1,346 research outputs found
Word Representation Models for Morphologically Rich Languages in Neural Machine Translation
Dealing with the complex word forms in morphologically rich languages is an
open problem in language processing, and is particularly important in
translation. In contrast to most modern neural systems of translation, which
discard the identity for rare words, in this paper we propose several
architectures for learning word representations from character and morpheme
level word decompositions. We incorporate these representations in a novel
machine translation model which jointly learns word alignments and translations
via a hard attention mechanism. Evaluating on translating from several
morphologically rich languages into English, we show consistent improvements
over strong baseline methods, of between 1 and 1.5 BLEU points
Fast Ensemble Smoothing
Smoothing is essential to many oceanographic, meteorological and hydrological
applications. The interval smoothing problem updates all desired states within
a time interval using all available observations. The fixed-lag smoothing
problem updates only a fixed number of states prior to the observation at
current time. The fixed-lag smoothing problem is, in general, thought to be
computationally faster than a fixed-interval smoother, and can be an
appropriate approximation for long interval-smoothing problems. In this paper,
we use an ensemble-based approach to fixed-interval and fixed-lag smoothing,
and synthesize two algorithms. The first algorithm produces a linear time
solution to the interval smoothing problem with a fixed factor, and the second
one produces a fixed-lag solution that is independent of the lag length.
Identical-twin experiments conducted with the Lorenz-95 model show that for lag
lengths approximately equal to the error doubling time, or for long intervals
the proposed methods can provide significant computational savings. These
results suggest that ensemble methods yield both fixed-interval and fixed-lag
smoothing solutions that cost little additional effort over filtering and model
propagation, in the sense that in practical ensemble application the additional
increment is a small fraction of either filtering or model propagation costs.
We also show that fixed-interval smoothing can perform as fast as fixed-lag
smoothing and may be advantageous when memory is not an issue
Measuring the Behavioural Component of the S&P 500 and its Relationship to Financial Stress and Aggregated Earnings Surprises
Scholars in management and economics have shown increasing interest in isolating the
behavioural dimension of market evolution. Indeed, by improving forecast accuracy and
precision, this exercise would certainly help firms to anticipate economic fluctuations,
thus leading to more profitable business and investment strategies. Yet, how to extract
the behavioural component from real market data remains an open question. By using
monthly data on the returns of the constituents of the S&P 500 index, we propose a
Bayesian methodology to measure the extent to which market data conform to what is
predicted by prospect theory (the behavioural perspective), relative to the (standard) subjective
expected utility theory baseline.We document a significant behavioural component
that reaches its peaks during recession periods and is correlated to measures of financial
volatility, market sentiment and financial stress with expected sign. Moreover, the behavioural
component decreases around macroeconomic corporate earnings news, while it
reacts positively to the number of surprising announcements
IMBERT: Making BERT Immune to Insertion-based Backdoor Attacks
Backdoor attacks are an insidious security threat against machine learning models. Adversaries can manipulate the predictions of compromised models by inserting triggers into the training phase. Various backdoor attacks have been devised which can achieve nearly perfect attack success without affecting model predictions for clean inputs. Means of mitigating such vulnerabilities are underdeveloped, especially in natural language processing. To fill this gap, we introduce IMBERT, which uses either gradients or self-attention scores derived from victim models to self-defend against backdoor attacks at inference time. Our empirical studies demonstrate that IMBERT can effectively identify up to 98.5% of inserted triggers. Thus, it significantly reduces the attack success rate while attaining competitive accuracy on the clean dataset across widespread insertion-based attacks compared to two baselines. Finally, we show that our approach is model-agnostic, and can be easily ported to several pre-trained transformer models
Colossal dielectric constants in transition-metal oxides
Many transition-metal oxides show very large ("colossal") magnitudes of the
dielectric constant and thus have immense potential for applications in modern
microelectronics and for the development of new capacitance-based
energy-storage devices. In the present work, we thoroughly discuss the
mechanisms that can lead to colossal values of the dielectric constant,
especially emphasising effects generated by external and internal interfaces,
including electronic phase separation. In addition, we provide a detailed
overview and discussion of the dielectric properties of CaCu3Ti4O12 and related
systems, which is today's most investigated material with colossal dielectric
constant. Also a variety of further transition-metal oxides with large
dielectric constants are treated in detail, among them the system La2-xSrxNiO4
where electronic phase separation may play a role in the generation of a
colossal dielectric constant.Comment: 31 pages, 18 figures, submitted to Eur. Phys. J. for publication in
the Special Topics volume "Cooperative Phenomena in Solids: Metal-Insulator
