Skip to main content

Showing 1–37 of 37 results for author: Le, X

  1. arXiv:2407.08713  [pdf, other

    cs.CL cs.AI

    GTA: A Benchmark for General Tool Agents

    Authors: Jize Wang, Zerun Ma, Yining Li, Songyang Zhang, Cailian Chen, Kai Chen, Xinyi Le

    Abstract: Significant focus has been placed on integrating large language models (LLMs) with various tools in developing general-purpose agents. This poses a challenge to LLMs' tool-use capabilities. However, there are evident gaps between existing tool-use evaluations and real-world scenarios. Current evaluations often use AI-generated queries, single-step tasks, dummy tools, and text-only interactions, fa… ▽ More

    Submitted 11 July, 2024; originally announced July 2024.

    Comments: Github repo: https://github.com/open-compass/GTA

  2. arXiv:2405.14608  [pdf, other

    cs.LG cs.AI

    ShapeFormer: Shapelet Transformer for Multivariate Time Series Classification

    Authors: Xuan-May Le, Ling Luo, Uwe Aickelin, Minh-Tuan Tran

    Abstract: Multivariate time series classification (MTSC) has attracted significant research attention due to its diverse real-world applications. Recently, exploiting transformers for MTSC has achieved state-of-the-art performance. However, existing methods focus on generic features, providing a comprehensive understanding of data, but they ignore class-specific features crucial for learning the representat… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

    Comments: Accepted at KDD 2024

  3. arXiv:2403.14101  [pdf, other

    cs.CV cs.CL cs.LG

    Text-Enhanced Data-free Approach for Federated Class-Incremental Learning

    Authors: Minh-Tuan Tran, Trung Le, Xuan-May Le, Mehrtash Harandi, Dinh Phung

    Abstract: Federated Class-Incremental Learning (FCIL) is an underexplored yet pivotal issue, involving the dynamic addition of new classes in the context of federated learning. In this field, Data-Free Knowledge Transfer (DFKT) plays a crucial role in addressing catastrophic forgetting and data privacy problems. However, prior approaches lack the crucial synergy between DFKT and the model training phases, c… ▽ More

    Submitted 20 March, 2024; originally announced March 2024.

    Comments: Accepted at CVPR 2024

  4. arXiv:2311.11340  [pdf, other

    cs.RO

    RflyMAD: A Dataset for Multicopter Fault Detection and Health Assessment

    Authors: Xiangli Le, Bo Jin, Gen Cui, Xunhua Dai, Quan Quan

    Abstract: This paper presents an open-source dataset RflyMAD, a Multicopter Abnomal Dataset developed by Reliable Flight Control (Rfly) Group aiming to promote the development of research fields like fault detection and isolation (FDI) or health assessment (HA). The entire 114 GB dataset includes 11 types of faults under 6 flight statuses which are adapted from ADS-33 file to cover more occasions in which t… ▽ More

    Submitted 11 January, 2024; v1 submitted 19 November, 2023; originally announced November 2023.

  5. arXiv:2310.00258  [pdf, other

    cs.CV

    NAYER: Noisy Layer Data Generation for Efficient and Effective Data-free Knowledge Distillation

    Authors: Minh-Tuan Tran, Trung Le, Xuan-May Le, Mehrtash Harandi, Quan Hung Tran, Dinh Phung

    Abstract: Data-Free Knowledge Distillation (DFKD) has made significant recent strides by transferring knowledge from a teacher neural network to a student neural network without accessing the original data. Nonetheless, existing approaches encounter a significant challenge when attempting to generate samples from random noise inputs, which inherently lack meaningful information. Consequently, these models s… ▽ More

    Submitted 21 March, 2024; v1 submitted 30 September, 2023; originally announced October 2023.

