Skip to main content

Showing 1–40 of 40 results for author: Vu, V

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.19363  [pdf, ps, other

    cs.IT math.CO

    Sequence Reconstruction for Sticky Insertion/Deletion Channels

    Authors: Van Long Phuoc Pham, Yeow Meng Chee, Kui Cai, Van Khu Vu

    Abstract: The sequence reconstruction problem for insertion/deletion channels has attracted significant attention owing to their applications recently in some emerging data storage systems, such as racetrack memories, DNA-based data storage. Our goal is to investigate the reconstruction problem for sticky-insdel channels where both sticky-insertions and sticky-deletions occur. If there are only sticky-inser… ▽ More

    Submitted 27 April, 2025; originally announced April 2025.

  2. arXiv:2504.15592  [pdf, other

    cs.CR

    Yet Another Diminishing Spark: Low-level Cyberattacks in the Israel-Gaza Conflict

    Authors: Anh V. Vu, Alice Hutchings, Ross Anderson

    Abstract: We report empirical evidence of web defacement and DDoS attacks carried out by low-level cybercrime actors in the Israel-Gaza conflict. Our quantitative measurements indicate an immediate increase in such cyberattacks following the Hamas-led assault and the subsequent declaration of war. However, the surges waned quickly after a few weeks, with patterns resembling those observed in the aftermath o… ▽ More

    Submitted 16 May, 2025; v1 submitted 22 April, 2025; originally announced April 2025.

  3. arXiv:2504.09876  [pdf, other

    cs.CV cs.AI

    HDC: Hierarchical Distillation for Multi-level Noisy Consistency in Semi-Supervised Fetal Ultrasound Segmentation

    Authors: Tran Quoc Khanh Le, Nguyen Lan Vi Vu, Ha-Hieu Pham, Xuan-Loc Huynh, Tien-Huy Nguyen, Minh Huu Nhat Le, Quan Nguyen, Hien D. Nguyen

    Abstract: Transvaginal ultrasound is a critical imaging modality for evaluating cervical anatomy and detecting physiological changes. However, accurate segmentation of cervical structures remains challenging due to low contrast, shadow artifacts, and indistinct boundaries. While convolutional neural networks (CNNs) have demonstrated efficacy in medical image segmentation, their reliance on large-scale annot… ▽ More

    Submitted 16 April, 2025; v1 submitted 14 April, 2025; originally announced April 2025.

  4. arXiv:2503.08028  [pdf, ps, other

    stat.ML cs.LG

    Computational bottlenecks for denoising diffusions

    Authors: Andrea Montanari, Viet Vu

    Abstract: Denoising diffusions sample from a probability distribution $μ$ in $\mathbb{R}^d$ by constructing a stochastic process $({\hat{\boldsymbol x}}_t:t\ge 0)$ in $\mathbb{R}^d$ such that ${\hat{\boldsymbol x}}_0$ is easy to sample, but the distribution of $\hat{\boldsymbol x}_T$ at large $T$ approximates $μ$. The drift ${\boldsymbol m}:\mathbb{R}^d\times\mathbb{R}\to\mathbb{R}^d$ of this diffusion proc… ▽ More

    Submitted 5 June, 2025; v1 submitted 11 March, 2025; originally announced March 2025.

    Comments: 43 pages; 2 figures

  5. arXiv:2502.04753  [pdf, other

    cs.CR

    Assessing the Aftermath: the Effects of a Global Takedown against DDoS-for-hire Services

    Authors: Anh V. Vu, Ben Collier, Daniel R. Thomas, John Kristoff, Richard Clayton, Alice Hutchings

    Abstract: Law enforcement and private-sector partners have in recent years conducted various interventions to disrupt the DDoS-for-hire market. Drawing on multiple quantitative datasets, including web traffic and ground-truth visits to seized websites, millions of DDoS attack records from academic, industry, and self-reported statistics, along with chats on underground forums and Telegram channels, we asses… ▽ More

    Submitted 7 February, 2025; originally announced February 2025.

