Skip to main content

Showing 1–50 of 50 results for author: Chong, S

  1. arXiv:2406.03713  [pdf

    cs.RO

    Gait-Adaptive Navigation and Human Searching in field with Cyborg Insect

    Authors: Phuoc Thanh Tran-Ngoc, Huu Duoc Nguyen, Duc Long Le, Rui Li, Bing Sheng Chong, Hirotaka Sato

    Abstract: This study focuses on improving the ability of cyborg insects to navigate autonomously during search and rescue missions in outdoor environments. We propose an algorithm that leverages data from an IMU to calculate orientation and position based on the insect's walking gait. These computed factors serve as essential feedback channels across 3 phases of our exploration. Our method functions without… ▽ More

    Submitted 5 June, 2024; originally announced June 2024.

    Comments: 35 pages, 9 figures

  2. arXiv:2405.19806  [pdf, other

    cs.LG

    Preference Alignment with Flow Matching

    Authors: Minu Kim, Yongsik Lee, Sehyeok Kang, Jihwan Oh, Song Chong, Seyoung Yun

    Abstract: We present Preference Flow Matching (PFM), a new framework for preference-based reinforcement learning (PbRL) that streamlines the integration of preferences into an arbitrary class of pre-trained models. Existing PbRL methods require fine-tuning pre-trained models, which presents challenges such as scalability, inefficiency, and the need for model modifications, especially with black-box APIs lik… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

  3. arXiv:2404.00103  [pdf, other

    cs.LG cs.CV

    PikeLPN: Mitigating Overlooked Inefficiencies of Low-Precision Neural Networks

    Authors: Marina Neseem, Conor McCullough, Randy Hsin, Chas Leichner, Shan Li, In Suk Chong, Andrew G. Howard, Lukasz Lew, Sherief Reda, Ville-Mikko Rautio, Daniele Moro

    Abstract: Low-precision quantization is recognized for its efficacy in neural network optimization. Our analysis reveals that non-quantized elementwise operations which are prevalent in layers such as parameterized activation functions, batch normalization, and quantization scaling dominate the inference cost of low-precision models. These non-quantized elementwise operations are commonly overlooked in SOTA… ▽ More

    Submitted 29 March, 2024; originally announced April 2024.

    Comments: Accepted in CVPR 2024. 10 Figures, 9 Tables

  4. arXiv:2403.05829  [pdf, ps, other

    eess.SY cs.CR cs.ET cs.LO

    Measuring Robustness in Cyber-Physical Systems under Sensor Attacks

    Authors: Jian Xiang, Ruggero Lanotte, Simone Tini, Stephen Chong, Massimo Merro

    Abstract: This paper contributes a formal framework for quantitative analysis of bounded sensor attacks on cyber-physical systems, using the formalism of differential dynamic logic. Given a precondition and postcondition of a system, we formalize two quantitative safety notions, quantitative forward and backward safety, which respectively express (1) how strong the strongest postcondition of the system is w… ▽ More

    Submitted 9 March, 2024; originally announced March 2024.

    Comments: Preprint submitted to Elsevier

  5. arXiv:2403.02251  [pdf, other

    stat.ML cs.LG

    A prediction rigidity formalism for low-cost uncertainties in trained neural networks

    Authors: Filippo Bigi, Sanggyu Chong, Michele Ceriotti, Federico Grasselli

    Abstract: Regression methods are fundamental for scientific and technological applications. However, fitted models can be highly unreliable outside of their training domain, and hence the quantification of their uncertainty is crucial in many of their applications. Based on the solution of a constrained optimization problem, we propose "prediction rigidities" as a method to obtain uncertainties of arbitrary… ▽ More

    Submitted 4 March, 2024; originally announced March 2024.

  6. arXiv:2402.18153  [pdf, other

    cs.LG cs.AI

    Diffusion-based Neural Network Weights Generation

    Authors: Bedionita Soro, Bruno Andreis, Hayeon Lee, Song Chong, Frank Hutter, Sung Ju Hwang

    Abstract: Transfer learning is a topic of significant interest in recent deep learning research because it enables faster convergence and improved performance on new tasks. While the performance of transfer learning depends on the similarity of the source data to the target data, it is costly to train a model on a large number of datasets. Therefore, pretrained models are generally blindly selected with the… ▽ More

    Submitted 28 February, 2024; originally announced February 2024.

