Skip to main content

Showing 1–50 of 54 results for author: Hoang, P

.
  1. arXiv:2407.08439  [pdf, other

    math.NA

    A fitted space-time finite element method for an advection-diffusion problem with moving interfaces

    Authors: Quang Huy Nguyen, Van Chien Le, Phuong Cuc Hoang, Thi Thanh Mai Ta

    Abstract: This paper presents a fitted space-time finite element method for solving a parabolic advection-diffusion problem with a nonstationary interface. The jum** diffusion coefficient gives rise to the discontinuity of the spatial gradient of solution across the interface. We use the Banach-Necas-Babuska theorem to show the well-posedness of the continuous variational problem. A fully discrete finite-… ▽ More

    Submitted 11 July, 2024; originally announced July 2024.

    Comments: 19 pages

  2. arXiv:2407.08185  [pdf, other

    cs.CR cs.CL cs.CY cs.NI

    Automatic Generation of Web Censorship Probe Lists

    Authors: Jenny Tang, Leo Alvarez, Arjun Brar, Nguyen Phong Hoang, Nicolas Christin

    Abstract: Domain probe lists--used to determine which URLs to probe for Web censorship--play a critical role in Internet censorship measurement studies. Indeed, the size and accuracy of the domain probe list limits the set of censored pages that can be detected; inaccurate lists can lead to an incomplete view of the censorship landscape or biased results. Previous efforts to generate domain probe lists have… ▽ More

    Submitted 11 July, 2024; originally announced July 2024.

    Comments: To appear in the Proceedings on Privacy Enhancing Technologies 2024

  3. arXiv:2406.09168  [pdf, other

    eess.IV cs.CV cs.LG

    SR-CACO-2: A Dataset for Confocal Fluorescence Microscopy Image Super-Resolution

    Authors: Soufiane Belharbi, Mara KM Whitford, Phuong Hoang, Shakeeb Murtaza, Luke McCaffrey, Eric Granger

    Abstract: Confocal fluorescence microscopy is one of the most accessible and widely used imaging techniques for the study of biological processes. Scanning confocal microscopy allows the capture of high-quality images from 3D samples, yet suffers from well-known limitations such as photobleaching and phototoxicity of specimens caused by intense light exposure, which limits its use in some applications, espe… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

    Comments: 23 pages, 13 figures

  4. arXiv:2405.01863  [pdf, other

    math.CO

    Generating all invertible matrices by row operations

    Authors: Petr Gregor, Hung P. Hoang, Arturo Merino, Ondřej Mička

    Abstract: We show that all invertible $n \times n$ matrices over any finite field $\mathbb{F}_q$ can be generated in a Gray code fashion. More specifically, there exists a listing such that (1) each matrix appears exactly once, and (2) two consecutive matrices differ by adding or subtracting one row from a previous or subsequent row, or by multiplying or diving a row by the generator of the multiplicative g… ▽ More

    Submitted 3 May, 2024; originally announced May 2024.

    Comments: 20 pages, 6 figures

  5. arXiv:2404.16741  [pdf, other

    cs.DS

    Parameterized Complexity of Efficient Sortation

    Authors: Robert Ganian, Hung P. Hoang, Simon Wietheger

    Abstract: A crucial challenge arising in the design of large-scale logistical networks is to optimize parcel sortation for routing. We study this problem under the recent graph-theoretic formalization of Van Dyk, Klause, Koenemann and Megow (IPCO 2024). The problem asks - given an input digraph D (the fulfillment network) together with a set of commodities represented as source-sink tuples - for a minimum-o… ▽ More

    Submitted 25 April, 2024; originally announced April 2024.

  6. arXiv:2403.15882  [pdf, other

    cs.CL

    VLUE: A New Benchmark and Multi-task Knowledge Transfer Learning for Vietnamese Natural Language Understanding

    Authors: Phong Nguyen-Thuan Do, Son Quoc Tran, Phu Gia Hoang, Kiet Van Nguyen, Ngan Luu-Thuy Nguyen

    Abstract: The success of Natural Language Understanding (NLU) benchmarks in various languages, such as GLUE for English, CLUE for Chinese, KLUE for Korean, and IndoNLU for Indonesian, has facilitated the evaluation of new NLU models across a wide range of tasks. To establish a standardized set of benchmarks for Vietnamese NLU, we introduce the first Vietnamese Language Understanding Evaluation (VLUE) benchm… ▽ More

    Submitted 23 March, 2024; originally announced March 2024.

