Skip to main content

Showing 1–28 of 28 results for author: Kung, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2208.11257  [pdf, other

    cs.CV

    3D-FM GAN: Towards 3D-Controllable Face Manipulation

    Authors: Yuchen Liu, Zhixin Shu, Yijun Li, Zhe Lin, Richard Zhang, S. Y. Kung

    Abstract: 3D-controllable portrait synthesis has significantly advanced, thanks to breakthroughs in generative adversarial networks (GANs). However, it is still challenging to manipulate existing face images with precise 3D control. While concatenating GAN inversion and a 3D-aware, noise-to-image GAN is a straight-forward solution, it is inefficient and may lead to noticeable drop in editing quality. To fil… ▽ More

    Submitted 23 August, 2022; originally announced August 2022.

    Comments: Accepted to ECCV2022. Project webpage: https://lychenyoko.github.io/3D-FM-GAN-Webpage/

  2. arXiv:2208.06049  [pdf, other

    cs.CV cs.CL cs.LG

    MILAN: Masked Image Pretraining on Language Assisted Representation

    Authors: Zejiang Hou, Fei Sun, Yen-Kuang Chen, Yuan Xie, Sun-Yuan Kung

    Abstract: Self-attention based transformer models have been dominating many computer vision tasks in the past few years. Their superb model qualities heavily depend on the excessively large labeled image datasets. In order to reduce the reliance on large labeled datasets, reconstruction based masked autoencoders are gaining popularity, which learn high quality transferable representations from unlabeled ima… ▽ More

    Submitted 19 December, 2022; v1 submitted 11 August, 2022; originally announced August 2022.

    Comments: add new experiments and improved results. provide repo link

  3. arXiv:2203.15794  [pdf, other

    cs.CV

    CHEX: CHannel EXploration for CNN Model Compression

    Authors: Zejiang Hou, Minghai Qin, Fei Sun, Xiaolong Ma, Kun Yuan, Yi Xu, Yen-Kuang Chen, Rong **, Yuan Xie, Sun-Yuan Kung

    Abstract: Channel pruning has been broadly recognized as an effective technique to reduce the computation and memory cost of deep convolutional neural networks. However, conventional pruning methods have limitations in that: they are restricted to pruning process only, and they require a fully pre-trained large model. Such limitations may lead to sub-optimal model quality as well as excessive memory and tra… ▽ More

    Submitted 29 March, 2022; originally announced March 2022.

    Comments: Accepted to CVPR 2022

  4. arXiv:2201.00043  [pdf, other

    cs.CV cs.LG

    Multi-Dimensional Model Compression of Vision Transformer

    Authors: Zejiang Hou, Sun-Yuan Kung

    Abstract: Vision transformers (ViT) have recently attracted considerable attentions, but the huge computational cost remains an issue for practical deployment. Previous ViT pruning methods tend to prune the model along one dimension solely, which may suffer from excessive reduction and lead to sub-optimal model quality. In contrast, we advocate a multi-dimensional ViT compression paradigm, and propose to ha… ▽ More

    Submitted 31 December, 2021; originally announced January 2022.

  5. Evolving Transferable Neural Pruning Functions

    Authors: Yuchen Liu, S. Y. Kung, David Wentzlaff

    Abstract: Structural design of neural networks is crucial for the success of deep learning. While most prior works in evolutionary learning aim at directly searching the structure of a network, few attempts have been made on another promising track, channel pruning, which recently has made major headway in designing efficient deep learning models. In fact, prior pruning methods adopt human-made pruning func… ▽ More

    Submitted 3 August, 2022; v1 submitted 20 October, 2021; originally announced October 2021.

    Comments: Published at GECCO 2022

    Journal ref: Proceedings of the Genetic and Evolutionary Computation Conference, 2022 (385--394)

  6. arXiv:2110.10864  [pdf, other

    cs.CV

    Class-Discriminative CNN Compression

    Authors: Yuchen Liu, David Wentzlaff, S. Y. Kung

    Abstract: Compressing convolutional neural networks (CNNs) by pruning and distillation has received ever-increasing focus in the community. In particular, designing a class-discrimination based approach would be desired as it fits seamlessly with the CNNs training objective. In this paper, we propose class-discriminative compression (CDC), which injects class discrimination in both pruning and distillation… ▽ More

    Submitted 20 October, 2021; originally announced October 2021.

