Skip to main content

Showing 1–15 of 15 results for author: Schröder, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.13999  [pdf, other

    stat.ML cond-mat.dis-nn cs.LG math.ST

    Asymptotics of Learning with Deep Structured (Random) Features

    Authors: Dominik Schröder, Daniil Dmitriev, Hugo Cui, Bruno Loureiro

    Abstract: For a large class of feature maps we provide a tight asymptotic characterisation of the test error associated with learning the readout layer, in the high-dimensional limit where the input dimension, hidden layer widths, and number of training samples are proportionally large. This characterization is formulated in terms of the population covariance of the features. Our work is partially motivated… ▽ More

    Submitted 10 June, 2024; v1 submitted 21 February, 2024; originally announced February 2024.

    Comments: ICML camera-ready version

  2. arXiv:2310.05542  [pdf, other

    cs.SI physics.soc-ph

    Harmful Conspiracies in Temporal Interaction Networks: Understanding the Dynamics of Digital Wildfires through Phase Transitions

    Authors: Kaspara Skovli Gåsvær, Pedro G. Lind, Johannes Langguth, Morten Hjorth-Jensen, Michael Kreil, Daniel Thilo Schroeder

    Abstract: Shortly after the first COVID-19 cases became apparent in December 2020, rumors spread on social media suggesting a connection between the virus and the 5G radiation emanating from the recently deployed telecommunications network. In the course of the following weeks, this idea gained increasing popularity, and various alleged explanations for how such a connection manifests emerged. Ultimately, a… ▽ More

    Submitted 9 October, 2023; originally announced October 2023.

  3. Social media in the Global South: A Network Dataset of the Malian Twittersphere

    Authors: Daniel Thilo Schroeder, Mirjam de Bruijn, Luca Bruls, Mulatu Alemayehu Moges, Samba Dialimpa Badji, Noëmie Fritz, Modibo Galy Cisse, Johannes Langguth, Bruce Mutsvairo, Kristin Skare Orgeret

    Abstract: With the expansion of mobile communications infrastructure, social media usage in the Global South is surging. Compared to the Global North, populations of the Global South have had less prior experience with social media from stationary computers and wired Internet. Many countries are experiencing violent conflicts that have a profound effect on their societies. As a result, social networks devel… ▽ More

    Submitted 24 October, 2023; v1 submitted 25 April, 2023; originally announced April 2023.

    Comments: 12 pages, 4 figures

    Journal ref: Journal of Data Mining & Digital Humanities, 2023 (November 3, 2023) jdmdh:11246

  4. arXiv:2302.00401  [pdf, other

    stat.ML cs.LG

    Deterministic equivalent and error universality of deep random features learning

    Authors: Dominik Schröder, Hugo Cui, Daniil Dmitriev, Bruno Loureiro

    Abstract: This manuscript considers the problem of learning a random Gaussian network function using a fully connected network with frozen intermediate layers and trainable readout layer. This problem can be seen as a natural generalization of the widely studied random features model to deeper architectures. First, we prove Gaussian universality of the test error in a ridge regression setting where the lear… ▽ More

    Submitted 1 February, 2023; originally announced February 2023.

  5. arXiv:2207.09771  [pdf, other

    cs.CV eess.IV

    Localization supervision of chest x-ray classifiers using label-specific eye-tracking annotation

    Authors: Ricardo Bigolin Lanfredi, Joyce D. Schroeder, Tolga Tasdizen

    Abstract: Convolutional neural networks (CNNs) have been successfully applied to chest x-ray (CXR) images. Moreover, annotated bounding boxes have been shown to improve the interpretability of a CNN in terms of localizing abnormalities. However, only a few relatively small CXR datasets containing bounding boxes are available, and collecting them is very costly. Opportunely, eye-tracking (ET) data can be col… ▽ More

    Submitted 14 December, 2022; v1 submitted 20 July, 2022; originally announced July 2022.

