Skip to main content

Showing 51–100 of 112 results for author: Nguyen, T N

.
  1. Vulnerability Detection with Fine-grained Interpretations

    Authors: Yi Li, Shaohua Wang, Tien N. Nguyen

    Abstract: Despite the successes of machine learning (ML) and deep learning (DL) based vulnerability detectors (VD), they are limited to providing only the decision on whether a given code is vulnerable or not, without details on what part of the code is relevant to the detected vulnerability. We present IVDetect an interpretable vulnerability detector with the philosophy of using Artificial Intelligence (AI… ▽ More

    Submitted 19 June, 2021; originally announced June 2021.

  2. ShortcutFusion: From Tensorflow to FPGA-based accelerator with reuse-aware memory allocation for shortcut data

    Authors: Duy Thanh Nguyen, Hyeonseung Je, Tuan Nghia Nguyen, Soojung Ryu, Kyujoong Lee, Hyuk-Jae Lee

    Abstract: Residual block is a very common component in recent state-of-the art CNNs such as EfficientNet or EfficientDet. Shortcut data accounts for nearly 40% of feature-maps access in ResNet152 [8]. Most of the previous DNN compilers, accelerators ignore the shortcut data optimization. This paper presents ShortcutFusion, an optimization tool for FPGA-based accelerator with a reuse-aware static memory allo… ▽ More

    Submitted 13 February, 2022; v1 submitted 15 June, 2021; originally announced June 2021.

    Comments: Accepted for publication in IEEE Transaction on Circuits and Systems I: Regular Papers

  3. arXiv:2106.07625  [pdf, other

    math.NA math.OC

    On numerical aspects of parameter identification for the Landau-Lifshitz-Gilbert equation in Magnetic Particle Imaging

    Authors: Tram Thi Ngoc Nguyen, Anne Wald

    Abstract: The Landau-Lifshitz-Gilbert equation yields a mathematical model to describe the evolution of the magnetization of a magnetic material, particularly in response to an external applied magnetic field. It allows one to take into account various physical effects, such as the exchange within the magnetic material itself. In particular, the Landau-Lifshitz-Gilbert equation encodes relaxation effects, i… ▽ More

    Submitted 8 June, 2021; originally announced June 2021.

    MSC Class: 35R30; 65M32; 65N21

    Journal ref: Inverse Problems and Imaging, 2021

  4. arXiv:2105.07482  [pdf, other

    cond-mat.mes-hall

    Impact of screening and relaxation onto weakly coupled 2D heterostructures

    Authors: T. T. Nhung Nguyen, T. Sollfrank, C. Tegenkamp, E. Rauls, U. Gerstmann

    Abstract: The stacking of different 2D materials provides a promising approach to realize new states of quantum matter. In this combined scanning tunneling microscopy (STM) and density functional theory (DFT) study we show that the structure in weakly bound, purely van der Waals (vdW) interacting systems is strongly influenced by screening and relaxation. We studied in detail the physisorption of lead phtha… ▽ More

    Submitted 16 May, 2021; originally announced May 2021.

  5. arXiv:2104.02256  [pdf, other

    eess.IV cs.CV

    A clinical validation of VinDr-CXR, an AI system for detecting abnormal chest radiographs

    Authors: Ngoc Huy Nguyen, Ha Quy Nguyen, Nghia Trung Nguyen, Thang Viet Nguyen, Hieu Huy Pham, Tuan Ngoc-Minh Nguyen

    Abstract: Computer-Aided Diagnosis (CAD) systems for chest radiographs using artificial intelligence (AI) have recently shown a great potential as a second opinion for radiologists. The performances of such systems, however, were mostly evaluated on a fixed dataset in a retrospective manner and, thus, far from the real performances in clinical practice. In this work, we demonstrate a mechanism for validatin… ▽ More

    Submitted 6 April, 2021; v1 submitted 5 April, 2021; originally announced April 2021.

    Comments: This is a preprint which has been submitted and under review by PLOS One journal

  6. arXiv:2103.00270  [pdf, other

    cs.SE

    Fault Localization with Code Coverage Representation Learning

    Authors: Yi Li, Shaohua Wang, Tien N. Nguyen

    Abstract: In this paper, we propose DeepRL4FL, a deep learning fault localization (FL) approach that locates the buggy code at the statement and method levels by treating FL as an image pattern recognition problem. DeepRL4FL does so via novel code coverage representation learning (RL) and data dependencies RL for program statements. Those two types of RL on the dynamic information in a code coverage matrix… ▽ More

    Submitted 27 February, 2021; originally announced March 2021.

