-
GPC: Generative and General Pathology Image Classifier
Authors:
Anh Tien Nguyen,
Jin Tae Kwak
Abstract:
Deep learning has been increasingly incorporated into various computational pathology applications to improve its efficiency, accuracy, and robustness. Although successful, most previous approaches for image classification have crucial drawbacks. There exist numerous tasks in pathology, but one needs to build a model per task, i.e., a task-specific model, thereby increasing the number of models, t…
▽ More
Deep learning has been increasingly incorporated into various computational pathology applications to improve its efficiency, accuracy, and robustness. Although successful, most previous approaches for image classification have crucial drawbacks. There exist numerous tasks in pathology, but one needs to build a model per task, i.e., a task-specific model, thereby increasing the number of models, training resources, and cost. Moreover, transferring arbitrary task-specific model to another task is still a challenging problem. Herein, we propose a task-agnostic generative and general pathology image classifier, so called GPC, that aims at learning from diverse kinds of pathology images and conducting numerous classification tasks in a unified model. GPC, equipped with a convolutional neural network and a Transformer-based language model, maps pathology images into a high-dimensional feature space and generates pertinent class labels as texts via the image-to-text classification mechanism. We evaluate GPC on six datasets for four different pathology image classification tasks. Experimental results show that GPC holds considerable potential for developing an effective and efficient universal model for pathology image analysis.
△ Less
Submitted 12 July, 2024;
originally announced July 2024.
-
CAMP: Continuous and Adaptive Learning Model in Pathology
Authors:
Anh Tien Nguyen,
Keunho Byeon,
Kyungeun Kim,
Boram Song,
Seoung Wan Chae,
Jin Tae Kwak
Abstract:
There exist numerous diagnostic tasks in pathology. Conventional computational pathology formulates and tackles them as independent and individual image classification problems, thereby resulting in computational inefficiency and high costs. To address the challenges, we propose a generic, unified, and universal framework, called a continuous and adaptive learning model in pathology (CAMP), for pa…
▽ More
There exist numerous diagnostic tasks in pathology. Conventional computational pathology formulates and tackles them as independent and individual image classification problems, thereby resulting in computational inefficiency and high costs. To address the challenges, we propose a generic, unified, and universal framework, called a continuous and adaptive learning model in pathology (CAMP), for pathology image classification. CAMP is a generative, efficient, and adaptive classification model that can continuously adapt to any classification task by leveraging pathology-specific prior knowledge and learning taskspecific knowledge with minimal computational cost and without forgetting the knowledge from the existing tasks. We evaluated CAMP on 22 datasets, including 1,171,526 patches and 11,811 pathology slides, across 17 classification tasks. CAMP achieves state-of-theart classification performance on a wide range of datasets and tasks at both patch- and slide-levels and reduces up to 94% of computation time and 85% of storage memory in comparison to the conventional classification models. Our results demonstrate that CAMP can offer a fundamental transformation in pathology image classification, paving the way for the fully digitized and computerized pathology practice.
△ Less
Submitted 12 July, 2024;
originally announced July 2024.
-
Towards a text-based quantitative and explainable histopathology image analysis
Authors:
Anh Tien Nguyen,
Trinh Thi Le Vuong,
Jin Tae Kwak
Abstract:
Recently, vision-language pre-trained models have emerged in computational pathology. Previous works generally focused on the alignment of image-text pairs via the contrastive pre-training paradigm. Such pre-trained models have been applied to pathology image classification in zero-shot learning or transfer learning fashion. Herein, we hypothesize that the pre-trained vision-language models can be…
▽ More
Recently, vision-language pre-trained models have emerged in computational pathology. Previous works generally focused on the alignment of image-text pairs via the contrastive pre-training paradigm. Such pre-trained models have been applied to pathology image classification in zero-shot learning or transfer learning fashion. Herein, we hypothesize that the pre-trained vision-language models can be utilized for quantitative histopathology image analysis through a simple image-to-text retrieval. To this end, we propose a Text-based Quantitative and Explainable histopathology image analysis, which we call TQx. Given a set of histopathology images, we adopt a pre-trained vision-language model to retrieve a word-of-interest pool. The retrieved words are then used to quantify the histopathology images and generate understandable feature embeddings due to the direct mapping to the text description. To evaluate the proposed method, the text-based embeddings of four histopathology image datasets are utilized to perform clustering and classification tasks. The results demonstrate that TQx is able to quantify and analyze histopathology images that are comparable to the prevalent visual models in computational pathology.
△ Less
Submitted 10 July, 2024;
originally announced July 2024.
-
Vision language models are blind
Authors:
Pooyan Rahmanzadehgervi,
Logan Bolton,
Mohammad Reza Taesiri,
Anh Totti Nguyen
Abstract:
Large language models with vision capabilities (VLMs), e.g., GPT-4o and Gemini 1.5 Pro are powering countless image-text applications and scoring high on many vision-understanding benchmarks. We propose BlindTest, a suite of 7 visual tasks absurdly easy to humans such as identifying (a) whether two circles overlap; (b) whether two lines intersect; (c) which letter is being circled in a word; and (…
▽ More
Large language models with vision capabilities (VLMs), e.g., GPT-4o and Gemini 1.5 Pro are powering countless image-text applications and scoring high on many vision-understanding benchmarks. We propose BlindTest, a suite of 7 visual tasks absurdly easy to humans such as identifying (a) whether two circles overlap; (b) whether two lines intersect; (c) which letter is being circled in a word; and (d) counting the number of circles in a Olympic-like logo. Surprisingly, four state-of-the-art VLMs are, on average, only 56.20% accurate on our benchmark, with \newsonnet being the best (73.77% accuracy). On BlindTest, VLMs struggle with tasks that requires precise spatial information and counting (from 0 to 10), sometimes providing an impression of a person with myopia seeing fine details as blurry and making educated guesses. Code is available at: https://vlmsareblind.github.io/
△ Less
Submitted 12 July, 2024; v1 submitted 9 July, 2024;
originally announced July 2024.
