Skip to main content

Showing 1–50 of 62 results for author: Jung, T

  1. arXiv:2404.13475  [pdf, other

    quant-ph cs.AI cs.CR cs.ET cs.LG

    PristiQ: A Co-Design Framework for Preserving Data Security of Quantum Learning in the Cloud

    Authors: Zhepeng Wang, Yi Sheng, Nirajan Koirala, Kanad Basu, Taeho Jung, Cheng-Chang Lu, Weiwen Jiang

    Abstract: Benefiting from cloud computing, today's early-stage quantum computers can be remotely accessed via the cloud services, known as Quantum-as-a-Service (QaaS). However, it poses a high risk of data leakage in quantum machine learning (QML). To run a QML model with QaaS, users need to locally compile their quantum circuits including the subcircuit of data encoding first and then send the compiled cir… ▽ More

    Submitted 20 April, 2024; originally announced April 2024.

  2. arXiv:2402.11532  [pdf, other

    cs.CL

    Chain-of-Instructions: Compositional Instruction Tuning on Large Language Models

    Authors: Shirley Anugrah Hayati, Taehee Jung, Tristan Bodding-Long, Sudipta Kar, Abhinav Sethy, Joo-Kyung Kim, Dongyeop Kang

    Abstract: Fine-tuning large language models (LLMs) with a collection of large and diverse instructions has improved the model's generalization to different tasks, even for unseen tasks. However, most existing instruction datasets include only single instructions, and they struggle to follow complex instructions composed of multiple subtasks. In this work, we propose a novel concept of compositional instruct… ▽ More

    Submitted 24 June, 2024; v1 submitted 18 February, 2024; originally announced February 2024.

  3. arXiv:2401.15681  [pdf, other

    cs.HC

    From Word Embedding to Reading Embedding Using Large Language Model, EEG and Eye-tracking

    Authors: Yuhong Zhang, Shilai Yang, Gert Cauwenberghs, Tzyy-Ping Jung

    Abstract: Reading comprehension, a fundamental cognitive ability essential for knowledge acquisition, is a complex skill, with a notable number of learners lacking proficiency in this domain. This study introduces innovative tasks for Brain-Computer Interface (BCI), predicting the relevance of words or tokens read by individuals to the target inference words. We use state-of-the-art Large Language Models (L… ▽ More

    Submitted 28 January, 2024; originally announced January 2024.

  4. arXiv:2310.08897  [pdf, other

    eess.IV cs.CV cs.LG

    Self supervised convolutional kernel based handcrafted feature harmonization: Enhanced left ventricle hypertension disease phenotyping on echocardiography

    Authors: Jina Lee, Youngtaek Hong, Dawun Jeong, Yeonggul Jang, Jaeik Jeon, Sihyeon Jeong, Taekgeun Jung, Yeonyee E. Yoon, Inki Moon, Seung-Ah Lee, Hyuk-Jae Chang

    Abstract: Radiomics, a medical imaging technique, extracts quantitative handcrafted features from images to predict diseases. Harmonization in those features ensures consistent feature extraction across various imaging devices and protocols. Methods for harmonization include standardized imaging protocols, statistical adjustments, and evaluating feature robustness. Myocardial diseases such as Left Ventricul… ▽ More

    Submitted 22 November, 2023; v1 submitted 13 October, 2023; originally announced October 2023.

    Comments: 11 pages, 7 figures

  5. arXiv:2309.15714  [pdf, other

    cs.CL cs.AI

    Integrating LLM, EEG, and Eye-Tracking Biomarker Analysis for Word-Level Neural State Classification in Semantic Inference Reading Comprehension

    Authors: Yuhong Zhang, Qin Li, Sujal Nahata, Tasnia Jamal, Shih-kuen Cheng, Gert Cauwenberghs, Tzyy-Ping Jung

    Abstract: With the recent proliferation of large language models (LLMs), such as Generative Pre-trained Transformers (GPT), there has been a significant shift in exploring human and machine comprehension of semantic language meaning. This shift calls for interdisciplinary research that bridges cognitive science and natural language processing (NLP). This pilot study aims to provide insights into individuals… ▽ More

    Submitted 17 October, 2023; v1 submitted 27 September, 2023; originally announced September 2023.

  6. arXiv:2308.02648  [pdf, other

    cs.CR cs.AR

    Privacy Preserving In-memory Computing Engine

    Authors: Haoran Geng, Jianqiao Mo, Dayane Reis, Jonathan Takeshita, Taeho Jung, Brandon Reagen, Michael Niemier, Xiaobo Sharon Hu

    Abstract: Privacy has rapidly become a major concern/design consideration. Homomorphic Encryption (HE) and Garbled Circuits (GC) are privacy-preserving techniques that support computations on encrypted data. HE and GC can complement each other, as HE is more efficient for linear operations, while GC is more effective for non-linear operations. Together, they enable complex computing tasks, such as machine l… ▽ More

    Submitted 10 August, 2023; v1 submitted 4 August, 2023; originally announced August 2023.

