Skip to main content

Showing 1–44 of 44 results for author: Koo, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.13990  [pdf, other

    cs.LG cs.AI eess.SY

    PC-DeepNet: A GNSS Positioning Error Minimization Framework Using Permutation-Invariant Deep Neural Network

    Authors: M. Humayun Kabir, Md. Ali Hasan, Md. Shafiqul Islam, Kyeongjun Ko, Wonjae Shin

    Abstract: Global navigation satellite systems (GNSS) face significant challenges in urban and sub-urban areas due to non-line-of-sight (NLOS) propagation, multipath effects, and low received power levels, resulting in highly non-linear and non-Gaussian measurement error distributions. In light of this, conventional model-based positioning approaches, which rely on Gaussian error approximations, struggle to… ▽ More

    Submitted 18 April, 2025; originally announced April 2025.

    Comments: 31 pages, 14 figures, 6 tables

  2. arXiv:2501.19395  [pdf, other

    cs.RO

    Precision Harvesting in Cluttered Environments: Integrating End Effector Design with Dual Camera Perception

    Authors: Kendall Koe, Poojan Kalpeshbhai Shah, Benjamin Walt, Jordan Westphal, Samhita Marri, Shivani Kamtikar, James Seungbum Nam, Naveen Kumar Uppalapati, Girish Krishnan, Girish Chowdhary

    Abstract: Due to labor shortages in specialty crop industries, a need for robotic automation to increase agricultural efficiency and productivity has arisen. Previous manipulation systems perform well in harvesting in uncluttered and structured environments. High tunnel environments are more compact and cluttered in nature, requiring a rethinking of the large form factor systems and grippers. We propose a n… ▽ More

    Submitted 31 January, 2025; originally announced January 2025.

  3. arXiv:2501.05945  [pdf, other

    eess.IV cs.CV q-bio.TO

    Reusable specimen-level inference in computational pathology

    Authors: Jakub R. Kaczmarzyk, Rishul Sharma, Peter K. Koo, Joel H. Saltz

    Abstract: Foundation models for computational pathology have shown great promise for specimen-level tasks and are increasingly accessible to researchers. However, specimen-level models built on these foundation models remain largely unavailable, hindering their broader utility and impact. To address this gap, we developed SpinPath, a toolkit designed to democratize specimen-level deep learning by providing… ▽ More

    Submitted 10 January, 2025; originally announced January 2025.

  4. arXiv:2412.20166  [pdf, other

    cs.AR cs.AI

    LoL-PIM: Long-Context LLM Decoding with Scalable DRAM-PIM System

    Authors: Hyucksung Kwon, Kyungmo Koo, Janghyeon Kim, Woongkyu Lee, Minjae Lee, Hyungdeok Lee, Yousub Jung, Jaehan Park, Yosub Song, Byeongsu Yang, Haerang Choi, Guhyun Kim, Jongsoon Won, Woojae Shin, Changhyun Kim, Gyeongcheol Shin, Yongkee Kwon, Ilkon Kim, Euicheol Lim, John Kim, Jungwook Choi

    Abstract: The expansion of large language models (LLMs) with hundreds of billions of parameters presents significant challenges to computational resources, particularly data movement and memory bandwidth. Long-context LLMs, which process sequences of tens of thousands of tokens, further increase the demand on the memory system as the complexity in attention layers and key-value cache sizes is proportional t… ▽ More

    Submitted 14 January, 2025; v1 submitted 28 December, 2024; originally announced December 2024.

    Comments: 15 pages, 12 figures

  5. arXiv:2412.10515  [pdf, other

    cs.RO

    Active Semantic Mapping with Mobile Manipulator in Horticultural Environments

    Authors: Jose Cuaran, Kulbir Singh Ahluwalia, Kendall Koe, Naveen Kumar Uppalapati, Girish Chowdhary

    Abstract: Semantic maps are fundamental for robotics tasks such as navigation and manipulation. They also enable yield prediction and phenotyping in agricultural settings. In this paper, we introduce an efficient and scalable approach for active semantic mapping in horticultural environments, employing a mobile robot manipulator equipped with an RGB-D camera. Our method leverages probabilistic semantic maps… ▽ More

    Submitted 13 December, 2024; originally announced December 2024.

