Skip to main content

Showing 1–24 of 24 results for author: Truong, T T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.04631  [pdf, other

    cond-mat.mtrl-sci cs.LG

    An autoencoder for compressing angle-resolved photoemission spectroscopy data

    Authors: Steinn Ymir Agustsson, Mohammad Ahsanul Haque, Thi Tam Truong, Marco Bianchi, Nikita Klyuchnikov, Davide Mottin, Panagiotis Karras, Philip Hofmann

    Abstract: Angle-resolved photoemission spectroscopy (ARPES) is a powerful experimental technique to determine the electronic structure of solids. Advances in light sources for ARPES experiments are currently leading to a vast increase of data acquisition rates and data quantity. On the other hand, access time to the most advanced ARPES instruments remains strictly limited, calling for fast, effective, and o… ▽ More

    Submitted 5 July, 2024; originally announced July 2024.

  2. arXiv:2401.01393  [pdf, other

    math.OC cs.LG math.CV math.DS math.NA

    Backtracking New Q-Newton's method, Newton's flow, Voronoi's diagram and Stochastic root finding

    Authors: John Erik Fornaess, Mi Hu, Tuyen Trung Truong, Takayuki Watanabe

    Abstract: A new variant of Newton's method - named Backtracking New Q-Newton's method (BNQN) - which has strong theoretical guarantee, is easy to implement, and has good experimental performance, was recently introduced by the third author. Experiments performed previously showed some remarkable properties of the basins of attractions for finding roots of polynomials and meromorphic functions, with BNQN.… ▽ More

    Submitted 8 January, 2024; v1 submitted 2 January, 2024; originally announced January 2024.

    Comments: 48 pages. Some typos are fixed. Comments are welcome!. arXiv admin note: text overlap with arXiv:2312.12166

  3. arXiv:2311.18620  [pdf, other

    cs.CE cs.AI

    Data-driven prediction of tool wear using Bayesian-regularized artificial neural networks

    Authors: Tam T. Truong, Jay Airao, Panagiotis Karras, Faramarz Hojati, Bahman Azarhoushang, Ramin Aghababaei

    Abstract: The prediction of tool wear helps minimize costs and enhance product quality in manufacturing. While existing data-driven models using machine learning and deep learning have contributed to the accurate prediction of tool wear, they often lack generality and require substantial training data for high accuracy. In this paper, we propose a new data-driven model that uses Bayesian Regularized Artific… ▽ More

    Submitted 30 November, 2023; originally announced November 2023.

  4. arXiv:2309.11475  [pdf, other

    math.OC cs.LG math.DS math.NA

    Creating walls to avoid unwanted points in root finding and optimization

    Authors: Tuyen Trung Truong

    Abstract: In root finding and optimization, there are many cases where there is a closed set $A$ one likes that the sequence constructed by one's favourite method will not converge to A (here, we do not assume extra properties on $A$ such as being convex or connected). For example, if one wants to find roots, and one chooses initial points in the basin of attraction for 1 root $z^*$ (a fact which one may no… ▽ More

    Submitted 10 January, 2024; v1 submitted 20 September, 2023; originally announced September 2023.

    Comments: 24 pages.Improved abstract and exposition. Comments are welcome!

  5. arXiv:2205.05493  [pdf, other

    cs.CV cs.AI

    Deep Learning and Computer Vision Techniques for Microcirculation Analysis: A Review

    Authors: Maged Abdalla Helmy Mohamed Abdou, Trung Tuyen Truong, Eric Jul, Paulo Ferreira

    Abstract: The analysis of microcirculation images has the potential to reveal early signs of life-threatening diseases like sepsis. Quantifying the capillary density and the capillary distribution in microcirculation images can be used as a biological marker to assist critically ill patients. The quantification of these biological markers is labor-intensive, time-consuming, and subject to interobserver vari… ▽ More

    Submitted 11 May, 2022; originally announced May 2022.

