Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–33 of 33 results for author: Doan, D

.
  1. arXiv:2406.17381  [pdf, other

    cs.LG cs.CV

    Forget but Recall: Incremental Latent Rectification in Continual Learning

    Authors: Nghia D. Nguyen, Hieu Trung Nguyen, Ang Li, Hoang Pham, Viet Anh Nguyen, Khoa D. Doan

    Abstract: Intrinsic capability to continuously learn a changing data stream is a desideratum of deep neural networks (DNNs). However, current DNNs suffer from catastrophic forgetting, which hinders remembering past knowledge. To mitigate this issue, existing Continual Learning (CL) approaches either retain exemplars for replay, regularize learning, or allocate dedicated capacity for new tasks. This paper in… ▽ More

    Submitted 25 June, 2024; originally announced June 2024.

  2. arXiv:2406.16751  [pdf, other

    cs.CL cs.SD eess.AS

    Towards Zero-Shot Text-To-Speech for Arabic Dialects

    Authors: Khai Duy Doan, Abdul Waheed, Muhammad Abdul-Mageed

    Abstract: Zero-shot multi-speaker text-to-speech (ZS-TTS) systems have advanced for English, however, it still lags behind due to insufficient resources. We address this gap for Arabic, a language of more than 450 million native speakers, by first adapting a sizeable existing dataset to suit the needs of speech synthesis. Additionally, we employ a set of Arabic dialect identification models to explore the i… ▽ More

    Submitted 25 June, 2024; v1 submitted 24 June, 2024; originally announced June 2024.

  3. arXiv:2406.13411  [pdf, other

    cs.CV cs.LG

    Composite Concept Extraction through Backdooring

    Authors: Banibrata Ghosh, Haripriya Harikumar, Khoa D Doan, Svetha Venkatesh, Santu Rana

    Abstract: Learning composite concepts, such as \textquotedbl red car\textquotedbl , from individual examples -- like a white car representing the concept of \textquotedbl car\textquotedbl{} and a red strawberry representing the concept of \textquotedbl red\textquotedbl -- is inherently challenging. This paper introduces a novel method called Composite Concept Extractor (CoCE), which leverages techniques fro… ▽ More

    Submitted 21 June, 2024; v1 submitted 19 June, 2024; originally announced June 2024.

  4. arXiv:2312.05174  [pdf, other

    physics.optics cond-mat.mtrl-sci

    High Absorptivity Nanotextured Powders for Additive Manufacturing

    Authors: Ottman A. Tertuliano, Philip J. DePond, Andrew C. Lee, Jiho Hong, David Doan, Luc Capaldi, Mark Brongersma, X. Wendy Gu, Manyalibo J. Matthews, Wei Cai, Adrian J. Lew

    Abstract: The widespread application of metal additive manufacturing (AM) is limited by the ability to control the complex interactions between the energy source and the feedstock material. Here we develop a generalizable process to introduce nanoscale grooves to the surface of metal powders which increases the powder absorptivity by up to 70% during laser powder bed fusion. Absorptivity enhancements in cop… ▽ More

    Submitted 8 December, 2023; originally announced December 2023.

  5. arXiv:2312.03419  [pdf, other

    cs.CR

    Synthesizing Physical Backdoor Datasets: An Automated Framework Leveraging Deep Generative Models

    Authors: Sze Jue Yang, Chinh D. La, Quang H. Nguyen, Kok-Seng Wong, Anh Tuan Tran, Chee Seng Chan, Khoa D. Doan

    Abstract: Backdoor attacks, representing an emerging threat to the integrity of deep neural networks, have garnered significant attention due to their ability to compromise deep learning systems clandestinely. While numerous backdoor attacks occur within the digital realm, their practical implementation in real-world prediction systems remains limited and vulnerable to disturbances in the physical world. Co… ▽ More

    Submitted 15 March, 2024; v1 submitted 6 December, 2023; originally announced December 2023.