    Comments: Accepted at CVPR 2024

  6. arXiv:2308.11161  [pdf, other

    cs.SE

    Adversarial Attacks on Code Models with Discriminative Graph Patterns

    Authors: Thanh-Dat Nguyen, Yang Zhou, Xuan Bach D. Le, Patanamon, Thongtanunam, David Lo

    Abstract: Pre-trained language models of code are now widely used in various software engineering tasks such as code generation, code completion, vulnerability detection, etc. This, in turn, poses security and reliability risks to these models. One of the important threats is \textit{adversarial attacks}, which can lead to erroneous predictions and largely affect model performance on downstream tasks. Curre… ▽ More

    Submitted 21 August, 2023; originally announced August 2023.

  7. arXiv:2307.12596  [pdf, other

    cs.SE

    Refining ChatGPT-Generated Code: Characterizing and Mitigating Code Quality Issues

    Authors: Yue Liu, Thanh Le-Cong, Ratnadira Widyasari, Chakkrit Tantithamthavorn, Li Li, Xuan-Bach D. Le, David Lo

    Abstract: We systematically study the quality of 4,066 ChatGPT-generated code implemented in two popular programming languages, i.e., Java and Python, for 2,033 programming tasks. The goal of this work is three folds. First, we analyze the correctness of ChatGPT on code generation tasks and uncover the factors that influence its effectiveness, including task difficulty, programming language, time that tasks… ▽ More

    Submitted 14 December, 2023; v1 submitted 24 July, 2023; originally announced July 2023.

  8. arXiv:2306.00812  [pdf, other

    eess.AS cs.SD

    Harmonic enhancement using learnable comb filter for light-weight full-band speech enhancement model

    Authors: Xiaohuai Le, Tong Lei, Li Chen, Yiqing Guo, Chao He, Cheng Chen, Xianjun Xia, Hua Gao, Yijian Xiao, Piao Ding, Shenyi Song, Jing Lu

    Abstract: With fewer feature dimensions, filter banks are often used in light-weight full-band speech enhancement models. In order to further enhance the coarse speech in the sub-band domain, it is necessary to apply a post-filtering for harmonic retrieval. The signal processing-based comb filters used in RNNoise and PercepNet have limited performance and may cause speech quality degradation due to inaccura… ▽ More

    Submitted 1 June, 2023; originally announced June 2023.

    Comments: accepted by Interspeech 2023

  9. arXiv:2305.13884  [pdf, other

    cs.CR cs.AI cs.SE

    Multi-Granularity Detector for Vulnerability Fixes

    Authors: Truong Giang Nguyen, Thanh Le-Cong, Hong Jin Kang, Ratnadira Widyasari, Chengran Yang, Zhipeng Zhao, Bowen Xu, Jiayuan Zhou, Xin Xia, Ahmed E. Hassan, Xuan-Bach D. Le, David Lo

    Abstract: With the increasing reliance on Open Source Software, users are exposed to third-party library vulnerabilities. Software Composition Analysis (SCA) tools have been created to alert users of such vulnerabilities. SCA requires the identification of vulnerability-fixing commits. Prior works have proposed methods that can automatically identify such vulnerability-fixing commits. However, identifying s… ▽ More

    Submitted 23 May, 2023; originally announced May 2023.

    Journal ref: IEEE Transactions on Software Engineering, 2023

  10. arXiv:2302.09953  [pdf, other

    eess.AS cs.SD

    Personalized speech enhancement combining band-split RNN and speaker attentive module

    Authors: Xiaohuai Le, Li Chen, Chao He, Yiqing Guo, Cheng Chen, Xianjun Xia, Jing Lu

    Abstract: Target speaker information can be utilized in speech enhancement (SE) models to more effectively extract the desired speech. Previous works introduce the speaker embedding into speech enhancement models by means of concatenation or affine transformation. In this paper, we propose a speaker attentive module to calculate the attention scores between the speaker embedding and the intermediate feature… ▽ More

    Submitted 16 March, 2023; v1 submitted 20 February, 2023; originally announced February 2023.

