Skip to main content

Showing 1–50 of 69 results for author: Kang, U

.
  1. arXiv:2407.05713  [pdf, other

    cs.CV cs.AI

    Short-term Object Interaction Anticipation with Disentangled Object Detection @ Ego4D Short Term Object Interaction Anticipation Challenge

    Authors: Hyun** Cho, Dong Un Kang, Se Young Chun

    Abstract: Short-term object interaction anticipation is an important task in egocentric video analysis, including precise predictions of future interactions and their timings as well as the categories and positions of the involved active objects. To alleviate the complexity of this task, our proposed method, SOIA-DOD, effectively decompose it into 1) detecting active object and 2) classifying interaction an… ▽ More

    Submitted 8 July, 2024; originally announced July 2024.

    Comments: 4 pages

  2. arXiv:2405.11911  [pdf, other

    cs.AI cs.LG cs.SI

    PULL: PU-Learning-based Accurate Link Prediction

    Authors: Junghun Kim, Ka Hyun Park, Hoyoung Yoon, U Kang

    Abstract: Given an edge-incomplete graph, how can we accurately find the missing links? The link prediction in edge-incomplete graphs aims to discover the missing relations between entities when their relationships are represented as a graph. Edge-incomplete graphs are prevalent in real-world due to practical limitations, such as not checking all users when adding friends in a social network. Addressing the… ▽ More

    Submitted 20 May, 2024; originally announced May 2024.

    Comments: 11 pages

  3. arXiv:2404.04544  [pdf, other

    cs.CV cs.AI

    BeyondScene: Higher-Resolution Human-Centric Scene Generation With Pretrained Diffusion

    Authors: Gwanghyun Kim, Hayeon Kim, Hoigi Seo, Dong Un Kang, Se Young Chun

    Abstract: Generating higher-resolution human-centric scenes with details and controls remains a challenge for existing text-to-image diffusion models. This challenge stems from limited training image size, text encoder capacity (limited tokens), and the inherent difficulty of generating complex scenes involving multiple humans. While current methods attempted to address training size limit only, they often… ▽ More

    Submitted 6 April, 2024; originally announced April 2024.

    Comments: Project page: https://janeyeon.github.io/beyond-scene

  4. arXiv:2401.15347  [pdf, other

    cs.CL cs.AI

    A Comprehensive Survey of Compression Algorithms for Language Models

    Authors: Seungcheol Park, Jaehyeon Choi, So** Lee, U Kang

    Abstract: How can we compress language models without sacrificing accuracy? The number of compression algorithms for language models is rapidly growing to benefit from remarkable advances of recent language models without side effects due to the gigantic size of language models, such as increased carbon emissions and expensive maintenance fees. While numerous compression algorithms have shown remarkable pro… ▽ More

    Submitted 27 January, 2024; originally announced January 2024.

    MSC Class: 68T50 ACM Class: I.2.7

  5. arXiv:2311.18654  [pdf, other

    cs.CV cs.AI

    Detailed Human-Centric Text Description-Driven Large Scene Synthesis

    Authors: Gwanghyun Kim, Dong Un Kang, Hoigi Seo, Hayeon Kim, Se Young Chun

    Abstract: Text-driven large scene image synthesis has made significant progress with diffusion models, but controlling it is challenging. While using additional spatial controls with corresponding texts has improved the controllability of large scene synthesis, it is still challenging to faithfully reflect detailed text descriptions without user-provided controls. Here, we propose DetText2Scene, a novel tex… ▽ More

    Submitted 30 November, 2023; originally announced November 2023.

  6. arXiv:2310.03813  [pdf, other

    cs.IR cs.AI

    Cold-start Bundle Recommendation via Popularity-based Coalescence and Curriculum Heating

    Authors: Hyunsik Jeon, Jong-eun Lee, Jeongin Yun, U Kang

    Abstract: How can we recommend cold-start bundles to users? The cold-start problem in bundle recommendation is crucial because new bundles are continuously created on the Web for various marketing purposes. Despite its importance, existing methods for cold-start item recommendation are not readily applicable to bundles. They depend overly on historical information, even for less popular bundles, failing to… ▽ More

    Submitted 10 March, 2024; v1 submitted 5 October, 2023; originally announced October 2023.

