-
Scalable Timing Coordination of Bell State Analyzers in Quantum Networks
Authors:
Yoshihiro Mori,
Toshihiko Sasaki,
Rikizo Ikuta,
Kentaro Teramoto,
Hiroyuki Ohno,
Michal Hajdušek,
Rodney Van Meter,
Shota Nagayama
Abstract:
The optical Bell State Analyzer (BSA) plays a key role in the optical generation of entanglement in quantum networks. The optical BSA is effective in controlling the timing of arriving photons to achieve interference. It is unclear whether timing synchronization is possible even in multi-hop and complex large-scale networks, and if so, how efficient it is. We investigate the scalability of BSA syn…
▽ More
The optical Bell State Analyzer (BSA) plays a key role in the optical generation of entanglement in quantum networks. The optical BSA is effective in controlling the timing of arriving photons to achieve interference. It is unclear whether timing synchronization is possible even in multi-hop and complex large-scale networks, and if so, how efficient it is. We investigate the scalability of BSA synchronization mechanisms over multiple hops for quantum networks both with and without memory in each node. We first focus on the exchange of entanglement between two network nodes via a BSA, especially effective methods of optical path coordination in achieving the simultaneous arrival of photons at the BSA. In optical memoryless quantum networks, including repeater graph state networks, we see that the quantum optical path coordination works well, though some possible timing coordination mechanisms have effects that cascade to adjacent links and beyond, some of which was not going to work well of timing coordination. We also discuss the effect of quantum memory, given that end-to-end extension of entangled states through multi-node entanglement exchange is essential for the practical application of quantum networks. Finally, cycles of all-optical links in the network topology are shown to may not be to synchronize, this property should be taken into account when considering synchronization in large networks.
△ Less
Submitted 16 May, 2024;
originally announced May 2024.
-
Test-time Adaptation Meets Image Enhancement: Improving Accuracy via Uncertainty-aware Logit Switching
Authors:
Shohei Enomoto,
Naoya Hasegawa,
Kazuki Adachi,
Taku Sasaki,
Shin'ya Yamaguchi,
Satoshi Suzuki,
Takeharu Eda
Abstract:
Deep neural networks have achieved remarkable success in a variety of computer vision applications. However, there is a problem of degrading accuracy when the data distribution shifts between training and testing. As a solution of this problem, Test-time Adaptation~(TTA) has been well studied because of its practicality. Although TTA methods increase accuracy under distribution shift by updating t…
▽ More
Deep neural networks have achieved remarkable success in a variety of computer vision applications. However, there is a problem of degrading accuracy when the data distribution shifts between training and testing. As a solution of this problem, Test-time Adaptation~(TTA) has been well studied because of its practicality. Although TTA methods increase accuracy under distribution shift by updating the model at test time, using high-uncertainty predictions is known to degrade accuracy. Since the input image is the root of the distribution shift, we incorporate a new perspective on enhancing the input image into TTA methods to reduce the prediction's uncertainty. We hypothesize that enhancing the input image reduces prediction's uncertainty and increase the accuracy of TTA methods. On the basis of our hypothesis, we propose a novel method: Test-time Enhancer and Classifier Adaptation~(TECA). In TECA, the classification model is combined with the image enhancement model that transforms input images into recognition-friendly ones, and these models are updated by existing TTA methods. Furthermore, we found that the prediction from the enhanced image does not always have lower uncertainty than the prediction from the original image. Thus, we propose logit switching, which compares the uncertainty measure of these predictions and outputs the lower one. In our experiments, we evaluate TECA with various TTA methods and show that TECA reduces prediction's uncertainty and increases accuracy of TTA methods despite having no hyperparameters and little parameter overhead.
△ Less
Submitted 26 March, 2024;
originally announced March 2024.
-
Test-time Similarity Modification for Person Re-identification toward Temporal Distribution Shift
Authors:
Kazuki Adachi,
Shohei Enomoto,
Taku Sasaki,
Shin'ya Yamaguchi
Abstract:
Person re-identification (re-id), which aims to retrieve images of the same person in a given image from a database, is one of the most practical image recognition applications. In the real world, however, the environments that the images are taken from change over time. This causes a distribution shift between training and testing and degrades the performance of re-id. To maintain re-id performan…
▽ More
Person re-identification (re-id), which aims to retrieve images of the same person in a given image from a database, is one of the most practical image recognition applications. In the real world, however, the environments that the images are taken from change over time. This causes a distribution shift between training and testing and degrades the performance of re-id. To maintain re-id performance, models should continue adapting to the test environment's temporal changes. Test-time adaptation (TTA), which aims to adapt models to the test environment with only unlabeled test data, is a promising way to handle this problem because TTA can adapt models instantly in the test environment. However, the previous TTA methods are designed for classification and cannot be directly applied to re-id. This is because the set of people's identities in the dataset differs between training and testing in re-id, whereas the set of classes is fixed in the current TTA methods designed for classification. To improve re-id performance in changing test environments, we propose TEst-time similarity Modification for Person re-identification (TEMP), a novel TTA method for re-id. TEMP is the first fully TTA method for re-id, which does not require any modification to pre-training. Inspired by TTA methods that refine the prediction uncertainty in classification, we aim to refine the uncertainty in re-id. However, the uncertainty cannot be computed in the same way as classification in re-id since it is an open-set task, which does not share person labels between training and testing. Hence, we propose re-id entropy, an alternative uncertainty measure for re-id computed based on the similarity between the feature vectors. Experiments show that the re-id entropy can measure the uncertainty on re-id and TEMP improves the performance of re-id in online settings where the distribution changes over time.
△ Less
Submitted 20 March, 2024;
originally announced March 2024.
-
Quantum natural gradient without monotonicity
Authors:
Toi Sasaki,
Hideyuki Miyahara
Abstract:
Natural gradient (NG) is an information-geometric optimization method that plays a crucial role, especially in the estimation of parameters for machine learning models like neural networks. To apply NG to quantum systems, the quantum natural gradient (QNG) was introduced and utilized for noisy intermediate-scale devices. Additionally, a mathematically equivalent approach to QNG, known as the stoch…
▽ More
Natural gradient (NG) is an information-geometric optimization method that plays a crucial role, especially in the estimation of parameters for machine learning models like neural networks. To apply NG to quantum systems, the quantum natural gradient (QNG) was introduced and utilized for noisy intermediate-scale devices. Additionally, a mathematically equivalent approach to QNG, known as the stochastic reconfiguration method, has been implemented to enhance the performance of quantum Monte Carlo methods. It is worth noting that these methods are based on the symmetric logarithmic derivative (SLD) metric, which is one of the monotone metrics. So far, monotonicity has been believed to be a guiding principle to construct a geometry in physics. In this paper, we propose generalized QNG by removing the condition of monotonicity. Initially, we demonstrate that monotonicity is a crucial condition for conventional QNG to be optimal. Subsequently, we provide analytical and numerical evidence showing that non-monotone QNG outperforms conventional QNG based on the SLD metric in terms of convergence speed.
△ Less
Submitted 24 January, 2024;
originally announced January 2024.
-
Scaling-up Memristor Monte Carlo with magnetic domain-wall physics
Authors:
Thomas Dalgaty,
Shogo Yamada,
Anca Molnos,
Eiji Kawasaki,
Thomas Mesquida,
François Rummens,
Tatsuo Shibata,
Yukihiro Urakawa,
Yukio Terasaki,
Tomoyuki Sasaki,
Marc Duranton
Abstract:
By exploiting the intrinsic random nature of nanoscale devices, Memristor Monte Carlo (MMC) is a promising enabler of edge learning systems. However, due to multiple algorithmic and device-level limitations, existing demonstrations have been restricted to very small neural network models and datasets. We discuss these limitations, and describe how they can be overcome, by map** the stochastic gr…
▽ More
By exploiting the intrinsic random nature of nanoscale devices, Memristor Monte Carlo (MMC) is a promising enabler of edge learning systems. However, due to multiple algorithmic and device-level limitations, existing demonstrations have been restricted to very small neural network models and datasets. We discuss these limitations, and describe how they can be overcome, by map** the stochastic gradient Langevin dynamics (SGLD) algorithm onto the physics of magnetic domain-wall Memristors to scale-up MMC models by five orders of magnitude. We propose the push-pull pulse programming method that realises SGLD in-physics, and use it to train a domain-wall based ResNet18 on the CIFAR-10 dataset. On this task, we observe no performance degradation relative to a floating point model down to an update precision of between 6 and 7-bits, indicating we have made a step towards a large-scale edge learning system leveraging noisy analogue devices.
