Open Access. Powered by Scholars. Published by Universities.®

Artificial Intelligence and Robotics Commons

Open Access. Powered by Scholars. Published by Universities.®

3,606 Full-Text Articles 5,373 Authors 1,290,840 Downloads 205 Institutions

All Articles in Artificial Intelligence and Robotics

Faceted Search

3,606 full-text articles. Page 6 of 161.

Cmr3d: Contextualized Multi-Stage Refinement For 3d Object Detection, Dhanalaxmi Gaddam, Jean Lahoud, Fahad Shahbaz Khan, Rao Anwer, Hisham Cholakkal 2022 Mohamed bin Zayed University of Artificial Intelligence

Cmr3d: Contextualized Multi-Stage Refinement For 3d Object Detection, Dhanalaxmi Gaddam, Jean Lahoud, Fahad Shahbaz Khan, Rao Anwer, Hisham Cholakkal

Computer Vision Faculty Publications

Existing deep learning-based 3D object detectors typically rely on the appearance of individual objects and do not explicitly pay attention to the rich contextual information of the scene. In this work, we propose Contextualized Multi-Stage Refinement for 3D Object Detection (CMR3D) framework, which takes a 3D scene as input and strives to explicitly integrate useful contextual information of the scene at multiple levels to predict a set of object bounding-boxes along with their corresponding semantic labels. To this end, we propose to utilize a context enhancement network that captures the contextual information at different levels of granularity followed by a …


Cnn-Lstm Vs Ann: Option Pricing Theory, Edward Chang 2022 Western University

Cnn-Lstm Vs Ann: Option Pricing Theory, Edward Chang

Undergraduate Student Research Internships Conference

The modern derivatives market has been steadily growing since the development of the first accurate option pricing model by Fischer Black, Robert Merton, and Myron Scholes. Since then, there have been many different approaches to more accurately price options like the binomial option pricing model and approaches using technology such as machine learning. There are many different research papers on option pricing with artificial neural networks (“ANN”) but not many with other neural network types. We contribute to the existing literature by developing a convolutional neural network – long short-term memory (“CNN-LSTM”) model to price options and compare it to …


Self-Supervised Learning For Invariant Representations From Multi-Spectral And Sar Images, Pallavi Jain, Bianca Schoen Phelan, Robert Ross 2022 Technological University Dublin

Self-Supervised Learning For Invariant Representations From Multi-Spectral And Sar Images, Pallavi Jain, Bianca Schoen Phelan, Robert Ross

Articles

Self-Supervised learning (SSL) has become the new state of the art in several domain classification and segmentation tasks. One popular category of SSL are distillation networks such as Bootstrap Your Own Latent (BYOL). This work proposes RS-BYOL, which builds on BYOL in the remote sensing (RS) domain where data are non-trivially different from natural RGB images. Since multi-spectral (MS) and synthetic aperture radar (SAR) sensors provide varied spectral and spatial resolution information, we utilise them as an implicit augmentation to learn invariant feature embeddings. In order to learn RS based invariant features with SSL, we trained RS-BYOL in two ways, …


Transformers In Remote Sensing: A Survey, Abdulaziz Amer Aleissaee, Amandeep Kumar, Rao Anwer, Salman Khan, Hisham Cholakkal, Gui-Song Xia, Fahad Shahbaz Khan 2022 Mohamed bin Zayed University of Artificial Intelligence

Transformers In Remote Sensing: A Survey, Abdulaziz Amer Aleissaee, Amandeep Kumar, Rao Anwer, Salman Khan, Hisham Cholakkal, Gui-Song Xia, Fahad Shahbaz Khan

Computer Vision Faculty Publications

Deep learning-based algorithms have seen a massive popularity in different areas of remote sensing image analysis over the past decade. Recently, transformers-based architectures, originally introduced in natural language processing, have pervaded computer vision field where the self-attention mechanism has been utilized as a replacement to the popular convolution operator for capturing long-range dependencies. Inspired by recent advances in computer vision, remote sensing community has also witnessed an increased exploration of vision transformers for a diverse set of tasks. Although a number of surveys have focused on transformers in computer vision in general, to the best of our knowledge we are …


