Skip to main content

Showing 1–50 of 55 results for author: Chong, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2409.15100  [pdf, ps, other

    cs.LG cs.AI

    Robust Federated Learning Over the Air: Combating Heavy-Tailed Noise with Median Anchored Clipping

    Authors: Jiaxing Li, Zihan Chen, Kai Fong Ernest Chong, Bikramjit Das, Tony Q. S. Quek, Howard H. Yang

    Abstract: Leveraging over-the-air computations for model aggregation is an effective approach to cope with the communication bottleneck in federated edge learning. By exploiting the superposition properties of multi-access channels, this approach facilitates an integrated design of communication and computation, thereby enhancing system privacy while reducing implementation costs. However, the inherent elec… ▽ More

    Submitted 6 July, 2025; v1 submitted 23 September, 2024; originally announced September 2024.

    Comments: This is the full version of the paper, and the appendix contains a complete convergence analysis under non-convex conditions

  2. arXiv:2409.05020  [pdf, other

    eess.SY cs.DS

    A Performance Bound for the Greedy Algorithm in a Generalized Class of String Optimization Problems

    Authors: Brandon Van Over, Bowen Li, Edwin K. P. Chong, Ali Pezeshki

    Abstract: We present a simple performance bound for the greedy scheme in string optimization problems that obtains strong results. Our approach vastly generalizes the group of previously established greedy curvature bounds by Conforti and Cornuéjols (1984). We consider three constants, $α_G$, $α_G'$, and $α_G''$ introduced by Conforti and Cornuéjols (1984), that are used in performance bounds of greedy sche… ▽ More

    Submitted 8 September, 2024; originally announced September 2024.

  3. arXiv:2404.06669  [pdf, other

    eess.SY cs.DS

    On Bounds for Greedy Schemes in String Optimization based on Greedy Curvatures

    Authors: Bowen Li, Brandon Van Over, Edwin K. P. Chong, Ali Pezeshki

    Abstract: We consider the celebrated bound introduced by Conforti and Cornuéjols (1984) for greedy schemes in submodular optimization. The bound assumes a submodular function defined on a collection of sets forming a matroid and is based on greedy curvature. We show that the bound holds for a very general class of string problems that includes maximizing submodular functions over set matroids as a special c… ▽ More

    Submitted 8 September, 2024; v1 submitted 9 April, 2024; originally announced April 2024.

    Comments: This version has been accepted as an invited paper in the 63rd IEEE Conference on Decision and Control, Milan, Italy, December 16--19, 2024

  4. arXiv:2403.15759  [pdf

    cs.CY

    Deep Learning Approach to Forecasting COVID-19 Cases in Residential Buildings of Hong Kong Public Housing Estates: The Role of Environment and Sociodemographics

    Authors: E. Leung, J. Guan, KO. Kwok, CT. Hung, CC. Ching, KC. Chong, CHK. Yam, T. Sun, WH. Tsang, EK. Yeoh, A. Lee

    Abstract: Introduction: The current study investigates the complex association between COVID-19 and the studied districts' socioecology (e.g. internal and external built environment, sociodemographic profiles, etc.) to quantify their contributions to the early outbreaks and epidemic resurgence of COVID-19. Methods: We aligned the analytic model's architecture with the hierarchical structure of the resident'… ▽ More

    Submitted 23 March, 2024; originally announced March 2024.

  5. Improving Uncertainty Sampling with Bell Curve Weight Function

    Authors: Zan-Kai Chong, Hiroyuki Ohsaki, Bok-Min Goi

    Abstract: Typically, a supervised learning model is trained using passive learning by randomly selecting unlabelled instances to annotate. This approach is effective for learning a model, but can be costly in cases where acquiring labelled instances is expensive. For example, it can be time-consuming to manually identify spam mails (labelled instances) from thousands of emails (unlabelled instances) floodin… ▽ More

    Submitted 2 March, 2024; originally announced March 2024.

    Comments: 9 pages, 9 figures, journal

    Journal ref: International Journal of Applied Physics and Mathematics, Vol. 13, No. 4, pp. 44-52, 2023

  6. arXiv:2401.17124  [pdf, other

    cs.LG cs.NI

    Spectral Co-Distillation for Personalized Federated Learning

    Authors: Zihan Chen, Howard H. Yang, Tony Q. S. Quek, Kai Fong Ernest Chong

    Abstract: Personalized federated learning (PFL) has been widely investigated to address the challenge of data heterogeneity, especially when a single generic model is inadequate in satisfying the diverse performance requirements of local clients simultaneously. Existing PFL methods are inherently based on the idea that the relations between the generic global and personalized local models are captured by th… ▽ More

    Submitted 29 January, 2024; originally announced January 2024.

