Skip to main content

Showing 1–14 of 14 results for author: Sang, F

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.15425  [pdf, other

    cs.CR cs.AR

    Prime+Retouch: When Cache is Locked and Leaked

    Authors: Jaehyuk Lee, Fan Sang, Taesoo Kim

    Abstract: Caches on the modern commodity CPUs have become one of the major sources of side-channel leakages and been abused as a new attack vector. To thwart the cache-based side-channel attacks, two types of countermeasures have been proposed: detection-based ones that limit the amount of microarchitectural traces an attacker can leave, and cache prefetching-and-locking techniques that claim to prevent suc… ▽ More

    Submitted 23 February, 2024; originally announced February 2024.

  2. arXiv:2312.13119  [pdf, other

    cs.CR cs.CL cs.LG

    Graphene: Infrastructure Security Posture Analysis with AI-generated Attack Graphs

    Authors: Xin **, Charalampos Katsis, Fan Sang, Jiahao Sun, Elisa Bertino, Ramana Rao Kompella, Ashish Kundu

    Abstract: The rampant occurrence of cybersecurity breaches imposes substantial limitations on the progress of network infrastructures, leading to compromised data, financial losses, potential harm to individuals, and disruptions in essential services. The current security landscape demands the urgent development of a holistic security assessment solution that encompasses vulnerability analysis and investiga… ▽ More

    Submitted 30 April, 2024; v1 submitted 20 December, 2023; originally announced December 2023.

  3. arXiv:2206.07164  [pdf, other

    cs.CR cs.AI

    Edge Security: Challenges and Issues

    Authors: Xin **, Charalampos Katsis, Fan Sang, Jiahao Sun, Ashish Kundu, Ramana Kompella

    Abstract: Edge computing is a paradigm that shifts data processing services to the network edge, where data are generated. While such an architecture provides faster processing and response, among other benefits, it also raises critical security issues and challenges that must be addressed. This paper discusses the security threats and vulnerabilities emerging from the edge network architecture spanning fro… ▽ More

    Submitted 14 June, 2022; originally announced June 2022.

    Comments: 21 pages. Survey paper

  4. arXiv:1909.11164  [pdf, other

    cs.CR

    P2FAAS: Toward Privacy-Preserving Fuzzing as a Service

    Authors: Fan Sang, Daehee Jang, Ming-Wei Shih, Taesoo Kim

    Abstract: Global corporations (e.g., Google and Microsoft) have recently introduced a new model of cloud services, fuzzing-as-a-service (FaaS). Despite effectively alleviating the cost of fuzzing, the model comes with privacy concerns. For example, the end user has to trust both cloud and service providers who have access to the application to be fuzzed. Such concerns are due to the platform is under the co… ▽ More

    Submitted 24 September, 2019; originally announced September 2019.

  5. arXiv:cs/0306050  [pdf, ps, other

    cs.CL

    Introduction to the CoNLL-2003 Shared Task: Language-Independent Named Entity Recognition

    Authors: Erik F. Tjong Kim Sang, Fien De Meulder

    Abstract: We describe the CoNLL-2003 shared task: language-independent named entity recognition. We give background information on the data sets (English and German) and the evaluation method, present a general overview of the systems that have taken part in the task and discuss their performance.

    Submitted 12 June, 2003; originally announced June 2003.

    ACM Class: I.2.7

    Journal ref: Proceedings of CoNLL-2003, Edmonton, Canada, 2003, pp. 142-147

  6. arXiv:cs/0209010  [pdf, ps, other

    cs.CL

    Introduction to the CoNLL-2002 Shared Task: Language-Independent Named Entity Recognition

    Authors: Erik F. Tjong Kim Sang

    Abstract: We describe the CoNLL-2002 shared task: language-independent named entity recognition. We give background information on the data sets and the evaluation method, present a general overview of the systems that have taken part in the task and discuss their performance.

    Submitted 5 September, 2002; originally announced September 2002.

    Comments: 4 pages

    ACM Class: I.2.7

    Journal ref: Dan Roth and Antal van den Bosch (eds.), Proceedings of CoNLL-2002, Taipei, Taiwan, 2002, pp. 155-158

  7. arXiv:cs/0204049  [pdf, ps, other

    cs.CL

    Memory-Based Shallow Parsing

    Authors: Erik F. Tjong Kim Sang

    Abstract: We present memory-based learning approaches to shallow parsing and apply these to five tasks: base noun phrase identification, arbitrary base phrase recognition, clause detection, noun phrase parsing and full parsing. We use feature selection techniques and system combination methods for improving the performance of the memory-based learner. Our approach is evaluated on standard data sets and th… ▽ More

    Submitted 24 April, 2002; originally announced April 2002.

