Skip to main content

Showing 151–200 of 310 results for author: Tran, L

  1. arXiv:2101.02149  [pdf, other

    cs.LG cs.CV

    Cauchy-Schwarz Regularized Autoencoder

    Authors: Linh Tran, Maja Pantic, Marc Peter Deisenroth

    Abstract: Recent work in unsupervised learning has focused on efficient inference and learning in latent variables models. Training these models by maximizing the evidence (marginal likelihood) is typically intractable. Thus, a common approximation is to maximize the Evidence Lower BOund (ELBO) instead. Variational autoencoders (VAE) are a powerful and widely-used class of generative models that optimize th… ▽ More

    Submitted 12 February, 2021; v1 submitted 6 January, 2021; originally announced January 2021.

  2. arXiv:2101.00191  [pdf, other

    cs.NI cs.LG

    Dynamic Federated Learning-Based Economic Framework for Internet-of-Vehicles

    Authors: Yuris Mulya Saputra, Dinh Thai Hoang, Diep N. Nguyen, Le-Nam Tran, Shimin Gong, Eryk Dutkiewicz

    Abstract: Federated learning (FL) can empower Internet-of-Vehicles (IoV) networks by leveraging smart vehicles (SVs) to participate in the learning process with minimum data exchanges and privacy disclosure. The collected data and learned knowledge can help the vehicular service provider (VSP) improve the global model accuracy, e.g., for road safety as well as better profits for both VSP and participating S… ▽ More

    Submitted 11 March, 2021; v1 submitted 1 January, 2021; originally announced January 2021.

    Comments: 18 pages, 12 figures, submitted to an IEEE journal

  3. arXiv:2012.11701  [pdf, other

    cs.CR cs.SE

    Learning from What We Know: How to Perform Vulnerability Prediction using Noisy Historical Data

    Authors: Aayush Garg, Renzo Degiovanni, Matthieu Jimenez, Maxime Cordy, Mike Papadakis, Yves Le Traon

    Abstract: Vulnerability prediction refers to the problem of identifying system components that are most likely to be vulnerable. Typically, this problem is tackled by training binary classifiers on historical data. Unfortunately, recent research has shown that such approaches underperform due to the following two reasons: a) the imbalanced nature of the problem, and b) the inherently noisy historical data,… ▽ More

    Submitted 25 July, 2022; v1 submitted 21 December, 2020; originally announced December 2020.

    Comments: The article was accepted in Empirical Software Engineering (EMSE) on July 02, 2022

  4. Influence-Driven Data Poisoning in Graph-Based Semi-Supervised Classifiers

    Authors: Adriano Franci, Maxime Cordy, Martin Gubri, Mike Papadakis, Yves Le Traon

    Abstract: Graph-based Semi-Supervised Learning (GSSL) is a practical solution to learn from a limited amount of labelled data together with a vast amount of unlabelled data. However, due to their reliance on the known labels to infer the unknown labels, these algorithms are sensitive to data quality. It is therefore essential to study the potential threats related to the labelled data, more specifically, la… ▽ More

    Submitted 11 May, 2022; v1 submitted 14 December, 2020; originally announced December 2020.

  5. IBIR: Bug Report driven Fault Injection

    Authors: Ahmed Khanfir, Anil Koyuncu, Mike Papadakis, Maxime Cordy, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon

    Abstract: Much research on software engineering and software testing relies on experimental studies based on fault injection. Fault injection, however, is not often relevant to emulate real-world software faults since it "blindly" injects large numbers of faults. It remains indeed challenging to inject few but realistic faults that target a particular functionality in a program. In this work, we introduce I… ▽ More

    Submitted 11 December, 2020; originally announced December 2020.

  6. arXiv:2012.05667  [pdf, ps, other

    cs.IT eess.SP

    On the Secrecy Capacity of MIMO Wiretap Channels: Convex Reformulation and Efficient Numerical Methods

    Authors: Anshu Mukherjee, Björn Ottersten, Le-Nam Tran

    Abstract: This paper presents novel numerical approaches to finding the secrecy capacity of the multiple-input multiple-output (MIMO) wiretap channel subject to multiple linear transmit covariance constraints, including sum power constraint, per antenna power constraints and interference power constraint. An analytical solution to this problem is not known and existing numerical solutions suffer from slow c… ▽ More

    Submitted 8 July, 2021; v1 submitted 10 December, 2020; originally announced December 2020.

