从先前收集的专家数据数据集中学习提供了有望在没有不安全和昂贵的在线探索的情况下获取机器人政策。但是,一个主要的挑战是培训数据集中的各州与在测试时学到的政策访问的国家之间的分配转移。尽管先前的工作主要研究了在离线培训期间政策引起的分配变化,但研究在部署时间从分布状态恢复的问题还不是很好。我们通过引入一项恢复政策来减轻部署时间的分配转变,该恢复政策将代理人带回培训歧管,每当由于外部扰动而逐渐退出分布状态,例如。恢复策略依赖于训练数据密度的近似值和学习的模棱两可的映射,该映射将视觉观测映射到一个潜在空间中,在该空间中,翻译与机器人动作相对应。我们通过在真正的机器人平台上进行了几个操纵实验来证明所提出的方法的有效性。我们的结果表明,恢复策略使代理可以完成任务,而行为克隆仅由于分配转移问题而失败。
translated by 谷歌翻译
我们介绍了一种与数据对称性相对的学习表示形式的通用方法。核心思想是将潜在空间分解为不变因素和对称组本身。该组件在语义上分别对应于固有的数据类别,并构成姿势。学习者是自我监督的,并根据相对对称信息来渗透这些语义。该方法是由群体理论的理论结果激励的,并保证了无损,可解释和解开的表示。我们通过涉及具有多种对称性的数据集的实验来实证研究该方法。结果表明,我们的表示形式捕获数据的几何形状,并超过其他模棱两可的表示框架。
translated by 谷歌翻译
我们引入了一种基于最近邻居回归的活动函数近似的算法。我们的活跃邻居回归器(ANNR)依靠Voronoi-Delaunay框架从计算几何形状到具有恒定估计函数值的空间将空间细分为恒定的函数值,并以一种将函数图的几何形状计入的方式选择新的查询点。我们将最新的最新活动函数近似值(称为defer)视为基于空间的增量矩形分区,为主基线。ANNR解决了由延期中使用的空间细分策略产生的许多局限性。我们提供了我们方法的计算有效实施以及理论停止保证。经验结果表明,Annr优于封闭形式函数和现实示例的基线,例如引力波参数推断和生成模型潜在空间的探索。
translated by 谷歌翻译
我们考虑一个用于边缘计算应用程序的智能传感器网络,该网络采样了感兴趣的信号,并将更新发送到基站进行远程全局监视。传感器配备了传感和计算,并且可以在传输前在板载上发送原始数据或处理它们。边缘的有限硬件资源产生基本的潜伏期 - 准确性权衡:原始测量值不准确,但及时,而计算延迟后准确的处理更新可用。同样,如果传感器在板载处理需要数据压缩,则无线通信引起的延迟可能会更高。因此,需要决定何时传感器应传输原始测量或依靠本地处理以最大程度地提高整体网络性能。为了解决这个传感设计问题,我们对一个嵌入计算和通信延迟的估计理论优化框架进行建模,并提出一种基于强化学习的方法,以在每个传感器上动态分配计算资源。我们提出的方法的有效性是通过数值模拟的验证,该案例研究是由无人机和自动驾驶车辆驱动的案例研究。
translated by 谷歌翻译
从几个培训示例中不断学习新课程,而不忘记以前的旧课程需要一个灵活的体系结构,而不可避免地会增加部分存储,其中可以逐步存储并有效地检索新的示例和类。一个可行的架构解决方案是将固定的深神经网络紧密融合到动态发展的明确记忆(EM)。作为该体系结构的核心,我们提出了一个EM单元,该单元在持续学习操作过程中利用节能中的内存计算(IMC)核心。我们首次证明了EM单元如何使用基于IMC Core上的操作(PCM)上的IMC核心操作,在推理期间进行了多个训练示例,扩展以适应看不见的类并进行相似性搜索。具体而言,通过PCM设备的原位进行性结晶实现了一些编码训练示例的物理叠加。与不断学习的最新完整精确基线软件模型相比,IMC核心上达到的分类精度在1.28% - 2.5%范围内保持在2.5%之内。在60个旧课程的顶部,新颖的课程(每班只有五个示例)。
translated by 谷歌翻译
在本文中,我们考虑了一个智能传感器(代理)的无线网络,该网络可以监视动态过程,并将测量结果发送到执行全球监控和决策的基站。智能传感器配备了传感和计算,并且可以在传输前发送原始测量或对其进行处理。受限的代理资源提出了基本的潜伏 - 准确性权衡。一方面,原始测量值不准确,但生产速度很快。另一方面,对资源约束平台上的数据处理以不可忽略的计算延迟成本生成准确的测量。此外,如果也压缩了处理的数据,则无线通信引起的延迟可能更高。因此,确定网络中的传感器应在何时何地传输原始测量或利用耗时的本地处理是一项挑战。为了解决这个设计问题,我们提出了一种增强学习方法,以学习有效的政策,该政策会动态决定何时在每个传感器上处理测量。我们提出的方法的有效性通过数值模拟,并通过案例研究对智能感应进行了验证。
translated by 谷歌翻译
The increasingly crucial role of human displacements in complex societal phenomena, such as traffic congestion, segregation, and the diffusion of epidemics, is attracting the interest of scientists from several disciplines. In this article, we address mobility network generation, i.e., generating a city's entire mobility network, a weighted directed graph in which nodes are geographic locations and weighted edges represent people's movements between those locations, thus describing the entire mobility set flows within a city. Our solution is MoGAN, a model based on Generative Adversarial Networks (GANs) to generate realistic mobility networks. We conduct extensive experiments on public datasets of bike and taxi rides to show that MoGAN outperforms the classical Gravity and Radiation models regarding the realism of the generated networks. Our model can be used for data augmentation and performing simulations and what-if analysis.
