-
Diffusion-Based Electrocardiography Noise Quantification via Anomaly Detection
Authors:
Tae-Seong Han,
Jae-Wook Heo,
Hakseung Kim,
Cheol-Hui Lee,
Hyub Huh,
Eue-Keun Choi,
Dong-Joo Kim
Abstract:
Electrocardiography (ECG) signals are often degraded by noise, which complicates diagnosis in clinical and wearable settings. This study proposes a diffusion-based framework for ECG noise quantification via reconstruction-based anomaly detection, addressing annotation inconsistencies and the limited generalizability of conventional methods. We introduce a distributional evaluation using the Wasser…
▽ More
Electrocardiography (ECG) signals are often degraded by noise, which complicates diagnosis in clinical and wearable settings. This study proposes a diffusion-based framework for ECG noise quantification via reconstruction-based anomaly detection, addressing annotation inconsistencies and the limited generalizability of conventional methods. We introduce a distributional evaluation using the Wasserstein-1 distance ($W_1$), comparing the reconstruction error distributions between clean and noisy ECGs to mitigate inconsistent annotations. Our final model achieved robust noise quantification using only three reverse diffusion steps. The model recorded a macro-average $W_1$ score of 1.308 across the benchmarks, outperforming the next-best method by over 48%. External validations demonstrated strong generalizability, supporting the exclusion of low-quality segments to enhance diagnostic accuracy and enable timely clinical responses to signal degradation. The proposed method enhances clinical decision-making, diagnostic accuracy, and real-time ECG monitoring capabilities, supporting future advancements in clinical and wearable ECG applications.
△ Less
Submitted 13 June, 2025;
originally announced June 2025.
-
I Experienced More than 10 DeFi Scams: On DeFi Users' Perception of Security Breaches and Countermeasures
Authors:
Mingyi Liu,
Jun Ho Huh,
HyungSeok Han,
Jaehyuk Lee,
Jihae Ahn,
Frank Li,
Hyoungshick Kim,
Taesoo Kim
Abstract:
Decentralized Finance (DeFi) offers a whole new investment experience and has quickly emerged as an enticing alternative to Centralized Finance (CeFi). Rapidly growing market size and active users, however, have also made DeFi a lucrative target for scams and hacks, with 1.95 billion USD lost in 2023. Unfortunately, no prior research thoroughly investigates DeFi users' security risk awareness leve…
▽ More
Decentralized Finance (DeFi) offers a whole new investment experience and has quickly emerged as an enticing alternative to Centralized Finance (CeFi). Rapidly growing market size and active users, however, have also made DeFi a lucrative target for scams and hacks, with 1.95 billion USD lost in 2023. Unfortunately, no prior research thoroughly investigates DeFi users' security risk awareness levels and the adequacy of their risk mitigation strategies.
Based on a semi-structured interview study (N = 14) and a follow-up survey (N = 493), this paper investigates DeFi users' security perceptions and commonly adopted practices, and how those affected by previous scams or hacks (DeFi victims) respond and try to recover their losses. Our analysis shows that users often prefer DeFi over CeFi due to their decentralized nature and strong profitability. Despite being aware that DeFi, compared to CeFi, is prone to more severe attacks, users are willing to take those risks to explore new investment opportunities. Worryingly, most victims do not learn from previous experiences; unlike victims studied through traditional systems, DeFi victims tend to find new services, without revising their security practices, to recover their losses quickly. The abundance of various DeFi services and opportunities allows victims to continuously explore new financial opportunities, and this reality seems to cloud their security priorities. Indeed, our results indicate that DeFi users' strong financial motivations outweigh their security concerns - much like those who are addicted to gambling. Our observations about victims' post-incident behaviors suggest that stronger control in the form of industry regulations would be necessary to protect DeFi users from future breaches.
△ Less
Submitted 21 June, 2024;
originally announced June 2024.
