Skip to main content

Showing 1–29 of 29 results for author: Kao, H

  1. arXiv:2406.06375  [pdf, other

    cs.SD cs.AI eess.AS

    MOSA: Music Motion with Semantic Annotation Dataset for Cross-Modal Music Processing

    Authors: Yu-Fen Huang, Nikki Moran, Simon Coleman, Jon Kelly, Shun-Hwa Wei, Po-Yin Chen, Yun-Hsin Huang, Tsung-Ping Chen, Yu-Chia Kuo, Yu-Chi Wei, Chih-Hsuan Li, Da-Yu Huang, Hsuan-Kai Kao, Ting-Wei Lin, Li Su

    Abstract: In cross-modal music processing, translation between visual, auditory, and semantic content opens up new possibilities as well as challenges. The construction of such a transformative scheme depends upon a benchmark corpus with a comprehensive data infrastructure. In particular, the assembly of a large-scale cross-modal dataset presents major challenges. In this paper, we present the MOSA (Music m… ▽ More

    Submitted 10 June, 2024; originally announced June 2024.

    Comments: IEEE/ACM Transactions on Audio, Speech, and Language Processing, 2024. 14 pages, 7 figures. Dataset is available on: https://github.com/yufenhuang/MOSA-Music-mOtion-and-Semantic-Annotation-dataset/tree/main and https://zenodo.org/records/11393449

  2. arXiv:2402.13025  [pdf, other

    cs.CL cs.AI

    CFEVER: A Chinese Fact Extraction and VERification Dataset

    Authors: Ying-Jia Lin, Chun-Yi Lin, Chia-Jen Yeh, Yi-Ting Li, Yun-Yu Hu, Chih-Hao Hsu, Mei-Feng Lee, Hung-Yu Kao

    Abstract: We present CFEVER, a Chinese dataset designed for Fact Extraction and VERification. CFEVER comprises 30,012 manually created claims based on content in Chinese Wikipedia. Each claim in CFEVER is labeled as "Supports", "Refutes", or "Not Enough Info" to depict its degree of factualness. Similar to the FEVER dataset, claims in the "Supports" and "Refutes" categories are also annotated with correspon… ▽ More

    Submitted 20 February, 2024; originally announced February 2024.

    Comments: AAAI-24

  3. arXiv:2310.19185  [pdf, other

    cs.RO

    Robotic Barrier Construction through Weaved, Inflatable Tubes

    Authors: H. J. Kim, H. Abdel-Raziq, X. Liu, A. Y. Siskovic, S. Patil, K. H. Petersen, H. L. Kao

    Abstract: In this article, we present a mechanism and related path planning algorithm to construct light-duty barriers out of extruded, inflated tubes weaved around existing environmental features. Our extruded tubes are based on everted vine-robots and in this context, we present a new method to steer their growth. We characterize the mechanism in terms of accuracy resilience, and, towards their use as bar… ▽ More

    Submitted 29 October, 2023; originally announced October 2023.

  4. arXiv:2207.08141  [pdf, other

    cs.CL

    ELECTRA is a Zero-Shot Learner, Too

    Authors: Shiwen Ni, Hung-Yu Kao

    Abstract: Recently, for few-shot or even zero-shot learning, the new paradigm "pre-train, prompt, and predict" has achieved remarkable achievements compared with the "pre-train, fine-tune" paradigm. After the success of prompt-based GPT-3, a series of masked language model (MLM)-based (e.g., BERT, RoBERTa) prompt learning methods became popular and widely used. However, another efficient pre-trained discrim… ▽ More

    Submitted 20 July, 2022; v1 submitted 17 July, 2022; originally announced July 2022.

    Comments: The source code is available at: https://github.com/nishiwen1214/RTD-ELECTRA

  5. True or False: Does the Deep Learning Model Learn to Detect Rumors?

    Authors: Shiwen Ni, Jiawen Li, Hung-Yu Kao

    Abstract: It is difficult for humans to distinguish the true and false of rumors, but current deep learning models can surpass humans and achieve excellent accuracy on many rumor datasets. In this paper, we investigate whether deep learning models that seem to perform well actually learn to detect rumors. We evaluate models on their generalization ability to out-of-domain examples by fine-tuning BERT-based… ▽ More

    Submitted 30 November, 2021; originally announced December 2021.