    Comments: 13 pages, NeurIPS 2023. Code at https://github.com/jimmyc96/spectral-dis-FL

  7. arXiv:2310.04003  [pdf, other

    cs.NI cs.DC cs.LG eess.SY

    The Role of Federated Learning in a Wireless World with Foundation Models

    Authors: Zihan Chen, Howard H. Yang, Y. C. Tay, Kai Fong Ernest Chong, Tony Q. S. Quek

    Abstract: Foundation models (FMs) are general-purpose artificial intelligence (AI) models that have recently enabled multiple brand-new generative AI applications. The rapid advances in FMs serve as an important contextual backdrop for the vision of next-generation wireless networks, where federated learning (FL) is a key enabler of distributed network intelligence. Currently, the exploration of the interpl… ▽ More

    Submitted 7 May, 2024; v1 submitted 6 October, 2023; originally announced October 2023.

    Comments: 8 pages, 4 figures, 2 tables. This version has been accepted by IEEE Wireless Communications

  8. arXiv:2308.15758  [pdf, other

    cs.DS cs.DM eess.SY

    An Improved Greedy Curvature Bound in Finite-Horizon String Optimization with Application to a Sensor Coverage Problem

    Authors: Brandon Van Over, Bowen Li, Edwin K. P. Chong, Ali Pezeshki

    Abstract: We study the optimization problem of choosing strings of finite length to maximize string submodular functions on string matroids, which is a broader class of problems than maximizing set submodular functions on set matroids. We provide a lower bound for the performance of the greedy algorithm in our problem, and then prove that our bound is superior to the greedy curvature bound of Conforti and C… ▽ More

    Submitted 7 September, 2023; v1 submitted 30 August, 2023; originally announced August 2023.

  9. arXiv:2307.09810  [pdf

    cs.CV cs.IT cs.LG

    GenKL: An Iterative Framework for Resolving Label Ambiguity and Label Non-conformity in Web Images Via a New Generalized KL Divergence

    Authors: Xia Huang, Kai Fong Ernest Chong

    Abstract: Web image datasets curated online inherently contain ambiguous in-distribution (ID) instances and out-of-distribution (OOD) instances, which we collectively call non-conforming (NC) instances. In many recent approaches for mitigating the negative effects of NC instances, the core implicit assumption is that the NC instances can be found via entropy maximization. For "entropy" to be well-defined, w… ▽ More

    Submitted 19 July, 2023; originally announced July 2023.

    Comments: Published (with open access) at International Journal of Computer Vision (IJCV, 2023). 25 pages, 8 figures. Code is available at: https://github.com/codetopaper/GenKL

    ACM Class: I.2.0; I.4.0

  10. arXiv:2303.11730  [pdf, other

    cs.CV cs.AI cs.SC math.AC

    Abstract Visual Reasoning: An Algebraic Approach for Solving Raven's Progressive Matrices

    Authors: Jingyi Xu, Tushar Vaidya, Yufei Wu, Saket Chandra, Zhangsheng Lai, Kai Fong Ernest Chong

    Abstract: We introduce algebraic machine reasoning, a new reasoning framework that is well-suited for abstract reasoning. Effectively, algebraic machine reasoning reduces the difficult process of novel problem-solving to routine algebraic computation. The fundamental algebraic objects of interest are the ideals of some suitably initialized polynomial ring. We shall explain how solving Raven's Progressive Ma… ▽ More

    Submitted 21 March, 2023; originally announced March 2023.

    Comments: Accepted at IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2023. 30 pages, 7 figures (including supplementary material). First three authors contributed equally. Code is available at: https://github.com/Xu-Jingyi/AlgebraicMR

    MSC Class: 13P25; 68W30 ACM Class: I.1; I.2.4; I.2.6; I.5.1

  11. arXiv:2301.13162  [pdf, other

    math.NA cs.AI cs.LG

    A deep learning approach for adaptive zoning

    Authors: Massimiliano Lupo Pasini, Luka Malenica, Kwitae Chong, Stuart Slattery

    Abstract: We propose a supervised deep learning (DL) approach to perform adaptive zoning on time dependent partial differential equations that model the propagation of 1D shock waves in a compressible medium. We train a neural network on a dataset composed of different static shock profiles associated with the corresponding adapted meshes computed with standard adaptive zoning techniques. We show that the t… ▽ More

    Submitted 9 December, 2022; originally announced January 2023.

    Comments: 30 pages, 26 figures

    MSC Class: 68T10; 68U20; 00A72; 00A79 ACM Class: G.1.1; G.1.8; I.2

  12. arXiv:2212.00206  [pdf, other

    cs.LG

    Clustering and Analysis of GPS Trajectory Data using Distance-based Features

    Authors: Zann Koh, Yuren Zhou, Billy Pik Lik Lau, Ran Liu, Keng Hua Chong, Chau Yuen

    Abstract: The proliferation of smartphones has accelerated mobility studies by largely increasing the type and volume of mobility data available. One such source of mobility data is from GPS technology, which is becoming increasingly common and helps the research community understand mobility patterns of people. However, there lacks a standardized framework for studying the different mobility patterns creat… ▽ More

    Submitted 30 November, 2022; originally announced December 2022.

