Skip to main content

Showing 1–26 of 26 results for author: Simoens, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.07447  [pdf

    cs.HC

    From traces to measures: Large language models as a tool for psychological measurement from text

    Authors: Joseph J. P. Simons, Wong Liang Ze, Prasanta Bhattacharya, Brandon Siyuan Loh, Wei Gao

    Abstract: Digital trace data provide potentially valuable resources for understanding human behaviour, but their value has been limited by issues of unclear measurement. The growth of large language models provides an opportunity to address this limitation in the case of text data. Specifically, recognizing cases where their responses are a form of psychological measurement (the use of observable indicators… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

    Comments: 12 pages, 2 figures, 1 table

  2. arXiv:2405.05031  [pdf, other

    cs.CV

    Mitigating Bias Using Model-Agnostic Data Attribution

    Authors: Sander De Coninck, Wei-Cheng Wang, Sam Leroux, Pieter Simoens

    Abstract: Mitigating bias in machine learning models is a critical endeavor for ensuring fairness and equity. In this paper, we propose a novel approach to address bias by leveraging pixel image attributions to identify and regularize regions of images containing significant information about bias attributes. Our method utilizes a model-agnostic approach to extract pixel attributions by employing a convolut… ▽ More

    Submitted 8 May, 2024; originally announced May 2024.

    Comments: Accepted to the 2024 IEEE CVPR Workshop on Fair, Data-efficient, and Trusted Computer Vision

  3. arXiv:2312.08837  [pdf, other

    cs.LG cs.AI

    Learning Safety Constraints From Demonstration Using One-Class Decision Trees

    Authors: Mattijs Baert, Sam Leroux, Pieter Simoens

    Abstract: The alignment of autonomous agents with human values is a pivotal challenge when deploying these agents within physical environments, where safety is an important concern. However, defining the agent's objective as a reward and/or cost function is inherently complex and prone to human errors. In response to this challenge, we present a novel approach that leverages one-class decision trees to faci… ▽ More

    Submitted 14 December, 2023; originally announced December 2023.

    Comments: accepted for AAAI 2024 Workshop on Neuro-Symbolic Learning and Reasoning in the Era of Large Language Models (NucLeaR)

  4. arXiv:2310.09848  [pdf

    cs.CL

    Enhancing Stance Classification with Quantified Moral Foundations

    Authors: Hong Zhang, Prasanta Bhattacharya, Wei Gao, Liang Ze Wong, Brandon Siyuan Loh, Joseph J. P. Simons, Jisun An

    Abstract: This study enhances stance detection on social media by incorporating deeper psychological attributes, specifically individuals' moral foundations. These theoretically-derived dimensions aim to provide a comprehensive profile of an individual's moral concerns which, in recent work, has been linked to behaviour in a range of domains, including society, politics, health, and the environment. In this… ▽ More

    Submitted 15 October, 2023; originally announced October 2023.

    Comments: 11 pages, 5 figures

  5. arXiv:2305.02857  [pdf, other

    cs.LG cs.AI

    Maximum Causal Entropy Inverse Constrained Reinforcement Learning

    Authors: Mattijs Baert, Pietro Mazzaglia, Sam Leroux, Pieter Simoens

    Abstract: When deploying artificial agents in real-world environments where they interact with humans, it is crucial that their behavior is aligned with the values, social norms or other requirements of that environment. However, many environments have implicit constraints that are difficult to specify and transfer to a learning agent. To address this challenge, we propose a novel method that utilizes the p… ▽ More

    Submitted 4 May, 2023; originally announced May 2023.

  6. arXiv:2208.12632  [pdf, other

    cs.CV

    Selective manipulation of disentangled representations for privacy-aware facial image processing

    Authors: Sander De Coninck, Wei-Cheng Wang, Sam Leroux, Pieter Simoens

    Abstract: Camera sensors are increasingly being combined with machine learning to perform various tasks such as intelligent surveillance. Due to its computational complexity, most of these machine learning algorithms are offloaded to the cloud for processing. However, users are increasingly concerned about privacy issues such as function creep and malicious usage by third-party cloud providers. To alleviate… ▽ More

    Submitted 26 August, 2022; originally announced August 2022.

    Comments: Accepted to the MLCS workshop at ECML PKDD 2022

  7. arXiv:2205.06632  [pdf, other

    cs.CY

    The art of compensation: how hybrid teams solve collective risk dilemmas

    Authors: Inês Terrucha, Elias Fernández Domingos, Francisco C. Santos, Pieter Simoens, Tom Lenaerts

    Abstract: It is widely known how the human ability to cooperate has influenced the thriving of our species. However, as we move towards a hybrid human-machine future, it is still unclear how the introduction of AI agents in our social interactions will affect this cooperative capacity. Within the context of the one-shot collective risk dilemma, where enough members of a group must cooperate in order to avoi… ▽ More

    Submitted 13 May, 2022; originally announced May 2022.

