Skip to main content

Showing 1–32 of 32 results for author: Shim, K

  1. arXiv:2406.07007  [pdf, other

    cs.CL

    Crayon: Customized On-Device LLM via Instant Adapter Blending and Edge-Server Hybrid Inference

    Authors: Jihwan Bang, Juntae Lee, Kyuhong Shim, Seunghan Yang, Simyung Chang

    Abstract: The customization of large language models (LLMs) for user-specified tasks gets important. However, maintaining all the customized LLMs on cloud servers incurs substantial memory and computational overheads, and uploading user data can also lead to privacy concerns. On-device LLMs can offer a promising solution by mitigating these issues. Yet, the performance of on-device LLMs is inherently constr… ▽ More

    Submitted 11 June, 2024; originally announced June 2024.

    Comments: ACL 2024 Main

  2. arXiv:2405.03945  [pdf, other

    cs.CV cs.NI

    Role of Sensing and Computer Vision in 6G Wireless Communications

    Authors: Seungnyun Kim, Jihoon Moon, Jinhong Kim, Yongjun Ahn, Donghoon Kim, Sunwoo Kim, Kyuhong Shim, Byonghyo Shim

    Abstract: Recently, we are witnessing the remarkable progress and widespread adoption of sensing technologies in autonomous driving, robotics, and metaverse. Considering the rapid advancement of computer vision (CV) technology to analyze the sensing information, we anticipate a proliferation of wireless applications exploiting the sensing and CV technologies in 6G. In this article, we provide a holistic ove… ▽ More

    Submitted 6 May, 2024; originally announced May 2024.

  3. arXiv:2404.11630  [pdf, other

    cs.CV cs.AI

    SNP: Structured Neuron-level Pruning to Preserve Attention Scores

    Authors: Kyunghwan Shim, Jaewoong Yun, Shinkook Choi

    Abstract: Multi-head self-attention (MSA) is a key component of Vision Transformers (ViTs), which have achieved great success in various vision tasks. However, their high computational cost and memory footprint hinder their deployment on resource-constrained devices. Conventional pruning approaches can only compress and accelerate the MSA module using head pruning, although the head is not an atomic unit. T… ▽ More

    Submitted 17 April, 2024; originally announced April 2024.

  4. arXiv:2403.01594  [pdf, other

    cs.HC

    Never Tell the Trick: Covert Interactive Mixed Reality System for Immersive Storytelling

    Authors: Chanwoo Lee, Kyubeom Shim, Sanggyo Seo, Gwonu Ryu, Yongsoon Choi

    Abstract: This study explores the integration of Ultra-Wideband (UWB) technology into Mixed Reality (MR) Systems for immersive storytelling. Addressing the limitations of existing technologies like Microsoft Kinect and HTC Vive, the research focuses on overcoming challenges in robustness to occlusion, tracking volume, and cost efficiency in props tracking. Utilizing UWB technology, the interactive MR system… ▽ More

    Submitted 3 March, 2024; originally announced March 2024.

    Comments: To be presented in IEEE VR 2024

  5. arXiv:2312.07342  [pdf, other

    cs.CV

    Expand-and-Quantize: Unsupervised Semantic Segmentation Using High-Dimensional Space and Product Quantization

    Authors: Jiyoung Kim, Kyuhong Shim, Insu Lee, Byonghyo Shim

    Abstract: Unsupervised semantic segmentation (USS) aims to discover and recognize meaningful categories without any labels. For a successful USS, two key abilities are required: 1) information compression and 2) clustering capability. Previous methods have relied on feature dimension reduction for information compression, however, this approach may hinder the process of clustering. In this paper, we propose… ▽ More

    Submitted 12 December, 2023; originally announced December 2023.