    Comments: 13 pages, 12 figures. To be published in IEEE Access

  13. arXiv:2207.06746  [pdf

    eess.IV cs.CV

    Single-Pixel Image Reconstruction Based on Block Compressive Sensing and Deep Learning

    Authors: Stephen L. H. Lau, Edwin K. P. Chong

    Abstract: Single-pixel imaging (SPI) is a novel imaging technique whose working principle is based on the compressive sensing (CS) theory. In SPI, data is obtained through a series of compressive measurements and the corresponding image is reconstructed. Typically, the reconstruction algorithm such as basis pursuit relies on the sparsity assumption in images. However, recent advances in deep learning have f… ▽ More

    Submitted 14 July, 2022; originally announced July 2022.

  14. arXiv:2204.04677  [pdf, other

    cs.LG cs.AI cs.CV

    FedCorr: Multi-Stage Federated Learning for Label Noise Correction

    Authors: Jingyi Xu, Zihan Chen, Tony Q. S. Quek, Kai Fong Ernest Chong

    Abstract: Federated learning (FL) is a privacy-preserving distributed learning paradigm that enables clients to jointly train a global model. In real-world FL implementations, client data could have label noise, and different clients could have vastly different label noise levels. Although there exist methods in centralized learning for tackling label noise, such methods do not perform well on heterogeneous… ▽ More

    Submitted 10 April, 2022; originally announced April 2022.

    Comments: Accepted at IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2022. 18 pages, 10 figures (including supplementary material). First two authors contributed equally. Code is available at: https://github.com/Xu-Jingyi/FedCorr

  15. arXiv:2201.02275  [pdf, ps, other

    eess.SP cs.IT eess.SY stat.CO

    Well-Conditioned Linear Minimum Mean Square Error Estimation

    Authors: Edwin K. P. Chong

    Abstract: Linear minimum mean square error (LMMSE) estimation is often ill-conditioned, suggesting that unconstrained minimization of the mean square error is an inadequate approach to filter design. To address this, we first develop a unifying framework for studying constrained LMMSE estimation problems. Using this framework, we explore an important structural property of constrained LMMSE filters involvin… ▽ More

    Submitted 21 March, 2022; v1 submitted 6 January, 2022; originally announced January 2022.

  16. arXiv:2109.08754  [pdf, other

    cs.CL

    Semi-Supervised Few-Shot Intent Classification and Slot Filling

    Authors: Samyadeep Basu, Karine lp Kiun Chong, Amr Sharaf, Alex Fischer, Vishal Rohra, Michael Amoake, Hazem El-Hammamy, Ehi Nosakhare, Vijay Ramani, Benjamin Han

    Abstract: Intent classification (IC) and slot filling (SF) are two fundamental tasks in modern Natural Language Understanding (NLU) systems. Collecting and annotating large amounts of data to train deep learning models for such systems is not scalable. This problem can be addressed by learning from few examples using fast supervised meta-learning techniques such as prototypical networks. In this work, we sy… ▽ More

    Submitted 17 September, 2021; originally announced September 2021.

  17. arXiv:2108.05765  [pdf, other

    cs.LG cs.DC

    Dynamic Attention-based Communication-Efficient Federated Learning

    Authors: Zihan Chen, Kai Fong Ernest Chong, Tony Q. S. Quek

    Abstract: Federated learning (FL) offers a solution to train a global machine learning model while still maintaining data privacy, without needing access to data stored locally at the clients. However, FL suffers performance degradation when client data distribution is non-IID, and a longer training duration to combat this degradation may not necessarily be feasible due to communication limitations. To addr… ▽ More

    Submitted 12 August, 2021; originally announced August 2021.

    Comments: 7 pages, 3 figures, presented at the International Workshop on Federated and Transfer Learning for Data Sparsity and Confidentiality (FTL-IJCAI 2021) in conjunction with the 30th International Joint Conference on Artificial Intelligence (IJCAI), 2021

    ACM Class: I.2

  18. arXiv:2105.13892  [pdf, other

    cs.LG

    Training Classifiers that are Universally Robust to All Label Noise Levels

    Authors: Jingyi Xu, Tony Q. S. Quek, Kai Fong Ernest Chong

    Abstract: For classification tasks, deep neural networks are prone to overfitting in the presence of label noise. Although existing methods are able to alleviate this problem at low noise levels, they encounter significant performance reduction at high noise levels, or even at medium noise levels when the label noise is asymmetric. To train classifiers that are universally robust to all noise levels, and th… ▽ More

    Submitted 27 May, 2021; originally announced May 2021.

