首页 > 最新文献

Machine learning and knowledge discovery in databases : European Conference, ECML PKDD ... : proceedings. ECML PKDD (Conference)最新文献

英文 中文
VCNet: A self-explaining model for realistic counterfactual generation VCNet:现实反事实生成的自解释模型
Victor Guyomard, Franccoise Fessant, Thomas Guyet, Tassadit Bouadi, A. Termier
Counterfactual explanation is a common class of methods to make local explanations of machine learning decisions. For a given instance, these methods aim to find the smallest modification of feature values that changes the predicted decision made by a machine learning model. One of the challenges of counterfactual explanation is the efficient generation of realistic counterfactuals. To address this challenge, we propose VCNet-Variational Counter Net-a model architecture that combines a predictor and a counterfactual generator that are jointly trained, for regression or classification tasks. VCNet is able to both generate predictions, and to generate counterfactual explanations without having to solve another minimisation problem. Our contribution is the generation of counterfactuals that are close to the distribution of the predicted class. This is done by learning a variational autoencoder conditionally to the output of the predictor in a join-training fashion. We present an empirical evaluation on tabular datasets and across several interpretability metrics. The results are competitive with the state-of-the-art method.
反事实解释是对机器学习决策进行局部解释的常见方法。对于给定的实例,这些方法旨在找到改变机器学习模型所做出的预测决策的特征值的最小修改。反事实解释的挑战之一是有效地生成现实的反事实。为了应对这一挑战,我们提出了vcnet -变分计数器-一种模型架构,它结合了联合训练的预测器和反事实生成器,用于回归或分类任务。VCNet既可以生成预测,也可以生成反事实的解释,而无需解决另一个最小化问题。我们的贡献是生成接近预测类分布的反事实。这是通过以联合训练的方式有条件地学习变分自编码器到预测器的输出来完成的。我们提出了对表格数据集和跨几个可解释性指标的实证评估。其结果可与最先进的方法相媲美。
{"title":"VCNet: A self-explaining model for realistic counterfactual generation","authors":"Victor Guyomard, Franccoise Fessant, Thomas Guyet, Tassadit Bouadi, A. Termier","doi":"10.48550/arXiv.2212.10847","DOIUrl":"https://doi.org/10.48550/arXiv.2212.10847","url":null,"abstract":"Counterfactual explanation is a common class of methods to make local explanations of machine learning decisions. For a given instance, these methods aim to find the smallest modification of feature values that changes the predicted decision made by a machine learning model. One of the challenges of counterfactual explanation is the efficient generation of realistic counterfactuals. To address this challenge, we propose VCNet-Variational Counter Net-a model architecture that combines a predictor and a counterfactual generator that are jointly trained, for regression or classification tasks. VCNet is able to both generate predictions, and to generate counterfactual explanations without having to solve another minimisation problem. Our contribution is the generation of counterfactuals that are close to the distribution of the predicted class. This is done by learning a variational autoencoder conditionally to the output of the predictor in a join-training fashion. We present an empirical evaluation on tabular datasets and across several interpretability metrics. The results are competitive with the state-of-the-art method.","PeriodicalId":74091,"journal":{"name":"Machine learning and knowledge discovery in databases : European Conference, ECML PKDD ... : proceedings. ECML PKDD (Conference)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85573375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Invariant Lipschitz Bandits: A Side Observation Approach 不变Lipschitz强盗:一种侧面观察方法
Nam-Phuong Tran, The-Anh Ta, Long Tran-Thanh
Symmetry arises in many optimization and decision-making problems, and has attracted considerable attention from the optimization community: By utilizing the existence of such symmetries, the process of searching for optimal solutions can be improved significantly. Despite its success in (offline) optimization, the utilization of symmetries has not been well examined within the online optimization settings, especially in the bandit literature. As such, in this paper we study the invariant Lipschitz bandit setting, a subclass of the Lipschitz bandits where the reward function and the set of arms are preserved under a group of transformations. We introduce an algorithm named texttt{UniformMesh-N}, which naturally integrates side observations using group orbits into the texttt{UniformMesh} algorithm (cite{Kleinberg2005_UniformMesh}), which uniformly discretizes the set of arms. Using the side-observation approach, we prove an improved regret upper bound, which depends on the cardinality of the group, given that the group is finite. We also prove a matching regret's lower bound for the invariant Lipschitz bandit class (up to logarithmic factors). We hope that our work will ignite further investigation of symmetry in bandit theory and sequential decision-making theory in general.
