Skip to main content

Showing 1–29 of 29 results for author: Tai, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.15717  [pdf, other

    cs.CR

    Trusted Compute Units: A Framework for Chained Verifiable Computations

    Authors: Fernando Castillo, Jonathan Heiss, Sebastian Werner, Stefan Tai

    Abstract: Blockchain and distributed ledger technologies (DLTs) facilitate decentralized computations across trust boundaries. However, ensuring complex computations with low gas fees and confidentiality remains challenging. Recent advances in Confidential Computing -- leveraging hardware-based Trusted Execution Environments (TEEs) -- and Proof-carrying Data -- employing cryptographic Zero-Knowledge Virtual… ▽ More

    Submitted 28 April, 2025; v1 submitted 22 April, 2025; originally announced April 2025.

    Comments: To be published in 2025 IEEE International Conference on Blockchain and Cryptocurrency (ICBC'25). 9 pages. 4 figures

  2. arXiv:2503.08641  [pdf, other

    cs.SE cs.DC

    A Comprehensive Experimentation Framework for Energy-Efficient Design of Cloud-Native Applications

    Authors: Sebastian Werner, Maria C. Borges, Karl Wolf, Stefan Tai

    Abstract: Current approaches to designing energy-efficient applications typically rely on measuring individual components using readily available local metrics, like CPU utilization. However, these metrics fall short when applied to cloud-native applications, which operate within the multi-tenant, shared environments of distributed cloud providers. Assessing and optimizing the energy efficiency of cloud-nat… ▽ More

    Submitted 11 March, 2025; originally announced March 2025.

    Comments: This work has been accepted to the 22nd IEEE International Conference on Software Architecture (ICSA'25)

  3. arXiv:2501.12016  [pdf

    cs.CV cs.LG

    Are Traditional Deep Learning Model Approaches as Effective as a Retinal-Specific Foundation Model for Ocular and Systemic Disease Detection?

    Authors: Samantha Min Er Yew, Xiaofeng Lei, Jocelyn Hui Lin Goh, Yibing Chen, Sahana Srinivasan, Miao-li Chee, Krithi Pushpanathan, Ke Zou, Qingshan Hou, Zhi Da Soh, Cancan Xue, Marco Chak Yan Yu, Charumathi Sabanayagam, E Shyong Tai, Xueling Sim, Yaxing Wang, Jost B. Jonas, Vinay Nangia, Gabriel Dawei Yang, Emma Anran Ran, Carol Yim-Lui Cheung, Yangqin Feng, Jun Zhou, Rick Siow Mong Goh, Yukun Zhou , et al. (4 additional authors not shown)

    Abstract: Background: RETFound, a self-supervised, retina-specific foundation model (FM), showed potential in downstream applications. However, its comparative performance with traditional deep learning (DL) models remains incompletely understood. This study aimed to evaluate RETFound against three ImageNet-pretrained supervised DL models (ResNet50, ViT-base, SwinV2) in detecting ocular and systemic disease… ▽ More

    Submitted 21 January, 2025; originally announced January 2025.

  4. arXiv:2404.16915  [pdf, other

    cs.SE cs.CR

    Servicifying zk-SNARKs Execution for Verifiable Off-chain Computations

    Authors: Alvaro Alonso Domenech, Jonathan Heiss, Stefan Tai

    Abstract: Zk-SNARKs help scale blockchains with Verifiable Off-chain Computations (VOC). zk-SNARK DSL toolkits are key when designing arithmetic circuits but fall short of automating the subsequent proof-generation step in an automated manner. We emphasize the need for portability, interoperability, and manageability in VOC-based solutions and introduce a Proving Service that is designed to provide a scalab… ▽ More

    Submitted 25 April, 2024; originally announced April 2024.

    Comments: 2 pages, 3 figures

  5. arXiv:2404.12623  [pdf, other

    cs.LG cs.CR cs.DC

    End-to-End Verifiable Decentralized Federated Learning

    Authors: Chaehyeon Lee, Jonathan Heiss, Stefan Tai, James Won-Ki Hong

    Abstract: Verifiable decentralized federated learning (FL) systems combining blockchains and zero-knowledge proofs (ZKP) make the computational integrity of local learning and global aggregation verifiable across workers. However, they are not end-to-end: data can still be corrupted prior to the learning. In this paper, we propose a verifiable decentralized FL system for end-to-end integrity and authenticit… ▽ More

    Submitted 19 April, 2024; originally announced April 2024.