△ Less
Submitted 5 December, 2023;
originally announced December 2023.
-
D3: Data Diversity Design for Systematic Generalization in Visual Question Answering
Authors:
Amir Rahimi,
Vanessa D'Amario,
Moyuru Yamada,
Kentaro Takemoto,
Tomotake Sasaki,
Xavier Boix
Abstract:
Systematic generalization is a crucial aspect of intelligence, which refers to the ability to generalize to novel tasks by combining known subtasks and concepts. One critical factor that has been shown to influence systematic generalization is the diversity of training data. However, diversity can be defined in various ways, as data have many factors of variation. A more granular understanding of…
▽ More
Systematic generalization is a crucial aspect of intelligence, which refers to the ability to generalize to novel tasks by combining known subtasks and concepts. One critical factor that has been shown to influence systematic generalization is the diversity of training data. However, diversity can be defined in various ways, as data have many factors of variation. A more granular understanding of how different aspects of data diversity affect systematic generalization is lacking. We present new evidence in the problem of Visual Question Answering (VQA) that reveals that the diversity of simple tasks (i.e. tasks formed by a few subtasks and concepts) plays a key role in achieving systematic generalization. This implies that it may not be essential to gather a large and varied number of complex tasks, which could be costly to obtain. We demonstrate that this result is independent of the similarity between the training and testing data and applies to well-known families of neural network architectures for VQA (i.e. monolithic architectures and neural module networks). Additionally, we observe that neural module networks leverage all forms of data diversity we evaluated, while monolithic architectures require more extensive amounts of data to do so. These findings provide a first step towards understanding the interactions between data diversity design, neural network architectures, and systematic generalization capabilities.
△ Less
Submitted 15 September, 2023;
originally announced September 2023.
-
Modularity Trumps Invariance for Compositional Robustness
Authors:
Ian Mason,
Anirban Sarkar,
Tomotake Sasaki,
Xavier Boix
Abstract:
By default neural networks are not robust to changes in data distribution. This has been demonstrated with simple image corruptions, such as blurring or adding noise, degrading image classification performance. Many methods have been proposed to mitigate these issues but for the most part models are evaluated on single corruptions. In reality, visual space is compositional in nature, that is, that…
▽ More
By default neural networks are not robust to changes in data distribution. This has been demonstrated with simple image corruptions, such as blurring or adding noise, degrading image classification performance. Many methods have been proposed to mitigate these issues but for the most part models are evaluated on single corruptions. In reality, visual space is compositional in nature, that is, that as well as robustness to elemental corruptions, robustness to compositions of corruptions is also needed. In this work we develop a compositional image classification task where, given a few elemental corruptions, models are asked to generalize to compositions of these corruptions. That is, to achieve compositional robustness. We experimentally compare empirical risk minimization with an invariance building pairwise contrastive loss and, counter to common intuitions in domain generalization, achieve only marginal improvements in compositional robustness by encouraging invariance. To move beyond invariance, following previously proposed inductive biases that model architectures should reflect data structure, we introduce a modular architecture whose structure replicates the compositional nature of the task. We then show that this modular approach consistently achieves better compositional robustness than non-modular approaches. We additionally find empirical evidence that the degree of invariance between representations of 'in-distribution' elemental corruptions fails to correlate with robustness to 'out-of-distribution' compositions of corruptions.
△ Less
Submitted 15 June, 2023;
originally announced June 2023.
-
M4: Multi-generator, Multi-domain, and Multi-lingual Black-Box Machine-Generated Text Detection
Authors:
Yuxia Wang,
Jonibek Mansurov,
Petar Ivanov,
**yan Su,
Artem Shelmanov,
Akim Tsvigun,
Chenxi Whitehouse,
Osama Mohammed Afzal,
Tarek Mahmoud,
Toru Sasaki,
Thomas Arnold,
Alham Fikri Aji,
Nizar Habash,
Iryna Gurevych,
Preslav Nakov
Abstract:
Large language models (LLMs) have demonstrated remarkable capability to generate fluent responses to a wide variety of user queries. However, this has also raised concerns about the potential misuse of such texts in journalism, education, and academia. In this study, we strive to create automated systems that can detect machine-generated texts and pinpoint potential misuse. We first introduce a la…
▽ More
Large language models (LLMs) have demonstrated remarkable capability to generate fluent responses to a wide variety of user queries. However, this has also raised concerns about the potential misuse of such texts in journalism, education, and academia. In this study, we strive to create automated systems that can detect machine-generated texts and pinpoint potential misuse. We first introduce a large-scale benchmark \textbf{M4}, which is a multi-generator, multi-domain, and multi-lingual corpus for machine-generated text detection. Through an extensive empirical study of this dataset, we show that it is challenging for detectors to generalize well on instances from unseen domains or LLMs. In such cases, detectors tend to misclassify machine-generated text as human-written. These results show that the problem is far from solved and that there is a lot of room for improvement. We believe that our dataset will enable future research towards more robust approaches to this pressing societal problem. The dataset is available at https://github.com/mbzuai-nlp/M4.
△ Less
Submitted 9 March, 2024; v1 submitted 24 May, 2023;
originally announced May 2023.
-
HICO-DET-SG and V-COCO-SG: New Data Splits for Evaluating the Systematic Generalization Performance of Human-Object Interaction Detection Models
Authors:
Kentaro Takemoto,
Moyuru Yamada,
Tomotake Sasaki,
Hisanao Akima
Abstract:
Human-Object Interaction (HOI) detection is a task to localize humans and objects in an image and predict the interactions in human-object pairs. In real-world scenarios, HOI detection models need systematic generalization, i.e., generalization to novel combinations of objects and interactions, because the train data are expected to cover a limited portion of all possible combinations. To evaluate…
▽ More
Human-Object Interaction (HOI) detection is a task to localize humans and objects in an image and predict the interactions in human-object pairs. In real-world scenarios, HOI detection models need systematic generalization, i.e., generalization to novel combinations of objects and interactions, because the train data are expected to cover a limited portion of all possible combinations. To evaluate the systematic generalization performance of HOI detection models, we created two new sets of HOI detection data splits named HICO-DET-SG and V-COCO-SG based on the HICO-DET and V-COCO datasets, respectively. When evaluated on the new data splits, HOI detection models with various characteristics performed much more poorly than when evaluated on the original splits. This shows that systematic generalization is a challenging goal in HOI detection. By analyzing the evaluation results, we also gain insights for improving the systematic generalization performance and identify four possible future research directions. We hope that our new data splits and presented analysis will encourage further research on systematic generalization in HOI detection.
△ Less
Submitted 11 April, 2024; v1 submitted 17 May, 2023;
originally announced May 2023.
-
SolefulTap: Augmenting Tap Dancing Experience using a Floor-Type Impact Display
Authors:
Tomoya Sasaki,
Narin Okazaki,
Takatoshi Yoshida,
Alfonso Balandra,
Zendai Kashino,
Masahiko Inami
Abstract:
We propose SolefulTap for a novel tap dancing experience. It allows users to feel as if they are tap dancing or appreciate a tap dancing performance using the sensations of their own feet. SolefulTap uses a method called Step Augmentation that provides audio-haptic feedback to users, generating impacts in response to users' simple step motions. Our prototype uses a floor-type impact display consis…
▽ More
We propose SolefulTap for a novel tap dancing experience. It allows users to feel as if they are tap dancing or appreciate a tap dancing performance using the sensations of their own feet. SolefulTap uses a method called Step Augmentation that provides audio-haptic feedback to users, generating impacts in response to users' simple step motions. Our prototype uses a floor-type impact display consisting of pressure sensors, which detect users' steps, and solenoids, which generate feedback through impact. Through a preliminary user study, we confirmed that the system can provide untrained users with the experience of tap dancing. This study serves as a case study that provides insight into how a reactive environment can affect the human capabilities of physical expression and the sensation experienced.
△ Less
Submitted 1 April, 2023;
originally announced April 2023.