  7. arXiv:2307.16342  [pdf, other

    cs.LG cs.AI cs.CR

    Proof-of-Federated-Learning-Subchain: Free Partner Selection Subchain Based on Federated Learning

    Authors: Boyang Li, Bingyu Shen, Qing Lu, Taeho Jung, Yiyu Shi

    Abstract: The continuous thriving of the Blockchain society motivates research in novel designs of schemes supporting cryptocurrencies. Previously multiple Proof-of-Deep-Learning(PoDL) consensuses have been proposed to replace hashing with useful work such as deep learning model training tasks. The energy will be more efficiently used while maintaining the ledger. However deep learning models are problem-sp… ▽ More

    Submitted 30 July, 2023; originally announced July 2023.

    Comments: 7 pages, 7 figures

  8. Using EEG Signals to Assess Workload during Memory Retrieval in a Real-world Scenario

    Authors: Kuan-Jung Chiang, Steven Dong, Chung-Kuan Cheng, Tzyy-Ping Jung

    Abstract: Objective: The Electroencephalogram (EEG) is gaining popularity as a physiological measure for neuroergonomics in human factor studies because it is objective, less prone to bias, and capable of assessing the dynamics of cognitive states. This study investigated the associations between memory workload and EEG during participants' typical office tasks on a single-monitor and dual-monitor arrangeme… ▽ More

    Submitted 13 May, 2023; originally announced May 2023.

    Comments: This paper is published in Journal of Neural Engineering (2023). 19 pages, 9 figures

  9. arXiv:2302.09150  [pdf, other

    cs.CL cs.LG

    Cluster-Guided Label Generation in Extreme Multi-Label Classification

    Authors: Taehee Jung, Joo-Kyung Kim, Sungjin Lee, Dongyeop Kang

    Abstract: For extreme multi-label classification (XMC), existing classification-based models poorly perform for tail labels and often ignore the semantic relations among labels, like treating "Wikipedia" and "Wiki" as independent and separate labels. In this paper, we cast XMC as a generation task (XLGen), where we benefit from pre-trained text-to-text models. However, generating labels from the extremely l… ▽ More

    Submitted 17 February, 2023; originally announced February 2023.

    Journal ref: EACL 2023

  10. arXiv:2206.07089  [pdf, other

    cs.DC cs.LG

    A Collaboration Strategy in the Mining Pool for Proof-of-Neural-Architecture Consensus

    Authors: Boyang Li, Qing Lu, Weiwen Jiang, Taeho Jung, Yiyu Shi

    Abstract: In most popular public accessible cryptocurrency systems, the mining pool plays a key role because mining cryptocurrency with the mining pool turns the non-profitable situation into profitable for individual miners. In many recent novel blockchain consensuses, the deep learning training procedure becomes the task for miners to prove their workload, thus the computation power of miners will not pur… ▽ More

    Submitted 5 May, 2022; originally announced June 2022.

  11. arXiv:2205.03886  [pdf, other

    eess.SP cs.AI

    Demo: Real-Time Semantic Communications with a Vision Transformer

    Authors: Hanju Yoo, Taehun Jung, Linglong Dai, Songkuk Kim, Chan-Byoung Chae

    Abstract: Semantic communications are expected to enable the more effective delivery of meaning rather than a precise transfer of symbols. In this paper, we propose an end-to-end deep neural network-based architecture for image transmission and demonstrate its feasibility in a real-time wireless channel by implementing a prototype based on a field-programmable gate array (FPGA). We demonstrate that this sys… ▽ More

    Submitted 8 May, 2022; originally announced May 2022.

  12. arXiv:2111.10026  [pdf

    eess.SP cs.LG

    IC-U-Net: A U-Net-based Denoising Autoencoder Using Mixtures of Independent Components for Automatic EEG Artifact Removal

    Authors: Chun-Hsiang Chuang, Kong-Yi Chang, Chih-Sheng Huang, Tzyy-Ping Jung

    Abstract: Electroencephalography (EEG) signals are often contaminated with artifacts. It is imperative to develop a practical and reliable artifact removal method to prevent misinterpretations of neural signals and underperformance of brain-computer interfaces. This study developed a new artifact removal method, IC-U-Net, which is based on the U-Net architecture for removing pervasive EEG artifacts and reco… ▽ More

    Submitted 22 November, 2021; v1 submitted 18 November, 2021; originally announced November 2021.

