-
End-to-end learned Lossy Dynamic Point Cloud Attribute Compression
Authors:
Dat Thanh Nguyen,
Daniel Zieger,
Marc Stamminger,
Andre Kaup
Abstract:
Recent advancements in point cloud compression have primarily emphasized geometry compression while comparatively fewer efforts have been dedicated to attribute compression. This study introduces an end-to-end learned dynamic lossy attribute coding approach, utilizing an efficient high-dimensional convolution to capture extensive inter-point dependencies. This enables the efficient projection of a…
▽ More
Recent advancements in point cloud compression have primarily emphasized geometry compression while comparatively fewer efforts have been dedicated to attribute compression. This study introduces an end-to-end learned dynamic lossy attribute coding approach, utilizing an efficient high-dimensional convolution to capture extensive inter-point dependencies. This enables the efficient projection of attribute features into latent variables. Subsequently, we employ a context model that leverage previous latent space in conjunction with an auto-regressive context model for encoding the latent tensor into a bitstream. Evaluation of our method on widely utilized point cloud datasets from the MPEG and Microsoft demonstrates its superior performance compared to the core attribute compression module Region-Adaptive Hierarchical Transform method from MPEG Geometry Point Cloud Compression with 38.1% Bjontegaard Delta-rate saving in average while ensuring a low-complexity encoding/decoding.
△ Less
Submitted 20 August, 2024;
originally announced August 2024.
-
Modular assurance of an Autonomous Ferry using Contract-Based Design and Simulation-based Verification Principles
Authors:
Jon Arne Glomsrud,
Stephanie Kemna,
Chanjei Vasanthan,
Luman Zhao,
Dag McGeorge,
Tom Arne Pedersen,
Tobias Rye Torben,
Børge Rokseth,
Dong Trong Nguyen
Abstract:
With the introduction of autonomous technology into our society, e.g. autonomous shipping, it is important to assess and assure the safety of autonomous systems in a real-world context. Simulation-based testing is a common approach to attempt to verify performance of autonomous systems, but assurance also requires formal evidence. This paper introduces the Assurance of Digital Assets (ADA) framewo…
▽ More
With the introduction of autonomous technology into our society, e.g. autonomous shipping, it is important to assess and assure the safety of autonomous systems in a real-world context. Simulation-based testing is a common approach to attempt to verify performance of autonomous systems, but assurance also requires formal evidence. This paper introduces the Assurance of Digital Assets (ADA) framework, a structured method for the assurance of digital assets, i.e. novel, complex, or intelligent systems enabled by digital technologies, using contract-based design. Results are shown for an autonomous ferry assurance case, focusing on collision avoidance during the ferry's transit. Further, we discuss the role of simulation-based testing in verifying compliance to contract specifications, to build the necessary evidence for an assurance case.
△ Less
Submitted 6 August, 2024;
originally announced August 2024.
-
Non-Cooperative Backdoor Attacks in Federated Learning: A New Threat Landscape
Authors:
Tuan Nguyen,
Dung Thuy Nguyen,
Khoa D Doan,
Kok-Seng Wong
Abstract:
Despite the promise of Federated Learning (FL) for privacy-preserving model training on distributed data, it remains susceptible to backdoor attacks. These attacks manipulate models by embedding triggers (specific input patterns) in the training data, forcing misclassification as predefined classes during deployment. Traditional single-trigger attacks and recent work on cooperative multiple-trigge…
▽ More
Despite the promise of Federated Learning (FL) for privacy-preserving model training on distributed data, it remains susceptible to backdoor attacks. These attacks manipulate models by embedding triggers (specific input patterns) in the training data, forcing misclassification as predefined classes during deployment. Traditional single-trigger attacks and recent work on cooperative multiple-trigger attacks, where clients collaborate, highlight limitations in attack realism due to coordination requirements. We investigate a more alarming scenario: non-cooperative multiple-trigger attacks. Here, independent adversaries introduce distinct triggers targeting unique classes. These parallel attacks exploit FL's decentralized nature, making detection difficult. Our experiments demonstrate the alarming vulnerability of FL to such attacks, where individual backdoors can be successfully learned without impacting the main task. This research emphasizes the critical need for robust defenses against diverse backdoor attacks in the evolving FL landscape. While our focus is on empirical analysis, we believe it can guide backdoor research toward more realistic settings, highlighting the crucial role of FL in building robust defenses against diverse backdoor threats. The code is available at \url{https://anonymous.4open.science/r/nba-980F/}.
△ Less
Submitted 5 July, 2024;
originally announced July 2024.
-
Delay-Aware Robust Edge Network Hardening Under Decision-Dependent Uncertainty
Authors:
Jiaming Cheng,
Duong Thuy Anh Nguyen,
Ni Trieu,
Duong Tung Nguyen
Abstract:
Edge computing promises to offer low-latency and ubiquitous computation to numerous devices at the network edge. For delay-sensitive applications, link delays can have a direct impact on service quality. These delays can fluctuate drastically over time due to various factors such as network congestion, changing traffic conditions, cyberattacks, component failures, and natural disasters. Thus, it i…
▽ More
Edge computing promises to offer low-latency and ubiquitous computation to numerous devices at the network edge. For delay-sensitive applications, link delays can have a direct impact on service quality. These delays can fluctuate drastically over time due to various factors such as network congestion, changing traffic conditions, cyberattacks, component failures, and natural disasters. Thus, it is crucial to efficiently harden the edge network to mitigate link delay variation as well as ensure a stable and improved user experience. To this end, we propose a novel robust model for optimal edge network hardening, considering the link delay uncertainty. Departing from the existing literature that treats uncertainties as exogenous, our model incorporates an endogenous uncertainty set to properly capture the impact of hardening and workload allocation decisions on link delays. However, the endogenous set introduces additional complexity to the problem due to the interdependence between decisions and uncertainties. We present two efficient methods to transform the problem into a solvable form. Extensive numerical results are shown to demonstrate the effectiveness of the proposed approach.
△ Less
Submitted 8 July, 2024;
originally announced July 2024.
-
ToVo: Toxicity Taxonomy via Voting
Authors:
Tinh Son Luong,
Thanh-Thien Le,
Thang Viet Doan,
Linh Ngo Van,
Thien Huu Nguyen,
Diep Thi-Ngoc Nguyen
Abstract:
Existing toxic detection models face significant limitations, such as lack of transparency, customization, and reproducibility. These challenges stem from the closed-source nature of their training data and the paucity of explanations for their evaluation mechanism. To address these issues, we propose a dataset creation mechanism that integrates voting and chain-of-thought processes, producing a h…
▽ More
Existing toxic detection models face significant limitations, such as lack of transparency, customization, and reproducibility. These challenges stem from the closed-source nature of their training data and the paucity of explanations for their evaluation mechanism. To address these issues, we propose a dataset creation mechanism that integrates voting and chain-of-thought processes, producing a high-quality open-source dataset for toxic content detection. Our methodology ensures diverse classification metrics for each sample and includes both classification scores and explanatory reasoning for the classifications.
We utilize the dataset created through our proposed mechanism to train our model, which is then compared against existing widely-used detectors. Our approach not only enhances transparency and customizability but also facilitates better fine-tuning for specific use cases. This work contributes a robust framework for developing toxic content detection models, emphasizing openness and adaptability, thus paving the way for more effective and user-specific content moderation solutions.
△ Less
Submitted 20 June, 2024;
originally announced June 2024.
-
A Simple View on Large-Signal Resonant-Tunneling-Diode Dynamics
Authors:
Petr Ourednik,
Dinh Tuan Nguyen,
Michael Feiginov
Abstract:
We present a model for an accurate description of the large-signal resonant-tunneling-diode (RTD) dynamics, which allows for a simple and intuitive analysis in terms of dynamical trajectories in a phase space. We show that the RTD admittance can be accurately described by a simple RLRC equivalent circuit, which has a universal configuration, but with different circuit parameters in the large- and…
▽ More
We present a model for an accurate description of the large-signal resonant-tunneling-diode (RTD) dynamics, which allows for a simple and intuitive analysis in terms of dynamical trajectories in a phase space. We show that the RTD admittance can be accurately described by a simple RLRC equivalent circuit, which has a universal configuration, but with different circuit parameters in the large- and small-signal cases.
△ Less
Submitted 27 May, 2024;
originally announced June 2024.
-
First joint oscillation analysis of Super-Kamiokande atmospheric and T2K accelerator neutrino data
Authors:
Super-Kamiokande,
T2K collaborations,
:,
S. Abe,
K. Abe,
N. Akhlaq,
R. Akutsu,
H. Alarakia-Charles,
A. Ali,
Y. I. Alj Hakim,
S. Alonso Monsalve,
S. Amanai,
C. Andreopoulos,
L. H. V. Anthony,
M. Antonova,
S. Aoki,
K. A. Apte,
T. Arai,
T. Arihara,
S. Arimoto,
Y. Asada,
R. Asaka,
Y. Ashida,
E. T. Atkin,
N. Babu
, et al. (524 additional authors not shown)
Abstract:
The Super-Kamiokande and T2K collaborations present a joint measurement of neutrino oscillation parameters from their atmospheric and beam neutrino data. It uses a common interaction model for events overlapping in neutrino energy and correlated detector systematic uncertainties between the two datasets, which are found to be compatible. Using 3244.4 days of atmospheric data and a beam exposure of…
▽ More
The Super-Kamiokande and T2K collaborations present a joint measurement of neutrino oscillation parameters from their atmospheric and beam neutrino data. It uses a common interaction model for events overlapping in neutrino energy and correlated detector systematic uncertainties between the two datasets, which are found to be compatible. Using 3244.4 days of atmospheric data and a beam exposure of $19.7(16.3) \times 10^{20}$ protons on target in (anti)neutrino mode, the analysis finds a 1.9$σ$ exclusion of CP-conservation (defined as $J_{CP}=0$) and a preference for the normal mass ordering.