    Comments: 8 pages, 5 figures, accepted at workshop ALA 2022 (AAMAS 2022)

  8. arXiv:2203.10923  [pdf, other

    cs.LG cs.DC cs.NE

    TinyMLOps: Operational Challenges for Widespread Edge AI Adoption

    Authors: Sam Leroux, Pieter Simoens, Meelis Lootus, Kartik Thakore, Akshay Sharma

    Abstract: Deploying machine learning applications on edge devices can bring clear benefits such as improved reliability, latency and privacy but it also introduces its own set of challenges. Most works focus on the limited computational resources of edge platforms but this is not the only bottleneck standing in the way of widespread adoption. In this paper we list several other challenges that a TinyML prac… ▽ More

    Submitted 27 March, 2022; v1 submitted 21 March, 2022; originally announced March 2022.

    Comments: 4th Workshop on Parallel AI and Systems for the Edge (PAISE2022) paper

  9. arXiv:2110.15171  [pdf, other

    cs.CV cs.LG

    Privacy Aware Person Detection in Surveillance Data

    Authors: Sander De Coninck, Sam Leroux, Pieter Simoens

    Abstract: Crowd management relies on inspection of surveillance video either by operators or by object detection models. These models are large, making it difficult to deploy them on resource constrained edge hardware. Instead, the computations are often offloaded to a (third party) cloud platform. While crowd management may be a legitimate application, transferring video from the camera to remote infrastru… ▽ More

    Submitted 28 October, 2021; originally announced October 2021.

  10. arXiv:2101.07529  [pdf, other

    cs.CV cs.NE

    Intelligent Frame Selection as a Privacy-Friendlier Alternative to Face Recognition

    Authors: Mattijs Baert, Sam Leroux, Pieter Simoens

    Abstract: The widespread deployment of surveillance cameras for facial recognition gives rise to many privacy concerns. This study proposes a privacy-friendly alternative to large scale facial recognition. While there are multiple techniques to preserve privacy, our work is based on the minimization principle which implies minimizing the amount of collected personal data. Instead of running facial recogniti… ▽ More

    Submitted 27 January, 2021; v1 submitted 19 January, 2021; originally announced January 2021.

    Comments: accepted for AAAI 2021 Workshop on Privacy-Preserving Artificial Intelligence (PPAI-21)

  11. arXiv:2011.05054  [pdf, other

    cs.CV cs.LG

    Decoupled Appearance and Motion Learning for Efficient Anomaly Detection in Surveillance Video

    Authors: Bo Li, Sam Leroux, Pieter Simoens

    Abstract: Automating the analysis of surveillance video footage is of great interest when urban environments or industrial sites are monitored by a large number of cameras. As anomalies are often context-specific, it is hard to predefine events of interest and collect labelled training data. A purely unsupervised approach for automated anomaly detection is much more suitable. For every camera, a separate al… ▽ More

    Submitted 12 November, 2020; v1 submitted 10 November, 2020; originally announced November 2020.

  12. arXiv:1904.08149  [pdf, other

    cs.LG cs.AI cs.NE

    Bayesian policy selection using active inference

    Authors: Ozan Çatal, Johannes Nauta, Tim Verbelen, Pieter Simoens, Bart Dhoedt

    Abstract: Learning to take actions based on observations is a core requirement for artificial agents to be able to be successful and robust at their task. Reinforcement Learning (RL) is a well-known technique for learning such policies. However, current RL algorithms often have to deal with reward sha**, have difficulties generalizing to other environments and are most often sample inefficient. In this pa… ▽ More

    Submitted 25 April, 2019; v1 submitted 17 April, 2019; originally announced April 2019.

    Comments: ICLR 2019 Workshop on Structure & priors in reinforcement learning

  13. arXiv:1809.03851  [pdf, other

    cs.CV cs.LG

    Visualizing Convolutional Neural Networks to Improve Decision Support for Skin Lesion Classification

    Authors: Pieter Van Molle, Miguel De Strooper, Tim Verbelen, Bert Vankeirsbilck, Pieter Simoens, Bart Dhoedt

    Abstract: Because of their state-of-the-art performance in computer vision, CNNs are becoming increasingly popular in a variety of fields, including medicine. However, as neural networks are black box function approximators, it is difficult, if not impossible, for a medical expert to reason about their output. This could potentially result in the expert distrusting the network when he or she does not agree… ▽ More

    Submitted 11 September, 2018; originally announced September 2018.