-
PEEB: Part-based Image Classifiers with an Explainable and Editable Language Bottleneck
Authors:
Thang M. Pham,
Peijie Chen,
Tin Nguyen,
Seunghyun Yoon,
Trung Bui,
Anh Totti Nguyen
Abstract:
CLIP-based classifiers rely on the prompt containing a {class name} that is known to the text encoder. Therefore, they perform poorly on new classes or the classes whose names rarely appear on the Internet (e.g., scientific names of birds). For fine-grained classification, we propose PEEB - an explainable and editable classifier to (1) express the class name into a set of text descriptors that des…
▽ More
CLIP-based classifiers rely on the prompt containing a {class name} that is known to the text encoder. Therefore, they perform poorly on new classes or the classes whose names rarely appear on the Internet (e.g., scientific names of birds). For fine-grained classification, we propose PEEB - an explainable and editable classifier to (1) express the class name into a set of text descriptors that describe the visual parts of that class; and (2) match the embeddings of the detected parts to their textual descriptors in each class to compute a logit score for classification. In a zero-shot setting where the class names are unknown, PEEB outperforms CLIP by a huge margin (~10x in top-1 accuracy). Compared to part-based classifiers, PEEB is not only the state-of-the-art (SOTA) on the supervised-learning setting (88.80% and 92.20% accuracy on CUB-200 and Dogs-120, respectively) but also the first to enable users to edit the text descriptors to form a new classifier without any re-training. Compared to concept bottleneck models, PEEB is also the SOTA in both zero-shot and supervised-learning settings.
△ Less
Submitted 12 April, 2024; v1 submitted 8 March, 2024;
originally announced March 2024.
-
An Application of Vector Autoregressive Model for Analyzing the Impact of Weather And Nearby Traffic Flow On The Traffic Volume
Authors:
Anh Thi-Hoang Nguyen,
Dung Ha Nguyen,
Trong-Hop Do
Abstract:
This paper aims to predict the traffic flow at one road segment based on nearby traffic volume and weather conditions. Our team also discover the impact of weather conditions and nearby traffic volume on the traffic flow at a target point. The analysis results will help solve the problem of traffic flow prediction and develop an optimal transport network with efficient traffic movement and minimal…
▽ More
This paper aims to predict the traffic flow at one road segment based on nearby traffic volume and weather conditions. Our team also discover the impact of weather conditions and nearby traffic volume on the traffic flow at a target point. The analysis results will help solve the problem of traffic flow prediction and develop an optimal transport network with efficient traffic movement and minimal traffic congestion. Hourly historical weather and traffic flow data are selected to solve this problem. This paper uses model VAR(36) with time trend and constant to train the dataset and forecast. With an RMSE of 565.0768111 on average, the model is considered appropriate although some statistical tests implies that the residuals are unstable and non-normal. Also, this paper points out some variables that are not useful in forecasting, which helps simplify the data-collecting process when building the forecasting system.
△ Less
Submitted 12 November, 2023;
originally announced November 2023.
-
Automatic Textual Normalization for Hate Speech Detection
Authors:
Anh Thi-Hoang Nguyen,
Dung Ha Nguyen,
Nguyet Thi Nguyen,
Khanh Thanh-Duy Ho,
Kiet Van Nguyen
Abstract:
Social media data is a valuable resource for research, yet it contains a wide range of non-standard words (NSW). These irregularities hinder the effective operation of NLP tools. Current state-of-the-art methods for the Vietnamese language address this issue as a problem of lexical normalization, involving the creation of manual rules or the implementation of multi-staged deep learning frameworks,…
▽ More
Social media data is a valuable resource for research, yet it contains a wide range of non-standard words (NSW). These irregularities hinder the effective operation of NLP tools. Current state-of-the-art methods for the Vietnamese language address this issue as a problem of lexical normalization, involving the creation of manual rules or the implementation of multi-staged deep learning frameworks, which necessitate extensive efforts to craft intricate rules. In contrast, our approach is straightforward, employing solely a sequence-to-sequence (Seq2Seq) model. In this research, we provide a dataset for textual normalization, comprising 2,181 human-annotated comments with an inter-annotator agreement of 0.9014. By leveraging the Seq2Seq model for textual normalization, our results reveal that the accuracy achieved falls slightly short of 70%. Nevertheless, textual normalization enhances the accuracy of the Hate Speech Detection (HSD) task by approximately 2%, demonstrating its potential to improve the performance of complex NLP tasks. Our dataset is accessible for research purposes.
△ Less
Submitted 4 December, 2023; v1 submitted 12 November, 2023;
originally announced November 2023.
-
Fast and Interpretable Face Identification for Out-Of-Distribution Data Using Vision Transformers
Authors:
Hai Phan,
Cindy Le,
Vu Le,
Yihui He,
Anh Totti Nguyen
Abstract:
Most face identification approaches employ a Siamese neural network to compare two images at the image embedding level. Yet, this technique can be subject to occlusion (e.g. faces with masks or sunglasses) and out-of-distribution data. DeepFace-EMD (Phan et al. 2022) reaches state-of-the-art accuracy on out-of-distribution data by first comparing two images at the image level, and then at the patc…
▽ More
Most face identification approaches employ a Siamese neural network to compare two images at the image embedding level. Yet, this technique can be subject to occlusion (e.g. faces with masks or sunglasses) and out-of-distribution data. DeepFace-EMD (Phan et al. 2022) reaches state-of-the-art accuracy on out-of-distribution data by first comparing two images at the image level, and then at the patch level. Yet, its later patch-wise re-ranking stage admits a large $O(n^3 \log n)$ time complexity (for $n$ patches in an image) due to the optimal transport optimization. In this paper, we propose a novel, 2-image Vision Transformers (ViTs) that compares two images at the patch level using cross-attention. After training on 2M pairs of images on CASIA Webface (Yi et al. 2014), our model performs at a comparable accuracy as DeepFace-EMD on out-of-distribution data, yet at an inference speed more than twice as fast as DeepFace-EMD (Phan et al. 2022). In addition, via a human study, our model shows promising explainability through the visualization of cross-attention. We believe our work can inspire more explorations in using ViTs for face identification.
△ Less
Submitted 5 November, 2023;
originally announced November 2023.
-
Large Language Models for Scientific Synthesis, Inference and Explanation
Authors:
Yizhen Zheng,
Huan Yee Koh,
Jiaxin Ju,
Anh T. N. Nguyen,
Lauren T. May,
Geoffrey I. Webb,
Shirui Pan
Abstract:
Large language models are a form of artificial intelligence systems whose primary knowledge consists of the statistical patterns, semantic relationships, and syntactical structures of language1. Despite their limited forms of "knowledge", these systems are adept at numerous complex tasks including creative writing, storytelling, translation, question-answering, summarization, and computer code gen…
▽ More
Large language models are a form of artificial intelligence systems whose primary knowledge consists of the statistical patterns, semantic relationships, and syntactical structures of language1. Despite their limited forms of "knowledge", these systems are adept at numerous complex tasks including creative writing, storytelling, translation, question-answering, summarization, and computer code generation. However, they have yet to demonstrate advanced applications in natural science. Here we show how large language models can perform scientific synthesis, inference, and explanation. We present a method for using general-purpose large language models to make inferences from scientific datasets of the form usually associated with special-purpose machine learning algorithms. We show that the large language model can augment this "knowledge" by synthesizing from the scientific literature. When a conventional machine learning system is augmented with this synthesized and inferred knowledge it can outperform the current state of the art across a range of benchmark tasks for predicting molecular properties. This approach has the further advantage that the large language model can explain the machine learning system's predictions. We anticipate that our framework will open new avenues for AI to accelerate the pace of scientific discovery.