    Comments: Accepted at NAACL 2024 (Findings)

  7. arXiv:2403.08461  [pdf, other

    cond-mat.str-el

    The Heisenberg-RIXS instrument at the European XFEL

    Authors: Justine Schlappa, Giacomo Ghiringhelli, Benjamin E. Van Kuiken, Martin Teichmann, Piter S. Miedema, Jan Torben Delitz, Natalia Gerasimova, Serguei Molodtsov, Luigi Adriano, Bernard Baranasic, Carsten Broers, Robert Carley, Patrick Gessler, Nahid Ghodrati, David Hickin, Le Phuong Hoang, Manuel Izquierdo, Laurent Mercadier, Giuseppe Mercurio, Sergii Parchenko, Marijan Stupar, Zhong Yin, Leonardo Martinelli, Giacomo Merzoni, Ying Ying Peng , et al. (22 additional authors not shown)

    Abstract: Resonant Inelastic X-ray Scattering (RIXS) is an ideal X-ray spectroscopy method to push the combination of energy and time resolutions to the Fourier transform ultimate limit, because it is unaffected by the core-hole lifetime energy broadening. And in pump-probe experiments the interaction time is made very short by the same core-hole lifetime. RIXS is very photon hungry so it takes great advant… ▽ More

    Submitted 13 March, 2024; originally announced March 2024.

    Comments: 43 pages, 12 figures, Supplemental Material

  8. arXiv:2402.07061  [pdf, other

    cs.DS cs.DM math.CO

    The $k$-Opt algorithm for the Traveling Salesman Problem has exponential running time for $k \ge 5$

    Authors: Sophia Heimann, Hung P. Hoang, Stefan Hougardy

    Abstract: The $k$-Opt algorithm is a local search algorithm for the Traveling Salesman Problem. Starting with an initial tour, it iteratively replaces at most $k$ edges in the tour with the same number of edges to obtain a better tour. Krentel (FOCS 1989) showed that the Traveling Salesman Problem with the $k$-Opt neighborhood is complete for the class PLS (polynomial time local search) and that the $k$-Opt… ▽ More

    Submitted 13 June, 2024; v1 submitted 10 February, 2024; originally announced February 2024.

    Comments: Appeared in ICALP 2024

    MSC Class: 68W25; 68W40; 68Q25; 90C27 ACM Class: F.2.2; G.2.1; G.2.2

  9. arXiv:2401.10044  [pdf, other

    cs.CV

    Deep spatial context: when attention-based models meet spatial regression

    Authors: Paulina Tomaszewska, Elżbieta Sienkiewicz, Mai P. Hoang, Przemysław Biecek

    Abstract: We propose 'Deep spatial context' (DSCon) method, which serves for investigation of the attention-based vision models using the concept of spatial context. It was inspired by histopathologists, however, the method can be applied to various domains. The DSCon allows for a quantitative measure of the spatial context's role using three Spatial Context Measures: $SCM_{features}$, $SCM_{targets}$,… ▽ More

    Submitted 10 March, 2024; v1 submitted 18 January, 2024; originally announced January 2024.

  10. arXiv:2401.07978  [pdf, other

    cond-mat.mtrl-sci

    Noncollinear electric dipoles in a polar, chiral phase of CsSnBr$_3$ perovskite

    Authors: Douglas H. Fabini, Kedar Honasoge, Adi Cohen, Sebastian Bette, Kyle M. McCall, Constantinos C. Stoumpos, Steffen Klenner, Mirjam Zipkat, Le Phuong Hoang, Jürgen Nuss, Reinhard K. Kremer, Mercouri G. Kanatzidis, Omer Yaffe, Stefan Kaiser, Bettina V. Lotsch

    Abstract: Polar and chiral crystal symmetries confer a variety of potentially useful functionalities upon solids by coupling otherwise noninteracting mechanical, electronic, optical, and magnetic degrees of freedom. We describe two unstudied phases of the 3D perovskite, CsSnBr$_3$, which emerge below 85 K due to the formation of Sn(II) lone pairs and their interaction with extant octahedral tilts. Phase II… ▽ More

    Submitted 25 April, 2024; v1 submitted 15 January, 2024; originally announced January 2024.

  11. arXiv:2311.15297  [pdf, other

    cs.LG math.OC

    Controllable Expensive Multi-objective Learning with Warm-starting Bayesian Optimization

    Authors: Quang-Huy Nguyen, Long P. Hoang, Hoang V. Viet, Dung D. Le

    Abstract: Pareto Set Learning (PSL) is a promising approach for approximating the entire Pareto front in multi-objective optimization (MOO) problems. However, existing derivative-free PSL methods are often unstable and inefficient, especially for expensive black-box MOO problems where objective function evaluations are costly. In this work, we propose to address the instability and inefficiency of existing… ▽ More

    Submitted 9 February, 2024; v1 submitted 26 November, 2023; originally announced November 2023.

  12. arXiv:2309.01673  [pdf, ps, other

    cond-mat.mtrl-sci

    Probing the Surface Polarization of Ferroelectric Thin Films by X-ray Standing Waves

    Authors: Le Phuong Hoang, Irena Spasojevic, Tien-Lin Lee, David Pesquera, Kai Rossnagel, Jörg Zegenhagen, Gustau Catalan, Ivan A. Vartanyants, Andreas Scherz, Giuseppe Mercurio

    Abstract: Understanding the mechanisms underlying a stable polarization at the surface of ferroelectric thin films is of particular importance both from a fundamental point of view and to achieve control of the surface polarization itself. In this study, it is demonstrated that the X-ray standing wave technique allows the polarization near the surface of a ferroelectric thin film to be probed directly. The… ▽ More

    Submitted 4 September, 2023; originally announced September 2023.

