Skip to main content

Showing 1–13 of 13 results for author: Huh, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.11815  [pdf, ps, other

    eess.SP cs.AI cs.LG eess.IV

    Diffusion-Based Electrocardiography Noise Quantification via Anomaly Detection

    Authors: Tae-Seong Han, Jae-Wook Heo, Hakseung Kim, Cheol-Hui Lee, Hyub Huh, Eue-Keun Choi, Dong-Joo Kim

    Abstract: Electrocardiography (ECG) signals are often degraded by noise, which complicates diagnosis in clinical and wearable settings. This study proposes a diffusion-based framework for ECG noise quantification via reconstruction-based anomaly detection, addressing annotation inconsistencies and the limited generalizability of conventional methods. We introduce a distributional evaluation using the Wasser… ▽ More

    Submitted 13 June, 2025; originally announced June 2025.

    Comments: This manuscript contains 17 pages, 10 figures, and 3 tables

  2. arXiv:2406.15709  [pdf, other

    cs.CR

    I Experienced More than 10 DeFi Scams: On DeFi Users' Perception of Security Breaches and Countermeasures

    Authors: Mingyi Liu, Jun Ho Huh, HyungSeok Han, Jaehyuk Lee, Jihae Ahn, Frank Li, Hyoungshick Kim, Taesoo Kim

    Abstract: Decentralized Finance (DeFi) offers a whole new investment experience and has quickly emerged as an enticing alternative to Centralized Finance (CeFi). Rapidly growing market size and active users, however, have also made DeFi a lucrative target for scams and hacks, with 1.95 billion USD lost in 2023. Unfortunately, no prior research thoroughly investigates DeFi users' security risk awareness leve… ▽ More

    Submitted 21 June, 2024; originally announced June 2024.

    Comments: In Proceedings of the 33rd USENIX Security Symposium, Philadelphia, PA, USA, Aug. 2024

  3. arXiv:2406.15282  [pdf, other

    cs.GT cs.CR econ.TH

    Computing Optimal Manipulations in Cryptographic Self-Selection Proof-of-Stake Protocols

    Authors: Matheus V. X. Ferreira, Aadityan Ganesh, Jack Hourigan, Hannah Huh, S. Matthew Weinberg, Catherine Yu

    Abstract: Cryptographic Self-Selection is a paradigm employed by modern Proof-of-Stake consensus protocols to select a block-proposing "leader." Algorand [Chen and Micali, 2019] proposes a canonical protocol, and Ferreira et al. [2022] establish bounds $f(α,β)$ on the maximum fraction of rounds a strategic player can lead as a function of their stake $α$ and a network connectivity parameter $β$. While both… ▽ More

    Submitted 21 June, 2024; originally announced June 2024.

    Comments: Appeared in the 25th ACM Conference on Economics and Computation (EC '24)

    ACM Class: G.3

  4. arXiv:2201.08678  [pdf, other

    cs.CR

    Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin 'Forks' in the Wild

    Authors: Jusop Choi, Wonseok Choi, William Aiken, Hyoungshick Kim, Jun Ho Huh, Taesoo Kim, Yongdae Kim, Ross Anderson

    Abstract: Since Bitcoin appeared in 2009, over 6,000 different cryptocurrency projects have followed. The cryptocurrency world may be the only technology where a massive number of competitors offer similar services yet claim unique benefits, including scalability, fast transactions, and security. But are these projects really offering unique features and significant enhancements over their competitors? To a… ▽ More

    Submitted 21 January, 2022; originally announced January 2022.

  5. Achieving "Massive MIMO" Spectral Efficiency with a Not-so-Large Number of Antennas

    Authors: Hoon Huh, Giuseppe Caire, Haralabos C. Papadopoulos, Sean A. Ramprashad

    Abstract: The main focus and contribution of this paper is a novel network-MIMO TDD architecture that achieves spectral efficiencies comparable with "Massive MIMO", with one order of magnitude fewer antennas per active user per cell. The proposed architecture is based on a family of network-MIMO schemes defined by small clusters of cooperating base stations, zero-forcing multiuser MIMO precoding with suitab… ▽ More

    Submitted 12 September, 2011; v1 submitted 19 July, 2011; originally announced July 2011.

    Comments: Full version with appendice (proofs of theorems). A shortened version without appendice was submitted to IEEE Trans. on Wireless Commun. Appendix B was revised after submission

  6. Network MIMO with Linear Zero-Forcing Beamforming: Large System Analysis, Impact of Channel Estimation and Reduced-Complexity Scheduling

    Authors: Hoon Huh, Antonia M. Tulino, Giuseppe Caire

    Abstract: We consider the downlink of a multi-cell system with multi-antenna base stations and single-antenna user terminals, arbitrary base station cooperation clusters, distance-dependent propagation pathloss, and general "fairness" requirements. Base stations in the same cooperation cluster employ joint transmission with linear zero-forcing beamforming, subject to sum or per-base station power constraint… ▽ More

    Submitted 11 September, 2011; v1 submitted 14 December, 2010; originally announced December 2010.

