Skip to main content

Showing 1–28 of 28 results for author: Zaki, M J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.04538  [pdf, other

    cs.LG

    Triplet Interaction Improves Graph Transformers: Accurate Molecular Graph Learning with Triplet Graph Transformers

    Authors: Md Shamim Hussain, Mohammed J. Zaki, Dharmashankar Subramanian

    Abstract: Graph transformers typically lack third-order interactions, limiting their geometric understanding which is crucial for tasks like molecular geometry prediction. We propose the Triplet Graph Transformer (TGT) that enables direct communication between pairs within a 3-tuple of nodes via novel triplet attention and aggregation mechanisms. TGT is applied to molecular property prediction by first pred… ▽ More

    Submitted 9 June, 2024; v1 submitted 6 February, 2024; originally announced February 2024.

    Comments: ICML'24 Accepted Version, 25 pages, 10 figures, 18 tables

  2. arXiv:2306.03209  [pdf, other

    cs.LG

    End-to-end Differentiable Clustering with Associative Memories

    Authors: Bishwajit Saha, Dmitry Krotov, Mohammed J. Zaki, Parikshit Ram

    Abstract: Clustering is a widely used unsupervised learning technique involving an intensive discrete optimization problem. Associative Memory models or AMs are differentiable neural networks defining a recursive dynamical system, which have been integrated with various deep learning architectures. We uncover a novel connection between the AM dynamics and the inherent discrete assignment necessary in cluste… ▽ More

    Submitted 5 June, 2023; originally announced June 2023.

    Comments: Accepted to ICML 2023

  3. The Information Pathways Hypothesis: Transformers are Dynamic Self-Ensembles

    Authors: Md Shamim Hussain, Mohammed J. Zaki, Dharmashankar Subramanian

    Abstract: Transformers use the dense self-attention mechanism which gives a lot of flexibility for long-range connectivity. Over multiple layers of a deep transformer, the number of possible connectivity patterns increases exponentially. However, very few of these contribute to the performance of the network, and even fewer are essential. We hypothesize that there are sparsely connected sub-networks within… ▽ More

    Submitted 2 June, 2023; originally announced June 2023.

    Comments: KDD23 preprint, 12 pages, 7 figures, 10 tables

  4. arXiv:2305.17219  [pdf

    cs.CV cs.CL cs.LG

    GVdoc: Graph-based Visual Document Classification

    Authors: Fnu Mohbat, Mohammed J. Zaki, Catherine Finegan-Dollak, Ashish Verma

    Abstract: The robustness of a model for real-world deployment is decided by how well it performs on unseen data and distinguishes between in-domain and out-of-domain samples. Visual document classifiers have shown impressive performance on in-distribution test sets. However, they tend to have a hard time correctly classifying and differentiating out-of-distribution examples. Image-based classifiers lack the… ▽ More

    Submitted 26 May, 2023; originally announced May 2023.

  5. arXiv:2302.07253  [pdf, other

    cs.LG cond-mat.dis-nn cs.CV q-bio.NC stat.ML

    Energy Transformer

    Authors: Benjamin Hoover, Yuchen Liang, Bao Pham, Rameswar Panda, Hendrik Strobelt, Duen Horng Chau, Mohammed J. Zaki, Dmitry Krotov

    Abstract: Our work combines aspects of three promising paradigms in machine learning, namely, attention mechanism, energy-based models, and associative memory. Attention is the power-house driving modern deep learning successes, but it lacks clear theoretical foundations. Energy-based models allow a principled approach to discriminative and generative tasks, but the design of the energy functional is not st… ▽ More

    Submitted 31 October, 2023; v1 submitted 14 February, 2023; originally announced February 2023.

    Journal ref: 37th Conference on Neural Information Processing Systems (NeurIPS 2023)

  6. arXiv:2208.14376  [pdf, other

    cs.LG cs.NE cs.SI q-bio.NC stat.ML

    Associative Learning for Network Embedding

    Authors: Yuchen Liang, Dmitry Krotov, Mohammed J. Zaki

    Abstract: The network embedding task is to represent the node in the network as a low-dimensional vector while incorporating the topological and structural information. Most existing approaches solve this problem by factorizing a proximity matrix, either directly or implicitly. In this work, we introduce a network embedding method from a new perspective, which leverages Modern Hopfield Networks (MHN) for as… ▽ More

    Submitted 30 August, 2022; originally announced August 2022.