    Journal ref: Proceedings of the USENIX Security Symposium (SEC) 2025

  6. arXiv:2501.19224  [pdf, other

    math.ST cs.LG math.CO math.PR stat.AP

    Fast exact recovery of noisy matrix from few entries: the infinity norm approach

    Authors: BaoLinh Tran, Van Vu

    Abstract: The matrix recovery (completion) problem, a central problem in data science and theoretical computer science, is to recover a matrix $A$ from a relatively small sample of entries. While such a task is impossible in general, it has been shown that one can recover $A$ exactly in polynomial time, with high probability, from a random subset of entries, under three (basic and necessary) assumptions:… ▽ More

    Submitted 4 March, 2025; v1 submitted 31 January, 2025; originally announced January 2025.

    Comments: 59 pages, 1 figure

    MSC Class: 60B20; 05C50; 65F99; 65C20; 60C05; 15A83; 68T09 ACM Class: F.2.1; G.1.2; G.1.3; G.2.1; G.3; I.5.4

  7. arXiv:2501.13534  [pdf, ps, other

    cs.IT math.CO

    A New Construction of Non-Binary Deletion Correcting Codes and their Decoding

    Authors: Michael Schaller, Beatrice Toesca, Van Khu Vu

    Abstract: Non-binary codes correcting multiple deletions have recently attracted a lot of attention. In this work, we focus on multiplicity-free codes, a family of non-binary codes where all symbols are distinct. Our main contribution is a new explicit construction of such codes, based on set and permutation codes. We show that our multiplicity-free codes can correct multiple deletions and provide a decodin… ▽ More

    Submitted 23 January, 2025; originally announced January 2025.

  8. arXiv:2407.03665  [pdf, other

    cs.IR cs.AI cs.LG cs.SI stat.ML

    Heterogeneous Hypergraph Embedding for Recommendation Systems

    Authors: Darnbi Sakong, Viet Hung Vu, Thanh Trung Huynh, Phi Le Nguyen, Hongzhi Yin, Quoc Viet Hung Nguyen, Thanh Tam Nguyen

    Abstract: Recent advancements in recommender systems have focused on integrating knowledge graphs (KGs) to leverage their auxiliary information. The core idea of KG-enhanced recommenders is to incorporate rich semantic information for more accurate recommendations. However, two main challenges persist: i) Neglecting complex higher-order interactions in the KG-based user-item network, potentially leading to… ▽ More

    Submitted 4 July, 2024; originally announced July 2024.

  9. arXiv:2406.16656  [pdf, ps, other

    cs.IT cs.DM math.CO

    Permutation and Multi-permutation Codes Correcting Multiple Deletions

    Authors: Shuche Wang, The Nguyen, Yeow Meng Chee, Van Khu Vu

    Abstract: Permutation codes in the Ulam metric, which can correct multiple deletions, have been investigated extensively recently. In this work, we are interested in the maximum size of permutation codes in the Ulam metric and aim to design permutation codes that can correct multiple deletions with efficient decoding algorithms. We first present an improvement on the Gilbert--Varshamov bound of the maximum… ▽ More

    Submitted 9 December, 2024; v1 submitted 24 June, 2024; originally announced June 2024.

    Comments: update new title, added new results, corrected some typos, 16 pages

  10. arXiv:2405.05827  [pdf, other

    cs.IT

    Efficient designs for threshold group testing without gap

    Authors: Thach V. Bui, Yeow Meng Chee, Van Khu Vu

    Abstract: Given $d$ defective items in a population of $n$ items with $d \ll n$, in threshold group testing without gap, the outcome of a test on a subset of items is positive if the subset has at least $u$ defective items and negative otherwise, where $1 \leq u \leq d$. The basic goal of threshold group testing is to quickly identify the defective items via a small number of tests. In non-adaptive design,… ▽ More

    Submitted 9 May, 2024; originally announced May 2024.

