Skip to main content

Showing 1–32 of 32 results for author: Quinn, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.11683  [pdf, other

    cs.LG

    Conditionally-Conjugate Gaussian Process Factor Analysis for Spike Count Data via Data Augmentation

    Authors: Yididiya Y. Nadew, Xuhui Fan, Christopher J. Quinn

    Abstract: Gaussian process factor analysis (GPFA) is a latent variable modeling technique commonly used to identify smooth, low-dimensional latent trajectories underlying high-dimensional neural recordings. Specifically, researchers model spiking rates as Gaussian observations, resulting in tractable inference. Recently, GPFA has been extended to model spike count data. However, due to the non-conjugacy of… ▽ More

    Submitted 19 May, 2024; originally announced May 2024.

    Comments: 23 pages, 2 figures, ICML

  2. arXiv:2405.10211  [pdf, ps, other

    cs.SD cs.CL eess.AS

    Building a Luganda Text-to-Speech Model From Crowdsourced Data

    Authors: Sulaiman Kagumire, Andrew Katumba, Joyce Nakatumba-Nabende, John Quinn

    Abstract: Text-to-speech (TTS) development for African languages such as Luganda is still limited, primarily due to the scarcity of high-quality, single-speaker recordings essential for training TTS models. Prior work has focused on utilizing the Luganda Common Voice recordings of multiple speakers aged between 20-49. Although the generated speech is intelligible, it is still of lower quality than the model… ▽ More

    Submitted 16 May, 2024; originally announced May 2024.

    Comments: Presented at the AfricaNLP workshop at ICLR 2024

  3. arXiv:2403.10063  [pdf, other

    cs.LG cs.AI cs.CC math.OC

    Unified Projection-Free Algorithms for Adversarial DR-Submodular Optimization

    Authors: Mohammad Pedramfar, Yididiya Y. Nadew, Christopher J. Quinn, Vaneet Aggarwal

    Abstract: This paper introduces unified projection-free Frank-Wolfe type algorithms for adversarial continuous DR-submodular optimization, spanning scenarios such as full information and (semi-)bandit feedback, monotone and non-monotone functions, different constraints, and types of stochastic queries. For every problem considered in the non-monotone setting, the proposed algorithms are either the first wit… ▽ More

    Submitted 26 April, 2024; v1 submitted 15 March, 2024; originally announced March 2024.

    Comments: This paper is published in ICLR 2024. This version includes a correction for regret bounds in the full-information zeroth order feedback setting (see the footnote on page 1 for details)

  4. arXiv:2312.08057  [pdf, other

    cs.LG cs.AI math.CO math.OC stat.ML

    Combinatorial Stochastic-Greedy Bandit

    Authors: Fares Fourati, Christopher John Quinn, Mohamed-Slim Alouini, Vaneet Aggarwal

    Abstract: We propose a novel combinatorial stochastic-greedy bandit (SGB) algorithm for combinatorial multi-armed bandit problems when no extra information other than the joint reward of the selected set of $n$ arms at each time step $t\in [T]$ is observed. SGB adopts an optimized stochastic-explore-then-commit approach and is specifically designed for scenarios with a large set of base arms. Unlike existin… ▽ More

    Submitted 13 December, 2023; originally announced December 2023.

  5. arXiv:2310.11622  [pdf, other

    cs.CV

    High-Resolution Building and Road Detection from Sentinel-2

    Authors: Wojciech Sirko, Emmanuel Asiedu Brempong, Juliana T. C. Marcos, Abigail Annkah, Abel Korme, Mohammed Alewi Hassen, Krishna Sapkota, Tomer Shekel, Abdoulaye Diack, Sella Nevo, Jason Hickey, John Quinn

    Abstract: Map** buildings and roads automatically with remote sensing typically requires high-resolution imagery, which is expensive to obtain and often sparsely available. In this work we demonstrate how multiple 10 m resolution Sentinel-2 images can be used to generate 50 cm resolution building and road segmentation masks. This is done by training a `student' model with access to Sentinel-2 images to re… ▽ More

    Submitted 20 June, 2024; v1 submitted 17 October, 2023; originally announced October 2023.

