1,346 research outputs found

    Word Representation Models for Morphologically Rich Languages in Neural Machine Translation

    Full text link
    Dealing with the complex word forms in morphologically rich languages is an open problem in language processing, and is particularly important in translation. In contrast to most modern neural systems of translation, which discard the identity for rare words, in this paper we propose several architectures for learning word representations from character and morpheme level word decompositions. We incorporate these representations in a novel machine translation model which jointly learns word alignments and translations via a hard attention mechanism. Evaluating on translating from several morphologically rich languages into English, we show consistent improvements over strong baseline methods, of between 1 and 1.5 BLEU points

    Fast Ensemble Smoothing

    Full text link
    Smoothing is essential to many oceanographic, meteorological and hydrological applications. The interval smoothing problem updates all desired states within a time interval using all available observations. The fixed-lag smoothing problem updates only a fixed number of states prior to the observation at current time. The fixed-lag smoothing problem is, in general, thought to be computationally faster than a fixed-interval smoother, and can be an appropriate approximation for long interval-smoothing problems. In this paper, we use an ensemble-based approach to fixed-interval and fixed-lag smoothing, and synthesize two algorithms. The first algorithm produces a linear time solution to the interval smoothing problem with a fixed factor, and the second one produces a fixed-lag solution that is independent of the lag length. Identical-twin experiments conducted with the Lorenz-95 model show that for lag lengths approximately equal to the error doubling time, or for long intervals the proposed methods can provide significant computational savings. These results suggest that ensemble methods yield both fixed-interval and fixed-lag smoothing solutions that cost little additional effort over filtering and model propagation, in the sense that in practical ensemble application the additional increment is a small fraction of either filtering or model propagation costs. We also show that fixed-interval smoothing can perform as fast as fixed-lag smoothing and may be advantageous when memory is not an issue

    Measuring the Behavioural Component of the S&P 500 and its Relationship to Financial Stress and Aggregated Earnings Surprises

    Get PDF
    Scholars in management and economics have shown increasing interest in isolating the behavioural dimension of market evolution. Indeed, by improving forecast accuracy and precision, this exercise would certainly help firms to anticipate economic fluctuations, thus leading to more profitable business and investment strategies. Yet, how to extract the behavioural component from real market data remains an open question. By using monthly data on the returns of the constituents of the S&P 500 index, we propose a Bayesian methodology to measure the extent to which market data conform to what is predicted by prospect theory (the behavioural perspective), relative to the (standard) subjective expected utility theory baseline.We document a significant behavioural component that reaches its peaks during recession periods and is correlated to measures of financial volatility, market sentiment and financial stress with expected sign. Moreover, the behavioural component decreases around macroeconomic corporate earnings news, while it reacts positively to the number of surprising announcements

    IMBERT: Making BERT Immune to Insertion-based Backdoor Attacks

    Get PDF
    Backdoor attacks are an insidious security threat against machine learning models. Adversaries can manipulate the predictions of compromised models by inserting triggers into the training phase. Various backdoor attacks have been devised which can achieve nearly perfect attack success without affecting model predictions for clean inputs. Means of mitigating such vulnerabilities are underdeveloped, especially in natural language processing. To fill this gap, we introduce IMBERT, which uses either gradients or self-attention scores derived from victim models to self-defend against backdoor attacks at inference time. Our empirical studies demonstrate that IMBERT can effectively identify up to 98.5% of inserted triggers. Thus, it significantly reduces the attack success rate while attaining competitive accuracy on the clean dataset across widespread insertion-based attacks compared to two baselines. Finally, we show that our approach is model-agnostic, and can be easily ported to several pre-trained transformer models

    Colossal dielectric constants in transition-metal oxides

    Get PDF
    Many transition-metal oxides show very large ("colossal") magnitudes of the dielectric constant and thus have immense potential for applications in modern microelectronics and for the development of new capacitance-based energy-storage devices. In the present work, we thoroughly discuss the mechanisms that can lead to colossal values of the dielectric constant, especially emphasising effects generated by external and internal interfaces, including electronic phase separation. In addition, we provide a detailed overview and discussion of the dielectric properties of CaCu3Ti4O12 and related systems, which is today's most investigated material with colossal dielectric constant. Also a variety of further transition-metal oxides with large dielectric constants are treated in detail, among them the system La2-xSrxNiO4 where electronic phase separation may play a role in the generation of a colossal dielectric constant.Comment: 31 pages, 18 figures, submitted to Eur. Phys. J. for publication in the Special Topics volume "Cooperative Phenomena in Solids: Metal-Insulator Transitions and Ordering of Microscopic Degrees of Freedom

