Skip to main content

Showing 1–23 of 23 results for author: Hoang, V T

.
  1. arXiv:2404.18199  [pdf, other

    eess.IV cs.CV

    Rethinking Attention Gated with Hybrid Dual Pyramid Transformer-CNN for Generalized Segmentation in Medical Imaging

    Authors: Fares Bougourzi, Fadi Dornaika, Abdelmalik Taleb-Ahmed, Vinh Truong Hoang

    Abstract: Inspired by the success of Transformers in Computer vision, Transformers have been widely investigated for medical imaging segmentation. However, most of Transformer architecture are using the recent transformer architectures as encoder or as parallel encoder with the CNN encoder. In this paper, we introduce a novel hybrid CNN-Transformer segmentation architecture (PAG-TransYnet) designed for effi… ▽ More

    Submitted 28 April, 2024; originally announced April 2024.

  2. arXiv:2401.16176  [pdf, other

    cs.LG cs.AI

    A Survey on Structure-Preserving Graph Transformers

    Authors: Van Thuy Hoang, O-Joun Lee

    Abstract: The transformer architecture has shown remarkable success in various domains, such as natural language processing and computer vision. When it comes to graph learning, transformers are required not only to capture the interactions between pairs of nodes but also to preserve graph structures connoting the underlying relations and proximity between them, showing the expressive power to capture diffe… ▽ More

    Submitted 29 January, 2024; originally announced January 2024.

    Comments: 12

  3. arXiv:2401.03748  [pdf, other

    cs.LG cs.CR cs.DC cs.IR

    Towards Efficient Communication and Secure Federated Recommendation System via Low-rank Training

    Authors: Ngoc-Hieu Nguyen, Tuan-Anh Nguyen, Tuan Nguyen, Vu Tien Hoang, Dung D. Le, Kok-Seng Wong

    Abstract: Federated Recommendation (FedRec) systems have emerged as a solution to safeguard users' data in response to growing regulatory concerns. However, one of the major challenges in these systems lies in the communication costs that arise from the need to transmit neural network models between user devices and a central server. Prior approaches to these challenges often lead to issues such as computat… ▽ More

    Submitted 28 February, 2024; v1 submitted 8 January, 2024; originally announced January 2024.

    Comments: 12 pages, 6 figures, 4 tables

  4. arXiv:2312.16788  [pdf, other

    cs.LG cs.AI cs.SI

    Mitigating Degree Biases in Message Passing Mechanism by Utilizing Community Structures

    Authors: Van Thuy Hoang, O-Joun Lee

    Abstract: This study utilizes community structures to address node degree biases in message-passing (MP) via learnable graph augmentations and novel graph transformers. Recent augmentation-based methods showed that MP neural networks often perform poorly on low-degree nodes, leading to degree biases due to a lack of messages reaching low-degree nodes. Despite their success, most methods use heuristic or uni… ▽ More

    Submitted 27 December, 2023; originally announced December 2023.

    Comments: 11

  5. arXiv:2309.03219  [pdf, other

    cs.AI cs.CL cs.LG

    Companion Animal Disease Diagnostics based on Literal-aware Medical Knowledge Graph Representation Learning

    Authors: Van Thuy Hoang, Sang Thanh Nguyen, Sangmyeong Lee, Jooho Lee, Luong Vuong Nguyen, O-Joun Lee

    Abstract: Knowledge graph (KG) embedding has been used to benefit the diagnosis of animal diseases by analyzing electronic medical records (EMRs), such as notes and veterinary records. However, learning representations to capture entities and relations with literal information in KGs is challenging as the KGs show heterogeneous properties and various types of literal information. Meanwhile, the existing met… ▽ More

    Submitted 31 August, 2023; originally announced September 2023.

    Comments: 16 pages

  6. arXiv:2308.09517  [pdf, other

    cs.LG cs.SI

    Transitivity-Preserving Graph Representation Learning for Bridging Local Connectivity and Role-based Similarity

    Authors: Van Thuy Hoang, O-Joun Lee

    Abstract: Graph representation learning (GRL) methods, such as graph neural networks and graph transformer models, have been successfully used to analyze graph-structured data, mainly focusing on node classification and link prediction tasks. However, the existing studies mostly only consider local connectivity while ignoring long-range connectivity and the roles of nodes. In this paper, we propose Unified… ▽ More

    Submitted 18 August, 2023; originally announced August 2023.

