, 7 tables

  7. arXiv:2406.11946  [pdf, ps, other

    cs.HC

    Expedient Assistance and Consequential Misunderstanding: Envisioning an Operationalized Mutual Theory of Mind

    Authors: Justin D. Weisz, Michael Muller, Arielle Goldberg, Dario Andres Silva Moran

    Abstract: Design fictions allow us to prototype the future. They enable us to interrogate emerging or non-existent technologies and examine their implications. We present three design fictions that probe the potential consequences of operationalizing a mutual theory of mind (MToM) between human users and one (or more) AI agents. We use these fictions to explore many aspects of MToM, including how models of… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

    Comments: 11 pages. Published in Proceedings of Workshop on Theory of Mind in Human-AI Interaction at CHI 2024

  8. arXiv:2406.05670  [pdf, other

    cs.LG cs.CR cs.CV

    Certified Robustness to Data Poisoning in Gradient-Based Training

    Authors: Philip Sosnin, Mark N. Müller, Maximilian Baader, Calvin Tsay, Matthew Wicker

    Abstract: Modern machine learning pipelines leverage large amounts of public data, making it infeasible to guarantee data quality and leaving models open to poisoning and backdoor attacks. However, provably bounding model behavior under such attacks remains an open problem. In this work, we address this challenge and develop the first framework providing provable guarantees on the behavior of models trained… ▽ More

    Submitted 9 June, 2024; originally announced June 2024.

    Comments: 15 pages, 5 figures

  9. arXiv:2406.05313  [pdf, other

    cs.RO

    Traversing Mars: Cooperative Informative Path Planning to Efficiently Navigate Unknown Scenes

    Authors: Friedrich M. Rockenbauer, Jaeyoung Lim, Marcus G. Müller, Roland Siegwart, Lukas Schmid

    Abstract: The ability to traverse an unknown environment is crucial for autonomous robot operations. However, due to the limited sensing capabilities and system constraints, approaching this problem with a single robot agent can be slow, costly, and unsafe. For example, in planetary exploration missions, the wear on the wheels of a rover from abrasive terrain should be minimized at all costs as reparations… ▽ More

    Submitted 12 June, 2024; v1 submitted 7 June, 2024; originally announced June 2024.

    Comments: 8 pages, 9 figures, code will be available at https://github.com/ethz-asl/scouting-ipp

  10. arXiv:2406.03512  [pdf, other

    cs.SD cs.AI eess.AS

    Harder or Different? Understanding Generalization of Audio Deepfake Detection

    Authors: Nicolas M. Müller, Nicholas Evans, Hemlata Tak, Philip Sperl, Konstantin Böttinger

    Abstract: Recent research has highlighted a key issue in speech deepfake detection: models trained on one set of deepfakes perform poorly on others. The question arises: is this due to the continuously improving quality of Text-to-Speech (TTS) models, i.e., are newer DeepFakes just 'harder' to detect? Or, is it because deepfakes generated with one model are fundamentally different to those generated using a… ▽ More

    Submitted 12 June, 2024; v1 submitted 5 June, 2024; originally announced June 2024.

    Journal ref: Interspeech 2024

  11. arXiv:2406.01843  [pdf, other

    cs.CV

    L-MAGIC: Language Model Assisted Generation of Images with Coherence

    Authors: Zhipeng Cai, Matthias Mueller, Reiner Birkl, Diana Wofk, Shao-Yen Tseng, JunDa Cheng, Gabriela Ben-Melech Stan, Vasudev Lal, Michael Paulitsch

    Abstract: In the current era of generative AI breakthroughs, generating panoramic scenes from a single input image remains a key challenge. Most existing methods use diffusion-based iterative or simultaneous multi-view inpainting. However, the lack of global scene layout priors leads to subpar outputs with duplicated objects (e.g., multiple beds in a bedroom) or requires time-consuming human text inputs for… ▽ More

    Submitted 3 June, 2024; originally announced June 2024.

