(Translated by https://www.hiragana.jp/)
Search | arXiv e-print repository
Skip to main content

Showing 1–50 of 53 results for author: Hong, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2409.12572  [pdf, other

    cs.NI cs.CR

    Scalable and Robust Mobile Activity Fingerprinting via Over-the-Air Control Channel in 5G Networks

    Authors: Gunwoo Yoon, Byeongdo Hong

    Abstract: 5G has undergone significant changes in its over-the-air control channel architecture compared to legacy networks, aimed at enhancing performance. These changes have unintentionally strengthened the security of control channels, reducing vulnerabilities in radio channels for attackers. However, based on our experimental results, less than 10% of Physical Downlink Control Channel (PDCCH) messages c… ▽ More

    Submitted 19 September, 2024; originally announced September 2024.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  2. arXiv:2409.02390  [pdf, other

    cs.NE cs.AI cs.CV q-bio.NC

    Neural Dynamics Model of Visual Decision-Making: Learning from Human Experts

    Authors: Jie Su, Fang Cai, Shu-Kuo Zhao, Xin-Yi Wang, Tian-Yi Qian, Da-Hui Wang, Bo Hong

    Abstract: Uncovering the fundamental neural correlates of biological intelligence, developing mathematical models, and conducting computational simulations are critical for advancing new paradigms in artificial intelligence (AI). In this study, we implemented a comprehensive visual decision-making model that spans from visual input to behavioral output, using a neural dynamics modeling approach. Drawing ins… ▽ More

    Submitted 3 September, 2024; originally announced September 2024.

  3. arXiv:2409.01630  [pdf, other

    cs.RO cs.AI cs.ET

    SafeEmbodAI: a Safety Framework for Mobile Robots in Embodied AI Systems

    Authors: Wenxiao Zhang, Xiangrui Kong, Thomas Braunl, Jin B. Hong

    Abstract: Embodied AI systems, including AI-powered robots that autonomously interact with the physical world, stand to be significantly advanced by Large Language Models (LLMs), which enable robots to better understand complex language commands and perform advanced tasks with enhanced comprehension and adaptability, highlighting their potential to improve embodied AI capabilities. However, this advancement… ▽ More

    Submitted 3 September, 2024; originally announced September 2024.

  4. arXiv:2408.16633  [pdf

    cs.RO cs.AI

    Optimizing Automated Picking Systems in Warehouse Robots Using Machine Learning

    Authors: Keqin Li, Jin Wang, Xubo Wu, Xirui Peng, Runmian Chang, Xiaoyu Deng, Yiwen Kang, Yue Yang, Fanghao Ni, Bo Hong

    Abstract: With the rapid growth of global e-commerce, the demand for automation in the logistics industry is increasing. This study focuses on automated picking systems in warehouses, utilizing deep learning and reinforcement learning technologies to enhance picking efficiency and accuracy while reducing system failure rates. Through empirical analysis, we demonstrate the effectiveness of these technologies… ▽ More

    Submitted 29 August, 2024; originally announced August 2024.

  5. arXiv:2408.03515  [pdf, other

    cs.RO cs.AI

    A Study on Prompt Injection Attack Against LLM-Integrated Mobile Robotic Systems

    Authors: Wenxiao Zhang, Xiangrui Kong, Conan Dewitt, Thomas Braunl, Jin B. Hong

    Abstract: The integration of Large Language Models (LLMs) like GPT-4o into robotic systems represents a significant advancement in embodied artificial intelligence. These models can process multi-modal prompts, enabling them to generate more context-aware responses. However, this integration is not without challenges. One of the primary concerns is the potential security risks associated with using LLMs in… ▽ More

    Submitted 8 September, 2024; v1 submitted 6 August, 2024; originally announced August 2024.

  6. Exploiting Diffusion Prior for Out-of-Distribution Detection

    Authors: Armando Zhu, Jiabei Liu, Keqin Li, Shuying Dai, Bo Hong, Peng Zhao, Changsong Wei

    Abstract: Out-of-distribution (OOD) detection is crucial for deploying robust machine learning models, especially in areas where security is critical. However, traditional OOD detection methods often fail to capture complex data distributions from large scale date. In this paper, we present a novel approach for OOD detection that leverages the generative ability of diffusion models and the powerful feature… ▽ More

    Submitted 21 August, 2024; v1 submitted 16 June, 2024; originally announced June 2024.

