Skip to main content

Showing 1–29 of 29 results for author: Truong, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.15386  [pdf

    cs.LG cs.AI

    Large-Scale Multipurpose Benchmark Datasets For Assessing Data-Driven Deep Learning Approaches For Water Distribution Networks

    Authors: Andres Tello, Huy Truong, Alexander Lazovik, Victoria Degeler

    Abstract: Currently, the number of common benchmark datasets that researchers can use straight away for assessing data-driven deep learning approaches is very limited. Most studies provide data as configuration files. It is still up to each practitioner to follow a particular data generation method and run computationally intensive simulations to obtain usable data for model training and evaluation. In this… ▽ More

    Submitted 23 April, 2024; originally announced April 2024.

    Comments: Presented at WDSA CCWI, Ferrara, Italy, July 2024

  2. arXiv:2404.11152  [pdf, other

    eess.IV cs.CV

    Multi-target and multi-stage liver lesion segmentation and detection in multi-phase computed tomography scans

    Authors: Abdullah F. Al-Battal, Soan T. M. Duong, Van Ha Tang, Quang Duc Tran, Steven Q. H. Truong, Chien Phan, Truong Q. Nguyen, Cheolhong An

    Abstract: Multi-phase computed tomography (CT) scans use contrast agents to highlight different anatomical structures within the body to improve the probability of identifying and detecting anatomical structures of interest and abnormalities such as liver lesions. Yet, detecting these lesions remains a challenging task as these lesions vary significantly in their size, shape, texture, and contrast with resp… ▽ More

    Submitted 17 April, 2024; originally announced April 2024.

  3. arXiv:2404.02421  [pdf, other

    cs.CL

    Revisiting subword tokenization: A case study on affixal negation in large language models

    Authors: Thinh Hung Truong, Yulia Otmakhova, Karin Verspoor, Trevor Cohn, Timothy Baldwin

    Abstract: In this work, we measure the impact of affixal negation on modern English large language models (LLMs). In affixal negation, the negated meaning is expressed through a negative morpheme, which is potentially challenging for LLMs as their tokenizers are often not morphologically plausible. We conduct extensive experiments using LLMs with different subword tokenization methods, which lead to several… ▽ More

    Submitted 4 April, 2024; v1 submitted 2 April, 2024; originally announced April 2024.

    Comments: NAACL 2024

  4. arXiv:2311.10579  [pdf, other

    cs.LG

    Graph Neural Networks for Pressure Estimation in Water Distribution Systems

    Authors: Huy Truong, Andrés Tello, Alexander Lazovik, Victoria Degeler

    Abstract: Pressure and flow estimation in Water Distribution Networks (WDN) allows water management companies to optimize their control operations. For many years, mathematical simulation tools have been the most common approach to reconstructing an estimate of the WDN hydraulics. However, pure physics-based simulations involve several challenges, e.g. partially observable data, high uncertainty, and extens… ▽ More

    Submitted 17 November, 2023; originally announced November 2023.

    Comments: submitted to Water Resources Research. Huy Truong and Andrés Tello contributed equally to this work

  5. arXiv:2308.05046  [pdf, other

    cs.CL cs.LG

    RadGraph2: Modeling Disease Progression in Radiology Reports via Hierarchical Information Extraction

    Authors: Sameer Khanna, Adam Dejl, Kibo Yoon, Quoc Hung Truong, Hanh Duong, Agustina Saenz, Pranav Rajpurkar

    Abstract: We present RadGraph2, a novel dataset for extracting information from radiology reports that focuses on capturing changes in disease state and device placement over time. We introduce a hierarchical schema that organizes entities based on their relationships and show that using this hierarchy during training improves the performance of an information extraction model. Specifically, we propose a mo… ▽ More

    Submitted 9 August, 2023; originally announced August 2023.

    Comments: Accepted at Machine Learning for Healthcare 2023

  6. arXiv:2306.08189  [pdf, other

    cs.CL

    Language models are not naysayers: An analysis of language models on negation benchmarks

    Authors: Thinh Hung Truong, Timothy Baldwin, Karin Verspoor, Trevor Cohn

    Abstract: Negation has been shown to be a major bottleneck for masked language models, such as BERT. However, whether this finding still holds for larger-sized auto-regressive language models (``LLMs'') has not been studied comprehensively. With the ever-increasing volume of research and applications of LLMs, we take a step back to evaluate the ability of current-generation LLMs to handle negation, a fundam… ▽ More

    Submitted 13 June, 2023; originally announced June 2023.

