Skip to main content

Showing 1–8 of 8 results for author: Mun, C

.
  1. arXiv:2309.14117  [pdf, other

    cs.CV cs.AI

    Small Objects Matters in Weakly-supervised Semantic Segmentation

    Authors: Cheolhyun Mun, Sanghuk Lee, Youngjung Uh, Junsuk Choe, Hyeran Byun

    Abstract: Weakly-supervised semantic segmentation (WSSS) performs pixel-wise classification given only image-level labels for training. Despite the difficulty of this task, the research community has achieved promising results over the last five years. Still, current WSSS literature misses the detailed sense of how well the methods perform on different sizes of objects. Thus we propose a novel evaluation me… ▽ More

    Submitted 25 September, 2023; originally announced September 2023.

    Comments: Accepted to WACV 2024

  2. arXiv:2007.11825  [pdf, other

    cond-mat.mtrl-sci

    Influence of M/A substitution on material properties of intermetallic compounds MSn$_2$ (M = Fe, Co; A = Li, Na): A first-principles study

    Authors: Chol-Jun Yu, Un-Song Hwang, Yong-Chol Pak, Kyonga Rim, Chol Ryu, Chon-Ryong Mun, Un-Gi Jong

    Abstract: Iron and cobalt distannides \ce{MSn2} (M = Fe, Co) are regarded as a promising conversion-type anode material for lithium- and sodium-ion batteries, but their properties are not well understood. In this work, we report a first-principles study of alkali metal (A = Li, Na) substitutional effect on the structural, mechanical, lattice vibrational, electronic and defect properties of these distannides… ▽ More

    Submitted 23 July, 2020; originally announced July 2020.

  3. PrivFT: Private and Fast Text Classification with Homomorphic Encryption

    Authors: Ahmad Al Badawi, Luong Hoang, Chan Fook Mun, Kim Laine, Khin Mi Mi Aung

    Abstract: The need for privacy-preserving analytics is higher than ever due to the severity of privacy risks and to comply with new privacy regulations leading to an amplified interest in privacy-preserving techniques that try to balance between privacy and utility. In this work, we present an efficient method for Text Classification while preserving the privacy of the content using Fully Homomorphic Encryp… ▽ More

    Submitted 18 November, 2019; v1 submitted 18 August, 2019; originally announced August 2019.

    Comments: 13 pages, 3 figures, 4 tables, 5 Algorithms

    Report number: 2169-3536

    Journal ref: IEEE Access, 2020

  4. arXiv:1901.10074  [pdf, other

    cs.CR

    CaRENets: Compact and Resource-Efficient CNN for Homomorphic Inference on Encrypted Medical Images

    Authors: ** Chao, Ahmad Al Badawi, Balagopal Unnikrishnan, Jie Lin, Chan Fook Mun, James M. Brown, J. Peter Campbell, Michael Chiang, Jayashree Kalpathy-Cramer, Vijay Ramaseshan Chandrasekhar, Pavitra Krishnaswamy, Khin Mi Mi Aung

    Abstract: Convolutional neural networks (CNNs) have enabled significant performance leaps in medical image classification tasks. However, translating neural network models for clinical applications remains challenging due to data privacy issues. Fully Homomorphic Encryption (FHE) has the potential to address this challenge as it enables the use of CNNs on encrypted images. However, current HE technology pos… ▽ More

    Submitted 28 January, 2019; originally announced January 2019.

  5. arXiv:1811.00778  [pdf, other

    cs.CR cs.LG

    Towards the AlexNet Moment for Homomorphic Encryption: HCNN, theFirst Homomorphic CNN on Encrypted Data with GPUs

    Authors: Ahmad Al Badawi, ** Chao, Jie Lin, Chan Fook Mun, Jun Jie Sim, Benjamin Hong Meng Tan, Xiao Nan, Khin Mi Mi Aung, Vijay Ramaseshan Chandrasekhar

    Abstract: Deep Learning as a Service (DLaaS) stands as a promising solution for cloud-based inference applications. In this setting, the cloud has a pre-learned model whereas the user has samples on which she wants to run the model. The biggest concern with DLaaS is user privacy if the input samples are sensitive data. We provide here an efficient privacy-preserving system by employing high-end technologies… ▽ More

    Submitted 18 August, 2020; v1 submitted 2 November, 2018; originally announced November 2018.

  6. arXiv:1006.3301   

    cs.IT cs.NI

    Codebook-Based SDMA for Coexistence with Fixed Wireless Service

    Authors: Han-Shin Jo, Cheol Mun, Jong-Gwan Yook

    Abstract: A portion of frequency band for International Mobile Telecommunications (IMT)-Advanced is currently allocated to Fixed Wireless Service (FWS) such as Fixed Service (FS), Fixed Satellite Service (FSS), or Fixed Wireless Access (FWA), which requires frequency sharing between both the systems. SDMA, due to its high throughput nature, is candidate for IMT-Advanced. This paper proposes a systematic des… ▽ More

    Submitted 20 October, 2010; v1 submitted 16 June, 2010; originally announced June 2010.

    Comments: The paper has been withdrawn by the author due to some error in main analysis

  7. arXiv:0910.2221  [pdf, ps, other

    cs.NI

    Interference Mitigation Using Uplink Power Control for Two-Tier Femtocell Networks

    Authors: Han-Shin Jo, Cheol Mun, June Moon, Jong-Gwan Yook

    Abstract: This paper proposes two interference mitigation strategies that adjust the maximum transmit power of femtocell users to suppress the cross-tier interference at a macrocell base station (BS). The open-loop and the closed-loop control suppress the cross-tier interference less than a fixed threshold and an adaptive threshold based on the noise and interference (NI) level at the macrocell BS, respec… ▽ More

    Submitted 12 October, 2009; originally announced October 2009.

    Comments: 13 pages, 5 figures

  8. Self-optimized Coverage Coordination in Femtocell Networks

    Authors: Han-Shin Jo, Cheol Mun, June Moon, Jong-Gwan Yook

    Abstract: This paper proposes a self-optimized coverage coordination scheme for two-tier femtocell networks, in which a femtocell base station adjusts the transmit power based on the statistics of the signal and the interference power that is measured at a femtocell downlink. Furthermore, an analytic expression is derived for the coverage leakage probability that a femtocell coverage area leaks into an outd… ▽ More

    Submitted 14 October, 2010; v1 submitted 12 October, 2009; originally announced October 2009.

    Comments: 16 pages, 5 figures

    Journal ref: IEEE Transactions on Wireless Communications, vol.9, no.10, pp.2977-2982, Oct. 2010