△ Less
Submitted 21 May, 2024;
originally announced May 2024.
-
Q-learning-based Opportunistic Communication for Real-time Mobile Air Quality Monitoring Systems
Authors:
Trung Thanh Nguyen,
Truong Thao Nguyen,
Dinh Tuan Anh Nguyen,
Thanh Hung Nguyen,
Phi Le Nguyen
Abstract:
We focus on real-time air quality monitoring systems that rely on devices installed on automobiles in this research. We investigate an opportunistic communication model in which devices can send the measured data directly to the air quality server through a 4G communication channel or via Wi-Fi to adjacent devices or the so-called Road Side Units deployed along the road. We aim to reduce 4G costs…
▽ More
We focus on real-time air quality monitoring systems that rely on devices installed on automobiles in this research. We investigate an opportunistic communication model in which devices can send the measured data directly to the air quality server through a 4G communication channel or via Wi-Fi to adjacent devices or the so-called Road Side Units deployed along the road. We aim to reduce 4G costs while assuring data latency, where the data latency is defined as the amount of time it takes for data to reach the server. We propose an offloading scheme that leverages Q-learning to accomplish the purpose. The experiment results show that our offloading method significantly cuts down around 40-50% of the 4G communication cost while keeping the latency of 99.5% packets smaller than the required threshold.
△ Less
Submitted 2 May, 2024;
originally announced May 2024.
-
Constrained multi-cluster game: Distributed Nash equilibrium seeking over directed graphs
Authors:
Duong Thuy Anh Nguyen,
Mattia Bianchi,
Florian Dörfler,
Duong Tung Nguyen,
Angelia Nedić
Abstract:
Motivated by the complex dynamics of cooperative and competitive interactions within networked agent systems, multi-cluster games provide a framework for modeling the interconnected goals of self-interested clusters of agents. For this setup, the existing literature lacks comprehensive gradient-based solutions that simultaneously consider constraint sets and directed communication networks, both o…
▽ More
Motivated by the complex dynamics of cooperative and competitive interactions within networked agent systems, multi-cluster games provide a framework for modeling the interconnected goals of self-interested clusters of agents. For this setup, the existing literature lacks comprehensive gradient-based solutions that simultaneously consider constraint sets and directed communication networks, both of which are crucial for many practical applications. To address this gap, this paper proposes a distributed Nash equilibrium seeking algorithm that integrates consensus-based methods and gradient-tracking techniques, where inter-cluster and intra-cluster communications only use row- and column-stochastic weight matrices, respectively. To handle constraints, we introduce an averaging procedure, which can effectively address the complications associated with projections. In turn, we can show linear convergence of our algorithm, focusing on the contraction property of the optimality gap. We demonstrate the efficacy of the proposed algorithm through a microgrid energy management application.
△ Less
Submitted 22 April, 2024;
originally announced April 2024.
-
Data-Adaptive Tradeoffs among Multiple Risks in Distribution-Free Prediction
Authors:
Drew T. Nguyen,
Reese Pathak,
Anastasios N. Angelopoulos,
Stephen Bates,
Michael I. Jordan
Abstract:
Decision-making pipelines are generally characterized by tradeoffs among various risk functions. It is often desirable to manage such tradeoffs in a data-adaptive manner. As we demonstrate, if this is done naively, state-of-the art uncertainty quantification methods can lead to significant violations of putative risk guarantees.
To address this issue, we develop methods that permit valid control…
▽ More
Decision-making pipelines are generally characterized by tradeoffs among various risk functions. It is often desirable to manage such tradeoffs in a data-adaptive manner. As we demonstrate, if this is done naively, state-of-the art uncertainty quantification methods can lead to significant violations of putative risk guarantees.
To address this issue, we develop methods that permit valid control of risk when threshold and tradeoff parameters are chosen adaptively. Our methodology supports monotone and nearly-monotone risks, but otherwise makes no distributional assumptions.
To illustrate the benefits of our approach, we carry out numerical experiments on synthetic data and the large-scale vision dataset MS-COCO.
△ Less
Submitted 28 March, 2024;
originally announced March 2024.
-
(Almost) Affine Higher-Order Tree Transducers
Authors:
Lê Thành Dũng Tito Nguyên,
Gabriele Vanoni
Abstract:
We investigate the tree-to-tree functions computed by \enquote{affine$λ$-transducers}: tree automata whose memory consists of an affine $λ$-term instead of a finite state. They can be seen as variations on Gallot, Lemay and Salvati's Linear High-Order Deterministic Tree Transducers. When the memory is almost purely affine (\textit{à la} Kanazawa), we show that these machines can be translated to t…
▽ More
We investigate the tree-to-tree functions computed by \enquote{affine$λ$-transducers}: tree automata whose memory consists of an affine $λ$-term instead of a finite state. They can be seen as variations on Gallot, Lemay and Salvati's Linear High-Order Deterministic Tree Transducers. When the memory is almost purely affine (\textit{à la} Kanazawa), we show that these machines can be translated to tree-walking transducers (and with a purely affine memory, we get a reversible tree-walking transducer). This leads to a proof of an inexpressivity conjecture of \titocecilia on \enquote{implicit automata} in an affine $λ$-calculus. The key technical tool in our proofs is the Interaction Abstract Machine (IAM), an operational avatar of the \enquote{geometry of interaction} semantics of linear logic. We work with ad-hoc specializations to (almost) affine $λ$-terms of a tree-generating version of the IAM.
△ Less
Submitted 8 February, 2024;
originally announced February 2024.
-
Multilinear Kernel Regression and Imputation via Manifold Learning
Authors:
Duc Thien Nguyen,
Konstantinos Slavakis
Abstract:
This paper introduces a novel nonparametric framework for data imputation, coined multilinear kernel regression and imputation via the manifold assumption (MultiL-KRIM). Motivated by manifold learning, MultiL-KRIM models data features as a point cloud located in or close to a user-unknown smooth manifold embedded in a reproducing kernel Hilbert space. Unlike typical manifold-learning routes, which…
▽ More
This paper introduces a novel nonparametric framework for data imputation, coined multilinear kernel regression and imputation via the manifold assumption (MultiL-KRIM). Motivated by manifold learning, MultiL-KRIM models data features as a point cloud located in or close to a user-unknown smooth manifold embedded in a reproducing kernel Hilbert space. Unlike typical manifold-learning routes, which seek low-dimensional patterns via regularizers based on graph-Laplacian matrices, MultiL-KRIM builds instead on the intuitive concept of tangent spaces to manifolds and incorporates collaboration among point-cloud neighbors (regressors) directly into the data-modeling term of the loss function. Multiple kernel functions are allowed to offer robustness and rich approximation properties, while multiple matrix factors offer low-rank modeling, integrate dimensionality reduction, and streamline computations with no need of training data. Two important application domains showcase the functionality of MultiL-KRIM: time-varying-graph-signal (TVGS) recovery, and reconstruction of highly accelerated dynamic-magnetic-resonance-imaging (dMRI) data. Extensive numerical tests on real and synthetic data demonstrate MultiL-KRIM's remarkable speedups over its predecessors, and outperformance over prevalent "shallow" data-imputation techniques, with a more intuitive and explainable pipeline than deep-image-prior methods.
△ Less
Submitted 5 February, 2024;
originally announced February 2024.
-
Self-supervised Video Object Segmentation with Distillation Learning of Deformable Attention
Authors:
Quang-Trung Truong,
Duc Thanh Nguyen,
Binh-Son Hua,
Sai-Kit Yeung
Abstract:
Video object segmentation is a fundamental research problem in computer vision. Recent techniques have often applied attention mechanism to object representation learning from video sequences. However, due to temporal changes in the video data, attention maps may not well align with the objects of interest across video frames, causing accumulated errors in long-term video processing. In addition,…
▽ More
Video object segmentation is a fundamental research problem in computer vision. Recent techniques have often applied attention mechanism to object representation learning from video sequences. However, due to temporal changes in the video data, attention maps may not well align with the objects of interest across video frames, causing accumulated errors in long-term video processing. In addition, existing techniques have utilised complex architectures, requiring highly computational complexity and hence limiting the ability to integrate video object segmentation into low-powered devices. To address these issues, we propose a new method for self-supervised video object segmentation based on distillation learning of deformable attention. Specifically, we devise a lightweight architecture for video object segmentation that is effectively adapted to temporal changes. This is enabled by deformable attention mechanism, where the keys and values capturing the memory of a video sequence in the attention module have flexible locations updated across frames. The learnt object representations are thus adaptive to both the spatial and temporal dimensions. We train the proposed architecture in a self-supervised fashion through a new knowledge distillation paradigm where deformable attention maps are integrated into the distillation loss. We qualitatively and quantitatively evaluate our method and compare it with existing methods on benchmark datasets including DAVIS 2016/2017 and YouTube-VOS 2018/2019. Experimental results verify the superiority of our method via its achieved state-of-the-art performance and optimal memory usage.
