-
Vulnerability Detection with Fine-grained Interpretations
Authors:
Yi Li,
Shaohua Wang,
Tien N. Nguyen
Abstract:
Despite the successes of machine learning (ML) and deep learning (DL) based vulnerability detectors (VD), they are limited to providing only the decision on whether a given code is vulnerable or not, without details on what part of the code is relevant to the detected vulnerability. We present IVDetect an interpretable vulnerability detector with the philosophy of using Artificial Intelligence (AI…
▽ More
Despite the successes of machine learning (ML) and deep learning (DL) based vulnerability detectors (VD), they are limited to providing only the decision on whether a given code is vulnerable or not, without details on what part of the code is relevant to the detected vulnerability. We present IVDetect an interpretable vulnerability detector with the philosophy of using Artificial Intelligence (AI) to detect vulnerabilities, while using Intelligence Assistant (IA) via providing VD interpretations in terms of vulnerable statements.
For vulnerability detection, we separately consider the vulnerable statements and their surrounding contexts via data and control dependencies. This allows our model better discriminate vulnerable statements than using the mixture of vulnerable code and~contextual code as in existing approaches. In addition to the coarse-grained vulnerability detection result, we leverage interpretable AI to provide users with fine-grained interpretations that include the sub-graph in the Program Dependency Graph (PDG) with the crucial statements that are relevant to the detected vulnerability. Our empirical evaluation on vulnerability databases shows that IVDetect outperforms the existing DL-based approaches by 43%--84% and 105%--255% in top-10 nDCG and MAP ranking scores. IVDetect correctly points out the vulnerable statements relevant to the vulnerability via its interpretation~in 67% of the cases with a top-5 ranked list. It improves over baseline interpretation models by 12.3%--400% and 9%--400% in accuracy.
△ Less
Submitted 19 June, 2021;
originally announced June 2021.
-
ShortcutFusion: From Tensorflow to FPGA-based accelerator with reuse-aware memory allocation for shortcut data
Authors:
Duy Thanh Nguyen,
Hyeonseung Je,
Tuan Nghia Nguyen,
Soojung Ryu,
Kyujoong Lee,
Hyuk-Jae Lee
Abstract:
Residual block is a very common component in recent state-of-the art CNNs such as EfficientNet or EfficientDet. Shortcut data accounts for nearly 40% of feature-maps access in ResNet152 [8]. Most of the previous DNN compilers, accelerators ignore the shortcut data optimization. This paper presents ShortcutFusion, an optimization tool for FPGA-based accelerator with a reuse-aware static memory allo…
▽ More
Residual block is a very common component in recent state-of-the art CNNs such as EfficientNet or EfficientDet. Shortcut data accounts for nearly 40% of feature-maps access in ResNet152 [8]. Most of the previous DNN compilers, accelerators ignore the shortcut data optimization. This paper presents ShortcutFusion, an optimization tool for FPGA-based accelerator with a reuse-aware static memory allocation for shortcut data, to maximize on-chip data reuse given resource constraints. From TensorFlow DNN models, the proposed design generates instruction sets for a group of nodes which uses an optimized data reuse for each residual block. The accelerator design implemented on the Xilinx KCU1500 FPGA card 2.8x faster and 9.9x more power efficient than NVIDIA RTX 2080 Ti for 256x256 input size. . Compared to the result from baseline, in which the weights, inputs, and outputs are accessed from the off-chip memory exactly once per each layer, ShortcutFusion reduces the DRAM access by 47.8-84.8% for RetinaNet, Yolov3, ResNet152, and EfficientNet. Given a similar buffer size to ShortcutMining [8], which also mine the shortcut data in hardware, the proposed work reduces off-chip access for feature-maps 5.27x while accessing weight from off-chip memory exactly once.
△ Less
Submitted 13 February, 2022; v1 submitted 15 June, 2021;
originally announced June 2021.
-
On numerical aspects of parameter identification for the Landau-Lifshitz-Gilbert equation in Magnetic Particle Imaging
Authors:
Tram Thi Ngoc Nguyen,
Anne Wald
Abstract:
The Landau-Lifshitz-Gilbert equation yields a mathematical model to describe the evolution of the magnetization of a magnetic material, particularly in response to an external applied magnetic field. It allows one to take into account various physical effects, such as the exchange within the magnetic material itself. In particular, the Landau-Lifshitz-Gilbert equation encodes relaxation effects, i…
▽ More
The Landau-Lifshitz-Gilbert equation yields a mathematical model to describe the evolution of the magnetization of a magnetic material, particularly in response to an external applied magnetic field. It allows one to take into account various physical effects, such as the exchange within the magnetic material itself. In particular, the Landau-Lifshitz-Gilbert equation encodes relaxation effects, i.e., it describes the time-delayed alignment of the magnetization field with an external magnetic field. These relaxation effects are an important aspect in magnetic particle imaging, particularly in the calibration process. In this article, we address the data-driven modeling of the system function in magnetic particle imaging, where the Landau-Lifshitz-Gilbert equation serves as the basic tool to include relaxation effects in the model. We formulate the respective parameter identification problem both in the all-at-once and the reduced setting, present reconstruction algorithms that yield a regularized solution and discuss numerical experiments. Apart from that, we propose a practical numerical solver to the nonlinear Landau-Lifshitz-Gilbert equation, not via the classical finite element method, but through solving only linear PDEs in an inverse problem framework.
△ Less
Submitted 8 June, 2021;
originally announced June 2021.
-
Impact of screening and relaxation onto weakly coupled 2D heterostructures
Authors:
T. T. Nhung Nguyen,
T. Sollfrank,
C. Tegenkamp,
E. Rauls,
U. Gerstmann
Abstract:
The stacking of different 2D materials provides a promising approach to realize new states of quantum matter. In this combined scanning tunneling microscopy (STM) and density functional theory (DFT) study we show that the structure in weakly bound, purely van der Waals (vdW) interacting systems is strongly influenced by screening and relaxation. We studied in detail the physisorption of lead phtha…
▽ More
The stacking of different 2D materials provides a promising approach to realize new states of quantum matter. In this combined scanning tunneling microscopy (STM) and density functional theory (DFT) study we show that the structure in weakly bound, purely van der Waals (vdW) interacting systems is strongly influenced by screening and relaxation. We studied in detail the physisorption of lead phthalocyanine (PbPc) molecules on epitaxial monolayer graphene on SiC(0001) as well as on highly ordered pyrolytic graphite (HOPG), resembling truly 2D and anisotropic, semi-infinite 3D supports. Our analysis demonstrates that the different deformation ability of the vdW coupled systems, i.e. their actual thickness and buckling, triggers the molecular morphology and exhibits a proximity coupled band structure. It thus provides important implications for future 2D design concepts.
△ Less
Submitted 16 May, 2021;
originally announced May 2021.
-
A clinical validation of VinDr-CXR, an AI system for detecting abnormal chest radiographs
Authors:
Ngoc Huy Nguyen,
Ha Quy Nguyen,
Nghia Trung Nguyen,
Thang Viet Nguyen,
Hieu Huy Pham,
Tuan Ngoc-Minh Nguyen
Abstract:
Computer-Aided Diagnosis (CAD) systems for chest radiographs using artificial intelligence (AI) have recently shown a great potential as a second opinion for radiologists. The performances of such systems, however, were mostly evaluated on a fixed dataset in a retrospective manner and, thus, far from the real performances in clinical practice. In this work, we demonstrate a mechanism for validatin…
▽ More
Computer-Aided Diagnosis (CAD) systems for chest radiographs using artificial intelligence (AI) have recently shown a great potential as a second opinion for radiologists. The performances of such systems, however, were mostly evaluated on a fixed dataset in a retrospective manner and, thus, far from the real performances in clinical practice. In this work, we demonstrate a mechanism for validating an AI-based system for detecting abnormalities on X-ray scans, VinDr-CXR, at the Phu Tho General Hospital - a provincial hospital in the North of Vietnam. The AI system was directly integrated into the Picture Archiving and Communication System (PACS) of the hospital after being trained on a fixed annotated dataset from other sources. The performance of the system was prospectively measured by matching and comparing the AI results with the radiology reports of 6,285 chest X-ray examinations extracted from the Hospital Information System (HIS) over the last two months of 2020. The normal/abnormal status of a radiology report was determined by a set of rules and served as the ground truth. Our system achieves an F1 score - the harmonic average of the recall and the precision - of 0.653 (95% CI 0.635, 0.671) for detecting any abnormalities on chest X-rays. Despite a significant drop from the in-lab performance, this result establishes a high level of confidence in applying such a system in real-life situations.
△ Less
Submitted 6 April, 2021; v1 submitted 5 April, 2021;
originally announced April 2021.
