首页 > 最新文献

IEEE transactions on artificial intelligence最新文献

英文 中文
Guest Editorial: New Developments in Explainable and Interpretable Artificial Intelligence 特邀社论:可解释和可解读人工智能的新发展
Pub Date : 2024-04-16 DOI: 10.1109/TAI.2024.3356669
K. P. Suba Subbalakshmi;Wojciech Samek;Xia Ben Hu
This special issue brings together seven articles that address different aspects of explainable and interpretable artificial intelligence (AI). Over the years, machine learning (ML) and AI models have posted strong performance across several tasks. This has sparked interest in deploying these methods in critical applications like health and finance. However, to be deployable in the field, ML and AI models must be trustworthy. Explainable and interpretable AI are two areas of research that have become increasingly important to ensure trustworthiness and hence deployability of advanced AI and ML methods. Interpretable AI are models that obey some domain-specific constraints so that they are better understandable by humans. In essence, they are not black-box models. On the other hand, explainable AI refers to models and methods that are typically used to explain another black-box model.
本特刊汇集了七篇文章,探讨了可解释和可解释人工智能(AI)的不同方面。多年来,机器学习(ML)和人工智能模型在多项任务中表现出色。这激发了人们将这些方法部署到健康和金融等关键应用领域的兴趣。然而,要在该领域部署,ML 和 AI 模型必须值得信赖。可解释人工智能和可解释人工智能是两个日益重要的研究领域,可确保先进人工智能和 ML 方法的可信度和可部署性。可解释的人工智能模型遵从某些特定领域的约束条件,因此更容易被人类理解。从本质上讲,它们不是黑盒模型。另一方面,可解释人工智能指的是通常用于解释另一个黑盒模型的模型和方法。
{"title":"Guest Editorial: New Developments in Explainable and Interpretable Artificial Intelligence","authors":"K. P. Suba Subbalakshmi;Wojciech Samek;Xia Ben Hu","doi":"10.1109/TAI.2024.3356669","DOIUrl":"https://doi.org/10.1109/TAI.2024.3356669","url":null,"abstract":"This special issue brings together seven articles that address different aspects of explainable and interpretable artificial intelligence (AI). Over the years, machine learning (ML) and AI models have posted strong performance across several tasks. This has sparked interest in deploying these methods in critical applications like health and finance. However, to be deployable in the field, ML and AI models must be trustworthy. Explainable and interpretable AI are two areas of research that have become increasingly important to ensure trustworthiness and hence deployability of advanced AI and ML methods. Interpretable AI are models that obey some domain-specific constraints so that they are better understandable by humans. In essence, they are not black-box models. On the other hand, explainable AI refers to models and methods that are typically used to explain another black-box model.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"5 4","pages":"1427-1428"},"PeriodicalIF":0.0,"publicationDate":"2024-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10500898","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140559370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Strategic Gradient Transmission With Targeted Privacy-Awareness in Model Training: A Stackelberg Game Analysis 模型训练中具有针对性隐私意识的策略梯度传输:斯塔克尔伯格博弈分析
Pub Date : 2024-04-16 DOI: 10.1109/TAI.2024.3389611
Hezhe Sun;Yufei Wang;Huiwen Yang;Kaixuan Huo;Yuzhe Li
Privacy-aware machine learning paradigms have sparked widespread concern due to their ability to safeguard the local privacy of data owners, preventing the leakage of private information to untrustworthy platforms or malicious third parties. This article focuses on characterizing the interactions between the learner and the data owner within this privacy-aware training process. Here, the data owner hesitates to transmit the original gradient to the learner due to potential cybersecurity issues, such as gradient leakage and membership inference. To address this concern, we propose a Stackelberg game framework that models the training process. In this framework, the data owner's objective is not to maximize the discrepancy between the learner's obtained gradient and the true gradient but rather to ensure that the learner obtains a gradient closely resembling one deliberately designed by the data owner, while the learner's objective is to recover the true gradient as accurately as possible. We derive the optimal encoder and decoder using mismatched cost functions and characterize the equilibrium for specific cases, balancing model accuracy and local privacy. Numerical examples illustrate the main results, and we conclude with expanding discussions to suggest future investigations into reliable countermeasure designs.