△ Less
Submitted 18 March, 2024; v1 submitted 24 January, 2024;
originally announced January 2024.
-
Two-Stage Distributionally Robust Edge Node Placement Under Endogenous Demand Uncertainty
Authors:
Jiaming Cheng,
Duong Thuy Anh Nguyen,
Duong Tung Nguyen
Abstract:
Edge computing (EC) promises to deliver low-latency and ubiquitous computation to numerous devices at the network edge. This paper aims to jointly optimize edge node (EN) placement and resource allocation for an EC platform, considering demand uncertainty. Diverging from existing approaches treating uncertainties as exogenous, we propose a novel two-stage decision-dependent distributionally robust…
▽ More
Edge computing (EC) promises to deliver low-latency and ubiquitous computation to numerous devices at the network edge. This paper aims to jointly optimize edge node (EN) placement and resource allocation for an EC platform, considering demand uncertainty. Diverging from existing approaches treating uncertainties as exogenous, we propose a novel two-stage decision-dependent distributionally robust optimization (DRO) framework to effectively capture the interdependence between EN placement decisions and uncertain demands. The first stage involves making EN placement decisions, while the second stage optimizes resource allocation after uncertainty revelation. We present an exact mixed-integer linear program reformulation for solving the underlying ``min-max-min" two-stage model. We further introduce a valid inequality method to enhance computational efficiency, especially for large-scale networks. Extensive numerical experiments demonstrate the benefits of considering endogenous uncertainties and the advantages of the proposed model and approach.
△ Less
Submitted 15 January, 2024;
originally announced January 2024.
-
Accelerating computational materials discovery with artificial intelligence and cloud high-performance computing: from large-scale screening to experimental validation
Authors:
Chi Chen,
Dan Thien Nguyen,
Shannon J. Lee,
Nathan A. Baker,
Ajay S. Karakoti,
Linda Lauw,
Craig Owen,
Karl T. Mueller,
Brian A. Bilodeau,
Vijayakumar Murugesan,
Matthias Troyer
Abstract:
High-throughput computational materials discovery has promised significant acceleration of the design and discovery of new materials for many years. Despite a surge in interest and activity, the constraints imposed by large-scale computational resources present a significant bottleneck. Furthermore, examples of large-scale computational discovery carried through experimental validation remain scar…
▽ More
High-throughput computational materials discovery has promised significant acceleration of the design and discovery of new materials for many years. Despite a surge in interest and activity, the constraints imposed by large-scale computational resources present a significant bottleneck. Furthermore, examples of large-scale computational discovery carried through experimental validation remain scarce, especially for materials with product applicability. Here we demonstrate how this vision became reality by first combining state-of-the-art artificial intelligence (AI) models and traditional physics-based models on cloud high-performance computing (HPC) resources to quickly navigate through more than 32 million candidates and predict around half a million potentially stable materials. By focusing on solid-state electrolytes for battery applications, our discovery pipeline further identified 18 promising candidates with new compositions and rediscovered a decade's worth of collective knowledge in the field as a byproduct. By employing around one thousand virtual machines (VMs) in the cloud, this process took less than 80 hours. We then synthesized and experimentally characterized the structures and conductivities of our top candidates, the Na$_x$Li$_{3-x}$YCl$_6$ ($0 < x < 3$) series, demonstrating the potential of these compounds to serve as solid electrolytes. Additional candidate materials that are currently under experimental investigation could offer more examples of the computational discovery of new phases of Li- and Na-conducting solid electrolytes. We believe that this unprecedented approach of synergistically integrating AI models and cloud HPC not only accelerates materials discovery but also showcases the potency of AI-guided experimentation in unlocking transformative scientific breakthroughs with real-world applications.
△ Less
Submitted 8 January, 2024;
originally announced January 2024.
-
Leveraging Open-Vocabulary Diffusion to Camouflaged Instance Segmentation
Authors:
Tuan-Anh Vu,
Duc Thanh Nguyen,
Qing Guo,
Binh-Son Hua,
Nhat Minh Chung,
Ivor W. Tsang,
Sai-Kit Yeung
Abstract:
Text-to-image diffusion techniques have shown exceptional capability of producing high-quality images from text descriptions. This indicates that there exists a strong correlation between the visual and textual domains. In addition, text-image discriminative models such as CLIP excel in image labelling from text prompts, thanks to the rich and diverse information available from open concepts. In t…
▽ More
Text-to-image diffusion techniques have shown exceptional capability of producing high-quality images from text descriptions. This indicates that there exists a strong correlation between the visual and textual domains. In addition, text-image discriminative models such as CLIP excel in image labelling from text prompts, thanks to the rich and diverse information available from open concepts. In this paper, we leverage these technical advances to solve a challenging problem in computer vision: camouflaged instance segmentation. Specifically, we propose a method built upon a state-of-the-art diffusion model, empowered by open-vocabulary to learn multi-scale textual-visual features for camouflaged object representations. Such cross-domain representations are desirable in segmenting camouflaged objects where visual cues are subtle to distinguish the objects from the background, especially in segmenting novel objects which are not seen in training. We also develop technically supportive components to effectively fuse cross-domain features and engage relevant features towards respective foreground objects. We validate our method and compare it with existing ones on several benchmark datasets of camouflaged instance segmentation and generic open-vocabulary instance segmentation. Experimental results confirm the advances of our method over existing ones. We will publish our code and pre-trained models to support future research.
△ Less
Submitted 29 December, 2023;
originally announced December 2023.
-
Study of cognitive component of auditory attention to natural speech events
Authors:
Nhan D. T. Nguyen,
Kaare Mikkelsen,
Preben Kidmose
Abstract:
Event-related potentials (ERP) have been used to address a wide range of research questions in neuroscience and cognitive psychology including selective auditory attention. The recent progress in auditory attention decoding (AAD) methods is based on algorithms that find a relation between the audio envelope and the neurophysiological response. The most popular approach is based on the reconstructi…
▽ More
Event-related potentials (ERP) have been used to address a wide range of research questions in neuroscience and cognitive psychology including selective auditory attention. The recent progress in auditory attention decoding (AAD) methods is based on algorithms that find a relation between the audio envelope and the neurophysiological response. The most popular approach is based on the reconstruction of the audio envelope based on EEG signals. However, these methods are mainly based on the neurophysiological entrainment to physical attributes of the sensory stimulus and are generally limited by a long detection window. This study proposes a novel approach to auditory attention decoding by looking at higher-level cognitive responses to natural speech. To investigate if natural speech events elicit cognitive ERP components and how these components are affected by attention mechanisms, we designed a series of four experimental paradigms with increasing complexity: a word category oddball paradigm, a word category oddball paradigm with competing speakers, and competing speech streams with and without specific targets. We recorded the electroencephalogram (EEG) from 32 scalp electrodes and 12 in-ear electrodes (ear-EEG) from 24 participants. A cognitive ERP component, which we believe is related to the well-known P3b component, was observed at parietal electrode sites with a latency of approximately 620 ms. The component is statistically most significant for the simplest paradigm and gradually decreases in strength with increasing complexity of the paradigm. We also show that the component can be observed in the in-ear EEG signals by using spatial filtering. The cognitive component elicited by auditory attention may contribute to decoding auditory attention from electrophysiological recordings and its presence in the ear-EEG signals is promising for future applications within hearing aids.
△ Less
Submitted 19 December, 2023; v1 submitted 16 December, 2023;
originally announced December 2023.
-
Dissecting vocabulary biases datasets through statistical testing and automated data augmentation for artifact mitigation in Natural Language Inference
Authors:
Dat Thanh Nguyen
Abstract:
In recent years, the availability of large-scale annotated datasets, such as the Stanford Natural Language Inference and the Multi-Genre Natural Language Inference, coupled with the advent of pre-trained language models, has significantly contributed to the development of the natural language inference domain. However, these crowdsourced annotated datasets often contain biases or dataset artifacts…
▽ More
In recent years, the availability of large-scale annotated datasets, such as the Stanford Natural Language Inference and the Multi-Genre Natural Language Inference, coupled with the advent of pre-trained language models, has significantly contributed to the development of the natural language inference domain. However, these crowdsourced annotated datasets often contain biases or dataset artifacts, leading to overestimated model performance and poor generalization. In this work, we focus on investigating dataset artifacts and developing strategies to address these issues. Through the utilization of a novel statistical testing procedure, we discover a significant association between vocabulary distribution and text entailment classes, emphasizing vocabulary as a notable source of biases. To mitigate these issues, we propose several automatic data augmentation strategies spanning character to word levels. By fine-tuning the ELECTRA pre-trained language model, we compare the performance of boosted models with augmented data against their baseline counterparts. The experiments demonstrate that the proposed approaches effectively enhance model accuracy and reduce biases by up to 0.66% and 1.14%, respectively.
△ Less
Submitted 14 December, 2023;
originally announced December 2023.
-
Levinson's theorem for two-dimensional scattering systems: it was a surprise, it is now topological!