-
Deephys: Deep Electrophysiology, Debugging Neural Networks under Distribution Shifts
Authors:
Anirban Sarkar,
Matthew Groth,
Ian Mason,
Tomotake Sasaki,
Xavier Boix
Abstract:
Deep Neural Networks (DNNs) often fail in out-of-distribution scenarios. In this paper, we introduce a tool to visualize and understand such failures. We draw inspiration from concepts from neural electrophysiology, which are based on inspecting the internal functioning of a neural networks by analyzing the feature tuning and invariances of individual units. Deep Electrophysiology, in short Deephy…
▽ More
Deep Neural Networks (DNNs) often fail in out-of-distribution scenarios. In this paper, we introduce a tool to visualize and understand such failures. We draw inspiration from concepts from neural electrophysiology, which are based on inspecting the internal functioning of a neural networks by analyzing the feature tuning and invariances of individual units. Deep Electrophysiology, in short Deephys, provides insights of the DNN's failures in out-of-distribution scenarios by comparative visualization of the neural activity in in-distribution and out-of-distribution datasets. Deephys provides seamless analyses of individual neurons, individual images, and a set of set of images from a category, and it is capable of revealing failures due to the presence of spurious features and novel features. We substantiate the validity of the qualitative visualizations of Deephys thorough quantitative analyses using convolutional and transformers architectures, in several datasets and distribution shifts (namely, colored MNIST, CIFAR-10 and ImageNet).
△ Less
Submitted 17 March, 2023;
originally announced March 2023.
-
The evolution of cooperation and diversity by integrated indirect reciprocity
Authors:
Tatsuya Sasaki,
Satoshi Uchida,
Isamu Okada,
Hitoshi Yamamoto
Abstract:
Indirect reciprocity is one of the major mechanisms for the evolution of cooperation in human societies. There are two types of indirect reciprocity: upstream and downstream. Cooperation in downstream reciprocity follows the pattern, 'You helped someone, and I will help you'. The direction of cooperation is reversed in upstream reciprocity, which instead follows the pattern, 'You helped me, and I…
▽ More
Indirect reciprocity is one of the major mechanisms for the evolution of cooperation in human societies. There are two types of indirect reciprocity: upstream and downstream. Cooperation in downstream reciprocity follows the pattern, 'You helped someone, and I will help you'. The direction of cooperation is reversed in upstream reciprocity, which instead follows the pattern, 'You helped me, and I will help someone else'. In reality, these two types of indirect reciprocity often occur in combination. However, upstream and downstream reciprocity have mostly been studied theoretically in isolation. Here, we propose a new model that integrates both types. We apply the standard giving-game framework of indirect reciprocity and analyze the model by means of evolutionary game theory. We show that the model can result in the stable coexistence of altruistic reciprocators and free riders in well-mixed populations. We also found that considering inattention in the assessment rule can strengthen the stability of this mixed equilibrium, even resulting in a global attractor. Our results indicate that the cycles of forwarding help and rewarding help need to be established for creating and maintaining diversity and inclusion in a society.
△ Less
Submitted 8 March, 2023;
originally announced March 2023.
-
Safe Exploration Method for Reinforcement Learning under Existence of Disturbance
Authors:
Yoshihiro Okawa,
Tomotake Sasaki,
Hitoshi Yanami,
Toru Namerikawa
Abstract:
Recent rapid developments in reinforcement learning algorithms have been giving us novel possibilities in many fields. However, due to their exploring property, we have to take the risk into consideration when we apply those algorithms to safety-critical problems especially in real environments. In this study, we deal with a safe exploration problem in reinforcement learning under the existence of…
▽ More
Recent rapid developments in reinforcement learning algorithms have been giving us novel possibilities in many fields. However, due to their exploring property, we have to take the risk into consideration when we apply those algorithms to safety-critical problems especially in real environments. In this study, we deal with a safe exploration problem in reinforcement learning under the existence of disturbance. We define the safety during learning as satisfaction of the constraint conditions explicitly defined in terms of the state and propose a safe exploration method that uses partial prior knowledge of a controlled object and disturbance. The proposed method assures the satisfaction of the explicit state constraints with a pre-specified probability even if the controlled object is exposed to a stochastic disturbance following a normal distribution. As theoretical results, we introduce sufficient conditions to construct conservative inputs not containing an exploring aspect used in the proposed method and prove that the safety in the above explained sense is guaranteed with the proposed method. Furthermore, we illustrate the validity and effectiveness of the proposed method through numerical simulations of an inverted pendulum and a four-bar parallel link robot manipulator.
△ Less
Submitted 20 March, 2023; v1 submitted 30 September, 2022;
originally announced September 2022.
-
Transformer Module Networks for Systematic Generalization in Visual Question Answering
Authors:
Moyuru Yamada,
Vanessa D'Amario,
Kentaro Takemoto,
Xavier Boix,
Tomotake Sasaki
Abstract:
Transformers achieve great performance on Visual Question Answering (VQA). However, their systematic generalization capabilities, i.e., handling novel combinations of known concepts, is unclear. We reveal that Neural Module Networks (NMNs), i.e., question-specific compositions of modules that tackle a sub-task, achieve better or similar systematic generalization performance than the conventional T…
▽ More
Transformers achieve great performance on Visual Question Answering (VQA). However, their systematic generalization capabilities, i.e., handling novel combinations of known concepts, is unclear. We reveal that Neural Module Networks (NMNs), i.e., question-specific compositions of modules that tackle a sub-task, achieve better or similar systematic generalization performance than the conventional Transformers, even though NMNs' modules are CNN-based. In order to address this shortcoming of Transformers with respect to NMNs, in this paper we investigate whether and how modularity can bring benefits to Transformers. Namely, we introduce Transformer Module Network (TMN), a novel NMN based on compositions of Transformer modules. TMNs achieve state-of-the-art systematic generalization performance in three VQA datasets, improving more than 30% over standard Transformers for novel compositions of sub-tasks. We show that not only the module composition but also the module specialization for each sub-task are the key of such performance gain.
△ Less
Submitted 17 March, 2023; v1 submitted 26 January, 2022;
originally announced January 2022.
-
Do Neural Networks for Segmentation Understand Insideness?
Authors:
Kimberly Villalobos,
Vilim Štih,
Amineh Ahmadinejad,
Shobhita Sundaram,
Jamell Dozier,
Andrew Francl,
Frederico Azevedo,
Tomotake Sasaki,
Xavier Boix
Abstract:
The insideness problem is an aspect of image segmentation that consists of determining which pixels are inside and outside a region. Deep Neural Networks (DNNs) excel in segmentation benchmarks, but it is unclear if they have the ability to solve the insideness problem as it requires evaluating long-range spatial dependencies. In this paper, the insideness problem is analysed in isolation, without…
▽ More
The insideness problem is an aspect of image segmentation that consists of determining which pixels are inside and outside a region. Deep Neural Networks (DNNs) excel in segmentation benchmarks, but it is unclear if they have the ability to solve the insideness problem as it requires evaluating long-range spatial dependencies. In this paper, the insideness problem is analysed in isolation, without texture or semantic cues, such that other aspects of segmentation do not interfere in the analysis. We demonstrate that DNNs for segmentation with few units have sufficient complexity to solve insideness for any curve. Yet, such DNNs have severe problems with learning general solutions. Only recurrent networks trained with small images learn solutions that generalize well to almost any curve. Recurrent networks can decompose the evaluation of long-range dependencies into a sequence of local operations, and learning with small images alleviates the common difficulties of training recurrent networks with a large number of unrolling steps.
△ Less
Submitted 25 January, 2022;
originally announced January 2022.
-
Symmetry Perception by Deep Networks: Inadequacy of Feed-Forward Architectures and Improvements with Recurrent Connections
Authors:
Shobhita Sundaram,
Darius Sinha,
Matthew Groth,
Tomotake Sasaki,
Xavier Boix
Abstract:
Symmetry is omnipresent in nature and perceived by the visual system of many species, as it facilitates detecting ecologically important classes of objects in our environment. Symmetry perception requires abstraction of long-range spatial dependencies between image regions, and its underlying neural mechanisms remain elusive. In this paper, we evaluate Deep Neural Network (DNN) architectures on th…
▽ More
Symmetry is omnipresent in nature and perceived by the visual system of many species, as it facilitates detecting ecologically important classes of objects in our environment. Symmetry perception requires abstraction of long-range spatial dependencies between image regions, and its underlying neural mechanisms remain elusive. In this paper, we evaluate Deep Neural Network (DNN) architectures on the task of learning symmetry perception from examples. We demonstrate that feed-forward DNNs that excel at modelling human performance on object recognition tasks, are unable to acquire a general notion of symmetry. This is the case even when the DNNs are architected to capture long-range spatial dependencies, such as through `dilated' convolutions and the recently introduced `transformers' design. By contrast, we find that recurrent architectures are capable of learning to perceive symmetry by decomposing the long-range spatial dependencies into a sequence of local operations, that are reusable for novel images. These results suggest that recurrent connections likely play an important role in symmetry perception in artificial systems, and possibly, biological ones too.
