Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–10 of 10 results for author: Tong, V

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.15506  [pdf, other

    cs.LG

    Learning to Discretize Denoising Diffusion ODEs

    Authors: Vinh Tong, Anji Liu, Trung-Dung Hoang, Guy Van den Broeck, Mathias Niepert

    Abstract: Diffusion Probabilistic Models (DPMs) are powerful generative models showing competitive performance in various domains, including image synthesis and 3D point cloud generation. However, sampling from pre-trained DPMs involves multiple neural function evaluations (NFE) to transform Gaussian noise samples into images, resulting in higher computational costs compared to single-step generative models… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

  2. arXiv:2312.02585  [pdf, other

    cs.CR

    CVE representation to build attack positions graphs

    Authors: Manuel Poisson, Valérie Viet Triem Tong, Gilles Guette, Frédéric Guihéry, Damien Crémilleux

    Abstract: In cybersecurity, CVEs (Common Vulnerabilities and Exposures) are publicly disclosed hardware or software vulnerabilities. These vulnerabilities are documented and listed in the NVD database maintained by the NIST. Knowledge of the CVEs impacting an information system provides a measure of its level of security. This article points out that these vulnerabilities should be described in greater deta… ▽ More

    Submitted 5 December, 2023; originally announced December 2023.

    Journal ref: CyberHunt 2023, Workshop on Cyber Threat Intelligence and Hunting, IEEE BigData, Dec 2023, Sorrento, Italy. pp.1-5

  3. arXiv:2311.11096  [pdf, other

    eess.IV cs.CV

    On the Out of Distribution Robustness of Foundation Models in Medical Image Segmentation

    Authors: Duy Minh Ho Nguyen, Tan Ngoc Pham, Nghiem Tuong Diep, Nghi Quoc Phan, Quang Pham, Vinh Tong, Binh T. Nguyen, Ngan Hoang Le, Nhat Ho, Pengtao Xie, Daniel Sonntag, Mathias Niepert

    Abstract: Constructing a robust model that can effectively generalize to test samples under distribution shifts remains a significant challenge in the field of medical imaging. The foundational models for vision and language, pre-trained on extensive sets of natural image and text data, have emerged as a promising approach. It showcases impressive learning abilities across different tasks with the need for… ▽ More

    Submitted 18 November, 2023; originally announced November 2023.

    Comments: Advances in Neural Information Processing Systems (NeurIPS) 2023, Workshop on robustness of zero/few-shot learning in foundation models

  4. arXiv:2303.17373  [pdf, other

    cs.CR

    URSID: Using formalism to Refine attack Scenarios for vulnerable Infrastructure Deployment

    Authors: Pierre-Victor Besson, Valérie Viet Triem Tong, Gilles Guette, Guillaume Piolle, Erwan Abgrall

    Abstract: In this paper we propose a novel way of deploying vulnerable architectures for defense and research purposes, which aims to generate deception platforms based on the formal description of a scenario. An attack scenario is described by an attack graph in which transitions are labeled by ATT&CK techniques or procedures. The state of the attacker is modeled as a set of secrets he acquires and a set o… ▽ More

    Submitted 30 March, 2023; originally announced March 2023.

    Comments: 13 pages, 9 figures

  5. arXiv:2210.08922  [pdf, other

    cs.CL

    Joint Multilingual Knowledge Graph Completion and Alignment

    Authors: Vinh Tong, Dat Quoc Nguyen, Trung Thanh Huynh, Tam Thanh Nguyen, Quoc Viet Hung Nguyen, Mathias Niepert

    Abstract: Knowledge graph (KG) alignment and completion are usually treated as two independent tasks. While recent work has leveraged entity and relation alignments from multiple KGs, such as alignments between multilingual KGs with common entities and relations, a deeper understanding of the ways in which multilingual KG completion (MKGC) can aid the creation of multilingual KG alignments (MKGA) is still l… ▽ More

    Submitted 18 October, 2022; v1 submitted 17 October, 2022; originally announced October 2022.