    Journal ref: Irish Interdisciplinary Journal of Science & Research (IIJSR), Volume 8, Issue 2 (2024) 171-185

  7. arXiv:2406.04151  [pdf, other

    cs.AI cs.CL

    AgentGym: Evolving Large Language Model-based Agents across Diverse Environments

    Authors: Zhiheng Xi, Yiwen Ding, Wenxiang Chen, Boyang Hong, Honglin Guo, Junzhe Wang, Dingwen Yang, Chenyang Liao, Xin Guo, Wei He, Songyang Gao, Lu Chen, Rui Zheng, Yicheng Zou, Tao Gui, Qi Zhang, Xipeng Qiu, Xuanjing Huang, Zuxuan Wu, Yu-Gang Jiang

    Abstract: Building generalist agents that can handle diverse tasks and evolve themselves across different environments is a long-term goal in the AI community. Large language models (LLMs) are considered a promising foundation to build such agents due to their generalized capabilities. Current approaches either have LLM-based agents imitate expert-provided trajectories step-by-step, requiring human supervis… ▽ More

    Submitted 6 June, 2024; originally announced June 2024.

    Comments: Project site: https://agentgym.github.io

  8. Cross-Task Multi-Branch Vision Transformer for Facial Expression and Mask Wearing Classification

    Authors: Armando Zhu, Keqin Li, Tong Wu, Peng Zhao, Bo Hong

    Abstract: With wearing masks becoming a new cultural norm, facial expression recognition (FER) while taking masks into account has become a significant challenge. In this paper, we propose a unified multi-branch vision transformer for facial expression recognition and mask wearing classification tasks. Our approach extracts shared features for both tasks using a dual-branch architecture that obtains multi-s… ▽ More

    Submitted 30 April, 2024; v1 submitted 22 April, 2024; originally announced April 2024.

    Journal ref: Journal of Computer Technology and Applied Mathematics, vol. 1, no. 1, Apr. 2024, pp. 46-53,

  9. The application of Augmented Reality (AR) in Remote Work and Education

    Authors: Keqin Li, Peng Xirui, Jintong Song, Bo Hong, Jin Wang

    Abstract: With the rapid advancement of technology, Augmented Reality (AR) technology, known for its ability to deeply integrate virtual information with the real world, is gradually transforming traditional work modes and teaching methods. Particularly in the realms of remote work and online education, AR technology demonstrates a broad spectrum of application prospects. This paper delves into the applicat… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

    Report number: JCTAM-2024041200065

  10. arXiv:2404.03635  [pdf, other

    cs.CV cs.AI cs.CL cs.LG cs.MM

    WorDepth: Variational Language Prior for Monocular Depth Estimation

    Authors: Ziyao Zeng, Daniel Wang, Fengyu Yang, Hyoungseob Park, Yangchao Wu, Stefano Soatto, Byung-Woo Hong, Dong Lao, Alex Wong

    Abstract: Three-dimensional (3D) reconstruction from a single image is an ill-posed problem with inherent ambiguities, i.e. scale. Predicting a 3D scene from text description(s) is similarly ill-posed, i.e. spatial arrangements of objects described. We investigate the question of whether two inherently ambiguous modalities can be used in conjunction to produce metric-scaled reconstructions. To test this, we… ▽ More

    Submitted 2 June, 2024; v1 submitted 4 April, 2024; originally announced April 2024.

  11. arXiv:2404.01954  [pdf, other

    cs.CL cs.AI

    HyperCLOVA X Technical Report

    Authors: Kang Min Yoo, Jaegeun Han, Sookyo In, Heewon Jeon, Jisu Jeong, Jaewook Kang, Hyunwook Kim, Kyung-Min Kim, Munhyong Kim, Sungju Kim, Donghyun Kwak, Hanock Kwak, Se Jung Kwon, Bado Lee, Dongsoo Lee, Gichang Lee, Jooho Lee, Baeseong Park, Seongjin Shin, Joonsang Yu, Seolki Baek, Sumin Byeon, Eungsup Cho, Dooseok Choe, Jeesung Han , et al. (371 additional authors not shown)

    Abstract: We introduce HyperCLOVA X, a family of large language models (LLMs) tailored to the Korean language and culture, along with competitive capabilities in English, math, and coding. HyperCLOVA X was trained on a balanced mix of Korean, English, and code data, followed by instruction-tuning with high-quality human-annotated datasets while abiding by strict safety guidelines reflecting our commitment t… ▽ More

    Submitted 13 April, 2024; v1 submitted 2 April, 2024; originally announced April 2024.

    Comments: 44 pages; updated authors list and fixed author names

  12. arXiv:2403.17458  [pdf, ps, other

    cs.CR cs.LG

    Expectations Versus Reality: Evaluating Intrusion Detection Systems in Practice

    Authors: Jake Hesford, Daniel Cheng, Alan Wan, Larry Huynh, Seungho Kim, Hyoungshick Kim, Jin B. Hong

    Abstract: Our paper provides empirical comparisons between recent IDSs to provide an objective comparison between them to help users choose the most appropriate solution based on their requirements. Our results show that no one solution is the best, but is dependent on external variables such as the types of attacks, complexity, and network environment in the dataset. For example, BoT_IoT and Stratosphere I… ▽ More

    Submitted 28 March, 2024; v1 submitted 26 March, 2024; originally announced March 2024.

