Skip to main content

Showing 1–16 of 16 results for author: Do, T T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.04090  [pdf, other

    cs.LG cs.CV eess.IV eess.SP

    Interpretable Lightweight Transformer via Unrolling of Learned Graph Smoothness Priors

    Authors: Tam Thuc Do, Parham Eftekhar, Seyed Alireza Hosseini, Gene Cheung, Philip Chou

    Abstract: We build interpretable and lightweight transformer-like neural networks by unrolling iterative optimization algorithms that minimize graph smoothness priors -- the quadratic graph Laplacian regularizer (GLR) and the $\ell_1$-norm graph total variation (GTV) -- subject to an interpolation constraint. The crucial insight is that a normalized signal-dependent graph learning module amounts to a varian… ▽ More

    Submitted 6 June, 2024; originally announced June 2024.

  2. arXiv:2311.13539  [pdf, other

    eess.IV cs.LG eess.SP

    Learned Nonlinear Predictor for Critically Sampled 3D Point Cloud Attribute Compression

    Authors: Tam Thuc Do, Philip A. Chou, Gene Cheung

    Abstract: We study 3D point cloud attribute compression via a volumetric approach: assuming point cloud geometry is known at both encoder and decoder, parameters $θ$ of a continuous attribute function $f: \mathbb{R}^3 \mapsto \mathbb{R}$ are quantized to $\hatθ$ and encoded, so that discrete samples $f_{\hatθ}(\mathbf{x}_i)$ can be recovered at known 3D points $\mathbf{x}_i \in \mathbb{R}^3$ at the decoder.… ▽ More

    Submitted 22 November, 2023; originally announced November 2023.

  3. arXiv:2305.06042  [pdf, other

    cs.LG

    Blockwise Principal Component Analysis for monotone missing data imputation and dimensionality reduction

    Authors: Tu T. Do, Mai Anh Vu, Tuan L. Vo, Hoang Thien Ly, Thu Nguyen, Steven A. Hicks, Michael A. Riegler, Pål Halvorsen, Binh T. Nguyen

    Abstract: Monotone missing data is a common problem in data analysis. However, imputation combined with dimensionality reduction can be computationally expensive, especially with the increasing size of datasets. To address this issue, we propose a Blockwise principal component analysis Imputation (BPI) framework for dimensionality reduction and imputation of monotone missing data. The framework conducts Pri… ▽ More

    Submitted 10 January, 2024; v1 submitted 10 May, 2023; originally announced May 2023.

  4. arXiv:2304.00335  [pdf, other

    eess.SP cs.CV

    Volumetric Attribute Compression for 3D Point Clouds using Feedforward Network with Geometric Attention

    Authors: Tam Thuc Do, Philip A. Chou, Gene Cheung

    Abstract: We study 3D point cloud attribute compression using a volumetric approach: given a target volumetric attribute function $f : \mathbb{R}^3 \rightarrow \mathbb{R}$, we quantize and encode parameter vector $θ$ that characterizes $f$ at the encoder, for reconstruction $f_{\hatθ}(\mathbf{x})$ at known 3D points $\mathbf{x}$'s at the decoder. Extending a previous work Region Adaptive Hierarchical Transf… ▽ More

    Submitted 1 April, 2023; originally announced April 2023.

  5. arXiv:2302.00911  [pdf, other

    stat.ML cs.LG

    Conditional expectation with regularization for missing data imputation

    Authors: Mai Anh Vu, Thu Nguyen, Tu T. Do, Nhan Phan, Nitesh V. Chawla, Pål Halvorsen, Michael A. Riegler, Binh T. Nguyen

    Abstract: Missing data frequently occurs in datasets across various domains, such as medicine, sports, and finance. In many cases, to enable proper and reliable analyses of such data, the missing values are often imputed, and it is necessary that the method used has a low root mean square error (RMSE) between the imputed and the true values. In addition, for some critical applications, it is also often a re… ▽ More

    Submitted 11 September, 2023; v1 submitted 2 February, 2023; originally announced February 2023.

