Skip to main content

Showing 1–23 of 23 results for author: Chang, J M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2309.02640  [pdf, other

    cs.LG cs.CL

    Epi-Curriculum: Episodic Curriculum Learning for Low-Resource Domain Adaptation in Neural Machine Translation

    Authors: Keyu Chen, Di Zhuang, Mingchen Li, J. Morris Chang

    Abstract: Neural Machine Translation (NMT) models have become successful, but their performance remains poor when translating on new domains with a limited number of data. In this paper, we present a novel approach Epi-Curriculum to address low-resource domain adaptation (DA), which contains a new episodic training framework along with denoised curriculum learning. Our episodic training framework enhances t… ▽ More

    Submitted 5 September, 2023; originally announced September 2023.

  2. arXiv:2302.00514  [pdf, other

    cs.LG cs.CV

    Towards Implementing Energy-aware Data-driven Intelligence for Smart Health Applications on Mobile Platforms

    Authors: G. Dumindu Samaraweera, Hung Nguyen, Hadi Zanddizari, Behnam Zeinali, J. Morris Chang

    Abstract: Recent breakthrough technological progressions of powerful mobile computing resources such as low-cost mobile GPUs along with cutting-edge, open-source software architectures have enabled high-performance deep learning on mobile platforms. These advancements have revolutionized the capabilities of today's mobile applications in different dimensions to perform data-driven intelligence locally, part… ▽ More

    Submitted 1 February, 2023; originally announced February 2023.

  3. arXiv:2208.00068  [pdf, ps, other

    cs.RO

    IMUNet: Efficient Regression Architecture for IMU Navigation and Positioning

    Authors: Behnam Zeinali, Hadi Zandizari, J. Morris Chang

    Abstract: Data-driven based method for navigation and positioning has absorbed attention in recent years and it outperforms all its competitor methods in terms of accuracy and efficiency. This paper introduces a new architecture called IMUNet which is accurate and efficient for position estimation on edge device implementation receiving a sequence of raw IMU measurements. The architecture has been compared… ▽ More

    Submitted 29 July, 2022; originally announced August 2022.

  4. arXiv:2205.14298  [pdf, other

    cs.LG cs.CR

    MC-GEN:Multi-level Clustering for Private Synthetic Data Generation

    Authors: Mingchen Li, Di Zhuang, J. Morris Chang

    Abstract: With the development of machine learning and data science, data sharing is very common between companies and research institutes to avoid data scarcity. However, sharing original datasets that contain private information can cause privacy leakage. A reliable solution is to utilize private synthetic datasets which preserve statistical information from original datasets. In this paper, we propose MC… ▽ More

    Submitted 29 November, 2022; v1 submitted 27 May, 2022; originally announced May 2022.

  5. arXiv:2202.05685  [pdf, other

    cs.CV cs.LG

    SuperCon: Supervised Contrastive Learning for Imbalanced Skin Lesion Classification

    Authors: Keyu Chen, Di Zhuang, J. Morris Chang

    Abstract: Convolutional neural networks (CNNs) have achieved great success in skin lesion classification. A balanced dataset is required to train a good model. However, due to the appearance of different skin lesions in practice, severe or even deadliest skin lesion types (e.g., melanoma) naturally have quite small amount represented in a dataset. In that, classification performance degradation occurs widel… ▽ More

    Submitted 11 February, 2022; originally announced February 2022.

  6. arXiv:2202.02971  [pdf, other

    cs.LG cs.AI cs.CR

    Locally Differentially Private Distributed Deep Learning via Knowledge Distillation

    Authors: Di Zhuang, Mingchen Li, J. Morris Chang

    Abstract: Deep learning often requires a large amount of data. In real-world applications, e.g., healthcare applications, the data collected by a single organization (e.g., hospital) is often limited, and the majority of massive and diverse data is often segregated across multiple organizations. As such, it motivates the researchers to conduct distributed deep learning, where the data user would like to bui… ▽ More

    Submitted 7 February, 2022; originally announced February 2022.

