Skip to main content

Showing 1–50 of 95 results for author: Nguyen, H H

  1. arXiv:2407.07662  [pdf, other

    cs.CV cs.CR

    Mitigating Backdoor Attacks using Activation-Guided Model Editing

    Authors: Felix Hsieh, Huy H. Nguyen, AprilPyone MaungMaung, Dmitrii Usynin, Isao Echizen

    Abstract: Backdoor attacks compromise the integrity and reliability of machine learning models by embedding a hidden trigger during the training process, which can later be activated to cause unintended misbehavior. We propose a novel backdoor mitigation approach via machine unlearning to counter such backdoor attacks. The proposed method utilizes model activation of domain-equivalent unseen data to guide t… ▽ More

    Submitted 10 July, 2024; originally announced July 2024.

  2. arXiv:2406.09039  [pdf, other

    cs.RO

    Language-Driven Closed-Loop Grasping with Model-Predictive Trajectory Replanning

    Authors: Huy Hoang Nguyen, Minh Nhat Vu, Florian Beck, Gerald Ebmer, Anh Nguyen, Andreas Kugi

    Abstract: Combining a vision module inside a closed-loop control system for a \emph{seamless movement} of a robot in a manipulation task is challenging due to the inconsistent update rates between utilized modules. This task is even more difficult in a dynamic environment, e.g., objects are moving. This paper presents a \emph{modular} zero-shot framework for language-driven manipulation of (dynamic) objects… ▽ More

    Submitted 19 June, 2024; v1 submitted 13 June, 2024; originally announced June 2024.

    Comments: 9 pages, 6 figures

  3. arXiv:2405.16815  [pdf, other

    cs.CV

    Image-level Regression for Uncertainty-aware Retinal Image Segmentation

    Authors: Trung Dang, Huy Hoang Nguyen, Aleksei Tiulpin

    Abstract: Accurate retinal vessel segmentation is a crucial step in the quantitative assessment of retinal vasculature, which is needed for the early detection of retinal diseases and other conditions. Numerous studies have been conducted to tackle the problem of segmenting vessels automatically using a pixel-wise classification approach. The common practice of creating ground truth labels is to categorize… ▽ More

    Submitted 27 May, 2024; originally announced May 2024.

    Comments: 13 pages

  4. arXiv:2405.16813  [pdf, other

    cs.CV

    SiNGR: Brain Tumor Segmentation via Signed Normalized Geodesic Transform Regression

    Authors: Trung Dang, Huy Hoang Nguyen, Aleksei Tiulpin

    Abstract: One of the primary challenges in brain tumor segmentation arises from the uncertainty of voxels close to tumor boundaries. However, the conventional process of generating ground truth segmentation masks fails to treat such uncertainties properly. Those ``hard labels'' with 0s and 1s conceptually influenced the majority of prior studies on brain image segmentation. As a result, tumor segmentation i… ▽ More

    Submitted 27 May, 2024; originally announced May 2024.

    Comments: Accepted as a conference paper at MICCAI 2024

  5. arXiv:2405.00355  [pdf, other

    cs.CV

    Exploring Self-Supervised Vision Transformers for Deepfake Detection: A Comparative Analysis

    Authors: Huy H. Nguyen, Junichi Yamagishi, Isao Echizen

    Abstract: This paper investigates the effectiveness of self-supervised pre-trained transformers compared to supervised pre-trained transformers and conventional neural networks (ConvNets) for detecting various types of deepfakes. We focus on their potential for improved generalization, particularly when training data is limited. Despite the notable success of large vision-language models utilizing transform… ▽ More

    Submitted 1 May, 2024; originally announced May 2024.

  6. arXiv:2404.12618  [pdf

    cs.CL cs.AI cs.LG

    CORI: CJKV Benchmark with Romanization Integration -- A step towards Cross-lingual Transfer Beyond Textual Scripts

    Authors: Hoang H. Nguyen, Chenwei Zhang, Ye Liu, Natalie Parde, Eugene Rohrbaugh, Philip S. Yu

    Abstract: Naively assuming English as a source language may hinder cross-lingual transfer for many languages by failing to consider the importance of language contact. Some languages are more well-connected than others, and target languages can benefit from transferring from closely related languages; for many languages, the set of closely related languages does not include English. In this work, we study t… ▽ More

    Submitted 19 April, 2024; originally announced April 2024.

    Comments: Accepted at LREC-COLING 2024

  7. arXiv:2404.02511  [pdf, other

    math.OC cs.LG

    Stochastic Constrained Decentralized Optimization for Machine Learning with Fewer Data Oracles: a Gradient Sliding Approach

    Authors: Hoang Huy Nguyen, Yan Li, Tuo Zhao

    Abstract: In modern decentralized applications, ensuring communication efficiency and privacy for the users are the key challenges. In order to train machine-learning models, the algorithm has to communicate to the data center and sample data for its gradient computation, thus exposing the data and increasing the communication cost. This gives rise to the need for a decentralized optimization algorithm that… ▽ More

    Submitted 3 April, 2024; originally announced April 2024.