  6. arXiv:2306.05589  [pdf

    cs.NI cs.CR

    Intrusion Detection Systems for Flying Ad-hoc Networks

    Authors: Jordan Quinn, Safdar Hussain Bouk

    Abstract: Unmanned Aerial Vehicles (UAVs) are becoming more dependent on mission success than ever. Due to their increase in demand, addressing security vulnerabilities to both UAVs and the Flying Ad-hoc Networks (FANET) they form is more important than ever. As the network traffic is communicated through open airwaves, this network of UAVs relies on monitoring applications known as Intrusion Detection Syst… ▽ More

    Submitted 8 June, 2023; originally announced June 2023.

    Comments: 5 Pages, 1 figure, 1 table, 41 References

  7. arXiv:2305.16671  [pdf, ps, other

    cs.LG cs.AI cs.CC

    A Unified Approach for Maximizing Continuous DR-submodular Functions

    Authors: Mohammad Pedramfar, Christopher John Quinn, Vaneet Aggarwal

    Abstract: This paper presents a unified approach for maximizing continuous DR-submodular functions that encompasses a range of settings and oracle access types. Our approach includes a Frank-Wolfe type offline algorithm for both monotone and non-monotone functions, with different restrictions on the general convex set. We consider settings where the oracle provides access to either the gradient of the funct… ▽ More

    Submitted 12 January, 2024; v1 submitted 26 May, 2023; originally announced May 2023.

    Comments: 37th Conference on Neural Information Processing Systems (NeurIPS 2023)

  8. HARDC : A novel ECG-based heartbeat classification method to detect arrhythmia using hierarchical attention based dual structured RNN with dilated CNN

    Authors: Md Shofiqul Islam, Khondokar Fida Hasan, Sunjida Sultana, Shahadat Uddin, Pietro Lio, Julian M. W. Quinn, Mohammad Ali Moni

    Abstract: In this paper have developed a novel hybrid hierarchical attention-based bidirectional recurrent neural network with dilated CNN (HARDC) method for arrhythmia classification. This solves problems that arise when traditional dilated convolutional neural network (CNN) models disregard the correlation between contexts and gradient dispersion. The proposed HARDC fully exploits the dilated CNN and bidi… ▽ More

    Submitted 6 March, 2023; originally announced March 2023.

    Comments: 23 pages

  9. arXiv:2302.01324  [pdf, other

    cs.LG cs.AI math.OC

    Randomized Greedy Learning for Non-monotone Stochastic Submodular Maximization Under Full-bandit Feedback

    Authors: Fares Fourati, Vaneet Aggarwal, Christopher John Quinn, Mohamed-Slim Alouini

    Abstract: We investigate the problem of unconstrained combinatorial multi-armed bandits with full-bandit feedback and stochastic rewards for submodular maximization. Previous works investigate the same problem assuming a submodular and monotone reward function. In this work, we study a more general problem, i.e., when the reward function is not necessarily monotone, and the submodularity is assumed only in… ▽ More

    Submitted 2 February, 2023; originally announced February 2023.

  10. arXiv:2301.13326  [pdf, other

    cs.LG cs.AI cs.DS eess.SY

    A Framework for Adapting Offline Algorithms to Solve Combinatorial Multi-Armed Bandit Problems with Bandit Feedback

    Authors: Guanyu Nie, Yididiya Y Nadew, Yanhui Zhu, Vaneet Aggarwal, Christopher John Quinn

    Abstract: We investigate the problem of stochastic, combinatorial multi-armed bandits where the learner only has access to bandit feedback and the reward function can be non-linear. We provide a general framework for adapting discrete offline approximation algorithms into sublinear $α$-regret methods that only require bandit feedback, achieving $\mathcal{O}\left(T^\frac{2}{3}\log(T)^\frac{1}{3}\right)$ expe… ▽ More

    Submitted 11 October, 2023; v1 submitted 30 January, 2023; originally announced January 2023.

    Comments: This extends the framework in previous version to adapt randomized offline approximation algorithms

    Journal ref: Proceedings of the 40th International Conference on Machine Learning, 2023

  11. arXiv:2211.09744  [pdf, other

    cs.CL

    Zero-Shot Dynamic Quantization for Transformer Inference

    Authors: Yousef El-Kurdi, Jerry Quinn, Avirup Sil

    Abstract: We introduce a novel run-time method for significantly reducing the accuracy loss associated with quantizing BERT-like models to 8-bit integers. Existing methods for quantizing models either modify the training procedure,or they require an additional calibration step to adjust parameters that also requires a selected held-out dataset. Our method permits taking advantage of quantization without the… ▽ More

    Submitted 17 November, 2022; originally announced November 2022.