    Comments: 10 pages

    MSC Class: 68M25; 68M20 ACM Class: C.4; D.m

  13. arXiv:2403.16209  [pdf

    cs.CV cs.AI

    Image Captioning in news report scenario

    Authors: Tianrui Liu, Qi Cai, Changxin Xu, Bo Hong, Jize Xiong, Yuxin Qiao, Tsungwei Yang

    Abstract: Image captioning strives to generate pertinent captions for specified images, situating itself at the crossroads of Computer Vision (CV) and Natural Language Processing (NLP). This endeavor is of paramount importance with far-reaching applications in recommendation systems, news outlets, social media, and beyond. Particularly within the realm of news reporting, captions are expected to encompass d… ▽ More

    Submitted 1 April, 2024; v1 submitted 24 March, 2024; originally announced March 2024.

    Comments: 10 pages, 4 figures

  14. arXiv:2403.16206  [pdf

    cs.AI

    Rumor Detection with a novel graph neural network approach

    Authors: Tianrui Liu, Qi Cai, Changxin Xu, Bo Hong, Fanghao Ni, Yuxin Qiao, Tsungwei Yang

    Abstract: The wide spread of rumors on social media has caused a negative impact on people's daily life, leading to potential panic, fear, and mental health problems for the public. How to debunk rumors as early as possible remains a challenging problem. Existing studies mainly leverage information propagation structure to detect rumors, while very few works focus on correlation among users that they may co… ▽ More

    Submitted 1 April, 2024; v1 submitted 24 March, 2024; originally announced March 2024.

    Comments: 10 pages, 5 figures

  15. arXiv:2402.06772  [pdf, other

    q-bio.QM cs.AI cs.CE cs.LG

    Retrosynthesis Prediction via Search in (Hyper) Graph

    Authors: Zixun Lan, Binjie Hong, Jiajun Zhu, Zuo Zeng, Zhenfu Liu, Limin Yu, Fei Ma

    Abstract: Predicting reactants from a specified core product stands as a fundamental challenge within organic synthesis, termed retrosynthesis prediction. Recently, semi-template-based methods and graph-edits-based methods have achieved good performance in terms of both interpretability and accuracy. However, due to their mechanisms these methods cannot predict complex reactions, e.g., reactions with multip… ▽ More

    Submitted 9 February, 2024; originally announced February 2024.

  16. arXiv:2402.05808  [pdf, other

    cs.AI cs.CL cs.LG

    Training Large Language Models for Reasoning through Reverse Curriculum Reinforcement Learning

    Authors: Zhiheng Xi, Wenxiang Chen, Boyang Hong, Senjie Jin, Rui Zheng, Wei He, Yiwen Ding, Shichun Liu, Xin Guo, Junzhe Wang, Honglin Guo, Wei Shen, Xiaoran Fan, Yuhao Zhou, Shihan Dou, Xiao Wang, Xinbo Zhang, Peng Sun, Tao Gui, Qi Zhang, Xuanjing Huang

    Abstract: In this paper, we propose R$^3$: Learning Reasoning through Reverse Curriculum Reinforcement Learning (RL), a novel method that employs only outcome supervision to achieve the benefits of process supervision for large language models. The core challenge in applying RL to complex reasoning is to identify a sequence of actions that result in positive rewards and provide appropriate supervision for o… ▽ More

    Submitted 17 March, 2024; v1 submitted 8 February, 2024; originally announced February 2024.

    Comments: Preprint. Codes released: https://github.com/WooooDyy/LLM-Reverse-Curriculum-RL

  17. arXiv:2401.17221  [pdf, other

    cs.CV cs.AI cs.CL cs.LG

    MouSi: Poly-Visual-Expert Vision-Language Models

    Authors: Xiaoran Fan, Tao Ji, Changhao Jiang, Shuo Li, Senjie Jin, Sirui Song, Junke Wang, Boyang Hong, Lu Chen, Guodong Zheng, Ming Zhang, Caishuang Huang, Rui Zheng, Zhiheng Xi, Yuhao Zhou, Shihan Dou, Junjie Ye, Hang Yan, Tao Gui, Qi Zhang, Xipeng Qiu, Xuanjing Huang, Zuxuan Wu, Yu-Gang Jiang

    Abstract: Current large vision-language models (VLMs) often encounter challenges such as insufficient capabilities of a single visual component and excessively long visual tokens. These issues can limit the model's effectiveness in accurately interpreting complex visual information and over-lengthy contextual information. Addressing these challenges is crucial for enhancing the performance and applicability… ▽ More

    Submitted 30 January, 2024; originally announced January 2024.

