Skip to main content

Showing 1–19 of 19 results for author: Böhm, K

  1. arXiv:2406.17374  [pdf, other

    cs.LG math.ST

    Generalizability of experimental studies

    Authors: Federico Matteucci, Vadim Arzamasov, Jose Cribeiro-Ramallo, Marco Heyden, Konstantin Ntounas, Klemens Böhm

    Abstract: Experimental studies are a cornerstone of machine learning (ML) research. A common, but often implicit, assumption is that the results of a study will generalize beyond the study itself, e.g. to new data. That is, there is a high probability that repeating the study under different conditions will yield similar results. Despite the importance of the concept, the problem of measuring generalizabili… ▽ More

    Submitted 25 June, 2024; originally announced June 2024.

    Comments: Under review

  2. arXiv:2406.10421  [pdf, other

    cs.CL

    SciEx: Benchmarking Large Language Models on Scientific Exams with Human Expert Grading and Automatic Grading

    Authors: Tu Anh Dinh, Carlos Mullov, Leonard Bärmann, Zhaolin Li, Danni Liu, Simon Reiß, Jueun Lee, Nathan Lerzer, Fabian Ternava, Jianfeng Gao, Tobias Röddiger, Alexander Waibel, Tamim Asfour, Michael Beigl, Rainer Stiefelhagen, Carsten Dachsbacher, Klemens Böhm, Jan Niehues

    Abstract: With the rapid development of Large Language Models (LLMs), it is crucial to have benchmarks which can evaluate the ability of LLMs on different domains. One common use of LLMs is performing tasks on scientific topics, such as writing algorithms, querying databases or giving mathematical proofs. Inspired by the way university students are evaluated on such tasks, in this paper, we propose SciEx -… ▽ More

    Submitted 12 July, 2024; v1 submitted 14 June, 2024; originally announced June 2024.

    ACM Class: I.2.7

  3. arXiv:2404.14451  [pdf, other

    cs.LG cs.AI

    Generative Subspace Adversarial Active Learning for Outlier Detection in Multiple Views of High-dimensional Data

    Authors: Jose Cribeiro-Ramallo, Vadim Arzamasov, Federico Matteucci, Denis Wambold, Klemens Böhm

    Abstract: Outlier detection in high-dimensional tabular data is an important task in data mining, essential for many downstream tasks and applications. Existing unsupervised outlier detection algorithms face one or more problems, including inlier assumption (IA), curse of dimensionality (CD), and multiple views (MV). To address these issues, we introduce Generative Subspace Adversarial Active Learning (GSAA… ▽ More

    Submitted 20 April, 2024; originally announced April 2024.

    Comments: 16 pages, Pre-print

  4. arXiv:2402.03846  [pdf, other

    cs.LG

    Efficient Generation of Hidden Outliers for Improved Outlier Detection

    Authors: Jose Cribeiro-Ramallo, Vadim Arzamasov, Klemens Böhm

    Abstract: Outlier generation is a popular technique used for solving important outlier detection tasks. Generating outliers with realistic behavior is challenging. Popular existing methods tend to disregard the 'multiple views' property of outliers in high-dimensional spaces. The only existing method accounting for this property falls short in efficiency and effectiveness. We propose BISECT, a new outlier g… ▽ More

    Submitted 6 February, 2024; originally announced February 2024.

  5. arXiv:2402.00592  [pdf, other

    cs.LG stat.ML

    Partial-Label Learning with a Reject Option

    Authors: Tobias Fuchs, Florian Kalinke, Klemens Böhm

    Abstract: In real-world applications, one often encounters ambiguously labeled data, where different annotators assign conflicting class labels. Partial-label learning allows training classifiers in this weakly supervised setting, where state-of-the-art methods already show good predictive performance. However, even the best algorithms give incorrect predictions, which can have severe consequences when they… ▽ More

    Submitted 5 June, 2024; v1 submitted 1 February, 2024; originally announced February 2024.

  6. arXiv:2307.09191  [pdf, other

    cs.LG

    A benchmark of categorical encoders for binary classification

    Authors: Federico Matteucci, Vadim Arzamasov, Klemens Boehm

    Abstract: Categorical encoders transform categorical features into numerical representations that are indispensable for a wide range of machine learning models. Existing encoder benchmark studies lack generalizability because of their limited choice of (1) encoders, (2) experimental factors, and (3) datasets. Additionally, inconsistencies arise from the adoption of varying aggregation strategies. This paper… ▽ More

    Submitted 20 November, 2023; v1 submitted 17 July, 2023; originally announced July 2023.