Negational Symmetry Of Quantum Neural Networks For Binary Pattern Classification, Nanqing Dong, Michael Kampffmeyer, Irina Voiculescu, Eric P. Xing 2022 University of Oxford, United Kingdom

Negational Symmetry Of Quantum Neural Networks For Binary Pattern Classification, Nanqing Dong, Michael Kampffmeyer, Irina Voiculescu, Eric P. Xing

Machine Learning Faculty Publications

Although quantum neural networks (QNNs) have shown promising results in solving simple machine learning tasks recently, the behavior of QNNs in binary pattern classification is still underexplored. In this work, we find that QNNs have an Achilles’ heel in binary pattern classification. To illustrate this point, we provide a theoretical insight into the properties of QNNs by presenting and analyzing a new form of symmetry embedded in a family of QNNs with full entanglement, which we term negational symmetry. Due to negational symmetry, QNNs can not differentiate between a quantum binary signal and its negational counterpart. We empirically evaluate the …


Overview Of The Clef-2022 Checkthat! Lab Task 2 On Detecting Previously Fact-Checked Claims, Preslav Nakov, Giovanni Da San Martino, Firoj Alam, Shaden Shaar, Hamdy Mubarak, Nikolay Babulkov 2022 Mohamed bin Zayed University of Artificial Intelligence

Overview Of The Clef-2022 Checkthat! Lab Task 2 On Detecting Previously Fact-Checked Claims, Preslav Nakov, Giovanni Da San Martino, Firoj Alam, Shaden Shaar, Hamdy Mubarak, Nikolay Babulkov

Natural Language Processing Faculty Publications

We describe the fourth edition of the CheckThat! Lab, part of the 2022 Conference and Labs of the Evaluation Forum (CLEF). The lab evaluates technology supporting three tasks related to factuality, and it covers seven languages such as Arabic, Bulgarian, Dutch, English, German, Spanish, and Turkish. Here, we present the task 2, which asks to detect previously fact-checked claims (in two languages). A total of six teams participated in this task, submitted a total of 37 runs, and most submissions managed to achieve sizable improvements over the baselines using transformer based models such as BERT, RoBERTa. In this paper, we …


Artificial Intelligence And Human Employment, Singapore Management University 2022 Singapore Management University

Artificial Intelligence And Human Employment, Singapore Management University

Perspectives@SMU

AI will replace humans in repetitive tasks. Greater value can be created when it augments and complements the jobs people do


Leveraging Subject Matter Expertise To Optimize Machine Learning Techniques For Air And Space Applications, Philip Y. Cho 2022 Air Force Institute of Technology

Leveraging Subject Matter Expertise To Optimize Machine Learning Techniques For Air And Space Applications, Philip Y. Cho

Theses and Dissertations

We develop new machine learning and statistical methods that are tailored for Air and Space applications through the incorporation of subject matter expertise. In particular, we focus on three separate research thrusts that each represents a different type of subject matter knowledge, modeling approach, and application. In our first thrust, we incorporate knowledge of natural phenomena to design a neural network algorithm for localizing point defects in transmission electron microscopy (TEM) images of crystalline materials. In our second research thrust, we use Bayesian feature selection and regression to analyze the relationship between fighter pilot attributes and flight mishap rates. We …


Overview Of The Clef-2022 Checkthat! Lab Task 1 On Identifying Relevant Claims In Tweets, Preslav Nakov, Alberto Barrón-Cedeño, Giovanni Da San Martino, Firoj Alam, Mucahid Kutlu, Wajdi Zaghouani, Mucahid Kutlu, Wajdi Zaghouani, Chengkai Li, Shaden Shaar, Hamdy Mubarak, Alex Nikolov 2022 Mohamed bin Zayed University of Artificial Intelligence