  7. arXiv:2012.05131  [pdf, ps, other

    cs.IT

    Optimization of RIS-aided MIMO Systems via the Cutoff Rate

    Authors: Nemanja Stefan Perović, Le-Nam Tran, Marco Di Renzo, Mark F. Flanagan

    Abstract: The main difficulty concerning optimizing the mutual information (MI) in reconfigurable intelligent surface (RIS)-aided communication systems with discrete signaling is the inability to formulate this optimization problem in an analytically tractable manner. Therefore, we propose to use the cutoff rate (CR) as a more tractable metric for optimizing the MI and introduce two optimization methods to… ▽ More

    Submitted 3 September, 2021; v1 submitted 9 December, 2020; originally announced December 2020.

  8. arXiv:2011.13280  [pdf, other

    cs.SE

    FlexiRepair: Transparent Program Repair with Generic Patches

    Authors: Anil Koyuncu, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon

    Abstract: Template-based program repair research is in need for a common ground to express fix patterns in a standard and reusable manner. We propose to build on the concept of generic patch (also known as semantic patch), which is widely used in the Linux community to automate code evolution. We advocate that generic patches could provide at the same time a unified representation and a specification for fi… ▽ More

    Submitted 26 November, 2020; originally announced November 2020.

  9. arXiv:2011.05076  [pdf, ps, other

    eess.SP

    A Low-Complexity Approach for Max-Min Fairness in Uplink Cell-Free Massive MIMO

    Authors: Muhammad Farooq, Hien Quoc Ngo, Le Nam Tran

    Abstract: We consider the problem of max-min fairness for uplink cell-free massive multiple-input multiple-output which is a potential technology for beyond 5G networks. More specifically, we aim to maximize the minimum spectral efficiency of all users subject to the per-user power constraint, assuming linear receive combining technique at access points. The considered problem can be further divided into tw… ▽ More

    Submitted 10 November, 2020; originally announced November 2020.

    Comments: 6 pages, 3 figures

  10. arXiv:2011.05074  [pdf, other

    cs.LG stat.ML

    Efficient and Transferable Adversarial Examples from Bayesian Neural Networks

    Authors: Martin Gubri, Maxime Cordy, Mike Papadakis, Yves Le Traon, Koushik Sen

    Abstract: An established way to improve the transferability of black-box evasion attacks is to craft the adversarial examples on an ensemble-based surrogate to increase diversity. We argue that transferability is fundamentally related to uncertainty. Based on a state-of-the-art Bayesian Deep Learning technique, we propose a new method to efficiently build a surrogate by sampling approximately from the poste… ▽ More

    Submitted 18 June, 2022; v1 submitted 10 November, 2020; originally announced November 2020.

    Comments: Accepted at UAI 2022

  11. arXiv:2009.07167  [pdf, ps, other

    eess.SP

    Utility Maximization for Large-Scale Cell-Free Massive MIMO Downlink

    Authors: Muhammad Farooq, Hien Quoc Ngo, Een-Kee Hong, Le-Nam Tran

    Abstract: We consider the system-wide utility maximization problem in the downlink of a cell-free massive multiple-input multiple-output (MIMO) system whereby a very large number of access points (APs) simultaneously serve a group of users. Specifically, four fundamental problems with increasing order of user fairness are of interest: (i) to maximize the average spectral efficiency (SE), (ii) to maximize th… ▽ More

    Submitted 20 September, 2020; v1 submitted 15 September, 2020; originally announced September 2020.

    Comments: Submitted for publication

  12. arXiv:2008.09563  [pdf, ps, other

    cs.IT

    Achievable Rate Optimization for MIMO Systems with Reconfigurable Intelligent Surfaces

    Authors: Nemanja Stefan Perović, Le-Nam Tran, Marco Di Renzo, Mark F. Flanagan

    Abstract: Reconfigurable intelligent surfaces (RISs) represent a radical new technology that can shape the radio wave propagation in wireless communication systems and offers a great variety of possible performance and implementation gains. Motivated by this, in this paper we study the achievable rate optimization for a multi-stream multiple-input multiple-output (MIMO) system equipped with an RIS, and form… ▽ More

    Submitted 3 September, 2021; v1 submitted 21 August, 2020; originally announced August 2020.

  13. arXiv:2008.03626  [pdf

    stat.ML cs.LG stat.CO

    Directed hypergraph neural network

    Authors: Loc Hoang Tran, Linh Hoang Tran

    Abstract: To deal with irregular data structure, graph convolution neural networks have been developed by a lot of data scientists. However, data scientists just have concentrated primarily on developing deep neural network method for un-directed graph. In this paper, we will present the novel neural network method for directed hypergraph. In the other words, we will develop not only the novel directed hype… ▽ More

    Submitted 3 September, 2022; v1 submitted 8 August, 2020; originally announced August 2020.