隐私感知机器学习范式能够保护数据所有者的本地隐私,防止私人信息泄露给不可信的平台或恶意第三方,因此引发了广泛关注。本文的重点是描述这种隐私感知训练过程中学习者与数据所有者之间的互动。在这里,由于潜在的网络安全问题,如梯度泄漏和成员推理,数据所有者在向学习者传输原始梯度时犹豫不决。为了解决这个问题,我们提出了一个斯塔克尔伯格博弈框架来模拟训练过程。在这个框架中,数据所有者的目标不是最大化学习者获得的梯度与真实梯度之间的差异,而是确保学习者获得的梯度与数据所有者刻意设计的梯度非常相似,而学习者的目标是尽可能准确地恢复真实梯度。我们利用不匹配的成本函数推导出了最优编码器和解码器,并描述了特定情况下的平衡,在模型准确性和局部隐私之间取得了平衡。数字示例说明了主要结果,最后我们将展开讨论,为未来研究可靠的对策设计提供建议。
{"title":"Strategic Gradient Transmission With Targeted Privacy-Awareness in Model Training: A Stackelberg Game Analysis","authors":"Hezhe Sun;Yufei Wang;Huiwen Yang;Kaixuan Huo;Yuzhe Li","doi":"10.1109/TAI.2024.3389611","DOIUrl":"https://doi.org/10.1109/TAI.2024.3389611","url":null,"abstract":"Privacy-aware machine learning paradigms have sparked widespread concern due to their ability to safeguard the local privacy of data owners, preventing the leakage of private information to untrustworthy platforms or malicious third parties. This article focuses on characterizing the interactions between the learner and the data owner within this privacy-aware training process. Here, the data owner hesitates to transmit the original gradient to the learner due to potential cybersecurity issues, such as gradient leakage and membership inference. To address this concern, we propose a Stackelberg game framework that models the training process. In this framework, the data owner's objective is not to maximize the discrepancy between the learner's obtained gradient and the true gradient but rather to ensure that the learner obtains a gradient closely resembling one deliberately designed by the data owner, while the learner's objective is to recover the true gradient as accurately as possible. We derive the optimal encoder and decoder using mismatched cost functions and characterize the equilibrium for specific cases, balancing model accuracy and local privacy. Numerical examples illustrate the main results, and we conclude with expanding discussions to suggest future investigations into reliable countermeasure designs.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"5 9","pages":"4635-4648"},"PeriodicalIF":0.0,"publicationDate":"2024-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142169723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Explainable Intellectual Property Protection Method for Deep Neural Networks Based on Intrinsic Features 基于内在特征的可解释深度神经网络知识产权保护方法
Pub Date : 2024-04-16 DOI: 10.1109/TAI.2024.3388389
Mingfu Xue;Xin Wang;Yinghao Wu;Shifeng Ni;Leo Yu Zhang;Yushu Zhang;Weiqiang Liu
Intellectual property (IP) protection for deep neural networks (DNNs) has raised serious concerns in recent years. Most existing works embed watermarks in the DNN model for IP protection, which need to modify the model and do not consider/mention interpretability. In this article, for the first time, we propose an interpretable IP protection method for DNN based on explainable artificial intelligence. Compared with existing works, the proposed method does not modify the DNN model, and the decision of the ownership verification is interpretable. We extract the intrinsic features of the DNN model by using deep Taylor decomposition. Since the intrinsic feature is composed of unique interpretation of the model's decision, the intrinsic feature can be regarded as fingerprint of the model. If the fingerprint of a suspected model is the same as the original model, the suspected model is considered as a pirated model. Experimental results demonstrate that the fingerprints can be successfully used to verify the ownership of the model and the test accuracy of the model is not affected. Furthermore, the proposed method is robust to fine-tuning attack, pruning attack, watermark overwriting attack, and adaptive attack.
