Skip to main content

Showing 1–17 of 17 results for author: Park, K H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2503.19147  [pdf, other

    cs.DM cs.LO

    On the number of asynchronous attractors in AND-NOT Boolean networks

    Authors: Van-Giang Trinh, Samuel Pastva, Jordan Rozum, Kyu Hyong Park, Réka Albert

    Abstract: Boolean Networks (BNs) describe the time evolution of binary states using logic functions on the nodes of a network. They are fundamental models for complex discrete dynamical systems, with applications in various areas of science and engineering, and especially in systems biology. A key aspect of the dynamical behavior of BNs is the number of attractors, which determines the diversity of long-ter… ▽ More

    Submitted 24 March, 2025; originally announced March 2025.

    Comments: 16 pages, 3 figures

  2. arXiv:2411.18645  [pdf, other

    cs.CV cs.LG

    Bi-ICE: An Inner Interpretable Framework for Image Classification via Bi-directional Interactions between Concept and Input Embeddings

    Authors: Jinyung Hong, Yearim Kim, Keun Hee Park, Sangyu Han, Nojun Kwak, Theodore P. Pavlic

    Abstract: Inner interpretability is a promising field focused on uncovering the internal mechanisms of AI systems and developing scalable, automated methods to understand these systems at a mechanistic level. While significant research has explored top-down approaches starting from high-level problems or algorithmic hypotheses and bottom-up approaches building higher-level abstractions from low-level or cir… ▽ More

    Submitted 26 November, 2024; originally announced November 2024.

    Comments: The first two authors equally contributed to this work, 27 pages, 19 figures, 9 tables

  3. arXiv:2405.11911  [pdf, other

    cs.AI cs.LG cs.SI

    Accurate Link Prediction for Edge-Incomplete Graphs via PU Learning

    Authors: Junghun Kim, Ka Hyun Park, Hoyoung Yoon, U Kang

    Abstract: Given an edge-incomplete graph, how can we accurately find the missing links? The link prediction in edge-incomplete graphs aims to discover the missing relations between entities when their relationships are represented as a graph. Edge-incomplete graphs are prevalent in real-world due to practical limitations, such as not checking all users when adding friends in a social network. Addressing the… ▽ More

    Submitted 12 December, 2024; v1 submitted 20 May, 2024; originally announced May 2024.

    Comments: AAAI'25

  4. arXiv:2403.14140  [pdf, other

    cs.CV cs.LG

    Learning Decomposable and Debiased Representations via Attribute-Centric Information Bottlenecks

    Authors: Jinyung Hong, Eun Som Jeon, Changhoon Kim, Keun Hee Park, Utkarsh Nath, Yezhou Yang, Pavan Turaga, Theodore P. Pavlic

    Abstract: Biased attributes, spuriously correlated with target labels in a dataset, can problematically lead to neural networks that learn improper shortcuts for classifications and limit their capabilities for out-of-distribution (OOD) generalization. Although many debiasing approaches have been proposed to ensure correct predictions from biased datasets, few studies have considered learning latent embeddi… ▽ More

    Submitted 21 March, 2024; originally announced March 2024.

    Comments: 24 pages, 16 figures, 3 tables

  5. arXiv:2310.15464  [pdf, other

    cs.CL

    Interpreting Answers to Yes-No Questions in User-Generated Content

    Authors: Shivam Mathur, Keun Hee Park, Dhivya Chinnappa, Saketh Kotamraju, Eduardo Blanco

    Abstract: Interpreting answers to yes-no questions in social media is difficult. Yes and no keywords are uncommon, and the few answers that include them are rarely to be interpreted what the keywords suggest. In this paper, we present a new corpus of 4,442 yes-no question-answer pairs from Twitter. We discuss linguistic characteristics of answers whose interpretation is yes or no, as well as answers whose i… ▽ More

    Submitted 23 October, 2023; originally announced October 2023.

    Comments: Accepted at the Findings of EMNLP 2023

  6. arXiv:2310.13290  [pdf, other

    cs.CL

    Interpreting Indirect Answers to Yes-No Questions in Multiple Languages

    Authors: Zijie Wang, Md Mosharaf Hossain, Shivam Mathur, Terry Cruz Melo, Kadir Bulut Ozler, Keun Hee Park, Jacob Quintero, MohammadHossein Rezaei, Shreya Nupur Shakya, Md Nayem Uddin, Eduardo Blanco

    Abstract: Yes-no questions expect a yes or no for an answer, but people often skip polar keywords. Instead, they answer with long explanations that must be interpreted. In this paper, we focus on this challenging problem and release new benchmarks in eight languages. We present a distant supervision approach to collect training data. We also demonstrate that direct answers (i.e., with polar keywords) are us… ▽ More

    Submitted 20 October, 2023; originally announced October 2023.

