Skip to main content

Showing 1–4 of 4 results for author: Quach, A

.
  1. arXiv:2406.15149  [pdf, other

    cs.RO cs.AI cs.CV

    Gaussian Splatting to Real World Flight Navigation Transfer with Liquid Networks

    Authors: Alex Quach, Makram Chahine, Alexander Amini, Ramin Hasani, Daniela Rus

    Abstract: Simulators are powerful tools for autonomous robot learning as they offer scalable data generation, flexible design, and optimization of trajectories. However, transferring behavior learned from simulation data into the real world proves to be difficult, usually mitigated with compute-heavy domain randomization methods or further model fine-tuning. We present a method to improve generalization and… ▽ More

    Submitted 21 June, 2024; originally announced June 2024.

  2. arXiv:2306.11890  [pdf, other

    cs.CV cs.AI cs.LG

    Out of Distribution Generalization via Interventional Style Transfer in Single-Cell Microscopy

    Authors: Wolfgang M. Pernice, Michael Doron, Alex Quach, Aditya Pratapa, Sultan Kenjeyev, Nicholas De Veaux, Michio Hirano, Juan C. Caicedo

    Abstract: Real-world deployment of computer vision systems, including in the discovery processes of biomedical research, requires causal representations that are invariant to contextual nuisances and generalize to new data. Leveraging the internal replicate structure of two novel single-cell fluorescent microscopy datasets, we propose generally applicable tests to assess the extent to which models learn cau… ▽ More

    Submitted 15 June, 2023; originally announced June 2023.

    Comments: Accepted at CVPR 2023 CVMI

  3. arXiv:2203.15121  [pdf, ps, other

    cs.CR

    Tightly Seal Your Sensitive Pointers with PACTight

    Authors: Mohannad Ismail, Andrew Quach, Christopher Jelesnianski, Yeong** Jang, Changwoo Min

    Abstract: ARM is becoming more popular in desktops and data centers, opening a new realm in terms of security attacks against ARM. ARM has released Pointer Authentication, a new hardware security feature that is intended to ensure pointer integrity with cryptographic primitives. In this paper, we utilize Pointer Authentication (PA) to build a novel scheme to completely prevent any misuse of security-sensiti… ▽ More

    Submitted 28 March, 2022; originally announced March 2022.

    Comments: Accepted for publication to USENIX Security 2022

  4. arXiv:1802.00759  [pdf, other

    cs.CR

    Debloating Software through Piece-Wise Compilation and Loading

    Authors: Anh Quach, Aravind Prakash, Lok Kwong Yan

    Abstract: Programs are bloated. Our study shows that only 5% of libc is used on average across the Ubuntu Desktop environment (2016 programs); the heaviest user, vlc media player, only needed 18%. In this paper: (1) We present a debloating framework built on a compiler toolchain that can successfully debloat programs (shared/static libraries and executables). Our solution can successfully compile and load… ▽ More

    Submitted 23 July, 2018; v1 submitted 2 February, 2018; originally announced February 2018.

    Comments: Usenix Security 2018

    Journal ref: USENIX Security Symposium, Baltimore, Maryland, August 2018