-
Smart Camera Parking System With Auto Parking Spot Detection
Authors:
Tuan T. Nguyen,
Mina Sartipi
Abstract:
Given the rising urban population and the consequential rise in traffic congestion, the implementation of smart parking systems has emerged as a critical matter of concern. Smart parking solutions use cameras, sensors, and algorithms like computer vision to find available parking spaces. This method improves parking place recognition, reduces traffic and pollution, and optimizes travel time. In re…
▽ More
Given the rising urban population and the consequential rise in traffic congestion, the implementation of smart parking systems has emerged as a critical matter of concern. Smart parking solutions use cameras, sensors, and algorithms like computer vision to find available parking spaces. This method improves parking place recognition, reduces traffic and pollution, and optimizes travel time. In recent years, computer vision-based approaches have been widely used. However, most existing studies rely on manually labeled parking spots, which has implications for the cost and practicality of implementation. To solve this problem, we propose a novel approach PakLoc, which automatically localize parking spots. Furthermore, we present the PakSke module, which automatically adjust the rotation and the size of detected bounding box. The efficacy of our proposed methodology on the PKLot dataset results in a significant reduction in human labor of 94.25\%. Another fundamental aspect of a smart parking system is its capacity to accurately determine and indicate the state of parking spots within a parking lot. The conventional approach involves employing classification techniques to forecast the condition of parking spots based on the bounding boxes derived from manually labeled grids. In this study, we provide a novel approach called PakSta for identifying the state of parking spots automatically. Our method utilizes object detector from PakLoc to simultaneously determine the occupancy status of all parking lots within a video frame. Our proposed method PakSta exhibits a competitive performance on the PKLot dataset when compared to other classification methods.
△ Less
Submitted 7 July, 2024;
originally announced July 2024.
-
Semantic Segmentation for Real-World and Synthetic Vehicle's Forward-Facing Camera Images
Authors:
Tuan T. Nguyen,
Phan Le,
Yasir Hassan,
Mina Sartipi
Abstract:
In this paper, we present the submission to the 5th Annual Smoky Mountains Computational Sciences Data Challenge, Challenge 3. This is the solution for semantic segmentation problem in both real-world and synthetic images from a vehicle s forward-facing camera. We concentrate in building a robust model which performs well across various domains of different outdoor situations such as sunny, snowy,…
▽ More
In this paper, we present the submission to the 5th Annual Smoky Mountains Computational Sciences Data Challenge, Challenge 3. This is the solution for semantic segmentation problem in both real-world and synthetic images from a vehicle s forward-facing camera. We concentrate in building a robust model which performs well across various domains of different outdoor situations such as sunny, snowy, rainy, etc. In particular, our method is developed with two main directions: model development and domain adaptation. In model development, we use the High Resolution Network (HRNet) as the baseline. Then, this baseline s result is processed by two coarse-to-fine models: Object-Contextual Representations (OCR) and Hierarchical Multi-scale Attention (HMA) to get the better robust feature. For domain adaption, we implement the Domain-Based Batch Normalization (DNB) to reduce the distribution shift from diverse domains. Our proposed method yield 81.259 mean intersection-over-union (mIoU) in validation set. This paper studies the effectiveness of employing real-world and synthetic data to handle the domain adaptation in semantic segmentation problem.
△ Less
Submitted 7 July, 2024;
originally announced July 2024.
-
Heterogeneous Hypergraph Embedding for Recommendation Systems
Authors:
Darnbi Sakong,
Viet Hung Vu,
Thanh Trung Huynh,
Phi Le Nguyen,
Hongzhi Yin,
Quoc Viet Hung Nguyen,
Thanh Tam Nguyen
Abstract:
Recent advancements in recommender systems have focused on integrating knowledge graphs (KGs) to leverage their auxiliary information. The core idea of KG-enhanced recommenders is to incorporate rich semantic information for more accurate recommendations. However, two main challenges persist: i) Neglecting complex higher-order interactions in the KG-based user-item network, potentially leading to…
▽ More
Recent advancements in recommender systems have focused on integrating knowledge graphs (KGs) to leverage their auxiliary information. The core idea of KG-enhanced recommenders is to incorporate rich semantic information for more accurate recommendations. However, two main challenges persist: i) Neglecting complex higher-order interactions in the KG-based user-item network, potentially leading to sub-optimal recommendations, and ii) Dealing with the heterogeneous modalities of input sources, such as user-item bipartite graphs and KGs, which may introduce noise and inaccuracies. To address these issues, we present a novel Knowledge-enhanced Heterogeneous Hypergraph Recommender System (KHGRec). KHGRec captures group-wise characteristics of both the interaction network and the KG, modeling complex connections in the KG. Using a collaborative knowledge heterogeneous hypergraph (CKHG), it employs two hypergraph encoders to model group-wise interdependencies and ensure explainability. Additionally, it fuses signals from the input graphs with cross-view self-supervised learning and attention mechanisms. Extensive experiments on four real-world datasets show our model's superiority over various state-of-the-art baselines, with an average 5.18\% relative improvement. Additional tests on noise resilience, missing data, and cold-start problems demonstrate the robustness of our KHGRec framework. Our model and evaluation datasets are publicly available at \url{https://github.com/viethungvu1998/KHGRec}.
△ Less
Submitted 4 July, 2024;
originally announced July 2024.
-
AHMsys: An Automated HVAC Modeling System for BIM Project
Authors:
Long Hoang Dang,
Duy-Hung Nguyen,
Thai Quang Le,
Thinh Truong Nguyen,
Clark Mei,
Vu Hoang
Abstract:
This paper presents a novel system, named AHMsys, designed to automate the process of generating 3D Heating, Ventilation, and Air Conditioning (HVAC) models from 2D Computer-Aided Design (CAD) drawings, a key component of Building Information Modeling (BIM). By automatically preprocessing and extracting essential HVAC object information then creating detailed 3D models, our proposed AHMsys signifi…
▽ More
This paper presents a novel system, named AHMsys, designed to automate the process of generating 3D Heating, Ventilation, and Air Conditioning (HVAC) models from 2D Computer-Aided Design (CAD) drawings, a key component of Building Information Modeling (BIM). By automatically preprocessing and extracting essential HVAC object information then creating detailed 3D models, our proposed AHMsys significantly reduced the 20 percent work schedule of the BIM process in Akila. This advancement highlights the essential impact of integrating AI technologies in managing the lifecycle of a digital representation of the building.
△ Less
Submitted 2 July, 2024;
originally announced July 2024.
-
X-Ray Constraints on Dark Photon Tridents
Authors:
Tim Linden,
Thong T. Q. Nguyen,
Tim M. P. Tait
Abstract:
Dark photons that are sufficiently light and/or weakly-interacting represent a compelling vision of dark matter. Dark photon decay into three photons, which we call the dark photon trident, can be the dominant channel when the dark photon mass falls below the electron pair threshold and can produce a significant flux of x-rays. We use 16 years of data from INTEGRAL/SPI to constrain sub-MeV dark ph…
▽ More
Dark photons that are sufficiently light and/or weakly-interacting represent a compelling vision of dark matter. Dark photon decay into three photons, which we call the dark photon trident, can be the dominant channel when the dark photon mass falls below the electron pair threshold and can produce a significant flux of x-rays. We use 16 years of data from INTEGRAL/SPI to constrain sub-MeV dark photon decay, producing new worlds-best constraints on the kinetic mixing parameter for dark photon masses between 61 keV and 1022 keV, and comment on the potential for future x-ray observatories to discover the trident decay process.
△ Less
Submitted 27 June, 2024;
originally announced June 2024.
-
Speech Emotion Recognition under Resource Constraints with Data Distillation
Authors:
Yi Chang,
Zhao Ren,
Zhonghao Zhao,
Thanh Tam Nguyen,
Kun Qian,
Tanja Schultz,
Björn W. Schuller
Abstract:
Speech emotion recognition (SER) plays a crucial role in human-computer interaction. The emergence of edge devices in the Internet of Things (IoT) presents challenges in constructing intricate deep learning models due to constraints in memory and computational resources. Moreover, emotional speech data often contains private information, raising concerns about privacy leakage during the deployment…
▽ More
Speech emotion recognition (SER) plays a crucial role in human-computer interaction. The emergence of edge devices in the Internet of Things (IoT) presents challenges in constructing intricate deep learning models due to constraints in memory and computational resources. Moreover, emotional speech data often contains private information, raising concerns about privacy leakage during the deployment of SER models. To address these challenges, we propose a data distillation framework to facilitate efficient development of SER models in IoT applications using a synthesised, smaller, and distilled dataset. Our experiments demonstrate that the distilled dataset can be effectively utilised to train SER models with fixed initialisation, achieving performances comparable to those developed using the original full emotional speech dataset.
△ Less
Submitted 21 June, 2024;
originally announced June 2024.