  8. Image-Text Out-Of-Context Detection Using Synthetic Multimodal Misinformation

    Authors: Fatma Shalabi, Huy H. Nguyen, Hichem Felouat, Ching-Chun Chang, Isao Echizen

    Abstract: Misinformation has become a major challenge in the era of increasing digital information, requiring the development of effective detection methods. We have investigated a novel approach to Out-Of-Context detection (OOCD) that uses synthetic data generation. We created a dataset specifically designed for OOCD and developed an efficient detector for accurate classification. Our experimental findings… ▽ More

    Submitted 29 January, 2024; originally announced March 2024.

    Comments: 8 pages, 2 figures, conference

  9. arXiv:2403.08776  [pdf, other

    cs.CV cs.AI

    Leveraging Chat-Based Large Vision Language Models for Multimodal Out-Of-Context Detection

    Authors: Fatma Shalabi, Hichem Felouat, Huy H. Nguyen, Isao Echizen

    Abstract: Out-of-context (OOC) detection is a challenging task involving identifying images and texts that are irrelevant to the context in which they are presented. Large vision-language models (LVLMs) are effective at various tasks, including image classification and text generation. However, the extent of their proficiency in multimodal OOC detection tasks is unclear. In this paper, we investigate the ab… ▽ More

    Submitted 22 January, 2024; originally announced March 2024.

    Comments: 13 pages, 6 figures , conference

  10. arXiv:2402.08200  [pdf, other

    cs.CV

    Fine-Tuning Text-To-Image Diffusion Models for Class-Wise Spurious Feature Generation

    Authors: AprilPyone MaungMaung, Huy H. Nguyen, Hitoshi Kiya, Isao Echizen

    Abstract: We propose a method for generating spurious features by leveraging large-scale text-to-image diffusion models. Although the previous work detects spurious features in a large-scale dataset like ImageNet and introduces Spurious ImageNet, we found that not all spurious images are spurious across different classifiers. Although spurious images help measure the reliance of a classifier, filtering many… ▽ More

    Submitted 12 February, 2024; originally announced February 2024.

  11. arXiv:2401.08046  [pdf, other

    cs.CL cs.AI

    Enhancing Robustness of LLM-Synthetic Text Detectors for Academic Writing: A Comprehensive Analysis

    Authors: Zhicheng Dou, Yuchen Guo, Ching-Chun Chang, Huy H. Nguyen, Isao Echizen

    Abstract: The emergence of large language models (LLMs), such as Generative Pre-trained Transformer 4 (GPT-4) used by ChatGPT, has profoundly impacted the academic and broader community. While these models offer numerous advantages in terms of revolutionizing work and study methods, they have also garnered significant attention due to their potential negative consequences. One example is generating academic… ▽ More

    Submitted 15 January, 2024; originally announced January 2024.

  12. Cross-Attention Watermarking of Large Language Models

    Authors: Folco Bertini Baldassini, Huy H. Nguyen, Ching-Chung Chang, Isao Echizen

    Abstract: A new approach to linguistic watermarking of language models is presented in which information is imperceptibly inserted into the output text while preserving its readability and original meaning. A cross-attention mechanism is used to embed watermarks in the text during inference. Two methods using cross-attention are presented that minimize the effect of watermarking on the performance of a pret… ▽ More

    Submitted 12 January, 2024; originally announced January 2024.

    Comments: 5 pages, 3 figures. Accepted to ICASSP 2024

  13. arXiv:2401.05745  [pdf, other

    cs.CV

    Surface Normal Estimation with Transformers

    Authors: Barry Shichen Hu, Siyun Liang, Johannes Paetzold, Huy H. Nguyen, Isao Echizen, Jiapeng Tang

    Abstract: We propose the use of a Transformer to accurately predict normals from point clouds with noise and density variations. Previous learning-based methods utilize PointNet variants to explicitly extract multi-scale features at different input scales, then focus on a surface fitting method by which local point cloud neighborhoods are fitted to a geometric surface approximated by either a polynomial fun… ▽ More

    Submitted 11 January, 2024; originally announced January 2024.

  14. UAV Trajectory Planning for AoI-Minimal Data Collection in UAV-Aided IoT Networks by Transformer

    Authors: Botao Zhu, Ebrahim Bedeer, Ha H. Nguyen, Robert Barton, Zhen Gao

    Abstract: Maintaining freshness of data collection in Internet-of-Things (IoT) networks has attracted increasing attention. By taking into account age-of-information (AoI), we investigate the trajectory planning problem of an unmanned aerial vehicle (UAV) that is used to aid a cluster-based IoT network. An optimization problem is formulated to minimize the total AoI of the collected data by the UAV from the… ▽ More

    Submitted 8 November, 2023; originally announced January 2024.