  18. arXiv:2310.09485  [pdf, other

    cs.LG

    Applying Bayesian Ridge Regression AI Modeling in Virus Severity Prediction

    Authors: Jai Pal, Bryan Hong

    Abstract: Artificial intelligence (AI) is a powerful tool for reshaping healthcare systems. In healthcare, AI is invaluable for its capacity to manage vast amounts of data, which can lead to more accurate and speedy diagnoses, ultimately easing the workload on healthcare professionals. As a result, AI has proven itself to be a power tool across various industries, simplifying complex tasks and pattern recog… ▽ More

    Submitted 4 December, 2023; v1 submitted 14 October, 2023; originally announced October 2023.

    Comments: 7 pages, 2 figures, 5 listings

  19. arXiv:2309.09190  [pdf, other

    cs.AR eess.SY

    Generalized Gain and Impedance Expressions for Single-Transistor Amplifiers

    Authors: Brian Hong

    Abstract: This expository manuscript presents generalized expressions for the low-frequency voltage gain and terminal impedances of each of the three fundamental bipolar-amplifier topologies (i.e., common emitter, common base, and common collector). Unlike the formulas that students typically learn and designers typically use, the equations presented in this tutorial assume the most general set of condition… ▽ More

    Submitted 17 September, 2023; originally announced September 2023.

  20. arXiv:2309.07864  [pdf, other

    cs.AI cs.CL

    The Rise and Potential of Large Language Model Based Agents: A Survey

    Authors: Zhiheng Xi, Wenxiang Chen, Xin Guo, Wei He, Yiwen Ding, Boyang Hong, Ming Zhang, Junzhe Wang, Senjie Jin, Enyu Zhou, Rui Zheng, Xiaoran Fan, Xiao Wang, Limao Xiong, Yuhao Zhou, Weiran Wang, Changhao Jiang, Yicheng Zou, Xiangyang Liu, Zhangyue Yin, Shihan Dou, Rongxiang Weng, Wensen Cheng, Qi Zhang, Wenjuan Qin , et al. (4 additional authors not shown)

    Abstract: For a long time, humanity has pursued artificial intelligence (AI) equivalent to or surpassing the human level, with AI agents considered a promising vehicle for this pursuit. AI agents are artificial entities that sense their environment, make decisions, and take actions. Many efforts have been made to develop intelligent agents, but they mainly focus on advancement in algorithms or training stra… ▽ More

    Submitted 19 September, 2023; v1 submitted 14 September, 2023; originally announced September 2023.

    Comments: 86 pages, 12 figures

  21. arXiv:2309.06221  [pdf, other

    cs.CV

    Use neural networks to recognize students' handwritten letters and incorrect symbols

    Authors: JiaJun Zhu, Zichuan Yang, Binjie Hong, Jiacheng Song, Jiwei Wang, Tianhao Chen, Shuilan Yang, Zixun Lan, Fei Ma

    Abstract: Correcting students' multiple-choice answers is a repetitive and mechanical task that can be considered an image multi-classification task. Assuming possible options are 'abcd' and the correct option is one of the four, some students may write incorrect symbols or options that do not exist. In this paper, five classifications were set up - four for possible correct options and one for other incorr… ▽ More

    Submitted 12 September, 2023; originally announced September 2023.

  22. arXiv:2301.12071  [pdf, other

    cs.LG q-bio.MN

    RCsearcher: Reaction Center Identification in Retrosynthesis via Deep Q-Learning

    Authors: Zixun Lan, Zuo Zeng, Binjie Hong, Zhenfu Liu, Fei Ma

    Abstract: The reaction center consists of atoms in the product whose local properties are not identical to the corresponding atoms in the reactants. Prior studies on reaction center identification are mainly on semi-templated retrosynthesis methods. Moreover, they are limited to single reaction center identification. However, many reaction centers are comprised of multiple bonds or atoms in reality. We refe… ▽ More

    Submitted 27 January, 2023; originally announced January 2023.

  23. arXiv:2301.06043  [pdf, other

    eess.IV cs.CV

    Unsupervised Cardiac Segmentation Utilizing Synthesized Images from Anatomical Labels

    Authors: Sihan Wang, Fuping Wu, Lei Li, Zheyao Gao, Byung-Woo Hong, Xiahai Zhuang

    Abstract: Cardiac segmentation is in great demand for clinical practice. Due to the enormous labor of manual delineation, unsupervised segmentation is desired. The ill-posed optimization problem of this task is inherently challenging, requiring well-designed constraints. In this work, we propose an unsupervised framework for multi-class segmentation with both intensity and shape constraints. Firstly, we ext… ▽ More

    Submitted 15 January, 2023; originally announced January 2023.

