Predicting and Characterising User Impact on Twitter

Total Page:16

File Type:pdf, Size:1020Kb

Predicting and Characterising User Impact on Twitter Predicting and Characterising User Impact on Twitter Vasileios Lampos1, Nikolaos Aletras2, Daniel Preot¸iuc-Pietro2 and Trevor Cohn3 1 Department of Computer Science, University College London 2 Department of Computer Science, University of Sheffield 3 Computing and Information Systems, The University of Melbourne [email protected], n.aletras,d.preotiuc @dcs.shef.ac.uk, [email protected] { } Abstract ment.1 Intuitively, it is expected that user impact cannot be defined by a single attribute, but depends The open structure of online social net- on multiple user actions, such as posting frequency works and their uncurated nature give rise and quality, interaction strategies, and the text or to problems of user credibility and influ- topics of the written communications. ence. In this paper, we address the task of In this paper, we start by predicting user impact predicting the impact of Twitter users based as a statistical learning task (regression). For that only on features under their direct control, purpose, we firstly define an impact score function such as usage statistics and the text posted for Twitter users driven by basic account proper- in their tweets. We approach the problem as ties. Afterwards, from a set of accounts, we mea- regression and apply linear as well as non- sure several publicly available attributes, such as linear learning methods to predict a user the quantity of posts or interaction figures. Textual impact score, estimated by combining the attributes are also modelled either by word frequen- numbers of the user’s followers, followees cies or, more generally, by clusters of related words and listings. The experimental results point which quantify a topic-oriented participation. The out that a strong prediction performance is main hypothesis being tested is whether textual achieved, especially for models based on and non textual attributes encapsulate patterns that the Gaussian Processes framework. Hence, affect the impact of an account. we can interpret various modelling com- To model this data, we present a method based ponents, transforming them into indirect on nonlinear regression using Gaussian Processes, ‘suggestions’ for impact boosting. a Bayesian non-parametric class of methods (Ras- mussen and Williams, 2006), proven more effec- 1 Introduction tive in capturing the multimodal user features. The modelling choice of excluding components that Online social networks have become a wide spread are not under an account’s direct control (e.g. re- medium for information dissemination and inter- ceived retweets) combined with a significant user action between millions of users (Huberman et al., impact prediction performance (r = .78) enabled 2009; Kwak et al., 2010), turning, at the same us to investigate further how specific aspects of a time, into a popular subject for interdisciplinary user’s behaviour relate to impact, by examining the research, involving domains such as Computer Sci- parameters of the inferred model. ence (Sakaki et al., 2010), Health (Lampos and Among our findings, we identify relevant fea- Cristianini, 2012) and Psychology (Boyd et al., tures for this task and confirm that consistent ac- 2010). Open access along with the property of struc- tivity and broad interaction are deciding impact tured content retrieval for publicly posted data have factors. Informativeness, estimated by computing brought the microblogging platform of Twitter into a joint user-topic entropy, contributes well to the the spotlight. separation between low and high impact accounts. Vast quantities of human-generated text from Use case scenarios based on combinations of fea- a range of themes, including opinions, news and tures are also explored, leading to findings such as everyday activities, spread over a social network. that engaging about ‘serious’ or more ‘light’ topics Naturally, issues arise, like user credibility (Castillo may not register a differentiation in impact. et al., 2011) and content attractiveness (Suh et al., 2010), and quite often trustful or appealing informa- 1For example, the influence assessment metric of Klout — tion transmitters are identified by an impact assess- http://www.klout.com. 405 Proceedings of the 14th Conference of the European Chapter of the Association for Computational Linguistics, pages 405–413, Gothenburg, Sweden, April 26-30 2014. c 2014 Association for Computational Linguistics 2 Data 0.15 @nikaletras For the experimental process of this paper, we @guardian formed a Twitter data set ( 1) of more than 48 mil- @David_Cameron D 0.1 lion tweets produced by U = 38, 020 users geolo- | | @PaulMasonNews cated in the UK in the period between 14/04/2011 @spam? @lampos and 12/04/2012 (both dates included, ∆t = 365 days). 