-
A Tangible Multi-Display Toolkit to Support the Collaborative Design Exploration of AV-Pedestrian Interfaces
Authors:
Marius Hoggenmuller,
Martin Tomitsch,
Callum Parker,
Trung Thanh Nguyen,
Dawei Zhou,
Stewart Worrall,
Eduardo Nebot
Abstract:
The advent of cyber-physical systems, such as robots and autonomous vehicles (AVs), brings new opportunities and challenges for the domain of interaction design. Though there is consensus about the value of human-centred development, there is a lack of documented tailored methods and tools for involving multiple stakeholders in design exploration processes. In this paper we present a novel approac…
▽ More
The advent of cyber-physical systems, such as robots and autonomous vehicles (AVs), brings new opportunities and challenges for the domain of interaction design. Though there is consensus about the value of human-centred development, there is a lack of documented tailored methods and tools for involving multiple stakeholders in design exploration processes. In this paper we present a novel approach using a tangible multi-display toolkit. Orchestrating computer-generated imagery across multiple displays, the toolkit enables multiple viewing angles and perspectives to be captured simultaneously (e.g. top-view, first-person pedestrian view). Participants are able to directly interact with the simulated environment through tangible objects. At the same time, the objects physically simulate the interface's behaviour (e.g. through an integrated LED display). We evaluated the toolkit in design sessions with experts to collect feedback and input on the design of an AV-pedestrian interface. The paper reports on how the combination of tangible objects and multiple displays supports collaborative design explorations.
△ Less
Submitted 12 June, 2024;
originally announced June 2024.
-
Simplicial complexes and matroids with vanishing $T^2$
Authors:
Alexandru Constantinescu,
Patricia Klein,
Thai Thanh Nguyen,
Anurag Singh,
Lorenzo Venturello
Abstract:
We investigate quotients by radical monomial ideals for which $T^2$, the second cotangent cohomology module, vanishes. The dimension of the graded components of $T^2$, and thus their vanishing, depends only on the combinatorics of the corresponding simplicial complex. We give both a complete characterization and a full list of one dimensional complexes with $T^2=0$. We characterize the graded comp…
▽ More
We investigate quotients by radical monomial ideals for which $T^2$, the second cotangent cohomology module, vanishes. The dimension of the graded components of $T^2$, and thus their vanishing, depends only on the combinatorics of the corresponding simplicial complex. We give both a complete characterization and a full list of one dimensional complexes with $T^2=0$. We characterize the graded components of $T^2$ when the simplicial complex is a uniform matroid. Finally, we show that $T^2$ vanishes for all matroids of corank at most two and conjecture that all connected matroids with vanishing $T^2$ are of corank at most two.
△ Less
Submitted 4 June, 2024;
originally announced June 2024.
-
Encoding and Controlling Global Semantics for Long-form Video Question Answering
Authors:
Thong Thanh Nguyen,
Zhiyuan Hu,
Xiaobao Wu,
Cong-Duy T Nguyen,
See-Kiong Ng,
Anh Tuan Luu
Abstract:
Seeking answers effectively for long videos is essential to build video question answering (videoQA) systems. Previous methods adaptively select frames and regions from long videos to save computations. However, this fails to reason over the whole sequence of video, leading to sub-optimal performance. To address this problem, we introduce a state space layer (SSL) into multi-modal Transformer to e…
▽ More
Seeking answers effectively for long videos is essential to build video question answering (videoQA) systems. Previous methods adaptively select frames and regions from long videos to save computations. However, this fails to reason over the whole sequence of video, leading to sub-optimal performance. To address this problem, we introduce a state space layer (SSL) into multi-modal Transformer to efficiently integrate global semantics of the video, which mitigates the video information loss caused by frame and region selection modules. Our SSL includes a gating unit to enable controllability over the flow of global semantics into visual representations. To further enhance the controllability, we introduce a cross-modal compositional congruence (C^3) objective to encourage global semantics aligned with the question. To rigorously evaluate long-form videoQA capacity, we construct two new benchmarks Ego-QA and MAD-QA featuring videos of considerably long length, i.e. 17.5 minutes and 1.9 hours, respectively. Extensive experiments demonstrate the superiority of our framework on these new as well as existing datasets.
△ Less
Submitted 30 May, 2024;
originally announced May 2024.
-
Track Initialization and Re-Identification for~3D Multi-View Multi-Object Tracking
Authors:
Linh Van Ma,
Tran Thien Dat Nguyen,
Ba-Ngu Vo,
Hyunsung Jang,
Moongu Jeon
Abstract:
We propose a 3D multi-object tracking (MOT) solution using only 2D detections from monocular cameras, which automatically initiates/terminates tracks as well as resolves track appearance-reappearance and occlusions. Moreover, this approach does not require detector retraining when cameras are reconfigured but only the camera matrices of reconfigured cameras need to be updated. Our approach is base…
▽ More
We propose a 3D multi-object tracking (MOT) solution using only 2D detections from monocular cameras, which automatically initiates/terminates tracks as well as resolves track appearance-reappearance and occlusions. Moreover, this approach does not require detector retraining when cameras are reconfigured but only the camera matrices of reconfigured cameras need to be updated. Our approach is based on a Bayesian multi-object formulation that integrates track initiation/termination, re-identification, occlusion handling, and data association into a single Bayes filtering recursion. However, the exact filter that utilizes all these functionalities is numerically intractable due to the exponentially growing number of terms in the (multi-object) filtering density, while existing approximations trade-off some of these functionalities for speed. To this end, we develop a more efficient approximation suitable for online MOT by incorporating object features and kinematics into the measurement model, which improves data association and subsequently reduces the number of terms. Specifically, we exploit the 2D detections and extracted features from multiple cameras to provide a better approximation of the multi-object filtering density to realize the track initiation/termination and re-identification functionalities. Further, incorporating a tractable geometric occlusion model based on 2D projections of 3D objects on the camera planes realizes the occlusion handling functionality of the filter. Evaluation of the proposed solution on challenging datasets demonstrates significant improvements and robustness when camera configurations change on-the-fly, compared to existing multi-view MOT solutions. The source code is publicly available at https://github.com/linh-gist/mv-glmb-ab.
△ Less
Submitted 28 May, 2024;
originally announced May 2024.
-
Fast-FedUL: A Training-Free Federated Unlearning with Provable Skew Resilience
Authors:
Thanh Trung Huynh,
Trong Bang Nguyen,
Phi Le Nguyen,
Thanh Tam Nguyen,
Matthias Weidlich,
Quoc Viet Hung Nguyen,
Karl Aberer
Abstract:
Federated learning (FL) has recently emerged as a compelling machine learning paradigm, prioritizing the protection of privacy for training data. The increasing demand to address issues such as ``the right to be forgotten'' and combat data poisoning attacks highlights the importance of techniques, known as \textit{unlearning}, which facilitate the removal of specific training data from trained FL…
▽ More
Federated learning (FL) has recently emerged as a compelling machine learning paradigm, prioritizing the protection of privacy for training data. The increasing demand to address issues such as ``the right to be forgotten'' and combat data poisoning attacks highlights the importance of techniques, known as \textit{unlearning}, which facilitate the removal of specific training data from trained FL models. Despite numerous unlearning methods proposed for centralized learning, they often prove inapplicable to FL due to fundamental differences in the operation of the two learning paradigms. Consequently, unlearning in FL remains in its early stages, presenting several challenges. Many existing unlearning solutions in FL require a costly retraining process, which can be burdensome for clients. Moreover, these methods are primarily validated through experiments, lacking theoretical assurances. In this study, we introduce Fast-FedUL, a tailored unlearning method for FL, which eliminates the need for retraining entirely. Through meticulous analysis of the target client's influence on the global model in each round, we develop an algorithm to systematically remove the impact of the target client from the trained model. In addition to presenting empirical findings, we offer a theoretical analysis delineating the upper bound of our unlearned model and the exact retrained model (the one obtained through retraining using untargeted clients). Experimental results with backdoor attack scenarios indicate that Fast-FedUL effectively removes almost all traces of the target client, while retaining the knowledge of untargeted clients (obtaining a high accuracy of up to 98\% on the main task). Significantly, Fast-FedUL attains the lowest time complexity, providing a speed that is 1000 times faster than retraining. Our source code is publicly available at \url{https://github.com/thanhtrunghuynh93/fastFedUL}.
△ Less
Submitted 28 May, 2024;
originally announced May 2024.
-
Diameter of Commuting Graphs of Lie Algebras
Authors:
Hieu V. Ha,
Hoa D. Quang,
Vu A. Le,
Tuyen T. M Nguyen
Abstract:
In this paper, we study the connectedness of the commuting graph of a general Lie algebra and provide a process to determine whether the commuting graph is connected or not, as well as to compute an upper bound for its diameter. In addition, we will examine the connectedness and diameter of the commuting graphs of some remarkable classes of Lie algebras, including: (1) a class of Lie algebras with…
▽ More
In this paper, we study the connectedness of the commuting graph of a general Lie algebra and provide a process to determine whether the commuting graph is connected or not, as well as to compute an upper bound for its diameter. In addition, we will examine the connectedness and diameter of the commuting graphs of some remarkable classes of Lie algebras, including: (1) a class of Lie algebras with one- or two-dimensional derived algebras; and (2) a class of solvable Lie algebras over the real field of dimension up to $4$.