△ Less
Submitted 11 October, 2023;
originally announced October 2023.
-
Security Allocation in Networked Control Systems under Stealthy Attacks
Authors:
Anh Tung Nguyen,
André M. H. Teixeira,
Alexander Medvedev
Abstract:
This paper considers the problem of security allocation in a networked control system under stealthy attacks. The system is comprised of interconnected subsystems represented by vertices. A malicious adversary selects a single vertex on which to conduct a stealthy data injection attack with the purpose of maximally disrupting a distant target vertex while remaining undetected. Defense resources ag…
▽ More
This paper considers the problem of security allocation in a networked control system under stealthy attacks. The system is comprised of interconnected subsystems represented by vertices. A malicious adversary selects a single vertex on which to conduct a stealthy data injection attack with the purpose of maximally disrupting a distant target vertex while remaining undetected. Defense resources against the adversary are allocated by a defender on several selected vertices. First, the objectives of the adversary and the defender with uncertain targets are formulated in a probabilistic manner, resulting in an expected worst-case impact of stealthy attacks. Next, we provide a graph-theoretic necessary and sufficient condition under which the cost for the defender and the expected worst-case impact of stealthy attacks are bounded. This condition enables the defender to restrict the admissible actions to dominating sets of the graph representing the network. Then, the security allocation problem is solved through a Stackelberg game-theoretic framework. Finally, the obtained results are validated through a numerical example of a 50-vertex networked control system.
△ Less
Submitted 2 April, 2024; v1 submitted 31 August, 2023;
originally announced August 2023.
-
PCNN: Probable-Class Nearest-Neighbor Explanations Improve Fine-Grained Image Classification Accuracy for AIs and Humans
Authors:
Giang Nguyen,
Valerie Chen,
Mohammad Reza Taesiri,
Anh Totti Nguyen
Abstract:
Nearest neighbors (NN) are traditionally used to compute final decisions, e.g., in Support Vector Machines or k-NN classifiers, and to provide users with explanations for the model's decision. In this paper, we show a novel utility of nearest neighbors: To improve predictions of a frozen, pretrained classifier C. We leverage an image comparator S that (1) compares the input image with NN images fr…
▽ More
Nearest neighbors (NN) are traditionally used to compute final decisions, e.g., in Support Vector Machines or k-NN classifiers, and to provide users with explanations for the model's decision. In this paper, we show a novel utility of nearest neighbors: To improve predictions of a frozen, pretrained classifier C. We leverage an image comparator S that (1) compares the input image with NN images from the top-K most probable classes; and (2) uses S's output scores to weight the confidence scores of C. Our method consistently improves fine-grained image classification accuracy on CUB-200, Cars-196, and Dogs-120. Also, a human study finds that showing lay users our probable-class nearest neighbors (PCNN) improves their decision accuracy over prior work which only shows only the top-1 class examples.
△ Less
Submitted 23 April, 2024; v1 submitted 25 August, 2023;
originally announced August 2023.
-
Conditional Support Alignment for Domain Adaptation with Label Shift
Authors:
Anh T Nguyen,
Lam Tran,
Anh Tong,
Tuan-Duy H. Nguyen,
Toan Tran
Abstract:
Unsupervised domain adaptation (UDA) refers to a domain adaptation framework in which a learning model is trained based on the labeled samples on the source domain and unlabelled ones in the target domain. The dominant existing methods in the field that rely on the classical covariate shift assumption to learn domain-invariant feature representation have yielded suboptimal performance under the la…
▽ More
Unsupervised domain adaptation (UDA) refers to a domain adaptation framework in which a learning model is trained based on the labeled samples on the source domain and unlabelled ones in the target domain. The dominant existing methods in the field that rely on the classical covariate shift assumption to learn domain-invariant feature representation have yielded suboptimal performance under the label distribution shift between source and target domains. In this paper, we propose a novel conditional adversarial support alignment (CASA) whose aim is to minimize the conditional symmetric support divergence between the source's and target domain's feature representation distributions, aiming at a more helpful representation for the classification task. We also introduce a novel theoretical target risk bound, which justifies the merits of aligning the supports of conditional feature distributions compared to the existing marginal support alignment approach in the UDA settings. We then provide a complete training process for learning in which the objective optimization functions are precisely based on the proposed target risk bound. Our empirical results demonstrate that CASA outperforms other state-of-the-art methods on different UDA benchmark tasks under label shift conditions.
△ Less
Submitted 29 May, 2023;
originally announced May 2023.
-
Coend elements of a braided Hopf algebra
Authors:
Anh Tuong Nguyen
Abstract:
Let $H$ be a Hopf algebra in a braided rigid monoidal category $\mathcal{V}$ admitting a coend $C$. We define a ``coend element'' of $H$ to be a morphism from $C$ to $H$. We then study certain coend elements of $H$, which generalize important elements (e.g., pivotal and ribbon elements) of a finite dimensional Hopf algebra over a field. This builds on prior work of Bruguières and Virelizier (2012)…
▽ More
Let $H$ be a Hopf algebra in a braided rigid monoidal category $\mathcal{V}$ admitting a coend $C$. We define a ``coend element'' of $H$ to be a morphism from $C$ to $H$. We then study certain coend elements of $H$, which generalize important elements (e.g., pivotal and ribbon elements) of a finite dimensional Hopf algebra over a field. This builds on prior work of Bruguières and Virelizier (2012) on $R$-matrices of braided Hopf algebras. As an application, we provide another description for pivotal and ribbon structures on the category $\mathcal{V}_H$ of $H$-modules.
△ Less
Submitted 18 May, 2023;
originally announced May 2023.