    Comments: accepted to CVPR 2024

  12. arXiv:2405.17447  [pdf, other

    cs.CV cs.LG

    How to train your ViT for OOD Detection

    Authors: Maximilian Mueller, Matthias Hein

    Abstract: VisionTransformers have been shown to be powerful out-of-distribution detectors for ImageNet-scale settings when finetuned from publicly available checkpoints, often outperforming other model types on popular benchmarks. In this work, we investigate the impact of both the pretraining and finetuning scheme on the performance of ViTs on this task by analyzing a large pool of models. We find that the… ▽ More

    Submitted 21 May, 2024; originally announced May 2024.

    Comments: arXiv admin note: text overlap with arXiv:2306.00826

  13. arXiv:2405.16281  [pdf, other

    cs.CL

    ConStat: Performance-Based Contamination Detection in Large Language Models

    Authors: Jasper Dekoninck, Mark Niklas Müller, Martin Vechev

    Abstract: Public benchmarks play an essential role in the evaluation of large language models. However, data contamination can lead to inflated performance, rendering them unreliable for model comparison. It is therefore crucial to detect contamination and estimate its impact on measured performance. Unfortunately, existing detection methods can be easily evaded and fail to quantify contamination. To overco… ▽ More

    Submitted 25 May, 2024; originally announced May 2024.

  14. arXiv:2405.15586  [pdf, other

    cs.LG cs.DC

    DAGER: Exact Gradient Inversion for Large Language Models

    Authors: Ivo Petrov, Dimitar I. Dimitrov, Maximilian Baader, Mark Niklas Müller, Martin Vechev

    Abstract: Federated learning works by aggregating locally computed gradients from multiple clients, thus enabling collaborative training without sharing private client data. However, prior work has shown that the data can actually be recovered by the server using so-called gradient inversion attacks. While these attacks perform well when applied on images, they are limited in the text domain and only permit… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

    ACM Class: I.2.7; I.2.11

  15. arXiv:2405.12010  [pdf, other

    cs.NI

    DarkDNS: Revisiting the Value of Rapid Zone Update

    Authors: Raffaele Sommese, Gautam Akiwate, Antonia Affinito, Moritz Muller, Mattijs Jonker, KC Claffy

    Abstract: Malicious actors exploit the DNS namespace to launch spam campaigns, phishing attacks, malware, and other harmful activities. Combating these threats requires visibility into domain existence, ownership and nameservice activity that the DNS protocol does not itself provide. To facilitate visibility and security-related study of the expanding gTLD namespace, ICANN introduced the Centralized Zone Da… ▽ More

    Submitted 20 May, 2024; originally announced May 2024.

  16. arXiv:2405.07515  [pdf, other

    cs.RO cs.AI cs.LG

    OpenBot-Fleet: A System for Collective Learning with Real Robots

    Authors: Matthias Müller, Samarth Brahmbhatt, Ankur Deka, Quentin Leboutet, David Hafner, Vladlen Koltun

    Abstract: We introduce OpenBot-Fleet, a comprehensive open-source cloud robotics system for navigation. OpenBot-Fleet uses smartphones for sensing, local compute and communication, Google Firebase for secure cloud storage and off-board compute, and a robust yet low-cost wheeled robot toact in real-world environments. The robots collect task data and upload it to the cloud where navigation policies can be le… ▽ More

    Submitted 13 May, 2024; originally announced May 2024.

    Comments: Accepted at ICRA'24

  17. arXiv:2405.05594  [pdf, other

    cs.AI

    Expected Work Search: Combining Win Rate and Proof Size Estimation

    Authors: Owen Randall, Martin Müller, Ting Han Wei, Ryan Hayward

    Abstract: We propose Expected Work Search (EWS), a new game solving algorithm. EWS combines win rate estimation, as used in Monte Carlo Tree Search, with proof size estimation, as used in Proof Number Search. The search efficiency of EWS stems from minimizing a novel notion of Expected Work, which predicts the expected computation required to solve a position. EWS outperforms traditional solving algorithms… ▽ More

    Submitted 9 May, 2024; originally announced May 2024.

