Implementation Notes for the Soft Cosine Measure

Total Page:16

File Type:pdf, Size:1020Kb

Implementation Notes for the Soft Cosine Measure Implementation Notes for the Soft Cosine Measure Vít Novotný Masaryk University Faculty of Informatics Brno, Czech Republic [email protected] ABSTRACT coordinates in α: T The standard bag-of-words vector space model (vsm) is efficient, ¹v1ºα = »1 1 1 1 1 1 0 0 0 0 0 0 0 0¼ ; and and ubiquitous in information retrieval, but it underestimates the ¹ º » ¼T similarity of documents with the same meaning, but different termi- v2 α = 0 0 0 1 1 0 2 1 1 1 1 1 1 1 : nology. To overcome this limitation, Sidorov et al. [14] proposed the Assuming α is orthonormal, we can take the inner product of the 2 Soft Cosine Measure (scm) that incorporates term similarity rela- ` -normalized vectors v1, and v2 to measure the cosine of the angle tions. Charlet and Damnati [2] showed that the scm is highly effec- (i.e. the cosine similarity) between the documents d1, and d2: tive in question answering (qa) systems. However, the orthonormal- ¹v º T¹v º ization algorithm proposed by Sidorov et al. [14] has an impractical h /k k /k ki 1 α 2 α ≈ v1 v1 ; v2 v2 = q q 0:23: time complexity of O¹n4º, where n is the size of the vocabulary. T T ¹v1ºα ¹v1ºα ¹v2ºα ¹v2ºα In this paper, we prove a tighter lower worst-case time complex- ity bound of O¹n3º. We also present an algorithm for computing Intuitively, this underestimates the true similarity between d1, the similarity between documents and we show that its worst-case and d2. Assuming α is orthogonal but not orthonormal, and that the time complexity is O¹1º given realistic conditions. Lastly, we de- terms Julius, and Caesar are twice as important as the other terms, scribe implementation in general-purpose vector databases such as we can construct a diagonal change-of-basis matrix W = ¹wij º Annoy, and Faiss and in the inverted indices of text search engines from α to an orthonormal basis β, where wii corresponds to the such as Apache Lucene, and ElasticSearch. Our results enable the importance of a term i. This brings us closer to the true similarity: deployment of the scm in real-world information retrieval systems. T ¹v1ºβ = W¹v1ºα = »1 1 1 2 2 1 0 0 0 0 0 0 0 0¼ ; T KEYWORDS ¹v2ºβ = W¹v2ºα = »0 0 0 2 2 0 2 1 1 1 1 1 1 1¼ ; and Vector Space Model, computational complexity, similarity measure hv1/kv1 k; v2/kv2 ki ACM Reference Format: T W¹v1ºα W¹v2ºα Vít Novotný. 2018. Implementation Notes for the Soft Cosine Measure. = ≈ 0:53: In q q The 27th ACM International Conference on Information and Knowledge W¹v º TW¹v º W¹v º TW¹v º Management (CIKM ’18), October 22–26, 2018, Torino, Italy. ACM, New York, 1 α 1 α 2 α 2 α NY, USA, 4 pages. https://doi.org/10.1145/3269206.3269317 Since we assume that the bases α and β are orthogonal, the terms dead and killed contribute nothing to the cosine similarity despite h i 1 INTRODUCTION the clear synonymy, because βdead; βkilled = 0. In general, the vsm will underestimate the true similarity between documents that The standard bag-of-words vector space model (vsm) [13] represents carry the same meaning but use different terminology. documents as real vectors. Documents are expressed in a basis In this paper, we further develop the soft vsm described by where each basis vector corresponds to a single term, and each Sidorov et al. [14], which does not assume α is orthogonal and coordinate corresponds to the frequency of a term in a document. which achieved state-of-the-art results on the question answer- arXiv:1808.09407v1 [cs.IR] 28 Aug 2018 Consider the documents ing (qa) task at SemEval 2017 [2]. In Section 2, we review the previous work incorporating term similarity into the vsm. In Sec- d1 = “When Antony found Julius Caesar dead”, and tion 3, we restate the definition of the soft vsm and present several d = “I did enact Julius Caesar: I was killed i’ the Capitol” 2 computational complexity results. In Section 4, we describe the im- f g14 14 plementation in vector databases and inverted indices. We conclude represented in a basis α i i=1 of R , where the basis vectors cor- respond to the terms in the order of first appearance. Then the cor- in Section 5 by summarizing our results and suggesting future work. responding document vectors v , and v would have the following 1 2 2 RELATED WORK Most works incorporating term similarity into the vsm published CIKM ’18, October 22–26, 2018, Torino, Italy © 2018 Association for