    Comments: 14 pages

  7. arXiv:2401.06152  [pdf

    cs.CE cond-mat.mtrl-sci

    Graph-Network-Based Predictive Modeling for Highly Cross-Linked Polymer Systems

    Authors: Wonseok Lee, Sanggyu Chong, Jihan Kim

    Abstract: In this study, a versatile methodology for initiating polymerization from monomers in highly cross-linked materials is investigated. As polymerization progresses, force-field parameters undergo continuous modification due to the formation of new chemical bonds. This dynamic process not only impacts the atoms directly involved in bonding, but also influences the neighboring atomic environment. Moni… ▽ More

    Submitted 21 December, 2023; originally announced January 2024.

  8. arXiv:2311.10502  [pdf, other

    cs.NE

    Fast Estimations of Hitting Time of Elitist Evolutionary Algorithms from Fitness Levels

    Authors: Jun He, Siang Yew Chong, Xin Yao

    Abstract: The fitness level method is an easy-to-use tool for estimating the hitting time of elitist evolutionary algorithms. Recently, linear lower and upper bounds by fitness levels have been constructed. But these bounds require recursive computation, which makes them difficult to use in practice. We address this shortcoming with a new directed graph (digraph) method that does not require recursive compu… ▽ More

    Submitted 16 May, 2024; v1 submitted 17 November, 2023; originally announced November 2023.

  9. arXiv:2309.14396  [pdf, other

    cs.SE cs.LG cs.PL

    Guess & Sketch: Language Model Guided Transpilation

    Authors: Celine Lee, Abdulrahman Mahmoud, Michal Kurek, Simone Campanoni, David Brooks, Stephen Chong, Gu-Yeon Wei, Alexander M. Rush

    Abstract: Maintaining legacy software requires many software and systems engineering hours. Assembly code programs, which demand low-level control over the computer machine state and have no variable names, are particularly difficult for humans to analyze. Existing conventional program translators guarantee correctness, but are hand-engineered for the source and target programming languages in question. Lea… ▽ More

    Submitted 15 March, 2024; v1 submitted 25 September, 2023; originally announced September 2023.

  10. arXiv:2309.00544  [pdf

    cs.RO

    Modular, Multi-Robot Integration of Laboratories: An Autonomous Solid-State Workflow for Powder X-Ray Diffraction

    Authors: Amy. M. Lunt, Hatem Fakhruldeen, Gabriella Pizzuto, Louis Longley, Alexander White, Nicola Rankin, Rob Clowes, Ben Alston, Lucia Gigli, Graeme M. Day, Andrew I. Cooper, Sam. Y. Chong

    Abstract: Automation can transform productivity in research activities that use liquid handling, such as organic synthesis, but it has made less impact in materials laboratories, which require sample preparation steps and a range of solid-state characterization techniques. For example, powder X-ray diffraction (PXRD) is a key method in materials and pharmaceutical chemistry, but its end-to-end automation is… ▽ More

    Submitted 23 November, 2023; v1 submitted 1 September, 2023; originally announced September 2023.

  11. arXiv:2307.00858  [pdf, ps, other

    q-bio.NC cs.LG eess.IV

    Beyond the Snapshot: Brain Tokenized Graph Transformer for Longitudinal Brain Functional Connectome Embedding

    Authors: Zijian Dong, Yilei Wu, Yu Xiao, Joanna Su Xian Chong, Yueming Jin, Juan Helen Zhou

    Abstract: Under the framework of network-based neurodegeneration, brain functional connectome (FC)-based Graph Neural Networks (GNN) have emerged as a valuable tool for the diagnosis and prognosis of neurodegenerative diseases such as Alzheimer's disease (AD). However, these models are tailored for brain FC at a single time point instead of characterizing FC trajectory. Discerning how FC evolves with diseas… ▽ More

    Submitted 12 July, 2023; v1 submitted 3 July, 2023; originally announced July 2023.

    Comments: MICCAI 2023

  12. arXiv:2301.03829  [pdf, other

    cs.LG cs.AI cs.CV cs.DB cs.MM

    From Plate to Prevention: A Dietary Nutrient-aided Platform for Health Promotion in Singapore

    Authors: Kaiping Zheng, Thao Nguyen, Jesslyn Hwei Sing Chong, Charlene Enhui Goh, Melanie Herschel, Hee Hoon Lee, Changshuo Liu, Beng Chin Ooi, Wei Wang, James Yip

    Abstract: Singapore has been striving to improve the provision of healthcare services to her people. In this course, the government has taken note of the deficiency in regulating and supervising people's nutrient intake, which is identified as a contributing factor to the development of chronic diseases. Consequently, this issue has garnered significant attention. In this paper, we share our experience in a… ▽ More

    Submitted 28 March, 2023; v1 submitted 10 January, 2023; originally announced January 2023.