  18. arXiv:2405.04443  [pdf, other

    cs.AI

    POV Learning: Individual Alignment of Multimodal Models using Human Perception

    Authors: Simon Werner, Katharina Christ, Laura Bernardy, Marion G. Müller, Achim Rettinger

    Abstract: Aligning machine learning systems with human expectations is mostly attempted by training with manually vetted human behavioral samples, typically explicit feedback. This is done on a population level since the context that is capturing the subjective Point-Of-View (POV) of a concrete person in a specific situational context is not retained in the data. However, we argue that alignment on an indiv… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

  19. arXiv:2405.00837  [pdf, other

    cs.LG eess.SP math.OC stat.ML

    Locality Regularized Reconstruction: Structured Sparsity and Delaunay Triangulations

    Authors: Marshall Mueller, James M. Murphy, Abiy Tasissa

    Abstract: Linear representation learning is widely studied due to its conceptual simplicity and empirical utility in tasks such as compression, classification, and feature extraction. Given a set of points $[\mathbf{x}_1, \mathbf{x}_2, \ldots, \mathbf{x}_n] = \mathbf{X} \in \mathbb{R}^{d \times n}$ and a vector $\mathbf{y} \in \mathbb{R}^d$, the goal is to find coefficients $\mathbf{w} \in \mathbb{R}^n$ so… ▽ More

    Submitted 1 May, 2024; originally announced May 2024.

    Comments: 26 pages, 8 figures

  20. arXiv:2404.16051  [pdf, other

    cs.HC cs.CY

    TimeFlows: Visualizing Process Chronologies from Vast Collections of Heterogeneous Information Objects

    Authors: Max Lonysa Muller, Erik Saaman, Jan Martijn E. M. van der Werf, Charles Jeurgens, Hajo A. Reijers

    Abstract: In many fact-finding investigations, notably parliamentary inquiries, process chronologies are created to reconstruct how a controversial policy or decision came into existence. Current approaches, like timelines, lack the expressiveness to represent the variety of relations in which historic events may link to the overall chronology. This obfuscates the nature of the interdependence among the eve… ▽ More

    Submitted 2 May, 2024; v1 submitted 10 April, 2024; originally announced April 2024.

    Comments: 16 pages, accepted at RCIS 2024

  21. arXiv:2404.07765  [pdf, other

    cs.CL cs.AI cs.CR cs.LG

    AnnoCTR: A Dataset for Detecting and Linking Entities, Tactics, and Techniques in Cyber Threat Reports

    Authors: Lukas Lange, Marc Müller, Ghazaleh Haratinezhad Torbati, Dragan Milchevski, Patrick Grau, Subhash Pujari, Annemarie Friedrich

    Abstract: Monitoring the threat landscape to be aware of actual or potential attacks is of utmost importance to cybersecurity professionals. Information about cyber threats is typically distributed using natural language reports. Natural language processing can help with managing this large amount of unstructured information, yet to date, the topic has received little attention. With this paper, we present… ▽ More

    Submitted 11 April, 2024; originally announced April 2024.

    Comments: Accepted at LREC-COLING 2024. Corpus available at https://github.com/boschresearch/anno-ctr-lrec-coling-2024

  22. arXiv:2404.00387  [pdf, other

    cs.MS cs.AR

    Inexactness and Correction of Floating-Point Reciprocal, Division and Square Root

    Authors: Lucas M. Dutton, Christopher Kumar Anand, Robert Enenkel, Silvia Melitta Müller

    Abstract: Floating-point arithmetic performance determines the overall performance of important applications, from graphics to AI. Meeting the IEEE-754 specification for floating-point requires that final results of addition, subtraction, multiplication, division, and square root are correctly rounded based on the user-selected rounding mode. A frustrating fact for implementers is that naive rounding method… ▽ More

    Submitted 30 March, 2024; originally announced April 2024.