  14. On the Efficiency of Test Suite based Program Repair: A Systematic Assessment of 16 Automated Repair Systems for Java Programs

    Authors: Kui Liu, Shangwen Wang, Anil Koyuncu, Kisub Kim, Tegawendé F. Bissyandé, Dongsun Kim, Peng Wu, Jacques Klein, Xiaoguang Mao, Yves Le Traon

    Abstract: Test-based automated program repair has been a prolific field of research in software engineering in the last decade. Many approaches have indeed been proposed, which leverage test suites as a weak, but affordable, approximation to program specifications. Although the literature regularly sets new records on the number of benchmark bugs that can be fixed, several studies increasingly raise concern… ▽ More

    Submitted 3 August, 2020; originally announced August 2020.

  15. arXiv:2006.09621  [pdf, other

    physics.chem-ph

    Improving excited state potential energy surfaces via optimal orbital shapes

    Authors: Lan Nguyen Tran, Eric Neuscamman

    Abstract: We demonstrate that, rather than resorting to high-cost dynamic correlation methods, qualitative failures in excited-state potential energy surface predictions can often be remedied at no additional cost by ensuring that optimal molecular orbitals are used for each individual excited state. This approach also avoids the weighting choices required by state-averaging and dynamic weighting and obviat… ▽ More

    Submitted 16 June, 2020; originally announced June 2020.

    Comments: 6 pages, 6 figures, 1 table

  16. arXiv:2006.07087  [pdf, other

    cs.CY physics.soc-ph q-bio.PE

    Data-driven Simulation and Optimization for Covid-19 Exit Strategies

    Authors: Salah Ghamizi, Renaud Rwemalika, Lisa Veiber, Maxime Cordy, Tegawende F. Bissyande, Mike Papadakis, Jacques Klein, Yves Le Traon

    Abstract: The rapid spread of the Coronavirus SARS-2 is a major challenge that led almost all governments worldwide to take drastic measures to respond to the tragedy. Chief among those measures is the massive lockdown of entire countries and cities, which beyond its global economic impact has created some deep social and psychological tensions within populations. While the adopted mitigation measures (incl… ▽ More

    Submitted 12 June, 2020; originally announced June 2020.

  17. Noncoherent Joint Transmission Beamforming for Dense Small Cell Networks: Global Optimality, Efficient Solution and Distributed Implementation

    Authors: Quang-Doanh Vu, Le-Nam Tran, Markku Juntti

    Abstract: We investigate the coordinated multi-point noncoherent joint transmission (JT) in dense small cell networks. The goal is to design beamforming vectors for macro cell and small cell base stations (BSs) such that the weighted sum rate of the system is maximized, subject to a total transmit power at individual BSs. The optimization problem is inherently nonconvex and intractable, making it difficult… ▽ More

    Submitted 25 May, 2020; originally announced May 2020.

    Comments: 35 pages, 11 figures. Accepted for publication on IEEE Transactions on Wireless Communications

  18. arXiv:2005.07160  [pdf

    cs.CR

    XACs-DyPol: Towards an XACML-based Access Control Model for Dynamic Security Policy

    Authors: Tran Khanh Dang, Xuan Son Ha, Luong Khiem Tran

    Abstract: Authorization and access control play an essential role in protecting sensitive information from malicious users. The system is based on security policies to determine if an access request is allowed. However, of late, the growing popularity of big data has created a new challenge which the security policy management is facing with such as dynamic and update policies in run time. Applications of d… ▽ More

    Submitted 10 April, 2020; originally announced May 2020.

    Comments: 12 pages

  19. arXiv:2003.11531  [pdf, other

    cs.CL

    The Medical Scribe: Corpus Development and Model Performance Analyses

    Authors: Izhak Shafran, Nan Du, Linh Tran, Amanda Perry, Lauren Keyes, Mark Knichel, Ashley Domin, Lei Huang, Yuhui Chen, Gang Li, Mingqiu Wang, Laurent El Shafey, Hagen Soltau, Justin S. Paul

    Abstract: There is a growing interest in creating tools to assist in clinical note generation using the audio of provider-patient encounters. Motivated by this goal and with the help of providers and medical scribes, we developed an annotation scheme to extract relevant clinical concepts. We used this annotation scheme to label a corpus of about 6k clinical encounters. This was used to train a state-of-the-… ▽ More

    Submitted 11 March, 2020; originally announced March 2020.

    Comments: Extended version of the paper accepted at LREC 2020

    Journal ref: Proceedings of Language Resources and Evaluation, 2020

  20. arXiv:2003.09579  [pdf, other

    cs.AI

    FlapAI Bird: Training an Agent to Play Flappy Bird Using Reinforcement Learning Techniques

    Authors: Tai Vu, Leon Tran

    Abstract: Reinforcement learning is one of the most popular approaches for automated game playing. This method allows an agent to estimate the expected utility of its state in order to make optimal actions in an unknown environment. We seek to apply reinforcement learning algorithms to the game Flappy Bird. We implement SARSA and Q-Learning with some modifications such as $ε$-greedy policy, discretization a… ▽ More

    Submitted 8 April, 2020; v1 submitted 21 March, 2020; originally announced March 2020.

