The low-rank approximation of big data matrices and tensors plays a pivotal role in many modern applications. Recently, the randomized subspace iteration has shown to be a powerful tool in approximating large matrices...
详细信息
ISBN:
(数字)9798350349399
ISBN:
(纸本)9798350349405
The low-rank approximation of big data matrices and tensors plays a pivotal role in many modern applications. Recently, the randomized subspace iteration has shown to be a powerful tool in approximating large matrices. In this paper we present a rank-revealing, two-sided variant of the randomized subspace iteration. Novelty of our work lies in the utilization of the unpivoted QR factorization, rather than the singular value decomposition (SVD), for factorizing the compressed matrix. We provide bounds on the rank-revealingness of our algorithm as well as bounds on the error of the low-rank approximations, in both 2- and Frobenius norm. In addition, we employ the proposed algorithm to efficiently compute the low rank tensor decomposition using the truncated higher-order SVD. We conduct tests on (i) two classes of matrices, and (ii) synthetic data tensor and real dataset to demonstrate the efficacy of the proposed algorithms.
This paper proposes fast randomized algorithms for computing the Kronecker Tensor Decomposition (KTD). The proposed algorithms can decompose a given tensor into the KTD format much faster than the existing state-of-th...
详细信息
The idea of using the gait of a walking person as a biometric identification method has been seen in a number of proposed authentication methods, yet previous works focus on the addition of other authentication method...
详细信息
ISBN:
(纸本)9781509006243
The idea of using the gait of a walking person as a biometric identification method has been seen in a number of proposed authentication methods, yet previous works focus on the addition of other authentication methods along with the gait, or require a stationary sensor attached to the hip of the user. This paper uses Genetic Programming to model an identification gait fingerprint for two users, whose walking data was recorded from the accelerometer in a commercially available phone. With the phone freely placed within a pocket, users moved without a fixed protocol at a normal, nonuniform pace. This design of data collection more closely matches the real world applications of such a method. The highly specialized Genetic Programming system with multiple modular enhancements was implemented to perform symbolic regression. The system was demonstrated to be robust to noise and was able to effectively model each dataset with high accuracy. It was also determined that a model could be generated for a subject's whole dataset from only a single step's worth of data. Top models were applied to other subject's data in order to evaluate the uniqueness of these mathematical models.
This paper introduces a novel collaborative neurodynamic model for computing nonnegative Canonical Polyadic Decomposition (CPD). The model relies on a system of recurrent neural networks to solve the underlying noncon...
详细信息
This work deals with developing two fast randomized algorithms for computing the generalized tensor singular value decomposition (GTSVD) based on the tensor product (T-product). The random projection method is utilize...
详细信息
machinelearning (ML) models trained on biased data can reproduce and even amplify these biases. Since such models are deployed to make decisions that can affect people's lives, ensuring their fairness is critical...
machinelearning (ML) models trained on biased data can reproduce and even amplify these biases. Since such models are deployed to make decisions that can affect people's lives, ensuring their fairness is critical. One approach to mitigate possible unfairness of ML models is to map the input data into a less-biased new space by means of training the model on fair representations. Several methods based on adversarial learning have been proposed to learn fair representation by fooling an adversary in predicting the sensitive attribute (e.g., gender or race). However, adversarial-based learning can be too difficult to optimize in practice; besides, it penalizes the utility of the representation. Hence, in this research effort we train bias-free representations from the input data by inducing a uniform distribution over the sensitive attributes in the latent space. In particular, we propose a probabilistic framework that learns these representations by enforcing the correct reconstruction of the original data, plus the prediction of the attributes of interest while eliminating the possibility of predicting the sensitive ones. Our method leverages the inability of Deep Neural Networks (DNNs) to generalize when trained on a noisy label space to regularize the latent space. We use a network head that predicts a noisy version of the sensitive attributes in order to increase the uncertainty of their predictions at test time. Our experiments in two datasets demonstrated that the proposed model significantly improves fairness while maintaining the prediction accuracy of downstream tasks.
In this paper we propose efficient randomized fixed-precision techniques for low tubal rank approximation of tensors. The proposed methods are faster and more efficient than the existing fixed-precision algorithms for...
详细信息
Outlier detection is one of the main fields in machinelearning and it has been growing rapidly due to its wide range of applications. In the last few years, deep learning-based methods have outperformed machine learn...
详细信息
ISBN:
(纸本)9781450388894
Outlier detection is one of the main fields in machinelearning and it has been growing rapidly due to its wide range of applications. In the last few years, deep learning-based methods have outperformed machinelearning and handcrafted outlier detection techniques, and our method is no different. We present a new twist to generative models which leverages variational autoencoders as a source for uniform distributions which can be used to separate the inliers from the outliers. Both the generative and adversarial parts of the model are used to obtain three main losses (Reconstruction loss, KL-divergence, Discriminative loss) which in return are wrapped with a one-class SVM which is used to make the predictions. We evaluated our method against several datasets both for images and tabular data and it has shown great results for the zero-shot outlier detection problem and was able to easily generalize it for supervised outlier detection tasks on which the performance has increased. For comparison, we evaluated our method against several of the common outlier detection techniques such as DBSCAN-based outlier detection, GMM, K-means and one class SVM directly, and we have outperformed all of them on all datasets.
暂无评论