-
PU-EdgeFormer: Edge Transformer for Dense Prediction in Point Cloud Upsampling
Authors:
Dohoon Kim,
Minwoo Shin,
Joonki Paik
Abstract:
Despite the recent development of deep learning-based point cloud upsampling, most MLP-based point cloud upsampling methods have limitations in that it is difficult to train the local and global structure of the point cloud at the same time. To solve this problem, we present a combined graph convolution and transformer for point cloud upsampling, denoted by PU-EdgeFormer. The proposed method const…
▽ More
Despite the recent development of deep learning-based point cloud upsampling, most MLP-based point cloud upsampling methods have limitations in that it is difficult to train the local and global structure of the point cloud at the same time. To solve this problem, we present a combined graph convolution and transformer for point cloud upsampling, denoted by PU-EdgeFormer. The proposed method constructs EdgeFormer unit that consists of graph convolution and multi-head self-attention modules. We employ graph convolution using EdgeConv, which learns the local geometry and global structure of point cloud better than existing point-to-feature method. Through in-depth experiments, we confirmed that the proposed method has better point cloud upsampling performance than the existing state-of-the-art method in both subjective and objective aspects. The code is available at https://github.com/dohoon2045/PU-EdgeFormer.
△ Less
Submitted 1 May, 2023;
originally announced May 2023.
-
Feature Engineering Using File Layout for Malware Detection
Authors:
Jeongwoo Kim,
Eun-Sun Cho,
Joon-Young Paik
Abstract:
Malware detection on binary executables provides a high availability to even binaries which are not disassembled or decompiled. However, a binary-level approach could cause ambiguity problems. In this paper, we propose a new feature engineering technique that use minimal knowledge about the internal layout on a binary. The proposed feature avoids the ambiguity problems by integrating the informati…
▽ More
Malware detection on binary executables provides a high availability to even binaries which are not disassembled or decompiled. However, a binary-level approach could cause ambiguity problems. In this paper, we propose a new feature engineering technique that use minimal knowledge about the internal layout on a binary. The proposed feature avoids the ambiguity problems by integrating the information about the layout with structural entropy. The experimental results show that our feature improves accuracy and F1-score by 3.3% and 0.07, respectively, on a CNN based malware detector with realistic benign and malicious samples.
△ Less
Submitted 5 April, 2023;
originally announced April 2023.
-
PPFS: Predictive Permutation Feature Selection
Authors:
Atif Hassan,
Jiaul H. Paik,
Swanand Khare,
Syed Asif Hassan
Abstract:
We propose Predictive Permutation Feature Selection (PPFS), a novel wrapper-based feature selection method based on the concept of Markov Blanket (MB). Unlike previous MB methods, PPFS is a universal feature selection technique as it can work for both classification as well as regression tasks on datasets containing categorical and/or continuous features. We propose Predictive Permutation Independ…
▽ More
We propose Predictive Permutation Feature Selection (PPFS), a novel wrapper-based feature selection method based on the concept of Markov Blanket (MB). Unlike previous MB methods, PPFS is a universal feature selection technique as it can work for both classification as well as regression tasks on datasets containing categorical and/or continuous features. We propose Predictive Permutation Independence (PPI), a new Conditional Independence (CI) test, which enables PPFS to be categorised as a wrapper feature selection method. This is in contrast to current filter based MB feature selection techniques that are unable to harness the advancements in supervised algorithms such as Gradient Boosting Machines (GBM). The PPI test is based on the knockoff framework and utilizes supervised algorithms to measure the association between an individual or a set of features and the target variable. We also propose a novel MB aggregation step that addresses the issue of sample inefficiency. Empirical evaluations and comparisons on a large number of datasets demonstrate that PPFS outperforms state-of-the-art Markov blanket discovery algorithms as well as, well-known wrapper methods. We also provide a sketch of the proof of correctness of our method. Implementation of this work is available at \url{https://github.com/atif-hassan/PyImpetus}
△ Less
Submitted 20 October, 2021;
originally announced October 2021.
-
Supervised Segmentation with Domain Adaptation for Small Sampled Orbital CT Images
Authors:
Sungho Suh,
Sojeong Cheon,
Wonseo Choi,
Yeon Woong Chung,
Won-Kyung Cho,
Ji-Sun Paik,
Sung Eun Kim,
Dong-** Chang,
Yong Oh Lee
Abstract:
Deep neural networks (DNNs) have been widely used for medical image analysis. However, the lack of access a to large-scale annotated dataset poses a great challenge, especially in the case of rare diseases, or new domains for the research society. Transfer of pre-trained features, from the relatively large dataset is a considerable solution. In this paper, we have explored supervised segmentation…
▽ More
Deep neural networks (DNNs) have been widely used for medical image analysis. However, the lack of access a to large-scale annotated dataset poses a great challenge, especially in the case of rare diseases, or new domains for the research society. Transfer of pre-trained features, from the relatively large dataset is a considerable solution. In this paper, we have explored supervised segmentation using domain adaptation for optic nerve and orbital tumor, when only small sampled CT images are given. Even the lung image database consortium image collection (LIDC-IDRI) is a cross-domain to orbital CT, but the proposed domain adaptation method improved the performance of attention U-Net for the segmentation in public optic nerve dataset and our clinical orbital tumor dataset. The code and dataset are available at https://github.com/cmcbigdata.