    Comments: Accepted to AAAI 2024

  6. arXiv:2309.00647  [pdf, other

    eess.AS cs.LG cs.SD

    Improving Small Footprint Few-shot Keyword Spotting with Supervision on Auxiliary Data

    Authors: Seunghan Yang, Byeonggeun Kim, Kyuhong Shim, Simyung Chang

    Abstract: Few-shot keyword spotting (FS-KWS) models usually require large-scale annotated datasets to generalize to unseen target keywords. However, existing KWS datasets are limited in scale and gathering keyword-like labeled data is costly undertaking. To mitigate this issue, we propose a framework that uses easily collectible, unlabeled reading speech data as an auxiliary source. Self-supervised learning… ▽ More

    Submitted 31 August, 2023; originally announced September 2023.

    Comments: Interspeech 2023

  7. arXiv:2308.16415  [pdf, other

    cs.CL eess.AS

    Knowledge Distillation from Non-streaming to Streaming ASR Encoder using Auxiliary Non-streaming Layer

    Authors: Kyuhong Shim, Jinkyu Lee, Simyung Chang, Kyuwoong Hwang

    Abstract: Streaming automatic speech recognition (ASR) models are restricted from accessing future context, which results in worse performance compared to the non-streaming models. To improve the performance of streaming ASR, knowledge distillation (KD) from the non-streaming to streaming model has been studied, mainly focusing on aligning the output token probabilities. In this paper, we propose a layer-to… ▽ More

    Submitted 30 August, 2023; originally announced August 2023.

    Comments: Accepted to Interspeech 2023

  8. arXiv:2306.01388  [pdf, other

    cs.DB

    From Large Language Models to Databases and Back: A discussion on research and education

    Authors: Sihem Amer-Yahia, Angela Bonifati, Lei Chen, Guoliang Li, Kyuseok Shim, Jianliang Xu, Xiaochun Yang

    Abstract: This discussion was conducted at a recent panel at the 28th International Conference on Database Systems for Advanced Applications (DASFAA 2023), held April 17-20, 2023 in Tianjin, China. The title of the panel was "What does LLM (ChatGPT) Bring to Data Science Research and Education? Pros and Cons". It was moderated by Lei Chen and Xiaochun Yang. The discussion raised several questions on how lar… ▽ More

    Submitted 7 July, 2023; v1 submitted 2 June, 2023; originally announced June 2023.

    Comments: 7 pages, 2 figures, the Panel at the 28th International Conference on Database Systems for Advanced Applications (DASFAA 2023)

  9. arXiv:2305.13680  [pdf, other

    cs.SE

    ChatGPT, Can You Generate Solutions for my Coding Exercises? An Evaluation on its Effectiveness in an undergraduate Java Programming Course

    Authors: Eng Lieh Ouh, Benjamin Kok Siew Gan, Kyong Jin Shim, Swavek Wlodkowski

    Abstract: In this study, we assess the efficacy of employing the ChatGPT language model to generate solutions for coding exercises within an undergraduate Java programming course. ChatGPT, a large-scale, deep learning-driven natural language processing model, is capable of producing programming code based on textual input. Our evaluation involves analyzing ChatGPT-generated solutions for 80 diverse programm… ▽ More

    Submitted 23 May, 2023; originally announced May 2023.

  10. arXiv:2304.12849  [pdf, other

    cs.CV

    Depth-Relative Self Attention for Monocular Depth Estimation

    Authors: Kyuhong Shim, Jiyoung Kim, Gusang Lee, Byonghyo Shim

    Abstract: Monocular depth estimation is very challenging because clues to the exact depth are incomplete in a single RGB image. To overcome the limitation, deep neural networks rely on various visual hints such as size, shade, and texture extracted from RGB information. However, we observe that if such hints are overly exploited, the network can be biased on RGB information without considering the comprehen… ▽ More

    Submitted 25 April, 2023; originally announced April 2023.