    Comments: 9 pages, 5 figures, This article has been accepted for presentation at the IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2024)

  6. arXiv:2404.01643  [pdf, other

    eess.IV cs.CV cs.LG

    A Closer Look at Spatial-Slice Features Learning for COVID-19 Detection

    Authors: Chih-Chung Hsu, Chia-Ming Lee, Yang Fan Chiang, Yi-Shiuan Chou, Chih-Yu Jiang, Shen-Chieh Tai, Chi-Han Tsai

    Abstract: Conventional Computed Tomography (CT) imaging recognition faces two significant challenges: (1) There is often considerable variability in the resolution and size of each CT scan, necessitating strict requirements for the input size and adaptability of models. (2) CT-scan contains large number of out-of-distribution (OOD) slices. The crucial features may only be present in specific spatial regions… ▽ More

    Submitted 20 April, 2024; v1 submitted 2 April, 2024; originally announced April 2024.

    Comments: Camera-ready version, accepted by DEF-AI-MIA workshop, in conjunted with CVPR2024

  7. arXiv:2403.11230  [pdf, other

    eess.IV cs.CV cs.LG

    Simple 2D Convolutional Neural Network-based Approach for COVID-19 Detection

    Authors: Chih-Chung Hsu, Chia-Ming Lee, Yang Fan Chiang, Yi-Shiuan Chou, Chih-Yu Jiang, Shen-Chieh Tai, Chi-Han Tsai

    Abstract: This study explores the use of deep learning techniques for analyzing lung Computed Tomography (CT) images. Classic deep learning approaches face challenges with varying slice counts and resolutions in CT images, a diversity arising from the utilization of assorted scanning equipment. Typically, predictions are made on single slices which are then combined for a comprehensive outcome. Yet, this me… ▽ More

    Submitted 17 March, 2024; originally announced March 2024.

  8. Informed and Assessable Observability Design Decisions in Cloud-native Microservice Applications

    Authors: Maria C. Borges, Joshua Bauer, Sebastian Werner, Michael Gebauer, Stefan Tai

    Abstract: Observability is important to ensure the reliability of microservice applications. These applications are often prone to failures, since they have many independent services deployed on heterogeneous environments. When employed "correctly", observability can help developers identify and troubleshoot faults quickly. However, instrumenting and configuring the observability of a microservice applicati… ▽ More

    Submitted 12 July, 2024; v1 submitted 1 March, 2024; originally announced March 2024.

    Comments: 21st IEEE International Conference on Software Architecture (ICSA'24)

  9. arXiv:2311.10873  [pdf, other

    cs.CV

    Multi-entity Video Transformers for Fine-Grained Video Representation Learning

    Authors: Matthew Walmer, Rose Kanjirathinkal, Kai Sheng Tai, Keyur Muzumdar, Taipeng Tian, Abhinav Shrivastava

    Abstract: The area of temporally fine-grained video representation learning aims to generate frame-by-frame representations for temporally dense tasks. In this work, we advance the state-of-the-art for this area by re-examining the design of transformer architectures for video representation learning. A salient aspect of our self-supervised method is the improved integration of spatial information in the te… ▽ More

    Submitted 17 November, 2023; originally announced November 2023.

  10. arXiv:2302.14078  [pdf, other

    cs.LG math.DS

    Analyzing Populations of Neural Networks via Dynamical Model Embedding

    Authors: Jordan Cotler, Kai Sheng Tai, Felipe Hernández, Blake Elias, David Sussillo

    Abstract: A core challenge in the interpretation of deep neural networks is identifying commonalities between the underlying algorithms implemented by distinct networks trained for the same task. Motivated by this problem, we introduce DYNAMO, an algorithm that constructs low-dimensional manifolds where each point corresponds to a neural network model, and two points are nearby if the corresponding neural n… ▽ More

    Submitted 27 February, 2023; originally announced February 2023.

    Comments: 12+8 pages, 11 figures

  11. arXiv:2209.09584  [pdf, other

    cs.CR

    Non-Disclosing Credential On-chaining for Blockchain-based Decentralized Applications

    Authors: Jonathan Heiss, Robert Muth, Frank Pallas, Stefan Tai

    Abstract: Many service systems rely on verifiable identity-related information of their users. Manipulation and unwanted exposure of this privacy-relevant information, however, must at the same time be prevented and avoided. Peer-to-peer blockchain-based decentralization with a smart contract-based execution model and verifiable off-chain computations leveraging zero-knowledge proofs promise to provide the… ▽ More

    Submitted 20 September, 2022; originally announced September 2022.

