Skip to main content

Showing 1–24 of 24 results for author: Chow, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.18310  [pdf, other

    cs.CV cs.LG eess.IV

    Spatial-temporal Hierarchical Reinforcement Learning for Interpretable Pathology Image Super-Resolution

    Authors: Wenting Chen, Jie Liu, Tommy W. S. Chow, Yixuan Yuan

    Abstract: Pathology image are essential for accurately interpreting lesion cells in cytopathology screening, but acquiring high-resolution digital slides requires specialized equipment and long scanning times. Though super-resolution (SR) techniques can alleviate this problem, existing deep learning models recover pathology image in a black-box manner, which can lead to untruthful biological details and mis… ▽ More

    Submitted 26 June, 2024; originally announced June 2024.

    Comments: Accepted to IEEE TRANSACTIONS ON MEDICAL IMAGING (TMI)

  2. arXiv:2406.07061  [pdf, other

    eess.IV cs.CV

    Triage of 3D pathology data via 2.5D multiple-instance learning to guide pathologist assessments

    Authors: Gan Gao, Andrew H. Song, Fiona Wang, David Brenes, Rui Wang, Sarah S. L. Chow, Kevin W. Bishop, Lawrence D. True, Faisal Mahmood, Jonathan T. C. Liu

    Abstract: Accurate patient diagnoses based on human tissue biopsies are hindered by current clinical practice, where pathologists assess only a limited number of thin 2D tissue slices sectioned from 3D volumetric tissue. Recent advances in non-destructive 3D pathology, such as open-top light-sheet microscopy, enable comprehensive imaging of spatially heterogeneous tissue morphologies, offering the feasibili… ▽ More

    Submitted 11 June, 2024; originally announced June 2024.

    Comments: CVPR CVMI 2024

    Journal ref: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops, 2024, pp. 6955-6965

  3. arXiv:2405.08194  [pdf, other

    cs.IT

    Distributionally Robust Degree Optimization for BATS Codes

    Authors: Hoover H. F. Yin, Jie Wang, Sherman S. M. Chow

    Abstract: Batched sparse (BATS) code is a network coding solution for multi-hop wireless networks with packet loss. Achieving a close-to-optimal rate relies on an optimal degree distribution. Technical challenges arise from the sensitivity of this distribution to the often empirically obtained rank distribution at the destination node. Specifically, if the empirical distribution overestimates the channel, B… ▽ More

    Submitted 13 May, 2024; originally announced May 2024.

    Comments: 8 pages, accepted by 2024 IEEE International Symposium on Information Theory

  4. DP-Forward: Fine-tuning and Inference on Language Models with Differential Privacy in Forward Pass

    Authors: Minxin Du, Xiang Yue, Sherman S. M. Chow, Tianhao Wang, Chenyu Huang, Huan Sun

    Abstract: Differentially private stochastic gradient descent (DP-SGD) adds noise to gradients in back-propagation, safeguarding training data from privacy leakage, particularly membership inference. It fails to cover (inference-time) threats like embedding inversion and sensitive attribute inference. It is also costly in storage and computation when used to fine-tune large pre-trained language models (LMs).… ▽ More

    Submitted 19 September, 2023; v1 submitted 13 September, 2023; originally announced September 2023.

    Comments: To appear at ACM CCS '23. This is the full version. The first two authors contribute equally

  5. arXiv:2305.07593  [pdf, ps, other

    cs.CR cs.IT

    Unconditionally Secure Access Control Encryption

    Authors: Cheuk Ting Li, Sherman S. M. Chow

    Abstract: Access control encryption (ACE) enforces, through a sanitizer as the mediator, that only legitimate sender-receiver pairs can communicate, without the sanitizer knowing the communication metadata, including its sender and recipient identity, the policy over them, and the underlying plaintext. Any illegitimate transmission is indistinguishable from pure noise. Existing works focused on computationa… ▽ More

    Submitted 12 May, 2023; originally announced May 2023.

    Comments: 10 pages. This is the long version of a paper to be presented at 2023 IEEE International Symposium on Information Theory

  6. Collaborative Residual Metric Learning

    Authors: Tianjun Wei, Jianghong Ma, Tommy W. S. Chow

    Abstract: In collaborative filtering, distance metric learning has been applied to matrix factorization techniques with promising results. However, matrix factorization lacks the ability of capturing collaborative information, which has been remarked by recent works and improved by interpreting user interactions as signals. This paper aims to find out how metric learning connect to these signal-based models… ▽ More

    Submitted 16 April, 2023; originally announced April 2023.