-
Computing Optimal Manipulations in Cryptographic Self-Selection Proof-of-Stake Protocols
Authors:
Matheus V. X. Ferreira,
Aadityan Ganesh,
Jack Hourigan,
Hannah Huh,
S. Matthew Weinberg,
Catherine Yu
Abstract:
Cryptographic Self-Selection is a paradigm employed by modern Proof-of-Stake consensus protocols to select a block-proposing "leader." Algorand [Chen and Micali, 2019] proposes a canonical protocol, and Ferreira et al. [2022] establish bounds $f(α,β)$ on the maximum fraction of rounds a strategic player can lead as a function of their stake $α$ and a network connectivity parameter $β$. While both…
▽ More
Cryptographic Self-Selection is a paradigm employed by modern Proof-of-Stake consensus protocols to select a block-proposing "leader." Algorand [Chen and Micali, 2019] proposes a canonical protocol, and Ferreira et al. [2022] establish bounds $f(α,β)$ on the maximum fraction of rounds a strategic player can lead as a function of their stake $α$ and a network connectivity parameter $β$. While both their lower and upper bounds are non-trivial, there is a substantial gap between them (for example, they establish $f(10\%,1) \in [10.08\%, 21.12\%]$), leaving open the question of how significant of a concern these manipulations are. We develop computational methods to provably nail $f(α,β)$ for any desired $(α,β)$ up to arbitrary precision, and implement our method on a wide range of parameters (for example, we confirm $f(10\%,1) \in [10.08\%, 10.15\%]$).
Methodologically, estimating $f(α,β)$ can be phrased as estimating to high precision the value of a Markov Decision Process whose states are countably-long lists of real numbers. Our methodological contributions involve (a) reformulating the question instead as computing to high precision the expected value of a distribution that is a fixed-point of a non-linear sampling operator, and (b) provably bounding the error induced by various truncations and sampling estimations of this distribution (which appears intractable to solve in closed form). One technical challenge, for example, is that natural sampling-based estimates of the mean of our target distribution are \emph{not} unbiased estimators, and therefore our methods necessarily go beyond claiming sufficiently-many samples to be close to the mean.
△ Less
Submitted 21 June, 2024;
originally announced June 2024.
-
Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin 'Forks' in the Wild
Authors:
Jusop Choi,
Wonseok Choi,
William Aiken,
Hyoungshick Kim,
Jun Ho Huh,
Taesoo Kim,
Yongdae Kim,
Ross Anderson
Abstract:
Since Bitcoin appeared in 2009, over 6,000 different cryptocurrency projects have followed. The cryptocurrency world may be the only technology where a massive number of competitors offer similar services yet claim unique benefits, including scalability, fast transactions, and security. But are these projects really offering unique features and significant enhancements over their competitors? To a…
▽ More
Since Bitcoin appeared in 2009, over 6,000 different cryptocurrency projects have followed. The cryptocurrency world may be the only technology where a massive number of competitors offer similar services yet claim unique benefits, including scalability, fast transactions, and security. But are these projects really offering unique features and significant enhancements over their competitors? To answer this question, we conducted a large-scale empirical analysis of code maintenance activities, originality and security across 592 crypto projects. We found that about half of these projects have not been updated for the last six months; over two years, about three-quarters of them disappeared, or were reported as scams or inactive. We also investigated whether 11 security vulnerabilities patched in Bitcoin were also patched in other projects. We found that about 80% of 510 C-language-based cryptocurrency projects have at least one unpatched vulnerability, and the mean time taken to fix the vulnerability is 237.8 days. Among those 510 altcoins, we found that at least 157 altcoins are likely to have been forked from Bitcoin, about a third of them containing only slight changes from the Bitcoin version from which they were forked. As case studies, we did a deep dive into 20 altcoins (e.g., Litecoin, FujiCoin, and Feathercoin) similar to the version of Bitcoin used for the fork. About half of them did not make any technically meaningful change - failing to comply with the promises (e.g., about using Proof of Stake) made in their whitepapers.
△ Less
Submitted 21 January, 2022;
originally announced January 2022.