  13. arXiv:2211.08474  [pdf, other

    eess.SY cs.CR math.OC

    Resilient Set-based State Estimation for Linear Time-Invariant Systems Using Zonotopes

    Authors: Muhammad Umar B. Niazi, Amr Alanwar, Michelle S. Chong, Karl Henrik Johansson

    Abstract: This paper considers the problem of set-based state estimation for linear time-invariant (LTI) systems under time-varying sensor attacks. Provided that the LTI system is stable and observable via every single sensor and that at least one sensor is uncompromised, we guarantee that the true state is always contained in the estimated set. We use zonotopes to represent these sets for computational eff… ▽ More

    Submitted 15 November, 2022; originally announced November 2022.

  14. arXiv:2208.01643  [pdf, other

    eess.IV cs.AI cs.CV

    CTooth+: A Large-scale Dental Cone Beam Computed Tomography Dataset and Benchmark for Tooth Volume Segmentation

    Authors: Weiwei Cui, Yaqi Wang, Yilong Li, Dan Song, Xingyong Zuo, Jiaojiao Wang, Yifan Zhang, Huiyu Zhou, Bung san Chong, Liaoyuan Zeng, Qianni Zhang

    Abstract: Accurate tooth volume segmentation is a prerequisite for computer-aided dental analysis. Deep learning-based tooth segmentation methods have achieved satisfying performances but require a large quantity of tooth data with ground truth. The dental data publicly available is limited meaning the existing methods can not be reproduced, evaluated and applied in clinical practice. In this paper, we esta… ▽ More

    Submitted 2 August, 2022; originally announced August 2022.

  15. arXiv:2207.02007  [pdf, other

    cs.LG cs.AI

    The StarCraft Multi-Agent Challenges+ : Learning of Multi-Stage Tasks and Environmental Factors without Precise Reward Functions

    Authors: Mingyu Kim, Jihwan Oh, Yongsik Lee, Joonkee Kim, Seonghwan Kim, Song Chong, Se-Young Yun

    Abstract: In this paper, we propose a novel benchmark called the StarCraft Multi-Agent Challenges+, where agents learn to perform multi-stage tasks and to use environmental factors without precise reward functions. The previous challenges (SMAC) recognized as a standard benchmark of Multi-Agent Reinforcement Learning are mainly concerned with ensuring that all agents cooperatively eliminate approaching adve… ▽ More

    Submitted 7 July, 2022; v1 submitted 5 July, 2022; originally announced July 2022.

    Comments: ICML Workshop: AI for Agent Based Modeling 2022 Spotlight

  16. Approximating Permutations with Neural Network Components for Travelling Photographer Problem

    Authors: Sue Sin Chong

    Abstract: Most of the current inference techniques rely upon Bayesian inference on Probabilistic Graphical Models of observations and do predictions and classification on observations. However, there is very little literature on the mining of relationships between observations and building models of the relationship between sets of observations or the generating context of the observations. Moreover, event… ▽ More

    Submitted 23 May, 2022; v1 submitted 30 April, 2022; originally announced May 2022.

    Comments: 11 pages

    Journal ref: Published in 2022 Asia Conference on Algorithms, Computing and Machine Learning (CACML 2022)

  17. Loss Function Entropy Regularization for Diverse Decision Boundaries

    Authors: Sue Sin Chong

    Abstract: Is it possible to train several classifiers to perform meaningful crowd-sourcing to produce a better prediction label set without ground-truth annotation? This paper will modify the contrastive learning objectives to automatically train a self-complementing ensemble to produce a state-of-the-art prediction on the CIFAR10 and CIFAR100-20 tasks. This paper will present a straightforward method to mo… ▽ More

    Submitted 23 May, 2022; v1 submitted 30 April, 2022; originally announced May 2022.

    Comments: 7 pages

    Journal ref: 2022 7th International Conference on Big Data Analytics (ICBDA)

  18. arXiv:2204.07167  [pdf, other

    cs.PL cs.OS

    Towards Porting Operating Systems with Program Synthesis

    Authors: Jingmei Hu, Eric Lu, David A. Holland, Ming Kawaguchi, Stephen Chong, Margo I. Seltzer

    Abstract: The end of Moore's Law has ushered in a diversity of hardware not seen in decades. Operating system (and system software) portability is accordingly becoming increasingly critical. Simultaneously, there has been tremendous progress in program synthesis. We set out to explore the feasibility of using modern program synthesis to generate the machine-dependent parts of an operating system. Our ultima… ▽ More

    Submitted 22 September, 2022; v1 submitted 15 April, 2022; originally announced April 2022.