  7. arXiv:2103.00269  [pdf, other

    cs.SE

    A Context-based Automated Approach for Method Name Consistency Checking and Suggestion

    Authors: Yi Li, Shaohua Wang, Tien N. Nguyen

    Abstract: Misleading method names in software projects can confuse developers, which may lead to software defects and affect code understandability. In this paper, we present DeepName, a context-based, deep learning approach to detect method name inconsistencies and suggest a proper name for a method. The key departure point is the philosophy of "Show Me Your Friends, I'll Tell You Who You Are". Unlike the… ▽ More

    Submitted 27 February, 2021; originally announced March 2021.

  8. arXiv:2102.09030  [pdf, other

    cs.LG math.OC stat.ML

    Proactive DP: A Multple Target Optimization Framework for DP-SGD

    Authors: Marten van Dijk, Nhuong V. Nguyen, Toan N. Nguyen, Lam M. Nguyen, Phuong Ha Nguyen

    Abstract: We introduce a multiple target optimization framework for DP-SGD referred to as pro-active DP. In contrast to traditional DP accountants, which are used to track the expenditure of privacy budgets, the pro-active DP scheme allows one to a-priori select parameters of DP-SGD based on a fixed privacy budget (in terms of $ε$ and $δ$) in such a way to optimize the anticipated utility (test accuracy) th… ▽ More

    Submitted 4 June, 2024; v1 submitted 17 February, 2021; originally announced February 2021.

    Comments: arXiv admin note: text overlap with arXiv:2007.09208, changes in contents and title

  9. arXiv:2012.14078  [pdf, other

    cs.SE

    API Misuse Detection An Immune System inspired Approach

    Authors: Maxime Gallais-Jimenez, Hoan A. Nguyen, Mohamed Aymen Saied, Tien N. Nguyen, Houari Sahraoui

    Abstract: APIs are essential ingredients for develo** complex software systems. However, they are difficult to learn and to use. Thus, developers may misuse them, which results in various types of issues. In this paper, we explore the use of a bio-inspired approach (artificial immune system) to detect API misuses in client code. We built APIMMUNE, a novel API misuse detector. We collect normal usages of a… ▽ More

    Submitted 27 December, 2020; originally announced December 2020.

    Comments: Paper submitted to Journal of Systems and Software

  10. arXiv:2012.09908  [pdf, ps, other

    math.OC math.AP math.DS

    A model reference adaptive system approach for nonlinear online parameter identification

    Authors: Barbara Kaltenbacher, Tram Thi Ngoc Nguyen

    Abstract: Dynamical systems, for instance in model predictive control, often contain unknown parameters, which must be determined during system operation. Online or on-the-fly parameter identification methods are therefore necessary. The challenge of online methods is that one must continuously estimate parameters as experimental data becomes available. The existing techniques in the context of time-depende… ▽ More

    Submitted 2 April, 2021; v1 submitted 17 December, 2020; originally announced December 2020.

    Comments: accepted manuscript in Inverse Problems

  11. arXiv:2012.04934  [pdf, other

    cs.CV cs.LG cs.RO

    AMVNet: Assertion-based Multi-View Fusion Network for LiDAR Semantic Segmentation

    Authors: Venice Erin Liong, Thi Ngoc Tho Nguyen, Sergi Widjaja, Dhananjai Sharma, Zhuang Jie Chong

    Abstract: In this paper, we present an Assertion-based Multi-View Fusion network (AMVNet) for LiDAR semantic segmentation which aggregates the semantic features of individual projection-based networks using late fusion. Given class scores from different projection-based networks, we perform assertion-guided point sampling on score disagreements and pass a set of point-level features for each sampled point t… ▽ More

    Submitted 9 December, 2020; originally announced December 2020.

    Comments: 10 pages, 7 figures, 5 tables

  12. arXiv:2011.07859  [pdf, other

    eess.AS

    A General Network Architecture for Sound Event Localization and Detection Using Transfer Learning and Recurrent Neural Network

    Authors: Thi Ngoc Tho Nguyen, Ngoc Khanh Nguyen, Huy Phan, Lam Pham, Kenneth Ooi, Douglas L. Jones, Woon-Seng Gan

    Abstract: Polyphonic sound event detection and localization (SELD) task is challenging because it is difficult to jointly optimize sound event detection (SED) and direction-of-arrival (DOA) estimation in the same network. We propose a general network architecture for SELD in which the SELD network comprises sub-networks that are pretrained to solve SED and DOA estimation independently, and a recurrent layer… ▽ More

    Submitted 16 November, 2020; originally announced November 2020.