对称性出现在许多优化和决策问题中,并引起了优化界的广泛关注:通过利用这种对称性的存在,可以显著改善搜索最优解的过程。尽管它在(离线)优化方面取得了成功,但在在线优化设置中,特别是在强盗文献中,对称性的利用还没有得到很好的检验。因此,本文研究了不变Lipschitz匪盗集合,即在一组变换下奖励函数和武器集合保持不变的Lipschitz匪盗的子类。我们引入了一种名为texttt{UniformMesh- n}的算法,该算法自然地将使用群轨道的侧面观测整合到texttt{UniformMesh}算法(cite{Kleinberg2005_UniformMesh})中,从而均匀地离散化臂集。利用侧观察方法,我们证明了一个改进的遗憾上界,它取决于群体的基数,给定群体是有限的。我们还证明了不变Lipschitz强盗类的匹配遗憾下界(直到对数因子)。我们希望我们的工作能够点燃对强盗理论和顺序决策理论中对称性的进一步研究。
{"title":"Invariant Lipschitz Bandits: A Side Observation Approach","authors":"Nam-Phuong Tran, The-Anh Ta, Long Tran-Thanh","doi":"10.48550/arXiv.2212.07524","DOIUrl":"https://doi.org/10.48550/arXiv.2212.07524","url":null,"abstract":"Symmetry arises in many optimization and decision-making problems, and has attracted considerable attention from the optimization community: By utilizing the existence of such symmetries, the process of searching for optimal solutions can be improved significantly. Despite its success in (offline) optimization, the utilization of symmetries has not been well examined within the online optimization settings, especially in the bandit literature. As such, in this paper we study the invariant Lipschitz bandit setting, a subclass of the Lipschitz bandits where the reward function and the set of arms are preserved under a group of transformations. We introduce an algorithm named texttt{UniformMesh-N}, which naturally integrates side observations using group orbits into the texttt{UniformMesh} algorithm (cite{Kleinberg2005_UniformMesh}), which uniformly discretizes the set of arms. Using the side-observation approach, we prove an improved regret upper bound, which depends on the cardinality of the group, given that the group is finite. We also prove a matching regret's lower bound for the invariant Lipschitz bandit class (up to logarithmic factors). We hope that our work will ignite further investigation of symmetry in bandit theory and sequential decision-making theory in general.","PeriodicalId":74091,"journal":{"name":"Machine learning and knowledge discovery in databases : European Conference, ECML PKDD ... : proceedings. ECML PKDD (Conference)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86701469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recommending Related Products Using Graph Neural Networks in Directed Graphs 在有向图中使用图神经网络推荐相关产品
Srinivas Virinchi, Anoop Saladi, Abhirup Mondal
Related product recommendation (RPR) is pivotal to the success of any e-commerce service. In this paper, we deal with the problem of recommending related products i.e., given a query product, we would like to suggest top-k products that have high likelihood to be bought together with it. Our problem implicitly assumes asymmetry i.e., for a phone, we would like to recommend a suitable phone case, but for a phone case, it may not be apt to recommend a phone because customers typically would purchase a phone case only while owning a phone. We also do not limit ourselves to complementary or substitute product recommendation. For example, for a specific night wear t-shirt, we can suggest similar t-shirts as well as track pants. So, the notion of relatedness is subjective to the query product and dependent on customer preferences. Further, various factors such as product price, availability lead to presence of selection bias in the historical purchase data, that needs to be controlled for while training related product recommendations model. These challenges are orthogonal to each other deeming our problem nontrivial. To address these, we propose DAEMON, a novel Graph Neural Network (GNN) based framework for related product recommendation, wherein the problem is formulated as a node recommendation task on a directed product graph. In order to capture product asymmetry, we employ an asymmetric loss function and learn dual embeddings for each product, by appropriately aggregating features from its neighborhood. DAEMON leverages multi-modal data sources such as catalog metadata, browse behavioral logs to mitigate selection bias and generate recommendations for cold-start products. Extensive offline experiments show that DAEMON outperforms state-of-the-art baselines by 30-160% in terms of HitRate and MRR for the node recommendation task.