  6. arXiv:2204.06539  [pdf, other

    cs.NE

    Switching between Numerical Black-box Optimization Algorithms with Warm-starting Policies

    Authors: Dominik Schröder, Diederick Vermetten, Hao Wang, Carola Doerr, Thomas Bäck

    Abstract: When solving optimization problems with black-box approaches, the algorithms gather valuable information about the problem instance during the optimization process. This information is used to adjust the distributions from which new solution candidates are sampled. In fact, a key objective in evolutionary computation is to identify the most effective ways to collect and exploit instance knowledge.… ▽ More

    Submitted 12 January, 2023; v1 submitted 13 April, 2022; originally announced April 2022.

  7. arXiv:2112.11716  [pdf, other

    cs.CV eess.IV

    Comparing radiologists' gaze and saliency maps generated by interpretability methods for chest x-rays

    Authors: Ricardo Bigolin Lanfredi, Ambuj Arora, Trafton Drew, Joyce D. Schroeder, Tolga Tasdizen

    Abstract: The interpretability of medical image analysis models is considered a key research field. We use a dataset of eye-tracking data from five radiologists to compare the outputs of interpretability methods and the heatmaps representing where radiologists looked. We conduct a class-independent analysis of the saliency maps generated by two methods selected from the literature: Grad-CAM and attention ma… ▽ More

    Submitted 19 April, 2023; v1 submitted 22 December, 2021; originally announced December 2021.

    Comments: This paper was presented as an Extended Abstract at the Gaze Meets ML 2022 Workshop, a NeurIPS 2022 workshop

  8. arXiv:2110.07878  [pdf, other

    eess.IV cs.CV

    Single volume lung biomechanics from chest computed tomography using a mode preserving generative adversarial network

    Authors: Muhammad F. A. Chaudhary, Sarah E. Gerard, Di Wang, Gary E. Christensen, Christopher B. Cooper, Joyce D. Schroeder, Eric A. Hoffman, Joseph M. Reinhardt

    Abstract: Local tissue expansion of the lungs is typically derived by registering computed tomography (CT) scans acquired at multiple lung volumes. However, acquiring multiple scans incurs increased radiation dose, time, and cost, and may not be possible in many cases, thus restricting the applicability of registration-based biomechanics. We propose a generative adversarial learning approach for estimating… ▽ More

    Submitted 15 October, 2021; originally announced October 2021.

    Comments: 5 pages, 5 figures

  9. REFLACX, a dataset of reports and eye-tracking data for localization of abnormalities in chest x-rays

    Authors: Ricardo Bigolin Lanfredi, Mingyuan Zhang, William F. Auffermann, Jessica Chan, Phuong-Anh T. Duong, Vivek Srikumar, Trafton Drew, Joyce D. Schroeder, Tolga Tasdizen

    Abstract: Deep learning has shown recent success in classifying anomalies in chest x-rays, but datasets are still small compared to natural image datasets. Supervision of abnormality localization has been shown to improve trained models, partially compensating for dataset sizes. However, explicitly labeling these anomalies requires an expert and is very time-consuming. We propose a potentially scalable meth… ▽ More

    Submitted 28 June, 2022; v1 submitted 29 September, 2021; originally announced September 2021.

    Comments: Supplementary material included as ancillary files. Update 1: added clarifications and a graph showing the time correlation between gaze and report. Update 2: This preprint has not undergone peer review or any post-submission improvements or corrections. The Version of Record of this article is published in Scientific Data, and is available online at https://doi.org/10.1038/s41597-022-01441-z

  10. arXiv:2105.05115  [pdf, ps, other

    stat.ML cs.LG math.PR

    Analysis of One-Hidden-Layer Neural Networks via the Resolvent Method

    Authors: Vanessa Piccolo, Dominik Schröder

    Abstract: In this work, we investigate the asymptotic spectral density of the random feature matrix $M = Y Y^\ast$ with $Y = f(WX)$ generated by a single-hidden-layer neural network, where $W$ and $X$ are random rectangular matrices with i.i.d. centred entries and $f$ is a non-linear smooth function which is applied entry-wise. We prove that the Stieltjes transform of the limiting spectral distribution appr… ▽ More

    Submitted 11 November, 2021; v1 submitted 11 May, 2021; originally announced May 2021.

