Skip to main content

Showing 1–25 of 25 results for author: Lo, H

  1. arXiv:2404.19360  [pdf, other

    cs.CV cs.CL cs.IR

    Large Language Model Informed Patent Image Retrieval

    Authors: Hao-Cheng Lo, Jung-Mei Chu, Jieh Hsiang, Chun-Chieh Cho

    Abstract: In patent prosecution, image-based retrieval systems for identifying similarities between current patent images and prior art are pivotal to ensure the novelty and non-obviousness of patent applications. Despite their growing popularity in recent years, existing attempts, while effective at recognizing images within the same patent, fail to deliver practical value due to their limited generalizabi… ▽ More

    Submitted 30 April, 2024; originally announced April 2024.

    Comments: 8 pages. Under review

  2. arXiv:2403.15675  [pdf, other

    cs.CV

    An active learning model to classify animal species in Hong Kong

    Authors: Gareth Lamb, Ching Hei Lo, Jin Wu, Calvin K. F. Lee

    Abstract: Camera traps are used by ecologists globally as an efficient and non-invasive method to monitor animals. While it is time-consuming to manually label the collected images, recent advances in deep learning and computer vision has made it possible to automating this process [1]. A major obstacle to this is the generalisability of these models when applying these images to independently collected dat… ▽ More

    Submitted 22 March, 2024; originally announced March 2024.

    Comments: 6 pages, 2 figures, 1 table

  3. arXiv:2402.00421  [pdf, other

    cs.CL cs.HC cs.IR cs.LG

    From PARIS to LE-PARIS: Toward Patent Response Automation with Recommender Systems and Collaborative Large Language Models

    Authors: Jung-Mei Chu, Hao-Cheng Lo, Jieh Hsiang, Chun-Chieh Cho

    Abstract: In patent prosecution, timely and effective responses to Office Actions (OAs) are crucial for securing patents. However, past automation and artificial intelligence research have largely overlooked this aspect. To bridge this gap, our study introduces the Patent Office Action Response Intelligence System (PARIS) and its advanced version, the Large Language Model (LLM) Enhanced PARIS (LE-PARIS). Th… ▽ More

    Submitted 4 March, 2024; v1 submitted 1 February, 2024; originally announced February 2024.

    Comments: 28 pages, 5 figures, typos corrected, references added, under review

  4. arXiv:2309.11017  [pdf, other

    cs.ET

    3SAT on an All-to-All-Connected CMOS Ising Solver Chip

    Authors: Hüsrev Cılasun, Ziqing Zeng, Ramprasath S, Abhimanyu Kumar, Hao Lo, William Cho, Chris H. Kim, Ulya R. Karpuzcu, Sachin S. Sapatnekar

    Abstract: This work solves 3SAT, a classical NP-complete problem, on a CMOS-based Ising hardware chip with all-to-all connectivity. The paper addresses practical issues in going from algorithms to hardware. It considers several degrees of freedom in mapping the 3SAT problem to the chip - using multiple Ising formulations for 3SAT; exploring multiple strategies for decomposing large problems into subproblems… ▽ More

    Submitted 19 September, 2023; originally announced September 2023.

    ACM Class: B.7

  5. arXiv:2309.08325  [pdf, other

    cs.CL

    Distributional Inclusion Hypothesis and Quantifications: Probing for Hypernymy in Functional Distributional Semantics

    Authors: Chun Hei Lo, Wai Lam, Hong Cheng, Guy Emerson

    Abstract: Functional Distributional Semantics (FDS) models the meaning of words by truth-conditional functions. This provides a natural representation for hypernymy but no guarantee that it can be learnt when FDS models are trained on a corpus. In this paper, we probe into FDS models and study the representations learnt, drawing connections between quantifications, the Distributional Inclusion Hypothesis (D… ▽ More

    Submitted 10 February, 2024; v1 submitted 15 September, 2023; originally announced September 2023.