    Comments: EMNLP 2022 (Findings), to appear

  6. arXiv:2112.09266  [pdf, other

    cs.CL cs.AI cs.LG

    Incomplete Knowledge Graph Alignment

    Authors: Vinh Van Tong, Thanh Trung Huynh, Thanh Tam Nguyen, Hongzhi Yin, Quoc Viet Hung Nguyen, Quyet Thang Huynh

    Abstract: Knowledge graph (KG) alignment - the task of recognizing entities referring to the same thing in different KGs - is recognized as one of the most important operations in the field of KG construction and completion. However, existing alignment techniques often assume that the input KGs are complete and isomorphic, which is not true due to the real-world heterogeneity in the domain, size, and sparsi… ▽ More

    Submitted 15 March, 2022; v1 submitted 16 December, 2021; originally announced December 2021.

  7. arXiv:2112.09231  [pdf, other

    cs.CL cs.AI cs.LG

    Two-view Graph Neural Networks for Knowledge Graph Completion

    Authors: Vinh Tong, Dai Quoc Nguyen, Dinh Phung, Dat Quoc Nguyen

    Abstract: We present an effective graph neural network (GNN)-based knowledge graph embedding model, which we name WGE, to capture entity- and relation-focused graph structures. Given a knowledge graph, WGE builds a single undirected entity-focused graph that views entities as nodes. WGE also constructs another single undirected graph from relation-focused constraints, which views entities and relations as n… ▽ More

    Submitted 11 March, 2023; v1 submitted 16 December, 2021; originally announced December 2021.

    Comments: To appear in Proceedings of ESWC 2023; 17 pages; 4 tables; 4 figures

  8. arXiv:2111.12912  [pdf, other

    cs.CV

    A War Beyond Deepfake: Benchmarking Facial Counterfeits and Countermeasures

    Authors: Minh Tam Pham, Thanh Trung Huynh, Van Vinh Tong, Thanh Tam Nguyen, Thanh Thi Nguyen, Hongzhi Yin, Quoc Viet Hung Nguyen

    Abstract: In recent years, visual forgery has reached a level of sophistication that humans cannot identify fraud, which poses a significant threat to information security. A wide range of malicious applications have emerged, such as fake news, defamation or blackmailing of celebrities, impersonation of politicians in political warfare, and the spreading of rumours to attract views. As a result, a rich body… ▽ More

    Submitted 7 April, 2022; v1 submitted 25 November, 2021; originally announced November 2021.

  9. arXiv:2104.07396  [pdf, other

    cs.CL cs.LG

    Node Co-occurrence based Graph Neural Networks for Knowledge Graph Link Prediction

    Authors: Dai Quoc Nguyen, Vinh Tong, Dinh Phung, Dat Quoc Nguyen

    Abstract: We introduce a novel embedding model, named NoGE, which aims to integrate co-occurrence among entities and relations into graph neural networks to improve knowledge graph completion (i.e., link prediction). Given a knowledge graph, NoGE constructs a single graph considering entities and relations as individual nodes. NoGE then computes weights for edges among nodes based on the co-occurrence of en… ▽ More

    Submitted 25 December, 2021; v1 submitted 15 April, 2021; originally announced April 2021.

    Comments: To appear in Proceedings of WSDM 2022. The first two authors contributed equally to this work

  10. Evasive Windows Malware: Impact on Antiviruses and Possible Countermeasures

    Authors: Cédric Herzog, Valérie Viet Triem Tong, Pierre Wilke, Arnaud van Straaten, Jean-Louis Lanet

    Abstract: The perpetual opposition between antiviruses and malware leads both parties to evolve continuously. On the one hand, antiviruses put in place solutions that are more and more sophisticated and propose more complex detection techniques in addition to the classic signature analysis. This sophistication leads antiviruses to leave more traces of their presence on the machine they protect. To remain un… ▽ More

    Submitted 25 September, 2020; originally announced September 2020.

    Journal ref: 17th International Conference on Security and Cryptography, Jul 2020, Lieusaint - Paris, France. pp.302-309