Skip to main content

Showing 1–6 of 6 results for author: Panwar, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.17653  [pdf, other

    cs.LG cs.AI cs.CL

    InversionView: A General-Purpose Method for Reading Information from Neural Activations

    Authors: Xinting Huang, Madhur Panwar, Navin Goyal, Michael Hahn

    Abstract: The inner workings of neural networks can be better understood if we can fully decipher the information encoded in neural activations. In this paper, we argue that this information is embodied by the subset of inputs that give rise to similar activations. Computing such subsets is nontrivial as the input space is exponentially large. We propose InversionView, which allows us to practically inspect… ▽ More

    Submitted 2 June, 2024; v1 submitted 27 May, 2024; originally announced May 2024.

  2. arXiv:2404.16367  [pdf, other

    cs.CL cs.LG

    Learning Syntax Without Planting Trees: Understanding When and Why Transformers Generalize Hierarchically

    Authors: Kabir Ahuja, Vidhisha Balachandran, Madhur Panwar, Tianxing He, Noah A. Smith, Navin Goyal, Yulia Tsvetkov

    Abstract: Transformers trained on natural language data have been shown to learn its hierarchical structure and generalize to sentences with unseen syntactic structures without explicitly encoding any structural bias. In this work, we investigate sources of inductive bias in transformer models and their training that could cause such generalization behavior to emerge. We extensively experiment with transfor… ▽ More

    Submitted 31 May, 2024; v1 submitted 25 April, 2024; originally announced April 2024.

    Comments: Code now available: https://github.com/kabirahuja2431/transformers-hg

  3. arXiv:2306.04891  [pdf, other

    cs.LG cs.CL

    In-Context Learning through the Bayesian Prism

    Authors: Madhur Panwar, Kabir Ahuja, Navin Goyal

    Abstract: In-context learning (ICL) is one of the surprising and useful features of large language models and subject of intense research. Recently, stylized meta-learning-like ICL setups have been devised that train transformers on sequences of input-output pairs $(x, f(x))$. The function $f$ comes from a function class and generalization is checked by evaluating on sequences generated from unseen function… ▽ More

    Submitted 14 April, 2024; v1 submitted 7 June, 2023; originally announced June 2023.

    Comments: ICLR 2024

  4. arXiv:2211.02930  [pdf

    eess.SY cs.LG

    1-D Convolutional Graph Convolutional Networks for Fault Detection in Distributed Energy Systems

    Authors: Bang L. H. Nguyen, Tuyen Vu, Thai-Thanh Nguyen, Mayank Panwar, Rob Hovsapian

    Abstract: This paper presents a 1-D convolutional graph neural network for fault detection in microgrids. The combination of 1-D convolutional neural networks (1D-CNN) and graph convolutional networks (GCN) helps extract both spatial-temporal correlations from the voltage measurements in microgrids. The fault detection scheme includes fault event detection, fault type and phase classification, and fault loc… ▽ More

    Submitted 5 November, 2022; originally announced November 2022.

    Comments: arXiv admin note: text overlap with arXiv:2210.15177

  5. arXiv:2012.01524  [pdf, other

    cs.CL

    TAN-NTM: Topic Attention Networks for Neural Topic Modeling

    Authors: Madhur Panwar, Shashank Shailabh, Milan Aggarwal, Balaji Krishnamurthy

    Abstract: Topic models have been widely used to learn text representations and gain insight into document corpora. To perform topic discovery, most existing neural models either take document bag-of-words (BoW) or sequence of tokens as input followed by variational inference and BoW reconstruction to learn topic-word distribution. However, leveraging topic-word distribution for learning better features duri… ▽ More

    Submitted 9 July, 2021; v1 submitted 2 December, 2020; originally announced December 2020.

    Comments: Accepted as a long paper at ACL 2021 (Oral)

  6. arXiv:1512.08515  [pdf

    cs.CR cs.CY cs.SE physics.data-an

    Security Metrics in Industrial Control Systems

    Authors: Zachary A. Collier, Mahesh Panwar, Alexander A. Ganin, Alex Kott, Igor Linkov

    Abstract: Risk is the best known and perhaps the best studied example within a much broader class of cyber security metrics. However, risk is not the only possible cyber security metric. Other metrics such as resilience can exist and could be potentially very valuable to defenders of ICS systems. Often, metrics are defined as measurable properties of a system that quantify the degree to which objectives of… ▽ More

    Submitted 25 December, 2015; originally announced December 2015.

    Comments: Chapter in In: Colbert, E. and Kott, A. (eds.), "Cyber Security of Industrial Control Systems, Including SCADA Systems," Springer, NY, 2016