    Comments: 8 pages, 4 figures, 4 tables

  7. arXiv:2308.05986  [pdf, other

    cs.LG

    Fast and Accurate Transferability Measurement by Evaluating Intra-class Feature Variance

    Authors: Huiwen Xu, U Kang

    Abstract: Given a set of pre-trained models, how can we quickly and accurately find the most useful pre-trained model for a downstream task? Transferability measurement is to quantify how transferable is a pre-trained model learned on a source task to a target task. It is used for quickly ranking pre-trained models for a given task and thus becomes a crucial step for transfer learning. Existing methods meas… ▽ More

    Submitted 11 August, 2023; originally announced August 2023.

  8. arXiv:2308.03449  [pdf, other

    cs.CL

    Accurate Retraining-free Pruning for Pretrained Encoder-based Language Models

    Authors: Seungcheol Park, Hojun Choi, U Kang

    Abstract: Given a pretrained encoder-based language model, how can we accurately compress it without retraining? Retraining-free structured pruning algorithms are crucial in pretrained language model compression due to their significantly reduced pruning cost and capability to prune large language models. However, existing retraining-free algorithms encounter severe accuracy degradation, as they fail to han… ▽ More

    Submitted 15 March, 2024; v1 submitted 7 August, 2023; originally announced August 2023.

    MSC Class: 68T50 ACM Class: I.2.7

  9. arXiv:2306.12590  [pdf

    cs.RO

    Arc-to-line frame registration method for ultrasound and photoacoustic image-guided intraoperative robot-assisted laparoscopic prostatectomy

    Authors: Hyunwoo Song, Shuojue Yang, Zijian Wu, Hamid Moradi, Russell H. Taylor, ** U. Kang, Septimiu E. Salcudean, Emad M. Boctor

    Abstract: Purpose: To achieve effective robot-assisted laparoscopic prostatectomy, the integration of transrectal ultrasound (TRUS) imaging system which is the most widely used imaging modelity in prostate imaging is essential. However, manual manipulation of the ultrasound transducer during the procedure will significantly interfere with the surgery. Therefore, we propose an image co-registration algorithm… ▽ More

    Submitted 21 June, 2023; originally announced June 2023.

    Comments: 12 pages, 9 figures

  10. arXiv:2306.10127  [pdf, other

    cs.RO

    Towards Deep Learning Guided Autonomous Eye Surgery Using Microscope and iOCT Images

    Authors: Ji Woong Kim, Shuwen Wei, Peiyao Zhang, Peter Gehlbach, ** U. Kang, Iulian Iordachita, Marin Kobilarov

    Abstract: Recent advancements in retinal surgery have paved the way for a modern operating room equipped with a surgical robot, a microscope, and intraoperative optical coherence tomography (iOCT)- a depth sensor widely used in retinal surgery. Integrating these tools raises the fundamental question of how to effectively combine them to enable surgical autonomy. In this work, we tackle this question by deve… ▽ More

    Submitted 27 July, 2023; v1 submitted 16 June, 2023; originally announced June 2023.

    Comments: pending submission to a journal

  11. arXiv:2305.18376  [pdf, other

    cs.LG cs.IR

    Fast and Accurate Dual-Way Streaming PARAFAC2 for Irregular Tensors -- Algorithm and Application

    Authors: Jun-Gi Jang, Jeongyoung Lee, Yong-chan Park, U Kang

    Abstract: How can we efficiently and accurately analyze an irregular tensor in a dual-way streaming setting where the sizes of two dimensions of the tensor increase over time? What types of anomalies are there in the dual-way streaming setting? An irregular tensor is a collection of matrices whose column lengths are the same while their row lengths are different. In a dual-way streaming setting, both new ro… ▽ More

    Submitted 28 May, 2023; originally announced May 2023.

    Comments: 12 pages, accept to The 29th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD) 2023

  12. arXiv:2305.10732  [pdf, ps, other

    eess.IV cs.CV

    BlindHarmony: "Blind" Harmonization for MR Images via Flow model

    Authors: Hwihun Jeong, Heejoon Byun, Dong Un Kang, Jongho Lee

    Abstract: In MRI, images of the same contrast (e.g., T$_1$) from the same subject can exhibit noticeable differences when acquired using different hardware, sequences, or scan parameters. These differences in images create a domain gap that needs to be bridged by a step called image harmonization, to process the images successfully using conventional or deep learning-based image analysis (e.g., segmentation… ▽ More

    Submitted 16 August, 2023; v1 submitted 18 May, 2023; originally announced May 2023.