近年来,深度神经网络(DNN)的知识产权(IP)保护引起了人们的严重关注。现有研究大多在 DNN 模型中嵌入水印进行知识产权保护,这需要修改模型,且没有考虑/提及可解释性。本文首次提出了一种基于可解释人工智能的 DNN 可解释知识产权保护方法。与现有方法相比,本文提出的方法不需要修改 DNN 模型,而且所有权验证的决定是可解释的。我们利用深度泰勒分解法提取 DNN 模型的内在特征。由于内在特征是由对模型判定的唯一解释组成的,因此内在特征可视为模型的指纹。如果可疑模型的指纹与原始模型相同,则该可疑模型被视为盗版模型。实验结果表明,指纹可成功用于验证模型的所有权,模型的测试准确性不受影响。此外,所提出的方法对微调攻击、剪枝攻击、水印覆盖攻击和自适应攻击具有鲁棒性。
{"title":"An Explainable Intellectual Property Protection Method for Deep Neural Networks Based on Intrinsic Features","authors":"Mingfu Xue;Xin Wang;Yinghao Wu;Shifeng Ni;Leo Yu Zhang;Yushu Zhang;Weiqiang Liu","doi":"10.1109/TAI.2024.3388389","DOIUrl":"https://doi.org/10.1109/TAI.2024.3388389","url":null,"abstract":"Intellectual property (IP) protection for deep neural networks (DNNs) has raised serious concerns in recent years. Most existing works embed watermarks in the DNN model for IP protection, which need to modify the model and do not consider/mention interpretability. In this article, for the first time, we propose an interpretable IP protection method for DNN based on explainable artificial intelligence. Compared with existing works, the proposed method does not modify the DNN model, and the decision of the ownership verification is interpretable. We extract the intrinsic features of the DNN model by using deep Taylor decomposition. Since the intrinsic feature is composed of unique interpretation of the model's decision, the intrinsic feature can be regarded as fingerprint of the model. If the fingerprint of a suspected model is the same as the original model, the suspected model is considered as a pirated model. Experimental results demonstrate that the fingerprints can be successfully used to verify the ownership of the model and the test accuracy of the model is not affected. Furthermore, the proposed method is robust to fine-tuning attack, pruning attack, watermark overwriting attack, and adaptive attack.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"5 9","pages":"4649-4659"},"PeriodicalIF":0.0,"publicationDate":"2024-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142169670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Unified Conditional Diffusion Framework for Dual Protein Targets-Based Bioactive Molecule Generation 基于双蛋白靶点的生物活性分子生成的统一条件扩散框架
Pub Date : 2024-04-11 DOI: 10.1109/TAI.2024.3387402
Lei Huang;Zheng Yuan;Huihui Yan;Rong Sheng;Linjing Liu;Fuzhou Wang;Weidun Xie;Nanjun Chen;Fei Huang;Songfang Huang;Ka-Chun Wong;Yaoyun Zhang
Advances in deep generative models shed light on de novo molecule generation with desired properties. However, molecule generation targeted for dual protein targets still faces formidable challenges including insufficient protein 3-D structure data requisition for conditioned model training, inflexibility of auto-regressive sampling, and model generalization to unseen targets. Here, this study proposed diffusion model for dual targets-based molecule generation (DiffDTM), a novel unified structure-free deep generative framework based on a diffusion model for dual-target based molecule generation to address the above issues. Specifically, DiffDTM receives representations of protein sequences and molecular graphs pretrained on large-scale datasets as inputs instead of protein and molecular conformations and incorporates an information fusion module to achieve conditional generation in a one-shot manner. We perform comprehensive multiview experiments to demonstrate that DiffDTM can generate druglike, synthesis-accessible, novel, and high-binding affinity molecules targeting specific dual proteins, outperforming the state-of-the-art (SOTA) models in terms of multiple evaluation metrics. Furthermore, DiffDTM could directly generate molecules toward dopamine receptor D2 (DRD2) and 5-hydroxytryptamine receptor 1A (HTR1A) as new antipsychotics. Experimental comparisons highlight the generalizability of DiffDTM to easily adapt to unseen dual targets and generate bioactive molecules, addressing the issues of insufficient active molecule data for model training when new targets are encountered.
深度生成模型的进步为从头生成具有所需特性的分子提供了启示。然而,针对双蛋白质靶标的分子生成仍然面临着巨大的挑战,包括用于条件模型训练的蛋白质三维结构数据征集不足、自动回归采样缺乏灵活性以及模型泛化到未见靶标等。为解决上述问题,本研究提出了基于扩散模型的双目标分子生成扩散模型(DiffDTM),这是一种基于扩散模型的新型统一无结构深度生成框架。具体来说,DiffDTM 接收在大规模数据集上预训练的蛋白质序列和分子图的表示作为输入,而不是蛋白质和分子构象,并结合信息融合模块,以一次性的方式实现条件生成。我们进行了全面的多视角实验,证明 DiffDTM 可以生成药物样的、可合成的、新颖的和高结合亲和力的分子,靶向特定的双蛋白,在多个评价指标方面优于最先进的(SOTA)模型。此外,DiffDTM 还能直接生成针对多巴胺受体 D2(DRD2)和 5- 羟色胺受体 1A(HTR1A)的分子,作为新型抗精神病药物。实验比较凸显了 DiffDTM 的通用性,它可以轻松适应未知的双重靶点并生成生物活性分子,解决了遇到新靶点时模型训练所需的活性分子数据不足的问题。