  11. arXiv:2301.03944  [pdf, other

    cs.SE cs.CR

    CHRONOS: Time-Aware Zero-Shot Identification of Libraries from Vulnerability Reports

    Authors: Yunbo Lyu, Thanh Le-Cong, Hong Jin Kang, Ratnadira Widyasari, Zhipeng Zhao, Xuan-Bach D. Le, Ming Li, David Lo

    Abstract: Tools that alert developers about library vulnerabilities depend on accurate, up-to-date vulnerability databases which are maintained by security researchers. These databases record the libraries related to each vulnerability. However, the vulnerability reports may not explicitly list every library and human analysis is required to determine all the relevant libraries. Human analysis may be slow a… ▽ More

    Submitted 29 July, 2023; v1 submitted 10 January, 2023; originally announced January 2023.

    Comments: Accepted to the Technical Track of ICSE 2023

  12. Invalidator: Automated Patch Correctness Assessment via Semantic and Syntactic Reasoning

    Authors: Thanh Le-Cong, Duc-Minh Luong, Xuan Bach D. Le, David Lo, Nhat-Hoa Tran, Bui Quang-Huy, Quyet-Thang Huynh

    Abstract: Automated program repair (APR) faces the challenge of test overfitting, where generated patches pass validation tests but fail to generalize. Existing methods for patch assessment involve generating new tests or manual inspection, which can be time-consuming or biased. In this paper, we propose a novel technique, INVALIDATOR, to automatically assess the correctness of APR-generated patches via sem… ▽ More

    Submitted 17 March, 2023; v1 submitted 3 January, 2023; originally announced January 2023.

    Journal ref: IEEE Transactions on Software Engineering, 2023

  13. arXiv:2210.00616  [pdf, ps, other

    cs.LO

    An Efficient Cyclic Entailment Procedure in a Fragment of Separation Logic

    Authors: Quang Loc Le, Xuan-Bach D. Le

    Abstract: An efficient entailment proof system is essential to compositional verification using separation logic. Unfortunately, existing decision procedures are either inexpressive or inefficient. For example, Smallfoot is an efficient procedure but only works with hardwired lists and trees. Other procedures that can support general inductive predicates run exponentially in time as their proof search requi… ▽ More

    Submitted 2 October, 2022; originally announced October 2022.

  14. arXiv:2209.03260  [pdf, other

    cs.CR cs.AI cs.SE

    VulCurator: A Vulnerability-Fixing Commit Detector

    Authors: Truong Giang Nguyen, Thanh Le-Cong, Hong Jin Kang, Xuan-Bach D. Le, David Lo

    Abstract: Open-source software (OSS) vulnerability management process is important nowadays, as the number of discovered OSS vulnerabilities is increasing over time. Monitoring vulnerability-fixing commits is a part of the standard process to prevent vulnerability exploitation. Manually detecting vulnerability-fixing commits is, however, time consuming due to the possibly large number of commits to review.… ▽ More

    Submitted 7 September, 2022; originally announced September 2022.

    Comments: accepted to ESEC/FSE 2022, Tool Demos Track

  15. AutoPruner: Transformer-Based Call Graph Pruning

    Authors: Thanh Le-Cong, Hong Jin Kang, Truong Giang Nguyen, Stefanus Agus Haryono, David Lo, Xuan-Bach D. Le, Huynh Quyet Thang

    Abstract: Constructing a static call graph requires trade-offs between soundness and precision. Program analysis techniques for constructing call graphs are unfortunately usually imprecise. To address this problem, researchers have recently proposed call graph pruning empowered by machine learning to post-process call graphs constructed by static analysis. A machine learning model is built to capture inform… ▽ More

    Submitted 7 September, 2022; originally announced September 2022.

    Comments: Accepted to ESEC/FSE 2022, Research Track

  16. arXiv:2209.01816  [pdf, other

    cs.CV

    ADTR: Anomaly Detection Transformer with Feature Reconstruction

    Authors: Zhiyuan You, Kai Yang, Wenhan Luo, Lei Cui, Yu Zheng, Xinyi Le

    Abstract: Anomaly detection with only prior knowledge from normal samples attracts more attention because of the lack of anomaly samples. Existing CNN-based pixel reconstruction approaches suffer from two concerns. First, the reconstruction source and target are raw pixel values that contain indistinguishable semantic information. Second, CNN tends to reconstruct both normal samples and anomalies well, maki… ▽ More

    Submitted 9 December, 2022; v1 submitted 5 September, 2022; originally announced September 2022.

