Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–35 of 35 results for author: Kong, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.18034  [pdf, other

    cs.CV cs.AI

    AttentionHand: Text-driven Controllable Hand Image Generation for 3D Hand Reconstruction in the Wild

    Authors: Junho Park, Kyeongbo Kong, Suk-Ju Kang

    Abstract: Recently, there has been a significant amount of research conducted on 3D hand reconstruction to use various forms of human-computer interaction. However, 3D hand reconstruction in the wild is challenging due to extreme lack of in-the-wild 3D hand datasets. Especially, when hands are in complex pose such as interacting hands, the problems like appearance similarity, self-handed occclusion and dept… ▽ More

    Submitted 25 July, 2024; originally announced July 2024.

    Comments: Accepted by ECCV 2024

  2. arXiv:2407.17261  [pdf, other

    cs.CV

    Embedding-Free Transformer with Inference Spatial Reduction for Efficient Semantic Segmentation

    Authors: Hyunwoo Yu, Yubin Cho, Beoungwoo Kang, Seunghun Moon, Kyeongbo Kong, Suk-Ju Kang

    Abstract: We present an Encoder-Decoder Attention Transformer, EDAFormer, which consists of the Embedding-Free Transformer (EFT) encoder and the all-attention decoder leveraging our Embedding-Free Attention (EFA) structure. The proposed EFA is a novel global context modeling mechanism that focuses on functioning the global non-linearity, not the specific roles of the query, key and value. For the decoder, w… ▽ More

    Submitted 24 July, 2024; originally announced July 2024.

    Comments: Accepted by ECCV 2024

  3. arXiv:2405.10284  [pdf, other

    quant-ph cs.LG hep-ph

    Quantum Vision Transformers for Quark-Gluon Classification

    Authors: Marçal Comajoan Cara, Gopal Ramesh Dahale, Zhongtian Dong, Roy T. Forestano, Sergei Gleyzer, Daniel Justice, Kyoungchul Kong, Tom Magorsch, Konstantin T. Matchev, Katia Matcheva, Eyup B. Unlu

    Abstract: We introduce a hybrid quantum-classical vision transformer architecture, notable for its integration of variational quantum circuits within both the attention mechanism and the multi-layer perceptrons. The research addresses the critical challenge of computational efficiency and resource constraints in analyzing data from the upcoming High Luminosity Large Hadron Collider, presenting the architect… ▽ More

    Submitted 16 May, 2024; originally announced May 2024.

    Comments: 14 pages, 8 figures. Published in MDPI Axioms 2024, 13(5), 323

    MSC Class: 68Q12 (Primary) 81P68; 68T07 (Secondary)

    Journal ref: Axioms 2024, 13(5), 323

  4. arXiv:2402.14361  [pdf, other

    cs.LG

    OpenTab: Advancing Large Language Models as Open-domain Table Reasoners

    Authors: Kezhi Kong, Jiani Zhang, Zhengyuan Shen, Balasubramaniam Srinivasan, Chuan Lei, Christos Faloutsos, Huzefa Rangwala, George Karypis

    Abstract: Large Language Models (LLMs) trained on large volumes of data excel at various natural language tasks, but they cannot handle tasks requiring knowledge that has not been trained on previously. One solution is to use a retriever that fetches relevant information to expand LLM's knowledge scope. However, existing textual-oriented retrieval-based LLMs are not ideal on structured table data due to div… ▽ More

    Submitted 12 April, 2024; v1 submitted 22 February, 2024; originally announced February 2024.

    Comments: Accepted by ICLR 2024

  5. arXiv:2402.00776  [pdf, other

    quant-ph cs.LG hep-ph stat.ML

    Hybrid Quantum Vision Transformers for Event Classification in High Energy Physics

    Authors: Eyup B. Unlu, Marçal Comajoan Cara, Gopal Ramesh Dahale, Zhongtian Dong, Roy T. Forestano, Sergei Gleyzer, Daniel Justice, Kyoungchul Kong, Tom Magorsch, Konstantin T. Matchev, Katia Matcheva

    Abstract: Models based on vision transformer architectures are considered state-of-the-art when it comes to image classification tasks. However, they require extensive computational resources both for training and deployment. The problem is exacerbated as the amount and complexity of the data increases. Quantum-based vision transformer models could potentially alleviate this issue by reducing the training a… ▽ More

    Submitted 19 March, 2024; v1 submitted 1 February, 2024; originally announced February 2024.