  23. arXiv:2403.19319  [pdf, other

    cs.CV

    Mesh2NeRF: Direct Mesh Supervision for Neural Radiance Field Representation and Generation

    Authors: Yu** Chen, Yinyu Nie, Benjamin Ummenhofer, Reiner Birkl, Michael Paulitsch, Matthias Müller, Matthias Nießner

    Abstract: We present Mesh2NeRF, an approach to derive ground-truth radiance fields from textured meshes for 3D generation tasks. Many 3D generative approaches represent 3D scenes as radiance fields for training. Their ground-truth radiance fields are usually fitted from multi-view renderings from a large-scale synthetic 3D dataset, which often results in artifacts due to occlusions or under-fitting issues.… ▽ More

    Submitted 28 March, 2024; originally announced March 2024.

    Comments: Project page: https://terencecyj.github.io/projects/Mesh2NeRF/ Video: https://youtu.be/oufv1N3f7iY

  24. arXiv:2403.09986  [pdf, other

    cs.CY cs.HC cs.SI

    Designing Sousveillance Tools for Gig Workers

    Authors: Maya De Los Santos, Kimberly Do, Michael Muller, Saiph Savage

    Abstract: As independently-contracted employees, gig workers disproportionately suffer the consequences of workplace surveillance, which include increased pressures to work, breaches of privacy, and decreased digital autonomy. Despite the negative impacts of workplace surveillance, gig workers lack the tools, strategies, and workplace social support to protect themselves against these harms. Meanwhile, some… ▽ More

    Submitted 23 March, 2024; v1 submitted 14 March, 2024; originally announced March 2024.

    Comments: Published as a conference paper at the ACM Conference on Human Factors in Computing Systems, CHI 2024, 3 figures, 30 pages

  25. arXiv:2403.07095  [pdf, other

    cs.LG

    Overcoming the Paradox of Certified Training with Gaussian Smoothing

    Authors: Stefan Balauca, Mark Niklas Müller, Yuhao Mao, Maximilian Baader, Marc Fischer, Martin Vechev

    Abstract: Training neural networks with high certified accuracy against adversarial examples remains an open problem despite significant efforts. While certification methods can effectively leverage tight convex relaxations for bound computation, in training, these methods perform worse than looser relaxations. Prior work hypothesized that this is caused by the discontinuity and perturbation sensitivity of… ▽ More

    Submitted 25 June, 2024; v1 submitted 11 March, 2024; originally announced March 2024.

  26. arXiv:2403.05638  [pdf, other

    cs.NI cs.CR cs.CY

    Internet Sanctions on Russian Media: Actions and Effects

    Authors: John Kristoff, Moritz Müller, Arturo Filastò, Max Resing, Chris Kanich, Niels ten Oever

    Abstract: As a response to the Russian aggression against Ukraine, the European Union (EU), through the notion of "digital sovereignty", imposed sanctions on organizations and individuals affiliated with the Russian Federation that prohibit broadcasting content, including online distribution. In this paper, we interrogate the implementation of these sanctions and interpret them as a means to translate the u… ▽ More

    Submitted 8 March, 2024; originally announced March 2024.

    Comments: Accepted to Free and Open Communications on the Internet (FOCI) 2024

  27. arXiv:2403.03945  [pdf, other

    cs.LG cs.CR cs.DC

    SPEAR:Exact Gradient Inversion of Batches in Federated Learning

    Authors: Dimitar I. Dimitrov, Maximilian Baader, Mark Niklas Müller, Martin Vechev

    Abstract: Federated learning is a framework for collaborative machine learning where clients only share gradient updates and not their private data with a server. However, it was recently shown that gradient inversion attacks can reconstruct this data from the shared gradients. In the important honest-but-curious setting, existing attacks enable exact reconstruction only for a batch size of $b=1$, with larg… ▽ More

    Submitted 3 June, 2024; v1 submitted 6 March, 2024; originally announced March 2024.