    Comments: Accepted at the Eighth International Workshop on Deep Learning on Graphs: Methods and Applications (DLG-KDD 2022), Washington DC

  7. arXiv:2207.05194  [pdf, other

    cs.CL

    Towards Neural Numeric-To-Text Generation From Temporal Personal Health Data

    Authors: Jonathan Harris, Mohammed J. Zaki

    Abstract: With an increased interest in the production of personal health technologies designed to track user data (e.g., nutrient intake, step counts), there is now more opportunity than ever to surface meaningful behavioral insights to everyday users in the form of natural language. This knowledge can increase their behavioral awareness and allow them to take action to meet their health goals. It can also… ▽ More

    Submitted 11 July, 2022; originally announced July 2022.

    Comments: 5 pages, 2 figures, 1 table

  8. arXiv:2206.06952  [pdf, other

    cs.CL cs.AI cs.LG

    FETILDA: An Effective Framework For Fin-tuned Embeddings For Long Financial Text Documents

    Authors: Bolun "Namir" Xia, Vipula D. Rawte, Mohammed J. Zaki, Aparna Gupta

    Abstract: Unstructured data, especially text, continues to grow rapidly in various domains. In particular, in the financial sphere, there is a wealth of accumulated unstructured financial data, such as the textual disclosure documents that companies submit on a regular basis to regulatory agencies, such as the Securities and Exchange Commission (SEC). These documents are typically very long and tend to cont… ▽ More

    Submitted 14 June, 2022; originally announced June 2022.

    Comments: 10 pages, 9 figures, 7 tables

    ACM Class: I.2.7

  9. arXiv:2111.07198  [pdf, ps, other

    cs.CL cs.IR cs.LG

    Keyphrase Extraction Using Neighborhood Knowledge Based on Word Embeddings

    Authors: Yuchen Liang, Mohammed J. Zaki

    Abstract: Keyphrase extraction is the task of finding several interesting phrases in a text document, which provide a list of the main topics within the document. Most existing graph-based models use co-occurrence links as cohesion indicators to model the relationship of syntactic elements. However, a word may have different forms of expression within the document, and may have several synonyms as well. Sim… ▽ More

    Submitted 13 November, 2021; originally announced November 2021.

  10. Global Self-Attention as a Replacement for Graph Convolution

    Authors: Md Shamim Hussain, Mohammed J. Zaki, Dharmashankar Subramanian

    Abstract: We propose an extension to the transformer neural network architecture for general-purpose graph learning by adding a dedicated pathway for pairwise structural information, called edge channels. The resultant framework - which we call Edge-augmented Graph Transformer (EGT) - can directly accept, process and output structural information of arbitrary form, which is important for effective learning… ▽ More

    Submitted 3 June, 2022; v1 submitted 6 August, 2021; originally announced August 2021.

    Comments: The accepted version in KDD '22

  11. arXiv:2102.05571  [pdf, other

    cs.CR cs.AI cs.IR cs.LG

    TINKER: A framework for Open source Cyberthreat Intelligence

    Authors: Nidhi Rastogi, Sharmishtha Dutta, Mohammed J. Zaki, Alex Gittens, Charu Aggarwal

    Abstract: Threat intelligence on malware attacks and campaigns is increasingly being shared with other security experts for a cost or for free. Other security analysts use this intelligence to inform them of indicators of compromise, attack techniques, and preventative actions. Security analysts prepare threat analysis reports after investigating an attack, an emerging cyber threat, or a recently discovered… ▽ More

    Submitted 19 January, 2023; v1 submitted 10 February, 2021; originally announced February 2021.

    Comments: 9 pages

  12. arXiv:2101.06887  [pdf, other

    cs.CL cs.LG cs.NE q-bio.NC stat.ML

    Can a Fruit Fly Learn Word Embeddings?