    Comments: typos corrected, references added

  21. Undulation instabilities in cholesteric liquid crystals induced by anchoring transitions

    Authors: Maxim O. Lavrentovich, Lisa Tran

    Abstract: Cholesteric liquid crystals (CLCs) have a characteristic length scale given by the pitch of the twisted stacking of their constituent rod-like molecules. Under homeotropic anchoring conditions where the molecules prefer to orient perpendicular to an interface, cholesteric interfaces exhibit striped phases with stripe widths commensurate with the pitch. Conversely, planar anchoring conditions have… ▽ More

    Submitted 10 February, 2020; originally announced February 2020.

    Comments: 10 pages, 8 figures

    Journal ref: Phys. Rev. Research 2, 023128 (2020)

  22. arXiv:2002.02655  [pdf, other

    cs.LG stat.ML

    The k-tied Normal Distribution: A Compact Parameterization of Gaussian Mean Field Posteriors in Bayesian Neural Networks

    Authors: Jakub Swiatkowski, Kevin Roth, Bastiaan S. Veeling, Linh Tran, Joshua V. Dillon, Jasper Snoek, Stephan Mandt, Tim Salimans, Rodolphe Jenatton, Sebastian Nowozin

    Abstract: Variational Bayesian Inference is a popular methodology for approximating posterior distributions over Bayesian neural network weights. Recent work developing this class of methods has explored ever richer parameterizations of the approximate posterior in the hope of improving performance. In contrast, here we share a curious experimental finding that suggests instead restricting the variational d… ▽ More

    Submitted 5 July, 2020; v1 submitted 7 February, 2020; originally announced February 2020.

  23. arXiv:2002.02650  [pdf, other

    cs.SE

    What You See is What it Means! Semantic Representation Learning of Code based on Visualization and Transfer Learning

    Authors: Patrick Keller, Laura Plein, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon

    Abstract: Recent successes in training word embeddings for NLP tasks have encouraged a wave of research on representation learning for source code, which builds on similar NLP methods. The overall objective is then to produce code embeddings that capture the maximum of program semantics. State-of-the-art approaches invariably rely on a syntactic representation (i.e., raw lexical tokens, abstract syntax tree… ▽ More

    Submitted 7 February, 2020; originally announced February 2020.

  24. arXiv:2002.02405  [pdf, other

    stat.ML cs.LG stat.CO

    How Good is the Bayes Posterior in Deep Neural Networks Really?

    Authors: Florian Wenzel, Kevin Roth, Bastiaan S. Veeling, Jakub Świątkowski, Linh Tran, Stephan Mandt, Jasper Snoek, Tim Salimans, Rodolphe Jenatton, Sebastian Nowozin

    Abstract: During the past five years the Bayesian deep learning community has developed increasingly accurate and efficient approximate inference procedures that allow for Bayesian inference in deep neural networks. However, despite this algorithmic progress and the promise of improved uncertainty quantification and sample efficiency there are---as of early 2020---no publicized deployments of Bayesian neura… ▽ More

    Submitted 2 July, 2020; v1 submitted 6 February, 2020; originally announced February 2020.

    Comments: Full version (main paper and appendix) of the ICML 2020 publication

  25. arXiv:2001.09148  [pdf, other

    cs.SE

    Learning to Catch Security Patches

    Authors: Arthur D. Sawadogo, Tegawendé F. Bissyandé, Naouel Moha, Kevin Allix, Jacques Klein, Li Li, Yves Le Traon

    Abstract: Timely patching is paramount to safeguard users and maintainers against dire consequences of malicious attacks. In practice, patching is prioritized following the nature of the code change that is committed in the code repository. When such a change is labeled as being security-relevant, i.e., as fixing a vulnerability, maintainers rapidly spread the change and users are notified about the need to… ▽ More

    Submitted 24 January, 2020; originally announced January 2020.

  26. arXiv:2001.04694  [pdf, other

    cs.LG stat.ML

    Hydra: Preserving Ensemble Diversity for Model Distillation

    Authors: Linh Tran, Bastiaan S. Veeling, Kevin Roth, Jakub Swiatkowski, Joshua V. Dillon, Jasper Snoek, Stephan Mandt, Tim Salimans, Sebastian Nowozin, Rodolphe Jenatton

    Abstract: Ensembles of models have been empirically shown to improve predictive performance and to yield robust measures of uncertainty. However, they are expensive in computation and memory. Therefore, recent research has focused on distilling ensembles into a single compact model, reducing the computational and memory burden of the ensemble while trying to preserve its predictive behavior. Most existing d… ▽ More

    Submitted 19 March, 2021; v1 submitted 14 January, 2020; originally announced January 2020.