相关产品推荐(RPR)是任何电子商务服务成功的关键。在本文中,我们处理推荐相关产品的问题,即给定一个查询产品,我们想要推荐top-k的产品,这些产品有很高的可能性与它一起购买。我们的问题隐含地假设了不对称性,即对于一部手机,我们想推荐一个合适的手机壳,但是对于一个手机壳,我们可能不倾向于推荐一部手机,因为客户通常只会在拥有手机的情况下购买手机壳。我们也不局限于补充或替代产品的推荐。例如,对于一件特定的夜装t恤,我们可以建议类似的t恤和运动裤。因此,相关性的概念对于查询产品来说是主观的,并且依赖于客户的偏好。此外,产品价格、可用性等各种因素导致历史购买数据中存在选择偏差,在训练相关产品推荐模型时需要对其进行控制。这些挑战是相互正交的,因此我们的问题很重要。为了解决这些问题,我们提出了DAEMON,一个新的基于图神经网络(GNN)的相关产品推荐框架,其中问题被表述为有向产品图上的节点推荐任务。为了捕获产品的不对称性,我们采用了不对称损失函数,并通过适当地聚合其邻域的特征来学习每个产品的对偶嵌入。DAEMON利用多模式数据源,如目录元数据,浏览行为日志,以减轻选择偏差,并生成冷启动产品的建议。大量的离线实验表明,DAEMON在节点推荐任务的命中率和MRR方面比最先进的基线高出30-160%。
{"title":"Recommending Related Products Using Graph Neural Networks in Directed Graphs","authors":"Srinivas Virinchi, Anoop Saladi, Abhirup Mondal","doi":"10.48550/arXiv.2211.11583","DOIUrl":"https://doi.org/10.48550/arXiv.2211.11583","url":null,"abstract":"Related product recommendation (RPR) is pivotal to the success of any e-commerce service. In this paper, we deal with the problem of recommending related products i.e., given a query product, we would like to suggest top-k products that have high likelihood to be bought together with it. Our problem implicitly assumes asymmetry i.e., for a phone, we would like to recommend a suitable phone case, but for a phone case, it may not be apt to recommend a phone because customers typically would purchase a phone case only while owning a phone. We also do not limit ourselves to complementary or substitute product recommendation. For example, for a specific night wear t-shirt, we can suggest similar t-shirts as well as track pants. So, the notion of relatedness is subjective to the query product and dependent on customer preferences. Further, various factors such as product price, availability lead to presence of selection bias in the historical purchase data, that needs to be controlled for while training related product recommendations model. These challenges are orthogonal to each other deeming our problem nontrivial. To address these, we propose DAEMON, a novel Graph Neural Network (GNN) based framework for related product recommendation, wherein the problem is formulated as a node recommendation task on a directed product graph. In order to capture product asymmetry, we employ an asymmetric loss function and learn dual embeddings for each product, by appropriately aggregating features from its neighborhood. DAEMON leverages multi-modal data sources such as catalog metadata, browse behavioral logs to mitigate selection bias and generate recommendations for cold-start products. Extensive offline experiments show that DAEMON outperforms state-of-the-art baselines by 30-160% in terms of HitRate and MRR for the node recommendation task.","PeriodicalId":74091,"journal":{"name":"Machine learning and knowledge discovery in databases : European Conference, ECML PKDD ... : proceedings. ECML PKDD (Conference)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76023368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Resisting Graph Adversarial Attack via Cooperative Homophilous Augmentation 利用合作同调增强抵抗图对抗攻击
Zhihao Zhu, Chenwang Wu, Mingyang Zhou, Hao Liao, DefuLian, Enhong Chen
Recent studies show that Graph Neural Networks(GNNs) are vulnerable and easily fooled by small perturbations, which has raised considerable concerns for adapting GNNs in various safety-critical applications. In this work, we focus on the emerging but critical attack, namely, Graph Injection Attack(GIA), in which the adversary poisons the graph by injecting fake nodes instead of modifying existing structures or node attributes. Inspired by findings that the adversarial attacks are related to the increased heterophily on perturbed graphs (the adversary tends to connect dissimilar nodes), we propose a general defense framework CHAGNN against GIA through cooperative homophilous augmentation of graph data and model. Specifically, the model generates pseudo-labels for unlabeled nodes in each round of training to reduce heterophilous edges of nodes with distinct labels. The cleaner graph is fed back to the model, producing more informative pseudo-labels. In such an iterative manner, model robustness is then promisingly enhanced. We present the theoretical analysis of the effect of homophilous augmentation and provide the guarantee of the proposal's validity. Experimental results empirically demonstrate the effectiveness of CHAGNN in comparison with recent state-of-the-art defense methods on diverse real-world datasets.