  13. Enhancing an Intelligent Digital Twin with a Self-organized Reconfiguration Management based on Adaptive Process Models

    Authors: Timo Müller, Benjamin Lindemann, Tobias Jung, Nasser Jazdi, Michael Weyrich

    Abstract: Shorter product life cycles and increasing individualization of production leads to an increased reconfiguration demand in the domain of industrial automation systems, which will be dominated by cyber-physical production systems in the future. In constantly changing systems, however, not all configuration alternatives of the almost infinite state space are fully understood. Thus, certain configura… ▽ More

    Submitted 7 July, 2021; originally announced July 2021.

    Comments: 6 pages, 2 figures. Submitted to 54th CIRP Conference on Manufacturing Systems 2021

  14. arXiv:2105.14242  [pdf, other

    cs.CL

    CommitBERT: Commit Message Generation Using Pre-Trained Programming Language Model

    Authors: Tae-Hwan Jung

    Abstract: Commit message is a document that summarizes source code changes in natural language. A good commit message clearly shows the source code changes, so this enhances collaboration between developers. Therefore, our work is to develop a model that automatically writes the commit message. To this end, we release 345K datasets consisting of code modification and commit messages in six programming lan… ▽ More

    Submitted 29 May, 2021; originally announced May 2021.

    Comments: 8 pages, 3 figures, 4 Tables

  15. arXiv:2103.14741  [pdf

    cs.CR q-bio.GN

    Genomic Encryption of Biometric Information for Privacy-Preserving Forensics

    Authors: Taeho Jung, Ryan Karl, Geoffrey H. Siwo

    Abstract: DNA fingerprinting is a cornerstone for human identification in forensics, where the sequence of highly polymorphic short tandem repeats (STRs) from an individual is compared against a DNA database. This presents significant privacy risks to individuals with DNA profiles in the database due to hacking by malicious attackers who may access the data and misuse it for secondary purposes. In this pape… ▽ More

    Submitted 26 March, 2021; originally announced March 2021.

    Comments: 6 pages, 2 figures

  16. Boosting Template-based SSVEP Decoding by Cross-domain Transfer Learning

    Authors: Kuan-Jung Chiang, Chun-Shu Wei, Masaki Nakanishi, Tzyy-Ping Jung

    Abstract: Objective: This study aims to establish a generalized transfer-learning framework for boosting the performance of steady-state visual evoked potential (SSVEP)-based brain-computer interfaces (BCIs) by leveraging cross-domain data transferring. Approach: We enhanced the state-of-the-art template-based SSVEP decoding through incorporating a least-squares transformation (LST)-based transfer learning… ▽ More

    Submitted 9 February, 2021; originally announced February 2021.

    Comments: Mirror version of the manuscript in the Journal of Neural Engineering on IOP Science (https://iopscience.iop.org/article/10.1088/1741-2552/abcb6e/meta), Journal of Neural Engineering (2020)

  17. arXiv:2011.00101  [pdf, ps, other

    cs.CR cs.HC cs.LG eess.SP

    EEG-Based Brain-Computer Interfaces Are Vulnerable to Backdoor Attacks

    Authors: Lubin Meng, Jian Huang, Zhigang Zeng, Xue Jiang, Shan Yu, Tzyy-Ping Jung, Chin-Teng Lin, Ricardo Chavarriaga, Dongrui Wu

    Abstract: Research and development of electroencephalogram (EEG) based brain-computer interfaces (BCIs) have advanced rapidly, partly due to deeper understanding of the brain and wide adoption of sophisticated machine learning approaches for decoding the EEG signals. However, recent studies have shown that machine learning algorithms are vulnerable to adversarial attacks. This article proposes to use narrow… ▽ More

    Submitted 2 January, 2021; v1 submitted 30 October, 2020; originally announced November 2020.

    Journal ref: IEEE Transactions on Neural Systems and Rehabilitation Engineering, 2023

  18. arXiv:2010.03881  [pdf, other

    cs.CL

    Large Product Key Memory for Pretrained Language Models

    Authors: Gyuwan Kim, Tae-Hwan Jung

    Abstract: Product key memory (PKM) proposed by Lample et al. (2019) enables to improve prediction accuracy by increasing model capacity efficiently with insignificant computational overhead. However, their empirical application is only limited to causal language modeling. Motivated by the recent success of pretrained language models (PLMs), we investigate how to incorporate large PKM into PLMs that can be f… ▽ More

    Submitted 8 October, 2020; originally announced October 2020.

    Comments: Accepted to Findings of EMNLP 2020; 10 pages, 4 figures

  19. arXiv:2009.14421  [pdf, other

    cs.HC

    A Virtual Reality Game as a Tool to Assess Physiological Correlations of Stress

    Authors: Daniel H. Lee, Tzyy-Ping Jung

    Abstract: The objective of this study is to develop and use a virtual reality game as a tool to assess the effects of realistic stress on the behavioral and physiological responses of participants. The game is based on a popular Steam game called Keep Talking Nobody Explodes, where the player collaborates with another person to defuse a bomb. Varying levels of difficulties in solving a puzzle and time press… ▽ More

    Submitted 30 September, 2020; originally announced September 2020.

