Skip to main content

Showing 1–27 of 27 results for author: Cho, B

  1. arXiv:2407.04833  [pdf, other

    cs.CV cs.AI

    3D Adaptive Structural Convolution Network for Domain-Invariant Point Cloud Recognition

    Authors: Younggun Kim, Beomsik Cho, Seonghoon Ryoo, Soomok Lee

    Abstract: Adapting deep learning networks for point cloud data recognition in self-driving vehicles faces challenges due to the variability in datasets and sensor technologies, emphasizing the need for adaptive techniques to maintain accuracy across different conditions. In this paper, we introduce the 3D Adaptive Structural Convolution Network (3D-ASCN), a cutting-edge framework for 3D point cloud recognit… ▽ More

    Submitted 5 July, 2024; originally announced July 2024.

    Comments: 11 pages, 3 figures

    ACM Class: I.2.10; I.5.1

  2. arXiv:2404.04241  [pdf, other

    cs.RO

    Modeling Kinematic Uncertainty of Tendon-Driven Continuum Robots via Mixture Density Networks

    Authors: Jordan Thompson, Brian Y. Cho, Daniel S. Brown, Alan Kuntz

    Abstract: Tendon-driven continuum robot kinematic models are frequently computationally expensive, inaccurate due to unmodeled effects, or both. In particular, unmodeled effects produce uncertainties that arise during the robot's operation that lead to variability in the resulting geometry. We propose a novel solution to these issues through the development of a Gaussian mixture kinematic model. We train a… ▽ More

    Submitted 5 April, 2024; originally announced April 2024.

  3. arXiv:2404.03816  [pdf, other

    cs.RO

    Accounting for Hysteresis in the Forward Kinematics of Nonlinearly-Routed Tendon-Driven Continuum Robots via a Learned Deep Decoder Network

    Authors: Brian Y. Cho, Daniel S. Esser, Jordan Thompson, Bao Thach, Robert J. Webster III, Alan Kuntz

    Abstract: Tendon-driven continuum robots have been gaining popularity in medical applications due to their ability to curve around complex anatomical structures, potentially reducing the invasiveness of surgery. However, accurate modeling is required to plan and control the movements of these flexible robots. Physics-based models have limitations due to unmodeled effects, leading to mismatches between model… ▽ More

    Submitted 4 April, 2024; originally announced April 2024.

    Comments: 8 pages, 9 figures, Submitted to IEEE Robotics and Automation Letters

  4. arXiv:2404.01808  [pdf, other

    cs.CR

    Software-Defined Cryptography: A Design Feature of Cryptographic Agility

    Authors: Jihoon Cho, Changhoon Lee, Eunkyung Kim, Jieun Lee, Beumjin Cho

    Abstract: Cryptographic agility, or crypto-agility, is a design feature that enables agile updates to new cryptographic algorithms and standards without the need to modify or replace the surrounding infrastructure. This paper examines the prerequisites for crypto-agility and proposes its desired design feature. More specifically, we investigate the design characteristics of widely deployed cybersecurity par… ▽ More

    Submitted 2 April, 2024; originally announced April 2024.

  5. arXiv:2403.13866  [pdf, other

    cs.LG cs.AI

    The Bid Picture: Auction-Inspired Multi-player Generative Adversarial Networks Training

    Authors: Joo Yong Shim, Jean Seong Bjorn Choe, Jong-Kook Kim

    Abstract: This article proposes auction-inspired multi-player generative adversarial networks training, which mitigates the mode collapse problem of GANs. Mode collapse occurs when an over-fitted generator generates a limited range of samples, often concentrating on a small subset of the data distribution. Despite the restricted diversity of generated samples, the discriminator can still be deceived into di… ▽ More

    Submitted 20 March, 2024; originally announced March 2024.

  6. arXiv:2402.06122  [pdf, other

    stat.ME cs.LG stat.ML

    Peeking with PEAK: Sequential, Nonparametric Composite Hypothesis Tests for Means of Multiple Data Streams

    Authors: Brian Cho, Kyra Gan, Nathan Kallus

    Abstract: We propose a novel nonparametric sequential test for composite hypotheses for means of multiple data streams. Our proposed method, \emph{peeking with expectation-based averaged capital} (PEAK), builds upon the testing-by-betting framework and provides a non-asymptotic $α$-level test across any stopping time. Our contributions are two-fold: (1) we propose a novel betting scheme and provide theoreti… ▽ More

    Submitted 2 June, 2024; v1 submitted 8 February, 2024; originally announced February 2024.