-
Fault Localization with Code Coverage Representation Learning
Authors:
Yi Li,
Shaohua Wang,
Tien N. Nguyen
Abstract:
In this paper, we propose DeepRL4FL, a deep learning fault localization (FL) approach that locates the buggy code at the statement and method levels by treating FL as an image pattern recognition problem. DeepRL4FL does so via novel code coverage representation learning (RL) and data dependencies RL for program statements. Those two types of RL on the dynamic information in a code coverage matrix…
▽ More
In this paper, we propose DeepRL4FL, a deep learning fault localization (FL) approach that locates the buggy code at the statement and method levels by treating FL as an image pattern recognition problem. DeepRL4FL does so via novel code coverage representation learning (RL) and data dependencies RL for program statements. Those two types of RL on the dynamic information in a code coverage matrix are also combined with the code representation learning on the static information of the usual suspicious source code. This combination is inspired by crime scene investigation in which investigators analyze the crime scene (failed test cases and statements) and related persons (statements with dependencies), and at the same time, examine the usual suspects who have committed a similar crime in the past (similar buggy code in the training data).
For the code coverage information, DeepRL4FL first orders the test cases and marks error-exhibiting code statements, expecting that a model can recognize the patterns discriminating between faulty and non-faulty statements/methods. For dependencies among statements, the suspiciousness of a statement is seen taking into account the data dependencies to other statements in execution and data flows, in addition to the statement by itself. Finally, the vector representations for code coverage matrix, data dependencies among statements, and source code are combined and used as the input of a classifier built from a Convolution Neural Network to detect buggy statements/methods. Our empirical evaluation shows that DeepRL4FL improves the top-1 results over the state-of-the-art statement-level FL baselines from 173.1% to 491.7%. It also improves the top-1 results over the existing method-level FL baselines from 15.0% to 206.3%.
△ Less
Submitted 27 February, 2021;
originally announced March 2021.
-
A Context-based Automated Approach for Method Name Consistency Checking and Suggestion
Authors:
Yi Li,
Shaohua Wang,
Tien N. Nguyen
Abstract:
Misleading method names in software projects can confuse developers, which may lead to software defects and affect code understandability. In this paper, we present DeepName, a context-based, deep learning approach to detect method name inconsistencies and suggest a proper name for a method. The key departure point is the philosophy of "Show Me Your Friends, I'll Tell You Who You Are". Unlike the…
▽ More
Misleading method names in software projects can confuse developers, which may lead to software defects and affect code understandability. In this paper, we present DeepName, a context-based, deep learning approach to detect method name inconsistencies and suggest a proper name for a method. The key departure point is the philosophy of "Show Me Your Friends, I'll Tell You Who You Are". Unlike the state-of-the-art approaches, in addition to the method's body, we also consider the interactions of the current method under study with the other ones including the caller and callee methods, and the sibling methods in the same enclosing class. The sequences of sub-tokens in the program entities' names in the contexts are extracted and used as the input for an RNN-based encoder-decoder to produce the representations for the current method. We modify that RNN model to integrate the copy mechanism and our newly developed component, called the non-copy mechanism, to emphasize on the possibility of a certain sub-token not to be copied to follow the current sub-token in the currently generated method name.
We conducted several experiments to evaluate DeepName on large datasets with +14M methods. For consistency checking, DeepName improves the state-of-the-art approach by 2.1%, 19.6%, and 11.9% relatively in recall, precision, and F-score, respectively. For name suggestion, DeepName improves relatively over the state-of-the-art approaches in precision (1.8%--30.5%), recall (8.8%--46.1%), and F-score (5.2%--38.2%). To assess DeepName's usefulness, we detected inconsistent methods and suggested new method names in active projects. Among 50 pull requests, 12 were merged into the main branch. In total, in 30/50 cases, the team members agree that our suggested method names are more meaningful than the current names.
△ Less
Submitted 27 February, 2021;
originally announced March 2021.
-
Proactive DP: A Multple Target Optimization Framework for DP-SGD
Authors:
Marten van Dijk,
Nhuong V. Nguyen,
Toan N. Nguyen,
Lam M. Nguyen,
Phuong Ha Nguyen
Abstract:
We introduce a multiple target optimization framework for DP-SGD referred to as pro-active DP. In contrast to traditional DP accountants, which are used to track the expenditure of privacy budgets, the pro-active DP scheme allows one to a-priori select parameters of DP-SGD based on a fixed privacy budget (in terms of $ε$ and $δ$) in such a way to optimize the anticipated utility (test accuracy) th…
▽ More
We introduce a multiple target optimization framework for DP-SGD referred to as pro-active DP. In contrast to traditional DP accountants, which are used to track the expenditure of privacy budgets, the pro-active DP scheme allows one to a-priori select parameters of DP-SGD based on a fixed privacy budget (in terms of $ε$ and $δ$) in such a way to optimize the anticipated utility (test accuracy) the most. To achieve this objective, we first propose significant improvements to the moment account method, presenting a closed-form $(ε,δ)$-DP guarantee that connects all parameters in the DP-SGD setup. We show that DP-SGD is $(ε<0.5,δ=1/N)$-DP if $σ=\sqrt{2(ε+\ln(1/δ))/ε}$ with $T$ at least $\approx 2k^2/ε$ and $(2/e)^2k^2-1/2\geq \ln(N)$, where $T$ is the total number of rounds, and $K=kN$ is the total number of gradient computations where $k$ measures $K$ in number of epochs of size $N$ of the local data set. We prove that our expression is close to tight in that if $T$ is more than a constant factor $\approx 4$ smaller than the lower bound $\approx 2k^2/ε$, then the $(ε,δ)$-DP guarantee is violated. The above DP guarantee can be enhanced in thatDP-SGD is $(ε, δ)$-DP if $σ= \sqrt{2(ε+\ln(1/δ))/ε}$ with $T$ at least $\approx 2k^2/ε$ together with two additional, less intuitive, conditions that allow larger $ε\geq 0.5$. Our DP theory allows us to create a utility graph and DP calculator. These tools link privacy and utility objectives and search for optimal experiment setups, efficiently taking into account both accuracy and privacy objectives, as well as implementation goals. We furnish a comprehensive implementation flow of our proactive DP, with rigorous experiments to showcase the proof-of-concept.
△ Less
Submitted 4 June, 2024; v1 submitted 17 February, 2021;
originally announced February 2021.
-
API Misuse Detection An Immune System inspired Approach
Authors:
Maxime Gallais-Jimenez,
Hoan A. Nguyen,
Mohamed Aymen Saied,
Tien N. Nguyen,
Houari Sahraoui
Abstract:
APIs are essential ingredients for develo** complex software systems. However, they are difficult to learn and to use. Thus, developers may misuse them, which results in various types of issues. In this paper, we explore the use of a bio-inspired approach (artificial immune system) to detect API misuses in client code. We built APIMMUNE, a novel API misuse detector. We collect normal usages of a…
▽ More
APIs are essential ingredients for develo** complex software systems. However, they are difficult to learn and to use. Thus, developers may misuse them, which results in various types of issues. In this paper, we explore the use of a bio-inspired approach (artificial immune system) to detect API misuses in client code. We built APIMMUNE, a novel API misuse detector. We collect normal usages of a given APIs from the set of client programs using the APIs, especially after some API usages were fixed in those programs. The normal API usages are considered as normal body cells. We transform them into normal-usage signatures. Then, artificial detectors are randomly generated by generating artificial deviations from these usages with the objective of being different from the normal usage signatures. The generated detectors have the ability to detect risky uses of APIs exactly as the immune system detects foreign cells of the organism. Moreover, for the detection purpose, only the artificial detectors are necessary, without the need to disclose the code used to generate them. Our approach was evaluated on the misuses dataset of three APIs as well as on known misuses from a state of the art APIs misuses benchmarking dataset. APIMMUNE was also compared to four state-of-the-art API misuse detection tools. The results show that APIMMUNE has good detection accuracy and performance, and it can complement pattern-based tools for uncommon misuses detection.
△ Less
Submitted 27 December, 2020;
originally announced December 2020.
-
A model reference adaptive system approach for nonlinear online parameter identification
Authors:
Barbara Kaltenbacher,
Tram Thi Ngoc Nguyen
Abstract:
Dynamical systems, for instance in model predictive control, often contain unknown parameters, which must be determined during system operation. Online or on-the-fly parameter identification methods are therefore necessary. The challenge of online methods is that one must continuously estimate parameters as experimental data becomes available. The existing techniques in the context of time-depende…
▽ More
Dynamical systems, for instance in model predictive control, often contain unknown parameters, which must be determined during system operation. Online or on-the-fly parameter identification methods are therefore necessary. The challenge of online methods is that one must continuously estimate parameters as experimental data becomes available. The existing techniques in the context of time-dependent partial differential equations exclude the case where the system depends nonlinearly on the parameters.Based on a model reference adaptive system approach, we present an online parameter identification method for nonlinear infinite-dimensional evolutionary system.
△ Less
Submitted 2 April, 2021; v1 submitted 17 December, 2020;
originally announced December 2020.
