Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–16 of 16 results for author: Shih, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.09395  [pdf, other

    cs.CV

    Modeling Ambient Scene Dynamics for Free-view Synthesis

    Authors: Meng-Li Shih, Jia-Bin Huang, Changil Kim, Rajvi Shah, Johannes Kopf, Chen Gao

    Abstract: We introduce a novel method for dynamic free-view synthesis of an ambient scenes from a monocular capture bringing a immersive quality to the viewing experience. Our method builds upon the recent advancements in 3D Gaussian Splatting (3DGS) that can faithfully reconstruct complex static scenes. Previous attempts to extend 3DGS to represent dynamics have been confined to bounded scenes or require m… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

  2. arXiv:2406.06133  [pdf, other

    cs.CV

    ExtraNeRF: Visibility-Aware View Extrapolation of Neural Radiance Fields with Diffusion Models

    Authors: Meng-Li Shih, Wei-Chiu Ma, Lorenzo Boyice, Aleksander Holynski, Forrester Cole, Brian L. Curless, Janne Kontkanen

    Abstract: We propose ExtraNeRF, a novel method for extrapolating the range of views handled by a Neural Radiance Field (NeRF). Our main idea is to leverage NeRFs to model scene-specific, fine-grained details, while capitalizing on diffusion models to extrapolate beyond our observed data. A key ingredient is to track visibility to determine what portions of the scene have not been observed, and focus on reco… ▽ More

    Submitted 10 June, 2024; originally announced June 2024.

    Comments: 8 pages, 8 figures, CVPR2024

  3. arXiv:2312.09781  [pdf, other

    cs.CL cs.AI

    GSQA: An End-to-End Model for Generative Spoken Question Answering

    Authors: Min-Han Shih, Ho-Lam Chung, Yu-Chi Pai, Ming-Hao Hsu, Guan-Ting Lin, Shang-Wen Li, Hung-yi Lee

    Abstract: In recent advancements in spoken question answering (QA), end-to-end models have made significant strides. However, previous research has primarily focused on extractive span selection. While this extractive-based approach is effective when answers are present directly within the input, it falls short in addressing abstractive questions, where answers are not directly extracted but inferred from t… ▽ More

    Submitted 2 July, 2024; v1 submitted 15 December, 2023; originally announced December 2023.

    Comments: 5 pages, 2 figures, Interspeech 2024

  4. arXiv:2301.13133  [pdf, other

    stat.ME cs.LG

    Falsification of Internal and External Validity in Observational Studies via Conditional Moment Restrictions

    Authors: Zeshan Hussain, Ming-Chieh Shih, Michael Oberst, Ilker Demirel, David Sontag

    Abstract: Randomized Controlled Trials (RCT)s are relied upon to assess new treatments, but suffer from limited power to guide personalized treatment decisions. On the other hand, observational (i.e., non-experimental) studies have large and diverse populations, but are prone to various biases (e.g. residual confounding). To safely leverage the strengths of observational studies, we focus on the problem of… ▽ More

    Submitted 6 March, 2023; v1 submitted 30 January, 2023; originally announced January 2023.

    Comments: Artificial Intelligence and Statistics 2023

  5. arXiv:2212.01032  [pdf, other

    cs.CL cs.AI

    Systematic Analysis for Pretrained Language Model Priming for Parameter-Efficient Fine-tuning

    Authors: Shih-Cheng Huang, Shih-Heng Wang, Min-Han Shih, Saurav Sahay, Hung-yi Lee

    Abstract: Parameter-efficient (PE) methods (like Prompts or Adapters) for adapting pre-trained language models (PLM) to downstream tasks have been popular recently. However, hindrances still prevent these methods from reaching their full potential. For example, two significant challenges are few-shot adaptation and cross-task generalization. To tackle these issues, we propose a general PE priming framework… ▽ More

    Submitted 30 May, 2024; v1 submitted 2 December, 2022; originally announced December 2022.