-
Achieving "Massive MIMO" Spectral Efficiency with a Not-so-Large Number of Antennas
Authors:
Hoon Huh,
Giuseppe Caire,
Haralabos C. Papadopoulos,
Sean A. Ramprashad
Abstract:
The main focus and contribution of this paper is a novel network-MIMO TDD architecture that achieves spectral efficiencies comparable with "Massive MIMO", with one order of magnitude fewer antennas per active user per cell. The proposed architecture is based on a family of network-MIMO schemes defined by small clusters of cooperating base stations, zero-forcing multiuser MIMO precoding with suitab…
▽ More
The main focus and contribution of this paper is a novel network-MIMO TDD architecture that achieves spectral efficiencies comparable with "Massive MIMO", with one order of magnitude fewer antennas per active user per cell. The proposed architecture is based on a family of network-MIMO schemes defined by small clusters of cooperating base stations, zero-forcing multiuser MIMO precoding with suitable inter-cluster interference constraints, uplink pilot signals reuse across cells, and frequency reuse. The key idea consists of partitioning the users population into geographically determined "bins", such that all users in the same bin are statistically equivalent, and use the optimal network-MIMO architecture in the family for each bin. A scheduler takes care of serving the different bins on the time-frequency slots, in order to maximize a desired network utility function that captures some desired notion of fairness. This results in a mixed-mode network-MIMO architecture, where different schemes, each of which is optimized for the served user bin, are multiplexed in time-frequency. In order to carry out the performance analysis and the optimization of the proposed architecture in a clean and computationally efficient way, we consider the large-system regime where the number of users, the number of antennas, and the channel coherence block length go to infinity with fixed ratios. The performance predicted by the large-system asymptotic analysis matches very well the finite-dimensional simulations. Overall, the system spectral efficiency obtained by the proposed architecture is similar to that achieved by "Massive MIMO", with a 10-fold reduction in the number of antennas at the base stations (roughly, from 500 to 50 antennas).
△ Less
Submitted 12 September, 2011; v1 submitted 19 July, 2011;
originally announced July 2011.
-
Network MIMO with Linear Zero-Forcing Beamforming: Large System Analysis, Impact of Channel Estimation and Reduced-Complexity Scheduling
Authors:
Hoon Huh,
Antonia M. Tulino,
Giuseppe Caire
Abstract:
We consider the downlink of a multi-cell system with multi-antenna base stations and single-antenna user terminals, arbitrary base station cooperation clusters, distance-dependent propagation pathloss, and general "fairness" requirements. Base stations in the same cooperation cluster employ joint transmission with linear zero-forcing beamforming, subject to sum or per-base station power constraint…
▽ More
We consider the downlink of a multi-cell system with multi-antenna base stations and single-antenna user terminals, arbitrary base station cooperation clusters, distance-dependent propagation pathloss, and general "fairness" requirements. Base stations in the same cooperation cluster employ joint transmission with linear zero-forcing beamforming, subject to sum or per-base station power constraints. Inter-cluster interference is treated as noise at the user terminals. Analytic expressions for the system spectral efficiency are found in the large-system limit where both the numbers of users and antennas per base station tend to infinity with a given ratio. In particular, for the per-base station power constraint, we find new results in random matrix theory, yielding the squared Frobenius norm of submatrices of the Moore-Penrose pseudo-inverse for the structured non-i.i.d. channel matrix resulting from the cooperation cluster, user distribution, and path-loss coefficients. The analysis is extended to the case of non-ideal Channel State Information at the Transmitters (CSIT) obtained through explicit downlink channel training and uplink feedback. Specifically, our results illuminate the trade-off between the benefit of a larger number of cooperating antennas and the cost of estimating higher-dimensional channel vectors. Furthermore, our analysis leads to a new simplified downlink scheduling scheme that pre-selects the users according to probabilities obtained from the large-system results, depending on the desired fairness criterion. The proposed scheme performs close to the optimal (finite-dimensional) opportunistic user selection while requiring significantly less channel state feedback, since only a small fraction of pre-selected users must feed back their channel state information.
△ Less
Submitted 11 September, 2011; v1 submitted 14 December, 2010;
originally announced December 2010.