    Comments: 13 pages

  7. arXiv:2305.11502  [pdf

    physics.optics

    Observation of Brillouin scattering in a high-index doped silica chip waveguide

    Authors: M. Zerbib, V. T. Hoang, J. C. Beugnot, K. P. Huy, B. Little, S. T. Chu, D. J. Moss, R. Morandotti, B. Wetzel, T. Sylvestre

    Abstract: We report the observation of Brillouin backscattering in a 50-cm long spiral high-index doped silica chip waveguide and measured a Brillouin frequency shift of 16 GHz which is in very good agreement with theoretical predictions and numerical simulations based on the elastodynamics equation.

    Submitted 19 May, 2023; originally announced May 2023.

    Comments: 5 pages, 6 figures

  8. arXiv:2304.13195  [pdf, other

    cs.LG cs.SI

    Connector 0.5: A unified framework for graph representation learning

    Authors: Thanh Sang Nguyen, Jooho Lee, Van Thuy Hoang, O-Joun Lee

    Abstract: Graph representation learning models aim to represent the graph structure and its features into low-dimensional vectors in a latent space, which can benefit various downstream tasks, such as node classification and link prediction. Due to its powerful graph data modelling capabilities, various graph embedding models and libraries have been proposed to learn embeddings and help researchers ease con… ▽ More

    Submitted 25 April, 2023; originally announced April 2023.

    Comments: An unified framework for graph representation learning

  9. arXiv:2206.04324  [pdf

    physics.optics

    Optimizing supercontinuum spectro-temporal properties by leveraging machine learning towards multi-photon microscopy

    Authors: Van Thuy Hoang, Yassin Boussafa, Lynn Sader, Sébastien Février, Vincent Couderc, Benjamin Wetzel

    Abstract: Multi-photon microscopy has played a significant role in biological imaging since it allows to observe living tissues with improved penetration depth and excellent sectioning effect. Multi-photon microscopy relies on multi-photon absorption, enabling the use of different imaging modalities that strongly depends on the properties of the sample structure, the selected fluorophore and the excitation… ▽ More

    Submitted 9 June, 2022; originally announced June 2022.

    Comments: Submitted version - Under review

  10. Enhanced Teaching-Learning-based Optimization for 3D Path Planning of Multicopter UAVs

    Authors: Van Truong Hoang, Manh Duong Phung

    Abstract: This paper introduces a new path planning algorithm for unmanned aerial vehicles (UAVs) based on the teaching-learning-based optimization (TLBO) technique. We first define an objective function that incorporates requirements on the path length and constraints on the movement and safe operation of UAVs to convert the path planning into an optimization problem. The optimization algorithm named Multi… ▽ More

    Submitted 31 May, 2022; originally announced May 2022.

    Comments: Proceedings of the International Conference on Advanced Mechanical Engineering, Automation, and Sustainable Development 2021 (AMAS2021)

    Journal ref: Lecture Notes in Mechanical Engineering, 2022

  11. arXiv:2010.06471  [pdf, ps, other

    cs.DC cs.CR

    CryptMPI: A Fast Encrypted MPI Library

    Authors: Abu Naser, Cong Wu, Mehran Sadeghi Lahijani, Mohsen Gavahi, Viet Tung Hoang, Zhi Wang, Xin Yuan

    Abstract: The cloud infrastructure must provide security for High-Performance Computing (HPC) applications of sensitive data to execute in such an environment. However, supporting security in the communication infrastructure of today's public cloud is challenging, because current networks for data centers are so fast that adding encryption can incur very significant overheads. In this work, we introduce Cry… ▽ More

    Submitted 2 November, 2020; v1 submitted 13 October, 2020; originally announced October 2020.

    Comments: Updated system description, format changed

  12. arXiv:2010.06139  [pdf, ps, other

    cs.DC cs.CR

    Performance Evaluation and Modeling of Cryptographic Libraries for MPI Communications

    Authors: Abu Naser, Mehran Sadeghi Lahijani, Cong Wu, Mohsen Gavahi, Viet Tung Hoang, Zhi Wang, Xin Yuan

    Abstract: In order for High-Performance Computing (HPC) applications with data security requirements to execute in the public cloud, the cloud infrastructure must ensure the privacy and integrity of data. To meet this goal, we consider incorporating encryption in the Message Passing Interface (MPI) library. We empirically evaluate four contemporary cryptographic libraries, OpenSSL, BoringSSL, Libsodium, and… ▽ More

    Submitted 12 October, 2020; originally announced October 2020.