  12. arXiv:2207.01579  [pdf, other

    eess.IV cs.CV cs.LG

    Spatiotemporal Feature Learning Based on Two-Step LSTM and Transformer for CT Scans

    Authors: Chih-Chung Hsu, Chi-Han Tsai, Guan-Lin Chen, Sin-Di Ma, Shen-Chieh Tai

    Abstract: Computed tomography (CT) imaging could be very practical for diagnosing various diseases. However, the nature of the CT images is even more diverse since the resolution and number of the slices of a CT scan are determined by the machine and its settings. Conventional deep learning models are hard to tickle such diverse data since the essential requirement of the deep neural network is the consiste… ▽ More

    Submitted 8 July, 2022; v1 submitted 4 July, 2022; originally announced July 2022.

    Comments: draft

  13. arXiv:2206.11641  [pdf, other

    cs.CR cs.DC

    Advancing Blockchain-based Federated Learning through Verifiable Off-chain Computations

    Authors: Jonathan Heiss, Elias Grünewald, Nikolas Haimerl, Stefan Schulte, Stefan Tai

    Abstract: Federated learning may be subject to both global aggregation attacks and distributed poisoning attacks. Blockchain technology along with incentive and penalty mechanisms have been suggested to counter these. In this paper, we explore verifiable off-chain computations using zero-knowledge proofs as an alternative to incentive and penalty mechanisms in blockchain-based federated learning. In our sol… ▽ More

    Submitted 23 June, 2022; originally announced June 2022.

  14. Synthesizing Configuration Tactics for Exercising Hidden Options in Serverless Systems

    Authors: Jörn Kuhlenkamp, Sebastian Werner, Chin Hong Tran, Stefan Tai

    Abstract: A proper configuration of an information system can ensure accuracy and efficiency, among other system objectives. Conversely, a poor configuration can have a significant negative impact on the system's performance, reliability, and cost. Serverless systems, which are comprised of many functions and managed services, especially risk exposure to misconfigurations, with many provider- and platform-s… ▽ More

    Submitted 3 June, 2022; v1 submitted 31 May, 2022; originally announced May 2022.

    Comments: updated typo in abstract

    Journal ref: Intelligent Information Systems - CAiSE 2022

  15. arXiv:2205.14107  [pdf, other

    cs.LG

    Spartan: Differentiable Sparsity via Regularized Transportation

    Authors: Kai Sheng Tai, Taipeng Tian, Ser-Nam Lim

    Abstract: We present Spartan, a method for training sparse neural network models with a predetermined level of sparsity. Spartan is based on a combination of two techniques: (1) soft top-k masking of low-magnitude parameters via a regularized optimal transportation problem and (2) dual averaging-based parameter updates with hard sparsification in the forward pass. This scheme realizes an exploration-exploit… ▽ More

    Submitted 17 October, 2022; v1 submitted 27 May, 2022; originally announced May 2022.

    Comments: NeurIPS 2022 camera ready

  16. arXiv:2111.00933  [pdf, other

    cs.SE cs.DC

    Application-Platform Co-Design for Serverless Data Processing

    Authors: Sebastian Werner, Stefan Tai

    Abstract: "Application-platform co-design" refers to the phenomenon of new platforms being created in response to changing application needs, followed by application design and development changing due to the emergence (and the specifics, limitations) of the new platforms, therefore creating, again, new application and platform requirements. This continuous process of application and platform (re-)design de… ▽ More

    Submitted 29 October, 2021; originally announced November 2021.

    Comments: Preprint version to be published Proceedings of the 19th International Conference on Service-Oriented Computing

  17. arXiv:2110.15869  [pdf, other

    cs.DC cs.CR

    Trustworthy Pre-Processing of Sensor Data in Data On-chaining Workflows for Blockchain-based IoT Applications

    Authors: Jonathan Heiss, Anselm Busse, Stefan Tai

    Abstract: Prior to provisioning sensor data to smart contracts, a pre-processing of the data on intermediate off-chain nodes is often necessary. When doing so, originally constructed cryptographic signatures cannot be verified on-chain anymore. This exposes an opportunity for undetected manipulation and presents a problem for applications in the Internet of Things where trustworthy sensor data is required o… ▽ More

    Submitted 29 October, 2021; originally announced October 2021.

