By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: SAGE Net Ablation Study: Analyzing the Impact of Input Sequence Length on Performance | HackerNoon
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > SAGE Net Ablation Study: Analyzing the Impact of Input Sequence Length on Performance | HackerNoon
Computing

SAGE Net Ablation Study: Analyzing the Impact of Input Sequence Length on Performance | HackerNoon

News Room
Last updated: 2025/11/05 at 8:16 PM
News Room Published 5 November 2025
Share
SAGE Net Ablation Study: Analyzing the Impact of Input Sequence Length on Performance | HackerNoon
SHARE

Table of Links

Abstract and 1 Introduction

  1. Related works

  2. Problem setting

  3. Methodology

    4.1. Decision boundary-aware distillation

    4.2. Knowledge consolidation

  4. Experimental results and 5.1. Experiment Setup

    5.2. Comparison with SOTA methods

    5.3. Ablation study

  5. Conclusion and future work and References

Supplementary Material

  1. Details of the theoretical analysis on KCEMA mechanism in IIL
  2. Algorithm overview
  3. Dataset details
  4. Implementation details
  5. Visualization of dusted input images
  6. More experimental results

5.2. Comparison with SOTA methods

Tab. 1 shows the test performance of different methods on the Cifar-100 and ImageNet-100. The proposed method achieves the best performance promotion after ten consecutive IIL tasks by a large margin with a low forgetting rate. Although ISL [13] which is proposed for a similar setting of learning from new sub-categories has a low forgetting rate, it fails on the new requirement of model enhancement. Attain a better performance on the test data is more important than forgetting on a certain data.

In the new IIL setting, all rehearsal-based methods including iCarl [22], PODNet [4], Der [31] and OnPro [29], not perform well. Old exemplars can cause memory overfitting and model bias [35]. Thus, limited old exemplars not always have a positive influence to the stability and plasticity [26], especially in the IIL task. Forgetting rate of rehearsal-based methods is high compared to other methods, which also explains their performance degradation on the test data. Detailed performance at each learning phase is shown in Fig. 4. Compared to other methods that struggle in resisting forgetting, our method is the only one that stably promotes the existing model on both of the two datasets.

Following ISL [13], we further apply our method on the incremental sub-population learning as shown in Tab. 2. Sub-population incremental learning is a special case of the IIL where new knowledge comes from the new subclasses. Compared to the SOTA ISL [13], our method is notably superior in learning new subclasses over long incremental steps with a comparable small forgetting rate. Noteworthy, ISL [13] use Continual Hyperparameter Framework (CHF) [3] searching the best learning rate (such as low to 0.005 in 15-step task) for each setting. While our method learns utilizing ISL pretrained base model with a fixed learning rate (0.05). Low learning rate in ISL reduces the forgetting but hinders the new knowledge learning. The proposed method well balances learning new from unseen subclasses and resisting forgetting on seen classes.

:::info
Authors:

(1) Qiang Nie, Hong Kong University of Science and Technology (Guangzhou);

(2) Weifu Fu, Tencent Youtu Lab;

(3) Yuhuan Lin, Tencent Youtu Lab;

(4) Jialin Li, Tencent Youtu Lab;

(5) Yifeng Zhou, Tencent Youtu Lab;

(6) Yong Liu, Tencent Youtu Lab;

(7) Qiang Nie, Hong Kong University of Science and Technology (Guangzhou);

(8) Chengjie Wang, Tencent Youtu Lab.

:::


:::info
This paper is available on arxiv under CC BY-NC-ND 4.0 Deed (Attribution-Noncommercial-Noderivs 4.0 International) license.

:::

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Today's NYT Strands Hints, Answer and Help for Nov. 6 #613 – CNET Today's NYT Strands Hints, Answer and Help for Nov. 6 #613 – CNET
Next Article Moment two eerie flashes erupt from surface of the MOON in haunting footage Moment two eerie flashes erupt from surface of the MOON in haunting footage
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Robot Vacuum Deals For March: Clean Floors, Full Dust Bins, Can’t Lose
Robot Vacuum Deals For March: Clean Floors, Full Dust Bins, Can’t Lose
News
Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection
Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection
Computing
Convenience stores were an emblem of Japan. Until the demographic crisis has revealed the dark side of opening 24 hours
Convenience stores were an emblem of Japan. Until the demographic crisis has revealed the dark side of opening 24 hours
Mobile
KiiBoom Cybrix 16 review: 16 keys, tons of usefulness
KiiBoom Cybrix 16 review: 16 keys, tons of usefulness
News

You Might also Like

Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection
Computing

Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection

3 Min Read
Xiaohongshu acquires China payment license via full takeover of Oriental Electronic Payment · TechNode
Computing

Xiaohongshu acquires China payment license via full takeover of Oriental Electronic Payment · TechNode

1 Min Read
Public GPTs and ChatGPT community – Chat GPT AI Hub
Computing

Public GPTs and ChatGPT community – Chat GPT AI Hub

39 Min Read
Blizzard opens pre-orders for Diablo II: Resurrected in China, no-wipe test begins August 27 · TechNode
Computing

Blizzard opens pre-orders for Diablo II: Resurrected in China, no-wipe test begins August 27 · TechNode

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?