Skip to main content

Showing 1–21 of 21 results for author: Dinh, T N

Searching in archive cs. Search in all archives.
.
  1. Development of a Vision System to Enhance the Reliability of the Pick-and-Place Robot for Autonomous Testing of Camera Module used in Smartphones

    Authors: Hoang-Anh Phan, Duy Nam Bui, Tuan Nguyen Dinh, Bao-Anh Hoang, An Nguyen Ngoc, Dong Tran Huu Quoc, Ha Tran Thi Thuy, Tung Thanh Bui, Van Nguyen Thi Thanh

    Abstract: Pick-and-place robots are commonly used in modern industrial manufacturing. For complex devices/parts like camera modules used in smartphones, which contain optical parts, electrical components and interfacing connectors, the placement operation may not absolutely accurate, which may cause damage in the device under test during the mechanical movement to make good contact for electrical functions… ▽ More

    Submitted 8 May, 2023; originally announced May 2023.

    Comments: Published to 2021 International Conference on Engineering and Emerging Technologies (ICEET 2021). 6 pages

  2. arXiv:2211.11001  [pdf

    cs.CV

    F2SD: A dataset for end-to-end group detection algorithms

    Authors: Giang Hoang, Tuan Nguyen Dinh, Tung Cao Hoang, Son Le Duy, Keisuke Hihara, Yumeka Utada, Akihiko Torii, Naoki Izumi, Long Tran Quoc

    Abstract: The lack of large-scale datasets has been impeding the advance of deep learning approaches to the problem of F-formation detection. Moreover, most research works on this problem rely on input sensor signals of object location and orientation rather than image signals. To address this, we develop a new, large-scale dataset of simulated images for F-formation detection, called F-formation Simulation… ▽ More

    Submitted 20 November, 2022; originally announced November 2022.

    Comments: Accepted at ICMV 2022

  3. arXiv:2208.04613  [pdf

    eess.IV cs.CV cs.LG

    Res-Dense Net for 3D Covid Chest CT-scan classification

    Authors: Quoc-Huy Trinh, Minh-Van Nguyen, Thien-Phuc Nguyen Dinh

    Abstract: One of the most contentious areas of research in Medical Image Preprocessing is 3D CT-scan. With the rapid spread of COVID-19, the function of CT-scan in properly and swiftly diagnosing the disease has become critical. It has a positive impact on infection prevention. There are many tasks to diagnose the illness through CT-scan images, include COVID-19. In this paper, we propose a method that usin… ▽ More

    Submitted 9 August, 2022; originally announced August 2022.

    Comments: arXiv admin note: text overlap with arXiv:2106.07524 by other authors

  4. arXiv:2205.05611  [pdf, other

    cs.CR cs.LG

    Blockchain-based Secure Client Selection in Federated Learning

    Authors: Truc Nguyen, Phuc Thai, Tre' R. Jeter, Thang N. Dinh, My T. Thai

    Abstract: Despite the great potential of Federated Learning (FL) in large-scale distributed learning, the current system is still subject to several privacy issues due to the fact that local models trained by clients are exposed to the central server. Consequently, secure aggregation protocols for FL have been developed to conceal the local models from the server. However, we show that, by manipulating the… ▽ More

    Submitted 11 May, 2022; originally announced May 2022.

    Comments: IEEE ICBC 2022

  5. arXiv:2205.05004  [pdf, other

    quant-ph cs.DS

    FastHare: Fast Hamiltonian Reduction for Large-scale Quantum Annealing

    Authors: Phuc Thai, My T. Thai, Tam Vu, Thang N. Dinh

    Abstract: Quantum annealing (QA) that encodes optimization problems into Hamiltonians remains the only near-term quantum computing paradigm that provides sufficient many qubits for real-world applications. To fit larger optimization instances on existing quantum annealers, reducing Hamiltonians into smaller equivalent Hamiltonians provides a promising approach. Unfortunately, existing reduction techniques a… ▽ More

    Submitted 10 May, 2022; originally announced May 2022.