    Comments: IJCNN 2021 paper, 8 pages, 3 figures. Code available: https://github.com/Xu-Jingyi/PUDistill

    ACM Class: I.2.0

  19. WiFi Fingerprint Clustering for Urban Mobility Analysis

    Authors: Sumudu HasalaMarakkalage, Billy Pik Lik Lau, Yuren Zhou, Ran Liu, Chau Yuen, Wei Quin Yow, Keng Hua Chong

    Abstract: In this paper, we present an unsupervised learning approach to identify the user points of interest (POI) by exploiting WiFi measurements from smartphone application data. Due to the lack of GPS positioning accuracy in indoor, sheltered, and high rise building environments, we rely on widely available WiFi access points (AP) in contemporary urban areas to accurately identify POI and mobility patte… ▽ More

    Submitted 3 May, 2021; originally announced May 2021.

    Comments: accepted by IEEE Access

  20. The Study of Urban Residential's Public Space Activeness using Space-centric Approach

    Authors: Billy Pik Lik Lau, Benny Kai Kiat Ng, Chau Yuen, Bige Tuncer, Keng Hua Chong

    Abstract: With the advancement of the Internet of Things (IoT) and communication platform, large scale sensor deployment can be easily implemented in an urban city to collect various information. To date, there are only a handful of research studies about understanding the usage of urban public spaces. Leveraging IoT, various sensors have been deployed in an urban residential area to monitor and study publi… ▽ More

    Submitted 11 January, 2021; v1 submitted 11 January, 2021; originally announced January 2021.

    Comments: Accepted at IEEE Internet of Things Journal 2021

  21. Multiple-Perspective Clustering of Passive Wi-Fi Sensing Trajectory Data

    Authors: Zann Koh, Yuren Zhou, Billy Pik Lik Lau, Chau Yuen, Bige Tuncer, Keng Hua Chong

    Abstract: Information about the spatiotemporal flow of humans within an urban context has a wide plethora of applications. Currently, although there are many different approaches to collect such data, there lacks a standardized framework to analyze it. The focus of this paper is on the analysis of the data collected through passive Wi-Fi sensing, as such passively collected data can have a wide coverage at… ▽ More

    Submitted 21 December, 2020; originally announced December 2020.

    Comments: 15 pages, 11 figures

  22. arXiv:2002.06505  [pdf, ps, other

    cs.LG math.FA stat.ML

    A closer look at the approximation capabilities of neural networks

    Authors: Kai Fong Ernest Chong

    Abstract: The universal approximation theorem, in one of its most general versions, says that if we consider only continuous activation functions $σ$, then a standard feedforward neural network with one hidden layer is able to approximate any continuous multivariate function $f$ to any given approximation threshold $\varepsilon$, if and only if $σ$ is non-polynomial. In this paper, we give a direct algebrai… ▽ More

    Submitted 15 February, 2020; originally announced February 2020.

    Comments: Published as a conference paper at ICLR 2020

  23. Automated Pavement Crack Segmentation Using U-Net-based Convolutional Neural Network

    Authors: Stephen L. H. Lau, Edwin K. P. Chong, Xu Yang, Xin Wang

    Abstract: Automated pavement crack image segmentation is challenging because of inherent irregular patterns, lighting conditions, and noise in images. Conventional approaches require a substantial amount of feature engineering to differentiate crack regions from non-affected regions. In this paper, we propose a deep learning technique based on a convolutional neural network to perform segmentation tasks on… ▽ More

    Submitted 30 June, 2020; v1 submitted 7 January, 2020; originally announced January 2020.

    Comments: Accepted for publication in IEEE Access

  24. arXiv:1910.04030  [pdf, other

    eess.IV cs.CV

    Cribriform pattern detection in prostate histopathological images using deep learning models

    Authors: Malay Singh, Emarene Mationg Kalaw, Wang Jie, Mundher Al-Shabi, Chin Fong Wong, Danilo Medina Giron, Kian-Tai Chong, Maxine Tan, Zeng Zeng, Hwee Kuan Lee

    Abstract: Architecture, size, and shape of glands are most important patterns used by pathologists for assessment of cancer malignancy in prostate histopathological tissue slides. Varying structures of glands along with cumbersome manual observations may result in subjective and inconsistent assessment. Cribriform gland with irregular border is an important feature in Gleason pattern 4. We propose using dee… ▽ More

    Submitted 9 October, 2019; originally announced October 2019.