    Comments: 13 pages, 9 figures. Published version in a special issue "Computational Aspects of Machine Learning and Quantum Computing"

    MSC Class: 68Q12; 81P68

    Journal ref: Axioms v. 13, no 3, (2024) 187

  6. arXiv:2311.18744  [pdf, other

    quant-ph cs.LG hep-ph stat.ML

    $\mathbb{Z}_2\times \mathbb{Z}_2$ Equivariant Quantum Neural Networks: Benchmarking against Classical Neural Networks

    Authors: Zhongtian Dong, Marçal Comajoan Cara, Gopal Ramesh Dahale, Roy T. Forestano, Sergei Gleyzer, Daniel Justice, Kyoungchul Kong, Tom Magorsch, Konstantin T. Matchev, Katia Matcheva, Eyup B. Unlu

    Abstract: This paper presents a comprehensive comparative analysis of the performance of Equivariant Quantum Neural Networks (EQNN) and Quantum Neural Networks (QNN), juxtaposed against their classical counterparts: Equivariant Neural Networks (ENN) and Deep Neural Networks (DNN). We evaluate the performance of each network with two toy examples for a binary classification task, focusing on model complexity… ▽ More

    Submitted 20 March, 2024; v1 submitted 30 November, 2023; originally announced November 2023.

    Comments: 13 pages, 7 figures

    Journal ref: Axioms 2024, 13 (3), 188

  7. arXiv:2311.18672  [pdf, other

    quant-ph cs.LG hep-ph stat.ML

    A Comparison Between Invariant and Equivariant Classical and Quantum Graph Neural Networks

    Authors: Roy T. Forestano, Marçal Comajoan Cara, Gopal Ramesh Dahale, Zhongtian Dong, Sergei Gleyzer, Daniel Justice, Kyoungchul Kong, Tom Magorsch, Konstantin T. Matchev, Katia Matcheva, Eyup B. Unlu

    Abstract: Machine learning algorithms are heavily relied on to understand the vast amounts of data from high-energy particle collisions at the CERN Large Hadron Collider (LHC). The data from such collision events can naturally be represented with graph structures. Therefore, deep geometric methods, such as graph neural networks (GNNs), have been leveraged for various data analysis tasks in high-energy physi… ▽ More

    Submitted 21 May, 2024; v1 submitted 30 November, 2023; originally announced November 2023.

    Comments: 15 pages, 7 figures, 3 appendices

    Journal ref: Axioms 13 (2024) 160

  8. arXiv:2311.14464  [pdf, other

    cs.LG cs.CE physics.flu-dyn

    Finite Volume Features, Global Geometry Representations, and Residual Training for Deep Learning-based CFD Simulation

    Authors: Loh Sher En Jessica, Naheed Anjum Arafat, Wei Xian Lim, Wai Lee Chan, Adams Wai Kin Kong

    Abstract: Computational fluid dynamics (CFD) simulation is an irreplaceable modelling step in many engineering designs, but it is often computationally expensive. Some graph neural network (GNN)-based CFD methods have been proposed. However, the current methods inherit the weakness of traditional numerical simulators, as well as ignore the cell characteristics in the mesh used in the finite volume method, a… ▽ More

    Submitted 24 November, 2023; originally announced November 2023.

  9. arXiv:2311.05383  [pdf

    cs.CV

    Improving Hand Recognition in Uncontrolled and Uncooperative Environments using Multiple Spatial Transformers and Loss Functions

    Authors: Wojciech Michal Matkowski, Xiaojie Li, Adams Wai Kin Kong

    Abstract: The prevalence of smartphone and consumer camera has led to more evidence in the form of digital images, which are mostly taken in uncontrolled and uncooperative environments. In these images, criminals likely hide or cover their faces while their hands are observable in some cases, creating a challenging use case for forensic investigation. Many existing hand-based recognition methods perform wel… ▽ More

    Submitted 9 November, 2023; originally announced November 2023.

