DOMAIN ADAPTATION BY MULTI-NOISING STACKED MARGINALIZED DENOISING ENCODERS
20170220897 · 2017-08-03
Assignee
Inventors
Cpc classification
G06N7/01
PHYSICS
G06F18/214
PHYSICS
G06V10/774
PHYSICS
G06V10/72
PHYSICS
G06F18/217
PHYSICS
G06V20/35
PHYSICS
International classification
Abstract
A machine learning method operates on training instances from a plurality of domains including one or more source domains and a target domain. Each training instance is represented by values for a set of features. Domain adaptation is performed using stacked marginalized denoising autoencoding (mSDA) operating on the training instances to generate a stack of domain adaptation transform layers. Each iteration of the domain adaptation includes corrupting the training instances in accord with feature corruption probabilities that are non-uniform over at least one of the set of features and the domains. A classifier is learned on the training instances transformed using the stack of domain adaptation transform layers. Thereafter, a label prediction is generated for an input instance from the target domain represented by values for the set of features by applying the classifier to the input instance transformed using the stack of domain adaptation transform domains.
Claims
1. A non-transitory storage medium storing instructions executable by a computer to perform a machine learning method operating on training instances from a plurality of domains including (i) one or more source domains and (ii) a target domain with each training instance represented by values for a set of features and some training instances being labeled with labels of a set of labels, the machine learning method including the operations of: performing domain adaptation using stacked marginalized denoising autoencoding (mSDA) operating on the training instances with at least one of: (1) different feature corruption probabilities for different features of the set of features and (2) different feature corruption probabilities for different domains of the plurality of domains to generate a stack of domain adaptation transform layers operative to transform the domains to a common adapted domain; performing supervised or semi-supervised learning on the training instances transformed to the common adapted domain using the stack of domain adaptation transform layers to generate a classifier that outputs label predictions from the set of labels for the training instances; and generating a label prediction for an input instance in the target domain represented by values for the set of features by applying the classifier to the input instance transformed to the common adapted domain using the stack of domain adaptation transform domains.
2. The non-transitory storage medium of claim 1 wherein the domain adaptation using mSDA operates on the training instances with at least different feature corruption probabilities for different features of the set of features.
3. The non-transitory storage medium of claim 2 wherein the different feature corruption probabilities for different features of the set of features include: a domain-specific feature corruption probability for more discriminative features, and a domain-independent feature corruption probability for less discriminative features; wherein the domain-specific feature corruption probability is larger than the domain-independent feature corruption probability.
4. The non-transitory storage medium of claim 2 wherein the feature corruption probabilities are larger for more discriminative features and are smaller for less discriminative features.
5. The non-transitory storage medium of claim 1 wherein the domain adaptation using mSDA operates on the training instances with at least different feature corruption probabilities for different domains of the plurality of domains.
6. The non-transitory storage medium of claim 5 wherein the different feature corruption probabilities for different domains of the plurality of domains include: a source domains feature corruption probability used for training instances from the one or more source domains; and a target domain feature corruption probability used for training instances from the target domain; wherein the target domain feature corruption probability is different from the source domains feature corruption probability.
7. The non-transitory storage medium of claim 5 wherein the different feature corruption probabilities for different domains of the plurality of domains include feature corruption probabilities p.sub.j, j=1, . . . , N and p.sub.t where N is the number of source domains with N being greater than or equal to two, p.sub.j is the feature corruption probability used for training instances from source domain j, and p.sub.t is the feature corruption probability used for training instances from the target domain, and wherein p.sub.j≠p.sub.j, for all j≠j′ and p.sub.t≠p.sub.j for all j=1, . . . , N.
8. The non-transitory storage medium of claim 1 wherein the domain adaptation using mSDA operates on the training instances with different feature corruption probabilities for different features of the set of features and with different feature corruption probabilities for different domains of the plurality of domains.
9. The non-transitory storage medium of claim 1 wherein each training instance represents a corresponding image, the set of features is a set of image features, the classifier is an image classifier, and the machine learning method includes the further operation of: generating each training instance by extracting values for the set of image features from the corresponding image.
10. The non-transitory storage medium of claim 1 wherein each training instance represents a corresponding text-based document, the set of features is a set of text features, the classifier is a document classifier, and the machine learning method includes the further operation of: generating each training instance by extracting values for the set of text features from the corresponding text-based document.