  6. arXiv:2203.01746  [pdf, other

    cs.SI

    SaPHyRa: A Learning Theory Approach to Ranking Nodes in Large Networks

    Authors: Phuc Thai, My T. Thai, Tam Vu, Thang N. Dinh

    Abstract: Ranking nodes based on their centrality stands a fundamental, yet, challenging problem in large-scale networks. Approximate methods can quickly estimate nodes' centrality and identify the most central nodes, but the ranking for the majority of remaining nodes may be meaningless. For example, ranking for less-known websites in search queries is known to be noisy and unstable. To this end, we invest… ▽ More

    Submitted 3 March, 2022; originally announced March 2022.

    Comments: To appear in IEEE ICDE'22

  7. arXiv:2111.11604  [pdf, other

    cs.CV

    Simultaneous face detection and 360 degree headpose estimation

    Authors: Hoang Nguyen Viet, Linh Nguyen Viet, Tuan Nguyen Dinh, Duc Tran Minh, Long Tran Quoc

    Abstract: With many practical applications in human life, including manufacturing surveillance cameras, analyzing and processing customer behavior, many researchers are noticing face detection and head pose estimation on digital images. A large number of proposed deep learning models have state-of-the-art accuracy such as YOLO, SSD, MTCNN, solving the problem of face detection or HopeNet, FSA-Net, RankPose… ▽ More

    Submitted 22 November, 2021; originally announced November 2021.

    Comments: Accepted at The 13th International Conference on Knowledge and Systems Engineering (KSE 2021), 7 pages, 2 figures, 3 tables

  8. arXiv:2111.07039  [pdf, other

    cs.CV cs.AI cs.HC

    UET-Headpose: A sensor-based top-view head pose dataset

    Authors: Linh Nguyen Viet, Tuan Nguyen Dinh, Hoang Nguyen Viet, Duc Tran Minh, Long Tran Quoc

    Abstract: Head pose estimation is a challenging task that aims to solve problems related to predicting three dimensions vector, that serves for many applications in human-robot interaction or customer behavior. Previous researches have proposed some precise methods for collecting head pose data. But those methods require either expensive devices like depth cameras or complex laboratory environment setup. In… ▽ More

    Submitted 12 November, 2021; originally announced November 2021.

  9. OptChain: Optimal Transactions Placement for Scalable Blockchain Sharding

    Authors: Lan N. Nguyen, Truc Nguyen, Thang N. Dinh, My T. Thai

    Abstract: A major challenge in blockchain sharding protocols is that more than 95% transactions are cross-shard. Not only those cross-shard transactions degrade the system throughput but also double the confirmation time, and exhaust an already scarce network bandwidth. Are cross-shard transactions imminent for sharding schemes? In this paper, we propose a new sharding paradigm, called OptChain, in which cr… ▽ More

    Submitted 18 October, 2021; v1 submitted 16 July, 2020; originally announced July 2020.

  10. arXiv:1907.06247  [pdf

    cs.CV cs.RO

    State Estimation in Visual Inertial Autonomous Helicopter Landing Using Optimisation on Manifold

    Authors: Thinh Hoang Dinh, Hieu Le Thi Hong, Tri Ngo Dinh

    Abstract: Autonomous helicopter landing is a challenging task that requires precise information about the aircraft states regarding the helicopters position, attitude, as well as position of the helipad. To this end, we propose a solution that fuses data from an Inertial Measurement Unit (IMU) and a monocular camera which is capable of detecting helipads position in the image plane. The algorithm utilises m… ▽ More

    Submitted 14 July, 2019; originally announced July 2019.