    Comments: Preprint (under review)

  6. arXiv:2411.19301  [pdf, other

    cs.SE cs.AI

    Structured Object Language Modeling (SoLM): Native Structured Objects Generation Conforming to Complex Schemas with Self-Supervised Denoising

    Authors: Amir Tavanaei, Kee Kiat Koo, Hayreddin Ceker, Shaobai Jiang, Qi Li, Julien Han, Karim Bouyarmane

    Abstract: In this paper, we study the problem of generating structured objects that conform to a complex schema, with intricate dependencies between the different components (facets) of the object. The facets of the object (attributes, fields, columns, properties) can be a mix of short, structured, type-constrained facts, or long natural-language descriptions. The object has to be self-consistent between th… ▽ More

    Submitted 28 November, 2024; originally announced November 2024.

  7. arXiv:2411.14788  [pdf, other

    cs.DB cs.HC

    Jovis: A Visualization Tool for PostgreSQL Query Optimizer

    Authors: Yoojin Choi, Juhee Han, Kyoseung Koo, Bongki Moon

    Abstract: Query optimizers are essential components of relational database management systems that directly impact query performance as they transform input queries into efficient execution plans. While users can obtain the final execution plan using the EXPLAIN command and leverage existing visualization tools for intuitive understanding, the internal decision-making processes of query optimizers are hidde… ▽ More

    Submitted 25 March, 2025; v1 submitted 22 November, 2024; originally announced November 2024.

  8. arXiv:2411.04124  [pdf, other

    cs.CC cs.DS quant-ph

    On the (Classical and Quantum) Fine-Grained Complexity of Log-Approximate CVP and Max-Cut

    Authors: Jeremy Ahrens Huang, Young Kun Ko, Chunhao Wang

    Abstract: We show a linear sized reduction from the Maximum Cut Problem (Max-Cut) with completeness $1 - \varepsilon$ and soundness $1 - \varepsilon^{1/2}$ to the $γ$-Approximate Closest Vector Problem under any finite $\ell_p$-norm including $p = 2$. This reduction implies two headline results: (i) We show that any sub-exponential time (classical or quantum) algorithm for the… ▽ More

    Submitted 6 November, 2024; originally announced November 2024.

    Comments: 35 pages, 3 figures

  9. arXiv:2407.08476  [pdf, other

    cs.CV

    VideoMamba: Spatio-Temporal Selective State Space Model

    Authors: Jinyoung Park, Hee-Seon Kim, Kangwook Ko, Minbeom Kim, Changick Kim

    Abstract: We introduce VideoMamba, a novel adaptation of the pure Mamba architecture, specifically designed for video recognition. Unlike transformers that rely on self-attention mechanisms leading to high computational costs by quadratic complexity, VideoMamba leverages Mamba's linear complexity and selective SSM mechanism for more efficient processing. The proposed Spatio-Temporal Forward and Backward SSM… ▽ More

    Submitted 11 July, 2024; originally announced July 2024.

    Comments: ECCV 2024. code available at http://github.com/jinyjelly/VideoMamba

  10. arXiv:2406.07103  [pdf, other

    eess.AS cs.AI

    MR-RawNet: Speaker verification system with multiple temporal resolutions for variable duration utterances using raw waveforms

    Authors: Seung-bin Kim, Chan-yeong Lim, Jungwoo Heo, Ju-ho Kim, Hyun-seo Shin, Kyo-Won Koo, Ha-Jin Yu

    Abstract: In speaker verification systems, the utilization of short utterances presents a persistent challenge, leading to performance degradation primarily due to insufficient phonetic information to characterize the speakers. To overcome this obstacle, we propose a novel structure, MR-RawNet, designed to enhance the robustness of speaker verification systems against variable duration utterances using raw… ▽ More

    Submitted 11 June, 2024; originally announced June 2024.

    Comments: 5 pages, accepted by Interspeech 2024

  11. arXiv:2406.00069  [pdf, other

    cs.CL cs.LG

    Confidence-Aware Sub-Structure Beam Search (CABS): Mitigating Hallucination in Structured Data Generation with Large Language Models

    Authors: Chengwei Wei, Kee Kiat Koo, Amir Tavanaei, Karim Bouyarmane

    Abstract: Large Language Models (LLMs) have facilitated structured data generation, with applications in domains like tabular data, document databases, product catalogs, etc. However, concerns persist about generation veracity due to incorrect references or hallucinations, necessitating the incorporation of some form of model confidence for mitigation. Existing confidence estimation methods on LLM generatio… ▽ More

    Submitted 30 May, 2024; originally announced June 2024.