Authors:
A. Alexander,
D. T. Nguyen,
A. Rennie,
S. Richard
Abstract:
We prove a general Levinson's theorem for Schrödinger operators in two dimensions with threshold obstructions at zero energy. Our results confirm and simplify earlier seminal results of Bollé, Gesztesy et al., while providing an explicit topological interpretation. We also derive explicit formulas for the wave operators, and so show that they are elements of a $C^*$-algebra introduced by Cordes. A…
▽ More
We prove a general Levinson's theorem for Schrödinger operators in two dimensions with threshold obstructions at zero energy. Our results confirm and simplify earlier seminal results of Bollé, Gesztesy et al., while providing an explicit topological interpretation. We also derive explicit formulas for the wave operators, and so show that they are elements of a $C^*$-algebra introduced by Cordes. As a consequence of our approach, we provide an evaluation of the spectral shift function at zero in the presence of $p$-resonances.
△ Less
Submitted 16 November, 2023;
originally announced November 2023.
-
An empirical study of automatic wildlife detection using drone thermal imaging and object detection
Authors:
Miao Chang,
Tan Vuong,
Manas Palaparthi,
Lachlan Howell,
Alessio Bonti,
Mohamed Abdelrazek,
Duc Thanh Nguyen
Abstract:
Artificial intelligence has the potential to make valuable contributions to wildlife management through cost-effective methods for the collection and interpretation of wildlife data. Recent advances in remotely piloted aircraft systems (RPAS or ``drones'') and thermal imaging technology have created new approaches to collect wildlife data. These emerging technologies could provide promising altern…
▽ More
Artificial intelligence has the potential to make valuable contributions to wildlife management through cost-effective methods for the collection and interpretation of wildlife data. Recent advances in remotely piloted aircraft systems (RPAS or ``drones'') and thermal imaging technology have created new approaches to collect wildlife data. These emerging technologies could provide promising alternatives to standard labourious field techniques as well as cover much larger areas. In this study, we conduct a comprehensive review and empirical study of drone-based wildlife detection. Specifically, we collect a realistic dataset of drone-derived wildlife thermal detections. Wildlife detections, including arboreal (for instance, koalas, phascolarctos cinereus) and ground dwelling species in our collected data are annotated via bounding boxes by experts. We then benchmark state-of-the-art object detection algorithms on our collected dataset. We use these experimental results to identify issues and discuss future directions in automatic animal monitoring using drones.
△ Less
Submitted 17 October, 2023;
originally announced October 2023.
-
Optimal Workload Allocation for Distributed Edge Clouds With Renewable Energy and Battery Storage
Authors:
Duong Thuy Anh Nguyen,
Jiaming Cheng,
Ni Trieu,
Duong Tung Nguyen
Abstract:
This paper studies an optimal workload allocation problem for a network of renewable energy-powered edge clouds that serve users located across various geographical areas. Specifically, each edge cloud is furnished with both an on-site renewable energy generation unit and a battery storage unit. Due to the discrepancy in electricity pricing and the diverse temporal-spatial characteristics of renew…
▽ More
This paper studies an optimal workload allocation problem for a network of renewable energy-powered edge clouds that serve users located across various geographical areas. Specifically, each edge cloud is furnished with both an on-site renewable energy generation unit and a battery storage unit. Due to the discrepancy in electricity pricing and the diverse temporal-spatial characteristics of renewable energy generation, how to optimally allocate workload to different edge clouds to minimize the total operating cost while maximizing renewable energy utilization is a crucial and challenging problem. To this end, we introduce and formulate an optimization-based framework designed for Edge Service Providers (ESPs) with the overarching goal of simultaneously reducing energy costs and environmental impacts through the integration of renewable energy sources and battery storage systems, all while maintaining essential quality-of-service standards. Numerical results demonstrate the effectiveness of the proposed model and solution in maintaining service quality as well as reducing operational costs and emissions. Furthermore, the impacts of renewable energy generation and battery storage on optimal system operations are rigorously analyzed.
△ Less
Submitted 21 October, 2023; v1 submitted 1 October, 2023;
originally announced October 2023.
-
MVC: A Multi-Task Vision Transformer Network for COVID-19 Diagnosis from Chest X-ray Images
Authors:
Huyen Tran,
Duc Thanh Nguyen,
John Yearwood
Abstract:
Medical image analysis using computer-based algorithms has attracted considerable attention from the research community and achieved tremendous progress in the last decade. With recent advances in computing resources and availability of large-scale medical image datasets, many deep learning models have been developed for disease diagnosis from medical images. However, existing techniques focus on…
▽ More
Medical image analysis using computer-based algorithms has attracted considerable attention from the research community and achieved tremendous progress in the last decade. With recent advances in computing resources and availability of large-scale medical image datasets, many deep learning models have been developed for disease diagnosis from medical images. However, existing techniques focus on sub-tasks, e.g., disease classification and identification, individually, while there is a lack of a unified framework enabling multi-task diagnosis. Inspired by the capability of Vision Transformers in both local and global representation learning, we propose in this paper a new method, namely Multi-task Vision Transformer (MVC) for simultaneously classifying chest X-ray images and identifying affected regions from the input data. Our method is built upon the Vision Transformer but extends its learning capability in a multi-task setting. We evaluated our proposed method and compared it with existing baselines on a benchmark dataset of COVID-19 chest X-ray images. Experimental results verified the superiority of the proposed method over the baselines on both the image classification and affected region identification tasks.
△ Less
Submitted 30 September, 2023;
originally announced October 2023.
-
Towards Tuning-Free Minimum-Volume Nonnegative Matrix Factorization
Authors:
Duc Toan Nguyen,
Eric C. Chi
Abstract:
Nonnegative Matrix Factorization (NMF) is a versatile and powerful tool for discovering latent structures in data matrices, with many variations proposed in the literature. Recently, Leplat et al.\@ (2019) introduced a minimum-volume NMF for the identifiable recovery of rank-deficient matrices in the presence of noise. The performance of their formulation, however, requires the selection of a tuni…
▽ More
Nonnegative Matrix Factorization (NMF) is a versatile and powerful tool for discovering latent structures in data matrices, with many variations proposed in the literature. Recently, Leplat et al.\@ (2019) introduced a minimum-volume NMF for the identifiable recovery of rank-deficient matrices in the presence of noise. The performance of their formulation, however, requires the selection of a tuning parameter whose optimal value depends on the unknown noise level. In this work, we propose an alternative formulation of minimum-volume NMF inspired by the square-root lasso and its tuning-free properties. Our formulation also requires the selection of a tuning parameter, but its optimal value does not depend on the noise level. To fit our NMF model, we propose a majorization-minimization (MM) algorithm that comes with global convergence guarantees. We show empirically that the optimal choice of our tuning parameter is insensitive to the noise level in the data.
△ Less
Submitted 24 September, 2023;
originally announced September 2023.
-
Language-driven Object Fusion into Neural Radiance Fields with Pose-Conditioned Dataset Updates
Authors:
Ka Chun Shum,
Jaeyeon Kim,
Binh-Son Hua,
Duc Thanh Nguyen,
Sai-Kit Yeung
Abstract:
Neural radiance field is an emerging rendering method that generates high-quality multi-view consistent images from a neural scene representation and volume rendering. Although neural radiance field-based techniques are robust for scene reconstruction, their ability to add or remove objects remains limited. This paper proposes a new language-driven approach for object manipulation with neural radi…
▽ More
Neural radiance field is an emerging rendering method that generates high-quality multi-view consistent images from a neural scene representation and volume rendering. Although neural radiance field-based techniques are robust for scene reconstruction, their ability to add or remove objects remains limited. This paper proposes a new language-driven approach for object manipulation with neural radiance fields through dataset updates. Specifically, to insert a new foreground object represented by a set of multi-view images into a background radiance field, we use a text-to-image diffusion model to learn and generate combined images that fuse the object of interest into the given background across views. These combined images are then used for refining the background radiance field so that we can render view-consistent images containing both the object and the background. To ensure view consistency, we propose a dataset updates strategy that prioritizes radiance field training with camera views close to the already-trained views prior to propagating the training to remaining views. We show that under the same dataset updates strategy, we can easily adapt our method for object insertion using data from text-to-3D models as well as object removal. Experimental results show that our method generates photorealistic images of the edited scenes, and outperforms state-of-the-art methods in 3D reconstruction and neural radiance field blending.
△ Less
Submitted 31 March, 2024; v1 submitted 20 September, 2023;
originally announced September 2023.
-
Nash equilibrium seeking over digraphs with row-stochastic matrices and network-independent step-sizes
Authors:
Duong Thuy Anh Nguyen,
Mattia Bianchi,
Florian Dörfler,
Duong Tung Nguyen,
Angelia Nedić
Abstract:
In this paper, we address the challenge of Nash equilibrium (NE) seeking in non-cooperative convex games with partial-decision information. We propose a distributed algorithm, where each agent refines its strategy through projected-gradient steps and an averaging procedure. Each agent uses estimates of competitors' actions obtained solely from local neighbor interactions, in a directed communicati…
▽ More
In this paper, we address the challenge of Nash equilibrium (NE) seeking in non-cooperative convex games with partial-decision information. We propose a distributed algorithm, where each agent refines its strategy through projected-gradient steps and an averaging procedure. Each agent uses estimates of competitors' actions obtained solely from local neighbor interactions, in a directed communication network. Unlike previous approaches that rely on (strong) monotonicity assumptions, this work establishes the convergence towards a NE under a diagonal dominance property of the pseudo-gradient mapping, that can be checked locally by the agents. Further, this condition is physically interpretable and of relevance for many applications, as it suggests that an agent's objective function is primarily influenced by its individual strategic decisions, rather than by the actions of its competitors. In virtue of a novel block-infinity norm convergence argument, we provide explicit bounds for constant step-size that are independent of the communication structure, and can be computed in a totally decentralized way. Numerical simulations on an optical network's power control problem validate the algorithm's effectiveness.