    Comments: To appear at the Forty-first International Conference on Machine Learning (ICML 2024)

  7. arXiv:2309.15881  [pdf, other

    cs.LG cs.AI

    Enhancing Cross-Category Learning in Recommendation Systems with Multi-Layer Embedding Training

    Authors: Zihao Deng, Benjamin Ghaemmaghami, Ashish Kumar Singh, Benjamin Cho, Leo Orshansky, Mattan Erez, Michael Orshansky

    Abstract: Modern DNN-based recommendation systems rely on training-derived embeddings of sparse features. Input sparsity makes obtaining high-quality embeddings for rarely-occurring categories harder as their representations are updated infrequently. We demonstrate a training-time technique to produce superior embeddings via effective cross-category learning and theoretically explain its surprising effectiv… ▽ More

    Submitted 27 September, 2023; originally announced September 2023.

    Comments: This is the preprint of our paper accepted at ACML 2023

  8. arXiv:2309.10154  [pdf, other

    cs.RO

    Efficient and Accurate Mapping of Subsurface Anatomy via Online Trajectory Optimization for Robot Assisted Surgery

    Authors: Brian Y. Cho, Alan Kuntz

    Abstract: Robotic surgical subtask automation has the potential to reduce the per-patient workload of human surgeons. There are a variety of surgical subtasks that require geometric information of subsurface anatomy, such as the location of tumors, which necessitates accurate and efficient surgical sensing. In this work, we propose an automated sensing method that maps 3D subsurface anatomy to provide such… ▽ More

    Submitted 18 September, 2023; originally announced September 2023.

    Comments: 7 pages, 6 figures, submitted to 2024 IEEE International Conference on Robotics and Automation (ICRA 2024)

  9. arXiv:2309.02740  [pdf, other

    cs.CL cs.AI

    Rubric-Specific Approach to Automated Essay Scoring with Augmentation Training

    Authors: Brian Cho, Youngbin Jang, Jaewoong Yoon

    Abstract: Neural based approaches to automatic evaluation of subjective responses have shown superior performance and efficiency compared to traditional rule-based and feature engineering oriented solutions. However, it remains unclear whether the suggested neural solutions are sufficient replacements of human raters as we find recent works do not properly account for rubric items that are essential for aut… ▽ More

    Submitted 6 September, 2023; originally announced September 2023.

    Comments: 13 pages

    ACM Class: I.2.7

  10. Towards Understanding of Deepfake Videos in the Wild

    Authors: Beomsang Cho, Binh M. Le, Jiwon Kim, Simon Woo, Shahroz Tariq, Alsharif Abuadbba, Kristen Moore

    Abstract: Deepfakes have become a growing concern in recent years, prompting researchers to develop benchmark datasets and detection algorithms to tackle the issue. However, existing datasets suffer from significant drawbacks that hamper their effectiveness. Notably, these datasets fail to encompass the latest deepfake videos produced by state-of-the-art methods that are being shared across various platform… ▽ More

    Submitted 6 September, 2023; v1 submitted 4 September, 2023; originally announced September 2023.

    Journal ref: 32nd ACM International Conference on Information & Knowledge Management (CIKM), UK, 2023

  11. arXiv:2305.04449  [pdf, other

    cs.RO cs.AI cs.LG

    DeformerNet: Learning Bimanual Manipulation of 3D Deformable Objects

    Authors: Bao Thach, Brian Y. Cho, Shing-Hei Ho, Tucker Hermans, Alan Kuntz

    Abstract: Applications in fields ranging from home care to warehouse fulfillment to surgical assistance require robots to reliably manipulate the shape of 3D deformable objects. Analytic models of elastic, 3D deformable objects require numerous parameters to describe the potentially infinite degrees of freedom present in determining the object's shape. Previous attempts at performing 3D shape control rely o… ▽ More

    Submitted 19 February, 2024; v1 submitted 8 May, 2023; originally announced May 2023.