    Comments: ACM Transactions on Programming Languages and Systems. Accepted on August 2022

  19. arXiv:2106.08630  [pdf, other

    cs.LG

    HELP: Hardware-Adaptive Efficient Latency Prediction for NAS via Meta-Learning

    Authors: Hayeon Lee, Sewoong Lee, Song Chong, Sung Ju Hwang

    Abstract: For deployment, neural architecture search should be hardware-aware, in order to satisfy the device-specific constraints (e.g., memory usage, latency and energy consumption) and enhance the model efficiency. Existing methods on hardware-aware NAS collect a large number of samples (e.g., accuracy and latency) from a target device, either builds a lookup table or a latency estimator. However, such a… ▽ More

    Submitted 1 December, 2021; v1 submitted 16 June, 2021; originally announced June 2021.

    Comments: NeurIPS 2021 (Spotlight)

  20. arXiv:2106.01850  [pdf, ps, other

    cs.CR

    Relational Analysis of Sensor Attacks on Cyber-Physical Systems

    Authors: Jian Xiang, Nathan Fulton, Stephen Chong

    Abstract: Cyber-physical systems, such as self-driving cars or autonomous aircraft, must defend against attacks that target sensor hardware. Analyzing system design can help engineers understand how a compromised sensor could impact the system's behavior; however, designing security analyses for cyber-physical systems is difficult due to their combination of discrete dynamics, continuous dynamics, and nonde… ▽ More

    Submitted 3 June, 2021; originally announced June 2021.

    Comments: This is an extended version of the paper with the same title that appeared in the 2021 Computer Security Foundations Symposium

  21. arXiv:2105.10869  [pdf

    cs.RO

    Insect-Computer Hybrid System for Autonomous Search and Rescue Mission

    Authors: P. Thanh Tran-Ngoc, D. Long Le, Bing Sheng Chong, H. Duoc Nguyen, V. Than Dung, Feng Cao, Yao Li, Kazuki Kai, Jia Hui Gan, T. Thang Vo-Doan, T. Luan Nguyen, Hirotaka Sato

    Abstract: There is still a long way to go before artificial mini robots are really used for search and rescue missions in disaster-hit areas due to hindrance in power consumption, computation load of the locomotion, and obstacle-avoidance system. Insect-computer hybrid system, which is the fusion of living insect platform and microcontroller, emerges as an alternative solution. This study demonstrates the f… ▽ More

    Submitted 21 June, 2021; v1 submitted 23 May, 2021; originally announced May 2021.

    Comments: Videos are available at https://hirosatontu.wordpress.com/research/

  22. arXiv:2104.10379  [pdf, other

    cs.CR cs.PL

    A Calculus for Flow-Limited Authorization

    Authors: Owen Arden, Anitha Gollamudi, Ethan Cecchetti, Stephen Chong, Andrew C. Myers

    Abstract: Real-world applications routinely make authorization decisions based on dynamic computation. Reasoning about dynamically computed authority is challenging. Integrity of the system might be compromised if attackers can improperly influence the authorizing computation. Confidentiality can also be compromised by authorization, since authorization decisions are often based on sensitive data such as me… ▽ More

    Submitted 21 April, 2021; originally announced April 2021.

    Comments: 58 pages

    ACM Class: F.3.1; F.3.2; D.4.6

  23. arXiv:2012.10981  [pdf, other

    cs.RO

    Towards Complex and Continuous Manipulation: A Gesture Based Anthropomorphic Robotic Hand Design

    Authors: Li Tian, Hanhui Li, Qifa Wang, Xuezeng Du, Jialin Tao, Jordan Sia Chong, Nadia Magnenat Thalmann, Jianmin Zheng

    Abstract: Most current anthropomorphic robotic hands can realize part of the human hand functions, particularly for object grasping. However, due to the complexity of the human hand, few current designs target at daily object manipulations, even for simple actions like rotating a pen. To tackle this problem, we introduce a gesture based framework, which adopts the widely-used 33 grasping gestures of Feix as… ▽ More

    Submitted 20 April, 2021; v1 submitted 20 December, 2020; originally announced December 2020.

    Comments: 8 pages, 9 figures, 3 tables, accepted by IEEE Robotics and Automation Letters

  24. arXiv:2009.08361  [pdf, other

    cs.PL

    Formulog: Datalog for SMT-Based Static Analysis (Extended Version)

    Authors: Aaron Bembenek, Michael Greenberg, Stephen Chong

    Abstract: Satisfiability modulo theories (SMT) solving has become a critical part of many static analyses, including symbolic execution, refinement type checking, and model checking. We propose Formulog, a domain-specific language that makes it possible to write a range of SMT-based static analyses in a way that is both close to their formal specifications and amenable to high-level optimizations and effici… ▽ More

    Submitted 16 October, 2020; v1 submitted 17 September, 2020; originally announced September 2020.

