Skip to main content

Showing 1–5 of 5 results for author: Wang, D Y

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.04016  [pdf, ps, other

    cs.CL cs.AI cs.LG

    SLOT: Structuring the Output of Large Language Models

    Authors: Darren Yow-Bang Wang, Zhengyuan Shen, Soumya Smruti Mishra, Zhichao Xu, Yifei Teng, Haibo Ding

    Abstract: Structured outputs are essential for large language models (LLMs) in critical applications like agents and information extraction. Despite their capabilities, LLMs often generate outputs that deviate from predefined schemas, significantly hampering reliable application development. We present SLOT (Structured LLM Output Transformer), a model-agnostic approach that transforms unstructured LLM outpu… ▽ More

    Submitted 6 May, 2025; originally announced May 2025.

  2. arXiv:2410.15827  [pdf, other

    cs.LG

    Explainability of Highly Associated Fuzzy Churn Patterns in Binary Classification

    Authors: D. Y. C. Wang, Lars Arne Jordanger, Jerry Chun-Wei Lin

    Abstract: Customer churn, particularly in the telecommunications sector, influences both costs and profits. As the explainability of models becomes increasingly important, this study emphasizes not only the explainability of customer churn through machine learning models, but also the importance of identifying multivariate patterns and setting soft bounds for intuitive interpretation. The main objective is… ▽ More

    Submitted 21 October, 2024; originally announced October 2024.

    Comments: 18 pages single columns, 4 figures, This paper is an extended version of a work originally presented at the 6th International Workshop on Utility-Driven Mining and Learning (held in conjunction with the 28th Pacific-Asia Conference on Knowledge Discovery and Data Mining - PAKDD 2024) on May 7, 2024

  3. arXiv:2410.07282  [pdf, other

    cs.LG

    A Utility-Mining-Driven Active Learning Approach for Analyzing Clickstream Sequences

    Authors: Danny Y. C. Wang, Lars Arne Jordanger, Jerry Chun-Wei Lin

    Abstract: In rapidly evolving e-commerce industry, the capability of selecting high-quality data for model training is essential. This study introduces the High-Utility Sequential Pattern Mining using SHAP values (HUSPM-SHAP) model, a utility mining-based active learning strategy to tackle this challenge. We found that the parameter settings for positive and negative SHAP values impact the model's mining ou… ▽ More

    Submitted 9 October, 2024; originally announced October 2024.

    Comments: 7 pages, 2 figures, preprint version

  4. arXiv:2410.00260  [pdf, other

    cs.CL cs.AI cs.LG

    DoPAMine: Domain-specific Pre-training Adaptation from seed-guided data Mining

    Authors: Vinayak Arannil, Neha Narwal, Sourav Sanjukta Bhabesh, Sai Nikhil Thirandas, Darren Yow-Bang Wang, Graham Horwood, Alex Anto Chirayath, Gouri Pandeshwar

    Abstract: Large Language Models (LLMs) have shown remarkable ability to generalize effectively across numerous industry domains while executing a range of tasks. Many of these competencies are obtained from the data utilized during the pre-training phase of the Language Models (LMs). However, these models exhibit limitations when tasked with performing in specialized or low-resource industry domains. More r… ▽ More

    Submitted 9 October, 2024; v1 submitted 30 September, 2024; originally announced October 2024.

  5. arXiv:1207.5442  [pdf, ps, other

    cs.CR

    Security Analysis of a Password-Based Authentication Protocol Proposed to IEEE 1363

    Authors: Z. Zhao, Z. Dongand Yongge Wang

    Abstract: In recent years, several protocols for password-based authenticated key exchange have been proposed. These protocols aim to be secure even though the sample space of passwords may be small enough to be enumerated by an off-line adversary. In Eurocrypt 2000, Bellare, Pointcheval and Rogaway (BPR) presented a model and security definition for authenticated key exchange. They claimed that in the idea… ▽ More

    Submitted 23 July, 2012; originally announced July 2012.

    Journal ref: Theoretical Computer Science, 352(1-3):280--287, 2006