Skip to main content

Showing 1–17 of 17 results for author: Ho, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.10294  [pdf, other

    cs.CL cs.LG

    RelevAI-Reviewer: A Benchmark on AI Reviewers for Survey Paper Relevance

    Authors: Paulo Henrique Couto, Quang Phuoc Ho, Nageeta Kumari, Benedictus Kent Rachmat, Thanh Gia Hieu Khuong, Ihsan Ullah, Lisheng Sun-Hosoya

    Abstract: Recent advancements in Artificial Intelligence (AI), particularly the widespread adoption of Large Language Models (LLMs), have significantly enhanced text analysis capabilities. This technological evolution offers considerable promise for automating the review of scientific papers, a task traditionally managed through peer review by fellow researchers. Despite its critical role in maintaining res… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

    Journal ref: Conf{é}rence sur l'Apprentissage Automatique 2024, Jul 2024, Lille, France

  2. arXiv:2405.14259  [pdf, other

    cs.CL cs.AI

    Let's Fuse Step by Step: A Generative Fusion Decoding Algorithm with LLMs for Multi-modal Text Recognition

    Authors: Chan-Jan Hsu, Yi-Chang Chen, Feng-Ting Liao, Pei-Chen Ho, Yu-Hsiang Wang, Po-Chun Hsu, Da-shan Shiu

    Abstract: We introduce "Generative Fusion Decoding" (GFD), a novel shallow fusion framework, utilized to integrate Large Language Models (LLMs) into multi-modal text recognition systems such as automatic speech recognition (ASR) and optical character recognition (OCR). We derive the formulas necessary to enable GFD to operate across mismatched token spaces of different models by map** text token space to… ▽ More

    Submitted 2 June, 2024; v1 submitted 23 May, 2024; originally announced May 2024.

  3. arXiv:2401.04908  [pdf, other

    cs.IT cs.NI

    On Achieving High-Fidelity Grant-free Non-Orthogonal Multiple Access

    Authors: Haoran Mei, Limei Peng, Pin-Han Ho

    Abstract: Grant-free access (GFA) has been envisioned to play an active role in massive Machine Type Communication (mMTC) under 5G and Beyond mobile systems, which targets at achieving significant reduction of signaling overhead and access latency in the presence of sporadic traffic and small-size data. The paper focuses on a novel K-repetition GFA (K-GFA) scheme by incorporating Reed-Solomon (RS) code with… ▽ More

    Submitted 9 January, 2024; originally announced January 2024.

    Comments: 9 pages, 5 figures

  4. arXiv:2401.04539  [pdf, other

    cs.IT cs.NI

    A Novel Framework of K-repetition Grant-free Access via Diversity Slotted Aloha (DSA)

    Authors: Haoran Mei, Limei Peng, Pin-Han Ho

    Abstract: This article introduces a novel framework of multi-user detection (MUD) for K-repetition grant-free non-orthogonal multiple access (K-GF-NOMA), called $α$ iterative interference cancellation diversity slotted aloha ($α$-IIC-DSA). The proposed framework targets at a simple yet effective decoding process where the AP can intelligently exploit the correlation among signals received at different resou… ▽ More

    Submitted 9 January, 2024; originally announced January 2024.

    Comments: 7 pages, 5 figures

  5. arXiv:2308.16381  [pdf, other

    cs.RO

    Wasserstein Distributionally Robust Chance Constrained Trajectory Optimization for Mobile Robots within Uncertain Safe Corridor

    Authors: Shaohang Xu, Haolin Ruan, Wentao Zhang, Yian Wang, Lijun Zhu, Chin Pang Ho

    Abstract: Safe corridor-based Trajectory Optimization (TO) presents an appealing approach for collision-free path planning of autonomous robots, offering global optimality through its convex formulation. The safe corridor is constructed based on the perceived map, however, the non-ideal perception induces uncertainty, which is rarely considered in trajectory generation. In this paper, we propose Distributio… ▽ More

    Submitted 30 August, 2023; originally announced August 2023.