  13. arXiv:2010.14763  [pdf, other

    cs.LG math.OC stat.ML

    Hogwild! over Distributed Local Data Sets with Linearly Increasing Mini-Batch Sizes

    Authors: Marten van Dijk, Nhuong V. Nguyen, Toan N. Nguyen, Lam M. Nguyen, Quoc Tran-Dinh, Phuong Ha Nguyen

    Abstract: Hogwild! implements asynchronous Stochastic Gradient Descent (SGD) where multiple threads in parallel access a common repository containing training data, perform SGD iterations and update shared state that represents a jointly learned (global) model. We consider big data analysis where training data is distributed among local data sets in a heterogeneous way -- and we wish to move SGD computation… ▽ More

    Submitted 26 February, 2021; v1 submitted 26 October, 2020; originally announced October 2020.

    Comments: arXiv admin note: substantial text overlap with arXiv:2007.09208 AISTATS 2021

  14. arXiv:2010.14123  [pdf, ps, other

    cs.CL

    Event Detection: Gate Diversity and Syntactic Importance Scoresfor Graph Convolution Neural Networks

    Authors: Viet Dac Lai, Tuan Ngo Nguyen, Thien Huu Nguyen

    Abstract: Recent studies on event detection (ED) haveshown that the syntactic dependency graph canbe employed in graph convolution neural net-works (GCN) to achieve state-of-the-art per-formance. However, the computation of thehidden vectors in such graph-based models isagnostic to the trigger candidate words, po-tentially leaving irrelevant information for thetrigger candidate for event prediction. In addi… ▽ More

    Submitted 27 October, 2020; originally announced October 2020.

    Comments: EMNLP 2020

  15. arXiv:2010.13391  [pdf, ps, other

    cs.CL

    Graph Transformer Networks with Syntactic and Semantic Structures for Event Argument Extraction

    Authors: Amir Pouran Ben Veyseh, Tuan Ngo Nguyen, Thien Huu Nguyen

    Abstract: The goal of Event Argument Extraction (EAE) is to find the role of each entity mention for a given event trigger word. It has been shown in the previous works that the syntactic structures of the sentences are helpful for the deep learning models for EAE. However, a major problem in such prior works is that they fail to exploit the semantic structures of the sentences to induce effective represent… ▽ More

    Submitted 26 October, 2020; originally announced October 2020.

    Comments: accepted at EMNLP 2020 findings

  16. Connection Pruning for Deep Spiking Neural Networks with On-Chip Learning

    Authors: Thao N. N. Nguyen, Bharadwaj Veeravalli, Xuanyao Fong

    Abstract: Long training time hinders the potential of the deep, large-scale Spiking Neural Network (SNN) with the on-chip learning capability to be realized on the embedded systems hardware. Our work proposes a novel connection pruning approach that can be applied during the on-chip Spike Timing Dependent Plasticity (STDP)-based learning to optimize the learning time and the network connectivity of the deep… ▽ More

    Submitted 31 July, 2021; v1 submitted 8 October, 2020; originally announced October 2020.

    Comments: 8 pages, 9 figures This paper has been accepted for publication in the International Conference on Neuromorphic Systems (ICONS) 2021

    Journal ref: International Conference on Neuromorphic Systems 2021

  17. arXiv:2007.14034  [pdf, ps, other

    math.NA

    Simultaneous diagonalization via congruence of Hermitian matrices: some equivalent conditions and a numerical solution

    Authors: T. H. Le, T. N. Nguyen

    Abstract: This paper aims at solving the Hermitian SDC problem, i.e., that of \textit{simultaneously diagonalizing via $*$-congruence} a collection of finitely many (not need pairwise commute) Hermitian matrices. Theoretically, we provide some equivalent conditions for that such a matrix collection can be simultaneously diagonalized via $^*$-congruence.% by a nonsingular matrix. Interestingly, one of such c… ▽ More

    Submitted 15 November, 2020; v1 submitted 28 July, 2020; originally announced July 2020.

    MSC Class: 15A20; 15A22; 15B57

  18. arXiv:2007.09208  [pdf, other

    cs.LG cs.CR math.OC stat.ML

    Asynchronous Federated Learning with Reduced Number of Rounds and with Differential Privacy from Less Aggregated Gaussian Noise

    Authors: Marten van Dijk, Nhuong V. Nguyen, Toan N. Nguyen, Lam M. Nguyen, Quoc Tran-Dinh, Phuong Ha Nguyen

    Abstract: The feasibility of federated learning is highly constrained by the server-clients infrastructure in terms of network communication. Most newly launched smartphones and IoT devices are equipped with GPUs or sufficient computing hardware to run powerful AI models. However, in case of the original synchronous federated learning, client devices suffer waiting times and regular communication between cl… ▽ More

    Submitted 17 July, 2020; originally announced July 2020.