最近的研究表明,图神经网络(gnn)是脆弱的,很容易被小的扰动所愚弄,这引起了人们对在各种安全关键应用中调整gnn的相当大的关注。在这项工作中,我们专注于新兴但关键的攻击,即图注入攻击(GIA),其中攻击者通过注入假节点而不是修改现有结构或节点属性来毒害图。研究发现,对抗性攻击与摄动图上的异质性增加有关(攻击者倾向于连接不同的节点),我们通过对图数据和模型的合作同质增强,提出了一种针对GIA的通用防御框架CHAGNN。具体而言,该模型在每轮训练中为未标记的节点生成伪标签,以减少具有不同标签的节点的异缘。更清晰的图被反馈给模型,产生更多信息的伪标签。在这样的迭代方式下,模型鲁棒性得到了很好的增强。本文从理论上分析了同调增的效应,并为该建议的有效性提供了保证。在不同的真实数据集上,实验结果实证地证明了CHAGNN与最近最先进的防御方法的有效性。
{"title":"Resisting Graph Adversarial Attack via Cooperative Homophilous Augmentation","authors":"Zhihao Zhu, Chenwang Wu, Mingyang Zhou, Hao Liao, DefuLian, Enhong Chen","doi":"10.48550/arXiv.2211.08068","DOIUrl":"https://doi.org/10.48550/arXiv.2211.08068","url":null,"abstract":"Recent studies show that Graph Neural Networks(GNNs) are vulnerable and easily fooled by small perturbations, which has raised considerable concerns for adapting GNNs in various safety-critical applications. In this work, we focus on the emerging but critical attack, namely, Graph Injection Attack(GIA), in which the adversary poisons the graph by injecting fake nodes instead of modifying existing structures or node attributes. Inspired by findings that the adversarial attacks are related to the increased heterophily on perturbed graphs (the adversary tends to connect dissimilar nodes), we propose a general defense framework CHAGNN against GIA through cooperative homophilous augmentation of graph data and model. Specifically, the model generates pseudo-labels for unlabeled nodes in each round of training to reduce heterophilous edges of nodes with distinct labels. The cleaner graph is fed back to the model, producing more informative pseudo-labels. In such an iterative manner, model robustness is then promisingly enhanced. We present the theoretical analysis of the effect of homophilous augmentation and provide the guarantee of the proposal's validity. Experimental results empirically demonstrate the effectiveness of CHAGNN in comparison with recent state-of-the-art defense methods on diverse real-world datasets.","PeriodicalId":74091,"journal":{"name":"Machine learning and knowledge discovery in databases : European Conference, ECML PKDD ... : proceedings. ECML PKDD (Conference)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76998425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hypothesis Transfer in Bandits by Weighted Models 基于加权模型的土匪假设转移
Steven Bilaj, Sofien Dhouib, S. Maghsudi
We consider the problem of contextual multi-armed bandits in the setting of hypothesis transfer learning. That is, we assume having access to a previously learned model on an unobserved set of contexts, and we leverage it in order to accelerate exploration on a new bandit problem. Our transfer strategy is based on a re-weighting scheme for which we show a reduction in the regret over the classic Linear UCB when transfer is desired, while recovering the classic regret rate when the two tasks are unrelated. We further extend this method to an arbitrary amount of source models, where the algorithm decides which model is preferred at each time step. Additionally we discuss an approach where a dynamic convex combination of source models is given in terms of a biased regularization term in the classic LinUCB algorithm. The algorithms and the theoretical analysis of our proposed methods substantiated by empirical evaluations on simulated and real-world data.