    Comments: 8 pages, 6 figures, Workshop on Interpretability of Machine Intelligence in Medical Image Computing at MICCAI 2018

  14. Psychological Frameworks for Persuasive Information and Communications Technologies

    Authors: Joseph J. P. Simons

    Abstract: When develo** devices to encourage positive change in users, social psychology can offer useful conceptual resources. This article outlines three major theories from the discipline and discusses their implications for designing persuasive technologies.

    Submitted 28 August, 2018; originally announced August 2018.

    Journal ref: Simons, Joseph JP. "Psychological Frameworks for Persuasive Information and Communications Technologies." IEEE Pervasive Computing 15, no. 3 (2016): 68-76

  15. arXiv:1806.03486  [pdf, other

    cs.CV cs.LG cs.RO

    Learning to Grasp from a Single Demonstration

    Authors: Pieter Van Molle, Tim Verbelen, Elias De Coninck, Cedric De Boom, Pieter Simoens, Bart Dhoedt

    Abstract: Learning-based approaches for robotic gras** using visual sensors typically require collecting a large size dataset, either manually labeled or by many trial and errors of a robotic manipulator in the real or simulated world. We propose a simpler learning-from-demonstration approach that is able to detect the object to grasp from merely a single demonstration using a convolutional neural network… ▽ More

    Submitted 9 June, 2018; originally announced June 2018.

    Comments: 10 pages, 5 figures, IAS-15 2018 workshop on Learning Applications for Intelligent Autonomous Robots

  16. arXiv:1805.12024  [pdf, other

    cs.LG cs.CV cs.NE stat.ML

    Privacy Aware Offloading of Deep Neural Networks

    Authors: Sam Leroux, Tim Verbelen, Pieter Simoens, Bart Dhoedt

    Abstract: Deep neural networks require large amounts of resources which makes them hard to use on resource constrained devices such as Internet-of-things devices. Offloading the computations to the cloud can circumvent these constraints but introduces a privacy risk since the operator of the cloud is not necessarily trustworthy. We propose a technique that obfuscates the data before sending it to the remote… ▽ More

    Submitted 30 May, 2018; originally announced May 2018.

    Comments: ICML 2018 Privacy in Machine Learning and Artificial Intelligence workshop

  17. arXiv:1804.10123  [pdf, other

    cs.CV cs.NE

    IamNN: Iterative and Adaptive Mobile Neural Network for Efficient Image Classification

    Authors: Sam Leroux, Pavlo Molchanov, Pieter Simoens, Bart Dhoedt, Thomas Breuel, Jan Kautz

    Abstract: Deep residual networks (ResNets) made a recent breakthrough in deep learning. The core idea of ResNets is to have shortcut connections between layers that allow the network to be much deeper while still being easy to optimize avoiding vanishing gradients. These shortcut connections have interesting side-effects that make ResNets behave differently from other typical network architectures. In this… ▽ More

    Submitted 26 April, 2018; originally announced April 2018.

    Comments: ICLR 2018 Workshop track

  18. arXiv:1711.10761  [pdf, other

    cs.NE cs.CV

    Transfer Learning with Binary Neural Networks

    Authors: Sam Leroux, Steven Bohez, Tim Verbelen, Bert Vankeirsbilck, Pieter Simoens, Bart Dhoedt

    Abstract: Previous work has shown that it is possible to train deep neural networks with low precision weights and activations. In the extreme case it is even possible to constrain the network to binary values. The costly floating point multiplications are then reduced to fast logical operations. High end smart phones such as Google's Pixel 2 and Apple's iPhone X are already equipped with specialised hardwa… ▽ More

    Submitted 29 November, 2017; originally announced November 2017.

    Comments: Machine Learning on the Phone and other Consumer Devices, NIPS2017 Workshop

  19. arXiv:1708.02838  [pdf, other

    cs.AI

    Decoupled Learning of Environment Characteristics for Safe Exploration

    Authors: Pieter Van Molle, Tim Verbelen, Steven Bohez, Sam Leroux, Pieter Simoens, Bart Dhoedt

    Abstract: Reinforcement learning is a proven technique for an agent to learn a task. However, when learning a task using reinforcement learning, the agent cannot distinguish the characteristics of the environment from those of the task. This makes it harder to transfer skills between tasks in the same environment. Furthermore, this does not reduce risk when training for a new task. In this paper, we introdu… ▽ More

    Submitted 9 August, 2017; originally announced August 2017.

    Comments: 4 pages, 4 figures, ICML 2017 workshop on Reliable Machine Learning in the Wild

  20. arXiv:1703.04550  [pdf, other

    cs.RO cs.LG cs.NE eess.SY

    Sensor Fusion for Robot Control through Deep Reinforcement Learning

    Authors: Steven Bohez, Tim Verbelen, Elias De Coninck, Bert Vankeirsbilck, Pieter Simoens, Bart Dhoedt

    Abstract: Deep reinforcement learning is becoming increasingly popular for robot control algorithms, with the aim for a robot to self-learn useful feature representations from unstructured sensory input leading to the optimal actuation policy. In addition to sensors mounted on the robot, sensors might also be deployed in the environment, although these might need to be accessed via an unreliable wireless co… ▽ More

    Submitted 13 March, 2017; originally announced March 2017.