  11. arXiv:1709.03565  [pdf, other

    cs.DS

    Importance Sketching of Influence Dynamics in Billion-scale Networks

    Authors: Hung T. Nguyen, Tri P. Nguyen, NhatHai Phan, Thang N. Dinh

    Abstract: The blooming availability of traces for social, biological, and communication networks opens up unprecedented opportunities in analyzing diffusion processes in networks. However, the sheer sizes of the nowadays networks raise serious challenges in computational efficiency and scalability. In this paper, we propose a new hyper-graph sketching framework for inflence dynamics in networks. The centr… ▽ More

    Submitted 11 September, 2017; originally announced September 2017.

    Comments: 12 pages, to appear in ICDM 2017 as a regular paper

  12. arXiv:1704.04794  [pdf, other

    cs.DS cs.SI

    Outward Influence and Cascade Size Estimation in Billion-scale Networks

    Authors: Hung T. Nguyen, Tri P. Nguyen, Tam Vu, Thang N. Dinh

    Abstract: Estimating cascade size and nodes' influence is a fundamental task in social, technological, and biological networks. Yet this task is extremely challenging due to the sheer size and the structural heterogeneity of networks. We investigate a new influence measure, termed outward influence (OI), defined as the (expected) number of nodes that a subset of nodes $S$ will activate, excluding the nodes… ▽ More

    Submitted 16 April, 2017; originally announced April 2017.

    Comments: 16 pages, SIGMETRICS 2017

  13. arXiv:1702.05854  [pdf, other

    cs.SI

    Blocking Self-avoiding Walks Stops Cyber-epidemics: A Scalable GPU-based Approach

    Authors: Hung T. Nguyen, Alberto Cano, Tam Vu, Thang N. Dinh

    Abstract: Cyber-epidemics, the widespread of fake news or propaganda through social media, can cause devastating economic and political consequences. A common countermeasure against cyber-epidemics is to disable a small subset of suspected social connections or accounts to effectively contain the epidemics. An example is the recent shutdown of 125,000 ISIS-related Twitter accounts. Despite many proposed met… ▽ More

    Submitted 21 February, 2017; v1 submitted 19 February, 2017; originally announced February 2017.

  14. arXiv:1702.01452  [pdf, other

    cs.SI physics.soc-ph

    Towards Optimal Strategy for Adaptive Probing in Incomplete Networks

    Authors: Tri P. Nguyen, Hung T. Nguyen, Thang N. Dinh

    Abstract: We investigate a graph probing problem in which an agent has only an incomplete view $G' \subsetneq G$ of the network and wishes to explore the network with least effort. In each step, the agent selects a node $u$ in $G'$ to probe. After probing $u$, the agent gains the information about $u$ and its neighbors. All the neighbors of $u$ become \emph{observed} and are \emph{probable} in the subsequen… ▽ More

    Submitted 5 February, 2017; originally announced February 2017.

  15. arXiv:1702.01451  [pdf, other

    cs.SI physics.soc-ph

    Transitivity Demolition and the Falls of Social Networks

    Authors: Hung T. Nguyen, Nam P. Nguyen, Tam Vu, Huan X. Hoang, Thang N. Dinh

    Abstract: In this paper, we study crucial elements of a complex network, namely its nodes and connections, which play a key role in maintaining the network's structure and function under unexpected structural perturbations of nodes and edges removal. Specifically, we want to identify vital nodes and edges whose failure (either random or intentional) will break the most number of connected triples (or triang… ▽ More

    Submitted 5 February, 2017; originally announced February 2017.

  16. arXiv:1701.08787  [pdf, ps, other

    cs.SI

    Vulnerability of Clustering under Node Failure in Complex Networks

    Authors: Alan Kuhnle, Nam P. Nguyen, Thang N. Dinh, My T. Thai

    Abstract: Robustness in response to unexpected events is always desirable for real-world networks. To improve the robustness of any networked system, it is important to analyze vulnerability to external perturbation such as random failures or adversarial attacks occurring to elements of the network. In this paper, we study an emerging problem in assessing the robustness of complex networks: the vulnerabilit… ▽ More

    Submitted 30 January, 2017; originally announced January 2017.