1 is a temporal subset of the data set used 0.05 D Probability Density for modelling UK voting intentions in (Lampos et al., 2013). Geolocation of users was carried out by matching the location field in their profile with 0 −5 0 5 10 15 20 25 30 UK city names on DBpedia as well as by check- Impact Score (S) ing that the user’s timezone is set to G.M.T. (Rout Figure 1: Histogram of the user impact scores in et al., 2013). The use of a common greater geo- our data set. The solid black line represents a gen- graphical area (UK) was essential in order to derive eralised extreme value probability distribution fit- a data set with language and topic homogeneity. ted in our data, and the dashed line denotes the A distinct Twitter data set ( 2) consisting of ap- D mean impact score (= 6.776). User @spam? is a prox. 400 million tweets was formed for learning sample account with φin = 10, φout = 1000 and term clusters (Section 4.2). 2 was retrieved from D φλ = 0; @lampos is a very active account, whereas Twitter’s Gardenhose stream (a 10% sample of the @nikaletras is a regular user. entire stream) from 02/01 to 28/02/2011. 1 and D 2 were processed using TrendMiner’s pipeline D interest. Indeed, Pearson’s correlation between φin (Preot¸iuc-Pietro et al., 2012). and φλ for all the accounts in our data set is equal to .765 (p < .001); the two metrics are correlated, 3 User Impact Definition but not entirely and on those grounds, it would be On the microblogging platform of Twitter, user – reasonable to use both for quantifying impact. or, in general, account – popularity is usually quan- Consequently, we have chosen to represent user tified by the raw number of followers (φ 0), impact (S) as a log function of the number of fol- in ≥ i.e. other users interested in this account. Likewise, lowers, followees and listings, given by a user can follow others, which we denote as his set of followees (φ 0). It is expected that users (φ + θ)(φ + θ)2 out ≥ (φ , φ , φ ) = ln λ in , with high numbers of followers are also popular S in out λ φout + θ ! in the real world, being well-known artists, politi- (1) cians, brands and so on. However, non popular where θ is a smoothing constant set equal to 1 so entities, the majority in the social network, can also that the natural logarithm is always applied on a gain a great number of followers, by exploiting, real positive number. Figure 1 shows the impact 2 for example, a follow-back strategy. Therefore, score distribution for all the users in our sample, using solely the number of followers to quantify including some pointers to less or more popular impact may lead to inaccurate outcomes (Cha et al., Twitter accounts. The depicted user impact scores 2010). A natural alternative, the ratio of φin/φout form the response variable in the regression models is not a reliable metric, as it is invariant to scal- presented in the following sections. ing, i.e. it cannot differentiate accounts of the type φ , φ = m, n and γ m, γ n . We { in out} { } { × × } resolve this problem by squaring the number of 4 User Account Features 2 followers φin/φout ; note that the previous expres- This section presents the features used in the user sion is equal to (φ φ ) (φ /φ ) + φ and in− out × in out in impact prediction task. They are divided into two thus, it incorporates the ratio as well as the differ- categories: non-textual and text-based. All features ence between followers and followees. have the joint characteristic of being under the An additional impact indicator is the number of user’s direct control, something essential for char- times an account has been listed by others (φ 0). λ ≥ acterising impact based on the actions of a user. Lists provide a way to curate content on Twitter; Attributes such as the number of received retweets thus, users included in many lists are attractors of or @-mentions (of a user in the tweets of others) 2An account follows other accounts randomly expecting were not considered as they are not controlled by that they will follow back. the account itself. 406 a1 # of tweets graph partitioning on the word-by-word similar- a2 proportion of retweets ity matrix. In our case, tweet-term similarity is reflected by the Normalised Pointwise Mutual In- a3 proportion of non-duplicate tweets formation (NPMI), an information theoretic mea- a proportion of tweets with hashtags 4 sure indicating which words co-occur in the same a5 hashtag-tokens ratio in tweets context (Bouma, 2009). We use the random walk a6 proportion of tweets with @-mentions graph Laplacian and only keep the largest compo- a7 # of unique @-mentions in tweets nent of the resulting graph, eliminating most stop a8 proportion of tweets with @-replies words in the process. The number of clusters needs to be specified in advance and each cluster’s most a9 links ratio in tweets representative words are identified by the following a # of favourites the account made 10 metric of centrality: a11 total # of tweets (entire history) v c NPMI(w, v) a12 using default profile background (binary) C (c) = ∈ , (2) w c 1 a13 using default profile image (binary) P | | − a14 enabled geolocation (binary) where w is the target word and c the cluster it be- a population of account’s location longs ( c denotes the cluster’s size).