    Comments: Accepted to ICML 2020 Workshop on Uncertainty and Robustness in Deep Learning

  27. arXiv:2001.02941  [pdf, other

    cs.SE

    Killing Stubborn Mutants with Symbolic Execution

    Authors: Thierry Titcheu Chekam, Mike Papadakis, Maxime Cordy, Yves Le Traon

    Abstract: We introduce SeMu, a Dynamic Symbolic Execution technique that generates test inputs capable of killing stubborn mutants (killable mutants that remain undetected after a reasonable amount of testing). SeMu aims at mutant propagation (triggering erroneous states to the program output) by incrementally searching for divergent program behaviours between the original and the mutant versions. We model… ▽ More

    Submitted 9 January, 2020; originally announced January 2020.

  28. Swelling cholesteric liquid crystal shells to direct colloids at the interface

    Authors: Lisa Tran, Kyle J. M. Bishop

    Abstract: Cholesteric liquid crystals can exhibit spatial patterns in molecular alignment at interfaces that can be exploited for particle assembly. These patterns emerge from the competition between bulk and surface energies, tunable with the system geometry. In this work, we use the osmotic swelling of cholesteric double emulsions to assemble colloidal particles through a pathway-dependent process. Partic… ▽ More

    Submitted 4 January, 2020; originally announced January 2020.

    Comments: 21 pages, 9 figures total, including 4 supplemental figures

    Journal ref: ACS Nano 14 (5), 5459-5467 (2020)

  29. arXiv:1912.06124  [pdf, ps, other

    cond-mat.mes-hall cond-mat.str-el quant-ph

    Excitons bound by photon exchange

    Authors: Erika Cortese, Linh Tran, Jean-Michel Manceau, Adel Bousseksou, Iacopo Carusotto, Giorgio Biasiol, Raffaele Colombelli, Simone De Liberato

    Abstract: In contrast to interband excitons in undoped quantum wells, doped quantum wells do not display sharp resonances due to excitonic bound states. In these systems the effective Coulomb interaction between electrons and holes typically only leads to a depolarization shift of the single-electron intersubband transitions. Non-perturbative light-matter interaction in solid-state devices has been investig… ▽ More

    Submitted 12 December, 2019; originally announced December 2019.

    Journal ref: Nature Physics 17, 31(2021)

  30. arXiv:1912.01487  [pdf, other

    cs.CR cs.LG

    Adversarial Embedding: A robust and elusive Steganography and Watermarking technique

    Authors: Salah Ghamizi, Maxime Cordy, Mike Papadakis, Yves Le Traon

    Abstract: We propose adversarial embedding, a new steganography and watermarking technique that embeds secret information within images. The key idea of our method is to use deep neural networks for image classification and adversarial attacks to embed secret information within images. Thus, we use the attacks to embed an encoding of the message within images and the related deep neural network outputs to e… ▽ More

    Submitted 14 November, 2019; originally announced December 2019.

  31. arXiv:1911.10279  [pdf, other

    math.CO math.PR

    Reaching a Consensus on Random Networks: The Power of Few

    Authors: Linh Tran, Van Vu

    Abstract: A community of $n$ individuals splits into two camps, Red and Blue. The individuals are connected by a social network, which influences their colors. Everyday, each person changes his/her color according to the majority among his/her neighbors. Red (Blue) wins if everyone in the community becomes Red (Blue) at some point. We study this process when the underlying network is the random Erdos-Reny… ▽ More

    Submitted 18 May, 2020; v1 submitted 22 November, 2019; originally announced November 2019.

    MSC Class: 05C80

  32. arXiv:1910.00045  [pdf, other

    cond-mat.mtrl-sci cond-mat.str-el

    Direct comparison of many-body methods for realistic electronic Hamiltonians

    Authors: Kiel T. Williams, Yuan Yao, Jia Li, Li Chen, Hao Shi, Mario Motta, Chunyao Niu, Ushnish Ray, Sheng Guo, Robert J. Anderson, Junhao Li, Lan Nguyen Tran, Chia-Nan Yeh, Bastien Mussard, Sandeep Sharma, Fabien Bruneval, Mark van Schilfgaarde, George H. Booth, Garnet Kin-Lic Chan, Shiwei Zhang, Emanuel Gull, Dominika Zgid, Andrew Millis, Cyrus J. Umrigar, Lucas K. Wagner

    Abstract: A large collaboration carefully benchmarks 20 first principles many-body electronic structure methods on a test set of 7 transition metal atoms, and their ions and monoxides. Good agreement is attained between the 3 systematically converged methods, resulting in experiment-free reference values. These reference values are used to assess the accuracy of modern emerging and scalable approaches to th… ▽ More

    Submitted 5 October, 2019; v1 submitted 30 September, 2019; originally announced October 2019.