    Comments: 21 pages, 4 figures, 6 tables

  25. arXiv:1910.00699  [pdf, other

    cs.AI eess.SY math.OC stat.AP stat.CO

    Decision Automation for Electric Power Network Recovery

    Authors: Yugandhar Sarkale, Saeed Nozhati, Edwin K. P. Chong, Bruce R. Ellingwood

    Abstract: Critical infrastructure systems such as electric power networks, water networks, and transportation systems play a major role in the welfare of any community. In the aftermath of disasters, their recovery is of paramount importance; orderly and efficient recovery involves the assignment of limited resources (a combination of human repair workers and machines) to repair damaged infrastructure compo… ▽ More

    Submitted 18 October, 2019; v1 submitted 1 October, 2019; originally announced October 2019.

    Comments: Submitted to IEEE Transactions on Automation Science and Engineering (13 pages and 6 figures)

  26. An approximate dynamic programming approach to food security of communities following hazards

    Authors: Saeed Nozhati, Yugandhar Sarkale, Bruce R. Ellingwood, Edwin K. P. Chong, Hussam Mahmoud

    Abstract: Food security can be threatened by extreme natural hazard events for households of all social classes within a community. To address food security issues following a natural disaster, the recovery of several elements of the built environment within a community, including its building portfolio, must be considered. Building portfolio restoration is one of the most challenging elements of recovery o… ▽ More

    Submitted 15 December, 2018; originally announced December 2018.

    Comments: As opposed to the preemptive scheduling problem, which was addressed in multiple works by us, we deal with a non-preemptive stochastic scheduling problem in this work. Submitted to 13th International Conference on Applications of Statistics and Probability in Civil Engineering, ICASP13 Seoul, South Korea, May 26-30, 2019

    Journal ref: 13th Int. Conf. Appl. Statistics and Prob. Civ. Eng. (ICASP13), Seoul, South Korea, May 26-30, 2019

  27. arXiv:1806.08492  [pdf

    cs.CY

    An Approximate Dynamic Programming Approach to Community Recovery Management (Extended Abstract)

    Authors: Saeed Nozhati, Bruce R. Ellingwood, Hussam Mahmoud, Yugandhar Sarkale, Edwin K. P. Chong, Nathanael Rosenheim

    Abstract: The functioning of interdependent civil infrastructure systems in the aftermath of a disruptive event is critical to the performance and vitality of any modern urban community. Post-event stressors and chaotic circumstances, time limitations, and complexities in the community recovery process highlight the necessity for a comprehensive decision-making framework at the community-level for post-even… ▽ More

    Submitted 22 June, 2018; originally announced June 2018.

    Comments: The material in this work provides a gist of the material in the journal version of our work (arXiv:1803.01451) that has in-detailed description of the methods employed in this article in addition to a more comprehensive treatment. This work will serve as a suitable introduction to the interested reader

    Journal ref: Presented at Engineering Mechanics Institute Conference 2018 (EMI 2018 -- MS36 Robustness of Infrastructures), Cambridge -- Boston, MA, May 29--June 1, 2018

  28. arXiv:1804.00250  [pdf

    cs.CE eess.SY

    A Modified Approximate Dynamic Programming Algorithm for Community-level Food Security Following Disasters

    Authors: Saeed Nozhati, Yugandhar Sarkale, Bruce R. Ellingwood, Edwin K. P. Chong, Hussam Mahmoud

    Abstract: In the aftermath of an extreme natural hazard, community residents must have access to functioning food retailers to maintain food security. Food security is dependent on supporting critical infrastructure systems, including electricity, potable water, and transportation. An understanding of the response of such interdependent networks and the process of post-disaster recovery is the cornerstone o… ▽ More

    Submitted 15 May, 2018; v1 submitted 31 March, 2018; originally announced April 2018.

    Comments: The material presented here might have some overlap with arXiv:1803.04144 and arXiv:1803.01451. Nonetheless, this material contains substantial additions

    Journal ref: Proceedings of the 9th International Congress on Environmental Modelling and Software (iEMSs 2018), Fort Collins, CO, June 24--28, 2018

  29. arXiv:1803.04144  [pdf, other

    math.OC cs.CE eess.SY

    Solving Markov decision processes for network-level post-hazard recovery via simulation optimization and rollout

    Authors: Yugandhar Sarkale, Saeed Nozhati, Edwin K. P. Chong, Bruce Ellingwood, Hussam Mahmoud

    Abstract: Computation of optimal recovery decisions for community resilience assurance post-hazard is a combinatorial decision-making problem under uncertainty. It involves solving a large-scale optimization problem, which is significantly aggravated by the introduction of uncertainty. In this paper, we draw upon established tools from multiple research communities to provide an effective solution to this c… ▽ More

    Submitted 12 April, 2018; v1 submitted 12 March, 2018; originally announced March 2018.