    Journal ref: IEEE TWC, 2023

  15. arXiv:2312.13970  [pdf, other

    cs.LG cs.AI math.OC

    On Partial Optimal Transport: Revising the Infeasibility of Sinkhorn and Efficient Gradient Methods

    Authors: Anh Duc Nguyen, Tuan Dung Nguyen, Quang Minh Nguyen, Hoang H. Nguyen, Lam M. Nguyen, Kim-Chuan Toh

    Abstract: This paper studies the Partial Optimal Transport (POT) problem between two unbalanced measures with at most $n$ supports and its applications in various AI tasks such as color transfer or domain adaptation. There is hence the need for fast approximations of POT with increasingly large problem sizes in arising applications. We first theoretically and experimentally investigate the infeasibility of… ▽ More

    Submitted 22 December, 2023; v1 submitted 21 December, 2023; originally announced December 2023.

    Comments: Accepted to AAAI 2024

  16. arXiv:2312.08020  [pdf, other

    cs.CV cs.CR

    Generalized Deepfakes Detection with Reconstructed-Blended Images and Multi-scale Feature Reconstruction Network

    Authors: Yuyang Sun, Huy H. Nguyen, Chun-Shien Lu, ZhiYong Zhang, Lu Sun, Isao Echizen

    Abstract: The growing diversity of digital face manipulation techniques has led to an urgent need for a universal and robust detection technology to mitigate the risks posed by malicious forgeries. We present a blended-based detection approach that has robust applicability to unseen datasets. It combines a method for generating synthetic training samples, i.e., reconstructed blended images, that incorporate… ▽ More

    Submitted 13 December, 2023; originally announced December 2023.

  17. arXiv:2310.14623  [pdf, other

    cs.CL cs.LG

    CoF-CoT: Enhancing Large Language Models with Coarse-to-Fine Chain-of-Thought Prompting for Multi-domain NLU Tasks

    Authors: Hoang H. Nguyen, Ye Liu, Chenwei Zhang, Tao Zhang, Philip S. Yu

    Abstract: While Chain-of-Thought prompting is popular in reasoning tasks, its application to Large Language Models (LLMs) in Natural Language Understanding (NLU) is under-explored. Motivated by multi-step reasoning of LLMs, we propose Coarse-to-Fine Chain-of-Thought (CoF-CoT) approach that breaks down NLU tasks into multiple reasoning steps where LLMs can learn to acquire and leverage essential concepts to… ▽ More

    Submitted 23 October, 2023; originally announced October 2023.

    Comments: Accepted at EMNLP 2023 (Main Conference)

  18. arXiv:2310.05312  [pdf, other

    cs.SE

    Quality Assurance of A GPT-based Sentiment Analysis System: Adversarial Review Data Generation and Detection

    Authors: Tinghui Ouyang, Hoang-Quoc Nguyen-Son, Huy H. Nguyen, Isao Echizen, Yoshiki Seo

    Abstract: Large Language Models (LLMs) have been garnering significant attention of AI researchers, especially following the widespread popularity of ChatGPT. However, due to LLMs' intricate architecture and vast parameters, several concerns and challenges regarding their quality assurance require to be addressed. In this paper, a fine-tuned GPT-based sentiment analysis model is first constructed and studie… ▽ More

    Submitted 8 October, 2023; originally announced October 2023.

  19. arXiv:2310.00922  [pdf, other

    cs.CV

    How Close are Other Computer Vision Tasks to Deepfake Detection?

    Authors: Huy H. Nguyen, Junichi Yamagishi, Isao Echizen

    Abstract: In this paper, we challenge the conventional belief that supervised ImageNet-trained models have strong generalizability and are suitable for use as feature extractors in deepfake detection. We present a new measurement, "model separability," for visually and quantitatively assessing a model's raw capacity to separate data in an unsupervised manner. We also present a systematic benchmark for deter… ▽ More

    Submitted 2 October, 2023; originally announced October 2023.

    Comments: Accepted to be Published in Proceedings of the IEEE International Joint Conference on Biometrics (IJCB 2023)

  20. arXiv:2309.16699  [pdf

    cs.RO eess.SY

    Circular-Line Trajectory Tracking Controller for Mobile Robot using Multi-Pixy2 Sensors

    Authors: Xuan Quang Ngo, Tri Duc Tran, Huy Hung Nguyen, Van Dong Nguyen, Van Tu Duong, Tan Tien Nguyen

    Abstract: This study suggests a novel tracking method that employs three Pixy2 sensors to identify the desired line trajectories instead of traditional perceiving means. Firstly, the kinematic model of the mobile robot is derived from the information gathered by three Pixy2 sensors. Secondly, the sliding mode controller is implemented to regulate the tracking error. Finally, simulation results are analyzed… ▽ More

    Submitted 12 August, 2023; originally announced September 2023.