    Comments: Accepted by ICONIP 2022

  17. Inference skipping for more efficient real-time speech enhancement with parallel RNNs

    Authors: Xiaohuai Le, Tong Lei, Kai Chen, Jing Lu

    Abstract: Deep neural network (DNN) based speech enhancement models have attracted extensive attention due to their promising performance. However, it is difficult to deploy a powerful DNN in real-time applications because of its high computational cost. Typical compression methods such as pruning and quantization do not make good use of the data characteristics. In this paper, we introduce the Skip-RNN str… ▽ More

    Submitted 22 July, 2022; originally announced July 2022.

    Comments: 11 pages, 8 figures, accepted by IEEE/ACM TASLP

  18. arXiv:2206.14524  [pdf

    eess.AS cs.SD

    A light-weight full-band speech enhancement model

    Authors: Qinwen Hu, Zhongshu Hou, Xiaohuai Le, Jing Lu

    Abstract: Deep neural network based full-band speech enhancement systems face challenges of high demand of computational resources and imbalanced frequency distribution. In this paper, a light-weight full-band model is proposed with two dedicated strategies, i.e., a learnable spectral compression mapping for more effective high-band spectral information compression, and the utilization of the multi-head att… ▽ More

    Submitted 3 July, 2022; v1 submitted 29 June, 2022; originally announced June 2022.

  19. arXiv:2206.03687  [pdf, other

    cs.CV

    A Unified Model for Multi-class Anomaly Detection

    Authors: Zhiyuan You, Lei Cui, Yujun Shen, Kai Yang, Xin Lu, Yu Zheng, Xinyi Le

    Abstract: Despite the rapid advance of unsupervised anomaly detection, existing methods require to train separate models for different objects. In this work, we present UniAD that accomplishes anomaly detection for multiple classes with a unified framework. Under such a challenging setting, popular reconstruction networks may fall into an "identical shortcut", where both normal and anomalous samples can be… ▽ More

    Submitted 25 October, 2022; v1 submitted 8 June, 2022; originally announced June 2022.

    Comments: Accepted by NeurIPS 2022

  20. arXiv:2204.08024  [pdf

    cs.CV

    The Z-axis, X-axis, Weight and Disambiguation Methods for Constructing Local Reference Frame in 3D Registration: An Evaluation

    Authors: Bao Zhao, Xianyong Fang, Jiahui Yue, Xiaobo Chen, Xinyi Le, Chanjuan Zhao

    Abstract: The local reference frame (LRF), as an independent coordinate system generated on a local 3D surface, is widely used in 3D local feature descriptor construction and 3D transformation estimation which are two key steps in the local method-based surface matching. There are numerous LRF methods have been proposed in literatures. In these methods, the x- and z-axis are commonly generated by different… ▽ More

    Submitted 17 April, 2022; originally announced April 2022.

  21. arXiv:2203.03884  [pdf, other

    cs.CV

    Semi-Supervised Semantic Segmentation Using Unreliable Pseudo-Labels

    Authors: Yuchao Wang, Haochen Wang, Yujun Shen, Jingjing Fei, Wei Li, Guoqiang Jin, Liwei Wu, Rui Zhao, Xinyi Le

    Abstract: The crux of semi-supervised semantic segmentation is to assign adequate pseudo-labels to the pixels of unlabeled images. A common practice is to select the highly confident predictions as the pseudo ground-truth, but it leads to a problem that most pixels may be left unused due to their unreliability. We argue that every pixel matters to the model training, even its prediction is ambiguous. Intuit… ▽ More

    Submitted 14 March, 2022; v1 submitted 8 March, 2022; originally announced March 2022.