  24. arXiv:2208.04580  [pdf, other

    cs.LG cs.AI

    More Interpretable Graph Similarity Computation via Maximum Common Subgraph Inference

    Authors: Zixun Lan, Binjie Hong, Ye Ma, Fei Ma

    Abstract: Graph similarity measurement, which computes the distance/similarity between two graphs, arises in various graph-related tasks. Recent learning-based methods lack interpretability, as they directly transform interaction information between two graphs into one hidden vector and then map it to similarity. To cope with this problem, this study proposes a more interpretable end-to-end paradigm for gra… ▽ More

    Submitted 16 September, 2022; v1 submitted 9 August, 2022; originally announced August 2022.

  25. arXiv:2204.12084  [pdf, other

    cs.CV cs.AI

    U-Net with ResNet Backbone for Garment Landmarking Purpose

    Authors: Khay Boon Hong

    Abstract: We build a heatmap-based landmark detection model to locate important landmarks on 2D RGB garment images. The main goal is to detect edges, corners and suitable interior region of the garments. This let us re-create 3D garments in modern 3D editing software by incorporate landmark detection model and texture unwrapping. We use a U-net architecture with ResNet backbone to build the model. With an a… ▽ More

    Submitted 26 April, 2022; originally announced April 2022.

    Comments: A draft for purpose of archive, not intended for official academic uses

    ACM Class: I.2.6

  26. arXiv:2203.16034  [pdf, other

    cs.CV cs.AI cs.LG

    Monitored Distillation for Positive Congruent Depth Completion

    Authors: Tian Yu Liu, Parth Agrawal, Allison Chen, Byung-Woo Hong, Alex Wong

    Abstract: We propose a method to infer a dense depth map from a single image, its calibration, and the associated sparse point cloud. In order to leverage existing models (teachers) that produce putative depth maps, we propose an adaptive knowledge distillation approach that yields a positive congruent training process, wherein a student model avoids learning the error modes of the teachers. In the absence… ▽ More

    Submitted 25 October, 2022; v1 submitted 29 March, 2022; originally announced March 2022.

  27. arXiv:2109.08791  [pdf, other

    eess.IV cs.AI cs.CV cs.LG

    Small Lesion Segmentation in Brain MRIs with Subpixel Embedding

    Authors: Alex Wong, Allison Chen, Yangchao Wu, Safa Cicek, Alexandre Tiard, Byung-Woo Hong, Stefano Soatto

    Abstract: We present a method to segment MRI scans of the human brain into ischemic stroke lesion and normal tissues. We propose a neural network architecture in the form of a standard encoder-decoder where predictions are guided by a spatial expansion embedding network. Our embedding network learns features that can resolve detailed structures in the brain without the need for high-resolution training imag… ▽ More

    Submitted 17 September, 2021; originally announced September 2021.

  28. arXiv:2108.06467  [pdf, ps, other

    cs.LG cs.AI math.OC

    Optimal Approximation with Sparse Neural Networks and Applications

    Authors: Khay Boon Hong

    Abstract: We use deep sparsely connected neural networks to measure the complexity of a function class in $L^2(\mathbb R^d)$ by restricting connectivity and memory requirement for storing the neural networks. We also introduce representation system - a countable collection of functions to guide neural networks, since approximation theory with representation system has been well developed in Mathematics. We… ▽ More

    Submitted 14 August, 2021; originally announced August 2021.

    Comments: 37 pages, no figures. Undergraduate Final Year Project

  29. arXiv:2106.12265  [pdf, other

    cs.CV

    Instance-based Vision Transformer for Subtyping of Papillary Renal Cell Carcinoma in Histopathological Image

    Authors: Zeyu Gao, Bangyang Hong, Xianli Zhang, Yang Li, Chang Jia, Jialun Wu, Chunbao Wang, Deyu Meng, Chen Li

    Abstract: Histological subtype of papillary (p) renal cell carcinoma (RCC), type 1 vs. type 2, is an essential prognostic factor. The two subtypes of pRCC have a similar pattern, i.e., the papillary architecture, yet some subtle differences, including cellular and cell-layer level patterns. However, the cellular and cell-layer level patterns almost cannot be captured by existing CNN-based models in large-si… ▽ More

    Submitted 23 June, 2021; originally announced June 2021.

    Comments: Accepted by MICCAI 2021

  30. arXiv:2106.03010  [pdf, other

    cs.CV cs.LG cs.RO

    An Adaptive Framework for Learning Unsupervised Depth Completion

    Authors: Alex Wong, Xiaohan Fei, Byung-Woo Hong, Stefano Soatto

    Abstract: We present a method to infer a dense depth map from a color image and associated sparse depth measurements. Our main contribution lies in the design of an annealing process for determining co-visibility (occlusions, disocclusions) and the degree of regularization to impose on the model. We show that regularization and co-visibility are related via the fitness (residual) of model to data and both c… ▽ More

    Submitted 24 August, 2021; v1 submitted 5 June, 2021; originally announced June 2021.

