Skip to main content

Showing 1–50 of 125 results for author: Hong, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.16125  [pdf, other

    cs.CR cs.AI

    CBPF: Filtering Poisoned Data Based on Composite Backdoor Attack

    Authors: Hanfeng Xia, Haibo Hong, Ruili Wang

    Abstract: Backdoor attacks involve the injection of a limited quantity of poisoned examples containing triggers into the training dataset. During the inference stage, backdoor attacks can uphold a high level of accuracy for normal examples, yet when presented with trigger-containing instances, the model may erroneously predict them as the targeted class designated by the attacker. This paper explores strate… ▽ More

    Submitted 23 June, 2024; originally announced June 2024.

  2. arXiv:2406.10520  [pdf, ps, other

    cs.CV eess.IV eess.SP

    Full reference point cloud quality assessment using support vector regression

    Authors: Ryosuke Watanabe, Shashank N. Sridhara, Haoran Hong, Eduardo Pavez, Keisuke Nonaka, Tatsuya Kobayashi, Antonio Ortega

    Abstract: Point clouds are a general format for representing realistic 3D objects in diverse 3D applications. Since point clouds have large data sizes, develo** efficient point cloud compression methods is crucial. However, excessive compression leads to various distortions, which deteriorates the point cloud quality perceived by end users. Thus, establishing reliable point cloud quality assessment (PCQA)… ▽ More

    Submitted 15 June, 2024; originally announced June 2024.

    Comments: Source code: https://github.com/STAC-USC/FRSVR-PCQA

  3. arXiv:2406.06822  [pdf, other

    cs.CR cs.AI cs.SE

    An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection

    Authors: Shenao Yan, Shen Wang, Yue Duan, Hanbin Hong, Kiho Lee, Doowon Kim, Yuan Hong

    Abstract: Large Language Models (LLMs) have transformed code completion tasks, providing context-based suggestions to boost developer productivity in software engineering. As users often fine-tune these models for specific applications, poisoning and backdoor attacks can covertly alter the model outputs. To address this critical security challenge, we introduce CodeBreaker, a pioneering LLM-assisted backdoo… ▽ More

    Submitted 10 June, 2024; originally announced June 2024.

    Comments: To appear in USENIX Security '24

  4. arXiv:2406.02208  [pdf, other

    cs.CV cs.AI cs.CL

    Why Only Text: Empowering Vision-and-Language Navigation with Multi-modal Prompts

    Authors: Haodong Hong, Sen Wang, Zi Huang, Qi Wu, Jiajun Liu

    Abstract: Current Vision-and-Language Navigation (VLN) tasks mainly employ textual instructions to guide agents. However, being inherently abstract, the same textual instruction can be associated with different visual signals, causing severe ambiguity and limiting the transfer of prior knowledge in the vision domain from the user to the agent. To fill this gap, we propose Vision-and-Language Navigation with… ▽ More

    Submitted 4 June, 2024; originally announced June 2024.

    Comments: IJCAI 2024

  5. arXiv:2405.20650  [pdf, other

    cs.CV

    GenMix: Combining Generative and Mixture Data Augmentation for Medical Image Classification

    Authors: Hansang Lee, Haeil Lee, Helen Hong

    Abstract: In this paper, we propose a novel data augmentation technique called GenMix, which combines generative and mixture approaches to leverage the strengths of both methods. While generative models excel at creating new data patterns, they face challenges such as mode collapse in GANs and difficulties in training diffusion models, especially with limited medical imaging data. On the other hand, mixture… ▽ More

    Submitted 31 May, 2024; originally announced May 2024.

  6. arXiv:2405.19691  [pdf, other

    cs.HC

    Designing Prompt Analytics Dashboards to Analyze Student-ChatGPT Interactions in EFL Writing

    Authors: Minsun Kim, SeonGyeom Kim, Suyoun Lee, Yoosang Yoon, Junho Myung, Haneul Yoo, Hyungseung Lim, Jieun Han, Yoonsu Kim, So-Yeon Ahn, Juho Kim, Alice Oh, Hwajung Hong, Tak Yeon Lee

    Abstract: While ChatGPT has significantly impacted education by offering personalized resources for students, its integration into educational settings poses unprecedented risks, such as inaccuracies and biases in AI-generated content, plagiarism and over-reliance on AI, and privacy and security issues. To help teachers address such risks, we conducted a two-phase iterative design process that comprises sur… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

  7. arXiv:2405.16036  [pdf, other

    cs.LG cs.CR cs.CV

    Certifying Adapters: Enabling and Enhancing the Certification of Classifier Adversarial Robustness

    Authors: Jieren Deng, Hanbin Hong, Aaron Palmer, Xin Zhou, **bo Bi, Kaleel Mahmood, Yuan Hong, Derek Aguiar