△ Less
Submitted 10 May, 2024;
originally announced May 2024.
-
Q-learning-based Opportunistic Communication for Real-time Mobile Air Quality Monitoring Systems
Authors:
Trung Thanh Nguyen,
Truong Thao Nguyen,
Dinh Tuan Anh Nguyen,
Thanh Hung Nguyen,
Phi Le Nguyen
Abstract:
We focus on real-time air quality monitoring systems that rely on devices installed on automobiles in this research. We investigate an opportunistic communication model in which devices can send the measured data directly to the air quality server through a 4G communication channel or via Wi-Fi to adjacent devices or the so-called Road Side Units deployed along the road. We aim to reduce 4G costs…
▽ More
We focus on real-time air quality monitoring systems that rely on devices installed on automobiles in this research. We investigate an opportunistic communication model in which devices can send the measured data directly to the air quality server through a 4G communication channel or via Wi-Fi to adjacent devices or the so-called Road Side Units deployed along the road. We aim to reduce 4G costs while assuring data latency, where the data latency is defined as the amount of time it takes for data to reach the server. We propose an offloading scheme that leverages Q-learning to accomplish the purpose. The experiment results show that our offloading method significantly cuts down around 40-50% of the 4G communication cost while kee** the latency of 99.5% packets smaller than the required threshold.
△ Less
Submitted 2 May, 2024;
originally announced May 2024.
-
Fuzzy Q-Learning-Based Opportunistic Communication for MEC-Enhanced Vehicular Crowdsensing
Authors:
Trung Thanh Nguyen,
Truong Thao Nguyen,
Thanh Hung Nguyen,
Phi Le Nguyen
Abstract:
This study focuses on MEC-enhanced, vehicle-based crowdsensing systems that rely on devices installed on automobiles. We investigate an opportunistic communication paradigm in which devices can transmit measured data directly to a crowdsensing server over a 4G communication channel or to nearby devices or so-called Road Side Units positioned along the road via Wi-Fi. We tackle a new problem that i…
▽ More
This study focuses on MEC-enhanced, vehicle-based crowdsensing systems that rely on devices installed on automobiles. We investigate an opportunistic communication paradigm in which devices can transmit measured data directly to a crowdsensing server over a 4G communication channel or to nearby devices or so-called Road Side Units positioned along the road via Wi-Fi. We tackle a new problem that is how to reduce the cost of 4G while preserving the latency. We propose an offloading strategy that combines a reinforcement learning technique known as Q-learning with Fuzzy logic to accomplish the purpose. Q-learning assists devices in learning to decide the communication channel. Meanwhile, Fuzzy logic is used to optimize the reward function in Q-learning. The experiment results show that our offloading method significantly cuts down around 30-40% of the 4G communication cost while kee** the latency of 99% packets below the required threshold.
△ Less
Submitted 2 May, 2024;
originally announced May 2024.
-
One-Stage Open-Vocabulary Temporal Action Detection Leveraging Temporal Multi-scale and Action Label Features
Authors:
Trung Thanh Nguyen,
Yasutomo Kawanishi,
Takahiro Komamizu,
Ichiro Ide
Abstract:
Open-vocabulary Temporal Action Detection (Open-vocab TAD) is an advanced video analysis approach that expands Closed-vocabulary Temporal Action Detection (Closed-vocab TAD) capabilities. Closed-vocab TAD is typically confined to localizing and classifying actions based on a predefined set of categories. In contrast, Open-vocab TAD goes further and is not limited to these predefined categories. Th…
▽ More
Open-vocabulary Temporal Action Detection (Open-vocab TAD) is an advanced video analysis approach that expands Closed-vocabulary Temporal Action Detection (Closed-vocab TAD) capabilities. Closed-vocab TAD is typically confined to localizing and classifying actions based on a predefined set of categories. In contrast, Open-vocab TAD goes further and is not limited to these predefined categories. This is particularly useful in real-world scenarios where the variety of actions in videos can be vast and not always predictable. The prevalent methods in Open-vocab TAD typically employ a 2-stage approach, which involves generating action proposals and then identifying those actions. However, errors made during the first stage can adversely affect the subsequent action identification accuracy. Additionally, existing studies face challenges in handling actions of different durations owing to the use of fixed temporal processing methods. Therefore, we propose a 1-stage approach consisting of two primary modules: Multi-scale Video Analysis (MVA) and Video-Text Alignment (VTA). The MVA module captures actions at varying temporal resolutions, overcoming the challenge of detecting actions with diverse durations. The VTA module leverages the synergy between visual and textual modalities to precisely align video segments with corresponding action labels, a critical step for accurate action identification in Open-vocab scenarios. Evaluations on widely recognized datasets THUMOS14 and ActivityNet-1.3, showed that the proposed method achieved superior results compared to the other methods in both Open-vocab and Closed-vocab settings. This serves as a strong demonstration of the effectiveness of the proposed method in the TAD task.
△ Less
Submitted 30 April, 2024;
originally announced April 2024.
-
Limits of length functions of multi $p$-families of ideals
Authors:
Thai Thanh Nguyen,
Vinh Anh Pham
Abstract:
We show the asymptotic relationship between the limit of the normalized length function of a multi-$p-$family of ideals and that of its shifted family under linear growth conditions in a local domain of characteristic $p$. Examples of multi-$p-$families of ideals including products of Frobenius powers of different ideals. We apply our results to obtain a generalized version of a formula due to Wan…
▽ More
We show the asymptotic relationship between the limit of the normalized length function of a multi-$p-$family of ideals and that of its shifted family under linear growth conditions in a local domain of characteristic $p$. Examples of multi-$p-$families of ideals including products of Frobenius powers of different ideals. We apply our results to obtain a generalized version of a formula due to Wantanabe-Yoshida for certain $p-$families using results from Verma, and to provide an instance of the existence of a mixed multiplicity version of multi-$p$-families of ideals.
△ Less
Submitted 26 April, 2024;
originally announced April 2024.
-
Manipulating Recommender Systems: A Survey of Poisoning Attacks and Countermeasures
Authors:
Thanh Toan Nguyen,
Quoc Viet Hung Nguyen,
Thanh Tam Nguyen,
Thanh Trung Huynh,
Thanh Thi Nguyen,
Matthias Weidlich,
Hongzhi Yin
Abstract:
Recommender systems have become an integral part of online services to help users locate specific information in a sea of data. However, existing studies show that some recommender systems are vulnerable to poisoning attacks, particularly those that involve learning schemes. A poisoning attack is where an adversary injects carefully crafted data into the process of training a model, with the goal…
▽ More
Recommender systems have become an integral part of online services to help users locate specific information in a sea of data. However, existing studies show that some recommender systems are vulnerable to poisoning attacks, particularly those that involve learning schemes. A poisoning attack is where an adversary injects carefully crafted data into the process of training a model, with the goal of manipulating the system's final recommendations. Based on recent advancements in artificial intelligence, such attacks have gained importance recently. While numerous countermeasures to poisoning attacks have been developed, they have not yet been systematically linked to the properties of the attacks. Consequently, assessing the respective risks and potential success of mitigation strategies is difficult, if not impossible. This survey aims to fill this gap by primarily focusing on poisoning attacks and their countermeasures. This is in contrast to prior surveys that mainly focus on attacks and their detection methods. Through an exhaustive literature review, we provide a novel taxonomy for poisoning attacks, formalise its dimensions, and accordingly organise 30+ attacks described in the literature. Further, we review 40+ countermeasures to detect and/or prevent poisoning attacks, evaluating their effectiveness against specific types of attacks. This comprehensive survey should serve as a point of reference for protecting recommender systems against poisoning attacks. The article concludes with a discussion on open issues in the field and impactful directions for future research. A rich repository of resources associated with poisoning attacks is available at https://github.com/tamlhp/awesome-recsys-poisoning.
△ Less
Submitted 23 April, 2024;
originally announced April 2024.
-
Efficient and Concise Explanations for Object Detection with Gaussian-Class Activation Map** Explainer
Authors:
Quoc Khanh Nguyen,
Truong Thanh Hung Nguyen,
Vo Thanh Khang Nguyen,
Van Binh Truong,
Tuong Phan,
Hung Cao
Abstract:
To address the challenges of providing quick and plausible explanations in Explainable AI (XAI) for object detection models, we introduce the Gaussian Class Activation Map** Explainer (G-CAME). Our method efficiently generates concise saliency maps by utilizing activation maps from selected layers and applying a Gaussian kernel to emphasize critical image regions for the predicted object. Compar…
▽ More
To address the challenges of providing quick and plausible explanations in Explainable AI (XAI) for object detection models, we introduce the Gaussian Class Activation Map** Explainer (G-CAME). Our method efficiently generates concise saliency maps by utilizing activation maps from selected layers and applying a Gaussian kernel to emphasize critical image regions for the predicted object. Compared with other Region-based approaches, G-CAME significantly reduces explanation time to 0.5 seconds without compromising the quality. Our evaluation of G-CAME, using Faster-RCNN and YOLOX on the MS-COCO 2017 dataset, demonstrates its ability to offer highly plausible and faithful explanations, especially in reducing the bias on tiny object detection.