    ACM Class: I.2.11

  28. arXiv:2403.00148  [pdf, ps, other

    cs.HC

    Implications of Regulations on the Use of AI and Generative AI for Human-Centered Responsible Artificial Intelligence

    Authors: Marios Constantinides, Mohammad Tahaei, Daniele Quercia, Simone Stumpf, Michael Madaio, Sean Kennedy, Lauren Wilcox, Jessica Vitak, Henriette Cramer, Edyta Bogucka, Ricardo Baeza-Yates, Ewa Luger, Jess Holbrook, Michael Muller, Ilana Golbin Blumenfeld, Giada Pistilli

    Abstract: With the upcoming AI regulations (e.g., EU AI Act) and rapid advancements in generative AI, new challenges emerge in the area of Human-Centered Responsible Artificial Intelligence (HCR-AI). As AI becomes more ubiquitous, questions around decision-making authority, human oversight, accountability, sustainability, and the ethical and legal responsibilities of AI and their creators become paramount.… ▽ More

    Submitted 29 February, 2024; originally announced March 2024.

    Comments: 6 pages

  29. arXiv:2402.11963  [pdf, other

    cs.LG cs.AI

    Imbalance in Regression Datasets

    Authors: Daniel Kowatsch, Nicolas M. Müller, Kilian Tscharke, Philip Sperl, Konstantin Bötinger

    Abstract: For classification, the problem of class imbalance is well known and has been extensively studied. In this paper, we argue that imbalance in regression is an equally important problem which has so far been overlooked: Due to under- and over-representations in a data set's target distribution, regressors are prone to degenerate to naive models, systematically neglecting uncommon training data and o… ▽ More

    Submitted 19 February, 2024; originally announced February 2024.

  30. arXiv:2402.11095  [pdf, other

    cs.CV

    GIM: Learning Generalizable Image Matcher From Internet Videos

    Authors: Xuelun Shen, Zhipeng Cai, Wei Yin, Matthias Müller, Zijun Li, Kaixuan Wang, Xiaozhi Chen, Cheng Wang

    Abstract: Image matching is a fundamental computer vision problem. While learning-based methods achieve state-of-the-art performance on existing benchmarks, they generalize poorly to in-the-wild images. Such methods typically need to train separate models for different scene types and are impractical when the scene type is unknown in advance. One of the underlying problems is the limited scalability of exis… ▽ More

    Submitted 16 February, 2024; originally announced February 2024.

    Comments: Accepted to ICLR 2024 for spotlight presentation

  31. arXiv:2402.06304  [pdf, ps, other

    cs.SD cs.AI eess.AS

    A New Approach to Voice Authenticity

    Authors: Nicolas M. Müller, Piotr Kawa, Shen Hu, Matthias Neu, Jennifer Williams, Philip Sperl, Konstantin Böttinger

    Abstract: Voice faking, driven primarily by recent advances in text-to-speech (TTS) synthesis technology, poses significant societal challenges. Currently, the prevailing assumption is that unaltered human speech can be considered genuine, while fake speech comes from TTS synthesis. We argue that this binary distinction is oversimplified. For instance, altered playback speeds can be used for malicious purpo… ▽ More

    Submitted 9 February, 2024; originally announced February 2024.

  32. arXiv:2402.02823  [pdf, other

    cs.LG cs.AI cs.CL cs.CR

    Evading Data Contamination Detection for Language Models is (too) Easy

    Authors: Jasper Dekoninck, Mark Niklas Müller, Maximilian Baader, Marc Fischer, Martin Vechev

    Abstract: Large language models are widespread, with their performance on benchmarks frequently guiding user preferences for one model over another. However, the vast amount of data these models are trained on can inadvertently lead to contamination with public benchmarks, thus compromising performance measurements. While recently developed contamination detection methods try to address this issue, they ove… ▽ More

    Submitted 12 February, 2024; v1 submitted 5 February, 2024; originally announced February 2024.

  33. arXiv:2402.00069  [pdf, other

    cs.AR cs.AI

    Using the Abstract Computer Architecture Description Language to Model AI Hardware Accelerators

    Authors: Mika Markus Müller, Alexander Richard Manfred Borst, Konstantin Lübeck, Alexander Louis-Ferdinand Jung, Oliver Bringmann

    Abstract: Artificial Intelligence (AI) has witnessed remarkable growth, particularly through the proliferation of Deep Neural Networks (DNNs). These powerful models drive technological advancements across various domains. However, to harness their potential in real-world applications, specialized hardware accelerators are essential. This demand has sparked a market for parameterizable AI hardware accelerato… ▽ More

    Submitted 30 January, 2024; originally announced February 2024.

