Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Singapore Management University

Discipline
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1921 - 1950 of 7454

Full-Text Articles in Physical Sciences and Mathematics

Investigating The Adoption Of Hybrid Encrypted Cloud Data Deduplication With Game Theory, Xueqin Liang, Zheng Yan, Robert H. Deng, Qinghu Zheng Mar 2021

Investigating The Adoption Of Hybrid Encrypted Cloud Data Deduplication With Game Theory, Xueqin Liang, Zheng Yan, Robert H. Deng, Qinghu Zheng

Research Collection School Of Computing and Information Systems

Encrypted data deduplication, along with different preferences in data access control, brings the birth of hybrid encrypted cloud data deduplication (H-DEDU for short). However, whether H-DEDU can be successfully deployed in practice has not been seriously investigated. Obviously, the adoption of H-DEDU depends on whether it can bring economic benefits to all stakeholders. But existing economic models of cloud storage fail to support H-DEDU due to complicated interactions among stakeholders. In this article, we establish a formal economic model of H-DEDU by formulating the utilities of all involved stakeholders, i.e., data holders, data owners, and Cloud Storage Providers (CSPs). Then, …


Fast Scene Labeling Via Structural Inference, Huaidong Zhang, Chu Han, Xiaodan Zhang, Yong Du, Xuemiao Xu, Guoqiang Han, Jing Qin, Shengfeng He Mar 2021

Fast Scene Labeling Via Structural Inference, Huaidong Zhang, Chu Han, Xiaodan Zhang, Yong Du, Xuemiao Xu, Guoqiang Han, Jing Qin, Shengfeng He

Research Collection School Of Computing and Information Systems

Scene labeling or parsing aims to assign pixelwise semantic labels for an input image. Existing CNN-based models cannot leverage the label dependencies, while RNN-based models predict labels within the local context. In this paper, we propose a fast LSTM scene labeling network via structural inference. A minimum spanning tree is used to build the image structure for constructing semantic relationships. This structure allows efficient generation of direct parent-child dependencies for arbitrary levels of superpixels, and thus structural relationships can be learned with LSTM. In particular, we propose a bi-directional recurrent network to model the information flow along the parent-child path. …


Recent Advances On Intelligent Mobility And Edge Computing, Xun Shao, Zhi Liu, Xianfu Chen, Seng W. Loke, Hwee-Pink Tan Mar 2021

Recent Advances On Intelligent Mobility And Edge Computing, Xun Shao, Zhi Liu, Xianfu Chen, Seng W. Loke, Hwee-Pink Tan

Research Collection School Of Computing and Information Systems

In recent years, we have seen fast development of wireless communications, networking, and cloud computing: 4G, 5G and multiaccess networks greatly enhance the quality of service (QoS) of wireless access networks; software-defined networking, network function virtualization, and information-centric networking largely reduce the cost of network service providers and improve the quality of experience (QoE) of end-users; the development of mobile devices and mobile cloud computing lead to explosive deployment of mobile services and applications; the recent development of advanced algorithms such as Deep Learning has shown great potential in resource allocation and service orchestration. Deep integration of the above technologies …


Deepis: Susceptibility Estimation On Social Networks, Wenwen Xia, Yuchen Li, Jun Wu, Shenghong Li Mar 2021

Deepis: Susceptibility Estimation On Social Networks, Wenwen Xia, Yuchen Li, Jun Wu, Shenghong Li

Research Collection School Of Computing and Information Systems

Influence diffusion estimation is a crucial problem in social network analysis. Most prior works mainly focus on predicting the total influence spread, i.e., the expected number of influenced nodes given an initial set of active nodes (aka. seeds). However, accurate estimation of susceptibility, i.e., the probability of being influenced for each individual, is more appealing and valuable in real-world applications. Previous methods generally adopt Monte Carlo simulation or heuristic rules to estimate the influence, resulting in high computational cost or unsatisfactory estimation error when these methods are used to estimate susceptibility. In this work, we propose to leverage graph neural …


How Do Monetary Incentives Influence Giving? An Empirical Investigation Of Matching Subsidies On Kiva, Zhiyuan Gao, Zhiling Guo, Qian Tang Mar 2021