11. A device comprising: a computer programmed to perform a machine learning method operating on training instances from a plurality of domains including one or more source domains and a target domain, with each training instance represented by values for a set of features, the machine learning method including the operations of: performing domain adaptation using stacked marginalized denoising autoencoding (mSDA) operating on the training instances to generate a stack of domain adaptation transform layers wherein each iteration of the domain adaptation includes corrupting the training instances in accord with feature corruption probabilities that are non-uniform over at least one of the set of features and the domains; learning a classifier on the training instances transformed using the stack of domain adaptation transform layers; and generating a label prediction for an input instance from the target domain represented by values for the set of features by applying the classifier to the input instance transformed using the stack of domain adaptation transform domains.
12. The device of claim 11 wherein each iteration of the domain adaptation includes corrupting the training instances in accord with feature corruption probabilities that are non-uniform over the set of features.
13. The device of claim 12 wherein the non-uniform feature corruption probabilities over the set of features include: a domain-specific feature corruption probability for more discriminative features; and a domain-independent feature corruption probability for less discriminative features that is smaller than the domain-specific feature corruption probability.
14. The device of claim 12 wherein the feature corruption probabilities are larger for more discriminative features of the set of features and are smaller for less discriminative features of the set of features.
15. The device of claim 11 wherein each iteration of the domain adaptation includes corrupting the training instances in accord with feature corruption probabilities that are non-uniform over the domains.
16. The device of claim 15 wherein each iteration of the domain adaptation includes: corrupting the training instances from the one or more source domains in accord with a source domains feature corruption probability; and corrupting the training instances from the target domain in accord with a target domain feature corruption probability that is different from the source domains feature corruption probability.
17. The device of claim 15 wherein each iteration of the domain adaptation includes: corrupting the training instances from each source domain in accord with a feature corruption probability specific to that source domain; and corrupting the training instances from the target domain in accord with a feature corruption probability specific to the target domain.
18. The device of claim 11 wherein each iteration of the domain adaptation includes corrupting the training instances in accord with feature corruption probabilities that are non-uniform over both the set of features and the domains.
19. The device of claim 11 wherein some training instances are labeled with labels of a set of labels and the learning comprises: performing supervised learning of the classifier on the training instances transformed using the stack of domain adaptation transform layers wherein the supervised learning optimizes the classifier respective to the labels of the labeled training instances.
20. The device of claim 11 wherein one of: (I) each training instance represents a corresponding image, the set of features is a set of image features, the classifier is an image classifier, and the machine learning method includes the further operation of generating each training instance by extracting values for the set of image features from the corresponding image; and (II) each training instance represents a corresponding text-based document, the set of features is a set of text features, the classifier is a document classifier, and the machine learning method includes the further operation of generating each training instance by extracting values for the set of text features from the corresponding text-based document.
21. A machine learning method operating on training instances from a plurality of domains including one or more source domains and a target domain, with each training instance represented by values for a set of features, the machine learning method comprising: performing domain adaptation using stacked marginalized denoising autoencoding (mSDA) operating on the training instances to generate a stack of domain adaptation transform layers wherein each iteration of the domain adaptation includes corrupting the training instances in accord with feature corruption probabilities that are non-uniform over at least one of the set of features and the domains; and learning a classifier on the training instances transformed using the stack of domain adaptation transform layers; wherein the domain adaptation and the learning are performed by a computer.
22. The machine learning method of claim 21 further comprising: generating a label prediction for an input instance represented by values for the set of features by applying the classifier to the input instance transformed using the stack of domain adaptation transform domains; wherein the generating is performed by a computer.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0009]
[0010]
[0011]
DETAILED DESCRIPTION
[0012] Domain adaptation using stacked marginalized denoising autoencoders (mSDAs) use a noise model represented by a feature corruption probability when corrupting feature values of the training instances. The feature corruption probability used in the mSDAs may be optimized, for example using cross-validation.
[0013] However, it is recognized herein that this approach has certain deficiencies. Conceptually, the feature corruption probability controls how much adaptation is performed. A low feature corruption probability produces weak denoising and hence can provide only limited adaptation; whereas, a large feature corruption probability requires compensatory strong denoising and hence can provide extensive adaptation. On the other hand, a high feature corruption probability can produce undesirably large adaptation in situations where minor adaptation is appropriate.