    Comments: Accepted Version for: MBMV'24

  34. Design Principles for Generative AI Applications

    Authors: Justin D. Weisz, Jessica He, Michael Muller, Gabriela Hoefer, Rachel Miles, Werner Geyer

    Abstract: Generative AI applications present unique design challenges. As generative AI technologies are increasingly being incorporated into mainstream applications, there is an urgent need for guidance on how to design user experiences that foster effective and safe use. We present six principles for the design of generative AI applications that address unique characteristics of generative AI UX and offer… ▽ More

    Submitted 25 January, 2024; originally announced January 2024.

    Comments: 34 pages, 4 figures. To be published in CHI 2024

  35. arXiv:2401.09512  [pdf, other

    cs.SD eess.AS

    MLAAD: The Multi-Language Audio Anti-Spoofing Dataset

    Authors: Nicolas M. Müller, Piotr Kawa, Wei Herng Choong, Edresson Casanova, Eren Gölge, Thorsten Müller, Piotr Syga, Philip Sperl, Konstantin Böttinger

    Abstract: Text-to-Speech (TTS) technology brings significant advantages, such as giving a voice to those with speech impairments, but also enables audio deepfakes and spoofs. The former mislead individuals and may propagate misinformation, while the latter undermine voice biometric security systems. AI-based detection can help to address these challenges by automatically differentiating between genuine and… ▽ More

    Submitted 16 April, 2024; v1 submitted 17 January, 2024; originally announced January 2024.

    Comments: IJCNN 2024

  36. arXiv:2401.02430  [pdf, other

    cs.CV cs.AI cs.LG

    Automated Classification of Model Errors on ImageNet

    Authors: Momchil Peychev, Mark Niklas Müller, Marc Fischer, Martin Vechev

    Abstract: While the ImageNet dataset has been driving computer vision research over the past decade, significant label noise and ambiguity have made top-1 accuracy an insufficient measure of further progress. To address this, new label-sets and evaluation protocols have been proposed for ImageNet showing that state-of-the-art models already achieve over 95% accuracy and shifting the focus on investigating w… ▽ More

    Submitted 13 November, 2023; originally announced January 2024.

    Comments: NeurIPS 2023

  37. Monte Carlo Tree Search in the Presence of Transition Uncertainty

    Authors: Farnaz Kohankhaki, Kiarash Aghakasiri, Hongming Zhang, Ting-Han Wei, Chao Gao, Martin Müller

    Abstract: Monte Carlo Tree Search (MCTS) is an immensely popular search-based framework used for decision making. It is traditionally applied to domains where a perfect simulation model of the environment is available. We study and improve MCTS in the context where the environment model is given but imperfect. We show that the discrepancy between the model and the actual environment can lead to significant… ▽ More

    Submitted 18 December, 2023; originally announced December 2023.

  38. arXiv:2312.10431  [pdf, other

    cs.LG stat.ML

    Continuous Diffusion for Mixed-Type Tabular Data

    Authors: Markus Mueller, Kathrin Gruber, Dennis Fok

    Abstract: Score-based generative models (or diffusion models for short) have proven successful for generating text and image data. However, the adaption of this model family to tabular data of mixed-type has fallen short so far. In this paper, we propose CDTD, a Continuous Diffusion model for mixed-type Tabular Data. Specifically, we combine score matching and score interpolation to ensure a common continuo… ▽ More

    Submitted 27 May, 2024; v1 submitted 16 December, 2023; originally announced December 2023.

  39. arXiv:2312.09843  [pdf, other

    cs.CY econ.GN

    Drivers and Barriers of AI Adoption and Use in Scientific Research

    Authors: Stefano Bianchini, Moritz Müller, Pierre Pelletier

    Abstract: New technologies have the power to revolutionize science. It has happened in the past and is happening again with the emergence of new computational tools, such as artificial intelligence and machine learning. Despite the documented impact of these technologies, there remains a significant gap in understanding the process of their adoption within the scientific community. In this paper, we draw on… ▽ More

    Submitted 22 February, 2024; v1 submitted 15 December, 2023; originally announced December 2023.