  6. arXiv:2204.08462  [pdf, other

    eess.IV cs.CV cs.LG

    CapillaryX: A Software Design Pattern for Analyzing Medical Images in Real-time using Deep Learning

    Authors: Maged Abdalla Helmy Abdou, Paulo Ferreira, Eric Jul, Tuyen Trung Truong

    Abstract: Recent advances in digital imaging, e.g., increased number of pixels captured, have meant that the volume of data to be processed and analyzed from these images has also increased. Deep learning algorithms are state-of-the-art for analyzing such images, given their high accuracy when trained with a large data volume of data. Nevertheless, such analysis requires considerable computational power, ma… ▽ More

    Submitted 13 April, 2022; originally announced April 2022.

  7. arXiv:2109.11395  [pdf, ps, other

    math.OC cs.LG math.AG math.CV math.DS

    Generalisations and improvements of New Q-Newton's method Backtracking

    Authors: Tuyen Trung Truong

    Abstract: In this paper, we propose a general framework for the algorithm New Q-Newton's method Backtracking, developed in the author's previous work. For a symmetric, square real matrix $A$, we define $minsp(A):=\min _{||e||=1} ||Ae||$. Given a $C^2$ cost function $f:\mathbb{R}^m\rightarrow \mathbb{R}$ and a real number $0<τ$, as well as $m+1$ fixed real numbers $δ_0,\ldots ,δ_m$, we define for each… ▽ More

    Submitted 23 September, 2021; originally announced September 2021.

    Comments: 14 pages. arXiv admin note: text overlap with arXiv:2108.10249

  8. arXiv:2108.10249  [pdf, ps, other

    math.OC cs.LG math.DS math.NA stat.ML

    New Q-Newton's method meets Backtracking line search: good convergence guarantee, saddle points avoidance, quadratic rate of convergence, and easy implementation

    Authors: Tuyen Trung Truong

    Abstract: In a recent joint work, the author has developed a modification of Newton's method, named New Q-Newton's method, which can avoid saddle points and has quadratic rate of convergence. While good theoretical convergence guarantee has not been established for this method, experiments on small scale problems show that the method works very competitively against other well known modifications of Newton'… ▽ More

    Submitted 23 August, 2021; originally announced August 2021.

    Comments: 29 pages. arXiv admin note: text overlap with arXiv:2006.01512

  9. CapillaryNet: An Automated System to Quantify Skin Capillary Density and Red Blood Cell Velocity from Handheld Vital Microscopy

    Authors: Maged Helmy, Anastasiya Dykyy, Tuyen Trung Truong, Paulo Ferreira, Eric Jul

    Abstract: Capillaries are the smallest vessels in the body responsible for delivering oxygen and nutrients to surrounding cells. Various life-threatening diseases are known to alter the density of healthy capillaries and the flow velocity of erythrocytes within the capillaries. In previous studies, capillary density and flow velocity were manually assessed by trained specialists. However, manual analysis of… ▽ More

    Submitted 20 January, 2022; v1 submitted 23 April, 2021; originally announced April 2021.

    Comments: Improved overall English text and added few more sections

  10. arXiv:2008.11091  [pdf, ps, other

    math.OC cs.LG math.DG math.DS stat.ML

    Unconstrained optimisation on Riemannian manifolds

    Authors: Tuyen Trung Truong

    Abstract: In this paper, we give explicit descriptions of versions of (Local-) Backtracking Gradient Descent and New Q-Newton's method to the Riemannian setting.Here are some easy to state consequences of results in this paper, where X is a general Riemannian manifold of finite dimension and $f:X\rightarrow \mathbb{R}$ a $C^2$ function which is Morse (that is, all its critical points are non-degenerate).… ▽ More

    Submitted 31 August, 2020; v1 submitted 25 August, 2020; originally announced August 2020.