-
AMVNet: Assertion-based Multi-View Fusion Network for LiDAR Semantic Segmentation
Authors:
Venice Erin Liong,
Thi Ngoc Tho Nguyen,
Sergi Widjaja,
Dhananjai Sharma,
Zhuang Jie Chong
Abstract:
In this paper, we present an Assertion-based Multi-View Fusion network (AMVNet) for LiDAR semantic segmentation which aggregates the semantic features of individual projection-based networks using late fusion. Given class scores from different projection-based networks, we perform assertion-guided point sampling on score disagreements and pass a set of point-level features for each sampled point t…
▽ More
In this paper, we present an Assertion-based Multi-View Fusion network (AMVNet) for LiDAR semantic segmentation which aggregates the semantic features of individual projection-based networks using late fusion. Given class scores from different projection-based networks, we perform assertion-guided point sampling on score disagreements and pass a set of point-level features for each sampled point to a simple point head which refines the predictions. This modular-and-hierarchical late fusion approach provides the flexibility of having two independent networks with a minor overhead from a light-weight network. Such approaches are desirable for robotic systems, e.g. autonomous vehicles, for which the computational and memory resources are often limited. Extensive experiments show that AMVNet achieves state-of-the-art results in both the SemanticKITTI and nuScenes benchmark datasets and that our approach outperforms the baseline method of combining the class scores of the projection-based networks.
△ Less
Submitted 9 December, 2020;
originally announced December 2020.
-
A General Network Architecture for Sound Event Localization and Detection Using Transfer Learning and Recurrent Neural Network
Authors:
Thi Ngoc Tho Nguyen,
Ngoc Khanh Nguyen,
Huy Phan,
Lam Pham,
Kenneth Ooi,
Douglas L. Jones,
Woon-Seng Gan
Abstract:
Polyphonic sound event detection and localization (SELD) task is challenging because it is difficult to jointly optimize sound event detection (SED) and direction-of-arrival (DOA) estimation in the same network. We propose a general network architecture for SELD in which the SELD network comprises sub-networks that are pretrained to solve SED and DOA estimation independently, and a recurrent layer…
▽ More
Polyphonic sound event detection and localization (SELD) task is challenging because it is difficult to jointly optimize sound event detection (SED) and direction-of-arrival (DOA) estimation in the same network. We propose a general network architecture for SELD in which the SELD network comprises sub-networks that are pretrained to solve SED and DOA estimation independently, and a recurrent layer that combines the SED and DOA estimation outputs into SELD outputs. The recurrent layer does the alignment between the sound classes and DOAs of sound events while being unaware of how these outputs are produced by the upstream SED and DOA estimation algorithms. This simple network architecture is compatible with different existing SED and DOA estimation algorithms. It is highly practical since the sub-networks can be improved independently. The experimental results using the DCASE 2020 SELD dataset show that the performances of our proposed network architecture using different SED and DOA estimation algorithms and different audio formats are competitive with other state-of-the-art SELD algorithms. The source code for the proposed SELD network architecture is available at Github.
△ Less
Submitted 16 November, 2020;
originally announced November 2020.
-
Hogwild! over Distributed Local Data Sets with Linearly Increasing Mini-Batch Sizes
Authors:
Marten van Dijk,
Nhuong V. Nguyen,
Toan N. Nguyen,
Lam M. Nguyen,
Quoc Tran-Dinh,
Phuong Ha Nguyen
Abstract:
Hogwild! implements asynchronous Stochastic Gradient Descent (SGD) where multiple threads in parallel access a common repository containing training data, perform SGD iterations and update shared state that represents a jointly learned (global) model. We consider big data analysis where training data is distributed among local data sets in a heterogeneous way -- and we wish to move SGD computation…
▽ More
Hogwild! implements asynchronous Stochastic Gradient Descent (SGD) where multiple threads in parallel access a common repository containing training data, perform SGD iterations and update shared state that represents a jointly learned (global) model. We consider big data analysis where training data is distributed among local data sets in a heterogeneous way -- and we wish to move SGD computations to local compute nodes where local data resides. The results of these local SGD computations are aggregated by a central "aggregator" which mimics Hogwild!. We show how local compute nodes can start choosing small mini-batch sizes which increase to larger ones in order to reduce communication cost (round interaction with the aggregator). We improve state-of-the-art literature and show $O(\sqrt{K}$) communication rounds for heterogeneous data for strongly convex problems, where $K$ is the total number of gradient computations across all local compute nodes. For our scheme, we prove a \textit{tight} and novel non-trivial convergence analysis for strongly convex problems for {\em heterogeneous} data which does not use the bounded gradient assumption as seen in many existing publications. The tightness is a consequence of our proofs for lower and upper bounds of the convergence rate, which show a constant factor difference. We show experimental results for plain convex and non-convex problems for biased (i.e., heterogeneous) and unbiased local data sets.
△ Less
Submitted 26 February, 2021; v1 submitted 26 October, 2020;
originally announced October 2020.
-
Event Detection: Gate Diversity and Syntactic Importance Scoresfor Graph Convolution Neural Networks
Authors:
Viet Dac Lai,
Tuan Ngo Nguyen,
Thien Huu Nguyen
Abstract:
Recent studies on event detection (ED) haveshown that the syntactic dependency graph canbe employed in graph convolution neural net-works (GCN) to achieve state-of-the-art per-formance. However, the computation of thehidden vectors in such graph-based models isagnostic to the trigger candidate words, po-tentially leaving irrelevant information for thetrigger candidate for event prediction. In addi…
▽ More
Recent studies on event detection (ED) haveshown that the syntactic dependency graph canbe employed in graph convolution neural net-works (GCN) to achieve state-of-the-art per-formance. However, the computation of thehidden vectors in such graph-based models isagnostic to the trigger candidate words, po-tentially leaving irrelevant information for thetrigger candidate for event prediction. In addi-tion, the current models for ED fail to exploitthe overall contextual importance scores of thewords, which can be obtained via the depen-dency tree, to boost the performance. In thisstudy, we propose a novel gating mechanismto filter noisy information in the hidden vec-tors of the GCN models for ED based on theinformation from the trigger candidate. Wealso introduce novel mechanisms to achievethe contextual diversity for the gates and theimportance score consistency for the graphsand models in ED. The experiments show thatthe proposed model achieves state-of-the-artperformance on two ED datasets
△ Less
Submitted 27 October, 2020;
originally announced October 2020.
-
Graph Transformer Networks with Syntactic and Semantic Structures for Event Argument Extraction
Authors:
Amir Pouran Ben Veyseh,
Tuan Ngo Nguyen,
Thien Huu Nguyen
Abstract:
The goal of Event Argument Extraction (EAE) is to find the role of each entity mention for a given event trigger word. It has been shown in the previous works that the syntactic structures of the sentences are helpful for the deep learning models for EAE. However, a major problem in such prior works is that they fail to exploit the semantic structures of the sentences to induce effective represent…
▽ More
The goal of Event Argument Extraction (EAE) is to find the role of each entity mention for a given event trigger word. It has been shown in the previous works that the syntactic structures of the sentences are helpful for the deep learning models for EAE. However, a major problem in such prior works is that they fail to exploit the semantic structures of the sentences to induce effective representations for EAE. Consequently, in this work, we propose a novel model for EAE that exploits both syntactic and semantic structures of the sentences with the Graph Transformer Networks (GTNs) to learn more effective sentence structures for EAE. In addition, we introduce a novel inductive bias based on information bottleneck to improve generalization of the EAE models. Extensive experiments are performed to demonstrate the benefits of the proposed model, leading to state-of-the-art performance for EAE on standard datasets.
△ Less
Submitted 26 October, 2020;
originally announced October 2020.
-
Connection Pruning for Deep Spiking Neural Networks with On-Chip Learning
Authors:
Thao N. N. Nguyen,
Bharadwaj Veeravalli,
Xuanyao Fong
Abstract:
Long training time hinders the potential of the deep, large-scale Spiking Neural Network (SNN) with the on-chip learning capability to be realized on the embedded systems hardware. Our work proposes a novel connection pruning approach that can be applied during the on-chip Spike Timing Dependent Plasticity (STDP)-based learning to optimize the learning time and the network connectivity of the deep…
▽ More
Long training time hinders the potential of the deep, large-scale Spiking Neural Network (SNN) with the on-chip learning capability to be realized on the embedded systems hardware. Our work proposes a novel connection pruning approach that can be applied during the on-chip Spike Timing Dependent Plasticity (STDP)-based learning to optimize the learning time and the network connectivity of the deep SNN. We applied our approach to a deep SNN with the Time To First Spike (TTFS) coding and has successfully achieved 2.1x speed-up and 64% energy savings in the on-chip learning and reduced the network connectivity by 92.83%, without incurring any accuracy loss. Moreover, the connectivity reduction results in 2.83x speed-up and 78.24% energy savings in the inference. Evaluation of our proposed approach on the Field Programmable Gate Array (FPGA) platform revealed 0.56% power overhead was needed to implement the pruning algorithm.
△ Less
Submitted 31 July, 2021; v1 submitted 8 October, 2020;
originally announced October 2020.