  40. arXiv:2312.08548  [pdf, other

    cs.CV

    EVP: Enhanced Visual Perception using Inverse Multi-Attentive Feature Refinement and Regularized Image-Text Alignment

    Authors: Mykola Lavreniuk, Shariq Farooq Bhat, Matthias Müller, Peter Wonka

    Abstract: This work presents the network architecture EVP (Enhanced Visual Perception). EVP builds on the previous work VPD which paved the way to use the Stable Diffusion network for computer vision tasks. We propose two major enhancements. First, we develop the Inverse Multi-Attentive Feature Refinement (IMAFR) module which enhances feature learning capabilities by aggregating spatial information from hig… ▽ More

    Submitted 13 December, 2023; originally announced December 2023.

  41. Geranos: a Novel Tilted-Rotors Aerial Robot for the Transportation of Poles

    Authors: Nicolas Gorlo, Samuel Bamert, Rafael Cathomen, Gabriel Käppeli, Mario Müller, Tim Reinhart, Henriette Stadler, Hua Shen, Eugenio Cuniato, Marco Tognon, Roland Siegwart

    Abstract: In challenging terrains, constructing structures such as antennas and cable-car masts often requires the use of helicopters to transport loads via ropes. The swinging of the load, exacerbated by wind, impairs positioning accuracy, therefore necessitating precise manual placement by ground crews. This increases costs and risk of injuries. Challenging this paradigm, we present Geranos: a specialized… ▽ More

    Submitted 11 January, 2024; v1 submitted 4 December, 2023; originally announced December 2023.

    Comments: accepted at IEEE Robotics and Automation Magazine

  42. arXiv:2312.00923  [pdf, other

    cs.LG cs.CV

    Label Delay in Online Continual Learning

    Authors: Botos Csaba, Wenxuan Zhang, Matthias Müller, Ser-Nam Lim, Mohamed Elhoseiny, Philip Torr, Adel Bibi

    Abstract: Online continual learning, the process of training models on streaming data, has gained increasing attention in recent years. However, a critical aspect often overlooked is the label delay, where new data may not be labeled due to slow and costly annotation processes. We introduce a new continual learning framework with explicit modeling of the label delay between data and label streams over time… ▽ More

    Submitted 25 April, 2024; v1 submitted 1 December, 2023; originally announced December 2023.

    Comments: 17 pages, 12 figures

    ACM Class: I.4.0; I.4.10

  43. arXiv:2311.18433  [pdf, other

    cs.CV

    E2PNet: Event to Point Cloud Registration with Spatio-Temporal Representation Learning

    Authors: Xiuhong Lin, Changjie Qiu, Zhipeng Cai, Siqi Shen, Yu Zang, Weiquan Liu, Xuesheng Bian, Matthias Müller, Cheng Wang

    Abstract: Event cameras have emerged as a promising vision sensor in recent years due to their unparalleled temporal resolution and dynamic range. While registration of 2D RGB images to 3D point clouds is a long-standing problem in computer vision, no prior work studies 2D-3D registration for event cameras. To this end, we propose E2PNet, the first learning-based method for event-to-point cloud registration… ▽ More

    Submitted 27 December, 2023; v1 submitted 30 November, 2023; originally announced November 2023.

    Comments: 10 pages, 4 figures, accepted by Thirty-seventh Conference on Neural Information Processing Systems(NeurIPS 2023)

  44. arXiv:2311.10174  [pdf, other

    cs.CL

    JWSign: A Highly Multilingual Corpus of Bible Translations for more Diversity in Sign Language Processing

    Authors: Shester Gueuwou, Sophie Siake, Colin Leong, Mathias Müller

    Abstract: Advancements in sign language processing have been hindered by a lack of sufficient data, impeding progress in recognition, translation, and production tasks. The absence of comprehensive sign language datasets across the world's sign languages has widened the gap in this field, resulting in a few sign languages being studied more than others, making this research area extremely skewed mostly towa… ▽ More

    Submitted 16 November, 2023; originally announced November 2023.

