Skip to main content

Showing 1–7 of 7 results for author: Tan, H M

.
  1. arXiv:2505.19165  [pdf, ps, other

    cs.AI

    OrgAccess: A Benchmark for Role Based Access Control in Organization Scale LLMs

    Authors: Debdeep Sanyal, Umakanta Maharana, Yash Sinha, Hong Ming Tan, Shirish Karande, Mohan Kankanhalli, Murari Mandal

    Abstract: Role-based access control (RBAC) and hierarchical structures are foundational to how information flows and decisions are made within virtually all organizations. As the potential of Large Language Models (LLMs) to serve as unified knowledge repositories and intelligent assistants in enterprise settings becomes increasingly apparent, a critical, yet under explored, challenge emerges: \textit{can th… ▽ More

    Submitted 17 June, 2025; v1 submitted 25 May, 2025; originally announced May 2025.

    Comments: 56 Pages

  2. arXiv:2402.09288  [pdf, other

    cs.LG

    EcoVal: An Efficient Data Valuation Framework for Machine Learning

    Authors: Ayush K Tarun, Vikram S Chundawat, Murari Mandal, Hong Ming Tan, Bowei Chen, Mohan Kankanhalli

    Abstract: Quantifying the value of data within a machine learning workflow can play a pivotal role in making more strategic decisions in machine learning initiatives. The existing Shapley value based frameworks for data valuation in machine learning are computationally expensive as they require considerable amount of repeated training of the model to obtain the Shapley value. In this paper, we introduce an… ▽ More

    Submitted 9 July, 2024; v1 submitted 14 February, 2024; originally announced February 2024.

    Comments: KDD-2024

  3. arXiv:2401.03173  [pdf, other

    eess.IV cs.CV cs.LG

    UGGNet: Bridging U-Net and VGG for Advanced Breast Cancer Diagnosis

    Authors: Tran Cao Minh, Nguyen Kim Quoc, Phan Cong Vinh, Dang Nhu Phu, Vuong Xuan Chi, Ha Minh Tan

    Abstract: In the field of medical imaging, breast ultrasound has emerged as a crucial diagnostic tool for early detection of breast cancer. However, the accuracy of diagnosing the location of the affected area and the extent of the disease depends on the experience of the physician. In this paper, we propose a novel model called UGGNet, combining the power of the U-Net and VGG architectures to enhance the p… ▽ More

    Submitted 6 January, 2024; originally announced January 2024.

    Comments: Submitted to the journal "EAI Endorsed Transactions on Context-aware Systems and Applications" ,2 images, 5 data tables

    Journal ref: EAI Endorsed Transactions on Contex-aware Systems and Applications, 10(1), 2024

  4. arXiv:2212.04371  [pdf

    cs.LG cs.CR

    Skellam Mixture Mechanism: a Novel Approach to Federated Learning with Differential Privacy

    Authors: Ergute Bao, Yizheng Zhu, Xiaokui Xiao, Yin Yang, Beng Chin Ooi, Benjamin Hong Meng Tan, Khin Mi Mi Aung

    Abstract: Deep neural networks have strong capabilities of memorizing the underlying training data, which can be a serious privacy concern. An effective solution to this problem is to train models with differential privacy, which provides rigorous privacy guarantees by injecting random noise to the gradients. This paper focuses on the scenario where sensitive data are distributed among multiple participants… ▽ More

    Submitted 2 July, 2024; v1 submitted 8 December, 2022; originally announced December 2022.

  5. arXiv:1902.04303  [pdf, other

    stat.AP cs.CR q-bio.GN

    Achieving GWAS with Homomorphic Encryption

    Authors: Jun Jie Sim, Fook Mun Chan, Shibin Chen, Benjamin Hong Meng Tan, Khin Mi Mi Aung

    Abstract: One way of investigating how genes affect human traits would be with a genome-wide association study (GWAS). Genetic markers, known as single-nucleotide polymorphism (SNP), are used in GWAS. This raises privacy and security concerns as these genetic markers can be used to identify individuals uniquely. This problem is further exacerbated by a large number of SNPs needed, which produce reliable res… ▽ More

    Submitted 1 August, 2019; v1 submitted 12 February, 2019; originally announced February 2019.

  6. arXiv:1811.00778  [pdf, other

    cs.CR cs.LG

    Towards the AlexNet Moment for Homomorphic Encryption: HCNN, theFirst Homomorphic CNN on Encrypted Data with GPUs

    Authors: Ahmad Al Badawi, Jin Chao, Jie Lin, Chan Fook Mun, Jun Jie Sim, Benjamin Hong Meng Tan, Xiao Nan, Khin Mi Mi Aung, Vijay Ramaseshan Chandrasekhar

    Abstract: Deep Learning as a Service (DLaaS) stands as a promising solution for cloud-based inference applications. In this setting, the cloud has a pre-learned model whereas the user has samples on which she wants to run the model. The biggest concern with DLaaS is user privacy if the input samples are sensitive data. We provide here an efficient privacy-preserving system by employing high-end technologies… ▽ More

    Submitted 18 August, 2020; v1 submitted 2 November, 2018; originally announced November 2018.

  7. arXiv:1802.05004  [pdf, ps, other

    cs.CR

    Zero-Knowledge Password Policy Check from Lattices

    Authors: Khoa Nguyen, Benjamin Hong Meng Tan, Huaxiong Wang

    Abstract: Passwords are ubiquitous and most commonly used to authenticate users when logging into online services. Using high entropy passwords is critical to prevent unauthorized access and password policies emerged to enforce this requirement on passwords. However, with current methods of password storage, poor practices and server breaches have leaked many passwords to the public. To protect one's sensit… ▽ More

    Submitted 14 February, 2018; originally announced February 2018.

    Journal ref: ISC 2017