Skip to main content

Showing 1–5 of 5 results for author: Epema, D

.
  1. arXiv:2405.14961  [pdf, other

    cs.CV cs.LG

    SFDDM: Single-fold Distillation for Diffusion models

    Authors: Chi Hong, Jiyue Huang, Robert Birke, Dick Epema, Stefanie Roos, Lydia Y. Chen

    Abstract: While diffusion models effectively generate remarkable synthetic images, a key limitation is the inference inefficiency, requiring numerous sampling steps. To accelerate inference and maintain high-quality synthesis, teacher-student distillation is applied to compress the diffusion models in a progressive and binary manner by retraining, e.g., reducing the 1024-step model to a 128-step model in 3… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

  2. arXiv:2310.04058  [pdf, other

    cs.GT cs.CE

    Game-Theoretic Analysis of (Non-)Refundable Fees in the Lightning Network

    Authors: Satwik Prabhu Kumble, Dick Epema, Stefanie Roos

    Abstract: In PCNs, nodes that forward payments between a source and a receiver are paid a small fee if the payment is successful. The fee is a compensation for temporarily committing funds to the payment. However, payments may fail due to insufficient funds or attacks, often after considerable delays of up to several days, leaving a node without compensation. Furthermore, attackers can intentionally cause f… ▽ More

    Submitted 6 October, 2023; originally announced October 2023.

  3. How Lightning's Routing Diminishes its Anonymity

    Authors: Satwik Prabhu Kumble, Dick Epema, Stefanie Roos

    Abstract: The system shows the error of "Bad character(s) in field Abstract" for no reason. Please refer to manuscript for the full abstract

    Submitted 21 July, 2021; originally announced July 2021.

    Comments: 10 pages, 4 figures, 1 table, The 16th International Conference on Availability, Reliability and Security (ARES 2021), August 17--20, 2021, Vienna, Austria

  4. arXiv:2010.14149  [pdf, other

    cs.LG

    Active Learning for Noisy Data Streams Using Weak and Strong Labelers

    Authors: Taraneh Younesian, Dick Epema, Lydia Y. Chen

    Abstract: Labeling data correctly is an expensive and challenging task in machine learning, especially for on-line data streams. Deep learning models especially require a large number of clean labeled data that is very difficult to acquire in real-world problems. Choosing useful data samples to label while minimizing the cost of labeling is crucial to maintain efficiency in the training process. When confro… ▽ More

    Submitted 27 October, 2020; originally announced October 2020.

  5. A Truly Self-Sovereign Identity System

    Authors: Quinten Stokkink, Georgy Ishmaev, Dick Epema, Johan Pouwelse

    Abstract: Existing digital identity management systems fail to deliver the desirable properties of control by the users of their own identity data, credibility of disclosed identity data, and network-level anonymity. The recently proposed Self-Sovereign Identity (SSI) approach promises to give users these properties. However, we argue that without addressing privacy at the network level, SSI systems cannot… ▽ More

    Submitted 28 September, 2021; v1 submitted 1 July, 2020; originally announced July 2020.

    Comments: Accepted for publication at the 46th IEEE Conference on Local Computer Networks (LCN), October 4-7, 2021