Recommended publications
  • Risk Bounds for Classification and Regression Rules That Interpolate
    Overfitting or perfect fitting? Risk bounds for classification and regression rules that interpolate Mikhail Belkin Daniel Hsu Partha P. Mitra The Ohio State University Columbia University Cold Spring Harbor Laboratory Abstract Many modern machine learning models are trained to achieve zero or near-zero training error in order to obtain near-optimal (but non-zero) test error. This phe- nomenon of strong generalization performance for “overfitted” / interpolated clas- sifiers appears to be ubiquitous in high-dimensional data, having been observed in deep networks, kernel machines, boosting and random forests. Their performance is consistently robust even when the data contain large amounts of label noise. Very little theory is available to explain these observations. The vast majority of theoretical analyses of generalization allows for interpolation only when there is little or no label noise. This paper takes a step toward a theoretical foundation for interpolated classifiers by analyzing local interpolating schemes, including geometric simplicial interpolation algorithm and singularly weighted k-nearest neighbor schemes. Consistency or near-consistency is proved for these schemes in classification and regression problems. Moreover, the nearest neighbor schemes exhibit optimal rates under some standard statistical assumptions. Finally, this paper suggests a way to explain the phenomenon of adversarial ex- amples, which are seemingly ubiquitous in modern machine learning, and also discusses some connections to kernel machines and random forests in the interpo- lated regime. 1 Introduction The central problem of supervised inference is to predict labels of unseen data points from a set of labeled training data. The literature on this subject is vast, ranging from classical parametric and non-parametric statistics [48, 49] to more recent machine learning methods, such as kernel machines [39], boosting [36], random forests [15], and deep neural networks [25].
    [Show full text]
  • Probabilistic Circuits: Representations, Inference, Learning and Theory
    Inference Probabilistic Representations Learning Circuits Theory Antonio Vergari YooJung Choi University of California, Los Angeles University of California, Los Angeles Robert Peharz Guy Van den Broeck TU Eindhoven University of California, Los Angeles January 7th, 2021 - IJCAI-PRICAI 2020 Fully factorized NaiveBayes AndOrGraphs PDGs Trees PSDDs CNets LTMs SPNs NADEs Thin Junction Trees ACs MADEs MAFs VAEs DPPs FVSBNs TACs IAFs NAFs RAEs Mixtures BNs NICE FGs GANs RealNVP MNs The Alphabet Soup of probabilistic models 2/153 Fully factorized NaiveBayes AndOrGraphs PDGs Trees PSDDs CNets LTMs SPNs NADEs Thin Junction Trees ACs MADEs MAFs VAEs DPPs FVSBNs TACs IAFs NAFs RAEs Mixtures BNs NICE FGs GANs RealNVP MNs Intractable and tractable models 3/153 Fully factorized NaiveBayes AndOrGraphs PDGs Trees PSDDs CNets LTMs SPNs NADEs Thin Junction Trees ACs MADEs MAFs VAEs DPPs FVSBNs TACs IAFs NAFs RAEs Mixtures BNs NICE FGs GANs RealNVP MNs tractability is a spectrum 4/153 Fully factorized NaiveBayes AndOrGraphs PDGs Trees PSDDs CNets LTMs SPNs NADEs Thin Junction Trees ACs MADEs MAFs VAEs DPPs FVSBNs TACs IAFs NAFs RAEs Mixtures BNs NICE FGs GANs RealNVP MNs Expressive models without compromises 5/153 Fully factorized NaiveBayes AndOrGraphs PDGs Trees PSDDs CNets LTMs SPNs NADEs Thin Junction Trees ACs MADEs MAFs VAEs DPPs FVSBNs TACs IAFs NAFs RAEs Mixtures BNs NICE FGs GANs RealNVP MNs a unifying framework for tractable models 6/153 Why tractable inference? or expressiveness vs tractability 7/153 Why tractable inference? or expressiveness
    [Show full text]
  • Risk Bounds for Classification and Regression Rules That Interpolate