    Comments: Please cite the official published version of this work: Aaron Bembenek, Michael Greenberg, and Stephen Chong. 2020. Formulog: Datalog for SMT-Based Static Analysis. Proc. ACM Program. Lang. 4, OOPSLA, Article 141 (November 2020), 31 pages. https://doi.org/10. 1145/3428209

  25. arXiv:2007.12987  [pdf, other

    cs.PL cs.LO

    Coupled Relational Symbolic Execution for Differential Privacy

    Authors: Gian Pietro Farina, Stephen Chong, Marco Gaboardi

    Abstract: Differential privacy is a de facto standard in data privacy with applications in the private and public sectors. Most of the techniques that achieve differential privacy are based on a judicious use of randomness. However, reasoning about randomized programs is difficult and error prone. For this reason, several techniques have been recently proposed to support designer in proving programs differe… ▽ More

    Submitted 25 July, 2020; originally announced July 2020.

  26. arXiv:2002.01077  [pdf, other

    cs.IR cs.HC

    Quantifying the Effects of Recommendation Systems

    Authors: Sunshine Chong, Andrés Abeliuk

    Abstract: Recommendation systems today exert a strong influence on consumer behavior and individual perceptions of the world. By using collaborative filtering (CF) methods to create recommendations, it generates a continuous feedback loop in which user behavior becomes magnified in the algorithmic system. Popular items get recommended more frequently, creating the bias that affects and alters user preferenc… ▽ More

    Submitted 3 February, 2020; originally announced February 2020.

    Comments: 8 pages, 6 figures, accepted into the National Symposium of IEEE Big Data 2019

  27. arXiv:1910.10096  [pdf, other

    cs.CR

    Formalizing Privacy Laws for License Generation and Data Repository Decision Automation

    Authors: Micah Altman, Stephen Chong, Alexandra Wood

    Abstract: In this paper, we summarize work-in-progress on expert system support to automate some data deposit and release decisions within a data repository, and to generate custom license agreements for those data transfers. Our approach formalizes via a logic programming language the privacy-relevant aspects of laws, regulations, and best practices, supported by legal analysis documented in legal memora… ▽ More

    Submitted 22 October, 2019; originally announced October 2019.

  28. Fine-Grained, Language-Based Access Control for Database-Backed Applications

    Authors: Ezra Zigmond, Stephen Chong, Christos Dimoulas, Scott Moore

    Abstract: Context: Database-backed applications often run queries with more authority than necessary. Since programs can access more data than they legitimately need, flaws in security checks at the application level can enable malicious or buggy code to view or modify data in violation of intended access control policies. Inquiry: Although database management systems provide tools to control access to da… ▽ More

    Submitted 26 September, 2019; originally announced September 2019.

    Journal ref: The Art, Science, and Engineering of Programming, 2020, Vol. 4, Issue 2, Article 3

  29. arXiv:1908.00093  [pdf, other

    cs.PL

    Aquarium: Cassiopea and Alewife Languages

    Authors: David A. Holland, Jingmei Hu, Ming Kawaguchi, Eric Lu, Stephen Chong, Margo I. Seltzer

    Abstract: This technical report describes two of the domain specific languages used in the Aquarium kernel code synthesis project. It presents the language cores in terms of abstract syntax. Cassiopea is a machine description language for describing the semantics of processor instruction sets. Alewife is a specification language that can be used to write machine-independent specifications for assembly-level… ▽ More

    Submitted 12 April, 2022; v1 submitted 31 July, 2019; originally announced August 2019.

  30. arXiv:1809.06274  [pdf, ps, other

    cs.PL

    FormuLog: Datalog for static analysis involving logical formulae

    Authors: Aaron Bembenek, Stephen Chong

    Abstract: Datalog has become a popular language for writing static analyses. Because Datalog is very limited, some implementations of Datalog for static analysis have extended it with new language features. However, even with these features it is hard or impossible to express a large class of analyses because they use logical formulae to represent program state. FormuLog fills this gap by extending Datalog… ▽ More

    Submitted 17 September, 2018; originally announced September 2018.