    Comments: To appear in EMNLP 2022 industry track

  12. arXiv:2207.08937  [pdf, ps, other

    cs.SI cs.AI

    A Community-Aware Framework for Social Influence Maximization

    Authors: Abhishek K. Umrawal, Christopher J. Quinn, Vaneet Aggarwal

    Abstract: We consider the problem of Influence Maximization (IM), the task of selecting $k$ seed nodes in a social network such that the expected number of nodes influenced is maximized. We propose a community-aware divide-and-conquer framework that involves (i) learning the inherent community structure of the social network, (ii) generating candidate solutions by solving the influence maximization problem… ▽ More

    Submitted 18 February, 2023; v1 submitted 18 July, 2022; originally announced July 2022.

    Comments: 14 pages, 4 figures, and 7 tables; Accepted for publication in IEEE Transactions on Emerging Topics in Computational Intelligence (TETCI) in Dec 2022

  13. arXiv:2107.12283  [pdf, other

    cs.CV

    Continental-Scale Building Detection from High Resolution Satellite Imagery

    Authors: Wojciech Sirko, Sergii Kashubin, Marvin Ritter, Abigail Annkah, Yasser Salah Eddine Bouchareb, Yann Dauphin, Daniel Keysers, Maxim Neumann, Moustapha Cisse, John Quinn

    Abstract: Identifying the locations and footprints of buildings is vital for many practical and scientific purposes. Such information can be particularly useful in develo** regions where alternative data sources may be scarce. In this work, we describe a model training pipeline for detecting buildings across the entire continent of Africa, using 50 cm satellite imagery. Starting with the U-Net model, wide… ▽ More

    Submitted 29 July, 2021; v1 submitted 26 July, 2021; originally announced July 2021.

  14. arXiv:2011.10657  [pdf, other

    q-bio.QM cs.LG

    Predicting Patient COVID-19 Disease Severity by means of Statistical and Machine Learning Analysis of Blood Cell Transcriptome Data

    Authors: Sakifa Aktar, Md. Martuza Ahamad, Md. Rashed-Al-Mahfuz, AKM Azad, Shahadat Uddin, A H M Kamal, Salem A. Alyami, **-I Lin, Sheikh Mohammed Shariful Islam, Julian M. W. Quinn, Valsamma Eapen, Mohammad Ali Moni

    Abstract: Introduction: For COVID-19 patients accurate prediction of disease severity and mortality risk would greatly improve care delivery and resource allocation. There are many patient-related factors, such as pre-existing comorbidities that affect disease severity. Since rapid automated profiling of peripheral blood samples is widely available, we investigated how such data from the peripheral blood of… ▽ More

    Submitted 19 November, 2020; originally announced November 2020.

    Report number: JMIR ms#25884

    Journal ref: JMIR Med Inform 2021;9(4):e25884, PMID: 33779565

  15. arXiv:2011.07687  [pdf, ps, other

    cs.LG stat.ML

    DART: aDaptive Accept RejecT for non-linear top-K subset identification

    Authors: Mridul Agarwal, Vaneet Aggarwal, Christopher J. Quinn, Abhishek Umrawal

    Abstract: We consider the bandit problem of selecting $K$ out of $N$ arms at each time step. The reward can be a non-linear function of the rewards of the selected individual arms. The direct use of a multi-armed bandit algorithm requires choosing among $\binom{N}{K}$ options, making the action space large. To simplify the problem, existing works on combinatorial bandits {typically} assume feedback as a lin… ▽ More

    Submitted 15 November, 2020; originally announced November 2020.