    Comments: 6 pages, 12 figures, the 2023 International Symposium on Electrical and Electronics Engineering, Ho Chi Minh, Viet Nam, 2023

  21. arXiv:2309.15519  [pdf, other

    cs.CV

    Defending Against Physical Adversarial Patch Attacks on Infrared Human Detection

    Authors: Lukas Strack, Futa Waseda, Huy H. Nguyen, Yinqiang Zheng, Isao Echizen

    Abstract: Infrared detection is an emerging technique for safety-critical tasks owing to its remarkable anti-interference capability. However, recent studies have revealed that it is vulnerable to physically-realizable adversarial patches, posing risks in its real-world applications. To address this problem, we are the first to investigate defense strategies against adversarial patch attacks on infrared det… ▽ More

    Submitted 10 June, 2024; v1 submitted 27 September, 2023; originally announced September 2023.

    Comments: Accepted at ICIP2024. Lukas Strack and Futa Waseda contributed equally

  22. arXiv:2308.13982  [pdf, ps, other

    cs.LG

    Universal Graph Continual Learning

    Authors: Thanh Duc Hoang, Do Viet Tung, Duy-Hung Nguyen, Bao-Sinh Nguyen, Huy Hoang Nguyen, Hung Le

    Abstract: We address catastrophic forgetting issues in graph learning as incoming data transits from one to another graph distribution. Whereas prior studies primarily tackle one setting of graph continual learning such as incremental node classification, we focus on a universal approach wherein each data point in a task can be a node or a graph, and the task varies from node to graph classification. We pro… ▽ More

    Submitted 26 August, 2023; originally announced August 2023.

    Comments: 16 pages

  23. arXiv:2308.04712  [pdf, other

    cs.CL cs.LG

    Slot Induction via Pre-trained Language Model Probing and Multi-level Contrastive Learning

    Authors: Hoang H. Nguyen, Chenwei Zhang, Ye Liu, Philip S. Yu

    Abstract: Recent advanced methods in Natural Language Understanding for Task-oriented Dialogue (TOD) Systems (e.g., intent detection and slot filling) require a large amount of annotated data to achieve competitive performance. In reality, token-level annotations (slot labels) are time-consuming and difficult to acquire. In this work, we study the Slot Induction (SI) task whose objective is to induce slot b… ▽ More

    Submitted 9 August, 2023; originally announced August 2023.

    Comments: Accepted at SIGDIAL 2023

  24. arXiv:2307.04361  [pdf, other

    cs.CL

    Enhancing Cross-lingual Transfer via Phonemic Transcription Integration

    Authors: Hoang H. Nguyen, Chenwei Zhang, Tao Zhang, Eugene Rohrbaugh, Philip S. Yu

    Abstract: Previous cross-lingual transfer methods are restricted to orthographic representation learning via textual scripts. This limitation hampers cross-lingual transfer and is biased towards languages sharing similar well-known scripts. To alleviate the gap between languages from different writing scripts, we propose PhoneXL, a framework incorporating phonemic transcriptions as an additional linguistic… ▽ More

    Submitted 10 July, 2023; originally announced July 2023.

    Comments: 11 pages,1 figure, 7 tables. To appear in Findings of ACL 2023

  25. arXiv:2306.05340  [pdf

    cs.RO

    Research Impact of Solar Panel Cleaning Robot on Photovoltaic Panel's Deflection

    Authors: Trung Dat Phan, Minh Duc Nguyen, Maxence Auffray, Nhut Thang Le, Cong Toai Truong, Van Tu Duong, Huy Hung Nguyen, Tan Tien Nguyen

    Abstract: In the last few decades, solar panel cleaning robots (SPCR) have been widely used for sanitizing photovoltaic (PV) panels as an effective solution for ensuring PV efficiency. However, the dynamic load generated by the SPCR during operation might have a negative impact on PV panels. To reduce these effects, this paper presents the utilization of ANSYS software to simulate multiple scenarios involvi… ▽ More

    Submitted 8 June, 2023; v1 submitted 8 June, 2023; originally announced June 2023.

    Comments: 8 pages, 8 figures, The 4th International Conference on Applied Convergence Engineering (ICACE 2023)

  26. arXiv:2305.02646  [pdf, other

    cs.IT eess.SP

    Design and Detection of Unitary Constellations in Non-Coherent SIMO Systems for Short Packet Communications

    Authors: Son T. Duong, Ha H. Nguyen, Ebrahim Bedeer, Robert Barton

    Abstract: This paper proposes a novel design of multi-symbol unitary constellation for non-coherent single-input multiple-output (SIMO) communications over block Rayleigh fading channels. To facilitate the design and the detection of large unitary constellations at reduced complexity, the proposed constellations are constructed as the Cartesian product of independent amplitude and phase-shift-keying (PSK) v… ▽ More

    Submitted 6 November, 2023; v1 submitted 4 May, 2023; originally announced May 2023.