  10. arXiv:2310.13345  [pdf, other

    cs.CR

    An LLM can Fool Itself: A Prompt-Based Adversarial Attack

    Authors: Xilie Xu, Keyi Kong, Ning Liu, Lizhen Cui, Di Wang, Jingfeng Zhang, Mohan Kankanhalli

    Abstract: The wide-ranging applications of large language models (LLMs), especially in safety-critical domains, necessitate the proper evaluation of the LLM's adversarial robustness. This paper proposes an efficient tool to audit the LLM's adversarial robustness via a prompt-based adversarial attack (PromptAttack). PromptAttack converts adversarial textual attacks into an attack prompt that can cause the vi… ▽ More

    Submitted 20 October, 2023; originally announced October 2023.

  11. arXiv:2306.04634  [pdf, other

    cs.LG cs.CL cs.CR

    On the Reliability of Watermarks for Large Language Models

    Authors: John Kirchenbauer, Jonas Geiping, Yuxin Wen, Manli Shu, Khalid Saifullah, Kezhi Kong, Kasun Fernando, Aniruddha Saha, Micah Goldblum, Tom Goldstein

    Abstract: As LLMs become commonplace, machine-generated text has the potential to flood the internet with spam, social media bots, and valueless content. Watermarking is a simple and effective strategy for mitigating such harms by enabling the detection and documentation of LLM-generated text. Yet a crucial question remains: How reliable is watermarking in realistic settings in the wild? There, watermarked… ▽ More

    Submitted 1 May, 2024; v1 submitted 7 June, 2023; originally announced June 2023.

    Comments: 9 pages in the main body. Published at ICLR 2024. Code is available at https://github.com/jwkirchenbauer/lm-watermarking

  12. arXiv:2305.17445  [pdf, other

    cs.SE

    Synthesizing Speech Test Cases with Text-to-Speech? An Empirical Study on the False Alarms in Automated Speech Recognition Testing

    Authors: Julia Kaiwen Lau, Kelvin Kai Wen Kong, Julian Hao Yong, Per Hoong Tan, Zhou Yang, Zi Qian Yong, Joshua Chern Wey Low, Chun Yong Chong, Mei Kuan Lim, David Lo

    Abstract: Recent studies have proposed the use of Text-To-Speech (TTS) systems to automatically synthesise speech test cases on a scale and uncover a large number of failures in ASR systems. However, the failures uncovered by synthetic test cases may not reflect the actual performance of an ASR system when it transcribes human audio, which we refer to as false alarms. Given a failed test case synthesised fr… ▽ More

    Submitted 18 July, 2023; v1 submitted 27 May, 2023; originally announced May 2023.

    Comments: 13 pages, Accepted at ISSTA2023

  13. arXiv:2211.08420  [pdf, other

    hep-ph cs.AI cs.LG cs.SC hep-ex

    Is the Machine Smarter than the Theorist: Deriving Formulas for Particle Kinematics with Symbolic Regression

    Authors: Zhongtian Dong, Kyoungchul Kong, Konstantin T. Matchev, Katia Matcheva

    Abstract: We demonstrate the use of symbolic regression in deriving analytical formulas, which are needed at various stages of a typical experimental analysis in collider phenomenology. As a first application, we consider kinematic variables like the stransverse mass, $M_{T2}$, which are defined algorithmically through an optimization procedure and not in terms of an analytical formula. We then train a symb… ▽ More

    Submitted 15 November, 2022; originally announced November 2022.

    Comments: 15 pages, 13 figures, 8 tables

  14. arXiv:2210.01680  [pdf, other

    stat.ML cs.LG hep-ex hep-ph

    New Machine Learning Techniques for Simulation-Based Inference: InferoStatic Nets, Kernel Score Estimation, and Kernel Likelihood Ratio Estimation

    Authors: Kyoungchul Kong, Konstantin T. Matchev, Stephen Mrenna, Prasanth Shyamsundar

    Abstract: We propose an intuitive, machine-learning approach to multiparameter inference, dubbed the InferoStatic Networks (ISN) method, to model the score and likelihood ratio estimators in cases when the probability density can be sampled but not computed directly. The ISN uses a backend neural network that models a scalar function called the inferostatic potential $\varphi$. In addition, we introduce new… ▽ More

    Submitted 3 February, 2023; v1 submitted 4 October, 2022; originally announced October 2022.