  6. arXiv:2311.09696  [pdf, other

    cs.CL

    Fumbling in Babel: An Investigation into ChatGPT's Language Identification Ability

    Authors: Wei-Rui Chen, Ife Adebara, Khai Duy Doan, Qisheng Liao, Muhammad Abdul-Mageed

    Abstract: ChatGPT has recently emerged as a powerful NLP tool that can carry out a variety of tasks. However, the range of languages ChatGPT can handle remains largely a mystery. To uncover which languages ChatGPT `knows', we investigate its language identification (LID) abilities. For this purpose, we compile Babel-670, a benchmark comprising 670 languages representing 24 language families spoken in five c… ▽ More

    Submitted 8 April, 2024; v1 submitted 16 November, 2023; originally announced November 2023.

    Comments: Accepted to NAACL 2024 Findings

  7. arXiv:2310.14557  [pdf, other

    cs.CL

    The Skipped Beat: A Study of Sociopragmatic Understanding in LLMs for 64 Languages

    Authors: Chiyu Zhang, Khai Duy Doan, Qisheng Liao, Muhammad Abdul-Mageed

    Abstract: Instruction tuned large language models (LLMs), such as ChatGPT, demonstrate remarkable performance in a wide range of tasks. Despite numerous recent studies that examine the performance of instruction-tuned LLMs on various NLP benchmarks, there remains a lack of comprehensive investigation into their ability to understand cross-lingual sociopragmatic meaning (SM), i.e., meaning embedded within so… ▽ More

    Submitted 23 October, 2023; originally announced October 2023.

    Comments: Accepted by EMNLP 2023 Main conference

  8. arXiv:2310.01452  [pdf, other

    cs.CL cs.AI

    Fooling the Textual Fooler via Randomizing Latent Representations

    Authors: Duy C. Hoang, Quang H. Nguyen, Saurav Manchanda, MinLong Peng, Kok-Seng Wong, Khoa D. Doan

    Abstract: Despite outstanding performance in a variety of NLP tasks, recent studies have revealed that NLP models are vulnerable to adversarial attacks that slightly perturb the input to cause the models to misbehave. Among these attacks, adversarial word-level perturbations are well-studied and effective attack strategies. Since these attacks work in black-box settings, they do not require access to the mo… ▽ More

    Submitted 9 June, 2024; v1 submitted 2 October, 2023; originally announced October 2023.

    Comments: Accepted to Findings of ACL 2024

  9. arXiv:2310.00567  [pdf, other

    cs.LG cs.AI cs.CV

    Understanding the Robustness of Randomized Feature Defense Against Query-Based Adversarial Attacks

    Authors: Quang H. Nguyen, Yingjie Lao, Tung Pham, Kok-Seng Wong, Khoa D. Doan

    Abstract: Recent works have shown that deep neural networks are vulnerable to adversarial examples that find samples close to the original image but can make the model misclassify. Even with access only to the model's output, an attacker can employ black-box attacks to generate such adversarial examples. In this work, we propose a simple and lightweight defense against black-box attacks by adding random noi… ▽ More

    Submitted 30 September, 2023; originally announced October 2023.

  10. arXiv:2308.16684  [pdf, other

    cs.CR cs.AI cs.CV cs.LG

    Everyone Can Attack: Repurpose Lossy Compression as a Natural Backdoor Attack

    Authors: Sze Jue Yang, Quang Nguyen, Chee Seng Chan, Khoa D. Doan

    Abstract: The vulnerabilities to backdoor attacks have recently threatened the trustworthiness of machine learning models in practical applications. Conventional wisdom suggests that not everyone can be an attacker since the process of designing the trigger generation algorithm often involves significant effort and extensive experimentation to ensure the attack's stealthiness and effectiveness. Alternativel… ▽ More

    Submitted 3 September, 2023; v1 submitted 31 August, 2023; originally announced August 2023.

    Comments: 14 pages. This paper shows everyone can mount a powerful and stealthy backdoor attack with the widely-used lossy image compression

  11. arXiv:2308.02943  [pdf

    cond-mat.soft

    Direct observation of phase transitions in Archimedean trunctated tetrahedrons under quasi-2D confinement

    Authors: David Doan, John Kulikowski, X. Wendy Gu

    Abstract: Colloidal crystals are used to understand fundamentals of atomic rearrangements in condensed matter and build complex metamaterials with unique functionalities. Simulations predict a multitude of self-assembled crystal structures from anisotropic colloids, but these shapes have been challenging to fabricate. Here, we use two-photon lithography to fabricate Archimedean truncated tetrahedrons and se… ▽ More

    Submitted 5 August, 2023; originally announced August 2023.