{"title":"A Unified Conditional Diffusion Framework for Dual Protein Targets-Based Bioactive Molecule Generation","authors":"Lei Huang;Zheng Yuan;Huihui Yan;Rong Sheng;Linjing Liu;Fuzhou Wang;Weidun Xie;Nanjun Chen;Fei Huang;Songfang Huang;Ka-Chun Wong;Yaoyun Zhang","doi":"10.1109/TAI.2024.3387402","DOIUrl":"https://doi.org/10.1109/TAI.2024.3387402","url":null,"abstract":"Advances in deep generative models shed light on \u0000<italic>de novo</i>\u0000 molecule generation with desired properties. However, molecule generation targeted for dual protein targets still faces formidable challenges including insufficient protein 3-D structure data requisition for conditioned model training, inflexibility of auto-regressive sampling, and model generalization to unseen targets. Here, this study proposed diffusion model for dual targets-based molecule generation (DiffDTM), a novel unified structure-free deep generative framework based on a diffusion model for dual-target based molecule generation to address the above issues. Specifically, DiffDTM receives representations of protein sequences and molecular graphs pretrained on large-scale datasets as inputs instead of protein and molecular conformations and incorporates an information fusion module to achieve conditional generation in a one-shot manner. We perform comprehensive multiview experiments to demonstrate that DiffDTM can generate druglike, synthesis-accessible, novel, and high-binding affinity molecules targeting specific dual proteins, outperforming the state-of-the-art (SOTA) models in terms of multiple evaluation metrics. Furthermore, DiffDTM could directly generate molecules toward dopamine receptor D2 (DRD2) and 5-hydroxytryptamine receptor 1A (HTR1A) as new antipsychotics. Experimental comparisons highlight the generalizability of DiffDTM to easily adapt to unseen dual targets and generate bioactive molecules, addressing the issues of insufficient active molecule data for model training when new targets are encountered.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"5 9","pages":"4595-4606"},"PeriodicalIF":0.0,"publicationDate":"2024-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142169693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Intelligent Fingerprinting Technique for Low-Power Embedded IoT Devices 低功耗嵌入式物联网设备的智能指纹识别技术
Pub Date : 2024-04-10 DOI: 10.1109/TAI.2024.3386498
Varun Kohli;Muhammad Naveed Aman;Biplab Sikdar
The Internet of Things (IoT) has been a popular topic for research and development in the past decade. The resource-constrained and wireless nature of IoT devices presents a large surface of vulnerabilities, and traditional network security methods involving complex cryptography are not feasible. Studies show that Denial of Service (DoS), physical intrusion, spoofing, and node forgery are prevalent threats in the IoT, and there is a need for robust, lightweight device fingerprinting schemes. We identify eight criteria of effective fingerprinting methods for resource-constrained IoT devices and propose an intelligent, lightweight, whitelist-based fingerprinting method that satisfies these properties. The proposed method uses the power-up Static Random Access Memory (SRAM) stack as fingerprint features and autoencoder networks (AEN) for fingerprint registration and verification. We also present a threat mitigation framework based on network isolation levels to handle potential and identified threats. Experiments are conducted with a heterogeneous pool of 10 advanced virtual reduced instruction set computer (AVR) Harvard architecture prover devices from different vendors, and Dell Latitude and Dell XPS 13 laptops are used as verifier testbeds. The proposed method has a 99.9% accuracy, 100% precision, and 99.6% recall on known and unknown heterogeneous devices, which is an improvement over several past works. The independence of fingerprints stored in the AENs enables easy distribution and update, and the observed evaluation latency ($sim$ $10^{-4}$ s) and data collection latency ($sim$ $1$ s) make our method practical for real-world scenarios. Lastly, we analyze the proposed method with regard to the eight criteria and highlight its limitations for future improvement.