  7. arXiv:2305.13693  [pdf, other

    cs.CL

    Automated Metrics for Medical Multi-Document Summarization Disagree with Human Evaluations

    Authors: Lucy Lu Wang, Yulia Otmakhova, Jay DeYoung, Thinh Hung Truong, Bailey E. Kuehl, Erin Bransom, Byron C. Wallace

    Abstract: Evaluating multi-document summarization (MDS) quality is difficult. This is especially true in the case of MDS for biomedical literature reviews, where models must synthesize contradicting evidence reported across different documents. Prior work has shown that rather than performing the task, models may exploit shortcuts that are difficult to detect using standard n-gram similarity metrics such as… ▽ More

    Submitted 23 May, 2023; originally announced May 2023.

    Comments: ACL 2023; Github: https://github.com/allenai/mslr-annotated-dataset

  8. ViMQ: A Vietnamese Medical Question Dataset for Healthcare Dialogue System Development

    Authors: Ta Duc Huy, Nguyen Anh Tu, Tran Hoang Vu, Nguyen Phuc Minh, Nguyen Phan, Trung H. Bui, Steven Q. H. Truong

    Abstract: Existing medical text datasets usually take the form of question and answer pairs that support the task of natural language generation, but lacking the composite annotations of the medical terms. In this study, we publish a Vietnamese dataset of medical questions from patients with sentence-level and entity-level annotations for the Intent Classification and Named Entity Recognition tasks. The tag… ▽ More

    Submitted 27 April, 2023; originally announced April 2023.

    Comments: accepted at ICONIP 2021

  9. arXiv:2304.08252  [pdf, other

    cs.RO

    PaaS: Planning as a Service for reactive driving in CARLA Leaderboard

    Authors: Nhat Hao Truong, Huu Thien Mai, Tuan Anh Tran, Minh Quang Tran, Duc Duy Nguyen, Ngoc Viet Phuong Pham

    Abstract: End-to-end deep learning approaches has been proven to be efficient in autonomous driving and robotics. By using deep learning techniques for decision-making, those systems are often referred to as a black box, and the result is driven by data. In this paper, we propose PaaS (Planning as a Service), a vanilla module to generate local trajectory planning for autonomous driving in CARLA simulation.… ▽ More

    Submitted 14 June, 2023; v1 submitted 17 April, 2023; originally announced April 2023.

    Comments: accepted on 05.06.2023, revised on 15.06.2023, to be published on ICSSE 2023

  10. arXiv:2210.03256  [pdf, other

    cs.CL

    Not another Negation Benchmark: The NaN-NLI Test Suite for Sub-clausal Negation

    Authors: Thinh Hung Truong, Yulia Otmakhova, Timothy Baldwin, Trevor Cohn, Jey Han Lau, Karin Verspoor

    Abstract: Negation is poorly captured by current language models, although the extent of this problem is not widely understood. We introduce a natural language inference (NLI) test suite to enable probing the capabilities of NLP methods, with the aim of understanding sub-clausal negation. The test suite contains premise--hypothesis pairs where the premise contains sub-clausal negation and the hypothesis is… ▽ More

    Submitted 13 October, 2022; v1 submitted 6 October, 2022; originally announced October 2022.

    Comments: AACL-ICJNLP 2022

  11. arXiv:2209.08698  [pdf, other

    cs.CL

    LED down the rabbit hole: exploring the potential of global attention for biomedical multi-document summarisation

    Authors: Yulia Otmakhova, Hung Thinh Truong, Timothy Baldwin, Trevor Cohn, Karin Verspoor, Jey Han Lau

    Abstract: In this paper we report on our submission to the Multidocument Summarisation for Literature Review (MSLR) shared task. Specifically, we adapt PRIMERA (Xiao et al., 2022) to the biomedical domain by placing global attention on important biomedical entities in several ways. We analyse the outputs of the 23 resulting models, and report patterns in the results related to the presence of additional glo… ▽ More

    Submitted 18 September, 2022; originally announced September 2022.