  6. arXiv:2209.13708  [pdf, other

    cs.LG

    Falsification before Extrapolation in Causal Effect Estimation

    Authors: Zeshan Hussain, Michael Oberst, Ming-Chieh Shih, David Sontag

    Abstract: Randomized Controlled Trials (RCTs) represent a gold standard when developing policy guidelines. However, RCTs are often narrow, and lack data on broader populations of interest. Causal effects in these populations are often estimated using observational datasets, which may suffer from unobserved confounding and selection bias. Given a set of observational estimates (e.g. from multiple studies), w… ▽ More

    Submitted 6 March, 2023; v1 submitted 27 September, 2022; originally announced September 2022.

    Comments: Conference on Neural Information Processing Systems, 2022

  7. arXiv:2209.06727  [pdf

    cs.CL

    Automated Fidelity Assessment for Strategy Training in Inpatient Rehabilitation using Natural Language Processing

    Authors: Hunter Osterhoudt, Courtney E. Schneider, Haneef A Mohammad, Minmei Shih, Alexandra E. Harper, Leming Zhou, Elizabeth R Skidmore, Yanshan Wang

    Abstract: Strategy training is a multidisciplinary rehabilitation approach that teaches skills to reduce disability among those with cognitive impairments following a stroke. Strategy training has been shown in randomized, controlled clinical trials to be a more feasible and efficacious intervention for promoting independence than traditional rehabilitation approaches. A standardized fidelity assessment is… ▽ More

    Submitted 24 January, 2023; v1 submitted 14 September, 2022; originally announced September 2022.

    Comments: Accepted at the AMIA Informatics Summit 2023

  8. arXiv:2004.04727  [pdf, other

    cs.CV eess.IV

    3D Photography using Context-aware Layered Depth Inpainting

    Authors: Meng-Li Shih, Shih-Yang Su, Johannes Kopf, Jia-Bin Huang

    Abstract: We propose a method for converting a single RGB-D input image into a 3D photo - a multi-layer representation for novel view synthesis that contains hallucinated color and depth structures in regions occluded in the original view. We use a Layered Depth Image with explicit pixel connectivity as underlying representation, and present a learning-based inpainting model that synthesizes new local color… ▽ More

    Submitted 10 June, 2020; v1 submitted 9 April, 2020; originally announced April 2020.

    Comments: CVPR 2020. Project page: https://shihmengli.github.io/3D-Photo-Inpainting/ Code: https://github.com/vt-vl-lab/3d-photo-inpainting Demo: https://colab.research.google.com/drive/1706ToQrkIZshRSJSHvZ1RuCiM__YX3Bz

  9. arXiv:1909.11164  [pdf, other

    cs.CR

    P2FAAS: Toward Privacy-Preserving Fuzzing as a Service

    Authors: Fan Sang, Daehee Jang, Ming-Wei Shih, Taesoo Kim

    Abstract: Global corporations (e.g., Google and Microsoft) have recently introduced a new model of cloud services, fuzzing-as-a-service (FaaS). Despite effectively alleviating the cost of fuzzing, the model comes with privacy concerns. For example, the end user has to trust both cloud and service providers who have access to the application to be fuzzed. Such concerns are due to the platform is under the co… ▽ More

    Submitted 24 September, 2019; originally announced September 2019.

  10. arXiv:1909.02629  [pdf, other

    cs.DB cs.DS

    Random Sampling for Group-By Queries

    Authors: Trong Duc Nguyen, Ming-Hung Shih, Sai Sree Parvathaneni, Bojian Xu, Divesh Srivastava, Srikanta Tirthapura

    Abstract: Random sampling has been widely used in approximate query processing on large databases, due to its potential to significantly reduce resource usage and response times, at the cost of a small approximation error. We consider random sampling for answering the ubiquitous class of group-by queries, which first group data according to one or more attributes, and then aggregate within each group after… ▽ More

    Submitted 12 September, 2019; v1 submitted 5 September, 2019; originally announced September 2019.

  11. arXiv:1811.05304  [pdf, other

    cs.CV

    Self-Supervised Learning of Depth and Camera Motion from 360° Videos

    Authors: Fu-En Wang, Hou-Ning Hu, Hsien-Tzu Cheng, Juan-Ting Lin, Shang-Ta Yang, Meng-Li Shih, Hung-Kuo Chu, Min Sun

    Abstract: As 360° cameras become prevalent in many autonomous systems (e.g., self-driving cars and drones), efficient 360° perception becomes more and more important. We propose a novel self-supervised learning approach for predicting the omnidirectional depth and camera motion from a 360° video. In particular, starting from the SfMLearner, which is designed for cameras with normal field-of-view, we introdu… ▽ More

    Submitted 13 November, 2018; originally announced November 2018.