物联网(IoT)是近十年来研究和开发的热门话题。物联网设备的资源受限和无线特性带来了巨大的漏洞,而涉及复杂密码学的传统网络安全方法并不可行。研究表明,拒绝服务(DoS)、物理入侵、欺骗和节点伪造是物联网中普遍存在的威胁,因此需要稳健、轻量级的设备指纹方案。我们为资源受限的物联网设备确定了有效指纹识别方法的八项标准,并提出了一种智能、轻量级、基于白名单的指纹识别方法,它能满足这些特性。所提出的方法使用开机静态随机存取存储器(SRAM)堆栈作为指纹特征,并使用自动编码器网络(AEN)进行指纹注册和验证。我们还提出了一个基于网络隔离级别的威胁缓解框架,以处理潜在的和已识别的威胁。实验使用了由不同供应商提供的 10 台高级虚拟精简指令集计算机(AVR)哈佛架构验证器设备组成的异构池,并使用戴尔 Latitude 和戴尔 XPS 13 笔记本电脑作为验证器测试平台。所提出的方法在已知和未知异构设备上的准确率为 99.9%,精确率为 100%,召回率为 99.6%,比过去的几项工作有所提高。存储在AEN中的指纹的独立性使其易于分发和更新,观察到的评估延迟($sim$ $10^{-4}$ s)和数据收集延迟($sim$ $1$ s)使我们的方法在现实世界的应用场景中非常实用。最后,我们根据八项标准对所提出的方法进行了分析,并强调了该方法的局限性,以供今后改进。
{"title":"An Intelligent Fingerprinting Technique for Low-Power Embedded IoT Devices","authors":"Varun Kohli;Muhammad Naveed Aman;Biplab Sikdar","doi":"10.1109/TAI.2024.3386498","DOIUrl":"https://doi.org/10.1109/TAI.2024.3386498","url":null,"abstract":"The Internet of Things (IoT) has been a popular topic for research and development in the past decade. The resource-constrained and wireless nature of IoT devices presents a large surface of vulnerabilities, and traditional network security methods involving complex cryptography are not feasible. Studies show that Denial of Service (DoS), physical intrusion, spoofing, and node forgery are prevalent threats in the IoT, and there is a need for robust, lightweight device fingerprinting schemes. We identify eight criteria of effective fingerprinting methods for resource-constrained IoT devices and propose an intelligent, lightweight, whitelist-based fingerprinting method that satisfies these properties. The proposed method uses the power-up Static Random Access Memory (SRAM) stack as fingerprint features and autoencoder networks (AEN) for fingerprint registration and verification. We also present a threat mitigation framework based on network isolation levels to handle potential and identified threats. Experiments are conducted with a heterogeneous pool of 10 advanced virtual reduced instruction set computer (AVR) Harvard architecture prover devices from different vendors, and Dell Latitude and Dell XPS 13 laptops are used as verifier testbeds. The proposed method has a 99.9% accuracy, 100% precision, and 99.6% recall on known and unknown heterogeneous devices, which is an improvement over several past works. The independence of fingerprints stored in the AENs enables easy distribution and update, and the observed evaluation latency (\u0000<inline-formula><tex-math>$sim$</tex-math></inline-formula>\u0000 \u0000<inline-formula><tex-math>$10^{-4}$</tex-math></inline-formula>\u0000 s) and data collection latency (\u0000<inline-formula><tex-math>$sim$</tex-math></inline-formula>\u0000 \u0000<inline-formula><tex-math>$1$</tex-math></inline-formula>\u0000 s) make our method practical for real-world scenarios. Lastly, we analyze the proposed method with regard to the eight criteria and highlight its limitations for future improvement.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"5 9","pages":"4519-4534"},"PeriodicalIF":0.0,"publicationDate":"2024-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142164998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stabilizing Diffusion Model for Robotic Control With Dynamic Programming and Transition Feasibility 采用动态编程和过渡可行性的机器人控制稳定扩散模型
Pub Date : 2024-04-10 DOI: 10.1109/TAI.2024.3387401
Haoran Li;Yaocheng Zhang;Haowei Wen;Yuanheng Zhu;Dongbin Zhao
Due to its strong ability in distribution representation, the diffusion model has been incorporated into offline reinforcement learning (RL) to cover diverse trajectories of the complex behavior policy. However, this also causes several challenges. Training the diffusion model to imitate behavior from the collected trajectories suffers from limited stitching capability which derives better policies from suboptimal trajectories. Furthermore, the inherent randomness of the diffusion model can lead to unpredictable control and dangerous behavior for the robot. To address these concerns, we propose the value-learning-based decision diffuser (V-DD), which consists of the trajectory diffusion module (TDM) and the trajectory evaluation module (TEM). During the training process, the TDM combines the state-value and classifier-free guidance to bolster the ability to stitch suboptimal trajectories. During the inference process, we design the TEM to select a feasible trajectory generated by the diffusion model. Empirical results demonstrate that our method delivers competitive results on the D4RL benchmark and substantially outperforms current diffusion model-based methods on the real-world robot task.