    Comments: Accepted for IJCAI 2023

  11. arXiv:2303.05692  [pdf, ps, other

    cs.CV

    Semantic-Preserving Augmentation for Robust Image-Text Retrieval

    Authors: Sunwoo Kim, Kyuhong Shim, Luong Trung Nguyen, Byonghyo Shim

    Abstract: Image text retrieval is a task to search for the proper textual descriptions of the visual world and vice versa. One challenge of this task is the vulnerability to input image and text corruptions. Such corruptions are often unobserved during the training, and degrade the retrieval model decision quality substantially. In this paper, we propose a novel image text retrieval technique, referred to a… ▽ More

    Submitted 9 March, 2023; originally announced March 2023.

    Comments: Accepted to ICASSP 2023

  12. arXiv:2302.11812  [pdf, other

    cs.CL cs.AI

    Teacher Intervention: Improving Convergence of Quantization Aware Training for Ultra-Low Precision Transformers

    Authors: Minsoo Kim, Kyuhong Shim, Seongmin Park, Wonyong Sung, Jungwook Choi

    Abstract: Pre-trained Transformer models such as BERT have shown great success in a wide range of applications, but at the cost of substantial increases in model complexity. Quantization-aware training (QAT) is a promising method to lower the implementation cost and energy consumption. However, aggressive quantization below 2-bit causes considerable accuracy degradation due to unstable convergence, especial… ▽ More

    Submitted 23 February, 2023; originally announced February 2023.

    Comments: Accepted to EACL 2023 (main conference)

  13. arXiv:2302.00875  [pdf, ps, other

    cs.CV

    Vision Transformer-based Feature Extraction for Generalized Zero-Shot Learning

    Authors: Jiseob Kim, Kyuhong Shim, Junhan Kim, Byonghyo Shim

    Abstract: Generalized zero-shot learning (GZSL) is a technique to train a deep learning model to identify unseen classes using the image attribute. In this paper, we put forth a new GZSL approach exploiting Vision Transformer (ViT) to maximize the attribute-related information contained in the image feature. In ViT, the entire image region is processed without the degradation of the image resolution and the… ▽ More

    Submitted 1 February, 2023; originally announced February 2023.

    Comments: 21 pages, 10 figures

  14. arXiv:2301.12444  [pdf, other

    cs.AI eess.SP

    Exploring Attention Map Reuse for Efficient Transformer Neural Networks

    Authors: Kyuhong Shim, Jungwook Choi, Wonyong Sung

    Abstract: Transformer-based deep neural networks have achieved great success in various sequence applications due to their powerful ability to model long-range dependency. The key module of Transformer is self-attention (SA) which extracts features from the entire sequence regardless of the distance between positions. Although SA helps Transformer performs particularly well on long-range tasks, SA requires… ▽ More

    Submitted 29 January, 2023; originally announced January 2023.

  15. arXiv:2210.00367  [pdf, other

    eess.AS cs.CL

    A Comparison of Transformer, Convolutional, and Recurrent Neural Networks on Phoneme Recognition

    Authors: Kyuhong Shim, Wonyong Sung

    Abstract: Phoneme recognition is a very important part of speech recognition that requires the ability to extract phonetic features from multiple frames. In this paper, we compare and analyze CNN, RNN, Transformer, and Conformer models using phoneme recognition. For CNN, the ContextNet model is used for the experiments. First, we compare the accuracy of various architectures under different constraints, suc… ▽ More

    Submitted 1 October, 2022; originally announced October 2022.

  16. arXiv:2204.12416  [pdf, other

    cs.CR cs.CY cs.SE

    XSS for the Masses: Integrating Security in a Web Programming Course using a Security Scanner

    Authors: Lwin Khin Shar, Christopher M. Poskitt, Kyong Jin Shim, Li Ying Leonard Wong

    Abstract: Cybersecurity education is considered an important part of undergraduate computing curricula, but many institutions teach it only in dedicated courses or tracks. This optionality risks students graduating with limited exposure to secure coding practices that are expected in industry. An alternative approach is to integrate cybersecurity concepts across non-security courses, so as to expose student… ▽ More

    Submitted 26 April, 2022; originally announced April 2022.