    Comments: 11 pages, 2 figures

  11. arXiv:2404.13674  [pdf, ps, other

    cs.IT

    On de Bruijn Covering Sequences and Arrays

    Authors: Yeow Meng Chee, Tuvi Etzion, Hoang Ta, Van Khu Vu

    Abstract: An $(m,n,R)$-de Bruijn covering array (dBCA) is a doubly periodic $M \times N$ array over an alphabet of size $q$ such that the set of all its $m \times n$ windows form a covering code with radius $R$. An upper bound of the smallest array area of an $(m,n,R)$-dBCA is provided using a probabilistic technique which is similar to the one that was used for an upper bound on the length of a de Bruijn c… ▽ More

    Submitted 9 May, 2024; v1 submitted 21 April, 2024; originally announced April 2024.

  12. arXiv:2403.01454  [pdf, other

    cs.IT

    Maximum Length RLL Sequences in de Bruijn Graph

    Authors: Yeow Meng Chee, Tuvi Etzion, Tien Long Nguyen, Duy Hoang Ta, Vinh Duc Tran, Van Khu Vu

    Abstract: Free-space quantum key distribution requires to synchronize the transmitted and received signals. A timing and synchronization system for this purpose based on a de Bruijn sequence has been proposed and studied recently for a channel associated with quantum communication that requires reliable synchronization. To avoid a long period of no-pulse in such a system on-off pulses are used to simulate a… ▽ More

    Submitted 8 November, 2024; v1 submitted 3 March, 2024; originally announced March 2024.

  13. arXiv:2401.06071  [pdf, other

    cs.CV cs.CL

    GroundingGPT:Language Enhanced Multi-modal Grounding Model

    Authors: Zhaowei Li, Qi Xu, Dong Zhang, Hang Song, Yiqing Cai, Qi Qi, Ran Zhou, Junting Pan, Zefeng Li, Van Tu Vu, Zhida Huang, Tao Wang

    Abstract: Multi-modal large language models have demonstrated impressive performance across various tasks in different modalities. However, existing multi-modal models primarily emphasize capturing global information within each modality while neglecting the importance of perceiving local information across modalities. Consequently, these models lack the ability to effectively understand the fine-grained de… ▽ More

    Submitted 5 March, 2024; v1 submitted 11 January, 2024; originally announced January 2024.

  14. arXiv:2308.16139  [pdf, other

    cs.CV cs.DB cs.LG

    MedShapeNet -- A Large-Scale Dataset of 3D Medical Shapes for Computer Vision

    Authors: Jianning Li, Zongwei Zhou, Jiancheng Yang, Antonio Pepe, Christina Gsaxner, Gijs Luijten, Chongyu Qu, Tiezheng Zhang, Xiaoxi Chen, Wenxuan Li, Marek Wodzinski, Paul Friedrich, Kangxian Xie, Yuan Jin, Narmada Ambigapathy, Enrico Nasca, Naida Solak, Gian Marco Melito, Viet Duc Vu, Afaque R. Memon, Christopher Schlachta, Sandrine De Ribaupierre, Rajnikant Patel, Roy Eagleson, Xiaojun Chen , et al. (132 additional authors not shown)

    Abstract: Prior to the deep learning era, shape was commonly used to describe the objects. Nowadays, state-of-the-art (SOTA) algorithms in medical imaging are predominantly diverging from computer vision, where voxel grids, meshes, point clouds, and implicit surface models are used. This is seen from numerous shape-related publications in premier vision conferences as well as the growing popularity of Shape… ▽ More

    Submitted 12 December, 2023; v1 submitted 30 August, 2023; originally announced August 2023.

    Comments: 16 pages

    MSC Class: 68T01

  15. arXiv:2308.15884  [pdf, other

    quant-ph cs.DS cs.IT

    Efficient Approximation of Quantum Channel Fidelity Exploiting Symmetry

    Authors: Yeow Meng Chee, Hoang Ta, Van Khu Vu

    Abstract: Determining the optimal fidelity for the transmission of quantum information over noisy quantum channels is one of the central problems in quantum information theory. Recently, [Berta-Borderi-Fawzi-Scholz, Mathematical Programming, 2021] introduced an asymptotically converging semidefinite programming hierarchy of outer bounds for this quantity. However, the size of the semidefinite programs (SDPs… ▽ More

    Submitted 21 March, 2024; v1 submitted 30 August, 2023; originally announced August 2023.