△ Less
Submitted 14 September, 2023;
originally announced September 2023.
-
Sub-Array Selection in Full-Duplex Massive MIMO for Enhanced Self-Interference Suppression
Authors:
Mobeen Mahmood,
Asil Koc,
Duc Tuong Nguyen,
Robert Morawski,
Tho Le-Ngoc
Abstract:
This study considers a novel full-duplex (FD) massive multiple-input multiple-output (mMIMO) system using hybrid beamforming (HBF) architecture, which allows for simultaneous uplink (UL) and downlink (DL) transmission over the same frequency band. Particularly, our objective is to mitigate the strong self-interference (SI) solely on the design of UL and DL RF beamforming stages jointly with sub-ar…
▽ More
This study considers a novel full-duplex (FD) massive multiple-input multiple-output (mMIMO) system using hybrid beamforming (HBF) architecture, which allows for simultaneous uplink (UL) and downlink (DL) transmission over the same frequency band. Particularly, our objective is to mitigate the strong self-interference (SI) solely on the design of UL and DL RF beamforming stages jointly with sub-array selection (SAS) for transmit (Tx) and receive (Rx) sub-arrays at base station (BS). Based on the measured SI channel in an anechoic chamber, we propose a min-SI beamforming scheme with SAS, which applies perturbations to the beam directivity to enhance SI suppression in UL and DL beam directions. To solve this challenging nonconvex optimization problem, we propose a swarm intelligence-based algorithmic solution to find the optimal perturbations as well as the Tx and Rx sub-arrays to minimize SI subject to the directivity degradation constraints for the UL and DL beams. The results show that the proposed min-SI BF scheme can achieve SI suppression as high as 78 dB in FD mMIMO systems.
△ Less
Submitted 6 September, 2023;
originally announced September 2023.
-
A translation of N.M. Katz's "Exponential Sums"
Authors:
David T. Nguyen
Abstract:
These notes are devoted to the theory of exponential sums over finite fields. The first chapter recalls some of the number-theoretic interest of such sums. The second chapter discusses the $L$-functions attached to such sums, the "Weil conjectures" for these $L$-functions as established by Deligne, andthe consequences for the exponential sums themselves. The third chapter is devoted to the cohomol…
▽ More
These notes are devoted to the theory of exponential sums over finite fields. The first chapter recalls some of the number-theoretic interest of such sums. The second chapter discusses the $L$-functions attached to such sums, the "Weil conjectures" for these $L$-functions as established by Deligne, andthe consequences for the exponential sums themselves. The third chapter is devoted to the cohomological interpretation of exponential sums and of their associated $L$-functions. These first three chapters are largely of an expository nature.
The main results are found in chapters four and five. Chapter four is devoted to theorems of uniformity "for almost all $p$" for the cohomological structure of quite general exponential sums. Chapter five is devoted to a precise analysis of the cohomological structure of certain specific classes of exponential sums for which the associated algebro-geometric situation is especially attractive.
△ Less
Submitted 13 August, 2023;
originally announced August 2023.
-
Generalized divisor functions in arithmetic progressions: I
Authors:
David T. Nguyen
Abstract:
We prove some distribution results for the $k$-fold divisor function in arithmetic progressions to moduli that exceed the square-root of length $X$ of the sum, with appropriate constrains and averaging on the moduli, saving a power of $X$ from the trivial bound. On assuming the Generalized Riemann Hypothesis, we obtain uniform power saving error terms that are independent of $k$.
We follow and s…
▽ More
We prove some distribution results for the $k$-fold divisor function in arithmetic progressions to moduli that exceed the square-root of length $X$ of the sum, with appropriate constrains and averaging on the moduli, saving a power of $X$ from the trivial bound. On assuming the Generalized Riemann Hypothesis, we obtain uniform power saving error terms that are independent of $k$.
We follow and specialize Y.T. Zhang's method on bounded gaps between primes to our setting. Our arguments are essentially self-contained, with the exception on the use of Deligne's work on the Riemann Hypothesis for varieties over finite fields. In particular, we avoid the reliance on Siegel's theorem, leading to some effective estimates.
△ Less
Submitted 13 August, 2023;
originally announced August 2023.
-
Conditional 360-degree Image Synthesis for Immersive Indoor Scene Decoration
Authors:
Ka Chun Shum,
Hong-Wing Pang,
Binh-Son Hua,
Duc Thanh Nguyen,
Sai-Kit Yeung
Abstract:
In this paper, we address the problem of conditional scene decoration for 360-degree images. Our method takes a 360-degree background photograph of an indoor scene and generates decorated images of the same scene in the panorama view. To do this, we develop a 360-aware object layout generator that learns latent object vectors in the 360-degree view to enable a variety of furniture arrangements for…
▽ More
In this paper, we address the problem of conditional scene decoration for 360-degree images. Our method takes a 360-degree background photograph of an indoor scene and generates decorated images of the same scene in the panorama view. To do this, we develop a 360-aware object layout generator that learns latent object vectors in the 360-degree view to enable a variety of furniture arrangements for an input 360-degree background image. We use this object layout to condition a generative adversarial network to synthesize images of an input scene. To further reinforce the generation capability of our model, we develop a simple yet effective scene emptier that removes the generated furniture and produces an emptied scene for our model to learn a cyclic constraint. We train the model on the Structure3D dataset and show that our model can generate diverse decorations with controllable object layout. Our method achieves state-of-the-art performance on the Structure3D dataset and generalizes well to the Zillow indoor scene dataset. Our user study confirms the immersive experiences provided by the realistic image quality and furniture layout in our generation results. Our implementation will be made available.
△ Less
Submitted 18 July, 2023;
originally announced July 2023.
-
Quantum-based Distributed Algorithms for Edge Node Placement and Workload Allocation
Authors:
Duong The Do,
Ni Trieu,
Duong Tung Nguyen
Abstract:
Edge computing is a promising technology that offers a superior user experience and enables various innovative Internet of Things applications. In this paper, we present a mixed-integer linear programming (MILP) model for optimal edge server placement and workload allocation, which is known to be NP-hard. To this end, we explore the possibility of addressing this computationally challenging proble…
▽ More
Edge computing is a promising technology that offers a superior user experience and enables various innovative Internet of Things applications. In this paper, we present a mixed-integer linear programming (MILP) model for optimal edge server placement and workload allocation, which is known to be NP-hard. To this end, we explore the possibility of addressing this computationally challenging problem using quantum computing. However, existing quantum solvers are limited to solving unconstrained binary programming problems. To overcome this obstacle, we propose a hybrid quantum-classical solution that decomposes the original problem into a quadratic unconstrained binary optimization (QUBO) problem and a linear program (LP) subproblem. The QUBO problem can be solved by a quantum solver, while the LP subproblem can be solved using traditional LP solvers. Our numerical experiments demonstrate the practicality of leveraging quantum supremacy to solve complex optimization problems in edge computing.
△ Less
Submitted 1 June, 2023;
originally announced June 2023.
-
On Ramanujan-Fourier expansions
Authors:
David T. Nguyen
Abstract:
We heuristically study the shifted convolution $\sum_{n\le X} τ_k(n) τ_\ell(n+h)$ using a normalized version of Ramanujan-Fourier expansions for $τ_k(n)$ and verify they produce the expected answer.
We heuristically study the shifted convolution $\sum_{n\le X} τ_k(n) τ_\ell(n+h)$ using a normalized version of Ramanujan-Fourier expansions for $τ_k(n)$ and verify they produce the expected answer.
△ Less
Submitted 27 May, 2023;
originally announced May 2023.
-
Distributed Stochastic Optimization with Gradient Tracking over Time-Varying Directed Networks
Authors:
Duong Thuy Anh Nguyen,
Duong Tung Nguyen,
Angelia Nedich
Abstract:
We study a distributed method called SAB-TV, which employs gradient tracking to collaboratively minimize the sum of smooth and strongly-convex local cost functions for networked agents communicating over a time-varying directed graph. Each agent, assumed to have access to a stochastic first-order oracle for obtaining an unbiased estimate of the gradient of its local cost function, maintains an aux…
▽ More
We study a distributed method called SAB-TV, which employs gradient tracking to collaboratively minimize the sum of smooth and strongly-convex local cost functions for networked agents communicating over a time-varying directed graph. Each agent, assumed to have access to a stochastic first-order oracle for obtaining an unbiased estimate of the gradient of its local cost function, maintains an auxiliary variable to asymptotically track the stochastic gradient of the global cost. The optimal decision and gradient tracking are updated over time through limited information exchange with local neighbors using row- and column-stochastic weights, guaranteeing both consensus and optimality. With a sufficiently small constant step-size, we demonstrate that, in expectation, SAB-TV converges linearly to a neighborhood of the optimal solution. Numerical simulations illustrate the effectiveness of the proposed algorithm.