  19. arXiv:2006.00359  [pdf

    cond-mat.mtrl-sci cond-mat.mes-hall physics.app-ph

    Silicon carbide stacking-order-induced do** variation in epitaxial graphene

    Authors: Davood Momeni Pakdehi, Philip Schädlich, T. T. Nhung Nguyen, Alexei A. Zakharov, Stefan Wundrack, Florian Speck, Klaus Pierz, Thomas Seyller, Christoph Tegenkamp, Hans. W. Schumacher

    Abstract: Generally, it is supposed that the Fermi level in epitaxial graphene is controlled by two effects: p-type polarization do** induced by the bulk of the hexagonal SiC(0001) substrate and overcompensation by donor-like states related to the buffer layer. In this work, we evidence that this effect is also related to the specific underlying SiC terrace. We fabricated a periodic sequence of non-identi… ▽ More

    Submitted 30 May, 2020; originally announced June 2020.

    Journal ref: Adv. Funct. Mater. 2020, 2004695

  20. arXiv:2005.02928  [pdf, other

    cs.CY

    BigO: A public health decision support system for measuring obesogenic behaviors of children in relation to their local environment

    Authors: Christos Diou, Ioannis Sarafis, Vasileios Papapanagiotou, Leonidas Alagialoglou, Irini Lekka, Dimitrios Filos, Leandros Stefanopoulos, Vasileios Kilintzis, Christos Maramis, Youla Karavidopoulou, Nikos Maglaveras, Ioannis Ioakimidis, Evangelia Charmandari, Penio Kassari, Athanasia Tragomalou, Monica Mars, Thien-An Ngoc Nguyen, Tahar Kechadi, Shane O' Donnell, Gerardine Doyle, Sarah Browne, Grace O' Malley, Rachel Heimeier, Katerina Riviou, Evangelia Koukoula , et al. (6 additional authors not shown)

    Abstract: Obesity is a complex disease and its prevalence depends on multiple factors related to the local socioeconomic, cultural and urban context of individuals. Many obesity prevention strategies and policies, however, are horizontal measures that do not depend on context-specific evidence. In this paper we present an overview of BigO (http://bigoprogram.eu), a system designed to collect objective behav… ▽ More

    Submitted 6 May, 2020; originally announced May 2020.

    Comments: Accepted version to be published in 2020, 42nd Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), Montreal, Canada

  21. arXiv:2002.11396  [pdf, ps, other

    math.AG

    On the classification of cubic plane Cremona maps

    Authors: Alberto Calabri, Thi Ngoc Giao Nguyen

    Abstract: We give a fine classification of cubic plane Cremona maps. A previous partial classification was obtained by Cerveau and Déserti a few years ago.

    Submitted 26 February, 2020; originally announced February 2020.

    Comments: 39 pages, 6 tables

    MSC Class: 14E07

  22. A Sequence Matching Network for Polyphonic Sound Event Localization and Detection

    Authors: Thi Ngoc Tho Nguyen, Douglas L. Jones, Woon-Seng Gan

    Abstract: Polyphonic sound event detection and direction-of-arrival estimation require different input features from audio signals. While sound event detection mainly relies on time-frequency patterns, direction-of-arrival estimation relies on magnitude or phase differences between microphones. Previous approaches use the same input features for sound event detection and direction-of-arrival estimation, and… ▽ More

    Submitted 13 February, 2020; originally announced February 2020.

    Comments: to be published in 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)

  23. arXiv:2001.09743  [pdf, other

    cs.CY cs.SI

    Understanding Our People at Scale

    Authors: Tam N. Nguyen

    Abstract: Human psychology plays an important role in organizational performance. However, understanding our employees is a difficult task due to issues such as psychological complexities, unpredictable dynamics, and the lack of data. Leveraging evidence-based psychology knowledge, this paper proposes a hybrid machine learning plus ontology-based reasoning system for detecting human psychological artifacts… ▽ More

    Submitted 5 January, 2020; originally announced January 2020.

    Comments: 29 pages APA style (8 reference pages), 5 figures, 1 table

    ACM Class: H.1; I.7; J.4

  24. arXiv:1911.11373  [pdf, other

    eess.AS cs.SD

    A two-step system for sound event localization and detection

    Authors: T. N. T. Nguyen, D. L. Jones, R. Ranjan, S. Jayabalan, W. S. Gan

    Abstract: Sound event detection and sound event localization requires different features from audio input signals. While sound event detection mainly relies on time-frequency patterns to distinguish different event classes, sound event localization uses magnitude or phase differences between microphones to estimate source directions. Therefore, we propose a two-step system to do sound event localization and… ▽ More

    Submitted 26 November, 2019; originally announced November 2019.

    Comments: 5 pages

  25. arXiv:1911.07781  [pdf, other

    cs.SE

    Combining Program Analysis and Statistical Language Model for Code Statement Completion

    Authors: Son Nguyen, Tien N. Nguyen, Yi Li, Shaohua Wang

    Abstract: Automatic code completion helps improve developers' productivity in their programming tasks. A program contains instructions expressed via code statements, which are considered as the basic units of program execution. In this paper, we introduce AutoSC, which combines program analysis and the principle of software naturalness to fill in a partially completed statement. AutoSC benefits from the str… ▽ More

    Submitted 18 November, 2019; originally announced November 2019.