    Abstract: Randomized smoothing has become a leading method for achieving certified robustness in deep classifiers against l_{p}-norm adversarial perturbations. Current approaches for achieving certified robustness, such as data augmentation with Gaussian noise and adversarial training, require expensive training procedures that tune large models for different Gaussian noise levels and thus cannot leverage h… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

  8. arXiv:2405.15252  [pdf, other

    cs.LG

    Fast 3D Molecule Generation via Unified Geometric Optimal Transport

    Authors: Haokai Hong, Wanyu Lin, Kay Chen Tan

    Abstract: This paper proposes a new 3D molecule generation framework, called GOAT, for fast and effective 3D molecule generation based on the flow-matching optimal transport objective. Specifically, we formulate a geometric transport formula for measuring the cost of map** multi-modal features (e.g., continuous atom coordinates and categorical atom types) between a base distribution and a target data dist… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

  9. arXiv:2405.05079  [pdf, other

    cs.CV

    Power Variable Projection for Initialization-Free Large-Scale Bundle Adjustment

    Authors: Simon Weber, Je Hyeong Hong, Daniel Cremers

    Abstract: Initialization-free bundle adjustment (BA) remains largely uncharted. While Levenberg-Marquardt algorithm is the golden method to solve the BA problem, it generally relies on a good initialization. In contrast, the under-explored Variable Projection algorithm (VarPro) exhibits a wide convergence basin even without initialization. Coupled with object space error formulation, recent works have shown… ▽ More

    Submitted 9 May, 2024; v1 submitted 8 May, 2024; originally announced May 2024.

  10. arXiv:2404.00962  [pdf, other

    cs.LG physics.chem-ph q-bio.BM

    Diffusion-Driven Domain Adaptation for Generating 3D Molecules

    Authors: Haokai Hong, Wanyu Lin, Kay Chen Tan

    Abstract: Can we train a molecule generator that can generate 3D molecules from a new domain, circumventing the need to collect data? This problem can be cast as the problem of domain adaptive molecule generation. This work presents a novel and principled diffusion-based approach, called GADM, that allows shifting a generative model to desired new domains without the need to collect even a single molecule.… ▽ More

    Submitted 1 April, 2024; originally announced April 2024.

    Comments: 11 pages, 3 figures, and 3 tables

  11. arXiv:2402.15061  [pdf, other

    cs.CL cs.LG

    Fine-tuning Large Language Models for Domain-specific Machine Translation

    Authors: Jiawei Zheng, Hanghai Hong, Xiaoli Wang, **gsong Su, Yonggui Liang, Shikai Wu

    Abstract: Large language models (LLMs) have made significant progress in machine translation (MT). However, their potential in domain-specific MT remains under-explored. Current LLM-based MT systems still face several challenges. First, for LLMs with in-context learning, their effectiveness is highly sensitive to input translation examples, and processing them can increase inference costs. They often requir… ▽ More

    Submitted 22 February, 2024; originally announced February 2024.

    Comments: 9 pages, 6 figures, 6tables

  12. arXiv:2401.17736  [pdf, other

    cs.CV

    Leveraging Human-Machine Interactions for Computer Vision Dataset Quality Enhancement

    Authors: Esla Timothy Anzaku, Hyesoo Hong, **-Woo Park, Wonjun Yang, Kangmin Kim, JongBum Won, Deshika Vinoshani Kumari Herath, Arnout Van Messem, Wesley De Neve

    Abstract: Large-scale datasets for single-label multi-class classification, such as \emph{ImageNet-1k}, have been instrumental in advancing deep learning and computer vision. However, a critical and often understudied aspect is the comprehensive quality assessment of these datasets, especially regarding potential multi-label annotation errors. In this paper, we introduce a lightweight, user-friendly, and sc… ▽ More

    Submitted 31 January, 2024; originally announced January 2024.

  13. Improving Angular Speed Uniformity by Piecewise Radical Reparameterization

    Authors: Hoon Hong, Dongming Wang, **g Yang

    Abstract: For a rational parameterization of a curve, it is desirable that its angular speed is as uniform as possible. Hence, given a rational parameterization, one wants to find re-parameterization with better uniformity. One natural way is to use piecewise rational reparameterization. However, it turns out that the piecewise rational reparameterization does not help when the angular speed of the given ra… ▽ More

    Submitted 22 January, 2024; originally announced January 2024.