    Overfitting or perfect fitting? Risk bounds for classification and regression rules that interpolate Mikhail Belkin1, Daniel Hsu2, and Partha P. Mitra3 1The Ohio State University, Columbus, OH 2Columbia University, New York, NY 3Cold Spring Harbor Laboratory, Cold Spring Harbor, NY October 29, 2018 Abstract Many modern machine learning models are trained to achieve zero or near-zero training error in order to obtain near-optimal (but non-zero) test error. This phenomenon of strong generalization performance for “overfitted” / interpolated classifiers appears to be ubiquitous in high-dimensional data, having been observed in deep networks, kernel machines, boosting and random forests. Their performance is consistently robust even when the data contain large amounts of label noise. Very little theory is available to explain these observations. The vast majority of theoretical analyses of generalization allows for interpolation only when there is little or no label noise. This paper takes a step toward a theoretical foundation for interpolated classifiers by analyzing local interpolating schemes, including geometric simplicial interpolation algorithm and singularly weighted k-nearest neighbor schemes. Consistency or near-consistency is proved for these schemes in classification and regression problems. Moreover, the nearest neighbor schemes exhibit optimal rates under some standard statistical assumptions. Finally, this paper suggests a way to explain the phenomenon of adversarial examples, which are seemingly ubiquitous in modern machine learning, and also discusses some connections to kernel machines and random forests in the interpolated regime. 1 Introduction arXiv:1806.05161v3 [stat.ML] 26 Oct 2018 The central problem of supervised inference is to predict labels of unseen data points from a set of labeled training data.
    [Show full text]
  • Part I Officers in Institutions Placed Under the Supervision of the General Board
    2 OFFICERS NUMBER–MICHAELMAS TERM 2009 [SPECIAL NO.7 PART I Chancellor: H.R.H. The Prince PHILIP, Duke of Edinburgh, T Vice-Chancellor: 2003, Prof. ALISON FETTES RICHARD, N, 2010 Deputy Vice-Chancellors for 2009–2010: Dame SANDRA DAWSON, SID,ATHENE DONALD, R,GORDON JOHNSON, W,STUART LAING, CC,DAVID DUNCAN ROBINSON, M,JEREMY KEITH MORRIS SANDERS, SE, SARAH LAETITIA SQUIRE, HH, the Pro-Vice-Chancellors Pro-Vice-Chancellors: 2004, ANDREW DAVID CLIFF, CHR, 31 Dec. 2009 2004, IAN MALCOLM LESLIE, CHR, 31 Dec. 2009 2008, JOHN MARTIN RALLISON, T, 30 Sept. 2011 2004, KATHARINE BRIDGET PRETTY, HO, 31 Dec. 2009 2009, STEPHEN JOHN YOUNG, EM, 31 July 2012 High Steward: 2001, Dame BRIDGET OGILVIE, G Deputy High Steward: 2009, ANNE MARY LONSDALE, NH Commissary: 2002, The Rt Hon. Lord MACKAY OF CLASHFERN, T Proctors for 2009–2010: JEREMY LLOYD CADDICK, EM LINDSAY ANNE YATES, JN Deputy Proctors for MARGARET ANN GUITE, G 2009–2010: PAUL DUNCAN BEATTIE, CC Orator: 2008, RUPERT THOMPSON, SE Registrary: 2007, JONATHAN WILLIAM NICHOLLS, EM Librarian: 2009, ANNE JARVIS, W Acting Deputy Librarian: 2009, SUSANNE MEHRER Director of the Fitzwilliam Museum and Marlay Curator: 2008, TIMOTHY FAULKNER POTTS, CL Director of Development and Alumni Relations: 2002, PETER LAWSON AGAR, SE Esquire Bedells: 2003, NICOLA HARDY, JE 2009, ROGER DERRICK GREEVES, CL University Advocate: 2004, PHILIPPA JANE ROGERSON, CAI, 2010 Deputy University Advocates: 2007, ROSAMUND ELLEN THORNTON, EM, 2010 2006, CHRISTOPHER FORBES FORSYTH, R, 2010 OFFICERS IN INSTITUTIONS PLACED UNDER THE SUPERVISION OF THE GENERAL BOARD PROFESSORS Accounting 2003 GEOFFREY MEEKS, DAR Active Tectonics 2002 JAMES ANTHONY JACKSON, Q Aeronautical Engineering, Francis Mond 1996 WILLIAM NICHOLAS DAWES, CHU Aerothermal Technology 2000 HOWARD PETER HODSON, G Algebra 2003 JAN SAXL, CAI Algebraic Geometry (2000) 2000 NICHOLAS IAN SHEPHERD-BARRON, T Algebraic Geometry (2001) 2001 PELHAM MARK HEDLEY WILSON, T American History, Paul Mellon 1992 ANTHONY JOHN BADGER, CL American History and Institutions, Pitt 2009 NANCY A.
