Skip to main content

Showing 1–20 of 20 results for author: Koh, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.08337  [pdf

    cs.CV cs.AI

    Perivascular space Identification Nnunet for Generalised Usage (PINGU)

    Authors: Benjamin Sinclair, Lucy Vivash, Jasmine Moses, Miranda Lynch, William Pham, Karina Dorfman, Cassandra Marotta, Shaun Koh, Jacob Bunyamin, Ella Rowsthorn, Alex Jarema, Himashi Peiris, Zhaolin Chen, Sandy R Shultz, David K Wright, Dexiao Kong, Sharon L. Naismith, Terence J. OBrien, Meng Law

    Abstract: Perivascular spaces(PVSs) form a central component of the brainÅ› waste clearance system, the glymphatic system. These structures are visible on MRI images, and their morphology is associated with aging and neurological disease. Manual quantification of PVS is time consuming and subjective. Numerous deep learning methods for PVS segmentation have been developed, however the majority have been devel… ▽ More

    Submitted 17 May, 2024; v1 submitted 14 May, 2024; originally announced May 2024.

  2. arXiv:2402.11989  [pdf, other

    cs.LG cs.CR cs.CV

    Privacy-Preserving Low-Rank Adaptation for Latent Diffusion Models

    Authors: Zihao Luo, Xilie Xu, Feng Liu, Yun Sing Koh, Di Wang, **gfeng Zhang

    Abstract: Low-rank adaptation (LoRA) is an efficient strategy for adapting latent diffusion models (LDMs) on a private dataset to generate specific images by minimizing the adaptation loss. However, the LoRA-adapted LDMs are vulnerable to membership inference (MI) attacks that can judge whether a particular data point belongs to the private dataset, thus leading to the privacy leakage. To defend against MI… ▽ More

    Submitted 8 June, 2024; v1 submitted 19 February, 2024; originally announced February 2024.

  3. arXiv:2311.07343  [pdf, other

    cs.LG

    Fine-Tuning the Retrieval Mechanism for Tabular Deep Learning

    Authors: Felix den Breejen, Sangmin Bae, Stephen Cha, Tae-Young Kim, Seoung Hyun Koh, Se-Young Yun

    Abstract: While interests in tabular deep learning has significantly grown, conventional tree-based models still outperform deep learning methods. To narrow this performance gap, we explore the innovative retrieval mechanism, a methodology that allows neural networks to refer to other data points while making predictions. Our experiments reveal that retrieval-based training, especially when fine-tuning the… ▽ More

    Submitted 13 November, 2023; originally announced November 2023.

    Comments: Table Representation Learning Workshop at NeurIPS 2023

  4. arXiv:2308.09971  [pdf, other

    cs.LG cs.AI cs.CV

    Disposable Transfer Learning for Selective Source Task Unlearning

    Authors: Seunghee Koh, Hyounguk Shon, Janghyeon Lee, Hyeong Gwon Hong, Junmo Kim

    Abstract: Transfer learning is widely used for training deep neural networks (DNN) for building a powerful representation. Even after the pre-trained model is adapted for the target task, the representation performance of the feature extractor is retained to some extent. As the performance of the pre-trained model can be considered the private property of the owner, it is natural to seek the exclusive right… ▽ More

    Submitted 19 August, 2023; originally announced August 2023.

    Comments: Accepted to ICCV 2023

  5. arXiv:2305.00645  [pdf, other

    cs.CR

    GTree: GPU-Friendly Privacy-preserving Decision Tree Training and Inference

    Authors: Qifan Wang, Shujie Cui, Lei Zhou, Ye Dong, Jianli Bai, Yun Sing Koh, Giovanni Russello

    Abstract: Decision tree (DT) is a widely used machine learning model due to its versatility, speed, and interpretability. However, for privacy-sensitive applications, outsourcing DT training and inference to cloud platforms raise concerns about data privacy. Researchers have developed privacy-preserving approaches for DT training and inference using cryptographic primitives, such as Secure Multi-Party Compu… ▽ More

    Submitted 30 April, 2023; originally announced May 2023.