  31. Model-based Cybersecurity Analysis: Past Work and Future Directions

    Authors: Simon Yusuf Enoch, Mengmeng Ge, Jin B. Hong, Dong Seong Kim

    Abstract: Model-based evaluation in cybersecurity has a long history. Attack Graphs (AGs) and Attack Trees (ATs) were the earlier developed graphical security models for cybersecurity analysis. However, they have limitations (e.g., scalability problem, state-space explosion problem, etc.) and lack the ability to capture other security features (e.g., countermeasures). To address the limitations and to cope… ▽ More

    Submitted 24 May, 2021; v1 submitted 18 May, 2021; originally announced May 2021.

    Comments: 10 pages

    Journal ref: 2021 Annual Reliability and Maintainability Symposium (RAMS)

  32. arXiv:2105.00220  [pdf, other

    cs.LG cs.CV

    Generative Adversarial Networks via a Composite Annealing of Noise and Diffusion

    Authors: Kensuke Nakamura, Simon Korman, Byung-Woo Hong

    Abstract: Generative adversarial network (GAN) is a framework for generating fake data using a set of real examples. However, GAN is unstable in the training stage. In order to stabilize GANs, the noise injection has been used to enlarge the overlap of the real and fake distributions at the cost of increasing variance. The diffusion (or smoothing) may reduce the intrinsic underlying dimensionality of data b… ▽ More

    Submitted 31 July, 2022; v1 submitted 1 May, 2021; originally announced May 2021.

  33. arXiv:2012.11073  [pdf, ps, other

    cs.LG

    Regularization in network optimization via trimmed stochastic gradient descent with noisy label

    Authors: Kensuke Nakamura, Bong-Soo Sohn, Kyoung-Jae Won, Byung-Woo Hong

    Abstract: Regularization is essential for avoiding over-fitting to training data in network optimization, leading to better generalization of the trained networks. The label noise provides a strong implicit regularization by replacing the target ground truth labels of training examples by uniform random labels. However, it can cause undesirable misleading gradients due to the large loss associated with inco… ▽ More

    Submitted 2 May, 2022; v1 submitted 20 December, 2020; originally announced December 2020.

  34. arXiv:2011.04322  [pdf, other

    cs.CY cs.CR cs.HC

    An Empirical Evaluation of Bluetooth-based Decentralized Contact Tracing in Crowds

    Authors: Hsu-Chun Hsiao, Chun-Ying Huang, Shin-Ming Cheng, Bing-Kai Hong, Hsin-Yuan Hu, Chia-Chien Wu, Jian-Sin Lee, Shih-Hong Wang, Wei Jeng

    Abstract: Digital contact tracing is being used by many countries to help contain COVID-19's spread in a post-lockdown world. Among the various available techniques, decentralized contact tracing that uses Bluetooth received signal strength indication (RSSI) to detect proximity is considered less of a privacy risk than approaches that rely on collecting absolute locations via GPS, cellular-tower history, or… ▽ More

    Submitted 4 November, 2021; v1 submitted 9 November, 2020; originally announced November 2020.

  35. arXiv:2008.06181  [pdf, other

    cs.CV

    Apparel-invariant Feature Learning for Apparel-changed Person Re-identification

    Authors: Zhengxu Yu, Yilun Zhao, Bin Hong, Zhongming Jin, Jianqiang Huang, Deng Cai, Xiaofei He, Xian-Sheng Hua

    Abstract: With the rise of deep learning methods, person Re-Identification (ReID) performance has been improved tremendously in many public datasets. However, most public ReID datasets are collected in a short time window in which persons' appearance rarely changes. In real-world applications such as in a shopping mall, the same person's clothing may change, and different persons may wearing similar clothes… ▽ More

    Submitted 16 August, 2020; v1 submitted 13 August, 2020; originally announced August 2020.

    Comments: 10 pages

  36. arXiv:2008.01650  [pdf, other

    cs.CY cs.SI stat.AP

    Exposure Density and Neighborhood Disparities in COVID-19 Infection Risk: Using Large-scale Geolocation Data to Understand Burdens on Vulnerable Communities

    Authors: Boyeong Hong, Bartosz Bonczak, Arpit Gupta, Lorna Thorpe, Constantine E. Kontokosta

    Abstract: This study develops a new method to quantify neighborhood activity levels at high spatial and temporal resolutions and test whether, and to what extent, behavioral responses to social distancing policies vary with socioeconomic and demographic characteristics. We define exposure density as a measure of both the localized volume of activity in a defined area and the proportion of activity occurring… ▽ More

    Submitted 4 August, 2020; originally announced August 2020.