  12. arXiv:2401.14635  [pdf, other

    cs.CR cs.SE

    Signing in Four Public Software Package Registries: Quantity, Quality, and Influencing Factors

    Authors: Taylor R Schorlemmer, Kelechi G Kalu, Luke Chigges, Kyung Myung Ko, Eman Abu Isghair, Saurabh Baghi, Santiago Torres-Arias, James C Davis

    Abstract: Many software applications incorporate open-source third-party packages distributed by public package registries. Guaranteeing authorship along this supply chain is a challenge. Package maintainers can guarantee package authorship through software signing. However, it is unclear how common this practice is, and whether the resulting signatures are created properly. Prior work has provided raw data… ▽ More

    Submitted 14 April, 2024; v1 submitted 25 January, 2024; originally announced January 2024.

    Comments: Accepted at IEEE Security & Privacy 2024 (S&P'24)

  13. arXiv:2306.02741  [pdf, other

    cs.CV

    ZIGNeRF: Zero-shot 3D Scene Representation with Invertible Generative Neural Radiance Fields

    Authors: Kanghyeok Ko, Minhyeok Lee

    Abstract: Generative Neural Radiance Fields (NeRFs) have demonstrated remarkable proficiency in synthesizing multi-view images by learning the distribution of a set of unposed images. Despite the aptitude of existing generative NeRFs in generating 3D-consistent high-quality random samples within data distribution, the creation of a 3D representation of a singular input image remains a formidable challenge.… ▽ More

    Submitted 5 June, 2023; originally announced June 2023.

  14. arXiv:2303.09802  [pdf, other

    cs.SE

    TypeScript's Evolution: An Analysis of Feature Adoption Over Time

    Authors: Joshua D. Scarsbrook, Mark Utting, Ryan K. L. Ko

    Abstract: TypeScript is a quickly evolving superset of JavaScript with active development of new features. Our paper seeks to understand how quickly these features are adopted by the developer community. Existing work in JavaScript shows the adoption of dynamic language features can be a major hindrance to static analysis. As TypeScript evolves the addition of features makes the underlying standard more and… ▽ More

    Submitted 17 March, 2023; originally announced March 2023.

  15. arXiv:2212.14214  [pdf, other

    cs.AI cs.LG

    Backward Curriculum Reinforcement Learning

    Authors: KyungMin Ko

    Abstract: Current reinforcement learning algorithms train an agent using forward-generated trajectories, which provide little guidance so that the agent can explore as much as possible. While realizing the value of reinforcement learning results from sufficient exploration, this approach leads to a trade-off in losing sample efficiency, an essential factor impacting algorithm performance. Previous tasks use… ▽ More

    Submitted 4 September, 2023; v1 submitted 29 December, 2022; originally announced December 2022.

    Comments: In the proceedings of the 32nd IEEE International Conference on Robot and Human Interactive Communication (IEEE RO-MAN 2023)

  16. arXiv:2212.06368  [pdf, other

    cs.CV eess.IV

    Single Cell Training on Architecture Search for Image Denoising

    Authors: Bokyeung Lee, Kyungdeuk Ko, Jonghwan Hong, Hanseok Ko

    Abstract: Neural Architecture Search (NAS) for automatically finding the optimal network architecture has shown some success with competitive performances in various computer vision tasks. However, NAS in general requires a tremendous amount of computations. Thus reducing computational cost has emerged as an important issue. Most of the attempts so far has been based on manual approaches, and often the arch… ▽ More

    Submitted 12 December, 2022; originally announced December 2022.

  17. Discriminatory and orthogonal feature learning for noise robust keyword spotting

    Authors: Donghyeon Kim, Kyungdeuk Ko, David K. Han, Hanseok Ko

    Abstract: Keyword Spotting (KWS) is an essential component in a smart device for alerting the system when a user prompts it with a command. As these devices are typically constrained by computational and energy resources, the KWS model should be designed with a small footprint. In our previous work, we developed lightweight dynamic filters which extract a robust feature map within a noisy environment. The l… ▽ More

    Submitted 20 October, 2022; originally announced October 2022.