-
Simultaneous diagonalization via congruence of Hermitian matrices: some equivalent conditions and a numerical solution
Authors:
T. H. Le,
T. N. Nguyen
Abstract:
This paper aims at solving the Hermitian SDC problem, i.e., that of \textit{simultaneously diagonalizing via $*$-congruence} a collection of finitely many (not need pairwise commute) Hermitian matrices. Theoretically, we provide some equivalent conditions for that such a matrix collection can be simultaneously diagonalized via $^*$-congruence.% by a nonsingular matrix. Interestingly, one of such c…
▽ More
This paper aims at solving the Hermitian SDC problem, i.e., that of \textit{simultaneously diagonalizing via $*$-congruence} a collection of finitely many (not need pairwise commute) Hermitian matrices. Theoretically, we provide some equivalent conditions for that such a matrix collection can be simultaneously diagonalized via $^*$-congruence.% by a nonsingular matrix. Interestingly, one of such conditions leads to the existence of a positive definite solution to a semidefinite program (SDP). From practical point of view, we propose an algorithm for numerically solving such problem. The proposed algorithm is a combination of
(1) a positive semidefinite program detecting whether the initial Hermitian matrices are simultaneously diagonalizable via $*$-congruence, and
(2) a Jacobi-like algorithm for simultaneously diagonalizing via $*$-congruence the commuting normal matrices derived from the previous stage. Illustrating examples by hand/coding in \textsc{Matlab} are also presented.
△ Less
Submitted 15 November, 2020; v1 submitted 28 July, 2020;
originally announced July 2020.
-
Asynchronous Federated Learning with Reduced Number of Rounds and with Differential Privacy from Less Aggregated Gaussian Noise
Authors:
Marten van Dijk,
Nhuong V. Nguyen,
Toan N. Nguyen,
Lam M. Nguyen,
Quoc Tran-Dinh,
Phuong Ha Nguyen
Abstract:
The feasibility of federated learning is highly constrained by the server-clients infrastructure in terms of network communication. Most newly launched smartphones and IoT devices are equipped with GPUs or sufficient computing hardware to run powerful AI models. However, in case of the original synchronous federated learning, client devices suffer waiting times and regular communication between cl…
▽ More
The feasibility of federated learning is highly constrained by the server-clients infrastructure in terms of network communication. Most newly launched smartphones and IoT devices are equipped with GPUs or sufficient computing hardware to run powerful AI models. However, in case of the original synchronous federated learning, client devices suffer waiting times and regular communication between clients and server is required. This implies more sensitivity to local model training times and irregular or missed updates, hence, less or limited scalability to large numbers of clients and convergence rates measured in real time will suffer. We propose a new algorithm for asynchronous federated learning which eliminates waiting times and reduces overall network communication - we provide rigorous theoretical analysis for strongly convex objective functions and provide simulation results. By adding Gaussian noise we show how our algorithm can be made differentially private -- new theorems show how the aggregated added Gaussian noise is significantly reduced.
△ Less
Submitted 17 July, 2020;
originally announced July 2020.
-
Silicon carbide stacking-order-induced do** variation in epitaxial graphene
Authors:
Davood Momeni Pakdehi,
Philip Schädlich,
T. T. Nhung Nguyen,
Alexei A. Zakharov,
Stefan Wundrack,
Florian Speck,
Klaus Pierz,
Thomas Seyller,
Christoph Tegenkamp,
Hans. W. Schumacher
Abstract:
Generally, it is supposed that the Fermi level in epitaxial graphene is controlled by two effects: p-type polarization do** induced by the bulk of the hexagonal SiC(0001) substrate and overcompensation by donor-like states related to the buffer layer. In this work, we evidence that this effect is also related to the specific underlying SiC terrace. We fabricated a periodic sequence of non-identi…
▽ More
Generally, it is supposed that the Fermi level in epitaxial graphene is controlled by two effects: p-type polarization do** induced by the bulk of the hexagonal SiC(0001) substrate and overcompensation by donor-like states related to the buffer layer. In this work, we evidence that this effect is also related to the specific underlying SiC terrace. We fabricated a periodic sequence of non-identical SiC terraces, which are unambiguously attributed to specific SiC surface terminations. A clear correlation between the SiC termination and the electronic graphene properties is experimentally observed and confirmed by various complementary surface-sensitive methods. We attribute this correlation to a proximity effect of the SiC termination-dependent polarization do** on the overlying graphene layer. Our findings open a new approach for a nano-scale do**-engineering by self-patterning of epitaxial graphene and other 2D layers on dielectric polar substrates.
△ Less
Submitted 30 May, 2020;
originally announced June 2020.
-
BigO: A public health decision support system for measuring obesogenic behaviors of children in relation to their local environment
Authors:
Christos Diou,
Ioannis Sarafis,
Vasileios Papapanagiotou,
Leonidas Alagialoglou,
Irini Lekka,
Dimitrios Filos,
Leandros Stefanopoulos,
Vasileios Kilintzis,
Christos Maramis,
Youla Karavidopoulou,
Nikos Maglaveras,
Ioannis Ioakimidis,
Evangelia Charmandari,
Penio Kassari,
Athanasia Tragomalou,
Monica Mars,
Thien-An Ngoc Nguyen,
Tahar Kechadi,
Shane O' Donnell,
Gerardine Doyle,
Sarah Browne,
Grace O' Malley,
Rachel Heimeier,
Katerina Riviou,
Evangelia Koukoula
, et al. (6 additional authors not shown)
Abstract:
Obesity is a complex disease and its prevalence depends on multiple factors related to the local socioeconomic, cultural and urban context of individuals. Many obesity prevention strategies and policies, however, are horizontal measures that do not depend on context-specific evidence. In this paper we present an overview of BigO (http://bigoprogram.eu), a system designed to collect objective behav…
▽ More
Obesity is a complex disease and its prevalence depends on multiple factors related to the local socioeconomic, cultural and urban context of individuals. Many obesity prevention strategies and policies, however, are horizontal measures that do not depend on context-specific evidence. In this paper we present an overview of BigO (http://bigoprogram.eu), a system designed to collect objective behavioral data from children and adolescent populations as well as their environment in order to support public health authorities in formulating effective, context-specific policies and interventions addressing childhood obesity. We present an overview of the data acquisition, indicator extraction, data exploration and analysis components of the BigO system, as well as an account of its preliminary pilot application in 33 schools and 2 clinics in four European countries, involving over 4,200 participants.
△ Less
Submitted 6 May, 2020;
originally announced May 2020.
-
On the classification of cubic plane Cremona maps
Authors:
Alberto Calabri,
Thi Ngoc Giao Nguyen
Abstract:
We give a fine classification of cubic plane Cremona maps. A previous partial classification was obtained by Cerveau and Déserti a few years ago.
We give a fine classification of cubic plane Cremona maps. A previous partial classification was obtained by Cerveau and Déserti a few years ago.
△ Less
Submitted 26 February, 2020;
originally announced February 2020.
-
A Sequence Matching Network for Polyphonic Sound Event Localization and Detection
Authors:
Thi Ngoc Tho Nguyen,
Douglas L. Jones,
Woon-Seng Gan
Abstract:
Polyphonic sound event detection and direction-of-arrival estimation require different input features from audio signals. While sound event detection mainly relies on time-frequency patterns, direction-of-arrival estimation relies on magnitude or phase differences between microphones. Previous approaches use the same input features for sound event detection and direction-of-arrival estimation, and…
▽ More
Polyphonic sound event detection and direction-of-arrival estimation require different input features from audio signals. While sound event detection mainly relies on time-frequency patterns, direction-of-arrival estimation relies on magnitude or phase differences between microphones. Previous approaches use the same input features for sound event detection and direction-of-arrival estimation, and train the two tasks jointly or in a two-stage transfer-learning manner. We propose a two-step approach that decouples the learning of the sound event detection and directional-of-arrival estimation systems. In the first step, we detect the sound events and estimate the directions-of-arrival separately to optimize the performance of each system. In the second step, we train a deep neural network to match the two output sequences of the event detector and the direction-of-arrival estimator. This modular and hierarchical approach allows the flexibility in the system design, and increase the performance of the whole sound event localization and detection system. The experimental results using the DCASE 2019 sound event localization and detection dataset show an improved performance compared to the previous state-of-the-art solutions.
△ Less
Submitted 13 February, 2020;
originally announced February 2020.
-
Understanding Our People at Scale
Authors:
Tam N. Nguyen
Abstract:
Human psychology plays an important role in organizational performance. However, understanding our employees is a difficult task due to issues such as psychological complexities, unpredictable dynamics, and the lack of data. Leveraging evidence-based psychology knowledge, this paper proposes a hybrid machine learning plus ontology-based reasoning system for detecting human psychological artifacts…
▽ More
Human psychology plays an important role in organizational performance. However, understanding our employees is a difficult task due to issues such as psychological complexities, unpredictable dynamics, and the lack of data. Leveraging evidence-based psychology knowledge, this paper proposes a hybrid machine learning plus ontology-based reasoning system for detecting human psychological artifacts at scale. This unique architecture provides a balance between system's processing speed and explain-ability. System outputs can be further consumed by graph science and/or model management system for optimizing business processes, understanding team dynamics, predicting insider threats, managing talents, and beyond.
△ Less
Submitted 5 January, 2020;
originally announced January 2020.
