Skip to main content

Showing 1–10 of 10 results for author: Ham, S

  1. arXiv:2405.17825  [pdf, other

    cs.CV cs.AI

    Diffusion Model Patching via Mixture-of-Prompts

    Authors: Seokil Ham, Sangmin Woo, Jin-Young Kim, Hyojun Go, Byeongjun Park, Changick Kim

    Abstract: We present Diffusion Model Patching (DMP), a simple method to boost the performance of pre-trained diffusion models that have already reached convergence, with a negligible increase in parameters. DMP inserts a small, learnable set of prompts into the model's input space while keeping the original model frozen. The effectiveness of DMP is not merely due to the addition of parameters but stems from… ▽ More

    Submitted 30 May, 2024; v1 submitted 28 May, 2024; originally announced May 2024.

    Comments: Project page: https://sangminwoo.github.io/DMP/

  2. arXiv:2403.09176  [pdf, other

    cs.CV

    Switch Diffusion Transformer: Synergizing Denoising Tasks with Sparse Mixture-of-Experts

    Authors: Byeongjun Park, Hyojun Go, Jin-Young Kim, Sangmin Woo, Seokil Ham, Changick Kim

    Abstract: Diffusion models have achieved remarkable success across a range of generative tasks. Recent efforts to enhance diffusion model architectures have reimagined them as a form of multi-task learning, where each task corresponds to a denoising task at a specific noise level. While these efforts have focused on parameter isolation and task routing, they fall short of capturing detailed inter-task relat… ▽ More

    Submitted 10 July, 2024; v1 submitted 14 March, 2024; originally announced March 2024.

    Comments: Project Page: https://byeongjun-park.github.io/Switch-DiT/

  3. arXiv:2311.00428  [pdf, other

    cs.LG

    NEO-KD: Knowledge-Distillation-Based Adversarial Training for Robust Multi-Exit Neural Networks

    Authors: Seokil Ham, Jungwuk Park, Dong-Jun Han, Jaekyun Moon

    Abstract: While multi-exit neural networks are regarded as a promising solution for making efficient inference via early exits, combating adversarial attacks remains a challenging problem. In multi-exit networks, due to the high dependency among different submodels, an adversarial example targeting a specific exit not only degrades the performance of the target exit but also reduces the performance of all o… ▽ More

    Submitted 1 November, 2023; originally announced November 2023.

    Comments: 10 pages, 4 figures, accepted by 37th Conference on Neural Information Processing Systems (NeurIPS 2023)

  4. arXiv:2307.08169  [pdf, other

    cs.LG cs.HC

    Discovering User Types: Mapping User Traits by Task-Specific Behaviors in Reinforcement Learning

    Authors: L. L. Ankile, B. S. Ham, K. Mao, E. Shin, S. Swaroop, F. Doshi-Velez, W. Pan

    Abstract: When assisting human users in reinforcement learning (RL), we can represent users as RL agents and study key parameters, called \emph{user traits}, to inform intervention design. We study the relationship between user behaviors (policy classes) and user traits. Given an environment, we introduce an intuitive tool for studying the breakdown of "user types": broad sets of traits that result in the s… ▽ More

    Submitted 16 July, 2023; originally announced July 2023.

  5. arXiv:2306.14384  [pdf, other

    cs.RO eess.SY

    Multitask Learning for Multiple Recognition Tasks: A Framework for Lower-limb Exoskeleton Robot Applications

    Authors: Joonhyun Kim, Seongmin Ha, Dongbin Shin, Seoyeon Ham, Jaepil Jang, Wansoo Kim

    Abstract: To control the lower-limb exoskeleton robot effectively, it is essential to accurately recognize user status and environmental conditions. Previous studies have typically addressed these recognition challenges through independent models for each task, resulting in an inefficient model development process. In this study, we propose a Multitask learning approach that can address multiple recognition… ▽ More

    Submitted 25 June, 2023; originally announced June 2023.

