Skip to main content

Showing 1–30 of 30 results for author: Lee, J K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.18047  [pdf, other

    cs.LG cs.AI cs.DC

    2BP: 2-Stage Backpropagation

    Authors: Christopher Rae, Joseph K. L. Lee, James Richings

    Abstract: As Deep Neural Networks (DNNs) grow in size and complexity, they often exceed the memory capacity of a single accelerator, necessitating the sharding of model parameters across multiple accelerators. Pipeline parallelism is a commonly used sharding strategy for training large DNNs. However, current implementations of pipeline parallelism are being unintentionally bottlenecked by the automatic diff… ▽ More

    Submitted 28 May, 2024; originally announced May 2024.

  2. arXiv:2404.10536  [pdf, ps, other

    cs.DC

    Benchmarking Machine Learning Applications on Heterogeneous Architecture using Reframe

    Authors: Christopher Rae, Joseph K. L. Lee, James Richings, Michele Weiland

    Abstract: With the rapid increase in machine learning workloads performed on HPC systems, it is beneficial to regularly perform machine learning specific benchmarks to monitor performance and identify issues. Furthermore, as part of the Edinburgh International Data Facility, EPCC currently hosts a wide range of machine learning accelerators including Nvidia GPUs, the Graphcore Bow Pod64 and Cerebras CS-2, w… ▽ More

    Submitted 25 April, 2024; v1 submitted 16 April, 2024; originally announced April 2024.

    Comments: Author accepted version of paper in the PERMAVOST workshop at the 33rd International Symposium on High-Performance Parallel and Distributed Computing (HPDC 24)

  3. arXiv:2403.12449  [pdf, other

    cs.RO

    Multi-Object RANSAC: Efficient Plane Clustering Method in a Clutter

    Authors: Seunghyeon Lim, Youngjae Yoo, Jun Ki Lee, Byoung-Tak Zhang

    Abstract: In this paper, we propose a novel method for plane clustering specialized in cluttered scenes using an RGB-D camera and validate its effectiveness through robot gras** experiments. Unlike existing methods, which focus on large-scale indoor structures, our approach -- Multi-Object RANSAC emphasizes cluttered environments that contain a wide range of objects with different scales. It enhances plan… ▽ More

    Submitted 19 March, 2024; originally announced March 2024.

    Comments: 7 pages, 6 figures

  4. arXiv:2403.10774  [pdf, other

    cs.CL

    Detecting Bias in Large Language Models: Fine-tuned KcBERT

    Authors: J. K. Lee, T. M. Chung

    Abstract: The rapid advancement of large language models (LLMs) has enabled natural language processing capabilities similar to those of humans, and LLMs are being widely utilized across various societal domains such as education and healthcare. While the versatility of these models has increased, they have the potential to generate subjective and normative language, leading to discriminatory treatment or o… ▽ More

    Submitted 15 March, 2024; originally announced March 2024.

    Comments: 14 pages, 5 figures

  5. arXiv:2403.10764  [pdf, other

    cs.CL cs.AI

    ECRC: Emotion-Causality Recognition in Korean Conversation for GCN

    Authors: J. K. Lee, T. M. Chung

    Abstract: In this multi-task learning study on simultaneous analysis of emotions and their underlying causes in conversational contexts, deep neural network methods were employed to effectively process and train large labeled datasets. However, these approaches are typically limited to conducting context analyses across the entire corpus because they rely on one of the two methods: word- or sentence-level e… ▽ More

    Submitted 15 March, 2024; originally announced March 2024.

    Comments: 10 pages, 5 figures

  6. arXiv:2311.03210  [pdf, other

    cs.DC

    Quantum Task Offloading with the OpenMP API

    Authors: Joseph K. L. Lee, Oliver T. Brown, Mark Bull, Martin Ruefenacht, Johannes Doerfert, Michael Klemm, Martin Schulz

    Abstract: Most of the widely used quantum programming languages and libraries are not designed for the tightly coupled nature of hybrid quantum-classical algorithms, which run on quantum resources that are integrated on-premise with classical HPC infrastructure. We propose a programming model using the API provided by OpenMP to target quantum devices, which provides an easy-to-use and efficient interface fo… ▽ More

    Submitted 6 November, 2023; originally announced November 2023.