△ Less
Submitted 21 January, 2022; v1 submitted 8 December, 2021;
originally announced December 2021.
-
Three approaches to facilitate DNN generalization to objects in out-of-distribution orientations and illuminations
Authors:
Akira Sakai,
Taro Sunagawa,
Spandan Madan,
Kanata Suzuki,
Takashi Katoh,
Hiromichi Kobashi,
Hanspeter Pfister,
Pawan Sinha,
Xavier Boix,
Tomotake Sasaki
Abstract:
The training data distribution is often biased towards objects in certain orientations and illumination conditions. While humans have a remarkable capability of recognizing objects in out-of-distribution (OoD) orientations and illuminations, Deep Neural Networks (DNNs) severely suffer in this case, even when large amounts of training examples are available. In this paper, we investigate three diff…
▽ More
The training data distribution is often biased towards objects in certain orientations and illumination conditions. While humans have a remarkable capability of recognizing objects in out-of-distribution (OoD) orientations and illuminations, Deep Neural Networks (DNNs) severely suffer in this case, even when large amounts of training examples are available. In this paper, we investigate three different approaches to improve DNNs in recognizing objects in OoD orientations and illuminations. Namely, these are (i) training much longer after convergence of the in-distribution (InD) validation accuracy, i.e., late-stop**, (ii) tuning the momentum parameter of the batch normalization layers, and (iii) enforcing invariance of the neural activity in an intermediate layer to orientation and illumination conditions. Each of these approaches substantially improves the DNN's OoD accuracy (more than 20% in some cases). We report results in four datasets: two datasets are modified from the MNIST and iLab datasets, and the other two are novel (one of 3D rendered cars and another of objects taken from various controlled orientations and illumination conditions). These datasets allow to study the effects of different amounts of bias and are challenging as DNNs perform poorly in OoD conditions. Finally, we demonstrate that even though the three approaches focus on different aspects of DNNs, they all tend to lead to the same underlying neural mechanism to enable OoD accuracy gains --individual neurons in the intermediate layers become more selective to a category and also invariant to OoD orientations and illuminations. We anticipate this study to be a basis for further improvement of deep neural networks' OoD generalization performance, which is highly demanded to achieve safe and fair AI applications.
△ Less
Submitted 25 January, 2022; v1 submitted 29 October, 2021;
originally announced November 2021.
-
Annotation Cost Reduction of Stream-based Active Learning by Automated Weak Labeling using a Robot Arm
Authors:
Kanata Suzuki,
Taro Sunagawa,
Tomotake Sasaki,
Takashi Katoh
Abstract:
Stream-based active learning (AL) is an efficient training data collection method, and it is used to reduce human annotation cost required in machine learning. However, it is difficult to say that the human cost is low enough because most previous studies have assumed that an oracle is a human with domain knowledge. In this study, we propose a method to replace a part of the oracle's work in strea…
▽ More
Stream-based active learning (AL) is an efficient training data collection method, and it is used to reduce human annotation cost required in machine learning. However, it is difficult to say that the human cost is low enough because most previous studies have assumed that an oracle is a human with domain knowledge. In this study, we propose a method to replace a part of the oracle's work in stream-based AL by self-training with weak labeling using a robot arm. A camera attached to a robot arm takes a series of image data related to a streamed object, which should have the same label. We use this information as a weak label to connect a pseudo-label (estimated class label) and a target instance. Our method selects two data from a series of image data; high confidence data for correcting pseudo-labels and low confidence data for improving the performance of the classifier. We paired a pseudo-label provided to high confidence data with a target instance (low confidence data). By using this technique, we mitigate the inefficiency in self-training, that is, difficulty in creating pseudo-labeled training data with a high impact on the target classifier. In the experiments, we employed the proposed method in the classification task of objects on a belt conveyor. We evaluated the performance against human cost on multiple scenarios considering the temporal variation of data. The proposed method achieves the same or better performance as the conventional methods while reducing human cost.
△ Less
Submitted 3 October, 2021;
originally announced October 2021.
-
Emergent Neural Network Mechanisms for Generalization to Objects in Novel Orientations
Authors:
Avi Cooper,
Xavier Boix,
Daniel Harari,
Spandan Madan,
Hanspeter Pfister,
Tomotake Sasaki,
Pawan Sinha
Abstract:
The capability of Deep Neural Networks (DNNs) to recognize objects in orientations outside the distribution of the training data is not well understood. We present evidence that DNNs are capable of generalizing to objects in novel orientations by disseminating orientation-invariance obtained from familiar objects seen from many viewpoints. This capability strengthens when training the DNN with an…
▽ More
The capability of Deep Neural Networks (DNNs) to recognize objects in orientations outside the distribution of the training data is not well understood. We present evidence that DNNs are capable of generalizing to objects in novel orientations by disseminating orientation-invariance obtained from familiar objects seen from many viewpoints. This capability strengthens when training the DNN with an increasing number of familiar objects, but only in orientations that involve 2D rotations of familiar orientations. We show that this dissemination is achieved via neurons tuned to common features between familiar and unfamiliar objects. These results implicate brain-like neural mechanisms for generalization.
△ Less
Submitted 13 July, 2023; v1 submitted 27 September, 2021;
originally announced September 2021.
-
The Foes of Neural Network's Data Efficiency Among Unnecessary Input Dimensions
Authors:
Vanessa D'Amario,
Sanjana Srivastava,
Tomotake Sasaki,
Xavier Boix
Abstract:
Datasets often contain input dimensions that are unnecessary to predict the output label, e.g. background in object recognition, which lead to more trainable parameters. Deep Neural Networks (DNNs) are robust to increasing the number of parameters in the hidden layers, but it is unclear whether this holds true for the input layer. In this letter, we investigate the impact of unnecessary input dime…
▽ More
Datasets often contain input dimensions that are unnecessary to predict the output label, e.g. background in object recognition, which lead to more trainable parameters. Deep Neural Networks (DNNs) are robust to increasing the number of parameters in the hidden layers, but it is unclear whether this holds true for the input layer. In this letter, we investigate the impact of unnecessary input dimensions on a central issue of DNNs: their data efficiency, ie. the amount of examples needed to achieve certain generalization performance. Our results show that unnecessary input dimensions that are task-unrelated substantially degrade data efficiency. This highlights the need for mechanisms that remove {task-unrelated} dimensions to enable data efficiency gains.
△ Less
Submitted 13 July, 2021;
originally announced July 2021.
-
Adversarial examples within the training distribution: A widespread challenge
Authors:
Spandan Madan,
Tomotake Sasaki,
Hanspeter Pfister,
Tzu-Mao Li,
Xavier Boix
Abstract:
Despite a plethora of proposed theories, understanding why deep neural networks are susceptible to adversarial attacks remains an open question. A promising recent strand of research investigates adversarial attacks within the training data distribution, providing a more stringent and worrisome definition for these attacks. These theories posit that the key issue is that in high dimensional datase…
▽ More
Despite a plethora of proposed theories, understanding why deep neural networks are susceptible to adversarial attacks remains an open question. A promising recent strand of research investigates adversarial attacks within the training data distribution, providing a more stringent and worrisome definition for these attacks. These theories posit that the key issue is that in high dimensional datasets, most data points are close to the ground-truth class boundaries. This has been shown in theory for some simple data distributions, but it is unclear if this theory is relevant in practice. Here, we demonstrate the existence of in-distribution adversarial examples for object recognition. This result provides evidence supporting theories attributing adversarial examples to the proximity of data to ground-truth class boundaries, and calls into question other theories which do not account for this more stringent definition of adversarial attacks. These experiments are enabled by our novel gradient-free, evolutionary strategies (ES) based approach for finding in-distribution adversarial examples in 3D rendered objects, which we call CMA-Search.
△ Less
Submitted 17 February, 2023; v1 submitted 30 June, 2021;
originally announced June 2021.
-
How Modular Should Neural Module Networks Be for Systematic Generalization?