    Comments: Accepted by the 27th annual conference on Innovation and Technology in Computer Science Education (ITiCSE 2022)

    Journal ref: Proc. ITiCSE'22, pages 463-469. ACM, 2022

  17. arXiv:2203.10252  [pdf, ps, other

    cs.CL eess.AS

    Similarity and Content-based Phonetic Self Attention for Speech Recognition

    Authors: Kyuhong Shim, Wonyong Sung

    Abstract: Transformer-based speech recognition models have achieved great success due to the self-attention (SA) mechanism that utilizes every frame in the feature extraction process. Especially, SA heads in lower layers capture various phonetic characteristics by the query-key dot product, which is designed to compute the pairwise relationship between frames. In this paper, we propose a variant of SA to ex… ▽ More

    Submitted 11 July, 2022; v1 submitted 19 March, 2022; originally announced March 2022.

    Comments: Accepted for INTERSPEECH 2022

  18. arXiv:2203.03583  [pdf, ps, other

    cs.CL cs.SD eess.AS

    Korean Tokenization for Beam Search Rescoring in Speech Recognition

    Authors: Kyuhong Shim, Hyewon Bae, Wonyong Sung

    Abstract: The performance of automatic speech recognition (ASR) models can be greatly improved by proper beam-search decoding with external language model (LM). There has been an increasing interest in Korean speech recognition, but not many studies have been focused on the decoding procedure. In this paper, we propose a Korean tokenization method for neural network-based LM used for Korean ASR. Although th… ▽ More

    Submitted 28 March, 2022; v1 submitted 22 February, 2022; originally announced March 2022.

    Comments: Submitted to INTERSPEECH 2022

  19. arXiv:2201.08357  [pdf

    cs.AR

    The Specialized High-Performance Network on Anton 3

    Authors: Keun Sup Shim, Brian Greskamp, Brian Towles, Bruce Edwards, J. P. Grossman, David E. Shaw

    Abstract: Molecular dynamics (MD) simulation, a computationally intensive method that provides invaluable insights into the behavior of biomolecules, typically requires large-scale parallelization. Implementation of fast parallel MD simulation demands both high bandwidth and low latency for inter-node communication, but in current semiconductor technology, neither of these properties is scaling as quickly a… ▽ More

    Submitted 20 January, 2022; originally announced January 2022.

    Comments: Accepted by the 28th IEEE International Symposium on High-Performance Computer Architecture (HPCA 2022)

  20. arXiv:2112.14478  [pdf, other

    cs.CV

    Semantic Feature Extraction for Generalized Zero-shot Learning

    Authors: Junhan Kim, Kyuhong Shim, Byonghyo Shim

    Abstract: Generalized zero-shot learning (GZSL) is a technique to train a deep learning model to identify unseen classes using the attribute. In this paper, we put forth a new GZSL technique that improves the GZSL classification performance greatly. Key idea of the proposed approach, henceforth referred to as semantic feature extraction-based GZSL (SE-GZSL), is to use the semantic feature containing only at… ▽ More

    Submitted 29 December, 2021; originally announced December 2021.

    Comments: Accepted at AAAI2022

  21. arXiv:2110.03252  [pdf, other

    cs.CL

    Layer-wise Pruning of Transformer Attention Heads for Efficient Language Modeling

    Authors: Kyuhong Shim, Iksoo Choi, Wonyong Sung, Jungwook Choi

    Abstract: While Transformer-based models have shown impressive language modeling performance, the large computation cost is often prohibitive for practical use. Attention head pruning, which removes unnecessary attention heads in the multihead attention, is a promising technique to solve this problem. However, it does not evenly reduce the overall load because the heavy feedforward module is not affected by… ▽ More

    Submitted 7 October, 2021; originally announced October 2021.