在假设迁移学习的背景下,我们考虑了情境多手强盗问题。也就是说,我们假设在未观察到的一组上下文中可以访问先前学习过的模型,并且我们利用它来加速对新土匪问题的探索。我们的迁移策略基于一个重新加权方案,当需要迁移时,我们展示了比经典线性UCB更少的遗憾,而当两个任务无关时,我们恢复了经典遗憾率。我们进一步将该方法扩展到任意数量的源模型,其中算法决定在每个时间步选择哪个模型。此外,我们还讨论了在经典LinUCB算法中根据有偏正则化项给出源模型的动态凸组合的方法。我们提出的方法的算法和理论分析得到了模拟和现实世界数据的实证评估的证实。
{"title":"Hypothesis Transfer in Bandits by Weighted Models","authors":"Steven Bilaj, Sofien Dhouib, S. Maghsudi","doi":"10.48550/arXiv.2211.07387","DOIUrl":"https://doi.org/10.48550/arXiv.2211.07387","url":null,"abstract":"We consider the problem of contextual multi-armed bandits in the setting of hypothesis transfer learning. That is, we assume having access to a previously learned model on an unobserved set of contexts, and we leverage it in order to accelerate exploration on a new bandit problem. Our transfer strategy is based on a re-weighting scheme for which we show a reduction in the regret over the classic Linear UCB when transfer is desired, while recovering the classic regret rate when the two tasks are unrelated. We further extend this method to an arbitrary amount of source models, where the algorithm decides which model is preferred at each time step. Additionally we discuss an approach where a dynamic convex combination of source models is given in terms of a biased regularization term in the classic LinUCB algorithm. The algorithms and the theoretical analysis of our proposed methods substantiated by empirical evaluations on simulated and real-world data.","PeriodicalId":74091,"journal":{"name":"Machine learning and knowledge discovery in databases : European Conference, ECML PKDD ... : proceedings. ECML PKDD (Conference)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74754306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sparse Horseshoe Estimation via Expectation-Maximisation 基于期望最大化的稀疏马蹄估计
Shu Yu Tew, D. Schmidt, E. Makalic
The horseshoe prior is known to possess many desirable properties for Bayesian estimation of sparse parameter vectors, yet its density function lacks an analytic form. As such, it is challenging to find a closed-form solution for the posterior mode. Conventional horseshoe estimators use the posterior mean to estimate the parameters, but these estimates are not sparse. We propose a novel expectation-maximisation (EM) procedure for computing the MAP estimates of the parameters in the case of the standard linear model. A particular strength of our approach is that the M-step depends only on the form of the prior and it is independent of the form of the likelihood. We introduce several simple modifications of this EM procedure that allow for straightforward extension to generalised linear models. In experiments performed on simulated and real data, our approach performs comparable, or superior to, state-of-the-art sparse estimation methods in terms of statistical performance and computational cost.
已知马蹄形先验具有稀疏参数向量贝叶斯估计所需的许多性质,但其密度函数缺乏解析形式。因此,对于后验模式,找到一个封闭的解是具有挑战性的。传统的马蹄估计使用后验均值来估计参数,但这些估计不是稀疏的。我们提出了一种新的期望最大化(EM)程序,用于计算标准线性模型中参数的MAP估计。我们的方法的一个特别的优点是m步只依赖于先验的形式,它独立于可能性的形式。我们介绍了这个EM过程的几个简单修改,允许直接扩展到广义线性模型。在模拟和真实数据上进行的实验中,我们的方法在统计性能和计算成本方面与最先进的稀疏估计方法相当或优于最先进的稀疏估计方法。
{"title":"Sparse Horseshoe Estimation via Expectation-Maximisation","authors":"Shu Yu Tew, D. Schmidt, E. Makalic","doi":"10.48550/arXiv.2211.03248","DOIUrl":"https://doi.org/10.48550/arXiv.2211.03248","url":null,"abstract":"The horseshoe prior is known to possess many desirable properties for Bayesian estimation of sparse parameter vectors, yet its density function lacks an analytic form. As such, it is challenging to find a closed-form solution for the posterior mode. Conventional horseshoe estimators use the posterior mean to estimate the parameters, but these estimates are not sparse. We propose a novel expectation-maximisation (EM) procedure for computing the MAP estimates of the parameters in the case of the standard linear model. A particular strength of our approach is that the M-step depends only on the form of the prior and it is independent of the form of the likelihood. We introduce several simple modifications of this EM procedure that allow for straightforward extension to generalised linear models. In experiments performed on simulated and real data, our approach performs comparable, or superior to, state-of-the-art sparse estimation methods in terms of statistical performance and computational cost.","PeriodicalId":74091,"journal":{"name":"Machine learning and knowledge discovery in databases : European Conference, ECML PKDD ... : proceedings. ECML PKDD (Conference)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85672697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Coupling User Preference with External Rewards to Enable Driver-centered and Resource-aware EV Charging Recommendation 将用户偏好与外部奖励相结合,实现以驾驶员为中心和资源感知的电动汽车充电建议
Chengyin Li, Zheng Dong, N. Fisher, D. Zhu
Electric Vehicle (EV) charging recommendation that both accommodates user preference and adapts to the ever-changing external environment arises as a cost-effective strategy to alleviate the range anxiety of private EV drivers. Previous studies focus on centralized strategies to achieve optimized resource allocation, particularly useful for privacy-indifferent taxi fleets and fixed-route public transits. However, private EV driver seeks a more personalized and resource-aware charging recommendation that is tailor-made to accommodate the user preference (when and where to charge) yet sufficiently adaptive to the spatiotemporal mismatch between charging supply and demand. Here we propose a novel Regularized Actor-Critic (RAC) charging recommendation approach that would allow each EV driver to strike an optimal balance between the user preference (historical charging pattern) and the external reward (driving distance and wait time). Experimental results on two real-world datasets demonstrate the unique features and superior performance of our approach to the competing methods.