Overview Of The Clef-2022 Checkthat! Lab Task 1 On Identifying Relevant Claims In Tweets, Preslav Nakov, Alberto Barrón-Cedeño, Giovanni Da San Martino, Firoj Alam, Mucahid Kutlu, Wajdi Zaghouani, Mucahid Kutlu, Wajdi Zaghouani, Chengkai Li, Shaden Shaar, Hamdy Mubarak, Alex Nikolov

Natural Language Processing Faculty Publications

We present an overview of CheckThat! lab 2022 Task 1, part of the 2022 Conference and Labs of the Evaluation Forum (CLEF). Task 1 asked to predict which posts in a Twitter stream are worth fact-checking, focusing on COVID-19 and politics in six languages: Arabic, Bulgarian, Dutch, English, Spanish, and Turkish. A total of 19 teams participated and most submissions managed to achieve sizable improvements over the baselines using Transformer-based models such as BERT and GPT-3. Across the four subtasks, approaches that targetted multiple languages (be it individually or in conjunction, in general obtained the best performance. We describe the …


Deep Learning For Coverage-Guided Fuzzing: How Far Are We?, Siqi LI, Xiaofei XIE, Yun LIN, Yuekang LI, Ruitao FENG, Xiaohong LI, Weimin GE, Jin Song DONG 2022 Singapore Management University

Deep Learning For Coverage-Guided Fuzzing: How Far Are We?, Siqi Li, Xiaofei Xie, Yun Lin, Yuekang Li, Ruitao Feng, Xiaohong Li, Weimin Ge, Jin Song Dong

Research Collection School Of Computing and Information Systems

Fuzzing is a widely-used software vulnerability discovery technology, many of which are optimized using coverage-feedback. Recently, some techniques propose to train deep learning (DL) models to predict the branch coverage of an arbitrary input owing to its always-available gradients etc. as a guide. Those techniques have proved their success in improving coverage and discovering bugs under different experimental settings. However, DL models, usually as a magic black-box, are notoriously lack of explanation. Moreover, their performance can be sensitive to the collected runtime coverage information for training, indicating potentially unstable performance. In this work, we conduct a systematic empirical study on …


Contrastive Transformer-Based Multiple Instance Learning For Weakly Supervised Polyp Frame Detection, Tian YU, Guansong PANG, Fengbei LIU, Yuyuan LIU, Chong WANG, Yuanhong CHEN, Johan VERJANS, Gustavo CARNEIRO 2022 Singapore Management University

Contrastive Transformer-Based Multiple Instance Learning For Weakly Supervised Polyp Frame Detection, Tian Yu, Guansong Pang, Fengbei Liu, Yuyuan Liu, Chong Wang, Yuanhong Chen, Johan Verjans, Gustavo Carneiro

Research Collection School Of Computing and Information Systems

Current polyp detection methods from colonoscopy videos use exclusively normal (i.e., healthy) training images, which i) ignore the importance of temporal information in consecutive video frames, and ii) lack knowledge about the polyps. Consequently, they often have high detection errors, especially on challenging polyp cases (e.g., small, flat, or partially visible polyps). In this work, we formulate polyp detection as a weakly-supervised anomaly detection task that uses video-level labelled training data to detect frame-level polyps. In particular, we propose a novel convolutional transformer-based multiple instance learning method designed to identify abnormal frames (i.e., frames with polyps) from anomalous videos (i.e., …


Accomontage2: A Complete Harmonization And Accompaniment Arrangement System, Li Yi, Haochen Hu, Jingwei Zhao, Gus Xia 2022 Music X Lab, NYU Shanghai, China & Mohamed bin Zayed University of Artificial Intelligence

Accomontage2: A Complete Harmonization And Accompaniment Arrangement System, Li Yi, Haochen Hu, Jingwei Zhao, Gus Xia

