-
Spatial Analysis of the Association between School Proximity and Crime in Philadelphia
Authors:
Leonardo de Castro Harth,
Bangxi Xiao,
Shane T. Jensen
Abstract:
We use high resolution data to investigate the association between crime incidence and proximity to different types of public schools over the past fifteen years in the city of Philadelphia. We employ two statistical methods, regression modeling and propensity score matching, in order to better isolate the association between crime and school proximity while controlling for the demographic, econom…
▽ More
We use high resolution data to investigate the association between crime incidence and proximity to different types of public schools over the past fifteen years in the city of Philadelphia. We employ two statistical methods, regression modeling and propensity score matching, in order to better isolate the association between crime and school proximity while controlling for the demographic, economic, land use and disorder characteristics of the surrounding neighborhood. With both of these approaches, we find significantly increased crime incidence near to public schools regardless of crime outcome, educational level and time period. The effect of school proximity on crime varies substantially depending on whether or not school is in session, as well as between different types of crime and educational levels of the school. We see the largest effects of school proximity on crime for violent crimes near to high schools during their in-session time periods. Our results support several theories which suggest that crime should be elevated near to schools, as well as finding significant associations between crime and other aspects of the built environment.
△ Less
Submitted 25 December, 2023; v1 submitted 7 June, 2022;
originally announced June 2022.
-
Proxy Network for Few Shot Learning
Authors:
Bin Xiao,
Chien-Liang Liu,
Wen-Hoar Hsaio
Abstract:
The use of a few examples for each class to train a predictive model that can be generalized to novel classes is a crucial and valuable research direction in artificial intelligence. This work addresses this problem by proposing a few-shot learning (FSL) algorithm called proxy network under the architecture of meta-learning. Metric-learning based approaches assume that the data points within the s…
▽ More
The use of a few examples for each class to train a predictive model that can be generalized to novel classes is a crucial and valuable research direction in artificial intelligence. This work addresses this problem by proposing a few-shot learning (FSL) algorithm called proxy network under the architecture of meta-learning. Metric-learning based approaches assume that the data points within the same class should be close, whereas the data points in the different classes should be separated as far as possible in the embedding space. We conclude that the success of metric-learning based approaches lies in the data embedding, the representative of each class, and the distance metric. In this work, we propose a simple but effective end-to-end model that directly learns proxies for class representative and distance metric from data simultaneously. We conduct experiments on CUB and mini-ImageNet datasets in 1-shot-5-way and 5-shot-5-way scenarios, and the experimental results demonstrate the superiority of our proposed method over state-of-the-art methods. Besides, we provide a detailed analysis of our proposed method.
△ Less
Submitted 9 September, 2020;
originally announced September 2020.
-
Conditional Sig-Wasserstein GANs for Time Series Generation
Authors:
Shujian Liao,
Hao Ni,
Lukasz Szpruch,
Magnus Wiese,
Marc Sabate-Vidales,
Baoren Xiao
Abstract:
Generative adversarial networks (GANs) have been extremely successful in generating samples, from seemingly high dimensional probability measures. However, these methods struggle to capture the temporal dependence of joint probability distributions induced by time-series data. Furthermore, long time-series data streams hugely increase the dimension of the target space, which may render generative…
▽ More
Generative adversarial networks (GANs) have been extremely successful in generating samples, from seemingly high dimensional probability measures. However, these methods struggle to capture the temporal dependence of joint probability distributions induced by time-series data. Furthermore, long time-series data streams hugely increase the dimension of the target space, which may render generative modelling infeasible. To overcome these challenges, motivated by the autoregressive models in econometric, we are interested in the conditional distribution of future time series given the past information. We propose the generic conditional Sig-WGAN framework by integrating Wasserstein-GANs (WGANs) with mathematically principled and efficient path feature extraction called the signature of a path. The signature of a path is a graded sequence of statistics that provides a universal description for a stream of data, and its expected value characterises the law of the time-series model. In particular, we develop the conditional Sig-$W_1$ metric, that captures the conditional joint law of time series models, and use it as a discriminator. The signature feature space enables the explicit representation of the proposed discriminators which alleviates the need for expensive training. We validate our method on both synthetic and empirical dataset and observe that our method consistently and significantly outperforms state-of-the-art benchmarks with respect to measures of similarity and predictive ability.
△ Less
Submitted 11 October, 2023; v1 submitted 9 June, 2020;
originally announced June 2020.