    Comments: Simons collaboration on the many-electron problem

    Journal ref: Phys. Rev. X 10, 011041 (2020)

  33. arXiv:1909.08964  [pdf

    q-fin.ST cs.LG stat.ML

    To Detect Irregular Trade Behaviors In Stock Market By Using Graph Based Ranking Methods

    Authors: Loc Tran, Linh Tran

    Abstract: To detect the irregular trade behaviors in the stock market is the important problem in machine learning field. These irregular trade behaviors are obviously illegal. To detect these irregular trade behaviors in the stock market, data scientists normally employ the supervised learning techniques. In this paper, we employ the three graph Laplacian based semi-supervised ranking methods to solve the… ▽ More

    Submitted 3 September, 2019; originally announced September 2019.

    Comments: 11 pages

    MSC Class: 68T10

  34. arXiv:1909.03051  [pdf, other

    cs.CV

    On Learning Disentangled Representations for Gait Recognition

    Authors: Ziyuan Zhang, Luan Tran, Feng Liu, Xiaoming Liu

    Abstract: Gait, the walking pattern of individuals, is one of the important biometrics modalities. Most of the existing gait recognition methods take silhouettes or articulated body models as gait features. These methods suffer from degraded recognition performance when handling confounding variables, such as clothing, carrying and viewing angle. To remedy this issue, we propose a novel AutoEncoder framewor… ▽ More

    Submitted 5 September, 2019; originally announced September 2019.

    Comments: arXiv admin note: substantial text overlap with arXiv:1904.04925

  35. arXiv:1909.01132  [pdf

    cs.SI cs.LG stat.ML

    PageRank algorithm for Directed Hypergraph

    Authors: Loc Tran, Tho Quan, An Mai

    Abstract: During the last two decades, we easilly see that the World Wide Web's link structure is modeled as the directed graph. In this paper, we will model the World Wide Web's link structure as the directed hypergraph. Moreover, we will develop the PageRank algorithm for this directed hypergraph. Due to the lack of the World Wide Web directed hypergraph datasets, we will apply the PageRank algorithm to t… ▽ More

    Submitted 6 September, 2022; v1 submitted 29 August, 2019; originally announced September 2019.

    MSC Class: 68T10

  36. arXiv:1908.11708  [pdf

    stat.ML cs.LG

    Solve fraud detection problem by using graph based learning methods

    Authors: Loc Tran, Tuan Tran, Linh Tran, An Mai

    Abstract: The credit cards' fraud transactions detection is the important problem in machine learning field. To detect the credit cards's fraud transactions help reduce the significant loss of the credit cards' holders and the banks. To detect the credit cards' fraud transactions, data scientists normally employ the unsupervised learning techniques and supervised learning techniques. In this paper, we emplo… ▽ More

    Submitted 29 August, 2019; originally announced August 2019.

    Comments: 9 pages. arXiv admin note: substantial text overlap with arXiv:1811.02986

    MSC Class: 68T10

  37. arXiv:1908.11536  [pdf, other

    cs.CL

    Learning to Infer Entities, Properties and their Relations from Clinical Conversations

    Authors: Nan Du, Mingqiu Wang, Linh Tran, Gang Li, Izhak Shafran

    Abstract: Recently we proposed the Span Attribute Tagging (SAT) Model (Du et al., 2019) to infer clinical entities (e.g., symptoms) and their properties (e.g., duration). It tackles the challenge of large label space and limited training data using a hierarchical two-stage approach that identifies the span of interest in a tagging step and assigns labels to the span in a classification step. We extend the… ▽ More

    Submitted 30 August, 2019; originally announced August 2019.

    Journal ref: Proc. Empirical Methods in Natural Language Processing, 2019

  38. arXiv:1908.10541  [pdf, other

    cs.RO

    Search and Rescue under the Forest Canopy using Multiple UAVs

    Authors: Yulun Tian, Katherine Liu, Kyel Ok, Loc Tran, Danette Allen, Nicholas Roy, Jonathan P. How

    Abstract: We present a multi-robot system for GPS-denied search and rescue under the forest canopy. Forests are particularly challenging environments for collaborative exploration and mapping, in large part due to the existence of severe perceptual aliasing which hinders reliable loop closure detection for mutual localization and map fusion. Our proposed system features unmanned aerial vehicles (UAVs) that… ▽ More

    Submitted 7 June, 2020; v1 submitted 28 August, 2019; originally announced August 2019.