    Comments: 36 pages, 10 figures. Submission to SciPost

    Report number: FERMILAB-PUB-22-741-SCD

  15. arXiv:2110.14363  [pdf, other

    cs.LG stat.ML

    VQ-GNN: A Universal Framework to Scale up Graph Neural Networks using Vector Quantization

    Authors: Mucong Ding, Kezhi Kong, Jingling Li, Chen Zhu, John P Dickerson, Furong Huang, Tom Goldstein

    Abstract: Most state-of-the-art Graph Neural Networks (GNNs) can be defined as a form of graph convolution which can be realized by message passing between direct neighbors or beyond. To scale such GNNs to large graphs, various neighbor-, layer-, or subgraph-sampling techniques are proposed to alleviate the "neighbor explosion" problem by considering only a small subset of messages passed to the nodes in a… ▽ More

    Submitted 27 October, 2021; originally announced October 2021.

    Comments: NeurIPS 2021

  16. arXiv:2110.03396  [pdf, other

    eess.IV cs.CV

    AnoSeg: Anomaly Segmentation Network Using Self-Supervised Learning

    Authors: Jouwon Song, Kyeongbo Kong, Ye-In Park, Seong-Gyun Kim, Suk-Ju Kang

    Abstract: Anomaly segmentation, which localizes defective areas, is an important component in large-scale industrial manufacturing. However, most recent researches have focused on anomaly detection. This paper proposes a novel anomaly segmentation network (AnoSeg) that can directly generate an accurate anomaly map using self-supervised learning. For highly accurate anomaly segmentation, the proposed AnoSeg… ▽ More

    Submitted 7 October, 2021; originally announced October 2021.

    Comments: 10 pages, 17 figures

  17. arXiv:2107.08792  [pdf, other

    cs.LG cs.AI

    Selective Focusing Learning in Conditional GANs

    Authors: Kyeongbo Kong, Kyunghun Kim, Woo-Jin Song, Suk-Ju Kang

    Abstract: Conditional generative adversarial networks (cGANs) have demonstrated remarkable success due to their class-wise controllability and superior quality for complex generation tasks. Typical cGANs solve the joint distribution matching problem by decomposing two easier sub-problems: marginal matching and conditional matching. From our toy experiments, we found that it is the best to apply only conditi… ▽ More

    Submitted 8 July, 2021; originally announced July 2021.

    Comments: 14 pages, 9 figures, spotlight presented at the ICML 2021 Workshop on Subset Selection in ML

  18. arXiv:2107.07041  [pdf, other

    cs.LG

    Mitigating Memorization in Sample Selection for Learning with Noisy Labels

    Authors: Kyeongbo Kong, Junggi Lee, Youngchul Kwak, Young-Rae Cho, Seong-Eun Kim, Woo-Jin Song

    Abstract: Because deep learning is vulnerable to noisy labels, sample selection techniques, which train networks with only clean labeled data, have attracted a great attention. However, if the labels are dominantly corrupted by few classes, these noisy samples are called dominant-noisy-labeled samples, the network also learns dominant-noisy-labeled samples rapidly via content-aware optimization. In this stu… ▽ More

    Submitted 8 July, 2021; originally announced July 2021.

    Comments: 14 pages, 9 figures, spotlight presented at the ICML 2021 Workshop on Subset Selection in ML

  19. arXiv:2107.06869  [pdf, other

    cs.LG cs.NE

    Core-set Sampling for Efficient Neural Architecture Search

    Authors: Jae-hun Shim, Kyeongbo Kong, Suk-Ju Kang

    Abstract: Neural architecture search (NAS), an important branch of automatic machine learning, has become an effective approach to automate the design of deep learning models. However, the major issue in NAS is how to reduce the large search time imposed by the heavy computational burden. While most recent approaches focus on pruning redundant sets or developing new search methodologies, this paper attempts… ▽ More

    Submitted 8 July, 2021; originally announced July 2021.