    Comments: Poster extended abstract for Supercomputing 2023 (SC23)

  7. arXiv:2305.00512  [pdf, other

    cs.DC

    Experiences of running an HPC RISC-V testbed

    Authors: Nick Brown, Maurice Jamieson, Joseph K. L. Lee

    Abstract: Funded by the UK ExCALIBUR H\&ES exascale programme, in early 2022 a RISC-V testbed for HPC was stood up to provide free access for scientific software developers to experiment with RISC-V for their workloads. Here we report on successes, challenges, and lessons learnt from this activity with a view to better understanding the suitability of RISC-V for HPC and important areas to focus RISC-V HPC c… ▽ More

    Submitted 30 April, 2023; originally announced May 2023.

    Comments: Author accepted version of extended abstract in RISC-V Summit Europe

  8. arXiv:2304.10324  [pdf, other

    cs.DC

    Backporting RISC-V Vector assembly

    Authors: Joseph K. L. Lee, Maurice Jamieson, Nick Brown

    Abstract: Leveraging vectorisation, the ability for a CPU to apply operations to multiple elements of data concurrently, is critical for high performance workloads. However, at the time of writing, commercially available physical RISC-V hardware that provides the RISC-V vector extension (RVV) only supports version 0.7.1, which is incompatible with the latest ratified version 1.0. The challenge is that upstr… ▽ More

    Submitted 20 April, 2023; originally announced April 2023.

    Comments: Preprint of paper accepted to First International Workshop on RISC-V for HPC (2023)

  9. arXiv:2304.10319  [pdf, other

    cs.DC

    Test-driving RISC-V Vector hardware for HPC

    Authors: Joseph K. L. Lee, Maurice Jamieson, Nick Brown, Ricardo Jesus

    Abstract: Whilst the RISC-V Vector extension (RVV) has been ratified, at the time of writing both hardware implementations and open source software support are still limited for vectorisation on RISC-V. This is important because vectorisation is crucial to obtaining good performance for High Performance Computing (HPC) workloads and, as of April 2023, the Allwinner D1 SoC, containing the XuanTie C906 proces… ▽ More

    Submitted 20 April, 2023; originally announced April 2023.

    Comments: Preprint of paper accepted to First International Workshop on RISC-V for HPC (2023)

  10. arXiv:2303.12128  [pdf, other

    cs.AR

    Simulation Environment with Customized RISC-V Instructions for Logic-in-Memory Architectures

    Authors: Jia-Hui Su, Chen-Hua Lu, Jenq Kuen Lee, Andrea Coluccio, Fabrizio Riente, Marco Vacca, Marco Ottavi, Kuan-Hsun Chen

    Abstract: Nowadays, various memory-hungry applications like machine learning algorithms are knocking "the memory wall". Toward this, emerging memories featuring computational capacity are foreseen as a promising solution that performs data process inside the memory itself, so-called computation-in-memory, while eliminating the need for costly data movement. Recent research shows that utilizing the custom ex… ▽ More

    Submitted 27 March, 2023; v1 submitted 21 March, 2023; originally announced March 2023.

  11. arXiv:2201.06680  [pdf, other

    cs.CR

    Evaluation of the Architecture Alternatives for Real-time Intrusion Detection Systems for Connected Vehicles

    Authors: Mubark B Jedh, Jian Kai Lee, Lotfi ben Othmane

    Abstract: Attackers demonstrated the use of remote access to the in-vehicle network of connected vehicles to launch cyber-attacks and remotely take control of these vehicles. Machine-learning-based Intrusion Detection Systems (IDSs) techniques have been proposed for the detection of such attacks. The evaluation of some of these IDS demonstrated their efficacy in terms of accuracy in detecting message inject… ▽ More

    Submitted 17 January, 2022; originally announced January 2022.

  12. arXiv:2110.15403  [pdf, other

    cs.LG stat.ML

    Selective Regression Under Fairness Criteria

    Authors: Abhin Shah, Yuheng Bu, Joshua Ka-Wing Lee, Subhro Das, Rameswar Panda, Prasanna Sattigeri, Gregory W. Wornell

    Abstract: Selective regression allows abstention from prediction if the confidence to make an accurate prediction is not sufficient. In general, by allowing a reject option, one expects the performance of a regression model to increase at the cost of reducing coverage (i.e., by predicting on fewer samples). However, as we show, in some cases, the performance of a minority subgroup can decrease while we redu… ▽ More

    Submitted 14 July, 2022; v1 submitted 28 October, 2021; originally announced October 2021.