Transitions and Ordering of Microscopic Degrees of Freedom
Rethinking Round-Trip Translation for Machine Translation Evaluation
Automatic evaluation methods for translation often require model training, and thus the availability of parallel corpora limits their applicability to low-resource settings. Round-trip translation is a potential workaround, which can reframe bilingual evaluation into a much simpler monolingual task. Early results from the era of statistical machine translation (SMT) raised fundamental concerns about the utility of this approach, based on poor correlation with human translation quality judgments. In this paper, we revisit this technique with modern neural translation (NMT) and show that round-trip translation does allow for accurate automatic evaluation without the need for reference translations. These opposite findings can be explained through the copy mechanism in SMT that is absent in NMT. We demonstrate that round-trip translation benefits multiple machine translation evaluation tasks: i) predicting forward translation scores; ii) improving the performance of a quality estimation model; and iii) identifying adversarial competitors in shared tasks via cross-system verification
3-(4-Nitrophenyl)-N-phenyloxirane-2-carboxamide
The molecule of the title compound, C15H12N2O4, adopts a syn conformation with the terminal benzene rings located on the same sides of the central epoxide ring. The epoxide ring makes dihedral angles of 71.08 (18) and 60.83 (17)° with the two benzene rings. Weak intermolecular C—H⋯O hydrogen bonding is present in the crystal structure
Mitigating Backdoor Poisoning Attacks through the Lens of Spurious Correlation
Modern NLP models are often trained over large untrusted datasets, raising the potential for a malicious adversary to compromise model behaviour. For instance, backdoors can be implanted through crafting training instances with a specific textual trigger and a target label. This paper posits that backdoor poisoning attacks exhibit a spurious correlation between simple text features and classification labels, and accordingly, proposes methods for mitigating spurious correlation as means of defence. Our empirical study reveals that the malicious triggers are highly correlated to their target labels; therefore such correlations are extremely distinguishable compared to those scores of benign features, and can be used to filter out potentially problematic instances. Compared with several existing defences, our defence method significantly reduces attack success rates across backdoor attacks, and in the case of insertion-based attacks, our method provides a near-perfect defence
Surgical treatment of tricuspid regurgitation after mitral valve surgery: a retrospective study in China
<p>Abstract</p> <p>Background</p> <p>Functional tricuspid regurgitation (TR) occurs in patients with rheumatic mitral valve disease even after mitral valve surgery. The aim of this study was to analyze surgical results of TR after previous successful mitral valve surgery.</p> <p>Methods</p> <p>From September 1996 to September 2008, 45 patients with TR after previous mitral valve replacement underwent second operation for TR. In those, 43 patients (95.6%) had right heart failure symptoms (edema of lower extremities, ascites, hepatic congestion, etc.) and 40 patients (88.9%) had atrial fibrillation. Twenty-six patients (57.8%) were in New York Heart Association (NYHA) functional class III, and 19 (42.2%) in class IV. Previous operations included: 41 for mechanical mitral valve replacement (91.1%), 4 for bioprosthetic mitral valve replacement (8.9%), and 7 for tricuspid annuloplasty (15.6%).</p> <p>Results</p> <p>The tricuspid valves were repaired with Kay's (7 cases, 15.6%) or De Vega technique (4 cases, 8.9%). Tricuspid valve replacement was performed in 34 cases (75.6%). One patient (2.2%) died. Postoperative low cardiac output (LCO) occurred in 5 patients and treated successfully. Postoperative echocardiography showed obvious reduction of right atrium and ventricle. The anterioposterior diameter of the right ventricle decreased to 25.5 ± 7.1 mm from 33.7 ± 6.2 mm preoperatively (P < 0. 05).</p> <p>Conclusion</p> <p>TR after mitral valve replacement in rheumatic heart disease is a serious clinical problem. If it occurs or progresses late after mitral valve surgery, tricuspid valve annuloplasty or replacement may be performed with satisfactory results. Due to the serious consequence of untreated TR, aggressive treatment of existing TR during mitral valve surgery is recommended.</p
SEEP: Training Dynamics Grounds Latent Representation Search for Mitigating Backdoor Poisoning Attacks
Modern NLP models are often trained on public datasets drawn from diverse
sources, rendering them vulnerable to data poisoning attacks. These attacks can
manipulate the model's behavior in ways engineered by the attacker. One such
tactic involves the implantation of backdoors, achieved by poisoning specific
training instances with a textual trigger and a target class label. Several
strategies have been proposed to mitigate the risks associated with backdoor
attacks by identifying and removing suspected poisoned examples. However, we
observe that these strategies fail to offer effective protection against
several advanced backdoor attacks. To remedy this deficiency, we propose a
novel defensive mechanism that first exploits training dynamics to identify
poisoned samples with high precision, followed by a label propagation step to
improve recall and thus remove the majority of poisoned instances. Compared
with recent advanced defense methods, our method considerably reduces the
success rates of several backdoor attacks while maintaining high classification
accuracy on clean test sets.Comment: accepted to TAC
- …
