Skip to main content

Showing 1–16 of 16 results for author: Yu, I

  1. arXiv:2406.11769  [pdf, other

    cs.CV

    Solving Vision Tasks with Simple Photoreceptors Instead of Cameras

    Authors: Andrei Atanov, Jiawei Fu, Rishubh Singh, Isabella Yu, Andrew Spielberg, Amir Zamir

    Abstract: A de facto standard in solving computer vision problems is to use a common high-resolution camera and choose its placement on an agent (i.e., position and orientation) based on human intuition. On the other hand, extremely simple and well-designed visual sensors found throughout nature allow many organisms to perform diverse, complex behaviors. In this work, motivated by these examples, we raise t… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

  2. arXiv:2404.00380  [pdf, other

    cs.CV

    DHR: Dual Features-Driven Hierarchical Rebalancing in Inter- and Intra-Class Regions for Weakly-Supervised Semantic Segmentation

    Authors: Sanghyun Jo, Fei Pan, In-Jae Yu, Kyungsu Kim

    Abstract: Weakly-supervised semantic segmentation (WSS) ensures high-quality segmentation with limited data and excels when employed as input seed masks for large-scale vision models such as Segment Anything. However, WSS faces challenges related to minor classes since those are overlooked in images with adjacent multiple classes, a limitation originating from the overfitting of traditional expansion method… ▽ More

    Submitted 19 May, 2024; v1 submitted 30 March, 2024; originally announced April 2024.

  3. arXiv:2304.09913  [pdf, other

    cs.CV cs.AI

    MARS: Model-agnostic Biased Object Removal without Additional Supervision for Weakly-Supervised Semantic Segmentation

    Authors: Sanghyun Jo, In-Jae Yu, Kyungsu Kim

    Abstract: Weakly-supervised semantic segmentation aims to reduce labeling costs by training semantic segmentation models using weak supervision, such as image-level class labels. However, most approaches struggle to produce accurate localization maps and suffer from false predictions in class-related backgrounds (i.e., biased objects), such as detecting a railroad with the train class. Recent methods that r… ▽ More

    Submitted 19 April, 2023; originally announced April 2023.

  4. arXiv:2303.03915  [pdf, other

    cs.CL cs.AI

    The BigScience ROOTS Corpus: A 1.6TB Composite Multilingual Dataset

    Authors: Hugo Laurençon, Lucile Saulnier, Thomas Wang, Christopher Akiki, Albert Villanova del Moral, Teven Le Scao, Leandro Von Werra, Chenghao Mou, Eduardo González Ponferrada, Huu Nguyen, Jörg Frohberg, Mario Šaško, Quentin Lhoest, Angelina McMillan-Major, Gerard Dupont, Stella Biderman, Anna Rogers, Loubna Ben allal, Francesco De Toni, Giada Pistilli, Olivier Nguyen, Somaieh Nikpoor, Maraim Masoud, Pierre Colombo, Javier de la Rosa , et al. (29 additional authors not shown)

    Abstract: As language models grow ever larger, the need for large-scale high-quality text datasets has never been more pressing, especially in multilingual settings. The BigScience workshop, a 1-year international and multidisciplinary initiative, was formed with the goal of researching and training large language models as a values-driven undertaking, putting issues of ethics, harm, and governance in the f… ▽ More

    Submitted 7 March, 2023; originally announced March 2023.

    Comments: NeurIPS 2022, Datasets and Benchmarks Track

    ACM Class: I.2.7

  5. arXiv:2301.03988  [pdf, other

    cs.SE cs.AI cs.LG

    SantaCoder: don't reach for the stars!

    Authors: Loubna Ben Allal, Raymond Li, Denis Kocetkov, Chenghao Mou, Christopher Akiki, Carlos Munoz Ferrandis, Niklas Muennighoff, Mayank Mishra, Alex Gu, Manan Dey, Logesh Kumar Umapathi, Carolyn Jane Anderson, Yangtian Zi, Joel Lamy Poirier, Hailey Schoelkopf, Sergey Troshin, Dmitry Abulkhanov, Manuel Romero, Michael Lappert, Francesco De Toni, Bernardo García del Río, Qian Liu, Shamik Bose, Urvashi Bhattacharyya, Terry Yue Zhuo , et al. (16 additional authors not shown)

    Abstract: The BigCode project is an open-scientific collaboration working on the responsible development of large language models for code. This tech report describes the progress of the collaboration until December 2022, outlining the current state of the Personally Identifiable Information (PII) redaction pipeline, the experiments conducted to de-risk the model architecture, and the experiments investigat… ▽ More

    Submitted 24 February, 2023; v1 submitted 9 January, 2023; originally announced January 2023.