    Comments: 6 pages, 6 figures, submitted to IROS 2017

  21. arXiv:1605.08543  [pdf, other

    cs.CV cs.NE

    Lazy Evaluation of Convolutional Filters

    Authors: Sam Leroux, Steven Bohez, Cedric De Boom, Elias De Coninck, Tim Verbelen, Bert Vankeirsbilck, Pieter Simoens, Bart Dhoedt

    Abstract: In this paper we propose a technique which avoids the evaluation of certain convolutional filters in a deep neural network. This allows to trade-off the accuracy of a deep neural network with the computational and memory requirements. This is especially important on a constrained device unable to hold all the weights of the network in memory.

    Submitted 27 May, 2016; originally announced May 2016.

  22. arXiv:1605.02486  [pdf, other

    cs.NE

    Efficiency Evaluation of Character-level RNN Training Schedules

    Authors: Cedric De Boom, Sam Leroux, Steven Bohez, Pieter Simoens, Thomas Demeester, Bart Dhoedt

    Abstract: We present four training and prediction schedules from the same character-level recurrent neural network. The efficiency of these schedules is tested in terms of model effectiveness as a function of training time and amount of training data seen. We show that the choice of training and prediction schedule potentially has a considerable impact on the prediction effectiveness for a given training bu… ▽ More

    Submitted 9 May, 2016; originally announced May 2016.

    Comments: 3 pages, 3 figures

  23. arXiv:cs/0303009  [pdf, ps, other

    cs.AI

    Unfolding Partiality and Disjunctions in Stable Model Semantics

    Authors: T. Janhunen, I. Niemela, D. Seipel, P. Simons, J. You

    Abstract: The paper studies an implementation methodology for partial and disjunctive stable models where partiality and disjunctions are unfolded from a logic program so that an implementation of stable models for normal (disjunction-free) programs can be used as the core inference engine. The unfolding is done in two separate steps. Firstly, it is shown that partial stable models can be captured by tota… ▽ More

    Submitted 2 January, 2004; v1 submitted 14 March, 2003; originally announced March 2003.

    Comments: 49 pages, 4 figures, 1 table

    ACM Class: I.2.4; F.4.1

  24. arXiv:cs/0005010  [pdf, ps, other

    cs.LO cs.AI

    Extending and Implementing the Stable Model Semantics

    Authors: Patrik Simons

    Abstract: An algorithm for computing the stable model semantics of logic programs is developed. It is shown that one can extend the semantics and the algorithm to handle new and more expressive types of rules. Emphasis is placed on the use of efficient implementation techniques. In particular, an implementation of lookahead that safely avoids testing every literal for failure and that makes the use of loo… ▽ More

    Submitted 8 May, 2000; originally announced May 2000.

    Comments: 109 pages, 30 figures, dissertation for the degree of Doctor of Technology

    Report number: HUT-TCS-A58 ACM Class: I.2.3; I.2.8; F.4.1

  25. arXiv:cs/0003033  [pdf, ps, other

    cs.AI

    Smodels: A System for Answer Set Programming

    Authors: Ilkka Niemela, Patrik Simons, Tommi Syrjanen

    Abstract: The Smodels system implements the stable model semantics for normal logic programs. It handles a subclass of programs which contain no function symbols and are domain-restricted but supports extensions including built-in functions as well as cardinality and weight constraints. On top of this core engine more involved systems can be built. As an example, we have implemented total and partial stab… ▽ More

    Submitted 8 March, 2000; originally announced March 2000.

    Comments: Proceedings of the 8th International Workshop on Non-Monotonic Reasoning, April 9-11, 2000, Breckenridge, Colorado 4 pages, uses aaai.sty

    ACM Class: I.2.3; I.2.4

  26. arXiv:cs/9908004  [pdf, ps, other

    cs.LO cs.AI

    Extending the Stable Model Semantics with More Expressive Rules

    Authors: Patrik Simons

    Abstract: The rules associated with propositional logic programs and the stable model semantics are not expressive enough to let one write concise programs. This problem is alleviated by introducing some new types of propositional rules. Together with a decision procedure that has been used as a base for an efficient implementation, the new rules supplant the standard ones in practical applications of the… ▽ More

    Submitted 6 August, 1999; originally announced August 1999.

    Comments: 18 pages, a shortened version will be published in the proceedings of the 5th International Conference on Logic Programming and Nonmonotonic Reasoning (LPNMR'99)

    ACM Class: I.2.3; I.2.8; F.4.1