-
Multi-Cell MIMO Downlink with Cell Cooperation and Fair Scheduling: a Large-System Limit Analysis
Authors:
Hoon Huh,
Giuseppe Caire,
Sung-Hyun Moon,
Young-Tae Kim,
Inkyu Lee
Abstract:
We consider the downlink of a cellular network with multiple cells and multi-antenna base stations, including a realistic distance-dependent pathloss model, clusters of cooperating cells, and general "fairness" requirements. Beyond Monte Carlo simulation, no efficient computation method to evaluate the ergodic throughput of such systems has been presented so far. We propose an analytic solution ba…
▽ More
We consider the downlink of a cellular network with multiple cells and multi-antenna base stations, including a realistic distance-dependent pathloss model, clusters of cooperating cells, and general "fairness" requirements. Beyond Monte Carlo simulation, no efficient computation method to evaluate the ergodic throughput of such systems has been presented so far. We propose an analytic solution based on the combination of large random matrix results and convex optimization. The proposed method is computationally much more efficient than Monte Carlo simulation and provides surprisingly accurate approximations for the actual finite-dimensional systems, even for a small number of users and base station antennas. Numerical examples include 2-cell linear and three-sectored 7-cell planar layouts, with no inter-cell cooperation, sector cooperation, or full inter-cell cooperation.
△ Less
Submitted 10 June, 2010;
originally announced June 2010.
-
Multi-cell MIMO Downlink with Fairness Criteria: the Large System Limit
Authors:
Hoon Huh,
Giuseppe Caire,
Sung-Hyun Moon,
Inkyu Lee
Abstract:
We consider the downlink of a cellular network with multiple cells and multi-antenna base stations including arbitrary inter-cell cooperation, realistic distance-dependent pathloss and general "fairness" requirements. Beyond Monte Carlo simulation, no efficient computation method to evaluate the ergodic throughput of such systems has been provided so far. We propose an analytic method based on the…
▽ More
We consider the downlink of a cellular network with multiple cells and multi-antenna base stations including arbitrary inter-cell cooperation, realistic distance-dependent pathloss and general "fairness" requirements. Beyond Monte Carlo simulation, no efficient computation method to evaluate the ergodic throughput of such systems has been provided so far. We propose an analytic method based on the combination of the large random matrix theory with Lagrangian optimization. The proposed method is computationally much more efficient than Monte Carlo simulation and provides a very accurate approximation (almost indistinguishable) for the actual finite-dimensional case, even for of a small number of users and base station antennas. Numerical examples include linear 2-cell and planar three-sectored 7-cell layouts, with no inter-cell cooperation, sector cooperation, and full cooperation.
△ Less
Submitted 4 June, 2010; v1 submitted 7 January, 2010;
originally announced January 2010.
-
Multiuser MISO Transmitter Optimization for Inter-Cell Interference Mitigation
Authors:
Hoon Huh,
Haralabos C. Papadopoulos,
Giuseppe Caire
Abstract:
The transmitter optimization (i.e., steering vectors and power allocation) for a MISO Broadcast Channel (MISO-BC) subject to general linear constraints is considered. Such constraints include, as special cases, the sum power, the per-antenna or per-group-of-antennas power, and "forbidden interference direction" constraints. We consider both the optimal dirty-paper coding and the simple suboptima…
▽ More
The transmitter optimization (i.e., steering vectors and power allocation) for a MISO Broadcast Channel (MISO-BC) subject to general linear constraints is considered. Such constraints include, as special cases, the sum power, the per-antenna or per-group-of-antennas power, and "forbidden interference direction" constraints. We consider both the optimal dirty-paper coding and the simple suboptimal linear zero-forcing beamforming strategies, and provide numerically efficient algorithms that solve the problem in its most general form. As an application, we consider a multi-cell scenario with partial cell cooperation, where each cell optimizes its precoder by taking into account interference constraints on specific users in adjacent cells. The effectiveness of the proposed methods is evaluated in a simple system scenario including two adjacent cells, under different fairness criteria that emphasize the bottleneck role of users near the cell "boundary". Our results show that "active" Inter-Cell Interference (ICI) mitigation outperforms the conventional "static" ICI mitigation based on fractional frequency reuse.
△ Less
Submitted 1 March, 2010; v1 submitted 7 September, 2009;
originally announced September 2009.