    Comments: Published in SPL

  18. arXiv:2210.08461  [pdf, other

    cs.LG stat.ML

    Positive-Unlabeled Learning using Random Forests via Recursive Greedy Risk Minimization

    Authors: Jonathan Wilton, Abigail M. Y. Koay, Ryan K. L. Ko, Miao Xu, Nan Ye

    Abstract: The need to learn from positive and unlabeled data, or PU learning, arises in many applications and has attracted increasing interest. While random forests are known to perform well on many tasks with positive and negative data, recent PU algorithms are generally based on deep neural networks, and the potential of tree-based PU learning is under-explored. In this paper, we propose new random fores… ▽ More

    Submitted 16 October, 2022; originally announced October 2022.

    Comments: Accepted at NeurIPS 2022

  19. arXiv:2206.06862  [pdf, other

    q-bio.QM cs.CV cs.LG eess.IV

    Evaluating histopathology transfer learning with ChampKit

    Authors: Jakub R. Kaczmarzyk, Tahsin M. Kurc, Shahira Abousamra, Rajarsi Gupta, Joel H. Saltz, Peter K. Koo

    Abstract: Histopathology remains the gold standard for diagnosis of various cancers. Recent advances in computer vision, specifically deep learning, have facilitated the analysis of histopathology images for various tasks, including immune cell detection and microsatellite instability classification. The state-of-the-art for each task often employs base architectures that have been pretrained for image clas… ▽ More

    Submitted 14 June, 2022; originally announced June 2022.

    Comments: Submitted to NeurIPS 2022 Track on Datasets and Benchmarks. Source code available at https://github.com/kaczmarj/champkit

    ACM Class: J.3; I.4.9; D.2.13

  20. arXiv:2204.02181  [pdf, other

    cs.CV

    Vision Transformer Equipped with Neural Resizer on Facial Expression Recognition Task

    Authors: Hyeonbin Hwang, Soyeon Kim, Wei-Jin Park, Jiho Seo, Kyungtae Ko, Hyeon Yeo

    Abstract: When it comes to wild conditions, Facial Expression Recognition is often challenged with low-quality data and imbalanced, ambiguous labels. This field has much benefited from CNN based approaches; however, CNN models have structural limitation to see the facial regions in distant. As a remedy, Transformer has been introduced to vision fields with global receptive field, but requires adjusting inpu… ▽ More

    Submitted 5 April, 2022; originally announced April 2022.

    Comments: Accepted to IEEE ICASSP 2022

  21. arXiv:2201.06379  [pdf, ps, other

    cs.HC cs.LG

    Distortion-Aware Brushing for Reliable Cluster Analysis in Multidimensional Projections

    Authors: Hyeon Jeon, Michaël Aupetit, Soohyun Lee, Kwon Ko, Youngtaek Kim, Ghulam Jilani Quadri, Jinwook Seo

    Abstract: Brushing is a common interaction technique in 2D scatterplots, allowing users to select clustered points within a continuous, enclosed region for further analysis or filtering. However, applying conventional brushing to 2D representations of multidimensional (MD) data, i.e., Multidimensional Projections (MDPs), can lead to unreliable cluster analysis due to MDP-induced distortions that inaccuratel… ▽ More

    Submitted 12 June, 2025; v1 submitted 17 January, 2022; originally announced January 2022.

    Comments: Under review

  22. arXiv:2110.01341  [pdf, other

    cs.CV cs.AI cs.LG

    Context-Aware Unsupervised Clustering for Person Search

    Authors: Byeong-Ju Han, Kuhyeun Ko, Jae-Young Sim

    Abstract: The existing person search methods use the annotated labels of person identities to train deep networks in a supervised manner that requires a huge amount of time and effort for human labeling. In this paper, we first introduce a novel framework of person search that is able to train the network in the absence of the person identity labels, and propose efficient unsupervised clustering methods to… ▽ More

    Submitted 4 October, 2021; originally announced October 2021.