    Authors: Yuchen Liang, Chaitanya K. Ryali, Benjamin Hoover, Leopold Grinberg, Saket Navlakha, Mohammed J. Zaki, Dmitry Krotov

    Abstract: The mushroom body of the fruit fly brain is one of the best studied systems in neuroscience. At its core it consists of a population of Kenyon cells, which receive inputs from multiple sensory modalities. These cells are inhibited by the anterior paired lateral neuron, thus creating a sparse high dimensional representation of the inputs. In this work we study a mathematical formalization of this n… ▽ More

    Submitted 14 March, 2021; v1 submitted 18 January, 2021; originally announced January 2021.

    Comments: Accepted for publication at ICLR 2021

  13. Personalized Food Recommendation as Constrained Question Answering over a Large-scale Food Knowledge Graph

    Authors: Yu Chen, Ananya Subburathinam, Ching-Hua Chen, Mohammed J. Zaki

    Abstract: Food recommendation has become an important means to help guide users to adopt healthy dietary habits. Previous works on food recommendation either i) fail to consider users' explicit requirements, ii) ignore crucial health factors (e.g., allergies and nutrition needs), or iii) do not utilize the rich food knowledge for recommending healthy recipes. To address these limitations, we propose a novel… ▽ More

    Submitted 5 January, 2021; originally announced January 2021.

    Comments: 9 pages. Accepted by WSDM 2021. Final version

  14. arXiv:2006.13009  [pdf, other

    cs.LG stat.ML

    Iterative Deep Graph Learning for Graph Neural Networks: Better and Robust Node Embeddings

    Authors: Yu Chen, Lingfei Wu, Mohammed J. Zaki

    Abstract: In this paper, we propose an end-to-end graph learning framework, namely Iterative Deep Graph Learning (IDGL), for jointly and iteratively learning graph structure and graph embedding. The key rationale of IDGL is to learn a better graph structure based on better node embeddings, and vice versa (i.e., better node embeddings based on a better graph structure). Our iterative method dynamically stops… ▽ More

    Submitted 22 October, 2020; v1 submitted 21 June, 2020; originally announced June 2020.

    Comments: 19 pages. Accepted by NeurIPS 2020. Final version

  15. MALOnt: An Ontology for Malware Threat Intelligence

    Authors: Nidhi Rastogi, Sharmishtha Dutta, Mohammed J. Zaki, Alex Gittens, Charu Aggarwal

    Abstract: Malware threat intelligence uncovers deep information about malware, threat actors, and their tactics, Indicators of Compromise(IoC), and vulnerabilities in different platforms from scattered threat sources. This collective information can guide decision making in cyber defense applications utilized by security operation centers(SoCs). In this paper, we introduce an open-source malware ontology -… ▽ More

    Submitted 19 June, 2020; originally announced June 2020.

  16. Toward Subgraph-Guided Knowledge Graph Question Generation with Graph Neural Networks

    Authors: Yu Chen, Lingfei Wu, Mohammed J. Zaki

    Abstract: Knowledge graph (KG) question generation (QG) aims to generate natural language questions from KGs and target answers. Previous works mostly focus on a simple setting which is to generate questions from a single KG triple. In this work, we focus on a more realistic setting where we aim to generate questions from a KG subgraph and target answers. In addition, most of previous works built on either… ▽ More

    Submitted 30 April, 2023; v1 submitted 13 April, 2020; originally announced April 2020.

    Comments: Accepted by TNNLS 2023

  17. arXiv:2004.00071  [pdf, ps, other

    cs.AI cs.IR

    Personal Health Knowledge Graphs for Patients

    Authors: Nidhi Rastogi, Mohammed J. Zaki

    Abstract: Existing patient data analytics platforms fail to incorporate information that has context, is personal, and topical to patients. For a recommendation system to give a suitable response to a query or to derive meaningful insights from patient data, it should consider personal information about the patient's health history, including but not limited to their preferences, locations, and life choices… ▽ More

    Submitted 7 May, 2020; v1 submitted 31 March, 2020; originally announced April 2020.