  12. arXiv:2306.14920  [pdf, other

    cs.LG

    A Cosine Similarity-based Method for Out-of-Distribution Detection

    Authors: Nguyen Ngoc-Hieu, Nguyen Hung-Quang, The-Anh Ta, Thanh Nguyen-Tang, Khoa D Doan, Hoang Thanh-Tung

    Abstract: The ability to detect OOD data is a crucial aspect of practical machine learning applications. In this work, we show that cosine similarity between the test feature and the typical ID feature is a good indicator of OOD data. We propose Class Typical Matching (CTM), a post hoc OOD detection algorithm that uses a cosine similarity scoring function. Extensive experiments on multiple benchmarks show t… ▽ More

    Submitted 23 June, 2023; originally announced June 2023.

    Comments: Accepted paper at ICML 2023 Workshop on Spurious Correlations, Invariance, and Stability. 10 pages (4 main + appendix)

  13. arXiv:2210.09194  [pdf, other

    cs.CR cs.CV

    Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class

    Authors: Khoa D. Doan, Yingjie Lao, Ping Li

    Abstract: In recent years, machine learning models have been shown to be vulnerable to backdoor attacks. Under such attacks, an adversary embeds a stealthy backdoor into the trained model such that the compromised models will behave normally on clean inputs but will misclassify according to the adversary's control on maliciously constructed input with a trigger. While these existing attacks are very effecti… ▽ More

    Submitted 17 October, 2022; originally announced October 2022.

    Comments: Accepted to NeurIPS 2022

  14. arXiv:2210.04288  [pdf, other

    cs.CV cs.IR cs.LG

    CoopHash: Cooperative Learning of Multipurpose Descriptor and Contrastive Pair Generator via Variational MCMC Teaching for Supervised Image Hashing

    Authors: Khoa D. Doan, Jianwen Xie, Yaxuan Zhu, Yang Zhao, Ping Li

    Abstract: Leveraging supervised information can lead to superior retrieval performance in the image hashing domain but the performance degrades significantly without enough labeled data. One effective solution to boost performance is to employ generative models, such as Generative Adversarial Networks (GANs), to generate synthetic data in an image hashing model. However, GAN-based methods are difficult to t… ▽ More

    Submitted 12 June, 2024; v1 submitted 9 October, 2022; originally announced October 2022.

  15. arXiv:2206.12381  [pdf, other

    cs.CV

    Defending Backdoor Attacks on Vision Transformer via Patch Processing

    Authors: Khoa D. Doan, Yingjie Lao, Peng Yang, Ping Li

    Abstract: Vision Transformers (ViTs) have a radically different architecture with significantly less inductive bias than Convolutional Neural Networks. Along with the improvement in performance, security and robustness of ViTs are also of great importance to study. In contrast to many recent works that exploit the robustness of ViTs against adversarial examples, this paper investigates a representative caus… ▽ More

    Submitted 16 January, 2023; v1 submitted 24 June, 2022; originally announced June 2022.

  16. arXiv:2205.15721  [pdf, other

    cs.CV cs.IR cs.LG

    One Loss for Quantization: Deep Hashing with Discrete Wasserstein Distributional Matching

    Authors: Khoa D. Doan, Peng Yang, Ping Li

    Abstract: Image hashing is a principled approximate nearest neighbor approach to find similar items to a query in a large collection of images. Hashing aims to learn a binary-output function that maps an image to a binary vector. For optimal retrieval performance, producing balanced hash codes with low-quantization error to bridge the gap between the learning stage's continuous relaxation and the inference… ▽ More

    Submitted 31 May, 2022; originally announced May 2022.

    Comments: CVPR 2022

  17. arXiv:2102.08783  [pdf, other

    math.CO

    Forbidden induced subgraphs for perfectness of claw-free graphs of independence number at least 4

    Authors: Christoph Brause, Trung Duy Doan, Přemysl Holub, Adam Kabela, Zdeněk Ryjáček, Ingo Schiermeyer, Petr Vrána

    Abstract: For every graph $X$, we consider the class of all connected $\{K_{1,3}, X\}$-free graphs which are distinct from an odd cycle and have independence number at least $4$, and we show that all graphs in the class are perfect if and only if $X$ is an induced subgraph of some of $P_6$, $K_1 \cup P_5$, $2P_3$, $Z_2$ or $K_1 \cup Z_1$. Furthermore, for $X$ chosen as $2K_1 \cup K_3$, we list all eight imp… ▽ More

    Submitted 1 September, 2021; v1 submitted 17 February, 2021; originally announced February 2021.