    Comments: Submitted to Simulation Optimization for Cyber Physical Energy Systems (Special Session) in 14th IEEE International Conference on Automation Science and Engineering

    Journal ref: 2018 IEEE 14th Int. Conf. Autom. Sci. and Eng. (CASE) 906 - 912

  30. arXiv:1803.01451  [pdf, other

    math.OC cs.CE eess.SY

    Near-optimal planning using approximate dynamic programming to enhance post-hazard community resilience management

    Authors: Saeed Nozhati, Yugandhar Sarkale, Bruce Ellingwood, Edwin K. P. Chong, Hussam Mahmoud

    Abstract: The lack of a comprehensive decision-making approach at the community level is an important problem that warrants immediate attention. Network-level decision-making algorithms need to solve large-scale optimization problems that pose computational challenges. The complexity of the optimization problems increases when various sources of uncertainty are considered. This research introduces a sequent… ▽ More

    Submitted 19 April, 2018; v1 submitted 4 March, 2018; originally announced March 2018.

    Comments: The first two authors contributed equally and are listed alphabetically

    Journal ref: Reliab. Eng. & Syst. Saf. 181 (2019) 116-126

  31. arXiv:1712.10284  [pdf, other

    cs.SI physics.soc-ph stat.AP

    Large-Scale Experiment on the Importance of Social Learning and Unimodality in the Wisdom of the Crowd

    Authors: Dhaval Adjodah, Shi Kai Chong, Yan Leng, Peter Krafft, Alex Pentland

    Abstract: In this study, we build on previous research to understand the conditions within which the Wisdom of the Crowd (WoC) improves or worsens as a result of showing individuals the predictions of their peers. Our main novel contributions are: 1) a dataset of unprecedented size and detail; 2) we observe the novel effect of the importance of the unimodality of the social information shown to individuals:… ▽ More

    Submitted 29 December, 2017; originally announced December 2017.

  32. arXiv:1712.09960  [pdf, other

    cs.SI physics.soc-ph

    Social Bayesian Learning in the Wisdom of the Crowd

    Authors: Dhaval Adjodah, Yan Leng, Shi Kai Chong, Peter Krafft, Alex Pentland

    Abstract: Being able to correctly aggregate the beliefs of many people into a single belief is a problem fundamental to many important social, economic and political processes such as policy making, market pricing and voting. Although there exist many models and mechanisms for aggregation, there is a lack of methods and literature regarding the aggregation of opinions when influence and learning between ind… ▽ More

    Submitted 28 December, 2017; originally announced December 2017.

  33. arXiv:1710.02619  [pdf, ps, other

    cs.LG stat.ML

    Ranking and Selection as Stochastic Control

    Authors: Yijie Peng, Edwin K. P. Chong, Chun-Hung Chen, Michael C. Fu

    Abstract: Under a Bayesian framework, we formulate the fully sequential sampling and selection decision in statistical ranking and selection as a stochastic control problem, and derive the associated Bellman equation. Using value function approximation, we derive an approximately optimal allocation policy. We show that this policy is not only computationally efficient but also possesses both one-step-ahead… ▽ More

    Submitted 6 October, 2017; originally announced October 2017.

    Comments: 15 pages, 8 figures, to appear in IEEE Transactions on Automatic Control

    MSC Class: IEEE

  34. arXiv:1706.09192  [pdf, other

    cs.SI

    Network Topology Inference Using Information Cascades with Limited Statistical Knowledge

    Authors: Feng Ji, Wenchang Tang, Wee Peng Tay, Edwin K. P. Chong

    Abstract: We study the problem of inferring network topology from information cascades, in which the amount of time taken for information to diffuse across an edge in the network follows an unknown distribution. Unlike previous studies, which assume knowledge of these distributions, we only require that diffusion along different edges in the network be independent together with limited moment information (e… ▽ More

    Submitted 4 March, 2019; v1 submitted 28 June, 2017; originally announced June 2017.

  35. arXiv:1703.08589  [pdf, other

    math.OC cs.DS

    Polynomial-Time Methods to Solve Unimodular Quadratic Programs With Performance Guarantees

    Authors: Shankarachary Ragi, Edwin K. P. Chong, Hans D. Mittelmann

    Abstract: We develop polynomial-time heuristic methods to solve unimodular quadratic programs (UQPs) approximately, which are known to be NP-hard. In the UQP framework, we maximize a quadratic function of a vector of complex variables with unit modulus. Several problems in active sensing and wireless communication applications boil down to UQP. With this motivation, we present three new heuristic methods wi… ▽ More

    Submitted 24 March, 2017; originally announced March 2017.

  36. arXiv:1603.04893  [pdf, ps, other

    math.OC cs.GT

    Performance Bounds for Nash Equilibria in Submodular Utility Systems with User Groups

    Authors: Yajing Liu, Edwin K. P. Chong, Ali Pezeshki

    Abstract: In this paper, we consider variations of the utility system considered by Vetta, in which users are grouped together. Our aim is to establish how grouping and cooperation among users affect performance bounds. We consider two types of grouping. The first type is from \cite{Zhang2014}, where each user belongs to a group of users having social ties with it. For this type of utility system, each user… ▽ More

    Submitted 11 October, 2017; v1 submitted 15 March, 2016; originally announced March 2016.