    Comments: Accepted to EMNLP 2023 Findings

  7. arXiv:2305.15775  [pdf, other

    cs.LG cs.CV

    Concept-Centric Transformers: Enhancing Model Interpretability through Object-Centric Concept Learning within a Shared Global Workspace

    Authors: Jinyung Hong, Keun Hee Park, Theodore P. Pavlic

    Abstract: Many interpretable AI approaches have been proposed to provide plausible explanations for a model's decision-making. However, configuring an explainable model that effectively communicates among computational modules has received less attention. A recently proposed shared global workspace theory showed that networks of distributed modules can benefit from sharing information with a bottlenecked me… ▽ More

    Submitted 7 November, 2023; v1 submitted 25 May, 2023; originally announced May 2023.

    Comments: 23 pages, 9 tables, 18 figures, Accepted at WACV2024

  8. arXiv:2305.14950  [pdf, other

    cs.CL cs.AI cs.CR cs.LG

    Adversarial Demonstration Attacks on Large Language Models

    Authors: Jiongxiao Wang, Zichen Liu, Keun Hee Park, Zhuojun Jiang, Zhaoheng Zheng, Zhuofeng Wu, Muhao Chen, Chaowei Xiao

    Abstract: With the emergence of more powerful large language models (LLMs), such as ChatGPT and GPT-4, in-context learning (ICL) has gained significant prominence in leveraging these models for specific tasks by utilizing data-label pairs as precondition prompts. While incorporating demonstrations can greatly enhance the performance of LLMs across various tasks, it may introduce a new security concern: atta… ▽ More

    Submitted 14 October, 2023; v1 submitted 24 May, 2023; originally announced May 2023.

  9. arXiv:2305.01506  [pdf, other

    cs.CV cs.AI cs.LG

    Discovering the Effectiveness of Pre-Training in a Large-scale Car-sharing Platform

    Authors: Kyung Ho Park, Hyunhee Chung

    Abstract: Recent progress of deep learning has empowered various intelligent transportation applications, especially in car-sharing platforms. While the traditional operations of the car-sharing service highly relied on human engagements in fleet management, modern car-sharing platforms let users upload car images before and after their use to inspect the cars without a physical visit. To automate the afore… ▽ More

    Submitted 2 May, 2023; originally announced May 2023.

  10. arXiv:2210.06585  [pdf, other

    cs.CV cs.LG

    Towards an Efficient ML System: Unveiling a Trade-off between Task Accuracy and Engineering Efficiency in a Large-scale Car Sharing Platform

    Authors: Kyung Ho Park, Hyunhee Chung, Soonwoo Kwon

    Abstract: Upon the significant performance of the supervised deep neural networks, conventional procedures of developing ML system are \textit{task-centric}, which aims to maximize the task accuracy. However, we scrutinized this \textit{task-centric} ML system lacks in engineering efficiency when the ML practitioners solve multiple tasks in their domain. To resolve this problem, we propose an \textit{effici… ▽ More

    Submitted 10 October, 2022; originally announced October 2022.

  11. arXiv:2205.12544  [pdf, other

    cs.CV cs.AI

    Deep Dense Local Feature Matching and Vehicle Removal for Indoor Visual Localization

    Authors: Kyung Ho Park

    Abstract: Visual localization is an essential component of intelligent transportation systems, enabling broad applications that require understanding one's self location when other sensors are not available. It is mostly tackled by image retrieval such that the location of a query image is determined by its closest match in the previously collected images. Existing approaches focus on large scale localizati… ▽ More

    Submitted 25 May, 2022; originally announced May 2022.