    Comments: SDP Workshop at COLING 2022

  12. From Disfluency Detection to Intent Detection and Slot Filling

    Authors: Mai Hoang Dao, Thinh Hung Truong, Dat Quoc Nguyen

    Abstract: We present the first empirical study investigating the influence of disfluency detection on downstream tasks of intent detection and slot filling. We perform this study for Vietnamese -- a low-resource language that has no previous study as well as no public dataset available for disfluency detection. First, we extend the fluent Vietnamese intent detection and slot filling dataset PhoATIS by manua… ▽ More

    Submitted 17 September, 2022; originally announced September 2022.

    Comments: In Proceedings of INTERSPEECH 2022

  13. Solar-Cycle Variation of quiet-Sun Magnetism and Surface Gravity Oscillation Mode

    Authors: Maarit J. Korpi-Lagg, Andreas Korpi-Lagg, Nigul Olspert, Hong-Linh Truong

    Abstract: The origin of the quiet Sun magnetism is under debate. Investigating the solar cycle variation observationally in more detail can give us clues about how to resolve the controversies. We investigate the solar cycle variation of the most magnetically quiet regions and their surface gravity oscillation ($f$-) mode integrated energy ($E_f$). We use 12 years of HMI data and apply a stringent selection… ▽ More

    Submitted 9 May, 2022; originally announced May 2022.

    Comments: 10 pages, 11 figures, submitted to Astronomy & Astrophysics

    Journal ref: A&A 665, A141 (2022)

  14. arXiv:2205.04012  [pdf, other

    cs.CL

    Improving negation detection with negation-focused pre-training

    Authors: Thinh Hung Truong, Timothy Baldwin, Trevor Cohn, Karin Verspoor

    Abstract: Negation is a common linguistic feature that is crucial in many language understanding tasks, yet it remains a hard problem due to diversity in its expression in different types of text. Recent work has shown that state-of-the-art NLP models underperform on samples containing negation in various tasks, and that negation detection models do not transfer well across domains. We propose a new negatio… ▽ More

    Submitted 8 May, 2022; originally announced May 2022.

  15. arXiv:2202.07858  [pdf, ps, other

    cs.CL cs.IR

    ITTC @ TREC 2021 Clinical Trials Track

    Authors: Thinh Hung Truong, Yulia Otmakhova, Rahmad Mahendra, Timothy Baldwin, Jey Han Lau, Trevor Cohn, Lawrence Cavedon, Damiano Spina, Karin Verspoor

    Abstract: This paper describes the submissions of the Natural Language Processing (NLP) team from the Australian Research Council Industrial Transformation Training Centre (ITTC) for Cognitive Computing in Medical Technologies to the TREC 2021 Clinical Trials Track. The task focuses on the problem of matching eligible clinical trials to topics constituting a summary of a patient's admission notes. We explor… ▽ More

    Submitted 15 February, 2022; originally announced February 2022.

    Comments: 7 pages

  16. arXiv:2110.06123  [pdf, other

    cs.SD eess.AS

    COVID-19 Diagnosis from Cough Acoustics using ConvNets and Data Augmentation

    Authors: Saranga Kingkor Mahanta, Darsh Kaushik, Shubham Jain, Hoang Van Truong, Koushik Guha

    Abstract: With the periodic rise and fall of COVID-19 and countries being inflicted by its waves, an efficient, economic, and effortless diagnosis procedure for the virus has been the utmost need of the hour. COVID-19 positive individuals may even be asymptomatic making the diagnosis difficult, but amongst the infected subjects, the asymptomatic ones need not be entirely free of symptoms caused by the virus… ▽ More

    Submitted 3 May, 2022; v1 submitted 12 October, 2021; originally announced October 2021.

    Comments: DiCOVA, top 1st, This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  17. arXiv:2104.03879  [pdf, other

    cs.CL

    COVID-19 Named Entity Recognition for Vietnamese

    Authors: Thinh Hung Truong, Mai Hoang Dao, Dat Quoc Nguyen

    Abstract: The current COVID-19 pandemic has lead to the creation of many corpora that facilitate NLP research and downstream applications to help fight the pandemic. However, most of these corpora are exclusively for English. As the pandemic is a global problem, it is worth creating COVID-19 related datasets for languages other than English. In this paper, we present the first manually-annotated COVID-19 do… ▽ More

    Submitted 8 April, 2021; originally announced April 2021.

