Skip to main content

Showing 1–31 of 31 results for author: Lee, D H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.02030  [pdf

    cs.CR

    Adaptive Privacy-Preserving SSD

    Authors: Na Young Ahn, Dong Hoon Lee

    Abstract: Data remanence in NAND flash complicates complete deletion on IoT SSDs. We design an adaptive architecture offering four privacy levels (PL0-PL3) that select among address, data, and parity deletion techniques. Quantitative analysis balances efficacy, latency, endurance, and cost. Machine-learning adjusts levels contextually, boosting privacy with negligible performance overhead and complexity.

    Submitted 30 May, 2025; originally announced June 2025.

    Comments: Reviewing on IEEE Security & Privacy

    ACM Class: H.3

  2. arXiv:2503.13790  [pdf, other

    cs.MA cs.GT

    A Convex Formulation of Game-theoretic Hierarchical Routing

    Authors: Dong Ho Lee, Kaitlyn Donnel, Max Z. Li, David Fridovich-Keil

    Abstract: Hierarchical decision-making is a natural paradigm for coordinating multi-agent systems in complex environments such as air traffic management. In this paper, we present a bilevel framework for game-theoretic hierarchical routing, where a high-level router assigns discrete routes to multiple vehicles who seek to optimize potentially noncooperative objectives that depend upon the assigned routes. T… ▽ More

    Submitted 17 March, 2025; originally announced March 2025.

  3. arXiv:2412.10569  [pdf, other

    cs.CV cs.AI

    Learning to Merge Tokens via Decoupled Embedding for Efficient Vision Transformers

    Authors: Dong Hoon Lee, Seunghoon Hong

    Abstract: Recent token reduction methods for Vision Transformers (ViTs) incorporate token merging, which measures the similarities between token embeddings and combines the most similar pairs. However, their merging policies are directly dependent on intermediate features in ViTs, which prevents exploiting features tailored for merging and requires end-to-end training to improve token merging. In this paper… ▽ More

    Submitted 13 December, 2024; originally announced December 2024.

    Comments: NeurIPS 2024

  4. arXiv:2411.07705  [pdf, other

    cs.CY

    dpvis: A Visual and Interactive Learning Tool for Dynamic Programming

    Authors: David H. Lee, Aditya Prasad, Ramiro Deo-Campo Vuong, Tianyu Wang, Eric Han, David Kempe

    Abstract: Dynamic programming (DP) is a fundamental and powerful algorithmic paradigm taught in most undergraduate (and many graduate) algorithms classes. DP problems are challenging for many computer science students because they require identifying unique problem structures and a refined understanding of recursion. In this paper, we present dpvis, a Python library that helps students understand DP through… ▽ More

    Submitted 12 November, 2024; originally announced November 2024.

    Comments: Published as a conference paper at Technical Symposium on Computer Science Education (SIGCSE TS '25); dpvis is available at https://dpvis.readthedocs.io/en/latest/

    ACM Class: K.3.1; K.3.2

  5. arXiv:2410.21447  [pdf, other

    cs.GT cs.MA

    You Can't Always Get What You Want: Games of Ordered Preference

    Authors: Dong Ho Lee, Lasse Peters, David Fridovich-Keil

    Abstract: We study noncooperative games, in which each player's objective is composed of a sequence of ordered- and potentially conflicting-preferences. Problems of this type naturally model a wide variety of scenarios: for example, drivers at a busy intersection must balance the desire to make forward progress with the risk of collision. Mathematically, these problems possess a nested structure, and to beh… ▽ More

    Submitted 21 January, 2025; v1 submitted 28 October, 2024; originally announced October 2024.

  6. arXiv:2406.11248  [pdf

    eess.AS cs.AI cs.SD

    Performance Improvement of Language-Queried Audio Source Separation Based on Caption Augmentation From Large Language Models for DCASE Challenge 2024 Task 9

    Authors: Do Hyun Lee, Yoonah Song, Hong Kook Kim

    Abstract: We present a prompt-engineering-based text-augmentation approach applied to a language-queried audio source separation (LASS) task. To enhance the performance of LASS, the proposed approach utilizes large language models (LLMs) to generate multiple captions corresponding to each sentence of the training dataset. To this end, we first perform experiments to identify the most effective prompts for c… ▽ More

    Submitted 26 November, 2024; v1 submitted 17 June, 2024; originally announced June 2024.