    Comments: 13 pages, 10 figures, in preparation to submit to IEEE Transactions on Wireless Communications

  27. arXiv:2303.04777  [pdf, other

    eess.SY cs.LG math.OC

    LMI-based Data-Driven Robust Model Predictive Control

    Authors: Hoang Hai Nguyen, Maurice Friedel, Rolf Findeisen

    Abstract: Predictive control, which is based on a model of the system to compute the applied input optimizing the future system behavior, is by now widely used. If the nominal models are not given or are very uncertain, data-driven model predictive control approaches can be employed, where the system model or input is directly obtained from past measured trajectories. Using a data informativity framework an… ▽ More

    Submitted 8 March, 2023; originally announced March 2023.

  28. arXiv:2303.02659  [pdf, other

    cs.CR cs.MM

    Cyber Vaccine for Deepfake Immunity

    Authors: Ching-Chun Chang, Huy Hong Nguyen, Junichi Yamagishi, Isao Echizen

    Abstract: Deepfakes pose an evolving threat to cybersecurity, which calls for the development of automated countermeasures. While considerable forensic research has been devoted to the detection and localisation of deepfakes, solutions for reversing fake to real are yet to be developed. In this study, we introduce cyber vaccination for conferring immunity to deepfakes. Analogous to biological vaccination th… ▽ More

    Submitted 5 March, 2023; originally announced March 2023.

  29. arXiv:2302.14246  [pdf, other

    eess.SY cs.RO math.OC

    i2LQR: Iterative LQR for Iterative Tasks in Dynamic Environments

    Authors: Yifan Zeng, Suiyi He, Han Hoang Nguyen, Yihan Li, Zhongyu Li, Koushil Sreenath, Jun Zeng

    Abstract: This work introduces a novel control strategy called Iterative Linear Quadratic Regulator for Iterative Tasks (i2LQR), which aims to improve closed-loop performance with local trajectory optimization for iterative tasks in a dynamic environment. The proposed algorithm is reference-free and utilizes historical data from previous iterations to enhance the performance of the autonomous system. Unlike… ▽ More

    Submitted 6 September, 2023; v1 submitted 27 February, 2023; originally announced February 2023.

    Comments: Accepted by 2023 62nd IEEE Conference on Decision and Control (CDC)

  30. arXiv:2301.10966  [pdf

    cs.RO eess.SY

    Design of Mobile Manipulator for Fire Extinguisher Testing. Part II: Design and Simulation

    Authors: Thai Nguyen Chau, Xuan Quang Ngo, Van Tu Duong, Trong Trung Nguyen, Huy Hung Nguyen, Tan Tien Nguyen

    Abstract: All flames are extinguished as early as possible, or fire services have to deal with major conflagrations. This leads to the fact that the quality of fire extinguishers has become a very sensitive and important issue in firefighting. Inspired by the development of automatic fire fighting systems, this paper presents a mobile manipulator to evaluate the power of fire extinguishers, which is designe… ▽ More

    Submitted 26 January, 2023; originally announced January 2023.

    Comments: 10 pages, 15 figures, the 7th International Conference on Advanced Engineering, Theory and Applications

  31. arXiv:2212.03678  [pdf, other

    cs.CV cs.AI

    Face Forgery Detection Based on Facial Region Displacement Trajectory Series

    Authors: YuYang Sun, ZhiYong Zhang, Isao Echizen, Huy H. Nguyen, ChangZhen Qiu, Lu Sun

    Abstract: Deep-learning-based technologies such as deepfakes ones have been attracting widespread attention in both society and academia, particularly ones used to synthesize forged face images. These automatic and professional-skill-free face manipulation technologies can be used to replace the face in an original image or video with any target object while maintaining the expression and demeanor. Since hu… ▽ More

    Submitted 7 December, 2022; originally announced December 2022.

  32. arXiv:2211.12655  [pdf, other

    cs.IT eess.SP

    Bit-Interleaved Coded Energy-Based Modulation with Iterative Decoding

    Authors: Ali Fazeli, Ha H. Nguyen, Halim Yanikomeroglu

    Abstract: This paper develops a low-complexity near-optimal non-coherent receiver for a multi-level energy-based coded modulation system. Inspired by the turbo processing principle, we incorporate the fundamentals of bit-interleaved coded modulation with iterative decoding (BICM-ID) into the proposed receiver design. The resulting system is called bit-interleaved coded energy-based modulation with iterative… ▽ More

    Submitted 22 November, 2022; originally announced November 2022.

