Skip to main content

Showing 1–11 of 11 results for author: Yim, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.10059  [pdf, ps, other

    cs.RO

    Double-Anonymous Review for Robotics

    Authors: Justin K. Yim, Paul Nadan, James Zhu, Alexandra Stutt, J. Joe Payne, Catherine Pavlov, Aaron M. Johnson

    Abstract: Prior research has investigated the benefits and costs of double-anonymous review (DAR, also known as double-blind review) in comparison to single-anonymous review (SAR) and open review (OR). Several review papers have attempted to compile experimental results in peer review research both broadly and in engineering and computer science. This document summarizes prior research in peer review that m… ▽ More

    Submitted 14 June, 2024; originally announced June 2024.

    Comments: Originally published August 24, 2022

  2. arXiv:2406.02943  [pdf

    cs.IR cs.AI cs.CL cs.HC cs.NE

    The Task-oriented Queries Benchmark (ToQB)

    Authors: Keun Soo Yim

    Abstract: Task-oriented queries (e.g., one-shot queries to play videos, order food, or call a taxi) are crucial for assessing the quality of virtual assistants, chatbots, and other large language model (LLM)-based services. However, a standard benchmark for task-oriented queries is not yet available, as existing benchmarks in the relevant NLP (Natural Language Processing) fields have primarily focused on ta… ▽ More

    Submitted 5 June, 2024; originally announced June 2024.

    Comments: Data available on GitHub, https://github.com/google/task-oriented-queries

  3. arXiv:2405.16655  [pdf

    cs.CR cs.AI cs.CY cs.LG cs.SE

    Predicting Likely-Vulnerable Code Changes: Machine Learning-based Vulnerability Protections for Android Open Source Project

    Authors: Keun Soo Yim

    Abstract: This paper presents a framework that selectively triggers security reviews for incoming source code changes. Functioning as a review bot within a code review service, the framework can automatically request additional security reviews at pre-submit time before the code changes are submitted to a source code repository. Because performing such secure code reviews add cost, the framework employs a c… ▽ More

    Submitted 26 May, 2024; originally announced May 2024.

    Comments: This is a preprint of an article that has been submitted to a journal for publication

  4. arXiv:2403.13124  [pdf, other

    cs.RO

    Cooperative Modular Manipulation with Numerous Cable-Driven Robots for Assistive Construction and Gap Crossing

    Authors: Kevin Murphy, Joao C. V. Soares, Justin K. Yim, Dustin Nottage, Ahmet Soylemezoglu, Joao Ramos

    Abstract: Soldiers in the field often need to cross negative obstacles, such as rivers or canyons, to reach goals or safety. Military gap crossing involves on-site temporary bridges construction. However, this procedure is conducted with dangerous, time and labor intensive operations, and specialized machinery. We envision a scalable robotic solution inspired by advancements in force-controlled and Cable Dr… ▽ More

    Submitted 19 March, 2024; originally announced March 2024.

    Comments: 8 pages, 9 figures. Submit to IROS 2024

  5. arXiv:2308.08401  [pdf, other

    cs.RO

    The Simplest Walking Robot: A bipedal robot with one actuator and two rigid bodies

    Authors: James Kyle, Justin K. Yim, Kendall Hart, Sarah Bergbreiter, Aaron M. Johnson

    Abstract: We present the design and experimental results of the first 1-DOF, hip-actuated bipedal robot. While passive dynamic walking is simple by nature, many existing bipeds inspired by this form of walking are complex in control, mechanical design, or both. Our design using only two rigid bodies connected by a single motor aims to enable exploration of walking at smaller sizes where more complex designs… ▽ More

    Submitted 30 October, 2023; v1 submitted 16 August, 2023; originally announced August 2023.

    Comments: 2023 IEEE-RAS International Conference on Humanoid Robots

  6. arXiv:2304.02129  [pdf, other

    cs.RO

    Proprioception and reaction for walking among entanglements

    Authors: Justin K. Yim, Jiming Ren, David Ologan, Selvin Garcia Gonzalez, Aaron M. Johnson

    Abstract: Entanglements like vines and branches in natural settings or cords and pipes in human spaces prevent mobile robots from accessing many environments. Legged robots should be effective in these settings, and more so than wheeled or tracked platforms, but naive controllers quickly become entangled and stuck. In this paper we present a method for proprioception aimed specifically at the task of sensin… ▽ More

    Submitted 9 September, 2023; v1 submitted 4 April, 2023; originally announced April 2023.