    Journal ref: AAAI 2021

  16. Machine Learning and Meta-Analysis Approach to Identify Patient Comorbidities and Symptoms that Increased Risk of Mortality in COVID-19

    Authors: Sakifa Aktar, Ashis Talukder, Md. Martuza Ahamad, A. H. M. Kamal, Jahidur Rahman Khan, Md. Protikuzzaman, Nasif Hossain, Julian M. W. Quinn, Mathew A. Summers, Teng Liaw, Valsamma Eapen, Mohammad Ali Moni

    Abstract: Background: Providing appropriate care for people suffering from COVID-19, the disease caused by the pandemic SARS-CoV-2 virus is a significant global challenge. Many individuals who become infected have pre-existing conditions that may interact with COVID-19 to increase symptom severity and mortality risk. COVID-19 patient comorbidities are likely to be informative about individual risk of severe… ▽ More

    Submitted 21 August, 2020; originally announced August 2020.

    Report number: 2008.12683

    Journal ref: Diagnostics 2021

  17. arXiv:2001.10685  [pdf, other

    cs.CV cs.HC cs.LG eess.IV

    PulseSatellite: A tool using human-AI feedback loops for satellite image analysis in humanitarian contexts

    Authors: Tomaz Logar, Joseph Bullock, Edoardo Nemni, Lars Bromley, John A. Quinn, Miguel Luengo-Oroz

    Abstract: Humanitarian response to natural disasters and conflicts can be assisted by satellite image analysis. In a humanitarian context, very specific satellite image analysis tasks must be done accurately and in a timely manner to provide operational support. We present PulseSatellite, a collaborative satellite image analysis tool which leverages neural network models that can be retrained on-the fly and… ▽ More

    Submitted 28 January, 2020; originally announced January 2020.

    Comments: 2 pages, 2 figures

    Journal ref: Proceedings of the AAAI Conference on Artificial Intelligence, New York, United States, 2020

  18. arXiv:1911.09581  [pdf, ps, other

    cs.RO

    Feedback Motion Planning for Long-Range Autonomous Underwater Vehicles

    Authors: Opeyemi S. Orioke, Tauhidul Alam, Joseph Quinn, Ramneek Kaur, Wesam H. Alsabban, Leonardo Bobadilla, Ryan N. Smith

    Abstract: Ocean ecosystems have spatiotemporal variability and dynamic complexity that require a long-term deployment of an autonomous underwater vehicle for data collection. A new long-range autonomous underwater vehicle called Tethys is adapted to study different oceanic phenomena. Additionally, an ocean environment has external forces and moments along with changing water currents which are generally not… ▽ More

    Submitted 21 November, 2019; originally announced November 2019.

    Comments: IEEE/MTS OCEANS-Marseille 2019

  19. arXiv:1911.06459  [pdf, other

    cs.LG cs.DC stat.ML

    Optimal Mini-Batch Size Selection for Fast Gradient Descent

    Authors: Michael P. Perrone, Haidar Khan, Changhoan Kim, Anastasios Kyrillidis, Jerry Quinn, Valentina Salapura

    Abstract: This paper presents a methodology for selecting the mini-batch size that minimizes Stochastic Gradient Descent (SGD) learning time for single and multiple learner problems. By decoupling algorithmic analysis issues from hardware and software implementation details, we reveal a robust empirical inverse law between mini-batch size and the average number of SGD updates required to converge to a speci… ▽ More

    Submitted 14 November, 2019; originally announced November 2019.

  20. Mobility profiles and calendars for food security and livelihoods analysis

    Authors: Pedro J. Zufiria, David Pastor-Escuredo, Luis Ubeda Medina, Miguel A. Hernandez Medina, Iker Barriales Valbuena, Alfredo J. Morales, Wilfred Nkwambi, John Quinn, Paula Hidalgo Sanchis, Miguel Luengo-Oroz

    Abstract: Social vulnerability is defined as the capacity of individuals and social groups to respond to any external stress placed on their livelihoods and wellbeing. Mobility and migrations are relevant when assessing vulnerability since the movements of a population reflect on their livelihoods, co** strategies and social safety nets. Although in general migration characterization is complex and open t… ▽ More

    Submitted 17 April, 2019; originally announced April 2019.