同时兼顾用户偏好和适应不断变化的外部环境的电动汽车充电建议是缓解私人电动汽车驾驶者里程焦虑的一种经济有效的策略。以往的研究主要集中在集中策略上,以实现资源的优化配置,尤其适用于隐私无关的出租车车队和固定路线的公共交通。然而,私人电动汽车司机寻求更加个性化和资源意识的充电建议,既要满足用户的偏好(充电时间和地点),又要充分适应充电供需之间的时空不匹配。本文提出了一种新的正则化行为批评家(RAC)充电推荐方法,该方法允许每个电动汽车驾驶员在用户偏好(历史充电模式)和外部奖励(行驶距离和等待时间)之间取得最佳平衡。在两个真实数据集上的实验结果表明,我们的方法与竞争方法相比具有独特的特点和优越的性能。
{"title":"Coupling User Preference with External Rewards to Enable Driver-centered and Resource-aware EV Charging Recommendation","authors":"Chengyin Li, Zheng Dong, N. Fisher, D. Zhu","doi":"10.48550/arXiv.2210.12693","DOIUrl":"https://doi.org/10.48550/arXiv.2210.12693","url":null,"abstract":"Electric Vehicle (EV) charging recommendation that both accommodates user preference and adapts to the ever-changing external environment arises as a cost-effective strategy to alleviate the range anxiety of private EV drivers. Previous studies focus on centralized strategies to achieve optimized resource allocation, particularly useful for privacy-indifferent taxi fleets and fixed-route public transits. However, private EV driver seeks a more personalized and resource-aware charging recommendation that is tailor-made to accommodate the user preference (when and where to charge) yet sufficiently adaptive to the spatiotemporal mismatch between charging supply and demand. Here we propose a novel Regularized Actor-Critic (RAC) charging recommendation approach that would allow each EV driver to strike an optimal balance between the user preference (historical charging pattern) and the external reward (driving distance and wait time). Experimental results on two real-world datasets demonstrate the unique features and superior performance of our approach to the competing methods.","PeriodicalId":74091,"journal":{"name":"Machine learning and knowledge discovery in databases : European Conference, ECML PKDD ... : proceedings. ECML PKDD (Conference)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75015747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Learning Graphical Factor Models with Riemannian Optimization 学习图形因子模型与黎曼优化
Alexandre Hippert-Ferrer, Florent Bouchard, A. Mian, Titouan Vayer, A. Breloy
Graphical models and factor analysis are well-established tools in multivariate statistics. While these models can be both linked to structures exhibited by covariance and precision matrices, they are generally not jointly leveraged within graph learning processes. This paper therefore addresses this issue by proposing a flexible algorithmic framework for graph learning under low-rank structural constraints on the covariance matrix. The problem is expressed as penalized maximum likelihood estimation of an elliptical distribution (a generalization of Gaussian graphical models to possibly heavy-tailed distributions), where the covariance matrix is optionally constrained to be structured as low-rank plus diagonal (low-rank factor model). The resolution of this class of problems is then tackled with Riemannian optimization, where we leverage geometries of positive definite matrices and positive semi-definite matrices of fixed rank that are well suited to elliptical models. Numerical experiments on real-world data sets illustrate the effectiveness of the proposed approach.