    Comments: 13 pages, 10 figures

    ACM Class: H.5.0

  20. arXiv:2009.07351  [pdf, other

    cs.CR cs.LG

    Federated Dynamic GNN with Secure Aggregation

    Authors: Meng Jiang, Taeho Jung, Ryan Karl, Tong Zhao

    Abstract: Given video data from multiple personal devices or street cameras, can we exploit the structural and dynamic information to learn dynamic representation of objects for applications such as distributed surveillance, without storing data at a central server that leads to a violation of user privacy? In this work, we introduce Federated Dynamic Graph Neural Network (Feddy), a distributed and secured… ▽ More

    Submitted 15 September, 2020; originally announced September 2020.

    Comments: 16 pages, 2 figures

  21. arXiv:2007.14960  [pdf, ps, other

    cs.LO eess.SY

    Opacity of Discrete Event Systems with Active Intruder

    Authors: Alireza Partovi, Taeho Jung, Lin Hai

    Abstract: Opacity is a security property formalizing the information leakage of a system to an external observer, namely intruder. The conventional opacity that has been studied in the Discrete Event System (DES) literature usually assumes passive intruders, who only observe the behavior of the system. However, in many cybersecurity concerns, such as web service, active intruders, who are capable of influen… ▽ More

    Submitted 24 July, 2020; originally announced July 2020.

  22. Computing-in-Memory for Performance and Energy Efficient Homomorphic Encryption

    Authors: Dayane Reis, Jonathan Takeshita, Taeho Jung, Michael Niemier, Xiaobo Sharon Hu

    Abstract: Homomorphic encryption (HE) allows direct computations on encrypted data. Despite numerous research efforts, the practicality of HE schemes remains to be demonstrated. In this regard, the enormous size of ciphertexts involved in HE computations degrades computational efficiency. Near-memory Processing (NMP) and Computing-in-memory (CiM) - paradigms where computation is done within the memory bound… ▽ More

    Submitted 19 August, 2020; v1 submitted 5 May, 2020; originally announced May 2020.

    Comments: 14 pages

    Journal ref: IEEE Transactions on Very Large Scale Integration (VLSI) Systems ( Volume: 28, Issue: 11, Nov. 2020)

  23. arXiv:2005.02330  [pdf, other

    cs.CR

    Secure Single-Server Nearly-Identical Image Deduplication

    Authors: Jonathan Takeshita, Ryan Karl, Taeho Jung

    Abstract: Cloud computing is often utilized for file storage. Clients of cloud storage services want to ensure the privacy of their data, and both clients and servers want to use as little storage as possible. Cross-user deduplication is one method to reduce the amount of storage a server uses. Deduplication and privacy are naturally conflicting goals, especially for nearly-identical (``fuzzy'') deduplicati… ▽ More

    Submitted 5 May, 2020; originally announced May 2020.

  24. arXiv:2004.14500  [pdf, other

    cs.CL cs.LG stat.ML

    Posterior Calibrated Training on Sentence Classification Tasks

    Authors: Taehee Jung, Dongyeop Kang, Hua Cheng, Lucas Mentch, Thomas Schaaf

    Abstract: Most classification models work by first predicting a posterior probability distribution over all classes and then selecting that class with the largest estimated probability. In many settings however, the quality of posterior probability itself (e.g., 65% chance having diabetes), gives more reliable information than the final predicted class alone. When these methods are shown to be poorly calibr… ▽ More

    Submitted 1 May, 2020; v1 submitted 29 April, 2020; originally announced April 2020.

    Comments: Accepted at ACL 2020

  25. Wireless VR/Haptic Open Platform for Multimodal Teleoperation

    Authors: Tae Hun Jung, Hanju Yoo, Yuna Jin, Chae Eun Rhee, Chan-Byoung Chae

    Abstract: With emerging trends in the fifth generation and robotics, the Internet of Skills will enable us to deliver skills or expertise anywhere over the Internet. In this paper, we propose a wireless connected virtual reality and haptic communication open platform to show the proof of concept for multimodal teleoperation systems in real-time. We focus on a practical implementation with commercial product… ▽ More

    Submitted 26 April, 2020; originally announced April 2020.