  22. Mind the Gap: Reimagining an Interactive Programming Course for the Synchronous Hybrid Classroom

    Authors: Christopher M. Poskitt, Kyong Jin Shim, Yi Meng Lau, Hong Seng Ong

    Abstract: COVID-19 has significantly affected universities, forcing many courses to be delivered entirely online. As countries bring the pandemic under control, a potential way to safely resume some face-to-face teaching is the synchronous hybrid classroom, in which physically and remotely attending students are taught simultaneously. This comes with challenges, however, including the risk that remotely att… ▽ More

    Submitted 19 September, 2021; originally announced September 2021.

    Comments: Accepted by the 34th Conference on Software Engineering Education and Training (CSEE&T 2022): Special Track of the 55th Hawaii International Conference on System Sciences (HICSS 2022)

    Journal ref: Proc. HICSS 2022, pages 931-940. ScholarSpace, 2022

  23. arXiv:2103.10858  [pdf, other

    cs.CV cs.LG

    Toward Compact Deep Neural Networks via Energy-Aware Pruning

    Authors: Seul-Ki Yeom, Kyung-Hwan Shim, Jee-Hyun Hwang

    Abstract: Despite the remarkable performance, modern deep neural networks are inevitably accompanied by a significant amount of computational cost for learning and deployment, which may be incompatible with their usage on edge devices. Recent efforts to reduce these overheads involve pruning and decomposing the parameters of various layers without performance deterioration. Inspired by several decomposition… ▽ More

    Submitted 10 March, 2022; v1 submitted 19 March, 2021; originally announced March 2021.

    Comments: 10 pages, 5 figures, 3 tables

  24. arXiv:2011.11851  [pdf, other

    cs.CL cs.AI

    Dual Supervision Framework for Relation Extraction with Distant Supervision and Human Annotation

    Authors: Woohwan Jung, Kyuseok Shim

    Abstract: Relation extraction (RE) has been extensively studied due to its importance in real-world applications such as knowledge base construction and question answering. Most of the existing works train the models on either distantly supervised data or human-annotated data. To take advantage of the high accuracy of human annotation and the cheap cost of distant supervision, we propose the dual supervisio… ▽ More

    Submitted 23 November, 2020; originally announced November 2020.

    Comments: Accepted to COLING 2020

  25. arXiv:2005.02602  [pdf, other

    cs.NE eess.SP q-bio.NC

    Gradual Relation Network: Decoding Intuitive Upper Extremity Movement Imaginations Based on Few-Shot EEG Learning

    Authors: Kyung-Hwan Shim, Ji-Hoon Jeong, Seong-Whan Lee

    Abstract: Brain-computer interface (BCI) is a communication tool that connects users and external devices. In a real-time BCI environment, a calibration procedure is particularly necessary for each user and each session. This procedure consumes a significant amount of time that hinders the application of a BCI system in a real-world scenario. To avoid this problem, we adopt the metric based few-shot learnin… ▽ More

    Submitted 6 May, 2020; originally announced May 2020.

  26. arXiv:2002.01122  [pdf, other

    cs.HC cs.LG eess.SP

    Motor Imagery Classification of Single-Arm Tasks Using Convolutional Neural Network based on Feature Refining

    Authors: Byeong-Hoo Lee, Ji-Hoon Jeong, Kyung-Hwan Shim, Dong-Joo Kim

    Abstract: Brain-computer interface (BCI) decodes brain signals to understand user intention and status. Because of its simple and safe data acquisition process, electroencephalogram (EEG) is commonly used in non-invasive BCI. One of EEG paradigms, motor imagery (MI) is commonly used for recovery or rehabilitation of motor functions due to its signal origin. However, the EEG signals are an oscillatory and no… ▽ More

    Submitted 3 February, 2020; originally announced February 2020.

  27. arXiv:2002.01121  [pdf, other

    cs.HC eess.SP

    Classification of Upper Limb Movements \newline Using Convolutional Neural Network \newline with 3D Inception Block

    Authors: D. -Y. Lee, J. -H. Jeong, K. -H. Shim, D. -J. Kim

    Abstract: A brain-machine interface (BMI) based on electroencephalography (EEG) can overcome the movement deficits for patients and real-world applications for healthy people. Ideally, the BMI system detects user movement intentions transforms them into a control signal for a robotic arm movement. In this study, we made progress toward user intention decoding and successfully classified six different reachi… ▽ More

    Submitted 3 February, 2020; originally announced February 2020.