  23. IceNet for Interactive Contrast Enhancement

    Authors: Keunsoo Ko, Chang-Su Kim

    Abstract: A CNN-based interactive contrast enhancement algorithm, called IceNet, is proposed in this work, which enables a user to adjust image contrast easily according to his or her preference. Specifically, a user provides a parameter for controlling the global brightness and two types of scribbles to darken or brighten local regions in an image. Then, given these annotations, IceNet estimates a gamma ma… ▽ More

    Submitted 25 December, 2021; v1 submitted 13 September, 2021; originally announced September 2021.

    Comments: 11 pages, 9 figures, 3 tables. This paper has been accepted for publication in IEEE Access. Copyright may change without notice

  24. arXiv:2104.13050  [pdf, other

    cs.LG

    Confined Gradient Descent: Privacy-preserving Optimization for Federated Learning

    Authors: Yanjun Zhang, Guangdong Bai, Xue Li, Surya Nepal, Ryan K L Ko

    Abstract: Federated learning enables multiple participants to collaboratively train a model without aggregating the training data. Although the training data are kept within each participant and the local gradients can be securely synthesized, recent studies have shown that such privacy protection is insufficient. The global model parameters that have to be shared for optimization are susceptible to leak in… ▽ More

    Submitted 27 April, 2021; originally announced April 2021.

  25. arXiv:2103.07012  [pdf, other

    cs.CR cs.SE

    ColdPress: An Extensible Malware Analysis Platform for Threat Intelligence

    Authors: Haoxi Tan, Mahin Chandramohan, Cristina Cifuentes, Guangdong Bai, Ryan K. L. Ko

    Abstract: Malware analysis is still largely a manual task. This slow and inefficient approach does not scale to the exponential rise in the rate of new unique malware generated. Hence, automating the process as much as possible becomes desirable. In this paper, we present ColdPress - an extensible malware analysis platform that automates the end-to-end process of malware threat intelligence gathering inte… ▽ More

    Submitted 11 March, 2021; originally announced March 2021.

    Comments: The code is open source at https://github.com/uqcyber/ColdPress

  26. arXiv:2103.06403  [pdf, other

    cs.AI cs.CV cs.RO

    A Vision Based Deep Reinforcement Learning Algorithm for UAV Obstacle Avoidance

    Authors: Jeremy Roghair, Kyungtae Ko, Amir Ehsan Niaraki Asli, Ali Jannesari

    Abstract: Integration of reinforcement learning with unmanned aerial vehicles (UAVs) to achieve autonomous flight has been an active research area in recent years. An important part focuses on obstacle detection and avoidance for UAVs navigating through an environment. Exploration in an unseen environment can be tackled with Deep Q-Network (DQN). However, value exploration with uniform sampling of actions m… ▽ More

    Submitted 10 March, 2021; originally announced March 2021.

    Comments: 12 pages, 6 figures

  27. arXiv:2101.11866  [pdf, other

    cs.CR

    An Analytics Framework for Heuristic Inference Attacks against Industrial Control Systems

    Authors: Taejun Choi, Guangdong Bai, Ryan K L Ko, Naipeng Dong, Wenlu Zhang, Shunyao Wang

    Abstract: Industrial control systems (ICS) of critical infrastructure are increasingly connected to the Internet for remote site management at scale. However, cyber attacks against ICS - especially at the communication channels between humanmachine interface (HMIs) and programmable logic controllers (PLCs) - are increasing at a rate which outstrips the rate of mitigation. In this paper, we introduce a ven… ▽ More

    Submitted 28 January, 2021; originally announced January 2021.

  28. arXiv:2012.04405  [pdf

    cs.CR cs.AI cs.CY cs.SE

    Cyber Autonomy: Automating the Hacker- Self-healing, self-adaptive, automatic cyber defense systems and their impact to the industry, society and national security

    Authors: Ryan K L Ko

    Abstract: This paper sets the context for the urgency for cyber autonomy, and the current gaps of the cyber security industry. A novel framework proposing four phases of maturity for full cyber autonomy will be discussed. The paper also reviews new and emerging cyber security automation techniques and tools, and discusses their impact on society, the perceived cyber security skills gap/shortage and national… ▽ More

    Submitted 8 December, 2020; originally announced December 2020.