-
A two-step system for sound event localization and detection
Authors:
T. N. T. Nguyen,
D. L. Jones,
R. Ranjan,
S. Jayabalan,
W. S. Gan
Abstract:
Sound event detection and sound event localization requires different features from audio input signals. While sound event detection mainly relies on time-frequency patterns to distinguish different event classes, sound event localization uses magnitude or phase differences between microphones to estimate source directions. Therefore, we propose a two-step system to do sound event localization and…
▽ More
Sound event detection and sound event localization requires different features from audio input signals. While sound event detection mainly relies on time-frequency patterns to distinguish different event classes, sound event localization uses magnitude or phase differences between microphones to estimate source directions. Therefore, we propose a two-step system to do sound event localization and detection. In the first step, we detect the sound events and estimate the directions-of-arrival separately. In the second step, we combine the results of the event detector and direction-of-arrival estimator together. The obtained results show a significant improvement over the baseline solution for sound event localization and detection in DCASE 2019 task 3 challenge. Using the evaluation dataset, the proposed system achieved an F1 score of 93.4% for sound event detection and an error of 5.4 degrees for direction-of-arrival estimation, while the winning solution achieved an F1 score of 94.7% and an angle error of 3.7 degrees respectively.
△ Less
Submitted 26 November, 2019;
originally announced November 2019.
-
Combining Program Analysis and Statistical Language Model for Code Statement Completion
Authors:
Son Nguyen,
Tien N. Nguyen,
Yi Li,
Shaohua Wang
Abstract:
Automatic code completion helps improve developers' productivity in their programming tasks. A program contains instructions expressed via code statements, which are considered as the basic units of program execution. In this paper, we introduce AutoSC, which combines program analysis and the principle of software naturalness to fill in a partially completed statement. AutoSC benefits from the str…
▽ More
Automatic code completion helps improve developers' productivity in their programming tasks. A program contains instructions expressed via code statements, which are considered as the basic units of program execution. In this paper, we introduce AutoSC, which combines program analysis and the principle of software naturalness to fill in a partially completed statement. AutoSC benefits from the strengths of both directions, in which the completed code statement is both frequent and valid. AutoSC is first trained on a large code corpus to derive the templates of candidate statements. Then, it uses program analysis to validate and concretize the templates into syntactically and type-valid candidate statements. Finally, these candidates are ranked by using a language model trained on the lexical form of the source code in the code corpus. Our empirical evaluation on the large datasets of real-world projects shows that AutoSC achieves 38.9-41.3% top-1 accuracy and 48.2-50.1% top-5 accuracy in statement completion. It also outperforms a state-of-the-art approach from 9X-69X in top-1 accuracy.
△ Less
Submitted 18 November, 2019;
originally announced November 2019.
-
Feature-Interaction Aware Configuration Prioritization for Configurable Code
Authors:
Son Nguyen,
Hoan Nguyen,
Ngoc Tran,
Hieu Tran,
Tien N. Nguyen
Abstract:
Unexpected interactions among features induce most bugs in a configurable software system. Exhaustively analyzing all the exponential number of possible configurations is prohibitively costly. Thus, various sampling techniques have been proposed to systematically narrow down the exponential number of legal configurations to be analyzed. Since analyzing all selected configurations can require a hug…
▽ More
Unexpected interactions among features induce most bugs in a configurable software system. Exhaustively analyzing all the exponential number of possible configurations is prohibitively costly. Thus, various sampling techniques have been proposed to systematically narrow down the exponential number of legal configurations to be analyzed. Since analyzing all selected configurations can require a huge amount of effort, fault-based configuration prioritization, that helps detect faults earlier, can yield practical benefits in quality assurance. In this paper, we propose CoPro, a novel formulation of feature-interaction bugs via common program entities enabled/disabled by the features. Leveraging from that, we develop an efficient feature-interaction aware configuration prioritization technique for a configurable system by ranking the configurations according to their total number of potential bugs. We conducted several experiments to evaluate CoPro on the ability to detect configuration-related bugs in a public benchmark. We found that CoPro outperforms the state-of-the-art configuration prioritization techniques when we add them on advanced sampling algorithms. In 78% of the cases, CoPro ranks the buggy configurations at the top 3 positions in the resulting list. Interestingly, CoPro is able to detect 17 not-yet-discovered feature-interaction bugs.
△ Less
Submitted 18 November, 2019;
originally announced November 2019.
-
On the Effectiveness of the Pooling Methods for Biomedical Relation Extraction with Deep Learning
Authors:
Tuan Ngo Nguyen,
Franck Dernoncourt,
Thien Huu Nguyen
Abstract:
Deep learning models have achieved state-of-the-art performances on many relation extraction datasets. A common element in these deep learning models involves the pooling mechanisms where a sequence of hidden vectors is aggregated to generate a single representation vector, serving as the features to perform prediction for RE. Unfortunately, the models in the literature tend to employ different st…
▽ More
Deep learning models have achieved state-of-the-art performances on many relation extraction datasets. A common element in these deep learning models involves the pooling mechanisms where a sequence of hidden vectors is aggregated to generate a single representation vector, serving as the features to perform prediction for RE. Unfortunately, the models in the literature tend to employ different strategies to perform pooling for RE, leading to the challenge to determine the best pooling mechanism for this problem, especially in the biomedical domain. In order to answer this question, in this work, we conduct a comprehensive study to evaluate the effectiveness of different pooling mechanisms for the deep learning models in biomedical RE. The experimental results suggest that dependency-based pooling is the best pooling strategy for RE in the biomedical domain, yielding the state-of-the-art performance on two benchmark datasets for this problem.
△ Less
Submitted 4 November, 2019;
originally announced November 2019.
-
A Heuristic for Maximizing the Lifetime of Data Aggregation in Wireless Sensor Networks
Authors:
Bing-Hong Liu,
Van-Trung Pham,
Tu N. Nguyen,
Yi-Sheng Luo
Abstract:
Recently, many researchers have studied efficiently gathering data in wireless sensor networks to minimize the total energy consumption when a fixed number of data are allowed to be aggregated into one packet. However, minimizing the total energy consumption does not imply the network lifetime is maximized. In this paper, we study the problem of scheduling data aggregation trees working for differ…
▽ More
Recently, many researchers have studied efficiently gathering data in wireless sensor networks to minimize the total energy consumption when a fixed number of data are allowed to be aggregated into one packet. However, minimizing the total energy consumption does not imply the network lifetime is maximized. In this paper, we study the problem of scheduling data aggregation trees working for different time periods to maximize the network lifetime when a fixed number of data are allowed to be aggregated into one packet. In addition, we propose a heuristic to balance the lifetime of nodes in data aggregation trees such that the network lifetime is maximized. Simulation results show that the proposed heuristic provides a good performance.
△ Less
Submitted 22 September, 2019;
originally announced October 2019.
-
A Convolutional Transformation Network for Malware Classification
Authors:
Duc-Ly Vu,
Trong-Kha Nguyen,
Tam V. Nguyen,
Tu N. Nguyen,
Fabio Massacci,
Phu H. Phung
Abstract:
Modern malware evolves various detection avoidance techniques to bypass the state-of-the-art detection methods. An emerging trend to deal with this issue is the combination of image transformation and machine learning techniques to classify and detect malware. However, existing works in this field only perform simple image transformation methods that limit the accuracy of the detection. In this pa…
▽ More
Modern malware evolves various detection avoidance techniques to bypass the state-of-the-art detection methods. An emerging trend to deal with this issue is the combination of image transformation and machine learning techniques to classify and detect malware. However, existing works in this field only perform simple image transformation methods that limit the accuracy of the detection. In this paper, we introduce a novel approach to classify malware by using a deep network on images transformed from binary samples. In particular, we first develop a novel hybrid image transformation method to convert binaries into color images that convey the binary semantics. The images are trained by a deep convolutional neural network that later classifies the test inputs into benign or malicious categories. Through the extensive experiments, our proposed method surpasses all baselines and achieves 99.14% in terms of accuracy on the testing set.
△ Less
Submitted 16 September, 2019;
originally announced September 2019.
-
Parameter identification for the Landau-Lifshitz-Gilbert equation in Magnetic Particle Imaging
Authors:
Barbara Kaltenbacher,
Tram Thi Ngoc Nguyen,
Anne Wald,
Thomas Schuster
Abstract:
Magnetic particle imaging (MPI) is a tracer-based technique for medical imaging where the tracer consists of ironoxide nanoparticles. The key idea is to measure the particle response to a temporally changing external magnetic field to compute the spatial concentration of the tracer inside the object. A decent mathematical model demands for a data-driven computation of the system function which doe…
▽ More
Magnetic particle imaging (MPI) is a tracer-based technique for medical imaging where the tracer consists of ironoxide nanoparticles. The key idea is to measure the particle response to a temporally changing external magnetic field to compute the spatial concentration of the tracer inside the object. A decent mathematical model demands for a data-driven computation of the system function which does not only describe the measurement geometry but also encodes the interaction of the particles with the external magnetic field. The physical model of this interaction is given by the Landau-Lifshitz-Gilbert (LLG) equation. The determination of the system function can be seen as an inverse problem of its own which can be interpreted as a calibration problem for MPI. In this contribution the calibration problem is formulated as an inverse parameter identification problem for the LLG equation. We give a detailed analysis of the direct as well as the inverse problem in an all-at-once as well as in a reduced setting. The analytical results yield a deeper understanding of inverse problems connected to the LLG equation and provide a starting point for the development of robust numerical solution methods in MPI.