    Comments: In Proceedings ADG 2023, arXiv:2401.10725

    ACM Class: I.3.3; I.3.5

    Journal ref: EPTCS 398, 2024, pp. 165-178

  14. arXiv:2401.00866  [pdf, ps, other

    math.AG cs.SC

    Conditions for eigenvalue configurations of two real symmetric matrices: a signature approach

    Authors: Hoon Hong, Daniel Profili, J. Rafael Sendra

    Abstract: For two real symmetric matrices, their eigenvalue configuration is the arrangement of their eigenvalues on the real line. In this paper, we provide quantifier-free necessary and sufficient conditions for two symmetric matrices to realize a given eigenvalue configuration. The basic idea is to generate a set of polynomials in the entries of the two matrices whose roots can be counted to uniquely det… ▽ More

    Submitted 10 May, 2024; v1 submitted 29 December, 2023; originally announced January 2024.

    Comments: arXiv admin note: substantial text overlap with arXiv:2401.00089

  15. arXiv:2401.00408  [pdf, ps, other

    cs.SC

    Computing greatest common divisor of several parametric univariate polynomials via generalized subresultant polynomials

    Authors: Hoon Hong, **g Yang

    Abstract: In this paper, we tackle the following problem: compute the gcd for several univariate polynomials with parametric coefficients. It amounts to partitioning the parameter space into ``cells'' so that the gcd has a uniform expression over each cell and constructing a uniform expression of gcd in each cell. We tackle the problem as follows. We begin by making a natural and obvious extension of subres… ▽ More

    Submitted 31 December, 2023; originally announced January 2024.

  16. arXiv:2401.00089  [pdf, ps, other

    math.AG cs.SC

    Conditions for eigenvalue configurations of two real symmetric matrices: a symmetric function approach

    Authors: Hoon Hong, Daniel Profili, J. Rafael Sendra

    Abstract: For two real symmetric matrices, their eigenvalue configuration is the arrangement of their eigenvalues on the real line. We study the problem of determining a quantifier-free necessary and sufficient condition for two real symmetric matrices to realize a given eigenvalue configuration as a generalization of Descartes' rule of signs. We exploit the combinatorial properties of our definition for ei… ▽ More

    Submitted 10 May, 2024; v1 submitted 29 December, 2023; originally announced January 2024.

  17. arXiv:2312.16145  [pdf, other

    cs.CV cs.AI cs.LG

    One-Dimensional Adapter to Rule Them All: Concepts, Diffusion Models and Erasing Applications

    Authors: Mengyao Lyu, Yuhong Yang, Haiwen Hong, Hui Chen, Xuan **, Yuan He, Hui Xue, Jungong Han, Guiguang Ding

    Abstract: The prevalent use of commercial and open-source diffusion models (DMs) for text-to-image generation prompts risk mitigation to prevent undesired behaviors. Existing concept erasing methods in academia are all based on full parameter or specification-based fine-tuning, from which we observe the following issues: 1) Generation alternation towards erosion: Parameter drift during target elimination ca… ▽ More

    Submitted 11 March, 2024; v1 submitted 26 December, 2023; originally announced December 2023.

    Comments: CVPR 2024

  18. arXiv:2312.13891  [pdf, other

    cs.RO

    A Summarized History-based Dialogue System for Amnesia-Free Prompt Updates

    Authors: Hye** Hong, Hibiki Kawano, Takuto Maekawa, Naoki Yoshimaru, Takamasa Iio, Kenji Hatano

    Abstract: In today's society, information overload presents challenges in providing optimal recommendations. Consequently, the importance of dialogue systems that can discern and provide the necessary information through dialogue is increasingly recognized. However, some concerns existing dialogue systems rely on pre-trained models and need help to cope with real-time or insufficient information. To address… ▽ More

    Submitted 21 December, 2023; originally announced December 2023.

    Comments: This paper is part of the proceedings of the Dialogue Robot Competition 2023

  19. arXiv:2312.12488  [pdf, other

    cs.LG cs.CR cs.CV

    Foreseeing Reconstruction Quality of Gradient Inversion: An Optimization Perspective

    Authors: HyeongGwon Hong, Yooshin Cho, Hanbyel Cho, Jaesung Ahn, Junmo Kim

    Abstract: Gradient inversion attacks can leak data privacy when clients share weight updates with the server in federated learning (FL). Existing studies mainly use L2 or cosine distance as the loss function for gradient matching in the attack. Our empirical investigation shows that the vulnerability ranking varies with the loss function used. Gradient norm, which is commonly used as a vulnerability proxy f… ▽ More

    Submitted 19 December, 2023; originally announced December 2023.