  6. arXiv:2203.01186  [pdf, other

    eess.IV cs.LG eess.SP

    Hybrid Model-based / Data-driven Graph Transform for Image Coding

    Authors: Saghar Bagheri, Tam Thuc Do, Gene Cheung, Antonio Ortega

    Abstract: Transform coding to sparsify signal representations remains crucial in an image compression pipeline. While the Karhunen-Loève transform (KLT) computed from an empirical covariance matrix $\bar{C}$ is theoretically optimal for a stationary process, in practice, collecting sufficient statistics from a non-stationary image to reliably estimate $\bar{C}$ can be difficult. In this paper, to encode an… ▽ More

    Submitted 2 March, 2022; originally announced March 2022.

  7. arXiv:2201.00237  [pdf, other

    cs.IR cs.SI

    Understanding Public Opinion on Using Hydroxychloroquine for COVID-19 Treatment via Social Media

    Authors: Thuy T. Do, Du Nguyen, Anh Le, Anh Nguyen, Dong Nguyen, Nga Hoang, Uyen Le, Tuan Tran

    Abstract: Hydroxychloroquine (HCQ) is used to prevent or treat malaria caused by mosquito bites. Recently, the drug has been suggested to treat COVID-19, but that has not been supported by scientific evidence. The information regarding the drug efficacy has flooded social networks, posting potential threats to the community by perverting their perceptions of the drug efficacy. This paper studies the reactio… ▽ More

    Submitted 1 January, 2022; originally announced January 2022.

    Comments: This paper will be presented at HEALTHINF 2022 - Conference

  8. arXiv:2109.13825  [pdf, other

    cs.LG

    What to Prioritize? Natural Language Processing for the Development of a Modern Bug Tracking Solution in Hardware Development

    Authors: Thi Thu Hang Do, Markus Dobler, Niklas Kühl

    Abstract: Managing large numbers of incoming bug reports and finding the most critical issues in hardware development is time consuming, but crucial in order to reduce development costs. In this paper, we present an approach to predict the time to fix, the risk and the complexity of debugging and resolution of a bug report using different supervised machine learning algorithms, namely Random Forest, Naive B… ▽ More

    Submitted 28 September, 2021; originally announced September 2021.

    Comments: Hawaii International Conference on System Sciences 2022 (HICSS-55)

  9. arXiv:1711.10218  [pdf, ps, other

    cs.IT

    Jamming Detection in Massive MIMO Systems

    Authors: Hossein Akhlaghpasand, S. Mohammad Razavizadeh, Emil Björnson, Tan Tai Do

    Abstract: This paper considers the physical layer security of a pilot-based massive multiple-input multiple-output (MaMIMO) system in presence of a multi-antenna jammer. To improve security of the network, we propose a new jamming detection method that makes use of a generalized likelihood ratio test over some coherence blocks. Our proposed method utilizes intentionally unused pilots in the network. The per… ▽ More

    Submitted 30 November, 2017; v1 submitted 28 November, 2017; originally announced November 2017.

    Comments: 5 pages, 2 figures, to appear in IEEE Wireless Communications Letters

  10. arXiv:1702.08800  [pdf, ps, other

    cs.IT

    Jamming-Resistant Receivers for the Massive MIMO Uplink

    Authors: Tan Tai Do, Emil Björnson, Erik G. Larsson, S. Mohammad Razavizadeh

    Abstract: We design a jamming-resistant receiver scheme to enhance the robustness of a massive MIMO uplink system against jamming. We assume that a jammer attacks the system both in the pilot and data transmission phases. The key feature of the proposed scheme is that, in the pilot phase, we estimate not only the legitimate channel, but also the jamming channel by exploiting a purposely unused pilot sequenc… ▽ More

    Submitted 28 February, 2017; originally announced February 2017.