    Comments: Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering Conference (ASE 2019)

  26. arXiv:1911.07779  [pdf, other

    cs.SE

    Feature-Interaction Aware Configuration Prioritization for Configurable Code

    Authors: Son Nguyen, Hoan Nguyen, Ngoc Tran, Hieu Tran, Tien N. Nguyen

    Abstract: Unexpected interactions among features induce most bugs in a configurable software system. Exhaustively analyzing all the exponential number of possible configurations is prohibitively costly. Thus, various sampling techniques have been proposed to systematically narrow down the exponential number of legal configurations to be analyzed. Since analyzing all selected configurations can require a hug… ▽ More

    Submitted 18 November, 2019; originally announced November 2019.

    Comments: Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering Conference (ASE 2019)

  27. arXiv:1911.01055  [pdf, ps, other

    cs.CL

    On the Effectiveness of the Pooling Methods for Biomedical Relation Extraction with Deep Learning

    Authors: Tuan Ngo Nguyen, Franck Dernoncourt, Thien Huu Nguyen

    Abstract: Deep learning models have achieved state-of-the-art performances on many relation extraction datasets. A common element in these deep learning models involves the pooling mechanisms where a sequence of hidden vectors is aggregated to generate a single representation vector, serving as the features to perform prediction for RE. Unfortunately, the models in the literature tend to employ different st… ▽ More

    Submitted 4 November, 2019; originally announced November 2019.

  28. arXiv:1910.05310  [pdf

    cs.NI

    A Heuristic for Maximizing the Lifetime of Data Aggregation in Wireless Sensor Networks

    Authors: Bing-Hong Liu, Van-Trung Pham, Tu N. Nguyen, Yi-Sheng Luo

    Abstract: Recently, many researchers have studied efficiently gathering data in wireless sensor networks to minimize the total energy consumption when a fixed number of data are allowed to be aggregated into one packet. However, minimizing the total energy consumption does not imply the network lifetime is maximized. In this paper, we study the problem of scheduling data aggregation trees working for differ… ▽ More

    Submitted 22 September, 2019; originally announced October 2019.

    Comments: International Congress on Engineering and Information

  29. arXiv:1909.07227  [pdf, other

    cs.CR cs.LG

    A Convolutional Transformation Network for Malware Classification

    Authors: Duc-Ly Vu, Trong-Kha Nguyen, Tam V. Nguyen, Tu N. Nguyen, Fabio Massacci, Phu H. Phung

    Abstract: Modern malware evolves various detection avoidance techniques to bypass the state-of-the-art detection methods. An emerging trend to deal with this issue is the combination of image transformation and machine learning techniques to classify and detect malware. However, existing works in this field only perform simple image transformation methods that limit the accuracy of the detection. In this pa… ▽ More

    Submitted 16 September, 2019; originally announced September 2019.

    Comments: 6 pages, 4 figures

  30. arXiv:1909.02912  [pdf, ps, other

    math.AP

    Parameter identification for the Landau-Lifshitz-Gilbert equation in Magnetic Particle Imaging

    Authors: Barbara Kaltenbacher, Tram Thi Ngoc Nguyen, Anne Wald, Thomas Schuster

    Abstract: Magnetic particle imaging (MPI) is a tracer-based technique for medical imaging where the tracer consists of ironoxide nanoparticles. The key idea is to measure the particle response to a temporally changing external magnetic field to compute the spatial concentration of the tracer inside the object. A decent mathematical model demands for a data-driven computation of the system function which doe… ▽ More

    Submitted 6 September, 2019; originally announced September 2019.

    Comments: 24 pages, no figures

    MSC Class: 35R30

  31. arXiv:1909.02616  [pdf, other

    cs.SE

    An Empirical Study on the Characteristics of Question-Answering Process on Developer Forums

    Authors: Yi Li, Shaohua Wang, Tien N. Nguyen, Son Van Nguyen, Xinyue Ye, Yan Wang

    Abstract: Developer forums are one of the most popular and useful Q&A websites on API usages. The analysis of API forums can be a critical resource for the automated question and answer approaches. In this paper, we empirically study three API forums including Twitter, eBay, and AdWords, to investigate the characteristics of question-answering process. We observe that +60% of the posts on all three forums w… ▽ More

    Submitted 8 September, 2019; v1 submitted 5 September, 2019; originally announced September 2019.