  33. arXiv:2211.09395  [pdf, ps, other

    cs.IT eess.SP

    Multi-level Design for Multiple-Symbol Non-Coherent Unitary Constellations for Massive SIMO Systems

    Authors: Son T. Duong, Ha H. Nguyen, Ebrahim Bedeer

    Abstract: This paper investigates non-coherent detection of single-input multiple-output (SIMO) systems over block Rayleigh fading channels. Using the Kullback-Leibler divergence as the design criterion, we formulate a multiple-symbol constellation optimization problem, which turns out to have high computational complexity to construct and detect. We exploit the structure of the formulated problem and decou… ▽ More

    Submitted 17 November, 2022; originally announced November 2022.

    Comments: 5 pages, 3 figures, submitted to IEEE Wireless Communications Letters

  34. arXiv:2210.14597  [pdf, other

    eess.IV cs.CV

    A Stronger Baseline For Automatic Pfirrmann Grading Of Lumbar Spine MRI Using Deep Learning

    Authors: Narasimharao Kowlagi, Huy Hoang Nguyen, Terence McSweeney, Simo Saarakkala, Juhani määttä, Jaro Karppinen, Aleksei Tiulpin

    Abstract: This paper addresses the challenge of grading visual features in lumbar spine MRI using Deep Learning. Such a method is essential for the automatic quantification of structural changes in the spine, which is valuable for understanding low back pain. Multiple recent studies investigated different architecture designs, and the most recent success has been attributed to the use of transformer archite… ▽ More

    Submitted 26 October, 2022; originally announced October 2022.

    Comments: 5 pages, under review

  35. Clinically-Inspired Multi-Agent Transformers for Disease Trajectory Forecasting from Multimodal Data

    Authors: Huy Hoang Nguyen, Matthew B. Blaschko, Simo Saarakkala, Aleksei Tiulpin

    Abstract: Deep neural networks are often applied to medical images to automate the problem of medical diagnosis. However, a more clinically relevant question that practitioners usually face is how to predict the future trajectory of a disease. Current methods for prognosis or disease trajectory forecasting often require domain knowledge and are complicated to apply. In this paper, we formulate the prognosis… ▽ More

    Submitted 19 September, 2023; v1 submitted 25 October, 2022; originally announced October 2022.

    Comments: Accepted in IEEE Transactions on Medical Imaging 2023

  36. arXiv:2210.10667  [pdf, other

    cs.CV

    Analysis of Master Vein Attacks on Finger Vein Recognition Systems

    Authors: Huy H. Nguyen, Trung-Nghia Le, Junichi Yamagishi, Isao Echizen

    Abstract: Finger vein recognition (FVR) systems have been commercially used, especially in ATMs, for customer verification. Thus, it is essential to measure their robustness against various attack methods, especially when a hand-crafted FVR system is used without any countermeasure methods. In this paper, we are the first in the literature to introduce master vein attacks in which we craft a vein-looking im… ▽ More

    Submitted 18 October, 2022; originally announced October 2022.

    Comments: Accepted to be Published in Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision (WACV) 2023

  37. arXiv:2208.13252  [pdf, other

    cs.SE cs.LG

    MANDO: Multi-Level Heterogeneous Graph Embeddings for Fine-Grained Detection of Smart Contract Vulnerabilities

    Authors: Hoang H. Nguyen, Nhat-Minh Nguyen, Chunyao Xie, Zahra Ahmadi, Daniel Kudendo, Thanh-Nam Doan, Lingxiao Jiang

    Abstract: Learning heterogeneous graphs consisting of different types of nodes and edges enhances the results of homogeneous graph techniques. An interesting example of such graphs is control-flow graphs representing possible software code execution flows. As such graphs represent more semantic information of code, developing techniques and tools for such graphs can be highly beneficial for detecting vulner… ▽ More

    Submitted 7 September, 2022; v1 submitted 28 August, 2022; originally announced August 2022.

    Comments: Accepted at the 9th IEEE International Conference on Data Science and Advanced Analytics (DSAA 2022 - Research Track)

    ACM Class: I.2.5; D.2.4

  38. arXiv:2206.14020  [pdf, other

    cs.CV

    Rethinking Adversarial Examples for Location Privacy Protection

    Authors: Trung-Nghia Le, Ta Gu, Huy H. Nguyen, Isao Echizen

    Abstract: We have investigated a new application of adversarial examples, namely location privacy protection against landmark recognition systems. We introduce mask-guided multimodal projected gradient descent (MM-PGD), in which adversarial examples are trained on different deep models. Image contents are protected by analyzing the properties of regions to identify the ones most suitable for blending in adv… ▽ More

    Submitted 28 June, 2022; originally announced June 2022.