  37. Composite Metrics for Network Security Analysis

    Authors: Simon Yusuf Enoch, Jin B. Hong, Mengmeng Ge, Dong Seong Kim

    Abstract: Security metrics present the security level of a system or a network in both qualitative and quantitative ways. In general, security metrics are used to assess the security level of a system and to achieve security goals. There are a lot of security metrics for security analysis, but there is no systematic classification of security metrics that are based on network reachability information. To ad… ▽ More

    Submitted 17 July, 2020; v1 submitted 7 July, 2020; originally announced July 2020.

    Comments: 21 pages journal

    Journal ref: Software Networking, 2018(1), 137-160

  38. arXiv:2004.06341  [pdf, ps, other

    cs.LG cs.CV stat.ML

    Stochastic batch size for adaptive regularization in deep network optimization

    Authors: Kensuke Nakamura, Stefano Soatto, Byung-Woo Hong

    Abstract: We propose a first-order stochastic optimization algorithm incorporating adaptive regularization applicable to machine learning problems in deep learning framework. The adaptive regularization is imposed by stochastic process in determining batch size for each model parameter at each optimization iteration. The stochastic batch size is determined by the update probability of each parameter followi… ▽ More

    Submitted 14 April, 2020; originally announced April 2020.

  39. arXiv:1907.09750  [pdf, ps, other

    cs.LG cs.AI stat.ML

    Adaptive Regularization via Residual Smoothing in Deep Learning Optimization

    Authors: Junghee Cho, Junseok Kwon, Byung-Woo Hong

    Abstract: We present an adaptive regularization algorithm that can be effectively applied to the optimization problem in deep learning framework. Our regularization algorithm aims to take into account the fitness of data to the current state of model in the determination of regularity to achieve better generalization. The degree of regularization at each element in the target space of the neural network arc… ▽ More

    Submitted 30 August, 2019; v1 submitted 23 July, 2019; originally announced July 2019.

  40. arXiv:1907.08931  [pdf, ps, other

    cs.LG cs.NE stat.ML

    Adaptive Weight Decay for Deep Neural Networks

    Authors: Kensuke Nakamura, Byung-Woo Hong

    Abstract: Regularization in the optimization of deep neural networks is often critical to avoid undesirable over-fitting leading to better generalization of model. One of the most popular regularization algorithms is to impose L-2 penalty on the model parameters resulting in the decay of parameters, called weight-decay, and the decay rate is generally constant to all the model parameters in the course of op… ▽ More

    Submitted 7 August, 2019; v1 submitted 21 July, 2019; originally announced July 2019.

  41. arXiv:1903.07309  [pdf, other

    cs.CV

    Bilateral Cyclic Constraint and Adaptive Regularization for Unsupervised Monocular Depth Prediction

    Authors: Alex Wong, Byung-Woo Hong, Stefano Soatto

    Abstract: Supervised learning methods to infer (hypothesize) depth of a scene from a single image require costly per-pixel ground-truth. We follow a geometric approach that exploits abundant stereo imagery to learn a model to hypothesize scene structure without direct supervision. Although we train a network with stereo pairs, we only require a single image at test time to hypothesize disparity or depth. We… ▽ More

    Submitted 19 June, 2019; v1 submitted 18 March, 2019; originally announced March 2019.

  42. arXiv:1903.04271  [pdf, ps, other

    cs.CR

    CloudSafe: A Tool for an Automated Security Analysis for Cloud Computing

    Authors: Seoungmo An, Taehoon Eom, Jong Sou Park, Jin B. Hong, Armstrong Nhlabatsi, Noora Fetais, Khaled M. Khan, Dong Seong Kim

    Abstract: Cloud computing has been adopted widely, providing on-demand computing resources to improve perfornance and reduce the operational costs. However, these new functionalities also bring new ways to exploit the cloud computing environment. To assess the security of the cloud, graphical security models can be used, such as Attack Graphs and Attack Trees. However, existing models do not consider all ty… ▽ More

    Submitted 11 March, 2019; originally announced March 2019.

  43. arXiv:1805.08527  [pdf, other

    stat.ML cs.LG

    Safe Element Screening for Submodular Function Minimization

    Authors: Weizhong Zhang, Bin Hong, Lin Ma, Wei Liu, Tong Zhang

    Abstract: Submodular functions are discrete analogs of convex functions, which have applications in various fields, including machine learning and computer vision. However, in large-scale applications, solving Submodular Function Minimization (SFM) problems remains challenging. In this paper, we make the first attempt to extend the emerging technique named screening in large-scale sparse learning to SFM for… ▽ More

    Submitted 6 June, 2018; v1 submitted 22 May, 2018; originally announced May 2018.