  18. Stress Induced Structural Transformations in Au Nanocrystals

    Authors: Abhinav Parakh, Sangryun Lee, Mehrdad T. Kiani, David Doan, Martin Kunz, Andrew Doran, Seunghwa Ryu, X. Wendy Gu

    Abstract: Nanocrystals can exist in multiply twinned structures like the icosahedron, or single crystalline structures like the cuboctahedron or Wulff-polyhedron. Structural transformation between these polymorphic structures can proceed through diffusion or displacive motion. Experimental studies on nanocrystal structural transformations have focused on high temperature diffusion mediated processes. Thus,… ▽ More

    Submitted 28 August, 2020; originally announced August 2020.

    Comments: 32 pages, 14 figures, and 1 movie (please open pdf with Adobe Acrobat Reader to see the embedded movie)

  19. arXiv:2003.11774  [pdf, other

    cs.CV cs.LG eess.IV

    Image Generation Via Minimizing Fréchet Distance in Discriminator Feature Space

    Authors: Khoa D. Doan, Saurav Manchanda, Fengjiao Wang, Sathiya Keerthi, Avradeep Bhowmik, Chandan K. Reddy

    Abstract: For a given image generation problem, the intrinsic image manifold is often low dimensional. We use the intuition that it is much better to train the GAN generator by minimizing the distributional distance between real and generated images in a small dimensional feature space representing such a manifold than on the original pixel-space. We use the feature space of the GAN discriminator for such a… ▽ More

    Submitted 30 March, 2020; v1 submitted 26 March, 2020; originally announced March 2020.

  20. arXiv:2003.00134  [pdf, other

    cs.IR cs.CV cs.LG

    Image Hashing by Minimizing Discrete Component-wise Wasserstein Distance

    Authors: Khoa D. Doan, Saurav Manchanda, Sarkhan Badirli, Chandan K. Reddy

    Abstract: Image hashing is one of the fundamental problems that demand both efficient and effective solutions for various practical scenarios. Adversarial autoencoders are shown to be able to implicitly learn a robust, locality-preserving hash function that generates balanced and high-quality hash codes. However, the existing adversarial hashing methods are inefficient to be employed for large-scale image r… ▽ More

    Submitted 25 May, 2020; v1 submitted 28 February, 2020; originally announced March 2020.

  21. arXiv:2002.10071  [pdf, ps, other

    stat.CO

    Black-box sampling for weakly smooth Langevin Monte Carlo using p-generalized Gaussian smoothing

    Authors: Anh Duc Doan, Xin Dang, Dao Nguyen

    Abstract: Discretization of continuous-time diffusion processes is a widely recognized method for sampling. However, the canonical Euler-Maruyama discretization of the Langevin diffusion process, also named as Langevin Monte Carlo (LMC), studied mostly in the context of smooth (gradient-Lipschitz) and strongly log-concave densities, a significant constraint for its deployment in many sciences, including com… ▽ More

    Submitted 5 October, 2020; v1 submitted 23 February, 2020; originally announced February 2020.

  22. arXiv:1911.01118  [pdf, ps, other

    math.CO

    Proper rainbow connection number of graphs

    Authors: Trung Duy Doan, Ingo Schiermeyer

    Abstract: A path in an edge-coloured graph is called \emph{rainbow path} if its edges receive pairwise distinct colours. An edge-coloured graph is said to be \emph{rainbow connected} if any two distinct vertices of the graph are connected by a rainbow path. The minimum $k$ for which there exists such an edge-colouring is the rainbow connection number $rc(G)$ of $G.$ Recently, Bau et al. \cite{BJJKM2018} int… ▽ More

    Submitted 4 November, 2019; originally announced November 2019.