    Comments: ACCV 2018 Oral

  12. arXiv:1809.09038  [pdf, other

    cs.CR

    SPX: Preserving End-to-End Security for Edge Computing

    Authors: Ketan Bhardwaj, Ming-Wei Shih, Ada Gavrilovska, Taesoo Kim, Chengyu Song

    Abstract: Beyond point solutions, the vision of edge computing is to enable web services to deploy their edge functions in a multi-tenant infrastructure present at the edge of mobile networks. However, edge functions can be rendered useless because of one critical issue: Web services are delivered over end-to-end encrypted connections, so edge functions cannot operate on encrypted traffic without compromisi… ▽ More

    Submitted 24 September, 2018; originally announced September 2018.

    Comments: 12 pages, 19 figures

  13. arXiv:1801.09039  [pdf, other

    cs.DB

    Variance-Optimal Offline and Streaming Stratified Random Sampling

    Authors: Trong Duc Nguyen, Ming-Hung Shih, Divesh Srivastava, Srikanta Tirthapura, Bojian Xu

    Abstract: Stratified random sampling (SRS) is a fundamental sampling technique that provides accurate estimates for aggregate queries using a small size sample, and has been used widely for approximate query processing. A key question in SRS is how to partition a target sample size among different strata. While Neyman allocation provides a solution that minimizes the variance of an estimate using this sampl… ▽ More

    Submitted 20 February, 2018; v1 submitted 27 January, 2018; originally announced January 2018.

  14. arXiv:1703.06748  [pdf, other

    cs.LG cs.CR stat.ML

    Tactics of Adversarial Attack on Deep Reinforcement Learning Agents

    Authors: Yen-Chen Lin, Zhang-Wei Hong, Yuan-Hong Liao, Meng-Li Shih, Ming-Yu Liu, Min Sun

    Abstract: We introduce two tactics to attack agents trained by deep reinforcement learning algorithms using adversarial examples, namely the strategically-timed attack and the enchanting attack. In the strategically-timed attack, the adversary aims at minimizing the agent's reward by only attacking the agent at a small subset of time steps in an episode. Limiting the attack activity to this subset helps pre… ▽ More

    Submitted 12 November, 2019; v1 submitted 7 March, 2017; originally announced March 2017.

    Comments: To Appear at IJCAI 2017. Project website: http://yenchenlin.me/adversarial_attack_RL/

  15. arXiv:1611.08947  [pdf, other

    cs.GR

    Navigable videos for presenting scientific data on head-mounted displays

    Authors: Jacqueline Chu, Leonardo Ferrer, Min Shih, Kwan-Liu Ma

    Abstract: Immersive, stereoscopic viewing enables scientists to better analyze the spatial structures of visualized physical phenomena. However, their findings cannot be properly presented in traditional media, which lack these core attributes. Creating a presentation tool that captures this environment poses unique challenges, namely related to poor viewing accessibility. Immersive scientific renderings of… ▽ More

    Submitted 27 November, 2016; originally announced November 2016.

  16. arXiv:1611.06952  [pdf, other

    cs.CR

    Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing

    Authors: Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, Marcus Peinado

    Abstract: In this paper, we explore a new, yet critical, side-channel attack against Intel Software Guard Extension (SGX), called a branch shadowing attack, which can reveal fine-grained control flows (i.e., each branch) of an enclave program running on real SGX hardware. The root cause of this attack is that Intel SGX does not clear the branch history when switching from enclave mode to non-enclave mode, l… ▽ More

    Submitted 1 June, 2017; v1 submitted 21 November, 2016; originally announced November 2016.

    Comments: A revised version of this paper will be presented at USENIX Security Symposium 2017. Please cite this paper as Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, and Marcus Peinado, "Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing," in Proceedings of the 26th USENIX Security Symposium (Security), Vancouver, Canada, August 2017