    Comments: 29 pages. Some experimental results (on singular cost functions on Euclidean spaces, and on minimum on the closed unit ball in the Euclidean spaces) are given. References updated

  11. arXiv:2007.03618  [pdf, ps, other

    math.OC cs.LG math.DS math.NA

    Asymptotic behaviour of learning rates in Armijo's condition

    Authors: Tuyen Trung Truong, Tuan Hang Nguyen

    Abstract: Fix a constant $0<α<1$. For a $C^1$ function $f:\mathbb{R}^k\rightarrow \mathbb{R}$, a point $x$ and a positive number $δ>0$, we say that Armijo's condition is satisfied if $f(x-δ\nabla f(x))-f(x)\leq -αδ||\nabla f(x)||^2$. It is a basis for the well known Backtracking Gradient Descent (Backtracking GD) algorithm. Consider a sequence $\{x_n\}$ defined by $x_{n+1}=x_n-δ_n\nabla f(x_n)$, for posit… ▽ More

    Submitted 7 July, 2020; originally announced July 2020.

    Comments: 5 pages

  12. arXiv:2006.01512  [pdf, other

    math.OC cs.LG math.DS math.NA stat.ML

    A fast and simple modification of Newton's method hel** to avoid saddle points

    Authors: Tuyen Trung Truong, Tat Dat To, Tuan Hang Nguyen, Thu Hang Nguyen, Hoang Phuong Nguyen, Maged Helmy

    Abstract: We propose in this paper New Q-Newton's method. The update rule is very simple conceptually, for example $x_{n+1}=x_n-w_n$ where $w_n=pr_{A_n,+}(v_n)-pr_{A_n,-}(v_n)$, with $A_n=\nabla ^2f(x_n)+δ_n||\nabla f(x_n)||^2.Id$ and $v_n=A_n^{-1}.\nabla f(x_n)$. Here $δ_n$ is an appropriate real number so that $A_n$ is invertible, and $pr_{A_n,\pm}$ are projections to the vector subspaces generated by eig… ▽ More

    Submitted 9 September, 2021; v1 submitted 2 June, 2020; originally announced June 2020.

    Comments: Main part: 43 pages, Appendix: 21 pages. Some misprints corrected. Add comparison to a relevant circle of ideas by Goldfarb, Gould et al, and others. Add applications to finding roots of a univariate meromorphic function

  13. arXiv:2003.05252  [pdf, ps, other

    math.OC cs.LG math.DS stat.ML

    Coordinate-wise Armijo's condition: General case

    Authors: Tuyen Trung Truong

    Abstract: Let $z=(x,y)$ be coordinates for the product space $\mathbb{R}^{m_1}\times \mathbb{R}^{m_2}$. Let $f:\mathbb{R}^{m_1}\times \mathbb{R}^{m_2}\rightarrow \mathbb{R}$ be a $C^1$ function, and $\nabla f=(\partial _xf,\partial _yf)$ its gradient. Fix $0<α<1$. For a point $(x,y) \in \mathbb{R}^{m_1}\times \mathbb{R}^{m_2}$, a number $δ>0$ satisfies Armijo's condition at $(x,y)$ if the following inequali… ▽ More

    Submitted 11 March, 2020; originally announced March 2020.

    Comments: 6 pages. Preprint arXiv:1911.07820 is incorporated as a very special case

  14. arXiv:2001.05768  [pdf, ps, other

    math.OC cs.LG math.AP math.FA stat.ML

    Some convergent results for Backtracking Gradient Descent method on Banach spaces

    Authors: Tuyen Trung Truong

    Abstract: Our main result concerns the following condition: {\bf Condition C.} Let $X$ be a Banach space. A $C^1$ function $f:X\rightarrow \mathbb{R}$ satisfies Condition C if whenever $\{x_n\}$ weakly converges to $x$ and $\lim _{n\rightarrow\infty}||\nabla f(x_n)||=0$, then $\nabla f(x)=0$. We assume that there is given a canonical isomorphism between $X$ and its dual $X^*$, for example when $X$ is a… ▽ More

    Submitted 22 January, 2020; v1 submitted 16 January, 2020; originally announced January 2020.