    Comments: To appear in AAAI 2024

  20. arXiv:2312.06125  [pdf, other

    cs.NE

    Pre-Evolved Model for Complex Multi-objective Optimization Problems

    Authors: Haokai Hong, Min Jiang

    Abstract: Multi-objective optimization problems (MOPs) necessitate the simultaneous optimization of multiple objectives. Numerous studies have demonstrated that evolutionary computation is a promising paradigm for solving complex MOPs, which involve optimization problems with large-scale decision variables, many objectives, and expensive evaluation functions. However, existing multi-objective evolutionary a… ▽ More

    Submitted 20 February, 2024; v1 submitted 11 December, 2023; originally announced December 2023.

    Comments: 9 pages, 2 figures, 4 tables

  21. arXiv:2312.04775  [pdf, other

    cs.CL

    How to Determine the Most Powerful Pre-trained Language Model without Brute Force Fine-tuning? An Empirical Survey

    Authors: Jun Bai, Xiaofeng Zhang, Chen Li, Hanhua Hong, Xi Xu, Chenghua Lin, Wenge Rong

    Abstract: Transferability estimation has been attached to great attention in the computer vision fields. Researchers try to estimate with low computational cost the performance of a model when transferred from a source task to a given target task. Considering the effectiveness of such estimations, the communities of natural language processing also began to study similar problems for the selection of pre-tr… ▽ More

    Submitted 7 December, 2023; originally announced December 2023.

    Comments: Accepted by Findings of EMNLP 2023

  22. arXiv:2311.00994  [pdf, other

    cs.CV cs.GR

    LaughTalk: Expressive 3D Talking Head Generation with Laughter

    Authors: Kim Sung-Bin, Lee Hyun, Da Hye Hong, Suekyeong Nam, Janghoon Ju, Tae-Hyun Oh

    Abstract: Laughter is a unique expression, essential to affirmative social interactions of humans. Although current 3D talking head generation methods produce convincing verbal articulations, they often fail to capture the vitality and subtleties of laughter and smiles despite their importance in social context. In this paper, we introduce a novel task to generate 3D talking heads capable of both articulate… ▽ More

    Submitted 2 November, 2023; originally announced November 2023.

    Comments: Accepted to WACV2024

  23. arXiv:2310.15566  [pdf, other

    cs.IT eess.SP

    RIS-Aided Receive Generalized Spatial Modulation Design with Reflecting Modulation

    Authors: Xinghao Guo, Yin Xu, Hanjiang Hong, De Mi, Ruiqi Liu, Dazhi He, Wenjun Zhang, Yi-yan Wu

    Abstract: Spatial modulation (SM) transmits additional information bits by the selection of antennas. Generalized spatial modulation (GSM), as an advanced type of SM, can be divided into diversity and multiplexing (MUX) schemes according to the symbols carried on the selected antennas are identical or different. Recently, reconfigurable intelligent surface (RIS) assisted SM exhibits better reception perform… ▽ More

    Submitted 15 April, 2024; v1 submitted 24 October, 2023; originally announced October 2023.

    Comments: 6 pages, submitted to Conference

  24. arXiv:2310.15565  [pdf, other

    cs.IT eess.SP

    Capacity-based Spatial Modulation Constellation and Pre-scaling Design

    Authors: Xinghao Guo, Hanjiang Hong, Yin Xu, Yi-yan Wu, Dazhi He, Wenjun Zhang

    Abstract: Spatial Modulation (SM) can utilize the index of the transmit antenna (TA) to transmit additional information. In this paper, to improve the performance of SM, a non-uniform constellation (NUC) and pre-scaling coefficients optimization design scheme is proposed. The bit-interleaved coded modulation (BICM) capacity calculation formula of SM system is firstly derived. The constellation and pre-scali… ▽ More

    Submitted 24 October, 2023; originally announced October 2023.

    Comments: 6 pages,conference

  25. arXiv:2310.07682  [pdf

    cs.CV

    Prediction of MET Overexpression in Non-Small Cell Lung Adenocarcinomas from Hematoxylin and Eosin Images

    Authors: Kshitij Ingale, Sun Hae Hong, Josh S. K. Bell, Abbas Rizvi, Amy Welch, Lingdao Sha, Irvin Ho, Kunal Nagpal, Aicha BenTaieb, Rohan P Joshi, Martin C Stumpe

    Abstract: MET protein overexpression is a targetable event in non-small cell lung cancer (NSCLC) and is the subject of active drug development. Challenges in identifying patients for these therapies include lack of access to validated testing, such as standardized immunohistochemistry (IHC) assessment, and consumption of valuable tissue for a single gene/protein assay. Development of pre-screening algorithm… ▽ More

    Submitted 12 October, 2023; v1 submitted 11 October, 2023; originally announced October 2023.