    Comments: 8 pages, 2 figures, spotlight presented at the ICML 2021 Workshop on Subset Selection in ML

  20. arXiv:2107.05274  [pdf, other

    eess.IV cs.CV

    TransAttUnet: Multi-level Attention-guided U-Net with Transformer for Medical Image Segmentation

    Authors: Bingzhi Chen, Yishu Liu, Zheng Zhang, Guangming Lu, Adams Wai Kin Kong

    Abstract: Accurate segmentation of organs or lesions from medical images is crucial for reliable diagnosis of diseases and organ morphometry. In recent years, convolutional encoder-decoder solutions have achieved substantial progress in the field of automatic medical image segmentation. Due to the inherent bias in the convolution operations, prior models mainly focus on local visual cues formed by the neigh… ▽ More

    Submitted 8 July, 2022; v1 submitted 12 July, 2021; originally announced July 2021.

  21. arXiv:2105.10126  [pdf, other

    hep-ph cs.LG hep-ex physics.data-an

    Deep-Learned Event Variables for Collider Phenomenology

    Authors: Doojin Kim, Kyoungchul Kong, Konstantin T. Matchev, Myeonghun Park, Prasanth Shyamsundar

    Abstract: The choice of optimal event variables is crucial for achieving the maximal sensitivity of experimental analyses. Over time, physicists have derived suitable kinematic variables for many typical event topologies in collider physics. Here we introduce a deep learning technique to design good event variables, which are sensitive over a wide range of values for the unknown model parameters. We demonst… ▽ More

    Submitted 21 May, 2021; originally announced May 2021.

    Comments: 6 pages, 7 figures

    Report number: FERMILAB-PUB-21-244-QIS, MI-TH-2111

  22. arXiv:2103.16851  [pdf, other

    cs.CV

    Attention Map-guided Two-stage Anomaly Detection using Hard Augmentation

    Authors: Jou Won Song, Kyeongbo Kong, Ye In Park, Suk-Ju Kang

    Abstract: Anomaly detection is a task that recognizes whether an input sample is included in the distribution of a target normal class or an anomaly class. Conventional generative adversarial network (GAN)-based methods utilize an entire image including foreground and background as an input. However, in these methods, a useless region unrelated to the normal class (e.g., unrelated background) is learned as… ▽ More

    Submitted 31 March, 2021; originally announced March 2021.

  23. arXiv:2103.04436   

    cs.LG

    Insta-RS: Instance-wise Randomized Smoothing for Improved Robustness and Accuracy

    Authors: Chen Chen, Kezhi Kong, Peihong Yu, Juan Luque, Tom Goldstein, Furong Huang

    Abstract: Randomized smoothing (RS) is an effective and scalable technique for constructing neural network classifiers that are certifiably robust to adversarial perturbations. Most RS works focus on training a good base model that boosts the certified robustness of the smoothed model. However, existing RS techniques treat every data point the same, i.e., the variance of the Gaussian noise used to form the… ▽ More

    Submitted 16 September, 2021; v1 submitted 7 March, 2021; originally announced March 2021.

    Comments: We plan to make major modifications to this paper including rewriting the entire text, rewriting the proofs and adding experiments. Given that the paper will be completely different, we decided to take this paper down temporarily

  24. arXiv:2102.08098  [pdf, other

    cs.LG cs.CL cs.CV

    GradInit: Learning to Initialize Neural Networks for Stable and Efficient Training

    Authors: Chen Zhu, Renkun Ni, Zheng Xu, Kezhi Kong, W. Ronny Huang, Tom Goldstein

    Abstract: Innovations in neural architectures have fostered significant breakthroughs in language modeling and computer vision. Unfortunately, novel architectures often result in challenging hyper-parameter choices and training instability if the network parameters are not properly initialized. A number of architecture-specific initialization schemes have been proposed, but these schemes are not always port… ▽ More

    Submitted 24 November, 2021; v1 submitted 16 February, 2021; originally announced February 2021.