△ Less
Submitted 20 April, 2024;
originally announced April 2024.
-
Sociotechnical Considerations for SLAM Anchors in Location-Based AR
Authors:
Tiffany T. Nguyen,
Cinthya Jauregui,
Sarah H. Sallee,
Mohan R. Chandrasekar,
Liam A'Hearn,
Dominic J. Woetzel,
Pinak Paliwal,
Madison Nguyen,
Isabella `Amne Gomez,
Xinqi Zhang,
Lee M. Panich,
Danielle M. Heitmuller,
Amy Lueck,
Kai Lukoff
Abstract:
In this position paper, we explore the power of storytelling and its connection to place through the use of Augmented Reality (AR) technology, particularly within the context of Thámien Ohlone history on the Santa Clara University campus. To do this, we utilized SLAM and 8th Wall to create virtual, location-based experiences that geolocate tribal stories at present-day sites, showcase the living c…
▽ More
In this position paper, we explore the power of storytelling and its connection to place through the use of Augmented Reality (AR) technology, particularly within the context of Thámien Ohlone history on the Santa Clara University campus. To do this, we utilized SLAM and 8th Wall to create virtual, location-based experiences that geolocate tribal stories at present-day sites, showcase the living culture of the Thámien Ohlone tribe, and advocate for physical markers that could exist to recognize their story. When doing so, we made sure to select locations that added to the story each stop tells to serve as our anchors. Our research then investigates both the social and technical considerations involved in selecting anchors for AR experiences, using the Thámien Ohlone AR Tour as a case study.
△ Less
Submitted 18 April, 2024;
originally announced April 2024.
-
A Survey of Privacy-Preserving Model Explanations: Privacy Risks, Attacks, and Countermeasures
Authors:
Thanh Tam Nguyen,
Thanh Trung Huynh,
Zhao Ren,
Thanh Toan Nguyen,
Phi Le Nguyen,
Hongzhi Yin,
Quoc Viet Hung Nguyen
Abstract:
As the adoption of explainable AI (XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention on privacy-preserving model explanations. This article presents the first thorough survey about privacy attacks on model explanations and their countermeasures. Our contribution to…
▽ More
As the adoption of explainable AI (XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention on privacy-preserving model explanations. This article presents the first thorough survey about privacy attacks on model explanations and their countermeasures. Our contribution to this field comprises a thorough analysis of research papers with a connected taxonomy that facilitates the categorisation of privacy attacks and countermeasures based on the targeted explanations. This work also includes an initial investigation into the causes of privacy leaks. Finally, we discuss unresolved issues and prospective research directions uncovered in our analysis. This survey aims to be a valuable resource for the research community and offers clear insights for those new to this domain. To support ongoing research, we have established an online resource repository, which will be continuously updated with new and relevant findings. Interested readers are encouraged to access our repository at https://github.com/tamlhp/awesome-privex.
△ Less
Submitted 26 June, 2024; v1 submitted 31 March, 2024;
originally announced April 2024.
-
Designing for Projection-based Communication between Autonomous Vehicles and Pedestrians
Authors:
Trung Thanh Nguyen,
Kai Hollander,
Marius Hoggenmueller,
Callum Parker,
Martin Tomitsch
Abstract:
Recent studies have investigated new approaches for communicating an autonomous vehicle's (AV) intent and awareness to pedestrians. This paper adds to this body of work by presenting the design and evaluation of in-situ projections on the road. Our design combines common traffic light patterns with aesthetic visual elements. We describe the iterative design process and the prototy** methods used…
▽ More
Recent studies have investigated new approaches for communicating an autonomous vehicle's (AV) intent and awareness to pedestrians. This paper adds to this body of work by presenting the design and evaluation of in-situ projections on the road. Our design combines common traffic light patterns with aesthetic visual elements. We describe the iterative design process and the prototy** methods used in each stage. The final design concept was represented as a virtual reality simulation and evaluated with 18 participants in four different street crossing scenarios, which included three scenarios that simulated various degrees of system errors. We found that different design elements were able to support participants' confidence in their decision even when the AV failed to correctly detect their presence. We also identified elements in our design that needed to be more clearly communicated. Based on these findings, the paper presents a series of design recommendations for projection-based communication between AVs and pedestrians.
△ Less
Submitted 11 March, 2024;
originally announced March 2024.
-
On certain properties of the $p$-unitary Cayley graph over a finite ring
Authors:
Tung T. Nguyen,
Nguyen Duy Tân
Abstract:
In recent work, we study certain Cayley graphs associated with a finite commutative ring and their multiplicative subgroups. Among various results that we prove, we provide the necessary and sufficient conditions for such a Cayley graph to be prime. In this paper, we continue this line of research. Specifically, we investigate some basic properties of certain $p$-unitary Cayeley graphs associated…
▽ More
In recent work, we study certain Cayley graphs associated with a finite commutative ring and their multiplicative subgroups. Among various results that we prove, we provide the necessary and sufficient conditions for such a Cayley graph to be prime. In this paper, we continue this line of research. Specifically, we investigate some basic properties of certain $p$-unitary Cayeley graphs associated with a finite commutative ring. In particular, under some mild conditions, we provide the necessary and sufficient conditions for this graph to be prime.
△ Less
Submitted 8 March, 2024;
originally announced March 2024.
-
Inferring solar differential rotation and viscosity via passive imaging with inertial waves
Authors:
Tram Thi Ngoc Nguyen,
Thorsten Hohage,
Damien Fournier,
Laurent Gizon
Abstract:
The recent discovery of inertial waves on the surface of the Sun offers new possibilities to learn about the solar interior. These waves are long-lived with a period on the order of the Sun rotation period ($\sim$27 days) and are sensitive to parameters deep inside the Sun. They are excited by turbulent convection, leading to a passive imaging problem. In this work, we present the forward and inve…
▽ More
The recent discovery of inertial waves on the surface of the Sun offers new possibilities to learn about the solar interior. These waves are long-lived with a period on the order of the Sun rotation period ($\sim$27 days) and are sensitive to parameters deep inside the Sun. They are excited by turbulent convection, leading to a passive imaging problem. In this work, we present the forward and inverse problem of reconstructing viscosity and differential rotation on the Sun from cross-covariance observations of these inertial waves.
△ Less
Submitted 22 March, 2024; v1 submitted 1 March, 2024;
originally announced March 2024.
-
LangXAI: Integrating Large Vision Models for Generating Textual Explanations to Enhance Explainability in Visual Perception Tasks
Authors:
Truong Thanh Hung Nguyen,
Tobias Clement,
Phuc Truong Loc Nguyen,
Nils Kemmerzell,
Van Binh Truong,
Vo Thanh Khang Nguyen,
Mohamed Abdelaal,
Hung Cao
Abstract:
LangXAI is a framework that integrates Explainable Artificial Intelligence (XAI) with advanced vision models to generate textual explanations for visual recognition tasks. Despite XAI advancements, an understanding gap persists for end-users with limited domain knowledge in artificial intelligence and computer vision. LangXAI addresses this by furnishing text-based explanations for classification,…
▽ More
LangXAI is a framework that integrates Explainable Artificial Intelligence (XAI) with advanced vision models to generate textual explanations for visual recognition tasks. Despite XAI advancements, an understanding gap persists for end-users with limited domain knowledge in artificial intelligence and computer vision. LangXAI addresses this by furnishing text-based explanations for classification, object detection, and semantic segmentation model outputs to end-users. Preliminary results demonstrate LangXAI's enhanced plausibility, with high BERTScore across tasks, fostering a more transparent and reliable AI framework on vision tasks for end-users.
△ Less
Submitted 19 February, 2024;
originally announced February 2024.
-
Examining Monitoring System: Detecting Abnormal Behavior In Online Examinations
Authors:
Dinh An Ngo,
Thanh Dat Nguyen,
Thi Le Chi Dang,
Huy Hoan Le,
Ton Bao Ho,
Vo Thanh Khang Nguyen,
Truong Thanh Hung Nguyen
Abstract:
Cheating in online exams has become a prevalent issue over the past decade, especially during the COVID-19 pandemic. To address this issue of academic dishonesty, our "Exam Monitoring System: Detecting Abnormal Behavior in Online Examinations" is designed to assist proctors in identifying unusual student behavior. Our system demonstrates high accuracy and speed in detecting cheating in real-time s…
▽ More
Cheating in online exams has become a prevalent issue over the past decade, especially during the COVID-19 pandemic. To address this issue of academic dishonesty, our "Exam Monitoring System: Detecting Abnormal Behavior in Online Examinations" is designed to assist proctors in identifying unusual student behavior. Our system demonstrates high accuracy and speed in detecting cheating in real-time scenarios, providing valuable information, and aiding proctors in decision-making. This article outlines our methodology and the effectiveness of our system in mitigating the widespread problem of cheating in online exams.