    Comments: To appear in Proceedings of NAACL 2021

  18. arXiv:2104.02021  [pdf, other

    cs.CL

    Intent Detection and Slot Filling for Vietnamese

    Authors: Mai Hoang Dao, Thinh Hung Truong, Dat Quoc Nguyen

    Abstract: Intent detection and slot filling are important tasks in spoken and natural language understanding. However, Vietnamese is a low-resource language in these research topics. In this paper, we present the first public intent detection and slot filling dataset for Vietnamese. In addition, we also propose a joint model for intent detection and slot filling, that extends the recent state-of-the-art Joi… ▽ More

    Submitted 9 June, 2021; v1 submitted 5 April, 2021; originally announced April 2021.

    Comments: To appear in Proceedings of INTERSPEECH 2021; The first two authors contributed equally to this work

  19. arXiv:2004.13997  [pdf, other

    cs.RO cs.DC cs.MA

    End-to-End Design for Self-Reconfigurable Heterogeneous Robotic Swarms

    Authors: Jorge Peña Queralta, Li Qingqing, Tuan Nguyen Gia, Hong-Linh Truong, Tomi Westerlund

    Abstract: More widespread adoption requires swarms of robots to be more flexible for real-world applications. Multiple challenges remain in complex scenarios where a large amount of data needs to be processed in real-time and high degrees of situational awareness are required. The options in this direction are limited in existing robotic swarms, mostly homogeneous robots with limited operational and reconfi… ▽ More

    Submitted 29 April, 2020; originally announced April 2020.

  20. arXiv:1908.09766  [pdf

    cs.NI eess.SY

    A Hybrid of Adaptation and Dynamic Routing based on SDN for Improving QoE in HTTP Adaptive VBR Video Streaming

    Authors: Hong Thinh Pham, Ngoc Nam Pham, Huu Thanh Nguyen, Alan Marshall, Thu Huong Truong

    Abstract: Recently, HTTP Adaptive Streaming HAS has received significant attention from both industry and academia based on its ability to enhancing media streaming services over the Internet. Recent research solutions that have tried to improve HAS by adaptation at the client side only may not be completely effective without interacting with routing decisions in the upper layers. In this paper, we address… ▽ More

    Submitted 26 August, 2019; originally announced August 2019.

    Comments: 14 pages, 17 figures, IJCSNS International Journal of Computer Science and Network Security, http://paper.ijcsns.org/07_book/201907/20190708.pdf

    Journal ref: VOL.19 No.7, July 2019

  21. arXiv:1908.09015  [pdf, other

    cs.DC cs.CR

    Towards Secure and Decentralized Sharing of IoT Data

    Authors: Hien Thi Thu Truong, Miguel Almeida, Ghassan Karame, Claudio Soriente

    Abstract: The Internet of Things (IoT) bears unprecedented security and scalability challenges due to the magnitude of data produced and exchanged by IoT devices and platforms. Some of those challenges are currently being addressed by coupling IoT applications with blockchains. However, current blockchain-backed IoT systems simply use the blockchain to store access control policies, thereby underutilizing t… ▽ More

    Submitted 23 August, 2019; originally announced August 2019.

  22. arXiv:1812.04293  [pdf, other

    cs.CR

    On the Security of Randomized Defenses Against Adversarial Samples

    Authors: Kumar Sharad, Giorgia Azzurra Marson, Hien Thi Thu Truong, Ghassan Karame

    Abstract: Deep Learning has been shown to be particularly vulnerable to adversarial samples. To combat adversarial strategies, numerous defensive techniques have been proposed. Among these, a promising approach is to use randomness in order to make the classification process unpredictable and presumably harder for the adversary to control. In this paper, we study the effectiveness of randomized defenses aga… ▽ More

    Submitted 16 March, 2020; v1 submitted 11 December, 2018; originally announced December 2018.

  23. arXiv:1803.07211  [pdf, other

    cs.CR

    DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification

    Authors: Hien Thi Thu Truong, Juhani Toivonen, Thien Duc Nguyen, Claudio Soriente, Sasu Tarkoma, N. Asokan

    Abstract: Copresence verification based on context can improve usability and strengthen security of many authentication and access control systems. By sensing and comparing their surroundings, two or more devices can tell whether they are copresent and use this information to make access control decisions. To the best of our knowledge, all context-based copresence verification mechanisms to date are suscept… ▽ More

    Submitted 18 February, 2019; v1 submitted 19 March, 2018; originally announced March 2018.