  13. arXiv:2304.04835  [pdf, other

    cs.CR cs.CY cs.NI

    Measuring and Evading Turkmenistan's Internet Censorship: A Case Study in Large-Scale Measurements of a Low-Penetration Country

    Authors: Sadia Nourin, Van Tran, Xi Jiang, Kevin Bock, Nick Feamster, Nguyen Phong Hoang, Dave Levin

    Abstract: Since 2006, Turkmenistan has been listed as one of the few Internet enemies by Reporters without Borders due to its extensively censored Internet and strictly regulated information control policies. Existing reports of filtering in Turkmenistan rely on a small number of vantage points or test a small number of websites. Yet, the country's poor Internet adoption rates and small population can make… ▽ More

    Submitted 17 April, 2023; v1 submitted 10 April, 2023; originally announced April 2023.

    Comments: To appear in Proceedings of The 2023 ACM Web Conference (WWW 2023)

  14. arXiv:2303.07401  [pdf, other

    cs.CG

    Drawings of Complete Multipartite Graphs Up to Triangle Flips

    Authors: Oswin Aichholzer, Man-Kwun Chiu, Hung P. Hoang, Michael Hoffmann, Jan Kynčl, Yannic Maus, Birgit Vogtenhuber, Alexandra Weinberger

    Abstract: For a drawing of a labeled graph, the rotation of a vertex or crossing is the cyclic order of its incident edges, represented by the labels of their other endpoints. The extended rotation system (ERS) of the drawing is the collection of the rotations of all vertices and crossings. A drawing is simple if each pair of edges has at most one common point. Gioan's Theorem states that for any two simple… ▽ More

    Submitted 13 March, 2023; originally announced March 2023.

    Comments: Abstract shortened for arxiv. This work (without appendix) is available at the 39th International Symposium on Computational Geometry (SoCG 2023)

  15. arXiv:2302.12487  [pdf, other

    math.OC

    A Framework for Controllable Pareto Front Learning with Completed Scalarization Functions and its Applications

    Authors: Tran Anh Tuan, Long P. Hoang, Dung D. Le, Tran Ngoc Thang

    Abstract: Pareto Front Learning (PFL) was recently introduced as an efficient method for approximating the entire Pareto front, the set of all optimal solutions to a Multi-Objective Optimization (MOO) problem. In the previous work, the map** between a preference vector and a Pareto optimal solution is still ambiguous, rendering its results. This study demonstrates the convergence and completion aspects of… ▽ More

    Submitted 13 August, 2023; v1 submitted 24 February, 2023; originally announced February 2023.

    Comments: Under Review at Neural Networks Journal

  16. arXiv:2302.02031  [pdf, other

    cs.LG cs.AI cs.CY cs.NI

    Augmenting Rule-based DNS Censorship Detection at Scale with Machine Learning

    Authors: Jacob Brown, Xi Jiang, Van Tran, Arjun Nitin Bhagoji, Nguyen Phong Hoang, Nick Feamster, Prateek Mittal, Vinod Yegneswaran

    Abstract: The proliferation of global censorship has led to the development of a plethora of measurement platforms to monitor and expose it. Censorship of the domain name system (DNS) is a key mechanism used across different countries. It is currently detected by applying heuristics to samples of DNS queries and responses (probes) for specific destinations. These heuristics, however, are both platform-speci… ▽ More

    Submitted 15 June, 2023; v1 submitted 3 February, 2023; originally announced February 2023.

    Comments: To appear in Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD '23)

  17. arXiv:2301.10186  [pdf, other

    cs.CL

    ViHOS: Hate Speech Spans Detection for Vietnamese

    Authors: Phu Gia Hoang, Canh Duc Luu, Khanh Quoc Tran, Kiet Van Nguyen, Ngan Luu-Thuy Nguyen

    Abstract: The rise in hateful and offensive language directed at other users is one of the adverse side effects of the increased use of social networking platforms. This could make it difficult for human moderators to review tagged comments filtered by classification systems. To help address this issue, we present the ViHOS (Vietnamese Hate and Offensive Spans) dataset, the first human-annotated corpus cont… ▽ More

    Submitted 26 January, 2023; v1 submitted 24 January, 2023; originally announced January 2023.

    Comments: EACL 2023

  18. arXiv:2212.03915  [pdf, other

    math.CO cs.DM

    Combinatorial generation via permutation languages. V. Acyclic orientations

    Authors: Jean Cardinal, Hung P. Hoang, Arturo Merino, Ondřej Mička, Torsten Mütze

    Abstract: In 1993, Savage, Squire, and West described an inductive construction for generating every acyclic orientation of a chordal graph exactly once, flip** one arc at a time. We provide two generalizations of this result. Firstly, we describe Gray codes for acyclic orientations of hypergraphs that satisfy a simple ordering condition, which generalizes the notion of perfect elimination order of graphs… ▽ More

    Submitted 7 December, 2022; originally announced December 2022.