  7. arXiv:2109.02820  [pdf, other

    cs.CV cs.AI cs.LG

    Few-shot Learning via Dependency Maximization and Instance Discriminant Analysis

    Authors: Zejiang Hou, Sun-Yuan Kung

    Abstract: We study the few-shot learning (FSL) problem, where a model learns to recognize new objects with extremely few labeled training data per category. Most of previous FSL approaches resort to the meta-learning paradigm, where the model accumulates inductive bias through learning many training tasks so as to solve a new unseen few-shot task. In contrast, we propose a simple approach to exploit unlabel… ▽ More

    Submitted 6 September, 2021; originally announced September 2021.

  8. arXiv:2106.10671  [pdf, other

    cs.LG cs.CR stat.ML

    A compressive multi-kernel method for privacy-preserving machine learning

    Authors: Thee Chanyaswad, J. Morris Chang, S. Y. Kung

    Abstract: As the analytic tools become more powerful, and more data are generated on a daily basis, the issue of data privacy arises. This leads to the study of the design of privacy-preserving machine learning algorithms. Given two objectives, namely, utility maximization and privacy-loss minimization, this work is based on two previously non-intersecting regimes -- Compressive Privacy and multi-kernel met… ▽ More

    Submitted 20 June, 2021; originally announced June 2021.

    Comments: Published in 2017 International Joint Conference on Neural Networks (IJCNN). IEEE, 2017

  9. arXiv:2105.12655  [pdf, other

    cs.SE cs.AI

    CodeNet: A Large-Scale AI for Code Dataset for Learning a Diversity of Coding Tasks

    Authors: Ruchir Puri, David S. Kung, Geert Janssen, Wei Zhang, Giacomo Domeniconi, Vladimir Zolotov, Julian Dolby, Jie Chen, Mihir Choudhury, Lindsey Decker, Veronika Thost, Luca Buratti, Saurabh Pujar, Shyam Ramji, Ulrich Finkler, Susan Malaika, Frederick Reiss

    Abstract: Over the last several decades, software has been woven into the fabric of every aspect of our society. As software development surges and code infrastructure of enterprise applications ages, it is now more critical than ever to increase software development productivity and modernize legacy applications. Advances in deep learning and machine learning algorithms have enabled numerous breakthroughs,… ▽ More

    Submitted 29 August, 2021; v1 submitted 24 May, 2021; originally announced May 2021.

    Comments: 22 pages including references

  10. arXiv:2104.02244  [pdf, other

    cs.CV

    Content-Aware GAN Compression

    Authors: Yuchen Liu, Zhixin Shu, Yijun Li, Zhe Lin, Federico Perazzi, S. Y. Kung

    Abstract: Generative adversarial networks (GANs), e.g., StyleGAN2, play a vital role in various image generation and synthesis tasks, yet their notoriously high computational cost hinders their efficient deployment on edge devices. Directly applying generic compression approaches yields poor results on GANs, which motivates a number of recent GAN compression works. While prior works mainly accelerate condit… ▽ More

    Submitted 5 April, 2021; originally announced April 2021.

    Comments: Published in CVPR2021

    ACM Class: I.4.0; I.2.6

  11. A Novel Multi-Stage Training Approach for Human Activity Recognition from Multimodal Wearable Sensor Data Using Deep Neural Network

    Authors: Tanvir Mahmud, A. Q. M. Sazzad Sayyed, Shaikh Anowarul Fattah, Sun-Yuan Kung

    Abstract: Deep neural network is an effective choice to automatically recognize human actions utilizing data from various wearable sensors. These networks automate the process of feature extraction relying completely on data. However, various noises in time series data with complex inter-modal relationships among sensors make this process more complicated. In this paper, we have proposed a novel multi-stage… ▽ More

    Submitted 3 January, 2021; originally announced January 2021.