    Comments: Under review - IEEE Transactions on Dependable and Secure Computing (TDSC). 12 figures, 11 tables, and 16 pages

  13. arXiv:1909.03352  [pdf, other

    eess.SY cs.RO

    Reconfigurable Multi-UAV Formation Using Angle-Encoded PSO

    Authors: V. T. Hoang, M. D. Phung, T. H. Dinh, Q. Zhu, Q. P. Ha

    Abstract: In this paper, we propose an algorithm for the formation of multiple UAVs used in vision-based inspection of infrastructure. A path planning algorithm is first developed by using a variant of the particle swarm optimisation, named theta-PSO, to generate a feasible path for the overall formation configuration taken into account the constraints for visual inspection. Here, we introduced a cost funct… ▽ More

    Submitted 7 September, 2019; originally announced September 2019.

    Comments: Pages 1670 - 1675

    Journal ref: 2019 IEEE 15th International Conference on Automation Science and Engineering (CASE)

  14. System Architecture for Real-time Surface Inspection Using Multiple UAVs

    Authors: Van Truong Hoang, Manh Duong Phung, Tran Hiep Dinh, Quang P. Ha

    Abstract: This paper presents a real-time control system for surface inspection using multiple unmanned aerial vehicles (UAVs). The UAVs are coordinated in a specific formation to collect data of the inspecting objects. The communication platform for data transmission is based on the Internet of Things (IoT). In the proposed architecture, the UAV formation is established via using the angle-encoded particle… ▽ More

    Submitted 7 July, 2019; originally announced July 2019.

    Journal ref: IEEE Systems Journal, pp.1-12, 2019

  15. Angle-Encoded Swarm Optimization for UAV Formation Path Planning

    Authors: V. T. Hoang, M. D. Phung, T. H. Dinh, Q. P. Ha

    Abstract: This paper presents a novel and feasible path planning technique for a group of unmanned aerial vehicles (UAVs) conducting surface inspection of infrastructure. The ultimate goal is to minimise the travel distance of UAVs while simultaneously avoid obstacles, and maintain altitude constraints as well as the shape of the UAV formation. A multiple-objective optimisation algorithm, called the Angle-e… ▽ More

    Submitted 19 December, 2018; originally announced December 2018.

    Comments: In Proceedings of The 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2018), pp. 5239-5244

  16. arXiv:1812.07868  [pdf, other

    cs.CV cs.RO

    Crack Detection Using Enhanced Thresholding on UAV based Collected Images

    Authors: Q. Zhu, T. H. Dinh, V. T. Hoang, M. D. Phung, Q. P. Ha

    Abstract: This paper proposes a thresholding approach for crack detection in an unmanned aerial vehicle (UAV) based infrastructure inspection system. The proposed algorithm performs recursively on the intensity histogram of UAV-taken images to exploit their crack-pixels appearing at the low intensity interval. A quantified criterion of interclass contrast is proposed and employed as an object cost and stop… ▽ More

    Submitted 19 December, 2018; originally announced December 2018.

    Comments: In Proceedings of Australian Conference on Robotics and Automation 2018 (ACRA)

  17. Adaptive twisting sliding mode control for quadrotor unmanned aerial vehicles

    Authors: V. T. Hoang, M. D. Phung, Q. P. Ha

    Abstract: This work addresses the problem of robust attitude control of quadcopters. First, the mathematical model of the quadcopter is derived considering factors such as nonlinearity, external disturbances, uncertain dynamics and strong coupling. An adaptive twisting sliding mode control algorithm is then developed with the objective of controlling the quadcopter to track desired attitudes under various c… ▽ More

    Submitted 5 June, 2018; originally announced June 2018.

    Comments: 2017 11th Asian Control Conference (ASCC)

  18. arXiv:1803.07690  [pdf

    eess.SY

    Adaptive Super-twisting Second-order Sliding Mode for Attitude Control of Quadcopter UAVs

    Authors: Van Truong Hoang, Quang Hieu Pham

    Abstract: This work addresses the modelling and control aspects for quadcopter or drone unmanned aerial vehicles (UAVs). First, the mathematical model of the drone is derived by identifying significant parameters and the negligible ones are treated as disturbances. The control design begins with the switching surface selection, then, an Adaptive Super Twisting Sliding Mode (ASTSM) Control algorithm is appli… ▽ More

    Submitted 20 March, 2018; originally announced March 2018.

