{"title":"2020 IEEE Second International Conference on Cognitive Machine Intelligence CogMI 2020","authors":"","doi":"10.1109/cogmi50398.2020.00001","DOIUrl":"https://doi.org/10.1109/cogmi50398.2020.00001","url":null,"abstract":"","PeriodicalId":360326,"journal":{"name":"2020 IEEE Second International Conference on Cognitive Machine Intelligence (CogMI)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128781864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fine-grained, aspect-based semantic sentiment analysis within the economic and financial domains","authors":"S. Consoli, Luca Barbaglia, S. Manzan","doi":"10.1109/CogMI50398.2020.00017","DOIUrl":"https://doi.org/10.1109/CogMI50398.2020.00017","url":null,"abstract":"The application of sentiment analysis in financial and economic applications has attracted great attention in recent years. News and social media represent a valuable source of information, that is timely available and potentially able to improve the forecast of economic and financial time series. Despite many successful applications of sentiment analysis in these domains, the range of natural language processing techniques employed is still very limited. In this work, we detail the technical presentation of a fine-grained aspect-based semantic sentiment analysis algorithm and check its performance with respect to a humanly annotated data set. The proposed approach is completely unsupervised and relies on a large custom-specific domain lexicon and on a thorough semantic polarity scheme, allowing a better interpretation and explanation of the analysis. Our method shows promising re-suits, with the proposed algorithm assigning a similar sentiment score as human annotators in the large majority of cases.","PeriodicalId":360326,"journal":{"name":"2020 IEEE Second International Conference on Cognitive Machine Intelligence (CogMI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121843349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Riccardo Guidotti, A. Monreale, Francesco Spinnato, D. Pedreschi, F. Giannotti
{"title":"Explaining Any Time Series Classifier","authors":"Riccardo Guidotti, A. Monreale, Francesco Spinnato, D. Pedreschi, F. Giannotti","doi":"10.1109/CogMI50398.2020.00029","DOIUrl":"https://doi.org/10.1109/CogMI50398.2020.00029","url":null,"abstract":"We present a method to explain the decisions of black box models for time series classification. The explanation consists of factual and counterfactual shapelet-based rules revealing the reasons for the classification, and of a set of exemplars and counter-exemplars highlighting similarities and differences with the time series under analysis. The proposed method first generates exemplar and counter-exemplar time series in the latent feature space and learns a local latent decision tree classifier. Then, it selects and decodes those respecting the decision rules explaining the decision. Finally, it learns on them a shapelet-tree that reveals the parts of the time series that must, and must not, be contained for getting the returned outcome from the black box. A wide experimentation shows that the proposed method provides faithful, meaningful and interpretable explanations.","PeriodicalId":360326,"journal":{"name":"2020 IEEE Second International Conference on Cognitive Machine Intelligence (CogMI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131191793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lo Pang-Yun Ting, Shan-Yun Teng, Suhang Wang, Kun-Ta Chuang, Huan Liu
{"title":"Learning Latent Perception Graphs for Personalized Unknowns Recommendation","authors":"Lo Pang-Yun Ting, Shan-Yun Teng, Suhang Wang, Kun-Ta Chuang, Huan Liu","doi":"10.1109/CogMI50398.2020.00015","DOIUrl":"https://doi.org/10.1109/CogMI50398.2020.00015","url":null,"abstract":"The fast-growing online-learning platforms, which are very convenient and contain rich course resources, have attracted many users to explore new knowledge online. However, the learning quality of online-learning is generally not as effective as offline classes. In offline studies in classrooms, teachers can interact with students and teach students in accordance with personal aptitude from students' feedback in classes. Without such real-time interaction, it is difficult for users to be aware of personal unknowns. In this paper, we consider an important issue to discover “user unknowns” from the question-giving process in online-learning platforms. A novel personalized learning framework, called PagBay, is devised to recommend user unknowns in the iterative round-by-round strategy, which contributes to applications such as a conversational bot. The flow enables users to progressively discover their weakness and to help them progress. However, discovering personal unknowns is quite challenging in online-learning platforms. Even though solving the problem with previous recommender algorithms provides solutions, they often lead to suboptimal results for unknowns recommendation as they simply rely on the user ratings and contextual features