    Comments: Submitted to IEEE Transactions on Robotics (T-RO). 20 pages, 27 figures. arXiv admin note: text overlap with arXiv:2110.04685

  12. arXiv:2302.01738  [pdf, other

    eess.IV cs.LG

    AIROGS: Artificial Intelligence for RObust Glaucoma Screening Challenge

    Authors: Coen de Vente, Koenraad A. Vermeer, Nicolas Jaccard, He Wang, Hongyi Sun, Firas Khader, Daniel Truhn, Temirgali Aimyshev, Yerkebulan Zhanibekuly, Tien-Dung Le, Adrian Galdran, Miguel Ángel González Ballester, Gustavo Carneiro, Devika R G, Hrishikesh P S, Densen Puthussery, Hong Liu, Zekang Yang, Satoshi Kondo, Satoshi Kasai, Edward Wang, Ashritha Durvasula, Jónathan Heras, Miguel Ángel Zapata, Teresa Araújo , et al. (11 additional authors not shown)

    Abstract: The early detection of glaucoma is essential in preventing visual impairment. Artificial intelligence (AI) can be used to analyze color fundus photographs (CFPs) in a cost-effective manner, making glaucoma screening more accessible. While AI models for glaucoma screening from CFPs have shown promising results in laboratory settings, their performance decreases significantly in real-world scenarios… ▽ More

    Submitted 10 February, 2023; v1 submitted 3 February, 2023; originally announced February 2023.

    Comments: 19 pages, 8 figures, 3 tables

  13. arXiv:2209.01353  [pdf, ps, other

    cs.MA

    A repeated unknown game: Decentralized task offloading in vehicular fog computing

    Authors: Byungjin Cho, Yu Xiao

    Abstract: Offloading computation to nearby edge/fog computing nodes, including the ones carried by moving vehicles, e.g., vehicular fog nodes (VFN), has proved to be a promising approach for enabling low-latency and compute-intensive mobility applications, such as cooperative and autonomous driving. This work considers vehicular fog computing scenarios where the clients of computation offloading services tr… ▽ More

    Submitted 20 May, 2023; v1 submitted 3 September, 2022; originally announced September 2022.

    Comments: Accepted to appear in IEEE TVT

  14. arXiv:2110.06195  [pdf, other

    cs.RO

    Planning Sensing Sequences for Subsurface 3D Tumor Mapping

    Authors: Brian Y. Cho, Tucker Hermans, Alan Kuntz

    Abstract: Surgical automation has the potential to enable increased precision and reduce the per-patient workload of overburdened human surgeons. An effective automation system must be able to sense and map subsurface anatomy, such as tumors, efficiently and accurately. In this work, we present a method that plans a sequence of sensing actions to map the 3D geometry of subsurface tumors. We leverage a seque… ▽ More

    Submitted 12 October, 2021; originally announced October 2021.

    Comments: 7 pages, 9 figures, to be published in the proceedings of the 2021 International Symposium on Medical Robotics (ISMR)

  15. arXiv:2110.04685  [pdf, other

    cs.RO cs.AI

    Learning Visual Shape Control of Novel 3D Deformable Objects from Partial-View Point Clouds

    Authors: Bao Thach, Brian Y. Cho, Alan Kuntz, Tucker Hermans

    Abstract: If robots could reliably manipulate the shape of 3D deformable objects, they could find applications in fields ranging from home care to warehouse fulfillment to surgical assistance. Analytic models of elastic, 3D deformable objects require numerous parameters to describe the potentially infinite degrees of freedom present in determining the object's shape. Previous attempts at performing 3D shape… ▽ More

    Submitted 18 April, 2022; v1 submitted 9 October, 2021; originally announced October 2021.

    Comments: Published in the proceedings of the IEEE Conference on Robotics and Automation (ICRA) 2022. 8 pages, 10 figures

  16. arXiv:2104.12827  [pdf, ps, other

    cs.LG cs.IT

    Learning-based decentralized offloading decision making in an adversarial environment

    Authors: Byungjin Cho, Yu Xiao

    Abstract: Vehicular fog computing (VFC) pushes the cloud computing capability to the distributed fog nodes at the edge of the Internet, enabling compute-intensive and latency-sensitive computing services for vehicles through task offloading. However, a heterogeneous mobility environment introduces uncertainties in terms of resource supply and demand, which are inevitable bottlenecks for the optimal offloadi… ▽ More

    Submitted 6 September, 2021; v1 submitted 26 April, 2021; originally announced April 2021.