Computing Machinery. prior to Sidorov et al. [14] remain in an orthogonal coordinate This is the author’s version of the work. It is posted here for your personal use. system and instead propose novel document similarity measures. To Not for redistribution. The definitive Version of Record was published in The 27th name a few, Mikawa et al. [8] proposes the extended cosine measure, ACM International Conference on Information and Knowledge Management (CIKM ’18), October 22–26, 2018, Torino, Italy, https://doi.org/10.1145/3269206.3269317. which introduces a metric matrix Q as a multiplicative factor in the cosine similarity formula. Q is the solution of an optimization problem to maximize the sum of extended cosine measures between Table 1: The real time to compute a matrix E from a dense matrix S each vector and the centroid of the vector’s category. Conveniently, averaged over 100 iterations. We used two Intel Xeon E5-2650 v2 3 the metric matrix Q can be used directly with the soft vsm, where (20M cache, 2.60 GHz) processors to evaluate the O¹n º Cholesky 4 it defines the inner product between basis vectors. Jimenez etal. factorization from NumPy 1.14.3, and the O¹n º iterated Gaussian [6] equip the multiset vsm with a soft cardinality operator that elimination from lapack. For n > 1000, only sparse S seem practical. corresponds to cardinality, but takes term similarities into account. The notion of generalizing the vsm to non-orthogonal coordinate n terms Algorithm Real computation time systems was perhaps first explored by Sidorov et al. [14] in thecon- 100 Cholesky factorization 0.0006 sec (0.606 ms) text of entrance exam question answering, where the basis vectors 100 Gaussian elimination 0.0529 sec (52.893 ms) did not correspond directly to terms, but to n-grams constructed 500 Cholesky factorization 0.0086 sec (8.640 ms) by following paths in syntactic trees. The authors derive the inner 500 Gaussian elimination 22.7361 sec (22.736 sec) product of two basis vectors from the edit distance between the cor- 1000 Cholesky factorization 0.0304 sec (30.378 ms) responding n-grams. Soft cosine measure (scm) is how they term the 1000 Gaussian elimination 354.2746 sec (5.905 min) formula for computing the cosine similarity between two vectors expressed in a non-orthogonal basis. They also present an algo- rithm that computes a change-of-basis matrix to an orthonormal the Cholesky factor E can also be arbitrarily dense and therefore basis in time O¹n4º. We present an O¹n3º algorithm in this paper. expensive to store. Given a permutation matrix P, we can instead T T Charlet and Damnati [2] achieved state-of-the-art results at the factorize P SP into FF . Finding the permutation matrix P that min- qa task at SemEval 2017 [10] by training a document classifier on imizes the density of the Cholesky factor F is NP-hard [16], but T −1 soft cosine measures between document passages. Unlike Sidorov heuristic stategies are known [3, 4]. Using the fact that P = P , et al. [14], Charlet and Damnati [2] already use basis vectors that and basic facts about transpose, we can derive E = PF as follows: T T T T T T correspond to terms rather than to n-grams. They derive the inner S = PP SPP = PFF P = PF¹PFº = EE : product of two basis vectors both from the edit distance between Lemma 3.3. G = ¹Rn; W ; S º x; y 2 Rn the corresponding terms, and from the inner product of the corre- Let α β be a soft vsm. Let . T sponding word2vec term embeddings [9]. Then hx; yi = ¹W¹xºα º SW¹yºα . Proof. Let E be the change-of-basis matrix from the basis β to 3 COMPUTATIONAL COMPLEXITY an orthonormal basis γ of Rn. Then: In this section, we restate the definition of the soft vsm as it was T T T described by Sidorov et al. [14]. We then prove a tighter lower hx; yi = ¹xºγ ¹yºγ = E¹xºβ E¹yºβ = EW¹xºα EW¹yºα n n worst-case time complexity bound for computing a change-of-basis Õ Õ matrix to an orthonormal basis. We also prove that under certain = ¹α i ºγ · wii · ¹xi ºα · ¹α j ºγ · wjj · ¹yj ºα assumptions, the inner product is a linear-time operation. i=1 j=1 n n n Õ Õ Definition 3.1. Let R be the real n-space over R equipped with = wii · ¹xi ºα · hα i ; α j i · wjj · ¹yj ºα h· ·i f gn n the bilinear inner product ; . Let α i i=1 be the basis of R in i=1 j=1 which we express our vectors. Let W = ¹w º be a diagonal change- n n α ij Õ Õ T f gn n = wii · ¹xi ºα · sij · wjj · ¹yj ºα = W¹xºα SW¹yº : □ of-basis matrix from α to a normalized basis βi i=1 of R , i.e.