  24. arXiv:1705.00673   

    cs.AI cs.SE

    MACA: A Modular Architecture for Conversational Agents

    Authors: Hoai Phuoc Truong, Prasanna Parthasarathi, Joelle Pineau

    Abstract: We propose a software architecture designed to ease the implementation of dialogue systems. The Modular Architecture for Conversational Agents (MACA) uses a plug-n-play style that allows quick prototy**, thereby facilitating the development of new techniques and the reproduction of previous work. The architecture separates the domain of the conversation from the agent's dialogue strategy, and as… ▽ More

    Submitted 2 May, 2017; v1 submitted 1 May, 2017; originally announced May 2017.

    Comments: The architecture needs to be tested further. Sorry for the inconvenience. We should be putting up the paper up soon

  25. Sensor-based Proximity Detection in the Face of Active Adversaries

    Authors: Babins Shrestha, Nitesh Saxena, Hien Thi Thu Truong, N. Asokan

    Abstract: Contextual proximity detection (or, co-presence detection) is a promising approach to defend against relay attacks in many mobile authentication systems. We present a systematic assessment of co-presence detection in the presence of a context-manipulating attacker. First, we show that it is feasible to manipulate, consistently control and stabilize the readings of different acoustic and physical e… ▽ More

    Submitted 4 April, 2021; v1 submitted 3 November, 2015; originally announced November 2015.

    Journal ref: IEEE Transactions on Mobile Computing ( Volume: 18, Issue: 2, Feb. 1 2019)

  26. arXiv:1312.5941  [pdf

    cs.MA

    Develo** a model of evacuation after an earthquake in Lebanon

    Authors: Hong Van Truong, Elise Beck, Julie Dugdale, Carole Adam

    Abstract: This article describes the development of an agent-based model (AMEL, Agent-based Model for Earthquake evacuation in Lebanon) that aims at simulating the movement of pedestrians shortly after an earthquake. The GAMA platform was chosen to implement the model. AMEL is applied to a real case study, a district of the city of Beirut, Lebanon, which potentially could be stricken by a M7 earthquake. The… ▽ More

    Submitted 20 December, 2013; originally announced December 2013.

    Comments: 8 pages, 11 figures, ISCRAM Vietnam Conference, November 2013

  27. The Company You Keep: Mobile Malware Infection Rates and Inexpensive Risk Indicators

    Authors: Hien Thi Thu Truong, Eemil Lagerspetz, Petteri Nurmi, Adam J. Oliner, Sasu Tarkoma, N. Asokan, Sourav Bhattacharya

    Abstract: There is little information from independent sources in the public domain about mobile malware infection rates. The only previous independent estimate (0.0009%) [12], was based on indirect measurements obtained from domain name resolution traces. In this paper, we present the first independent study of malware infection rates and associated risk factors using data collected directly from over 55,0… ▽ More

    Submitted 27 February, 2014; v1 submitted 11 December, 2013; originally announced December 2013.

    ACM Class: D.4.6

  28. Integration of knowledge to support automatic object reconstruction from images and 3D data

    Authors: Frank Boochs, Andreas Marbs, Hung Truong, Helmi Ben Hmida, Ashish Karmacharya, Christophe Cruz, Adlane Habed, Yvon Voisin, Christophe Nicolle

    Abstract: Object reconstruction is an important task in many fields of application as it allows to generate digital representations of our physical world used as base for analysis, planning, construction, visualization or other aims. A reconstruction itself normally is based on reliable data (images, 3D point clouds for example) expressing the object in his complete extent. This data then has to be compiled… ▽ More

    Submitted 21 January, 2013; originally announced January 2013.

    Journal ref: Systems, Signals and Devices (SSD), 2011 8th International Multi-Conference on, Chemnitz : Germany (2011)

  29. arXiv:1012.1131  [pdf, ps, other

    cs.DC

    A Log Auditing Approach for Trust Management in Peer-to-Peer Collaboration

    Authors: Hien Thi Thu Truong, Claudia-Lavinia Ignat

    Abstract: Nowadays we are faced with an increasing popularity of social software including wikis, blogs, micro-blogs and online social networks such as Facebook and MySpace. Unfortunately, the mostly used social services are centralized and personal information is stored at a single vendor. This results in potential privacy problems as users do not have much control over how their private data is disseminat… ▽ More

    Submitted 6 December, 2010; originally announced December 2010.