    Comments: Preprint version of full paper at ICSCO21

  18. arXiv:2110.15150  [pdf, ps, other

    cs.CR

    Messaging with Purpose Limitation -- Privacy-Compliant Publish-Subscribe Systems

    Authors: Karl Wolf, Frank Pallas, Stefan Tai

    Abstract: Purpose limitation is an important privacy principle to ensure that personal data may only be used for the declared purposes it was originally collected for. Ensuring compliance with respective privacy regulations like the GDPR, which codify purpose limitation as an obligation, consequently, is a major challenge in real-world enterprise systems. Technical solutions under the umbrella of purpose-ba… ▽ More

    Submitted 28 October, 2021; originally announced October 2021.

    ACM Class: C.2.4; H.4.0; K.5.0

  19. arXiv:2102.08622  [pdf, other

    cs.LG stat.ML

    Sinkhorn Label Allocation: Semi-Supervised Classification via Annealed Self-Training

    Authors: Kai Sheng Tai, Peter Bailis, Gregory Valiant

    Abstract: Self-training is a standard approach to semi-supervised learning where the learner's own predictions on unlabeled data are used as supervision during training. In this paper, we reinterpret this label assignment process as an optimal transportation problem between examples and classes, wherein the cost of assigning an example to a class is mediated by the current predictions of the classifier. Thi… ▽ More

    Submitted 11 June, 2021; v1 submitted 17 February, 2021; originally announced February 2021.

    Comments: ICML 2021 camera ready version

  20. arXiv:2012.09943  [pdf, other

    stat.ML cs.LG

    Guiding Neural Network Initialization via Marginal Likelihood Maximization

    Authors: Anthony S. Tai, Chunfeng Huang

    Abstract: We propose a simple, data-driven approach to help guide hyperparameter selection for neural network initialization. We leverage the relationship between neural network and Gaussian process models having corresponding activation and covariance functions to infer the hyperparameter values desirable for model initialization. Our experiment shows that marginal likelihood maximization provides recommen… ▽ More

    Submitted 17 December, 2020; originally announced December 2020.

  21. arXiv:1905.06852  [pdf, other

    cs.CR

    Blockchain-based Data Provenance for the Internet of Things

    Authors: Marten Sigwart, Michael Borkowski, Marco Peise, Stefan Schulte, Stefan Tai

    Abstract: As more and more applications and services depend on data collected and provided by Internet of Things (IoT) devices, it is of importance that such data can be trusted. Data provenance solutions together with blockchain technology are one way to make data more trustworthy. However, current solutions do not address the heterogeneous nature of IoT applications and their data. In this work, we identi… ▽ More

    Submitted 6 August, 2019; v1 submitted 15 May, 2019; originally announced May 2019.

  22. arXiv:1901.11399  [pdf, other

    cs.CV cs.LG stat.ML

    Equivariant Transformer Networks

    Authors: Kai Sheng Tai, Peter Bailis, Gregory Valiant

    Abstract: How can prior knowledge on the transformation invariances of a domain be incorporated into the architecture of a neural network? We propose Equivariant Transformers (ETs), a family of differentiable image-to-image mappings that improve the robustness of models towards pre-defined continuous transformation groups. Through the use of specially-derived canonical coordinate systems, ETs incorporate fu… ▽ More

    Submitted 24 May, 2019; v1 submitted 25 January, 2019; originally announced January 2019.

    Comments: ICML 2019

  23. arXiv:1811.10002  [pdf, other

    cs.CV cs.LG

    Non-local RoI for Cross-Object Perception

    Authors: Shou-Yao Roy Tseng, Hwann-Tzong Chen, Shao-Heng Tai, Tyng-Luh Liu

    Abstract: We present a generic and flexible module that encodes region proposals by both their intrinsic features and the extrinsic correlations to the others. The proposed non-local region of interest (NL-RoI) can be seamlessly adapted into different generalized R-CNN architectures to better address various perception tasks. Observe that existing techniques from R-CNN treat RoIs independently and perform t… ▽ More

    Submitted 25 November, 2018; originally announced November 2018.