△ Less
Submitted 6 September, 2019;
originally announced September 2019.
-
An Empirical Study on the Characteristics of Question-Answering Process on Developer Forums
Authors:
Yi Li,
Shaohua Wang,
Tien N. Nguyen,
Son Van Nguyen,
Xinyue Ye,
Yan Wang
Abstract:
Developer forums are one of the most popular and useful Q&A websites on API usages. The analysis of API forums can be a critical resource for the automated question and answer approaches. In this paper, we empirically study three API forums including Twitter, eBay, and AdWords, to investigate the characteristics of question-answering process. We observe that +60% of the posts on all three forums w…
▽ More
Developer forums are one of the most popular and useful Q&A websites on API usages. The analysis of API forums can be a critical resource for the automated question and answer approaches. In this paper, we empirically study three API forums including Twitter, eBay, and AdWords, to investigate the characteristics of question-answering process. We observe that +60% of the posts on all three forums were answered by providing API method names or documentation. +85% of the questions were answered by API development teams and the answers from API development teams drew fewer follow-up questions. Our results provide empirical evidences for us in a future work to build automated solutions to answer developer questions on API forums.
△ Less
Submitted 8 September, 2019; v1 submitted 5 September, 2019;
originally announced September 2019.
-
Assessment of gait normality using a depth camera and mirrors
Authors:
Trong Nguyen Nguyen,
Huu Hung Huynh,
Jean Meunier
Abstract:
This paper presents an initial work on assessment of gait normality in which the human body motion is represented by a sequence of enhanced depth maps. The input data is provided by a system consisting of a Time-of-Flight (ToF) depth camera and two mirrors. This approach proposes two feature types to describe characteristics of localized points of interest and the level of posture symmetry. These…
▽ More
This paper presents an initial work on assessment of gait normality in which the human body motion is represented by a sequence of enhanced depth maps. The input data is provided by a system consisting of a Time-of-Flight (ToF) depth camera and two mirrors. This approach proposes two feature types to describe characteristics of localized points of interest and the level of posture symmetry. These two features are processed on a sequence of enhanced depth maps with the support of a sliding window to provide two corresponding scores. The gait assessment is finally performed based on a weighted combination of these two scores. The evaluation is performed by experimenting on 6 simulated abnormal gaits.
△ Less
Submitted 17 August, 2019;
originally announced August 2019.
-
Skeleton-based Gait Index Estimation with LSTMs
Authors:
Trong Nguyen Nguyen,
Huu Hung Huynh,
Jean Meunier
Abstract:
In this paper, we propose a method that estimates a gait index for a sequence of skeletons. Our system is a stack of an encoder and a decoder that are formed by Long Short-Term Memories (LSTMs). In the encoding stage, the characteristics of an input are automatically determined and are compressed into a latent space. The decoding stage then attempts to reconstruct the input according to such inter…
▽ More
In this paper, we propose a method that estimates a gait index for a sequence of skeletons. Our system is a stack of an encoder and a decoder that are formed by Long Short-Term Memories (LSTMs). In the encoding stage, the characteristics of an input are automatically determined and are compressed into a latent space. The decoding stage then attempts to reconstruct the input according to such intermediate representation. The reconstruction error is thus considered as a weak gait index. By combining such weak indices over a long-time movement, our system can provide a good estimation for the gait index. Our experiments on a large dataset (nearly one hundred thousand skeletons) showed that the index given by the proposed method outperformed some recent works on gait analysis.
△ Less
Submitted 17 August, 2019;
originally announced August 2019.
-
Estimating skeleton-based gait abnormality index by sparse deep auto-encoder
Authors:
Trong Nguyen Nguyen,
Huu Hung Huynh,
Jean Meunier
Abstract:
This paper proposes an approach estimating a gait abnormality index based on skeletal information provided by a depth camera. Differently from related works where the extraction of hand-crafted features is required to describe gait characteristics, our method automatically performs that stage with the support of a deep auto-encoder. In order to get visually interpretable features, we embedded a co…
▽ More
This paper proposes an approach estimating a gait abnormality index based on skeletal information provided by a depth camera. Differently from related works where the extraction of hand-crafted features is required to describe gait characteristics, our method automatically performs that stage with the support of a deep auto-encoder. In order to get visually interpretable features, we embedded a constraint of sparsity into the model. Similarly to most gait-related studies, the temporal factor is also considered as a post-processing in our system. This method provided promising results when experimenting on a dataset containing nearly one hundred thousand skeleton samples.
△ Less
Submitted 17 August, 2019;
originally announced August 2019.
-
Anomaly Detection in Video Sequence with Appearance-Motion Correspondence
Authors:
Trong Nguyen Nguyen,
Jean Meunier
Abstract:
Anomaly detection in surveillance videos is currently a challenge because of the diversity of possible events. We propose a deep convolutional neural network (CNN) that addresses this problem by learning a correspondence between common object appearances (e.g. pedestrian, background, tree, etc.) and their associated motions. Our model is designed as a combination of a reconstruction network and an…
▽ More
Anomaly detection in surveillance videos is currently a challenge because of the diversity of possible events. We propose a deep convolutional neural network (CNN) that addresses this problem by learning a correspondence between common object appearances (e.g. pedestrian, background, tree, etc.) and their associated motions. Our model is designed as a combination of a reconstruction network and an image translation model that share the same encoder. The former sub-network determines the most significant structures that appear in video frames and the latter one attempts to associate motion templates to such structures. The training stage is performed using only videos of normal events and the model is then capable to estimate frame-level scores for an unknown input. The experiments on 6 benchmark datasets demonstrate the competitive performance of the proposed approach with respect to state-of-the-art methods.
△ Less
Submitted 17 August, 2019;
originally announced August 2019.
-
Hybrid Deep Network for Anomaly Detection
Authors:
Trong Nguyen Nguyen,
Jean Meunier
Abstract:
In this paper, we propose a deep convolutional neural network (CNN) for anomaly detection in surveillance videos. The model is adapted from a typical auto-encoder working on video patches under the perspective of sparse combination learning. Our CNN focuses on (unsupervisedly) learning common characteristics of normal events with the emphasis of their spatial locations (by supervised losses). To o…
▽ More
In this paper, we propose a deep convolutional neural network (CNN) for anomaly detection in surveillance videos. The model is adapted from a typical auto-encoder working on video patches under the perspective of sparse combination learning. Our CNN focuses on (unsupervisedly) learning common characteristics of normal events with the emphasis of their spatial locations (by supervised losses). To our knowledge, this is the first work that directly adapts the patch position as the target of a classification sub-network. The model is capable to provide a score of anomaly assessment for each video frame. Our experiments were performed on 4 benchmark datasets with various anomalous events and the obtained results were competitive with state-of-the-art studies.
△ Less
Submitted 17 August, 2019;
originally announced August 2019.
-
Matching-based Depth Camera and Mirrors for 3D Reconstruction
Authors:
Trong Nguyen Nguyen,
Huu Hung Huynh,
Jean Meunier
Abstract:
Reconstructing 3D object models is playing an important role in many applications in the field of computer vision. Instead of employing a collection of cameras and/or sensors as in many studies, this paper proposes a simple way to build a cheaper system for 3D reconstruction using only one depth camera and 2 or more mirrors. Each mirror is equivalently considered as a depth camera at another viewp…
▽ More
Reconstructing 3D object models is playing an important role in many applications in the field of computer vision. Instead of employing a collection of cameras and/or sensors as in many studies, this paper proposes a simple way to build a cheaper system for 3D reconstruction using only one depth camera and 2 or more mirrors. Each mirror is equivalently considered as a depth camera at another viewpoint. Since all scene data are provided by only one depth sensor, our approach can be applied to moving objects and does not require any synchronization protocol as with a set of cameras. Some experiments were performed on easy-to-evaluate objects to confirm the reconstruction accuracy of our proposed system.
△ Less
Submitted 17 August, 2019;
originally announced August 2019.
-
The tangential cone condition for some coefficient identification model problems in parabolic PDEs
Authors:
Barbara Kaltenbacher,
Tram Thi Ngoc Nguyen,
Otmar Scherzer
Abstract:
The tangential condition was introduced in [Hanke et al., 95] as a sufficient condition for convergence of the Landweber iteration for solving ill-posed problems. In this paper we present a series of time dependent benchmark inverse problems for which we can verify this condition.
The tangential condition was introduced in [Hanke et al., 95] as a sufficient condition for convergence of the Landweber iteration for solving ill-posed problems. In this paper we present a series of time dependent benchmark inverse problems for which we can verify this condition.
△ Less
Submitted 5 August, 2021; v1 submitted 3 August, 2019;
originally announced August 2019.
-
Does BLEU Score Work for Code Migration?
