Skip to main content

Showing 1–17 of 17 results for author: Shen, E

  1. arXiv:2405.18400  [pdf, other

    cs.CL cs.LG

    Superposed Decoding: Multiple Generations from a Single Autoregressive Inference Pass

    Authors: Ethan Shen, Alan Fan, Sarah M. Pratt, Jae Sung Park, Matthew Wallingford, Sham M. Kakade, Ari Holtzman, Ranjay Krishna, Ali Farhadi, Aditya Kusupati

    Abstract: Many applications today provide users with multiple auto-complete drafts as they type, including GitHub's code completion, Gmail's smart compose, and Apple's messaging auto-suggestions. Under the hood, language models support this by running an autoregressive inference pass to provide a draft. Consequently, providing $k$ drafts to the user requires running an expensive language model $k$ times. To… ▽ More

    Submitted 24 June, 2024; v1 submitted 28 May, 2024; originally announced May 2024.

    Comments: 22 pages, 15 figures

  2. arXiv:2311.05784  [pdf, other

    cs.CV cs.AI cs.LG

    Are "Hierarchical" Visual Representations Hierarchical?

    Authors: Ethan Shen, Ali Farhadi, Aditya Kusupati

    Abstract: Learned visual representations often capture large amounts of semantic information for accurate downstream applications. Human understanding of the world is fundamentally grounded in hierarchy. To mimic this and further improve representation capabilities, the community has explored "hierarchical" visual representations that aim at modeling the underlying hierarchy of the visual world. In this wor… ▽ More

    Submitted 23 November, 2023; v1 submitted 9 November, 2023; originally announced November 2023.

  3. arXiv:2310.10351  [pdf, other

    cs.GR

    B-rep Boolean Resulting Model Repair by Correcting Intersection Edges Based on Inference Procedure

    Authors: Haomian Huang, Li Chen, Enya Shen, Jianmin Wang

    Abstract: As the most essential part of CAD modeling operations, boolean operations on B-rep CAD models often suffer from errors. Errors caused by geometric precision or numerical uncertainty are hard to eliminate. They will reduce the reliability of boolean operations and damage the integrity of the resulting models. And it is difficult to repair false boolean resulting models damaged by errors. In practic… ▽ More

    Submitted 16 October, 2023; originally announced October 2023.

  4. arXiv:2307.13339  [pdf, other

    cs.CL cs.AI

    Analyzing Chain-of-Thought Prompting in Large Language Models via Gradient-based Feature Attributions

    Authors: Skyler Wu, Eric Meng Shen, Charumathi Badrinath, Jiaqi Ma, Himabindu Lakkaraju

    Abstract: Chain-of-thought (CoT) prompting has been shown to empirically improve the accuracy of large language models (LLMs) on various question answering tasks. While understanding why CoT prompting is effective is crucial to ensuring that this phenomenon is a consequence of desired model behavior, little work has addressed this; nonetheless, such an understanding is a critical prerequisite for responsibl… ▽ More

    Submitted 25 July, 2023; originally announced July 2023.

    Comments: Accepted to Workshop on Challenges in Deployable Generative AI at ICML 2023

  5. arXiv:2307.10405  [pdf, other

    cs.CV cs.AI

    Generative Visual Question Answering

    Authors: Ethan Shen, Scotty Singh, Bhavesh Kumar

    Abstract: Multi-modal tasks involving vision and language in deep learning continue to rise in popularity and are leading to the development of newer models that can generalize beyond the extent of their training data. The current models lack temporal generalization which enables models to adapt to changes in future data. This paper discusses a viable approach to creating an advanced Visual Question Answeri… ▽ More

    Submitted 18 July, 2023; originally announced July 2023.

  6. arXiv:2210.05650  [pdf, other

    cs.LG

    Regret Bounds for Risk-Sensitive Reinforcement Learning

    Authors: O. Bastani, Y. J. Ma, E. Shen, W. Xu

    Abstract: In safety-critical applications of reinforcement learning such as healthcare and robotics, it is often desirable to optimize risk-sensitive objectives that account for tail outcomes rather than expected reward. We prove the first regret bounds for reinforcement learning under a general class of risk-sensitive objectives including the popular CVaR objective. Our theory is based on a novel character… ▽ More

    Submitted 11 October, 2022; originally announced October 2022.