    Comments: ICCV 2023 accepted. 9 pages and 5 Figures for manuscipt, supplementary included

  13. arXiv:2212.08817  [pdf, other

    cs.AI

    Accurate Open-set Recognition for Memory Workload

    Authors: Jun-Gi Jang, Sooyeon Shim, Vladimir Egay, Jeeyong Lee, Jongmin Park, Suhyun Chae, U Kang

    Abstract: How can we accurately identify new memory workloads while classifying known memory workloads? Verifying DRAM (Dynamic Random Access Memory) using various workloads is an important task to guarantee the quality of DRAM. A crucial component in the process is open-set recognition which aims to detect new workloads not seen in the training phase. Despite its importance, however, existing open-set reco… ▽ More

    Submitted 17 December, 2022; originally announced December 2022.

    Comments: 15 pages, 5 figures

  14. arXiv:2211.01328  [pdf, other

    cs.IR cs.LG

    Diversely Regularized Matrix Factorization for Accurate and Aggregately Diversified Recommendation

    Authors: Jong** Kim, Hyunsik Jeon, Jaeri Lee, U Kang

    Abstract: When recommending personalized top-$k$ items to users, how can we recommend the items diversely to them while satisfying their needs? Aggregately diversified recommender systems aim to recommend a variety of items across whole users without sacrificing the recommendation accuracy. They increase the exposure opportunities of various items, which in turn increase potential revenue of sellers as well… ▽ More

    Submitted 19 October, 2022; originally announced November 2022.

    Comments: 9 pages, 7 figures, 2 tables

  15. Accurate Bundle Matching and Generation via Multitask Learning with Partially Shared Parameters

    Authors: Hyunsik Jeon, Jun-Gi Jang, Taehun Kim, U Kang

    Abstract: How can we recommend existing bundles to users accurately? How can we generate new tailored bundles for users? Recommending a bundle, or a group of various items, has attracted widespread attention in e-commerce owing to the increased satisfaction of both users and providers. Bundle matching and bundle generation are two representative tasks in bundle recommendation. The bundle matching task is to… ▽ More

    Submitted 28 October, 2022; v1 submitted 19 October, 2022; originally announced October 2022.

    Comments: 10 pages, 7 figures

  16. arXiv:2208.06089  [pdf, other

    cs.AI cs.LG eess.SY

    Accurate Action Recommendation for Smart Home via Two-Level Encoders and Commonsense Knowledge

    Authors: Hyunsik Jeon, Jong** Kim, Hoyoung Yoon, Jaeri Lee, U Kang

    Abstract: How can we accurately recommend actions for users to control their devices at home? Action recommendation for smart home has attracted increasing attention due to its potential impact on the markets of virtual assistants and Internet of Things (IoT). However, designing an effective action recommender system for smart home is challenging because it requires handling context correlations, considerin… ▽ More

    Submitted 11 August, 2022; originally announced August 2022.

    Comments: 10 pages, 8 figures, Accepted to CIKM 2022

  17. arXiv:2207.01520  [pdf, other

    eess.IV cs.CV

    Adaptive GLCM sampling for transformer-based COVID-19 detection on CT

    Authors: Okchul Jung, Dong Un Kang, Gwanghyun Kim, Se Young Chun

    Abstract: The world has suffered from COVID-19 (SARS-CoV-2) for the last two years, causing much damage and change in people's daily lives. Thus, automated detection of COVID-19 utilizing deep learning on chest computed tomography (CT) scans became promising, which helps correct diagnosis efficiently. Recently, transformer-based COVID-19 detection method on CT is proposed to utilize 3D information in CT vol… ▽ More

    Submitted 4 July, 2022; originally announced July 2022.

    Comments: 6 pages

  18. arXiv:2206.04516  [pdf, other

    cs.LG

    Accurate Node Feature Estimation with Structured Variational Graph Autoencoder

    Authors: Jaemin Yoo, Hyunsik Jeon, **hong Jung, U Kang

    Abstract: Given a graph with partial observations of node features, how can we estimate the missing features accurately? Feature estimation is a crucial problem for analyzing real-world graphs whose features are commonly missing during the data collection process. Accurate estimation not only provides diverse information of nodes but also supports the inference of graph neural networks that require the full… ▽ More

    Submitted 5 April, 2023; v1 submitted 9 June, 2022; originally announced June 2022.