  6. arXiv:2304.00664  [pdf, other

    cs.HC cs.CR

    What You See is Not What You Get: The Role of Email Presentation in Phishing Susceptibility

    Authors: Sijie Zhuo, Robert Biddle, Lucas Betts, Nalin Asanka Gamagedara Arachchilage, Yun Sing Koh, Danielle Lottridge, Giovanni Russello

    Abstract: Phishing is one of the most prevalent social engineering attacks that targets both organizations and individuals. It is crucial to understand how email presentation impacts users' reactions to phishing attacks. We speculated that the device and email presentation may play a role, and, in particular, that how links are shown might influence susceptibility. Collaborating with the IT Services unit of… ▽ More

    Submitted 2 April, 2023; originally announced April 2023.

    Comments: 12 pages, 3 figures

  7. arXiv:2205.09114  [pdf, other

    cond-mat.quant-gas cs.CV cs.LG stat.ML

    Dark solitons in Bose-Einstein condensates: a dataset for many-body physics research

    Authors: Amilson R. Fritsch, Shangjie Guo, Sophia M. Koh, I. B. Spielman, Justyna P. Zwolak

    Abstract: We establish a dataset of over $1.6\times10^4$ experimental images of Bose--Einstein condensates containing solitonic excitations to enable machine learning (ML) for many-body physics research. About $33~\%$ of this dataset has manually assigned and carefully curated labels. The remainder is automatically labeled using SolDet -- an implementation of a physics-informed ML data analysis framework --… ▽ More

    Submitted 11 February, 2023; v1 submitted 17 May, 2022; originally announced May 2022.

    Comments: 16 pages, 4 figures

    Journal ref: Mach. Learn.: Sci. Technol. 3, 047001 (2022)

  8. arXiv:2202.07905  [pdf, other

    cs.CR cs.CY cs.HC

    SoK: Human-Centered Phishing Susceptibility

    Authors: Sijie Zhuo, Robert Biddle, Yun Sing Koh, Danielle Lottridge, Giovanni Russello

    Abstract: Phishing is recognised as a serious threat to organisations and individuals. While there have been significant technical advances in blocking phishing attacks, people remain the last line of defence after phishing emails reach their email client. Most of the existing literature on this subject has focused on the technical aspects related to phishing. However, the factors that cause humans to be su… ▽ More

    Submitted 16 February, 2022; originally announced February 2022.

    Comments: 13 pages of content, 2 figures, 18 pages in total

  9. arXiv:2112.13497  [pdf, other

    cs.SE

    Evaluating Software User Feedback Classifiers on Unseen Apps, Datasets, and Metadata

    Authors: Peter Devine, Yun Sing Koh, Kelly Blincoe

    Abstract: Listening to user's requirements is crucial to building and maintaining high quality software. Online software user feedback has been shown to contain large amounts of information useful to requirements engineering (RE). Previous studies have created machine learning classifiers for parsing this feedback for development insight. While these classifiers report generally good performance when evalua… ▽ More

    Submitted 26 December, 2021; originally announced December 2021.

  10. arXiv:2111.04881  [pdf, other

    cond-mat.quant-gas cs.CV cs.LG quant-ph

    Combining machine learning with physics: A framework for tracking and sorting multiple dark solitons

    Authors: Shangjie Guo, Sophia M. Koh, Amilson R. Fritsch, I. B. Spielman, Justyna P. Zwolak

    Abstract: In ultracold-atom experiments, data often comes in the form of images which suffer information loss inherent in the techniques used to prepare and measure the system. This is particularly problematic when the processes of interest are complicated, such as interactions among excitations in Bose-Einstein condensates (BECs). In this paper, we describe a framework combining machine learning (ML) model… ▽ More

    Submitted 1 June, 2022; v1 submitted 8 November, 2021; originally announced November 2021.