    Comments: 15 pages, 5 figures, preprint of chapter in edited book "Emerging Technologies and International Security: Machines, the State, and War" edited By Reuben Steff, Joe Burton, Simona R. Soare

    ACM Class: I.2.2; I.2.m; K.4.0; K.4.1

  29. arXiv:2011.06135  [pdf, ps, other

    cs.CC cs.DS

    Hardness of Approximate Nearest Neighbor Search under L-infinity

    Authors: Young Kun Ko, Min Jae Song

    Abstract: We show conditional hardness of Approximate Nearest Neighbor Search (ANN) under the $\ell_\infty$ norm with two simple reductions. Our first reduction shows that hardness of a special case of the Shortest Vector Problem (SVP), which captures many provably hard instances of SVP, implies a lower bound for ANN with polynomial preprocessing time under the same norm. Combined with a recent quantitative… ▽ More

    Submitted 11 November, 2020; originally announced November 2020.

    Comments: 16 pages

  30. arXiv:2010.11910  [pdf, other

    cs.SD cs.IR cs.LG eess.AS

    Neural Audio Fingerprint for High-specific Audio Retrieval based on Contrastive Learning

    Authors: Sungkyun Chang, Donmoon Lee, Jeongsoo Park, Hyungui Lim, Kyogu Lee, Karam Ko, Yoonchang Han

    Abstract: Most of existing audio fingerprinting systems have limitations to be used for high-specific audio retrieval at scale. In this work, we generate a low-dimensional representation from a short unit segment of audio, and couple this fingerprint with a fast maximum inner-product search. To this end, we present a contrastive learning framework that derives from the segment-level search objective. Each u… ▽ More

    Submitted 10 February, 2021; v1 submitted 22 October, 2020; originally announced October 2020.

    Comments: ICASSP 2021 (accepted)

  31. arXiv:2009.11484  [pdf

    cs.CR cs.AI cs.SE

    Pandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools

    Authors: Hetong Jiang, Taejun Choi, Ryan K. L. Ko

    Abstract: Cybersecurity tools are increasingly automated with artificial intelligent (AI) capabilities to match the exponential scale of attacks, compensate for the relatively slower rate of training new cybersecurity talents, and improve of the accuracy and performance of both tools and users. However, the safe and appropriate usage of autonomous cyber attack tools - especially at the development stages fo… ▽ More

    Submitted 24 September, 2020; originally announced September 2020.

    Comments: 20 pages, 10 figures, to be published in SSCC 2020

    MSC Class: 68M25 ACM Class: D.4.6; D.2.5; K.3

  32. arXiv:2008.07083  [pdf, other

    cs.NI cs.CV cs.LG

    Edge Network-Assisted Real-Time Object Detection Framework for Autonomous Driving

    Authors: Seung Wook Kim, Keunsoo Ko, Haneul Ko, Victor C. M. Leung

    Abstract: Autonomous vehicles (AVs) can achieve the desired results within a short duration by offloading tasks even requiring high computational power (e.g., object detection (OD)) to edge clouds. However, although edge clouds are exploited, real-time OD cannot always be guaranteed due to dynamic channel quality. To mitigate this problem, we propose an edge network-assisted real-time OD framework~(EODF). I… ▽ More

    Submitted 17 August, 2020; originally announced August 2020.

    Comments: This paper will be published in IEEE Network

  33. arXiv:2007.12622  [pdf, other

    cs.CV

    BMBC:Bilateral Motion Estimation with Bilateral Cost Volume for Video Interpolation

    Authors: Junheum Park, Keunsoo Ko, Chul Lee, Chang-Su Kim

    Abstract: Video interpolation increases the temporal resolution of a video sequence by synthesizing intermediate frames between two consecutive frames. We propose a novel deep-learning-based video interpolation algorithm based on bilateral motion estimation. First, we develop the bilateral motion network with the bilateral cost volume to estimate bilateral motions accurately. Then, we approximate bi-directi… ▽ More

    Submitted 17 July, 2020; originally announced July 2020.