    Comments: Fixed Table 4 from the KDD 2022 version

  19. arXiv:2203.12798  [pdf, other

    cs.LG cs.DB cs.MS

    DPar2: Fast and Scalable PARAFAC2 Decomposition for Irregular Dense Tensors

    Authors: Jun-Gi Jang, U Kang

    Abstract: Given an irregular dense tensor, how can we efficiently analyze it? An irregular tensor is a collection of matrices whose columns have the same size and rows have different sizes from each other. PARAFAC2 decomposition is a fundamental tool to deal with an irregular tensor in applications including phenotype discovery and trend analysis. Although several PARAFAC2 decomposition methods exist, their… ▽ More

    Submitted 2 June, 2022; v1 submitted 23 March, 2022; originally announced March 2022.

    Comments: 14 pages, 11 figures. To appear at the 38th IEEE International Conference on Data Engineering (ICDE '22)

  20. arXiv:2202.10107  [pdf, other

    cs.LG cs.SI

    Model-Agnostic Augmentation for Accurate Graph Classification

    Authors: Jaemin Yoo, Sooyeon Shim, U Kang

    Abstract: Given a graph dataset, how can we augment it for accurate graph classification? Graph augmentation is an essential strategy to improve the performance of graph-based tasks, and has been widely utilized for analyzing web and social graphs. However, previous works for graph augmentation either a) involve the target model in the process of augmentation, losing the generalizability to other tasks, or… ▽ More

    Submitted 21 February, 2022; originally announced February 2022.

    Comments: Accepted to The Web Conference (WWW) 2022

  21. MiDaS: Representative Sampling from Real-world Hypergraphs

    Authors: Minyoung Choe, Jaemin Yoo, Geon Lee, Woonsung Baek, U Kang, Kijung Shin

    Abstract: Graphs are widely used for representing pairwise interactions in complex systems. Since such real-world graphs are large and often evergrowing, sampling a small representative subgraph is indispensable for various purposes: simulation, visualization, stream processing, representation learning, crawling, to name a few. However, many complex systems consist of group interactions (e.g., collaboration… ▽ More

    Submitted 5 February, 2022; v1 submitted 3 February, 2022; originally announced February 2022.

    Comments: Accepted to WWW 2022 - The Web Conference 2022

  22. arXiv:2107.01288  [pdf

    cs.RO

    Breaking Barriers in Robotic Soft Tissue Surgery: Conditional Autonomous Intestinal Anastomosis

    Authors: H. Saeidi, J. D. Opfermann, M. Kam, S. Wei, S. Leonard, M. H. Hsieh, J. U. Kang, A. Krieger

    Abstract: Autonomous robotic surgery has the potential to provide efficacy, safety, and consistency independent of individual surgeons skill and experience. Autonomous soft-tissue surgery in unstructured and deformable environments is especially challenging as it necessitates intricate imaging, tissue tracking and surgical planning techniques, as well as a precise execution via highly adaptable control stra… ▽ More

    Submitted 2 July, 2021; originally announced July 2021.

  23. arXiv:2012.14191  [pdf, other

    cs.LG cs.SI

    Signed Graph Diffusion Network

    Authors: **hong Jung, Jaemin Yoo, U Kang

    Abstract: Given a signed social graph, how can we learn appropriate node representations to infer the signs of missing edges? Signed social graphs have received considerable attention to model trust relationships. Learning node representations is crucial to effectively analyze graph data, and various techniques such as network embedding and graph convolutional network (GCN) have been proposed for learning s… ▽ More

    Submitted 28 December, 2020; originally announced December 2020.

    Comments: 15 pages

  24. arXiv:2012.12507  [pdf, other

    cs.CV

    Blur More To Deblur Better: Multi-Blur2Deblur For Efficient Video Deblurring

    Authors: Dongwon Park, Dong Un Kang, Se Young Chun

    Abstract: One of the key components for video deblurring is how to exploit neighboring frames. Recent state-of-the-art methods either used aligned adjacent frames to the center frame or propagated the information on past frames to the current frame recurrently. Here we propose multi-blur-to-deblur (MB2D), a novel concept to exploit neighboring frames for efficient video deblurring. Firstly, inspired by unsh… ▽ More

    Submitted 23 December, 2020; originally announced December 2020.

    Comments: 9 pages, 7 figures

  25. arXiv:2012.12487  [pdf, other

    cs.SI

    Finding Key Structures in MMORPG Graph with Hierarchical Graph Summarization

    Authors: Jun-Gi Jang, Chaeheum Park, Changwon Jang, Geonsoo Kim, U Kang

    Abstract: What are the key structures existing in a large real-world MMORPG (Massively Multiplayer Online Role-Playing Game) graph? How can we compactly summarize an MMORPG graph with hierarchical node labels, considering consistent substructures at different levels of hierarchy? Recent MMORPGs generate complex interactions between entities inducing a heterogeneous graph where each entity has hierarchical l… ▽ More

    Submitted 23 December, 2020; originally announced December 2020.