Authors:
Vanessa D'Amario,
Tomotake Sasaki,
Xavier Boix
Abstract:
Neural Module Networks (NMNs) aim at Visual Question Answering (VQA) via composition of modules that tackle a sub-task. NMNs are a promising strategy to achieve systematic generalization, i.e., overcoming biasing factors in the training distribution. However, the aspects of NMNs that facilitate systematic generalization are not fully understood. In this paper, we demonstrate that the degree of mod…
▽ More
Neural Module Networks (NMNs) aim at Visual Question Answering (VQA) via composition of modules that tackle a sub-task. NMNs are a promising strategy to achieve systematic generalization, i.e., overcoming biasing factors in the training distribution. However, the aspects of NMNs that facilitate systematic generalization are not fully understood. In this paper, we demonstrate that the degree of modularity of the NMN have large influence on systematic generalization. In a series of experiments on three VQA datasets (VQA-MNIST, SQOOP, and CLEVR-CoGenT), our results reveal that tuning the degree of modularity, especially at the image encoder stage, reaches substantially higher systematic generalization. These findings lead to new NMN architectures that outperform previous ones in terms of systematic generalization.
△ Less
Submitted 15 January, 2022; v1 submitted 15 June, 2021;
originally announced June 2021.
-
Two-step reinforcement learning for model-free redesign of nonlinear optimal regulator
Authors:
Mei Minami,
Yuka Masumoto,
Yoshihiro Okawa,
Tomotake Sasaki,
Yutaka Hori
Abstract:
In many practical control applications, the performance level of a closed-loop system degrades over time due to the change of plant characteristics. Thus, there is a strong need for redesigning a controller without going through the system modeling process, which is often difficult for closed-loop systems. Reinforcement learning (RL) is one of the promising approaches that enable model-free redesi…
▽ More
In many practical control applications, the performance level of a closed-loop system degrades over time due to the change of plant characteristics. Thus, there is a strong need for redesigning a controller without going through the system modeling process, which is often difficult for closed-loop systems. Reinforcement learning (RL) is one of the promising approaches that enable model-free redesign of optimal controllers for nonlinear dynamical systems based only on the measurement of the closed-loop system. However, the learning process of RL usually requires a considerable number of trial-and-error experiments using the poorly controlled system that may accumulate wear on the plant. To overcome this limitation, we propose a model-free two-step design approach that improves the transient learning performance of RL in an optimal regulator redesign problem for unknown nonlinear systems. Specifically, we first design a linear control law that attains some degree of control performance in a model-free manner, and then, train the nonlinear optimal control law with online RL by using the designed linear control law in parallel. We introduce an offline RL algorithm for the design of the linear control law and theoretically guarantee its convergence to the LQR controller under mild assumptions. Numerical simulations show that the proposed approach improves the transient learning performance and efficiency in hyperparameter tuning of RL.
△ Less
Submitted 30 November, 2023; v1 submitted 5 March, 2021;
originally announced March 2021.
-
Automatic Exploration Process Adjustment for Safe Reinforcement Learning with Joint Chance Constraint Satisfaction
Authors:
Yoshihiro Okawa,
Tomotake Sasaki,
Hidenao Iwane
Abstract:
In reinforcement learning (RL) algorithms, exploratory control inputs are used during learning to acquire knowledge for decision making and control, while the true dynamics of a controlled object is unknown. However, this exploring property sometimes causes undesired situations by violating constraints regarding the state of the controlled object. In this paper, we propose an automatic exploration…
▽ More
In reinforcement learning (RL) algorithms, exploratory control inputs are used during learning to acquire knowledge for decision making and control, while the true dynamics of a controlled object is unknown. However, this exploring property sometimes causes undesired situations by violating constraints regarding the state of the controlled object. In this paper, we propose an automatic exploration process adjustment method for safe RL in continuous state and action spaces utilizing a linear nominal model of the controlled object. Specifically, our proposed method automatically selects whether the exploratory input is used or not at each time depending on the state and its predicted value as well as adjusts the variance-covariance matrix used in the Gaussian policy for exploration. We also show that our exploration process adjustment method theoretically guarantees the satisfaction of the constraints with the pre-specified probability, that is, the satisfaction of a joint chance constraint at every time. Finally, we illustrate the validity and the effectiveness of our method through numerical simulation.
△ Less
Submitted 5 March, 2021;
originally announced March 2021.
-
Where to Map? Iterative Rover-Copter Path Planning for Mars Exploration
Authors:
Takahiro Sasaki,
Kyohei Otsu,
Rohan Thakker,
Sofie Haesaert,
Ali-akbar Agha-mohammadi
Abstract:
In addition to conventional ground rovers, the Mars 2020 mission will send a helicopter to Mars. The copter's high-resolution data helps the rover to identify small hazards such as steps and pointy rocks, as well as providing rich textual information useful to predict perception performance. In this paper, we consider a three-agent system composed of a Mars rover, copter, and orbiter. The objectiv…
▽ More
In addition to conventional ground rovers, the Mars 2020 mission will send a helicopter to Mars. The copter's high-resolution data helps the rover to identify small hazards such as steps and pointy rocks, as well as providing rich textual information useful to predict perception performance. In this paper, we consider a three-agent system composed of a Mars rover, copter, and orbiter. The objective is to provide good localization to the rover by selecting an optimal path that minimizes the localization uncertainty accumulation during the rover's traverse. To achieve this goal, we quantify the localizability as a goodness measure associated with the map, and conduct a joint-space search over rover's path and copter's perceptual actions given prior information from the orbiter. We jointly address where to map by the copter and where to drive by the rover using the proposed iterative copter-rover path planner. We conducted numerical simulations using the map of Mars 2020 landing site to demonstrate the effectiveness of the proposed planner.
△ Less
Submitted 17 August, 2020;
originally announced August 2020.
-
Security Architecture for Trustworthy Systems in 5G Era
Authors:
Takayuki Sasaki,
Shuichi Karino,
Mikiya Tani,
Kazuaki Nakajima,
Koki Tomita,
Norio Yamagaki
Abstract:
Systems using 5G are expected to be used in various cases of Society 5.0 and Industrie 4.0 such as smart cities, smart factories, and also critical infrastructures. These systems are essential for our life, thus cyberattacks against the system must be prevented. In this paper, we tackle two problems posed by 5G features: system construction using multi-vendor devices and softwarized functions. Spe…
▽ More
Systems using 5G are expected to be used in various cases of Society 5.0 and Industrie 4.0 such as smart cities, smart factories, and also critical infrastructures. These systems are essential for our life, thus cyberattacks against the system must be prevented. In this paper, we tackle two problems posed by 5G features: system construction using multi-vendor devices and softwarized functions. Specifically, there are supply-chain risks that malicious devices are used in the construction phase. Moreover, the softwarized network functions are easy to be attacked compared to hardware. To cope with these problems, we propose a concept of architecture comprising a blockchain to record security events including supply-chain information and a tamper detection engine to ensure the integrity of software components in 5G system. We implement the initial prototype of the architecture and show its feasibility.
△ Less
Submitted 29 July, 2020;
originally announced July 2020.
-
Towards a Backdoorless Network Architecture Based on Remote Attestation and Backdoor Inspection
Authors:
Takayuki Sasaki,
Yusuke Shimada
Abstract:
To keep a system secure, all devices in the system need to be benign. To avoid malicious and/or compromised devices, network access control such as authentication using a credential and remote attestation based on trusted hardware has been used. These techniques ensure the authenticity and integrity of the devices, but do not mitigate risks of a backdoor embedded in the devices by the developer. T…
▽ More
To keep a system secure, all devices in the system need to be benign. To avoid malicious and/or compromised devices, network access control such as authentication using a credential and remote attestation based on trusted hardware has been used. These techniques ensure the authenticity and integrity of the devices, but do not mitigate risks of a backdoor embedded in the devices by the developer. To tackle this problem, we propose a novel architecture that integrates remote attestation and backdoor inspection. Specifically, the backdoor inspection result is stored in a server and the verifier retrieves and checks the backdoor inspection result when the remote attestation is performed. Moreover, we discuss issues to deploy the proposed architecture to the real world.
△ Less
Submitted 20 August, 2020; v1 submitted 29 July, 2020;
originally announced July 2020.