-
Hybrid Spam Filtering for Mobile Communication
Authors:
Ji Won Yoon,
Hyoungshick Kim,
Jun Ho Huh
Abstract:
Spam messages are an increasing threat to mobile communication. Several mitigation techniques have been proposed, including white and black listing, challenge-response and content-based filtering. However, none are perfect and it makes sense to use a combination rather than just one. We propose an anti-spam framework based on the hybrid of content-based filtering and challenge-response. There is…
▽ More
Spam messages are an increasing threat to mobile communication. Several mitigation techniques have been proposed, including white and black listing, challenge-response and content-based filtering. However, none are perfect and it makes sense to use a combination rather than just one. We propose an anti-spam framework based on the hybrid of content-based filtering and challenge-response. There is the trade-offs between accuracy of anti-spam classifiers and the communication overhead. Experimental results show how, depending on the proportion of spam messages, different filtering %%@ parameters should be set.
△ Less
Submitted 17 August, 2009;
originally announced August 2009.
-
MIMO Broadcast Channel Optimization under General Linear Constraints
Authors:
Hoon Huh,
Haralabos Papadopoulos,
Giuseppe Caire
Abstract:
The optimization of the transmit parameters (power allocation and steering vectors) for the MIMO BC under general linear constraints is treated under the optimal DPC coding strategy and the simple suboptimal linear zero-forcing beamforming strategy. In the case of DPC, we show that "SINR duality" and "min-max duality" yield the same dual MAC problem, and compare two alternatives for its efficien…
▽ More
The optimization of the transmit parameters (power allocation and steering vectors) for the MIMO BC under general linear constraints is treated under the optimal DPC coding strategy and the simple suboptimal linear zero-forcing beamforming strategy. In the case of DPC, we show that "SINR duality" and "min-max duality" yield the same dual MAC problem, and compare two alternatives for its efficient solution. In the case of zero-forcing beamforming, we provide a new efficient algorithm based on the direct optimization of a generalized inverse matrix. In both cases, the algorithms presented here address the problems in the most general form and can be applied to special cases previously considered, such as per-antenna and per-group of antennas power constraints, "forbidden interference direction" constraints, or any combination thereof.
△ Less
Submitted 29 May, 2009; v1 submitted 16 January, 2009;
originally announced January 2009.
-
A resource-based Korean morphological annotation system
Authors:
Hyun-Gue Huh,
Eric Laporte
Abstract:
We describe a resource-based method of morphological annotation of written Korean text. Korean is an agglutinative language. The output of our system is a graph of morphemes annotated with accurate linguistic information. The language resources used by the system can be easily updated, which allows us-ers to control the evolution of the per-formances of the system. We show that morphological ann…
▽ More
We describe a resource-based method of morphological annotation of written Korean text. Korean is an agglutinative language. The output of our system is a graph of morphemes annotated with accurate linguistic information. The language resources used by the system can be easily updated, which allows us-ers to control the evolution of the per-formances of the system. We show that morphological annotation of Korean text can be performed directly with a lexicon of words and without morpho-logical rules.
△ Less
Submitted 21 November, 2007;
originally announced November 2007.
-
Morphological annotation of Korean with Directly Maintainable Resources
Authors:
Ivan Berlocher,
Hyun-Gue Huh,
Eric Laporte,
Jee-Sun Nam
Abstract:
This article describes an exclusively resource-based method of morphological annotation of written Korean text. Korean is an agglutinative language. Our annotator is designed to process text before the operation of a syntactic parser. In its present state, it annotates one-stem words only. The output is a graph of morphemes annotated with accurate linguistic information. The granularity of the t…
▽ More
This article describes an exclusively resource-based method of morphological annotation of written Korean text. Korean is an agglutinative language. Our annotator is designed to process text before the operation of a syntactic parser. In its present state, it annotates one-stem words only. The output is a graph of morphemes annotated with accurate linguistic information. The granularity of the tagset is 3 to 5 times higher than usual tagsets. A comparison with a reference annotated corpus showed that it achieves 89% recall without any corpus training. The language resources used by the system are lexicons of stems, transducers of suffixes and transducers of generation of allomorphs. All can be easily updated, which allows users to control the evolution of the performances of the system. It has been claimed that morphological annotation of Korean text could only be performed by a morphological analysis module accessing a lexicon of morphemes. We show that it can also be performed directly with a lexicon of words and without applying morphological rules at annotation time, which speeds up annotation to 1,210 word/s. The lexicon of words is obtained from the maintainable language resources through a fully automated compilation process.
△ Less
Submitted 21 November, 2007;
originally announced November 2007.