    [Show full text]
  • Machine Learning Conference Report
    Part of the conference series Breakthrough science and technologies Transforming our future Machine learning Conference report Machine learning report – Conference report 1 Introduction On 22 May 2015, the Royal Society hosted a unique, high level conference on the subject of machine learning. The conference brought together scientists, technologists and experts from across academia, industry and government to learn about the state-of-the-art in machine learning from world and UK experts. The presentations covered four main areas of machine learning: cutting-edge developments in software, the underpinning hardware, current applications and future social and economic impacts. This conference is the first in a new series organised This report is not a verbatim record, but summarises by the Royal Society, entitled Breakthrough Science the discussions that took place during the day and the and Technologies: Transforming our Future, which will key points raised. Comments and recommendations address the major scientific and technical challenges reflect the views and opinions of the speakers and of the next decade. Each conference will focus on one not necessarily that of the Royal Society. Full versions technology and cover key issues including the current of the presentations can be found on our website at: state of the UK industry sector, future direction of royalsociety.org/events/2015/05/breakthrough-science- research and the wider social and economic implications. technologies-machine-learning The conference series is being organised through the Royal Society’s Science and Industry programme, which demonstrates our commitment to reintegrate science and industry at the Society and to promote science and its value, build relationships and foster translation.
    [Show full text]
  • AAAI News AAAI News
    AAAI News AAAI News Winter News from the Association for the Advancement of Artificial Intelligence AAAI-18 Registration Student Activities looking for internships or jobs to meet with representatives from over 30 com - As part of its outreach to students, Is Open! panies and academia in an informal AAAI-18 will continue several special "meet-and-greet" atmosphere. If you AAAI-18 registration information is programs specifically for students, are representing a company, research now available at aaai.org/aaai18, and including the Doctoral Consortium, organization or university and would online registration can be completed at the Student Abstract Program, Lunch like to participate in the job fair, please regonline.com/aaai18. The deadline with a Fellow, and the Volunteer Pro - send an email with your contact infor - for late registration rates is January 5, gram, in addition to the following: 2018. Complete tutorial and workshop mation to [email protected] no later than January 5. The organizers of information, as well as other special Student Reception the AAAI/ACM SIGAI Job Fair are John program information is available at AAAI will welcome all students to Dickerson (University of Maryland, these sites. AAAI-18 by hosting an evening stu - USA) and Nicholas Mattei (IBM, USA). dent reception on Friday, February 2. Make Your Hotel Reservation Although the reception is especially The Winograd Now! beneficial to new students at the con - Schema Challenge AAAI has reserved a block of rooms at ference, all are welcome! Please join us and make all the newcomers welcome! Nuance Communications, Inc. is spon - the Hilton New Orleans Riverside at soring a competition to encourage reduced conference rates.