    Comments: 22 pages, 9 figures

  26. arXiv:2012.10595  [pdf, other

    cs.LG cs.AI cs.CL

    T-GAP: Learning to Walk across Time for Temporal Knowledge Graph Completion

    Authors: Jaehun Jung, **hong Jung, U Kang

    Abstract: Temporal knowledge graphs (TKGs) inherently reflect the transient nature of real-world knowledge, as opposed to static knowledge graphs. Naturally, automatic TKG completion has drawn much research interests for a more realistic modeling of relational reasoning. However, most of the existing mod-els for TKG completion extend static KG embeddings that donot fully exploit TKG structure, thus lacking… ▽ More

    Submitted 18 December, 2020; originally announced December 2020.

  27. arXiv:2012.08855  [pdf, other

    cs.LG stat.ML

    Time-Aware Tensor Decomposition for Missing Entry Prediction

    Authors: Dawon Ahn, Jun-Gi Jang, U Kang

    Abstract: Given a time-evolving tensor with missing entries, how can we effectively factorize it for precisely predicting the missing entries? Tensor factorization has been extensively utilized for analyzing various multi-dimensional real-world data. However, existing models for tensor factorization have disregarded the temporal property for tensor factorization while most real-world data are closely relate… ▽ More

    Submitted 16 December, 2020; originally announced December 2020.

    Comments: 20 pages

  28. Notes on the post-bounce background dynamics in bouncing cosmologies

    Authors: Ok Song An, ** U Kang, Thae Hyok Kim, Ui Ri Mun

    Abstract: We investigate the post-bounce background dynamics in a certain class of single bounce scenarios studied in the literature, in which the cosmic bounce is driven by a scalar field with negative exponential potential such as the ekpyrotic potential. We show that those models can actually lead to cyclic evolutions with repeated bounces. These cyclic evolutions, however, do not account for the current… ▽ More

    Submitted 16 September, 2021; v1 submitted 25 October, 2020; originally announced October 2020.

    Comments: 26 pages, 15 figures. Significantly revised and accepted version for JHEP

  29. arXiv:2009.14822  [pdf, other

    cs.LG stat.ML

    Pea-KD: Parameter-efficient and Accurate Knowledge Distillation on BERT

    Authors: Ikhyun Cho, U Kang

    Abstract: How can we efficiently compress a model while maintaining its performance? Knowledge Distillation (KD) is one of the widely known methods for model compression. In essence, KD trains a smaller student model based on a larger teacher model and tries to retain the teacher model's level of performance as much as possible. However, existing KD methods suffer from the following limitations. First, sinc… ▽ More

    Submitted 11 December, 2020; v1 submitted 30 September, 2020; originally announced September 2020.

    Comments: 10 pages

  30. AUBER: Automated BERT Regularization

    Authors: Hyun Dong Lee, Seongmin Lee, U Kang

    Abstract: How can we effectively regularize BERT? Although BERT proves its effectiveness in various downstream natural language processing tasks, it often overfits when there are only a small number of training instances. A promising direction to regularize BERT is based on pruning its attention heads based on a proxy score for head importance. However, heuristic-based methods are usually suboptimal since t… ▽ More

    Submitted 29 September, 2020; originally announced September 2020.

  31. arXiv:2009.14248  [pdf, other

    cs.LG stat.ML

    Ensemble Multi-Source Domain Adaptation with Pseudolabels

    Authors: Seongmin Lee, Hyunsik Jeon, U Kang

    Abstract: Given multiple source datasets with labels, how can we train a target model with no labeled data? Multi-source domain adaptation (MSDA) aims to train a model using multiple source datasets different from a target dataset in the absence of target data labels. MSDA is a crucial problem applicable to many practical cases where labels for the target data are unavailable due to privacy issues. Existing… ▽ More

    Submitted 29 September, 2020; originally announced September 2020.

  32. arXiv:2008.12559  [pdf, other

    cs.LG stat.ML

    Fast Partial Fourier Transform

    Authors: Yong-chan Park, Jun-Gi Jang, U Kang

    Abstract: Given a time series vector, how can we efficiently compute a specified part of Fourier coefficients? Fast Fourier transform (FFT) is a widely used algorithm that computes the discrete Fourier transform in many machine learning applications. Despite its pervasive use, all known FFT algorithms do not provide a fine-tuning option for the user to specify one's demand, that is, the output size (the num… ▽ More

    Submitted 28 August, 2020; originally announced August 2020.