    Comments: 5 pages, 3 figures, 8 tables

    Journal ref: 2021 International Conference on Technologies and Applications of Artificial Intelligence (TAAI)

  6. arXiv:2111.00781  [pdf, ps, other

    cs.LG cs.MA math.OC

    Decentralized Cooperative Reinforcement Learning with Hierarchical Information Structure

    Authors: Hsu Kao, Chen-Yu Wei, Vijay Subramanian

    Abstract: Multi-agent reinforcement learning (MARL) problems are challenging due to information asymmetry. To overcome this challenge, existing methods often require high level of coordination or communication between the agents. We consider two-agent multi-armed bandits (MABs) and Markov decision processes (MDPs) with a hierarchical information structure arising in applications, which we exploit to propose… ▽ More

    Submitted 1 November, 2021; originally announced November 2021.

  7. arXiv:2110.12603  [pdf, ps, other

    cs.LG cs.MA math.OC

    Common Information based Approximate State Representations in Multi-Agent Reinforcement Learning

    Authors: Hsu Kao, Vijay Subramanian

    Abstract: Due to information asymmetry, finding optimal policies for Decentralized Partially Observable Markov Decision Processes (Dec-POMDPs) is hard with the complexity growing doubly exponentially in the horizon length. The challenge increases greatly in the multi-agent reinforcement learning (MARL) setting where the transition probabilities, observation kernel, and reward function are unknown. Here, we… ▽ More

    Submitted 24 October, 2021; originally announced October 2021.

  8. arXiv:2110.00425  [pdf, other

    cs.CL cs.SI

    HAT4RD: Hierarchical Adversarial Training for Rumor Detection on Social Media

    Authors: Shiwen Ni, Jiawen Li, Hung-Yu Kao

    Abstract: With the development of social media, social communication has changed. While this facilitates people's communication and access to information, it also provides an ideal platform for spreading rumors. In normal or critical situations, rumors will affect people's judgment and even endanger social security. However, natural language is high-dimensional and sparse, and the same rumor may be expresse… ▽ More

    Submitted 29 August, 2022; v1 submitted 29 August, 2021; originally announced October 2021.

  9. arXiv:2108.12805  [pdf, other

    cs.LG cs.AI cs.CL

    DropAttack: A Masked Weight Adversarial Training Method to Improve Generalization of Neural Networks

    Authors: Shiwen Ni, Jiawen Li, Hung-Yu Kao

    Abstract: Adversarial training has been proven to be a powerful regularization method to improve the generalization of models. However, current adversarial training methods only attack the original input sample or the embedding vectors, and their attacks lack coverage and diversity. To further enhance the breadth and depth of attack, we propose a novel masked weight adversarial training method called DropAt… ▽ More

    Submitted 29 August, 2021; originally announced August 2021.

  10. arXiv:2107.10747  [pdf, other

    cs.SI

    Meet The Truth: Leverage Objective Facts and Subjective Views for Interpretable Rumor Detection

    Authors: Jiawen Li, Shiwen Ni, Hung-Yu Kao

    Abstract: Existing rumor detection strategies typically provide detection labels while ignoring their explanation. Nonetheless, providing pieces of evidence to explain why a suspicious tweet is rumor is essential. As such, a novel model, LOSIRD, was proposed in this paper. First, LOSIRD mines appropriate evidence sentences and classifies them by automatically checking the veracity of the relationship of the… ▽ More

    Submitted 21 July, 2021; originally announced July 2021.

  11. arXiv:2011.00259  [pdf

    cs.CL

    Rumor Detection on Twitter Using Multiloss Hierarchical BiLSTM with an Attenuation Factor

    Authors: Yudianto Sujana, Jiawen Li, Hung-Yu Kao

    Abstract: Social media platforms such as Twitter have become a breeding ground for unverified information or rumors. These rumors can threaten people's health, endanger the economy, and affect the stability of a country. Many researchers have developed models to classify rumors using traditional machine learning or vanilla deep learning models. However, previous studies on rumor detection have achieved low… ▽ More

    Submitted 14 December, 2020; v1 submitted 31 October, 2020; originally announced November 2020.

  12. arXiv:2009.08015  [pdf, other

    cs.MM cs.AI cs.SD eess.AS eess.IV

    Temporally Guided Music-to-Body-Movement Generation

    Authors: Hsuan-Kai Kao, Li Su

    Abstract: This paper presents a neural network model to generate virtual violinist's 3-D skeleton movements from music audio. Improved from the conventional recurrent neural network models for generating 2-D skeleton data in previous works, the proposed model incorporates an encoder-decoder architecture, as well as the self-attention mechanism to model the complicated dynamics in body movement sequences. To… ▽ More

    Submitted 16 September, 2020; originally announced September 2020.