    Comments: 12 Pages, 7 Figures. This article has been published in IEEE Sensors Journal

    Journal ref: IEEE Sensors Journal, Volume: 21, Issue:2, Page(s): 1715 - 1726, January 2021

  12. arXiv:2012.01473  [pdf, other

    eess.IV cs.CV cs.LG

    CovSegNet: A Multi Encoder-Decoder Architecture for Improved Lesion Segmentation of COVID-19 Chest CT Scans

    Authors: Tanvir Mahmud, Md Awsafur Rahman, Shaikh Anowarul Fattah, Sun-Yuan Kung

    Abstract: Automatic lung lesions segmentation of chest CT scans is considered a pivotal stage towards accurate diagnosis and severity measurement of COVID-19. Traditional U-shaped encoder-decoder architecture and its variants suffer from diminutions of contextual information in pooling/upsampling operations with increased semantic gaps among encoded and decoded feature maps as well as instigate vanishing gr… ▽ More

    Submitted 2 December, 2020; originally announced December 2020.

  13. Privacy Enhancing Machine Learning via Removal of Unwanted Dependencies

    Authors: Mert Al, Semih Yagli, Sun-Yuan Kung

    Abstract: The rapid rise of IoT and Big Data has facilitated copious data driven applications to enhance our quality of life. However, the omnipresent and all-encompassing nature of the data collection can generate privacy concerns. Hence, there is a strong need to develop techniques that ensure the data serve only the intended purposes, giving users control over the information they share. To this end, thi… ▽ More

    Submitted 7 September, 2021; v1 submitted 30 July, 2020; originally announced July 2020.

    Comments: 15 pages, 5 figures, published on IEEE Transactions on Neural Networks and Learning Systems

  14. arXiv:2005.13796  [pdf, other

    cs.LG cs.CV stat.ML

    A Feature-map Discriminant Perspective for Pruning Deep Neural Networks

    Authors: Zejiang Hou, Sun-Yuan Kung

    Abstract: Network pruning has become the de facto tool to accelerate deep neural networks for mobile and edge applications. Recently, feature-map discriminant based channel pruning has shown promising results, as it aligns well with the CNN objective of differentiating multiple classes and offers better interpretability of the pruning decision. However, existing discriminant-based methods are challenged by… ▽ More

    Submitted 28 May, 2020; originally announced May 2020.

  15. arXiv:2004.14492  [pdf, other

    cs.CV

    Rethinking Class-Discrimination Based CNN Channel Pruning

    Authors: Yuchen Liu, David Wentzlaff, S. Y. Kung

    Abstract: Channel pruning has received ever-increasing focus on network compression. In particular, class-discrimination based channel pruning has made major headway, as it fits seamlessly with the classification objective of CNNs and provides good explainability. Prior works singly propose and evaluate their discriminant functions, while further study on the effectiveness of the adopted metrics is absent.… ▽ More

    Submitted 29 April, 2020; originally announced April 2020.

  16. arXiv:2003.00547  [pdf, other

    cs.CV

    Soft-Root-Sign Activation Function

    Authors: Yuan Zhou, Dandan Li, Shuwei Huo, Sun-Yuan Kung

    Abstract: The choice of activation function in deep networks has a significant effect on the training dynamics and task performance. At present, the most effective and widely-used activation function is ReLU. However, because of the non-zero mean, negative missing and unbounded output, ReLU is at a potential disadvantage during optimization. To this end, we introduce a novel activation function to manage to… ▽ More

    Submitted 1 March, 2020; originally announced March 2020.

  17. arXiv:1911.10511  [pdf, other

    cs.CV

    Exploiting Operation Importance for Differentiable Neural Architecture Search

    Authors: Xukai Xie, Yuan Zhou, Sun-Yuan Kung

    Abstract: Recently, differentiable neural architecture search methods significantly reduce the search cost by constructing a super network and relax the architecture representation by assigning architecture weights to the candidate operations. All the existing methods determine the importance of each operation directly by architecture weights. However, architecture weights cannot accurately reflect the impo… ▽ More

    Submitted 24 November, 2019; originally announced November 2019.