    Comments: Proceedings of the 11th Workshop on Answer Set Programming and Other Computing Paradigms 2018

  31. arXiv:1712.10284  [pdf, other

    cs.SI physics.soc-ph stat.AP

    Large-Scale Experiment on the Importance of Social Learning and Unimodality in the Wisdom of the Crowd

    Authors: Dhaval Adjodah, Shi Kai Chong, Yan Leng, Peter Krafft, Alex Pentland

    Abstract: In this study, we build on previous research to understand the conditions within which the Wisdom of the Crowd (WoC) improves or worsens as a result of showing individuals the predictions of their peers. Our main novel contributions are: 1) a dataset of unprecedented size and detail; 2) we observe the novel effect of the importance of the unimodality of the social information shown to individuals:… ▽ More

    Submitted 29 December, 2017; originally announced December 2017.

  32. arXiv:1712.09960  [pdf, other

    cs.SI physics.soc-ph

    Social Bayesian Learning in the Wisdom of the Crowd

    Authors: Dhaval Adjodah, Yan Leng, Shi Kai Chong, Peter Krafft, Alex Pentland

    Abstract: Being able to correctly aggregate the beliefs of many people into a single belief is a problem fundamental to many important social, economic and political processes such as policy making, market pricing and voting. Although there exist many models and mechanisms for aggregation, there is a lack of methods and literature regarding the aggregation of opinions when influence and learning between ind… ▽ More

    Submitted 28 December, 2017; originally announced December 2017.

  33. arXiv:1711.08349  [pdf, ps, other

    cs.PL

    Relational Symbolic Execution

    Authors: Gian Pietro Farina, Stephen Chong, Marco Gaboardi

    Abstract: Symbolic execution is a classical program analysis technique used to show that programs satisfy or violate given specifications. In this work we generalize symbolic execution to support program analysis for relational specifications in the form of relational properties - these are properties about two runs of two programs on related inputs, or about two executions of a single program on related in… ▽ More

    Submitted 1 August, 2019; v1 submitted 22 November, 2017; originally announced November 2017.

  34. Cryptographically Secure Information Flow Control on Key-Value Stores

    Authors: Lucas Waye, Pablo Buiras, Owen Arden, Alejandro Russo, Stephen Chong

    Abstract: We present Clio, an information flow control (IFC) system that transparently incorporates cryptography to enforce confidentiality and integrity policies on untrusted storage. Clio insulates developers from explicitly manipulating keys and cryptographic primitives by leveraging the policy language of the IFC system to automatically use the appropriate keys and correct cryptographic operations. We p… ▽ More

    Submitted 29 August, 2017; originally announced August 2017.

    Comments: Full version of conference paper appearing in CCS 2017

  35. arXiv:1704.03188  [pdf, other

    cs.LG

    Simplified Stochastic Feedforward Neural Networks

    Authors: Kimin Lee, Jaehyung Kim, Song Chong, Jinwoo Shin

    Abstract: It has been believed that stochastic feedforward neural networks (SFNNs) have several advantages beyond deterministic deep neural networks (DNNs): they have more expressive power allowing multi-modal mappings and regularize better due to their stochastic nature. However, training large-scale SFNN is notoriously harder. In this paper, we aim at developing efficient training methods for SFNN, in par… ▽ More

    Submitted 11 April, 2017; originally announced April 2017.

    Comments: 22 pages, 6 figures

  36. arXiv:1701.06439  [pdf

    cs.CV

    Segmentation-free Vehicle License Plate Recognition using ConvNet-RNN

    Authors: Teik Koon Cheang, Yong Shean Chong, Yong Haur Tay

    Abstract: While vehicle license plate recognition (VLPR) is usually done with a sliding window approach, it can have limited performance on datasets with characters that are of variable width. This can be solved by hand-crafting algorithms to prescale the characters. While this approach can work fairly well, the recognizer is only aware of the pixels within each detector window, and fails to account for oth… ▽ More

    Submitted 23 January, 2017; originally announced January 2017.

    Comments: 5 pages, 3 figures, International Workshop on Advanced Image Technology, January, 8-10, 2017. Penang, Malaysia. Proceeding IWAIT2017

    ACM Class: I.4.0, I.5.1, I.5.4, I.7.5

  37. arXiv:1701.01546  [pdf, other

    cs.CV

    Abnormal Event Detection in Videos using Spatiotemporal Autoencoder

    Authors: Yong Shean Chong, Yong Haur Tay

    Abstract: We present an efficient method for detecting anomalies in videos. Recent applications of convolutional neural networks have shown promises of convolutional layers for object detection and recognition, especially in images. However, convolutional neural networks are supervised and require labels as learning signals. We propose a spatiotemporal architecture for anomaly detection in videos including… ▽ More

    Submitted 6 January, 2017; originally announced January 2017.