  13. A Human-Computer Duet System for Music Performance

    Authors: Yuen-Jen Lin, Hsuan-Kai Kao, Yih-Chih Tseng, Ming Tsai, Li Su

    Abstract: Virtual musicians have become a remarkable phenomenon in the contemporary multimedia arts. However, most of the virtual musicians nowadays have not been endowed with abilities to create their own behaviors, or to perform music with human musicians. In this paper, we firstly create a virtual violinist, who can collaborate with a human pianist to perform chamber music automatically without any inter… ▽ More

    Submitted 16 September, 2020; originally announced September 2020.

  14. arXiv:2002.04500  [pdf

    eess.IV cs.CV q-bio.QM

    Artificial Intelligence Assistance Significantly Improves Gleason Grading of Prostate Biopsies by Pathologists

    Authors: Wouter Bulten, Maschenka Balkenhol, Jean-Joël Awoumou Belinga, Américo Brilhante, Aslı Çakır, Xavier Farré, Katerina Geronatsiou, Vincent Molinié, Guilherme Pereira, Paromita Roy, Günter Saile, Paulo Salles, Ewout Schaafsma, Joëlle Tschui, Anne-Marie Vos, Hester van Boven, Robert Vink, Jeroen van der Laak, Christina Hulsbergen-van de Kaa, Geert Litjens

    Abstract: While the Gleason score is the most important prognostic marker for prostate cancer patients, it suffers from significant observer variability. Artificial Intelligence (AI) systems, based on deep learning, have proven to achieve pathologist-level performance at Gleason grading. However, the performance of such systems can degrade in the presence of artifacts, foreign tissue, or other anomalies. Pa… ▽ More

    Submitted 11 February, 2020; originally announced February 2020.

    Comments: 21 pages, 5 figures

    Journal ref: Modern Pathology, Available online 5 August 2020

  15. arXiv:1911.03380  [pdf, other

    q-fin.TR cs.MA math.OC

    An analysis of Uniswap markets

    Authors: Guillermo Angeris, Hsien-Tang Kao, Rei Chiang, Charlie Noyes, Tarun Chitra

    Abstract: Uniswap -- and other constant product markets -- appear to work well in practice despite their simplicity. In this paper, we give a simple formal analysis of constant product markets and their generalizations, showing that, under some common conditions, these markets must closely track the reference market price. We also show that Uniswap satisfies many other desirable properties and numerically d… ▽ More

    Submitted 9 February, 2021; v1 submitted 8 November, 2019; originally announced November 2019.

  16. Automated Gleason Grading of Prostate Biopsies using Deep Learning

    Authors: Wouter Bulten, Hans Pinckaers, Hester van Boven, Robert Vink, Thomas de Bel, Bram van Ginneken, Jeroen van der Laak, Christina Hulsbergen-van de Kaa, Geert Litjens

    Abstract: The Gleason score is the most important prognostic marker for prostate cancer patients but suffers from significant inter-observer variability. We developed a fully automated deep learning system to grade prostate biopsies. The system was developed using 5834 biopsies from 1243 patients. A semi-automatic labeling technique was used to circumvent the need for full manual annotation by pathologists.… ▽ More

    Submitted 18 July, 2019; originally announced July 2019.

    Comments: 13 pages, 6 figures

    Journal ref: The Lancet Oncology, Available online 8 January 2020

  17. arXiv:1907.07355  [pdf, other

    cs.CL

    Probing Neural Network Comprehension of Natural Language Arguments

    Authors: Timothy Niven, Hung-Yu Kao

    Abstract: We are surprised to find that BERT's peak performance of 77% on the Argument Reasoning Comprehension Task reaches just three points below the average untrained human baseline. However, we show that this result is entirely accounted for by exploitation of spurious statistical cues in the dataset. We analyze the nature of these cues and demonstrate that a range of models all exploit them. This analy… ▽ More

    Submitted 16 September, 2019; v1 submitted 17 July, 2019; originally announced July 2019.