Recommended publications
  • Soft Similarity and Soft Cosine Measure: Similarity of Features in Vector Space Model
    Soft Similarity and Soft Cosine Measure: Similarity of Features in Vector Space Model Grigori Sidorov1, Alexander Gelbukh1, Helena Gomez-Adorno1, and David Pinto2 1 Centro de Investigacion en Computacion, Instituto Politecnico Nacional, Mexico D.F., Mexico 2 Facultad de Ciencias de la Computacion, Benemerita Universidad Autonoma de Puebla, Puebla, Mexico {sidorov,gelbukh}@cic.ipn.mx, [email protected], [email protected] Abstract. We show how to consider similarity between 1 Introduction features for calculation of similarity of objects in the Vec­ tor Space Model (VSM) for machine learning algorithms Computation of similarity of specific objects is a basic and other classes of methods that involve similarity be­ task of many methods applied in various problems in tween objects. Unlike LSA, we assume that similarity natural language processing and many other fields. In between features is known (say, from a synonym dictio­ natural language processing, text similarity plays crucial nary) and does not need to be learned from the data. role in many tasks from plagiarism detection [18] and We call the proposed similarity measure soft similarity. question answering [3] to sentiment analysis [14-16]. Similarity between features is common, for example, in The most common manner to represent objects is natural language processing: words, n-grams, or syn­ the Vector Space Model (VSM) [17]. In this model, the tactic n-grams can be somewhat different (which makes objects are represented as vectors of values of features. them different features) but still have much in common: The features characterize each object and have numeric for example, words “play” and “game” are different but values.
    [Show full text]
  • Evaluating Vector-Space Models of Word Representation, Or, the Unreasonable Effectiveness of Counting Words Near Other Words
    Evaluating Vector-Space Models of Word Representation, or, The Unreasonable Effectiveness of Counting Words Near Other Words Aida Nematzadeh, Stephan C. Meylan, and Thomas L. Griffiths University of California, Berkeley fnematzadeh, smeylan, tom griffi[email protected] Abstract angle between word vectors (e.g., Mikolov et al., 2013b; Pen- nington et al., 2014). Vector-space models of semantics represent words as continuously-valued vectors and measure similarity based on In this paper, we examine whether these constraints im- the distance or angle between those vectors. Such representa- ply that Word2Vec and GloVe representations suffer from the tions have become increasingly popular due to the recent de- same difficulty as previous vector-space models in capturing velopment of methods that allow them to be efficiently esti- mated from very large amounts of data. However, the idea human similarity judgments. To this end, we evaluate these of relating similarity to distance in a spatial representation representations on a set of tasks adopted from Griffiths et al. has been criticized by cognitive scientists, as human similar- (2007) in which the authors showed that the representations ity judgments have many properties that are inconsistent with the geometric constraints that a distance metric must obey. We learned by another well-known vector-space model, Latent show that two popular vector-space models, Word2Vec and Semantic Analysis (Landauer and Dumais, 1997), were in- GloVe, are unable to capture certain critical aspects of human consistent with patterns of semantic similarity demonstrated word association data as a consequence of these constraints. However, a probabilistic topic model estimated from a rela- in human word association data.