  44. arXiv:1711.07190  [pdf, ps, other

    cs.CV

    Block-Cyclic Stochastic Coordinate Descent for Deep Neural Networks

    Authors: Kensuke Nakamura, Stefano Soatto, Byung-Woo Hong

    Abstract: We present a stochastic first-order optimization algorithm, named BCSC, that adds a cyclic constraint to stochastic block-coordinate descent. It uses different subsets of the data to update different subsets of the parameters, thus limiting the detrimental effect of outliers in the training set. Empirical tests in benchmark datasets show that our algorithm outperforms state-of-the-art optimization… ▽ More

    Submitted 20 November, 2017; originally announced November 2017.

    Comments: 10 pages

  45. arXiv:1710.06905  [pdf, other

    cs.CY

    Predictors of Re-admission for Homeless Families in New York City: The Case of the Win Shelter Network

    Authors: Constantine Kontokosta, Boyeong Hong, Awais Malik, Ira M. Bellach, Xueqi Huang, Kristi Korsberg, Dara Perl, Avikal Somvanshi

    Abstract: New York City faces the challenge of an ever-increasing homeless population with almost 60,000 people currently living in city shelters. In 2015, approximately 25% of families stayed longer than 9 months in a shelter, and 17% of families with children that exited a homeless shelter returned to the shelter system within 30 days of leaving. This suggests that "long-term" shelter residents and those… ▽ More

    Submitted 18 October, 2017; originally announced October 2017.

    Comments: Presented at the Data For Good Exchange 2017

  46. arXiv:1710.02452  [pdf, other

    cs.CY

    Equity in 311 Reporting: Understanding Socio-Spatial Differentials in the Propensity to Complain

    Authors: Constantine Kontokosta, Boyeong Hong, Kristi Korsberg

    Abstract: Cities across the United States are implementing information communication technologies in an effort to improve government services. One such innovation in e-government is the creation of 311 systems, offering a centralized platform where citizens can request services, report non-emergency concerns, and obtain information about the city via hotline, mobile, or web-based applications. The NYC 311 s… ▽ More

    Submitted 6 October, 2017; originally announced October 2017.

    Comments: Presented at the Data For Good Exchange 2017

  47. arXiv:1705.03350  [pdf, other

    cs.CV

    Adaptive Regularization of Some Inverse Problems in Image Analysis

    Authors: Byung-Woo Hong, Ja-Keoung Koo, Martin Burger, Stefano Soatto

    Abstract: We present an adaptive regularization scheme for optimizing composite energy functionals arising in image analysis problems. The scheme automatically trades off data fidelity and regularization depending on the current data fit during the iterative optimization, so that regularization is strongest initially, and wanes as data fidelity improves, with the weight of the regularizer being minimized at… ▽ More

    Submitted 9 May, 2017; originally announced May 2017.

  48. arXiv:1702.08336  [pdf, other

    cs.CV

    Multi-Label Segmentation via Residual-Driven Adaptive Regularization

    Authors: Byung-Woo Hong, Ja-Keoung Koo, Stefano Soatto

    Abstract: We present a variational multi-label segmentation algorithm based on a robust Huber loss for both the data and the regularizer, minimized within a convex optimization framework. We introduce a novel constraint on the common areas, to bias the solution towards mutually exclusive regions. We also propose a regularization scheme that is adapted to the spatial statistics of the residual at each iterat… ▽ More

    Submitted 27 February, 2017; originally announced February 2017.

  49. arXiv:1609.02356  [pdf, other

    cs.CV

    Adaptive Regularization in Convex Composite Optimization for Variational Imaging Problems

    Authors: Byung-Woo Hong, Ja-Keoung Koo, Hendrik Dirks, Martin Burger

    Abstract: We propose an adaptive regularization scheme in a variational framework where a convex composite energy functional is optimized. We consider a number of imaging problems including denoising, segmentation and motion estimation, which are considered as optimal solutions of the energy functionals that mainly consist of data fidelity, regularization and a control parameter for their trade-off. We pres… ▽ More

    Submitted 28 February, 2017; v1 submitted 8 September, 2016; originally announced September 2016.

  50. arXiv:1607.06996  [pdf, other

    stat.ML cs.LG

    Scaling Up Sparse Support Vector Machines by Simultaneous Feature and Sample Reduction

    Authors: Weizhong Zhang, Bin Hong, Wei Liu, Jieping Ye, Deng Cai, Xiaofei He, Jie Wang

    Abstract: Sparse support vector machine (SVM) is a popular classification technique that can simultaneously learn a small set of the most interpretable features and identify the support vectors. It has achieved great successes in many real-world applications. However, for large-scale problems involving a huge number of samples and ultra-high dimensional features, solving sparse SVMs remains challenging. By… ▽ More

    Submitted 18 July, 2019; v1 submitted 24 July, 2016; originally announced July 2016.

    Comments: accepted by JMLR