  16. arXiv:2304.07037  [pdf, other

    cs.CR cs.CY

    No Easy Way Out: the Effectiveness of Deplatforming an Extremist Forum to Suppress Hate and Harassment

    Authors: Anh V. Vu, Alice Hutchings, Ross Anderson

    Abstract: Legislators and policymakers worldwide are debating options for suppressing illegal, harmful and undesirable material online. Drawing on several quantitative data sources, we show that deplatforming an active community to suppress online hate and harassment, even with a substantial concerted effort involving several tech firms, can be hard. Our case study is the disruption of the largest and longe… ▽ More

    Submitted 13 April, 2024; v1 submitted 14 April, 2023; originally announced April 2023.

    Journal ref: Proceedings of the IEEE Symposium on Security and Privacy (S&P) 2024

  17. arXiv:2304.02705  [pdf, other

    eess.SY cs.RO

    A Unified Taxonomy for Automated Vehicles: Individual, Cooperative, Collaborative, On-Road, and Off-Road

    Authors: Fredrik Warg, Anders Thorsén, Victoria Vu, Carl Bergenhem

    Abstract: Various types of vehicle automation is increasingly used in a variety of environments including road vehicles such as cars or automated shuttles, confined areas such as mines or harbours, or in agriculture and forestry. In many use cases, the benefits are greater if several automated vehicles (AVs) cooperate to aid each other reach their goals more efficiently, or collaborate to complete a common… ▽ More

    Submitted 5 April, 2023; originally announced April 2023.

    Comments: 8 pages, one figure

  18. arXiv:2304.00328  [pdf, other

    math.PR cs.DS math.CO math.NA math.ST

    Matrix Perturbation: Davis-Kahan in the Infinity Norm

    Authors: Abhinav Bhardwaj, Van Vu

    Abstract: Perturbation theory is developed to analyze the impact of noise on data and has been an essential part of numerical analysis. Recently, it has played an important role in designing and analyzing matrix algorithms. One of the most useful tools in this subject, the Davis-Kahan sine theorem, provides an $\ell_2$ error bound on the perturbation of the leading singular vectors (and spaces). We focus… ▽ More

    Submitted 20 November, 2023; v1 submitted 1 April, 2023; originally announced April 2023.

    Comments: 56 pages, 2 figures. Extended abstract to appear in the proceedings of SODA24

  19. arXiv:2302.02754  [pdf, ps, other

    cs.IT

    Codes for Correcting $t$ Limited-Magnitude Sticky Deletions

    Authors: Shuche Wang, Van Khu Vu, Vincent Y. F. Tan

    Abstract: Codes for correcting sticky insertions/deletions and limited-magnitude errors have attracted significant attention due to their applications of flash memories, racetrack memories, and DNA data storage systems. In this paper, we first consider the error type of $t$-sticky deletions with $\ell$-limited-magnitude and propose a non-systematic code for correcting this type of error with redundancy… ▽ More

    Submitted 6 February, 2023; originally announced February 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2301.11680

  20. arXiv:2301.11680  [pdf, other

    cs.IT

    Codes for Correcting Asymmetric Adjacent Transpositions and Deletions

    Authors: Shuche Wang, Van Khu Vu, Vincent Y. F. Tan

    Abstract: Codes in the Damerau--Levenshtein metric have been extensively studied recently owing to their applications in DNA-based data storage. In particular, Gabrys, Yaakobi, and Milenkovic (2017) designed a length-$n$ code correcting a single deletion and $s$ adjacent transpositions with at most $(1+2s)\log n$ bits of redundancy. In this work, we consider a new setting where both asymmetric adjacent tran… ▽ More

    Submitted 29 June, 2023; v1 submitted 27 January, 2023; originally announced January 2023.