    Report number: jmlr-2002-tks ACM Class: I.2.7

    Journal ref: Journal of Machine Learning Research, volume 2 (March), 2002, pp. 559-594

  8. arXiv:cs/0107018  [pdf, ps, other

    cs.CL

    Combining a self-organising map with memory-based learning

    Authors: James Hammerton, Erik F. Tjong Kim Sang

    Abstract: Memory-based learning (MBL) has enjoyed considerable success in corpus-based natural language processing (NLP) tasks and is thus a reliable method of getting a high-level of performance when building corpus-based NLP systems. However there is a bottleneck in MBL whereby any novel testing item has to be compared against all the training items in memory base. For this reason there has been some in… ▽ More

    Submitted 15 July, 2001; originally announced July 2001.

    ACM Class: I.2.7

    Journal ref: In: Walter Daelemans and Remi Zajac (eds.), Proceedings of CoNLL-2001, Toulouse, France, 2001, pp. 9-14

  9. arXiv:cs/0107017  [pdf, ps, other

    cs.CL

    Learning Computational Grammars

    Authors: John Nerbonne, Anja Belz, Nicola Cancedda, Herve Dejean, James Hammerton, Rob Koeling, Stasinos Konstantopoulos, Miles Osborne, Franck Thollard, Erik F. Tjong Kim Sang

    Abstract: This paper reports on the "Learning Computational Grammars" (LCG) project, a postdoc network devoted to studying the application of machine learning techniques to grammars suitable for computational use. We were interested in a more systematic survey to understand the relevance of many factors to the success of learning, esp. the availability of annotated data, the kind of dependencies in the da… ▽ More

    Submitted 15 July, 2001; originally announced July 2001.

    ACM Class: I.2.7

    Journal ref: In: Walter Daelemans and Remi Zajac (eds.), Proceedings of CoNLL-2001, Toulouse, France, 2001, pp. 97-104

  10. arXiv:cs/0107016  [pdf, ps, other

    cs.CL

    Introduction to the CoNLL-2001 Shared Task: Clause Identification

    Authors: Erik F. Tjong Kim Sang, Herve Dejean

    Abstract: We describe the CoNLL-2001 shared task: dividing text into clauses. We give background information on the data sets, present a general overview of the systems that have taken part in the shared task and briefly discuss their performance.

    Submitted 15 July, 2001; originally announced July 2001.

    ACM Class: I.2.7

    Journal ref: In: Walter Daelemans and Remi Zajac (eds.), Proceedings of CoNLL-2001, Toulouse, France, 2001, pp. 53-57

  11. arXiv:cs/0009008  [pdf, ps, other

    cs.CL

    Introduction to the CoNLL-2000 Shared Task: Chunking

    Authors: Erik F. Tjong Kim Sang, Sabine Buchholz

    Abstract: We describe the CoNLL-2000 shared task: dividing text into syntactically related non-overlap** groups of words, so-called text chunking. We give background information on the data sets, present a general overview of the systems that have taken part in the shared task and briefly discuss their performance.

    Submitted 18 September, 2000; originally announced September 2000.

    Comments: 6 pages

    ACM Class: I.2.7

    Journal ref: Proceedings of CoNLL-2000 and LLL-2000, Lisbon, Portugal

  12. arXiv:cs/0008012  [pdf, ps, other

    cs.CL

    Applying System Combination to Base Noun Phrase Identification

    Authors: Erik F. Tjong Kim Sang, Walter Daelemans, Herve Dejean, Rob Koeling, Yuval Krymolowski, Vasin Punyakanok, Dan Roth

    Abstract: We use seven machine learning algorithms for one task: identifying base noun phrases. The results have been processed by different system combination methods and all of these outperformed the best individual result. We have applied the seven learners with the best combinator, a majority vote of the top five systems, to a standard data set and managed to improve the best published result for this… ▽ More

    Submitted 17 August, 2000; originally announced August 2000.

    Comments: 7 pages

    ACM Class: I.2.7

    Journal ref: Proceedings of COLING 2000, Saarbruecken, Germany

  13. arXiv:cs/0005015  [pdf, ps, other

    cs.CL

    Noun Phrase Recognition by System Combination

    Authors: Erik F. Tjong Kim Sang

    Abstract: The performance of machine learning algorithms can be improved by combining the output of different systems. In this paper we apply this idea to the recognition of noun phrases.We generate different classifiers by using different representations of the data. By combining the results with voting techniques described in (Van Halteren et.al. 1998) we manage to improve the best reported performances… ▽ More

    Submitted 10 May, 2000; originally announced May 2000.

    Comments: 6 pages

    ACM Class: I.2.7

    Journal ref: Proceedings of NAACL 2000, Seattle, WA, USA

  14. arXiv:cs/9907006  [pdf, ps, other

    cs.CL

    Representing Text Chunks

    Authors: Erik F. Tjong Kim Sang, Jorn Veenstra

    Abstract: Dividing sentences in chunks of words is a useful preprocessing step for parsing, information extraction and information retrieval. (Ramshaw and Marcus, 1995) have introduced a "convenient" data representation for chunking by converting it to a tagging task. In this paper we will examine seven different data representations for the problem of recognizing noun phrase chunks. We will show that the… ▽ More

    Submitted 6 July, 1999; originally announced July 1999.

    Comments: 7 pages

    ACM Class: I.2.7

    Journal ref: EACL'99, Bergen