Skip to main content

Showing 1–9 of 9 results for author: Ka, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.10996  [pdf, other

    cs.CL

    THEANINE: Revisiting Memory Management in Long-term Conversations with Timeline-augmented Response Generation

    Authors: Seo Hyun Kim, Kai Tzu-iunn Ong, Taeyoon Kwon, Namyoung Kim, Keummin Ka, SeongHyeon Bae, Yohan Jo, Seung-won Hwang, Dongha Lee, **young Yeo

    Abstract: Large language models (LLMs) are capable of processing lengthy dialogue histories during prolonged interaction with users without additional memory modules; however, their responses tend to overlook or incorrectly recall information from the past. In this paper, we revisit memory-augmented response generation in the era of LLMs. While prior work focuses on getting rid of outdated memories, we argu… ▽ More

    Submitted 16 June, 2024; originally announced June 2024.

    Comments: Under Review

  2. arXiv:2403.04787  [pdf, other

    cs.CL cs.AI

    Ever-Evolving Memory by Blending and Refining the Past

    Authors: Seo Hyun Kim, Keummin Ka, Yohan Jo, Seung-won Hwang, Dongha Lee, **young Yeo

    Abstract: For a human-like chatbot, constructing a long-term memory is crucial. However, current large language models often lack this capability, leading to instances of missing important user information or redundantly asking for the same information, thereby diminishing conversation quality. To effectively construct memory, it is crucial to seamlessly connect past and present information, while also poss… ▽ More

    Submitted 7 April, 2024; v1 submitted 3 March, 2024; originally announced March 2024.

    Comments: 17 pages, 4 figures, 7 tables

  3. arXiv:2201.05985  [pdf, other

    cs.SI cs.LG stat.AP

    Exposing the Obscured Influence of State-Controlled Media: A Causal Estimation of Influence Between Media Outlets Via Quotation Propagation

    Authors: Joseph Schlessinger, Richard Bennet, Jacob Coakwell, Steven T. Smith, Edward K. Kao

    Abstract: This study quantifies influence between media outlets by applying a novel methodology that uses causal effect estimation on networks and transformer language models. We demonstrate the obscured influence of state-controlled outlets over other outlets, regardless of orientation, by analyzing a large dataset of quotations from over 100 thousand articles published by the most prominent European and R… ▽ More

    Submitted 16 January, 2022; originally announced January 2022.

  4. arXiv:2005.10879  [pdf, other

    cs.SI cs.LG stat.AP stat.ML

    Automatic Detection of Influential Actors in Disinformation Networks

    Authors: Steven T. Smith, Edward K. Kao, Erika D. Mackin, Danelle C. Shah, Olga Simek, Donald B. Rubin

    Abstract: The weaponization of digital communications and social media to conduct disinformation campaigns at immense scale, speed, and reach presents new challenges to identify and counter hostile influence operations (IOs). This paper presents an end-to-end framework to automate detection of disinformation narratives, networks, and influential actors. The framework integrates natural language processing,… ▽ More

    Submitted 7 January, 2021; v1 submitted 21 May, 2020; originally announced May 2020.

    Comments: Proc. Natl. Acad. Sciences U.S.A. Vol. 118, No. 4, e2011216118

  5. arXiv:2004.12599  [pdf, other

    cs.CV eess.IV

    Deploying Image Deblurring across Mobile Devices: A Perspective of Quality and Latency

    Authors: Cheng-Ming Chiang, Yu Tseng, Yu-Syuan Xu, Hsien-Kai Kuo, Yi-Min Tsai, Guan-Yu Chen, Koan-Sin Tan, Wei-Ting Wang, Yu-Chieh Lin, Shou-Yao Roy Tseng, Wei-Shiang Lin, Chia-Lin Yu, BY Shen, Kloze Kao, Chia-Ming Cheng, Hung-Jen Chen

    Abstract: Recently, image enhancement and restoration have become important applications on mobile devices, such as super-resolution and image deblurring. However, most state-of-the-art networks present extremely high computational complexity. This makes them difficult to be deployed on mobile devices with acceptable latency. Moreover, when deploying to different mobile devices, there is a large latency var… ▽ More

    Submitted 27 April, 2020; originally announced April 2020.

    Comments: CVPR 2020 Workshop on New Trends in Image Restoration and Enhancement (NTIRE)

  6. arXiv:1804.04109  [pdf, other

    cs.SI physics.soc-ph

    Influence Estimation on Social Media Networks Using Causal Inference

    Authors: Steven T. Smith, Edward K. Kao, Danelle C. Shah, Olga Simek, Donald B. Rubin

    Abstract: Estimating influence on social media networks is an important practical and theoretical problem, especially because this new medium is widely exploited as a platform for disinformation and propaganda. This paper introduces a novel approach to influence estimation on social media networks and applies it to the real-world problem of characterizing active influence operations on Twitter during the 20… ▽ More

    Submitted 11 April, 2018; originally announced April 2018.

    Comments: 5 pages, 4 figures, 1 table

    Journal ref: IEEE Statistical Signal Processing Workshop (SSP), June 2018

  7. arXiv:1708.08522  [pdf, other

    stat.ME cs.SI math.ST stat.AP

    Causal Inference Under Network Interference: A Framework for Experiments on Social Networks

    Authors: Edward K. Kao

    Abstract: No man is an island, as individuals interact and influence one another daily in our society. When social influence takes place in experiments on a population of interconnected individuals, the treatment on a unit may affect the outcomes of other units, a phenomenon known as interference. This thesis develops a causal framework and inference methodology for experiments where interference takes plac… ▽ More

    Submitted 28 August, 2017; originally announced August 2017.

    Comments: PhD Thesis at Harvard Department of Statistics

  8. arXiv:1311.5552  [pdf, other

    cs.SI cs.LG math.ST physics.soc-ph stat.ML

    Bayesian Discovery of Threat Networks

    Authors: Steven T. Smith, Edward K. Kao, Kenneth D. Senne, Garrett Bernstein, Scott Philips

    Abstract: A novel unified Bayesian framework for network detection is developed, under which a detection algorithm is derived based on random walks on graphs. The algorithm detects threat networks using partial observations of their activity, and is proved to be optimum in the Neyman-Pearson sense. The algorithm is defined by a graph, at least one observation, and a diffusion model for threat. A link to wel… ▽ More

    Submitted 8 September, 2014; v1 submitted 21 November, 2013; originally announced November 2013.

    Comments: IEEE Trans. Signal Process., major revision of arxiv.longhoe.net/abs/1303.5613. arXiv admin note: substantial text overlap with arXiv:1303.5613

    Journal ref: IEEE Trans. Signal Process., vol. 62, no. 20, pp. 5324-5338, October 2014

  9. arXiv:1303.5613  [pdf, other

    cs.SI cs.LG math.ST physics.soc-ph stat.ML

    Network Detection Theory and Performance

    Authors: Steven T. Smith, Kenneth D. Senne, Scott Philips, Edward K. Kao, Garrett Bernstein

    Abstract: Network detection is an important capability in many areas of applied research in which data can be represented as a graph of entities and relationships. Oftentimes the object of interest is a relatively small subgraph in an enormous, potentially uninteresting background. This aspect characterizes network detection as a "big data" problem. Graph partitioning and network discovery have been major r… ▽ More

    Submitted 22 March, 2013; originally announced March 2013.

    Comments: Submitted to IEEE Trans. Signal Processing

    Journal ref: IEEE Trans. Signal Process., vol. 62, no. 20, pp. 5324-5338, October 2014