  21. arXiv:2208.10629  [pdf, other

    cs.CR cs.CY

    Getting Bored of Cyberwar: Exploring the Role of Low-level Cybercrime Actors in the Russia-Ukraine Conflict

    Authors: Anh V. Vu, Daniel R. Thomas, Ben Collier, Alice Hutchings, Richard Clayton, Ross Anderson

    Abstract: There has been substantial commentary on the role of cyberattacks carried out by low-level cybercrime actors in the Russia-Ukraine conflict. We analyse 358k website defacement attacks, 1.7M UDP amplification DDoS attacks, 1764 posts made by 372 users on Hack Forums mentioning the two countries, and 441 Telegram announcements (with 58k replies) of a volunteer hacking group for two months before and… ▽ More

    Submitted 13 April, 2024; v1 submitted 22 August, 2022; originally announced August 2022.

    Journal ref: Proceedings of the ACM World Wide Web Conference (WWW) 2024

  22. arXiv:2208.00097  [pdf, other

    stat.AP cs.LG eess.IV physics.data-an stat.ME

    Robust Rayleigh Regression Method for SAR Image Processing in Presence of Outliers

    Authors: B. G. Palm, F. M. Bayer, R. Machado, M. I. Pettersson, V. T. Vu, R. J. Cintra

    Abstract: The presence of outliers (anomalous values) in synthetic aperture radar (SAR) data and the misspecification in statistical image models may result in inaccurate inferences. To avoid such issues, the Rayleigh regression model based on a robust estimation process is proposed as a more realistic approach to model this type of data. This paper aims at obtaining Rayleigh regression model parameter esti… ▽ More

    Submitted 29 July, 2022; originally announced August 2022.

    Comments: 17 pages, 5 figures, 4 tables

    Journal ref: IEEE Transactions on Geoscience and Remote Sensing, v. 60, 2021

  23. arXiv:2206.02278  [pdf, other

    eess.IV cs.CV stat.AP stat.ME

    Autoregressive Model for Multi-Pass SAR Change Detection Based on Image Stacks

    Authors: B. G. Palm, D. I. Alves, V. T. Vu, M. I. Pettersson, F. M. Bayer, R. J. Cintra, R. Machado, P. Dammert, H. Hellsten

    Abstract: Change detection is an important synthetic aperture radar (SAR) application, usually used to detect changes on the ground scene measurements in different moments in time. Traditionally, change detection algorithm (CDA) is mainly designed for two synthetic aperture radar (SAR) images retrieved at different instants. However, more images can be used to improve the algorithms performance, witch emerg… ▽ More

    Submitted 5 June, 2022; originally announced June 2022.

    Comments: 9 pages, 10 figures

    Journal ref: Proceedings Volume 10789, Image and Signal Processing for Remote Sensing XXIV; 1078916 (2018)

  24. arXiv:2203.11205  [pdf, other

    eess.IV cs.CV

    VinDr-Mammo: A large-scale benchmark dataset for computer-aided diagnosis in full-field digital mammography

    Authors: Hieu T. Nguyen, Ha Q. Nguyen, Hieu H. Pham, Khanh Lam, Linh T. Le, Minh Dao, Van Vu

    Abstract: Mammography, or breast X-ray, is the most widely used imaging modality to detect cancer and other breast diseases. Recent studies have shown that deep learning-based computer-assisted detection and diagnosis (CADe or CADx) tools have been developed to support physicians and improve the accuracy of interpreting mammography. However, most published datasets of mammography are either limited on sampl… ▽ More

    Submitted 16 March, 2023; v1 submitted 20 March, 2022; originally announced March 2022.

    Comments: The manuscript is accepted for publication by Scientific Data (Nature)

  25. arXiv:2111.04479  [pdf, other

    cs.SI cs.CY

    ExtremeBB: A Database for Large-Scale Research into Online Hate, Harassment, the Manosphere and Extremism

    Authors: Anh V. Vu, Lydia Wilson, Yi Ting Chua, Ilia Shumailov, Ross Anderson

    Abstract: We introduce ExtremeBB, a textual database of over 53.5M posts made by 38.5k users on 12 extremist bulletin board forums promoting online hate, harassment, the manosphere and other forms of extremism. It enables large-scale analyses of qualitative and quantitative historical trends going back two decades: measuring hate speech and toxicity; tracing the evolution of different strands of extremist i… ▽ More

    Submitted 20 August, 2023; v1 submitted 8 November, 2021; originally announced November 2021.