  26. arXiv:2310.07149  [pdf, other

    cs.CV

    Robust Unsupervised Domain Adaptation by Retaining Confident Entropy via Edge Concatenation

    Authors: Hye-Seong Hong, Abhishek Kumar, Dong-Gyu Lee

    Abstract: The generalization capability of unsupervised domain adaptation can mitigate the need for extensive pixel-level annotations to train semantic segmentation networks by training models on synthetic data as a source with computer-generated annotations. Entropy-based adversarial networks are proposed to improve source domain prediction; however, they disregard significant external information, such as… ▽ More

    Submitted 10 October, 2023; originally announced October 2023.

  27. arXiv:2310.05231  [pdf, other

    cs.HC cs.AI cs.CL

    MindfulDiary: Harnessing Large Language Model to Support Psychiatric Patients' Journaling

    Authors: Taewan Kim, Seolyeong Bae, Hyun Ah Kim, Su-woo Lee, Hwajung Hong, Chanmo Yang, Young-Ho Kim

    Abstract: In the mental health domain, Large Language Models (LLMs) offer promising new opportunities, though their inherent complexity and low controllability have raised questions about their suitability in clinical settings. We present MindfulDiary, a mobile journaling app incorporating an LLM to help psychiatric patients document daily experiences through conversation. Designed in collaboration with men… ▽ More

    Submitted 22 February, 2024; v1 submitted 8 October, 2023; originally announced October 2023.

    Comments: 20 pages, 6 figures, 4 tables. Accepted at ACM CHI 2024

    ACM Class: H.5.2; I.2.7

    Journal ref: In Proceedings of the CHI Conference on Human Factors in Computing Systems (CHI '24), May 11-16, 2024, Honolulu, HI, USA. ACM, New York, NY, USA

  28. arXiv:2310.05191  [pdf, other

    cs.CL

    FABRIC: Automated Scoring and Feedback Generation for Essays

    Authors: Jieun Han, Haneul Yoo, Junho Myung, Minsun Kim, Hyunseung Lim, Yoonsu Kim, Tak Yeon Lee, Hwajung Hong, Juho Kim, So-Yeon Ahn, Alice Oh

    Abstract: Automated essay scoring (AES) provides a useful tool for students and instructors in writing classes by generating essay scores in real-time. However, previous AES models do not provide more specific rubric-based scores nor feedback on how to improve the essays, which can be even more important than the overall scores for learning. We present FABRIC, a pipeline to help students and instructors in… ▽ More

    Submitted 8 October, 2023; originally announced October 2023.

  29. arXiv:2309.06902  [pdf, other

    cs.CV

    CCSPNet-Joint: Efficient Joint Training Method for Traffic Sign Detection Under Extreme Conditions

    Authors: Haoqin Hong, Yue Zhou, Xiangyu Shu, Xiaofang Hu

    Abstract: Traffic sign detection is an important research direction in intelligent driving. Unfortunately, existing methods often overlook extreme conditions such as fog, rain, and motion blur. Moreover, the end-to-end training strategy for image denoising and object detection models fails to utilize inter-model information effectively. To address these issues, we propose CCSPNet, an efficient feature extra… ▽ More

    Submitted 3 February, 2024; v1 submitted 13 September, 2023; originally announced September 2023.

  30. arXiv:2308.09971  [pdf, other

    cs.LG cs.AI cs.CV

    Disposable Transfer Learning for Selective Source Task Unlearning

    Authors: Seunghee Koh, Hyounguk Shon, Janghyeon Lee, Hyeong Gwon Hong, Junmo Kim

    Abstract: Transfer learning is widely used for training deep neural networks (DNN) for building a powerful representation. Even after the pre-trained model is adapted for the target task, the representation performance of the feature extractor is retained to some extent. As the performance of the pre-trained model can be considered the private property of the owner, it is natural to seek the exclusive right… ▽ More

    Submitted 19 August, 2023; originally announced August 2023.

    Comments: Accepted to ICCV 2023

  31. arXiv:2308.04212  [pdf, other

    stat.ML cs.LG stat.ME

    Varying-coefficients for regional quantile via KNN-based LASSO with applications to health outcome study

    Authors: Seyoung Park, Eun Ryung Lee, Hyokyoung G. Hong

    Abstract: Health outcomes, such as body mass index and cholesterol levels, are known to be dependent on age and exhibit varying effects with their associated risk factors. In this paper, we propose a novel framework for dynamic modeling of the associations between health outcomes and risk factors using varying-coefficients (VC) regional quantile regression via K-nearest neighbors (KNN) fused Lasso, which ca… ▽ More

    Submitted 8 August, 2023; originally announced August 2023.