    Comments: 8 pages, 12 figures, 2 tables

  12. arXiv:2108.05079  [pdf, other

    cs.LG cs.AI cs.HC

    Unsupervised Driver Behavior Profiling leveraging Recurrent Neural Networks

    Authors: Young Ah Choi, Kyung Ho Park, Eunji Park, Huy Kang Kim

    Abstract: In the era of intelligent transportation, driver behavior profiling has become a beneficial technology as it provides knowledge regarding the driver's aggressiveness. Previous approaches achieved promising driver behavior profiling performance through establishing statistical heuristics rules or supervised learning-based models. Still, there exist limits that the practitioner should prepare a labe… ▽ More

    Submitted 11 August, 2021; originally announced August 2021.

    Comments: 11 pages, 2 figures, 1 table, this paper is accepted in WISA 2021

    ACM Class: I.2; I.5.1

  13. arXiv:2011.13374  [pdf, other

    cs.AI cs.HC cs.LG

    Understand Watchdogs: Discover How Game Bot Get Discovered

    Authors: Eunji Park, Kyung Ho Park, Huy Kang Kim

    Abstract: The game industry has long been troubled by malicious activities utilizing game bots. The game bots disturb other game players and destroy the environmental system of the games. For these reasons, the game industry put their best efforts to detect the game bots among players' characters using the learning-based detections. However, one problem with the detection methodologies is that they do not p… ▽ More

    Submitted 19 January, 2021; v1 submitted 26 November, 2020; originally announced November 2020.

    Comments: 9 pages, 3 figures, 3 tables, this paper is accepted in ICAART 2021

  14. arXiv:2011.00540  [pdf, other

    cs.CR cs.LG

    Unsupervised Intrusion Detection System for Unmanned Aerial Vehicle with Less Labeling Effort

    Authors: Kyung Ho Park, Eunji Park, Huy Kang Kim

    Abstract: Along with the importance of safety, an IDS has become a significant task in the real world. Prior studies proposed various intrusion detection models for the UAV. Past rule-based approaches provided a concrete baseline IDS model, and the machine learning-based method achieved a precise intrusion detection performance on the UAV with supervised learning models. However, previous methods have room… ▽ More

    Submitted 1 November, 2020; originally announced November 2020.

    Comments: 14 pages, 4 tables, 3 figures, 5 equations, In Proceeding of WISA 2020 (THE 21ST WORLD CONFERENCE ON INFORMATION SECURITY APPLICATIONS)

  15. arXiv:1911.09870  [pdf, other

    cs.CR cs.LG eess.SP

    This Car is Mine!: Automobile Theft Countermeasure Leveraging Driver Identification with Generative Adversarial Networks

    Authors: Kyung Ho Park, Huy Kang Kim

    Abstract: As a car becomes more connected, a countermeasure against automobile theft has become a significant task in the real world. To respond to automobile theft, data mining, biometrics, and additional authentication methods are proposed. Among current countermeasures, data mining method is one of the efficient ways to capture the owner driver's unique characteristics. To identify the owner driver from… ▽ More

    Submitted 22 November, 2019; originally announced November 2019.

    Comments: 6 pages, 3 figures, 3 tables, In Proceedings of the escar Asia 2019

  16. arXiv:1909.08929  [pdf, other

    cs.LG stat.ML

    Automobile Theft Detection by Clustering Owner Driver Data

    Authors: Yong Goo Kang, Kyung Ho Park, Huy Kang Kim

    Abstract: As automobiles become intelligent, automobile theft methods are evolving intelligently. Therefore automobile theft detection has become a major research challenge. Data-mining, biometrics, and additional authentication methods have been proposed to address automobile theft, in previous studies. Among these methods, data-mining can be used to analyze driving characteristics and identify a driver co… ▽ More

    Submitted 19 September, 2019; originally announced September 2019.

    Comments: 15 pages, 7 figures, 3 tables, In Proceedings of the 17th escar Europe 2019

  17. arXiv:1908.03748  [pdf, other

    cs.CR cs.LG

    Show Me Your Account: Detecting MMORPG Game Bot Leveraging Financial Analysis with LSTM

    Authors: Kyung Ho Park, Eunjo Lee, Huy Kang Kim

    Abstract: With the rapid growth of MMORPG market, game bot detection has become an essential task for maintaining stable in-game ecosystem. To classify bots from normal users, detection methods are proposed in both game client and server-side. Among various classification methods, data mining method in server-side captured unique characteristics of bots efficiently. For features used in data mining, behavio… ▽ More

    Submitted 10 August, 2019; originally announced August 2019.

    Comments: 10 pages, 1 figure, 5 tables, In Proceedings of the 20th World Conference on Information Security and Applications (WISA) 2019