[0014] In the case of domain adaptation with multiple source domains, some source domains may be closer to the target domain than others. It is recognized herein that different feature corruption probabilities for different source domains may be useful to provide more accurate domain adaptation.
[0015] For either single source domain adaptation or multiple source domain adaptation, it is further recognized herein that the amount of adaptation (and hence the optimal feature corruption probability) may be different for different features of the set of features used to represent the instances.
[0016] In view of this it is disclosed herein to perform domain adaptation using stacked marginalized denoising autoencoding (mSDA) operating on the training instances to generate a stack of domain adaptation transform layers, in which each iteration of the domain adaptation includes corrupting the training instances in accord with feature corruption probabilities that are non-uniform over at least one of the set of features and the domains.
[0017] In some embodiments disclosed herein, each iteration of the domain adaptation using mSDA includes corrupting the training instances in accord with feature corruption probabilities that are non-uniform over the set of features, with feature corruption probabilities being larger for more discriminative features of the set of features and smaller for less discriminative features of the set of features. This captures, within the mSDA framework, the tendency of more discriminative features to require more adaptation compared with less discriminative features.
[0018] In some embodiments disclosed herein, each iteration of the domain adaptation using mSDA includes corrupting the training instances in accord with feature corruption probabilities that are non-uniform over the domains. For example, different feature corruption probabilities may be used for the source domain (or source domains, in multiple source domain adaptation) and for the target domain. In some multiple source domain adaptation embodiments disclosed herein, different feature probabilities are also used for corrupting training instances of the different source domains.
[0019] These embodiments are not mutually exclusive—rather, in some embodiments, each iteration of the domain adaptation includes corrupting the training instances in accord with feature corruption probabilities that are non-uniform over both the set of features and the domains.
[0020] With reference to
[0021] Domain adaptation is performed, using stacked marginalized denoising autoencoding (mSDA) 20 operating on the training instances 12 with at least one of: (1) different feature corruption probabilities for different features of the set of features and (2) different feature corruption probabilities for different domains of the plurality of domains. As will be described further including illustrative examples, the domain adaptation by mSDA 20 as disclosed herein includes the following processing sequence. In an operation 22, the training instances are corrupted in accord with feature corruption probabilities that are non-uniform over at least one of the set of features and the domains. For example, each feature of each training instance may be set to zero with some probability p, where the feature corruption probability p may be different for different features, or may be different for different domains, or may be different for both different features and different domains. In an operation 24, a linear denoising mapping W is determined to minimize a loss function measuring a difference between the original feature vectors representing the training instances and the corrupted feature vectors after denoising by the mapping W. The determined linear mapping W is used, either directly or (more preferably to extend the mapping beyond a linear transform) after applying a non-linear function ƒ(•), to construct a domain adaptation transform layer h.sub.t 30.sub.t. To create a stack of L such domain adaptation layers (where L is typically greater than or equal to two), each domain adaptation transform layer h.sub.t 30.sub.t is applied to update the training instances in an operation 32 and the process is executed in a loop 34 for t=1, . . . , L iterations.
[0022] The output of this iterative processing sequence 22, 24, 30, 32, 34 is a stack of denoising autoencoders h.sub.l, . . . , h.sub.L constructed for chosen feature corruption probabilities that are non-uniform over at least one of the set of features and the domains. This stack of domain adaptation transform layers h.sub.1, . . . , h.sub.L is operative to transform the N+1 domains to a common adapted domain. Moreover, execution of the t=1, . . . , L iterations of the update operation 32 has performed this transformation of the training instances to the common adapted domain. Accordingly, the training instances transformed to the common adapted domain are suitably used by a classifier trainer 40 to learn a classifier 42 to label instances in the common adapted domain. The classifier trainer 40 can employ substantially any architecture to generate the classifier 42 with that architecture. For example, in some embodiments, the classifier trainer 40 employs a support vector machine (SVM) training architecture to generate the classifier 42 as a linear SVM classifier. SVM is a supervised learning method; in other embodiments, an unsupervised (e.g. clustering) learning technique is used to generate the classifier 42. For example, an unsupervised k-means clustering architecture can be used to generate the classifier 42. Semi-supervised learning techniques may also be used. In the case of unsupervised learning, the class labels are generally not known a priori (and in some cases even the number of classes is not known a priori). Accordingly, in embodiments employing unsupervised learning the classifier training 40 may include manual review of and labeling of the resulting clusters. Other human feedback for the classifier training 40 is also contemplated, such as providing initial conditions for initiating an iterative classifier learning process.