    Comments: Accepted by SIGIR '23

  7. arXiv:2304.03841  [pdf, other

    cs.CR

    Efficient Secure Aggregation for Privacy-Preserving Federated Machine Learning

    Authors: Rouzbeh Behnia, Arman Riasi, Reza Ebrahimi, Sherman S. M. Chow, Balaji Padmanabhan, Thang Hoang

    Abstract: Secure aggregation protocols ensure the privacy of users' data in federated learning by preventing the disclosure of local gradients. Many existing protocols impose significant communication and computational burdens on participants and may not efficiently handle the large update vectors typical of machine learning models. Correspondingly, we present e-SeaFL, an efficient verifiable secure aggrega… ▽ More

    Submitted 8 November, 2024; v1 submitted 7 April, 2023; originally announced April 2023.

    Comments: Accepted in ACSAC 2024

  8. arXiv:2210.10244  [pdf, other

    cs.CR

    Prove You Owned Me: One Step beyond RFID Tag/Mutual Authentication

    Authors: Shaoying Cai, Yingjiu Li, Changshe Ma, Sherman S. M. Chow, Robert H. Deng

    Abstract: Radio Frequency Identification (RFID) is a key technology used in many applications. In the past decades, plenty of secure and privacy-preserving RFID tag/mutual authentication protocols as well as formal frameworks for evaluating them have been proposed. However, we notice that a property, namely proof of possession (PoP), has not been rigorously studied till now, despite it has significant value… ▽ More

    Submitted 18 October, 2022; originally announced October 2022.

  9. Modeling sequential annotations for sequence labeling with crowds

    Authors: Xiaolei Lu, Tommy W. S. Chow

    Abstract: Crowd sequential annotations can be an efficient and cost-effective way to build large datasets for sequence labeling. Different from tagging independent instances, for crowd sequential annotations the quality of label sequence relies on the expertise level of annotators in capturing internal dependencies for each token in the sequence. In this paper, we propose Modeling sequential annotation for… ▽ More

    Submitted 19 September, 2022; originally announced September 2022.

    Journal ref: IEEE Transactions on Cybernetics, 2021, 1-11

  10. Weak Disambiguation for Partial Structured Output Learning

    Authors: Xiaolei Lu, Tommy W. S. Chow

    Abstract: Existing disambiguation strategies for partial structured output learning just cannot generalize well to solve the problem that there are some candidates which can be false positive or similar to the ground-truth label. In this paper, we propose a novel weak disambiguation for partial structured output learning (WD-PSL). First, a piecewise large margin formulation is generalized to partial structu… ▽ More

    Submitted 19 September, 2022; originally announced September 2022.

    Journal ref: IEEE Transactions on Cybernetics ( Volume: 52, Issue: 2, February 2022)

  11. Partial sequence labeling with structured Gaussian Processes

    Authors: Xiaolei Lu, Tommy W. S. Chow

    Abstract: Existing partial sequence labeling models mainly focus on max-margin framework which fails to provide an uncertainty estimation of the prediction. Further, the unique ground truth disambiguation strategy employed by these models may include wrong label information for parameter learning. In this paper, we propose structured Gaussian Processes for partial sequence labeling (SGPPSL), which encodes u… ▽ More

    Submitted 19 September, 2022; originally announced September 2022.

    Journal ref: IEEE Transactions on Neural Networks and Learning Systems, 2022, 1 - 10

  12. Duration modeling with semi-Markov Conditional Random Fields for keyphrase extraction

    Authors: Xiaolei Lu, Tommy W. S. Chow

    Abstract: Existing methods for keyphrase extraction need preprocessing to generate candidate phrase or post-processing to transform keyword into keyphrase. In this paper, we propose a novel approach called duration modeling with semi-Markov Conditional Random Fields (DM-SMCRFs) for keyphrase extraction. First of all, based on the property of semi-Markov chain, DM-SMCRFs can encode segment-level features and… ▽ More

    Submitted 19 September, 2022; originally announced September 2022.