    Comments: Accepted for publication in the Proceedings of the 2023 IEEE International Conference on RO-MAN 2023 BUSAN, 7 pages

  6. arXiv:2110.02797  [pdf, other

    cs.CV cs.CR cs.LG

    Adversarial Robustness Comparison of Vision Transformer and MLP-Mixer to CNNs

    Authors: Philipp Benz, Soomin Ham, Chaoning Zhang, Adil Karjauv, In So Kweon

    Abstract: Convolutional Neural Networks (CNNs) have become the de facto gold standard in computer vision applications in the past years. Recently, however, new model architectures have been proposed challenging the status quo. The Vision Transformer (ViT) relies solely on attention modules, while the MLP-Mixer architecture substitutes the self-attention modules with Multi-Layer Perceptrons (MLPs). Despite t… ▽ More

    Submitted 11 October, 2021; v1 submitted 6 October, 2021; originally announced October 2021.

    Comments: Code: https://github.com/phibenz/robustness_comparison_vit_mlp-mixer_cnn

  7. arXiv:2009.07139  [pdf, other

    cs.LG stat.ML

    Analyzing the effect of APOE on Alzheimer's disease progression using an event-based model for stratified populations

    Authors: Vikram Venkatraghavan, Stefan Klein, Lana Fani, Leontine S. Ham, Henri Vrooman, M. Kamran Ikram, Wiro J. Niessen, Esther E. Bron

    Abstract: Alzheimer's disease (AD) is the most common form of dementia and is phenotypically heterogeneous. APOE is a triallelic gene which correlates with phenotypic heterogeneity in AD. In this work, we determined the effect of APOE alleles on the disease progression timeline of AD using a discriminative event-based model (DEBM). Since DEBM is a data-driven model, stratification into smaller disease subgr… ▽ More

    Submitted 15 September, 2020; originally announced September 2020.

  8. arXiv:2008.05833  [pdf

    quant-ph cs.CR

    Experimental demonstrations of unconditional security in a purely classical regime

    Authors: Byoung S. Ham

    Abstract: So far, unconditional security in key distribution processes has been confined to quantum key distribution (QKD) protocols based on the no-cloning theorem of nonorthogonal bases. Recently, a completely different approach, the unconditionally secured classical key distribution (USCKD), has been proposed for unconditional security in the purely classical regime. Unlike QKD, both classical channels a… ▽ More

    Submitted 13 August, 2020; originally announced August 2020.

    Comments: 8 pages, 4 figures, 1 table

  9. arXiv:1705.06882  [pdf, other

    cs.NI

    QuickTalk: An Association-Free Communication Method for IoT Devices in Proximity

    Authors: Seongmin Ham, Jihyung Lee, Kyunghan Lee

    Abstract: IoT devices are in general considered to be straightforward to use. However, we find that there are a number of situations where the usability becomes poor. The situations include but not limited to the followings: 1) when initializing an IoT device, 2) when trying to control an IoT device which is initialized and registered by another person, and 3) when trying to control an IoT device out of man… ▽ More

    Submitted 19 May, 2017; originally announced May 2017.

    Comments: 18 pages, 9 figures, IMWUT(Ubicomp) conference

  10. arXiv:1404.0106  [pdf

    cs.CV

    Traffic Monitoring Using M2M Communication

    Authors: Shiu Kumar, Eun Sik Ham, Seong Ro Lee

    Abstract: This paper presents an intelligent traffic monitoring system using wireless vision sensor network that captures and processes the real-time video image to obtain the traffic flow rate and vehicle speeds along different urban roadways. This system will display the traffic states on the front roadways that can guide the drivers to select the right way and avoid potential traffic congestions. On the… ▽ More

    Submitted 31 March, 2014; originally announced April 2014.

    Comments: 2 pages, 2 figures, presented in local conference in Korea South

    Journal ref: General Fall Conference of Korea Information and Communications Society (KICS) 2012, Seoul, South Korea, 2012, pp. 233-234