How Do Monetary Incentives Influence Giving? An Empirical Investigation Of Matching Subsidies On Kiva, Zhiyuan Gao, Zhiling Guo, Qian Tang

Research Collection School Of Computing and Information Systems

Matching subsidies, through which third-party institutions provide a dollar-for-dollar match of private contributions made through selected campaigns, have served as effective tools to boost fundraising. We utilize a quasi-experiment on a prosocial crowdfunding platform to examine the effectiveness of matching subsidies in shaping funding outcomes and lender behaviors. Although matching subsidies offer matched loans competitive advantages over unmatched loans, we find that total private contributions made to both matched and unmatched loans increase compared to their prematching counterparts, suggesting a positive spillover effect on unmatched loans. However, matching subsidies lead to decreased private contributions made on the platform after a …


Combining Query Reduction And Expansion For Text-Retrieval-Based Bug Localization, Juan Manuel Florez, Oscar Chaparro, Christoph Treude, Andrian Marcus Mar 2021

Combining Query Reduction And Expansion For Text-Retrieval-Based Bug Localization, Juan Manuel Florez, Oscar Chaparro, Christoph Treude, Andrian Marcus

Research Collection School Of Computing and Information Systems

Automated text-retrieval-based bug localization (TRBL) techniques normally use the full text of a bug report to formulate a query and retrieve parts of the code that are buggy. Previous research has shown that reducing the size of the query increases the effectiveness of TRBL. On the other hand, researchers also found improvements when expanding the query (i.e., adding more terms). In this paper, we bring these two views together to reformulate queries for TRBL. Specifically, we improve discourse-based query reduction strategies, by adopting a combinatorial approach and using task phrases from bug reports, and combine them with a state-of-the-art query …


Outsourcing Life Cycle Model For Financial Services In The Fintech Era, Tristan Lim, Patrick Thng Mar 2021

Outsourcing Life Cycle Model For Financial Services In The Fintech Era, Tristan Lim, Patrick Thng

Research Collection School Of Computing and Information Systems

In today’s financial services landscape, staying ahead of the innovation curve and being disciplined at enhancing core service offerings entail careful resource planning. A well-structured outsourcing arrangement can go a long way towards enhancing long term organizational strategic growth. In the post-2014 FinTech era, (i) strategic management with an innovation focus and (ii) financial technology-associated risks, have brought about changes to outsourcing in the financial services industry. Presently, most outsourcing life cycle models in existing literature seek to provide comprehensive, yet industry-neutral guidelines lacking industry context and depth of coverage. A newly licensed financial institution deciding to embark on outsourcing …


Is The Ground Truth Really Accurate? Dataset Purification For Automated Program Repair, Deheng Yang, Yan Lei, Xiaoguang Mao, David Lo, Huan Xie, Meng Yan Mar 2021

Is The Ground Truth Really Accurate? Dataset Purification For Automated Program Repair, Deheng Yang, Yan Lei, Xiaoguang Mao, David Lo, Huan Xie, Meng Yan

Research Collection School Of Computing and Information Systems

Datasets of real-world bugs shipped with human-written patches are intensively used in the evaluation of existing automated program repair (APR) techniques, wherein the human-written patches always serve as the ground truth, for manual or automated assessment approaches, to evaluate the correctness of test-suite adequate patches. An inaccurate human-written patch tangled with other code changes will pose threats to the reliability of the assessment results. Therefore, the construction of such datasets always requires much manual effort on isolating real bug fixes from bug fixing commits. However, the manual work is time-consuming and prone to mistakes, and little has been known on …


Adaptive Simultaneous Pervasive Visible Light Communication And Sensing, Ila Nitin Gokarn, Archan Misra Mar 2021

Adaptive Simultaneous Pervasive Visible Light Communication And Sensing, Ila Nitin Gokarn, Archan Misra

Research Collection School Of Computing and Information Systems

Driven by the rapid growth in the proliferation of low-cost LED luminaries, visible light is being increasingly explored as both a high-speed communication and sensing channel for a variety of IoT applications. Visible Light Communication (VLC) exploits the high-frequency modulation of an optical source while ensuring imperceptibility to the human eye. In parallel, recent approaches in Visible Light Sensing (VLS) have demonstrated how high frequency optical strobing can be used to perform vision-based remote sensing of mechanical vibrations (e.g., of factory equipment). To date, exemplars of VLC and VLS have, however, been explored in isolation, without consideration of their mutual …