图形模型和因子分析是多元统计中行之有效的工具。虽然这些模型都可以与协方差和精度矩阵所显示的结构相关联,但它们通常不会在图学习过程中共同利用。因此,本文通过提出一个灵活的算法框架来解决这个问题,该框架用于在协方差矩阵的低秩结构约束下进行图学习。该问题表示为椭圆分布的惩罚最大似然估计(高斯图形模型对可能的重尾分布的推广),其中协方差矩阵可选地约束为低秩加对角线(低秩因子模型)的结构。这类问题的解决,然后处理黎曼优化,其中我们利用几何的正定矩阵和正半定矩阵的固定秩,非常适合椭圆模型。在实际数据集上的数值实验证明了该方法的有效性。
{"title":"Learning Graphical Factor Models with Riemannian Optimization","authors":"Alexandre Hippert-Ferrer, Florent Bouchard, A. Mian, Titouan Vayer, A. Breloy","doi":"10.48550/arXiv.2210.11950","DOIUrl":"https://doi.org/10.48550/arXiv.2210.11950","url":null,"abstract":"Graphical models and factor analysis are well-established tools in multivariate statistics. While these models can be both linked to structures exhibited by covariance and precision matrices, they are generally not jointly leveraged within graph learning processes. This paper therefore addresses this issue by proposing a flexible algorithmic framework for graph learning under low-rank structural constraints on the covariance matrix. The problem is expressed as penalized maximum likelihood estimation of an elliptical distribution (a generalization of Gaussian graphical models to possibly heavy-tailed distributions), where the covariance matrix is optionally constrained to be structured as low-rank plus diagonal (low-rank factor model). The resolution of this class of problems is then tackled with Riemannian optimization, where we leverage geometries of positive definite matrices and positive semi-definite matrices of fixed rank that are well suited to elliptical models. Numerical experiments on real-world data sets illustrate the effectiveness of the proposed approach.","PeriodicalId":74091,"journal":{"name":"Machine learning and knowledge discovery in databases : European Conference, ECML PKDD ... : proceedings. ECML PKDD (Conference)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83470382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Stock Trading Volume Prediction with Dual-Process Meta-Learning 基于双过程元学习的股票交易量预测
Ruibo Chen, Wei Li, Zhiyuan Zhang, Ruihan Bao, Keiko Harimoto, Xu Sun
Volume prediction is one of the fundamental objectives in the Fintech area, which is helpful for many downstream tasks, e.g., algorithmic trading. Previous methods mostly learn a universal model for different stocks. However, this kind of practice omits the specific characteristics of individual stocks by applying the same set of parameters for different stocks. On the other hand, learning different models for each stock would face data sparsity or cold start problems for many stocks with small capitalization. To take advantage of the data scale and the various characteristics of individual stocks, we propose a dual-process meta-learning method that treats the prediction of each stock as one task under the meta-learning framework. Our method can model the common pattern behind different stocks with a meta-learner, while modeling the specific pattern for each stock across time spans with stock-dependent parameters. Furthermore, we propose to mine the pattern of each stock in the form of a latent variable which is then used for learning the parameters for the prediction module. This makes the prediction procedure aware of the data pattern. Extensive experiments on volume predictions show that our method can improve the performance of various baseline models. Further analyses testify the effectiveness of our proposed meta-learning framework.
交易量预测是金融科技领域的基本目标之一,它有助于许多下游任务,例如算法交易。以前的方法主要是学习不同股票的通用模型。然而,这种做法通过对不同的股票应用相同的一组参数而忽略了个股的具体特征。另一方面,为每只股票学习不同的模型会面临数据稀疏或许多小市值股票的冷启动问题。为了利用数据规模和个股的不同特征,我们提出了一种双过程元学习方法,将每只股票的预测作为元学习框架下的一个任务。我们的方法可以使用元学习器对不同股票背后的共同模式进行建模,同时使用股票相关参数对每个股票的特定模式进行跨时间跨度建模。此外,我们建议以潜在变量的形式挖掘每个股票的模式,然后用于学习预测模块的参数。这使得预测过程知道数据模式。大量的体积预测实验表明,我们的方法可以提高各种基线模型的性能。进一步的分析证明了我们提出的元学习框架的有效性。
{"title":"Stock Trading Volume Prediction with Dual-Process Meta-Learning","authors":"Ruibo Chen, Wei Li, Zhiyuan Zhang, Ruihan Bao, Keiko Harimoto, Xu Sun","doi":"10.48550/arXiv.2211.01762","DOIUrl":"https://doi.org/10.48550/arXiv.2211.01762","url":null,"abstract":"Volume prediction is one of the fundamental objectives in the Fintech area, which is helpful for many downstream tasks, e.g., algorithmic trading. Previous methods mostly learn a universal model for different stocks. However, this kind of practice omits the specific characteristics of individual stocks by applying the same set of parameters for different stocks. On the other hand, learning different models for each stock would face data sparsity or cold start problems for many stocks with small capitalization. To take advantage of the data scale and the various characteristics of individual stocks, we propose a dual-process meta-learning method that treats the prediction of each stock as