    Comments: submitted to IEEE Trans. Inf. Forensics and Security

  11. arXiv:1702.04703  [pdf, ps, other

    cs.IT

    Jamming Resistant Receivers for Massive MIMO

    Authors: Tan Tai Do, Emil Björnson, Erik G. Larsson

    Abstract: We design jamming resistant receivers to enhance the robustness of a massive MIMO uplink channel against jamming. In the pilot phase, we estimate not only the desired channel, but also the jamming channel by exploiting purposely unused pilot sequences. The jamming channel estimate is used to construct the linear receive filter to reduce impact that jamming has on the achievable rates. The performa… ▽ More

    Submitted 15 February, 2017; originally announced February 2017.

    Comments: Accepted in the 42nd IEEE Int. Conf. Acoust., Speech, and Signal Process. (ICASSP2017)

  12. arXiv:1611.08316  [pdf, ps, other

    cs.IT

    Massive MIMO Pilot Retransmission Strategies for Robustification against Jamming

    Authors: Tan Tai Do, Hien Quoc Ngo, Trung Q. Duong, Tobias J. Oechtering, Mikael Skoglund

    Abstract: This letter proposes anti-jamming strategies based on pilot retransmission for a single user uplink massive MIMO under jamming attack. A jammer is assumed to attack the system both in the training and data transmission phases. We first derive an achievable rate which enables us to analyze the effect of jamming attacks on the system performance. Counter-attack strategies are then proposed to mitiga… ▽ More

    Submitted 24 November, 2016; originally announced November 2016.

    Comments: Accepted for publication in the IEEE Wireless Communications Letters

  13. On the Entropy Computation of Large Complex Gaussian Mixture Distributions

    Authors: Su Min Kim, Tan Tai Do, Tobias J. Oechtering, Gunnar Peters

    Abstract: The entropy computation of Gaussian mixture distributions with a large number of components has a prohibitive computational complexity. In this paper, we propose a novel approach exploiting the sphere decoding concept to bound and approximate such entropy terms with reduced complexity and good accuracy. Moreover, we propose an SNR region based enhancement of the approximation method to reduce the… ▽ More

    Submitted 27 May, 2015; v1 submitted 12 February, 2015; originally announced February 2015.

    Comments: 14 pages, Accepted to IEEE Transactions on Signal Processing

  14. arXiv:1111.1947  [pdf, other

    cs.CV

    Discriminative Local Sparse Representations for Robust Face Recognition

    Authors: Yi Chen, Umamahesh Srinivas, Thong T. Do, Vishal Monga, Trac D. Tran

    Abstract: A key recent advance in face recognition models a test face image as a sparse linear combination of a set of training face images. The resulting sparse representations have been shown to possess robustness against a variety of distortions like random pixel corruption, occlusion and disguise. This approach however makes the restrictive (in many scenarios) assumption that test faces must be perfectl… ▽ More

    Submitted 8 November, 2011; originally announced November 2011.

  15. Fast and Efficient Compressive Sensing using Structurally Random Matrices

    Authors: Thong T. Do, Lu Gan, Nam H. Nguyen, Trac D. Tran

    Abstract: This paper introduces a new framework of fast and efficient sensing matrices for practical compressive sensing, called Structurally Random Matrix (SRM). In the proposed framework, we pre-randomize a sensing signal by scrambling its samples or flip** its sample signs and then fast-transform the randomized samples and finally, subsample the transform coefficients as the final sensing measurements.… ▽ More

    Submitted 24 June, 2011; originally announced June 2011.

  16. arXiv:0911.0486  [pdf

    cs.DL cs.IR

    Building a Vietnamese Language Query Processing Framework for ELibrary Searching Systems

    Authors: Dang Tuan Nguyen, Ha Quy-Tinh Luong, Tuyen Thi-Thanh Do

    Abstract: In the objective of building intelligent searching systems for Elibraries or online bookstores, we have proposed a searching system model based on a Vietnamese language query processing component. Such document searching systems based on this model can allow users to use Vietnamese queries that represent content information as input, instead of entering keywords for searching in specific fields… ▽ More

    Submitted 2 November, 2009; originally announced November 2009.

    Comments: 5 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/

    Report number: ISSN 1947 5500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 1, pp. 092-096, October 2009, USA