Privacy-Preserving Multi-Keyword Searchable Encryption For Distributed Systems, Xueqiao Liu, Guomin Yang, Willy Susilo, Joseph Tonien, Jian Shen Mar 2021

Privacy-Preserving Multi-Keyword Searchable Encryption For Distributed Systems, Xueqiao Liu, Guomin Yang, Willy Susilo, Joseph Tonien, Jian Shen

Research Collection School Of Computing and Information Systems

As cloud storage has been widely adopted in various applications, how to protect data privacy while allowing efficient data search and retrieval in a distributed environment remains a challenging research problem. Existing searchable encryption schemes are still inadequate on desired functionality and security/privacy perspectives. Specifically, supporting multi-keyword search under the multi-user setting, hiding search pattern and access pattern, and resisting keyword guessing attacks (KGA) are the most challenging tasks. In this article, we present a new searchable encryption scheme that addresses the above problems simultaneously, which makes it practical to be adopted in distributed systems. It not only enables multi-keyword …


Structurally Enriched Entity Mention Embedding From Semi-Structured Textual Content, Lee Hsun Hsieh, Yang Yin Lee, Ee-Peng Lim Mar 2021

Structurally Enriched Entity Mention Embedding From Semi-Structured Textual Content, Lee Hsun Hsieh, Yang Yin Lee, Ee-Peng Lim

Research Collection School Of Computing and Information Systems

In this research, we propose a novel and effective entity mention embedding framework that learns from semi-structured text corpus with annotated entity mentions without the aid of well-constructed knowledge graph or external semantic information other than the corpus itself. Based on the co-occurrence of words and entity mentions, we enrich the co-occurrence matrix with entity-entity, entity-word, and word-entity relationships as well as the simple structures within the documents. Experimentally, we show that our proposed entity mention embedding benefits from the structural information in link prediction task measured by mean reciprocal rank (MRR) and mean precision@K (MP@K) on two datasets for …


Decision-Guided Weighted Automata Extraction From Recurrent Neural Networks, Xiyue Zhang, Xiaoning Du, Xiaofei Xie, Lei Ma, Yang Liu, Meng Sun Feb 2021

Decision-Guided Weighted Automata Extraction From Recurrent Neural Networks, Xiyue Zhang, Xiaoning Du, Xiaofei Xie, Lei Ma, Yang Liu, Meng Sun

Research Collection School Of Computing and Information Systems

Recurrent Neural Networks (RNNs) have demonstrated their effectiveness in learning and processing sequential data (e.g., speech and natural language). However, due to the black-box nature of neural networks, understanding the decision logic of RNNs is quite challenging. Some recent progress has been made to approximate the behavior of an RNN by weighted automata. They provide better interpretability, but still suffer from poor scalability. In this paper, we propose a novel approach to extracting weighted automata with the guidance of a target RNN’s decision and context information. In particular, we identify the patterns of RNN’s step-wise predictive decisions to instruct the …


Culturally Diverse Expert Teams Have Yet To Bring Comprehensive Linguistic Diversity To Intergovernmental Ecosystem Assessments, Abigail J. Lynch, Fernández-Llamazares Álvaro, Ignacio Palomo, Pedro Jaureguiberry, Amano Tatsuya, Zeenatul Basher, Michelle Lim, Tuyeni Heita Mwampamba, Aibek Samakov, Odirilwe Selomane, Michelle Mei Ling Lim Feb 2021

Culturally Diverse Expert Teams Have Yet To Bring Comprehensive Linguistic Diversity To Intergovernmental Ecosystem Assessments, Abigail J. Lynch, Fernández-Llamazares Álvaro, Ignacio Palomo, Pedro Jaureguiberry, Amano Tatsuya, Zeenatul Basher, Michelle Lim, Tuyeni Heita Mwampamba, Aibek Samakov, Odirilwe Selomane, Michelle Mei Ling Lim