[0023] It is noted that the domain adaptation 20 does not rely upon the labels (if any) annotated to some or all training instances 12. The classifier training 40 uses such labels in the case of supervised or semi-supervised learning, but does not use annotated labels in the case of unsupervised learning—thus, in the case of the training 40 employing unsupervised learning it is contemplated for all training instances 20 to be unlabeled.
[0024] The domain adaptation 20 uses feature corruption probabilities that are non-uniform over at least one of the set of features and the domains. The choice of feature corruption probabilities may be made based on the expected amount of adaptation, where such information is available or pre-computed a priori. For example, it is generally expected that more discriminative features will benefit from substantial adaptation; whereas, less discriminative features may be expected to require less adaptation. The variance of a feature amongst the various domains can be used as a metric of how discriminative the feature is. Thus, in one approach employing feature corruption probabilities that are non-uniform over the set of features, larger feature corruption probabilities are chosen for more discriminative features of the set of features, while smaller probabilities are chosen for less discriminative features.
[0025] In the case of feature corruption probabilities that are non-uniform over the domains, a priori knowledge may be used to assess “closeness” of a source domain to the target domain. For example, considering the illustrative task of traffic intersection surveillance cameras, a given domain defined by a particular camera installation may be characterized by metrics such as camera-to-intersection distance, camera height, camera angle relative to a plane containing the traffic lights, or so forth. These domain metrics may be used to quantitatively compare the target domain with each source domain. Source domains that are more different from the target domain based on the quantitative comparison are likely to need greater adaptation, and accordingly may be assigned larger feature corruption probabilities, as compared with domains that are quantitatively closer to the target domain.
[0026] Such knowledge-based approaches provide a principled basis for selecting the feature corruption probabilities for the various features and domains. In another approach, which may be used separately from or in combination with such a knowledge-based approach, a search grid 44 of feature corruption probabilities may be employed. In this empirical approach, the domain adaptation 20 is repeated for various feature corruption probabilities and the best result is chosen. In one approach, the “best” result is assessed based solely on the output of the domain adaptation 20, e.g. based on quantitative metrics of how well the training instances adapted to the common domain align. In another approach, for each point of the search grid 44 the classifier training 40 is also performed and the assessment is made based on metrics of the resulting classifier 42.
[0027] With reference to
[0028] It will be appreciated that the inference phase of
[0029] In other embodiments, the two computers 10, 11 are the same computer. For example, named entity recognition (NER) tasks may be performed in an institutional setting such as using a corporate computing system, for which it may be convenient to use the same corporate computing server to perform both the training and inference phases. In such an illustrative example, both computers 10, 11 may be embodied by a corporate server (or by a common cloud computing resource, or so forth).
[0030] It will be further appreciated that the disclosed training and/or inference phases may be implemented in the form of a non-transitory storage medium storing instructions suitable for programming a computer 10, 11 to perform the disclosed training and/or inference functions. The non-transitory storage medium may, for example, be a hard disk drive or other magnetic storage medium, an optical disk or other optical storage medium, a solid state disk, flash drive, or other electronic storage medium, various combination(s) thereof, or so forth.
[0031] In the following, some more detailed illustrative examples of the training phase of is defined as composed of a feature space
⊂R.sup.d and a label space
. Any task in domain
(classification, regression, etc.) is defined by a function h:
.fwdarw.
. In machine learning, learning the task is to estimate a classifier function
.fwdarw.
from the sample data D={(x.sub.1; y.sup.1), . . . , (x.sub.n; y.sub.n)}, x.sub.iε
; y.sub.iε
, that best approximates h, according to certain criteria. As previously mentioned, there are N.sub.+1 domains, including N source domains S.sub.i, j=1 . . . , N and one target domain T. From a source domain S.sub.j the training instances 14 with labels are denoted D.sub.s.sub.
. If the classifier training 40 is unsupervised, then target data 16 are sampled without labels; in the semi-supervised setting, initial l.sub.T
n.sub.T items in D.sub.T have labels {y.sub.1, . . . , y.sub.l.sub.