  26. arXiv:2002.10055  [pdf, other

    cs.CR

    Ensuring Privacy in Location-Based Services: A Model-based Approach

    Authors: Alireza Partovi, Wei Zheng, Taeho Jung, Hai Lin

    Abstract: In recent years, the widespread of mobile devices equipped with GPS and communication chips has led to the growing use of location-based services (LBS) in which a user receives a service based on his current location. The disclosure of user's location, however, can raise serious concerns about user privacy in general, and location privacy in particular which led to the development of various locat… ▽ More

    Submitted 23 February, 2020; originally announced February 2020.

  27. arXiv:2001.11569  [pdf, ps, other

    cs.HC cs.LG eess.SP

    Tiny noise, big mistakes: Adversarial perturbations induce errors in Brain-Computer Interface spellers

    Authors: Xiao Zhang, Dongrui Wu, Lieyun Ding, Hanbin Luo, Chin-Teng Lin, Tzyy-Ping Jung, Ricardo Chavarriaga

    Abstract: An electroencephalogram (EEG) based brain-computer interface (BCI) speller allows a user to input text to a computer by thought. It is particularly useful to severely disabled individuals, e.g., amyotrophic lateral sclerosis patients, who have no other effective means of communication with another person or a computer. Most studies so far focused on making EEG-based BCI spellers faster and more re… ▽ More

    Submitted 16 July, 2020; v1 submitted 30 January, 2020; originally announced January 2020.

    Journal ref: National Science Review, 8(4), 2021

  28. arXiv:2001.11337  [pdf, other

    eess.SP cs.AI cs.HC

    EEG-based Brain-Computer Interfaces (BCIs): A Survey of Recent Studies on Signal Sensing Technologies and Computational Intelligence Approaches and their Applications

    Authors: Xiaotong Gu, Zehong Cao, Alireza Jolfaei, Peng Xu, Dongrui Wu, Tzyy-Ping Jung, Chin-Teng Lin

    Abstract: Brain-Computer Interface (BCI) is a powerful communication tool between users and systems, which enhances the capability of the human brain in communicating and interacting with the environment directly. Advances in neuroscience and computer science in the past decades have led to exciting developments in BCI, thereby making BCI a top interdisciplinary research area in computational neuroscience a… ▽ More

    Submitted 28 January, 2020; originally announced January 2020.

    Comments: Submitting to IEEE/ACM Transactions on Computational Biology and Bioinformatics

  29. arXiv:2001.00236  [pdf, other

    cs.CV cs.LG eess.IV

    Multi-lane Detection Using Instance Segmentation and Attentive Voting

    Authors: Donghoon Chang, Vinjohn Chirakkal, Shubham Goswami, Munawar Hasan, Taekwon Jung, Jinkeon Kang, Seok-Cheol Kee, Dongkyu Lee, Ajit Pratap Singh

    Abstract: Autonomous driving is becoming one of the leading industrial research areas. Therefore many automobile companies are coming up with semi to fully autonomous driving solutions. Among these solutions, lane detection is one of the vital driver-assist features that play a crucial role in the decision-making process of the autonomous vehicle. A variety of solutions have been proposed to detect lanes on… ▽ More

    Submitted 1 January, 2020; originally announced January 2020.

    Comments: Accepted in ICCAS 2019 - The 19th International Conference on Control, Automation and Systems, Corresponding Author: Shubham Goswami

  30. arXiv:1911.04606  [pdf, ps, other

    cs.CR cs.AI cs.LG eess.SP

    White-Box Target Attack for EEG-Based BCI Regression Problems

    Authors: Lubin Meng, Chin-Teng Lin, Tzyy-Ring Jung, Dongrui Wu

    Abstract: Machine learning has achieved great success in many applications, including electroencephalogram (EEG) based brain-computer interfaces (BCIs). Unfortunately, many machine learning models are vulnerable to adversarial examples, which are crafted by adding deliberately designed perturbations to the original inputs. Many adversarial attack approaches for classification problems have been proposed, bu… ▽ More

    Submitted 7 November, 2019; originally announced November 2019.

  31. arXiv:1911.04379  [pdf

    eess.IV cs.LG stat.AP stat.ML

    Modeling EEG data distribution with a Wasserstein Generative Adversarial Network to predict RSVP Events

    Authors: Sharaj Panwar, Paul Rad, Tzyy-Ping Jung, Yufei Huang

    Abstract: Electroencephalography (EEG) data are difficult to obtain due to complex experimental setups and reduced comfort with prolonged wearing. This poses challenges to train powerful deep learning model with the limited EEG data. Being able to generate EEG data computationally could address this limitation. We propose a novel Wasserstein Generative Adversarial Network with gradient penalty (WGAN-GP) to… ▽ More

    Submitted 1 July, 2020; v1 submitted 11 November, 2019; originally announced November 2019.