    Comments: NeurIPS 2021, fixing typos

  25. arXiv:2011.10684  [pdf, other

    cs.LG

    SHOT-VAE: Semi-supervised Deep Generative Models With Label-aware ELBO Approximations

    Authors: Hao-Zhe Feng, Kezhi Kong, Minghao Chen, Tianye Zhang, Minfeng Zhu, Wei Chen

    Abstract: Semi-supervised variational autoencoders (VAEs) have obtained strong results, but have also encountered the challenge that good ELBO values do not always imply accurate inference results. In this paper, we investigate and propose two causes of this problem: (1) The ELBO objective cannot utilize the label information directly. (2) A bottleneck value exists and continuing to optimize ELBO after this… ▽ More

    Submitted 8 December, 2020; v1 submitted 20 November, 2020; originally announced November 2020.

    Comments: 12 pages, 6 figures, Accepted for presentation at AAAI2021

  26. arXiv:2010.09891  [pdf, other

    cs.LG stat.ML

    Robust Optimization as Data Augmentation for Large-scale Graphs

    Authors: Kezhi Kong, Guohao Li, Mucong Ding, Zuxuan Wu, Chen Zhu, Bernard Ghanem, Gavin Taylor, Tom Goldstein

    Abstract: Data augmentation helps neural networks generalize better by enlarging the training set, but it remains an open question how to effectively augment graph data to enhance the performance of GNNs (Graph Neural Networks). While most existing graph regularizers focus on manipulating graph topological structures by adding/removing edges, we offer a method to augment node features for better performance… ▽ More

    Submitted 29 March, 2022; v1 submitted 19 October, 2020; originally announced October 2020.

    Comments: Accepted at CVPR 2022

  27. arXiv:2010.07092  [pdf, other

    cs.LG cs.CV

    Data Augmentation for Meta-Learning

    Authors: Renkun Ni, Micah Goldblum, Amr Sharaf, Kezhi Kong, Tom Goldstein

    Abstract: Conventional image classifiers are trained by randomly sampling mini-batches of images. To achieve state-of-the-art performance, practitioners use sophisticated data augmentation schemes to expand the amount of training data available for sampling. In contrast, meta-learning algorithms sample support data, query data, and tasks on each training step. In this complex sampling scenario, data augment… ▽ More

    Submitted 22 June, 2021; v1 submitted 14 October, 2020; originally announced October 2020.

    Comments: 15 pages, 3 figures, Accepted to ICML 2021

  28. arXiv:2010.01810  [pdf, other

    cs.CV eess.IV

    Painting Outside as Inside: Edge Guided Image Outpainting via Bidirectional Rearrangement with Progressive Step Learning

    Authors: Kyunghun Kim, Yeohun Yun, Keon-Woo Kang, Kyeongbo Kong, Siyeong Lee, Suk-Ju Kang

    Abstract: Image outpainting is a very intriguing problem as the outside of a given image can be continuously filled by considering as the context of the image. This task has two main challenges. The first is to maintain the spatial consistency in contents of generated regions and the original input. The second is to generate a high-quality large image with a small amount of adjacent information. Conventiona… ▽ More

    Submitted 9 November, 2020; v1 submitted 5 October, 2020; originally announced October 2020.

    Comments: Paper accepted in WACV 2021

  29. arXiv:2008.04147  [pdf, ps, other

    eess.SP cs.IT

    Knowledge Distillation-aided End-to-End Learning for Linear Precoding in Multiuser MIMO Downlink Systems with Finite-Rate Feedback

    Authors: Kyeongbo Kong, Woo-Jin Song, Moonsik Min

    Abstract: We propose a deep learning-based channel estimation, quantization, feedback, and precoding method for downlink multiuser multiple-input and multiple-output systems. In the proposed system, channel estimation and quantization for limited feedback are handled by a receiver deep neural network (DNN). Precoder selection is handled by a transmitter DNN. To emulate the traditional channel quantization,… ▽ More

    Submitted 22 March, 2021; v1 submitted 10 August, 2020; originally announced August 2020.