.fwdarw.
with the help, via domain adaptation, of the labeled sets D.sub.S.sub.
[0032] In deep learning, a denoising autoencoder (DA) is a one-layer neural network trained to reconstruct input data from partial random corruption. The denoisers can be stacked into multi-layered architectures where the weights are fine-tuned with back-propagation. Alternatively, the outputs of intermediate layers can be used as input features to other learning algorithms. These learned feature representations improve classification accuracy in many cases. The multi-layer variant is referred to as stacked denoising autoencoders (SDAs).
[0033] A difficulty with SDAs is typically long training time, which often entails specialized computing supports such as GPUs, especially for large-scale tasks. To address this problem, a variation of SDA has been developed, called stacked marginalized denoising autoencoder (mSDA). See Chen et al., “Marginalized denoising autoencoders for domain adaptation”, ICML (2014). In mSDA, the random corruption is marginalized out. This yields optimal reconstruction weights computed in a closed form and eliminates the back-propagation. Features learned with mSDA have been found to lead to classification accuracy comparable with SDAs, with a large reduction of the training time.
[0034] The basic building block of the mSDA is a one-layer linear denoising autoencoder. A set of input instances x.sub.1, . . . , x.sub.m are sampled with replacement, where typically m>n=|D|. These inputs are corrupted in the operation 22 by random feature corruption, i.e. a feature is corrupted by being set to 0 with probability p. Other types of feature corruption with probability p are alternatively contemplated The corrupted version of x.sub.i is denoted as {tilde over (x)}.sub.i and the corrupted inputs are reconstructed with a linear mapping W: R.sup.d.fwdarw.R.sup.d, that minimizes the squared reconstruction loss:
[0035] A constant feature with value unity can be added to the input feature vector, that is, x.sub.i.fwdarw.[x.sub.1; 1], and a bias is incorporated within the mapping, i.e. W=[W; b]. The added constant feature is never corrupted. The input feature vectors representing the training instances 12 are arranged as a concatenated matrix X=[x.sub.1, . . . , x.sub.m], and its corrupted version is denoted {tilde over (X)}=[{tilde over (x)}.sub.1, . . . , {tilde over (x)}.sub.m]. Then the solution of Equation (1) can be expressed as the closed-form solution for ordinary least squares:
W=PQ.sup.−1 where Q={tilde over (X)}{tilde over (X)}.sup.T and P=X{tilde over (X)}.sup.T (2)
[0036] The solution to Equation (2) depends on the re-sampling of x.sub.1, . . . , x.sub.m and on which features are randomly corrupted. It is preferable to consider all possible corruptions of all possible inputs when the denoising transformation W is computed, i.e. letting m.fwdarw.∞. By the weak law of large numbers, the matrices P and Q converge to their expected values [P],
[Q] as more copies of the corrupted data are created. In the limit, one can derive their expectations and express the corresponding mapping for W in a closed form as W=
[P]
[Q], where:
where q=[1−p, . . . , 1−p, 1]εR.sup.d+1 and S=XX.sup.T is the covariance matrix of the uncorrupted data.
[0037] Thus, the linear denoising autoencoder matrix W is computed as W=[P]
[Q] where the expectations are given in Equation (3). This is, a single denoising autoencoder (DA). A stacked denoising autodecoder (SDA) stacks multiple layers of denoising autoencoders, thereby creating a deep learning architecture. In illustrative embodiments, this DA stacking is done for t=1, . . . , L DA layers by feeding the representations of the t-th denoising layer, denoted here as h.sub.t, as the input to the (t+1)-th layer h.sub.t+1. Each transformation W.sup.t is learned to reconstruct the previous DA output h.sub.t from its corrupted version. In order to extend the mapping beyond a linear transformation, a non-linear function ƒ(•) between layers is applied. In the illustrative embodiments the hyberbolic tangent function is used, i.e. ƒ(•)=tanh(•). Thus, the representation of each DA layer is obtained from the preceding layer through the relationship h.sub.t=tanh(W.sup.th.sub.t−1), with h.sub.0=X. Other non-linear functions beside tanh(•) are contemplated for use as the non-linear function ƒ(•) between layers.