△ Less
Submitted 19 February, 2024;
originally announced February 2024.
-
Linear Landau dam** for the Vlasov-Maxwell system in $\mathbb{R}^3$
Authors:
Daniel Han-Kwan,
Toan T. Nguyen,
Frédéric Rousset
Abstract:
In this work, we consider the relativistic Vlasov-Maxwell system, linearized around a spatially homogeneous equilibrium, set in the whole space $\mathbb{R}^3 \times \mathbb{R}^3$. The equilibrium is assumed to belong to a class of radial, smooth, rapidly decaying functions. Under appropriate conditions on the initial data, we prove algebraic decay (of dispersive nature) for the electromagnetic fie…
▽ More
In this work, we consider the relativistic Vlasov-Maxwell system, linearized around a spatially homogeneous equilibrium, set in the whole space $\mathbb{R}^3 \times \mathbb{R}^3$. The equilibrium is assumed to belong to a class of radial, smooth, rapidly decaying functions. Under appropriate conditions on the initial data, we prove algebraic decay (of dispersive nature) for the electromagnetic field. For the electric scalar potential, the leading behavior is driven by a dispersive wave packet with non-degenerate phase and compactly supported amplitude, while for the magnetic vector potential, it is driven by a wave packet whose phase behaves globally like the one of Klein-Gordon and the amplitude has unbounded support.
△ Less
Submitted 17 February, 2024;
originally announced February 2024.
-
Beyond explaining: XAI-based Adaptive Learning with SHAP Clustering for Energy Consumption Prediction
Authors:
Tobias Clement,
Hung Truong Thanh Nguyen,
Nils Kemmerzell,
Mohamed Abdelaal,
Davor Stjelja
Abstract:
This paper presents an approach integrating explainable artificial intelligence (XAI) techniques with adaptive learning to enhance energy consumption prediction models, with a focus on handling data distribution shifts. Leveraging SHAP clustering, our method provides interpretable explanations for model predictions and uses these insights to adaptively refine the model, balancing model complexity…
▽ More
This paper presents an approach integrating explainable artificial intelligence (XAI) techniques with adaptive learning to enhance energy consumption prediction models, with a focus on handling data distribution shifts. Leveraging SHAP clustering, our method provides interpretable explanations for model predictions and uses these insights to adaptively refine the model, balancing model complexity with predictive performance. We introduce a three-stage process: (1) obtaining SHAP values to explain model predictions, (2) clustering SHAP values to identify distinct patterns and outliers, and (3) refining the model based on the derived SHAP clustering characteristics. Our approach mitigates overfitting and ensures robustness in handling data distribution shifts. We evaluate our method on a comprehensive dataset comprising energy consumption records of buildings, as well as two additional datasets to assess the transferability of our approach to other domains, regression, and classification problems. Our experiments demonstrate the effectiveness of our approach in both task types, resulting in improved predictive performance and interpretable model explanations.
△ Less
Submitted 7 February, 2024;
originally announced February 2024.
-
Indirect Searches for Dark Photon-Photon Tridents in Celestial Objects
Authors:
Tim Linden,
Thong T. Q. Nguyen,
Tim M. P. Tait
Abstract:
We model and constrain the unique indirect detection signature produced by dark matter particles that annihilate through a $U(1)$ gauge symmetry into dark photons that subsequently decay into three-photon final states. We focus on scenarios where the dark photon is long-lived, and show that $γ$-ray probes of celestial objects can set strong constraints on the dark matter/baryon scattering cross se…
▽ More
We model and constrain the unique indirect detection signature produced by dark matter particles that annihilate through a $U(1)$ gauge symmetry into dark photons that subsequently decay into three-photon final states. We focus on scenarios where the dark photon is long-lived, and show that $γ$-ray probes of celestial objects can set strong constraints on the dark matter/baryon scattering cross section that in many cases surpass the power of current direct detection constraints, and in some cases even peer into the neutrino fog.
△ Less
Submitted 2 February, 2024;
originally announced February 2024.
-
Lowers bounds for Waldschmidt constants and Demailly's Conjecture for general and very general points
Authors:
Sankhaneel Bisui,
Thai Thanh Nguyen
Abstract:
We prove Demailly's Conjecture concerning the lower bound for the Waldschmidt constant in terms of the initial degree of the second symbolic powers for any set of generic points or very general points in $\mathbb{P}^N$. We also discuss the Harbourne-Huneke Containment and the aforementioned Demailly's Conjecture for general points and show the results for sufficiently many general points and gener…
▽ More
We prove Demailly's Conjecture concerning the lower bound for the Waldschmidt constant in terms of the initial degree of the second symbolic powers for any set of generic points or very general points in $\mathbb{P}^N$. We also discuss the Harbourne-Huneke Containment and the aforementioned Demailly's Conjecture for general points and show the results for sufficiently many general points and general points in projective spaces with low dimensions.
△ Less
Submitted 20 January, 2024;
originally announced January 2024.
-
XAI-Enhanced Semantic Segmentation Models for Visual Quality Inspection
Authors:
Tobias Clement,
Truong Thanh Hung Nguyen,
Mohamed Abdelaal,
Hung Cao
Abstract:
Visual quality inspection systems, crucial in sectors like manufacturing and logistics, employ computer vision and machine learning for precise, rapid defect detection. However, their unexplained nature can hinder trust, error identification, and system improvement. This paper presents a framework to bolster visual quality inspection by using CAM-based explanations to refine semantic segmentation…
▽ More
Visual quality inspection systems, crucial in sectors like manufacturing and logistics, employ computer vision and machine learning for precise, rapid defect detection. However, their unexplained nature can hinder trust, error identification, and system improvement. This paper presents a framework to bolster visual quality inspection by using CAM-based explanations to refine semantic segmentation models. Our approach consists of 1) Model Training, 2) XAI-based Model Explanation, 3) XAI Evaluation, and 4) Annotation Augmentation for Model Enhancement, informed by explanations and expert insights. Evaluations show XAI-enhanced models surpass original DeepLabv3-ResNet101 models, especially in intricate object segmentation.
△ Less
Submitted 18 January, 2024;
originally announced January 2024.
-
Enhancing the Fairness and Performance of Edge Cameras with Explainable AI
Authors:
Truong Thanh Hung Nguyen,
Vo Thanh Khang Nguyen,
Quoc Hung Cao,
Van Binh Truong,
Quoc Khanh Nguyen,
Hung Cao
Abstract:
The rising use of Artificial Intelligence (AI) in human detection on Edge camera systems has led to accurate but complex models, challenging to interpret and debug. Our research presents a diagnostic method using Explainable AI (XAI) for model debugging, with expert-driven problem identification and solution creation. Validated on the Bytetrack model in a real-world office Edge network, we found t…
▽ More
The rising use of Artificial Intelligence (AI) in human detection on Edge camera systems has led to accurate but complex models, challenging to interpret and debug. Our research presents a diagnostic method using Explainable AI (XAI) for model debugging, with expert-driven problem identification and solution creation. Validated on the Bytetrack model in a real-world office Edge network, we found the training dataset as the main bias source and suggested model augmentation as a solution. Our approach helps identify model biases, essential for achieving fair and trustworthy models.
△ Less
Submitted 18 January, 2024;
originally announced January 2024.
-
Semi-Supervised Semantic Segmentation using Redesigned Self-Training for White Blood Cells
Authors:
Vinh Quoc Luu,
Duy Khanh Le,
Huy Thanh Nguyen,
Minh Thanh Nguyen,
Thinh Tien Nguyen,
Vinh Quang Dinh
Abstract:
Artificial Intelligence (AI) in healthcare, especially in white blood cell cancer diagnosis, is hindered by two primary challenges: the lack of large-scale labeled datasets for white blood cell (WBC) segmentation and outdated segmentation methods. These challenges inhibit the development of more accurate and modern techniques to diagnose cancer relating to white blood cells. To address the first c…
▽ More
Artificial Intelligence (AI) in healthcare, especially in white blood cell cancer diagnosis, is hindered by two primary challenges: the lack of large-scale labeled datasets for white blood cell (WBC) segmentation and outdated segmentation methods. These challenges inhibit the development of more accurate and modern techniques to diagnose cancer relating to white blood cells. To address the first challenge, a semi-supervised learning framework should be devised to efficiently capitalize on the scarcity of the dataset available. In this work, we address this issue by proposing a novel self-training pipeline with the incorporation of FixMatch. Self-training is a technique that utilizes the model trained on labeled data to generate pseudo-labels for the unlabeled data and then re-train on both of them. FixMatch is a consistency-regularization algorithm to enforce the model's robustness against variations in the input image. We discover that by incorporating FixMatch in the self-training pipeline, the performance improves in the majority of cases. Our performance achieved the best performance with the self-training scheme with consistency on DeepLab-V3 architecture and ResNet-50, reaching 90.69%, 87.37%, and 76.49% on Zheng 1, Zheng 2, and LISC datasets, respectively.