Authors:
Ngoc Tran,
Hieu Tran,
Son Nguyen,
Hoan Nguyen,
Tien N. Nguyen
Abstract:
Statistical machine translation (SMT) is a fast-growing sub-field of computational linguistics. Until now, the most popular automatic metric to measure the quality of SMT is BiLingual Evaluation Understudy (BLEU) score. Lately, SMT along with the BLEU metric has been applied to a Software Engineering task named code migration. (In)Validating the use of BLEU score could advance the research and dev…
▽ More
Statistical machine translation (SMT) is a fast-growing sub-field of computational linguistics. Until now, the most popular automatic metric to measure the quality of SMT is BiLingual Evaluation Understudy (BLEU) score. Lately, SMT along with the BLEU metric has been applied to a Software Engineering task named code migration. (In)Validating the use of BLEU score could advance the research and development of SMT-based code migration tools. Unfortunately, there is no study to approve or disapprove the use of BLEU score for source code. In this paper, we conducted an empirical study on BLEU score to (in)validate its suitability for the code migration task due to its inability to reflect the semantics of source code. In our work, we use human judgment as the ground truth to measure the semantic correctness of the migrated code. Our empirical study demonstrates that BLEU does not reflect translation quality due to its weak correlation with the semantic correctness of translated code. We provided counter-examples to show that BLEU is ineffective in comparing the translation quality between SMT-based models. Due to BLEU's ineffectiveness for code migration task, we propose an alternative metric RUBY, which considers lexical, syntactical, and semantic representations of source code. We verified that RUBY achieves a higher correlation coefficient with the semantic correctness of migrated code, 0.775 in comparison with 0.583 of BLEU score. We also confirmed the effectiveness of RUBY in reflecting the changes in translation quality of SMT-based translation models. With its advantages, RUBY can be used to evaluate SMT-based code migration models.
△ Less
Submitted 11 June, 2019;
originally announced June 2019.
-
Landweber-Kaczmarz for parameter identification in time-dependent inverse problems: All-at-once versus Reduced version
Authors:
Tram Thi Ngoc Nguyen
Abstract:
In this study, we consider a general time-space system, whose model operator and observation operator are locally Lipschitz continuous, over a finite time horizon and parameter identification by using Landweber-Kaczmarz regularization. The problem is investigated in two different modeling settings: An All-at-once and a Reduced version, together with two observation scenarios: continuous and discre…
▽ More
In this study, we consider a general time-space system, whose model operator and observation operator are locally Lipschitz continuous, over a finite time horizon and parameter identification by using Landweber-Kaczmarz regularization. The problem is investigated in two different modeling settings: An All-at-once and a Reduced version, together with two observation scenarios: continuous and discrete observations. Segmenting the time line into several subintervals leads to the idea of applying the Kaczmarz method. A lo** strategy is incorporated into the method to yield the lo** Landweber-Kaczmarz iteration.
△ Less
Submitted 30 January, 2019;
originally announced January 2019.
-
Lusin characterisation of Hardy spaces associated with Hermite operators
Authors:
Tan Duc Do,
Trong Ngoc Nguyen,
Truong Xuan Le
Abstract:
Let $d \in \{3, 4, 5, \ldots\}$ and $p \in (0,1]$. We consider the Hermite operator $L = -Δ+ |x|^2$ on its maximal domain in $L^2(\mathbb{R}^d)$. Let $H_L^p(\mathbb{R}^d)$ be the completion of $ \{ f \in L^2(\mathbb{R}^d): \mathcal{M}_L f \in L^p(\mathbb{R}^d) \} $ with respect to the quasi-norm $ \|\cdot\|_{H_L^p} = \|\mathcal{M}\cdot\|_{L^p}, $ where…
▽ More
Let $d \in \{3, 4, 5, \ldots\}$ and $p \in (0,1]$. We consider the Hermite operator $L = -Δ+ |x|^2$ on its maximal domain in $L^2(\mathbb{R}^d)$. Let $H_L^p(\mathbb{R}^d)$ be the completion of $ \{ f \in L^2(\mathbb{R}^d): \mathcal{M}_L f \in L^p(\mathbb{R}^d) \} $ with respect to the quasi-norm $ \|\cdot\|_{H_L^p} = \|\mathcal{M}\cdot\|_{L^p}, $ where $\mathcal{M}_L f(\cdot) = \sup_{t > 0} |e^{-tL} f(\cdot)|$ for all $f \in L^2(\mathbb{R}^d)$. We characterise $H_L^p(\mathbb{R}^d)$ in terms of Lusin integrals associated with Hermite operator.
△ Less
Submitted 19 January, 2019;
originally announced January 2019.
-
Intelligence-based Cybersecurity Awareness Training- an Exploratory Project
Authors:
Tam n. Nguyen,
Lydia Sbityakov,
Samantha Scoggins
Abstract:
Cybersecurity training should be adaptable to evolving the cyber threat landscape, cost effective and integrated well with other enterprise management components. Unfortunately, very few cybersecurity training platforms can satisfy such requirements. This paper proposes a new and novel model for conducting cybersecurity training with three main objectives: (i) training should be initiated by emerg…
▽ More
Cybersecurity training should be adaptable to evolving the cyber threat landscape, cost effective and integrated well with other enterprise management components. Unfortunately, very few cybersecurity training platforms can satisfy such requirements. This paper proposes a new and novel model for conducting cybersecurity training with three main objectives: (i) training should be initiated by emerging relevant threats and delivered first to the most vulnerable members (ii) the process has to be agile (iii) training results must be able to provide actionable intelligence. For the first time, this paper establishes a type system (ontology and associated relationships) that links the domain of cybersecurity awareness training with that of cyber threat intelligence. Powered by IBM Watson Knowledge Studio platform, the proposed method was found to be practical and scalable. Main contributions such as exports of the type system, the manually annotated corpus of 100 threat reports and 127 cybersecurity assessment results, the dictionaries for pre-annotation, etc were made publicly available.
△ Less
Submitted 11 December, 2018;
originally announced December 2018.
-
Homogeneous Large-area Quasi-freestanding Monolayer and Bilayer Graphene on SiC
Authors:
Davood Momeni Pakdehi,
Klaus Pierz,
Stefan Wundrack,
Johannes Aprojanz,
Thi Thuy Nhung Nguyen,
Thorsten Dziomba,
Frank Hohls,
Andrey Bakin,
Rainer Stosch,
Christoph Tegenkamp,
Franz J. Ahlers,
Hans W. Schumacher
Abstract:
In this study, we first show that the argon flow during epitaxial graphene growth is an important parameter to control the quality of the buffer and the graphene layer. Atomic force microscopy (AFM) and low-energy electron diffraction (LEED) measurements reveal that the decomposition of the SiC substrate strongly depends on the Ar mass flow rate while pressure and temperature are kept constant. Ou…
▽ More
In this study, we first show that the argon flow during epitaxial graphene growth is an important parameter to control the quality of the buffer and the graphene layer. Atomic force microscopy (AFM) and low-energy electron diffraction (LEED) measurements reveal that the decomposition of the SiC substrate strongly depends on the Ar mass flow rate while pressure and temperature are kept constant. Our data are interpreted by a model based on the competition of the SiC decomposition rate, controlled by the Ar flow, with a uniform graphene buffer layer formation under the equilibrium process at the SiC surface. The proper choice of a set of growth parameters allows the growth of defect-free, ultra-smooth and coherent graphene-free buffer layer and bilayer-free monolayer graphene sheets which can be transformed into large-area high-quality quasi-freestanding monolayer and bilayer graphene (QFMLG and QFBLG) by hydrogen intercalation. AFM, scanning tunneling microscopy (STM), Raman spectroscopy and electronic transport measurements underline the excellent homogeneity of the resulting quasi-freestanding layers. Electronic transport measurements in four-point probe configuration reveal a homogeneous low resistance anisotropy on both μm- and mm scales.
△ Less
Submitted 12 November, 2018;
originally announced November 2018.
-
Certified Ethical Hacker v.10 Online Course - a Case Study
Authors:
Tam N. Nguyen
Abstract:
CEH v.10 Certification Self-study Course is an online course preparing learners for one of the most prestige cyber security certifications in the world - the Certified Ethical Hacker (CEH) v.10 Certification. Due to a pay wall and the practical rather than theoretical nature, most researchers have limited exposure to this course. For the first time, this paper will analyze the course's instruction…
▽ More
CEH v.10 Certification Self-study Course is an online course preparing learners for one of the most prestige cyber security certifications in the world - the Certified Ethical Hacker (CEH) v.10 Certification. Due to a pay wall and the practical rather than theoretical nature, most researchers have limited exposure to this course. For the first time, this paper will analyze the course's instructional design based on the highest national standards and related peer-reviewed published research works. The sole intention is to push the course to a higher ground, making it the best online course for cyber security. More importantly, the paper's instructional design evaluation strategy can well be extended and applied to any other online course' instructional design review and/or evaluation process.
△ Less
Submitted 17 October, 2018;
originally announced November 2018.