  19. arXiv:2212.01130  [pdf, other

    cs.LG

    Improving Pareto Front Learning via Multi-Sample Hypernetworks

    Authors: Long P. Hoang, Dung D. Le, Tran Anh Tuan, Tran Ngoc Thang

    Abstract: Pareto Front Learning (PFL) was recently introduced as an effective approach to obtain a map** function from a given trade-off vector to a solution on the Pareto front, which solves the multi-objective optimization (MOO) problem. Due to the inherent trade-off between conflicting objectives, PFL offers a flexible approach in many scenarios in which the decision makers can not specify the preferen… ▽ More

    Submitted 28 April, 2023; v1 submitted 2 December, 2022; originally announced December 2022.

    Comments: Accepted to AAAI-23

  20. arXiv:2210.11374  [pdf, other

    cs.CL

    Meeting Decision Tracker: Making Meeting Minutes with De-Contextualized Utterances

    Authors: Shumpei Inoue, Hy Nguyen, Pham Viet Hoang, Tsungwei Liu, Minh-Tien Nguyen

    Abstract: Meetings are a universal process to make decisions in business and project collaboration. The capability to automatically itemize the decisions in daily meetings allows for extensive tracking of past discussions. To that end, we developed Meeting Decision Tracker, a prototype system to construct decision items comprising decision utterance detector (DUD) and decision utterance rewriter (DUR). We s… ▽ More

    Submitted 20 October, 2022; originally announced October 2022.

    Comments: 7 pages, AACL-IJCNLP 2022

  21. On approximating the rank of graph divisors

    Authors: Kristóf Bérczi, Hung P. Hoang, Lilla Tóthmérész

    Abstract: Baker and Norine initiated the study of graph divisors as a graph-theoretic analogue of the Riemann-Roch theory for Riemann surfaces. One of the key concepts of graph divisor theory is the {\it rank} of a divisor on a graph. The importance of the rank is well illustrated by Baker's {\it Specialization lemma}, stating that the dimension of a linear system can only go up under specialization from cu… ▽ More

    Submitted 11 April, 2024; v1 submitted 20 June, 2022; originally announced June 2022.

    Comments: 11 pages, 3 figures

    Journal ref: Discrete Math. 346 (2023), no. 9, Paper No. 113528, 8 pp

  22. arXiv:2206.00524  [pdf, other

    cs.CL cs.AI cs.LG

    Vietnamese Hate and Offensive Detection using PhoBERT-CNN and Social Media Streaming Data

    Authors: Khanh Q. Tran, An T. Nguyen, Phu Gia Hoang, Canh Duc Luu, Trong-Hop Do, Kiet Van Nguyen

    Abstract: Society needs to develop a system to detect hate and offense to build a healthy and safe environment. However, current research in this field still faces four major shortcomings, including deficient pre-processing techniques, indifference to data imbalance issues, modest performance models, and lacking practical applications. This paper focused on develo** an intelligent system capable of addres… ▽ More

    Submitted 1 June, 2022; originally announced June 2022.

  23. arXiv:2202.00663  [pdf, other

    cs.NI cs.CR cs.SI

    Measuring the Accessibility of Domain Name Encryption and Its Impact on Internet Filtering

    Authors: Nguyen Phong Hoang, Michalis Polychronakis, Phillipa Gill

    Abstract: Most online communications rely on DNS to map domain names to their hosting IP address(es). Previous work has shown that DNS-based network interference is widespread due to the unencrypted and unauthenticated nature of the original DNS protocol. In addition to DNS, accessed domain names can also be monitored by on-path observers during the TLS handshake when the SNI extension is used. These linger… ▽ More

    Submitted 1 February, 2022; originally announced February 2022.

    Comments: To appear in Proceedings of the Passive and Active Measurement Conference 2022

  24. Positron Driven High-Field Terahertz Waves in Dielectric Material

    Authors: N. Majernik, G. Andonian, O. B. Williams, B. D. O'Shea, P. D. Hoang, C. Clarke, M. J. Hogan, V. Yakimenko, J. B. Rosenzweig

    Abstract: Advanced acceleration methods based on wakefields generated by high energy electron bunches passing through dielectric-based structures have demonstrated $>$GV/m fields, paving the first steps on a path to applications such as future compact linear colliders. For a collider scenario, it is desirable that, in contrast to plasmas, wakefields in dielectrics do not behave differently for positron and… ▽ More

    Submitted 5 November, 2021; originally announced November 2021.

    Comments: 6 pages, 6 figures

  25. arXiv:2107.14550  [pdf, other

    cs.DS math.OC

    Assistance and Interdiction Problems on Interval Graphs

    Authors: Hung P. Hoang, Stefan Lendl, Lasse Wulf

    Abstract: We introduce a novel framework of graph modifications specific to interval graphs. We study interdiction problems with respect to these graph modifications. Given a list of original intervals, each interval has a replacement interval such that either the replacement contains the original, or the original contains the replacement. The interdictor is allowed to replace up to $k$ original intervals w… ▽ More

    Submitted 30 July, 2021; originally announced July 2021.