    Comments: DCASE 2024 Challenge Task 9, 4 pages

  7. arXiv:2406.06648  [pdf, other

    cs.CL cs.AI cs.LG

    SignBLEU: Automatic Evaluation of Multi-channel Sign Language Translation

    Authors: Jung-Ho Kim, Mathew Huerta-Enochian, Changyong Ko, Du Hui Lee

    Abstract: Sign languages are multi-channel languages that communicate information through not just the hands (manual signals) but also facial expressions and upper body movements (non-manual signals). However, since automatic sign language translation is usually performed by generating a single sequence of glosses, researchers eschew non-manual and co-occurring manual signals in favor of a simplified list o… ▽ More

    Submitted 10 June, 2024; originally announced June 2024.

    Comments: Published in LREC-Coling 2024

  8. arXiv:2404.00733  [pdf, other

    cs.GT cs.MA eess.SY

    Smooth Information Gathering in Two-Player Noncooperative Games

    Authors: Fernando Palafox, Jesse Milzman, Dong Ho Lee, Ryan Park, David Fridovich-Keil

    Abstract: We present a mathematical framework for modeling two-player noncooperative games in which one player is uncertain of the other player's costs but can preemptively allocate information-gathering resources to reduce this uncertainty. We refer to the players as the uncertain player (UP) and the certain player (CP), respectively. We obtain UP's decisions by solving a two-stage problem where, in Stage… ▽ More

    Submitted 24 October, 2024; v1 submitted 31 March, 2024; originally announced April 2024.

    Comments: https://github.com/CLeARoboticsLab/GamesVoI.jl

  9. arXiv:2312.11331  [pdf, other

    cs.LG cs.NE

    Density Descent for Diversity Optimization

    Authors: David H. Lee, Anishalakshmi V. Palaparthi, Matthew C. Fontaine, Bryon Tjanaka, Stefanos Nikolaidis

    Abstract: Diversity optimization seeks to discover a set of solutions that elicit diverse features. Prior work has proposed Novelty Search (NS), which, given a current set of solutions, seeks to expand the set by finding points in areas of low density in the feature space. However, to estimate density, NS relies on a heuristic that considers the k-nearest neighbors of the search point in the feature space,… ▽ More

    Submitted 30 May, 2024; v1 submitted 18 December, 2023; originally announced December 2023.

    Comments: 15 pages, 5 figures, published as a conference paper at the 2024 Genetic and Evolutionary Computation Conference (GECCO '24)

  10. IoT Security: On-Chip Secure Deletion Scheme using ECC Modulation in IoT Appliances

    Authors: Na Young Ahn, Dong Hoon Lee

    Abstract: NAND flash memory-based IoT devices inherently suffer from data retention issues. In IoT security, these retention issues are significant and require a robust solution for secure deletion. Secure deletion methods can be categorized into off-chip and on-chip schemes. Off-chip secure deletion schemes, based on block-level erasure operations, are unable to perform real-time trim operations. Consequen… ▽ More

    Submitted 9 August, 2023; originally announced August 2023.

    Comments: Available online 2 August 2023

    MSC Class: 68M15 ACM Class: C.5.1

    Journal ref: Computers & Security, 2023

  11. arXiv:2303.01963  [pdf

    cs.LG cs.RO math.OC

    Multi-Start Team Orienteering Problem for UAS Mission Re-Planning with Data-Efficient Deep Reinforcement Learning

    Authors: Dong Ho Lee, Jaemyung Ahn

    Abstract: In this paper, we study the Multi-Start Team Orienteering Problem (MSTOP), a mission re-planning problem where vehicles are initially located away from the depot and have different amounts of fuel. We consider/assume the goal of multiple vehicles is to travel to maximize the sum of collected profits under resource (e.g., time, fuel) consumption constraints. Such re-planning problems occur in a wid… ▽ More

    Submitted 2 March, 2023; originally announced March 2023.

    Comments: 48 pages, 18 figures, 7 tables

  12. arXiv:2303.00191  [pdf, other

    cs.NE cs.LG cs.SE

    pyribs: A Bare-Bones Python Library for Quality Diversity Optimization

    Authors: Bryon Tjanaka, Matthew C. Fontaine, David H. Lee, Yulun Zhang, Nivedit Reddy Balam, Nathaniel Dennler, Sujay S. Garlanka, Nikitas Dimitri Klapsis, Stefanos Nikolaidis

    Abstract: Recent years have seen a rise in the popularity of quality diversity (QD) optimization, a branch of optimization that seeks to find a collection of diverse, high-performing solutions to a given problem. To grow further, we believe the QD community faces two challenges: developing a framework to represent the field's growing array of algorithms, and implementing that framework in software that supp… ▽ More

    Submitted 14 April, 2023; v1 submitted 28 February, 2023; originally announced March 2023.

