Skip to main content

Showing 1–12 of 12 results for author: Woo, M

  1. arXiv:2311.12560  [pdf

    cs.CV

    Benchmarking bias: Expanding clinical AI model card to incorporate bias reporting of social and non-social factors

    Authors: Carolina A. M. Heming, Mohamed Abdalla, Shahram Mohanna, Monish Ahluwalia, Linglin Zhang, Hari Trivedi, MinJae Woo, Benjamin Fine, Judy Wawira Gichoya, Leo Anthony Celi, Laleh Seyyed-Kalantari

    Abstract: Clinical AI model reporting cards should be expanded to incorporate a broad bias reporting of both social and non-social factors. Non-social factors consider the role of other factors, such as disease dependent, anatomic, or instrument factors on AI model bias, which are essential to ensure safe deployment.

    Submitted 2 July, 2024; v1 submitted 21 November, 2023; originally announced November 2023.

  2. arXiv:2310.05299  [pdf

    eess.IV cs.CV cs.LG

    Image Compression and Decompression Framework Based on Latent Diffusion Model for Breast Mammography

    Authors: InChan Hwang, MinJae Woo

    Abstract: This research presents a novel framework for the compression and decompression of medical images utilizing the Latent Diffusion Model (LDM). The LDM represents advancement over the denoising diffusion probabilistic model (DDPM) with a potential to yield superior image quality while requiring fewer computational resources in the image decompression process. A possible application of LDM and Torchvi… ▽ More

    Submitted 8 October, 2023; originally announced October 2023.

    Comments: 6 pages IEEE conference

  3. arXiv:2305.04422  [pdf

    eess.IV cs.CV cs.CY cs.LG

    Multivariate Analysis on Performance Gaps of Artificial Intelligence Models in Screening Mammography

    Authors: Linglin Zhang, Beatrice Brown-Mulry, Vineela Nalla, InChan Hwang, Judy Wawira Gichoya, Aimilia Gastounioti, Imon Banerjee, Laleh Seyyed-Kalantari, MinJae Woo, Hari Trivedi

    Abstract: Although deep learning models for abnormality classification can perform well in screening mammography, the demographic, imaging, and clinical characteristics associated with increased risk of model failure remain unclear. This retrospective study uses the Emory BrEast Imaging Dataset(EMBED) containing mammograms from 115931 patients imaged at Emory Healthcare between 2013-2020, with BI-RADS asses… ▽ More

    Submitted 19 October, 2023; v1 submitted 7 May, 2023; originally announced May 2023.

    Comments: 29 pages, 6 tables, 7 figures, 2 supplemental tables

  4. arXiv:2211.15605  [pdf

    cs.DC cs.MS cs.SE

    Development of an Equation-based Parallelization Method for Multiphase Particle-in-Cell Simulations

    Authors: Mino Woo, Terry Jordan, Tarak Nandi, Jean Francois Dietiker, Christopher Guenther, Dirk Van Essendelft

    Abstract: Manufacturers have been developing new graphics processing unit (GPU) nodes with large capacity, high bandwidth memory and very high bandwidth intra-node interconnects. This enables moving large amounts of data between GPUs on the same node at low cost. However, small packet bandwidths and latencies have not decreased which makes global dot products expensive. These characteristics favor a new kin… ▽ More

    Submitted 28 November, 2022; originally announced November 2022.

    Comments: 28 pages, 11 figures

  5. arXiv:2209.13768  [pdf, other

    cs.DC cs.AR cs.MS cs.PF

    Disruptive Changes in Field Equation Modeling: A Simple Interface for Wafer Scale Engines

    Authors: Mino Woo, Terry Jordan, Robert Schreiber, Ilya Sharapov, Shaheer Muhammad, Abhishek Koneru, Michael James, Dirk Van Essendelft

    Abstract: We present a high-level and accessible Application Programming Interface (API) for the solution of field equations on the Cerebras Systems Wafer-Scale Engine (WSE) with over two orders of magnitude performance gain relative to traditional distributed computing approaches. The domain-specific API is called the WSE Field-equation API (WFA). The WFA outperforms OpenFOAM on NETL's Joule 2.0 supercompu… ▽ More

    Submitted 28 September, 2022; v1 submitted 27 September, 2022; originally announced September 2022.

    Comments: 22 pages, 5 figures, 2 Tables

    ACM Class: J.2; I.6

  6. arXiv:2202.04073  [pdf

    eess.IV cs.CV cs.LG

    The EMory BrEast imaging Dataset (EMBED): A Racially Diverse, Granular Dataset of 3.5M Screening and Diagnostic Mammograms

    Authors: Jiwoong J. Jeong, Brianna L. Vey, Ananth Reddy, Thomas Kim, Thiago Santos, Ramon Correa, Raman Dutt, Marina Mosunjac, Gabriela Oprea-Ilies, Geoffrey Smith, Minjae Woo, Christopher R. McAdams, Mary S. Newell, Imon Banerjee, Judy Gichoya, Hari Trivedi

    Abstract: Developing and validating artificial intelligence models in medical imaging requires datasets that are large, granular, and diverse. To date, the majority of publicly available breast imaging datasets lack in one or more of these areas. Models trained on these data may therefore underperform on patient populations or pathologies that have not previously been encountered. The EMory BrEast imaging D… ▽ More

    Submitted 8 February, 2022; originally announced February 2022.