  26. Duality-symmetric axion electrodynamics and haloscopes of various geometries

    Authors: Dai-Nam Le, Le Phuong Hoang, Binh Xuan Cao

    Abstract: Within the dual symmetric point of view, the theory for seeking axion dark matter via haloscope experiments is derived by exactly solving the dual symmetric axion electrodynamics equation. Notwithstanding that the conventional theory of axion electrodynamics presented in [Phys. Rev. Lett. 51, 1415 (1983) and J. Phys. A: Math. Gen. 19, L33 (1986)] is more commonly used in haloscope theory, we show… ▽ More

    Submitted 20 August, 2022; v1 submitted 9 July, 2021; originally announced July 2021.

    Comments: 19 pages, 18 figures. Published on Journal of Cosmology and Astroparticle Physics

    Journal ref: Journal of Cosmology and Astroparticle Physics 2022, 039 (2022)

  27. arXiv:2107.00221  [pdf, other

    cs.IR

    Embedding-based Recommender System for Job to Candidate Matching on Scale

    Authors: **g Zhao, **gya Wang, Madhav Sigdel, Bopeng Zhang, Phuong Hoang, Mengshu Liu, Mohammed Korayem

    Abstract: The online recruitment matching system has been the core technology and service platform in CareerBuilder. One of the major challenges in an online recruitment scenario is to provide good matches between job posts and candidates using a recommender system on the scale. In this paper, we discussed the techniques for applying an embedding-based recommender system for the large scale of job to candid… ▽ More

    Submitted 1 July, 2021; originally announced July 2021.

    Comments: 8 pages

  28. arXiv:2106.02167  [pdf, other

    cs.CR cs.CY cs.NI cs.SI

    How Great is the Great Firewall? Measuring China's DNS Censorship

    Authors: Nguyen Phong Hoang, Arian Akhavan Niaki, Jakub Dalek, Jeffrey Knockel, Pellaeon Lin, Bill Marczak, Masashi Crete-Nishihata, Phillipa Gill, Michalis Polychronakis

    Abstract: The DNS filtering apparatus of China's Great Firewall (GFW) has evolved considerably over the past two decades. However, most prior studies of China's DNS filtering were performed over short time periods, leading to unnoticed changes in the GFW's behavior. In this study, we introduce GFWatch, a large-scale, longitudinal measurement platform capable of testing hundreds of millions of domains daily,… ▽ More

    Submitted 3 June, 2021; originally announced June 2021.

    Comments: To appear at the 30th USENIX Security Symposium

  29. arXiv:2105.08693  [pdf, other

    cs.DM math.CO

    Conflict-Free Coloring: Graphs of Bounded Clique Width and Intersection Graphs

    Authors: Sriram Bhyravarapu, Tim A. Hartmann, Hung P. Hoang, Subrahmanyam Kalyanasundaram, I. Vinod Reddy

    Abstract: A conflict-free coloring of a graph $G$ is a (partial) coloring of its vertices such that every vertex $u$ has a neighbor whose assigned color is unique in the neighborhood of $u$. There are two variants of this coloring, one defined using the open neighborhood and one using the closed neighborhood. For both variants, we study the problem of deciding whether the conflict-free coloring of a given g… ▽ More

    Submitted 11 March, 2024; v1 submitted 18 May, 2021; originally announced May 2021.

    Comments: Accepted in Algorithmica

  30. arXiv:2104.07376  [pdf, other

    cs.CL

    UIT-E10dot3 at SemEval-2021 Task 5: Toxic Spans Detection with Named Entity Recognition and Question-Answering Approaches

    Authors: Phu Gia Hoang, Luan Thanh Nguyen, Kiet Van Nguyen

    Abstract: The increment of toxic comments on online space is causing tremendous effects on other vulnerable users. For this reason, considerable efforts are made to deal with this, and SemEval-2021 Task 5: Toxic Spans Detection is one of those. This task asks competitors to extract spans that have toxicity from the given texts, and we have done several analyses to understand its structure before doing exper… ▽ More

    Submitted 15 April, 2021; originally announced April 2021.

    Comments: Accepted at SemEval-2021 Task 5: Toxic Spans Detection, ACL-IJCNLP 2021

  31. arXiv:2102.08332  [pdf, other

    cs.CR cs.NI

    Domain Name Encryption Is Not Enough: Privacy Leakage via IP-based Website Fingerprinting

    Authors: Nguyen Phong Hoang, Arian Akhavan Niaki, Phillipa Gill, Michalis Polychronakis

    Abstract: Although the security benefits of domain name encryption technologies such as DNS over TLS (DoT), DNS over HTTPS (DoH), and Encrypted Client Hello (ECH) are clear, their positive impact on user privacy is weakened by--the still exposed--IP address information. However, content delivery networks, DNS-based load balancing, co-hosting of different websites on the same server, and IP address churn, al… ▽ More

    Submitted 16 June, 2021; v1 submitted 16 February, 2021; originally announced February 2021.