    Comments: Published as a conference paper at the 2023 Genetic and Evolutionary Computation Conference (GECCO '23); Pyribs is available at https://pyribs.org

  13. arXiv:2211.02284  [pdf, other

    cs.CV

    Unsupervised Visual Representation Learning via Mutual Information Regularized Assignment

    Authors: Dong Hoon Lee, Sungik Choi, Hyunwoo Kim, Sae-Young Chung

    Abstract: This paper proposes Mutual Information Regularized Assignment (MIRA), a pseudo-labeling algorithm for unsupervised representation learning inspired by information maximization. We formulate online pseudo-labeling as an optimization problem to find pseudo-labels that maximize the mutual information between the label and data while being close to a given model probability. We derive a fixed-point it… ▽ More

    Submitted 4 November, 2022; originally announced November 2022.

    Comments: NeurIPS 2022

  14. arXiv:2210.02622  [pdf, other

    cs.RO cs.LG cs.NE

    Training Diverse High-Dimensional Controllers by Scaling Covariance Matrix Adaptation MAP-Annealing

    Authors: Bryon Tjanaka, Matthew C. Fontaine, David H. Lee, Aniruddha Kalkar, Stefanos Nikolaidis

    Abstract: Pre-training a diverse set of neural network controllers in simulation has enabled robots to adapt online to damage in robot locomotion tasks. However, finding diverse, high-performing controllers requires expensive network training and extensive tuning of a large number of hyperparameters. On the other hand, Covariance Matrix Adaptation MAP-Annealing (CMA-MAE), an evolution strategies (ES)-based… ▽ More

    Submitted 15 September, 2023; v1 submitted 5 October, 2022; originally announced October 2022.

    Comments: Source code and videos available at https://scalingcmamae.github.io

  15. Security of IoT Device: Perspective Forensic/Anti-Forensic Issues on Invalid Area of NAND Flash Memory

    Authors: Na Young Ahn, Dong Hoon Lee

    Abstract: NAND flash memory-based IoT device can potentially still leave behind original personal data in an invalid area even if the data has been deleted. In this paper, we raise the forensic issue of original data remaining in unmanaged blocks caused by NAND flash memory and introduce methods for secure deletion of such data in the invalid area. We also propose a verification technique for secure deletio… ▽ More

    Submitted 1 August, 2022; originally announced August 2022.

    Comments: IEEE Access, early published by July 14, 2022

    MSC Class: 68W20

  16. arXiv:2112.13923  [pdf

    cs.CR

    Forensic Issues and Techniques to Improve Security in SSD with Flex Capacity Feature

    Authors: Na Young Ahn, Dong Hoon Lee

    Abstract: Over-provisioning technology is typically introduced as a means to improve the performance of storage systems, such as databases. The over-provisioning area is both hidden and difficult for normal users to access. This paper focuses on attack models for such hidden areas. Malicious hackers use advanced over-provisioning techniques that vary capacity according to workload, and as such, our focus is… ▽ More

    Submitted 20 December, 2021; originally announced December 2021.

    Comments: resubmitted(Nov. 25, 2021) and accepted(Dec. 15, 2021)in IEEE ACCESS(Access-2021-39427)

    MSC Class: 68M25 ACM Class: B.7.0; H.4.0

  17. arXiv:2112.02191  [pdf, other

    cs.LG cs.AI

    NN-LUT: Neural Approximation of Non-Linear Operations for Efficient Transformer Inference

    Authors: Joonsang Yu, Junki Park, Seongmin Park, Minsoo Kim, Sihwa Lee, Dong Hyun Lee, Jungwook Choi

    Abstract: Non-linear operations such as GELU, Layer normalization, and Softmax are essential yet costly building blocks of Transformer models. Several prior works simplified these operations with look-up tables or integer computations, but such approximations suffer inferior accuracy or considerable hardware cost with long latency. This paper proposes an accurate and hardware-friendly approximation framewor… ▽ More

    Submitted 3 December, 2021; originally announced December 2021.

    Comments: 7 pages, 3 figures

  18. arXiv:2106.11486  [pdf, other

    cs.CV

    Unsupervised Embedding Adaptation via Early-Stage Feature Reconstruction for Few-Shot Classification

    Authors: Dong Hoon Lee, Sae-Young Chung

    Abstract: We propose unsupervised embedding adaptation for the downstream few-shot classification task. Based on findings that deep neural networks learn to generalize before memorizing, we develop Early-Stage Feature Reconstruction (ESFR) -- a novel adaptation scheme with feature reconstruction and dimensionality-driven early stopping that finds generalizable features. Incorporating ESFR consistently impro… ▽ More

    Submitted 21 June, 2021; originally announced June 2021.