    MSC Class: 05C15; 05C40; 05C07

  23. Nucleation of Dislocations in 3.9 nm Nanocrystals at High Pressure

    Authors: Abhinav Parakh, Sangryun Lee, K. Anika Harkins, Mehrdad T. Kiani, David Doan, Martin Kunz, Andrew Doran, Lindsey A. Hanson, Seunghwa Ryu, X. Wendy Gu

    Abstract: As circuitry approaches single nanometer length scales, it is important to predict the stability of metals at these scales. The behavior of metals at larger scales can be predicted based on the behavior of dislocations, but it is unclear if dislocations can form and be sustained at single nanometer dimensions. Here, we report the formation of dislocations within individual 3.9 nm Au nanocrystals u… ▽ More

    Submitted 20 September, 2019; originally announced September 2019.

    Comments: 33 pages, 12 figures

    Journal ref: Phys. Rev. Lett. 124, 106104 (2020)

  24. Development and Experimental Evaluation of Grey-Box Models for Application in Model Predictive Control of a Microscale Polygeneration System

    Authors: Parantapa Sawant, Adrian Bürger, Minh Dang Doan, Clemens Felsmann, Jens Pfafferott

    Abstract: With the need for optimisation based supervisory controllers for complex energy systems, comes the need for reduced order system models representing not only the non-linear characteristics of the components, but also certain unknown process dynamics like their internal control logic. We present in this paper an extensive literature study of existing methods and a rational modelling procedure based… ▽ More

    Submitted 10 May, 2019; originally announced May 2019.

  25. arXiv:1811.02963  [pdf, other

    stat.CO

    Simulation-based inference methods for partially observed Markov model via the R package is2

    Authors: Duc Anh Doan, Dao Nguyen, Xin Dang

    Abstract: Partially observed Markov process (POMP) models are powerful tools for time series modeling and analysis. Inherited the flexible framework of R package pomp, the is2 package extends some useful Monte Carlo statistical methodologies to improve on convergence rates. A variety of efficient statistical methods for POMP models have been developed including fixed lag smoothing, second-order iterated smo… ▽ More

    Submitted 7 November, 2018; originally announced November 2018.

  26. arXiv:1707.01634  [pdf, ps, other

    math.CO

    Graphs with conflict-free connection number two

    Authors: Hong Chang, Trung Duy Doan, Zhong Huang, Stanislav Jendrol', Xueliang Li, Ingo Schiermeyer

    Abstract: An edge-colored graph $G$ is \emph{conflict-free connected} if any two of its vertices are connected by a path, which contains a color used on exactly one of its edges. The \emph{conflict-free connection number} of a connected graph $G$, denoted by $cfc(G)$, is the smallest number of colors needed in order to make $G$ conflict-free connected. For a graph $G,$ let $C(G)$ be the subgraph of $G$ indu… ▽ More

    Submitted 8 May, 2018; v1 submitted 6 July, 2017; originally announced July 2017.

    Comments: 13 pages

    MSC Class: 05C15; 05C40; 05C07

  27. arXiv:1303.5347  [pdf

    physics.geo-ph

    Evolution of seismic velocities in heavy oil sand reservoirs during thermal recovery process

    Authors: Jean-François Nauroy, Dinh Hong Doan, N. Guy, Axelle Baroni, Pierre Delage, Marc Mainguy

    Abstract: In thermally enhanced recovery processes like cyclic steam stimulation (CSS) or steam assisted gravity drainage (SAGD), continuous steam injection entails changes in pore fluid, pore pressure and temperature in the rock reservoir, that are most often unconsolidated or weakly consolidated sandstones. This in turn increases or decreases the effective stresses and changes the elastic properties of th… ▽ More

    Submitted 21 March, 2013; originally announced March 2013.

    Journal ref: Oil and Gas Science and Technology 67, 6 (2012) 1029-1039

  28. arXiv:1302.2093  [pdf, ps, other

    math.OC cs.MA eess.SY math.NA

    A distributed accelerated gradient algorithm for distributed model predictive control of a hydro power valley

    Authors: Minh Dang Doan, Pontus Giselsson, Tamás Keviczky, Bart De Schutter, Anders Rantzer

    Abstract: A distributed model predictive control (DMPC) approach based on distributed optimization is applied to the power reference tracking problem of a hydro power valley (HPV) system. The applied optimization algorithm is based on accelerated gradient methods and achieves a convergence rate of O(1/k^2), where k is the iteration number. Major challenges in the control of the HPV include a nonlinear and l… ▽ More

    Submitted 8 February, 2013; originally announced February 2013.