    [Show full text]
  • Text Similarity Estimation Based on Word Embeddings and Matrix Norms for Targeted Marketing
    Text Similarity Estimation Based on Word Embeddings and Matrix Norms for Targeted Marketing Tim vor der Bruck¨ Marc Pouly School of Information Technology School of Information Technology Lucerne University of Lucerne University of Applied Sciences and Arts Applied Sciences and Arts Switzerland Switzerland [email protected] [email protected] Abstract determined beforehand on a very large cor- pus typically using either the skip gram or The prevalent way to estimate the similarity of two documents based on word embeddings the continuous bag of words variant of the is to apply the cosine similarity measure to Word2Vec model (Mikolov et al., 2013). the two centroids obtained from the embed- 2. The centroid over all word embeddings be- ding vectors associated with the words in each longing to the same document is calculated document. Motivated by an industrial appli- to obtain its vector representation. cation from the domain of youth marketing, If vector representations of the two documents to where this approach produced only mediocre compare were successfully established, a similar- results, we propose an alternative way of com- ity estimate can be obtained by applying the cosine bining the word vectors using matrix norms. The evaluation shows superior results for most measure to the two vectors. of the investigated matrix norms in compari- Let x1; : : : ; xm and y1; : : : ; yn be the word vec- son to both the classical cosine measure and tors of two documents. The cosine similarity value several other document similarity estimates. between the two document centroids C1 und C2 is given by: 1 Introduction Estimating semantic document similarity is of ut- m n 1 X 1 X most importance in a lot of different areas, like cos( ( x ; y )) \ m i n i plagiarism detection, information retrieval, or text i=1 i=1 (1) Pm Pn summarization.
    [Show full text]
  • Using Semantic Folding with Textrank for Automatic Summarization
    DEGREE PROJECT IN COMPUTER SCIENCE AND ENGINEERING, SECOND CYCLE, 30 CREDITS STOCKHOLM, SWEDEN 2017 Using semantic folding with TextRank for automatic summarization SIMON KARLSSON KTH ROYAL INSTITUTE OF TECHNOLOGY SCHOOL OF COMPUTER SCIENCE AND COMMUNICATION Using semantic folding with TextRank for automatic summarization SIMON KARLSSON [email protected] Master in Computer Science Date: June 27, 2017 Principal: Findwise AB Supervisor at Findwise: Henrik Laurentz Supervisor at KTH: Stefan Nilsson Examiner at KTH: Olov Engwall Swedish title: TextRank med semantisk vikning för automatisk sammanfattning School of Computer Science and Communication i Abstract This master thesis deals with automatic summarization of text and how semantic fold- ing can be used as a similarity measure between sentences in the TextRank algorithm. The method was implemented and compared with two common similarity measures. These two similarity measures were cosine similarity of tf-idf vectors and the number of overlapping terms in two sentences. The three methods were implemented and the linguistic features used in the construc- tion were stop words, part-of-speech filtering and stemming. Five different part-of- speech filters were used, with different mixtures of nouns, verbs, and adjectives. The three methods were evaluated by summarizing documents from the Document Understanding Conference and comparing them to gold-standard summarization cre- ated by human judges. Comparison between the system summaries and gold-standard summaries was made with the ROUGE-1 measure. The algorithm with semantic fold- ing performed worst of the three methods, but only 0.0096 worse in F-score than cosine similarity of tf-idf vectors that performed best. For semantic folding, the average preci- sion was 46.2% and recall 45.7% for the best-performing part-of-speech filter.
    [Show full text]
  • Lecture Note
    Algorithms for Data Science: Lecture on Finding Similar Items Barna Saha 1 Finding Similar Items Finding similar items is a fundamental data mining task. We may want to find whether two documents are similar to detect plagiarism, mirror websites, multiple versions of the same article etc. Finding similar items is useful for building recommender systems as well where we want to find users with similar buying patterns. In Netflix two movies can be deemed similar if they are rated highly by the same customers. While, there are many measures of similarity, in this lecture, we will concentrate one such popular measure known as Jaccard Similarity. Definition (Jaccard Similairty). Given two sets S1 and S2, Jaccard similarity of S1 and S2 is defined as |S1∩S2 S1∪S2 Example 1. Let S1 = {1, 2, 3, 4, 7} and S2 = {1, 4, 9, 7, 5} then |S1 ∪ S2| = 7 and |S1 ∩ S2| = 3. 3 Thus the Jaccard similarity of S1 and S2 is 7 . 1.1 Document Similarity To compare two documents to know how similar they are, here is a simple approach: • Compute k shingles for a suitable value of k k shingles are all substrings of length k that appear in the document. For example, if a document is abcdabd and k = 2, then the 2-shingles are ab, bc, cd, da, ab, bd. • Compare the set of k shingled based on Jaccard similarity. One will often map the set of shingled to a set of integers via hashing. What should be the right size of the hash table? Select a hash table size to avoid collision.