  39. arXiv:2205.02849  [pdf, other

    eess.IV cs.CV cs.LG

    AdaTriplet: Adaptive Gradient Triplet Loss with Automatic Margin Learning for Forensic Medical Image Matching

    Authors: Khanh Nguyen, Huy Hoang Nguyen, Aleksei Tiulpin

    Abstract: This paper tackles the challenge of forensic medical image matching (FMIM) using deep neural networks (DNNs). FMIM is a particular case of content-based image retrieval (CBIR). The main challenge in FMIM compared to the general case of CBIR, is that the subject to whom a query image belongs may be affected by aging and progressive degenerative disorders, making it difficult to match data on a subj… ▽ More

    Submitted 10 May, 2022; v1 submitted 5 May, 2022; originally announced May 2022.

    Comments: 15 pages, 6 figures, accepted as a conference paper at MICCAI 2022

  40. arXiv:2202.06228  [pdf, other

    cs.CV

    Robust Deepfake On Unrestricted Media: Generation And Detection

    Authors: Trung-Nghia Le, Huy H Nguyen, Junichi Yamagishi, Isao Echizen

    Abstract: Recent advances in deep learning have led to substantial improvements in deepfake generation, resulting in fake media with a more realistic appearance. Although deepfake media have potential application in a wide range of areas and are drawing much attention from both the academic and industrial communities, it also leads to serious social and criminal concerns. This chapter explores the evolution… ▽ More

    Submitted 13 February, 2022; originally announced February 2022.

    Comments: This article will appear as one chapter for a new book called Frontiers in Fake Media Generation and Detection, edited by Mahdi Khosravy, Isao Echizen, and Noboru Babaguchi

  41. arXiv:2202.03618  [pdf, other

    math.OC cs.LG

    On Unbalanced Optimal Transport: Gradient Methods, Sparsity and Approximation Error

    Authors: Quang Minh Nguyen, Hoang H. Nguyen, Yi Zhou, Lam M. Nguyen

    Abstract: We study the Unbalanced Optimal Transport (UOT) between two measures of possibly different masses with at most $n$ components, where the marginal constraints of standard Optimal Transport (OT) are relaxed via Kullback-Leibler divergence with regularization factor $τ$. Although only Sinkhorn-based UOT solvers have been analyzed in the literature with the iteration complexity of… ▽ More

    Submitted 8 January, 2024; v1 submitted 7 February, 2022; originally announced February 2022.

  42. arXiv:2201.09458  [pdf

    cs.RO eess.SY

    Hybrid Adaptive Control for Series Elastic Actuator of Humanoid Robot

    Authors: Anh Khoa Lanh Luu, Van Tu Duong, Huy Hung Nguyen, Sang Bong Kim, Tan Tien Nguyen

    Abstract: Generally, humanoid robots usually suffer significant impact force when walking or running in a non-predefined environment that could easily damage the actuators due to high stiffness. In recent years, the usages of passive, compliant series elastic actuators (SEA) for driving humanoid's joints have proved the capability in many aspects so far. However, despite being widely applied in the biped ro… ▽ More

    Submitted 23 January, 2022; originally announced January 2022.

  43. arXiv:2112.14337  [pdf, other

    cs.LG cs.CV

    Closer Look at the Transferability of Adversarial Examples: How They Fool Different Models Differently

    Authors: Futa Waseda, Sosuke Nishikawa, Trung-Nghia Le, Huy H. Nguyen, Isao Echizen

    Abstract: Deep neural networks are vulnerable to adversarial examples (AEs), which have adversarial transferability: AEs generated for the source model can mislead another (target) model's predictions. However, the transferability has not been understood in terms of to which class target model's predictions were misled (i.e., class-aware transferability). In this paper, we differentiate the cases in which a… ▽ More

    Submitted 19 October, 2022; v1 submitted 28 December, 2021; originally announced December 2021.

    Comments: 25 pages, 13 figures, Accepted at the IEEE Winter Conference on Applications of Computer Vision (WACV) 2023

  44. arXiv:2112.06593  [pdf, ps, other

    cs.IT eess.SP

    RIS-Aided Cell-Free Massive MIMO Systems: Joint Design of Transmit Beamforming and Phase Shifts

    Authors: Si-Nian Jin, Dian-Wu Yue, Ha H. Nguyen

    Abstract: This paper studies RIS-aided cell-free massive MIMO systems, where multiple RISs are deployed to assist the communication between multiple access points (APs) and multiple users, with either continuous or discrete phase shifts at the RISs. We formulate the max-min fairness problem that maximizes the minimum achievable rate among all users by jointly optimizing the transmit beamforming at active AP… ▽ More

    Submitted 13 December, 2021; originally announced December 2021.