    Comments: To be published in the 37th Conference on Neural Information Processing Systems (NeurIPS 2023) Track on Datasets and Benchmarks

  7. arXiv:2306.12974  [pdf, other

    cs.LG

    Adaptive Bernstein Change Detector for High-Dimensional Data Streams

    Authors: Marco Heyden, Edouard Fouché, Vadim Arzamasov, Tanja Fenn, Florian Kalinke, Klemens Böhm

    Abstract: Change detection is of fundamental importance when analyzing data streams. Detecting changes both quickly and accurately enables monitoring and prediction systems to react, e.g., by issuing an alarm or by updating a learning algorithm. However, detecting changes is challenging when observations are high-dimensional. In high-dimensional data, change detectors should not only be able to identify whe… ▽ More

    Submitted 14 January, 2024; v1 submitted 22 June, 2023; originally announced June 2023.

    MSC Class: 68T05 ACM Class: I.2.6

  8. arXiv:2306.07071  [pdf, other

    cs.LG stat.ML

    Budgeted Multi-Armed Bandits with Asymmetric Confidence Intervals

    Authors: Marco Heyden, Vadim Arzamasov, Edouard Fouché, Klemens Böhm

    Abstract: We study the stochastic Budgeted Multi-Armed Bandit (MAB) problem, where a player chooses from $K$ arms with unknown expected rewards and costs. The goal is to maximize the total reward under a budget constraint. A player thus seeks to choose the arm with the highest reward-cost ratio as often as possible. Current state-of-the-art policies for this problem have several issues, which we illustrate.… ▽ More

    Submitted 15 August, 2023; v1 submitted 12 June, 2023; originally announced June 2023.

    MSC Class: 68T37; 68T05 (Primary) 68W27; 68Q32 (Secondary) ACM Class: I.2.6; H.4.2; G.3

  9. arXiv:2205.12706  [pdf, other

    cs.LG

    Maximum Mean Discrepancy on Exponential Windows for Online Change Detection

    Authors: Florian Kalinke, Marco Heyden, Edouard Fouché, Klemens Böhm

    Abstract: Detecting changes is of fundamental importance when analyzing data streams and has many applications, e.g., predictive maintenance, fraud detection, or medicine. A principled approach to detect changes is to compare the distributions of observations within the stream to each other via hypothesis testing. Maximum mean discrepancy (MMD; also called energy distance) is a well-known (semi-)metric on t… ▽ More

    Submitted 13 March, 2023; v1 submitted 25 May, 2022; originally announced May 2022.

    ACM Class: I.2.6; H.1.1

  10. arXiv:2112.13285  [pdf, other

    cs.LG

    Pedagogical Rule Extraction to Learn Interpretable Models - an Empirical Study

    Authors: Vadim Arzamasov, Benjamin Jochum, Klemens Böhm

    Abstract: Machine-learning models are ubiquitous. In some domains, for instance, in medicine, the models' predictions must be interpretable. Decision trees, classification rules, and subgroup discovery are three broad categories of supervised machine-learning models presenting knowledge in the form of interpretable rules. The accuracy of these models learned from small datasets is usually low. Obtaining lar… ▽ More

    Submitted 28 April, 2022; v1 submitted 25 December, 2021; originally announced December 2021.

  11. Efficient Subspace Search in Data Streams

    Authors: Edouard Fouché, Florian Kalinke, Klemens Böhm

    Abstract: In the real world, data streams are ubiquitous -- think of network traffic or sensor data. Mining patterns, e.g., outliers or clusters, from such data must take place in real time. This is challenging because (1) streams often have high dimensionality, and (2) the data characteristics may change over time. Existing approaches tend to focus on only one aspect, either high dimensionality or the spec… ▽ More

    Submitted 7 January, 2021; v1 submitted 13 November, 2020; originally announced November 2020.

    Comments: Accepted Manuscript to Information Systems, Volume 97, Elsevier. Final authenticated version: https://doi.org/10.1016/j.is.2020.101705

    Journal ref: In: Information Systems 97 (2021), p. 101705. ISSN: 0306-4379

  12. arXiv:2009.13853  [pdf, other

    cs.LG stat.ML

    Efficient SVDD Sampling with Approximation Guarantees for the Decision Boundary

    Authors: Adrian Englhardt, Holger Trittenbach, Daniel Kottke, Bernhard Sick, Klemens Böhm

    Abstract: Support Vector Data Description (SVDD) is a popular one-class classifiers for anomaly and novelty detection. But despite its effectiveness, SVDD does not scale well with data size. To avoid prohibitive training times, sampling methods select small subsets of the training data on which SVDD trains a decision boundary hopefully equivalent to the one obtained on the full data set. According to the li… ▽ More

    Submitted 29 September, 2020; originally announced September 2020.