    Comments: This paper was accepted by Journal of Control and Decision

  37. arXiv:1507.04822  [pdf, ps, other

    cs.IT

    Subspace selection for projection maximization with matroid constraints

    Authors: Zhenliang Zhang, Yuan Wang, Edwin K. P. Chong, Ali Pezeshki, Louis Scharf

    Abstract: Suppose that there is a ground set which consists of a large number of vectors in a Hilbert space. Consider the problem of selecting a subset of the ground set such that the projection of a vector of interest onto the subspace spanned by the vectors in the chosen subset reaches the maximum norm. This problem is generally NP-hard, and alternative approximation algorithms such as forward regression… ▽ More

    Submitted 16 July, 2015; originally announced July 2015.

  38. Robust Decentralized Detection and Social Learning in Tandem Networks

    Authors: Jack Ho, Wee Peng Tay, Tony Q. S. Quek, Edwin K. P. Chong

    Abstract: We study a tandem of agents who make decisions about an underlying binary hypothesis, where the distribution of the agent observations under each hypothesis comes from an uncertainty class. We investigate both decentralized detection rules, where agents collaborate to minimize the error probability of the final agent, and social learning rules, where each agent minimizes its own local minimax erro… ▽ More

    Submitted 23 January, 2015; originally announced January 2015.

  39. Intersection Information based on Common Randomness

    Authors: Virgil Griffith, Edwin K. P. Chong, Ryan G. James, Christopher J. Ellison, James P. Crutchfield

    Abstract: The introduction of the partial information decomposition generated a flurry of proposals for defining an intersection information that quantifies how much of "the same information" two or more random variables specify about a target random variable. As of yet, none is wholly satisfactory. A palatable measure of intersection information would provide a principled way to quantify slippery concepts,… ▽ More

    Submitted 10 June, 2015; v1 submitted 6 October, 2013; originally announced October 2013.

    Comments: 19 pages, 5 figures

    Journal ref: Entropy (2014) Volume 16, Issue 4

  40. String Submodular Functions with Curvature Constraints

    Authors: Zhenliang Zhang, Edwin K. P. Chong, Ali Pezeshki, William Moran

    Abstract: The problem of objectively choosing a string of actions to optimize an objective function that is string submodular has been considered in [1]. There it is shown that the greedy strategy, consisting of a string of actions that only locally maximizes the step-wise gain in the objective function achieves at least a (1-e^{-1})-approximation to the optimal strategy. This paper improves this approximat… ▽ More

    Submitted 25 May, 2015; v1 submitted 12 March, 2013; originally announced March 2013.

    Comments: to appear in IEEE Transaction on Automatic Control

  41. Hypothesis Testing in Feedforward Networks with Broadcast Failures

    Authors: Zhenliang Zhang, Edwin K. P. Chong, Ali Pezeshki, William Moran

    Abstract: Consider a countably infinite set of nodes, which sequentially make decisions between two given hypotheses. Each node takes a measurement of the underlying truth, observes the decisions from some immediate predecessors, and makes a decision between the given hypotheses. We consider two classes of broadcast failures: 1) each node broadcasts a decision to the other nodes, subject to random erasure i… ▽ More

    Submitted 25 March, 2013; v1 submitted 19 November, 2012; originally announced November 2012.

  42. arXiv:1210.4507  [pdf, other

    cs.IT cs.MA

    Submodularity and Optimality of Fusion Rules in Balanced Binary Relay Trees

    Authors: Zhenliang Zhang, Edwin K. P. Chong, Ali Pezeshki, William Moran, Stephen D. Howard

    Abstract: We study the distributed detection problem in a balanced binary relay tree, where the leaves of the tree are sensors generating binary messages. The root of the tree is a fusion center that makes the overall decision. Every other node in the tree is a fusion node that fuses two binary messages from its child nodes into a new binary message and sends it to the parent node at the next level. We assu… ▽ More

    Submitted 16 October, 2012; originally announced October 2012.

  43. Learning in Hierarchical Social Networks

    Authors: Zhenliang Zhang, Edwin K. P. Chong, Ali Pezeshki, William Moran, Stephen D. Howard

    Abstract: We study a social network consisting of agents organized as a hierarchical M-ary rooted tree, common in enterprise and military organizational structures. The goal is to aggregate information to solve a binary hypothesis testing problem. Each agent at a leaf of the tree, and only such an agent, makes a direct measurement of the underlying true hypothesis. The leaf agent then makes a decision and s… ▽ More

    Submitted 21 November, 2012; v1 submitted 30 May, 2012; originally announced June 2012.