    Comments: 10 pages, 6 figures, 1 table. Submitted to IEEE Transactions on Knowledge and Data Engineering

  7. arXiv:2107.02672  [pdf, other

    eess.IV cs.CV

    COVID-19 Pneumonia Severity Prediction using Hybrid Convolution-Attention Neural Architectures

    Authors: Nam Nguyen, J. Morris Chang

    Abstract: This study proposed a novel framework for COVID-19 severity prediction, which is a combination of data-centric and model-centric approaches. First, we propose a data-centric pre-training for extremely scare data scenarios of the investigating dataset. Second, we propose two hybrid convolution-attention neural architectures that leverage the self-attention from the Transformer and the Dense Associa… ▽ More

    Submitted 7 July, 2021; v1 submitted 6 July, 2021; originally announced July 2021.

  8. arXiv:2107.01640  [pdf, other

    cs.DB cs.CR

    SEC-NoSQL: Towards Implementing High Performance Security-as-a-Service for NoSQL Databases

    Authors: G. Dumindu Samaraweera, J. Morris Chang

    Abstract: During the last few years, the explosion of Big Data has prompted cloud infrastructures to provide cloud-based database services as cost effective, efficient and scalable solutions to store and process large volume of data. Hence, NoSQL databases became more and more popular because of their inherent features of better performance and high scalability compared to other relational databases. Howeve… ▽ More

    Submitted 4 July, 2021; originally announced July 2021.

  9. arXiv:2106.12549  [pdf, ps, other

    cs.DC cs.NE

    ESAI: Efficient Split Artificial Intelligence via Early Exiting Using Neural Architecture Search

    Authors: Behnam Zeinali, Di Zhuang, J. Morris Chang

    Abstract: Recently, deep neural networks have been outperforming conventional machine learning algorithms in many computer vision-related tasks. However, it is not computationally acceptable to implement these models on mobile and IoT devices and the majority of devices are harnessing the cloud computing methodology in which outstanding deep learning models are responsible for analyzing the data on the serv… ▽ More

    Submitted 21 June, 2021; originally announced June 2021.

  10. arXiv:2106.10671  [pdf, other

    cs.LG cs.CR stat.ML

    A compressive multi-kernel method for privacy-preserving machine learning

    Authors: Thee Chanyaswad, J. Morris Chang, S. Y. Kung

    Abstract: As the analytic tools become more powerful, and more data are generated on a daily basis, the issue of data privacy arises. This leads to the study of the design of privacy-preserving machine learning algorithms. Given two objectives, namely, utility maximization and privacy-loss minimization, this work is based on two previously non-intersecting regimes -- Compressive Privacy and multi-kernel met… ▽ More

    Submitted 20 June, 2021; originally announced June 2021.

    Comments: Published in 2017 International Joint Conference on Neural Networks (IJCNN). IEEE, 2017

  11. Contrastive Self-supervised Neural Architecture Search

    Authors: Nam Nguyen, J. Morris Chang

    Abstract: This paper proposes a novel cell-based neural architecture search algorithm (NAS), which completely alleviates the expensive costs of data labeling inherited from supervised learning. Our algorithm capitalizes on the effectiveness of self-supervised learning for image representations, which is an increasingly crucial topic of computer vision. First, using only a small amount of unlabeled train dat… ▽ More

    Submitted 29 October, 2021; v1 submitted 21 February, 2021; originally announced February 2021.

    Journal ref: IEEE Transactions on Artificial Intelligence 2 (2021) 1-16

  12. arXiv:2101.09324  [pdf, other

    cs.LG cs.CR

    Generating Black-Box Adversarial Examples in Sparse Domain

    Authors: Hadi Zanddizari, Behnam Zeinali, J. Morris Chang

    Abstract: Applications of machine learning (ML) models and convolutional neural networks (CNNs) have been rapidly increased. Although state-of-the-art CNNs provide high accuracy in many applications, recent investigations show that such networks are highly vulnerable to adversarial attacks. The black-box adversarial attack is one type of attack that the attacker does not have any knowledge about the model o… ▽ More

    Submitted 15 October, 2021; v1 submitted 22 January, 2021; originally announced January 2021.