[0038] With reference back to Equation (3), and more particularly considering the term q=[1−p, . . . , 1−p, 1], the last element having value unity reflects that the added constant feature is never corrupted (p=0 so that 1−p=1). Further, the first d elements provide the feature corruption probabilities for features 1, . . . , d. For q=[1−p, . . . , 1−p, 1], these d features all have the same feature corruption probability denoted as p, which is also the same for all domains. Thus, in this implementation the training instances are corrupted in accord with a single feature corruption probability p that is uniform over both the set of features and the domains.
[0039] By contrast, as previously discussed with reference to
[0040] The case of feature corruption probabilities that are non-uniform over the set of features is considered first. In this case, the single feature corruption probability p is replaced by a d-dimensional vector of feature corruption probabilities [p.sub.1, . . . , p.sub.d]. Thus, vector q is changed to q=[1−p.sub.1, . . . , 1−p.sub.d, 1].
[0041] The phrase “feature corruption probabilities that are non-uniform over the set of features”, or “different feature corruption probabilities for different features of the set of features” or similar phraseology is satisfied so long as at least one of the d probabilities is different from the others. For example, in one embodiment the features are classified as either “discriminative” or “not discriminative”. Those features that are classified as “discriminative” are assigned a relatively higher discriminative feature corruption probability p.sub.h while those features that are classified as “non-discriminative” are assigned a relatively lower non-discriminative feature corruption probability p.sub.l. The higher feature corruption probability p.sub.h provides for greater domain adaptation for the discriminative features as compared with the non-discriminative features whose domain adaptation is controlled by the lower feature corruption probability p.sub.i.
[0042] In other embodiments, more feature corruption probability variation is provided amongst the different features of the set of d features. For example, if the features are quantitatively assessed by variance σ.sub.i amongst the training instances (where i here indexes the features), then the feature corruption probability may, for example, be computed to be generally different for each feature, e.g. p.sub.i=ƒ(σ.sub.i.sup.2) where function ƒ is chosen to ensure a range [0,1].
[0043] The case of feature corruption probabilities that are non-uniform over the domains is next considered. There are in general N+1 domains. Matrix X is constructed from the sampling instances 12 by concatenation of all domains, D=D.sub.T ∪D.sub.S.sub.
[0044] In an illustrative case, consider X as composed of target and source training instances in the form of two concatenated blocks X=[X.sub.T; X.sub.S], where target features indexed by the index k are corrupted with feature corruption probabilities p.sub.tk, k=1, . . . , d and the feature in the one or more source domains are corrupted with feature corruption probabilities p.sub.sk, k=1, . . . , d. (Note that this also incorporates the previously described nonuniformity over features via the k index). In this example all N source domains are corrupted using the same set of feature corruption probabilities p.sub.sk, k=1, . . . , d. Then, the expected value [{tilde over (x)}{tilde over (x)}.sup.T] depends on whether x is sampled from X.sub.T (i.e. from the target domain) or X.sub.S (i.e. one of the source domains). If the respective fractions of source and target instances in X=[X.sub.T; X.sub.S] are denoted as α.sub.t and α.sub.s with α.sub.t+α.sub.s=1, then Equation (3) can be generalized to the two noise vectors as follows:
where q.sub.t=[1−p.sub.t1, . . . , 1−p.sub.td, 1] and q.sub.s=[1−p.sub.s1, . . . , 1−p.sub.sd, 1]. The expectation of P becomes [P].sub.ij=S.sub.ij(α.sub.tq.sub.tj+α.sub.sq.sub.sj).
[0045] In the most general case, each element x.sub.ij in X may be corrupted with a proper noise p.sub.ij, i=1, . . . , d, k=1, . . . , n. The ((d+1) x n) matrix Q={q.sub.ik} is defined such that q.sub.ij=1−p.sub.ij and q.sub.d+1,j=1. The expectations of Q and P can then be written in closed form as:
[0046] In the following, some experimental results are presented, which were performed using the following data sets.
[0047] The ImageClef 2014 Domain Adaptation Challenge (“ICDA”) datset consists of a set of SIFT BOV (bag of visual words) features provided for 12 common classes from five image collections: Caltech-256 (“C”), ImageNet (“I”), PascalVOC (“P”), Bing (“B”) and SUN (“S”). The first four collections (C, I, P, and B) were treated as source domains, each with 600 image features and corresponding labels, and the SUN dataset (S) served as the target domain, with 60 annotated and 600 non-annotated instances. The task was to provide predictions for the non-annotated target data.