△ Less
Submitted 29 October, 2023; v1 submitted 30 April, 2023;
originally announced May 2023.
-
CrowdCache: A Decentralized Game-Theoretic Framework for Mobile Edge Content Sharing
Authors:
Duong Thuy Anh Nguyen,
Jiaming Cheng,
Duong Tung Nguyen,
Angelia Nedich
Abstract:
Mobile edge computing (MEC) is a promising solution for enhancing the user experience, minimizing content delivery expenses, and reducing backhaul traffic. In this paper, we propose a novel privacy-preserving decentralized game-theoretic framework for resource crowdsourcing in MEC. Our framework models the interactions between a content provider (CP) and multiple mobile edge device users (MEDs) as…
▽ More
Mobile edge computing (MEC) is a promising solution for enhancing the user experience, minimizing content delivery expenses, and reducing backhaul traffic. In this paper, we propose a novel privacy-preserving decentralized game-theoretic framework for resource crowdsourcing in MEC. Our framework models the interactions between a content provider (CP) and multiple mobile edge device users (MEDs) as a non-cooperative game, in which MEDs offer idle storage resources for content caching in exchange for rewards. We introduce efficient decentralized gradient play algorithms for Nash equilibrium (NE) computation by exchanging local information among neighboring MEDs only, thus preventing attackers from learning users' private information. The key challenge in designing such algorithms is that communication among MEDs is not fixed and is facilitated by a sequence of undirected time-varying graphs. Our approach achieves linear convergence to the NE without imposing any assumptions on the values of parameters in the local objective functions, such as requiring strong monotonicity to be stronger than its dependence on other MEDs' actions, which is commonly required in existing literature when the graph is directed time-varying. Extensive simulations demonstrate the effectiveness of our approach in achieving efficient resource outsourcing decisions while preserving the privacy of the edge devices.
△ Less
Submitted 25 April, 2023;
originally announced April 2023.
-
The Bjøntegaard Bible -- Why your Way of Comparing Video Codecs May Be Wrong
Authors:
Christian Herglotz,
Hannah Och,
Anna Meyer,
Geetha Ramasubbu,
Lena Eichermüller,
Matthias Kränzler,
Fabian Brand,
Kristian Fischer,
Dat Thanh Nguyen,
Andy Regensky,
André Kaup
Abstract:
In this paper, we provide an in-depth assessment on the Bjøntegaard Delta. We construct a large data set of video compression performance comparisons using a diverse set of metrics including PSNR, VMAF, bitrate, and processing energies. These metrics are evaluated for visual data types such as classic perspective video, 360$^\circ$ video, point clouds, and screen content. As compression technology…
▽ More
In this paper, we provide an in-depth assessment on the Bjøntegaard Delta. We construct a large data set of video compression performance comparisons using a diverse set of metrics including PSNR, VMAF, bitrate, and processing energies. These metrics are evaluated for visual data types such as classic perspective video, 360$^\circ$ video, point clouds, and screen content. As compression technology, we consider multiple hybrid video codecs as well as state-of-the-art neural network based compression methods. Using additional supporting points inbetween standard points defined by parameters such as the quantization parameter, we assess the interpolation error of the Bjøntegaard-Delta (BD) calculus and its impact on the final BD value. From the analysis, we find that the BD calculus is most accurate in the standard application of rate-distortion comparisons with mean errors below 0.5 percentage points. For other applications and special cases, e.g., VMAF quality, energy considerations, or inter-codec comparisons, the errors are higher (up to 5 percentage points), but can be halved by using a higher number of supporting points. We finally come up with recommendations on how to use the BD calculus such that the validity of the resulting BD-values is maximized. Main recommendations are as follows: First, relative curve differences should be plotted and analyzed. Second, the logarithmic domain should be used for saturating metrics such as SSIM and VMAF. Third, BD values below a certain threshold indicated by the subset error should not be used to draw recommendations. Fourth, using two supporting points is sufficient to obtain rough performance estimates.
△ Less
Submitted 22 December, 2023; v1 submitted 25 April, 2023;
originally announced April 2023.
-
The James Webb Space Telescope Mission
Authors:
Jonathan P. Gardner,
John C. Mather,
Randy Abbott,
James S. Abell,
Mark Abernathy,
Faith E. Abney,
John G. Abraham,
Roberto Abraham,
Yasin M. Abul-Huda,
Scott Acton,
Cynthia K. Adams,
Evan Adams,
David S. Adler,
Maarten Adriaensen,
Jonathan Albert Aguilar,
Mansoor Ahmed,
Nasif S. Ahmed,
Tanjira Ahmed,
Rüdeger Albat,
Loïc Albert,
Stacey Alberts,
David Aldridge,
Mary Marsha Allen,
Shaune S. Allen,
Martin Altenburg
, et al. (983 additional authors not shown)
Abstract:
Twenty-six years ago a small committee report, building on earlier studies, expounded a compelling and poetic vision for the future of astronomy, calling for an infrared-optimized space telescope with an aperture of at least $4m$. With the support of their governments in the US, Europe, and Canada, 20,000 people realized that vision as the $6.5m$ James Webb Space Telescope. A generation of astrono…
▽ More
Twenty-six years ago a small committee report, building on earlier studies, expounded a compelling and poetic vision for the future of astronomy, calling for an infrared-optimized space telescope with an aperture of at least $4m$. With the support of their governments in the US, Europe, and Canada, 20,000 people realized that vision as the $6.5m$ James Webb Space Telescope. A generation of astronomers will celebrate their accomplishments for the life of the mission, potentially as long as 20 years, and beyond. This report and the scientific discoveries that follow are extended thank-you notes to the 20,000 team members. The telescope is working perfectly, with much better image quality than expected. In this and accompanying papers, we give a brief history, describe the observatory, outline its objectives and current observing program, and discuss the inventions and people who made it possible. We cite detailed reports on the design and the measured performance on orbit.
△ Less
Submitted 10 April, 2023;
originally announced April 2023.
-
Multi-Linear Kernel Regression and Imputation in Data Manifolds
Authors:
Duc Thien Nguyen,
Konstantinos Slavakis
Abstract:
This paper introduces an efficient multi-linear nonparametric (kernel-based) approximation framework for data regression and imputation, and its application to dynamic magnetic-resonance imaging (dMRI). Data features are assumed to reside in or close to a smooth manifold embedded in a reproducing kernel Hilbert space. Landmark points are identified to describe concisely the point cloud of features…
▽ More
This paper introduces an efficient multi-linear nonparametric (kernel-based) approximation framework for data regression and imputation, and its application to dynamic magnetic-resonance imaging (dMRI). Data features are assumed to reside in or close to a smooth manifold embedded in a reproducing kernel Hilbert space. Landmark points are identified to describe concisely the point cloud of features by linear approximating patches which mimic the concept of tangent spaces to smooth manifolds. The multi-linear model effects dimensionality reduction, enables efficient computations, and extracts data patterns and their geometry without any training data or additional information. Numerical tests on dMRI data under severe under-sampling demonstrate remarkable improvements in efficiency and accuracy of the proposed approach over its predecessors, popular data modeling methods, as well as recent tensor-based and deep-image-prior schemes.
△ Less
Submitted 6 April, 2023;
originally announced April 2023.
-
Geometric Convergence of Distributed Heavy-Ball Nash Equilibrium Algorithm over Time-Varying Digraphs with Unconstrained Actions
Authors:
Duong Thuy Anh Nguyen,
Duong Tung Nguyen,
Angelia Nedich
Abstract:
This paper presents a new distributed algorithm that leverages heavy-ball momentum and a consensus-based gradient method to find a Nash equilibrium (NE) in a class of non-cooperative convex games with unconstrained action sets. In this approach, each agent in the game has access to its own smooth local cost function and can exchange information with its neighbors over a communication network. The…
▽ More
This paper presents a new distributed algorithm that leverages heavy-ball momentum and a consensus-based gradient method to find a Nash equilibrium (NE) in a class of non-cooperative convex games with unconstrained action sets. In this approach, each agent in the game has access to its own smooth local cost function and can exchange information with its neighbors over a communication network. The main novelty of our work is the incorporation of heavy-ball momentum in the context of non-cooperative games that operate on fully-decentralized, directed, and time-varying communication graphs, while also accommodating non-identical step-sizes and momentum parameters. Overcoming technical challenges arising from the dynamic and asymmetric nature of mixing matrices and the presence of an additional momentum term, we provide a rigorous proof of the geometric convergence to the NE. Moreover, we establish explicit bounds for the step-size values and momentum parameters based on the characteristics of the cost functions, mixing matrices, and graph connectivity structures. We perform numerical simulations on a Nash-Cournot game to demonstrate accelerated convergence of the proposed algorithm compared to that of the existing methods.
△ Less
Submitted 3 June, 2023; v1 submitted 28 March, 2023;
originally announced March 2023.