  17. arXiv:1701.08462  [pdf, other

    cs.SI

    TipTop: (Almost) Exact Solutions for Influence Maximization in Billion-scale Networks

    Authors: Xiang Li, J. David Smith, Thang N. Dinh, My T. Thai

    Abstract: In this paper, we study the Cost-aware Target Viral Marketing (CTVM) problem, a generalization of Influence Maximization (IM). CTVM asks for the most cost-effective users to influence the most relevant users. In contrast to the vast literature, we attempt to offer exact solutions. As the problem is NP-hard, thus, exact solutions are intractable, we propose TipTop, a $(1-ε)$-optimal solution for ar… ▽ More

    Submitted 7 February, 2019; v1 submitted 29 January, 2017; originally announced January 2017.

    Comments: extended version, v2

    ACM Class: G.2.2; G.1.6

  18. arXiv:1608.06492  [pdf, other

    cs.SI

    Multiple Infection Sources Identification with Provable Guarantees

    Authors: Hung T. Nguyen, Preetam Ghosh, Michael L. Mayo, Thang N. Dinh

    Abstract: Given an aftermath of a cascade in the network, i.e. a set $V_I$ of "infected" nodes after an epidemic outbreak or a propagation of rumors/worms/viruses, how can we infer the sources of the cascade? Answering this challenging question is critical for computer forensic, vulnerability analysis, and risk management. Despite recent interest towards this problem, most of existing works focus only on si… ▽ More

    Submitted 23 August, 2016; originally announced August 2016.

    Comments: in The 25th ACM International Conference on Information and Knowledge Management (CIKM 2016)

  19. arXiv:1605.07990  [pdf, other

    cs.SI cs.DS physics.soc-ph

    Stop-and-Stare: Optimal Sampling Algorithms for Viral Marketing in Billion-scale Networks

    Authors: Hung T. Nguyen, My T. Thai, Thang N. Dinh

    Abstract: Influence Maximization (IM), that seeks a small set of key users who spread the influence widely into the network, is a core problem in multiple domains. It finds applications in viral marketing, epidemic control, and assessing cascading failures within complex systems. Despite the huge amount of effort, IM in billion-scale networks such as Facebook, Twitter, and World Wide Web has not been satisf… ▽ More

    Submitted 22 February, 2017; v1 submitted 25 May, 2016; originally announced May 2016.

    Comments: Correct the errors in the proofs for SSA/D-SSA. Update D-SSA to estimate ε(s) instead of δ(s)

  20. arXiv:1602.01016  [pdf, other

    cs.SI cs.DS physics.soc-ph

    Network Clustering via Maximizing Modularity: Approximation Algorithms and Theoretical Limits

    Authors: Thang N. Dinh, Xiang Li, My T. Thai

    Abstract: Many social networks and complex systems are found to be naturally divided into clusters of densely connected nodes, known as community structure (CS). Finding CS is one of fundamental yet challenging topics in network science. One of the most popular classes of methods for this problem is to maximize Newman's modularity. However, there is a little understood on how well we can approximate the max… ▽ More

    Submitted 2 February, 2016; originally announced February 2016.

    Comments: Appeared in IEEE ICDM 2015

  21. arXiv:1108.4034  [pdf, other

    cs.SI cs.DS physics.soc-ph

    Finding Community Structure with Performance Guarantees in Complex Networks

    Authors: Thang N. Dinh, My T. Thai

    Abstract: Many networks including social networks, computer networks, and biological networks are found to divide naturally into communities of densely connected individuals. Finding community structure is one of fundamental problems in network science. Since Newman's suggestion of using \emph{modularity} as a measure to qualify the goodness of community structures, many efficient methods to maximize modula… ▽ More

    Submitted 19 August, 2011; originally announced August 2011.