-
Context-endcoding for neural network based skull strip** in magnetic resonance imaging
Authors:
Zhen Liu,
Borui Xiao,
Yuemeng Li,
Yong Fan
Abstract:
Skull strip** is usually the first step for most brain analysisprocess in magnetic resonance images. A lot of deep learn-ing neural network based methods have been developed toachieve higher accuracy. Since the 3D deep learning modelssuffer from high computational cost and are subject to GPUmemory limit challenge, a variety of 2D deep learning meth-ods have been developed. However, existing 2D d…
▽ More
Skull strip** is usually the first step for most brain analysisprocess in magnetic resonance images. A lot of deep learn-ing neural network based methods have been developed toachieve higher accuracy. Since the 3D deep learning modelssuffer from high computational cost and are subject to GPUmemory limit challenge, a variety of 2D deep learning meth-ods have been developed. However, existing 2D deep learn-ing methods are not equipped to effectively capture 3D se-mantic information that is needed to achieve higher accuracy.In this paper, we propose a context-encoding method to em-power the 2D network to capture the 3D context information.For the context-encoding method, firstly we encode the 2Dfeatures of original 2D network, secondly we encode the sub-volume of 3D MRI images, finally we fuse the encoded 2Dfeatures and 3D features with semantic encoding classifica-tion loss. To get computational efficiency, although we en-code the sub-volume of 3D MRI images instead of buildinga 3D neural network, extensive experiments on three bench-mark Datasets demonstrate our method can achieve superioraccuracy to state-of-the-art alternative methods with the dicescore 99.6% on NFBS and 99.09 % on LPBA40 and 99.17 %on OASIS.
△ Less
Submitted 23 October, 2019;
originally announced October 2019.
-
Potential-Based Advice for Stochastic Policy Learning
Authors:
Baicen Xiao,
Bhaskar Ramasubramanian,
Andrew Clark,
Hannaneh Hajishirzi,
Linda Bushnell,
Radha Poovendran
Abstract:
This paper augments the reward received by a reinforcement learning agent with potential functions in order to help the agent learn (possibly stochastic) optimal policies. We show that a potential-based reward sha** scheme is able to preserve optimality of stochastic policies, and demonstrate that the ability of an agent to learn an optimal policy is not affected when this scheme is augmented to…
▽ More
This paper augments the reward received by a reinforcement learning agent with potential functions in order to help the agent learn (possibly stochastic) optimal policies. We show that a potential-based reward sha** scheme is able to preserve optimality of stochastic policies, and demonstrate that the ability of an agent to learn an optimal policy is not affected when this scheme is augmented to soft Q-learning. We propose a method to impart potential based advice schemes to policy gradient algorithms. An algorithm that considers an advantage actor-critic architecture augmented with this scheme is proposed, and we give guarantees on its convergence. Finally, we evaluate our approach on a puddle-jump grid world with indistinguishable states, and the continuous state and action mountain car environment from classical control. Our results indicate that these schemes allow the agent to learn a stochastic optimal policy faster and obtain a higher average reward.
△ Less
Submitted 20 July, 2019;
originally announced July 2019.
-
QFlow: A Learning Approach to High QoE Video Streaming at the Wireless Edge
Authors:
Rajarshi Bhattacharyya,
Archana Bura,
Desik Rengarajan,
Mason Rumuly,
Bainan Xia,
Srinivas Shakkottai,
Dileep Kalathil,
Ricky K. P. Mok,
Amogh Dhamdhere
Abstract:
The predominant use of wireless access networks is for media streaming applications, which are only gaining popularity as ever more devices become available for this purpose. However, current access networks treat all packets identically, and lack the agility to determine which clients are most in need of service at a given time. Software reconfigurability of networking devices has seen wide adopt…
▽ More
The predominant use of wireless access networks is for media streaming applications, which are only gaining popularity as ever more devices become available for this purpose. However, current access networks treat all packets identically, and lack the agility to determine which clients are most in need of service at a given time. Software reconfigurability of networking devices has seen wide adoption, and this in turn implies that agile control policies can be now instantiated on access networks. The goal of this work is to design, develop and demonstrate QFlow, a learning approach to create a value chain from the application on one side, to algorithms operating over reconfigurable infrastructure on the other, so that applications are able to obtain necessary resources for optimal performance. Using YouTube video streaming as an example, we illustrate how QFlow is able to adaptively provide such resources and attain a high QoE for all clients at a wireless access point.
△ Less
Submitted 13 May, 2020; v1 submitted 3 January, 2019;
originally announced January 2019.
-
On the Limitation of Convolutional Neural Networks in Recognizing Negative Images
Authors:
Hossein Hosseini,
Baicen Xiao,
Mayoore Jaiswal,
Radha Poovendran
Abstract:
Convolutional Neural Networks (CNNs) have achieved state-of-the-art performance on a variety of computer vision tasks, particularly visual classification problems, where new algorithms reported to achieve or even surpass the human performance. In this paper, we examine whether CNNs are capable of learning the semantics of training data. To this end, we evaluate CNNs on negative images, since they…
▽ More
Convolutional Neural Networks (CNNs) have achieved state-of-the-art performance on a variety of computer vision tasks, particularly visual classification problems, where new algorithms reported to achieve or even surpass the human performance. In this paper, we examine whether CNNs are capable of learning the semantics of training data. To this end, we evaluate CNNs on negative images, since they share the same structure and semantics as regular images and humans can classify them correctly. Our experimental results indicate that when training on regular images and testing on negative images, the model accuracy is significantly lower than when it is tested on regular images. This leads us to the conjecture that current training methods do not effectively train models to generalize the concepts. We then introduce the notion of semantic adversarial examples - transformed inputs that semantically represent the same objects, but the model does not classify them correctly - and present negative images as one class of such inputs.
△ Less
Submitted 7 August, 2017; v1 submitted 20 March, 2017;
originally announced March 2017.