  32. Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks

    Authors: Xinyu Zhang, Hanbin Hong, Yuan Hong, Peng Huang, Binghui Wang, Zhongjie Ba, Kui Ren

    Abstract: The language models, especially the basic text classification models, have been shown to be susceptible to textual adversarial attacks such as synonym substitution and word insertion attacks. To defend against such attacks, a growing body of research has been devoted to improving the model robustness. However, providing provable robustness guarantees instead of empirical robustness is still widely… ▽ More

    Submitted 11 June, 2024; v1 submitted 31 July, 2023; originally announced July 2023.

    Comments: Published in the 2024 IEEE Symposium on Security and Privacy (SP)

  33. arXiv:2306.11689  [pdf, other

    econ.EM cs.AI stat.ME stat.ML

    Statistical Tests for Replacing Human Decision Makers with Algorithms

    Authors: Kai Feng, Han Hong, Ke Tang, **gyuan Wang

    Abstract: This paper proposes a statistical framework with which artificial intelligence can improve human decision making. The performance of each human decision maker is first benchmarked against machine predictions; we then replace the decisions made by a subset of the decision makers with the recommendation from the proposed artificial intelligence algorithm. Using a large nationwide dataset of pregnanc… ▽ More

    Submitted 20 June, 2023; originally announced June 2023.

    Comments: 65 pages, 19 figures

  34. arXiv:2306.06246  [pdf, other

    cs.CL

    Record Deduplication for Entity Distribution Modeling in ASR Transcripts

    Authors: Tianyu Huang, Chung Hoon Hong, Carl Wivagg, Kanna Shimizu

    Abstract: Voice digital assistants must keep up with trending search queries. We rely on a speech recognition model using contextual biasing with a rapidly updated set of entities, instead of frequent model retraining, to keep up with trends. There are several challenges with this approach: (1) the entity set must be frequently reconstructed, (2) the entity set is of limited size due to latency and accuracy… ▽ More

    Submitted 9 June, 2023; originally announced June 2023.

  35. Towards Visualization Thumbnail Designs that Entice Reading Data-driven Articles

    Authors: Hwiyeon Kim, Joohee Kim, Yunha Han, Hwajung Hong, Oh-Sang Kwon, Young-Woo Park, Niklas Elmqvist, Sungahn Ko, Bum Chul Kwon

    Abstract: As online news increasingly include data journalism, there is a corresponding increase in the incorporation of visualization in article thumbnail images. However, little research exists on the design rationale for visualization thumbnails, such as resizing, crop**, simplifying, and embellishing charts that appear within the body of the associated article. Therefore, in this paper we aim to under… ▽ More

    Submitted 26 May, 2023; originally announced May 2023.

    Comments: To appear in IEEE Transactions on Visualization and Computer Graphics, 16 pages, 6 figures, 5 tables. arXiv admin note: text overlap with arXiv:1908.06922

  36. arXiv:2305.12824  [pdf, other

    eess.SP cs.AR

    FieldHAR: A Fully Integrated End-to-end RTL Framework for Human Activity Recognition with Neural Networks from Heterogeneous Sensors

    Authors: Mengxi Liu, Bo Zhou, Zimin Zhao, Hyeonseok Hong, Hyun Kim, Sungho Suh, Vitor Fortes Rey, Paul Lukowicz

    Abstract: In this work, we propose an open-source scalable end-to-end RTL framework FieldHAR, for complex human activity recognition (HAR) from heterogeneous sensors using artificial neural networks (ANN) optimized for FPGA or ASIC integration. FieldHAR aims to address the lack of apparatus to transform complex HAR methodologies often limited to offline evaluation to efficient run-time edge applications. Th… ▽ More

    Submitted 22 May, 2023; originally announced May 2023.

    Comments: This work has been accepted by 2023 ASAP conference. Copyright may be transferred without notice, after which this version may no longer be accessible

  37. RECIPE: How to Integrate ChatGPT into EFL Writing Education

    Authors: Jieun Han, Haneul Yoo, Yoonsu Kim, Junho Myung, Minsun Kim, Hyunseung Lim, Juho Kim, Tak Yeon Lee, Hwajung Hong, So-Yeon Ahn, Alice Oh

    Abstract: The integration of generative AI in the field of education is actively being explored. In particular, ChatGPT has garnered significant interest, offering an opportunity to examine its effectiveness in English as a foreign language (EFL) education. To address this need, we present a novel learning platform called RECIPE (Revising an Essay with ChatGPT on an Interactive Platform for EFL learners). O… ▽ More

    Submitted 19 May, 2023; originally announced May 2023.