△ Less
Submitted 23 February, 2024; v1 submitted 14 January, 2024;
originally announced January 2024.
-
In-plane Density Gradation of Shoe Midsoles for Optimized Cushioning Performance
Authors:
Kazi Zahir Uddin,
Hai Anh Nguyen,
Thanh T. Nguyen,
Mitja Trkov,
George Youssef,
Behrad Koohbor
Abstract:
Midsoles are important components in footwear as they provide shock absorption and stability, thereby improving comfort and effectively preventing certain foot and ankle injuries. A rationally tailored midsole can potentially mitigate plantar pressure, improving performance and comfort levels. Despite the importance of midsole design, the potential of using in-plane density gradation in midsole ha…
▽ More
Midsoles are important components in footwear as they provide shock absorption and stability, thereby improving comfort and effectively preventing certain foot and ankle injuries. A rationally tailored midsole can potentially mitigate plantar pressure, improving performance and comfort levels. Despite the importance of midsole design, the potential of using in-plane density gradation in midsole has been rarely explored in earlier studies. The present work investigates the effectiveness of in-plane density gradation in shoe midsoles using a new class of polyurea foams as the material candidate. Their excellent cushioning properties justify the use of polyurea foams. Different polyurea foam densities, ranging from 95 to 350 kg/m3 are examined and tested to construct density-dependent correlative mathematical relations required for the optimization process. An optimization framework is then created to allocate foam densities at certain plantar zones based on the required cushioning performance constrained by the local pressures. The interior-point algorithm was used to solve the constrained optimization problem. The optimization algorithm introduces a novel approach, utilizing the maximum specific energy absorption as the objective function. The optimization process identifies specific foam densities at various plantar regions for maximum biomechanical energy dissipation without incurring additional weight penalties. Our results suggest midsole design can benefit from horizontal (in-plane) density gradation, leading to potential weight reduction and localized cushioning improvements. With local plantar peak pressure data analysis, the optimization results indicate low-density polyurea foams (140 kg/m3) for central and lateral phalanges, whereas stiffer foams (185-230 kg/m3) are identified as suitable candidates for metatarsal and arch regions in an in-plane density graded midsole design.
△ Less
Submitted 12 January, 2024;
originally announced January 2024.
-
On prime Cayley graphs
Authors:
Maria Chudnovsky,
Michal Cizek,
Logan Crew,
Ján Mináč,
Tung T. Nguyen,
Sophie Spirkl,
Nguyên Duy Tân
Abstract:
The decomposition of complex networks into smaller, interconnected components is a central challenge in network theory with a wide range of potential applications. In this paper, we utilize tools from group theory and ring theory to study this problem when the network is a Cayley graph. In particular, we answer the following question: Which Cayley graphs are prime?
The decomposition of complex networks into smaller, interconnected components is a central challenge in network theory with a wide range of potential applications. In this paper, we utilize tools from group theory and ring theory to study this problem when the network is a Cayley graph. In particular, we answer the following question: Which Cayley graphs are prime?
△ Less
Submitted 11 January, 2024;
originally announced January 2024.
-
The Smooth Trajectory Estimator for LMB Filters
Authors:
Hoa Van Nguyen,
Tran Thien Dat Nguyen,
Changbeom Shim,
Marzhar Anuar
Abstract:
This paper proposes a smooth-trajectory estimator for the labelled multi-Bernoulli (LMB) filter by exploiting the special structure of the generalised labelled multi-Bernoulli (GLMB) filter. We devise a simple and intuitive approach to store the best association map when approximating the GLMB random finite set (RFS) to the LMB RFS. In particular, we construct a smooth-trajectory estimator (i.e.,…
▽ More
This paper proposes a smooth-trajectory estimator for the labelled multi-Bernoulli (LMB) filter by exploiting the special structure of the generalised labelled multi-Bernoulli (GLMB) filter. We devise a simple and intuitive approach to store the best association map when approximating the GLMB random finite set (RFS) to the LMB RFS. In particular, we construct a smooth-trajectory estimator (i.e., an estimator over the entire trajectories of labelled estimates) for the LMB filter based on the history of the best association map and all of the measurements up to the current time. Experimental results under two challenging scenarios demonstrate significant tracking accuracy improvements with negligible additional computational time compared to the conventional LMB filter. The source code is publicly available at https://tinyurl.com/ste-lmb, aimed at promoting advancements in MOT algorithms.
△ Less
Submitted 1 January, 2024;
originally announced January 2024.
-
A Maturity Model for Operations in Neuroscience Research
Authors:
Erik C. Johnson,
Thinh T. Nguyen,
Benjamin K. Dichter,
Frank Zappulla,
Montgomery Kosma,
Kabilar Gunalan,
Yaroslav O. Halchenko,
Shay Q. Neufeld,
Michael Schirner,
Petra Ritter,
Maryann E. Martone,
Brock Wester,
Franco Pestilli,
Dimitri Yatsenko
Abstract:
Scientists are adopting new approaches to scale up their activities and goals. Progress in neurotechnologies, artificial intelligence, automation, and tools for collaboration promises new bursts of discoveries. However, compared to other disciplines and the industry, neuroscience laboratories have been slow to adopt key technologies to support collaboration, reproducibility, and automation. Drawin…
▽ More
Scientists are adopting new approaches to scale up their activities and goals. Progress in neurotechnologies, artificial intelligence, automation, and tools for collaboration promises new bursts of discoveries. However, compared to other disciplines and the industry, neuroscience laboratories have been slow to adopt key technologies to support collaboration, reproducibility, and automation. Drawing on progress in other fields, we define a roadmap for implementing automated research workflows for diverse research teams. We propose establishing a five-level capability maturity model for operations in neuroscience research. Achieving higher levels of operational maturity requires new technology-enabled methodologies, which we describe as ``SciOps''. The maturity model provides guidelines for evaluating and upgrading operations in multidisciplinary neuroscience teams.
△ Less
Submitted 29 December, 2023;
originally announced January 2024.
-
Improved Approximation Guarantees for Power Scheduling Problems With Sum-of-Squares Constraints
Authors:
Trung Thanh Nguyen,
Khaled Elbassioni,
Areg Karapetyan,
Majid Khonji
Abstract:
We study a class of combinatorial scheduling problems characterized by a particular type of constraint often associated with electrical power or gas energy. This constraint appears in several practical applications and is expressed as a sum of squares of linear functions. Its nonlinear nature adds complexity to the scheduling problem, rendering it notably challenging, even in the case of a linear…
▽ More
We study a class of combinatorial scheduling problems characterized by a particular type of constraint often associated with electrical power or gas energy. This constraint appears in several practical applications and is expressed as a sum of squares of linear functions. Its nonlinear nature adds complexity to the scheduling problem, rendering it notably challenging, even in the case of a linear objective. In fact, exact polynomial time algorithms are unlikely to exist, and thus, prior works have focused on designing approximation algorithms with polynomial running time and provable guarantees on the solution quality. In an effort to advance this line of research, we present novel approximation algorithms yielding significant improvements over the existing state-of-the-art results for these problems.
△ Less
Submitted 24 December, 2023;
originally announced December 2023.
-
DiffSpectralNet : Unveiling the Potential of Diffusion Models for Hyperspectral Image Classification
Authors:
Neetu Sigger,
Tuan Thanh Nguyen,
Gianluca Tozzi,
Quoc-Tuan Vien,
Sinh Van Nguyen
Abstract:
Hyperspectral images (HSI) have become popular for analysing remotely sensed images in multiple domain like agriculture, medical. However, existing models struggle with complex relationships and characteristics of spectral-spatial data due to the multi-band nature and data redundancy of hyperspectral data. To address this limitation, we propose a new network called DiffSpectralNet, which combines…
▽ More
Hyperspectral images (HSI) have become popular for analysing remotely sensed images in multiple domain like agriculture, medical. However, existing models struggle with complex relationships and characteristics of spectral-spatial data due to the multi-band nature and data redundancy of hyperspectral data. To address this limitation, we propose a new network called DiffSpectralNet, which combines diffusion and transformer techniques. Our approach involves a two-step process. First, we use an unsupervised learning framework based on the diffusion model to extract both high-level and low-level spectral-spatial features. The diffusion method is capable of extracting diverse and meaningful spectral-spatial features, leading to improvement in HSI classification. Then, we employ a pretrained denoising U-Net to extract intermediate hierarchical features for classification. Finally, we use a supervised transformer-based classifier to perform the HSI classification. Through comprehensive experiments on HSI datasets, we evaluate the classification performance of DiffSpectralNet. The results demonstrate that our framework significantly outperforms existing approaches, achieving state-of-the-art performance.