  7. arXiv:2208.13699  [pdf, other

    cs.DS

    Graph Exploration with Embedding-Guided Layouts

    Authors: Leixian Shen, Zhiwei Tai, Enya Shen, Jianmin Wang

    Abstract: Node-link diagrams are widely used to visualize graphs. Most graph layout algorithms only use graph topology for aesthetic goals (e.g., minimize node occlusions and edge crossings) or use node attributes for exploration goals (e.g., preserve visible communities). Existing hybrid methods that bind the two perspectives still suffer from various generation restrictions (e.g., limited input types and… ▽ More

    Submitted 19 January, 2023; v1 submitted 29 August, 2022; originally announced August 2022.

    Comments: accepted by TVCG

  8. arXiv:2205.11055  [pdf, other

    cs.CL cs.LG

    TempLM: Distilling Language Models into Template-Based Generators

    Authors: Tianyi Zhang, Mina Lee, Lisa Li, Ende Shen, Tatsunori B. Hashimoto

    Abstract: While pretrained language models (PLMs) have greatly improved text generation, they have also been known to produce unfaithful or inappropriate content. In contrast, classic template-based systems provide strong guarantees of faithfulness at the cost of fluency. We propose TempLM, which achieves the best of both worlds by distilling a PLM into a template-based generator. On the E2E and SynthBio da… ▽ More

    Submitted 23 May, 2022; originally announced May 2022.

  9. Visual Data Analysis with Task-based Recommendations

    Authors: Leixian Shen, Enya Shen, Zhiwei Tai, Yihao Xu, Jianmin Wang

    Abstract: General visualization recommendation systems typically make design decisions for the dataset automatically. However, most of them can only prune meaningless visualizations but fail to recommend targeted results. This paper contributes TaskVis, a task-oriented visualization recommendation system that allows users to select their tasks precisely on the interface. We first summarize a task base with… ▽ More

    Submitted 14 September, 2022; v1 submitted 6 May, 2022; originally announced May 2022.

    Comments: 16 pages 10 figures. Data Sci. Eng. (2022)

  10. Towards Natural Language Interfaces for Data Visualization: A Survey

    Authors: Leixian Shen, Enya Shen, Yuyu Luo, Xiaocong Yang, Xuming Hu, Xiongshuai Zhang, Zhiwei Tai, Jianmin Wang

    Abstract: Utilizing Visualization-oriented Natural Language Interfaces (V-NLI) as a complementary input modality to direct manipulation for visual analytics can provide an engaging user experience. It enables users to focus on their tasks rather than having to worry about how to operate visualization tools on the interface. In the past two decades, leveraging advanced natural language processing technologie… ▽ More

    Submitted 4 February, 2022; v1 submitted 8 September, 2021; originally announced September 2021.

    Comments: 20 pages, 15 figures, accepted by IEEE TVCG

  11. arXiv:2102.07077  [pdf, other

    cs.LG cs.CV

    Model-Agnostic Graph Regularization for Few-Shot Learning

    Authors: Ethan Shen, Maria Brbic, Nicholas Monath, Jiaqi Zhai, Manzil Zaheer, Jure Leskovec

    Abstract: In many domains, relationships between categories are encoded in the knowledge graph. Recently, promising results have been achieved by incorporating knowledge graph as side information in hard classification tasks with severely limited data. However, prior models consist of highly complex architectures with many sub-components that all seem to impact performance. In this paper, we present a compr… ▽ More

    Submitted 14 February, 2021; originally announced February 2021.

    Comments: NeurIPS Workshop on Meta-Learning 2020

  12. arXiv:1811.10789  [pdf, other

    cs.SI cs.LG

    Flexible Attributed Network Embedding

    Authors: Enya Shen, Zhidong Cao, Changqing Zou, Jianmin Wang

    Abstract: Network embedding aims to find a way to encode network by learning an embedding vector for each node in the network. The network often has property information which is highly informative with respect to the node's position and role in the network. Most network embedding methods fail to utilize this information during network representation learning. In this paper, we propose a novel framework, FA… ▽ More

    Submitted 26 November, 2018; originally announced November 2018.