    [Show full text]
  • Learning Semantic Similarity for Very Short Texts
    Learning Semantic Similarity for Very Short Texts Cedric De Boom, Steven Van Canneyt, Steven Bohez, Thomas Demeester, Bart Dhoedt Ghent University – iMinds Gaston Crommenlaan 8-201, 9050 Ghent, Belgium fcedric.deboom, steven.vancanneyt, steven.bohez, thomas.demeester, [email protected] Abstract—Levering data on social media, such as Twitter a single sentence representation that contains most of its and Facebook, requires information retrieval algorithms to semantic information. Many authors choose to average or become able to relate very short text fragments to each maximize across the embeddings in a text [8], [9], [10] or other. Traditional text similarity methods such as tf-idf cosine- similarity, based on word overlap, mostly fail to produce combine them through a multi-layer perceptron [6], [11], by good results in this case, since word overlap is little or non- clustering [12], or by trimming the text to a fixed length existent. Recently, distributed word representations, or word [11]. embeddings, have been shown to successfully allow words The Paragraph Vector algorithm by Le and Mikolov— to match on the semantic level. In order to pair short text also termed paragraph2vec—is a powerful method to find fragments—as a concatenation of separate words—an adequate distributed sentence representation is needed, in existing lit- suitable vector representations for sentences, paragraphs and erature often obtained by naively combining the individual documents of variable length [13]. The algorithm tries to word representations. We therefore investigated several text find embeddings for separate words and paragraphs at the representations as a combination of word embeddings in the same time through a procedure similar to word2vec.
    [Show full text]
  • Word Embeddings for Similarity Scoring in Practical Information
    Names of Editors (Hrsg.): 47. Jahrestagung der Gesellschaft für Informatik e.V. (GI), Lecture Notes in Informatics (LNI), Gesellschaft für Informatik, Bonn 2017 1 Evaluating the Impact of Word Embeddings on Similarity Scoring in Practical Information Retrieval Lukas Galke12, Ahmed Saleh12, Ansgar Scherp12 Abstract: We assess the suitability of word embeddings for practical information retrieval scenarios. Thus, we assume that users issue ad-hoc short queries where we return the first twenty retrieved documents after applying a boolean matching operation between the query and the documents. We compare the performance of several techniques that leverage word embeddings in the retrieval models to compute the similarity between the query and the documents, namely word centroid similarity, paragraph vectors, Word Mover’s distance, as well as our novel inverse document frequency (IDF) re-weighted word centroid similarity. We evaluate the performance using the ranking metrics mean average precision, mean reciprocal rank, and normalized discounted cumulative gain. Additionally, we inspect the retrieval models’ sensitivity to document length by using either only the title or the full-text of the documents for the retrieval task. We conclude that word centroid similarity is the best competitor to state-of-the-art retrieval models. It can be further improved by re-weighting the word frequencies with IDF before aggregating the respective word vectors of the embedding. The proposed cosine similarity of IDF re-weighted word vectors is competitive to the TF-IDF baseline and even outperforms it in case of the news domain with a relative percentage of 15%. Keywords: Word embeddings; Document representation; Information retrieval 1 Introduction Word embeddings have become the default representation for text in many neural network architectures and text processing pipelines [BCV13; Be03; Go16].