    Comments: 2023 IEEE/RSJ International Conference on Intelligent Robots and Systems

  7. arXiv:2303.04781  [pdf, other

    cs.RO

    Proprioception and Tail Control Enable Extreme Terrain Traversal by Quadruped Robots

    Authors: Yanhao Yang, Joseph Norby, Justin K. Yim, Aaron M. Johnson

    Abstract: Legged robots leverage ground contacts and the reaction forces they provide to achieve agile locomotion. However, uncertainty coupled with contact discontinuities can lead to failure, especially in real-world environments with unexpected height variations such as rocky hills or curbs. To enable dynamic traversal of extreme terrain, this work introduces 1) a proprioception-based gait planner for es… ▽ More

    Submitted 8 September, 2023; v1 submitted 8 March, 2023; originally announced March 2023.

    Comments: 8 pages, 9 figures, accepted to IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) 2023

  8. arXiv:2101.05201  [pdf, other

    eess.SP cs.LG stat.ML

    Optimisation of Spectral Wavelets for Persistence-based Graph Classification

    Authors: Ka Man Yim, Jacob Leygonie

    Abstract: A graph's spectral wavelet signature determines a filtration, and consequently an associated set of extended persistence diagrams. We propose a framework that optimises the choice of wavelet for a dataset of graphs, such that their associated persistence diagrams capture features of the graphs that are best suited to a given data science problem. Since the spectral wavelet signature of a graph is… ▽ More

    Submitted 1 March, 2021; v1 submitted 10 January, 2021; originally announced January 2021.

  9. arXiv:1810.00424  [pdf, other

    cs.LG cs.AI cs.NE stat.ML

    Interpretable Neuron Structuring with Graph Spectral Regularization

    Authors: Alexander Tong, David van Dijk, Jay S. Stanley III, Matthew Amodio, Kristina Yim, Rebecca Muhle, James Noonan, Guy Wolf, Smita Krishnaswamy

    Abstract: While neural networks are powerful approximators used to classify or embed data into lower dimensional spaces, they are often regarded as black boxes with uninterpretable features. Here we propose Graph Spectral Regularization for making hidden layers more interpretable without significantly impacting performance on the primary task. Taking inspiration from spatial organization and localization of… ▽ More

    Submitted 14 February, 2020; v1 submitted 30 September, 2018; originally announced October 2018.

    Comments: 12 pages, 6 figures, presented at IDA 2020

  10. arXiv:1807.00435  [pdf, other

    cs.CR

    Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey

    Authors: Gaurav Choudhary, Vishal Sharma, Ilsun You, Kangbin Yim, Ing-Ray Chen, **-Hee Cho

    Abstract: Unmanned Aerial Vehicles (UAV)-based civilian or military applications become more critical to serving civilian and/or military missions. The significantly increased attention on UAV applications also has led to security concerns particularly in the context of networked UAVs. Networked UAVs are vulnerable to malicious attacks over open-air radio space and accordingly, intrusion detection systems (… ▽ More

    Submitted 1 July, 2018; originally announced July 2018.

    Comments: 6 pages, 2 figures

  11. arXiv:1804.05549  [pdf, ps, other

    cs.NI cs.CR

    A framework for mitigating zero-day attacks in IoT

    Authors: Vishal Sharma, Jiyoon Kim, Soonhyun Kwon, Ilsun You, Kyungroul Lee, Kangbin Yim

    Abstract: Internet of Things (IoT) aims at providing connectivity between every computing entity. However, this facilitation is also leading to more cyber threats which may exploit the presence of a vulnerability of a period of time. One such vulnerability is the zero-day threat that may lead to zero-day attacks which are detrimental to an enterprise as well as the network security. In this article, a study… ▽ More

    Submitted 16 April, 2018; originally announced April 2018.

    Comments: 6 Pages, 6 Figures, Conference on Information Security and Cryptography (CISC-S'17)

    Journal ref: CISC-S'17, June 22-23, 2017, Sinchang-Asan, South Korea, pp.1-6