  32. arXiv:1908.11723  [pdf, other

    cs.CL

    Earlier Isn't Always Better: Sub-aspect Analysis on Corpus and System Biases in Summarization

    Authors: Taehee Jung, Dongyeop Kang, Lucas Mentch, Eduard Hovy

    Abstract: Despite the recent developments on neural summarization systems, the underlying logic behind the improvements from the systems and its corpus-dependency remains largely unexplored. Position of sentences in the original text, for example, is a well known bias for news summarization. Following in the spirit of the claim that summarization is a combination of sub-functions, we define three sub-aspect… ▽ More

    Submitted 30 August, 2019; originally announced August 2019.

    Comments: EMNLP 2019

  33. arXiv:1905.07039  [pdf, other

    cs.LG cs.HC eess.SP stat.ML

    Utilizing Deep Learning Towards Multi-modal Bio-sensing and Vision-based Affective Computing

    Authors: Siddharth Siddharth, Tzyy-Ping Jung, Terrence J. Sejnowski

    Abstract: In recent years, the use of bio-sensing signals such as electroencephalogram (EEG), electrocardiogram (ECG), etc. have garnered interest towards applications in affective computing. The parallel trend of deep-learning has led to a huge leap in performance towards solving various vision-based research problems such as object detection. Yet, these advances in deep-learning have not adequately transl… ▽ More

    Submitted 16 May, 2019; originally announced May 2019.

    Comments: Accepted for publication in IEEE Transactions on Affective Computing. This version on the arXiv is the updated version of the same manuscript

  34. arXiv:1904.07349  [pdf, other

    cs.DC cs.CV

    DLBC: A Deep Learning-Based Consensus in Blockchains for Deep Learning Services

    Authors: Boyang Li, Changhao Chenli, Xiaowei Xu, Yiyu Shi, Taeho Jung

    Abstract: With the increasing artificial intelligence application, deep neural network (DNN) has become an emerging task. However, to train a good deep learning model will suffer from enormous computation cost and energy consumption. Recently, blockchain has been widely used, and during its operation, a huge amount of computation resources are wasted for the Proof of Work (PoW) consensus. In this paper, we… ▽ More

    Submitted 30 January, 2020; v1 submitted 15 April, 2019; originally announced April 2019.

  35. Energy-recycling Blockchain with Proof-of-Deep-Learning

    Authors: Changhao Chenli, Boyang Li, Yiyu Shi, Taeho Jung

    Abstract: An enormous amount of energy is wasted in Proofof-Work (PoW) mechanisms adopted by popular blockchain applications (e.g., PoW-based cryptocurrencies), because miners must conduct a large amount of computation. Owing to this, one serious rising concern is that the energy waste not only dilutes the value of the blockchain but also hinders its further application. In this paper, we propose a novel bl… ▽ More

    Submitted 11 February, 2019; originally announced February 2019.

    Comments: 5 pages

  36. arXiv:1810.02842  [pdf, other

    q-bio.NC cs.HC cs.LG eess.SP

    Cross-Subject Transfer Learning Improves the Practicality of Real-World Applications of Brain-Computer Interfaces

    Authors: Kuan-Jung Chiang, Chun-Shu Wei, Masaki Nakanishi, Tzyy-Ping Jung

    Abstract: Steady-state visual evoked potential (SSVEP)-based brain-computer interfaces (BCIs) have shown its robustness in facilitating high-efficiency communication. State-of-the-art training-based SSVEP decoding methods such as extended Canonical Correlation Analysis (CCA) and Task-Related Component Analysis (TRCA) are the major players that elevate the efficiency of the SSVEP-based BCIs through a calibra… ▽ More

    Submitted 13 March, 2019; v1 submitted 5 October, 2018; originally announced October 2018.

    Comments: 4 pages, 3 figures, 1 table. For NER'19

  37. arXiv:1804.09452  [pdf, other

    cs.HC

    Multi-modal Approach for Affective Computing

    Authors: Siddharth Siddharth, Tzyy-Ping Jung, Terrence J. Sejnowski

    Abstract: Throughout the past decade, many studies have classified human emotions using only a single sensing modality such as face video, electroencephalogram (EEG), electrocardiogram (ECG), galvanic skin response (GSR), etc. The results of these studies are constrained by the limitations of these modalities such as the absence of physiological biomarkers in the face-video analysis, poor spatial resolution… ▽ More

    Submitted 20 June, 2018; v1 submitted 25 April, 2018; originally announced April 2018.

    Comments: Published in IEEE 40th International Engineering in Medicine and Biology Conference (EMBC) 2018

  38. arXiv:1802.07852  [pdf

    cs.HC

    An Affordable Bio-Sensing and Activity Tagging Platform for HCI Research

    Authors: Siddharth, Aashish Patel, Tzyy-Ping Jung, Terrence J. Sejnowski

    Abstract: We present a novel multi-modal bio-sensing platform capable of integrating multiple data streams for use in real-time applications. The system is composed of a central compute module and a companion headset. The compute node collects, time-stamps and transmits the data while also providing an interface for a wide range of sensors including electroencephalogram, photoplethysmogram, electrocardiogra… ▽ More

    Submitted 21 February, 2018; originally announced February 2018.