    Comments: Accepted to ICML 2021

  19. arXiv:2011.07846  [pdf

    cs.SE cs.AI cs.DC

    Secure Vehicle Communications Using Proof-of-Nonce Blockchain

    Authors: N. Y. Ahn, D. H. Lee

    Abstract: This paper presents an autonomous driving that achieves physical layer security. Proposed vehicle communication is implemented based on Proof-of-Nonce (PoN) blockchain algorithm. PoN blockchain algorithm is a consensus algorithm that can be implemented in light weight. We propose a more secure vehicle communication scheme while achieving physical layer security by defecting PoN algorithm and secre… ▽ More

    Submitted 16 November, 2020; originally announced November 2020.

    Comments: 6 pages, 4 figures, IEEE Communication Magazine (Submitted on Nov. 16, 2020)

    MSC Class: 68W15 ACM Class: C.2

  20. arXiv:2009.14421  [pdf, other

    cs.HC

    A Virtual Reality Game as a Tool to Assess Physiological Correlations of Stress

    Authors: Daniel H. Lee, Tzyy-Ping Jung

    Abstract: The objective of this study is to develop and use a virtual reality game as a tool to assess the effects of realistic stress on the behavioral and physiological responses of participants. The game is based on a popular Steam game called Keep Talking Nobody Explodes, where the player collaborates with another person to defuse a bomb. Varying levels of difficulties in solving a puzzle and time press… ▽ More

    Submitted 30 September, 2020; originally announced September 2020.

    Comments: 13 pages, 10 figures

    ACM Class: H.5.0

  21. Balancing Personal Privacy and Public Safety during COVID-19: The Case of South Korea

    Authors: Na Young Ahn, Jun Eun Park, Dong Hoon Lee, Paul C. Hong

    Abstract: There has been vigorous debate on how different countries responded to the COVID-19 pandemic. To secure public safety, South Korea actively used personal information at the risk of personal privacy whereas France encouraged voluntary cooperation at the risk of public safety. In this article, after a brief comparison of contextual differences with France, we focus on South Korea's approaches to epi… ▽ More

    Submitted 22 September, 2020; v1 submitted 29 April, 2020; originally announced April 2020.

    Comments: 11pages

    MSC Class: 93A30 ACM Class: C.0; H.0

    Journal ref: 2020, Vol.8

  22. arXiv:2003.13251  [pdf, other

    cs.CR eess.SP

    Hold the Door! Fingerprinting Your Car Key to Prevent Keyless Entry Car Theft

    Authors: Kyungho Joo, Wonsuk Choi, Dong Hoon Lee

    Abstract: Recently, the traditional way to unlock car doors has been replaced with a keyless entry system which proves more convenient for automobile owners. When a driver with a key fob is in the vicinity of the vehicle, doors automatically unlock on user command. However, unfortunately, it has been shown that these keyless entry systems are vulnerable to signal relaying attacks. While it is evident that a… ▽ More

    Submitted 30 March, 2020; originally announced March 2020.

    Comments: Published in NDSS 2020 proceeding

  23. arXiv:2001.00522  [pdf

    cs.CR eess.SP eess.SY

    Schemes for Privacy Data Destruction in a NAND Flash Memory

    Authors: Na-Young Ahn, Dong Hoon Lee

    Abstract: We propose schemes for efficiently destroying privacy data in a NAND flash memory. Generally, even if privcy data is discarded from NAND flash memories, there is a high probability that the data will remain in an invalid block. This is a management problem that arises from the specificity of a program operation and an erase operation of NAND flash memories. When updating pages or performing a garb… ▽ More

    Submitted 27 December, 2019; originally announced January 2020.

    Comments: Pages 181305 - 181313

  24. Multi-Client Order-Revealing Encryption

    Authors: Jieun Eom, Dong Hoon Lee, Kwangsu Lee

    Abstract: Order-revealing encryption is a useful cryptographic primitive that provides range queries on encrypted data since anyone can compare the order of plaintexts by running a public comparison algorithm. Most studies on order-revealing encryption focus only on comparing ciphertexts generated by a single client, and there is no study on comparing ciphertexts generated by multiple clients. In this paper… ▽ More

    Submitted 5 September, 2018; originally announced September 2018.