    Journal ref: ACL Workshop on Online Abuse and Harms (WOAH@ACL) 2023

  26. arXiv:2109.09932  [pdf, other

    cs.IT

    Endurance-Limited Memories: Capacity and Codes

    Authors: Yeow Meng Chee, Michal Horovitz, Alexander Vardy, Van Khu Vu, Eitan Yaakobi

    Abstract: \emph{Resistive memories}, such as \emph{phase change memories} and \emph{resistive random access memories} have attracted significant attention in recent years due to their better scalability, speed, rewritability, and yet non-volatility. However, their \emph{limited endurance} is still a major drawback that has to be improved before they can be widely adapted in large-scale systems. In this wo… ▽ More

    Submitted 20 September, 2021; originally announced September 2021.

  27. arXiv:2106.12930  [pdf, other

    eess.IV cs.CV cs.LG

    VinDr-SpineXR: A deep learning framework for spinal lesions detection and classification from radiographs

    Authors: Hieu T. Nguyen, Hieu H. Pham, Nghia T. Nguyen, Ha Q. Nguyen, Thang Q. Huynh, Minh Dao, Van Vu

    Abstract: Radiographs are used as the most important imaging tool for identifying spine anomalies in clinical practice. The evaluation of spinal bone lesions, however, is a challenging task for radiologists. This work aims at developing and evaluating a deep learning-based framework, named VinDr-SpineXR, for the classification and localization of abnormalities from spine X-rays. First, we build a large data… ▽ More

    Submitted 24 June, 2021; originally announced June 2021.

    Comments: This is a preprint of our paper which was accepted for publication by the International Conference on Medical Image Computing and Computer Assisted Intervention (MICCAI 2021)

  28. arXiv:2011.04555  [pdf, ps, other

    eess.SP cs.LG

    Multi-Agent Reinforcement Learning for Channel Assignment and Power Allocation in Platoon-Based C-V2X Systems

    Authors: Hung V. Vu, Mohammad Farzanullah, Zheyu Liu, Duy H. N. Nguyen, Robert Morawski, Tho Le-Ngoc

    Abstract: We consider the problem of joint channel assignment and power allocation in underlaid cellular vehicular-to-everything (C-V2X) systems where multiple vehicle-to-network (V2N) uplinks share the time-frequency resources with multiple vehicle-to-vehicle (V2V) platoons that enable groups of connected and autonomous vehicles to travel closely together. Due to the nature of high user mobility in vehicul… ▽ More

    Submitted 19 June, 2022; v1 submitted 9 November, 2020; originally announced November 2020.

    Comments: 5 pages, 3 figures

  29. arXiv:2005.03102  [pdf, ps, other

    cs.IT

    Constrained de Bruijn Codes: Properties, Enumeration, Constructions, and Applications

    Authors: Yeow Meng Chee, Tuvi Etzion, Han Mao Kiah, Alexander Vardy, Van Khu Vu, Eitan yaakobi

    Abstract: The de Bruijn graph, its sequences, and their various generalizations, have found many applications in information theory, including many new ones in the last decade. In this paper, motivated by a coding problem for emerging memory technologies, a set of sequences which generalize sequences in the de Bruijn graph are defined. These sequences can be also defined and viewed as constrained sequences.… ▽ More

    Submitted 6 May, 2020; originally announced May 2020.

  30. arXiv:2004.02184  [pdf, other

    cs.IR cs.LG

    Mining Shape of Expertise: A Novel Approach Based on Convolutional Neural Network

    Authors: Mahdi Dehghan, Hossein A. Rahmani, Ahmad Ali Abin, Viet-Vu Vu

    Abstract: Expert finding addresses the task of retrieving and ranking talented people on the subject of user query. It is a practical issue in the Community Question Answering networks. Recruiters looking for knowledgeable people for their job positions are the most important clients of expert finding systems. In addition to employee expertise, the cost of hiring new staff is another significant concern for… ▽ More

    Submitted 5 April, 2020; originally announced April 2020.