-
Lossless Point Cloud Geometry and Attribute Compression Using a Learned Conditional Probability Model
Authors:
Dat Thanh Nguyen,
Andre Kaup
Abstract:
In recent years, we have witnessed the presence of point cloud data in many aspects of our life, from immersive media, autonomous driving to healthcare, although at the cost of a tremendous amount of data. In this paper, we present an efficient lossless point cloud compression method that uses sparse tensor-based deep neural networks to learn point cloud geometry and color probability distribution…
▽ More
In recent years, we have witnessed the presence of point cloud data in many aspects of our life, from immersive media, autonomous driving to healthcare, although at the cost of a tremendous amount of data. In this paper, we present an efficient lossless point cloud compression method that uses sparse tensor-based deep neural networks to learn point cloud geometry and color probability distributions. Our method represents a point cloud with both occupancy feature and three attribute features at different bit depths in a unified sparse representation. This allows us to efficiently exploit feature-wise and point-wise dependencies within point clouds using a sparse tensor-based neural network and thus build an accurate auto-regressive context model for an arithmetic coder. To the best of our knowledge, this is the first learning-based lossless point cloud geometry and attribute compression approach. Compared with the-state-of-the-art lossless point cloud compression method from Moving Picture Experts Group (MPEG), our method achieves 22.6% reduction in total bitrate on a diverse set of test point clouds while having 49.0% and 18.3% rate reduction on geometry and color attribute component, respectively.
△ Less
Submitted 20 March, 2024; v1 submitted 11 March, 2023;
originally announced March 2023.
-
Deep probabilistic model for lossless scalable point cloud attribute compression
Authors:
Dat Thanh Nguyen,
Kamal Gopikrishnan Nambiar,
Andre Kaup
Abstract:
In recent years, several point cloud geometry compression methods that utilize advanced deep learning techniques have been proposed, but there are limited works on attribute compression, especially lossless compression. In this work, we build an end-to-end multiscale point cloud attribute coding method (MNeT) that progressively projects the attributes onto multiscale latent spaces. The multiscale…
▽ More
In recent years, several point cloud geometry compression methods that utilize advanced deep learning techniques have been proposed, but there are limited works on attribute compression, especially lossless compression. In this work, we build an end-to-end multiscale point cloud attribute coding method (MNeT) that progressively projects the attributes onto multiscale latent spaces. The multiscale architecture provides an accurate context for the attribute probability modeling and thus minimizes the coding bitrate with a single network prediction. Besides, our method allows scalable coding that lower quality versions can be easily extracted from the losslessly compressed bitstream. We validate our method on a set of point clouds from MVUB and MPEG and show that our method outperforms recently proposed methods and on par with the latest G-PCC version 14. Besides, our coding time is substantially faster than G-PCC.
△ Less
Submitted 11 March, 2023;
originally announced March 2023.
-
Generalized divisor functions in arithmetic progressions: II
Authors:
D. T. Nguyen
Abstract:
We obtain a new bound on the second moment of modified shifted convolutions of the generalized 3-fold divisor function, and show that, for applications, the modified version is sufficient.
We obtain a new bound on the second moment of modified shifted convolutions of the generalized 3-fold divisor function, and show that, for applications, the modified version is sufficient.
△ Less
Submitted 13 August, 2023; v1 submitted 24 February, 2023;
originally announced February 2023.
-
Fast Temporal Wavelet Graph Neural Networks
Authors:
Duc Thien Nguyen,
Manh Duc Tuan Nguyen,
Truong Son Hy,
Risi Kondor
Abstract:
Spatio-temporal signals forecasting plays an important role in numerous domains, especially in neuroscience and transportation. The task is challenging due to the highly intricate spatial structure, as well as the non-linear temporal dynamics of the network. To facilitate reliable and timely forecast for the human brain and traffic networks, we propose the Fast Temporal Wavelet Graph Neural Networ…
▽ More
Spatio-temporal signals forecasting plays an important role in numerous domains, especially in neuroscience and transportation. The task is challenging due to the highly intricate spatial structure, as well as the non-linear temporal dynamics of the network. To facilitate reliable and timely forecast for the human brain and traffic networks, we propose the Fast Temporal Wavelet Graph Neural Networks (FTWGNN) that is both time- and memory-efficient for learning tasks on timeseries data with the underlying graph structure, thanks to the theories of multiresolution analysis and wavelet theory on discrete spaces. We employ Multiresolution Matrix Factorization (MMF) (Kondor et al., 2014) to factorize the highly dense graph structure and compute the corresponding sparse wavelet basis that allows us to construct fast wavelet convolution as the backbone of our novel architecture. Experimental results on real-world PEMS-BAY, METR-LA traffic datasets and AJILE12 ECoG dataset show that FTWGNN is competitive with the state-of-the-arts while maintaining a low computational footprint. Our PyTorch implementation is publicly available at https://github.com/HySonLab/TWGNN
△ Less
Submitted 28 October, 2023; v1 submitted 16 February, 2023;
originally announced February 2023.
-
A Bandit Approach to Online Pricing for Heterogeneous Edge Resource Allocation
Authors:
Jiaming Cheng,
Duong Thuy Anh Nguyen,
Lele Wang,
Duong Tung Nguyen,
Vijay K. Bhargava
Abstract:
Edge Computing (EC) offers a superior user experience by positioning cloud resources in close proximity to end users. The challenge of allocating edge resources efficiently while maximizing profit for the EC platform remains a sophisticated problem, especially with the added complexity of the online arrival of resource requests. To address this challenge, we propose to cast the problem as a multi-…
▽ More
Edge Computing (EC) offers a superior user experience by positioning cloud resources in close proximity to end users. The challenge of allocating edge resources efficiently while maximizing profit for the EC platform remains a sophisticated problem, especially with the added complexity of the online arrival of resource requests. To address this challenge, we propose to cast the problem as a multi-armed bandit problem and develop two novel online pricing mechanisms, the Kullback-Leibler Upper Confidence Bound (KL-UCB) algorithm and the Min-Max Optimal algorithm, for heterogeneous edge resource allocation. These mechanisms operate in real-time and do not require prior knowledge of demand distribution, which can be difficult to obtain in practice. The proposed posted pricing schemes allow users to select and pay for their preferred resources, with the platform dynamically adjusting resource prices based on observed historical data. Numerical results show the advantages of the proposed mechanisms compared to several benchmark schemes derived from traditional bandit algorithms, including the Epsilon-Greedy, basic UCB, and Thompson Sampling algorithms.
△ Less
Submitted 14 February, 2023;
originally announced February 2023.
-
A Quantum Neural Network Regression for Modeling Lithium-ion Battery Capacity Degradation
Authors:
Anh Phuong Ngo,
Nhat Le,
Hieu T. Nguyen,
Abdullah Eroglu,
Duong T. Nguyen
Abstract:
Given the high power density low discharge rate and decreasing cost rechargeable lithium-ion batteries LiBs have found a wide range of applications such as power grid level storage systems electric vehicles and mobile devices. Developing a framework to accurately model the nonlinear degradation process of LiBs which is indeed a supervised learning problem becomes an important research topic. This…
▽ More
Given the high power density low discharge rate and decreasing cost rechargeable lithium-ion batteries LiBs have found a wide range of applications such as power grid level storage systems electric vehicles and mobile devices. Developing a framework to accurately model the nonlinear degradation process of LiBs which is indeed a supervised learning problem becomes an important research topic. This paper presents a classical-quantum hybrid machine learning approach to capture the LiB degradation model that assesses battery cell life loss from operating profiles. Our work is motivated by recent advances in quantum computers as well as the similarity between neural networks and quantum circuits. Similar to adjusting weight parameters in conventional neural networks the parameters of the quantum circuit namely the qubits degree of freedom can be tuned to learn a nonlinear function in a supervised learning fashion. As a proof of concept paper our obtained numerical results with the battery dataset provided by NASA demonstrate the ability of the quantum neural networks in modeling the nonlinear relationship between the degraded capacity and the operating cycles. We also discuss the potential advantage of the quantum approach compared to conventional neural networks in classical computers in dealing with massive data especially in the context of future penetration of EVs and energy storage.
△ Less
Submitted 5 February, 2023;
originally announced February 2023.
-
Accelerated $AB$/Push-Pull Methods for Distributed Optimization over Time-Varying Directed Networks
Authors:
Duong Thuy Anh Nguyen,
Duong Tung Nguyen,
Angelia Nedich
Abstract:
This paper investigates a novel approach for solving the distributed optimization problem in which multiple agents collaborate to find the global decision that minimizes the sum of their individual cost functions. First, the $AB$/Push-Pull gradient-based algorithm is considered, which employs row- and column-stochastic weights simultaneously to track the optimal decision and the gradient of the gl…
▽ More
This paper investigates a novel approach for solving the distributed optimization problem in which multiple agents collaborate to find the global decision that minimizes the sum of their individual cost functions. First, the $AB$/Push-Pull gradient-based algorithm is considered, which employs row- and column-stochastic weights simultaneously to track the optimal decision and the gradient of the global cost function, ensuring consensus on the optimal decision. Building on this algorithm, we then develop a general algorithm that incorporates acceleration techniques, such as heavy-ball momentum and Nesterov momentum, as well as their combination with non-identical momentum parameters. Previous literature has established the effectiveness of acceleration methods for various gradient-based distributed algorithms and demonstrated linear convergence for static directed communication networks. In contrast, we focus on time-varying directed communication networks and establish linear convergence of the methods to the optimal solution, when the agents' cost functions are smooth and strongly convex. Additionally, we provide explicit bounds for the step-size value and momentum parameters, based on the properties of the cost functions, the mixing matrices, and the graph connectivity structures. Our numerical results illustrate the benefits of the proposed acceleration techniques on the $AB$/Push-Pull algorithm.