    Comments: 12 pages

  6. arXiv:2304.13789  [pdf, other

    cs.CR quant-ph

    Composable Security of Distributed Symmetric Key Exchange Protocol

    Authors: Jie Lin, Manfred von Willich, Hoi-Kwong Lo

    Abstract: The Distributed Symmetric Key Exchange (DSKE) protocol provides secure secret exchange (e.g., for key exchange) between two honest parties that need not have had prior contact, and use intermediaries with whom they each securely share confidential data. We show the composable security of the DSKE protocol in the constructive cryptography framework of Maurer. Specifically, we prove the security (co… ▽ More

    Submitted 26 April, 2023; originally announced April 2023.

    Comments: 15+6 pages, 5 figures

  7. arXiv:2205.00615  [pdf, other

    quant-ph cs.CR

    Distributed Symmetric Key Exchange: A scalable, quantum-proof key distribution system

    Authors: Hoi-Kwong Lo, Mattia Montagna, Manfred von Willich

    Abstract: We propose and implement a protocol for a scalable, cost-effective, information-theoretically secure key distribution and management system. The system, called Distributed Symmetric Key Exchange (DSKE), relies on pre-shared random numbers between DSKE clients and a group of Security Hubs. Any group of DSKE clients can use the DSKE protocol to distill from the pre-shared numbers a secret key. The c… ▽ More

    Submitted 24 November, 2022; v1 submitted 1 May, 2022; originally announced May 2022.

    Comments: Our protocol has been renamed Distributed Symmetric Key Exchange (DSKE). 11 pages, 6 figures

    MSC Class: 94A60 ACM Class: E.3

  8. arXiv:2110.13041  [pdf, other

    cs.LG cs.AR physics.data-an physics.ins-det

    Applications and Techniques for Fast Machine Learning in Science

    Authors: Allison McCarn Deiana, Nhan Tran, Joshua Agar, Michaela Blott, Giuseppe Di Guglielmo, Javier Duarte, Philip Harris, Scott Hauck, Mia Liu, Mark S. Neubauer, Jennifer Ngadiuba, Seda Ogrenci-Memik, Maurizio Pierini, Thea Aarrestad, Steffen Bahr, Jurgen Becker, Anne-Sophie Berthold, Richard J. Bonventre, Tomas E. Muller Bravo, Markus Diefenthaler, Zhen Dong, Nick Fritzsche, Amir Gholami, Ekaterina Govorkova, Kyle J Hazelwood , et al. (62 additional authors not shown)

    Abstract: In this community review report, we discuss applications and techniques for fast machine learning (ML) in science -- the concept of integrating power ML methods into the real-time experimental data processing loop to accelerate scientific discovery. The material for the report builds on two workshops held by the Fast ML for Science community and covers three main areas: applications for fast ML ac… ▽ More

    Submitted 25 October, 2021; originally announced October 2021.

    Comments: 66 pages, 13 figures, 5 tables

    Report number: FERMILAB-PUB-21-502-AD-E-SCD

    Journal ref: Front. Big Data 5, 787421 (2022)

  9. arXiv:2101.06066  [pdf, other

    cs.CL cs.AI

    Unstructured Knowledge Access in Task-oriented Dialog Modeling using Language Inference, Knowledge Retrieval and Knowledge-Integrative Response Generation

    Authors: Mudit Chaudhary, Borislav Dzodzo, Sida Huang, Chun Hei Lo, Mingzhi Lyu, Lun Yiu Nie, Jinbo Xing, Tianhua Zhang, Xiaoying Zhang, Jingyan Zhou, Hong Cheng, Wai Lam, Helen Meng

    Abstract: Dialog systems enriched with external knowledge can handle user queries that are outside the scope of the supporting databases/APIs. In this paper, we follow the baseline provided in DSTC9 Track 1 and propose three subsystems, KDEAK, KnowleDgEFactor, and Ens-GPT, which form the pipeline for a task-oriented dialog system capable of accessing unstructured knowledge. Specifically, KDEAK performs know… ▽ More

    Submitted 15 January, 2021; originally announced January 2021.