    Comments: Submitted and accepted at D4D'15 Senegal NetMob. Final version now published in PLOS ONE https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0195714

    Journal ref: PloS one. 2018;13(4)

  21. arXiv:1811.11925  [pdf, ps, other

    cs.LG cs.AI stat.ML

    Stochastic Top-$K$ Subset Bandits with Linear Space and Non-Linear Feedback

    Authors: Mridul Agarwal, Vaneet Aggarwal, Christopher J. Quinn, Abhishek K. Umrawal

    Abstract: Many real-world problems like Social Influence Maximization face the dilemma of choosing the best $K$ out of $N$ options at a given time instant. This setup can be modeled as a combinatorial bandit which chooses $K$ out of $N$ arms at each time, with an aim to achieve an efficient trade-off between exploration and exploitation. This is the first work for combinatorial bandits where the feedback re… ▽ More

    Submitted 11 October, 2021; v1 submitted 28 November, 2018; originally announced November 2018.

    Comments: 38 pages, 4 figures, 32nd International Conference on Algorithmic Learning Theory

  22. arXiv:1811.08284  [pdf, other

    eess.AS cs.LG cs.SD stat.ML

    Feature exploration for almost zero-resource ASR-free keyword spotting using a multilingual bottleneck extractor and correspondence autoencoders

    Authors: Raghav Menon, Herman Kamper, Ewald van der Westhuizen, John Quinn, Thomas Niesler

    Abstract: We compare features for dynamic time war** (DTW) when used to bootstrap keyword spotting (KWS) in an almost zero-resource setting. Such quickly-deployable systems aim to support United Nations (UN) humanitarian relief efforts in parts of Africa with severely under-resourced languages. Our objective is to identify acoustic features that provide acceptable KWS performance in such environments. As… ▽ More

    Submitted 12 July, 2019; v1 submitted 14 November, 2018; originally announced November 2018.

    Comments: 5 pages, 2 figures, 2 tables, 38 references, Accepted at Interspeech 2019

  23. arXiv:1807.08669  [pdf, other

    cs.CL stat.ML

    Automatic Speech Recognition for Humanitarian Applications in Somali

    Authors: Raghav Menon, Astik Biswas, Armin Saeb, John Quinn, Thomas Niesler

    Abstract: We present our first efforts in building an automatic speech recognition system for Somali, an under-resourced language, using 1.57 hrs of annotated speech for acoustic model training. The system is part of an ongoing effort by the United Nations (UN) to implement keyword spotting systems supporting humanitarian relief programmes in parts of Africa where languages are severely under-resourced. We… ▽ More

    Submitted 23 July, 2018; originally announced July 2018.

    Comments: 5 pages, 3 figures, 5 tables accepted at SLTU 2018

  24. arXiv:1807.08666  [pdf, other

    cs.CL stat.ML

    ASR-free CNN-DTW keyword spotting using multilingual bottleneck features for almost zero-resource languages

    Authors: Raghav Menon, Herman Kamper, Emre Yilmaz, John Quinn, Thomas Niesler

    Abstract: We consider multilingual bottleneck features (BNFs) for nearly zero-resource keyword spotting. This forms part of a United Nations effort using keyword spotting to support humanitarian relief programmes in parts of Africa where languages are severely under-resourced. We use 1920 isolated keywords (40 types, 34 minutes) as exemplars for dynamic time war** (DTW) template matching, which is perform… ▽ More

    Submitted 23 July, 2018; originally announced July 2018.

    Comments: 5 pages, 3 figures, 3 tables, 1 equation accepted at SLTU 2018

  25. arXiv:1806.09374  [pdf, other

    cs.CL

    Fast ASR-free and almost zero-resource keyword spotting using DTW and CNNs for humanitarian monitoring

    Authors: Raghav Menon, Herman Kamper, John Quinn, Thomas Niesler

    Abstract: We use dynamic time war** (DTW) as supervision for training a convolutional neural network (CNN) based keyword spotting system using a small set of spoken isolated keywords. The aim is to allow rapid deployment of a keyword spotting system in a new language to support urgent United Nations (UN) relief programmes in parts of Africa where languages are extremely under-resourced and the development… ▽ More

    Submitted 25 June, 2018; originally announced June 2018.

    Comments: 5 pages, 4 figures, 3 tables, accepted at Interspeech 2018

  26. arXiv:1804.05038  [pdf, ps, other

    cs.CL

    Pieces of Eight: 8-bit Neural Machine Translation

    Authors: Jerry Quinn, Miguel Ballesteros

    Abstract: Neural machine translation has achieved levels of fluency and adequacy that would have been surprising a short time ago. Output quality is extremely relevant for industry purposes, however it is equally important to produce results in the shortest time possible, mainly for latency-sensitive applications and to control cloud hosting costs. In this paper we show the effectiveness of translating with… ▽ More

    Submitted 13 April, 2018; originally announced April 2018.