    Comments: To appear in Proceedings of the 21st Privacy Enhancing Technologies Symposium (PETS 2021)

  32. arXiv:2102.06427  [pdf, other

    cs.DS

    A Subexponential Algorithm for ARRIVAL

    Authors: Bernd Gärtner, Sebastian Haslebacher, Hung P. Hoang

    Abstract: The ARRIVAL problem is to decide the fate of a train moving along the edges of a directed graph, according to a simple (deterministic) pseudorandom walk. The problem is in $NP \cap coNP$ but not known to be in $P$. The currently best algorithms have runtime $2^{Θ(n)}$ where $n$ is the number of vertices. This is not much better than just performing the pseudorandom walk. We develop a subexponentia… ▽ More

    Submitted 9 April, 2021; v1 submitted 12 February, 2021; originally announced February 2021.

    Comments: 13 pages, 1 figure Added a reference

    MSC Class: 05C57; 05C85; 68Q25; 68W05; 91A46 ACM Class: F.2.2; G.2.2

  33. arXiv:2004.04623  [pdf, other

    cs.NI cs.CR

    The Web is Still Small After More Than a Decade

    Authors: Nguyen Phong Hoang, Arian Akhavan Niaki, Michalis Polychronakis, Phillipa Gill

    Abstract: Understanding web co-location is essential for various reasons. For instance, it can help one to assess the collateral damage that denial-of-service attacks or IP-based blocking can cause to the availability of co-located web sites. However, it has been more than a decade since the first study was conducted in 2007. The Internet infrastructure has changed drastically since then, necessitating a re… ▽ More

    Submitted 9 April, 2020; originally announced April 2020.

    Comments: ACM SIGCOMM Computer Communication Review, Volume 50, Issue 2, April 2020

  34. K-resolver: Towards Decentralizing Encrypted DNS Resolution

    Authors: Nguyen Phong Hoang, Ivan Lin, Seyedhamed Ghavamnia, Michalis Polychronakis

    Abstract: Centralized DNS over HTTPS/TLS (DoH/DoT) resolution, which has started being deployed by major hosting providers and web browsers, has sparked controversy among Internet activists and privacy advocates due to several privacy concerns. This design decision causes the trace of all DNS resolutions to be exposed to a third-party resolver, different than the one specified by the user's access network.… ▽ More

    Submitted 17 February, 2020; v1 submitted 24 January, 2020; originally announced January 2020.

    Comments: NDSS Workshop on Measurements, Attacks, and Defenses for the Web (MADWeb) 2020

  35. arXiv:1911.12078  [pdf, other

    math.CO

    Combinatorial generation via permutation languages. II. Lattice congruences

    Authors: Hung Phuc Hoang, Torsten Mütze

    Abstract: This paper deals with lattice congruences of the weak order on the symmetric group, and initiates the investigation of the cover graphs of the corresponding lattice quotients. These graphs also arise as the skeleta of the so-called quotientopes, a family of polytopes recently introduced by Pilaud and Santos [Bull. Lond. Math. Soc., 51:406-420, 2019], which generalize permutahedra, associahedra, hy… ▽ More

    Submitted 2 December, 2022; v1 submitted 27 November, 2019; originally announced November 2019.

  36. Assessing the Privacy Benefits of Domain Name Encryption

    Authors: Nguyen Phong Hoang, Arian Akhavan Niaki, Nikita Borisov, Phillipa Gill, Michalis Polychronakis

    Abstract: As Internet users have become more savvy about the potential for their Internet communication to be observed, the use of network traffic encryption technologies (e.g., HTTPS/TLS) is on the rise. However, even when encryption is enabled, users leak information about the domains they visit via DNS queries and via the Server Name Indication (SNI) extension of TLS. Two recent proposals to ameliorate t… ▽ More

    Submitted 8 July, 2020; v1 submitted 1 November, 2019; originally announced November 2019.

    Comments: In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS '20), October 5-9, 2020, Taipei, Taiwan

  37. arXiv:1907.11086  [pdf, other

    cs.LG cs.IR stat.ML

    Automated Discovery and Classification of Training Videos for Career Progression

    Authors: Alan Chern, Phuong Hoang, Madhav Sigdel, Janani Balaji, Mohammed Korayem

    Abstract: Job transitions and upskilling are common actions taken by many industry working professionals throughout their career. With the current rapidly changing job landscape where requirements are constantly changing and industry sectors are emerging, it is especially difficult to plan and navigate a predetermined career path. In this work, we implemented a system to automate the collection and classifi… ▽ More

    Submitted 23 July, 2019; originally announced July 2019.