    Comments: ACL 2019 (Updated Version)

  18. arXiv:1907.07347  [pdf, other

    cs.CL

    Fake News Detection as Natural Language Inference

    Authors: Kai-Chou Yang, Timothy Niven, Hung-Yu Kao

    Abstract: This report describes the entry by the Intelligent Knowledge Management (IKM) Lab in the WSDM 2019 Fake News Classification challenge. We treat the task as natural language inference (NLI). We individually train a number of the strongest NLI models as well as BERT. We ensemble these results and retrain with noisy labels in two stages. We analyze transitivity relations in the train and test sets an… ▽ More

    Submitted 17 July, 2019; originally announced July 2019.

  19. arXiv:1905.08846  [pdf, other

    cs.LG stat.ML

    Discovering Hidden Structure in High Dimensional Human Behavioral Data via Tensor Factorization

    Authors: Homa Hosseinmardi, Hsien-Te Kao, Kristina Lerman, Emilio Ferrara

    Abstract: In recent years, the rapid growth in technology has increased the opportunity for longitudinal human behavioral studies. Rich multimodal data, from wearables like Fitbit, online social networks, mobile phones etc. can be collected in natural environments. Uncovering the underlying low-dimensional structure of noisy multi-way data in an unsupervised setting is a challenging problem. Tensor factoriz… ▽ More

    Submitted 21 May, 2019; originally announced May 2019.

    Comments: 2018 WSDM Heteronam Workshop

    Journal ref: 2018 ACM International WSDM Conference, Heteronam Workshop

  20. arXiv:1811.11136  [pdf, other

    cs.CL cs.SI

    SOC: hunting the underground inside story of the ethereum Social-network Opinion and Comment

    Authors: TonTon Hsien-De Huang, Po-Wei Hong, Ying-Tse Lee, Yi-Lun Wang, Chi-Leong Lok, Hung-Yu Kao

    Abstract: The cryptocurrency is attracting more and more attention because of the blockchain technology. Ethereum is gaining a significant popularity in blockchain community, mainly due to the fact that it is designed in a way that enables developers to write smart contracts and decentralized applications (Dapps). There are many kinds of cryptocurrency information on the social network. The risks and fraud… ▽ More

    Submitted 27 November, 2018; originally announced November 2018.

    Comments: Draft

  21. Epithelium segmentation using deep learning in H&E-stained prostate specimens with immunohistochemistry as reference standard

    Authors: Wouter Bulten, Péter Bándi, Jeffrey Hoven, Rob van de Loo, Johannes Lotz, Nick Weiss, Jeroen van der Laak, Bram van Ginneken, Christina Hulsbergen-van de Kaa, Geert Litjens

    Abstract: Prostate cancer (PCa) is graded by pathologists by examining the architectural pattern of cancerous epithelial tissue on hematoxylin and eosin (H&E) stained slides. Given the importance of gland morphology, automatically differentiating between glandular epithelial tissue and other tissues is an important prerequisite for the development of automated methods for detecting PCa. We propose a new met… ▽ More

    Submitted 8 February, 2019; v1 submitted 17 August, 2018; originally announced August 2018.

    Journal ref: Nature Scientific Reports 9, 864 (2019)

  22. arXiv:1804.08266  [pdf, other

    cs.CL

    NLITrans at SemEval-2018 Task 12: Transfer of Semantic Knowledge for Argument Comprehension

    Authors: Tim Niven, Hung-Yu Kao

    Abstract: The Argument Reasoning Comprehension Task requires significant language understanding and complex reasoning over world knowledge. We focus on transfer of a sentence encoder to bootstrap more complicated models given the small size of the dataset. Our best model uses a pre-trained BiLSTM to encode input sentences, learns task-specific features for the argument and warrants, then performs independen… ▽ More

    Submitted 23 April, 2018; originally announced April 2018.

  23. arXiv:1803.00458  [pdf, ps, other

    cs.CY cs.HC cs.IR

    C-3PO: Click-sequence-aware DeeP Neural Network (DNN)-based Pop-uPs RecOmmendation

    Authors: TonTon Hsien-De Huang, Hung-Yu Kao

    Abstract: With the emergence of mobile and wearable devices, push notification becomes a powerful tool to connect and maintain the relationship with App users, but sending inappropriate or too many messages at the wrong time may result in the App being removed by the users. In order to maintain the retention rate and the delivery rate of advertisement, we adopt Deep Neural Network (DNN) to develop a pop-up… ▽ More

    Submitted 20 December, 2018; v1 submitted 28 February, 2018; originally announced March 2018.