    [Show full text]
  • Probabilistic Machine Learning: Foundations and Frontiers
    Probabilistic Machine Learning: Foundations and Frontiers Zoubin Ghahramani1,2,3,4 1 University of Cambridge 2 Alan Turing Institute 3 Leverhulme Centre for the Future of Intelligence 4 Uber AI Labs [email protected] http://mlg.eng.cam.ac.uk/zoubin/ Sackler Forum, National Academy of Sciences Washington DC, 2017 Machine Learning Zoubin Ghahramani 2 / 53 Many Related Terms Statistical Modelling Artificial Intelligence Neural Networks Machine Learning Data Mining Data Analytics Deep Learning Pattern Recognition Data Science Zoubin Ghahramani 3 / 53 Many Related Fields Engineering Computer Science Statistics Machine Learning Computational Applied Mathematics Neuroscience Economics Cognitive Science Physics Zoubin Ghahramani 4 / 53 Many Many Applications Bioinformatics Computer Vision Robotics Scientific Data Analysis Natural Language Processing Machine Learning Information Retrieval Speech Recognition Recommender Systems Signal Processing Machine Translation Medical Informatics Targeted Advertising Finance Data Compression Zoubin Ghahramani 5 / 53 Machine Learning • Machine learning is an interdisciplinary field that develops both the mathematical foundations and practical applications of systems that learn from data. Main conferences and journals: NIPS, ICML, AISTATS, UAI, KDD, JMLR, IEEE TPAMI Zoubin Ghahramani 6 / 53 Canonical problems in machine learning Zoubin Ghahramani 7 / 53 Classification x x x o x xxx o x o o o x x o o x o • Task: predict discrete class label from input data • Applications: face recognition, image recognition,
    [Show full text]
  • Bayesian Activity Recognition Using Variational Inference
    BAR: Bayesian Activity Recognition using variational inference Ranganath Krishnan Mahesh Subedar Omesh Tickoo [email protected] [email protected] [email protected] Intel Labs Hillsboro, OR (USA) Abstract Uncertainty estimation in deep neural networks is essential for designing reliable and robust AI systems. Applications such as video surveillance for identifying suspicious activities are designed with deep neural networks (DNNs), but DNNs do not provide uncertainty estimates. Capturing reliable uncertainty estimates in safety and security critical applications will help to establish trust in the AI system. Our contribution is to apply Bayesian deep learning framework to visual activity recognition application and quantify model uncertainty along with principled confidence. We utilize the stochastic variational inference technique while training the Bayesian DNNs to infer the approximate posterior distribution around model parameters and perform Monte Carlo sampling on the posterior of model parameters to obtain the predictive distribution. We show that the Bayesian inference applied to DNNs provide reliable confidence measures for visual activity recognition task as compared to conventional DNNs. We also show that our method improves the visual activity recognition precision-recall AUC by 6.2% compared to non-Bayesian baseline. We evaluate our models on Moments-In-Time (MiT) activity recognition dataset by selecting a subset of in- and out-of-distribution video samples. 1 Introduction Activity recognition is an active area of research with multiple approaches depending on the applica- tion domain and the types of sensors [1, 2, 3]. In recent years, the DNN models applied to the visual activity recognition task outperform the earlier methods based on Gaussian Mixture Models and Hid- den Markov Models [4, 5] using handcrafted features.