    Journal ref: IEEE Transactions on Knowledge and Data Engineering,Volume: 33, Issue: 4, 01 April 2021

  13. Fine-tuning Partition-aware Item Similarities for Efficient and Scalable Recommendation

    Authors: Tianjun Wei, Jianghong Ma, Tommy W. S. Chow

    Abstract: Collaborative filtering (CF) is widely searched in recommendation with various types of solutions. Recent success of Graph Convolution Networks (GCN) in CF demonstrates the effectiveness of modeling high-order relationships through graphs, while repetitive graph convolution and iterative batch optimization limit their efficiency. Instead, item similarity models attempt to construct direct relation… ▽ More

    Submitted 10 February, 2023; v1 submitted 13 July, 2022; originally announced July 2022.

    Comments: Accepted by The 2023 ACM Web Conference (WWW 2023)

  14. arXiv:2206.04855  [pdf, other

    cs.LG eess.SP

    Beyond the Gates of Euclidean Space: Temporal-Discrimination-Fusions and Attention-based Graph Neural Network for Human Activity Recognition

    Authors: Nafees Ahmad, Savio Ho-Chit Chow, Ho-fung Leung

    Abstract: Human activity recognition (HAR) through wearable devices has received much interest due to its numerous applications in fitness tracking, wellness screening, and supported living. As a result, we have seen a great deal of work in this field. Traditional deep learning (DL) has set a state of the art performance for HAR domain. However, it ignores the data's structure and the association between co… ▽ More

    Submitted 9 June, 2022; originally announced June 2022.

  15. arXiv:2106.01221  [pdf, other

    cs.CL cs.CR

    Differential Privacy for Text Analytics via Natural Text Sanitization

    Authors: Xiang Yue, Minxin Du, Tianhao Wang, Yaliang Li, Huan Sun, Sherman S. M. Chow

    Abstract: Texts convey sophisticated knowledge. However, texts also convey sensitive information. Despite the success of general-purpose language models and domain-specific mechanisms with differential privacy (DP), existing text sanitization mechanisms still provide low utility, as cursed by the high-dimensional text representation. The companion issue of utilizing sanitized texts for downstream analytics… ▽ More

    Submitted 2 June, 2021; originally announced June 2021.

    Comments: ACL-ICJNLP'21 Findings; The first two authors contributed equally

  16. arXiv:2002.10944  [pdf, other

    cs.CR cs.LG

    Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions

    Authors: Minghui Li, Sherman S. M. Chow, Shengshan Hu, Yuejing Yan, Chao Shen, Qian Wang

    Abstract: Convolutional neural network is a machine-learning model widely applied in various prediction tasks, such as computer vision and medical image analysis. Their great predictive power requires extensive computation, which encourages model owners to host the prediction service in a cloud platform. Recent researches focus on the privacy of the query and results, but they do not provide model privacy a… ▽ More

    Submitted 29 June, 2020; v1 submitted 22 February, 2020; originally announced February 2020.

  17. arXiv:2001.09961  [pdf, ps, other

    cs.SI physics.soc-ph

    Efficient Algorithms towards Network Intervention

    Authors: Hui-Ju Hung, Wang-Chien Lee, De-Nian Yang, Chih-Ya Shen, Zhen Lei, Sy-Miin Chow

    Abstract: Research suggests that social relationships have substantial impacts on individuals' health outcomes. Network intervention, through careful planning, can assist a network of users to build healthy relationships. However, most previous work is not designed to assist such planning by carefully examining and improving multiple network characteristics. In this paper, we propose and evaluate algorithms… ▽ More

    Submitted 27 January, 2020; originally announced January 2020.

  18. Learning with fuzzy hypergraphs: a topical approach to query-oriented text summarization

    Authors: Hadrien Van Lierde, Tommy W. S. Chow

    Abstract: Existing graph-based methods for extractive document summarization represent sentences of a corpus as the nodes of a graph or a hypergraph in which edges depict relationships of lexical similarity between sentences. Such approaches fail to capture semantic similarities between sentences when they express a similar information but have few words in common and are thus lexically dissimilar. To overc… ▽ More

    Submitted 22 June, 2019; originally announced June 2019.

    Comments: 8 figures

    Journal ref: Information Sciences, 496 (2019), 212-224

  19. Query-oriented text summarization based on hypergraph transversals

    Authors: Hadrien Van Lierde, Tommy W. S. Chow

    Abstract: Existing graph- and hypergraph-based algorithms for document summarization represent the sentences of a corpus as the nodes of a graph or a hypergraph in which the edges represent relationships of lexical similarities between sentences. Each sentence of the corpus is then scored individually, using popular node ranking algorithms, and a summary is produced by extracting highly scored sentences. Th… ▽ More

    Submitted 2 February, 2019; originally announced February 2019.