  18. arXiv:1911.01060  [pdf, other

    cs.CV

    Temporal Action Localization using Long Short-Term Dependency

    Authors: Yuan Zhou, Hongru Li, Sun-Yuan Kung

    Abstract: Temporal action localization in untrimmed videos is an important but difficult task. Difficulties are encountered in the application of existing methods when modeling temporal structures of videos. In the present study, we developed a novel method, referred to as Gemini Network, for effective modeling of temporal structures and achieving high-performance temporal action localization. The significa… ▽ More

    Submitted 4 November, 2019; originally announced November 2019.

    Comments: 12pages, Trans

  19. arXiv:1911.00387  [pdf, other

    cs.CV

    Comb Convolution for Efficient Convolutional Architecture

    Authors: Dandan Li, Yuan Zhou, Shuwei Huo, Sun-Yuan Kung

    Abstract: Convolutional neural networks (CNNs) are inherently suffering from massively redundant computation (FLOPs) due to the dense connection pattern between feature maps and convolution kernels. Recent research has investigated the sparse relationship between channels, however, they ignored the spatial relationship within a channel. In this paper, we present a novel convolutional operator, namely comb c… ▽ More

    Submitted 1 November, 2019; originally announced November 2019.

    Comments: 15 pages

  20. arXiv:1909.10432  [pdf, ps, other

    cs.LG stat.ML

    Scalable Kernel Learning via the Discriminant Information

    Authors: Mert Al, Zejiang Hou, Sun-Yuan Kung

    Abstract: Kernel approximation methods create explicit, low-dimensional kernel feature maps to deal with the high computational and memory complexity of standard techniques. This work studies a supervised kernel learning methodology to optimize such map**s. We utilize the Discriminant Information criterion, a measure of class separability with a strong connection to Discriminant Analysis. By generalizing… ▽ More

    Submitted 14 February, 2020; v1 submitted 23 September, 2019; originally announced September 2019.

    Comments: Published in IEEE 2020 International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2020)

  21. arXiv:1906.03657  [pdf, other

    cs.CV

    HGC: Hierarchical Group Convolution for Highly Efficient Neural Network

    Authors: Xukai Xie, Yuan Zhou, Sun-Yuan Kung

    Abstract: Group convolution works well with many deep convolutional neural networks (CNNs) that can effectively compress the model by reducing the number of parameters and computational cost. Using this operation, feature maps of different group cannot communicate, which restricts their representation capability. To address this issue, in this work, we propose a novel operation named Hierarchical Group Conv… ▽ More

    Submitted 9 June, 2019; originally announced June 2019.

    Comments: arXiv admin note: text overlap with arXiv:1711.09224, arXiv:1904.00346, arXiv:1811.07083 by other authors

  22. arXiv:1805.04018  [pdf, ps, other

    cs.LG stat.ML

    Supervising Nyström Methods via Negative Margin Support Vector Selection

    Authors: Mert Al, Thee Chanyaswad, Sun-Yuan Kung

    Abstract: The Nyström methods have been popular techniques for scalable kernel based learning. They approximate explicit, low-dimensional feature map**s for kernel functions from the pairwise comparisons with the training data. However, Nyström methods are generally applied without the supervision provided by the training labels in the classification/regression problems. This leads to pairwise comparisons… ▽ More

    Submitted 17 May, 2018; v1 submitted 10 May, 2018; originally announced May 2018.

    Comments: 10 pages, 3 figures, 1 table for the main paper. 4 pages, 2 figures, 1 table for the appendix. Submitted to the Thirty-second Annual Conference on Neural Information Processing Systems (NIPS)

  23. arXiv:1708.02629  [pdf, other

    cs.CR cs.LG

    Protecting Genomic Privacy by a Sequence-Similarity Based Obfuscation Method

    Authors: Shibiao Wan, Man-Wai Mak, Sun-Yuan Kung

    Abstract: In the post-genomic era, large-scale personal DNA sequences are produced and collected for genetic medical diagnoses and new drug discovery, which, however, simultaneously poses serious challenges to the protection of personal genomic privacy. Existing genomic privacy-protection methods are either time-consuming or with low accuracy. To tackle these problems, this paper proposes a sequence similar… ▽ More

    Submitted 8 August, 2017; originally announced August 2017.