  39. arXiv:1711.11460  [pdf, other

    cs.CR cs.HC

    VoiceMask: Anonymize and Sanitize Voice Input on Mobile Devices

    Authors: Jianwei Qian, Haohua Du, Jiahui Hou, Linlin Chen, Taeho Jung, Xiang-Yang Li, Yu Wang, Yanbo Deng

    Abstract: Voice input has been tremendously improving the user experience of mobile devices by freeing our hands from typing on the small screen. Speech recognition is the key technology that powers voice input, and it is usually outsourced to the cloud for the best performance. However, the cloud might compromise users' privacy by identifying their identities by voice, learning their sensitive input conten… ▽ More

    Submitted 30 November, 2017; originally announced November 2017.

  40. arXiv:1710.10998  [pdf, other

    cs.SI

    Social Network De-anonymization: More Adversarial Knowledge, More Users Re-Identified?

    Authors: Jianwei Qian, Xiang-Yang Li, Yu Wang, Shaojie Tang, Taeho Jung, Yang Fan

    Abstract: Following the trend of data trading and data publishing, many online social networks have enabled potentially sensitive data to be exchanged or shared on the web. As a result, users' privacy could be exposed to malicious third parties since they are extremely vulnerable to de-anonymization attacks, i.e., the attacker links the anonymous nodes in the social network to their real identities with the… ▽ More

    Submitted 30 October, 2017; originally announced October 2017.

  41. arXiv:1704.08533  [pdf, ps, other

    cs.HC cs.LG

    EEG-Based User Reaction Time Estimation Using Riemannian Geometry Features

    Authors: Dongrui Wu, Brent J. Lance, Vernon J. Lawhern, Stephen Gordon, Tzyy-Ping Jung, Chin-Teng Lin

    Abstract: Riemannian geometry has been successfully used in many brain-computer interface (BCI) classification problems and demonstrated superior performance. In this paper, for the first time, it is applied to BCI regression problems, an important category of BCI applications. More specifically, we propose a new feature extraction approach for Electroencephalogram (EEG) based BCI regression problems: a spa… ▽ More

    Submitted 27 April, 2017; originally announced April 2017.

    Comments: arXiv admin note: text overlap with arXiv:1702.02914

    Journal ref: IEEE Trans. on Neural Systems and Rehabilitation Engineering, 25(11), pp. 2157-2168, 2017

  42. arXiv:1702.02914  [pdf, ps, other

    cs.LG cs.HC

    Spatial Filtering for EEG-Based Regression Problems in Brain-Computer Interface (BCI)

    Authors: Dongrui Wu, Jung-Tai King, Chun-Hsiang Chuang, Chin-Teng Lin, Tzyy-Ping Jung

    Abstract: Electroencephalogram (EEG) signals are frequently used in brain-computer interfaces (BCIs), but they are easily contaminated by artifacts and noises, so preprocessing must be done before they are fed into a machine learning algorithm for classification or regression. Spatial filters have been widely used to increase the signal-to-noise ratio of EEG for BCI classification problems, but their applic… ▽ More

    Submitted 9 February, 2017; originally announced February 2017.

    Journal ref: IEEE Trans. on Fuzzy Systems, 26(2), pp. 771-781, 2018

  43. arXiv:1410.6593  [pdf, ps, other

    cs.CR

    Cloud-based Privacy Preserving Image Storage, Sharing and Search

    Authors: Lan Zhang, Taeho Jung, Puchun Feng, Xiang-Yang Li, Yunhao Liu

    Abstract: High-resolution cameras produce huge volume of high quality images everyday. It is extremely challenging to store, share and especially search those huge images, for which increasing number of cloud services are presented to support such functionalities. However, images tend to contain rich sensitive information (\eg, people, location and event), and people's privacy concerns hinder their readily… ▽ More

    Submitted 24 October, 2014; originally announced October 2014.

    Comments: 15 pages, 12 figures

  44. arXiv:1410.6589  [pdf, ps, other

    cs.CR

    Outsource Photo Sharing and Searching for Mobile Devices With Privacy Protection

    Authors: Lan Zhang, Taeho Jung, Cihang Liu, Xuan Ding, Xiang-Yang Li, Yunhao Liu

    Abstract: With the proliferation of mobile devices, cloud-based photo sharing and searching services are becoming common due to the mobile devices' resource constrains. Meanwhile, there is also increasing concern about privacy in photos. In this work, we present a framework \ourprotocolNSP, which enables cloud servers to provide privacy-preserving photo sharing and search as a service to mobile device users… ▽ More

    Submitted 24 October, 2014; originally announced October 2014.