    Comments: Accepted to ECCV 2020

  34. arXiv:2007.06953  [pdf, other

    cs.CR

    PrivColl: Practical Privacy-Preserving Collaborative Machine Learning

    Authors: Yanjun Zhang, Guangdong Bai, Xue Li, Caitlin Curtis, Chen Chen, Ryan K L Ko

    Abstract: Collaborative learning enables two or more participants, each with their own training dataset, to collaboratively learn a joint model. It is desirable that the collaboration should not cause the disclosure of either the raw datasets of each individual owner or the local model parameters trained on them. This privacy-preservation requirement has been approached through differential privacy mechanis… ▽ More

    Submitted 14 July, 2020; originally announced July 2020.

    Comments: 20 pages, 3 figures, to be published in 25th European Symposium on Research in Computer Security (ESORICS) 2020

  35. arXiv:2007.06167  [pdf, other

    cs.DS cs.IT

    Local Editing in LZ-End Compressed Data

    Authors: Daniel Roodt, Ulrich Speidel, Vimal Kumar, Ryan K. L. Ko

    Abstract: This paper presents an algorithm for the modification of data compressed using LZ-End, a derivate of LZ77, without prior decompression. The performance of the algorithm and the impact of the modifications on the compression ratio is evaluated. Finally, we discuss the importance of this work as a first step towards local editing in Lempel-Ziv compressed data.

    Submitted 12 July, 2020; originally announced July 2020.

    Comments: 12 pages, 1 Figure, 2 Tables

  36. arXiv:2001.01599  [pdf, other

    cs.CV cs.LG eess.IV

    Multi-scale Domain-adversarial Multiple-instance CNN for Cancer Subtype Classification with Unannotated Histopathological Images

    Authors: Noriaki Hashimoto, Daisuke Fukushima, Ryoichi Koga, Yusuke Takagi, Kaho Ko, Kei Kohno, Masato Nakaguro, Shigeo Nakamura, Hidekata Hontani, Ichiro Takeuchi

    Abstract: We propose a new method for cancer subtype classification from histopathological images, which can automatically detect tumor-specific features in a given whole slide image (WSI). The cancer subtype should be classified by referring to a WSI, i.e., a large-sized image (typically 40,000x40,000 pixels) of an entire pathological tissue slide, which consists of cancer and non-cancer portions. One diff… ▽ More

    Submitted 2 April, 2020; v1 submitted 6 January, 2020; originally announced January 2020.

    Comments: Accepted to CVPR2020

    ACM Class: I.2.1; I.5.4

  37. arXiv:1910.13543  [pdf, other

    cs.DS cs.CC

    An Adaptive Step Toward the Multiphase Conjecture

    Authors: Young Kun Ko, Omri Weinstein

    Abstract: In 2010, Pǎtraşcu proposed the following three-phase dynamic problem, as a candidate for proving polynomial lower bounds on the operational time of dynamic data structures: I: Preprocess a collection of sets $\vec{S} = S_1, \ldots , S_k \subseteq [n]$, where $k=\operatorname{poly}(n)$. II: A set $T\subseteq [n]$ is revealed, and the data structure updates its memory. III: An index… ▽ More

    Submitted 29 October, 2019; originally announced October 2019.

    Comments: 26 pages, 4 figures

  38. arXiv:1802.03581  [pdf

    cs.SD cs.CV eess.AS

    2-gram-based Phonetic Feature Generation for Convolutional Neural Network in Assessment of Trademark Similarity

    Authors: Kyung Pyo Ko, Kwang Hee Lee, Mi So Jang, Gun Hong Park

    Abstract: A trademark is a mark used to identify various commodities. If same or similar trademark is registered for the same or similar commodity, the purchaser of the goods may be confused. Therefore, in the process of trademark registration examination, the examiner judges whether the trademark is the same or similar to the other applied or registered trademarks. The confusion in trademarks is based on t… ▽ More

    Submitted 10 February, 2018; originally announced February 2018.

    Comments: 10 pages, 6 figures, 10 tables

  39. arXiv:1512.03543  [pdf, ps, other

    cs.GT cs.DS

    Hardness Results for Signaling in Bayesian Zero-Sum and Network Routing Games

    Authors: Umang Bhaskar, Yu Cheng, Young Kun Ko, Chaitanya Swamy

    Abstract: We study the optimization problem faced by a perfectly informed principal in a Bayesian game, who reveals information to the players about the state of nature to obtain a desirable equilibrium. This signaling problem is the natural design question motivated by uncertainty in games and has attracted much recent attention. We present new hardness results for signaling problems in (a) Bayesian two-pl… ▽ More

    Submitted 30 October, 2016; v1 submitted 11 December, 2015; originally announced December 2015.