  13. Discriminative Adversarial Domain Generalization with Meta-learning based Cross-domain Validation

    Authors: Keyu Chen, Di Zhuang, J. Morris Chang

    Abstract: The generalization capability of machine learning models, which refers to generalizing the knowledge for an "unseen" domain via learning from one or multiple seen domain(s), is of great importance to develop and deploy machine learning applications in the real-world conditions. Domain Generalization (DG) techniques aim to enhance such generalization capability of machine learning models, where the… ▽ More

    Submitted 15 February, 2022; v1 submitted 1 November, 2020; originally announced November 2020.

    Journal ref: Neurocomputing Volume 467, 7 January 2022, Pages 418-426

  14. arXiv:2005.04369  [pdf, other

    cs.CR cs.AI cs.LG

    Utility-aware Privacy-preserving Data Releasing

    Authors: Di Zhuang, J. Morris Chang

    Abstract: In the big data era, more and more cloud-based data-driven applications are developed that leverage individual data to provide certain valuable services (the utilities). On the other hand, since the same set of individual data could be utilized to infer the individual's certain sensitive information, it creates new channels to snoop the individual's privacy. Hence it is of great importance to deve… ▽ More

    Submitted 9 May, 2020; originally announced May 2020.

    Comments: 9 pages, 2 figures, 4 tables

  15. arXiv:2004.12064  [pdf, other

    cs.CV cs.LG eess.IV

    CS-AF: A Cost-sensitive Multi-classifier Active Fusion Framework for Skin Lesion Classification

    Authors: Di Zhuang, Keyu Chen, J. Morris Chang

    Abstract: Convolutional neural networks (CNNs) have achieved the state-of-the-art performance in skin lesion analysis. Compared with single CNN classifier, combining the results of multiple classifiers via fusion approaches shows to be more effective and robust. Since the skin lesion datasets are usually limited and statistically biased, while designing an effective fusion approach, it is important to consi… ▽ More

    Submitted 9 September, 2020; v1 submitted 25 April, 2020; originally announced April 2020.

    Comments: 16 pages, 8 figures, 2 table

  16. arXiv:2004.12059  [pdf, other

    cs.AI cs.CV cs.LG cs.MM

    SAIA: Split Artificial Intelligence Architecture for Mobile Healthcare System

    Authors: Di Zhuang, Nam Nguyen, Keyu Chen, J. Morris Chang

    Abstract: As the advancement of deep learning (DL), the Internet of Things and cloud computing techniques for biomedical and healthcare problems, mobile healthcare systems have received unprecedented attention. Since DL techniques usually require enormous amount of computation, most of them cannot be directly deployed on the resource-constrained mobile and IoT devices. Hence, most of the mobile healthcare s… ▽ More

    Submitted 9 May, 2020; v1 submitted 25 April, 2020; originally announced April 2020.

    Comments: 17 pages, 9 figures, 2 tables

  17. arXiv:2002.03261  [pdf, other

    cs.LG cs.CR stat.ML

    Privacy-Preserving Image Classification in the Local Setting

    Authors: Sen Wang, J. Morris Chang

    Abstract: Image data has been greatly produced by individuals and commercial vendors in the daily life, and it has been used across various domains, like advertising, medical and traffic analysis. Recently, image data also appears to be greatly important in social utility, like emergency response. However, the privacy concern becomes the biggest obstacle that prevents further exploration of image data, due… ▽ More

    Submitted 8 February, 2020; originally announced February 2020.

    Comments: 10 pages, 4 figures, conference

  18. arXiv:2002.02096  [pdf, other

    cs.CR cs.LG stat.ML

    Privacy-Preserving Boosting in the Local Setting

    Authors: Sen Wang, J. Morris Chang

    Abstract: In machine learning, boosting is one of the most popular methods that designed to combine multiple base learners to a superior one. The well-known Boosted Decision Tree classifier, has been widely adopted in many areas. In the big data era, the data held by individual and entities, like personal images, browsing history and census information, are more likely to contain sensitive information. The… ▽ More

    Submitted 5 February, 2020; originally announced February 2020.