    [Show full text]
  • Correlation Coefficients and Semantic Textual Similarity
    Correlation Coefficients and Semantic Textual Similarity Vitalii Zhelezniak, Aleksandar Savkov, April Shen & Nils Y. Hammerla Babylon Health ffirstname.lastnameg @babylonhealth.com Abstract text, with methods ranging from clever composi- tions of word embeddings (Mitchell and Lapata, A large body of research into semantic tex- 2008; De Boom et al., 2016; Arora et al., 2017; tual similarity has focused on constructing Wieting et al., 2016; Wieting and Gimpel, 2018; state-of-the-art embeddings using sophisti- Zhelezniak et al., 2019) to sophisticated neural ar- cated modelling, careful choice of learning signals and many clever tricks. By contrast, chitectures (Le and Mikolov, 2014; Kiros et al., little attention has been devoted to similar- 2015; Hill et al., 2016; Conneau et al., 2017; Gan ity measures between these embeddings, with et al., 2017; Tang et al., 2017; Zhelezniak et al., cosine similarity being used unquestionably 2018; Subramanian et al., 2018; Pagliardini et al., in the majority of cases. In this work, we 2018; Cer et al., 2018). illustrate that for all common word vectors, Comparatively, there is little research into sim- cosine similarity is essentially equivalent to the Pearson correlation coefficient, which pro- ilarity measures for textual embeddings. Despite vides some justification for its use. We thor- some investigations into alternatives (Camacho- oughly characterise cases where Pearson cor- Collados et al., 2015; De Boom et al., 2015; Santus relation (and thus cosine similarity) is unfit as et al., 2018; Zhelezniak et al., 2019), cosine simi- similarity measure. Importantly, we show that larity has persistently remained the default and un- Pearson correlation is appropriate for some questioned choice across the field.
    [Show full text]
  • A Geometric Interpretation for Local Alignment-Free Sequence Comparison
    JOURNAL OF COMPUTATIONAL BIOLOGY Volume 20, Number 7, 2013 Research Articles # Mary Ann Liebert, Inc. Pp. 471–485 DOI: 10.1089/cmb.2012.0280 A Geometric Interpretation for Local Alignment-Free Sequence Comparison EHSAN BEHNAM, MICHAEL S. WATERMAN, and ANDREW D. SMITH ABSTRACT Local alignment-free sequence comparison arises in the context of identifying similar seg- ments of sequences that may not be alignable in the traditional sense. We propose a ran- domized approximation algorithm that is both accurate and efficient. We show that under à D2 and its important variant D2 as the similarity measure, local alignment-free comparison between a pair of sequences can be formulated as the problem of finding the maximum bichromatic dot product between two sets of points in high dimensions. We introduce a geometric framework that reduces this problem to that of finding the bichromatic closest pair (BCP), allowing the properties of the underlying metric to be leveraged. Local align- ment-free sequence comparison can be solved by making a quadratic number of alignment- free substring comparisons. We show both theoretically and through empirical results on simulated data that our approximation algorithm requires a subquadratic number of such comparisons and trades only a small amount of accuracy to achieve this efficiency. There- fore, our algorithm can extend the current usage of alignment-free–based methods and can also be regarded as a substitute for local alignment algorithms in many biological studies. Key words: algorithms, alignment, dynamic programming, metagenomics. 1. INTRODUCTION equence alignment is perhaps the most well-known and intensively studied computational problem in Smodern molecular biology.
    [Show full text]
  • Chapter 6: Vector Semantics What Do Words Mean?
    Dan Jurafsky and James Martin Speech and Language Processing Chapter 6: Vector Semantics What do words mean? First thought: look in a dictionary http://www.oed.com/ Oxford English Dictionary | The definitive record of the English language pepperWords,, n. Lemmas, Senses, Definitions Pronunciation: Brit. /ˈpɛpə/ , U.S. /ˈpɛpər/ OxfordForms: OE peoporEnglish (rare), OEDictionary pipcer (transmission | The error), OEdefinitive pipor, OE pipur record (rare ... of the English languageFrequency (in current use): Etymology: A borrowing from Latin. Etymon: Latin piper. < classical Latin piper, a loanword < Indo-Aryan (as is ancient Greek πέπερι ); compare Sanskritsense ... lemma betel-, malagueta, walldefinition pepper, etc.: see the first element. See also WATER PEPPER n. 1. pepper, n. betel-, malagueta, wall pepper, etc.: see the first element. See also WATER PEPPER n. 1. I. The spice or the plant. Pronunciation: 1. Brit. /ˈpɛpə/ , U.S. /ˈpɛpər/ Forms: OE peopor (rare), OE pipcer (transmission error), OE pipor, OE pipur (rare ... a. A hot pungent spice derived from the prepared fruits (peppercorns) of c. U.S. The California pepper tree, Schinus molle. Cf. PEPPER TREE n. 3. theFrequency pepper plant,(in current Piper use):nigrum (see sense 2a), used from early times to c. U.S. The California pepper tree, Schinus molle. Cf. PEPPER TREE n. 3. seasonEtymology: food, Aeither borrowing whole from or groundLatin. Etymon: to powder Latin (often piper .in association with salt).< classical Also Latin (locally, piper chiefly, a loanword with <distinguishing Indo-Aryan (as word):is ancient a similarGreek πέπερι spice ); compare Sanskrit ... derived from the fruits of certain other species of the genus Piper; the 3.