  13. arXiv:1908.08641  [pdf, other

    cs.HC cs.AI cs.GT

    Stackelberg Punishment and Bully-Proofing Autonomous Vehicles

    Authors: Matt Cooper, Jun Ki Lee, Jacob Beck, Joshua D. Fishman, Michael Gillett, Zoƫ Papakipos, Aaron Zhang, Jerome Ramos, Aansh Shah, Michael L. Littman

    Abstract: Mutually beneficial behavior in repeated games can be enforced via the threat of punishment, as enshrined in game theory's well-known "folk theorem." There is a cost, however, to a player for generating these disincentives. In this work, we seek to minimize this cost by computing a "Stackelberg punishment," in which the player selects a behavior that sufficiently punishes the other player while ma… ▽ More

    Submitted 22 August, 2019; originally announced August 2019.

    Comments: 10 pages, The 11th International Conference on Social Robotics

  14. arXiv:1902.04257  [pdf, other

    cs.LG stat.ML

    Deep Reinforcement Learning from Policy-Dependent Human Feedback

    Authors: Dilip Arumugam, Jun Ki Lee, Sophie Saskin, Michael L. Littman

    Abstract: To widen their accessibility and increase their utility, intelligent agents must be able to learn complex behaviors as specified by (non-expert) human users. Moreover, they will need to learn these behaviors within a reasonable amount of time while efficiently leveraging the sparse feedback a human trainer is capable of providing. Recent work has shown that human feedback can be characterized as a… ▽ More

    Submitted 12 February, 2019; originally announced February 2019.

  15. arXiv:1812.02868  [pdf, other

    cs.LG cs.AI stat.ML

    Measuring and Characterizing Generalization in Deep Reinforcement Learning

    Authors: Sam Witty, Jun Ki Lee, Emma Tosch, Akanksha Atrey, Michael Littman, David Jensen

    Abstract: Deep reinforcement-learning methods have achieved remarkable performance on challenging control tasks. Observations of the resulting behavior give the impression that the agent has constructed a generalized representation that supports insightful action decisions. We re-examine what is meant by generalization in RL, and propose several definitions based on an agent's performance in on-policy, off-… ▽ More

    Submitted 11 December, 2018; v1 submitted 6 December, 2018; originally announced December 2018.

  16. arXiv:1812.01129  [pdf, other

    cs.LG cs.AI

    Mitigating Planner Overfitting in Model-Based Reinforcement Learning

    Authors: Dilip Arumugam, David Abel, Kavosh Asadi, Nakul Gopalan, Christopher Grimm, Jun Ki Lee, Lucas Lehnert, Michael L. Littman

    Abstract: An agent with an inaccurate model of its environment faces a difficult choice: it can ignore the errors in its model and act in the real world in whatever way it determines is optimal with respect to its model. Alternatively, it can take a more conservative stance and eschew its model in favor of optimizing its behavior solely via real-world interaction. This latter approach can be exceedingly slo… ▽ More

    Submitted 19 March, 2020; v1 submitted 3 December, 2018; originally announced December 2018.

  17. arXiv:1806.06927  [pdf, other

    cs.LG cs.AI cs.CV stat.ML

    Auto-Meta: Automated Gradient Based Meta Learner Search

    Authors: Jaehong Kim, Sangyeul Lee, Sungwan Kim, Moonsu Cha, Jung Kwon Lee, Youngduck Choi, Yongseok Choi, Dong-Yeon Cho, Jiwon Kim

    Abstract: Fully automating machine learning pipelines is one of the key challenges of current artificial intelligence research, since practical machine learning often requires costly and time-consuming human-powered processes such as model design, algorithm development, and hyperparameter tuning. In this paper, we verify that automated architecture search synergizes with the effect of gradient-based meta le… ▽ More

    Submitted 10 December, 2018; v1 submitted 11 June, 2018; originally announced June 2018.

    Comments: Presented at NIPS 2018 Workshop on Meta-Learning (MetaLearn 2018)

  18. arXiv:1705.08690  [pdf, other

    cs.AI cs.CV cs.LG

    Continual Learning with Deep Generative Replay

    Authors: Hanul Shin, Jung Kwon Lee, Jaehong Kim, Jiwon Kim

    Abstract: Attempts to train a comprehensive artificial intelligence capable of solving multiple tasks have been impeded by a chronic problem called catastrophic forgetting. Although simply replaying all previous data alleviates the problem, it requires large memory and even worse, often infeasible in real world applications where the access to past data is limited. Inspired by the generative nature of hippo… ▽ More

    Submitted 11 December, 2017; v1 submitted 24 May, 2017; originally announced May 2017.