  10. arXiv:2009.13271  [pdf, other

    cs.LG eess.SP

    Embedding and generation of indoor climbing routes with variational autoencoder

    Authors: K. H. Lo

    Abstract: Recent increase in popularity of indoor climbing allows possible applications of deep learning algorthms to classify and generate climbing routes. In this work, we employ a variational autoencoder to climbing routes in a standardized training apparatus MoonBoard, a well-known training tool within the climbing community. By sampling the encoded latent space, it is observed that the algorithm can ge… ▽ More

    Submitted 16 September, 2020; originally announced September 2020.

  11. arXiv:1909.04749  [pdf, other

    cs.HC cs.IR

    Visual Analytics of Student Learning Behaviors on K-12 Mathematics E-learning Platforms

    Authors: Meng Xia, Huan Wei, Min Xu, Leo Yu Ho Lo, Yong Wang, Rong Zhang, Huamin Qu

    Abstract: With increasing popularity in online learning, a surge of E-learning platforms have emerged to facilitate education opportunities for k-12 (from kindergarten to 12th grade) students and with this, a wealth of information on their learning logs are getting recorded. However, it remains unclear how to make use of these detailed learning behavior data to improve the design of learning materials and g… ▽ More

    Submitted 21 September, 2019; v1 submitted 7 September, 2019; originally announced September 2019.

    Comments: 2 pages, 6 figures, 2019 VAST conference, Best Poster, Learning Analytics, Visual Analytic System for Education, Online Learning, Learning Data Analysis, Learning Trajectories Analysis, Mouse Movement

  12. arXiv:1707.06684  [pdf, other

    cs.DL

    ShortScience.org - Reproducing Intuition

    Authors: Joseph Paul Cohen, Henry Z. Lo

    Abstract: We present ShortScience.org, a platform for post-publication discussion of research papers. On ShortScience.org, the research community can read and write summaries of papers in order to increase accessible and reproducibility. Summaries contain the perspective and insight of other readers, why they liked or disliked it, and their attempt to demystify complicated sections. ShortScience.org has ove… ▽ More

    Submitted 20 July, 2017; originally announced July 2017.

    Comments: To appear in International Conference on Machine Learning 2017 Workshop on Reproducibility in Machine Learning

  13. arXiv:1703.08710  [pdf, other

    cs.CV cs.LG stat.ML

    Count-ception: Counting by Fully Convolutional Redundant Counting

    Authors: Joseph Paul Cohen, Genevieve Boucher, Craig A. Glastonbury, Henry Z. Lo, Yoshua Bengio

    Abstract: Counting objects in digital images is a process that should be replaced by machines. This tedious task is time consuming and prone to errors due to fatigue of human annotators. The goal is to have a system that takes as input an image and returns a count of the objects inside and justification for the prediction in the form of object localization. We repose a problem, originally posed by Lempitsky… ▽ More

    Submitted 23 July, 2017; v1 submitted 25 March, 2017; originally announced March 2017.

    Comments: Under Review

  14. arXiv:1610.00318  [pdf, other

    cs.CV

    MinMax Radon Barcodes for Medical Image Retrieval

    Authors: H. R. Tizhoosh, Shujin Zhu, Hanson Lo, Varun Chaudhari, Tahmid Mehdi

    Abstract: Content-based medical image retrieval can support diagnostic decisions by clinical experts. Examining similar images may provide clues to the expert to remove uncertainties in his/her final diagnosis. Beyond conventional feature descriptors, binary features in different ways have been recently proposed to encode the image content. A recent proposal is "Radon barcodes" that employ binarized Radon p… ▽ More

    Submitted 2 October, 2016; originally announced October 2016.