    Comments: NIPS 2018 Workshop on Relational Representation Learning. arXiv admin note: substantial text overlap with arXiv:1807.05361

  24. arXiv:1807.05361  [pdf, other

    cs.CV

    Non-local RoIs for Instance Segmentation

    Authors: Shou-Yao Roy Tseng, Hwann-Tzong Chen, Shao-Heng Tai, Tyng-Luh Liu

    Abstract: We introduce the concept of Non-Local RoI (NL-RoI) Block as a generic and flexible module that can be seamlessly adapted into different Mask R-CNN heads for various tasks. Mask R-CNN treats RoIs (Regions of Interest) independently and performs the prediction based on individual object bounding boxes. However, the correlation between objects may provide useful information for detection and segmenta… ▽ More

    Submitted 14 July, 2018; originally announced July 2018.

    Comments: Robust Vision Challenge 2018

  25. arXiv:1803.01969  [pdf, other

    cs.DB

    Moment-Based Quantile Sketches for Efficient High Cardinality Aggregation Queries

    Authors: Edward Gan, Jialin Ding, Kai Sheng Tai, Vatsal Sharan, Peter Bailis

    Abstract: Interactive analytics increasingly involves querying for quantiles over sub-populations of high cardinality datasets. Data processing engines such as Druid and Spark use mergeable summaries to estimate quantiles, but summary merge times can be a bottleneck during aggregation. We show how a compact and efficiently mergeable quantile sketch can support aggregation workloads. This data structure, whi… ▽ More

    Submitted 13 July, 2018; v1 submitted 5 March, 2018; originally announced March 2018.

    Comments: Technical Report for paper to be published in VLDB 2018

  26. arXiv:1711.02305  [pdf, other

    cs.LG cs.DS stat.ML

    Sketching Linear Classifiers over Data Streams

    Authors: Kai Sheng Tai, Vatsal Sharan, Peter Bailis, Gregory Valiant

    Abstract: We introduce a new sub-linear space sketch---the Weight-Median Sketch---for learning compressed linear classifiers over data streams while supporting the efficient recovery of large-magnitude weights in the model. This enables memory-limited execution of several statistical analyses over streams, including online feature selection, streaming data explanation, relative deltoid detection, and stream… ▽ More

    Submitted 6 April, 2018; v1 submitted 7 November, 2017; originally announced November 2017.

    Comments: Full version of paper appearing at SIGMOD 2018 with more detailed proofs of theoretical results. Code available at https://github.com/stanford-futuredata/wmsketch

  27. arXiv:1706.08146  [pdf, other

    cs.LG cs.AI stat.ML

    Compressed Factorization: Fast and Accurate Low-Rank Factorization of Compressively-Sensed Data

    Authors: Vatsal Sharan, Kai Sheng Tai, Peter Bailis, Gregory Valiant

    Abstract: What learning algorithms can be run directly on compressively-sensed data? In this work, we consider the question of accurately and efficiently computing low-rank matrix or tensor factorizations given data compressed via random projections. We examine the approach of first performing factorization in the compressed domain, and then reconstructing the original high-dimensional factors from the reco… ▽ More

    Submitted 27 May, 2019; v1 submitted 25 June, 2017; originally announced June 2017.

    Comments: Updates for ICML'19 camera-ready

  28. arXiv:1503.00075  [pdf, other

    cs.CL cs.AI cs.LG

    Improved Semantic Representations From Tree-Structured Long Short-Term Memory Networks

    Authors: Kai Sheng Tai, Richard Socher, Christopher D. Manning

    Abstract: Because of their superior ability to preserve sequence information over time, Long Short-Term Memory (LSTM) networks, a type of recurrent neural network with a more complex computational unit, have obtained strong results on a variety of sequence modeling tasks. The only underlying LSTM structure that has been explored so far is a linear chain. However, natural language exhibits syntactic properti… ▽ More

    Submitted 30 May, 2015; v1 submitted 28 February, 2015; originally announced March 2015.

    Comments: Accepted for publication at ACL 2015

  29. arXiv:1112.1851  [pdf, other

    cs.DC

    (MC2)2: A Generic Decision-Making Framework and its Application to Cloud Computing

    Authors: Michael Menzel, Marten Schönherr, Jens Nimis, Stefan Tai

    Abstract: Cloud computing is a disruptive technology, representing a new model for information technology (IT) solution engineering and management that promises to introduce significant cost savings and other benefits. The adoption of Cloud computing requires a detailed comparison of infrastructure alternatives, taking a number of aspects into careful consideration. Existing methods of evaluation, however,… ▽ More

    Submitted 16 December, 2011; v1 submitted 8 December, 2011; originally announced December 2011.

    Comments: short version, full version available in proceedings of International Conference on Cloud Computing and Virtualization (CCV) 2010