    Comments: Accepted to appear in IEEE TVT

  17. arXiv:2012.00158  [pdf, other

    cs.AR

    Accelerating Bandwidth-Bound Deep Learning Inference with Main-Memory Accelerators

    Authors: Benjamin Y. Cho, Jeageun Jung, Mattan Erez

    Abstract: DL inference queries play an important role in diverse internet services and a large fraction of datacenter cycles are spent on processing DL inference queries. Specifically, the matrix-matrix multiplication (GEMM) operations of fully-connected MLP layers dominate many inference tasks. We find that the GEMM operations for datacenter DL inference tasks are memory bandwidth bound, contrary to common… ▽ More

    Submitted 30 November, 2020; originally announced December 2020.

  18. arXiv:2006.05623  [pdf, other

    cs.LG stat.ML

    Training with Multi-Layer Embeddings for Model Reduction

    Authors: Benjamin Ghaemmaghami, Zihao Deng, Benjamin Cho, Leo Orshansky, Ashish Kumar Singh, Mattan Erez, Michael Orshansky

    Abstract: Modern recommendation systems rely on real-valued embeddings of categorical features. Increasing the dimension of embedding vectors improves model accuracy but comes at a high cost to model size. We introduce a multi-layer embedding training (MLET) architecture that trains embeddings via a sequence of linear layers to derive superior embedding accuracy vs. model size trade-off. Our approach is f… ▽ More

    Submitted 9 June, 2020; originally announced June 2020.

    Comments: 10 pages, 3 figures

  19. arXiv:2003.11420  [pdf, other

    cs.RO cs.DM

    Fast and resilient manipulation planning for target retrieval in clutter

    Authors: Changjoo Nam, Jinhwi Lee, Sang Hun Cheong, Brian Y. Cho, ChangHwan Kim

    Abstract: This paper presents a task and motion planning (TAMP) framework for a robotic manipulator in order to retrieve a target object from clutter. We consider a configuration of objects in a confined space with a high density so no collision-free path to the target exists. The robot must relocate some objects to retrieve the target without collisions. For fast completion of object rearrangement, the rob… ▽ More

    Submitted 24 March, 2020; originally announced March 2020.

    Comments: 2020 IEEE International Conference on Robotics and Automation (ICRA). arXiv admin note: text overlap with arXiv:1907.03956

  20. arXiv:2003.10863  [pdf, other

    cs.RO

    Where to relocate?: Object rearrangement inside cluttered and confined environments for robotic manipulation

    Authors: Sang Hun Cheong, Brian Y. Cho, Jinhwi Lee, ChangHwan Kim, Changjoo Nam

    Abstract: We present an algorithm determining where to relocate objects inside a cluttered and confined space while rearranging objects to retrieve a target object. Although methods that decide what to remove have been proposed, planning for the placement of removed objects inside a workspace has not received much attention. Rather, removed objects are often placed outside the workspace, which incurs additi… ▽ More

    Submitted 24 March, 2020; originally announced March 2020.

    Comments: 2020 IEEE International Conference on Robotics and Automation (ICRA)

  21. arXiv:2001.06933  [pdf, other

    cs.DB cs.CR

    Fides: Managing Data on Untrusted Infrastructure

    Authors: Sujaya Maiyya, Danny Hyun Bum Cho, Divyakant Agrawal, Amr El Abbadi

    Abstract: Significant amounts of data are currently being stored and managed on third-party servers. It is impractical for many small scale enterprises to own their private datacenters, hence renting third-party servers is a viable solution for such businesses. But the increasing number of malicious attacks, both internal and external, as well as buggy software on third-party servers is causing clients to l… ▽ More

    Submitted 19 January, 2020; originally announced January 2020.