-
Robust Anomaly-Based Ship Proposals Detection from Pan-sharpened High-Resolution Satellite Image
Authors:
Viet Hung Luu,
Nguyen Hoang Hoa Luong,
Quang Hung Bui,
Thi Nhat Thanh Nguyen
Abstract:
Pre-screening of ship proposals is now employed by top ship detectors to avoid exhaustive search across image. In very high resolution (VHR) optical image, ships appeared as a cluster of abnormal bright pixels in open sea clutter (noise-like background). Anomaly-based detector utilizing Panchromatic (PAN) data has been widely used in many researches to detect ships, however, still facing two main…
▽ More
Pre-screening of ship proposals is now employed by top ship detectors to avoid exhaustive search across image. In very high resolution (VHR) optical image, ships appeared as a cluster of abnormal bright pixels in open sea clutter (noise-like background). Anomaly-based detector utilizing Panchromatic (PAN) data has been widely used in many researches to detect ships, however, still facing two main drawbacks: 1) detection rate tend to be low particularly when a ship is low contrast and 2) these models require a high manual configuration to select a threshold value best separate ships from sea surface background. This paper aims at further investigation of anomaly-based model to solve those issues. First, pan-sharpened Multi Spectral (MS) data is incorporated together with PAN to enhance ship discrimination. Second, we propose an improved anomaly-based model combining both global intensity anomaly and local texture anomaly map. Regarding noise appeared due to the present of sea clutter and because of pan-sharpen process, texture abnormality suppression term based on quantization theory is introduced. Experimental results on VNREDSat-1 VHR optical satellite images suggest that the pan-sharpened near-infrared (P-NIR) band can improve discrimination of ships from surrounding waters. Compared to state-of-the-art anomaly-based detectors, our proposed anomaly-based model on the combination of PAN and P-NIR data cannot only achieved highest ship detection's recall rate (91.14% and 45.9% on high-contrast and low-contrast dataset respectively) but also robust to different automatic threshold selection techniques.
△ Less
Submitted 24 April, 2018;
originally announced April 2018.
-
The Challenges in SDN/ML Based Network Security : A Survey
Authors:
Tam N. Nguyen
Abstract:
Machine Learning is gaining popularity in the network security domain as many more network-enabled devices get connected, as malicious activities become stealthier, and as new technologies like Software Defined Networking (SDN) emerge. Sitting at the application layer and communicating with the control layer, machine learning based SDN security models exercise a huge influence on the routing/switc…
▽ More
Machine Learning is gaining popularity in the network security domain as many more network-enabled devices get connected, as malicious activities become stealthier, and as new technologies like Software Defined Networking (SDN) emerge. Sitting at the application layer and communicating with the control layer, machine learning based SDN security models exercise a huge influence on the routing/switching of the entire SDN. Compromising the models is consequently a very desirable goal. Previous surveys have been done on either adversarial machine learning or the general vulnerabilities of SDNs but not both. Through examination of the latest ML-based SDN security applications and a good look at ML/SDN specific vulnerabilities accompanied by common attack methods on ML, this paper serves as a unique survey, making a case for more secure development processes of ML-based SDN security applications.
△ Less
Submitted 14 April, 2018; v1 submitted 8 April, 2018;
originally announced April 2018.
-
Comparison of various image fusion methods for impervious surface classification from VNREDSat-1
Authors:
Hung V. Luu,
Manh V. Pham,
Chuc D. Man,
Hung Q. Bui,
Thanh T. N. Nguyen
Abstract:
Impervious surface is an important indicator for urban development monitoring. Accurate urban impervious surfaces map** with VNREDSat-1 remains challenging due to their spectral diversity not captured by individual PAN image. In this artical, five multi-resolution image fusion techniques were compared for classification task of urban impervious surface. The result shows that for VNREDSat-1 datas…
▽ More
Impervious surface is an important indicator for urban development monitoring. Accurate urban impervious surfaces map** with VNREDSat-1 remains challenging due to their spectral diversity not captured by individual PAN image. In this artical, five multi-resolution image fusion techniques were compared for classification task of urban impervious surface. The result shows that for VNREDSat-1 dataset, UNB and Wavelet tranform methods are the best techniques reserving spatial and spectral information of original MS image, respectively. However, the UNB technique gives best results when it comes to impervious surface classification especially in the case of shadow area included in non-impervious surface group.
△ Less
Submitted 4 May, 2018; v1 submitted 6 March, 2018;
originally announced March 2018.
-
A Systematic Evaluation of Static API-Misuse Detectors
Authors:
Sven Amann,
Hoan Anh Nguyen,
Sarah Nadi,
Tien N. Nguyen,
Mira Mezini
Abstract:
Application Programming Interfaces (APIs) often have usage constraints, such as restrictions on call order or call conditions. API misuses, i.e., violations of these constraints, may lead to software crashes, bugs, and vulnerabilities. Though researchers developed many API-misuse detectors over the last two decades, recent studies show that API misuses are still prevalent. Therefore, we need to un…
▽ More
Application Programming Interfaces (APIs) often have usage constraints, such as restrictions on call order or call conditions. API misuses, i.e., violations of these constraints, may lead to software crashes, bugs, and vulnerabilities. Though researchers developed many API-misuse detectors over the last two decades, recent studies show that API misuses are still prevalent. Therefore, we need to understand the capabilities and limitations of existing detectors in order to advance the state of the art. In this paper, we present the first-ever qualitative and quantitative evaluation that compares static API-misuse detectors along the same dimensions, and with original author validation. To accomplish this, we develop MUC, a classification of API misuses, and MUBenchPipe, an automated benchmark for detector comparison, on top of our misuse dataset, MUBench. Our results show that the capabilities of existing detectors vary greatly and that existing detectors, though capable of detecting misuses, suffer from extremely low precision and recall. A systematic root-cause analysis reveals that, most importantly, detectors need to go beyond the naive assumption that a deviation from the most-frequent usage corresponds to a misuse and need to obtain additional usage examples to train their models. We present possible directions towards more-powerful API-misuse detectors.
△ Less
Submitted 13 March, 2018; v1 submitted 1 December, 2017;
originally announced December 2017.
-
Maintaining Ad-Hoc Communication Network in Area Protection Scenarios with Adversarial Agents
Authors:
Marika Ivanová,
Pavel Surynek,
Diep Thi Ngoc Nguyen
Abstract:
We address a problem of area protection in graph-based scenarios with multiple mobile agents where connectivity is maintained among agents to ensure they can communicate. The problem consists of two adversarial teams of agents that move in an undirected graph shared by both teams. Agents are placed in vertices of the graph; at most one agent can occupy a vertex; and they can move into adjacent ver…
▽ More
We address a problem of area protection in graph-based scenarios with multiple mobile agents where connectivity is maintained among agents to ensure they can communicate. The problem consists of two adversarial teams of agents that move in an undirected graph shared by both teams. Agents are placed in vertices of the graph; at most one agent can occupy a vertex; and they can move into adjacent vertices in a conflict free way. Teams have asymmetric goals: the aim of one team - attackers - is to invade into given area while the aim of the opponent team - defenders - is to protect the area from being entered by attackers by occupying selected vertices. The team of defenders need to maintain connectivity of vertices occupied by its own agents in a visibility graph. The visibility graph models possibility of communication between pairs of vertices.
We study strategies for allocating vertices to be occupied by the team of defenders to block attacking agents where connectivity is maintained at the same time. To do this we reserve a subset of defending agents that do not try to block the attackers but instead are placed to support connectivity of the team. The performance of strategies is tested in multiple benchmarks. The success of a strategy is heavily dependent on the type of the instance, and so one of the contributions of this work is that we identify suitable strategies for diverse instance types.
△ Less
Submitted 4 September, 2017;
originally announced September 2017.
-
Direct observation of magnetic droplet solitons in all-perpendicular spin torque nano-oscillators
Authors:
Sunjae Chung,
Q. Tuan Le,
Martina Ahlberg,
Markus Weigand,
Iuliia Bykova,
Ahmad A. Awad,
Hamid Mazraati,
Afshin Houshang,
Sheng Jiang,
T. N. Anh Nguyen,
Eberhard Goering,
Gisela Schütz,
Joachim Gräfe,
Johan Åkerman
Abstract:
Magnetic droplets are non-topological dynamical solitons that can be nucleated and sustained in nano-contact based spin torque nano-oscillators (NC-STNOs) with perpendicular anisotropy free layers. While originally predicted in all-perpendicular NC-STNOs, all experimental demonstrations have so far relied on orthogonal devices with an in-plane polarizing layer that requires a strong magnetic field…
▽ More
Magnetic droplets are non-topological dynamical solitons that can be nucleated and sustained in nano-contact based spin torque nano-oscillators (NC-STNOs) with perpendicular anisotropy free layers. While originally predicted in all-perpendicular NC-STNOs, all experimental demonstrations have so far relied on orthogonal devices with an in-plane polarizing layer that requires a strong magnetic field for droplet nucleation. Here, we instead show the nucleation and sustained operation of magnetic droplets in all-perpendicular NC-STNOs in modest perpendicular fields and over a wide range of nano-contact size. The droplet is observed electrically as an intermediate resistance state accompanied by broadband low-frequency microwave noise. Using canted fields, which introduce a non-zero relative angle between the free and fixed layer, the actual droplet precession frequency can also be determined. Finally, the droplet size, its perimeter width, and its fully reversed core are directly observed underneath a 80 nm diameter nano-contact using scanning transmission x-ray microscopy on both the Ni and Co edges. The droplet diameter is 150 nm, i.e. almost twice the nominal size of the nano-contact, and the droplet has a perimeter width of about 70 nm.
△ Less
Submitted 5 July, 2017;
originally announced July 2017.