    Comments: 3 pages, workshop paper

    ACM Class: I.2.4

  18. arXiv:2003.09530  [pdf, other

    cs.CL cs.DB

    A Framework for Generating Explanations from Temporal Personal Health Data

    Authors: Jonathan J. Harris, Ching-Hua Chen, Mohammed J. Zaki

    Abstract: Whereas it has become easier for individuals to track their personal health data (e.g., heart rate, step count, food log), there is still a wide chasm between the collection of data and the generation of meaningful explanations to help users better understand what their data means to them. With an increased comprehension of their data, users will be able to act upon the newfound information and wo… ▽ More

    Submitted 9 March, 2021; v1 submitted 20 March, 2020; originally announced March 2020.

    Comments: 41 pages, 24 figures. To appear in ACM Transactions on Computing for Healthcare

  19. arXiv:1912.07832  [pdf, other

    cs.LG stat.ML

    Deep Iterative and Adaptive Learning for Graph Neural Networks

    Authors: Yu Chen, Lingfei Wu, Mohammed J. Zaki

    Abstract: In this paper, we propose an end-to-end graph learning framework, namely Deep Iterative and Adaptive Learning for Graph Neural Networks (DIAL-GNN), for jointly learning the graph structure and graph embeddings simultaneously. We first cast the graph structure learning problem as a similarity metric learning problem and leverage an adapted graph regularization for controlling smoothness, connectivi… ▽ More

    Submitted 17 December, 2019; originally announced December 2019.

    Comments: 6 pages. Accepted at the AAAI 2020 Workshop on Deep Learning on Graphs: Methodologies and Applications (AAAI DLGMA 2020). Final Version

  20. arXiv:1910.08832  [pdf, other

    cs.CL

    Natural Question Generation with Reinforcement Learning Based Graph-to-Sequence Model

    Authors: Yu Chen, Lingfei Wu, Mohammed J. Zaki

    Abstract: Natural question generation (QG) aims to generate questions from a passage and an answer. In this paper, we propose a novel reinforcement learning (RL) based graph-to-sequence (Graph2Seq) model for QG. Our model consists of a Graph2Seq generator where a novel Bidirectional Gated Graph Neural Network is proposed to embed the passage, and a hybrid evaluator with a mixed objective combining both cros… ▽ More

    Submitted 19 October, 2019; originally announced October 2019.

    Comments: 4 pages. Accepted at the NeurIPS 2019 Workshop on Graph Representation Learning (NeurIPS GRL 2019). Final Version. arXiv admin note: substantial text overlap with arXiv:1908.04942

  21. arXiv:1908.04942  [pdf, other

    cs.CL

    Reinforcement Learning Based Graph-to-Sequence Model for Natural Question Generation

    Authors: Yu Chen, Lingfei Wu, Mohammed J. Zaki

    Abstract: Natural question generation (QG) aims to generate questions from a passage and an answer. Previous works on QG either (i) ignore the rich structure information hidden in text, (ii) solely rely on cross-entropy loss that leads to issues like exposure bias and inconsistency between train/test measurement, or (iii) fail to fully exploit the answer information. To address these limitations, in this pa… ▽ More

    Submitted 27 August, 2020; v1 submitted 13 August, 2019; originally announced August 2019.

    Comments: 17 pages. Accepted by ICLR 2020. Final version (fix typo in figure)

  22. arXiv:1908.00059  [pdf, other

    cs.CL

    GraphFlow: Exploiting Conversation Flow with Graph Neural Networks for Conversational Machine Comprehension

    Authors: Yu Chen, Lingfei Wu, Mohammed J. Zaki

    Abstract: Conversational machine comprehension (MC) has proven significantly more challenging compared to traditional MC since it requires better utilization of conversation history. However, most existing approaches do not effectively capture conversation history and thus have trouble handling questions involving coreference or ellipsis. Moreover, when reasoning over passage text, most of them simply treat… ▽ More

    Submitted 15 July, 2020; v1 submitted 31 July, 2019; originally announced August 2019.

    Comments: 7 pages. Accepted by IJCAI 2020. Final Version. The SOLE copyright holder is IJCAI (https://www.ijcai.org), all rights reserved

  23. arXiv:1903.02188  [pdf, other

    cs.CL

    Bidirectional Attentive Memory Networks for Question Answering over Knowledge Bases

    Authors: Yu Chen, Lingfei Wu, Mohammed J. Zaki

    Abstract: When answering natural language questions over knowledge bases (KBs), different question components and KB aspects play different roles. However, most existing embedding-based methods for knowledge base question answering (KBQA) ignore the subtle inter-relationships between the question and the KB (e.g., entity types, relation paths and context). In this work, we propose to directly model the two-… ▽ More

    Submitted 28 May, 2019; v1 submitted 6 March, 2019; originally announced March 2019.