    Comments: 7 pages, 8 figures

  19. Adaptive Second-order Sliding Mode Control of UAVs for Civil Applications

    Authors: Van Truong Hoang, Ansu Man Singh, Manh Duong Phung, Quang Ha

    Abstract: Quadcopters, as unmanned aerial vehicles (UAVs), have great potential in civil applications such as surveying, building monitoring, and infrastructure condition assessment. Quadcopters, however, are relatively sensitive to noises and disturbances so that their performance may be quickly downgraded in the case of inadequate control, system uncertainties and/or external disturbances. In this study,… ▽ More

    Submitted 31 July, 2017; originally announced July 2017.

    Comments: in Proceeding of The 34th International Symposium on Automation and Robotics in Construction (ISARC), pp. 823-829, Taipei, Taiwan, 2017

  20. arXiv:1707.09715  [pdf, other

    eess.SY cs.CV cs.RO

    Automatic Crack Detection in Built Infrastructure Using Unmanned Aerial Vehicles

    Authors: Manh Duong Phung, Van Truong Hoang, Tran Hiep Dinh, Quang Ha

    Abstract: This paper addresses the problem of crack detection which is essential for health monitoring of built infrastructure. Our approach includes two stages, data collection using unmanned aerial vehicles (UAVs) and crack detection using histogram analysis. For the data collection, a 3D model of the structure is first created by using laser scanners. Based on the model, geometric properties are extracte… ▽ More

    Submitted 31 July, 2017; originally announced July 2017.

    Comments: In proceeding of The 34th International Symposium on Automation and Robotics in Construction (ISARC), pp. 823-829, Taipei, Taiwan, 2017

  21. Domain-specific queries and Web search personalization: some investigations

    Authors: Van Tien Hoang, Angelo Spognardi, Francesco Tiezzi, Marinella Petrocchi, Rocco De Nicola

    Abstract: Major search engines deploy personalized Web results to enhance users' experience, by showing them data supposed to be relevant to their interests. Even if this process may bring benefits to users while browsing, it also raises concerns on the selection of the search results. In particular, users may be unknowingly trapped by search engines in protective information bubbles, called "filter bubbles… ▽ More

    Submitted 16 August, 2015; originally announced August 2015.

    Comments: In Proceedings WWV 2015, arXiv:1508.03389

    Journal ref: EPTCS 188, 2015, pp. 51-58

  22. arXiv:1208.1176  [pdf, ps, other

    cs.CR

    An Enciphering Scheme Based on a Card Shuffle

    Authors: Viet Tung Hoang, Ben Morris, Phillip Rogaway

    Abstract: We introduce the swap-or-not shuffle and show that the technique gives rise to a new method to convert a pseudorandom function (PRF) into a pseudorandom permutation (PRP) (or, alternatively, to directly build a confusion/diffusion blockcipher). We then prove that swap-or-not has excellent quantitative security bounds, giving a Luby-Rackoff type result that ensures security (assuming an ideal round… ▽ More

    Submitted 21 November, 2014; v1 submitted 6 August, 2012; originally announced August 2012.

  23. arXiv:0802.2867  [pdf, ps, other

    cs.DS

    Fixed Parameter Polynomial Time Algorithms for Maximum Agreement and Compatible Supertrees

    Authors: Viet Tung Hoang, Wing-Kin Sung

    Abstract: Consider a set of labels $L$ and a set of trees ${\mathcal T} = \{{\mathcal T}^{(1), {\mathcal T}^{(2), ..., {\mathcal T}^{(k) \$ where each tree ${\mathcal T}^{(i)$ is distinctly leaf-labeled by some subset of $L$. One fundamental problem is to find the biggest tree (denoted as supertree) to represent $\mathcal T}$ which minimizes the disagreements with the trees in ${\mathcal T}$ under certain… ▽ More

    Submitted 20 February, 2008; originally announced February 2008.

    Journal ref: Dans Proceedings of the 25th Annual Symposium on the Theoretical Aspects of Computer Science - STACS 2008, Bordeaux : France (2008)