    Comments: 12 pages, 11 figures, journal

  19. arXiv:1905.01039  [pdf, other

    cs.LG cs.CR stat.ML

    Locally Differentially Private Naive Bayes Classification

    Authors: Emre Yilmaz, Mohammad Al-Rubaie, J. Morris Chang

    Abstract: In machine learning, classification models need to be trained in order to predict class labels. When the training data contains personal information about individuals, collecting training data becomes difficult due to privacy concerns. Local differential privacy is a definition to measure the individual privacy when there is no trusted data curator. Individuals interact with an untrusted data aggr… ▽ More

    Submitted 3 May, 2019; originally announced May 2019.

  20. arXiv:1804.11238  [pdf

    cs.CR cs.LG

    Privacy Preserving Machine Learning: Threats and Solutions

    Authors: Mohammad Al-Rubaie, J. Morris Chang

    Abstract: For privacy concerns to be addressed adequately in current machine learning systems, the knowledge gap between the machine learning and privacy communities must be bridged. This article aims to provide an introduction to the intersection of both fields with special emphasis on the techniques used to protect the data.

    Submitted 27 March, 2018; originally announced April 2018.

    Comments: PPML Overview, 18 pages

  21. Enhanced PeerHunter: Detecting Peer-to-peer Botnets through Network-Flow Level Community Behavior Analysis

    Authors: Di Zhuang, J. Morris Chang

    Abstract: Peer-to-peer (P2P) botnets have become one of the major threats in network security for serving as the fundamental infrastructure for various cyber-crimes. More challenges are involved in the problem of detecting P2P botnets, despite a few work claimed to detect centralized botnets effectively. We propose Enhanced PeerHunter, a network-flow level community behavior analysis based system, to detect… ▽ More

    Submitted 13 November, 2018; v1 submitted 22 February, 2018; originally announced February 2018.

    Comments: 16 pages, 7 figures, 15 tables, Accepted for IEEE Transactions on Information Forensics and Security. arXiv admin note: substantial text overlap with arXiv:1709.06440

  22. DynaMo: Dynamic Community Detection by Incrementally Maximizing Modularity

    Authors: Di Zhuang, J. Morris Chang, Mingchen Li

    Abstract: Community detection is of great importance for online social network analysis. The volume, variety and velocity of data generated by today's online social networks are advancing the way researchers analyze those networks. For instance, real-world networks, such as Facebook, LinkedIn and Twitter, are inherently growing rapidly and expanding aggressively over time. However, most of the studies so fa… ▽ More

    Submitted 9 November, 2019; v1 submitted 25 September, 2017; originally announced September 2017.

    Comments: 14 pages, 6 figures, 2 tables, Accepted for IEEE Transactions on Knowledge and Data Engineering

  23. PeerHunter: Detecting Peer-to-Peer Botnets through Community Behavior Analysis

    Authors: Di Zhuang, J. Morris Chang

    Abstract: Peer-to-peer (P2P) botnets have become one of the major threats in network security for serving as the infrastructure that responsible for various of cyber-crimes. Though a few existing work claimed to detect traditional botnets effectively, the problem of detecting P2P botnets involves more challenges. In this paper, we present PeerHunter, a community behavior analysis based method, which is capa… ▽ More

    Submitted 13 November, 2018; v1 submitted 19 September, 2017; originally announced September 2017.

    Comments: 8 pages, 2 figures, 11 tables, 2017 IEEE Conference on Dependable and Secure Computing

    Journal ref: D. Zhuang and J. M. Chang, "PeerHunter: Detecting peer-to-peer botnets through community behavior analysis," 2017 IEEE Conference on Dependable and Secure Computing, Taipei, 2017, pp. 493-500