  32. Assessment of gait normality using a depth camera and mirrors

    Authors: Trong Nguyen Nguyen, Huu Hung Huynh, Jean Meunier

    Abstract: This paper presents an initial work on assessment of gait normality in which the human body motion is represented by a sequence of enhanced depth maps. The input data is provided by a system consisting of a Time-of-Flight (ToF) depth camera and two mirrors. This approach proposes two feature types to describe characteristics of localized points of interest and the level of posture symmetry. These… ▽ More

    Submitted 17 August, 2019; originally announced August 2019.

    Comments: 2018 IEEE EMBS International Conference on Biomedical & Health Informatics (BHI)

  33. Skeleton-based Gait Index Estimation with LSTMs

    Authors: Trong Nguyen Nguyen, Huu Hung Huynh, Jean Meunier

    Abstract: In this paper, we propose a method that estimates a gait index for a sequence of skeletons. Our system is a stack of an encoder and a decoder that are formed by Long Short-Term Memories (LSTMs). In the encoding stage, the characteristics of an input are automatically determined and are compressed into a latent space. The decoding stage then attempts to reconstruct the input according to such inter… ▽ More

    Submitted 17 August, 2019; originally announced August 2019.

    Comments: 2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS)

  34. Estimating skeleton-based gait abnormality index by sparse deep auto-encoder

    Authors: Trong Nguyen Nguyen, Huu Hung Huynh, Jean Meunier

    Abstract: This paper proposes an approach estimating a gait abnormality index based on skeletal information provided by a depth camera. Differently from related works where the extraction of hand-crafted features is required to describe gait characteristics, our method automatically performs that stage with the support of a deep auto-encoder. In order to get visually interpretable features, we embedded a co… ▽ More

    Submitted 17 August, 2019; originally announced August 2019.

    Comments: 2018 IEEE Seventh International Conference on Communications and Electronics (ICCE)

  35. arXiv:1908.06351  [pdf, other

    cs.CV cs.LG cs.NE

    Anomaly Detection in Video Sequence with Appearance-Motion Correspondence

    Authors: Trong Nguyen Nguyen, Jean Meunier

    Abstract: Anomaly detection in surveillance videos is currently a challenge because of the diversity of possible events. We propose a deep convolutional neural network (CNN) that addresses this problem by learning a correspondence between common object appearances (e.g. pedestrian, background, tree, etc.) and their associated motions. Our model is designed as a combination of a reconstruction network and an… ▽ More

    Submitted 17 August, 2019; originally announced August 2019.

    Comments: Paper accepted for ICCV 2019

  36. arXiv:1908.06347  [pdf, other

    cs.CV cs.LG cs.NE

    Hybrid Deep Network for Anomaly Detection

    Authors: Trong Nguyen Nguyen, Jean Meunier

    Abstract: In this paper, we propose a deep convolutional neural network (CNN) for anomaly detection in surveillance videos. The model is adapted from a typical auto-encoder working on video patches under the perspective of sparse combination learning. Our CNN focuses on (unsupervisedly) learning common characteristics of normal events with the emphasis of their spatial locations (by supervised losses). To o… ▽ More

    Submitted 17 August, 2019; originally announced August 2019.

    Comments: Paper accepted for BMVC 2019

  37. Matching-based Depth Camera and Mirrors for 3D Reconstruction

    Authors: Trong Nguyen Nguyen, Huu Hung Huynh, Jean Meunier

    Abstract: Reconstructing 3D object models is playing an important role in many applications in the field of computer vision. Instead of employing a collection of cameras and/or sensors as in many studies, this paper proposes a simple way to build a cheaper system for 3D reconstruction using only one depth camera and 2 or more mirrors. Each mirror is equivalently considered as a depth camera at another viewp… ▽ More

    Submitted 17 August, 2019; originally announced August 2019.

    Journal ref: Proc. SPIE 10666, Three-Dimensional Imaging, Visualization, and Display 2018, 1066610 (16 May 2018)

  38. arXiv:1908.01239  [pdf, ps, other

    math.AP math.DS math.NA math.OC

    The tangential cone condition for some coefficient identification model problems in parabolic PDEs

    Authors: Barbara Kaltenbacher, Tram Thi Ngoc Nguyen, Otmar Scherzer

    Abstract: The tangential condition was introduced in [Hanke et al., 95] as a sufficient condition for convergence of the Landweber iteration for solving ill-posed problems. In this paper we present a series of time dependent benchmark inverse problems for which we can verify this condition.

    Submitted 5 August, 2021; v1 submitted 3 August, 2019; originally announced August 2019.