    Comments: 13 pages, 10 figures. Submitted to IEEE for possible publication

  45. arXiv:2112.00333  [pdf, ps, other

    eess.SY cs.LG

    Joint Cluster Head Selection and Trajectory Planning in UAV-Aided IoT Networks by Reinforcement Learning with Sequential Model

    Authors: Botao Zhu, Ebrahim Bedeer, Ha H. Nguyen, Robert Barton, Jerome Henry

    Abstract: Employing unmanned aerial vehicles (UAVs) has attracted growing interests and emerged as the state-of-the-art technology for data collection in Internet-of-Things (IoT) networks. In this paper, with the objective of minimizing the total energy consumption of the UAV-IoT system, we formulate the problem of jointly designing the UAV's trajectory and selecting cluster heads in the IoT network as a co… ▽ More

    Submitted 1 December, 2021; originally announced December 2021.

    Comments: This paper has been accepted in IEEE IoT-J

  46. arXiv:2111.12888  [pdf, other

    cs.CV cs.AI

    Effectiveness of Detection-based and Regression-based Approaches for Estimating Mask-Wearing Ratio

    Authors: Khanh-Duy Nguyen, Huy H. Nguyen, Trung-Nghia Le, Junichi Yamagishi, Isao Echizen

    Abstract: Estimating the mask-wearing ratio in public places is important as it enables health authorities to promptly analyze and implement policies. Methods for estimating the mask-wearing ratio on the basis of image analysis have been reported. However, there is still a lack of comprehensive research on both methodologies and datasets. Most recent reports straightforwardly propose estimating the ratio by… ▽ More

    Submitted 3 December, 2021; v1 submitted 24 November, 2021; originally announced November 2021.

  47. arXiv:2111.10022  [pdf, ps, other

    eess.SP cs.IT

    Concurrent Transmission and Multiuser Detection of LoRa Signals

    Authors: The Khai Nguyen, Ha H. Nguyen, Ebrahim Bedeer

    Abstract: This paper investigates a new model to improve the scalability of low-power long-range (LoRa) networks by allowing multiple end devices (EDs) to simultaneously communicate with multiple multi-antenna gateways on the same frequency band and using the same spreading factor. The maximum likelihood (ML) decision rule is first derived for non-coherent detection of information bits transmitted by multip… ▽ More

    Submitted 18 November, 2021; originally announced November 2021.

    Comments: 11 pages, 7 figures, submitted to IEEE for possible publication

  48. arXiv:2109.03398  [pdf, other

    cs.CV

    Master Face Attacks on Face Recognition Systems

    Authors: Huy H. Nguyen, Sébastien Marcel, Junichi Yamagishi, Isao Echizen

    Abstract: Face authentication is now widely used, especially on mobile devices, rather than authentication using a personal identification number or an unlock pattern, due to its convenience. It has thus become a tempting target for attackers using a presentation attack. Traditional presentation attacks use facial images or videos of the victim. Previous work has proven the existence of master faces, i.e.,… ▽ More

    Submitted 7 September, 2021; originally announced September 2021.

    Comments: This paper is an extension of the IJCB paper published in 2019 (Generating Master Faces for Use in Performing Wolf Attacks on Face Recognition Systems) and its first version was initially submitted to T-BIOM journal on Dec 25, 2020

  49. arXiv:2108.00675  [pdf, ps, other

    cs.IT eess.SP

    Angle Estimation for Terahertz Ultra-Massive MIMO-Based Space-to-Air Communications

    Authors: Anwen Liao, Zhen Gao, Yang Yang, Ha H. Nguyen, Hua Wang, Hao Yin

    Abstract: This paper investigates terahertz ultra-massive (UM)-MIMO-based angle estimation for space-to-air communications, which can solve the performance degradation problem caused by the dual delay-beam squint effects of terahertz UM-MIMO channels. Specifically, we first design a grouping true-time delay unit module that can significantly mitigate the impact of delay-beam squint effects to establish the… ▽ More

    Submitted 2 August, 2021; originally announced August 2021.

    Comments: Accepted by IEEE/CIC International Conference on Communications in China. arXiv admin note: text overlap with arXiv:2103.01829

  50. arXiv:2108.00354  [pdf, ps, other

    eess.SY cs.LG

    UAV Trajectory Planning in Wireless Sensor Networks for Energy Consumption Minimization by Deep Reinforcement Learning

    Authors: Botao Zhu, Ebrahim Bedeer, Ha H. Nguyen, Robert Barton, Jerome Henry

    Abstract: Unmanned aerial vehicles (UAVs) have emerged as a promising candidate solution for data collection of large-scale wireless sensor networks (WSNs). In this paper, we investigate a UAV-aided WSN, where cluster heads (CHs) receive data from their member nodes, and a UAV is dispatched to collect data from CHs along the planned trajectory. We aim to minimize the total energy consumption of the UAV-WSN… ▽ More

    Submitted 31 July, 2021; originally announced August 2021.

    Journal ref: IEEE TVT, 2021