-
One-loop formulas for off-shell decay $H^* \rightarrow W^+W^-$ in 't Hooft-Veltman gauge and its applications
Authors:
Khiem Hong Phan,
Dzung Tri Tran,
Anh Thu Nguyen
Abstract:
We present analytic results for one-loop radiative corrections to off-shell decay $H^* \rightarrow W^+W^-$ in 't Hooft-Veltman gauge within Standard Model framework. In numerical results, we show off-shell decay rate and its corrections with varying off-shell Higgs mass. The results show that the corrections are of $10\%$ contributions to total decay rates. Furthermore, we study the impacts of one…
▽ More
We present analytic results for one-loop radiative corrections to off-shell decay $H^* \rightarrow W^+W^-$ in 't Hooft-Veltman gauge within Standard Model framework. In numerical results, we show off-shell decay rate and its corrections with varying off-shell Higgs mass. The results show that the corrections are of $10\%$ contributions to total decay rates. Furthermore, we study the impacts of one-loop radiative corrections to off-shell decay $H^* \rightarrow W^+W^-$ in Higgs processes at future colliders. The signal processes such as $e^-e^+\rightarrow ZH^*\rightarrow Z(WW)$ with including the initial beam polarizations and $e^-e^+\rightarrow ν_e\barν_e H^* \rightarrow ν_e\barν_e (WW)$ and $e^-γ\rightarrow e^-H^* \rightarrow e^-WW$ are examined. We find that the effects are visible impacts and these should be taken into account at future colliders.
△ Less
Submitted 6 May, 2023;
originally announced May 2023.
-
Optimal Detector Placement in Networked Control Systems under Cyber-attacks with Applications to Power Networks
Authors:
Anh Tung Nguyen,
Sribalaji C. Anand,
André M. H. Teixeira,
Alexander Medvedev
Abstract:
This paper proposes a game-theoretic method to address the problem of optimal detector placement in a networked control system under cyber-attacks. The networked control system is composed of interconnected agents where each agent is regulated by its local controller over unprotected communication, which leaves the system vulnerable to malicious cyber-attacks. To guarantee a given local performanc…
▽ More
This paper proposes a game-theoretic method to address the problem of optimal detector placement in a networked control system under cyber-attacks. The networked control system is composed of interconnected agents where each agent is regulated by its local controller over unprotected communication, which leaves the system vulnerable to malicious cyber-attacks. To guarantee a given local performance, the defender optimally selects a single agent on which to place a detector at its local controller with the purpose of detecting cyber-attacks. On the other hand, an adversary optimally chooses a single agent on which to conduct a cyber-attack on its input with the aim of maximally worsening the local performance while remaining stealthy to the defender. First, we present a necessary and sufficient condition to ensure that the maximal attack impact on the local performance is bounded, which restricts the possible actions of the defender to a subset of available agents. Then, by considering the maximal attack impact on the local performance as a game payoff, we cast the problem of finding optimal actions of the defender and the adversary as a zero-sum game. Finally, with the possible action sets of the defender and the adversary, an algorithm is devoted to determining the Nash equilibria of the zero-sum game that yield the optimal detector placement. The proposed method is illustrated on an IEEE benchmark for power systems.
△ Less
Submitted 12 April, 2023;
originally announced April 2023.
-
Secure State Estimation with Asynchronous Measurements against Malicious Measurement-data and Time-stamp Manipulation
Authors:
Zishuo Li,
Anh Tung Nguyen,
André Teixeira,
Yilin Mo,
Karl H. Johansson
Abstract:
This paper proposes a secure state estimation scheme with non-periodic asynchronous measurements for linear continuous-time systems under false data attacks on the measurement transmit channel. After sampling the output of the system, a sensor transmits the measurement information in a triple composed of sensor index, time-stamp, and measurement value to the fusion center via vulnerable communicat…
▽ More
This paper proposes a secure state estimation scheme with non-periodic asynchronous measurements for linear continuous-time systems under false data attacks on the measurement transmit channel. After sampling the output of the system, a sensor transmits the measurement information in a triple composed of sensor index, time-stamp, and measurement value to the fusion center via vulnerable communication channels. The malicious attacker can corrupt a subset of the sensors through (i) manipulating the time-stamp and measurement value; (ii) blocking transmitted measurement triples; or (iii) injecting fake measurement triples. To deal with such attacks, we propose the design of local estimators based on observability space decomposition, where each local estimator updates the local state and sends it to the fusion center after sampling a measurement. Whenever there is a local update, the fusion center combines all the local states and generates a secure state estimate by adopting the median operator. We prove that local estimators of benign sensors are unbiased with stable covariance. Moreover, the fused central estimation error has bounded expectation and covariance against at most $p$ corrupted sensors as long as the system is $2p$-sparse observable. The efficacy of the proposed scheme is demonstrated through an application on a benchmark example of the IEEE 14-bus system.
△ Less
Submitted 30 March, 2023;
originally announced March 2023.
-
Factors influencing to use of Bluezone
Authors:
Vinh T. Nguyen,
Anh T. Nguyen,
Tan H. Nguyen,
Dinh K. Luong
Abstract:
This study aims to understand the main factors and their influence on the behavioral intention of users about using Bluezone. Surveys are sent to users through the Google Form tool. Experimental results through analysis of exploratory factors on 224 survey subjects show that there are 4 main factors affecting user behavior. Structural equation modeling indicates that trust, performance expectation…
▽ More
This study aims to understand the main factors and their influence on the behavioral intention of users about using Bluezone. Surveys are sent to users through the Google Form tool. Experimental results through analysis of exploratory factors on 224 survey subjects show that there are 4 main factors affecting user behavior. Structural equation modeling indicates that trust, performance expectations, effort expectations, and social influence have a positive impact on behavioral intention of using Bluezone
△ Less
Submitted 24 January, 2023;
originally announced January 2023.
-
A Zero-Sum Game Framework for Optimal Sensor Placement in Uncertain Networked Control Systems under Cyber-Attacks
Authors:
Anh Tung Nguyen,
Sribalaji C. Anand,
André M. H. Teixeira
Abstract:
This paper proposes a game-theoretic approach to address the problem of optimal sensor placement against an adversary in uncertain networked control systems. The problem is formulated as a zero-sum game with two players, namely a malicious adversary and a detector. Given a protected performance vertex, we consider a detector, with uncertain system knowledge, that selects another vertex on which to…
▽ More
This paper proposes a game-theoretic approach to address the problem of optimal sensor placement against an adversary in uncertain networked control systems. The problem is formulated as a zero-sum game with two players, namely a malicious adversary and a detector. Given a protected performance vertex, we consider a detector, with uncertain system knowledge, that selects another vertex on which to place a sensor and monitors its output with the aim of detecting the presence of the adversary. On the other hand, the adversary, also with uncertain system knowledge, chooses a single vertex and conducts a cyber-attack on its input. The purpose of the adversary is to drive the attack vertex as to maximally disrupt the protected performance vertex while remaining undetected by the detector. As our first contribution, the game payoff of the above-defined zero-sum game is formulated in terms of the Value-at-Risk of the adversary's impact. However, this game payoff corresponds to an intractable optimization problem. To tackle the problem, we adopt the scenario approach to approximately compute the game payoff. Then, the optimal monitor selection is determined by analyzing the equilibrium of the zero-sum game. The proposed approach is illustrated via a numerical example of a 10-vertex networked control system.