  44. Detection Performance in Balanced Binary Relay Trees with Node and Link Failures

    Authors: Zhenliang Zhang, Edwin K. P. Chong, Ali Pezeshki, William Moran, Stephen D. Howard

    Abstract: We study the distributed detection problem in the context of a balanced binary relay tree, where the leaves of the tree correspond to $N$ identical and independent sensors generating binary messages. The root of the tree is a fusion center making an overall decision. Every other node is a relay node that aggregates the messages received from its child nodes into a new message and sends it up towar… ▽ More

    Submitted 19 November, 2012; v1 submitted 1 June, 2012; originally announced June 2012.

  45. arXiv:1202.3913  [pdf, other

    cs.IT

    Greedy Adaptive Compression in Signal-Plus-Noise Models

    Authors: Entao Liu, Edwin K. P. Chong, Louis L. Scharf

    Abstract: The purpose of this article is to examine the greedy adaptive measurement policy in the context of a linear Guassian measurement model with an optimization criterion based on information gain. In the special case of sequential scalar measurements, we provide sufficient conditions under which the greedy policy actually is optimal in the sense of maximizing the net information gain. In the general s… ▽ More

    Submitted 17 August, 2012; v1 submitted 17 February, 2012; originally announced February 2012.

  46. arXiv:1202.2319   

    cs.IT

    Detection Performance of M-ary Relay Trees with Non-binary Message Alphabets

    Authors: Zhenliang Zhang, Edwin K. P. Chong, Ali Pezeshki, William Moran, Stephen D. Howard

    Abstract: We study the detection performance of $M$-ary relay trees, where only the leaves of the tree represent sensors making measurements. The root of the tree represents the fusion center which makes an overall detection decision. Each of the other nodes is a relay node which aggregates $M$ messages sent by its child nodes into a new compressed message and sends the message to its parent node. Building… ▽ More

    Submitted 1 November, 2012; v1 submitted 10 February, 2012; originally announced February 2012.

    Comments: Submitted to SSP workshop 2012

  47. arXiv:1202.1354   

    cs.IT

    Error Probability Bounds for M-ary Relay Trees

    Authors: Zhenliang Zhang, Edwin K. P. Chong, Ali Pezeshki, William Moran, Stephen D. Howard

    Abstract: We study the detection error probabilities associated with an M-ary relay tree, where the leaves of the tree correspond to identical and independent sensors. Only these leaves are sensors. The root of the tree represents a fusion center that makes the overall detection decision. Each of the other nodes in the tree is a relay node that combines M summarized messages from its immediate child nodes t… ▽ More

    Submitted 1 November, 2012; v1 submitted 7 February, 2012; originally announced February 2012.

    Comments: Submitted to ISIT 2012

  48. arXiv:1107.1824  [pdf, other

    cs.IT

    Measurement Design for Detecting Sparse Signals

    Authors: Ramin Zahedi, Ali Pezeshki, Edwin K. P. Chong

    Abstract: We consider the problem of testing for the presence (or detection) of an unknown sparse signal in additive white noise. Given a fixed measurement budget, much smaller than the dimension of the signal, we consider the general problem of designing compressive measurements to maximize the measurement signal-to-noise ratio (SNR), as increasing SNR improves the detection performance in a large class of… ▽ More

    Submitted 9 July, 2011; originally announced July 2011.

  49. arXiv:1106.4288  [pdf, ps, other

    cs.NI cs.IT math.AP

    Continuum Limits of Markov Chains with Application to Network Modeling

    Authors: Yang Zhang, Edwin K. P. Chong, Jan Hannig, Donald Estep

    Abstract: In this paper we investigate the continuum limits of a class of Markov chains. The investigation of such limits is motivated by the desire to model very large networks. We show that under some conditions, a sequence of Markov chains converges in some sense to the solution of a partial differential equation. Based on such convergence we approximate Markov chains modeling networks with a large numbe… ▽ More

    Submitted 21 June, 2011; originally announced June 2011.

    Comments: 15 pages, 10 figures

  50. arXiv:1106.0061  [pdf, other

    cs.IT

    Error Probability Bounds for Binary Relay Trees with Crummy Sensors

    Authors: Zhenliang Zhang, Ali Pezeshki, William Moran, Stephen D. Howard, Edwin K. P. Chong

    Abstract: We study the detection error probability associated with balanced binary relay trees, in which sensor nodes fail with some probability. We consider N identical and independent crummy sensors, represented by leaf nodes of the tree. The root of the tree represents the fusion center, which makes the final decision between two hypotheses. Every other node is a relay node, which fuses at most two binar… ▽ More

    Submitted 31 May, 2011; originally announced June 2011.