Research Collection Yong Pung How School Of Law

Multicultural representation is a stated goal of many global scientific assessment processes. These processes aim to mobilize a broader, more diverse knowledge base and increase legitimacy and inclusiveness of these assessment processes. Often, enhancing cultural diversity is encouraged through involvement of diverse expert teams and sources of knowledge in different languages. In this article, we examine linguistic diversity, as one representation of cultural diversity, in the eight published assessments of the Intergovernmental Science-Policy Platform on Biodiversity and Ecosystem Services (IPBES). Our results show that the IPBES assessment outputs are disproportionately filtered through English-language literature and authors from Anglophone countries. To …


Evoking Empathy: A Framework For Describing Empathy Tools, Sydney Pratte, Anthony Tang, Lora Oehlberg Feb 2021

Evoking Empathy: A Framework For Describing Empathy Tools, Sydney Pratte, Anthony Tang, Lora Oehlberg

Research Collection School Of Computing and Information Systems

Empathy tools are experiences designed to evoke empathetic responses by placing the user in another’s lived and felt experience. The problem is that designers do not have a common vocabulary to describe empathy tool experiences; consequently, it is difficult to compare/contrast empathy tool designs or to think about their efficacy. To address this problem, we analyzed 26 publications on empathy tools to develop a descriptive framework for designers of empathy tools. Based on our analysis, we found that empathy tools can be described along three dimensions: (i) the amount of agency the tool allows, (ii) the user’s perspective while using …


Multi-Decoder Attention Model With Embedding Glimpse For Solving Vehicle Routing Problems, Liang Xin, Wen Song, Zhiguang Cao, Jie Zhang Feb 2021

Multi-Decoder Attention Model With Embedding Glimpse For Solving Vehicle Routing Problems, Liang Xin, Wen Song, Zhiguang Cao, Jie Zhang

Research Collection School Of Computing and Information Systems

We present a novel deep reinforcement learning method to learn construction heuristics for vehicle routing problems. In specific, we propose a Multi-Decoder Attention Model (MDAM) to train multiple diverse policies, which effectively increases the chance of finding good solutions compared with existing methods that train only one policy. A customized beam search strategy is designed to fully exploit the diversity of MDAM. In addition, we propose an Embedding Glimpse layer in MDAM based on the recursive nature of construction, which can improve the quality of each policy by providing more informative embeddings. Extensive experiments on six different routing problems show …


Understanding Adversarial Robustness Via Critical Attacking Route, Tianlin Li, Aishan Liu, Xianglong Liu, Yitao Xu, Chongzhi Zhang, Xiaofei Xie Feb 2021

Understanding Adversarial Robustness Via Critical Attacking Route, Tianlin Li, Aishan Liu, Xianglong Liu, Yitao Xu, Chongzhi Zhang, Xiaofei Xie

Research Collection School Of Computing and Information Systems

Deep neural networks (DNNs) are vulnerable to adversarial examples which are generated by inputs with imperceptible perturbations. Understanding adversarial robustness of DNNs has become an important issue, which would for certain result in better practical deep learning applications. To address this issue, we try to explain adversarial robustness for deep models from a new perspective of critical attacking route, which is computed by a gradient-based influence propagation strategy. Similar to rumor spreading in social net-works, we believe that adversarial noises are amplified and propagated through the critical attacking route. By exploiting neurons' influences layer by layer, we compose the critical …


Efficientderain: Learning Pixel-Wise Dilation Filtering For High-Efficiency Single-Image Deraining, Qing Guo, Jingyang Sun, Felix Juefei-Xu, Lei Ma, Xiaofei Xie, Wei Feng, Yang Liu, Jianjun Zhao Feb 2021

Efficientderain: Learning Pixel-Wise Dilation Filtering For High-Efficiency Single-Image Deraining, Qing Guo, Jingyang Sun, Felix Juefei-Xu, Lei Ma, Xiaofei Xie, Wei Feng, Yang Liu, Jianjun Zhao

Research Collection School Of Computing and Information Systems

Single-image deraining is rather challenging due to the unknown rain model. Existing methods often make specific assumptions of the rain model, which can hardly cover many diverse circumstances in the real world, compelling them to employ complex optimization or progressive refinement. This, however, significantly affects these methods’ efficiency and effectiveness for many efficiency-critical applications. To fill this gap, in this paper, we regard the single-image deraining as a general image-enhancing problem and originally propose a model-free deraining method, i.e., EfficientDeRain, which is able to process a rainy image within 10 ms (i.e., around 6 ms on average), over 80 times …