    Comments: 7 pages

  6. arXiv:2301.01045  [pdf, other

    cs.LG math.OC

    Risk-Averse MDPs under Reward Ambiguity

    Authors: Haolin Ruan, Zhi Chen, Chin Pang Ho

    Abstract: We propose a distributionally robust return-risk model for Markov decision processes (MDPs) under risk and reward ambiguity. The proposed model optimizes the weighted average of mean and percentile performances, and it covers the distributionally robust MDPs and the distributionally robust chance-constrained MDPs (both under reward ambiguity) as special cases. By considering that the unknown rewar… ▽ More

    Submitted 3 January, 2023; v1 submitted 3 January, 2023; originally announced January 2023.

  7. arXiv:2212.10439  [pdf, other

    cs.LG

    Policy Gradient in Robust MDPs with Global Convergence Guarantee

    Authors: Qiuhao Wang, Chin Pang Ho, Marek Petrik

    Abstract: Robust Markov decision processes (RMDPs) provide a promising framework for computing reliable policies in the face of model errors. Many successful reinforcement learning algorithms build on variations of policy-gradient methods, but adapting these methods to RMDPs has been challenging. As a result, the applicability of RMDPs to large, practical domains remains limited. This paper proposes a new D… ▽ More

    Submitted 7 June, 2023; v1 submitted 20 December, 2022; originally announced December 2022.

    Journal ref: International Conference on Machine Learning, 2023

  8. arXiv:2205.14202  [pdf, other

    math.OC cs.LG

    Robust Phi-Divergence MDPs

    Authors: Chin Pang Ho, Marek Petrik, Wolfram Wiesemann

    Abstract: In recent years, robust Markov decision processes (MDPs) have emerged as a prominent modeling framework for dynamic decision problems affected by uncertainty. In contrast to classical MDPs, which only account for stochasticity by modeling the dynamics through a stochastic process with a known transition kernel, robust MDPs additionally account for ambiguity by optimizing in view of the most advers… ▽ More

    Submitted 12 January, 2023; v1 submitted 27 May, 2022; originally announced May 2022.

    Journal ref: Advances in Neural Information Processing Systems (Neurips), 2022

  9. arXiv:2006.09484  [pdf, other

    cs.LG math.OC stat.ML

    Partial Policy Iteration for L1-Robust Markov Decision Processes

    Authors: Chin Pang Ho, Marek Petrik, Wolfram Wiesemann

    Abstract: Robust Markov decision processes (MDPs) allow to compute reliable solutions for dynamic decision problems whose evolution is modeled by rewards and partially-known transition probabilities. Unfortunately, accounting for uncertainty in the transition probabilities significantly increases the computational complexity of solving robust MDPs, which severely limits their scalability. This paper describ… ▽ More

    Submitted 16 June, 2020; originally announced June 2020.

  10. arXiv:1910.10786  [pdf, other

    cs.LG cs.AI stat.ML

    Optimizing Percentile Criterion Using Robust MDPs

    Authors: Bahram Behzadian, Reazul Hasan Russel, Marek Petrik, Chin Pang Ho

    Abstract: We address the problem of computing reliable policies in reinforcement learning problems with limited data. In particular, we compute policies that achieve good returns with high confidence when deployed. This objective, known as the \emph{percentile criterion}, can be optimized using Robust MDPs~(RMDPs). RMDPs generalize MDPs to allow for uncertain transition probabilities chosen adversarially fr… ▽ More

    Submitted 25 February, 2021; v1 submitted 23 October, 2019; originally announced October 2019.

  11. arXiv:1807.03116  [pdf, other

    cs.CV cs.LG

    Deep Global-Connected Net With The Generalized Multi-Piecewise ReLU Activation in Deep Learning

    Authors: Zhi Chen, Pin-han Ho

    Abstract: Recent Progress has shown that exploitation of hidden layer neurons in convolution neural networks incorporating with a carefully designed activation function can yield better classification results in the field of computer vision. The paper firstly introduces a novel deep learning architecture aiming to mitigate the gradient-vanishing problem, in which the earlier hidden layer neurons could be di… ▽ More

    Submitted 19 June, 2018; originally announced July 2018.