由于扩散模型在分布表示方面的强大能力,它已被纳入离线强化学习(RL),以覆盖复杂行为政策的各种轨迹。然而,这也带来了一些挑战。从收集到的轨迹中训练扩散模型来模仿行为,会受到拼接能力的限制,从而从次优轨迹中得出更好的策略。此外,扩散模型固有的随机性可能会导致机器人无法预测的控制和危险行为。为了解决这些问题,我们提出了基于价值学习的决策扩散器(V-DD),它由轨迹扩散模块(TDM)和轨迹评估模块(TEM)组成。在训练过程中,TDM 结合了状态值和无分类器指导,以提高缝合次优轨迹的能力。在推理过程中,我们设计 TEM 来选择由扩散模型生成的可行轨迹。实证结果表明,我们的方法在 D4RL 基准测试中取得了具有竞争力的结果,并且在实际机器人任务中大大优于当前基于扩散模型的方法。
{"title":"Stabilizing Diffusion Model for Robotic Control With Dynamic Programming and Transition Feasibility","authors":"Haoran Li;Yaocheng Zhang;Haowei Wen;Yuanheng Zhu;Dongbin Zhao","doi":"10.1109/TAI.2024.3387401","DOIUrl":"https://doi.org/10.1109/TAI.2024.3387401","url":null,"abstract":"Due to its strong ability in distribution representation, the diffusion model has been incorporated into offline reinforcement learning (RL) to cover diverse trajectories of the complex behavior policy. However, this also causes several challenges. Training the diffusion model to imitate behavior from the collected trajectories suffers from limited stitching capability which derives better policies from suboptimal trajectories. Furthermore, the inherent randomness of the diffusion model can lead to unpredictable control and dangerous behavior for the robot. To address these concerns, we propose the value-learning-based decision diffuser (V-DD), which consists of the trajectory diffusion module (TDM) and the trajectory evaluation module (TEM). During the training process, the TDM combines the state-value and classifier-free guidance to bolster the ability to stitch suboptimal trajectories. During the inference process, we design the TEM to select a feasible trajectory generated by the diffusion model. Empirical results demonstrate that our method delivers competitive results on the D4RL benchmark and substantially outperforms current diffusion model-based methods on the real-world robot task.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"5 9","pages":"4585-4594"},"PeriodicalIF":0.0,"publicationDate":"2024-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142165059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learning Counterfactual Explanation of Graph Neural Networks via Generative Flow Network 通过生成流网络学习图神经网络的反事实解释
Pub Date : 2024-04-10 DOI: 10.1109/TAI.2024.3387406
Kangjia He;Li Liu;Youmin Zhang;Ye Wang;Qun Liu;Guoyin Wang
Counterfactual subgraphs explain graph neural networks (GNNs) by answering the question: “How would the prediction change if a certain subgraph were absent in the input instance?” The differentiable proxy adjacency matrix is prevalent in current counterfactual subgraph discovery studies due to its ability to avoid exhaustive edge searching. However, a prediction gap exists when feeding the proxy matrix with continuous values and the thresholded discrete adjacency matrix to GNNs, compromising the optimization of the subgraph generator. Furthermore, the end-to-end learning schema adopted in the subgraph generator limits the diversity of counterfactual subgraphs. To this end, we propose CF-GFNExplainer, a flow-based approach for learning counterfactual subgraphs. CF-GFNExplainer employs a policy network with a discrete edge removal schema to construct counterfactual subgraph generation trajectories. Additionally, we introduce a loss function designed to guide CF-GFNExplainer's optimization. The discrete adjacency matrix generated in each trajectory eliminates the prediction gap, enhancing the validity of the learned subgraphs. Furthermore, the multitrajectories sampling strategy adopted in CF-GFNExplainer results in diverse counterfactual subgraphs. Extensive experiments conducted on synthetic and real-world datasets demonstrate the effectiveness of the proposed method in terms of validity and diversity.
反事实子图通过回答以下问题来解释图神经网络(GNN):"如果输入实例中不存在某个子图,预测结果会发生怎样的变化?由于可微分代理邻接矩阵能够避免穷举式边缘搜索,因此在当前的反事实子图发现研究中非常普遍。然而,在将连续值的代理矩阵和阈值化的离散邻接矩阵输入 GNN 时,会出现预测差距,从而影响子图生成器的优化。此外,子图生成器采用的端到端学习模式限制了反事实子图的多样性。为此,我们提出了基于流的反事实子图学习方法 CF-GFNExplainer。CF-GFNExplainer 采用具有离散边缘移除模式的策略网络来构建反事实子图生成轨迹。此外,我们还引入了一个损失函数,旨在指导 CF-GFNExplainer 进行优化。在每个轨迹中生成的离散邻接矩阵消除了预测差距,增强了所学子图的有效性。此外,CF-GFNExplainer 采用的多轨迹采样策略还能生成多样化的反事实子图。在合成和真实世界数据集上进行的大量实验证明了所提方法在有效性和多样性方面的有效性。
{"title":"Learning Counterfactual Explanation of Graph Neural Networks via Generative Flow Network","authors":"Kangjia He;Li Liu;Youmin Zhang;Ye Wang;Qun Liu;Guoyin Wang","doi":"10.1109/TAI.2024.3387406","DOIUrl":"https://doi.org/10.1109/TAI.2024.3387406","url":null,"abstract":"Counterfactual subgraphs explain graph neural networks (GNNs) by answering the question: “How would the prediction change if a certain subgraph were absent in the input instance?” The differentiable proxy adjacency matrix is prevalent in current counterfactual subgraph discovery studies due to its ability to avoid exhaustive edge searching. However, a prediction gap exists when feeding the proxy matrix with continuous values and the thresholded discrete adjacency matrix to GNNs, compromising the optimization of the subgraph generator. Furthermore, the end-to-end learning schema adopted in the subgraph generator limits the diversity of counterfactual subgraphs. To this end, we propose CF-GFNExplainer, a flow-based approach for learning counterfactual subgraphs. CF-GFNExplainer employs a policy network with a discrete edge removal schema to construct counterfactual subgraph generation trajectories. Additionally, we introduce a loss function designed to guide CF-GFNExplainer's optimization. The discrete adjacency matrix generated in each trajectory eliminates the prediction gap, enhancing the validity of the learned subgraphs. Furthermore, the multitrajectories sampling strategy adopted in CF-GFNExplainer results in diverse counterfactual subgraphs. Extensive experiments conducted on synthetic and real-world datasets demonstrate the effectiveness of the proposed method in terms of validity and diversity.