    Comments: 5 pages, accepted by BCI2020

  28. arXiv:2002.00210  [pdf, other

    eess.SP cs.LG

    Classification of High-Dimensional Motor Imagery Tasks based on An End-to-end role assigned convolutional neural network

    Authors: Byeong-Hoo Lee, Ji-Hoon Jeong, Kyung-Hwan Shim, Seong-Whan Lee

    Abstract: A brain-computer interface (BCI) provides a direct communication pathway between user and external devices. Electroencephalogram (EEG) motor imagery (MI) paradigm is widely used in non-invasive BCI to obtain encoded signals contained user intention of movement execution. However, EEG has intricate and non-stationary properties resulting in insufficient decoding performance. By imagining numerous m… ▽ More

    Submitted 3 February, 2020; v1 submitted 1 February, 2020; originally announced February 2020.

    Comments: Pre-review version, accepted at ICASSP 2020

  29. arXiv:1910.04397  [pdf, other

    eess.IV cs.CV

    BitNet: Learning-Based Bit-Depth Expansion

    Authors: Junyoung Byun, Kyujin Shim, Changick Kim

    Abstract: Bit-depth is the number of bits for each color channel of a pixel in an image. Although many modern displays support unprecedented higher bit-depth to show more realistic and natural colors with a high dynamic range, most media sources are still in bit-depth of 8 or lower. Since insufficient bit-depth may generate annoying false contours or lose detailed visual appearance, bit-depth expansion (BDE… ▽ More

    Submitted 10 October, 2019; originally announced October 2019.

    Comments: Accepted by ACCV 2018, Authors Byun and Shim contributed equally

  30. Crowdsourced Truth Discovery in the Presence of Hierarchies for Knowledge Fusion

    Authors: Woohwan Jung, Younghoon Kim, Kyuseok Shim

    Abstract: Existing works for truth discovery in categorical data usually assume that claimed values are mutually exclusive and only one among them is correct. However, many claimed values are not mutually exclusive even for functional predicates due to their hierarchical structures. Thus, we need to consider the hierarchical structure to effectively estimate the trustworthiness of the sources and infer the… ▽ More

    Submitted 23 April, 2019; originally announced April 2019.

    ACM Class: I.2.6

    Journal ref: Proceedings of the 22nd International Conference on Extending Database Technology, 2019. pp. 205-216

  31. arXiv:1611.05339  [pdf

    cs.CY

    CareerMapper: An Automated Resume Evaluation Tool

    Authors: Vivian Lai, Kyong Jin Shim, Richard J. Oentaryo, Philips K. Prasetyo, Casey Vu, Ee-Peng Lim, David Lo

    Abstract: The advent of the Web brought about major changes in the way people search for jobs and companies look for suitable candidates. As more employers and recruitment firms turn to the Web for job candidate search, an increasing number of people turn to the Web for uploading and creating their online resumes. Resumes are often the first source of information about candidates and also the first item of… ▽ More

    Submitted 16 November, 2016; originally announced November 2016.

    Journal ref: Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2016)

  32. arXiv:1104.3212  [pdf

    cs.DB cs.DS

    Similarity Join Size Estimation using Locality Sensitive Hashing

    Authors: Hongrae Lee, Raymond T. Ng, Kyuseok Shim

    Abstract: Similarity joins are important operations with a broad range of applications. In this paper, we study the problem of vector similarity join size estimation (VSJ). It is a generalization of the previously studied set similarity join size estimation (SSJ) problem and can handle more interesting cases such as TF-IDF vectors. One of the key challenges in similarity join size estimation is that the joi… ▽ More

    Submitted 16 April, 2011; originally announced April 2011.

    Comments: VLDB2011

    Journal ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 4, No. 6, pp. 338-349 (2011)