    Comments: This is the unrefereed Author's Original Version (or pre-print Version) of the article

    Journal ref: Information Processing & Management, Volume 56, Issue 4, July 2019, Pages 1317-1338

  20. arXiv:1805.00862  [pdf, other

    cs.DS cs.CV cs.DM stat.ML

    Spectral clustering algorithms for the detection of clusters in block-cyclic and block-acyclic graphs

    Authors: H. Van Lierde, T. W. S. Chow, J. -C. Delvenne

    Abstract: We propose two spectral algorithms for partitioning nodes in directed graphs respectively with a cyclic and an acyclic pattern of connection between groups of nodes. Our methods are based on the computation of extremal eigenvalues of the transition matrix associated to the directed graph. The two algorithms outperform state-of-the art methods for directed graph clustering on synthetic datasets, in… ▽ More

    Submitted 2 May, 2018; originally announced May 2018.

    Comments: This is the unrefereed Author's Original Version of the article. A peer-reviewed version has been accepted for publication in the Journal of Complex Networks published by Oxford University Press. The present version is not the Accepted Manuscript

    Journal ref: Journal of Complex Networks, cny011 (2018)

  21. Exactly Robust Kernel Principal Component Analysis

    Authors: Jicong Fan, Tommy W. S. Chow

    Abstract: Robust principal component analysis (RPCA) can recover low-rank matrices when they are corrupted by sparse noises. In practice, many matrices are, however, of high-rank and hence cannot be recovered by RPCA. We propose a novel method called robust kernel principal component analysis (RKPCA) to decompose a partially corrupted matrix as a sparse matrix plus a high or full-rank matrix with low latent… ▽ More

    Submitted 17 April, 2019; v1 submitted 28 February, 2018; originally announced February 2018.

    Comments: The paper was accepted by IEEE Transactions on Neural Networks and Learning Systems

  22. arXiv:1512.05417  [pdf, other

    cs.SI math.NA physics.soc-ph

    Influence Prediction for Continuous-Time Information Propagation on Networks

    Authors: Shui-Nee Chow, Xiaojing Ye, Hongyuan Zha, Haomin Zhou

    Abstract: We consider the problem of predicting the time evolution of influence, the expected number of activated nodes, given a set of initially active nodes on a propagation network. To address the significant computational challenges of this problem on large-scale heterogeneous networks, we establish a system of differential equations governing the dynamics of probability mass functions on the state grap… ▽ More

    Submitted 7 January, 2017; v1 submitted 16 December, 2015; originally announced December 2015.

    Comments: 14 pages, 17 figures

    MSC Class: 65C40; 65Y10; 68U35

  23. arXiv:1411.6400   

    stat.ML cs.LG

    Mutual Information-Based Unsupervised Feature Transformation for Heterogeneous Feature Subset Selection

    Authors: Min Wei, Tommy W. S. Chow, Rosa H. M. Chan

    Abstract: Conventional mutual information (MI) based feature selection (FS) methods are unable to handle heterogeneous feature subset selection properly because of data format differences or estimation methods of MI between feature subset and class label. A way to solve this problem is feature transformation (FT). In this study, a novel unsupervised feature transformation (UFT) which can transform non-numer… ▽ More

    Submitted 29 March, 2015; v1 submitted 24 November, 2014; originally announced November 2014.

    Comments: This paper has been withdrawn by the author due to the number of datasets and classifiers are not sufficient to support the claim. Need more simulation work

  24. arXiv:1405.4951  [pdf, ps, other

    cs.CR cs.SI stat.ML

    Secure Friend Discovery via Privacy-Preserving and Decentralized Community Detection

    Authors: Pili Hu, Sherman S. M. Chow, Wing Cheong Lau

    Abstract: The problem of secure friend discovery on a social network has long been proposed and studied. The requirement is that a pair of nodes can make befriending decisions with minimum information exposed to the other party. In this paper, we propose to use community detection to tackle the problem of secure friend discovery. We formulate the first privacy-preserving and decentralized community detectio… ▽ More

    Submitted 20 May, 2014; originally announced May 2014.

    Comments: ICML 2014 Workshop on Learning, Security and Privacy