Skip to main content

Showing 1–12 of 12 results for author: Choi, J I

Searching in archive cs. Search in all archives.
.
  1. arXiv:2311.12534  [pdf, other

    cs.CL

    Evaluation Metrics of Language Generation Models for Synthetic Traffic Generation Tasks

    Authors: Simone Filice, Jason Ingyu Choi, Giuseppe Castellucci, Eugene Agichtein, Oleg Rokhlenko

    Abstract: Many Natural Language Generation (NLG) tasks aim to generate a single output text given an input prompt. Other settings require the generation of multiple texts, e.g., for Synthetic Traffic Generation (STG). This generation task is crucial for training and evaluating QA systems as well as conversational agents, where the goal is to generate multiple questions or utterances resembling the linguisti… ▽ More

    Submitted 21 November, 2023; originally announced November 2023.

  2. arXiv:2303.02512  [pdf, other

    cs.CV

    Visual Saliency-Guided Channel Pruning for Deep Visual Detectors in Autonomous Driving

    Authors: Jung Im Choi, Qing Tian

    Abstract: Deep neural network (DNN) pruning has become a de facto component for deploying on resource-constrained devices since it can reduce memory requirements and computation costs during inference. In particular, channel pruning gained more popularity due to its structured nature and direct savings on general hardware. However, most existing pruning approaches utilize importance measures that are not di… ▽ More

    Submitted 4 March, 2023; originally announced March 2023.

    Comments: 6 pages, 4 figures

  3. arXiv:2202.04781  [pdf, other

    cs.CV

    Adversarial Attack and Defense of YOLO Detectors in Autonomous Driving Scenarios

    Authors: Jung Im Choi, Qing Tian

    Abstract: Visual detection is a key task in autonomous driving, and it serves as a crucial foundation for self-driving planning and control. Deep neural networks have achieved promising results in various visual tasks, but they are known to be vulnerable to adversarial attacks. A comprehensive understanding of deep visual detectors' vulnerability is required before people can improve their robustness. Howev… ▽ More

    Submitted 3 July, 2022; v1 submitted 9 February, 2022; originally announced February 2022.

    Comments: Accepted by 2022 IEEE Intelligent Vehicles Symposium (IV 2022)

  4. arXiv:2008.08180  [pdf, other

    cs.IR

    Semantic Product Search for Matching Structured Product Catalogs in E-Commerce

    Authors: Jason Ingyu Choi, Surya Kallumadi, Bhaskar Mitra, Eugene Agichtein, Faizan Javed

    Abstract: Retrieving all semantically relevant products from the product catalog is an important problem in E-commerce. Compared to web documents, product catalogs are more structured and sparse due to multi-instance fields that encode heterogeneous aspects of products (e.g. brand name and product dimensions). In this paper, we propose a new semantic product search algorithm that learns to represent and agg… ▽ More

    Submitted 18 August, 2020; originally announced August 2020.

    Comments: 4 pages

  5. Would You Like to Hear the News? Investigating Voice-BasedSuggestions for Conversational News Recommendation

    Authors: Harshita Sahijwani, Jason Ingyu Choi, Eugene Agichtein

    Abstract: One of the key benefits of voice-based personal assistants is the potential to proactively recommend relevant and interesting information. One of the most valuable sources of such information is the News. However, in order for the user to hear the news that is useful and relevant to them, it must be recommended in an interesting and informative way. However, to the best of our knowledge, how to pr… ▽ More

    Submitted 2 June, 2020; originally announced June 2020.

  6. arXiv:2006.01921  [pdf, other

    cs.HC cs.AI cs.LG

    Offline and Online Satisfaction Prediction in Open-Domain Conversational Systems

    Authors: Jason Ingyu Choi, Ali Ahmadvand, Eugene Agichtein

    Abstract: Predicting user satisfaction in conversational systems has become critical, as spoken conversational assistants operate in increasingly complex domains. Online satisfaction prediction (i.e., predicting satisfaction of the user with the system after each turn) could be used as a new proxy for implicit user feedback, and offers promising opportunities to create more responsive and effective conversa… ▽ More

    Submitted 2 June, 2020; originally announced June 2020.