-
When and how CNNs generalize to out-of-distribution category-viewpoint combinations
Authors:
Spandan Madan,
Timothy Henry,
Jamell Dozier,
Helen Ho,
Nishchal Bhandari,
Tomotake Sasaki,
Frédo Durand,
Hanspeter Pfister,
Xavier Boix
Abstract:
Object recognition and viewpoint estimation lie at the heart of visual understanding. Recent works suggest that convolutional neural networks (CNNs) fail to generalize to out-of-distribution (OOD) category-viewpoint combinations, ie. combinations not seen during training. In this paper, we investigate when and how such OOD generalization may be possible by evaluating CNNs trained to classify both…
▽ More
Object recognition and viewpoint estimation lie at the heart of visual understanding. Recent works suggest that convolutional neural networks (CNNs) fail to generalize to out-of-distribution (OOD) category-viewpoint combinations, ie. combinations not seen during training. In this paper, we investigate when and how such OOD generalization may be possible by evaluating CNNs trained to classify both object category and 3D viewpoint on OOD combinations, and identifying the neural mechanisms that facilitate such OOD generalization. We show that increasing the number of in-distribution combinations (ie. data diversity) substantially improves generalization to OOD combinations, even with the same amount of training data. We compare learning category and viewpoint in separate and shared network architectures, and observe starkly different trends on in-distribution and OOD combinations, ie. while shared networks are helpful in-distribution, separate networks significantly outperform shared ones at OOD combinations. Finally, we demonstrate that such OOD generalization is facilitated by the neural mechanism of specialization, ie. the emergence of two types of neurons -- neurons selective to category and invariant to viewpoint, and vice versa.
△ Less
Submitted 17 November, 2021; v1 submitted 15 July, 2020;
originally announced July 2020.
-
Keyword Assisted Topic Models
Authors:
Shusei Eshima,
Kosuke Imai,
Tomoya Sasaki
Abstract:
In recent years, fully automated content analysis based on probabilistic topic models has become popular among social scientists because of their scalability. The unsupervised nature of the models makes them suitable for exploring topics in a corpus without prior knowledge. However, researchers find that these models often fail to measure specific concepts of substantive interest by inadvertently…
▽ More
In recent years, fully automated content analysis based on probabilistic topic models has become popular among social scientists because of their scalability. The unsupervised nature of the models makes them suitable for exploring topics in a corpus without prior knowledge. However, researchers find that these models often fail to measure specific concepts of substantive interest by inadvertently creating multiple topics with similar content and combining distinct themes into a single topic. In this paper, we empirically demonstrate that providing a small number of keywords can substantially enhance the measurement performance of topic models. An important advantage of the proposed keyword assisted topic model (keyATM) is that the specification of keywords requires researchers to label topics prior to fitting a model to the data. This contrasts with a widespread practice of post-hoc topic interpretation and adjustments that compromises the objectivity of empirical findings. In our application, we find that keyATM provides more interpretable results, has better document classification performance, and is less sensitive to the number of topics than the standard topic models. Finally, we show that keyATM can also incorporate covariates and model time trends. An open-source software package is available for implementing the proposed methodology.
△ Less
Submitted 2 February, 2023; v1 submitted 13 April, 2020;
originally announced April 2020.
-
Rate-Distortion Optimization Guided Autoencoder for Isometric Embedding in Euclidean Latent Space
Authors:
Keizo Kato,
**g Zhou,
Tomotake Sasaki,
Akira Nakagawa
Abstract:
To analyze high-dimensional and complex data in the real world, deep generative models, such as variational autoencoder (VAE) embed data in a low-dimensional space (latent space) and learn a probabilistic model in the latent space. However, they struggle to accurately reproduce the probability distribution function (PDF) in the input space from that in the latent space. If the embedding were isome…
▽ More
To analyze high-dimensional and complex data in the real world, deep generative models, such as variational autoencoder (VAE) embed data in a low-dimensional space (latent space) and learn a probabilistic model in the latent space. However, they struggle to accurately reproduce the probability distribution function (PDF) in the input space from that in the latent space. If the embedding were isometric, this issue can be solved, because the relation of PDFs can become tractable. To achieve isometric property, we propose Rate- Distortion Optimization guided autoencoder inspired by orthonormal transform coding. We show our method has the following properties: (i) the Jacobian matrix between the input space and a Euclidean latent space forms a constantlyscaled orthonormal system and enables isometric data embedding; (ii) the relation of PDFs in both spaces can become tractable one such as proportional relation. Furthermore, our method outperforms state-of-the-art methods in unsupervised anomaly detection with four public datasets.
△ Less
Submitted 30 August, 2020; v1 submitted 9 October, 2019;
originally announced October 2019.
-
Bayesian Spectral Deconvolution Based on Poisson Distribution: Bayesian Measurement and Virtual Measurement Analytics (VMA)
Authors:
Kenji Nagata,
Yoh-ichi Mototake,
Rei Muraoka,
Takehiko Sasaki,
Masato Okada
Abstract:
In this paper, we propose a new method of Bayesian measurement for spectral deconvolution, which regresses spectral data into the sum of unimodal basis function such as Gaussian or Lorentzian functions. Bayesian measurement is a framework for considering not only the target physical model but also the measurement model as a probabilistic model, and enables us to estimate the parameter of a physica…
▽ More
In this paper, we propose a new method of Bayesian measurement for spectral deconvolution, which regresses spectral data into the sum of unimodal basis function such as Gaussian or Lorentzian functions. Bayesian measurement is a framework for considering not only the target physical model but also the measurement model as a probabilistic model, and enables us to estimate the parameter of a physical model with its confidence interval through a Bayesian posterior distribution given a measurement data set. The measurement with Poisson noise is one of the most effective system to apply our proposed method. Since the measurement time is strongly related to the signal-to-noise ratio for the Poisson noise model, Bayesian measurement with Poisson noise model enables us to clarify the relationship between the measurement time and the limit of estimation. In this study, we establish the probabilistic model with Poisson noise for spectral deconvolution. Bayesian measurement enables us to perform virtual and computer simulation for a certain measurement through the established probabilistic model. This property is called "Virtual Measurement Analytics(VMA)" in this paper. We also show that the relationship between the measurement time and the limit of estimation can be extracted by using the proposed method in a simulation of synthetic data and real data for XPS measurement of MoS$_2$.
△ Less
Submitted 11 December, 2018;
originally announced December 2018.
-
A solution for secure use of Kibana and Elasticsearch in multi-user environment
Authors:
Wataru Takase,
Tomoaki Nakamura,
Yoshiyuki Watase,
Takashi Sasaki
Abstract:
Monitoring is indispensable to check status, activities, or resource usage of IT services. A combination of Kibana and Elasticsearch is used for monitoring in many places such as KEK, CC-IN2P3, CERN, and also non-HEP communities. Kibana provides a web interface for rich visualization, and Elasticsearch is a scalable distributed search engine. However, these tools do not support authentication and…
▽ More
Monitoring is indispensable to check status, activities, or resource usage of IT services. A combination of Kibana and Elasticsearch is used for monitoring in many places such as KEK, CC-IN2P3, CERN, and also non-HEP communities. Kibana provides a web interface for rich visualization, and Elasticsearch is a scalable distributed search engine. However, these tools do not support authentication and authorization features by default. In the case of single Kibana and Elasticsearch services shared among many users, any user who can access Kibana can retrieve other's information from Elasticsearch. In multi-user environment, in order to protect own data from others or share part of data among a group, fine-grained access control is necessary.
The CERN cloud service group had provided cloud utilization dashboard to each user by Elasticsearch and Kibana. They had deployed a homemade Elasticsearch plugin to restrict data access based on a user authenticated by the CERN Single Sign On system. It enabled each user to have a separated Kibana dashboard for cloud usage, and the user could not access to other's one. Based on the solution, we propose an alternative one which enables user/group based Elasticsearch access control and Kibana objects separation. It is more flexible and can be applied to not only the cloud service but also the other various situations. We confirmed our solution works fine in CC-IN2P3. Moreover, a pre-production platform for CC-IN2P3 has been under construction.
We will describe our solution for the secure use of Kibana and Elasticsearch including integration of Kerberos authentication, development of a Kibana plugin which allows Kibana objects to be separated based on user/group, and contribution to Search Guard which is an Elasticsearch plugin enabling user/group based access control. We will also describe the effect on performance from using Search Guard.
△ Less
Submitted 30 June, 2017;
originally announced June 2017.
-
A norm knockout method on indirect reciprocity to reveal indispensable norms
Authors:
Hitoshi Yamamoto,
Isamu Okada,
Satoshi Uchida,
Tatsuya Sasaki
Abstract:
Although various norms for reciprocity-based cooperation have been suggested that are evolutionarily stable against invasion from free riders, the process of alternation of norms and the role of diversified norms remain unclear in the evolution of cooperation. We clarify the co-evolutionary dynamics of norms and cooperation in indirect reciprocity and also identify the indispensable norms for the…
▽ More
Although various norms for reciprocity-based cooperation have been suggested that are evolutionarily stable against invasion from free riders, the process of alternation of norms and the role of diversified norms remain unclear in the evolution of cooperation. We clarify the co-evolutionary dynamics of norms and cooperation in indirect reciprocity and also identify the indispensable norms for the evolution of cooperation. Inspired by the gene knockout method, a genetic engineering technique, we developed the norm knockout method and clarified the norms necessary for the establishment of cooperation. The results of numerical investigations revealed that the majority of norms gradually transitioned to tolerant norms after defectors are eliminated by strict norms. Furthermore, no cooperation emerges when specific norms that are intolerant to defectors are knocked out.