[0048] The Office31 (“OFF31”) and Office+Caltech (“OC10”) datasets are frequently used image datasets for testing image domain adaptation techniques with the provided SURF BOV features. The OFF31 dataset consists of three domains Amazon (“A”), dslr (“D”) and Webcam (“W”) with 31 common classes. The OC10 has in addition the Caltech (“C”) set but only the 10 common classes are considered. Each domain is considered in its turn as a target domain, with the other domains considered as source domains. All source examples were used in the unsupervised setting; in the semi-supervised case, three target instances per class were also added to the training set.
[0049] The 20 newsgroup dataset (“20NG”) was also used for some experiments. Six domain adaptation tasks were used for benchmarking. For each of these tasks, two classification problems were considered, from source to target and from target to source, thus giving a total of twelve tasks. The headers, footers and quotes fields were removed from documents, and words which occur in less than 3 documents were filtered out. The top 10,000 features according to the document frequency were considered. Experimental results are reported for l.sub.2 normalized term frequencies vectors; other term-weighting schemas (like tf-idf) gave similar results.
[0050] To evaluate the multi-noise mSDAs on different domain adaptation tasks, we consider three simplified, block-wise structure of noise matrix Q: (1) Two domain noises in which target domain T is corrupted with noise p.sub.t, and all instances from the source domains S.sub.j are corrupted with one noise p.sub.s; (2) N+1 domain noises in which, beyond the target domain noise p.sub.t, each source S.sub.i is corrupted with a proper noise p.sub.j, j=1, . . . , N; and (3) Two feature noises in which all features are split into two groups of domain-independent and domain-specific ones, each group is corrupted with a proper noise, p.sub.i or p.sub.s.
[0051] With reference to
[0052] Table 1 reports the accuracy values averaged over 15 ICDA tasks SS where SS is a subset of {C,I,P,B}. It compares results of linear SVMs learned with the original data, mSDA and mmSDA features, in both unsupervised (US) ans semi-supervised (SS) settings.
TABLE-US-00001 TABLE 1 Average accuracies over 15 ICDA tasks Dataset Origin mSDA mmSDA Gain (%) Sources Origin msDA mSmDA-2 Gain (%) C 26.33 31.50 32.33 2.65 I 28.5 32.83 33.67 2.54 P 26.67 29.00 29.17 0.57 B 30.83 37.17 37.33 0.45 C, I 28.67 30.67 31.50 2.72 C, P 21.83 31.50 31.67 0.53 C, B 30.83 34.50 35.50 2.90 I, P 28.5 30.17 30.83 2.21 I, B 33.83 38.17 39.00 2.18 P, B 30.33 33.67 33.83 0.50 C, I, P 28.5 31.00 31.33 1.08 C, I, B 30.33 36.17 37.17 2.76 C, P, B 29.17 32.00 33.17 3.65 I, P, B 31.5 33.83 35.00 3.45 C, I, P, B 30.17 32.33 34.00 5.15 ICDA (SS) 29.07 32.97 33.70 2.22 ICDA (US) 24.54 28.21 29.10 3.15
[0053] To test N+1 domain noises scenario, the SVM classifiers were replaced with the domain specific class mean classifier (DSCM). See Csurka et al., “Domain Adaptation with a Domain Specific Class Means Classifier”, ECCV, TASK-CV WS, 2014 It is fast in learning and allows performance of a grid search with three and more noise parameters. The DSCM computes class means in each domain and assigns a new target instance using the softmax function of distances to the domain specific class means. We used a single layer mDA and mmDA and concatenate their output with the original features to perform the DSCM classification.
[0054] In the experiments, a grid search was performed by varying each source noise p.sub.j, j=1, . . . , N and target noise p.sub.t from 0.1 to 0.9 with step 0.1. The best value on the grid for each target-source(s) configuration (mmDA) was kept, and similarly the best single common noise (mDA) was kept. We compared results to the classification with the original features. Table 2 shows results averaged over all domain adaptation tasks for OFF31, OC10 and ICDA, in the unsupervised (US) and semi-supervised (SS) settings. Thus, for OFF31, the best scores are averaged over the following 9 tasks: D.fwdarw.A, W.fwdarw.A, (D,W).fwdarw.A, A.fwdarw.D, W.fwdarw.D, (A,W).fwdarw.D, A.fwdarw.W, D.fwdarw.W and (A,D).fwdarw.W. These results show that using an appropriate (best tuned) multiple noise levels yields relatively a consistent but modest improvement over the best tuned single noise level on all the datasets in the case of DSCM.