△ Less
Submitted 21 June, 2023; v1 submitted 2 February, 2023;
originally announced February 2023.
-
A Fairness-Aware Attacker-Defender Model for Optimal Edge Network Operation and Protection
Authors:
Duong Thuy Anh Nguyen,
Jiaming Cheng,
Ni Trieu,
Duong Tung Nguyen
Abstract:
While various aspects of edge computing (EC) have been studied extensively, the current literature has overlooked the robust edge network operations and planning problem. To this end, this letter proposes a novel fairness-aware attacker-defender model for optimal edge network operation and hardening against possible attacks and disruptions. The proposed model helps EC platforms identify the set of…
▽ More
While various aspects of edge computing (EC) have been studied extensively, the current literature has overlooked the robust edge network operations and planning problem. To this end, this letter proposes a novel fairness-aware attacker-defender model for optimal edge network operation and hardening against possible attacks and disruptions. The proposed model helps EC platforms identify the set of most critical nodes to be protected to mitigate the impact of failures on system performance. Numerical results show that the proposed solution can not only ensure good service quality but also maintain fairness among different areas during disruptions.
△ Less
Submitted 6 February, 2023; v1 submitted 16 January, 2023;
originally announced January 2023.
-
Causal Inference via Style Transfer for Out-of-distribution Generalisation
Authors:
Toan Nguyen,
Kien Do,
Duc Thanh Nguyen,
Bao Duong,
Thin Nguyen
Abstract:
Out-of-distribution (OOD) generalisation aims to build a model that can generalise well on an unseen target domain using knowledge from multiple source domains. To this end, the model should seek the causal dependence between inputs and labels, which may be determined by the semantics of inputs and remain invariant across domains. However, statistical or non-causal methods often cannot capture thi…
▽ More
Out-of-distribution (OOD) generalisation aims to build a model that can generalise well on an unseen target domain using knowledge from multiple source domains. To this end, the model should seek the causal dependence between inputs and labels, which may be determined by the semantics of inputs and remain invariant across domains. However, statistical or non-causal methods often cannot capture this dependence and perform poorly due to not considering spurious correlations learnt from model training via unobserved confounders. A well-known existing causal inference method like back-door adjustment cannot be applied to remove spurious correlations as it requires the observation of confounders. In this paper, we propose a novel method that effectively deals with hidden confounders by successfully implementing front-door adjustment (FA). FA requires the choice of a mediator, which we regard as the semantic information of images that helps access the causal mechanism without the need for observing confounders. Further, we propose to estimate the combination of the mediator with other observed images in the front-door formula via style transfer algorithms. Our use of style transfer to estimate FA is novel and sensible for OOD generalisation, which we justify by extensive experimental results on widely used benchmark datasets.
△ Less
Submitted 10 June, 2023; v1 submitted 6 December, 2022;
originally announced December 2022.
-
PointInverter: Point Cloud Reconstruction and Editing via a Generative Model with Shape Priors
Authors:
Jaeyeon Kim,
Binh-Son Hua,
Duc Thanh Nguyen,
Sai-Kit Yeung
Abstract:
In this paper, we propose a new method for mapping a 3D point cloud to the latent space of a 3D generative adversarial network. Our generative model for 3D point clouds is based on SP-GAN, a state-of-the-art sphere-guided 3D point cloud generator. We derive an efficient way to encode an input 3D point cloud to the latent space of the SP-GAN. Our point cloud encoder can resolve the point ordering i…
▽ More
In this paper, we propose a new method for mapping a 3D point cloud to the latent space of a 3D generative adversarial network. Our generative model for 3D point clouds is based on SP-GAN, a state-of-the-art sphere-guided 3D point cloud generator. We derive an efficient way to encode an input 3D point cloud to the latent space of the SP-GAN. Our point cloud encoder can resolve the point ordering issue during inversion, and thus can determine the correspondences between points in the generated 3D point cloud and those in the canonical sphere used by the generator. We show that our method outperforms previous GAN inversion methods for 3D point clouds, achieving state-of-the-art results both quantitatively and qualitatively. Our code is available at https://github.com/hkust-vgd/point_inverter.
△ Less
Submitted 16 November, 2022;
originally announced November 2022.
-
AB/Push-Pull Method for Distributed Optimization in Time-Varying Directed Networks
Authors:
Angelia Nedich,
Duong Thuy Anh Nguyen,
Duong Tung Nguyen
Abstract:
In this paper, we study the distributed optimization problem for a system of agents embedded in time-varying directed communication networks. Each agent has its own cost function and agents cooperate to determine the global decision that minimizes the summation of all individual cost functions. We consider the so-called push-pull gradient-based algorithm (termed as AB/Push-Pull) which employs both…
▽ More
In this paper, we study the distributed optimization problem for a system of agents embedded in time-varying directed communication networks. Each agent has its own cost function and agents cooperate to determine the global decision that minimizes the summation of all individual cost functions. We consider the so-called push-pull gradient-based algorithm (termed as AB/Push-Pull) which employs both row- and column-stochastic weights simultaneously to track the optimal decision and the gradient of the global cost while ensuring consensus and optimality. We show that the algorithm converges linearly to the optimal solution over a time-varying directed network for a constant stepsize when the agent's cost function is smooth and strongly convex. The linear convergence of the method has been shown in Saadatniaki et al. (2020), where the multi-step consensus contraction parameters for row- and column-stochastic mixing matrices are not directly related to the underlying graph structure, and the explicit range for the stepsize value is not provided. With respect to Saadatniaki et al. (2020), the novelty of this work is twofold: (1) we establish the one-step consensus contraction for both row- and column-stochastic mixing matrices with the contraction parameters given explicitly in terms of the graph diameter and other graph properties; and (2) we provide explicit upper bounds for the stepsize value in terms of the properties of the cost functions, the mixing matrices, and the graph connectivity structure.
△ Less
Submitted 26 September, 2022; v1 submitted 14 September, 2022;
originally announced September 2022.
-
On correlation of the 3-fold divisor function with itself
Authors:
David T. Nguyen
Abstract:
Let $ζ^k(s) = \sum_{n=1}^\infty τ_k(n) n^{-s}, \Re s > 1$.
We present three conditional results on the ternary additive correlation sum $$\sum_{n\le X} τ_3(n) τ_3(n+h),\quad (h\ge 1),$$ and give numerical verifications of our method. The first is a conditional proof for the full main term of the above correlation sum for any composite shift $1 \le h \le X^{2/3}$, on assuming an averaged level of…
▽ More
Let $ζ^k(s) = \sum_{n=1}^\infty τ_k(n) n^{-s}, \Re s > 1$.
We present three conditional results on the ternary additive correlation sum $$\sum_{n\le X} τ_3(n) τ_3(n+h),\quad (h\ge 1),$$ and give numerical verifications of our method. The first is a conditional proof for the full main term of the above correlation sum for any composite shift $1 \le h \le X^{2/3}$, on assuming an averaged level of distribution for the three-fold divisor function $τ_3(n)$ in arithmetic progressions to level two-thirds. The second is a conditional derivation for the leading order main term asymptotics of this correlation sum, also valid for any composite shift $1 \le h \le X^{2/3}$. The third result gives a complete expansion of the polynomial for the full main term for the special case $h=1$ from both our method and from the delta-method, showing that our answers match.
Our method is essentially elementary, especially for the $h=1$ case, uses congruences, and, as alluded to earlier, gives the same answer as in prior prediction of Conrey and Gonek [Duke Math. J. 107 (3) 2002], previously computed by Ng and Thom [Funct. Approx. Comment. Math. 60(1) 2019], and unpublished heuristic probabilistic arguments of Tao. Our procedure is general and works to give the full main term with a power-saving error term for any correlations of the form $\sum_{n\le X} τ_k(n) f(n+h)$, to any composite shift $h$, and for a wide class of arithmetic function $f(n)$.
△ Less
Submitted 13 August, 2023; v1 submitted 12 June, 2022;
originally announced June 2022.
-
Variance of the k-fold divisor function in arithmetic progressions for individual modulus
Authors:
David T. Nguyen
Abstract:
In this paper, we confirm a smoothed version of a recent conjecture on the variance of the k-fold divisor function in arithmetic progressions to individual composite moduli, in a restricted range. In contrast to a previous result of Rodgers and Soundararajan, we do not require averaging over the moduli. Our proof adapts a technique of S. Lester who treated in the same range the variance of the k-f…
▽ More
In this paper, we confirm a smoothed version of a recent conjecture on the variance of the k-fold divisor function in arithmetic progressions to individual composite moduli, in a restricted range. In contrast to a previous result of Rodgers and Soundararajan, we do not require averaging over the moduli. Our proof adapts a technique of S. Lester who treated in the same range the variance of the k-fold divisor function in the short intervals setting, and is based on a smoothed Voronoi summation formula but twisted by multiplicative characters. The use of Dirichlet characters allows us to extend to a wider range from previous result of Kowalski and Ricotta who used additive characters. Smoothing also permits us to treat all k unconditionally. This result is closely related to moments of Dirichlet L-functions.
△ Less
Submitted 24 February, 2023; v1 submitted 4 May, 2022;
originally announced May 2022.