△ Less
Submitted 8 October, 2022;
originally announced October 2022.
-
One-loop calculations for $H\rightarrow f\bar{f}γ$ in the $U(1)_{B-L}$ extension for Standard Model
Authors:
Khiem Hong Phan,
Anh Thu Nguyen,
Dzung Tri Tran
Abstract:
In this paper, we present the calculations for $H\rightarrow f\bar{f}γ$ in the $U(1)_{B-L}$ extension for Standard Model. Analytic results for one-loop form factors in the decay process are expressed in terms of the scalar one-loop Passarino$-$Veltman functions in the conventions of {\tt LoopTools}. Therefore, the decay rates can be evaluated numerically by using this package. In phenomenological…
▽ More
In this paper, we present the calculations for $H\rightarrow f\bar{f}γ$ in the $U(1)_{B-L}$ extension for Standard Model. Analytic results for one-loop form factors in the decay process are expressed in terms of the scalar one-loop Passarino$-$Veltman functions in the conventions of {\tt LoopTools}. Therefore, the decay rates can be evaluated numerically by using this package. In phenomenological results, we show the differential decay rates with respect to invariant mass of fermion pair $m_{ff}$, new neutral gauge mass $M_{Z'}$ and the coupling $g'$ of $U(1)_{B-L}$ gauge group. We find that the contributions of the $U(1)_{B-L}$ extension for Standard Model are visible effects and they must be taken into account at future colliders.
△ Less
Submitted 27 September, 2022;
originally announced September 2022.
-
One-loop on-shell and off-shell decay $H^*\rightarrow VV$ at future $e^-e^-$ collider
Authors:
Anh Thu Nguyen,
Dzung Tri Tran,
Khiem Hong Phan
Abstract:
One-loop on-shell and off-shell decays $H\rightarrow VV$ with $VV=γγ, Zγ, ZZ$ are presented in this paper. The effects of one-loop on-shell and off-shell Higgs decays in Higgs productions at $e^-e^-$ collisions are also then examined. We find that the impacts of one-loop Higgs decays are significant and they are must be taken into account at $e^-e^-$ collision.
One-loop on-shell and off-shell decays $H\rightarrow VV$ with $VV=γγ, Zγ, ZZ$ are presented in this paper. The effects of one-loop on-shell and off-shell Higgs decays in Higgs productions at $e^-e^-$ collisions are also then examined. We find that the impacts of one-loop Higgs decays are significant and they are must be taken into account at $e^-e^-$ collision.
△ Less
Submitted 27 September, 2022; v1 submitted 27 September, 2022;
originally announced September 2022.
-
One-loop off-shell decay $H^* \rightarrow ZZ$ at future colliders
Authors:
Khiem Hong Phan,
Dzung Tri Tran,
Anh Thu Nguyen
Abstract:
We present one-loop formulas for contributing to the $HZZ$ vertex in 't Hooft-Veltman gauge within Standard Model framework. One-loop off-shell Higgs decay rates to $Z$-pair are investigated in both unpolarized and longitudinal polarization for $Z$ bosons in final state. The corrections are range of $7\%$ to $8.4\%$ when we vary the off-shell Higgs mass from $200$ GeV to $500$ GeV. In applications…
▽ More
We present one-loop formulas for contributing to the $HZZ$ vertex in 't Hooft-Veltman gauge within Standard Model framework. One-loop off-shell Higgs decay rates to $Z$-pair are investigated in both unpolarized and longitudinal polarization for $Z$ bosons in final state. The corrections are range of $7\%$ to $8.4\%$ when we vary the off-shell Higgs mass from $200$ GeV to $500$ GeV. In applications, we study off-shell Higgs decay $H^* \rightarrow ZZ$ in the Higgs productions at future colliders such as the signal processes $γ^*(Q^2)γ\rightarrow H^* \rightarrow ZZ$ and $e^-γ\rightarrow e^-H^* \rightarrow e^- ZZ$ are analyzed.
△ Less
Submitted 6 May, 2023; v1 submitted 26 September, 2022;
originally announced September 2022.
-
Effect of Co Substitution on Ferrimagnetic Heusler compound Mn3Ga
Authors:
Quynh Anh T. Nguyen,
Thi H. Ho,
Myung-Hwa Jung,
Sonny H. Rhim
Abstract:
Effect of Co substitution on Mn$_3$Ga is investigated using first-principles study for structural and magnetic properties. Without Co, ferrimagnetic Heusler compound Mn3Ga is in tetragonal phase. With Co substitution, depending on Co concentration (x) Mn$_3$Ga prefers tetragonal (cubic) phase when x \leq 0.5 (x \geq 0.5). Ferrimagnetism is robust regardless of x in both phases. While magnetic mome…
▽ More
Effect of Co substitution on Mn$_3$Ga is investigated using first-principles study for structural and magnetic properties. Without Co, ferrimagnetic Heusler compound Mn3Ga is in tetragonal phase. With Co substitution, depending on Co concentration (x) Mn$_3$Ga prefers tetragonal (cubic) phase when x \leq 0.5 (x \geq 0.5). Ferrimagnetism is robust regardless of x in both phases. While magnetic moments of two Mn do not vary significantly with x, Co magnetic moment in two phases exhibit different behaviors, leading to distinct features in total magnetic moment (M_{tot}). When x \leq 0.5, in tetragonal phase, Co magnetic moment is vanishingly small, resulting in a decrease of M_{tot} with x. In contrast, when x \geq 0.5, in cubic phase, Co magnetic moment is roughly 1$μ_B$, which is responsible for an increase of Mtot. Electronic structure is analyzed with partial density of states for various x. To elucidate the counterintuitively small Co moment, the magnetic exchange interaction is investigated where exchange coefficient between Co and Mn is much smaller in x \leq 0.5 case than x \geq 0.5 one.
△ Less
Submitted 21 September, 2022;
originally announced September 2022.