    Comments: Published in CIKM '19, 10 pages

  7. arXiv:2006.01916  [pdf, other

    cs.HC cs.AI cs.LG eess.AS

    Quantifying the Effects of Prosody Modulation on User Engagement and Satisfaction in Conversational Systems

    Authors: Jason Ingyu Choi, Eugene Agichtein

    Abstract: As voice-based assistants such as Alexa, Siri, and Google Assistant become ubiquitous, users increasingly expect to maintain natural and informative conversations with such systems. However, for an open-domain conversational system to be coherent and engaging, it must be able to maintain the user's interest for extended periods, without sounding boring or annoying. In this paper, we investigate on… ▽ More

    Submitted 2 June, 2020; originally announced June 2020.

    Comments: Published in CHIIR 2020, 4 pages

  8. arXiv:2005.13804  [pdf, other

    cs.CL

    Contextual Dialogue Act Classification for Open-Domain Conversational Agents

    Authors: Ali Ahmadvand, Jason Ingyu Choi, Eugene Agichtein

    Abstract: Classifying the general intent of the user utterance in a conversation, also known as Dialogue Act (DA), e.g., open-ended question, statement of opinion, or request for an opinion, is a key step in Natural Language Understanding (NLU) for conversational agents. While DA classification has been extensively studied in human-human conversations, it has not been sufficiently explored for the emerging… ▽ More

    Submitted 28 May, 2020; originally announced May 2020.

    Comments: SIGIR 2019

  9. arXiv:2005.13798  [pdf, other

    cs.CL

    ConCET: Entity-Aware Topic Classification for Open-Domain Conversational Agents

    Authors: Ali Ahmadvand, Harshita Sahijwani, Jason Ingyu Choi, Eugene Agichtein

    Abstract: Identifying the topic (domain) of each user's utterance in open-domain conversational systems is a crucial step for all subsequent language understanding and response tasks. In particular, for complex domains, an utterance is often routed to a single component responsible for that domain. Thus, correctly map** a user utterance to the right domain is critical. To address this problem, we introduc… ▽ More

    Submitted 28 May, 2020; originally announced May 2020.

    Comments: CIKM 2019

  10. arXiv:1907.00935  [pdf, other

    cs.CR

    One-Time Programs made Practical

    Authors: Lianying Zhao, Joseph I. Choi, Didem Demirag, Kevin R. B. Butler, Mohammad Mannan, Erman Ayday, Jeremy Clark

    Abstract: A one-time program (OTP) works as follows: Alice provides Bob with the implementation of some function. Bob can have the function evaluated exclusively on a single input of his choosing. Once executed, the program will fail to evaluate on any other input. State-of-the-art one-time programs have remained theoretical, requiring custom hardware that is cost-ineffective/unavailable, or confined to adh… ▽ More

    Submitted 1 July, 2019; originally announced July 2019.

  11. A Hybrid Approach to Secure Function Evaluation Using SGX

    Authors: Joseph I. Choi, Dave '**g' Tian, Grant Hernandez, Christopher Patton, Benjamin Mood, Thomas Shrimpton, Kevin R. B. Butler, Patrick Traynor

    Abstract: A protocol for two-party secure function evaluation (2P-SFE) aims to allow the parties to learn the output of function $f$ of their private inputs, while leaking nothing more. In a sense, such a protocol realizes a trusted oracle that computes $f$ and returns the result to both parties. There have been tremendous strides in efficiency over the past ten years, yet 2P-SFE protocols remain impractica… ▽ More

    Submitted 6 May, 2019; v1 submitted 3 May, 2019; originally announced May 2019.

    Comments: Full version, with proofs, of conference paper at AsiaCCS 2019; updated to include copyright information

  12. arXiv:1810.00024  [pdf, other

    cs.LG cs.AI cs.CR stat.ML

    Explainable Black-Box Attacks Against Model-based Authentication

    Authors: Washington Garcia, Joseph I. Choi, Suman K. Adari, Somesh Jha, Kevin R. B. Butler

    Abstract: Establishing unique identities for both humans and end systems has been an active research problem in the security community, giving rise to innovative machine learning-based authentication techniques. Although such techniques offer an automated method to establish identity, they have not been vetted against sophisticated attacks that target their core machine learning technique. This paper demons… ▽ More

    Submitted 28 September, 2018; originally announced October 2018.