  38. arXiv:1608.00678  [pdf, other

    cs.CR cs.LO

    Report on the NSF Workshop on Formal Methods for Security

    Authors: Stephen Chong, Joshua Guttman, Anupam Datta, Andrew Myers, Benjamin Pierce, Patrick Schaumont, Tim Sherwood, Nickolai Zeldovich

    Abstract: Report on the NSF Workshop on Formal Methods for Security, held 19-20 November 2015.

    Submitted 3 August, 2016; v1 submitted 1 August, 2016; originally announced August 2016.

  39. arXiv:1602.06594  [pdf, ps, other

    eess.SY cs.CR

    Vulnerability of linear systems against sensor attacks--a system's security index

    Authors: Michelle S. Chong, Margreta Kuijper

    Abstract: The `security index' of a discrete-time LTI system under sensor attacks is introduced as a quantitative measure on the security of an observable system. We derive ideas from error control coding theory to provide sufficient conditions for attack detection and correction.

    Submitted 21 February, 2016; originally announced February 2016.

    Comments: Submitted

    MSC Class: 93B35; 94B05

    Journal ref: Proceedings of MTNS 2016 (International Symposium on Mathematical Theory of Networks and Systems, July 2016, Minneapolis, USA), pp.373-376

  40. Precise, Dynamic Information Flow for Database-Backed Applications

    Authors: Jean Yang, Travis Hance, Thomas H. Austin, Armando Solar-Lezama, Cormac Flanagan, Stephen Chong

    Abstract: We present an approach for dynamic information flow control across the application and database. Our approach reduces the amount of policy code required, yields formal guarantees across the application and database, works with existing relational database implementations, and scales for realistic applications. In this paper, we present a programming model that factors out information flow policies… ▽ More

    Submitted 23 April, 2016; v1 submitted 13 July, 2015; originally announced July 2015.

    ACM Class: D.3.3

  41. arXiv:1505.00523  [pdf

    cs.CV

    Modeling Representation of Videos for Anomaly Detection using Deep Learning: A Review

    Authors: Yong Shean Chong, Yong Haur Tay

    Abstract: This review article surveys the current progresses made toward video-based anomaly detection. We address the most fundamental aspect for video anomaly detection, that is, video feature representation. Much research works have been done in finding the right representation to perform anomaly detection in video streams accurately with an acceptable false alarm rate. However, this is very challenging… ▽ More

    Submitted 4 May, 2015; originally announced May 2015.

    Comments: arXiv admin note: text overlap with arXiv:1411.4423 by other authors

  42. arXiv:1409.0309  [pdf, other

    cs.CR cs.LO

    Using Architecture to Reason about Information Security

    Authors: Stephen Chong, Ron van der Meyden

    Abstract: We demonstrate, by a number of examples, that information-flow security properties can be proved from abstract architectural descriptions, that describe only the causal structure of a system and local properties of trusted components. We specify these architectural descriptions of systems by generalizing intransitive noninterference policies to admit the ability to filter information passed betwee… ▽ More

    Submitted 1 September, 2014; originally announced September 2014.

  43. arXiv:1209.4527  [pdf, other

    cs.NI cs.PF

    Delay-Optimal Data Forwarding in Vehicular Sensor Networks

    Authors: Okyoung Choi, Seokhyun Kim, Jaeseong Jeong, Hyang-Won Lee, Song Chong

    Abstract: Vehicular Sensor Network (VSN) is emerging as a new solution for monitoring urban environments such as Intelligent Transportation Systems and air pollution. One of the crucial factors that determine the service quality of urban monitoring applications is the delivery delay of sensing data packets in the VSN. In this paper, we study the problem of routing data packets with minimum delay in the VSN,… ▽ More

    Submitted 20 September, 2012; originally announced September 2012.

  44. arXiv:1207.6607  [pdf, ps, other

    cs.NI cs.GT

    Economics of WiFi Offloading: Trading Delay for Cellular Capacity

    Authors: Joohyun Lee, Yung Yi, Song Chong, Youngmi Jin

    Abstract: Cellular networks are facing severe traffic overloads due to the proliferation of smart handheld devices and traffic-hungry applications. A cost-effective and practical solution is to offload cellular data through WiFi. Recent theoretical and experimental studies show that a scheme, referred to as delayed WiFi offloading, can significantly save the cellular capacity by delaying users' data and exp… ▽ More

    Submitted 31 December, 2012; v1 submitted 27 July, 2012; originally announced July 2012.