△ Less
Submitted 29 October, 2023;
originally announced December 2023.
-
Celestial Objects as Dark Matter Colliders
Authors:
Thong T. Q. Nguyen
Abstract:
In the vicinity of the Milky Way Galactic Center, celestial bodies, including neutron stars, reside within a dense dark matter environment. This study explores the accumulation of dark matter by neutron stars through dark matter-nucleon interactions, leading to increased internal dark matter density. Consequently, dark matter annihilation produces long-lived mediators that escape and decay into ne…
▽ More
In the vicinity of the Milky Way Galactic Center, celestial bodies, including neutron stars, reside within a dense dark matter environment. This study explores the accumulation of dark matter by neutron stars through dark matter-nucleon interactions, leading to increased internal dark matter density. Consequently, dark matter annihilation produces long-lived mediators that escape and decay into neutrinos. Leveraging experimental limits from IceCube, ANTARES, and future projections from ARIA, we establish constraints on the dark matter-nucleon cross section within a simplified dark $U(1)_{X}$ mediator model. This approach, applicable to various celestial objects and dark matter models, offers insights into the intricate interplay between dark matter and neutron stars near the Galactic Center.
△ Less
Submitted 19 December, 2023;
originally announced December 2023.
-
Self-interacting Vectorial Dark Matter in a SM-like Dark Sector
Authors:
Van Que Tran,
Thong T. Q. Nguyen,
Tzu-Chiang Yuan
Abstract:
A $SU(2)_D \times U(1)_D$ gauge-Higgs sector, an exact dark copy of the Standard Model (SM) one, is proposed. It is demonstrated that the dark gauge bosons ${\cal W}^{(p,m)}$, in analogous to the SM $W^\pm$, can fulfill the role as a self-interacting vector dark matter candidate, solving the core versus cusp and missing satellites problems faced by the conventional paradigm of collisionless weakly…
▽ More
A $SU(2)_D \times U(1)_D$ gauge-Higgs sector, an exact dark copy of the Standard Model (SM) one, is proposed. It is demonstrated that the dark gauge bosons ${\cal W}^{(p,m)}$, in analogous to the SM $W^\pm$, can fulfill the role as a self-interacting vector dark matter candidate, solving the core versus cusp and missing satellites problems faced by the conventional paradigm of collisionless weakly interacting massive particle. Constraints from collider, astroparticle and cosmology on such a self-interacting vector dark matter candidate are scrutinized. Implications for the future searches of ${\cal W}^{(p,m)}$ in direct detection experiments are discussed.
△ Less
Submitted 17 December, 2023;
originally announced December 2023.
-
Reconciling Shared versus Context-Specific Information in a Neural Network Model of Latent Causes
Authors:
Qihong Lu,
Tan T. Nguyen,
Qiong Zhang,
Uri Hasson,
Thomas L. Griffiths,
Jeffrey M. Zacks,
Samuel J. Gershman,
Kenneth A. Norman
Abstract:
It has been proposed that, when processing a stream of events, humans divide their experiences in terms of inferred latent causes (LCs) to support context-dependent learning. However, when shared structure is present across contexts, it is still unclear how the "splitting" of LCs and learning of shared structure can be simultaneously achieved. Here, we present the Latent Cause Network (LCNet), a n…
▽ More
It has been proposed that, when processing a stream of events, humans divide their experiences in terms of inferred latent causes (LCs) to support context-dependent learning. However, when shared structure is present across contexts, it is still unclear how the "splitting" of LCs and learning of shared structure can be simultaneously achieved. Here, we present the Latent Cause Network (LCNet), a neural network model of LC inference. Through learning, it naturally stores structure that is shared across tasks in the network weights. Additionally, it represents context-specific structure using a context module, controlled by a Bayesian nonparametric inference algorithm, which assigns a unique context vector for each inferred LC. Across three simulations, we found that LCNet could 1) extract shared structure across LCs in a function learning task while avoiding catastrophic interference, 2) capture human data on curriculum effects in schema learning, and 3) infer the underlying event structure when processing naturalistic videos of daily events. Overall, these results demonstrate a computationally feasible approach to reconciling shared structure and context-specific structure in a model of LCs that is scalable from laboratory experiment settings to naturalistic settings.
△ Less
Submitted 6 June, 2024; v1 submitted 13 December, 2023;
originally announced December 2023.
-
xNeuSM: Explainable Neural Subgraph Matching with Graph Learnable Multi-hop Attention Networks
Authors:
Duc Q. Nguyen,
Thanh Toan Nguyen,
Tho quan
Abstract:
Subgraph matching is a challenging problem with a wide range of applications in database systems, biochemistry, and cognitive science. It involves determining whether a given query graph is present within a larger target graph. Traditional graph-matching algorithms provide precise results but face challenges in large graph instances due to the NP-complete problem, limiting their practical applicab…
▽ More
Subgraph matching is a challenging problem with a wide range of applications in database systems, biochemistry, and cognitive science. It involves determining whether a given query graph is present within a larger target graph. Traditional graph-matching algorithms provide precise results but face challenges in large graph instances due to the NP-complete problem, limiting their practical applicability. In contrast, recent neural network-based approximations offer more scalable solutions, but often lack interpretable node correspondences. To address these limitations, this article presents xNeuSM: Explainable Neural Subgraph Matching which introduces Graph Learnable Multi-hop Attention Networks (GLeMA) that adaptively learns the parameters governing the attention factor decay for each node across hops rather than relying on fixed hyperparameters. We provide a theoretical analysis establishing error bounds for GLeMA's approximation of multi-hop attention as a function of the number of hops. Additionally, we prove that learning distinct attention decay factors for each node leads to a correct approximation of multi-hop attention. Empirical evaluation on real-world datasets shows that xNeuSM achieves substantial improvements in prediction accuracy of up to 34% compared to approximate baselines and, notably, at least a seven-fold faster query time than exact algorithms. The source code of our implementation is available at https://github.com/martinakaduc/xNeuSM.
△ Less
Submitted 3 December, 2023;
originally announced December 2023.
-
A Note on Finite Number Rings
Authors:
Suk-Geun Hwang,
Woo Jeon,
Ki-Bong Nam,
Tung T. Nguyen
Abstract:
We define the finite number ring ${\Bbb Z}_n [\sqrt [m] r]$ where $m,n$ are positive integers and $r$ in an integer akin to the definition of the Gaussian integer ${\Bbb Z}[i]$. This idea is also introduced briefly in [7]. By definition, this finite number ring ${\Bbb Z}_n [\sqrt [m] r]$ is naturally isomorphic to the ring ${\Bbb Z}_n[x]/{\langle x^m-r \rangle}$. From an educational standpoint, th…
▽ More
We define the finite number ring ${\Bbb Z}_n [\sqrt [m] r]$ where $m,n$ are positive integers and $r$ in an integer akin to the definition of the Gaussian integer ${\Bbb Z}[i]$. This idea is also introduced briefly in [7]. By definition, this finite number ring ${\Bbb Z}_n [\sqrt [m] r]$ is naturally isomorphic to the ring ${\Bbb Z}_n[x]/{\langle x^m-r \rangle}$. From an educational standpoint, this description offers a straightforward and elementary presentation of this finite ring, making it suitable for readers who do not have extensive exposure to abstract algebra. We discuss various arithmetical properties of this ring. In particular, when $n=p$ is a prime number and $\mathbb{Z}_p$ contains a primitive $m$-root of unity, we describe the structure of $\mathbb{Z}_n[\sqrt[m]{r}]$ explicitly.
△ Less
Submitted 1 December, 2023;
originally announced December 2023.
-
Pattern retrieval of traffic congestion using graph-based associations of traffic domain-specific features
Authors:
Tin T. Nguyen,
Simeon C. Calvert,
Guopeng Li,
Hans van Lint
Abstract:
The fast-growing amount of traffic data brings many opportunities for revealing more insightful information about traffic dynamics. However, it also demands an effective database management system in which information retrieval is arguably an important feature. The ability to locate similar patterns in big datasets potentially paves the way for further valuable analyses in traffic management. This…
▽ More
The fast-growing amount of traffic data brings many opportunities for revealing more insightful information about traffic dynamics. However, it also demands an effective database management system in which information retrieval is arguably an important feature. The ability to locate similar patterns in big datasets potentially paves the way for further valuable analyses in traffic management. This paper proposes a content-based retrieval system for spatiotemporal patterns of highway traffic congestion. There are two main components in our framework, namely pattern representation and similarity measurement. To effectively interpret retrieval outcomes, the paper proposes a graph-based approach (relation-graph) for the former component, in which fundamental traffic phenomena are encoded as nodes and their spatiotemporal relationships as edges. In the latter component, the similarities between congestion patterns are customizable with various aspects according to user expectations. We evaluated the proposed framework by applying it to a dataset of hundreds of patterns with various complexities (temporally and spatially). The example queries indicate the effectiveness of the proposed method, i.e. the obtained patterns present similar traffic phenomena as in the given examples. In addition, the success of the proposed approach directly derives a new opportunity for semantic retrieval, in which expected patterns are described by adopting the relation-graph notion to associate fundamental traffic phenomena.