  6. arXiv:2211.05100  [pdf, other

    cs.CL

    BLOOM: A 176B-Parameter Open-Access Multilingual Language Model

    Authors: BigScience Workshop, :, Teven Le Scao, Angela Fan, Christopher Akiki, Ellie Pavlick, Suzana Ilić, Daniel Hesslow, Roman Castagné, Alexandra Sasha Luccioni, François Yvon, Matthias Gallé, Jonathan Tow, Alexander M. Rush, Stella Biderman, Albert Webson, Pawan Sasanka Ammanamanchi, Thomas Wang, Benoît Sagot, Niklas Muennighoff, Albert Villanova del Moral, Olatunji Ruwase, Rachel Bawden, Stas Bekman, Angelina McMillan-Major , et al. (369 additional authors not shown)

    Abstract: Large language models (LLMs) have been shown to be able to perform new tasks based on a few demonstrations or natural language instructions. While these capabilities have led to widespread adoption, most LLMs are developed by resource-rich organizations and are frequently kept from the public. As a step towards democratizing this powerful technology, we present BLOOM, a 176B-parameter open-access… ▽ More

    Submitted 27 June, 2023; v1 submitted 9 November, 2022; originally announced November 2022.

  7. arXiv:2204.06754  [pdf, other

    cs.CV cs.AI

    RecurSeed and EdgePredictMix: Pseudo-Label Refinement Learning for Weakly Supervised Semantic Segmentation across Single- and Multi-Stage Frameworks

    Authors: Sanghyun Jo, In-Jae Yu, Kyungsu Kim

    Abstract: Although weakly supervised semantic segmentation using only image-level labels (WSSS-IL) is potentially useful, its low performance and implementation complexity still limit its application. The main causes are (a) non-detection and (b) false-detection phenomena: (a) The class activation maps refined from existing WSSS-IL methods still only represent partial regions for large-scale objects, and (b… ▽ More

    Submitted 15 December, 2023; v1 submitted 14 April, 2022; originally announced April 2022.

  8. arXiv:2108.12947  [pdf, other

    eess.IV cs.CV cs.LG cs.MM

    Learning JPEG Compression Artifacts for Image Manipulation Detection and Localization

    Authors: Myung-Joon Kwon, Seung-Hun Nam, In-Jae Yu, Heung-Kyu Lee, Changick Kim

    Abstract: Detecting and localizing image manipulation are necessary to counter malicious use of image editing techniques. Accordingly, it is essential to distinguish between authentic and tampered regions by analyzing intrinsic statistics in an image. We focus on JPEG compression artifacts left during image acquisition and editing. We propose a convolutional neural network (CNN) that uses discrete cosine tr… ▽ More

    Submitted 25 May, 2022; v1 submitted 29 August, 2021; originally announced August 2021.

    Comments: The version of record of this article, published in the International Journal of Computer Vision (IJCV), is available online at Publisher's website: https://link.springer.com/article/10.1007/s11263-022-01617-5 ; Code is available at: https://github.com/mjkwon2021/CAT-Net

    Journal ref: International Journal of Computer Vision (IJCV), 2022

  9. arXiv:2108.08197  [pdf

    cs.LG cs.AI

    CARE: Coherent Actionable Recourse based on Sound Counterfactual Explanations

    Authors: Peyman Rasouli, Ingrid Chieh Yu

    Abstract: Counterfactual explanation methods interpret the outputs of a machine learning model in the form of "what-if scenarios" without compromising the fidelity-interpretability trade-off. They explain how to obtain a desired prediction from the model by recommending small changes to the input features, aka recourse. We believe an actionable recourse should be created based on sound counterfactual explan… ▽ More

    Submitted 18 August, 2021; originally announced August 2021.

  10. arXiv:2107.08939  [pdf, other

    cs.MM cs.AI cs.CV

    DHNet: Double MPEG-4 Compression Detection via Multiple DCT Histograms

    Authors: Seung-Hun Nam, Wonhyuk Ahn, Myung-Joon Kwon, Jihyeon Kang, In-Jae Yu

    Abstract: In this article, we aim to detect the double compression of MPEG-4, a universal video codec that is built into surveillance systems and shooting devices. Double compression is accompanied by various types of video manipulation, and its traces can be exploited to determine whether a video is a forgery. To this end, we present a neural network-based approach with discriminant features for capturing… ▽ More

    Submitted 15 April, 2022; v1 submitted 19 July, 2021; originally announced July 2021.