△ Less
Submitted 11 March, 2017;
originally announced March 2017.
-
The Evolution of Reputation-Based Cooperation in Regular Networks
Authors:
Tatsuya Sasaki,
Hitoshi Yamamoto,
Isamu Okada,
Satoshi Uchida
Abstract:
Despite recent advances in reputation technologies, it is not clear how reputation systems can affect human cooperation in social networks. Although it is known that two of the major mechanisms in the evolution of cooperation are spatial selection and reputation-based reciprocity, theoretical study of the interplay between both mechanisms remains almost uncharted. Here, we present a new individual…
▽ More
Despite recent advances in reputation technologies, it is not clear how reputation systems can affect human cooperation in social networks. Although it is known that two of the major mechanisms in the evolution of cooperation are spatial selection and reputation-based reciprocity, theoretical study of the interplay between both mechanisms remains almost uncharted. Here, we present a new individual-based model for the evolution of reciprocal cooperation between reputation and networks. We comparatively analyze four of the leading moral assessment rules---shunning, image scoring, stern judging, and simple standing---and base the model on the giving game in regular networks for Cooperators, Defectors, and Discriminators. Discriminators rely on a proper moral assessment rule. By using individual-based models, we show that the four assessment rules are differently characterized in terms of how cooperation evolves, depending on the benefit-to-cost ratio, the network-node degree, and the observation and error conditions. Our findings show that the most tolerant rule---simple standing---is the most robust among the four assessment rules in promoting cooperation in regular networks.
△ Less
Submitted 22 January, 2017;
originally announced January 2017.
-
The evolution of conditional moral assessment in indirect reciprocity
Authors:
Tatsuya Sasaki,
Isamu Okada,
Yutaka Nakai
Abstract:
Indirect reciprocity is a major mechanism in the maintenance of cooperation among unrelated individuals. Indirect reciprocity leads to conditional cooperation according to social norms that discriminate the good (those who deserve to be rewarded with help) and the bad (those who should be punished by refusal of help). Despite intensive research, however, there is no definitive consensus on what so…
▽ More
Indirect reciprocity is a major mechanism in the maintenance of cooperation among unrelated individuals. Indirect reciprocity leads to conditional cooperation according to social norms that discriminate the good (those who deserve to be rewarded with help) and the bad (those who should be punished by refusal of help). Despite intensive research, however, there is no definitive consensus on what social norms best promote cooperation through indirect reciprocity, and it remains unclear even how those who refuse to help the bad should be assessed. Here, we propose a new simple norm called "Staying" that prescribes abstaining from assessment. Under the Staying norm, the image of the person who makes the decision to give help stays the same as in the last assessment if the person on the receiving end has a bad image. In this case, the choice about whether or not to give help to the potential receiver does not affect the image of the potential giver. We analyze the Staying norm in terms of evolutionary game theory and demonstrate that Staying is most effective in establishing cooperation compared to the prevailing social norms, which rely on constant monitoring and unconditional assessment. The application of Staying suggests that the strict application of moral judgment is limited.
△ Less
Submitted 4 February, 2017; v1 submitted 7 May, 2016;
originally announced May 2016.
-
SDNsec: Forwarding Accountability for the SDN Data Plane
Authors:
Takayuki Sasaki,
Christos Pappas,
Taeho Lee,
Torsten Hoefler,
Adrian Perrig
Abstract:
SDN promises to make networks more flexible, programmable, and easier to manage. Inherent security problems in SDN today, however, pose a threat to the promised benefits. First, the network operator lacks tools to proactively ensure that policies will be followed or to reactively inspect the behavior of the network. Second, the distributed nature of state updates at the data plane leads to inconsi…
▽ More
SDN promises to make networks more flexible, programmable, and easier to manage. Inherent security problems in SDN today, however, pose a threat to the promised benefits. First, the network operator lacks tools to proactively ensure that policies will be followed or to reactively inspect the behavior of the network. Second, the distributed nature of state updates at the data plane leads to inconsistent network behavior during reconfigurations. Third, the large flow space makes the data plane susceptible to state exhaustion attacks.
This paper presents SDNsec, an SDN security extension that provides forwarding accountability for the SDN data plane. Forwarding rules are encoded in the packet, ensuring consistent network behavior during reconfigurations and limiting state exhaustion attacks due to table lookups. Symmetric-key cryptography is used to protect the integrity of the forwarding rules and enforce them at each switch. A complementary path validation mechanism allows the controller to reactively examine the actual path taken by the packets. Furthermore, we present mechanisms for secure link-failure recovery and multicast/broadcast forwarding.
△ Less
Submitted 15 May, 2016; v1 submitted 6 May, 2016;
originally announced May 2016.
-
Evolution of public cooperation in a monitored society with implicated punishment and within-group enforcement
Authors:
Xiaojie Chen,
Tatsuya Sasaki,
Matjaz Perc
Abstract:
Monitoring with implicated punishment is common in human societies to avert freeriding on common goods. But is it effective in promoting public cooperation? We show that the introduction of monitoring and implicated punishment is indeed effective, as it transforms the public goods game to a coordination game, thus rendering cooperation viable in infinite and finite well-mixed populations. We also…
▽ More
Monitoring with implicated punishment is common in human societies to avert freeriding on common goods. But is it effective in promoting public cooperation? We show that the introduction of monitoring and implicated punishment is indeed effective, as it transforms the public goods game to a coordination game, thus rendering cooperation viable in infinite and finite well-mixed populations. We also show that the addition of within-group enforcement further promotes the evolution of public cooperation. However, although the group size in this context has nonlinear effects on collective action, an intermediate group size is least conductive to cooperative behaviour. This contradicts recent field observations, where an intermediate group size was declared optimal with the conjecture that group-size effects and within-group enforcement are responsible. Our theoretical research thus clarifies key aspects of monitoring with implicated punishment in human societies, and additionally, it reveals fundamental group-size effects that facilitate prosocial collective action.
△ Less
Submitted 19 November, 2015;
originally announced November 2015.
-
Voluntary rewards mediate the evolution of pool punishment for maintaining public goods in large populations
Authors:
Tatsuya Sasaki,
Satoshi Uchida,
Xiaojie Chen
Abstract:
Punishment is a popular tool when governing commons in situations where free riders would otherwise take over. It is well known that sanctioning systems, such as the police and courts, are costly and thus can suffer from those who free ride on other's efforts to maintain the sanctioning systems (second-order free riders). Previous game-theory studies showed that if populations are very large, pool…
▽ More
Punishment is a popular tool when governing commons in situations where free riders would otherwise take over. It is well known that sanctioning systems, such as the police and courts, are costly and thus can suffer from those who free ride on other's efforts to maintain the sanctioning systems (second-order free riders). Previous game-theory studies showed that if populations are very large, pool punishment rarely emerges in public good games, even when participation is optional, because of second-order free riders. Here we show that a matching fund for rewarding cooperation leads to the emergence of pool punishment, despite the presence of second-order free riders. We demonstrate that reward funds can pave the way for a transition from a population of free riders to a population of pool punishers. A key factor in promoting the transition is also to reward those who contribute to pool punishment, yet not abstaining from participation. Reward funds eventually vanish in raising pool punishment, which is sustainable by punishing the second-order free riders. This suggests that considering the interdependence of reward and punishment may help to better understand the origins and transitions of social norms and institutions.
△ Less
Submitted 10 March, 2015;
originally announced March 2015.