  38. arXiv:2305.08029  [pdf, other

    cs.SD cs.AI eess.AS

    REMAST: Real-time Emotion-based Music Arrangement with Soft Transition

    Authors: Zihao Wang, Le Ma, Chen Zhang, Bo Han, Yunfei Xu, Yikai Wang, Xinyi Chen, HaoRong Hong, Wenbo Liu, Xinda Wu, Kejun Zhang

    Abstract: Music as an emotional intervention medium has important applications in scenarios such as music therapy, games, and movies. However, music needs real-time arrangement according to changing emotions, bringing challenges to balance emotion real-time fit and soft emotion transition due to the fine-grained and mutable nature of the target emotion. Existing studies mainly focus on achieving emotion rea… ▽ More

    Submitted 5 February, 2024; v1 submitted 13 May, 2023; originally announced May 2023.

    ACM Class: H.5.5; F.2.2

  39. arXiv:2305.01905  [pdf, other

    cs.CV

    Localization using Multi-Focal Spatial Attention for Masked Face Recognition

    Authors: Yooshin Cho, Hanbyel Cho, Hyeong Gwon Hong, Jaesung Ahn, Dongmin Cho, JungWoo Chang, Junmo Kim

    Abstract: Since the beginning of world-wide COVID-19 pandemic, facial masks have been recommended to limit the spread of the disease. However, these masks hide certain facial attributes. Hence, it has become difficult for existing face recognition systems to perform identity verification on masked faces. In this context, it is necessary to develop masked Face Recognition (MFR) for contactless biometric reco… ▽ More

    Submitted 7 September, 2023; v1 submitted 3 May, 2023; originally announced May 2023.

    Comments: Accepted at FG 2023 - InterID Workshop

  40. arXiv:2304.04343  [pdf, other

    cs.LG cs.CR

    Certifiable Black-Box Attack: Ensuring Provably Successful Attack for Adversarial Examples

    Authors: Hanbin Hong, Yuan Hong

    Abstract: Black-box adversarial attacks have shown strong potential to subvert machine learning models. Existing black-box adversarial attacks craft the adversarial examples by iteratively querying the target model and/or leveraging the transferability of a local surrogate model. Whether such attack can succeed remains unknown to the adversary when empirically designing the attack. In this paper, to our bes… ▽ More

    Submitted 9 April, 2023; originally announced April 2023.

  41. arXiv:2304.04071  [pdf, other

    cs.NE cs.AI

    Improving Performance Insensitivity of Large-scale Multiobjective Optimization via Monte Carlo Tree Search

    Authors: Haokai Hong, Min Jiang, Gary G. Yen

    Abstract: The large-scale multiobjective optimization problem (LSMOP) is characterized by simultaneously optimizing multiple conflicting objectives and involving hundreds of decision variables. Many real-world applications in engineering fields can be modeled as LSMOPs; simultaneously, engineering applications require insensitivity in performance. This requirement usually means that the results from the alg… ▽ More

    Submitted 14 April, 2023; v1 submitted 8 April, 2023; originally announced April 2023.

    Comments: 12 pages, 11 figures

  42. arXiv:2304.04067  [pdf, other

    cs.NE cs.AI

    Efficiently Tackling Million-Dimensional Multiobjective Problems: A Direction Sampling and Fine-Tuning Approach

    Authors: Haokai Hong, Min Jiang, Qiuzhen Lin, Kay Chen Tan

    Abstract: We define very large-scale multiobjective optimization problems as optimizing multiple objectives (VLSMOPs) with more than 100,000 decision variables. These problems hold substantial significance, given the ubiquity of real-world scenarios necessitating the optimization of hundreds of thousands, if not millions, of variables. However, the larger dimension in VLSMOPs intensifies the curse of dimens… ▽ More

    Submitted 7 April, 2024; v1 submitted 8 April, 2023; originally announced April 2023.

    Comments: 12 pages, 6 figures

  43. arXiv:2303.02159  [pdf, ps, other

    cs.MS cs.SC math.DS q-bio.QM

    Robust Parameter Estimation for Rational Ordinary Differential Equations

    Authors: Oren Bassik, Yosef Berman, Soo Go, Hoon Hong, Ilia Ilmer, Alexey Ovchinnikov, Chris Rackauckas, Pedro Soto, Chee Yap

    Abstract: We present a new approach for estimating parameters in rational ODE models from given (measured) time series data. In typical existing approaches, an initial guess for the parameter values is made from a given search interval. Then, in a loop, the corresponding outputs are computed by solving the ODE numerically, followed by computing the error from the given time series data. If the error is sm… ▽ More

    Submitted 17 December, 2023; v1 submitted 2 March, 2023; originally announced March 2023.

    Comments: Updates regarding robustness

  44. PDIWS: Thermal Imaging Dataset for Person Detection in Intrusion Warning Systems

    Authors: Nguyen Duc Thuan, Le Hai Anh, Hoang Si Hong

    Abstract: In this paper, we present a synthetic thermal imaging dataset for Person Detection in Intrusion Warning Systems (PDIWS). The dataset consists of a training set with 2000 images and a test set with 500 images. Each image is synthesized by compounding a subject (intruder) with a background using the modified Poisson image editing method. There are a total of 50 different backgrounds and nearly 1000… ▽ More

    Submitted 2 October, 2023; v1 submitted 26 February, 2023; originally announced February 2023.