of questions. Generally, questions are associated with perceptions, and mining the relationships among users, questions, and perceptions potentially provide the clue to the better unknowns recommendation. Therefore, in this paper, we develop a novel recommender framework by borrowing strengths from perception-aware graph embedding for learning user unknowns. Our experimental studies on real data show that the proposed framework can effectively discover user unknowns in online learning services.","PeriodicalId":360326,"journal":{"name":"2020 IEEE Second International Conference on Cognitive Machine Intelligence (CogMI)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117217778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Michael R. Clark, Peter Swartz, Andrew Alten, Raed M. Salih
{"title":"No Classifier Left Behind: An In-depth Study of the RBF SVM Classifier's Vulnerability to Image Extraction Attacks via Confidence Information Exploitation","authors":"Michael R. Clark, Peter Swartz, Andrew Alten, Raed M. Salih","doi":"10.1109/CogMI50398.2020.00037","DOIUrl":"https://doi.org/10.1109/CogMI50398.2020.00037","url":null,"abstract":"Training image extraction attacks attempt to reverse engineer training images from an already trained machine learning model. Such attacks are concerning because training data can often be sensitive in nature. Recent research has shown that extracting training images is generally much harder than model inversion, which attempts to duplicate the functionality of the model. In this paper, we correct common misperceptions about image extraction attacks and develop a deep understanding ofwhy some trained models are vulnerable to ourattack while others are not. In particular, we use the RBFSVMclassifier to show that we can extract individual training images from models trained on thousands of images., which refutes the notion that these attacks can only extract an “average” of each class. We also show that increasing diversity of the training data set leads to more successful attacks. To the best of our knowledge, our work is the first to show semantically meaningful images extracted from the RBF SVM classifier.","PeriodicalId":360326,"journal":{"name":"2020 IEEE Second International Conference on Cognitive Machine Intelligence (CogMI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131047155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Learning Systems in the IoT: Trustworthiness Trade-offs for Edge Intelligence","authors":"Wiebke Toussaint, A. Ding","doi":"10.1109/CogMI50398.2020.00030","DOIUrl":"https://doi.org/10.1109/CogMI50398.2020.00030","url":null,"abstract":"Machine learning systems (MLSys) are emerging in the Internet of Things (IoT) to provision edge intelligence, which is paving our way towards the vision of ubiquitous intelligence. However, despite the maturity of machine learning systems and the IoT, we are facing severe challenges when integrating MLSys and IoT in practical context. For instance, many machine learning systems have been developed for large-scale production (e.g., cloud environments), but IoT introduces additional demands due to heterogeneous and resource-constrained devices and decentralized operation environment. To shed light on this convergence of MLSys and IoT, this paper analyzes the tradeoffs by covering the latest developments (up to 2020) on scaling and distributing ML across cloud, edge, and IoT devices. We position machine learning systems as a component of the IoT, and edge intelligence as a socio-technical system. On the challenges of designing trustworthy edge intelligence, we advocate a holistic design approach that takes multi-stakeholder concerns, design requirements and trade-offs into consideration, and highlight the future research opportunities in edge intelligence.","PeriodicalId":360326,"journal":{"name":"2020 IEEE Second International Conference on Cognitive Machine Intelligence (CogMI)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130086550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Artificial Dendrites: an Algorithm","authors":"Zachary S. Hutchinson","doi":"10.1109/CogMI50398.2020.00033","DOIUrl":"https://doi.org/10.1109/CogMI50398.2020.00033","url":null,"abstract":"This paper outlines preliminary work on an algorithm to create dendritic, tree-like structures by arranging spines in R3 using directional forces. Each spine is attracted to its neighbor based on the temporal coincidence of afferent action potentials. The resulting spine location spatially encodes activation patterns. Proximity to the soma and to each other determines connectivity within an acyclic graph. Dendritic branches carry back-propagating action potentials used for credit assignment by Hebbian-style learning. Preliminary results suggest this method could be used to create spiking neural networks consisting of dendritic neurons capable of pattern recognition.","PeriodicalId":360326,"journal":{"name":"2020 IEEE Second International Conference on Cognitive Machine Intelligence (CogMI)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123919883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cortically-Coupled Generative Adversarial Network for Target Image Retrieval in Rapid Image Search","authors":"Ruchi Bagwe, K. George","doi":"10.1109/CogMI50398.2020.00036","DOIUrl":"https://doi.org/10.1109/CogMI50398.2020.00036","url":null,"abstract":"Rapid growth in the multimedia and healthcare domain resulted in a tremendous increase in visual data. It has become difficult to access this visual data due to its huge volume and unstructured nature. Over the past few decades, computer vision research is focused on finding a smart way to retrieve the visual data of interest in rapid serial visual presentation (RSVP) events and understanding the brain sensory stimuli response to such events. In this paper, the focus is on developing the system that can relate a brain state to target identification and analysis in an RSVP. In this research, the P300 event occurred due to the shift in attention is analyzed and captured using the electroencephalogram (EEG). A model called Cortically-Coupled Generative Adversarial Network is proposed using this analysis. This model identifies and retrieves the target image in RSVP events. The evaluation of the proposed model demonstrates the combination of EEG signals and cortically-coupled GAN could effectively use to develop a smart way to retrieve the visual data of interest.","PeriodicalId":360326,"journal":{"name":"2020 IEEE Second International Conference on Cognitive Machine Intelligence (CogMI)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134519098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Iyengar, Dhaval Patel, Shrey Shrivastava, N. Zhou, A. Bhamidipaty
{"title":"Real-Time Data Quality Analysis","authors":"A. Iyengar, Dhaval Patel, Shrey Shrivastava, N. Zhou, A. Bhamidipaty","doi":"10.1109/CogMI50398.2020.00022","DOIUrl":"https://doi.org/10.1109/CogMI50398.2020.00022","url":null,"abstract":"Data quality is critically important for big data and machine learning applications. Data quality systems can analyze data sets for quality and detection of potential errors. They can also provide remediation to fix problems encountered in analyzing data sets. This paper discusses key features that of data quality analysis systems. We also present new algorithms for efficiently maintaining updated data quality metrics on changing data sets. Our algorithms consider anomalies in data regions in determining how much different regions of data contribute to overall data metrics. We also make intelligent choices of which data metrics to update and how frequently to do so in order to limit the overhead for data quality metric updates.","PeriodicalId":360326,"journal":{"name":"2020 IEEE Second International Conference on Cognitive Machine Intelligence (CogMI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123708326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Challenges and Opportunities in Rapid Epidemic Information Propagation with Live Knowledge Aggregation from Social Media","authors":"C. Pu, Abhijit Suprem, Rodrigo Alves Lima","doi":"10.1109/CogMI50398.2020.00026","DOIUrl":"https://doi.org/10.1109/CogMI50398.2020.00026","url":null,"abstract":"A rapidly evolving situation such as the COVID-19 pandemic is a significant challenge for AI/ML models because of its unpredictability. The most reliable indicator of the pandemic spreading has been the number of test positive cases. However, the tests are both incomplete (due to untested asymptomatic cases) and late (due the lag from the initial contact event, worsening symptoms, and test results). Social media can complement physical test data due to faster and higher coverage, but they present a different challenge: significant amounts of noise, misinformation and disinformation. We believe that social media can become good indicators of pandemic, provided two conditions are met. The first (True Novelty) is the capture of new, previously unknown, information from unpredictably evolving situations. The second (Fact vs. Fiction) is the distinction of verifiable facts from misinformation and disinformation. Social media information that satisfy those two conditions are called live knowledge. We apply evidence-based knowledge acquisition (EBKA) approach to collect, filter, and update live knowledge through the integration of social media sources with authoritative sources. Although limited in quantity, the reliable training data from authoritative sources enable the filtering of misinformation as well as capturing truly new information. We describe the EDNA/LITMUS tools that implement EBKA, integrating social media such as Twitter and Facebook with authoritative sources such as WHO and CDC, creating and updating live knowledge on the COVID-19 pandemic.","PeriodicalId":360326,"journal":{"name":"2020 IEEE Second International Conference on Cognitive Machine Intelligence (CogMI)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132954647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}