    Comments: 5 pages, 4 figures, Proceedings of the Data Collection, Curation, and Labeling for Mining and Learning

  38. arXiv:1907.10263  [pdf

    physics.geo-ph

    Seismic performance of an infilled moment-resisting steel frame during the 2016 Central Italy Earthquake

    Authors: Phan Hoang Nam, Fabrizio Paolacci, Phuong Hoa Hoang

    Abstract: A sequence of earthquakes occurred between the end of August 2016 and the end of October 2016 in Central Italy causing significant damage and major disruption in a wide area. The sequence of events is composed of five events with magnitude between Mw 5.5 to 6.5. As a consequence, numerous residential buildings in the affected area was not particularly resistant to the shaking, resulting in the col… ▽ More

    Submitted 24 July, 2019; originally announced July 2019.

  39. arXiv:1907.07120  [pdf, other

    cs.CY cs.NI cs.SI

    Measuring I2P Censorship at a Global Scale

    Authors: Nguyen Phong Hoang, Sadie Doreen, Michalis Polychronakis

    Abstract: The prevalence of Internet censorship has prompted the creation of several measurement platforms for monitoring filtering activities. An important challenge faced by these platforms revolves around the trade-off between depth of measurement and breadth of coverage. In this paper, we present an opportunistic censorship measurement infrastructure built on top of a network of distributed VPN servers… ▽ More

    Submitted 16 July, 2019; originally announced July 2019.

    Comments: To appear in Proceedings of the 9th USENIX Workshop on Free and Open Communications on the Internet (FOCI '19). San Francisco, CA. May 2020

  40. arXiv:1907.04245  [pdf, other

    cs.CR cs.CY cs.NI cs.SI

    ICLab: A Global, Longitudinal Internet Censorship Measurement Platform

    Authors: Arian Akhavan Niaki, Shinyoung Cho, Zachary Weinberg, Nguyen Phong Hoang, Abbas Razaghpanah, Nicolas Christin, Phillipa Gill

    Abstract: Researchers have studied Internet censorship for nearly as long as attempts to censor contents have taken place. Most studies have however been limited to a short period of time and/or a few countries; the few exceptions have traded off detail for breadth of coverage. Collecting enough data for a comprehensive, global, longitudinal perspective remains challenging. In this work, we present ICLab, a… ▽ More

    Submitted 10 July, 2019; v1 submitted 9 July, 2019; originally announced July 2019.

    Comments: To appear in Proceedings of the 41st IEEE Symposium on Security and Privacy (Oakland 2020). San Francisco, CA. May 2020

  41. arXiv:1906.06069  [pdf, other

    cs.DM math.CO

    Combinatorial generation via permutation languages. I. Fundamentals

    Authors: Elizabeth Hartung, Hung Phuc Hoang, Torsten Mütze, Aaron Williams

    Abstract: In this work we present a general and versatile algorithmic framework for exhaustively generating a large variety of different combinatorial objects, based on encoding them as permutations. This approach provides a unified view on many known results and allows us to prove many new ones. In particular, we obtain four classical Gray codes for permutations, bitstrings, binary trees and set partitions… ▽ More

    Submitted 3 November, 2021; v1 submitted 14 June, 2019; originally announced June 2019.

  42. arXiv:1902.05972  [pdf, ps, other

    math.AG math.OC

    Fedoryuk values and stability of global Hölderian error bounds for polynomial functions

    Authors: Huy-Vui Hà, Phi-Dũng Hoàng

    Abstract: Let $f$ be a polynomial function of $n$ variables. In this paper, we study stability of global Hölderian error bound for a nonempty sublevel set $[f \le t]$ under a perturbation of $t$. In this paper, we give: * Criteria for the existence of a global Hölderian error bound of $[f \le t]$; * Formulas for computing explicitly the set… ▽ More

    Submitted 16 October, 2019; v1 submitted 15 February, 2019; originally announced February 2019.

    Comments: Minor revisions

    MSC Class: 49K40; 90C26; 14P

  43. An Empirical Study of the I2P Anonymity Network and its Censorship Resistance

    Authors: Nguyen Phong Hoang, Panagiotis Kintis, Manos Antonakakis, Michalis Polychronakis

    Abstract: Tor and I2P are well-known anonymity networks used by many individuals to protect their online privacy and anonymity. Tor's centralized directory services facilitate the understanding of the Tor network, as well as the measurement and visualization of its structure through the Tor Metrics project. In contrast, I2P does not rely on centralized directory servers, and thus obtaining a complete view o… ▽ More

    Submitted 25 September, 2018; v1 submitted 24 September, 2018; originally announced September 2018.

    Comments: 14 pages, To appear in the 2018 Internet Measurement Conference (IMC'18)

  44. arXiv:1711.00974  [pdf

    physics.acc-ph

    An inverse free electron laser acceleration-driven Compton scattering X-ray source

    Authors: I. Gadjev, N. Sudar, M. Babzien, J. Duris, P. Hoang, M. Fedurin, K. Kusche, R. Malone, P. Musumeci, M. Palmer, I. Pogorelsky, M. Polyanskiy, Y. Sakai, C. Swinson, O. Williams, J. B. Rosenzweig

    Abstract: The generation of X-rays and γ-rays based on synchrotron radiation from free electrons, emitted in magnet arrays such as undulators, forms the basis of much of modern X-ray science. This approach has the drawback of requiring very high energy, up to the multi-GeV-scale, electron beams, to obtain the required photon energy. Due to the limit in accelerating gradients in conventional particle acceler… ▽ More

    Submitted 2 November, 2017; originally announced November 2017.