    Comments: Accepted to IEEE MultiMedia

  11. arXiv:2103.13674  [pdf, other

    cs.MM cs.AI cs.CV

    Frame-rate Up-conversion Detection Based on Convolutional Neural Network for Learning Spatiotemporal Features

    Authors: Minseok Yoon, Seung-Hun Nam, In-Jae Yu, Wonhyuk Ahn, Myung-Joon Kwon, Heung-Kyu Lee

    Abstract: With the advance in user-friendly and powerful video editing tools, anyone can easily manipulate videos without leaving prominent visual traces. Frame-rate up-conversion (FRUC), a representative temporal-domain operation, increases the motion continuity of videos with a lower frame-rate and is used by malicious counterfeiters in video tampering such as generating fake frame-rate video without impr… ▽ More

    Submitted 25 March, 2021; originally announced March 2021.

    Comments: preprint; under review

  12. Puzzle-CAM: Improved localization via matching partial and full features

    Authors: Sanghyun Jo, In-Jae Yu

    Abstract: Weakly-supervised semantic segmentation (WSSS) is introduced to narrow the gap for semantic segmentation performance from pixel-level supervision to image-level supervision. Most advanced approaches are based on class activation maps (CAMs) to generate pseudo-labels to train the segmentation network. The main limitation of WSSS is that the process of generating pseudo-labels from CAMs that use an… ▽ More

    Submitted 23 September, 2021; v1 submitted 27 January, 2021; originally announced January 2021.

    Comments: Accepted to ICIP 2021

  13. arXiv:2008.06255  [pdf, other

    cs.MM cs.CR cs.CV

    WAN: Watermarking Attack Network

    Authors: Seung-Hun Nam, In-Jae Yu, Seung-Min Mun, Daesik Kim, Wonhyuk Ahn

    Abstract: Multi-bit watermarking (MW) has been developed to improve robustness against signal processing operations and geometric distortions. To this end, benchmark tools that test robustness by applying simulated attacks on watermarked images are available. However, limitations in these general attacks exist since they cannot exploit specific characteristics of the targeted MW. In addition, these attacks… ▽ More

    Submitted 20 October, 2021; v1 submitted 14 August, 2020; originally announced August 2020.

    Comments: Accepted to BMVC 2021

  14. Deep Convolutional Neural Network for Identifying Seam-Carving Forgery

    Authors: Seung-Hun Nam, Wonhyuk Ahn, In-Jae Yu, Myung-Joon Kwon, Minseok Son, Heung-Kyu Lee

    Abstract: Seam carving is a representative content-aware image retargeting approach to adjust the size of an image while preserving its visually prominent content. To maintain visually important content, seam-carving algorithms first calculate the connected path of pixels, referred to as the seam, according to a defined cost function and then adjust the size of an image by removing and duplicating repeatedl… ▽ More

    Submitted 7 July, 2020; v1 submitted 5 July, 2020; originally announced July 2020.

  15. arXiv:2006.16625  [pdf, other

    eess.IV cs.CR cs.CV cs.LG cs.MM

    BitMix: Data Augmentation for Image Steganalysis

    Authors: In-Jae Yu, Wonhyuk Ahn, Seung-Hun Nam, Heung-Kyu Lee

    Abstract: Convolutional neural networks (CNN) for image steganalysis demonstrate better performances with employing concepts from high-level vision tasks. The major employed concept is to use data augmentation to avoid overfitting due to limited data. To augment data without damaging the message embedding, only rotating multiples of 90 degrees or horizontally flipping are used in steganalysis, which generat… ▽ More

    Submitted 30 June, 2020; originally announced June 2020.

  16. Modeling and Simulation of Spark Streaming

    Authors: Jia-Chun Lin, Ming-Chang Lee, Ingrid Chieh Yu, Einar Broch Johnsen

    Abstract: As more and more devices connect to Internet of Things, unbounded streams of data will be generated, which have to be processed "on the fly" in order to trigger automated actions and deliver real-time services. Spark Streaming is a popular realtime stream processing framework. To make efficient use of Spark Streaming and achieve stable stream processing, it requires a careful interplay between dif… ▽ More

    Submitted 11 September, 2018; v1 submitted 27 August, 2018; originally announced August 2018.

    Comments: 7 pages and 13 figures. This paper is published in IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA 2018)