[0055]
TABLE-US-00002 TABLE 2 N + 1 domain noises with DSCM mDA Dataset Origin p = 0.5 mDA mmDA OFF31 27.01 28.01 28.61 28.87 (US) OFF31 45.63 47.7 47.89 47.95 (SS) OC10 (US) 49.84 49.91 50.84 51.11 OC10 (SS) 55.31 55.96 56.7 57.15 ICDA1 26.16 25.73 26.36 26.56 (US) ICDA1 (SS) 34.28 34.14 34.69 34.85
[0056] Further experiments were performed with two feature noises on the 20NG dataset. Vocabulary change is an important problem in text domain adaptation. When adapting a document classifier or a part-of-speech (POS) tagger to a new domain, it is frequent that new words appear in the target domain, while some words from a source domain become less informative. In such tasks, it is useful to distinguish between domain-specific and other domain-independent words. For instance, the word “great” could be considered as a domain independent word for sentiment analysis, while “reliable” and “thrilling” as domain specific. Experiments investigated using different noises for domain-specific and domain-independent words. The mutual information criterion was used to assess discriminativeness from the least predictive features of the domain indicator to domain-independent words, and 500 domain-specific words were kept.
[0057] In
TABLE-US-00003 TABLE 3 Accuracy for two feature noise mmDAs on 20 NG dataset Tasks mDA mmDA comp vs 0.701 0.741 sci sci vs comp 0.680 0.688 rec vs talk 0.728 0.743 talk vs rec 0.731 0.774 rec vs sci 0.790 0.801 sci vs rec 0.796 0.797 sci vs talk 0.781 0.776 talk vs sci 0.773 0.769 comp vs 0.883 0.906 rec rec vs 0.895 0.901 comp comp vs 0.958 0.952 talk talk vs 0.954 0.951 comp Average 0.806 0.816
[0058] The experiments described above tested the multi-noise mSDA for domain adaptation tasks generated from available datasets assuming that any source is relevant to the target. In experiments described next, the utility of mmSDA is shown for a different setting, when not all sources are relevant and it is desired to select the best subset for domain adaptation.
[0059] Actually, in the ICDA experiments reported with reference to Table 1, the source selection was already critical, as the best source combination (I,B) performs 19% better than the all source combination (C,I,P,B).
[0060] The subset selection is a NP-hard problem and in practice is is often approximated with greedy search methods. The goal is to select sources and train a classifier on them that results in the good generalization on the target domain. The greedy algorithm processes by iterations, at each iteration it picks up a source that gives the maximal gain in the objection function, and adds it to the solution. The algorithm stops when where is no new source improves the objective function. Greedy algorithms are known for finding a good approximation when the sources are uncorrelated. In the following, it is shown that the noise marginalization extracts the representation that helps the greedy algorithm to find a good approximation.
[0061]
TABLE-US-00004 TABLE 4 Greedy source selection on the reshaped ICDA sources N.sub.new baseline mDA mmDA 4 96.9 99.1 99.2 8 87.0 95.3 96.1 16 76.3 84.4 88.3
[0062] To test the method, N=4 ICDA sources were randomly reshaped into N.sub.new=4, 8 and 16 sources of the same size, the greedy algorithm was run on them and the approximated solutions found were measured. The greedy algorithm was run 10 times for the baseline, mSDA and mmSDA, and the average approximation accuracy was reported, in percentage of the globally optimal solution. Table 4 reports the evaluation results and shows that mSDA and mmSDA resist better to the increase of the source number than the baseline.
[0063] It will be appreciated that various of the above-disclosed and other features and functions, or alternatives thereof, may be desirably combined into many other different systems or applications. Also that various presently unforeseen or unanticipated alternatives, modifications, variations or improvements therein may be subsequently made by those skilled in the art which are also intended to be encompassed by the following claims.