    [Show full text]
  • Automatic Opioid User Detection from Twitter
    Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence (IJCAI-18) Automatic Opioid User Detection From Twitter: Transductive Ensemble Built On Different Meta-graph Based Similarities Over Heterogeneous Information Network Yujie Fan, Yiming Zhang, Yanfang Ye ∗, Xin Li Department of Computer Science and Electrical Engineering, West Virginia University, WV, USA fyf0004,[email protected], fyanfang.ye,[email protected] Abstract 13,000 people died from heroin overdose, both reflecting sig- nificant increase from 2002 [NIDA, 2017]. Opioid addiction Opioid (e.g., heroin and morphine) addiction has is a chronic mental illness that requires long-term treatment become one of the largest and deadliest epidemics and care [McLellan et al., 2000]. Although Medication As- in the United States. To combat such deadly epi- sisted Treatment (MAT) using methadone or buprenorphine demic, in this paper, we propose a novel frame- has been proven to provide best outcomes for opioid addiction work named HinOPU to automatically detect opi- recovery, stigma (i.e., bias) associated with MAT has limited oid users from Twitter, which will assist in sharp- its utilization [Saloner and Karthikeyan, 2015]. Therefore, ening our understanding toward the behavioral pro- there is an urgent need for novel tools and methodologies to cess of opioid addiction and treatment. In HinOPU, gain new insights into the behavioral processes of opioid ad- to model the users and the posted tweets as well diction and treatment. as their rich relationships, we introduce structured In recent years, the role of social media in biomedical heterogeneous information network (HIN) for rep- knowledge mining has become more and more important resentation.
    [Show full text]
  • Deep Learning
    ADVANCEMENTS AND TRENDS IN MEDICAL IMAGE ANALYSIS USING DEEP LEARNING A presentation by Shekoofeh Azizi University of British Columbia, Canada, Ph.D. 2014-2018 Electrical and Computer Engineering Isfahan University of Technology, Iran, M.Sc. 2011-2013 Computer Engineering / Hardware Design Isfahan University of Technology, Iran, B.Sc. 2007-2011 Computer Engineering / Hardware Engineering Philips Research North America, 2015-now National Institutes of Health (NIH), 2015-now MICCAI Student Board Officer, 2016-now Women in MICCAI, 2017-now 2 UBC Queen’s University SFU Univ. of Western Ontario VGH Robarts Research Technical Univ. of Munich ETH Zurich NVidia Sejong Univ., Korea Philips IBM Univ. of Colorado NIH Size is related to the number of collaborators Academic Collaborators Industrial/Clinical Collaborators 3 OUTLINE Deep Learning Medical Imaging Challenges and Vision Opportunities 4 DEEP LEARNING 5 ARTIFICIAL INTELLIGENCE VS. DATA SCIENCE AI is a technique which enables machines to mimic the “human behaviour” It’s 17°C Hey Google, and sunny in Weather in Victoria Victoria! Voice Services Voice to Command Brain/Model Voice Output User Google Home Google Home 6 ARTIFICIAL INTELLIGENCE VS. DATA SCIENCE Data Science is about processes and systems to extract knowledge or insights from data in Artificial Intelligence various forms. (AI) Machine Learning is the connection Machine Learning between data science and artificial (ML) intelligence since machine learning is the process of learning from data over time. Data Science Deep Learning (DL) 7 MACHINE LEARNING (ML) Machine learning is the process of learning from data over time. Reinforcement Learning Andrew Ng, Machine Learning Course, Coursera. 9 DEEP LEARNING (DL) Inspired by the functionality of our brains Number of sides: 4? Closed form shape? Perpendicular sides? Square ? Equal sides? 10 DEEP LEARNING (DL) Cat Feature Learning Dog 11 DEEP LEARNING (DL) 12 WHY DEEP LEARNING? Consistent improvement over the state-of-the-art across a large variety of domains.