one task under the meta-learning framework. Our method can model the common pattern behind different stocks with a meta-learner, while modeling the specific pattern for each stock across time spans with stock-dependent parameters. Furthermore, we propose to mine the pattern of each stock in the form of a latent variable which is then used for learning the parameters for the prediction module. This makes the prediction procedure aware of the data pattern. Extensive experiments on volume predictions show that our method can improve the performance of various baseline models. Further analyses testify the effectiveness of our proposed meta-learning framework.","PeriodicalId":74091,"journal":{"name":"Machine learning and knowledge discovery in databases : European Conference, ECML PKDD ... : proceedings. ECML PKDD (Conference)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82397435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Safe Exploration Method for Reinforcement Learning under Existence of Disturbance 干扰存在下强化学习的安全探索方法
Y. Okawa, Tomotake Sasaki, H. Yanami, T. Namerikawa
Recent rapid developments in reinforcement learning algorithms have been giving us novel possibilities in many fields. However, due to their exploring property, we have to take the risk into consideration when we apply those algorithms to safety-critical problems especially in real environments. In this study, we deal with a safe exploration problem in reinforcement learning under the existence of disturbance. We define the safety during learning as satisfaction of the constraint conditions explicitly defined in terms of the state and propose a safe exploration method that uses partial prior knowledge of a controlled object and disturbance. The proposed method assures the satisfaction of the explicit state constraints with a pre-specified probability even if the controlled object is exposed to a stochastic disturbance following a normal distribution. As theoretical results, we introduce sufficient conditions to construct conservative inputs not containing an exploring aspect used in the proposed method and prove that the safety in the above explained sense is guaranteed with the proposed method. Furthermore, we illustrate the validity and effectiveness of the proposed method through numerical simulations of an inverted pendulum and a four-bar parallel link robot manipulator.
近年来,强化学习算法的快速发展为我们在许多领域提供了新的可能性。然而,由于它们的探索性,当我们将这些算法应用于安全关键问题时,特别是在现实环境中,我们必须考虑到风险。在本研究中,我们处理了一个存在干扰的强化学习中的安全探索问题。我们将学习过程中的安全性定义为满足以状态明确定义的约束条件,并提出了一种利用被控对象和干扰的部分先验知识的安全探索方法。该方法即使被控对象受到服从正态分布的随机扰动,也能保证以预先指定的概率满足显式状态约束。作为理论结果,我们引入了构造保守输入的充分条件,该输入不包含所提方法中使用的探索方面,并证明了所提方法保证了上述解释意义上的安全性。通过倒立摆和四杆并联机器人的数值仿真,验证了所提方法的有效性。
{"title":"Safe Exploration Method for Reinforcement Learning under Existence of Disturbance","authors":"Y. Okawa, Tomotake Sasaki, H. Yanami, T. Namerikawa","doi":"10.48550/arXiv.2209.15452","DOIUrl":"https://doi.org/10.48550/arXiv.2209.15452","url":null,"abstract":"Recent rapid developments in reinforcement learning algorithms have been giving us novel possibilities in many fields. However, due to their exploring property, we have to take the risk into consideration when we apply those algorithms to safety-critical problems especially in real environments. In this study, we deal with a safe exploration problem in reinforcement learning under the existence of disturbance. We define the safety during learning as satisfaction of the constraint conditions explicitly defined in terms of the state and propose a safe exploration method that uses partial prior knowledge of a controlled object and disturbance. The proposed method assures the satisfaction of the explicit state constraints with a pre-specified probability even if the controlled object is exposed to a stochastic disturbance following a normal distribution. As theoretical results, we introduce sufficient conditions to construct conservative inputs not containing an exploring aspect used in the proposed method and prove that the safety in the above explained sense is guaranteed with the proposed method. Furthermore, we illustrate the validity and effectiveness of the proposed method through numerical simulations of an inverted pendulum and a four-bar parallel link robot manipulator.","PeriodicalId":74091,"journal":{"name":"Machine learning and knowledge discovery in databases : European Conference, ECML PKDD ... : proceedings. ECML PKDD (Conference)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74702055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Machine learning and knowledge discovery in databases : European Conference, ECML PKDD ... : proceedings. ECML PKDD (Conference)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1