  40. arXiv:1510.05886  [pdf, ps, other

    cs.DM cs.DS

    Approximation Algorithm for Minimum Weight Connected $m$-Fold Dominating Set

    Authors: Zhao Zhang, Jiao Zhou, Ker-I Ko, Ding-zhu Du

    Abstract: Using connected dominating set (CDS) to serve as a virtual backbone in a wireless networks can save energy and reduce interference. Since nodes may fail due to accidental damage or energy depletion, it is desirable that the virtual backbone has some fault-tolerance. A $k$-connected $m$-fold dominating set ($(k,m)$-CDS) of a graph $G$ is a node set $D$ such that every node in $V\setminus D$ has at… ▽ More

    Submitted 12 March, 2017; v1 submitted 20 October, 2015; originally announced October 2015.

    MSC Class: 68W25; 05C85 ACM Class: G.2.1; G.2.2

  41. arXiv:1505.03110  [pdf, ps, other

    cs.CC cs.IT quant-ph

    Near-optimal bounds on bounded-round quantum communication complexity of disjointness

    Authors: Mark Braverman, Ankit Garg, Young Kun Ko, Jieming Mao, Dave Touchette

    Abstract: We prove a near optimal round-communication tradeoff for the two-party quantum communication complexity of disjointness. For protocols with $r$ rounds, we prove a lower bound of $\tildeΩ(n/r + r)$ on the communication required for computing disjointness of input size $n$, which is optimal up to logarithmic factors. The previous best lower bound was $Ω(n/r^2 + r)$ due to Jain, Radhakrishnan and Sen… ▽ More

    Submitted 12 May, 2015; originally announced May 2015.

    Comments: 41 pages

  42. arXiv:1504.08352  [pdf, ps, other

    cs.CC

    ETH Hardness for Densest-$k$-Subgraph with Perfect Completeness

    Authors: Mark Braverman, Young Kun Ko, Aviad Rubinstein, Omri Weinstein

    Abstract: We show that, assuming the (deterministic) Exponential Time Hypothesis, distinguishing between a graph with an induced $k$-clique and a graph in which all k-subgraphs have density at most $1-ε$, requires $n^{\tilde Ω(log n)}$ time. Our result essentially matches the quasi-polynomial algorithms of Feige and Seltser [FS97] and Barman [Bar15] for this problem, and is the first one to rule out an addi… ▽ More

    Submitted 30 April, 2015; originally announced April 2015.

  43. arXiv:1103.5046  [pdf, other

    cs.IR cs.AI cs.HC

    From Linked Data to Relevant Data -- Time is the Essence

    Authors: Markus Kirchberg, Ryan K L Ko, Bu Sung Lee

    Abstract: The Semantic Web initiative puts emphasis not primarily on putting data on the Web, but rather on creating links in a way that both humans and machines can explore the Web of data. When such users access the Web, they leave a trail as Web servers maintain a history of requests. Web usage mining approaches have been studied since the beginning of the Web given the log's huge potential for purposes… ▽ More

    Submitted 25 March, 2011; originally announced March 2011.

    Comments: 1st International Workshop on Usage Analysis and the Web of Data (USEWOD2011) in the 20th International World Wide Web Conference (WWW2011), Hyderabad, India, March 28th, 2011

    Report number: WWW2011USEWOD/2011/kirkolee

  44. arXiv:1008.4938  [pdf

    q-bio.QM cs.SC

    Towards Solving the Inverse Protein Folding Problem

    Authors: Yoojin Hong, Kyung Dae Ko, Gaurav Bhardwaj, Zhenhai Zhang, Damian B. van Rossum, Randen L. Patterson

    Abstract: Accurately assigning folds for divergent protein sequences is a major obstacle to structural studies and underlies the inverse protein folding problem. Herein, we outline our theories for fold-recognition in the "twilight-zone" of sequence similarity (<25% identity). Our analyses demonstrate that structural sequence profiles built using Position-Specific Scoring Matrices (PSSMs) significantly outp… ▽ More

    Submitted 29 August, 2010; originally announced August 2010.

    Comments: 22 pages, 11 figures