Fault Analysis And Debugging Of Microservice Systems: Industrial Survey, Benchmark System, And Empirical Study, Xiang Zhou, Xin Peng, Tao Xie, Jun Sun, Chao Ji, Wenhai Li, Dan Ding Feb 2021

Fault Analysis And Debugging Of Microservice Systems: Industrial Survey, Benchmark System, And Empirical Study, Xiang Zhou, Xin Peng, Tao Xie, Jun Sun, Chao Ji, Wenhai Li, Dan Ding

Research Collection School Of Computing and Information Systems

The complexity and dynamism of microservice systems pose unique challenges to a variety of software engineering tasks such as fault analysis and debugging. In spite of the prevalence and importance of microservices in industry, there is limited research on the fault analysis and debugging of microservice systems. To fill this gap, we conduct an industrial survey to learn typical faults of microservice systems, current practice of debugging, and the challenges faced by developers in practice. We then develop a medium-size benchmark microservice system (being the largest and most complex open source microservice system within our knowledge) and replicate 22 industrial …


Revman: Revenue-Aware Multi-Task Online Insurance Recommendation, Yu Li, Yi Zhang, Lu Gan, Gengwei Hong, Zimu Zhou, Qiang Li Feb 2021

Revman: Revenue-Aware Multi-Task Online Insurance Recommendation, Yu Li, Yi Zhang, Lu Gan, Gengwei Hong, Zimu Zhou, Qiang Li

Research Collection School Of Computing and Information Systems

Online insurance is a new type of e-commerce with exponential growth. An effective recommendation model that maximizes the total revenue of insurance products listed in multiple customized sales scenarios is crucial for the success of online insurance business. Prior recommendation models are ineffective because they fail to characterize the complex relatedness of insurance products in multiple sales scenarios and maximize the overall conversion rate rather than the total revenue. Even worse, it is impractical to collect training data online for total revenue maximization due to the business logic of online insurance. We propose RevMan, a Revenue-aware Multi-task Network for online …


Differential Training: A Generic Framework To Reduce Label Noises For Android Malware Detection, Jiayun Xu, Yingjiu Li, Robert H. Deng Feb 2021

Differential Training: A Generic Framework To Reduce Label Noises For Android Malware Detection, Jiayun Xu, Yingjiu Li, Robert H. Deng

Research Collection School Of Computing and Information Systems

A common problem in machine learning-based malware detection is that training data may contain noisy labels and it is challenging to make the training data noise-free at a large scale. To address this problem, we propose a generic framework to reduce the noise level of training data for the training of any machine learning-based Android malware detection. Our framework makes use of all intermediate states of two identical deep learning classification models during their training with a given noisy training dataset and generate a noise-detection feature vector for each input sample. Our framework then applies a set of outlier detection …


Visual Analysis Of Discrimination In Machine Learning, Qianwen Wang, Zhenghua Xu, Zhutian Chen, Yong Wang, Shixia Liu, Huamin Qu Feb 2021

Visual Analysis Of Discrimination In Machine Learning, Qianwen Wang, Zhenghua Xu, Zhutian Chen, Yong Wang, Shixia Liu, Huamin Qu

Research Collection School Of Computing and Information Systems

The growing use of automated decision-making in critical applications, such as crime prediction and college admission, has raised questions about fairness in machine learning. How can we decide whether different treatments are reasonable or discriminatory? In this paper, we investigate discrimination in machine learning from a visual analytics perspective and propose an interactive visualization tool, DiscriLens, to support a more comprehensive analysis. To reveal detailed information on algorithmic discrimination, DiscriLens identifies a collection of potentially discriminatory itemsets based on causal modeling and classification rules mining. By combining an extended Euler diagram with a matrix-based visualization, we develop a novel set …


Qlens: Visual Analytics Of Multi-Step Problem-Solving Behaviors For Improving Question Design, Meng Xia, Reshika P. Velumani, Yong Wang, Huamin Qu, Xiaojuan Ma Feb 2021