    Comments: IP&M 2020

  31. arXiv:1907.02944  [pdf

    cs.IT

    Proceedings of the 11th Asia-Europe Workshop on Concepts in Information Theory

    Authors: A. J. Han Vinck, Kees A. Schouhamer Immink, Tadashi Wadayama, Van Khu Vu, Akiko Manada, Kui Cai, Shunsuke Horii, Yoshiki Abe, Mitsugu Iwamoto, Kazuo Ohta, Xingwei Zhong, Zhen Mei, Renfei Bu, J. H. Weber, Vitaly Skachek, Hiroyoshi Morita, N. Hovhannisyan, Hiroshi Kamabe, Shan Lu, Hirosuke Yamamoto, Kengo Hasimoto, O. Ytrehus, Shigeaki Kuzuoaka, Mikihiko Nishiara, Han Mao Kiah , et al. (2 additional authors not shown)

    Abstract: This year, 2019 we celebrate 30 years of our friendship between Asian and European scientists at the AEW11 in Rotterdam, the Netherlands. Many of the 1989 participants are also present at the 2019 event. This year we have many participants from different parts of Asia and Europe. It shows the importance of this event. It is a good tradition to pay a tribute to a special lecturer in our community.… ▽ More

    Submitted 26 June, 2019; originally announced July 2019.

  32. arXiv:1803.00679  [pdf, other

    stat.ML cs.IT cs.LG math.PR

    Matrices with Gaussian noise: optimal estimates for singular subspace perturbation

    Authors: Sean O'Rourke, Van Vu, Ke Wang

    Abstract: The Davis-Kahan-Wedin $\sin Θ$ theorem describes how the singular subspaces of a matrix change when subjected to a small perturbation. This classic result is sharp in the worst case scenario. In this paper, we prove a stochastic version of the Davis-Kahan-Wedin $\sin Θ$ theorem when the perturbation is a Gaussian random matrix. Under certain structural assumptions, we obtain an optimal bound that… ▽ More

    Submitted 29 December, 2023; v1 submitted 1 March, 2018; originally announced March 2018.

    Comments: Final version. Accepted by IEEE Transactions on Information Theory

  33. arXiv:1701.06874  [pdf, ps, other

    cs.IT

    Coding for Racetrack Memories

    Authors: Yeow Meng Chee, Han Mao Kiah, Alexander Vardy, Van Khu Vu, Eitan Yaakobi

    Abstract: Racetrack memory is a new technology which utilizes magnetic domains along a nanoscopic wire in order to obtain extremely high storage density. In racetrack memory, each magnetic domain can store a single bit of information, which can be sensed by a reading port (head). The memory has a tape-like structure which supports a shift operation that moves the domains to be read sequentially by the head.… ▽ More

    Submitted 24 January, 2017; originally announced January 2017.

  34. arXiv:1507.00829  [pdf, other

    math.PR cs.CC

    Anti-concentration for polynomials of independent random variables

    Authors: Raghu Meka, Oanh Nguyen, Van Vu

    Abstract: We prove anti-concentration results for polynomials of independent random variables with arbitrary degree. Our results extend the classical Littlewood-Offord result for linear polynomials, and improve several earlier estimates. We discuss applications in two different areas. In complexity theory, we prove near optimal lower bounds for computing the Parity, addressing a challenge in complexity th… ▽ More

    Submitted 7 August, 2015; v1 submitted 3 July, 2015; originally announced July 2015.

    Comments: Theorem 1.7 on p-biased distribution and Theorem 2.5 on lower bound for approximating OR function are modified due to some errors in the previous version. Theorem 1.8 on general distributions and an application on graph theory are added

  35. arXiv:1501.05021  [pdf, other

    cs.DS

    Stochastic Block Model and Community Detection in the Sparse Graphs: A spectral algorithm with optimal rate of recovery

    Authors: Peter Chin, Anup Rao, Van Vu

    Abstract: In this paper, we present and analyze a simple and robust spectral algorithm for the stochastic block model with $k$ blocks, for any $k$ fixed. Our algorithm works with graphs having constant edge density, under an optimal condition on the gap between the density inside a block and the density between the blocks. As a co-product, we settle an open question posed by Abbe et. al. concerning censor b… ▽ More

    Submitted 24 June, 2015; v1 submitted 20 January, 2015; originally announced January 2015.