    Comments: EMNLP 20223 (Findings)

  45. arXiv:2311.04954  [pdf, other

    cs.CL cs.AI

    Prompt Sketching for Large Language Models

    Authors: Luca Beurer-Kellner, Mark Niklas Müller, Marc Fischer, Martin Vechev

    Abstract: Many recent prompting strategies for large language models (LLMs) query the model multiple times sequentially -- first to produce intermediate results and then the final answer. However, using these methods, both decoder and model are unaware of potential follow-up prompts, leading to disconnected and undesirably wordy intermediate responses. In this work, we address this issue by proposing prompt… ▽ More

    Submitted 8 November, 2023; originally announced November 2023.

  46. arXiv:2311.04015  [pdf, ps, other

    cs.LG cs.AI

    Expressivity of ReLU-Networks under Convex Relaxations

    Authors: Maximilian Baader, Mark Niklas Müller, Yuhao Mao, Martin Vechev

    Abstract: Convex relaxations are a key component of training and certifying provably safe neural networks. However, despite substantial progress, a wide and poorly understood accuracy gap to standard networks remains, raising the question of whether this is due to fundamental limitations of convex relaxations. Initial work investigating this question focused on the simple and widely used IBP relaxation. It… ▽ More

    Submitted 7 November, 2023; originally announced November 2023.

  47. arXiv:2310.19381  [pdf, other

    cs.AI

    Protecting Publicly Available Data With Machine Learning Shortcuts

    Authors: Nicolas M. Müller, Maximilian Burgert, Pascal Debus, Jennifer Williams, Philip Sperl, Konstantin Böttinger

    Abstract: Machine-learning (ML) shortcuts or spurious correlations are artifacts in datasets that lead to very good training and test performance but severely limit the model's generalization capability. Such shortcuts are insidious because they go unnoticed due to good in-domain test performance. In this paper, we explore the influence of different shortcuts and show that even simple shortcuts are difficul… ▽ More

    Submitted 30 October, 2023; originally announced October 2023.

    Comments: Published at BMVC 2023

  48. arXiv:2310.13960  [pdf, other

    cs.CL cs.CV

    Linguistically Motivated Sign Language Segmentation

    Authors: Amit Moryossef, Zifan Jiang, Mathias Müller, Sarah Ebling, Yoav Goldberg

    Abstract: Sign language segmentation is a crucial task in sign language processing systems. It enables downstream tasks such as sign recognition, transcription, and machine translation. In this work, we consider two kinds of segmentation: segmentation into individual signs and segmentation into phrases, larger units comprising several signs. We propose a novel approach to jointly model these two tasks. Ou… ▽ More

    Submitted 30 October, 2023; v1 submitted 21 October, 2023; originally announced October 2023.

    Comments: Accepted at EMNLP 2023 (Findings)

  49. Reaching the Limit in Autonomous Racing: Optimal Control versus Reinforcement Learning

    Authors: Yunlong Song, Angel Romero, Matthias Mueller, Vladlen Koltun, Davide Scaramuzza

    Abstract: A central question in robotics is how to design a control system for an agile mobile robot. This paper studies this question systematically, focusing on a challenging setting: autonomous drone racing. We show that a neural network controller trained with reinforcement learning (RL) outperformed optimal control (OC) methods in this setting. We then investigated which fundamental factors have contri… ▽ More

    Submitted 18 October, 2023; v1 submitted 16 October, 2023; originally announced October 2023.

    Journal ref: Science Robotics, 2023

  50. arXiv:2310.09066  [pdf, other

    cs.CV

    pose-format: Library for Viewing, Augmenting, and Handling .pose Files

    Authors: Amit Moryossef, Mathias Müller, Rebecka Fahrni

    Abstract: Managing and analyzing pose data is a complex task, with challenges ranging from handling diverse file structures and data types to facilitating effective data manipulations such as normalization and augmentation. This paper presents \texttt{pose-format}, a comprehensive toolkit designed to address these challenges by providing a unified, flexible, and easy-to-use interface. The library includes a… ▽ More

    Submitted 13 October, 2023; originally announced October 2023.