Machine Learning Faculty Publications

We propose AccoMontage2, a system capable of doing full-length song harmonization and accompaniment arrangement based on a lead melody. Following AccoMontage, this study focuses on generating piano arrangements for popular/folk songs and it carries on the generalized template-based retrieval method. The novelties of this study are twofold. First, we invent a harmonization module (which AccoMontage does not have). This module generates structured and coherent full-length chord progression by optimizing and balancing three loss terms: a micro-level loss for note-wise dissonance, a meso-level loss for phrase-template matching, and a macro-level loss for full piece coherency. Second, we develop a graphical user …


Influence Level Prediction On Social Media Through Multi-Task And Sociolinguistic User Characteristics Modeling, Denys Katerenchuk 2022 The Graduate Center, City University of New York

Influence Level Prediction On Social Media Through Multi-Task And Sociolinguistic User Characteristics Modeling, Denys Katerenchuk

Dissertations, Theses, and Capstone Projects

Prediction of a user’s influence level on social networks has attracted a lot of attention as human interactions move online. Influential users have the ability to influence others’ behavior to achieve their own agenda. As a result, predicting users’ level of influence online can help to understand social networks, forecast trends, prevent misinformation, etc. The research on user influence in social networks has attracted much attention across multiple disciplines, from social sciences to mathematics, yet it is still not well understood. One of the difficulties is that the definition of influence is specific to a particular problem or a domain, …


Risk-Aware Procurement Optimization In A Global Technology Supply Chain, Jonathan David CHASE, Jingfeng YANG, Hoong Chuin LAU 2022 Singapore Management University

Risk-Aware Procurement Optimization In A Global Technology Supply Chain, Jonathan David Chase, Jingfeng Yang, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

Supply chain disruption, from ‘Black Swan’ events like the COVID-19 pandemic or the Russian invasion of Ukraine, to more ordinary issues such as labour disputes and adverse weather conditions, can result in delays, missed orders, and financial loss for companies that deliver products globally. Developing a risk-tolerant procurement strategy that anticipates the logistical problems incurred by disruption involves both accurate quantification of risk and cost-effective decision-making. We develop a supplier-focused risk evaluation metric that constrains a procurement optimization model for a global technology company. Our solution offers practical risk tolerance and cost-effectiveness, accounting for a range of constraints that realistically …


Singapore Public Sector Ai Applications Emphasizing Public Engagement: Six Examples, Steven MILLER 2022 Singapore Management University

Singapore Public Sector Ai Applications Emphasizing Public Engagement: Six Examples, Steven Miller

Research Collection School Of Computing and Information Systems

This article provides an overview of six examples of public sector AI applications in Singapore that illustrate different ways of enhancing engagement with the public. These applications demonstrate ways of enhancing engagement with the public by providing greater accessibility to government services (access anywhere, anytime) and speedier responses to public processes and feedback. Some applications make it substantially easier for members of the public to do things or make choices, while others reduce waiting time, either across an entire public infrastructure, or for an individual transaction. Some provide highly individualized coaching to guide a person through the process of doing …


Deep Learning-Based Text Recognition Of Agricultural Regulatory Document, Hua Leong FWA, Farn Haur CHAN 2022 Singapore Management University

Deep Learning-Based Text Recognition Of Agricultural Regulatory Document, Hua Leong Fwa, Farn Haur Chan

Research Collection School Of Computing and Information Systems

In this study, an OCR system based on deep learning techniques was deployed to digitize scanned agricultural regulatory documents comprising of certificates and labels. Recognition of the certificatesand labels is challenging as they are scanned images of the hard copy form and the layout and size of the text as well as the languages vary between the various countries (due to diverse regulatory requirements). Weevaluated and compared between various state-of-the-art deep learningbased text detection and recognition model as well as a packaged OCR library – Tesseract. We then adopted a two-stage approach comprisingof text detection using Character Region Awareness For …


Constrained Multiagent Reinforcement Learning For Large Agent Population, Jiajing LING, Arambam James SINGH, Nguyen Duc THIEN, Akshat KUMAR 2022 Singapore Management University