    Rethinking Round-Trip Translation for Machine Translation Evaluation

    Get PDF
    Automatic evaluation methods for translation often require model training, and thus the availability of parallel corpora limits their applicability to low-resource settings. Round-trip translation is a potential workaround, which can reframe bilingual evaluation into a much simpler monolingual task. Early results from the era of statistical machine translation (SMT) raised fundamental concerns about the utility of this approach, based on poor correlation with human translation quality judgments. In this paper, we revisit this technique with modern neural translation (NMT) and show that round-trip translation does allow for accurate automatic evaluation without the need for reference translations. These opposite findings can be explained through the copy mechanism in SMT that is absent in NMT. We demonstrate that round-trip translation benefits multiple machine translation evaluation tasks: i) predicting forward translation scores; ii) improving the performance of a quality estimation model; and iii) identifying adversarial competitors in shared tasks via cross-system verification

    3-(4-Nitro­phen­yl)-N-phenyl­oxirane-2-carboxamide

    Get PDF
    The mol­ecule of the title compound, C15H12N2O4, adopts a syn conformation with the terminal benzene rings located on the same sides of the central epoxide ring. The epoxide ring makes dihedral angles of 71.08 (18) and 60.83 (17)° with the two benzene rings. Weak inter­molecular C—H⋯O hydrogen bonding is present in the crystal structure

    Mitigating Backdoor Poisoning Attacks through the Lens of Spurious Correlation

    Get PDF
    Modern NLP models are often trained over large untrusted datasets, raising the potential for a malicious adversary to compromise model behaviour. For instance, backdoors can be implanted through crafting training instances with a specific textual trigger and a target label. This paper posits that backdoor poisoning attacks exhibit a spurious correlation between simple text features and classification labels, and accordingly, proposes methods for mitigating spurious correlation as means of defence. Our empirical study reveals that the malicious triggers are highly correlated to their target labels; therefore such correlations are extremely distinguishable compared to those scores of benign features, and can be used to filter out potentially problematic instances. Compared with several existing defences, our defence method significantly reduces attack success rates across backdoor attacks, and in the case of insertion-based attacks, our method provides a near-perfect defence

    Surgical treatment of tricuspid regurgitation after mitral valve surgery: a retrospective study in China

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Functional tricuspid regurgitation (TR) occurs in patients with rheumatic mitral valve disease even after mitral valve surgery. The aim of this study was to analyze surgical results of TR after previous successful mitral valve surgery.</p> <p>Methods</p> <p>From September 1996 to September 2008, 45 patients with TR after previous mitral valve replacement underwent second operation for TR. In those, 43 patients (95.6%) had right heart failure symptoms (edema of lower extremities, ascites, hepatic congestion, etc.) and 40 patients (88.9%) had atrial fibrillation. Twenty-six patients (57.8%) were in New York Heart Association (NYHA) functional class III, and 19 (42.2%) in class IV. Previous operations included: 41 for mechanical mitral valve replacement (91.1%), 4 for bioprosthetic mitral valve replacement (8.9%), and 7 for tricuspid annuloplasty (15.6%).</p> <p>Results</p> <p>The tricuspid valves were repaired with Kay's (7 cases, 15.6%) or De Vega technique (4 cases, 8.9%). Tricuspid valve replacement was performed in 34 cases (75.6%). One patient (2.2%) died. Postoperative low cardiac output (LCO) occurred in 5 patients and treated successfully. Postoperative echocardiography showed obvious reduction of right atrium and ventricle. The anterioposterior diameter of the right ventricle decreased to 25.5 ± 7.1 mm from 33.7 ± 6.2 mm preoperatively (P < 0. 05).</p> <p>Conclusion</p> <p>TR after mitral valve replacement in rheumatic heart disease is a serious clinical problem. If it occurs or progresses late after mitral valve surgery, tricuspid valve annuloplasty or replacement may be performed with satisfactory results. Due to the serious consequence of untreated TR, aggressive treatment of existing TR during mitral valve surgery is recommended.</p

    SEEP: Training Dynamics Grounds Latent Representation Search for Mitigating Backdoor Poisoning Attacks

    Full text link
    Modern NLP models are often trained on public datasets drawn from diverse sources, rendering them vulnerable to data poisoning attacks. These attacks can manipulate the model's behavior in ways engineered by the attacker. One such tactic involves the implantation of backdoors, achieved by poisoning specific training instances with a textual trigger and a target class label. Several strategies have been proposed to mitigate the risks associated with backdoor attacks by identifying and removing suspected poisoned examples. However, we observe that these strategies fail to offer effective protection against several advanced backdoor attacks. To remedy this deficiency, we propose a novel defensive mechanism that first exploits training dynamics to identify poisoned samples with high precision, followed by a label propagation step to improve recall and thus remove the majority of poisoned instances. Compared with recent advanced defense methods, our method considerably reduces the success rates of several backdoor attacks while maintaining high classification accuracy on clean test sets.Comment: accepted to TAC
    corecore