    Comments: 14pages, 15 figures/graphs

  22. arXiv:1912.12953  [pdf, other

    cs.DC cs.AR

    RecNMP: Accelerating Personalized Recommendation with Near-Memory Processing

    Authors: Liu Ke, Udit Gupta, Carole-Jean Wu, Benjamin Youngjae Cho, Mark Hempstead, Brandon Reagen, Xuan Zhang, David Brooks, Vikas Chandra, Utku Diril, Amin Firoozshahian, Kim Hazelwood, Bill Jia, Hsien-Hsin S. Lee, Meng Li, Bert Maher, Dheevatsa Mudigere, Maxim Naumov, Martin Schatz, Mikhail Smelyanskiy, Xiaodong Wang

    Abstract: Personalized recommendation systems leverage deep learning models and account for the majority of data center AI cycles. Their performance is dominated by memory-bound sparse embedding operations with unique irregular memory access patterns that pose a fundamental challenge to accelerate. This paper proposes a lightweight, commodity DRAM compliant, near-memory processing solution to accelerate per… ▽ More

    Submitted 30 December, 2019; originally announced December 2019.

  23. arXiv:1908.06362  [pdf, other

    cs.AR

    Near Data Acceleration with Concurrent Host Access

    Authors: Benjamin Y. Cho, Yongkee Kwon, Sangkug Lym, Mattan Erez

    Abstract: Near-data accelerators (NDAs) that are integrated with main memory have the potential for significant power and performance benefits. Fully realizing these benefits requires the large available memory capacity to be shared between the host and the NDAs in a way that permits both regular memory access by some applications and accelerating others with an NDA, avoids copying data, enables collaborati… ▽ More

    Submitted 30 November, 2020; v1 submitted 17 August, 2019; originally announced August 2019.

  24. arXiv:1803.00694  [pdf

    physics.med-ph cs.CV eess.IV

    Deep-neural-network based sinogram synthesis for sparse-view CT image reconstruction

    Authors: Hoyeon Lee, Jongha Lee, Hyeongseok Kim, Byungchul Cho, Seungryong Cho

    Abstract: Recently, a number of approaches to low-dose computed tomography (CT) have been developed and deployed in commercialized CT scanners. Tube current reduction is perhaps the most actively explored technology with advanced image reconstruction algorithms. Sparse data sampling is another viable option to the low-dose CT, and sparse-view CT has been particularly of interest among the researchers in CT… ▽ More

    Submitted 5 March, 2018; v1 submitted 1 March, 2018; originally announced March 2018.

  25. arXiv:1611.02001  [pdf, other

    cs.NI

    Co-primary Spectrum Sharing for Inter-operator Device-to-Device Communication

    Authors: Byungjin Cho, Konstantinos Koufos, Riku Jäntti, Seong-Lyun Kim

    Abstract: The business potential of device-to-device (D2D) communication including public safety and vehicular communications will be realized only if direct communication between devices subscribed to different mobile operators (OPs) is supported. One possible way to implement inter-operator D2D communication may use the licensed spectrum of the OPs, i.e., OPs agree to share spectrum in a co-primary manner… ▽ More

    Submitted 7 November, 2016; originally announced November 2016.

    Comments: Accepted to appear in IEEE Journal on Selected Areas in Communications (JSAC)

  26. Modeling the Interference Generated from Car Base Stations towards Indoor Femto-cells

    Authors: Byungjin Cho, Konstantinos Koufos, Kalle Ruttik, Riku Jäntti

    Abstract: In future wireless networks, a significant number of users will be vehicular. One promising solution to improve the capacity for these vehicular users is to employ moving relays or car base stations. The system forms cell inside the vehicle and then uses rooftop antenna for back-hauling to overcome the vehicular penetration loss. In this paper, we develop a model for aggregate interference distrib… ▽ More

    Submitted 26 May, 2015; originally announced May 2015.

    Comments: 6 pages, 4 figures, 3rd IFAC Symposium on Telematics Applications

    Journal ref: Proc. of the 3rd IFAC Symposium on Telematics Applications, pp. 96-101, Nov, 2013

  27. Spectrum Allocation for Multi-Operator Device-to-Device Communication

    Authors: Byungjin Cho, Konstantinos Koufos, Riku Jäntti, Zexian Li, Mikko A. Uusitalo

    Abstract: In order to harvest the business potential of device-to-device (D2D) communication, direct communication between devices subscribed to different mobile operators should be supported. This would also support meeting requirements resulting from D2D relevant scenarios, like vehicle-to-vehicle communication. In this paper, we propose to allocate the multi-operator D2D communication over dedicated cell… ▽ More

    Submitted 14 February, 2015; originally announced February 2015.

    Comments: To appear in IEEE ICC 2015