    Comments: Accepted to CVPR 2022. Project: https://haochen-wang409.github.io/U2PL/

  22. arXiv:2201.08959  [pdf, other

    cs.CV

    Few-shot Object Counting with Similarity-Aware Feature Enhancement

    Authors: Zhiyuan You, Kai Yang, Wenhan Luo, Xin Lu, Lei Cui, Xinyi Le

    Abstract: This work studies the problem of few-shot object counting, which counts the number of exemplar objects (i.e., described by one or several support images) occurring in the query image. The major challenge lies in that the target objects can be densely packed in the query image, making it hard to recognize every single one. To tackle the obstacle, we propose a novel learning block, equipped with a s… ▽ More

    Submitted 10 September, 2022; v1 submitted 21 January, 2022; originally announced January 2022.

    Comments: Accepted by WACV 2023

  23. arXiv:2201.00117  [pdf, other

    cs.SE cs.NE

    Usability and Aesthetics: Better Together for Automated Repair of Web Pages

    Authors: Thanh Le-Cong, Xuan Bach D. Le, Quyet-Thang Huynh, Phi-Le Nguyen

    Abstract: With the recent explosive growth of mobile devices such as smartphones or tablets, guaranteeing consistent web appearance across all environments has become a significant problem. This happens simply because it is hard to keep track of the web appearance on different sizes and types of devices that render the web pages. Therefore, fixing the inconsistent appearance of web pages can be difficult, a… ▽ More

    Submitted 1 January, 2022; originally announced January 2022.

    Comments: Accepted to ISSRE 2021, Research Track

    Journal ref: 2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE 2021)

  24. arXiv:2201.00115  [pdf, other

    cs.SE cs.LG

    Toward the Analysis of Graph Neural Networks

    Authors: Thanh-Dat Nguyen, Thanh Le-Cong, ThanhVu H. Nguyen, Xuan-Bach D. Le, Quyet-Thang Huynh

    Abstract: Graph Neural Networks (GNNs) have recently emerged as a robust framework for graph-structured data. They have been applied to many problems such as knowledge graph analysis, social networks recommendation, and even Covid19 detection and vaccine developments. However, unlike other deep neural networks such as Feed Forward Neural Networks (FFNNs), few analyses such as verification and property infer… ▽ More

    Submitted 31 December, 2021; originally announced January 2022.

    Comments: Accepted to ICSE 2022, NIER track

    Journal ref: The 44th IEEE/ACM International Conference on Software Engineering (ICSE 2022)

  25. arXiv:2107.05429  [pdf, other

    cs.SD eess.AS

    DPCRN: Dual-Path Convolution Recurrent Network for Single Channel Speech Enhancement

    Authors: Xiaohuai Le, Hongsheng Chen, Kai Chen, Jing Lu

    Abstract: The dual-path RNN (DPRNN) was proposed to more effectively model extremely long sequences for speech separation in the time domain. By splitting long sequences to smaller chunks and applying intra-chunk and inter-chunk RNNs, the DPRNN reached promising performance in speech separation with a limited model size. In this paper, we combine the DPRNN module with Convolution Recurrent Network (CRN) and… ▽ More

    Submitted 12 July, 2021; originally announced July 2021.

    Comments: 5 pages, 1 figure, accepted by Interspeech 2021

  26. arXiv:2010.02340  [pdf, ps, other

    cs.LO cs.PL

    Complexity Analysis of Tree Share Structure

    Authors: Xuan-Bach Le, Aquinas Hobor, Anthony W. Lin

    Abstract: The tree share structure proposed by Dockins et al. is an elegant model for tracking disjoint ownership in concurrent separation logic, but decision procedures for tree shares are hard to implement due to a lack of a systematic theoretical study. We show that the first-order theory of the full Boolean algebra of tree shares (that is, with all tree-share constants) is decidable and has the same com… ▽ More

    Submitted 5 October, 2020; originally announced October 2020.