    Comments: 15 pages, 3 figures

  33. arXiv:2005.05274  [pdf, other

    cs.CV

    Normalized Convolutional Neural Network

    Authors: Dongsuk Kim, Geonhee Lee, Myungjae Lee, Shin Uk Kang, Dongmin Kim

    Abstract: In this paper, we propose Normalized Convolutional Neural Network(NCNN). NCNN is more fitted to a convolutional operator than other nomralizaiton methods. The normalized process is similar to a normalization methods, but NCNN is more adapative to sliced-inputs and corresponding the convolutional kernel. Therefor NCNN can be targeted to micro-batch training. Normalizaing of NC is conducted during c… ▽ More

    Submitted 18 May, 2020; v1 submitted 11 May, 2020; originally announced May 2020.

    Comments: 6pages typo errors ,errata are fixed.(p1,2,4,5)

  34. arXiv:1912.13366  [pdf, other

    cs.LG cs.AI stat.ML

    Fast and Accurate Transferability Measurement for Heterogeneous Multivariate Data

    Authors: Seungcheol Park, Huiwen Xu, Taehun Kim, Inhwan Hwang, Kyung-Jun Kim, U Kang

    Abstract: Given a set of heterogeneous source datasets with their classifiers, how can we quickly find the most useful source dataset for a specific target task? We address the problem of measuring transferability between source and target datasets, where the source and the target have different feature spaces and distributions. We propose Transmeter, a fast and accurate method to estimate the transferabili… ▽ More

    Submitted 29 January, 2021; v1 submitted 23 December, 2019; originally announced December 2019.

  35. General Markovian Equation for Scalar Fields in a Slowly Evolving Background

    Authors: Gilles Buldgen, Marco Drewes, ** U Kang, Ui Ri Mun

    Abstract: We present a general and model-independent method to obtain an effective Markovian quantum kinetic equation for the expectation value of a slowly evolving scalar field in an adiabatically evolving background from first principles of nonequilibrium quantum field theory. The method requires almost no assumptions about the field's interactions and the composition of the background, except that 1) the… ▽ More

    Submitted 24 May, 2022; v1 submitted 5 December, 2019; originally announced December 2019.

    Comments: 20 pages, 2 figures; version accepted in JCAP

    Report number: CP3-19-54

    Journal ref: JCAP05(2022)039

  36. arXiv:1911.07410  [pdf, other

    eess.IV cs.CV

    Multi-Temporal Recurrent Neural Networks For Progressive Non-Uniform Single Image Deblurring With Incremental Temporal Training

    Authors: Dongwon Park, Dong Un Kang, Jisoo Kim, Se Young Chun

    Abstract: Multi-scale (MS) approaches have been widely investigated for blind single image / video deblurring that sequentially recovers deblurred images in low spatial scale first and then in high spatial scale later with the output of lower scales. MS approaches have been effective especially for severe blurs induced by large motions in high spatial scale since those can be seen as small blurs in low spat… ▽ More

    Submitted 17 November, 2019; originally announced November 2019.

    Comments: 10 pages, 8 figures, 6 tables, work in progress

  37. arXiv:1909.11321  [pdf, other

    cs.CV eess.IV

    FALCON: Lightweight and Accurate Convolution

    Authors: Jun-Gi Jang, Chun Quan, Hyun Dong Lee, U Kang

    Abstract: How can we efficiently compress Convolutional Neural Network (CNN) while retaining their accuracy on classification tasks? Depthwise Separable Convolution (DSConv), which replaces a standard convolution with a depthwise convolution and a pointwise convolution, has been used for building lightweight architectures. However, previous works based on depthwise separable convolution are limited when com… ▽ More

    Submitted 28 December, 2020; v1 submitted 25 September, 2019; originally announced September 2019.

  38. arXiv:1908.08469  [pdf, other

    cs.LG stat.ML

    Data Context Adaptation for Accurate Recommendation with Additional Information

    Authors: Hyunsik Jeon, Bonhun Koo, U Kang

    Abstract: Given a sparse rating matrix and an auxiliary matrix of users or items, how can we accurately predict missing ratings considering different data contexts of entities? Many previous studies proved that utilizing the additional information with rating data is helpful to improve the performance. However, existing methods are limited in that 1) they ignore the fact that data contexts of rating and aux… ▽ More

    Submitted 22 August, 2019; originally announced August 2019.