Constrained Multiagent Reinforcement Learning For Large Agent Population, Jiajing Ling, Arambam James Singh, Nguyen Duc Thien, Akshat Kumar

Research Collection School Of Computing and Information Systems

Learning control policies for a large number of agents in a decentralized setting is challenging due to partial observability, uncertainty in the environment, and scalability challenges. While several scalable multiagent RL (MARL) methods have been proposed, relatively few approaches exist for large scale constrained MARL settings. To address this, we first formulate the constrained MARL problem in a collective multiagent setting where interactions among agents are governed by the aggregate count and types of agents, and do not depend on agents’ specific identities. Second, we show that standard Lagrangian relaxation methods, which are popular for single agent RL, do not …


Finite Gaussian Neurons: Defending Against Adversarial Attacks By Making Neural Networks Say "I Don’T Know", Felix Grezes 2022 The Graduate Center, City University of New York

Finite Gaussian Neurons: Defending Against Adversarial Attacks By Making Neural Networks Say "I Don’T Know", Felix Grezes

Dissertations, Theses, and Capstone Projects

In this work, I introduce the Finite Gaussian Neuron (FGN), a novel neuron architecture for artificial neural networks aimed at protecting against adversarial attacks.
Since 2014, artificial neural networks have been known to be vulnerable to adversarial attacks, which can fool the network into producing wrong or nonsensical outputs by making humanly imperceptible alterations to inputs. While defenses against adversarial attacks have been proposed, they usually involve retraining a new neural network from scratch, a costly task.

My works aims to:
- easily convert existing models to Finite Gaussian Neuron architecture,
- while preserving the existing model's behavior on real …


Truncated Matrix Power Iteration For Differentiable Dag Learning, Zhen Zhang, Ignavier Ng, Dong Gong, Yuhang Liu, Ehsan M. Abbasnejad, Mingming Gong, Kun Zhang, Javen Qinfeng Shi 2022 The University of Adelaide, Australia

Truncated Matrix Power Iteration For Differentiable Dag Learning, Zhen Zhang, Ignavier Ng, Dong Gong, Yuhang Liu, Ehsan M. Abbasnejad, Mingming Gong, Kun Zhang, Javen Qinfeng Shi

Machine Learning Faculty Publications

Recovering underlying Directed Acyclic Graph structures (DAG) from observational data is highly challenging due to the combinatorial nature of the DAG-constrained optimization problem. Recently, DAG learning has been cast as a continuous optimization problem by characterizing the DAG constraint as a smooth equality one, generally based on polynomials over adjacency matrices. Existing methods place very small coefficients on high-order polynomial terms for stabilization, since they argue that large coefficients on the higher-order terms are harmful due to numeric exploding. On the contrary, we discover that large coefficients on higher-order terms are beneficial for DAG learning, when the spectral radiuses of …


Exploiting Higher-Order Derivatives In Convex Optimization Methods, Dmitry Kamzolov, Alexander Gasnikov, Pavel Dvurechensky, Artem Agafonov, Martin Takac 2022 Mohamed bin Zayed University of Artificial Intelligence

Exploiting Higher-Order Derivatives In Convex Optimization Methods, Dmitry Kamzolov, Alexander Gasnikov, Pavel Dvurechensky, Artem Agafonov, Martin Takac

Machine Learning Faculty Publications

Exploiting higher-order derivatives in convex optimization is known at least since 1970’s. In each iteration higher-order (also called tensor) methods minimize a regularized Taylor expansion of the objective function, which leads to faster convergence rates if the corresponding higher-order derivative is Lipschitz-continuous. Recently a series of lower iteration complexity bounds for such methods were proved, and a gap between upper an lower complexity bounds was revealed. Moreover, it was shown that such methods can be implementable since the appropriately regularized Taylor expansion of a convex function is also convex and, thus, can be minimized in polynomial time. Only very recently …


Digital Commons powered by bepress