    Comments: 13 pages, 9 figures

    Journal ref: Phys. Rev. Research 4, 023163 (2022)

  11. arXiv:2109.03783  [pdf, other

    cs.CV

    Egocentric View Hand Action Recognition by Leveraging Hand Surface and Hand Grasp Type

    Authors: Sangpil Kim, Jihyun Bae, Hyunggun Chi, Sunghee Hong, Byoung Soo Koh, Karthik Ramani

    Abstract: We introduce a multi-stage framework that uses mean curvature on a hand surface and focuses on learning interaction between hand and object by analyzing hand grasp type for hand action recognition in egocentric videos. The proposed method does not require 3D information of objects including 6D object poses which are difficult to annotate for learning an object's behavior while it interacts with ha… ▽ More

    Submitted 8 September, 2021; originally announced September 2021.

  12. Revam** Storage Class Memory With Hardware Automated Memory-Over-Storage Solution

    Authors: Jie Zhang, Miryeong Kwon, Donghyun Gouk, Sungjoon Koh, Nam Sung Kim, Mahmut Taylan Kandemir, Myoungsoo Jung

    Abstract: Large persistent memories such as NVDIMM have been perceived as a disruptive memory technology, because they can maintain the state of a system even after a power failure and allow the system to recover quickly. However, overheads incurred by a heavy software-stack intervention seriously negate the benefits of such memories. First, to significantly reduce the software stack overheads, we propose H… ▽ More

    Submitted 27 June, 2021; originally announced June 2021.

  13. Improved Explanatory Efficacy on Human Affect and Workload through Interactive Process in Artificial Intelligence

    Authors: Byung Hyung Kim, Seunghun Koh, Sejoon Huh, Sungho Jo, Sunghee Choi

    Abstract: Despite recent advances in the field of explainable artificial intelligence systems, a concrete quantitative measure for evaluating the usability of such systems is nonexistent. Ensuring the success of an explanatory interface in interacting with users requires a cyclic, symbiotic relationship between human and artificial intelligence. We, therefore, propose explanatory efficacy, a novel metric fo… ▽ More

    Submitted 22 October, 2020; v1 submitted 13 December, 2019; originally announced December 2019.

    Journal ref: IEEE Access, Vol.8, 2020

  14. arXiv:1912.06998  [pdf, ps, other

    cs.OS

    Faster than Flash: An In-Depth Study of System Challenges for Emerging Ultra-Low Latency SSDs

    Authors: Sungjoon Koh, Junhyeok Jang, Changrim Lee, Miryeong Kwon, Jie Zhang, Myoungsoo Jung

    Abstract: Emerging storage systems with new flash exhibit ultra-low latency (ULL) that can address performance disparities between DRAM and conventional solid state drives (SSDs) in the memory hierarchy. Considering the advanced low-latency characteristics, different types of I/O completion methods (polling/hybrid) and storage stack architecture (SPDK) are proposed. While these new techniques are expected t… ▽ More

    Submitted 15 December, 2019; originally announced December 2019.

    Comments: 12 pages, 23 figures, 2019 IEEE International Symposium on Workload Characterization

  15. Exploring Fault-Tolerant Erasure Codes for Scalable All-Flash Array Clusters

    Authors: Sungjoon Koh, Jie Zhang, Miryeong Kwon, Jungyeon Yoon, David Donofrio, Nam Sung Kim, Myoungsoo Jung

    Abstract: Large-scale systems with all-flash arrays have become increasingly common in many computing segments. To make such systems resilient, we can adopt erasure coding such as Reed-Solomon (RS) code as an alternative to replication because erasure coding incurs a significantly lower storage overhead than replication. To understand the impact of using erasure coding on the system performance and other sy… ▽ More

    Submitted 12 June, 2019; originally announced June 2019.

