Introduction To Abductive Learning and Neuro-Symbolic (RL)
Introduction To Abductive Learning and Neuro-Symbolic (RL)
cn
Jiacheng Xu
2022.11.17
Outline
www.lamda.nju.edu.cn
http://www.lamda.nju.edu.cn
Abductive learning
www.lamda.nju.edu.cn
NIPS 2019
http://www.lamda.nju.edu.cn
Neuro-based success
www.lamda.nju.edu.cn
http://www.lamda.nju.edu.cn
Treating Reasoning As Perception
www.lamda.nju.edu.cn
http://www.lamda.nju.edu.cn
The Separated Perception And Reasoning
www.lamda.nju.edu.cn
http://www.lamda.nju.edu.cn
Motivation
www.lamda.nju.edu.cn
http://www.lamda.nju.edu.cn
Background
www.lamda.nju.edu.cn
Deduction: Given the rule and the cause, deduce the effect.
Induction: Given a cause and an effect, induce a rule.
Abduction: Given a rule and an effect, abduce a cause.
http://www.lamda.nju.edu.cn
Human Abductive Problem-Solving
www.lamda.nju.edu.cn
Row 8-9
are results
of row 1-7.
Column1 is
conjectures.
Column 2
is based on
conjectures
and know-
ledge.
http://www.lamda.nju.edu.cn
Handwritten Equation Decipherment Task
www.lamda.nju.edu.cn
http://www.lamda.nju.edu.cn
ABL Structure
www.lamda.nju.edu.cn
http://www.lamda.nju.edu.cn
Problem Setting
www.lamda.nju.edu.cn
Given 𝐷𝐷 = {< 𝑥𝑥1 , 𝑦𝑦1 >, . . . , < 𝑥𝑥𝑛𝑛 , 𝑦𝑦𝑛𝑛 >} , domain knowledge base 𝐵𝐵.
The target of abductive learning is to output a hypothesis model 𝐻𝐻 = 𝑝𝑝 ∪ Δ𝐶𝐶 .
• Perception Model:
𝑝𝑝: 𝜒𝜒 → Ρ is mapping from the feature space to primitive symbols.
• Knowledge model:
∆𝐶𝐶 is a set of first-order logical clauses that define the target concept
𝐶𝐶 with 𝐵𝐵
The hypothesis model should satisfy:
http://www.lamda.nju.edu.cn
Instantiation interpretation
www.lamda.nju.edu.cn
http://www.lamda.nju.edu.cn
ABL Structure
www.lamda.nju.edu.cn
http://www.lamda.nju.edu.cn
Instantiation interpretation
www.lamda.nju.edu.cn
1. Machine Learning
Map 𝑥𝑥 to 𝑒𝑒𝑞𝑞0 = [1,1,1,1,1], and ALP cannot abduce a
consistent hypothesis.
2. Consistency Optimization
RACOS will learn a 𝛿𝛿 that marking the “possibly incorrect”
as blank, 𝑒𝑒𝑞𝑞1 = [1, _, 1, _, 1].
3. Logical Abduction
ALP can abduce a consistent hypothesis and list of revised
pseudo-labels 𝑒𝑒𝑞𝑞1 ′ = [1, +, 1, =, 1] for re-training CNN.
http://www.lamda.nju.edu.cn
Performance
www.lamda.nju.edu.cn
http://www.lamda.nju.edu.cn
Module Analysis
www.lamda.nju.edu.cn
1. Transfer the CNN learned from the DBA addition task to XOR
equations constructed by the same characters
2. Transfer the learned knowledge model from RBA to DBA domains
http://www.lamda.nju.edu.cn
Discussion
www.lamda.nju.edu.cn
Superiority
ABL utilises logical abduction and trial-and-error search to bridge
machine learning with original first-order logic, without using gradient.
ABL inherits the full power of first-order logical reasoning (also DL).
Future Direction
Abductive reasoning connects high-level reasoning and low-level
perception;
The dividing line between high-level and low-level is unclear, how to
combine symbolic and sub-symbolic AI more efficiently is still an open
question.
http://www.lamda.nju.edu.cn
VAEL
www.lamda.nju.edu.cn
NIPS 2022
http://www.lamda.nju.edu.cn
Algorithm Overview
www.lamda.nju.edu.cn
http://www.lamda.nju.edu.cn
Probabilistic Logic Programming
www.lamda.nju.edu.cn
http://www.lamda.nju.edu.cn
Downstream Application
www.lamda.nju.edu.cn
http://www.lamda.nju.edu.cn
Experiment
www.lamda.nju.edu.cn
http://www.lamda.nju.edu.cn
Task Generalization
www.lamda.nju.edu.cn
http://www.lamda.nju.edu.cn
Data Efficiency
www.lamda.nju.edu.cn
http://www.lamda.nju.edu.cn
Deep Symbolic RL
www.lamda.nju.edu.cn
http://www.lamda.nju.edu.cn
Motivation
www.lamda.nju.edu.cn
http://www.lamda.nju.edu.cn
Algorithm Architecture
www.lamda.nju.edu.cn
http://www.lamda.nju.edu.cn
Task
www.lamda.nju.edu.cn
http://www.lamda.nju.edu.cn
Symbolic Representations
www.lamda.nju.edu.cn
http://www.lamda.nju.edu.cn
Low-level Symbol Generation
www.lamda.nju.edu.cn
http://www.lamda.nju.edu.cn
Experiment
www.lamda.nju.edu.cn
http://www.lamda.nju.edu.cn
Transfer
www.lamda.nju.edu.cn
http://www.lamda.nju.edu.cn
Discovering Symbolic Policies
www.lamda.nju.edu.cn
ICML 2021
http://www.lamda.nju.edu.cn
Motivation
www.lamda.nju.edu.cn
http://www.lamda.nju.edu.cn
Symbolic Policy
www.lamda.nju.edu.cn
http://www.lamda.nju.edu.cn
Algorithm Overview
www.lamda.nju.edu.cn
http://www.lamda.nju.edu.cn
Policy Generator
www.lamda.nju.edu.cn
Tokens are selected from a library ℒ, e.g. {+,×, 𝑠𝑠𝑠𝑠𝑠𝑠, 𝑠𝑠1 , 𝑠𝑠2 , 0.1,5.0}
So the search is reduced to a discrete sequence.
Use an autoregressive recurrent neural network to generate control
policies represented by tractable mathematical expressions 𝑓𝑓: 𝑆𝑆 → ℝ.
http://www.lamda.nju.edu.cn
Policy Evaluator
www.lamda.nju.edu.cn
http://www.lamda.nju.edu.cn
Experiment
www.lamda.nju.edu.cn
http://www.lamda.nju.edu.cn
Conclusion
www.lamda.nju.edu.cn
http://www.lamda.nju.edu.cn
www.lamda.nju.edu.cn
Thanks!
http://www.lamda.nju.edu.cn