    Comments: 52 pages, 7 figures, revised and submitted to IEEE Trans. on Inform. Theory (under the 2nd review)

  7. Multi-Cell MIMO Downlink with Cell Cooperation and Fair Scheduling: a Large-System Limit Analysis

    Authors: Hoon Huh, Giuseppe Caire, Sung-Hyun Moon, Young-Tae Kim, Inkyu Lee

    Abstract: We consider the downlink of a cellular network with multiple cells and multi-antenna base stations, including a realistic distance-dependent pathloss model, clusters of cooperating cells, and general "fairness" requirements. Beyond Monte Carlo simulation, no efficient computation method to evaluate the ergodic throughput of such systems has been presented so far. We propose an analytic solution ba… ▽ More

    Submitted 10 June, 2010; originally announced June 2010.

    Comments: 29 pages, 5 figures, submitted to IEEE Trans. on Inform. Theory

  8. arXiv:1001.1133  [pdf, other

    cs.IT

    Multi-cell MIMO Downlink with Fairness Criteria: the Large System Limit

    Authors: Hoon Huh, Giuseppe Caire, Sung-Hyun Moon, Inkyu Lee

    Abstract: We consider the downlink of a cellular network with multiple cells and multi-antenna base stations including arbitrary inter-cell cooperation, realistic distance-dependent pathloss and general "fairness" requirements. Beyond Monte Carlo simulation, no efficient computation method to evaluate the ergodic throughput of such systems has been provided so far. We propose an analytic method based on the… ▽ More

    Submitted 4 June, 2010; v1 submitted 7 January, 2010; originally announced January 2010.

    Comments: 5 pages, 2 figures, accepted for ISIT 2010, camera-ready version

  9. Multiuser MISO Transmitter Optimization for Inter-Cell Interference Mitigation

    Authors: Hoon Huh, Haralabos C. Papadopoulos, Giuseppe Caire

    Abstract: The transmitter optimization (i.e., steering vectors and power allocation) for a MISO Broadcast Channel (MISO-BC) subject to general linear constraints is considered. Such constraints include, as special cases, the sum power, the per-antenna or per-group-of-antennas power, and "forbidden interference direction" constraints. We consider both the optimal dirty-paper coding and the simple suboptima… ▽ More

    Submitted 1 March, 2010; v1 submitted 7 September, 2009; originally announced September 2009.

    Comments: 30 pages, 10 figures, and 1 table. revised and resubmitted to IEEE Transactions on Signal Processing

  10. arXiv:0908.2462  [pdf, ps, other

    cs.CR cs.NI

    Hybrid Spam Filtering for Mobile Communication

    Authors: Ji Won Yoon, Hyoungshick Kim, Jun Ho Huh

    Abstract: Spam messages are an increasing threat to mobile communication. Several mitigation techniques have been proposed, including white and black listing, challenge-response and content-based filtering. However, none are perfect and it makes sense to use a combination rather than just one. We propose an anti-spam framework based on the hybrid of content-based filtering and challenge-response. There is… ▽ More

    Submitted 17 August, 2009; originally announced August 2009.

    Comments: 6 pages, 5 figures, 1 table

    ACM Class: H.4; D.2.8

  11. arXiv:0901.2401  [pdf, other

    cs.IT

    MIMO Broadcast Channel Optimization under General Linear Constraints

    Authors: Hoon Huh, Haralabos Papadopoulos, Giuseppe Caire

    Abstract: The optimization of the transmit parameters (power allocation and steering vectors) for the MIMO BC under general linear constraints is treated under the optimal DPC coding strategy and the simple suboptimal linear zero-forcing beamforming strategy. In the case of DPC, we show that "SINR duality" and "min-max duality" yield the same dual MAC problem, and compare two alternatives for its efficien… ▽ More

    Submitted 29 May, 2009; v1 submitted 16 January, 2009; originally announced January 2009.

    Comments: accepted for ISIT 2009, replaced by the camera-ready version

  12. arXiv:0711.3453  [pdf

    cs.CL

    A resource-based Korean morphological annotation system

    Authors: Hyun-Gue Huh, Eric Laporte

    Abstract: We describe a resource-based method of morphological annotation of written Korean text. Korean is an agglutinative language. The output of our system is a graph of morphemes annotated with accurate linguistic information. The language resources used by the system can be easily updated, which allows us-ers to control the evolution of the per-formances of the system. We show that morphological ann… ▽ More

    Submitted 21 November, 2007; originally announced November 2007.

    Comments: 6 pages

    Journal ref: Dans Proceedings of the International Joint Conference on Natural Language Processing (IJCNLP) - A resource-based Korean morphological annotation system, Jeju : Corée, République de (2005)

  13. arXiv:0711.3412  [pdf

    cs.CL

    Morphological annotation of Korean with Directly Maintainable Resources

    Authors: Ivan Berlocher, Hyun-Gue Huh, Eric Laporte, Jee-Sun Nam

    Abstract: This article describes an exclusively resource-based method of morphological annotation of written Korean text. Korean is an agglutinative language. Our annotator is designed to process text before the operation of a syntactic parser. In its present state, it annotates one-stem words only. The output is a graph of morphemes annotated with accurate linguistic information. The granularity of the t… ▽ More

    Submitted 21 November, 2007; originally announced November 2007.

    Journal ref: Dans Proceedings of the Language Resource and Evaluation Consference (LREC) - Morphological annotation of Korean with Directly Maintainable Resources, Genoa : Italie (2006)