  29. arXiv:1109.1214  [pdf, ps, other

    math.OC cs.MA eess.SY

    A distributed optimization-based approach for hierarchical model predictive control of large-scale systems with coupled dynamics and constraints

    Authors: Minh Dang Doan, Tamás Keviczky, Bart De Schutter

    Abstract: We present a hierarchical model predictive control approach for large-scale systems based on dual decomposition. The proposed scheme allows coupling in both dynamics and constraints between the subsystems and generates a primal feasible solution within a finite number of iterations, using primal averaging and a constraint tightening approach. The primal update is performed in a distributed way and… ▽ More

    Submitted 7 September, 2011; v1 submitted 6 September, 2011; originally announced September 2011.

    Comments: This is the extended version of our paper at the 50th IEEE Conference on Decision and Control and European Control Conference, Orlando, Florida, Dec. 2011. In this version the proofs are provided

    Report number: Tech. rep. 11-039, Delft Center for Systems and Control, Delft University of Technology, Delft, The Netherlands

  30. arXiv:0809.3647  [pdf, ps, other

    math.OC

    A Jacobi algorithm for distributed model predictive control of dynamically coupled systems

    Authors: Dang Doan, Tamas Keviczky, Ion Necoara, Moritz Diehl

    Abstract: In this paper we introduce an iterative Jacobi algorithm for solving distributed model predictive control (DMPC) problems, with linear coupled dynamics and convex coupled constraints. The algorithm guarantees stability and persistent feasibility, and we provide a localized procedure for constructing an initial feasible solution by constraint tightening. Moreover, we show that the solution of the… ▽ More

    Submitted 22 September, 2008; originally announced September 2008.

    Comments: Shorter version submitted to 2009 American Control Conference

  31. Parallel Pricing Algorithms for Multi--Dimensional Bermudan/American Options using Monte Carlo methods

    Authors: Mireille Bossy, Françoise Baude, Viet Dung Doan, Abhijeet Gaikwad, Ian Stokes-Rees

    Abstract: In this paper we present two parallel Monte Carlo based algorithms for pricing multi--dimensional Bermudan/American options. First approach relies on computation of the optimal exercise boundary while the second relies on classification of continuation and exercise values. We also evaluate the performance of both the algorithms in a desktop grid environment. We show the effectiveness of the prop… ▽ More

    Submitted 13 May, 2008; originally announced May 2008.

    Report number: RR-6530

    Journal ref: N° RR-6530 (2008)

  32. arXiv:cs/0510072  [pdf, ps, other

    cs.IT

    On Interleaving Techniques for MIMO Channels and Limitations of Bit Interleaved Coded Modulation

    Authors: Dumitru Mihai Ionescu, Dung N. Doan, Steven D. Gray

    Abstract: It is shown that while the mutual information curves for coded modulation (CM) and bit interleaved coded modulation (BICM) overlap in the case of a single input single output channel, the same is not true in multiple input multiple output (MIMO) channels. A method for mitigating fading in the presence of multiple transmit antennas, named coordinate interleaving (CI), is presented as a generaliza… ▽ More

    Submitted 23 October, 2005; originally announced October 2005.

    Comments: 20 pages, 11 figures, uses IEEEtran.cls

    ACM Class: E.4; H.1.1

  33. Suppression of the bottleneck in semiconductor microcavities

    Authors: T. D. Doan, D. B. Tran Thoai

    Abstract: The relaxation kinetics of cavity polaritons by scattering with thermal acoustic phonons is studied within the rate equation approximation. Numerical results show that a suppression of the bottleneck of lower polariton states occurs at high polariton densities. We have found that the long decay time of the photon-like polaritons, the thin width of the embedded quantum wells and the small value o… ▽ More

    Submitted 23 July, 2002; originally announced July 2002.

    Comments: 5 pages, 4 figures. Submitted to Solid State Communication

    Journal ref: Solid State Commun. 123 (2002)427-430