    Comments: 15 pages, 11 figures, submitted for publication

  45. arXiv:1207.3740  [pdf, ps, other

    cs.NI

    Making 802.11 DCF Optimal: Design, Implementation, and Evaluation

    Authors: Jinsung Lee, Yung Yi, Song Chong, Bruno Nardelli, Edward W. Knightly, Mung Chiang

    Abstract: This paper proposes a new protocol called Optimal DCF (O-DCF). Inspired by a sequence of analytic results, O-DCF modifies the rule of adapting CSMA parameters, such as backoff time and transmission length, based on a function of the demand-supply differential of link capacity captured by the local queue length. Unlike clean-slate design, O-DCF is fully compatible with 802.11 hardware, so that it c… ▽ More

    Submitted 7 July, 2012; originally announced July 2012.

    Comments: 13 pages, 16 figures, submitted for publication

    MSC Class: 68-06 ACM Class: C.2.1

  46. arXiv:1207.1514  [pdf, ps, other

    cs.NI

    On the Generalized Delay-Capacity Tradeoff of Mobile Networks with Lévy Flight Mobility

    Authors: Yoora Kim, Kyunghan Lee, Ness B. Shroff, Injong Rhee, Song Chong

    Abstract: In the literature, scaling laws for wireless mobile networks have been characterized under various models of node mobility and several assumptions on how communication occurs between nodes. To improve the realism in the analysis of scaling laws, we propose a new analytical framework. The framework is the first to consider a Lévy flight mobility pattern, which is known to closely mimic human mobili… ▽ More

    Submitted 6 July, 2012; originally announced July 2012.

    Comments: 21 pages

  47. arXiv:1111.5472  [pdf, ps, other

    cs.GT

    Truthful Mechanisms for Agents that Value Privacy

    Authors: Yiling Chen, Stephen Chong, Ian A. Kash, Tal Moran, Salil Vadhan

    Abstract: Recent work has constructed economic mechanisms that are both truthful and differentially private. In these mechanisms, privacy is treated separately from the truthfulness; it is not incorporated in players' utility functions (and doing so has been shown to lead to non-truthfulness in some cases). In this work, we propose a new, general way of modelling privacy in players' utility functions. Speci… ▽ More

    Submitted 13 November, 2012; v1 submitted 23 November, 2011; originally announced November 2011.

  48. arXiv:1111.4724  [pdf, ps, other

    cs.NI

    On the Critical Delays of Mobile Networks under Lévy Walks and Lévy Flights

    Authors: Kyunghan Lee, Yoora Kim, Song Chong, Injong Rhee, Yung Yi, Ness. B. Shroff

    Abstract: Delay-capacity tradeoffs for mobile networks have been analyzed through a number of research work. However, Lévy mobility known to closely capture human movement patterns has not been adopted in such work. Understanding the delay-capacity tradeoff for a network with Lévy mobility can provide important insights into understanding the performance of real mobile networks governed by human mobility. T… ▽ More

    Submitted 1 February, 2012; v1 submitted 20 November, 2011; originally announced November 2011.

  49. arXiv:1105.0738  [pdf, ps, other

    cs.NI

    REFIM: A Practical Interference Management in Heterogeneous Wireless Access Networks

    Authors: Kyuho Son, Soohwan Lee, Yung Yi, Song Chong

    Abstract: Due to the increasing demand of capacity in wireless cellular networks, the small cells such as pico and femto cells are becoming more popular to enjoy a spatial reuse gain, and thus cells with different sizes are expected to coexist in a complex manner. In such a heterogeneous environment, the role of interference management (IM) becomes of more importance, but technical challenges also increase,… ▽ More

    Submitted 4 May, 2011; originally announced May 2011.

    Comments: 13 pages

  50. arXiv:cs/0412065  [pdf, ps, other

    cs.CL cs.HC

    A Framework for Creating Natural Language User Interfaces for Action-Based Applications

    Authors: Stephen Chong, Riccardo Pucella

    Abstract: In this paper we present a framework for creating natural language interfaces to action-based applications. Our framework uses a number of reusable application-independent components, in order to reduce the effort of creating a natural language interface for a given application. Using a type-logical grammar, we first translate natural language sentences into expressions in an extended higher-ord… ▽ More

    Submitted 16 December, 2004; originally announced December 2004.

    Comments: 25 pages, 1 figure. A preliminary version of this paper appeared in the Proceedings of the Third International AMAST Workshop on Algebraic Methods in Language Processing, TWLT Report 21, pp. 83-98, 2003

    ACM Class: H.5.2; I.2.7; F.4.2; F.4.1