    Comments: 10 pages, 7 figures, 5 tables

  39. arXiv:1902.07344  [pdf, other

    cs.CR

    Dataplant: Enhancing System Security with Low-Cost In-DRAM Value Generation Primitives

    Authors: Lois Orosa, Yaohua Wang, Ivan Puddu, Mohammad Sadrosadati, Kaveh Razavi, Juan Gómez-Luna, Hasan Hassan, Nika Mansouri-Ghiasi, Arash Tavakkol, Minesh Patel, Jeremie Kim, Vivek Seshadri, Uksong Kang, Saugata Ghose, Rodolfo Azevedo, Onur Mutlu

    Abstract: DRAM manufacturers have been prioritizing memory capacity, yield, and bandwidth for years, while trying to keep the design complexity as simple as possible. DRAM chips do not carry out any computation or other important functions, such as security. Processors implement most of the existing security mechanisms that protect the system against security threats, because 1) executing security mechanism… ▽ More

    Submitted 5 November, 2019; v1 submitted 19 February, 2019; originally announced February 2019.

  40. Quantum consistency in supersymmetric theories with $R$-symmetry in curved space

    Authors: Ok Song An, ** U Kang, Jong Chol Kim, Yong Hae Ko

    Abstract: We discuss consistency at the quantum level in the rigid $\mathcal N=1$ supersymmetric field theories with a $U(1)_R$ symmetry in four-dimensional curved space which are formulated via coupling to the new-minimal supergravity background fields. By analyzing correlation functions of the current operators in the $\mathcal{R}$-multiplet, we show that the quantum consistency with the (unbroken) supers… ▽ More

    Submitted 19 May, 2019; v1 submitted 12 February, 2019; originally announced February 2019.

    Comments: 15 pages plus 2 appendices, published version in JHEP, minor changes, references added

  41. Field redefinitions and Kähler potential in string theory at 1-loop

    Authors: Michael Haack, ** U Kang

    Abstract: Field redefinitions at string 1-loop order are often required by supersymmetry, for instance in order to make the Kähler structure of the scalar kinetic terms manifest. We derive the general structure of the field redefinitions and the Kähler potential at string 1-loop order in a certain class of string theory models (4-dimensional toroidal type IIB orientifolds with ${\cal N}=1$ supersymmetry) an… ▽ More

    Submitted 27 August, 2018; v1 submitted 2 May, 2018; originally announced May 2018.

    Comments: 50 pages, 1 figure, v2: small changes in order to match the published version

    Report number: LMU-ASC 19/18

  42. Zoom-SVD: Fast and Memory Efficient Method for Extracting Key Patterns in an Arbitrary Time Range

    Authors: Jun-Gi Jang, Dong** Choi, **hong Jung, U Kang

    Abstract: Given multiple time series data, how can we efficiently find latent patterns in an arbitrary time range? Singular value decomposition (SVD) is a crucial tool to discover hidden factors in multiple time series data, and has been used in many data mining applications including dimensionality reduction, principal component analysis, recommender systems, etc. Along with its static version, incremental… ▽ More

    Submitted 20 December, 2018; v1 submitted 2 May, 2018; originally announced May 2018.

    Comments: 10 pages, 2018 ACM Conference on Information and Knowledge Management (CIKM 2018)

  43. arXiv:1802.02468  [pdf, other

    cs.AI

    Efficient Learning of Bounded-Treewidth Bayesian Networks from Complete and Incomplete Data Sets

    Authors: Mauro Scanagatta, Giorgio Corani, Marco Zaffalon, Jaemin Yoo, U Kang

    Abstract: Learning a Bayesian networks with bounded treewidth is important for reducing the complexity of the inferences. We present a novel anytime algorithm (k-MAX) method for this task, which scales up to thousands of variables. Through extensive experiments we show that it consistently yields higher-scoring structures than its competitors on complete data sets. We then consider the problem of structure… ▽ More

    Submitted 7 February, 2018; originally announced February 2018.

  44. arXiv:1712.00595  [pdf, other

    cs.SI

    Fast and Accurate Random Walk with Restart on Dynamic Graphs with Guarantees

    Authors: Minji Yoon, Woojeong **, U Kang

    Abstract: Given a time-evolving graph, how can we track similarity between nodes in a fast and accurate way, with theoretical guarantees on the convergence and the error? Random Walk with Restart (RWR) is a popular measure to estimate the similarity between nodes and has been exploited in numerous applications. Many real-world graphs are dynamic with frequent insertion/deletion of edges; thus, tracking RWR… ▽ More

    Submitted 2 December, 2017; originally announced December 2017.