    Comments: 6 pages, 4 figures, submitted to IEEE Transactions on Vehicular Technology

  30. Gender and Ethnicity Classification based on Palmprint and Palmar Hand Images from Uncontrolled Environment

    Authors: Wojciech Michal Matkowski, Adams Wai Kin Kong

    Abstract: Soft biometric attributes such as gender, ethnicity or age may provide useful information for biometrics and forensics applications. Researchers used, e.g., face, gait, iris, and hand, etc. to classify such attributes. Even though hand has been widely studied for biometric recognition, relatively less attention has been given to soft biometrics from hand. Previous studies of soft biometrics based… ▽ More

    Submitted 6 August, 2020; originally announced August 2020.

    Comments: Accepted in the International Joint Conference on Biometrics (IJCB 2020), scheduled for Sep 28-Oct 1, 2020

  31. Palmprint Recognition in Uncontrolled and Uncooperative Environment

    Authors: Wojciech Michal Matkowski, Tingting Chai, Adams Wai Kin Kong

    Abstract: Online palmprint recognition and latent palmprint identification are two branches of palmprint studies. The former uses middle-resolution images collected by a digital camera in a well-controlled or contact-based environment with user cooperation for commercial applications and the latter uses high-resolution latent palmprints collected in crime scenes for forensic investigation. However, these tw… ▽ More

    Submitted 27 November, 2019; originally announced November 2019.

    Comments: Accepted in the IEEE Transactions on Information Forensics and Security

  32. A Study on Wrist Identification for Forensic Investigation

    Authors: Wojciech Michal Matkowski, Frodo Kin Sun Chan, Adams Wai Kin Kong

    Abstract: Criminal and victim identification based on crime scene images is an important part of forensic investigation. Criminals usually avoid identification by covering their faces and tattoos in the evidence images, which are taken in uncontrolled environments. Existing identification methods, which make use of biometric traits, such as vein, skin mark, height, skin color, weight, race, etc., are consid… ▽ More

    Submitted 8 October, 2019; originally announced October 2019.

    Journal ref: Image and Vision Computing, vol. 88, August 2019, pp 96-112

  33. Giant Panda Face Recognition Using Small Dataset

    Authors: Wojciech Michal Matkowski, Adams Wai Kin Kong, Han Su, Peng Chen, Rong Hou, Zhihe Zhang

    Abstract: Giant panda (panda) is a highly endangered animal. Significant efforts and resources have been put on panda conservation. To measure effectiveness of conservation schemes, estimating its population size in wild is an important task. The current population estimation approaches, including capture-recapture, human visual identification and collection of DNA from hair or feces, are invasive, subjecti… ▽ More

    Submitted 27 May, 2019; originally announced May 2019.

    Comments: Accepted in the IEEE 2019 International Conference on Image Processing (ICIP 2019), scheduled for 22-25 September 2019 in Taipei, Taiwan

    Journal ref: 2019 IEEE International Conference on Image Processing (ICIP)

  34. Towards Touch-to-Access Device Authentication Using Induced Body Electric Potentials

    Authors: Zhenyu Yan, Qun Song, Rui Tan, Yang Li, Adams Wai Kin Kong

    Abstract: This paper presents TouchAuth, a new touch-to-access device authentication approach using induced body electric potentials (iBEPs) caused by the indoor ambient electric field that is mainly emitted from the building's electrical cabling. The design of TouchAuth is based on the electrostatics of iBEP generation and a resulting property, i.e., the iBEPs at two close locations on the same human body… ▽ More

    Submitted 15 February, 2019; originally announced February 2019.

    Comments: 16 pages, accepted to the 25th Annual International Conference on Mobile Computing and Networking (MobiCom 2019), October 21-25, 2019, Los Cabos, Mexico

  35. Prefix-based Labeling Annotation for Effective XML Fragmentation

    Authors: Kok-Leong Koong, Su-Cheng Haw, Lay-Ki Soon, Samini Subramaniam

    Abstract: XML is gradually employed as a standard of data exchange in web environment since its inception in the 90s until present. It serves as a data exchange between systems and other applications. Meanwhile the data volume has grown substantially in the web and thus effective methods of storing and retrieving these data is essential. One recommended way is physically or virtually fragments the large chu… ▽ More

    Submitted 13 May, 2015; originally announced May 2015.

    Comments: 12 pages, invited extension from conference paper. International Journal of Computer Science & Information Technology (IJCSIT), Vol 7, No 2, April 2015

    ACM Class: H.2.4