△ Less
Submitted 1 July, 2021;
originally announced July 2021.
-
Compact pneumatic clutch with integrated stiffness variation and position feedback
Authors:
Yongkang Jiang,
Junlin Ma,
Diansheng Chen,
Jamie Paik
Abstract:
Stiffness variation and real-time position feedback are critical for any robotic system but most importantly for active and wearable devices to interact with the user and environment. Currently, for compact sizes, there is a lack of solutions bringing high-fidelity feedback and maintaining design and functional integrity. In this work, we propose a novel minimal clutch with integrated stiffness va…
▽ More
Stiffness variation and real-time position feedback are critical for any robotic system but most importantly for active and wearable devices to interact with the user and environment. Currently, for compact sizes, there is a lack of solutions bringing high-fidelity feedback and maintaining design and functional integrity. In this work, we propose a novel minimal clutch with integrated stiffness variation and real-time position feedback whose performance surpasses conventional jamming solutions. We introduce integrated design, modeling, and verification of the clutch in detail. Preliminary experimental results show the change in impedance force of the clutch is close to 24-fold at the maximum force density of 15.64 N/cm2. We validated the clutch experimentally in (1) enhancing the bending stiffness of a soft actuator to increase a soft manipulator's grip** force by 73%; (2) enabling a soft cylindrical actuator to execute omnidirectional movement; (3) providing real-time position feedback for hand posture detection and impedance force for kinesthetic haptic feedback. This manuscript presents the functional components with a focus on the integrated design methodology, which will have an impact on the development of soft robots and wearable devices.
△ Less
Submitted 4 March, 2021;
originally announced March 2021.
-
Soft Pneumatic Gelatin Actuator for Edible Robotics
Authors:
Jun Shintake,
Harshal Sonar,
Egor Piskarev,
Jamie Paik,
Dario Floreano
Abstract:
We present a fully edible pneumatic actuator based on gelatin-glycerol composite. The actuator is monolithic, fabricated via a molding process, and measures 90 mm in length, 20 mm in width, and 17 mm in thickness. Thanks to the composite mechanical characteristics similar to those of silicone elastomers, the actuator exhibits a bending angle of 170.3 ° and a blocked force of 0.34 N at the applied…
▽ More
We present a fully edible pneumatic actuator based on gelatin-glycerol composite. The actuator is monolithic, fabricated via a molding process, and measures 90 mm in length, 20 mm in width, and 17 mm in thickness. Thanks to the composite mechanical characteristics similar to those of silicone elastomers, the actuator exhibits a bending angle of 170.3 ° and a blocked force of 0.34 N at the applied pressure of 25 kPa. These values are comparable to elastomer based pneumatic actuators. As a validation example, two actuators are integrated to form a gripper capable of handling various objects, highlighting the high performance and applicability of the edible actuator. These edible actuators, combined with other recent edible materials and electronics, could lay the foundation for a new type of edible robots.
△ Less
Submitted 4 March, 2017;
originally announced March 2017.
-
Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation
Authors:
Junghyun Nam,
Kim-Kwang Raymond Choo,
Sangchul Han,
Moonseong Kim,
Juryon Paik,
Dongho Won
Abstract:
A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme…
▽ More
A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks).
△ Less
Submitted 22 September, 2015;
originally announced September 2015.
-
A Polya Urn Document Language Model for Improved Information Retrieval
Authors:
Ronan Cummins,
Jiaul Hoque Paik,
Yuanhua Lv
Abstract:
The multinomial language model has been one of the most effective models of retrieval for over a decade. However, the multinomial distribution does not model one important linguistic phenomenon relating to term-dependency, that is the tendency of a term to repeat itself within a document (i.e. word burstiness). In this article, we model document generation as a random process with reinforcement (a…
▽ More
The multinomial language model has been one of the most effective models of retrieval for over a decade. However, the multinomial distribution does not model one important linguistic phenomenon relating to term-dependency, that is the tendency of a term to repeat itself within a document (i.e. word burstiness). In this article, we model document generation as a random process with reinforcement (a multivariate Polya process) and develop a Dirichlet compound multinomial language model that captures word burstiness directly.
We show that the new reinforced language model can be computed as efficiently as current retrieval models, and with experiments on an extensive set of TREC collections, we show that it significantly outperforms the state-of-the-art language model for a number of standard effectiveness metrics. Experiments also show that the tuning parameter in the proposed model is more robust than in the multinomial language model. Furthermore, we develop a constraint for the verbosity hypothesis and show that the proposed model adheres to the constraint. Finally, we show that the new language model essentially introduces a measure closely related to idf which gives theoretical justification for combining the term and document event spaces in tf-idf type schemes.
△ Less
Submitted 5 March, 2015; v1 submitted 3 February, 2015;
originally announced February 2015.