Qlens: Visual Analytics Of Multi-Step Problem-Solving Behaviors For Improving Question Design, Meng Xia, Reshika P. Velumani, Yong Wang, Huamin Qu, Xiaojuan Ma

Research Collection School Of Computing and Information Systems

With the rapid development of online education in recent years, there has been an increasing number of learning platforms that provide students with multi-step questions to cultivate their problem-solving skills. To guarantee the high quality of such learning materials, question designers need to inspect how students’ problem-solving processes unfold step by step to infer whether students’ problem-solving logic matches their design intent. They also need to compare the behaviors of different groups (e.g., students from different grades) to distribute questions to students with the right level of knowledge. The availability of fine-grained interaction data, such as mouse movement trajectories from …


Graph-Evolving Meta-Learning For Low-Resource Medical Dialogue Generation, Shuai Lin, Pan Zhou, Xiaodan Liang, Jianheng Tang, Ruihui Zhao, Ziliang Chen, Liang Lin Feb 2021

Graph-Evolving Meta-Learning For Low-Resource Medical Dialogue Generation, Shuai Lin, Pan Zhou, Xiaodan Liang, Jianheng Tang, Ruihui Zhao, Ziliang Chen, Liang Lin

Research Collection School Of Computing and Information Systems

Human doctors with well-structured medical knowledge can diagnose a disease merely via a few conversations with patients about symptoms. In contrast, existing knowledge-grounded dialogue systems often require a large number of dialogue instances to learn as they fail to capture the correlations between different diseases and neglect the diagnostic experience shared among them. To address this issue, we propose a more natural and practical paradigm, i.e., low-resource medical dialogue generation, which can transfer the diagnostic experience from source diseases to target ones with a handful of data for adaptation. It is capitalized on a commonsense knowledge graph to characterize the …


Scalable Verification Of Quantized Neural Networks, Thomas A. Henzinger, Mathias Lechner, Dorde Zikelic Feb 2021

Scalable Verification Of Quantized Neural Networks, Thomas A. Henzinger, Mathias Lechner, Dorde Zikelic

Research Collection School Of Computing and Information Systems

Formal verification of neural networks is an active topic of research, and recent advances have significantly increased the size of the networks that verification tools can handle. However, most methods are designed for verification of an idealized model of the actual network which works over real arithmetic and ignores rounding imprecisions. This idealization is in stark contrast to network quantization, which is a technique that trades numerical precision for computational efficiency and is, therefore, often applied in practice. Neglecting rounding errors of such low-bit quantized neural networks has been shown to lead to wrong conclusions about the network’s correctness. Thus, …


Evidence Aware Neural Pornographic Text Identification For Child Protection, Kaisong Song, Yangyang Kang, Wei Gao, Zhe Gao, Changlong Sun, Xiaozhong Liu Feb 2021

Evidence Aware Neural Pornographic Text Identification For Child Protection, Kaisong Song, Yangyang Kang, Wei Gao, Zhe Gao, Changlong Sun, Xiaozhong Liu

Research Collection School Of Computing and Information Systems

Identifying pornographic text online is practically useful to protect children from access to such adult content. However, some authors may intentionally avoid using sensitive words in their pornographic texts to take advantage of the lack of human audits. Without prior knowledge guidance, real semantics of such pornographic text is difficult to understand by existing methods due to its high context-sensitivity and heavy usage of figurative language, which brings huge challenges to the porn detection systems used in social media platforms. In this paper, we approach to the problem as a document-level porn identification task by locating and integrating sentence-level evidence …


An Exploratory Study On The Introduction And Removal Of Different Types Of Technical Debt In Deep Learning Frameworks, Jiakun Liu, Qiao Huang, Xin Xia, Emad Shihab, David Lo, Shanping Li Feb 2021

An Exploratory Study On The Introduction And Removal Of Different Types Of Technical Debt In Deep Learning Frameworks, Jiakun Liu, Qiao Huang, Xin Xia, Emad Shihab, David Lo, Shanping Li