    Comments: We are considering some issues in the paper

  45. arXiv:2302.12533   

    cs.LG cs.AI eess.SP

    HUST bearing: a practical dataset for ball bearing fault diagnosis

    Authors: Nguyen Duc Thuan, Hoang Si Hong

    Abstract: In this work, we introduce a practical dataset named HUST bearing, that provides a large set of vibration data on different ball bearings. This dataset contains 90 raw vibration data of 6 types of defects (inner crack, outer crack, ball crack, and their 2-combinations) on 5 types of bearing at 3 working conditions with the sample rate of 51,200 samples per second. We established the envelope analy… ▽ More

    Submitted 2 October, 2023; v1 submitted 24 February, 2023; originally announced February 2023.

    Comments: We are considering some issues in the paper

  46. arXiv:2302.11426  [pdf, other

    cs.DB cs.IR

    Mining compact high utility sequential patterns

    Authors: Tai Dinh, Philippe Fournier-Viger, Huynh Van Hong

    Abstract: High utility sequential pattern mining (HUSPM) aims to mine all patterns that yield a high utility (profit) in a sequence dataset. HUSPM is useful for several applications such as market basket analysis, marketing, and website clickstream analysis. In these applications, users may also consider high utility patterns frequently appearing in the dataset to obtain more fruitful information. However,… ▽ More

    Submitted 22 February, 2023; originally announced February 2023.

    Comments: Nippon (Japan) Applied Informatics Society Journal

  47. arXiv:2301.00315  [pdf, ps, other

    cs.SC math.AC

    Parametric "Non-nested" Discriminants for Multiplicities of Univariate Polynomials

    Authors: Hoon Hong, **g Yang

    Abstract: We consider the problem of complex root classification, i.e., finding the conditions on the coefficients of a univariate polynomial for all possible multiplicity structures on its complex roots. It is well known that such conditions can be written as conjunctions of several polynomial equations and one inequation in the coefficients. Those polynomials in the coefficients are called discriminants f… ▽ More

    Submitted 22 April, 2023; v1 submitted 31 December, 2022; originally announced January 2023.

    MSC Class: 12D10; 68W30

  48. Noisy Label Classification using Label Noise Selection with Test-Time Augmentation Cross-Entropy and NoiseMix Learning

    Authors: Hansang Lee, Haeil Lee, Helen Hong, Junmo Kim

    Abstract: As the size of the dataset used in deep learning tasks increases, the noisy label problem, which is a task of making deep learning robust to the incorrectly labeled data, has become an important task. In this paper, we propose a method of learning noisy label data using the label noise selection with test-time augmentation (TTA) cross-entropy and classifier learning with the NoiseMix method. In th… ▽ More

    Submitted 1 December, 2022; originally announced December 2022.

    Comments: Accepted at the 2nd MICCAI workshop on Data Augmentation, Labeling, and Imperfections (DALI @ MICCAI 2022)

  49. arXiv:2212.00214  [pdf, other

    cs.CV cs.AI

    Test-Time Mixup Augmentation for Data and Class-Specific Uncertainty Estimation in Deep Learning Image Classification

    Authors: Hansang Lee, Haeil Lee, Helen Hong, Junmo Kim

    Abstract: Uncertainty estimation of trained deep learning networks is valuable for optimizing learning efficiency and evaluating the reliability of network predictions. In this paper, we propose a method for estimating uncertainty in deep learning image classification using test-time mixup augmentation (TTMA). To improve the ability to distinguish correct and incorrect predictions in existing aleatoric unce… ▽ More

    Submitted 14 February, 2024; v1 submitted 30 November, 2022; originally announced December 2022.

  50. arXiv:2211.15875  [pdf, other

    cs.LG cs.CR cs.CV

    Data Poisoning Attack Aiming the Vulnerability of Continual Learning

    Authors: Gyo** Han, Jaehyun Choi, Hyeong Gwon Hong, Junmo Kim

    Abstract: Generally, regularization-based continual learning models limit access to the previous task data to imitate the real-world constraints related to memory and privacy. However, this introduces a problem in these models by not being able to track the performance on each task. In essence, current continual learning methods are susceptible to attacks on previous tasks. We demonstrate the vulnerability… ▽ More

    Submitted 3 July, 2023; v1 submitted 28 November, 2022; originally announced November 2022.

    Comments: ICIP 2023 (NeurIPS 2022 ML Safety Workshop accepted paper)