-
Improving Out-of-Distribution Detection via Epistemic Uncertainty Adversarial Training
Authors:
Derek Everett,
Andre T. Nguyen,
Luke E. Richards,
Edward Raff
Abstract:
The quantification of uncertainty is important for the adoption of machine learning, especially to reject out-of-distribution (OOD) data back to human experts for review. Yet progress has been slow, as a balance must be struck between computational efficiency and the quality of uncertainty estimates. For this reason many use deep ensembles of neural networks or Monte Carlo dropout for reasonable u…
▽ More
The quantification of uncertainty is important for the adoption of machine learning, especially to reject out-of-distribution (OOD) data back to human experts for review. Yet progress has been slow, as a balance must be struck between computational efficiency and the quality of uncertainty estimates. For this reason many use deep ensembles of neural networks or Monte Carlo dropout for reasonable uncertainty estimates at relatively minimal compute and memory. Surprisingly, when we focus on the real-world applicable constraint of $\leq 1\%$ false positive rate (FPR), prior methods fail to reliably detect OOD samples as such. Notably, even Gaussian random noise fails to trigger these popular OOD techniques. We help to alleviate this problem by devising a simple adversarial training scheme that incorporates an attack of the epistemic uncertainty predicted by the dropout ensemble. We demonstrate this method improves OOD detection performance on standard data (i.e., not adversarially crafted), and improves the standardized partial AUC from near-random guessing performance to $\geq 0.75$.
△ Less
Submitted 9 September, 2022; v1 submitted 5 September, 2022;
originally announced September 2022.
-
Detecting COVID-19 from digitized ECG printouts using 1D convolutional neural networks
Authors:
Thao Nguyen,
Hieu H. Pham,
Huy Khiem Le,
Anh Tu Nguyen,
Ngoc Tien Thanh,
Cuong Do
Abstract:
The COVID-19 pandemic has exposed the vulnerability of healthcare services worldwide, raising the need to develop novel tools to provide rapid and cost-effective screening and diagnosis. Clinical reports indicated that COVID-19 infection may cause cardiac injury, and electrocardiograms (ECG) may serve as a diagnostic biomarker for COVID-19. This study aims to utilize ECG signals to detect COVID-19…
▽ More
The COVID-19 pandemic has exposed the vulnerability of healthcare services worldwide, raising the need to develop novel tools to provide rapid and cost-effective screening and diagnosis. Clinical reports indicated that COVID-19 infection may cause cardiac injury, and electrocardiograms (ECG) may serve as a diagnostic biomarker for COVID-19. This study aims to utilize ECG signals to detect COVID-19 automatically. We propose a novel method to extract ECG signals from ECG paper records, which are then fed into a one-dimensional convolution neural network (1D-CNN) to learn and diagnose the disease. To evaluate the quality of digitized signals, R peaks in the paper-based ECG images are labeled. Afterward, RR intervals calculated from each image are compared to RR intervals of the corresponding digitized signal. Experiments on the COVID-19 ECG images dataset demonstrate that the proposed digitization method is able to capture correctly the original signals, with a mean absolute error of 28.11 ms. Our proposed 1D-CNN model, which is trained on the digitized ECG signals, allows identifying individuals with COVID-19 and other subjects accurately, with classification accuracies of 98.42%, 95.63%, and 98.50% for classifying COVID-19 vs. Normal, COVID-19 vs. Abnormal Heartbeats, and COVID-19 vs. other classes, respectively. Furthermore, the proposed method also achieves a high-level of performance for the multi-classification task. Our findings indicate that a deep learning system trained on digitized ECG signals can serve as a potential tool for diagnosing COVID-19.
△ Less
Submitted 5 October, 2022; v1 submitted 10 August, 2022;
originally announced August 2022.
-
Vietnamese Hate and Offensive Detection using PhoBERT-CNN and Social Media Streaming Data
Authors:
Khanh Q. Tran,
An T. Nguyen,
Phu Gia Hoang,
Canh Duc Luu,
Trong-Hop Do,
Kiet Van Nguyen
Abstract:
Society needs to develop a system to detect hate and offense to build a healthy and safe environment. However, current research in this field still faces four major shortcomings, including deficient pre-processing techniques, indifference to data imbalance issues, modest performance models, and lacking practical applications. This paper focused on developing an intelligent system capable of addres…
▽ More
Society needs to develop a system to detect hate and offense to build a healthy and safe environment. However, current research in this field still faces four major shortcomings, including deficient pre-processing techniques, indifference to data imbalance issues, modest performance models, and lacking practical applications. This paper focused on developing an intelligent system capable of addressing these shortcomings. Firstly, we proposed an efficient pre-processing technique to clean comments collected from Vietnamese social media. Secondly, a novel hate speech detection (HSD) model, which is the combination of a pre-trained PhoBERT model and a Text-CNN model, was proposed for solving tasks in Vietnamese. Thirdly, EDA techniques are applied to deal with imbalanced data to improve the performance of classification models. Besides, various experiments were conducted as baselines to compare and investigate the proposed model's performance against state-of-the-art methods. The experiment results show that the proposed PhoBERT-CNN model outperforms SOTA methods and achieves an F1-score of 67,46% and 98,45% on two benchmark datasets, ViHSD and HSD-VLSP, respectively. Finally, we also built a streaming HSD application to demonstrate the practicality of our proposed system.
△ Less
Submitted 1 June, 2022;
originally announced June 2022.
-
A Single-Adversary-Single-Detector Zero-Sum Game in Networked Control Systems
Authors:
Anh Tung Nguyen,
André M. H. Teixeira,
Alexander Medvedev
Abstract:
This paper proposes a game-theoretic approach to address the problem of optimal sensor placement for detecting cyber-attacks in networked control systems. The problem is formulated as a zero-sum game with two players, namely a malicious adversary and a detector. Given a protected target vertex, the detector places a sensor at a single vertex to monitor the system and detect the presence of the adv…
▽ More
This paper proposes a game-theoretic approach to address the problem of optimal sensor placement for detecting cyber-attacks in networked control systems. The problem is formulated as a zero-sum game with two players, namely a malicious adversary and a detector. Given a protected target vertex, the detector places a sensor at a single vertex to monitor the system and detect the presence of the adversary. On the other hand, the adversary selects a single vertex through which to conduct a cyber-attack that maximally disrupts the target vertex while remaining undetected by the detector. As our first contribution, for a given pair of attack and monitor vertices and a known target vertex, the game payoff function is defined as the output-to-output gain of the respective system. Then, the paper characterizes the set of feasible actions by the detector that ensures bounded values of the game payoff. Finally, an algebraic sufficient condition is proposed to examine whether a given vertex belongs to the set of feasible monitor vertices. The optimal sensor placement is then determined by computing the mixed-strategy Nash equilibrium of the zero-sum game through linear programming. The approach is illustrated via a numerical example of a 10-vertex networked control system with a given target vertex.