    Comments: To appear in proceedings of the 12th International Symposium on Visual Computing, December 12-14, 2016, Las Vegas, Nevada, USA

  15. arXiv:1604.07796  [pdf, other

    cs.NE cs.LG stat.ML

    Scale Normalization

    Authors: Henry Z. Lo, Kevin Amaral, Wei Ding

    Abstract: One of the difficulties of training deep neural networks is caused by improper scaling between layers. Scaling issues introduce exploding / gradient problems, and have typically been addressed by careful scale-preserving initialization. We investigate the value of preserving scale, or isometry, beyond the initial weights. We propose two methods of maintaing isometry, one exact and one stochastic.… ▽ More

    Submitted 26 April, 2016; originally announced April 2016.

    Comments: Preliminary version submitted to ICLR workshop 2016

  16. arXiv:1603.04395  [pdf, ps, other

    cs.NI cs.CY cs.DL

    Academic Torrents: Scalable Data Distribution

    Authors: Henry Z. Lo, Joseph Paul Cohen

    Abstract: As competitions get more popular, transferring ever-larger data sets becomes infeasible and costly. For example, downloading the 157.3 GB 2012 ImageNet data set incurs about $4.33 in bandwidth costs per download. Downloading the full ImageNet data set takes 33 days. ImageNet has since become popular beyond the competition, and many papers and models now revolve around this data set. For sharing su… ▽ More

    Submitted 14 March, 2016; originally announced March 2016.

    Comments: Presented at Neural Information Processing Systems 2015 Challenges in Machine Learning (CiML) workshop http://ciml.chalearn.org/home/schedule

  17. arXiv:1602.05931  [pdf, other

    cs.CV

    RandomOut: Using a convolutional gradient norm to rescue convolutional filters

    Authors: Joseph Paul Cohen, Henry Z. Lo, Wei Ding

    Abstract: Filters in convolutional neural networks are sensitive to their initialization. The random numbers used to initialize filters are a bias and determine if you will "win" and converge to a satisfactory local minimum so we call this The Filter Lottery. We observe that the 28x28 Inception-V3 model without Batch Normalization fails to train 26% of the time when varying the random seed alone. This is a… ▽ More

    Submitted 29 May, 2017; v1 submitted 18 February, 2016; originally announced February 2016.

    Comments: Extended version of the ICLR 2016 workshop track paper

  18. arXiv:1601.00978  [pdf, other

    cs.CV

    Crater Detection via Convolutional Neural Networks

    Authors: Joseph Paul Cohen, Henry Z. Lo, Tingting Lu, Wei Ding

    Abstract: Craters are among the most studied geomorphic features in the Solar System because they yield important information about the past and present geological processes and provide information about the relative ages of observed geologic formations. We present a method for automatic crater detection using advanced machine learning to deal with the large amount of satellite imagery collected. The challe… ▽ More

    Submitted 5 January, 2016; originally announced January 2016.

    Comments: 2 Pages. Submitted to 47th Lunar and Planetary Science Conference (LPSC 2016)

  19. arXiv:1405.0198   

    quant-ph cs.CR

    No Superluminal Signaling Implies Unconditionally Secure Bit Commitment

    Authors: H. F. Chau, C. -H. Fred Fung, H. -K. Lo

    Abstract: Bit commitment (BC) is an important cryptographic primitive for an agent to convince a mutually mistrustful party that she has already made a binding choice of 0 or 1 but only to reveal her choice at a later time. Ideally, a BC protocol should be simple, reliable, easy to implement using existing technologies, and most importantly unconditionally secure in the sense that its security is based on a… ▽ More

    Submitted 18 November, 2014; v1 submitted 1 May, 2014; originally announced May 2014.

    Comments: This paper has been withdrawn by the authors due to a crucial oversight on an earlier work by A. Kent

  20. Postprocessing for quantum random number generators: entropy evaluation and randomness extraction

    Authors: Xiongfeng Ma, Feihu Xu, He Xu, Xiaoqing Tan, Bing Qi, Hoi-Kwong Lo

    Abstract: Quantum random-number generators (QRNGs) can offer a means to generate information-theoretically provable random numbers, in principle. In practice, unfortunately, the quantum randomness is inevitably mixed with classical randomness due to classical noises. To distill this quantum randomness, one needs to quantify the randomness of the source and apply a randomness extractor. Here, we propose a ge… ▽ More

    Submitted 21 June, 2013; v1 submitted 5 July, 2012; originally announced July 2012.