    Comments: 20 pages including appendix. Published at the 16th Asian Symposium on Programming Languages and Systems (APLAS 2018) in December 2018

  27. arXiv:2009.05977  [pdf, other

    cs.AI

    Transfer learning with class-weighted and focal loss function for automatic skin cancer classification

    Authors: Duyen N. T. Le, Hieu X. Le, Lua T. Ngo, Hoan T. Ngo

    Abstract: Skin cancer is by far in top-3 of the world's most common cancer. Among different skin cancer types, melanoma is particularly dangerous because of its ability to metastasize. Early detection is the key to success in skin cancer treatment. However, skin cancer diagnosis is still a challenge, even for experienced dermatologists, due to strong resemblances between benign and malignant lesions. To aid… ▽ More

    Submitted 13 September, 2020; originally announced September 2020.

    Comments: 7 pages, 8 figures

  28. arXiv:2009.05951  [pdf, other

    cs.CV cs.AI

    Interpretation of smartphone-captured radiographs utilizing a deep learning-based approach

    Authors: Hieu X. Le, Phuong D. Nguyen, Thang H. Nguyen, Khanh N. Q. Le, Thanh T. Nguyen

    Abstract: Recently, computer-aided diagnostic systems (CADs) that could automatically interpret medical images effectively have been the emerging subject of recent academic attention. For radiographs, several deep learning-based systems or models have been developed to study the multi-label diseases recognition tasks. However, none of them have been trained to work on smartphone-captured chest radiographs.… ▽ More

    Submitted 13 September, 2020; originally announced September 2020.

    Comments: 10 pages, 5 tables, 4 figures

  29. arXiv:2008.06828  [pdf, other

    cs.CV cs.LG eess.IV

    A novel approach to remove foreign objects from chest X-ray images

    Authors: Hieu X. Le, Phuong D. Nguyen, Thang H. Nguyen, Khanh N. Q. Le, Thanh T. Nguyen

    Abstract: We initially proposed a deep learning approach for foreign objects inpainting in smartphone-camera captured chest radiographs utilizing the cheXphoto dataset. Foreign objects which can significantly affect the quality of a computer-aided diagnostic prediction are captured under various settings. In this paper, we used multi-method to tackle both removal and inpainting chest radiographs. Firstly, a… ▽ More

    Submitted 15 August, 2020; originally announced August 2020.

    Comments: 9 pages, 7 figures, 7 tables

  30. arXiv:2003.00410  [pdf, other

    cs.CV cs.GR

    PF-Net: Point Fractal Network for 3D Point Cloud Completion

    Authors: Zitian Huang, Yikuan Yu, Jiawen Xu, Feng Ni, Xinyi Le

    Abstract: In this paper, we propose a Point Fractal Network (PF-Net), a novel learning-based approach for precise and high-fidelity point cloud completion. Unlike existing point cloud completion networks, which generate the overall shape of the point cloud from the incomplete point cloud and always change existing points and encounter noise and geometrical loss, PF-Net preserves the spatial arrangements of… ▽ More

    Submitted 1 March, 2020; originally announced March 2020.

  31. arXiv:1910.09455  [pdf, other

    cs.CV

    Depth-wise Decomposition for Accelerating Separable Convolutions in Efficient Convolutional Neural Networks

    Authors: Yihui He, Jianing Qian, Jianren Wang, Cindy X. Le, Congrui Hetang, Qi Lyu, Wenping Wang, Tianwei Yue

    Abstract: Very deep convolutional neural networks (CNNs) have been firmly established as the primary methods for many computer vision tasks. However, most state-of-the-art CNNs are large, which results in high inference latency. Recently, depth-wise separable convolution has been proposed for image recognition tasks on computationally limited platforms such as robotics and self-driving cars. Though it is mu… ▽ More

    Submitted 23 September, 2023; v1 submitted 21 October, 2019; originally announced October 2019.