  36. arXiv:1404.3918  [pdf, ps, other

    math.CO cs.DS

    A simple SVD algorithm for finding hidden partitions

    Authors: Van Vu

    Abstract: Finding a hidden partition in a random environment is a general and important problem, which contains as subproblems many famous questions, such as finding a hidden clique, finding a hidden coloring, finding a hidden bipartition etc. In this paper, we provide a simple SVD algorithm for this purpose, answering a question of McSherry. This algorithm is very easy to implement and works for sparse g… ▽ More

    Submitted 15 April, 2014; originally announced April 2014.

    MSC Class: 68W20

  37. arXiv:1403.6237  [pdf, ps, other

    cs.LO

    Resolution in Linguistic First Order Logic based on Linear Symmetrical Hedge Algebra

    Authors: Thi-Minh-Tam Nguyen, Viet-Trung Vu, The-Vinh Doan, Duc-Khanh Tran

    Abstract: This paper focuses on resolution in linguistic first order logic with truth value taken from linear symmetrical hedge algebra. We build the basic components of linguistic first order logic, including syntax and semantics. We present a resolution principle for our logic to resolve on two clauses having contradictory linguistic truth values. Since linguistic information is uncertain, inference in ou… ▽ More

    Submitted 30 March, 2014; v1 submitted 25 March, 2014; originally announced March 2014.

    Comments: IPMU 2014 Full paper (14 pages)

  38. arXiv:1307.7661  [pdf, ps, other

    cs.LO

    Resolution in Linguistic Propositional Logic based on Linear Symmetrical Hedge Algebra

    Authors: Thi-Minh-Tam Nguyen, Viet-Trung Vu, The-Vinh Doan, Duc-Khanh Tran

    Abstract: The paper introduces a propositional linguistic logic that serves as the basis for automated uncertain reasoning with linguistic information. First, we build a linguistic logic system with truth value domain based on a linear symmetrical hedge algebra. Then, we consider Gödel's t-norm and t-conorm to define the logical connectives for our logic. Next, we present a resolution inference rule, in whi… ▽ More

    Submitted 30 July, 2013; v1 submitted 29 July, 2013; originally announced July 2013.

    Comments: KSE 2013 conference

  39. arXiv:1202.0786  [pdf, ps, other

    stat.ML cs.LG math.ST

    Minimax Rates of Estimation for Sparse PCA in High Dimensions

    Authors: Vincent Q. Vu, Jing Lei

    Abstract: We study sparse principal components analysis in the high-dimensional setting, where $p$ (the number of variables) can be much larger than $n$ (the number of observations). We prove optimal, non-asymptotic lower and upper bounds on the minimax estimation error for the leading eigenvector when it belongs to an $\ell_q$ ball for $q \in [0,1]$. Our bounds are sharp in $p$ and $n$ for all… ▽ More

    Submitted 5 February, 2012; v1 submitted 3 February, 2012; originally announced February 2012.

    Comments: To appear in Proceedings of the 15th International Conference on Artificial Intelligence and Statistics (AISTATS) 2012, La Palma, Canary Islands. Volume 22 of JMLR: W&CP 22

  40. arXiv:0806.3978  [pdf, other

    q-bio.NC cs.IT q-bio.QM stat.ME

    Information In The Non-Stationary Case

    Authors: Vincent Q. Vu, Bin Yu, Robert E. Kass

    Abstract: Information estimates such as the ``direct method'' of Strong et al. (1998) sidestep the difficult problem of estimating the joint distribution of response and stimulus by instead estimating the difference between the marginal and conditional entropies of the response. While this is an effective estimation strategy, it tempts the practitioner to ignore the role of the stimulus and the meaning of… ▽ More

    Submitted 18 July, 2008; v1 submitted 24 June, 2008; originally announced June 2008.