    Journal ref: Time-dependent Problems in Imaging and Parameter Identification, Springer (2021)

  39. Does BLEU Score Work for Code Migration?

    Authors: Ngoc Tran, Hieu Tran, Son Nguyen, Hoan Nguyen, Tien N. Nguyen

    Abstract: Statistical machine translation (SMT) is a fast-growing sub-field of computational linguistics. Until now, the most popular automatic metric to measure the quality of SMT is BiLingual Evaluation Understudy (BLEU) score. Lately, SMT along with the BLEU metric has been applied to a Software Engineering task named code migration. (In)Validating the use of BLEU score could advance the research and dev… ▽ More

    Submitted 11 June, 2019; originally announced June 2019.

    Comments: 12 pages, 5 figures, ICPC '19 Proceedings of the 27th International Conference on Program Comprehension

  40. Landweber-Kaczmarz for parameter identification in time-dependent inverse problems: All-at-once versus Reduced version

    Authors: Tram Thi Ngoc Nguyen

    Abstract: In this study, we consider a general time-space system, whose model operator and observation operator are locally Lipschitz continuous, over a finite time horizon and parameter identification by using Landweber-Kaczmarz regularization. The problem is investigated in two different modeling settings: An All-at-once and a Reduced version, together with two observation scenarios: continuous and discre… ▽ More

    Submitted 30 January, 2019; originally announced January 2019.

    Comments: 30 pages, 4 figures, accepted manuscript by Inverse Problem (DOI: 10.1088/1361-6420/aaf9ba)

    MSC Class: 65M32; 65N21

  41. arXiv:1901.06550  [pdf, ps, other

    math.FA

    Lusin characterisation of Hardy spaces associated with Hermite operators

    Authors: Tan Duc Do, Trong Ngoc Nguyen, Truong Xuan Le

    Abstract: Let $d \in \{3, 4, 5, \ldots\}$ and $p \in (0,1]$. We consider the Hermite operator $L = -Δ+ |x|^2$ on its maximal domain in $L^2(\mathbb{R}^d)$. Let $H_L^p(\mathbb{R}^d)$ be the completion of $ \{ f \in L^2(\mathbb{R}^d): \mathcal{M}_L f \in L^p(\mathbb{R}^d) \} $ with respect to the quasi-norm $ \|\cdot\|_{H_L^p} = \|\mathcal{M}\cdot\|_{L^p}, $ where… ▽ More

    Submitted 19 January, 2019; originally announced January 2019.

    Comments: 16 pages

    MSC Class: 42B30; 42B37

  42. arXiv:1812.04234  [pdf, other

    cs.CR

    Intelligence-based Cybersecurity Awareness Training- an Exploratory Project

    Authors: Tam n. Nguyen, Lydia Sbityakov, Samantha Scoggins

    Abstract: Cybersecurity training should be adaptable to evolving the cyber threat landscape, cost effective and integrated well with other enterprise management components. Unfortunately, very few cybersecurity training platforms can satisfy such requirements. This paper proposes a new and novel model for conducting cybersecurity training with three main objectives: (i) training should be initiated by emerg… ▽ More

    Submitted 11 December, 2018; originally announced December 2018.

    Comments: 8 pages, 3 figures

  43. arXiv:1811.04998  [pdf

    cond-mat.mtrl-sci cond-mat.mes-hall

    Homogeneous Large-area Quasi-freestanding Monolayer and Bilayer Graphene on SiC

    Authors: Davood Momeni Pakdehi, Klaus Pierz, Stefan Wundrack, Johannes Aprojanz, Thi Thuy Nhung Nguyen, Thorsten Dziomba, Frank Hohls, Andrey Bakin, Rainer Stosch, Christoph Tegenkamp, Franz J. Ahlers, Hans W. Schumacher

    Abstract: In this study, we first show that the argon flow during epitaxial graphene growth is an important parameter to control the quality of the buffer and the graphene layer. Atomic force microscopy (AFM) and low-energy electron diffraction (LEED) measurements reveal that the decomposition of the SiC substrate strongly depends on the Ar mass flow rate while pressure and temperature are kept constant. Ou… ▽ More

    Submitted 12 November, 2018; originally announced November 2018.

    Comments: Supplementary data is included

    Journal ref: ACS Appl. Nano Mater. 2019, 2, 2, 844-852

  44. arXiv:1811.02887  [pdf, other

    cs.CY cs.CR

    Certified Ethical Hacker v.10 Online Course - a Case Study

    Authors: Tam N. Nguyen

    Abstract: CEH v.10 Certification Self-study Course is an online course preparing learners for one of the most prestige cyber security certifications in the world - the Certified Ethical Hacker (CEH) v.10 Certification. Due to a pay wall and the practical rather than theoretical nature, most researchers have limited exposure to this course. For the first time, this paper will analyze the course's instruction… ▽ More

    Submitted 17 October, 2018; originally announced November 2018.