    Comments: NIPS 2017

  19. arXiv:1703.05192  [pdf, other

    cs.CV

    Learning to Discover Cross-Domain Relations with Generative Adversarial Networks

    Authors: Taeksoo Kim, Moonsu Cha, Hyunsoo Kim, Jung Kwon Lee, Jiwon Kim

    Abstract: While humans easily recognize relations between data from different domains without any supervision, learning to automatically discover them is in general very challenging and needs many ground-truth pairs that illustrate the relations. To avoid costly pairing, we address the task of discovering cross-domain relations given unpaired data. We propose a method based on generative adversarial network… ▽ More

    Submitted 15 May, 2017; v1 submitted 15 March, 2017; originally announced March 2017.

    Comments: Accepted to International Conference on Machine Learning (ICML) 2017

  20. arXiv:1511.04587  [pdf, other

    cs.CV cs.LG

    Accurate Image Super-Resolution Using Very Deep Convolutional Networks

    Authors: Jiwon Kim, Jung Kwon Lee, Kyoung Mu Lee

    Abstract: We present a highly accurate single-image super-resolution (SR) method. Our method uses a very deep convolutional network inspired by VGG-net used for ImageNet classification \cite{simonyan2015very}. We find increasing our network depth shows a significant improvement in accuracy. Our final model uses 20 weight layers. By cascading small filters many times in a deep network structure, contextual i… ▽ More

    Submitted 11 November, 2016; v1 submitted 14 November, 2015; originally announced November 2015.

    Comments: CVPR 2016 Oral

  21. arXiv:1511.04491  [pdf, other

    cs.CV cs.LG

    Deeply-Recursive Convolutional Network for Image Super-Resolution

    Authors: Jiwon Kim, Jung Kwon Lee, Kyoung Mu Lee

    Abstract: We propose an image super-resolution method (SR) using a deeply-recursive convolutional network (DRCN). Our network has a very deep recursive layer (up to 16 recursions). Increasing recursion depth can improve performance without introducing new parameters for additional convolutions. Albeit advantages, learning a DRCN is very hard with a standard gradient descent method due to exploding/vanishing… ▽ More

    Submitted 11 November, 2016; v1 submitted 13 November, 2015; originally announced November 2015.

    Comments: CVPR 2016 Oral

  22. arXiv:1308.6705  [pdf, other

    cs.SI physics.data-an physics.soc-ph

    Digital breadcrumbs: Detecting urban mobility patterns and transport mode choices from cellphone networks

    Authors: Thomas Holleczek, Liang Yu, Joseph K. Lee, Oliver Senn, Kristian Kloeckl, Carlo Ratti, Patrick Jaillet

    Abstract: Many modern and growing cities are facing declines in public transport usage, with few efficient methods to explain why. In this article, we show that urban mobility patterns and transport mode choices can be derived from cellphone call detail records coupled with public transport data recorded from smart cards. Specifically, we present new data mining approaches to determine the spatial and tempo… ▽ More

    Submitted 30 August, 2013; originally announced August 2013.

  23. arXiv:1108.1593  [pdf

    cs.CR

    Multilayer Approach to Defend Phishing Attacks

    Authors: Cynthia Dhinakaran, Dhinaharan Nagamalai, Jae Kwang Lee

    Abstract: Spam messes up users inbox, consumes resources and spread attacks like DDoS, MiM, phishing etc. Phishing is a byproduct of email and causes financial loss to users and loss of reputation to financial institutions. In this paper we examine the characteristics of phishing and technology used by Phishers. In order to counter anti-phishing technology, phishers change their mode of operation; therefore… ▽ More

    Submitted 7 August, 2011; originally announced August 2011.

    Comments: 8 Pages, Journal of Internet Technology (JIT) 2010

  24. arXiv:1012.1665  [pdf

    cs.CR cs.NI

    An In-depth Analysis of Spam and Spammers

    Authors: Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, Jae Kwang Lee

    Abstract: Electronic mail services have become an important source of communication for millions of people all over the world. Due to this tremendous growth, there has been a significant increase in spam traffic. Spam messes up user's inbox, consumes network resources and spread worms and viruses. In this paper we study the characteristics of spam and the technology used by spammers. In order to counter ant… ▽ More

    Submitted 7 December, 2010; originally announced December 2010.