Research Collection School Of Computing and Information Systems

To complete tasks faster, developers often have to sacrifice the quality of the software. Such compromised practice results in the increasing burden to developers in future development. The metaphor, technical debt, describes such practice. Prior research has illustrated the negative impact of technical debt, and many researchers investigated how developers deal with a certain type of technical debt. However, few studies focused on the removal of different types of technical debt in practice. To fill this gap, we use the introduction and removal of different types of self-admitted technical debt (i.e., SATD) in 7 deep learning frameworks as an example. …


Accelerating Large-Scale Heterogeneous Interaction Graph Embedding Learning Via Importance Sampling, Yugang Ji, Mingyang Yin, Hongxia Yang, Jingren Zhou, Vincent W. Zheng, Chuan Shi, Yuan Fang Feb 2021

Accelerating Large-Scale Heterogeneous Interaction Graph Embedding Learning Via Importance Sampling, Yugang Ji, Mingyang Yin, Hongxia Yang, Jingren Zhou, Vincent W. Zheng, Chuan Shi, Yuan Fang

Research Collection School Of Computing and Information Systems

In real-world problems, heterogeneous entities are often related to each other through multiple interactions, forming a Heterogeneous Interaction Graph (HIG in short). While modeling HIGs to deal with fundamental tasks, graph neural networks present an attractive opportunity that can make full use of the heterogeneity and rich semantic information by aggregating and propagating information from different types of neighborhoods. However, learning on such complex graphs, often with millions or billions of nodes, edges, and various attributes, could suffer from expensive time cost and high memory consumption. In this paper, we attempt to accelerate representation learning on large-scale HIGs by adopting …


Exploring Media Portrayals Of People With Mental Disorders Using Nlp, Swapna Gottipati, Mark Chong, Andrew Wei Kiat Lim, Benny Haryanto Kawidiredjo Feb 2021

Exploring Media Portrayals Of People With Mental Disorders Using Nlp, Swapna Gottipati, Mark Chong, Andrew Wei Kiat Lim, Benny Haryanto Kawidiredjo

Research Collection School Of Computing and Information Systems

Media plays an important role in creating an impact in society. Several studies show that news media and entertainment channels, at times may create overwhelming images of the mental illness that emphasize criminality and dangerousness. The consequences of such negative impact may impact the audience with stigma and on the other hand, they impair the self-esteem and help-seeking behavior of the people with mental disorders. This is the first study to examine the Singapore media’s portrayal of persons with mental disorders (MDs) using text analytics and natural language processing. To date, most studies on media portrayal of people with MDs …


Learning To Pre-Train Graph Neural Networks, Yuanfu Lu, Xunqiang Jiang, Yuan Fang, Chuan Shi Feb 2021

Learning To Pre-Train Graph Neural Networks, Yuanfu Lu, Xunqiang Jiang, Yuan Fang, Chuan Shi

Research Collection School Of Computing and Information Systems

Graph neural networks (GNNs) have become the de facto standard for representation learning on graphs, which derive effective node representations by recursively aggregating information from graph neighborhoods. While GNNs can be trained from scratch, pre-training GNNs to learn transferable knowledge for downstream tasks has recently been demonstrated to improve the state of the art. However, conventional GNN pre-training methods follow a two-step paradigm: 1) pre-training on abundant unlabeled data and 2) fine-tuning on downstream labeled data, between which there exists a significant gap due to the divergence of optimization objectives in the two steps. In this paper, we conduct an …


Model Uncertainty Guides Visual Object Tracking, Lijun Zhou, Antoine Ledent, Qintao Hu, Ting Liu, Jianlin Zhang, Marius Kloft Feb 2021

Model Uncertainty Guides Visual Object Tracking, Lijun Zhou, Antoine Ledent, Qintao Hu, Ting Liu, Jianlin Zhang, Marius Kloft

Research Collection School Of Computing and Information Systems

Model object trackers largely rely on the online learning of a discriminative classifier from potentially diverse sample frames. However, noisy or insufficient amounts of samples can deteriorate the classifiers' performance and cause tracking drift. Furthermore, alterations such as occlusion and blurring can cause the target to be lost. In this paper, we make several improvements aimed at tackling uncertainty and improving robustness in object tracking. Our first and most important contribution is to propose a sampling method for the online learning of object trackers based on uncertainty adjustment: our method effectively selects representative sample frames to feed the discriminative branch …