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"5 9","pages":"4607-4619"},"PeriodicalIF":0.0,"publicationDate":"2024-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142169597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Incomplete Graph Learning via Partial Graph Convolutional Network 通过部分图卷积网络进行不完整图学习
Pub Date : 2024-04-10 DOI: 10.1109/TAI.2024.3386499
Ziyan Zhang;Bo Jiang;Jin Tang;Jinhui Tang;Bin Luo
Graph convolutional networks (GCNs) gain increasing attention on graph data learning tasks in recent years. However, in many applications, graph may come with an incomplete form where attributes of graph nodes are partially unknown/missing. Existing graph convolutions (GCs) are generally designed on complete graphs which cannot deal with attribute-incomplete graph data directly. To address this problem, in this article, we extend standard GC and develop an explicit Partial Graph Convolution (PaGC) for attribute-incomplete graph data. Our PaGC is derived based on the observation that the core neighborhood aggregator in GC operation can be equivalently viewed as an energy minimization model. Based on it, we can define a novel partial aggregation function and derive PaGC for incomplete graph data. Experiments demonstrate the effectiveness and efficiency of the proposed PaGCN.
近年来,图卷积网络(GCN)在图数据学习任务中越来越受到关注。然而,在许多应用中,图可能是不完整的,图节点的属性部分未知或缺失。现有的图卷积(GC)一般是针对完整图设计的,无法直接处理属性不完整的图数据。为了解决这个问题,我们在本文中扩展了标准图卷积,并开发了一种用于属性不完整图数据的显式部分图卷积(PaGC)。我们的 PaGC 是在观察到 GC 操作中的核心邻域聚合器可以等同于能量最小化模型的基础上推导出来的。在此基础上,我们可以定义一个新颖的部分聚合函数,并推导出适用于不完整图数据的 PaGC。实验证明了所提出的 PaGCN 的有效性和效率。
{"title":"Incomplete Graph Learning via Partial Graph Convolutional Network","authors":"Ziyan Zhang;Bo Jiang;Jin Tang;Jinhui Tang;Bin Luo","doi":"10.1109/TAI.2024.3386499","DOIUrl":"https://doi.org/10.1109/TAI.2024.3386499","url":null,"abstract":"Graph convolutional networks (GCNs) gain increasing attention on graph data learning tasks in recent years. However, in many applications, graph may come with an incomplete form where attributes of graph nodes are partially unknown/missing. Existing graph convolutions (GCs) are generally designed on complete graphs which cannot deal with attribute-incomplete graph data directly. To address this problem, in this article, we extend standard GC and develop an explicit Partial Graph Convolution (PaGC) for attribute-incomplete graph data. Our PaGC is derived based on the observation that the core neighborhood aggregator in GC operation can be equivalently viewed as an energy minimization model. Based on it, we can define a novel \u0000<italic>partial aggregation function</i>\u0000 and derive PaGC for incomplete graph data. Experiments demonstrate the effectiveness and efficiency of the proposed PaGCN.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"5 9","pages":"4315-4321"},"PeriodicalIF":0.0,"publicationDate":"2024-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142165011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Distributed Conditional Wasserstein Deep Convolutional Relativistic Loss Generative Adversarial Network With Improved Convergence 改进收敛性的分布式条件瓦瑟斯坦深度卷积相对损失生成对抗网络
Pub Date : 2024-04-09 DOI: 10.1109/TAI.2024.3386500
Arunava Roy;Dipankar Dasgupta
Generative adversarial networks (GANs) excel in diverse applications such as image enhancement, manipulation, and generating images and videos from text. Yet, training GANs with large datasets remains computationally intensive for standalone systems. Synchronization issues between the generator and discriminator lead to unstable training, poor convergence, vanishing, and exploding gradient challenges. In decentralized environments, standalone GANs struggle with distributed data on client machines. Researchers have turned to federated learning (FL) for distributed-GAN (D-GAN) implementations, but efforts often fall short due to training instability and poor synchronization within GAN components. In this study, we present DRL-GAN, a lightweight Wasserstein conditional distributed relativistic loss-GAN designed to overcome existing limitations. DRL-GAN ensures training stability in the face of nonconvex losses by employing a single global generator on the central server and a discriminator per client. Utilizing Wasserstein-1 for relativistic loss computation between real and fake samples, DRL-GAN effectively addresses issues, such as mode collapses, vanishing, and exploding gradients, accommodating both iid and non-iid private data in clients and fostering strong convergence. The absence of a robust conditional distributed-GAN model serves as another motivation for this work. We provide a comprehensive mathematical formulation of DRL-GAN and validate our claims empirically on CIFAR-10, MNIST, EuroSAT, and LSUN-Bedroom datasets.