    Comments: 10 pages, 13 figures

  45. arXiv:1404.5122  [pdf, ps, other

    cs.IT cs.LG stat.ML

    Spatiotemporal Sparse Bayesian Learning with Applications to Compressed Sensing of Multichannel Physiological Signals

    Authors: Zhilin Zhang, Tzyy-Ping Jung, Scott Makeig, Zhouyue Pi, Bhaskar D. Rao

    Abstract: Energy consumption is an important issue in continuous wireless telemonitoring of physiological signals. Compressed sensing (CS) is a promising framework to address it, due to its energy-efficient data compression procedure. However, most CS algorithms have difficulty in data recovery due to non-sparsity characteristic of many physiological signals. Block sparse Bayesian learning (BSBL) is an effe… ▽ More

    Submitted 14 November, 2014; v1 submitted 21 April, 2014; originally announced April 2014.

    Comments: Codes are available at: https://sites.google.com/site/researchbyzhang/stsbl

    Journal ref: IEEE Transactions On Neural Systems And Rehabilitation Engineering, Vol. 22, No. 6, pp. 1186-1197, November 2014

  46. arXiv:1311.3995  [pdf, ps, other

    cs.IT stat.ML

    Compressed Sensing for Energy-Efficient Wireless Telemonitoring: Challenges and Opportunities

    Authors: Zhilin Zhang, Bhaskar D. Rao, Tzyy-Ping Jung

    Abstract: As a lossy compression framework, compressed sensing has drawn much attention in wireless telemonitoring of biosignals due to its ability to reduce energy consumption and make possible the design of low-power devices. However, the non-sparseness of biosignals presents a major challenge to compressed sensing. This study proposes and evaluates a spatio-temporal sparse Bayesian learning algorithm, wh… ▽ More

    Submitted 21 April, 2014; v1 submitted 15 November, 2013; originally announced November 2013.

    Comments: Invited paper for 2013 Asilomar Conference on Signals, Systems & Computers (Asilomar 2013)

  47. arXiv:1310.8187  [pdf, ps, other

    cs.NI cs.CY eess.SY

    SmartLoc: Sensing Landmarks Silently for Smartphone Based Metropolitan Localization

    Authors: Cheng Bo, Xiang-Yang Li, Taeho Jung, Xufei Mao

    Abstract: We present \emph{SmartLoc}, a localization system to estimate the location and the traveling distance by leveraging the lower-power inertial sensors embedded in smartphones as a supplementary to GPS. To minimize the negative impact of sensor noises, \emph{SmartLoc} exploits the intermittent strong GPS signals and uses the linear regression to build a prediction model which is based on the trace es… ▽ More

    Submitted 31 August, 2013; originally announced October 2013.

  48. Enabling Privacy-preserving Auctions in Big Data

    Authors: Taeho Jung, Xiang-Yang Li

    Abstract: We study how to enable auctions in the big data context to solve many upcoming data-based decision problems in the near future. We consider the characteristics of the big data including, but not limited to, velocity, volume, variety, and veracity, and we believe any auction mechanism design in the future should take the following factors into consideration: 1) generality (variety); 2) efficiency a… ▽ More

    Submitted 21 January, 2015; v1 submitted 28 August, 2013; originally announced August 2013.

    Journal ref: 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp 173-178

  49. PDA: Semantically Secure Time-Series Data Analytics with Dynamic Subgroups

    Authors: Taeho Jung, Junze Han, Xiang-Yang Li

    Abstract: Third-party analysis on private records is becoming increasingly important due to the widespread data collection for various analysis purposes. However, the data in its original form often contains sensitive information about individuals, and its publication will severely breach their privacy. In this paper, we present a novel Privacy-preserving Data Analytics framework PDA, which allows a third-p… ▽ More

    Submitted 25 September, 2015; v1 submitted 28 August, 2013; originally announced August 2013.

  50. A General Framework for Privacy-Preserving Distributed Greedy Algorithm

    Authors: Taeho Jung, Xiang-Yang Li, Lan Zhang

    Abstract: Increasingly more attention is paid to the privacy in online applications due to the widespread data collection for various analysis purposes. Sensitive information might be mined from the raw data during the analysis, and this led to a great privacy concern among people (data providers) these days. To deal with this privacy concerns, multitudes of privacy-preserving computation schemes are propos… ▽ More

    Submitted 25 July, 2014; v1 submitted 8 July, 2013; originally announced July 2013.

    Comments: This paper has been withdrawn due to personal reasons

    Journal ref: BigCom 2015, LNCS 9196, pp. 88-102, 2015