    Comments: 2018/12/20

  24. arXiv:1710.05305  [pdf, other

    cs.CR cs.CY

    Data-Driven and Deep Learning Methodology for Deceptive Advertising and Phone Scams Detection

    Authors: TonTon Hsien-De Huang, Chia-Mu Yu, Hung-Yu Kao

    Abstract: The advance of smartphones and cellular networks boosts the need of mobile advertising and targeted marketing. However, it also triggers the unseen security threats. We found that the phone scams with fake calling numbers of very short lifetime are increasingly popular and have been used to trick the users. The harm is worldwide. On the other hand, deceptive advertising (deceptive ads), the fake a… ▽ More

    Submitted 15 October, 2017; originally announced October 2017.

    Comments: 6 pages, TAAI 2017 version

  25. arXiv:1705.04448  [pdf, other

    cs.CR cs.AI

    R2-D2: ColoR-inspired Convolutional NeuRal Network (CNN)-based AndroiD Malware Detections

    Authors: TonTon Hsien-De Huang, Hung-Yu Kao

    Abstract: The influence of Deep Learning on image identification and natural language processing has attracted enormous attention globally. The convolution neural network that can learn without prior extraction of features fits well in response to the rapid iteration of Android malware. The traditional solution for detecting Android malware requires continuous learning through pre-extracted features to main… ▽ More

    Submitted 15 November, 2018; v1 submitted 12 May, 2017; originally announced May 2017.

    Comments: Verison 2018/11/15, IEEE BigData 2018, Seattle, WA, USA, Dec 10-13, 2018. (Accepted)

  26. arXiv:1504.06018  [pdf, other

    cs.IT

    Blind Index Coding

    Authors: David T. H. Kao, Mohammad Ali Maddah-Ali, A. Salman Avestimehr

    Abstract: We introduce the blind index coding (BIC) problem, in which a single sender communicates distinct messages to multiple users over a shared channel. Each user has partial knowledge of each message as side information. However, unlike classic index coding, in BIC, the sender is uncertain of what side information is available to each user. In particular, the sender only knows the amount of bits in ea… ▽ More

    Submitted 1 September, 2015; v1 submitted 22 April, 2015; originally announced April 2015.

    Comments: Parts of this paper were presented at ISIT 2015 and ICC 2015

  27. arXiv:1504.04797  [pdf, other

    cs.IT

    Rover-to-Orbiter Communication in Mars: Taking Advantage of the Varying Topology

    Authors: Songze Li, David T. H. Kao, A. Salman Avestimehr

    Abstract: In this paper, we study the communication problem from rovers on Mars' surface to Mars-orbiting satellites. We first justify that, to a good extent, the rover-to-orbiter communication problem can be modelled as communication over a $2 \times 2$ X-channel with the network topology varying over time. For such a fading X-channel where transmitters are only aware of the time-varying topology but not t… ▽ More

    Submitted 10 December, 2015; v1 submitted 19 April, 2015; originally announced April 2015.

    Comments: 13 pages, 6 figures. Accepted by IEEE Transactions on Communications

  28. arXiv:1405.1091  [pdf, other

    cs.IT

    Linear Degrees of Freedom of the MIMO X-Channel with Delayed CSIT

    Authors: David T. H. Kao, A. Salman Avestimehr

    Abstract: We study the degrees of freedom (DoF) of the multiple-input multiple-output X-channel (MIMO XC) with delayed channel state information at the transmitters (delayed CSIT), assuming linear coding strategies at the transmitters. We present two results: 1) the linear sum DoF for MIMO XC with general antenna configurations, and 2) the linear DoF region for MIMO XC with symmetric antennas. The converse… ▽ More

    Submitted 5 May, 2014; originally announced May 2014.

    Comments: to be presented in part at ISIT 2014

  29. arXiv:1305.3934  [pdf, other

    cs.IT

    An Upper Bound on the Capacity of Vector Dirty Paper with Unknown Spin and Stretch

    Authors: David T. H. Kao, Ashutosh Sabharwal

    Abstract: Dirty paper codes are a powerful tool for combating known interference. However, there is a significant difference between knowing the transmitted interference sequence and knowing the received interference sequence, especially when the channel modifying the interference is uncertain. We present an upper bound on the capacity of a compound vector dirty paper channel where although an additive Gaus… ▽ More

    Submitted 16 May, 2013; originally announced May 2013.

    Comments: to be presented at ISIT 2013