△ Less
Submitted 27 May, 2022;
originally announced May 2022.
-
Big Tech Companies Impact on Research at the Faculty of Information Technology and Electrical Engineering
Authors:
Ahmad Hassanpour,
An Thi Nguyen,
Anshul Rani,
Sarang Shaikh,
Ying Xu,
Haoyu Zhang
Abstract:
Artificial intelligence is gaining momentum, ongoing pandemic is fuel to that with more opportunities in every sector specially in health and education sector. But with the growth in technology, challenges associated with ethics also grow (Katharine Schwab, 2021). Whenever a new AI product is developed, companies publicize that their systems are transparent, fair, and are in accordance with the ex…
▽ More
Artificial intelligence is gaining momentum, ongoing pandemic is fuel to that with more opportunities in every sector specially in health and education sector. But with the growth in technology, challenges associated with ethics also grow (Katharine Schwab, 2021). Whenever a new AI product is developed, companies publicize that their systems are transparent, fair, and are in accordance with the existing laws and regulations as the methods and procedures followed by a big tech company for ensuring AI ethics, not only affect the trust and perception of public, but it also challenges the capabilities of the companies towards business strategies in different regions, and the kind of brains it can attract for their projects. AI Big Tech companies have influence over AI ethics as many influencing ethical-AI researchers have roots in Big Tech or its associated labs.
△ Less
Submitted 10 April, 2022;
originally announced May 2022.
-
Artificial Intelligence Enables Real-Time and Intuitive Control of Prostheses via Nerve Interface
Authors:
Diu Khue Luu,
Anh Tuan Nguyen,
Ming Jiang,
Markus W. Drealan,
Jian Xu,
Tong Wu,
Wing-kin Tam,
Wenfeng Zhao,
Brian Z. H. Lim,
Cynthia K. Overstreet,
Qi Zhao,
Jonathan Cheng,
Edward W. Keefer,
Zhi Yang
Abstract:
Objective: The next generation prosthetic hand that moves and feels like a real hand requires a robust neural interconnection between the human minds and machines. Methods: Here we present a neuroprosthetic system to demonstrate that principle by employing an artificial intelligence (AI) agent to translate the amputee's movement intent through a peripheral nerve interface. The AI agent is designed…
▽ More
Objective: The next generation prosthetic hand that moves and feels like a real hand requires a robust neural interconnection between the human minds and machines. Methods: Here we present a neuroprosthetic system to demonstrate that principle by employing an artificial intelligence (AI) agent to translate the amputee's movement intent through a peripheral nerve interface. The AI agent is designed based on the recurrent neural network (RNN) and could simultaneously decode six degree-of-freedom (DOF) from multichannel nerve data in real-time. The decoder's performance is characterized in motor decoding experiments with three human amputees. Results: First, we show the AI agent enables amputees to intuitively control a prosthetic hand with individual finger and wrist movements up to 97-98% accuracy. Second, we demonstrate the AI agent's real-time performance by measuring the reaction time and information throughput in a hand gesture matching task. Third, we investigate the AI agent's long-term uses and show the decoder's robust predictive performance over a 16-month implant duration. Conclusion & significance: Our study demonstrates the potential of AI-enabled nerve technology, underling the next generation of dexterous and intuitive prosthetic hands.
△ Less
Submitted 16 March, 2022;
originally announced March 2022.
-
Task-Agnostic Robust Representation Learning
Authors:
A. Tuan Nguyen,
Ser Nam Lim,
Philip Torr
Abstract:
It has been reported that deep learning models are extremely vulnerable to small but intentionally chosen perturbations of its input. In particular, a deep network, despite its near-optimal accuracy on the clean images, often mis-classifies an image with a worst-case but humanly imperceptible perturbation (so-called adversarial examples). To tackle this problem, a great amount of research has been…
▽ More
It has been reported that deep learning models are extremely vulnerable to small but intentionally chosen perturbations of its input. In particular, a deep network, despite its near-optimal accuracy on the clean images, often mis-classifies an image with a worst-case but humanly imperceptible perturbation (so-called adversarial examples). To tackle this problem, a great amount of research has been done to study the training procedure of a network to improve its robustness. However, most of the research so far has focused on the case of supervised learning. With the increasing popularity of self-supervised learning methods, it is also important to study and improve the robustness of their resulting representation on the downstream tasks. In this paper, we study the problem of robust representation learning with unlabeled data in a task-agnostic manner. Specifically, we first derive an upper bound on the adversarial loss of a prediction model (which is based on the learned representation) on any downstream task, using its loss on the clean data and a robustness regularizer. Moreover, the regularizer is task-independent, thus we propose to minimize it directly during the representation learning phase to make the downstream prediction model more robust. Extensive experiments show that our method achieves preferable adversarial performance compared to relevant baselines.
△ Less
Submitted 14 March, 2022;
originally announced March 2022.
-
Out of Distribution Data Detection Using Dropout Bayesian Neural Networks
Authors:
Andre T. Nguyen,
Fred Lu,
Gary Lopez Munoz,
Edward Raff,
Charles Nicholas,
James Holt
Abstract:
We explore the utility of information contained within a dropout based Bayesian neural network (BNN) for the task of detecting out of distribution (OOD) data. We first show how previous attempts to leverage the randomized embeddings induced by the intermediate layers of a dropout BNN can fail due to the distance metric used. We introduce an alternative approach to measuring embedding uncertainty,…
▽ More
We explore the utility of information contained within a dropout based Bayesian neural network (BNN) for the task of detecting out of distribution (OOD) data. We first show how previous attempts to leverage the randomized embeddings induced by the intermediate layers of a dropout BNN can fail due to the distance metric used. We introduce an alternative approach to measuring embedding uncertainty, justify its use theoretically, and demonstrate how incorporating embedding uncertainty improves OOD data identification across three tasks: image classification, language classification, and malware detection.
△ Less
Submitted 17 February, 2022;
originally announced February 2022.