    Comments: 8 pages, 3 figures, 1 table

  45. arXiv:1804.09322  [pdf

    cs.CV

    Robust Anomaly-Based Ship Proposals Detection from Pan-sharpened High-Resolution Satellite Image

    Authors: Viet Hung Luu, Nguyen Hoang Hoa Luong, Quang Hung Bui, Thi Nhat Thanh Nguyen

    Abstract: Pre-screening of ship proposals is now employed by top ship detectors to avoid exhaustive search across image. In very high resolution (VHR) optical image, ships appeared as a cluster of abnormal bright pixels in open sea clutter (noise-like background). Anomaly-based detector utilizing Panchromatic (PAN) data has been widely used in many researches to detect ships, however, still facing two main… ▽ More

    Submitted 24 April, 2018; originally announced April 2018.

  46. The Challenges in SDN/ML Based Network Security : A Survey

    Authors: Tam N. Nguyen

    Abstract: Machine Learning is gaining popularity in the network security domain as many more network-enabled devices get connected, as malicious activities become stealthier, and as new technologies like Software Defined Networking (SDN) emerge. Sitting at the application layer and communicating with the control layer, machine learning based SDN security models exercise a huge influence on the routing/switc… ▽ More

    Submitted 14 April, 2018; v1 submitted 8 April, 2018; originally announced April 2018.

    Comments: 8 pages. arXiv admin note: substantial text overlap with arXiv:1705.00564

    Journal ref: 2018 2nd Cyber Security in Networking Conference (CSNet)

  47. arXiv:1803.02326  [pdf

    cs.CV

    Comparison of various image fusion methods for impervious surface classification from VNREDSat-1

    Authors: Hung V. Luu, Manh V. Pham, Chuc D. Man, Hung Q. Bui, Thanh T. N. Nguyen

    Abstract: Impervious surface is an important indicator for urban development monitoring. Accurate urban impervious surfaces map** with VNREDSat-1 remains challenging due to their spectral diversity not captured by individual PAN image. In this artical, five multi-resolution image fusion techniques were compared for classification task of urban impervious surface. The result shows that for VNREDSat-1 datas… ▽ More

    Submitted 4 May, 2018; v1 submitted 6 March, 2018; originally announced March 2018.

  48. arXiv:1712.00242  [pdf, other

    cs.SE

    A Systematic Evaluation of Static API-Misuse Detectors

    Authors: Sven Amann, Hoan Anh Nguyen, Sarah Nadi, Tien N. Nguyen, Mira Mezini

    Abstract: Application Programming Interfaces (APIs) often have usage constraints, such as restrictions on call order or call conditions. API misuses, i.e., violations of these constraints, may lead to software crashes, bugs, and vulnerabilities. Though researchers developed many API-misuse detectors over the last two decades, recent studies show that API misuses are still prevalent. Therefore, we need to un… ▽ More

    Submitted 13 March, 2018; v1 submitted 1 December, 2017; originally announced December 2017.

    Comments: Accepted for publication in IEEE Transactions on Software Engineering, March 12, 2018 Artifact page: http://www.st.informatik.tu-darmstadt.de/artifacts/mustudy/ 19 pages; 1 figure; 9 tables; 6 listings

  49. arXiv:1709.01070  [pdf, other

    cs.MA cs.AI

    Maintaining Ad-Hoc Communication Network in Area Protection Scenarios with Adversarial Agents

    Authors: Marika Ivanová, Pavel Surynek, Diep Thi Ngoc Nguyen

    Abstract: We address a problem of area protection in graph-based scenarios with multiple mobile agents where connectivity is maintained among agents to ensure they can communicate. The problem consists of two adversarial teams of agents that move in an undirected graph shared by both teams. Agents are placed in vertices of the graph; at most one agent can occupy a vertex; and they can move into adjacent ver… ▽ More

    Submitted 4 September, 2017; originally announced September 2017.

    Comments: arXiv admin note: substantial text overlap with arXiv:1708.07285

  50. arXiv:1707.01595  [pdf, other

    cond-mat.mes-hall

    Direct observation of magnetic droplet solitons in all-perpendicular spin torque nano-oscillators

    Authors: Sunjae Chung, Q. Tuan Le, Martina Ahlberg, Markus Weigand, Iuliia Bykova, Ahmad A. Awad, Hamid Mazraati, Afshin Houshang, Sheng Jiang, T. N. Anh Nguyen, Eberhard Goering, Gisela Schütz, Joachim Gräfe, Johan Åkerman

    Abstract: Magnetic droplets are non-topological dynamical solitons that can be nucleated and sustained in nano-contact based spin torque nano-oscillators (NC-STNOs) with perpendicular anisotropy free layers. While originally predicted in all-perpendicular NC-STNOs, all experimental demonstrations have so far relied on orthogonal devices with an in-plane polarizing layer that requires a strong magnetic field… ▽ More

    Submitted 5 July, 2017; originally announced July 2017.