  13. arXiv:2006.03646  [pdf, other

    cs.LG stat.ML

    Generating Artificial Outliers in the Absence of Genuine Ones -- a Survey

    Authors: Georg Steinbuss, Klemens Böhm

    Abstract: By definition, outliers are rarely observed in reality, making them difficult to detect or analyse. Artificial outliers approximate such genuine outliers and can, for instance, help with the detection of genuine outliers or with benchmarking outlier-detection algorithms. The literature features different approaches to generate artificial outliers. However, systematic comparison of these approaches… ▽ More

    Submitted 5 June, 2020; originally announced June 2020.

  14. arXiv:2005.12178  [pdf, other

    cs.LG eess.SP stat.ML

    Incremental Real-Time Personalization in Human Activity Recognition Using Domain Adaptive Batch Normalization

    Authors: Alan Mazankiewicz, Klemens Böhm, Mario Bergés

    Abstract: Human Activity Recognition (HAR) from devices like smartphone accelerometers is a fundamental problem in ubiquitous computing. Machine learning based recognition models often perform poorly when applied to new users that were not part of the training data. Previous work has addressed this challenge by personalizing general recognition models to the unique motion pattern of a new user in a static b… ▽ More

    Submitted 21 December, 2020; v1 submitted 25 May, 2020; originally announced May 2020.

    Comments: Updated version of the preprint from 05/2020 after going through revision. The content (experiments, results, proposed method) has not changed. The explanations changed. Certain sentences have been added/removed/rephrased to be clearer. Removed Figure 3. Added Discussion section. Renamed "Description of Approach" Section. Added a reference to related work

    Journal ref: Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 4, 4, Article 144 (December 2020), 20 pages

  15. arXiv:2004.06947  [pdf, other

    cs.LG stat.ML

    Benchmarking Unsupervised Outlier Detection with Realistic Synthetic Data

    Authors: Georg Steinbuss, Klemens Böhm

    Abstract: Benchmarking unsupervised outlier detection is difficult. Outliers are rare, and existing benchmark data contains outliers with various and unknown characteristics. Fully synthetic data usually consists of outliers and regular instance with clear characteristics and thus allows for a more meaningful evaluation of detection methods in principle. Nonetheless, there have only been few attempts to inc… ▽ More

    Submitted 15 April, 2020; originally announced April 2020.

  16. arXiv:1912.01927  [pdf, other

    cs.LG stat.ML

    Active Learning of SVDD Hyperparameter Values

    Authors: Holger Trittenbach, Klemens Böhm, Ira Assent

    Abstract: Support Vector Data Description is a popular method for outlier detection. However, its usefulness largely depends on selecting good hyperparameter values -- a difficult problem that has received significant attention in literature. Existing methods to estimate hyperparameter values are purely heuristic, and the conditions under which they work well are unclear. In this article, we propose LAMA (L… ▽ More

    Submitted 4 December, 2019; originally announced December 2019.

  17. REDS: Rule Extraction for Discovering Scenarios

    Authors: Vadim Arzamasov, Klemens Böhm

    Abstract: Scenario discovery is the process of finding areas of interest, known as scenarios, in data spaces resulting from simulations. For instance, one might search for conditions, i.e., inputs of the simulation model, where the system is unstable. Subgroup discovery methods are commonly used for scenario discovery. They find scenarios in the form of hyperboxes, which are easy to comprehend. Given a comp… ▽ More

    Submitted 5 May, 2022; v1 submitted 3 October, 2019; originally announced October 2019.

  18. arXiv:1810.02112  [pdf, other

    cs.LG cs.DS stat.ML

    Monte Carlo Dependency Estimation

    Authors: Edouard Fouché, Klemens Böhm

    Abstract: Estimating the dependency of variables is a fundamental task in data analysis. Identifying the relevant attributes in databases leads to better data understanding and also improves the performance of learning algorithms, both in terms of runtime and quality. In data streams, dependency monitoring provides key insights into the underlying process, but is challenging. In this paper, we propose Monte… ▽ More

    Submitted 4 October, 2018; originally announced October 2018.

  19. arXiv:1808.04759  [pdf, other

    cs.LG stat.ML

    An Overview and a Benchmark of Active Learning for Outlier Detection with One-Class Classifiers

    Authors: Holger Trittenbach, Adrian Englhardt, Klemens Böhm

    Abstract: Active learning methods increase classification quality by means of user feedback. An important subcategory is active learning for outlier detection with one-class classifiers. While various methods in this category exist, selecting one for a given application scenario is difficult. This is because existing methods rely on different assumptions, have different objectives, and often are tailored to… ▽ More

    Submitted 14 May, 2019; v1 submitted 14 August, 2018; originally announced August 2018.

    Comments: Change history: update to more specific title; restructure of experimental section: added additional data sets and heuristic to select kernel parameter; add guidelines and decision rules (Section 4.4). Further minor changes: additional references; discussion of split strategies now is in Section 3.4; fixed typos