translated by 谷歌翻译
在这项工作中,我们考虑线性逆问题$ y = ax + \ epsilon $,其中$ a \ colon x \ to y $是可分离的hilbert spaces $ x $和$ y $之间的已知线性运算符,$ x $。 $ x $和$ \ epsilon $中的随机变量是$ y $的零平均随机过程。该设置涵盖成像中的几个逆问题,包括去噪,去束和X射线层析造影。在古典正规框架内,我们专注于正则化功能的情况下未能先验,而是从数据中学习。我们的第一个结果是关于均方误差的最佳广义Tikhonov规则器的表征。我们发现它完全独立于前向操作员$ a $,并仅取决于$ x $的平均值和协方差。然后,我们考虑从两个不同框架中设置的有限训练中学习常规程序的问题:一个监督,根据$ x $和$ y $的样本,只有一个无人监督,只基于$ x $的样本。在这两种情况下,我们证明了泛化界限,在X $和$ \ epsilon $的分发的一些弱假设下,包括子高斯变量的情况。我们的界限保持在无限尺寸的空间中,从而表明更精细和更细的离散化不会使这个学习问题更加困难。结果通过数值模拟验证。
translated by 谷歌翻译
Computational units in artificial neural networks follow a simplified model of biological neurons. In the biological model, the output signal of a neuron runs down the axon, splits following the many branches at its end, and passes identically to all the downward neurons of the network. Each of the downward neurons will use their copy of this signal as one of many inputs dendrites, integrate them all and fire an output, if above some threshold. In the artificial neural network, this translates to the fact that the nonlinear filtering of the signal is performed in the upward neuron, meaning that in practice the same activation is shared between all the downward neurons that use that signal as their input. Dendrites thus play a passive role. We propose a slightly more complex model for the biological neuron, where dendrites play an active role: the activation in the output of the upward neuron becomes optional, and instead the signals going through each dendrite undergo independent nonlinear filterings, before the linear combination. We implement this new model into a ReLU computational unit and discuss its biological plausibility. We compare this new computational unit with the standard one and describe it from a geometrical point of view. We provide a Keras implementation of this unit into fully connected and convolutional layers and estimate their FLOPs and weights change. We then use these layers in ResNet architectures on CIFAR-10, CIFAR-100, Imagenette, and Imagewoof, obtaining performance improvements over standard ResNets up to 1.73%. Finally, we prove a universal representation theorem for continuous functions on compact sets and show that this new unit has more representational power than its standard counterpart.
translated by 谷歌翻译
Recent years have seen a proliferation of research on adversarial machine learning. Numerous papers demonstrate powerful algorithmic attacks against a wide variety of machine learning (ML) models, and numerous other papers propose defenses that can withstand most attacks. However, abundant real-world evidence suggests that actual attackers use simple tactics to subvert ML-driven systems, and as a result security practitioners have not prioritized adversarial ML defenses. Motivated by the apparent gap between researchers and practitioners, this position paper aims to bridge the two domains. We first present three real-world case studies from which we can glean practical insights unknown or neglected in research. Next we analyze all adversarial ML papers recently published in top security conferences, highlighting positive trends and blind spots. Finally, we state positions on precise and cost-driven threat modeling, collaboration between industry and academia, and reproducible research. We believe that our positions, if adopted, will increase the real-world impact of future endeavours in adversarial ML, bringing both researchers and practitioners closer to their shared goal of improving the security of ML systems.
translated by 谷歌翻译