    Comments: 11 pages. Accepted as NAACL 2019 Long Paper. Final Version

  24. arXiv:1705.02033  [pdf, other

    stat.ML cs.LG

    KATE: K-Competitive Autoencoder for Text

    Authors: Yu Chen, Mohammed J. Zaki

    Abstract: Autoencoders have been successful in learning meaningful representations from image datasets. However, their performance on text datasets has not been widely studied. Traditional autoencoders tend to learn possibly trivial representations of text documents due to their confounding properties such as high-dimensionality, sparsity and power-law word distributions. In this paper, we propose a novel k… ▽ More

    Submitted 4 June, 2017; v1 submitted 4 May, 2017; originally announced May 2017.

    Comments: 10 pages, KDD'17

  25. arXiv:1510.04233  [pdf, other

    cs.DC

    Arabesque: A System for Distributed Graph Mining - Extended version

    Authors: Carlos H. C. Teixeira, Alexandre J. Fonseca, Marco Serafini, Georgos Siganos, Mohammed J. Zaki, Ashraf Aboulnaga

    Abstract: Distributed data processing platforms such as MapReduce and Pregel have substantially simplified the design and deployment of certain classes of distributed graph analytics algorithms. However, these platforms do not represent a good match for distributed graph mining problems, as for example finding frequent subgraphs in a graph. Given an input graph, these problems require exploring a very large… ▽ More

    Submitted 14 October, 2015; originally announced October 2015.

    Comments: A short version of this report appeared in the Proceedings of the 25th ACM Symp. on Operating Systems Principles (SOSP), 2015

    Report number: QCRI-TR-2015-005

  26. arXiv:1301.0977  [pdf, ps, other

    cs.DB cs.DS

    DAGGER: A Scalable Index for Reachability Queries in Large Dynamic Graphs

    Authors: Hilmi Yildirim, Vineet Chaoji, Mohammed J. Zaki

    Abstract: With the ubiquity of large-scale graph data in a variety of application domains, querying them effectively is a challenge. In particular, reachability queries are becoming increasingly important, especially for containment, subsumption, and connectivity checks. Whereas many methods have been proposed for static graph reachability, many real-world graphs are constantly evolving, which calls for dyn… ▽ More

    Submitted 6 January, 2013; originally announced January 2013.

    Comments: 11 pages, 7 figures, 2 tables

    ACM Class: H.3.3

  27. arXiv:1203.2886  [pdf, ps, other

    cs.DB cs.DS

    BitPath -- Label Order Constrained Reachability Queries over Large Graphs

    Authors: Medha Atre, Vineet Chaoji, Mohammed J. Zaki

    Abstract: In this paper we focus on the following constrained reachability problem over edge-labeled graphs like RDF -- "given source node x, destination node y, and a sequence of edge labels (a, b, c, d), is there a path between the two nodes such that the edge labels on the path satisfy a regular expression "*a.*b.*c.*d.*". A "*" before "a" allows any other edge label to appear on the path before edge "a"… ▽ More

    Submitted 13 March, 2012; originally announced March 2012.

    Report number: RPI-CS 12-02 ACM Class: H.2.4; E.1; E.2

  28. arXiv:1201.6568  [pdf, other

    cs.DB

    Mining Attribute-structure Correlated Patterns in Large Attributed Graphs

    Authors: Arlei Silva, Wagner Meira Jr., Mohammed J. Zaki

    Abstract: In this work, we study the correlation between attribute sets and the occurrence of dense subgraphs in large attributed graphs, a task we call structural correlation pattern mining. A structural correlation pattern is a dense subgraph induced by a particular attribute set. Existing methods are not able to extract relevant knowledge regarding how vertex attributes interact with dense subgraphs. Str… ▽ More

    Submitted 31 January, 2012; originally announced January 2012.

    Comments: VLDB2012

    Journal ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 5, pp. 466-477 (2012)