Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–12 of 12 results for author: Lee, T C M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.09367  [pdf, other

    eess.IV cs.CV

    Improving Lung Cancer Diagnosis and Survival Prediction with Deep Learning and CT Imaging

    Authors: Xiawei Wang, James Sharpnack, Thomas C. M. Lee

    Abstract: Lung cancer is a major cause of cancer-related deaths, and early diagnosis and treatment are crucial for improving patients' survival outcomes. In this paper, we propose to employ convolutional neural networks to model the non-linear relationship between the risk of lung cancer and the lungs' morphology revealed in the CT images. We apply a mini-batched loss that extends the Cox proportional hazar… ▽ More

    Submitted 18 August, 2024; originally announced August 2024.

  2. arXiv:2404.17709  [pdf, other

    stat.ML cs.LG

    Low-rank Matrix Bandits with Heavy-tailed Rewards

    Authors: Yue Kang, Cho-Jui Hsieh, Thomas C. M. Lee

    Abstract: In stochastic low-rank matrix bandit, the expected reward of an arm is equal to the inner product between its feature matrix and some unknown $d_1$ by $d_2$ low-rank parameter matrix $Θ^*$ with rank $r \ll d_1\wedge d_2$. While all prior studies assume the payoffs are mixed with sub-Gaussian noises, in this work we loosen this strict assumption and consider the new problem of \underline{low}-rank… ▽ More

    Submitted 26 April, 2024; originally announced April 2024.

    Comments: The 40th Conference on Uncertainty in Artificial Intelligence (UAI 2024)

  3. arXiv:2401.07298  [pdf, other

    stat.ML cs.LG

    Efficient Frameworks for Generalized Low-Rank Matrix Bandit Problems

    Authors: Yue Kang, Cho-Jui Hsieh, Thomas C. M. Lee

    Abstract: In the stochastic contextual low-rank matrix bandit problem, the expected reward of an action is given by the inner product between the action's feature matrix and some fixed, but initially unknown $d_1$ by $d_2$ matrix $Θ^*$ with rank $r \ll \{d_1, d_2\}$, and an agent sequentially takes actions based on past experience to maximize the cumulative reward. In this paper, we study the generalized lo… ▽ More

    Submitted 14 January, 2024; originally announced January 2024.

    Comments: Revision of the paper accepted by NeurIPS 2022

  4. arXiv:2305.18543  [pdf, other

    cs.LG stat.ML

    Robust Lipschitz Bandits to Adversarial Corruptions

    Authors: Yue Kang, Cho-Jui Hsieh, Thomas C. M. Lee

    Abstract: Lipschitz bandit is a variant of stochastic bandits that deals with a continuous arm set defined on a metric space, where the reward function is subject to a Lipschitz constraint. In this paper, we introduce a new problem of Lipschitz bandits in the presence of adversarial corruptions where an adaptive adversary corrupts the stochastic rewards up to a total budget $C$. The budget is measured by th… ▽ More

    Submitted 8 October, 2023; v1 submitted 29 May, 2023; originally announced May 2023.

    Comments: Thirty-seventh Conference on Neural Information Processing Systems (NeurIPS 2023)

  5. arXiv:2302.09440  [pdf, other

    cs.LG stat.ML

    Online Continuous Hyperparameter Optimization for Generalized Linear Contextual Bandits

    Authors: Yue Kang, Cho-Jui Hsieh, Thomas C. M. Lee

    Abstract: In stochastic contextual bandits, an agent sequentially makes actions from a time-dependent action set based on past experience to minimize the cumulative regret. Like many other machine learning algorithms, the performance of bandits heavily depends on the values of hyperparameters, and theoretically derived parameter values may lead to unsatisfactory results in practice. Moreover, it is infeasib… ▽ More

    Submitted 8 April, 2024; v1 submitted 18 February, 2023; originally announced February 2023.

    Comments: Published in Transactions on Machine Learning Research (TMLR)

  6. A Review of Adversarial Attack and Defense for Classification Methods

    Authors: Yao Li, Minhao Cheng, Cho-Jui Hsieh, Thomas C. M. Lee

    Abstract: Despite the efficiency and scalability of machine learning systems, recent studies have demonstrated that many classification methods, especially deep neural networks (DNNs), are vulnerable to adversarial examples; i.e., examples that are carefully crafted to fool a well-trained classification model while being indistinguishable from natural data to human. This makes it potentially unsafe to apply… ▽ More

    Submitted 18 November, 2021; originally announced November 2021.