    Comments: More details and improvements added, including: C^1 convex functions satisfy Condition C, normalized duality map**, prevalence and shyness of sets in Banach spaces, hereditary Lindelof property of weak topology. Several typos fixed. 10 pages

  15. arXiv:2001.02005  [pdf, ps, other

    math.OC cs.LG stat.ML

    Backtracking Gradient Descent allowing unbounded learning rates

    Authors: Tuyen Trung Truong

    Abstract: In unconstrained optimisation on an Euclidean space, to prove convergence in Gradient Descent processes (GD) $x_{n+1}=x_n-δ_n \nabla f(x_n)$ it usually is required that the learning rates $δ_n$'s are bounded: $δ_n\leq δ$ for some positive $δ$. Under this assumption, if the sequence $x_n$ converges to a critical point $z$, then with large values of $n$ the update will be small because… ▽ More

    Submitted 8 January, 2020; v1 submitted 7 January, 2020; originally announced January 2020.

    Comments: Convergence for Two-way Backtracking GD can be proven under more general assumptions, in particular valid for C^2 functions. In statement of Theorem 0.3, need to add the assumption that {f(x_n}) is non-increasing. Some typos corrected. 5 pages

  16. arXiv:1911.07820  [pdf, ps, other

    math.OC cs.LG math.NA stat.ML

    Coordinate-wise Armijo's condition

    Authors: Tuyen Trung Truong

    Abstract: Let $z=(x,y)$ be coordinates for the product space $\mathbb{R}^{m_1}\times \mathbb{R}^{m_2}$. Let $f:\mathbb{R}^{m_1}\times \mathbb{R}^{m_2}\rightarrow \mathbb{R}$ be a $C^1$ function, and $\nabla f=(\partial _xf,\partial _yf)$ its gradient. Fix $0<α<1$. For a point $(x,y) \in \mathbb{R}^{m_1}\times \mathbb{R}^{m_2}$, a number $δ>0$ satisfies Armijo's condition at $(x,y)$ if the following inequali… ▽ More

    Submitted 18 November, 2019; originally announced November 2019.

    Comments: 6 pages

  17. arXiv:1911.04221  [pdf, ps, other

    math.OC cs.LG math.NA stat.ML

    Convergence to minima for the continuous version of Backtracking Gradient Descent

    Authors: Tuyen Trung Truong

    Abstract: The main result of this paper is: {\bf Theorem.} Let $f:\mathbb{R}^k\rightarrow \mathbb{R}$ be a $C^{1}$ function, so that $\nabla f$ is locally Lipschitz continuous. Assume moreover that $f$ is $C^2$ near its generalised saddle points. Fix real numbers $δ_0>0$ and $0<α<1$. Then there is a smooth function $h:\mathbb{R}^k\rightarrow (0,δ_0]$ so that the map… ▽ More

    Submitted 13 November, 2019; v1 submitted 11 November, 2019; originally announced November 2019.

    Comments: 20 pages. Definition 1.2 is revised to ensure that Armijo's condition is satisfied. A part iv is added to Theorem 1.3. For readers' convenience, two lemmas are added to help make proofs easy to follow. Typos corrected, exposition revised

  18. arXiv:1908.09015  [pdf, other

    cs.DC cs.CR

    Towards Secure and Decentralized Sharing of IoT Data

    Authors: Hien Thi Thu Truong, Miguel Almeida, Ghassan Karame, Claudio Soriente

    Abstract: The Internet of Things (IoT) bears unprecedented security and scalability challenges due to the magnitude of data produced and exchanged by IoT devices and platforms. Some of those challenges are currently being addressed by coupling IoT applications with blockchains. However, current blockchain-backed IoT systems simply use the blockchain to store access control policies, thereby underutilizing t… ▽ More

    Submitted 23 August, 2019; originally announced August 2019.

  19. arXiv:1812.04293  [pdf, other

    cs.CR

    On the Security of Randomized Defenses Against Adversarial Samples

    Authors: Kumar Sharad, Giorgia Azzurra Marson, Hien Thi Thu Truong, Ghassan Karame

    Abstract: Deep Learning has been shown to be particularly vulnerable to adversarial samples. To combat adversarial strategies, numerous defensive techniques have been proposed. Among these, a promising approach is to use randomness in order to make the classification process unpredictable and presumably harder for the adversary to control. In this paper, we study the effectiveness of randomized defenses aga… ▽ More

    Submitted 16 March, 2020; v1 submitted 11 December, 2018; originally announced December 2018.