  13. arXiv:1703.02014  [pdf, ps, other

    cs.CR

    SoK: Cryptographically Protected Database Search

    Authors: Benjamin Fuller, Mayank Varia, Arkady Yerukhimovich, Emily Shen, Ariel Hamlin, Vijay Gadepally, Richard Shay, John Darby Mitchell, Robert K. Cunningham

    Abstract: Protected database search systems cryptographically isolate the roles of reading from, writing to, and administering the database. This separation limits unnecessary administrator access and protects data in the case of system breaches. Since protected search was introduced in 2000, the area has grown rapidly; systems are offered by academia, start-ups, and established companies. However, there… ▽ More

    Submitted 2 June, 2017; v1 submitted 6 March, 2017; originally announced March 2017.

    Comments: 20 pages, to appear to IEEE Security and Privacy

  14. Probabilistic Model-Based Approach for Heart Beat Detection

    Authors: Hugh Chen, Yusuf Erol, Eric Shen, Stuart Russell

    Abstract: Nowadays, hospitals are ubiquitous and integral to modern society. Patients flow in and out of a veritable whirlwind of paperwork, consultations, and potential inpatient admissions, through an abstracted system that is not without flaws. One of the biggest flaws in the medical system is perhaps an unexpected one: the patient alarm system. One longitudinal study reported an 88.8% rate of false alar… ▽ More

    Submitted 24 December, 2015; originally announced December 2015.

  15. GReTA - a novel Global and Recursive Tracking Algorithm in three dimensions

    Authors: Alessandro Attanasi, Andrea Cavagna, Lorenzo Del Castello, Irene Giardina, Asja Jelic, Stefania Melillo, Leonardo Parisi, Fabio Pellacini, Edward Shen, Edmondo Silvestri, Massimiliano Viale

    Abstract: Tracking multiple moving targets allows quantitative measure of the dynamic behavior in systems as diverse as animal groups in biology, turbulence in fluid dynamics and crowd and traffic control. In three dimensions, tracking several targets becomes increasingly hard since optical occlusions are very likely, i.e. two featureless targets frequently overlap for several frames. Occlusions are particu… ▽ More

    Submitted 17 April, 2015; v1 submitted 7 May, 2013; originally announced May 2013.

    Comments: 13 pages, 6 figures, 3 tables. Version 3 was slightly shortened, and new comprative results on the public datasets (thermal infrared videos of flying bats) by Z. Wu and coworkers (2014) were included. in A. Attanasi et al., "GReTA - A Novel Global and Recursive Tracking Algorithm in Three Dimensions", IEEE Trans. Pattern Anal. Mach. Intell., vol.37 (2015)

  16. arXiv:1301.7015  [pdf, other

    cs.DB

    Mining Frequent Graph Patterns with Differential Privacy

    Authors: Entong Shen, Ting Yu

    Abstract: Discovering frequent graph patterns in a graph database offers valuable information in a variety of applications. However, if the graph dataset contains sensitive data of individuals such as mobile phone-call graphs and web-click graphs, releasing discovered frequent patterns may present a threat to the privacy of individuals. {\em Differential privacy} has recently emerged as the {\em de facto} s… ▽ More

    Submitted 1 March, 2013; v1 submitted 29 January, 2013; originally announced January 2013.

  17. arXiv:1103.5170  [pdf, other

    cs.DB

    Differentially Private Spatial Decompositions

    Authors: Graham Cormode, Magda Procopiuc, Entong Shen, Divesh Srivastava, Ting Yu

    Abstract: Differential privacy has recently emerged as the de facto standard for private data release. This makes it possible to provide strong theoretical guarantees on the privacy and utility of released data. While it is well-known how to release data based on counts and simple functions under this guarantee, it remains to provide general purpose techniques to release different kinds of data. In this pap… ▽ More

    Submitted 13 March, 2012; v1 submitted 26 March, 2011; originally announced March 2011.

    Comments: ICDE 2012 (supplementary acknowledgments)