    Comments: Final version, NeurIPS 2021. 22 pages, 4 figures

    MSC Class: 60B20; 68T07

  11. Quantifying the Preferential Direction of the Model Gradient in Adversarial Training With Projected Gradient Descent

    Authors: Ricardo Bigolin Lanfredi, Joyce D. Schroeder, Tolga Tasdizen

    Abstract: Adversarial training, especially projected gradient descent (PGD), has proven to be a successful approach for improving robustness against adversarial attacks. After adversarial training, gradients of models with respect to their inputs have a preferential direction. However, the direction of alignment is not mathematically well established, making it difficult to evaluate quantitatively. We propo… ▽ More

    Submitted 19 April, 2023; v1 submitted 10 September, 2020; originally announced September 2020.

    Comments: This paper was published in Pattern Recognition

  12. arXiv:2007.01975  [pdf, other

    eess.IV cs.CV cs.GR q-bio.QM

    Interpretation of Disease Evidence for Medical Images Using Adversarial Deformation Fields

    Authors: Ricardo Bigolin Lanfredi, Joyce D. Schroeder, Clement Vachet, Tolga Tasdizen

    Abstract: The high complexity of deep learning models is associated with the difficulty of explaining what evidence they recognize as correlating with specific disease labels. This information is critical for building trust in models and finding their biases. Until now, automated deep learning visualization solutions have identified regions of images used by classifiers, but these solutions are too coarse,… ▽ More

    Submitted 19 April, 2023; v1 submitted 3 July, 2020; originally announced July 2020.

    Comments: Presented at MICCAI 2020

  13. Adversarial regression training for visualizing the progression of chronic obstructive pulmonary disease with chest x-rays

    Authors: Ricardo Bigolin Lanfredi, Joyce D. Schroeder, Clement Vachet, Tolga Tasdizen

    Abstract: Knowledge of what spatial elements of medical images deep learning methods use as evidence is important for model interpretability, trustiness, and validation. There is a lack of such techniques for models in regression tasks. We propose a method, called visualization for regression with a generative adversarial network (VR-GAN), for formulating adversarial training specifically for datasets conta… ▽ More

    Submitted 27 August, 2019; originally announced August 2019.

    Comments: Accepted for MICCAI 2019

    Journal ref: International Conference on Medical Image Computing and Computer-Assisted Intervention. Springer, Cham, 2019. p. 685-693

  14. arXiv:1701.08068  [pdf, other

    cs.ET physics.ins-det

    An Enhanced Lumped Element Electrical Model of a Double Barrier Memristive Device

    Authors: Enver Solan, Sven Dirkmann, Mirko Hansen, Dietmar Schroeder, Hermann Kohlstedt, Martin Ziegler, Thomas Mussenbrock, Karlheinz Ochs

    Abstract: The massive parallel approach of neuromorphic circuits leads to effective methods for solving complex problems. It has turned out that resistive switching devices with a continuous resistance range are potential candidates for such applications. These devices are memristive systems - nonlinear resistors with memory. They are fabricated in nanotechnology and hence parameter spread during fabricatio… ▽ More

    Submitted 19 January, 2017; originally announced January 2017.

  15. arXiv:1403.1343  [pdf, other

    cs.CR cs.CV

    Ubic: Bridging the gap between digital cryptography and the physical world

    Authors: Mark Simkin, Dominique Schroeder, Andreas Bulling, Mario Fritz

    Abstract: Advances in computing technology increasingly blur the boundary between the digital domain and the physical world. Although the research community has developed a large number of cryptographic primitives and has demonstrated their usability in all-digital communication, many of them have not yet made their way into the real world due to usability aspects. We aim to make another step towards a tigh… ▽ More

    Submitted 24 July, 2014; v1 submitted 5 March, 2014; originally announced March 2014.

    Comments: In ESORICS 2014, volume 8712 of Lecture Notes in Computer Science, pp. 56-75, Wroclaw, Poland, September 7-11, 2014. Springer, Berlin, Germany