    Comments: 19 pages, 46 figures. arXiv admin note: substantial text overlap with arXiv:1709.05365

    Journal ref: IEEE Transactions on Parallel and Distributed Systems ( Volume: 30 , Issue: 6 , June 1 2019 )

  16. arXiv:1905.08848  [pdf, other

    cs.LG stat.ML

    Recurring Concept Meta-learning for Evolving Data Streams

    Authors: Robert Anderson, Yun Sing Koh, Gillian Dobbie, Albert Bifet

    Abstract: When concept drift is detected during classification in a data stream, a common remedy is to retrain a framework's classifier. However, this loses useful information if the classifier has learnt the current concept well, and this concept will recur again in the future. Some frameworks retain and reuse classifiers, but it can be time-consuming to select an appropriate classifier to reuse. These fra… ▽ More

    Submitted 21 May, 2019; originally announced May 2019.

  17. arXiv:1811.01544  [pdf, ps, other

    cs.AR

    Amber: Enabling Precise Full-System Simulation with Detailed Modeling of All SSD Resources

    Authors: Donghyun Gouk, Miryeong Kwon, Jie Zhang, Sungjoon Koh, Wonil Choi, Nam Sung Kim, Mahmut Kandemir, Myoungsoo Jung

    Abstract: SSDs become a major storage component in modern memory hierarchies, and SSD research demands exploring future simulation-based studies by integrating SSD subsystems into a full-system environment. However, several challenges exist to model SSDs under a full-system simulations; SSDs are composed upon their own complete system and architecture, which employ all necessary hardware, such as CPUs, DRAM… ▽ More

    Submitted 5 November, 2018; originally announced November 2018.

    Comments: This paper has been accepted at the 51st Annual IEEE/ACM International Symposium on Microarchitecture (MICRO '51), 2018. This material is presented to ensure timely dissemination of scholarly and technical work

  18. arXiv:1810.03226  [pdf, other

    cs.SD cs.LG cs.MM eess.AS

    Rethinking Recurrent Latent Variable Model for Music Composition

    Authors: Eunjeong Stella Koh, Shlomo Dubnov, Dustin Wright

    Abstract: We present a model for capturing musical features and creating novel sequences of music, called the Convolutional Variational Recurrent Neural Network. To generate sequential data, the model uses an encoder-decoder architecture with latent probabilistic connections to capture the hidden structure of music. Using the sequence-to-sequence model, our generative model can exploit samples from a prior… ▽ More

    Submitted 7 October, 2018; originally announced October 2018.

    Comments: Published as a conference paper at IEEE MMSP 2018

  19. arXiv:1809.05502  [pdf, other

    cs.AI cs.HC

    Mugeetion: Musical Interface Using Facial Gesture and Emotion

    Authors: Eunjeong Stella Koh, Shahrokh Yadegari

    Abstract: People feel emotions when listening to music. However, emotions are not tangible objects that can be exploited in the music composition process as they are difficult to capture and quantify in algorithms. We present a novel musical interface, Mugeetion, designed to capture occurring instances of emotional states from users' facial gestures and relay that data to associated musical features. Mugeet… ▽ More

    Submitted 7 October, 2018; v1 submitted 14 September, 2018; originally announced September 2018.

    Comments: 4 pages, accepted to ICMC 2018

  20. arXiv:1709.05365  [pdf, ps, other

    cs.DC cs.AR

    Understanding System Characteristics of Online Erasure Coding on Scalable, Distributed and Large-Scale SSD Array Systems

    Authors: Sungjoon Koh, Jie Zhang, Miryeong Kwon, Jungyeon Yoon, David Donofrio, Namsung Kim, Myoungsoo Jung

    Abstract: Large-scale systems with arrays of solid state disks (SSDs) have become increasingly common in many computing segments. To make such systems resilient, we can adopt erasure coding such as Reed-Solomon (RS) code as an alternative to replication because erasure coding can offer a significantly lower storage cost than replication. To understand the impact of using erasure coding on system performance… ▽ More

    Submitted 19 September, 2017; v1 submitted 14 September, 2017; originally announced September 2017.

    Comments: This paper is accepted by and will be published at 2017 IEEE International Symposium on Workload Characterization