    Comments: 14 pages, 8 Figures,5 tables, IJSA Vol 2, No 2, 2008

    Journal ref: International Journal of Security and its Applications,Vol. 2, No. 2, April, 2008

  25. Bayesian Based Comment Spam Defending Tool

    Authors: Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, Jae Kwang Lee

    Abstract: Spam messes up user's inbox, consumes network resources and spread worms and viruses. Spam is flooding of unsolicited, unwanted e mail. Spam in blogs is called blog spam or comment spam.It is done by posting comments or flooding spams to the services such as blogs, forums,news,email archives and guestbooks. Blog spams generally appears on guestbooks or comment pages where spammers fill a comment b… ▽ More

    Submitted 14 November, 2010; originally announced November 2010.

    Comments: 14 Pages,4 Figures, International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.4, October 2010

  26. Characterizing Spam traffic and Spammers

    Authors: Cynthia Dhinakaran, Dhinaharan Nagamalai, Jae Kwang Lee

    Abstract: There is a tremendous increase in spam traffic these days. Spam messages muddle up users inbox, consume network resources, and build up DDoS attacks, spread worms and viruses. Our goal is to present a definite figure about the characteristics of spam and spammers. Since spammers change their mode of operation to counter anti spam technology,continues evaluation of the characteristics of spam and s… ▽ More

    Submitted 3 November, 2010; originally announced November 2010.

    Comments: 6 pages, 4 Figures, ICCIT 2007, IEEE CS

  27. An Empirical Study of Spam and Spam Vulnerable email Accounts

    Authors: Cynthia Dhinakaran, Dhinaharan Nagamalai, Jae Kwang Lee

    Abstract: Spam messages muddle up users inbox, consume network resources, and build up DDoS attacks, spread malware. Our goal is to present a definite figure about the characteristics of spam and spam vulnerable email accounts. These evaluations help us to enhance the existing technology to combat spam effectively. We collected 400 thousand spam mails from a spam trap set up in a corporate mail server for a… ▽ More

    Submitted 2 November, 2010; originally announced November 2010.

    Comments: 6 pages, 5 Figures, FGCN 2007, IEEE CS

  28. "Reminder: please update your details": Phishing Trends

    Authors: Cynthia Dhinakaran, Jae Kwang lee, Dhinaharan Nagamalai

    Abstract: Spam messes up users inbox, consumes resources and spread attacks like DDoS, MiM, Phishing etc., Phishing is a byproduct of email and causes financial loss to users and loss of reputation to financial institutions. In this paper we study the characteristics of phishing and technology used by phishers. In order to counter anti phishing technology, phishers change their mode of operation; therefore… ▽ More

    Submitted 13 October, 2010; originally announced October 2010.

    Comments: 6 pages, 6 Figures, NETCOM 2009, IEEE CS

  29. Multi Layer Approach to Defend DDoS Attacks Caused by Spam

    Authors: Dhinaharan Nagamalai, Cynthia Dhinakaran, Jae Kwang Lee

    Abstract: Corporate mail services are designed to perform better than public mail services. Fast mail delivery, large size file transfer as an attachments, high level spam and virus protection, commercial advertisement free environment are some of the advantages worth to mention. But these mail services are frequent target of hackers and spammers. Distributed Denial of service attacks are becoming more comm… ▽ More

    Submitted 7 October, 2010; originally announced October 2010.

    Comments: 6 pages,5 figures,MUE 2007, IEEE CS

    Journal ref: MUE 2007, IEEE CS

  30. arXiv:0812.0904  [pdf, ps, other

    cs.PF

    An Approximation of the Outage Probability for Multi-hop AF Fixed Gain Relay

    Authors: Jun Kyoung Lee, Janghoon Yang, Dong Ku Kim

    Abstract: In this letter, we present a closed-form approximation of the outage probability for the multi-hop amplify-and-forward (AF) relaying systems with fixed gain in Rayleigh fading channel. The approximation is derived from the outage event for each hop. The simulation results show the tightness of the proposed approximation in low and high signal-to-noise ratio (SNR) region.

    Submitted 4 December, 2008; originally announced December 2008.

    Comments: 3 pages, 3 figures, Submitted to IEEE Communication Letters