    Comments: 5 pages, 2 figures

  24. arXiv:1707.07770  [pdf, other

    cs.CR cs.LG

    Desensitized RDCA Subspaces for Compressive Privacy in Machine Learning

    Authors: Artur Filipowicz, Thee Chanyaswad, S. Y. Kung

    Abstract: The quest for better data analysis and artificial intelligence has lead to more and more data being collected and stored. As a consequence, more data are exposed to malicious entities. This paper examines the problem of privacy in machine learning for classification. We utilize the Ridge Discriminant Component Analysis (RDCA) to desensitize data with respect to a privacy label. Based on five exper… ▽ More

    Submitted 24 July, 2017; originally announced July 2017.

  25. arXiv:1702.07976  [pdf, ps, other

    stat.ML cs.LG

    Ratio Utility and Cost Analysis for Privacy Preserving Subspace Projection

    Authors: Mert Al, Shibiao Wan, Sun-Yuan Kung

    Abstract: With a rapidly increasing number of devices connected to the internet, big data has been applied to various domains of human life. Nevertheless, it has also opened new venues for breaching users' privacy. Hence it is highly required to develop techniques that enable data owners to privatize their data while kee** it useful for intended applications. Existing methods, however, do not offer enough… ▽ More

    Submitted 25 February, 2017; originally announced February 2017.

    Comments: Submitted to ICASSP 2017

  26. Efficient Divide-And-Conquer Classification Based on Feature-Space Decomposition

    Authors: Qi Guo, Bo-Wei Chen, Feng Jiang, Xiangyang Ji, Sun-Yuan Kung

    Abstract: This study presents a divide-and-conquer (DC) approach based on feature space decomposition for classification. When large-scale datasets are present, typical approaches usually employed truncated kernel methods on the feature space or DC approaches on the sample space. However, this did not guarantee separability between classes, owing to overfitting. To overcome such problems, this work proposes… ▽ More

    Submitted 29 January, 2015; originally announced January 2015.

    Comments: 5 pages

  27. arXiv:1311.2911  [pdf

    cs.SI cs.CY physics.soc-ph

    Exploring universal patterns in human home-work commuting from mobile phone data

    Authors: Kevin S. Kung, Kael Greco, Stanislav Sobolevsky, Carlo Ratti

    Abstract: Home-work commuting has always attracted significant research attention because of its impact on human mobility. One of the key assumptions in this domain of study is the universal uniformity of commute times. However, a true comparison of commute patterns has often been hindered by the intrinsic differences in data collection methods, which make observation from different countries potentially bi… ▽ More

    Submitted 24 September, 2014; v1 submitted 12 November, 2013; originally announced November 2013.

    Journal ref: Kung KS, Greco K, Sobolevsky S, Ratti C (2014) Exploring Universal Patterns in Human Home-Work Commuting from Mobile Phone Data. PLoS ONE 9(6): e96180

  28. A low-cost time-hop** impulse radio system for high data rate transmission

    Authors: Andreas F. Molisch, Ye Geoffrey Li, Yves-Paul Nakache, Philip Orlik, Makoto Miyake, Yunnan Wu, Sinan Gezici, Harry Sheng, S. Y. Kung, H. Kobayashi, H. Vincent Poor, Alexander Haimovich, **yun Zhang

    Abstract: We present an efficient, low-cost implementation of time-hop** impulse radio that fulfills the spectral mask mandated by the FCC and is suitable for high-data-rate, short-range communications. Key features are: (i) all-baseband implementation that obviates the need for passband components, (ii) symbol-rate (not chip rate) sampling, A/D conversion, and digital signal processing, (iii) fast acqu… ▽ More

    Submitted 9 February, 2005; originally announced February 2005.

    Comments: To appear in EURASIP Journal on Applied Signal Processing (Special Issue on UWB - State of the Art)