    [Show full text]
  • Breaking and Fixing Secure Similarity Approximations: Dealing with Adversarially Perturbed Inputs
    Breaking and Fixing Secure Similarity Approximations: Dealing with Adversarially Perturbed Inputs Evgenios M. Kornaropoulos Petros Efstathopoulos Dept. of Computer Science, Brown University Symantec Research Labs [email protected] petros [email protected] Abstract—Computing similarity between data is a fundamen- working with a succinct representation of the data that is tal problem in information retrieval and data mining. To called a sketch. address the relevant performance and scalability challenges, Sketching is the mainstream approach for efficiently approximation methods are employed for large-scale similarity approximating a plethora of functions [11], [12], [16], [18], computation. A common characteristic among all privacy- [25], [36], [42], [47], [57], [58]. The seminal work by preserving approximation protocols based on sketching is that Feigenbaum et al. [27] set the foundation for secure multi- the sketching is performed locally and is based on common party computation of approximation functions. Since then, randomness. researchers proposed a variety of secure approximations In the semi-honest model the input to the sketching algo- based on sketching for several application areas. Melis et rithm is independent of the common randomness. We, however, al. [45] propose scalable and secure protocols to approx- consider a new threat model where a party is allowed to imate statistics on large data streams. Blundo et al. [9] use the common randomness to perturb her input 1) offline, propose secure approximation algorithms for iris matching, and 2) before the execution of any secure protocol so as to multimedia content similarity, and document similarity. The steer the approximation result to a maliciously chosen output. community has made several important steps towards private We formally define perturbation attacks under this adversarial computation on genomic data in a time-efficient and scalable model and propose two attacks on the well-studied techniques manner [3], [17], [22], [50].
    [Show full text]
  • Experimental Analysis of Crisp Similarity and Distance Measures
    International Conference of Soft Computing and Pattern Recognition Experimental Analysis of Crisp Similarity and Distance Measures Leila Baccour Robert I. John REGIM-Lab.: REsearch Groups in Intelligent Machines, Automated Scheduling, University of Sfax, Optimisation and Planning (ASAP) group, ENIS, BP 1173, Sfax, 3038, Tunisia. Computer Science Email: [email protected] Jubilee Campus, Wollaton Road Nottingham, NG8 1BB, UK Email: [email protected] Abstract—Distance measures are a requirement in many clas- This function is called distance, index of distance, index of sification systems. Euclidean distance is the most commonly used dissimilarity, semi-metric distance, or distance ultra-metric in these systems. However, there exists a huge number of distance according to one of the following cases: and similarity measures. In this paper we present an experimental index of dissimilarity: if the function d satisfies the analysis of crisp distance and similarity measures applied to • shapes classification and Arabic sentences recognition. properties 1 and 2. index of distance or semi-metric distance: if the function Keywords-Similarity measures, distance measures, crisp sets, • classification of shapes, classification of Arabic sentences d satisfies the properties 1, 2 and 3 distance: if the function d satisfies the properties 1, 2, 3 • I. INTRODUCTION and 4 distance ultra-metric: if the function d verifies the prop- In some applications such as recognition, classification and • clustering, it is necessary to compare two objects described erty x, y, z E,d(x, y) max (d (x, z) ,d(z,y)) ∀ ∈ ≤ with vectors of features. This operation is based on a distance Two patterns x and y are close if the distance d(x, y) tends or a similarity measure.
    [Show full text]