    Comments: 10 pages, 8 figures

  45. arXiv:1710.07134  [pdf, other

    cs.IR

    UniWalk: Explainable and Accurate Recommendation for Rating and Network Data

    Authors: Haekyu Park, Hyunsik Jeon, Junghwan Kim, Beunguk Ahn, U Kang

    Abstract: How can we leverage social network data and observed ratings to correctly recommend proper items and provide a persuasive explanation for the recommendations? Many online services provide social networks among users, and it is crucial to utilize social information since recommendation by a friend is more likely to grab attention than the one from a random user. Also, explaining why items are recom… ▽ More

    Submitted 18 October, 2017; originally announced October 2017.

    Comments: 9 pages

  46. arXiv:1710.06609  [pdf, other

    cs.SI physics.soc-ph

    Supervised and Extended Restart in Random Walks for Ranking and Link Prediction in Networks

    Authors: Woojeong **, **hong Jung, U Kang

    Abstract: Given a real-world graph, how can we measure relevance scores for ranking and link prediction? Random walk with restart (RWR) provides an excellent measure for this and has been applied to various applications such as friend recommendation, community detection, anomaly detection, etc. However, RWR suffers from two problems: 1) using the same restart probability for all the nodes limits the express… ▽ More

    Submitted 18 October, 2017; originally announced October 2017.

  47. arXiv:1710.02261  [pdf, other

    math.NA cs.DB cs.IR

    Scalable Tucker Factorization for Sparse Tensors - Algorithms and Discoveries

    Authors: Sejoon Oh, Namyong Park, Lee Sael, U Kang

    Abstract: Given sparse multi-dimensional data (e.g., (user, movie, time; rating) for movie recommendations), how can we discover latent concepts/relations and predict missing values? Tucker factorization has been widely used to solve such problems with multi-dimensional data, which are modeled as tensors. However, most Tucker factorization algorithms regard and estimate missing entries as zeros, which trigg… ▽ More

    Submitted 25 February, 2018; v1 submitted 5 October, 2017; originally announced October 2017.

    Comments: IEEE International Conference on Data Engineering (ICDE 2018)

  48. arXiv:1709.09099  [pdf, other

    cs.DC cs.DB cs.DS

    PMV: Pre-partitioned Generalized Matrix-Vector Multiplication for Scalable Graph Mining

    Authors: Chiwan Park, Ha-Myung Park, Minji Yoon, U Kang

    Abstract: How can we analyze enormous networks including the Web and social networks which have hundreds of billions of nodes and edges? Network analyses have been conducted by various graph mining methods including shortest path computation, PageRank, connected component computation, random walk with restart, etc. These graph mining methods can be expressed as generalized matrix-vector multiplication which… ▽ More

    Submitted 26 September, 2017; originally announced September 2017.

    Comments: 10 pages

  49. arXiv:1708.09088  [pdf, other

    cs.IR

    A Comparative Study of Matrix Factorization and Random Walk with Restart in Recommender Systems

    Authors: Haekyu Park, **hong Jung, U Kang

    Abstract: Between matrix factorization or Random Walk with Restart (RWR), which method works better for recommender systems? Which method handles explicit or implicit feedback data better? Does additional information help recommendation? Recommender systems play an important role in many e-commerce services such as Amazon and Netflix to recommend new items to a user. Among various recommendation strategies,… ▽ More

    Submitted 5 November, 2017; v1 submitted 29 August, 2017; originally announced August 2017.

    Comments: 10 pages, Appears in IEEE International Conference on Big Data 2017 (IEEE BigData 2017)

  50. arXiv:1708.08640  [pdf, other

    math.NA

    Fast, Accurate, and Scalable Method for Sparse Coupled Matrix-Tensor Factorization

    Authors: Dong** Choi, Jun-Gi Jang, U Kang

    Abstract: How can we capture the hidden properties from a tensor and a matrix data simultaneously in a fast, accurate, and scalable way? Coupled matrix-tensor factorization (CMTF) is a major tool to extract latent factors from a tensor and matrices at once. Designing an accurate and efficient CMTF method has become more crucial as the size and dimension of real-world data are growing explosively. However, e… ▽ More

    Submitted 5 December, 2017; v1 submitted 29 August, 2017; originally announced August 2017.

    Comments: 10 pages