博客
关于我
强烈建议你试试无所不能的chatGPT,快点击我
直播预告 | ICLR专场二
阅读量:2242 次
发布时间:2019-05-09

本文共 5147 字,大约阅读时间需要 17 分钟。

点击蓝字

关注我们

AI TIME欢迎每一位AI爱好者的加入!

『今日视频推荐』

5月26日晚7:30-9:00

AI TIME特别邀请了三位优秀的讲者跟大家共同开启ICLR专场二!

哔哩哔哩直播通道

扫码关注AITIME哔哩哔哩官方账号

观看直播

链接:https://live.bilibili.com/21813994

★ 邀请嘉宾 ★

秦增益:MIT一年级博士生,本科毕业于清华大学电子工程系,以第一作者在ICML, ICLR, CVPR, AAAI, TPAMI, ACM MM, ICRA等知名会议和期刊发表多篇论文。曾获清华大学挑战杯特等奖,北京大学生挑战杯特等奖。

报告题目:

多智能体的安全控制

摘要:

We study the multi-agent safe control problem where agents should avoid collisions to static obstacles and collisions with each other while reaching their goals. Our core idea is to learn the multi-agent control policy jointly with learning the control barrier functions as safety certificates. We propose a novel joint-learning framework that can be implemented in a decentralized fashion, which can adapt to an arbitrarily large number of agents. Our approach also shows exceptional generalization capability in that the control policy can be trained with 8 agents in one scenario, while being used on other scenarios with up to 1024 agents in complex multi-agent environments.

论文标题:

Learning Safe Multi-Agent Control with Decentralized Neural Barrier Certificates

论文链接:

https://arxiv.org/abs/2101.05436

袁渊源:本科毕业于复旦大学,现为香港科技大学计算机科学与工程系一年级博士生,导师为王帅教授。

报告题目:

基于生成模型的系统侧信道攻击

摘要:

System side channels denote effects imposed on the underlying system and hardware when running a program, such as its accessed CPU cache lines. Side channel analysis (SCA) allows attackers to infer program secrets based on observed side channel logs. Given the ever-growing adoption of machine learning as a service (MLaaS), image analysis software on cloud platforms has been exploited by reconstructing private user images from system side channels. Nevertheless, to date, SCA is still highly challenging, requiring technical knowledge of victim software’s internal operations. For existing SCA attacks, comprehending such internal operations requires heavyweight program analysis or manual efforts. This research proposes an attack framework to reconstruct private user images processed by media software via system side channels. The framework forms an effective workflow by incorporating convolutional networks, variational autoencoders, and generative adversarial networks.

Our evaluation of two popular side channels shows that the reconstructed images consistently match user inputs, making privacy leakage attacks more practical. We also show surprising results that even one-bit data read/write pattern side channels, which are deemed minimally informative, can be used to reconstruct quality images using our framework.

论文标题:

Private Image Reconstruction from System Side Channels Using Generative Models

论文链接:

https://openreview.net/forum?id=y06VOYLcQXa

简翔沄:约翰霍普金斯大学脑与心理研究所的博士班学生。

报告题目:

MAPPING THE TIMESCALE ORGANIZATION OF NEURAL LANGUAGE MODELS

摘要:

In the human brain, sequences of language input are processed within a distributed

and hierarchical architecture, in which higher stages of processing encode

contextual information over longer timescales. In contrast, in recurrent neural

networks which perform natural language processing, we know little about

how the multiple timescales of contextual information are functionally organized.

Therefore, we applied tools developed in neuroscience to map the “processing

timescales” of individual units within a word-level LSTM language model. This

timescale-mapping method assigned long timescales to units previously found to

track long-range syntactic dependencies. Additionally, the mapping revealed a

small subset of the network (less than 15% of units) with long timescales and

whose function had not previously been explored. We next probed the functional

organization of the network by examining the relationship between the processing

timescale of units and their network connectivity. We identified two classes of

long-timescale units: “controller” units composed a densely interconnected subnetwork

and strongly projected to the rest of the network, while “integrator” units

showed the longest timescales in the network, and expressed projection profiles

closer to the mean projection profile. Ablating integrator and controller units affected

model performance at different positions within a sentence, suggesting distinctive

functions of these two sets of units. Finally, we tested the generalization

of these results to a character-level LSTM model and models with different architectures.

In summary, we demonstrated a model-free technique for mapping the

timescale organization in recurrent neural networks, and we applied this method

to reveal the timescale and functional organization of neural language models.

论文标题:

MAPPING THE TIMESCALE ORGANIZATION OF NEURAL LANGUAGE MODELS

论文链接:

https://arxiv.org/abs/2012.06717

直播结束后我们会邀请讲者在微信群中与大家答疑交流,请添加“AI TIME小助手(微信号:AITIME_HY)”,回复“iclr”,将拉您进“ICLR会议交流群”!

AI TIME微信小助手

主       办:AI TIME 、AMiner

合作伙伴:智谱·AI、中国工程院知领直播、学堂在线、学术头条、biendata、数据派、 Ever链动、机器学习算法与自然语言处理

合作媒体:学术头条

AI TIME欢迎AI领域学者投稿,期待大家剖析学科历史发展和前沿技术。针对热门话题,我们将邀请专家一起论道。同时,我们也长期招募优质的撰稿人,顶级的平台需要顶级的你,

请将简历等信息发至yun.he@aminer.cn!

微信联系:AITIME_HY

AI TIME是清华大学计算机系一群关注人工智能发展,并有思想情怀的青年学者们创办的圈子,旨在发扬科学思辨精神,邀请各界人士对人工智能理论、算法、场景、应用的本质问题进行探索,加强思想碰撞,打造一个知识分享的聚集地。

更多资讯请扫码关注

 

我知道你在看

点击 阅读原文 了解更多精彩

转载地址:http://tkwdb.baihongyu.com/

你可能感兴趣的文章
C结构体、C++结构体、C++类的区别
查看>>
进程和线程的概念、区别和联系
查看>>
CMake 入门实战
查看>>
绑定CPU逻辑核心的利器——taskset
查看>>
Linux下perf性能测试火焰图只显示函数地址不显示函数名的问题
查看>>
c结构体、c++结构体和c++类的区别以及错误纠正
查看>>
Linux下查看根目录各文件内存占用情况
查看>>
A星算法详解(个人认为最详细,最通俗易懂的一个版本)
查看>>
利用栈实现DFS
查看>>
(PAT 1019) General Palindromic Number (进制转换)
查看>>
(PAT 1073) Scientific Notation (字符串模拟题)
查看>>
(PAT 1080) Graduate Admission (排序)
查看>>
Play on Words UVA - 10129 (欧拉路径)
查看>>
mininet+floodlight搭建sdn环境并创建简答topo
查看>>
【linux】nohup和&的作用
查看>>
Set、WeakSet、Map以及WeakMap结构基本知识点
查看>>
【NLP学习笔记】(一)Gensim基本使用方法
查看>>
【NLP学习笔记】(二)gensim使用之Topics and Transformations
查看>>
【深度学习】LSTM的架构及公式
查看>>
【python】re模块常用方法
查看>>