    Journal ref: The American Statistician. 0 (2021) 1-44

  7. arXiv:2106.02979  [pdf, other

    stat.ML cs.LG

    Syndicated Bandits: A Framework for Auto Tuning Hyper-parameters in Contextual Bandit Algorithms

    Authors: Qin Ding, Yue Kang, Yi-Wei Liu, Thomas C. M. Lee, Cho-Jui Hsieh, James Sharpnack

    Abstract: The stochastic contextual bandit problem, which models the trade-off between exploration and exploitation, has many real applications, including recommender systems, online advertising and clinical trials. As many other machine learning algorithms, contextual bandit algorithms often have one or more hyper-parameters. As an example, in most optimal stochastic contextual bandit algorithms, there is… ▽ More

    Submitted 11 June, 2022; v1 submitted 5 June, 2021; originally announced June 2021.

  8. arXiv:2105.08620  [pdf, other

    stat.ML cs.CV cs.LG

    Adversarial Examples Detection with Bayesian Neural Network

    Authors: Yao Li, Tongyi Tang, Cho-Jui Hsieh, Thomas C. M. Lee

    Abstract: In this paper, we propose a new framework to detect adversarial examples motivated by the observations that random components can improve the smoothness of predictors and make it easier to simulate the output distribution of a deep neural network. With these observations, we propose a novel Bayesian adversarial example detector, short for BATer, to improve the performance of adversarial example de… ▽ More

    Submitted 22 February, 2024; v1 submitted 18 May, 2021; originally announced May 2021.

  9. arXiv:1908.01251  [pdf, other

    stat.ML cs.LG math.ST stat.ME

    Measuring the Algorithmic Convergence of Randomized Ensembles: The Regression Setting

    Authors: Miles E. Lopes, Suofei Wu, Thomas C. M. Lee

    Abstract: When randomized ensemble methods such as bagging and random forests are implemented, a basic question arises: Is the ensemble large enough? In particular, the practitioner desires a rigorous guarantee that a given ensemble will perform nearly as well as an ideal infinite ensemble (trained on the same data). The purpose of the current paper is to develop a bootstrap method for solving this problem… ▽ More

    Submitted 3 August, 2019; originally announced August 2019.

    Comments: 36 pages

  10. arXiv:1812.00789  [pdf, other

    cs.SI physics.soc-ph stat.ME

    Simultaneous Detection of Multiple Change Points and Community Structures in Time Series of Networks

    Authors: Rex C. Y. Cheung, Alexander Aue, Seungyong Hwang, Thomas C. M. Lee

    Abstract: In many complex systems, networks and graphs arise in a natural manner. Often, time evolving behavior can be easily found and modeled using time-series methodology. Amongst others, two common research problems in network analysis are community detection and change-point detection. Community detection aims at finding specific sub-structures within the networks, and change-point detection tries to f… ▽ More

    Submitted 30 June, 2020; v1 submitted 29 November, 2018; originally announced December 2018.

  11. arXiv:1811.07950  [pdf, other

    cs.CV

    Optimal Transport Classifier: Defending Against Adversarial Attacks by Regularized Deep Embedding

    Authors: Yao Li, Martin Renqiang Min, Wenchao Yu, Cho-Jui Hsieh, Thomas C. M. Lee, Erik Kruus

    Abstract: Recent studies have demonstrated the vulnerability of deep convolutional neural networks against adversarial examples. Inspired by the observation that the intrinsic dimension of image data is much smaller than its pixel space dimension and the vulnerability of neural networks grows with the input dimension, we propose to embed high-dimensional input images into a low-dimensional space to perform… ▽ More

    Submitted 9 December, 2018; v1 submitted 19 November, 2018; originally announced November 2018.

    Comments: 9 pages

    Journal ref: Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV), 2021, pp. 7496-7505

  12. arXiv:1811.01305  [pdf, other

    cs.LG stat.ML

    Block-wise Partitioning for Extreme Multi-label Classification

    Authors: Yuefeng Liang, Cho-Jui Hsieh, Thomas C. M. Lee

    Abstract: Extreme multi-label classification aims to learn a classifier that annotates an instance with a relevant subset of labels from an extremely large label set. Many existing solutions embed the label matrix to a low-dimensional linear subspace, or examine the relevance of a test instance to every label via a linear scan. In practice, however, those approaches can be computationally exorbitant. To all… ▽ More

    Submitted 3 November, 2018; originally announced November 2018.