15,850 research outputs found
Neural Collaborative Ranking
Recommender systems are aimed at generating a personalized ranked list of
items that an end user might be interested in. With the unprecedented success
of deep learning in computer vision and speech recognition, recently it has
been a hot topic to bridge the gap between recommender systems and deep neural
network. And deep learning methods have been shown to achieve state-of-the-art
on many recommendation tasks. For example, a recent model, NeuMF, first
projects users and items into some shared low-dimensional latent feature space,
and then employs neural nets to model the interaction between the user and item
latent features to obtain state-of-the-art performance on the recommendation
tasks. NeuMF assumes that the non-interacted items are inherent negative and
uses negative sampling to relax this assumption. In this paper, we examine an
alternative approach which does not assume that the non-interacted items are
necessarily negative, just that they are less preferred than interacted items.
Specifically, we develop a new classification strategy based on the widely used
pairwise ranking assumption. We combine our classification strategy with the
recently proposed neural collaborative filtering framework, and propose a
general collaborative ranking framework called Neural Network based
Collaborative Ranking (NCR). We resort to a neural network architecture to
model a user's pairwise preference between items, with the belief that neural
network will effectively capture the latent structure of latent factors. The
experimental results on two real-world datasets show the superior performance
of our models in comparison with several state-of-the-art approaches.Comment: Proceedings of the 2018 ACM on Conference on Information and
Knowledge Managemen
Transit of asteroids across the 7/3 Kirkwood gap under the Yarkovsky effect
Many asteroids in the main belt are continuously pushed by Yarkovsky effect
into regions of different mean motion resonances (MMRs) and then ejected out.
They are considered as the principal source of near-Earth objects. We
investigate in this paper the effects of the 7/3 MMR with Jupiter (J7/3 MMR) on
the transportation of asteroids from Koronis and Eos families that reside
respectively on the inner and outer side of the resonance. The fraction of
asteroids that make successful crossing through the resonance and the escaping
rate from the resonance are found to depend on the Yarkovsky drifting rate, the
initial inclination and the migrating direction. The excitation of eccentricity
and inclination due to the combined influence from both the resonance and
Yarkovsky effect is discussed. Only the eccentricity can be pumped up
considerably, and it is attributed mainly to the resonance. In the
observational data, family members are also found in the resonance and on the
opposite side of the resonance with respect to the corresponding family centre.
The existence of these family members is explained using our results of
numerical simulations. Finally, the replenishment of asteroids in the J7/3 MMR
and the transportation of asteroids by it are discussed.Comment: 10 pages, 10 figures. Accepted by A&
QEBA: Query-Efficient Boundary-Based Blackbox Attack
Machine learning (ML), especially deep neural networks (DNNs) have been
widely used in various applications, including several safety-critical ones
(e.g. autonomous driving). As a result, recent research about adversarial
examples has raised great concerns. Such adversarial attacks can be achieved by
adding a small magnitude of perturbation to the input to mislead model
prediction. While several whitebox attacks have demonstrated their
effectiveness, which assume that the attackers have full access to the machine
learning models; blackbox attacks are more realistic in practice. In this
paper, we propose a Query-Efficient Boundary-based blackbox Attack (QEBA) based
only on model's final prediction labels. We theoretically show why previous
boundary-based attack with gradient estimation on the whole gradient space is
not efficient in terms of query numbers, and provide optimality analysis for
our dimension reduction-based gradient estimation. On the other hand, we
conducted extensive experiments on ImageNet and CelebA datasets to evaluate
QEBA. We show that compared with the state-of-the-art blackbox attacks, QEBA is
able to use a smaller number of queries to achieve a lower magnitude of
perturbation with 100% attack success rate. We also show case studies of
attacks on real-world APIs including MEGVII Face++ and Microsoft Azure.Comment: Accepted by CVPR 202
- …