    Comments: To appear at NAACL 2018 Industry Track

  27. arXiv:1608.02989  [pdf, other

    cs.CV

    Deep Convolutional Neural Networks for Microscopy-Based Point of Care Diagnostics

    Authors: John A. Quinn, Rose Nakasi, Pius K. B. Mugagga, Patrick Byanyima, William Lubega, Alfred Andama

    Abstract: Point of care diagnostics using microscopy and computer vision methods have been applied to a number of practical problems, and are particularly relevant to low-income, high disease burden areas. However, this is subject to the limitations in sensitivity and specificity of the computer vision methods used. In general, deep learning has recently revolutionised the field of computer vision, in some… ▽ More

    Submitted 9 August, 2016; originally announced August 2016.

    Comments: Presented at 2016 Machine Learning and Healthcare Conference (MLHC 2016), Los Angeles, CA

  28. arXiv:1506.04767  [pdf, other

    cs.IT

    Bounded Degree Approximations of Stochastic Networks

    Authors: Christopher J. Quinn, Ali Pinar, Negar Kiyavash

    Abstract: We propose algorithms to approximate directed information graphs. Directed information graphs are probabilistic graphical models that depict causal dependencies between stochastic processes in a network. The proposed algorithms identify optimal and near-optimal approximations in terms of Kullback-Leibler divergence. The user-chosen sparsity trades off the quality of the approximation against visua… ▽ More

    Submitted 15 June, 2015; originally announced June 2015.

  29. arXiv:1302.3700  [pdf, other

    stat.ML cs.LG

    Density Ratio Hidden Markov Models

    Authors: John A. Quinn, Masashi Sugiyama

    Abstract: Hidden Markov models and their variants are the predominant sequential classification method in such domains as speech recognition, bioinformatics and natural language processing. Being generative rather than discriminative models, however, their classification performance is a drawback. In this paper we apply ideas from the field of density ratio estimation to bypass the difficult step of learnin… ▽ More

    Submitted 15 February, 2013; originally announced February 2013.

  30. arXiv:1204.2003  [pdf, other

    cs.IT cs.AI stat.ML

    Directed Information Graphs

    Authors: Christopher J. Quinn, Negar Kiyavash, Todd P. Coleman

    Abstract: We propose a graphical model for representing networks of stochastic processes, the minimal generative model graph. It is based on reduced factorizations of the joint distribution over time. We show that under appropriate conditions, it is unique and consistent with another type of graphical model, the directed information graph, which is based on a generalization of Granger causality. We demonstr… ▽ More

    Submitted 11 March, 2015; v1 submitted 9 April, 2012; originally announced April 2012.

    Comments: 41 pages, 15 figures

  31. arXiv:1111.3376  [pdf, other

    cs.IT cs.MM

    Fingerprinting with Equiangular Tight Frames

    Authors: Dustin G. Mixon, Christopher J. Quinn, Negar Kiyavash, Matthew Fickus

    Abstract: Digital fingerprinting is a framework for marking media files, such as images, music, or movies, with user-specific signatures to deter illegal distribution. Multiple users can collude to produce a forgery that can potentially overcome a fingerprinting system. This paper proposes an equiangular tight frame fingerprint design which is robust to such collusion attacks. We motivate this design by con… ▽ More

    Submitted 14 November, 2011; originally announced November 2011.

    Comments: 10 pages, 6 figures, presented in part at ICASSP 2011 and SPIE 2011

  32. arXiv:1101.5108  [pdf, other

    cs.IT

    Causal Dependence Tree Approximations of Joint Distributions for Multiple Random Processes

    Authors: Christopher J. Quinn, Todd P. Coleman, Negar Kiyavash

    Abstract: We investigate approximating joint distributions of random processes with causal dependence tree distributions. Such distributions are particularly useful in providing parsimonious representation when there exists causal dynamics among processes. By extending the results by Chow and Liu on dependence tree approximations, we show that the best causal dependence tree approximation is the one which m… ▽ More

    Submitted 26 January, 2011; originally announced January 2011.

    Comments: 9 pages, 15 figures