  20. arXiv:1808.05160  [pdf, other

    math.OC cs.LG math.NA stat.ML

    Backtracking gradient descent method for general $C^1$ functions, with applications to Deep Learning

    Authors: Tuyen Trung Truong, Tuan Hang Nguyen

    Abstract: While Standard gradient descent is one very popular optimisation method, its convergence cannot be proven beyond the class of functions whose gradient is globally Lipschitz continuous. As such, it is not actually applicable to realistic applications such as Deep Neural Networks. In this paper, we prove that its backtracking variant behaves very nicely, in particular convergence can be shown for al… ▽ More

    Submitted 4 April, 2019; v1 submitted 15 August, 2018; originally announced August 2018.

    Comments: 37 pages, 3 figures, 3 tables. Exposition improved, many new results are added. Accompanying source codes will be available at the link: https://github.com/hank-nguyen/MBT-optimizer

    Report number: The paper, with additional experiments and in combination with arXiv:2001.02005 and arXiv:2007.03618 - and a reference to a variant of Backtracking GD by the first author (applicable to Lojasiewicz gradient inequality), has been divided into 2 parts (titles changed) and accepted for publications in 2 journals (see below)

    Journal ref: Applied Mathematics and Optimization 2020, Minimax Theory and its Applications 2021

  21. arXiv:1803.07211  [pdf, other

    cs.CR

    DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification

    Authors: Hien Thi Thu Truong, Juhani Toivonen, Thien Duc Nguyen, Claudio Soriente, Sasu Tarkoma, N. Asokan

    Abstract: Copresence verification based on context can improve usability and strengthen security of many authentication and access control systems. By sensing and comparing their surroundings, two or more devices can tell whether they are copresent and use this information to make access control decisions. To the best of our knowledge, all context-based copresence verification mechanisms to date are suscept… ▽ More

    Submitted 18 February, 2019; v1 submitted 19 March, 2018; originally announced March 2018.

  22. Sensor-based Proximity Detection in the Face of Active Adversaries

    Authors: Babins Shrestha, Nitesh Saxena, Hien Thi Thu Truong, N. Asokan

    Abstract: Contextual proximity detection (or, co-presence detection) is a promising approach to defend against relay attacks in many mobile authentication systems. We present a systematic assessment of co-presence detection in the presence of a context-manipulating attacker. First, we show that it is feasible to manipulate, consistently control and stabilize the readings of different acoustic and physical e… ▽ More

    Submitted 4 April, 2021; v1 submitted 3 November, 2015; originally announced November 2015.

    Journal ref: IEEE Transactions on Mobile Computing ( Volume: 18, Issue: 2, Feb. 1 2019)

  23. The Company You Keep: Mobile Malware Infection Rates and Inexpensive Risk Indicators

    Authors: Hien Thi Thu Truong, Eemil Lagerspetz, Petteri Nurmi, Adam J. Oliner, Sasu Tarkoma, N. Asokan, Sourav Bhattacharya

    Abstract: There is little information from independent sources in the public domain about mobile malware infection rates. The only previous independent estimate (0.0009%) [12], was based on indirect measurements obtained from domain name resolution traces. In this paper, we present the first independent study of malware infection rates and associated risk factors using data collected directly from over 55,0… ▽ More

    Submitted 27 February, 2014; v1 submitted 11 December, 2013; originally announced December 2013.

    ACM Class: D.4.6

  24. arXiv:1012.1131  [pdf, ps, other

    cs.DC

    A Log Auditing Approach for Trust Management in Peer-to-Peer Collaboration

    Authors: Hien Thi Thu Truong, Claudia-Lavinia Ignat

    Abstract: Nowadays we are faced with an increasing popularity of social software including wikis, blogs, micro-blogs and online social networks such as Facebook and MySpace. Unfortunately, the mostly used social services are centralized and personal information is stored at a single vendor. This results in potential privacy problems as users do not have much control over how their private data is disseminat… ▽ More

    Submitted 6 December, 2010; originally announced December 2010.