-
Unchecked strategy diversification and collapse in continuous voluntary public good games
Authors:
Tatsuya Sasaki,
Åke Brännström,
Isamu Okada,
Tatsuo Unemi
Abstract:
Cooperation or defection and participation or withdrawal are well-known options of behavior in game-like activities in free societies, yet the co-evolutionary dynamics of these behavioral traits in the individual level are not well understood. Here we investigate the continuous voluntary public good game, in which individuals have two types of continuous-valued options: a probability of joining th…
▽ More
Cooperation or defection and participation or withdrawal are well-known options of behavior in game-like activities in free societies, yet the co-evolutionary dynamics of these behavioral traits in the individual level are not well understood. Here we investigate the continuous voluntary public good game, in which individuals have two types of continuous-valued options: a probability of joining the public good game and a level of cooperative investment in the game. Our numerical results reveal hitherto unreported phenomena: (i) The evolutionary dynamics are initially characterized by oscillations in individual cooperation and participation levels, in contrast to the population-level oscillations that have previously been reported. (ii) Eventually, the population's average cooperation and participation levels converge to and stabilize at a center. (iii) Then, a most peculiar phenomenon unfolds: The strategies present in the population diversify and give rise to a "cloud" of tinkering individuals who each tries out a different strategy, and this process continues unchecked as long as the population's cooperation and participation levels remain balanced. Over time, however, imbalances build up as a consequence of random drift and there is a sudden and abrupt collapse of the strategy-diversity cloud. The process then repeats again in a cyclic manner. To understand the three aforementioned phenomena, we investigate the system analytically using adaptive-dynamics techniques. Our analysis casts light on the mechanisms which underpin the unexpected and surprising evolutionary dynamics.
△ Less
Submitted 12 February, 2015;
originally announced February 2015.
-
Rewards and the evolution of cooperation in public good games
Authors:
Tatsuya Sasaki,
Satoshi Uchida
Abstract:
Properly coordinating cooperation is relevant for resolving public good problems such as clean energy and environmental protection. However, little is known about how individuals can coordinate themselves for a certain level of cooperation in large populations of strangers. In a typical situation, a consensus-building process hardly succeeds due to lack of face and standing. The evolution of coope…
▽ More
Properly coordinating cooperation is relevant for resolving public good problems such as clean energy and environmental protection. However, little is known about how individuals can coordinate themselves for a certain level of cooperation in large populations of strangers. In a typical situation, a consensus-building process hardly succeeds due to lack of face and standing. The evolution of cooperation in this type of situation is studied using threshold public good games in which cooperation prevails when it is initially sufficient, or otherwise, it perishes. While punishment is a powerful tool to shape human behaviours, institutional punishment is often too costly to start with only a few contributors, which is another coordination problem. Here we show that whatever the initial conditions, reward funds based on voluntary contribution can evolve. The voluntary reward paves the way for effectively overcoming the coordination problem and efficiently transforms freeloaders to cooperators with a perceived small risk of collective failure.
△ Less
Submitted 23 April, 2016; v1 submitted 21 October, 2013;
originally announced October 2013.
-
Effect of assessment error and private information on stern-judging in indirect reciprocity
Authors:
Satoshi Uchida,
Tatsuya Sasaki
Abstract:
Stern-judging is one of the best-known assessment rules in indirect reciprocity. Indirect reciprocity is a fundamental mechanism for the evolution of cooperation. It relies on mutual monitoring and assessments, i.e., individuals judge, following their own assessment rules, whether other individuals are "good" or "bad" according to information on their past behaviors. Among many assessment rules, s…
▽ More
Stern-judging is one of the best-known assessment rules in indirect reciprocity. Indirect reciprocity is a fundamental mechanism for the evolution of cooperation. It relies on mutual monitoring and assessments, i.e., individuals judge, following their own assessment rules, whether other individuals are "good" or "bad" according to information on their past behaviors. Among many assessment rules, stern-judging is known to provide stable cooperation in a population, as observed when all members in the population know all about others' behaviors (public information case) and when the members never commit an assessment error. In this paper, the effect of assessment error and private information on stern-judging is investigated. By analyzing the image matrix, which describes who is good in the eyes of whom in the population, we analytically show that private information and assessment error cause the collapse of stern-judging: all individuals assess other individuals as "good" at random with a probability of 1/2.
△ Less
Submitted 14 August, 2013;
originally announced August 2013.
-
The evolution of cooperation by social exclusion
Authors:
Tatsuya Sasaki,
Satoshi Uchida
Abstract:
The exclusion of freeriders from common privileges or public acceptance is widely found in the real world. Current models on the evolution of cooperation with incentives mostly assume peer sanctioning, whereby a punisher imposes penalties on freeriders at a cost to itself. It is well known that such costly punishment has two substantial difficulties. First, a rare punishing cooperator barely subve…
▽ More
The exclusion of freeriders from common privileges or public acceptance is widely found in the real world. Current models on the evolution of cooperation with incentives mostly assume peer sanctioning, whereby a punisher imposes penalties on freeriders at a cost to itself. It is well known that such costly punishment has two substantial difficulties. First, a rare punishing cooperator barely subverts the asocial society of freeriders, and second, natural selection often eliminates punishing cooperators in the presence of non-punishing cooperators (namely, "second-order" freeriders). We present a game-theoretical model of social exclusion in which a punishing cooperator can exclude freeriders from benefit sharing. We show that such social exclusion can overcome the above-mentioned difficulties even if it is costly and stochastic. The results do not require a genetic relationship, repeated interaction, reputation, or group selection. Instead, only a limited number of freeriders are required to prevent the second-order freeriders from eroding the social immune system.
△ Less
Submitted 6 December, 2012; v1 submitted 12 November, 2012;
originally announced November 2012.
-
Status Report of the DPHEP Study Group: Towards a Global Effort for Sustainable Data Preservation in High Energy Physics
Authors:
Z. Akopov,
Silvia Amerio,
David Asner,
Eduard Avetisyan,
Olof Barring,
James Beacham,
Matthew Bellis,
Gregorio Bernardi,
Siegfried Bethke,
Amber Boehnlein,
Travis Brooks,
Thomas Browder,
Rene Brun,
Concetta Cartaro,
Marco Cattaneo,
Gang Chen,
David Corney,
Kyle Cranmer,
Ray Culbertson,
Sunje Dallmeier-Tiessen,
Dmitri Denisov,
Cristinel Diaconu,
Vitaliy Dodonov,
Tony Doyle,
Gregory Dubois-Felsmann
, et al. (65 additional authors not shown)
Abstract:
Data from high-energy physics (HEP) experiments are collected with significant financial and human effort and are mostly unique. An inter-experimental study group on HEP data preservation and long-term analysis was convened as a panel of the International Committee for Future Accelerators (ICFA). The group was formed by large collider-based experiments and investigated the technical and organisati…
▽ More
Data from high-energy physics (HEP) experiments are collected with significant financial and human effort and are mostly unique. An inter-experimental study group on HEP data preservation and long-term analysis was convened as a panel of the International Committee for Future Accelerators (ICFA). The group was formed by large collider-based experiments and investigated the technical and organisational aspects of HEP data preservation. An intermediate report was released in November 2009 addressing the general issues of data preservation in HEP. This paper includes and extends the intermediate report. It provides an analysis of the research case for data preservation and a detailed description of the various projects at experiment, laboratory and international levels. In addition, the paper provides a concrete proposal for an international organisation in charge of the data management and policies in high-energy physics.
△ Less
Submitted 21 May, 2012;
originally announced May 2012.
-
A data Grid testbed environment in Gigabit WAN with HPSS
Authors:
Atsushi Manabe,
Kohki Ishikawa,
Yoshihiko Itoh,
Setsuya Kawabata,
Tetsuro Mashimo,
Youhei Morita,
Hiroshi Sakamoto,
Takashi Sasaki,
Hiroyuki Sato,
Junichi Tanaka,
Ikuo Ueda,
Yoshiyuki Watase,
Satomi Yamamoto,
Shigeo Yashiro
Abstract:
For data analysis of large-scale experiments such as LHC Atlas and other Japanese high energy and nuclear physics projects, we have constructed a Grid test bed at ICEPP and KEK. These institutes are connected to national scientific gigabit network backbone called SuperSINET. In our test bed, we have installed NorduGrid middleware based on Globus, and connected 120TB HPSS at KEK as a large scale…
▽ More
For data analysis of large-scale experiments such as LHC Atlas and other Japanese high energy and nuclear physics projects, we have constructed a Grid test bed at ICEPP and KEK. These institutes are connected to national scientific gigabit network backbone called SuperSINET. In our test bed, we have installed NorduGrid middleware based on Globus, and connected 120TB HPSS at KEK as a large scale data store. Atlas simulation data at ICEPP has been transferred and accessed using SuperSINET. We have tested various performances and characteristics of HPSS through this high speed WAN. The measurement includes comparison between computing and storage resources are tightly coupled with low latency LAN and long distant WAN.
△ Less
Submitted 3 September, 2003; v1 submitted 12 June, 2003;
originally announced June 2003.