生成式对抗网络(GAN)在图像增强、处理以及根据文本生成图像和视频等多种应用中表现出色。然而,对于独立系统而言,使用大型数据集训练生成式对抗网络仍然是一项计算密集型工作。生成器和判别器之间的同步问题会导致训练不稳定、收敛性差、消失和梯度爆炸等难题。在分散的环境中,独立的 GANs 难以处理客户端机器上的分布式数据。研究人员已将联合学习(FL)用于分布式 GAN(D-GAN)的实现,但由于 GAN 组件内的训练不稳定和同步性差,这些努力往往无法奏效。在本研究中,我们介绍了 DRL-GAN,它是一种轻量级的 Wasserstein 条件分布式相对论损失-GAN,旨在克服现有的局限性。DRL-GAN 通过在中央服务器上采用单个全局发生器和每个客户端采用一个判别器,确保了面对非凸损失时的训练稳定性。DRL-GAN 利用 Wasserstein-1 在真实样本和虚假样本之间进行相对损失计算,有效解决了模式坍塌、消失和梯度爆炸等问题,同时兼顾了客户机中的 iid 和非 iid 私有数据,并促进了强大的收敛性。缺乏稳健的条件分布式广义网络模型是这项工作的另一个动机。我们提供了 DRL-GAN 的全面数学表述,并在 CIFAR-10、MNIST、EuroSAT 和 LSUN-Bedroom 数据集上验证了我们的主张。
{"title":"A Distributed Conditional Wasserstein Deep Convolutional Relativistic Loss Generative Adversarial Network With Improved Convergence","authors":"Arunava Roy;Dipankar Dasgupta","doi":"10.1109/TAI.2024.3386500","DOIUrl":"https://doi.org/10.1109/TAI.2024.3386500","url":null,"abstract":"Generative adversarial networks (GANs) excel in diverse applications such as image enhancement, manipulation, and generating images and videos from text. Yet, training GANs with large datasets remains computationally intensive for standalone systems. Synchronization issues between the generator and discriminator lead to unstable training, poor convergence, vanishing, and exploding gradient challenges. In decentralized environments, standalone GANs struggle with distributed data on client machines. Researchers have turned to federated learning (FL) for distributed-GAN (D-GAN) implementations, but efforts often fall short due to training instability and poor synchronization within GAN components. In this study, we present DRL-GAN, a lightweight Wasserstein conditional distributed relativistic loss-GAN designed to overcome existing limitations. DRL-GAN ensures training stability in the face of nonconvex losses by employing a single global generator on the central server and a discriminator per client. Utilizing Wasserstein-1 for relativistic loss computation between real and fake samples, DRL-GAN effectively addresses issues, such as mode collapses, vanishing, and exploding gradients, accommodating both iid and non-iid private data in clients and fostering strong convergence. The absence of a robust conditional distributed-GAN model serves as another motivation for this work. We provide a comprehensive mathematical formulation of DRL-GAN and validate our claims empirically on CIFAR-10, MNIST, EuroSAT, and LSUN-Bedroom datasets.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"5 9","pages":"4344-4353"},"PeriodicalIF":0.0,"publicationDate":"2024-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142165057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Transactions on Artificial Intelligence Publication Information IEEE Transactions on Artificial Intelligence 出版信息
Pub Date : 2024-04-09 DOI: 10.1109/TAI.2024.3382433
{"title":"IEEE Transactions on Artificial Intelligence Publication Information","authors":"","doi":"10.1109/TAI.2024.3382433","DOIUrl":"https://doi.org/10.1109/TAI.2024.3382433","url":null,"abstract":"","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"5 4","pages":"C2-C2"},"PeriodicalIF":0.0,"publicationDate":"2024-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10495742","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140540952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE transactions on artificial intelligence
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1