    Comments: 13 pages, 2 figures

    Journal ref: Phys. Rev. A 87, 062327 (2013)

  21. Phase-Remapping Attack in Practical Quantum Key Distribution Systems

    Authors: Chi-Hang Fred Fung, Bing Qi, Kiyoshi Tamaki, Hoi-Kwong Lo

    Abstract: Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remapping attack targeting two practical… ▽ More

    Submitted 5 March, 2007; v1 submitted 17 January, 2006; originally announced January 2006.

    Comments: 13 pages, 8 figures

    Journal ref: Phys. Rev. A 75, 032314 (2007)

  22. Conference Key Agreement and Quantum Sharing of Classical Secrets with Noisy GHZ States

    Authors: Kai Chen, Hoi-Kwong Lo

    Abstract: We propose a wide class of distillation schemes for multi-partite entangled states that are CSS-states. Our proposal provides not only superior efficiency, but also new insights on the connection between CSS-states and bipartite graph states. We then consider the applications of our distillation schemes for two cryptographic tasks--namely, (a) conference key agreement and (b) quantum sharing of… ▽ More

    Submitted 22 August, 2005; originally announced August 2005.

    Comments: 5 pages, to appear in Proc. 2005 IEEE International Symposium on Information Theory (ISIT 2005, Adelaide, Australia)

    Report number: CQIQC-ISIT 2005-CL1

    Journal ref: Information Theory, 2005. ISIT 2005. Proceedings. International Symposium on 4-9 Sept. 2005 Page(s):1607 - 1611

  23. A simple proof of the unconditional security of quantum key distribution

    Authors: Hoi-Kwong Lo

    Abstract: Quantum key distribution is the most well-known application of quantum cryptography. Previous proposed proofs of security of quantum key distribution contain various technical subtleties. Here, a conceptually simpler proof of security of quantum key distribution is presented. The new insight is the invariance of the error rate of a teleportation channel: We show that the error rate of a teleport… ▽ More

    Submitted 27 April, 1999; originally announced April 1999.

    Comments: 13 pages, extended abstract. Comments will be appreciated

    Journal ref: J.Phys.A34:6957-6968,2001

  24. Insecurity of Quantum Secure Computations

    Authors: Hoi-Kwong Lo

    Abstract: It had been widely claimed that quantum mechanics can protect private information during public decision in for example the so-called two-party secure computation. If this were the case, quantum smart-cards could prevent fake teller machines from learning the PIN (Personal Identification Number) from the customers' input. Although such optimism has been challenged by the recent surprising discov… ▽ More

    Submitted 28 April, 1997; v1 submitted 19 November, 1996; originally announced November 1996.

    Comments: The discussion on the insecurity of even non-ideal protocols has been greatly extended. Other technical points are also clarified. Version accepted for publication in Phys. Rev. A

  25. Is Quantum Bit Commitment Really Possible?

    Authors: Hoi-Kwong Lo, H. F. Chau

    Abstract: We show that all proposed quantum bit commitment schemes are insecure because the sender, Alice, can almost always cheat successfully by using an Einstein-Podolsky-Rosen type of attack and delaying her measurement until she opens her commitment.

    Submitted 2 April, 1997; v1 submitted 4 March, 1996; originally announced March 1996.

    Comments: Major revisions to include a more extensive introduction and an example of bit commitment. Overlap with independent work by Mayers acknowledged. More recent works by Mayers, by Lo and Chau and by Lo are also noted. Accepted for publication in Phys. Rev. Lett

    Journal ref: Phys. Rev. Lett. 78, 3410 (1997)