This document discusses and compares several next generation artificial intelligence techniques, including capsule networks, transfer learning, deep reinforcement learning, unsupervised/semi-supervised deep learning, meta-learning, swarm intelligence, and differentiable neural computers. It provides brief descriptions of each technique and potential applications, such as using capsule networks for text analytics, transfer learning for robotics, deep reinforcement learning for banking product recommendations, and swarm intelligence for robotics and fraud analytics. Examples and diagrams are included to help explain how some of the techniques work.
2. C O P Y R I G H T S A P I E N T R A Z O R F I S H | C O N F I D E N T I A L 2
Microsoft Computer Vision API: Image Captioning and Tagging
a group of giraffe standing next to a rock wall a statue of a bear in a pool of water
3. C O P Y R I G H T S A P I E N T R A Z O R F I S H | C O N F I D E N T I A L 3
Microsoft Computer Vision API: Image Captioning and Tagging
a group of brown cows walking along a wooden fence
a group of giraffe standing next to a tree
4. C O P Y R I G H T S A P I E N T R A Z O R F I S H | C O N F I D E N T I A L 4
More DL Howlers
a monkey sitting on a rock a group of pink flowers on top of a grass covered field
5. C O P Y R I G H T S A P I E N T R A Z O R F I S H | C O N F I D E N T I A L 5
More DL Howlers
a flock of seagulls at sunset a herd of sheep standing on top of a grass covered
field
6. C O P Y R I G H T S A P I E N T R A Z O R F I S H | C O N F I D E N T I A L 6
More DL Howlers
herd of sheep grazing on a lush green field
a woman wearing a green shirt
11. C O P Y R I G H T S A P I E N T R A Z O R F I S H | C O N F I D E N T I A L 11
Generalization and Surface Statistical Regularities
Claim 1:
• Deep CNNs
are
generalizing
extremely
well to an
unseen test
set.
Claim 2:
• Deep CNNs
have extreme
sensitivity to
adversarial
examples.
Train and Test
data sets
• Have similar
image
statistics
• Superficial
cues –
generalization
behaviour
• Perturbations
on images
12. C O P Y R I G H T S A P I E N T R A Z O R F I S H | C O N F I D E N T I A L 12
Fourier Filtering
J. Jo and Y. Bengio, “Measuring the tendency of cnns to learn surface statistical regularities,” arXiv preprint arXiv:1711.11561, 2017.
13. C O P Y R I G H T S A P I E N T R A Z O R F I S H | C O N F I D E N T I A L 13
DLs only learn Surface Statistical Regularities?
J. Jo and Y. Bengio, “Measuring the tendency of cnns to learn surface statistical regularities,” arXiv preprint arXiv:1711.11561, 2017.
Network1
• unfiltered
data set for
training
• Generalization
gap of 18-20%
Network2
• randomly
filtered data
for training
• Generalization
gap of 28%
Network3
• radially
filtered data
for training
• Generalization
gap of 10%
16. C O P Y R I G H T S A P I E N T R A Z O R F I S H | C O N F I D E N T I A L 16
Privacy Preserving Analytics: Federated Learning
§ Data is non-iid, massively distributed across
multiple clients/organizations and imbalanced
§ Trusted curator – collects parameters for
model.
§ Joint representative model without data
sharing.
§ Applications : Insurance domain for banks.
How federated learning works ?
17. C O P Y R I G H T S A P I E N T R A Z O R F I S H | C O N F I D E N T I A L 17
Transfer Learning
§ Typical application of multi task
learning can be found in Robotics,
where robots can learn from each
other.
§ Applications: RPA
How transfer learning works ?
18. C O P Y R I G H T S A P I E N T R A Z O R F I S H | C O N F I D E N T I A L 18
Unsupervised/Semi-supervised Deep Learning
Image source https://arxiv.org/abs/1511.06430
§ Approaches to Semi-Supervised Learning(SSL)
§ Pseudo Labeling
§ Ladder Network
• Uses Encoder and Decoder approach
• Uses two encoders paths(one with noise and another without
noise) to get noisy hidden activations and clean hidden
activations respectively
• Decoder reconstructs the clean hidden activations at each layer
from noisy activations
• Ladder Network provide close to 99% accuracy on MNIST test
data with just 100 labeled samples
§ Applications : Customer Behavior Prediction, Credit Scoring, Fraud
Detection, Image Classification, Topic Modeling, Text Summarization
How ladder network works ?
20. C O P Y R I G H T S A P I E N T R A Z O R F I S H | C O N F I D E N T I A L 20
Meta-Learning (Learning to Learn)
§ Meta Learning monitors the automatic learning process
itself, in the context of the learning problems it encounters,
and tries to adapt its behavior to perform better.
§ Supervised learning with data points that are entire
datasets
§ Applications: Few-shot image recognition
How meta-learning works ?
22. C O P Y R I G H T S A P I E N T R A Z O R F I S H | C O N F I D E N T I A L 22
Swarm Intelligence
§ What is Swarm Intelligence?
§ AI technique based on the collective
behavior of decentralized, self-organized
systems
§ Uses a number of agents (particles) that
constitute a swarm moving around in the
search space looking for the best solution
§ Each particle in search space adjusts its
“flying” according to its own flying
experience as well as the flying experience
of other particles
§ Applications: Robotics, fraud analytics
http://www.techferry.com/articles/swarm-intelligence.html