  32. arXiv:1905.02914  [pdf, other

    cs.RO cs.AI eess.SY

    Adaptive neural network based dynamic surface control for uncertain dual arm robots

    Authors: Dung Tien Pham, Thai Van Nguyen, Hai Xuan Le, Linh Nguyen, Nguyen Huu Thai, Tuan Anh Phan, Hai Tuan Pham, Anh Hoai Duong

    Abstract: The paper discusses an adaptive strategy to effectively control nonlinear manipulation motions of a dual arm robot (DAR) under system uncertainties including parameter variations, actuator nonlinearities and external disturbances. It is proposed that the control scheme is first derived from the dynamic surface control (DSC) method, which allows the robot's end-effectors to robustly track the desir… ▽ More

    Submitted 8 May, 2019; originally announced May 2019.

  33. arXiv:1903.00728  [pdf, other

    cs.FL

    Monadic Decomposability of Regular Relations

    Authors: Pablo Barcelo, Chih-Duo Hong, Xuan-Bach Le, Anthony W. Lin, Reino Niskanen

    Abstract: Monadic decomposibility --- the ability to determine whether a formula in a given logical theory can be decomposed into a boolean combination of monadic formulas --- is a powerful tool for devising a decision procedure for a given logical theory. In this paper, we revisit a classical decision problem in automata theory: given a regular (a.k.a. synchronized rational) relation, determine whether it… ▽ More

    Submitted 8 May, 2019; v1 submitted 2 March, 2019; originally announced March 2019.

    Comments: Full version of the paper accepted to ICALP 2019

  34. arXiv:1901.05104  [pdf

    cs.CV

    A Comprehensive Performance Evaluation for 3D Transformation Estimation Techniques

    Authors: Bao Zhao, Xiaobo Chen, Xinyi Le, Juntong Xi

    Abstract: 3D local feature extraction and matching is the basis for solving many tasks in the area of computer vision, such as 3D registration, modeling, recognition and retrieval. However, this process commonly draws into false correspondences, due to noise, limited features, occlusion, incomplete surface and etc. In order to estimate accurate transformation based on these corrupted correspondences, numero… ▽ More

    Submitted 15 January, 2019; originally announced January 2019.

  35. arXiv:1805.05983  [pdf, other

    cs.SE

    On Reliability of Patch Correctness Assessment

    Authors: Xuan Bach D. Le, Lingfeng Bao, David Lo, Xin Xia, Shanping Li

    Abstract: Current state-of-the-art automatic software repair (ASR) techniques rely heavily on incomplete specifications, e.g., test suites, to generate repairs. This, however, may render ASR tools to generate incorrect repairs that do not generalize. To assess patch correctness, researchers have been following two typical ways separately: (1) Automated annotation, wherein patches are automatically labeled b… ▽ More

    Submitted 27 June, 2018; v1 submitted 15 May, 2018; originally announced May 2018.

  36. arXiv:1711.05368  [pdf

    cs.CV

    A Novel SDASS Descriptor for Fully Encoding the Information of 3D Local Surface

    Authors: Bao Zhao, Xinyi Le, Juntong Xi

    Abstract: Local feature description is a fundamental yet challenging task in 3D computer vision. This paper proposes a novel descriptor, named Statistic of Deviation Angles on Subdivided Space (SDASS), of encoding geometrical and spatial information of local surface on Local Reference Axis (LRA). In terms of encoding geometrical information, considering that surface normals, which are usually used for encod… ▽ More

    Submitted 26 June, 2018; v1 submitted 14 November, 2017; originally announced November 2017.

    Comments: 21 pages, 15 figures

  37. arXiv:1609.01935  [pdf

    cs.RO

    Path planning and Obstacle avoidance approaches for Mobile robot

    Authors: Hoc Thai Nguyen, Hai Xuan Le

    Abstract: A new path planning method for Mobile Robots (MR) has been developed and implemented. On the one hand, based on the shortest path from the start point to the goal point, this path planner can choose the best moving directions of the MR, which helps to reach the target point as soon as possible. On the other hand, with an intelligent obstacle avoidance, our method can find the target point with the… ▽ More

    Submitted 7 September, 2016; originally announced September 2016.