    Journal ref: IEEE Access, 2018

  25. Duty to Delete on Non-Volatile Memory

    Authors: Na-Young Ahn, Dong Hoon Lee

    Abstract: We firstly suggest new cache policy applying the duty to delete invalid cache data on Non-volatile Memory (NVM). This cache policy includes generating random data and overwriting the random data into invalid cache data. Proposed cache policy is more economical and effective regarding perfect deletion of data. It is ensure that the invalid cache data in NVM is secure against malicious hackers.

    Submitted 7 July, 2017; originally announced July 2017.

    Comments: 3 pages, 8 figures

    Report number: CPS-2017-0088

  26. Countermeasure against Side-Channel Attack in Shared Memory of TrustZone

    Authors: Na-Young Ahn, Dong Hoon Lee

    Abstract: In this paper we introduced countermeasures against side-channel attacks in the shared memory of TrustZone. We proposed zero-contention cache memory or policy between REE and TEE to prevent from TruSpy attacks in TrustZone. And we suggested that delay time of data path of REE is equal or similar to that of data path of TEE to prevent timing side-channel attacks. Also, we proposed security informat… ▽ More

    Submitted 19 May, 2017; originally announced May 2017.

    Comments: 13 pages, 16 figures, PLOSONE 2017. arXiv admin note: text overlap with arXiv:1212.1651 by other authors

    Report number: PONE-D-17-11893 ACM Class: D.2.4

  27. arXiv:1610.07948  [pdf, ps, other

    cs.CR

    Revocable Hierarchical Identity-Based Encryption from Multilinear Maps

    Authors: Seunghwan Park, Dong Hoon Lee, Kwangsu Lee

    Abstract: In identity-based encryption (IBE) systems, an efficient key delegation method to manage a large number of users and an efficient key revocation method to handle the dynamic credentials of users are needed. Revocable hierarchical IBE (RHIBE) can provide these two methods by organizing the identities of users as a hierarchy and broadcasting an update key for non-revoked users per each time period.… ▽ More

    Submitted 25 October, 2016; originally announced October 2016.

    Comments: 30 pages

  28. arXiv:1607.00497  [pdf, other

    cs.CR

    Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks

    Authors: Wonsuk Choi, Hyo Jin Jo, Samuel Woo, Ji Young Chun, Jooyoung Park, Dong Hoon Lee

    Abstract: In the last several decades, the automotive industry has come to incorporate the latest Information and Communications (ICT) technology, increasingly replacing mechanical components of vehicles with electronic components. These electronic control units (ECUs) communicate with each other in an in-vehicle network that makes the vehicle both safer and easier to drive. Controller Area Networks (CANs)… ▽ More

    Submitted 2 July, 2016; originally announced July 2016.

    Comments: 12 pages, 6 figures

  29. Anonymous HIBE with Short Ciphertexts: Full Security in Prime Order Groups

    Authors: Kwangsu Lee, Jong Hwan Park, Dong Hoon Lee

    Abstract: Anonymous Hierarchical Identity-Based Encryption (HIBE) is an extension of Identity-Based Encryption (IBE), and it provides not only a message hiding property but also an identity hiding property. Anonymous HIBE schemes can be applicable to anonymous communication systems and public key encryption systems with keyword searching. However, previous anonymous HIBE schemes have some disadvantages that… ▽ More

    Submitted 26 February, 2015; originally announced February 2015.

    Comments: 31 pages, 1 figure

    Journal ref: Designs, Codes and Cryptography, vol. 74, no. 2, pp. 395-425, Feb. 2015

  30. Sequential Aggregate Signatures with Short Public Keys without Random Oracles

    Authors: Kwangsu Lee, Dong Hoon Lee, Moti Yung

    Abstract: The notion of aggregate signature has been motivated by applications and it enables any user to compress different signatures signed by different signers on different messages into a short signature. Sequential aggregate signature, in turn, is a special kind of aggregate signature that only allows a signer to add his signature into an aggregate signature in sequential order. This latter scheme has… ▽ More

    Submitted 24 February, 2015; originally announced February 2015.

    Comments: 39 pages in Theoret. Comput. Sci. (2015)

  31. Security Analysis of the Unrestricted Identity-Based Aggregate Signature Scheme

    Authors: Kwangsu Lee, Dong Hoon Lee

    Abstract: Aggregate signatures allow anyone to combine different signatures signed by different signers on different messages into a single short signature. An ideal aggregate signature scheme is an identity-based aggregate signature (IBAS) scheme that supports full aggregation since it can reduce the total transmitted data by using an identity string as a public key and anyone can freely aggregate differen… ▽ More

    Submitted 17 November, 2014; originally announced November 2014.

    Comments: 9 pages