    Comments: 13 pages, 5 figures

  45. arXiv:1710.08115  [pdf, ps, other

    math.OC

    Distributed Constrained Optimization over Networked Systems via A Singular Perturbation Method

    Authors: Phuong Huu Hoang, Hyo-Sung Ahn

    Abstract: This paper studies a constrained optimization problem over networked systems with an undirected and connected communication topology. The algorithm proposed in this work utilizes singular perturbation, dynamic average consensus, and saddle point dynamics methods to tackle the problem for a general class of objective function and affine constraints in a fully distributed manner. It is shown that th… ▽ More

    Submitted 23 October, 2017; originally announced October 2017.

    Comments: 8 pages

  46. Topological invariants of plane curve singularities: Polar quotients and Łojasiewicz gradient exponents

    Authors: Hong-Duc Nguyen, Tien-Son Pham, Phi-Dung Hoang

    Abstract: In this paper, we study polar quotients and Łojasiewicz exponents of plane curve singularities, which are {\em not necessarily reduced}. We first show that the polar quotients is a topological invariant. We next prove that the Łojasiewicz gradient exponent can be computed in terms of the polar quotients, and so it is also a topological invariant. As an application, we give effective estimates of t… ▽ More

    Submitted 28 August, 2017; originally announced August 2017.

    Comments: 19 pages, 3 figures

    Report number: 30

    Journal ref: International Journal of Mathematics, 2019

  47. Experimental characterization of electron beam driven wakefield modes in a dielectric woodpile Cartesian symmetric structure

    Authors: P. D. Hoang, G. Andonian, I. Gadjev, B. Naranjo, Y. Sakai, N. Sudar, O. Williams, M. Fedurin, K. Kusche, C. Swinson, J. B. Rosenzweig

    Abstract: The use of photonic structures in the terahertz (THz) spectral region may enable the essential characteristics of confinement, modal control, and electric field shielding for very high gradient accelerators based on wakefields in dielectrics. We report here an experimental investigation of THz wakefield modes in a 3D photonic woodpile structure. Selective control in exciting or suppressing of wake… ▽ More

    Submitted 31 July, 2017; originally announced August 2017.

    Comments: Submitted to the Physical Review Letters

    Journal ref: Phys. Rev. Lett. 120, 164801 (2018)

  48. Single shot, double differential spectral measurements of inverse Compton scattering in linear and nonlinear regimes

    Authors: Y. Sakai, I. Gadjev, P. Hoang, N. Majernik, A. Nause, A. Fukusawa, O. Williams, M. Fedurin, B. Malone, C. Swinson, K. Kusche, M. Polyanski, M. Babzien, M. Montemagno, Z. Zhong, P. Siddons, I. Pogorelsky, V. Yakimenko, T. Kumita, Y. Kamiya, J. B. Rosenzweig

    Abstract: Inverse Compton scattering (ICS) is a unique mechanism for producing fast pulses - picosecond and below - of bright X- to gamma-rays. These nominally narrow spectral bandwidth electromagnetic radiation pulses are efficiently produced in the interaction between intense, well-focused electron and laser beams. The spectral characteristics of such sources are affected by many experimental parameters,… ▽ More

    Submitted 2 January, 2017; originally announced January 2017.

    Comments: 12 pages, submitted to Physical Review Accelerators and Beams

  49. arXiv:1610.02065  [pdf

    cs.CR

    Towards an Autonomous System Monitor for Mitigating Correlation Attacks in the Tor Network

    Authors: Nguyen Phong Hoang

    Abstract: After carefully considering the scalability problem in Tor and exhaustively evaluating related works on AS-level adversaries, the author proposes ASmoniTor, which is an autonomous system monitor for mitigating correlation attacks in the Tor network. In contrast to prior works, which often released offline packets, including the source code of a modified Tor client and a snapshot of the Internet to… ▽ More

    Submitted 6 October, 2016; originally announced October 2016.

    Comments: Master's thesis

  50. Your Neighbors Are My Spies: Location and other Privacy Concerns in GLBT-focused Location-based Dating Applications

    Authors: Nguyen Phong Hoang, Yasuhito Asano, Masatoshi Yoshikawa

    Abstract: Trilateration is one of the well-known threat models to the user's location privacy in location-based apps, especially those contain highly sensitive information such as dating apps. The threat model mainly bases on the publicly shown distance from a targeted victim to the adversary to pinpoint the victim's location. As a countermeasure, most of location-based apps have already implemented the 'hi… ▽ More

    Submitted 20 April, 2016; originally announced April 2016.

    Comments: This work is a follow-up to arXiv:1604.07850, and is being submitted to the ICACT Transactions on Advanced Communications Technology, thus not a final version of this study