△ Less
Submitted 28 November, 2023;
originally announced November 2023.
-
Three invariants of geometrically vertex decomposable ideals
Authors:
Thai Thanh Nguyen,
Jenna Rajchgot,
Adam Van Tuyl
Abstract:
We study three invariants of geometrically vertex decomposable ideals: the Castelnuovo-Mumford regularity, the multiplicity, and the $a$-invariant. We show that these invariants can be computed recursively using the ideals that appear in the geometric vertex decomposition process. As an application, we prove that the $a$-invariant of a geometrically vertex decomposable ideal is non-positive. We al…
▽ More
We study three invariants of geometrically vertex decomposable ideals: the Castelnuovo-Mumford regularity, the multiplicity, and the $a$-invariant. We show that these invariants can be computed recursively using the ideals that appear in the geometric vertex decomposition process. As an application, we prove that the $a$-invariant of a geometrically vertex decomposable ideal is non-positive. We also recover some previously known results in the literature including a formula for the regularity of the Stanley--Reisner ideal of a pure vertex decomposable simplicial complex, and proofs that some well-known families of ideals are Hilbertian. Finally, we apply our recursions to the study of toric ideals of bipartite graphs. Included among our results on this topic is a new proof for a known bound on the $a$-invariant of a toric ideal of a bipartite graph.
△ Less
Submitted 14 November, 2023;
originally announced November 2023.
-
A New Version of q-ary Varshamov-Tenengolts Codes with More Efficient Encoders: The Differential VT Codes and The Differential Shifted VT Codes
Authors:
Tuan Thanh Nguyen,
Kui Cai,
Paul H. Siegel
Abstract:
The problem of correcting deletions and insertions has recently received significantly increased attention due to the DNA-based data storage technology, which suffers from deletions and insertions with extremely high probability. In this work, we study the problem of constructing non-binary burst-deletion/insertion correcting codes. Particularly, for the quaternary alphabet, our designed codes are…
▽ More
The problem of correcting deletions and insertions has recently received significantly increased attention due to the DNA-based data storage technology, which suffers from deletions and insertions with extremely high probability. In this work, we study the problem of constructing non-binary burst-deletion/insertion correcting codes. Particularly, for the quaternary alphabet, our designed codes are suited for correcting a burst of deletions/insertions in DNA storage.
Non-binary codes correcting a single deletion or insertion were introduced by Tenengolts [1984], and the results were extended to correct a fixed-length burst of deletions or insertions by Schoeny et al. [2017]. Recently, Wang et al. [2021] proposed constructions of non-binary codes of length n, correcting a burst of length at most two for q-ary alphabets with redundancy log n+O(log q log log n) bits, for arbitrary even q. The common idea in those constructions is to convert non-binary sequences into binary sequences, and the error decoding algorithms for the q-ary sequences are mainly based on the success of recovering the corresponding binary sequences, respectively. In this work, we look at a natural solution in which the error detection and correction algorithms are performed directly over q-ary sequences, and for certain cases, our codes provide a more efficient encoder with lower redundancy than the best-known encoder in the literature.
△ Less
Submitted 8 November, 2023;
originally announced November 2023.
-
Language-driven Scene Synthesis using Multi-conditional Diffusion Model
Authors:
An Vuong,
Minh Nhat Vu,
Toan Tien Nguyen,
Baoru Huang,
Dzung Nguyen,
Thieu Vo,
Anh Nguyen
Abstract:
Scene synthesis is a challenging problem with several industrial applications. Recently, substantial efforts have been directed to synthesize the scene using human motions, room layouts, or spatial graphs as the input. However, few studies have addressed this problem from multiple modalities, especially combining text prompts. In this paper, we propose a language-driven scene synthesis task, which…
▽ More
Scene synthesis is a challenging problem with several industrial applications. Recently, substantial efforts have been directed to synthesize the scene using human motions, room layouts, or spatial graphs as the input. However, few studies have addressed this problem from multiple modalities, especially combining text prompts. In this paper, we propose a language-driven scene synthesis task, which is a new task that integrates text prompts, human motion, and existing objects for scene synthesis. Unlike other single-condition synthesis tasks, our problem involves multiple conditions and requires a strategy for processing and encoding them into a unified space. To address the challenge, we present a multi-conditional diffusion model, which differs from the implicit unification approach of other diffusion literature by explicitly predicting the guiding points for the original data distribution. We demonstrate that our approach is theoretically supportive. The intensive experiment results illustrate that our method outperforms state-of-the-art benchmarks and enables natural scene editing applications. The source code and dataset can be accessed at https://lang-scene-synth.github.io/.
△ Less
Submitted 24 October, 2023;
originally announced October 2023.
-
Label Space Partition Selection for Multi-Object Tracking Using Two-Layer Partitioning
Authors:
Ji Youn Lee,
Changbeom Shim,
Hoa Van Nguyen,
Tran Thien Dat Nguyen,
Hyun** Choi,
Youngho Kim
Abstract:
Estimating the trajectories of multi-objects poses a significant challenge due to data association ambiguity, which leads to a substantial increase in computational requirements. To address such problems, a divide-and-conquer manner has been employed with parallel computation. In this strategy, distinguished objects that have unique labels are grouped based on their statistical dependencies, the i…
▽ More
Estimating the trajectories of multi-objects poses a significant challenge due to data association ambiguity, which leads to a substantial increase in computational requirements. To address such problems, a divide-and-conquer manner has been employed with parallel computation. In this strategy, distinguished objects that have unique labels are grouped based on their statistical dependencies, the intersection of predicted measurements. Several geometry approaches have been used for label grou** since finding all intersected label pairs is clearly infeasible for large-scale tracking problems. This paper proposes an efficient implementation of label grou** for label-partitioned generalized labeled multi-Bernoulli filter framework using a secondary partitioning technique. This allows for parallel computation in the label graph indexing step, avoiding generating and eliminating duplicate comparisons. Additionally, we compare the performance of the proposed technique with several efficient spatial searching algorithms. The results demonstrate the superior performance of the proposed approach on large-scale data sets, enabling scalable trajectory estimation.
△ Less
Submitted 22 October, 2023;
originally announced October 2023.
-
KAKURENBO: Adaptively Hiding Samples in Deep Neural Network Training
Authors:
Truong Thao Nguyen,
Balazs Gerofi,
Edgar Josafat Martinez-Noriega,
François Trahay,
Mohamed Wahib
Abstract:
This paper proposes a method for hiding the least-important samples during the training of deep neural networks to increase efficiency, i.e., to reduce the cost of training. Using information about the loss and prediction confidence during training, we adaptively find samples to exclude in a given epoch based on their contribution to the overall learning process, without significantly degrading ac…
▽ More
This paper proposes a method for hiding the least-important samples during the training of deep neural networks to increase efficiency, i.e., to reduce the cost of training. Using information about the loss and prediction confidence during training, we adaptively find samples to exclude in a given epoch based on their contribution to the overall learning process, without significantly degrading accuracy. We explore the converge properties when accounting for the reduction in the number of SGD updates. Empirical results on various large-scale datasets and models used directly in image classification and segmentation show that while the with-replacement importance sampling algorithm performs poorly on large datasets, our method can reduce total training time by up to 22% impacting accuracy only by 0.4% compared to the baseline. Code available at https://github.com/TruongThaoNguyen/kakurenbo
△ Less
Submitted 16 October, 2023;
originally announced October 2023.
-
Circular-Line Trajectory Tracking Controller for Mobile Robot using Multi-Pixy2 Sensors
Authors:
Xuan Quang Ngo,
Tri Duc Tran,
Huy Hung Nguyen,
Van Dong Nguyen,
Van Tu Duong,
Tan Tien Nguyen
Abstract:
This study suggests a novel tracking method that employs three Pixy2 sensors to identify the desired line trajectories instead of traditional perceiving means. Firstly, the kinematic model of the mobile robot is derived from the information gathered by three Pixy2 sensors. Secondly, the sliding mode controller is implemented to regulate the tracking error. Finally, simulation results are analyzed…
▽ More
This study suggests a novel tracking method that employs three Pixy2 sensors to identify the desired line trajectories instead of traditional perceiving means. Firstly, the kinematic model of the mobile robot is derived from the information gathered by three Pixy2 sensors. Secondly, the sliding mode controller is implemented to regulate the tracking error. Finally, simulation results are analyzed to show the effectiveness of the proposed method.
△ Less
Submitted 12 August, 2023;
originally announced September 2023.