  7. arXiv:2201.11844  [pdf

    cs.CR cs.CV physics.optics

    Speckle-based optical cryptosystem and its application for human face recognition via deep learning

    Authors: Qi Zhao, Huanhao Li, Zhipeng Yu, Chi Man Woo, Tianting Zhong, Shengfu Cheng, Yuanjin Zheng, Honglin Liu, Jie Tian, Puxiang Lai

    Abstract: Face recognition has recently become ubiquitous in many scenes for authentication or security purposes. Meanwhile, there are increasing concerns about the privacy of face images, which are sensitive biometric data that should be carefully protected. Software-based cryptosystems are widely adopted nowadays to encrypt face images, but the security level is limited by insufficient digital secret key… ▽ More

    Submitted 26 January, 2022; originally announced January 2022.

  8. arXiv:2012.09155  [pdf, other

    cs.PL cs.CR cs.SE

    On the Generation of Disassembly Ground Truth and the Evaluation of Disassemblers

    Authors: Kaiyuan Li, Maverick Woo, Limin Jia

    Abstract: When a software transformation or software security task needs to analyze a given program binary, the first step is often disassembly. Since many modern disassemblers have become highly accurate on many binaries, we believe reliable disassembler benchmarking requires standardizing the set of binaries used and the disassembly ground truth about these binaries. This paper presents (i) a first versio… ▽ More

    Submitted 11 December, 2020; originally announced December 2020.

    Comments: Revised and extended version of our publication that first appeared in the 2020 Workshop on Forming an Ecosystem Around Software Transformation (FEAST '20), November 13, 2020

  9. arXiv:2002.03009  [pdf

    eess.SP cs.LG physics.chem-ph

    Blind Source Separation for NMR Spectra with Negative Intensity

    Authors: Ryan J. McCarty, Nimish Ronghe, Mandy Woo, Todd M. Alam

    Abstract: NMR spectral datasets, especially in systems with limited samples, can be difficult to interpret if they contain multiple chemical components (phases, polymorphs, molecules, crystals, glasses, etc...) and the possibility of overlapping resonances. In this paper, we benchmark several blind source separation techniques for analysis of NMR spectral datasets containing negative intensity. For benchmar… ▽ More

    Submitted 7 February, 2020; originally announced February 2020.

    Comments: 28 pages, 6 figures, 5 tables

    MSC Class: 62H25 ACM Class: J.2

  10. arXiv:1912.07224  [pdf, other

    eess.IV cs.CV

    Domain Knowledge Based Brain Tumor Segmentation and Overall Survival Prediction

    Authors: Xiaoqing Guo, Chen Yang, Pak Lun Lam, Peter Y. M. Woo, Yixuan Yuan

    Abstract: Automatically segmenting sub-regions of gliomas (necrosis, edema and enhancing tumor) and accurately predicting overall survival (OS) time from multimodal MRI sequences have important clinical significance in diagnosis, prognosis and treatment of gliomas. However, due to the high degree variations of heterogeneous appearance and individual physical state, the segmentation of sub-regions and OS pre… ▽ More

    Submitted 16 December, 2019; originally announced December 2019.

    Comments: 11 pages, 5 figures, BrainLes 2019

  11. arXiv:1812.00140  [pdf, ps, other

    cs.CR cs.SE

    The Art, Science, and Engineering of Fuzzing: A Survey

    Authors: Valentin J. M. Manes, HyungSeok Han, Choongwoo Han, Sang Kil Cha, Manuel Egele, Edward J. Schwartz, Maverick Woo

    Abstract: Among the many software vulnerability discovery techniques available today, fuzzing has remained highly popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of empirical evidence in discovering real-world software vulnerabilities. At a high level, fuzzing refers to a process of repeatedly running a program with generated inputs that may be syntactically or s… ▽ More

    Submitted 7 April, 2019; v1 submitted 30 November, 2018; originally announced December 2018.

    Comments: 29 pages, under submission to ACM Computing Surveys (July 2018) - 2018.12.10 update: correct minor mistakes in overview table - 2019.02.16 update: source clean - 2019.04.08: submission to TSE, 21 pages

  12. arXiv:1106.5890  [pdf, ps, other

    cs.AI

    A Comparison of Lex Bounds for Multiset Variables in Constraint Programming

    Authors: Yat-Chiu Law, Jimmy Ho-Man Lee, May Hiu-Chun Woo, Toby Walsh

    Abstract: Set and multiset variables in constraint programming have typically been represented using subset bounds. However, this is a weak representation that neglects potentially useful information about a set such as its cardinality. For set variables, the length-lex (LL) representation successfully provides information about the length (cardinality) and position in the lexicographic ordering. For multis… ▽ More

    Submitted 29 June, 2011; originally announced June 2011.

    Comments: 7 pages, Proceedings of the Twenty-Fifth AAAI Conference on Artificial Intelligence (AAAI-11)