    Comments: IJRR revision

  39. iFixR: Bug Report driven Program Repair

    Authors: Anil Koyuncu, Kui Liu, Tegawendé F. Bissyandé, Dongsun Kim, Martin Monperrus, Jacques Klein, Yves Le Traon

    Abstract: Issue tracking systems are commonly used in modern software development for collecting feedback from users and developers. An ultimate automation target of software maintenance is then the systematization of patch generation for user-reported bugs. Although this ambition is aligned with the momentum of automated program repair, the literature has, so far, mostly focused on generate-and-validate se… ▽ More

    Submitted 12 July, 2019; originally announced July 2019.

    Comments: Accepted by FSE 2019

    Journal ref: Proceedings of the 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

  40. arXiv:1906.02594  [pdf, other

    cs.IR cs.LG

    Quaternion Collaborative Filtering for Recommendation

    Authors: Shuai Zhang, Lina Yao, Lucas Vinh Tran, Aston Zhang, Yi Tay

    Abstract: This paper proposes Quaternion Collaborative Filtering (QCF), a novel representation learning method for recommendation. Our proposed QCF relies on and exploits computation with Quaternion algebra, benefiting from the expressiveness and rich representation learning capability of Hamilton products. Quaternion representations, based on hypercomplex numbers, enable rich inter-latent dependencies betw… ▽ More

    Submitted 6 June, 2019; originally announced June 2019.

    Comments: Accepted at IJCAI 2019

  41. arXiv:1906.02239  [pdf, other

    cs.CL cs.LG

    Extracting Symptoms and their Status from Clinical Conversations

    Authors: Nan Du, Kai Chen, Anjuli Kannan, Linh Tran, Yuhui Chen, Izhak Shafran

    Abstract: This paper describes novel models tailored for a new application, that of extracting the symptoms mentioned in clinical conversations along with their status. Lack of any publicly available corpus in this privacy-sensitive domain led us to develop our own corpus, consisting of about 3K conversations annotated by professional medical scribes. We propose two novel deep learning approaches to infer t… ▽ More

    Submitted 5 June, 2019; originally announced June 2019.

    Journal ref: Proceedings of the Annual Meeting of the Association of Computational Linguistics, 2019

  42. arXiv:1905.08037  [pdf, ps, other

    cs.IT cs.LG stat.ML

    On Estimating Maximum Sum Rate of MIMO Systems with Successive Zero-Forcing Dirty Paper Coding and Per-antenna Power Constraint

    Authors: Thuy M. Pham, Ronan Farrell, Le-Nam Tran

    Abstract: In this paper, we study the sum rate maximization for successive zero-forcing dirty-paper coding (SZFDPC) with per-antenna power constraint (PAPC). Although SZFDPC is a low-complexity alternative to the optimal dirty paper coding (DPC), efficient algorithms to compute its sum rate are still open problems especially under practical PAPC. The existing solution to the considered problem is computatio… ▽ More

    Submitted 14 May, 2019; originally announced May 2019.

    Comments: 5 pages, 4 figures

  43. arXiv:1904.13195  [pdf, other

    cs.LG cs.SE stat.ML

    Test Selection for Deep Learning Systems

    Authors: Wei Ma, Mike Papadakis, Anestis Tsakmalis, Maxime Cordy, Yves Le Traon

    Abstract: Testing of deep learning models is challenging due to the excessive number and complexity of computations involved. As a result, test data selection is performed manually and in an ad hoc way. This raises the question of how we can automatically select candidate test data to test deep learning models. Recent research has focused on adapting test selection metrics from code-based software testing (… ▽ More

    Submitted 30 April, 2019; originally announced April 2019.

  44. arXiv:1904.08496  [pdf

    cs.CV cs.LG stat.ML

    Tensor Sparse PCA and Face Recognition: A Novel Approach

    Authors: Loc Hoang Tran, Linh Hoang Tran

    Abstract: Face recognition is the important field in machine learning and pattern recognition research area. It has a lot of applications in military, finance, public security, to name a few. In this paper, the combination of the tensor sparse PCA with the nearest-neighbor method (and with the kernel ridge regression method) will be proposed and applied to the face dataset. Experimental results show that th… ▽ More

    Submitted 11 August, 2020; v1 submitted 11 April, 2019; originally announced April 2019.