    Comments: 9 pages, 3 figures and 5 tables

  12. Fully Automatic Myocardial Segmentation of Contrast Echocardiography Sequence Using Random Forests Guided by Shape Model

    Authors: Yuanwei Li, Chin Pang Ho, Matthieu Toulemonde, Navtej Chahal, Roxy Senior, Meng-Xing Tang

    Abstract: Myocardial contrast echocardiography (MCE) is an imaging technique that assesses left ventricle function and myocardial perfusion for the detection of coronary artery diseases. Automatic MCE perfusion quantification is challenging and requires accurate segmentation of the myocardium from noisy and time-varying images. Random forests (RF) have been successfully applied to many medical image segment… ▽ More

    Submitted 19 June, 2018; originally announced June 2018.

    Comments: 11 pages, 9 figures, published in TMI

  13. Myocardial Segmentation of Contrast Echocardiograms Using Random Forests Guided by Shape Model

    Authors: Yuanwei Li, Chin Pang Ho, Navtej Chahal, Roxy Senior, Meng-Xing Tang

    Abstract: Myocardial Contrast Echocardiography (MCE) with micro-bubble contrast agent enables myocardial perfusion quantification which is invaluable for the early detection of coronary artery diseases. In this paper, we proposed a new segmentation method called Shape Model guided Random Forests (SMRF) for the analysis of MCE data. The proposed method utilizes a statistical shape model of the myocardium to… ▽ More

    Submitted 19 June, 2018; originally announced June 2018.

    Comments: 8 pages, 2 figures, accepted for MICCAI 2016

  14. A Novel Approach for Network Attack Classification Based on Sequential Questions

    Authors: Md Mehedi Hassan Onik, Nasr Al-Zaben, Hung Phan Hoo, Chul-Soo Kim

    Abstract: With the development of incipient technologies, user devices becoming more exposed and ill-used by foes. In upcoming decades, traditional security measures will not be sufficient enough to handle this huge threat towards distributed hardware and software. Lack of standard network attack taxonomy has become an indispensable dispute on develo** a clear understanding about the attacks in order to h… ▽ More

    Submitted 1 April, 2018; originally announced April 2018.

    Journal ref: Annals of Emerging Technologies in Computing (AETiC), Print ISSN: 2516-0281, Online ISSN: 2516029X, Print ISSN: 2516-0281, Online ISSN: 2516029X, pp. 1-14, Vol. 2, No. 2, 1st April 2018. http://www.aetic.theiaer.org/archive/v2n2/p1.html

  15. arXiv:1709.00655  [pdf, ps, other

    cs.IT

    Distortion Minimization for Relay Assisted Wireless Multicast

    Authors: Z. Chen, P. Ho, L. Peng

    Abstract: The paper studies the scenario of wireless multicast with a single transmitter and a relay that deliver scalable source symbols to the receivers in a decode-and-forward (DF) fashion. With the end-to-end mean square error distortion (EED) as performance metric, we firstly derive the EED expression for the $L$-resolution scalable source symbol for any receiver. An optimization problem in minimizing… ▽ More

    Submitted 2 September, 2017; originally announced September 2017.

    Comments: 11 pages, 6 figures

  16. arXiv:1512.03985  [pdf, ps, other

    cs.IT

    Joint Power Minimization Over Multi-Carrier Two-Way Relay Networks

    Authors: Zhi Chen, Pin-Han Ho, Li Mei Peng

    Abstract: The study considers a three-node, two-way relaying network (TWRN) over a multi-carrier system, aiming to minimize the total power consumption of all the transmit and receiver activities. By employing digital network coding (DNC) and physical-layer network coding (PNC), respectively, as well as a novel hybrid PNC/DNC switching scheme, the total transmission power of the considered multi-carrier TWR… ▽ More

    Submitted 2 September, 2017; v1 submitted 12 December, 2015; originally announced December 2015.

    Comments: 8 figures, 25 pages

  17. arXiv:1512.03982  [pdf, ps, other

    cs.IT

    QoS Guaranteed Energy Minimization Over Two-Way Relaying Networks

    Authors: Zhi Chen, Pin-Han Ho

    Abstract: In this work, we consider a typical three-node, two-way relaying network (TWRN) over fading channels. The aim is to minimize the entire system energy usage for a TWRN in the long run, while satisfying the required average symmetric exchange rate between the two source nodes. To this end, the energy usage of the physical-layer network coding (PNC) or the superposition coding based digital network c… ▽ More

    Submitted 15 November, 2016; v1 submitted 12 December, 2015; originally announced December 2015.

    Comments: 12 pages, 3 figures