    [Show full text]
  • Uncertainty in Deep Learning
    References Martín Abadi, Ashish Agarwal, Paul Barham, Eugene Brevdo, Zhifeng Chen, Craig Citro, Greg S. Corrado, Andy Davis, Jefrey Dean, Matthieu Devin, Sanjay Ghemawat, Ian Goodfellow, Andrew Harp, Geofrey Irving, Michael Isard, Yangqing Jia, Rafal Jozefowicz, Lukasz Kaiser, Manjunath Kudlur, Josh Levenberg, Dan Mané, Rajat Monga, Sherry Moore, Derek Murray, Chris Olah, Mike Schuster, Jonathon Shlens, Benoit Steiner, Ilya Sutskever, Kunal Talwar, Paul Tucker, Vincent Vanhoucke, Vijay Vasudevan, Fernanda Viégas, Oriol Vinyals, Pete Warden, Martin Wattenberg, Martin Wicke, Yuan Yu, and Xiaoqiang Zheng. TensorFlow: Large-scale machine learning on heterogeneous systems, 2015. URL http://tensorĆow.org/. Software available from tensorĆow.org. Dario Amodei, Chris Olah, Jacob Steinhardt, Paul Christiano, John Schulman, and Dan Mane. Concrete problems in ai safety. arXiv preprint arXiv:1606.06565, 2016. C Angermueller and O Stegle. Multi-task deep neural network to predict CpG methylation proĄles from low-coverage sequencing data. In NIPS MLCB workshop, 2015. O Anjos, C Iglesias, F Peres, J Martínez, Á García, and J Taboada. Neural networks applied to discriminate botanical origin of honeys. Food chemistry, 175:128Ű136, 2015. Christopher Atkeson and Juan Santamaria. A comparison of direct and model-based reinforcement learning. In In International Conference on Robotics and Automation. Citeseer, 1997. Jimmy Ba and Brendan Frey. Adaptive dropout for training deep neural networks. In Advances in Neural Information Processing Systems, pages 3084Ű3092, 2013. P Baldi, P Sadowski, and D Whiteson. Searching for exotic particles in high-energy physics with deep learning. Nature communications, 5, 2014. Pierre Baldi and Peter J Sadowski. Understanding dropout. In Advances in Neural Information Processing Systems, pages 2814Ű2822, 2013.
    [Show full text]
  • Arxiv:2012.12294V2 [Stat.ML] 16 Apr 2021 1 Introduction
    Evolutionary Variational Optimization of Generative Models Jakob Drefs1, Enrico Guiraud1;2, Jörg Lücke1 [email protected], [email protected], [email protected] 1 Machine Learning Lab, University of Oldenburg, Germany 2 CERN, Switzerland Abstract We combine two popular optimization approaches to derive learning algorithms for generative models: variational optimization and evolutionary algorithms. The combination is realized for generative models with discrete latents by using truncated posteriors as the family of variational distributions. The variational parameters of truncated posteriors are sets of latent states. By interpreting these states as genomes of individuals and by using the variational lower bound to define a fitness, we can apply evolutionary algorithms to realize the variational loop. The used variational distributions are very flexible and we show that evolutionary algorithms can effectively and efficiently optimize the variational bound. Furthermore, the variational loop is generally applicable (“black box”) with no analytical derivations required. To show general applicability, we apply the approach to three generative models (we use noisy-OR Bayes Nets, Binary Sparse Coding, and Spike-and-Slab Sparse Coding). To demonstrate effectiveness and efficiency of the novel variational approach, we use the standard competitive benchmarks of image denoising and inpainting. The benchmarks allow quantitative comparisons to a wide range of methods including probabilistic approaches, deep deterministic and generative networks, and non-local image processing methods. In the category of “zero-shot” learning (when only the corrupted image is used for training), we observed the evolutionary variational algorithm to significantly improve the state-of-the-art in many benchmark settings. For one well-known inpainting benchmark, we also observed state-of-the-art performance across all categories of algorithms although we only train on the corrupted image.
    [Show full text]