    Comments: It has some errors in the experimental section

    MSC Class: 68T10

  45. arXiv:1904.07466  [pdf, other

    cond-mat.mes-hall

    Tunable cloaking of Mexican-hat confined states in bilayer silicene

    Authors: Le Bin Ho, Lan Nguyen Tran

    Abstract: We present the ballistic quantum transport of a p-n-p bilayer silicene junction in the presence of spin-orbit coupling and electric field using a four-band model in combination with the transfer-matrix approach. A Mexican-hat shape of the low-energy spectrum is observed similarly to bilayer graphene under an interlayer bias. We show that while bilayer silicene shares some physics with bilayer grap… ▽ More

    Submitted 16 April, 2019; originally announced April 2019.

    Comments: 5 pages, 6 figures

  46. arXiv:1904.05489  [pdf, other

    cond-mat.str-el physics.chem-ph

    Tracking excited states in wave function optimization using density matrices and variational principles

    Authors: Lan Nguyen Tran, Jacqueline A. R. Shea, Eric Neuscamman

    Abstract: We present a method for finding individual excited states' energy stationary points in complete active space self-consistent field theory that is compatible with standard optimization methods and highly effective at overcoming difficulties due to root flipping and near-degeneracies. Inspired by both the maximum overlap method and recent progress in excited state variational principles, our approac… ▽ More

    Submitted 10 April, 2019; originally announced April 2019.

    Comments: 13 pages, submitted to JCTC

  47. arXiv:1904.04933  [pdf, other

    cs.CV

    Towards High-fidelity Nonlinear 3D Face Morphable Model

    Authors: Luan Tran, Feng Liu, Xiaoming Liu

    Abstract: Embedding 3D morphable basis functions into deep neural networks opens great potential for models with better representation power. However, to faithfully learn those models from an image collection, it requires strong regularization to overcome ambiguities involved in the learning process. This critically prevents us from learning high fidelity face models which are needed to represent face image… ▽ More

    Submitted 9 April, 2019; originally announced April 2019.

    Comments: CVPR 2019. Project webpage: http://cvlab.cse.msu.edu/project-nonlinear-3dmm.html

  48. arXiv:1904.04925  [pdf, other

    cs.CV

    Gait Recognition via Disentangled Representation Learning

    Authors: Ziyuan Zhang, Luan Tran, Xi Yin, Yousef Atoum, Xiaoming Liu, Jian Wan, Nanxin Wang

    Abstract: Gait, the walking pattern of individuals, is one of the most important biometrics modalities. Most of the existing gait recognition methods take silhouettes or articulated body models as the gait features. These methods suffer from degraded recognition performance when handling confounding variables, such as clothing, carrying and view angle. To remedy this issue, we propose a novel AutoEncoder fr… ▽ More

    Submitted 9 April, 2019; originally announced April 2019.

    Comments: To appear at CVPR 2019 as an oral presentation

  49. arXiv:1904.04612  [pdf, other

    cs.LG cs.CV

    Automated Search for Configurations of Deep Neural Network Architectures

    Authors: Salah Ghamizi, Maxime Cordy, Mike Papadakis, Yves Le Traon

    Abstract: Deep Neural Networks (DNNs) are intensively used to solve a wide variety of complex problems. Although powerful, such systems require manual configuration and tuning. To this end, we view DNNs as configurable systems and propose an end-to-end framework that allows the configuration, evaluation and automated search for DNN architectures. Therefore, our contribution is threefold. First, we model the… ▽ More

    Submitted 9 April, 2019; originally announced April 2019.

  50. arXiv:1902.06161  [pdf, other

    physics.ins-det hep-ex

    Characterisation of different stages of hadronic showers using the CALICE Si-W ECAL physics prototype

    Authors: CALICE Collaboration, G. Eigen, T. Price, N. K. Watson, A. Winter, Y. Do, A. Khan, D. Kim, G. C. Blazey, A. Dyshkant, K. Francis, V. Zutshi, K. Kawagoe, Y. Miura, R. Mori, I. Sekiya, T. Suehara, T. Yoshioka, J. Apostolakis, J. Giraud, D. Grondin, J. -Y. Hostachy, O. Bach, V. Bocharnikov, E. Brianne , et al. (81 additional authors not shown)

    Abstract: A detailed investigation of hadronic interactions is performed using $π^-$-mesons with energies in the range 2--10 GeV incident on a high granularity silicon-tungsten electromagnetic calorimeter. The data were recorded at FNAL in 2008. The region in which the $π^-$-mesons interact with the detector material and the produced secondary particles are characterised using a novel track-finding algorith… ▽ More

    Submitted 18 September, 2019; v1 submitted 16 February, 2019; originally announced February 2019.

    Comments: 21 pages, 21 figures

    Report number: CALICE-PUB-2019-002

    Journal ref: Nucl.Instrum.Meth. A937 (2019) 41-52