-
Offline Neural Contextual Bandits: Pessimism, Optimization and Generalization
Authors:
Thanh Nguyen-Tang,
Sunil Gupta,
A. Tuan Nguyen,
Svetha Venkatesh
Abstract:
Offline policy learning (OPL) leverages existing data collected a priori for policy optimization without any active exploration. Despite the prevalence and recent interest in this problem, its theoretical and algorithmic foundations in function approximation settings remain under-developed. In this paper, we consider this problem on the axes of distributional shift, optimization, and generalizatio…
▽ More
Offline policy learning (OPL) leverages existing data collected a priori for policy optimization without any active exploration. Despite the prevalence and recent interest in this problem, its theoretical and algorithmic foundations in function approximation settings remain under-developed. In this paper, we consider this problem on the axes of distributional shift, optimization, and generalization in offline contextual bandits with neural networks. In particular, we propose a provably efficient offline contextual bandit with neural network function approximation that does not require any functional assumption on the reward. We show that our method provably generalizes over unseen contexts under a milder condition for distributional shift than the existing OPL works. Notably, unlike any other OPL method, our method learns from the offline data in an online manner using stochastic gradient descent, allowing us to leverage the benefits of online learning into an offline setting. Moreover, we show that our method is more computationally efficient and has a better dependence on the effective dimension of the neural network than an online counterpart. Finally, we demonstrate the empirical effectiveness of our method in a range of synthetic and real-world OPL problems.
△ Less
Submitted 13 March, 2022; v1 submitted 26 November, 2021;
originally announced November 2021.
-
Leveraging Uncertainty for Improved Static Malware Detection Under Extreme False Positive Constraints
Authors:
Andre T. Nguyen,
Edward Raff,
Charles Nicholas,
James Holt
Abstract:
The detection of malware is a critical task for the protection of computing environments. This task often requires extremely low false positive rates (FPR) of 0.01% or even lower, for which modern machine learning has no readily available tools. We introduce the first broad investigation of the use of uncertainty for malware detection across multiple datasets, models, and feature types. We show ho…
▽ More
The detection of malware is a critical task for the protection of computing environments. This task often requires extremely low false positive rates (FPR) of 0.01% or even lower, for which modern machine learning has no readily available tools. We introduce the first broad investigation of the use of uncertainty for malware detection across multiple datasets, models, and feature types. We show how ensembling and Bayesian treatments of machine learning methods for static malware detection allow for improved identification of model errors, uncovering of new malware families, and predictive performance under extreme false positive constraints. In particular, we improve the true positive rate (TPR) at an actual realized FPR of 1e-5 from an expected 0.69 for previous methods to 0.80 on the best performing model class on the Sophos industry scale dataset. We additionally demonstrate how previous works have used an evaluation protocol that can lead to misleading results.
△ Less
Submitted 9 August, 2021;
originally announced August 2021.
-
Collision-free Formation Control of Multiple Nano-quadrotors
Authors:
Anh Tung Nguyen,
Ji-Won Lee,
Thanh Binh Nguyen,
Sung Kyung Hong
Abstract:
The utilisation of unmanned aerial vehicles has witnessed significant growth in real-world applications including surveillance tasks, military missions, and transportation deliveries. This letter investigates practical problems of formation control for multiple nano-quadrotor systems. To be more specific, the first aim of this work is to develop a theoretical framework for the time-varying formati…
▽ More
The utilisation of unmanned aerial vehicles has witnessed significant growth in real-world applications including surveillance tasks, military missions, and transportation deliveries. This letter investigates practical problems of formation control for multiple nano-quadrotor systems. To be more specific, the first aim of this work is to develop a theoretical framework for the time-varying formation flight of the multi-quadrotor system regarding anti-collisions. In order to achieve this goal, the finite cut-off potential function is devoted to avoiding collisions among vehicles in the group as well as between vehicles and an obstacle. The control algorithm navigates the group of nano-quadrotors to asymptotically reach an anticipated time-varying formation. The second aim is to implement the proposed algorithm on Crazyflies nanoquadrotors, one of the most ubiquitous indoor experimentation platforms. Several practical scenarios are conducted to tendentiously expose anti-collision abilities among group members as well as between vehicles and an obstacle. The experimental outcomes validate the effectiveness of the proposed method in the formation tracking and the collision avoidance of multiple nano-quadrotors.
△ Less
Submitted 28 July, 2021;
originally announced July 2021.
-
On the initial value problem for a class of nonlinear biharmonic equation with time-fractional derivative
Authors:
Anh Tuan Nguyen,
Tomás Caraballo,
Nguyen Huy Tuan
Abstract:
In this work, we investigate the IVP for a time-fractional fourth-order equation with nonlinear source terms. More specifically, we consider the time-fractional biharmonic with exponential nonlinearity and the time-fractional Cahn-Hilliard equation. By using the Fourier transform concept, the generalized formula for the mild solution as well as the smoothing effects of resolvent operators are prov…
▽ More
In this work, we investigate the IVP for a time-fractional fourth-order equation with nonlinear source terms. More specifically, we consider the time-fractional biharmonic with exponential nonlinearity and the time-fractional Cahn-Hilliard equation. By using the Fourier transform concept, the generalized formula for the mild solution as well as the smoothing effects of resolvent operators are proved. For the IVP associated with the first one, by using the Orlicz space with the function $ Ξ(z)=e^{|z|^p}-1$ and some embeddings between it and the usual Lebesgue spaces, we prove that the solution is a global-in-time solution or it shall blow up in a finite time if the initial value is regular. In the case of singular initial data, the local-in-time/global-in-time existence and uniqueness are derived. Also, the regularity of the mild solution is investigated. For the IVP associated with the second one, some modifications to the generalized formula are made to deal with the nonlinear term. We also establish some important estimates for the derivatives of resolvent operators, they are the basis for using the Picard sequence to prove the local-in-time existence of the solution.
△ Less
Submitted 28 July, 2021;
originally announced July 2021.
-
KL Guided Domain Adaptation
Authors:
A. Tuan Nguyen,
Toan Tran,
Yarin Gal,
Philip H. S. Torr,
Atılım Güneş Baydin
Abstract:
Domain adaptation is an important problem and often needed for real-world applications. In this problem, instead of i.i.d. training and testing datapoints, we assume that the source (training) data and the target (testing) data have different distributions. With that setting, the empirical risk minimization training procedure often does not perform well, since it does not account for the change in…
▽ More
Domain adaptation is an important problem and often needed for real-world applications. In this problem, instead of i.i.d. training and testing datapoints, we assume that the source (training) data and the target (testing) data have different distributions. With that setting, the empirical risk minimization training procedure often does not perform well, since it does not account for the change in the distribution. A common approach in the domain adaptation literature is to learn a representation of the input that has the same (marginal) distribution over the source and the target domain. However, these approaches often require additional networks and/or optimizing an adversarial (minimax) objective, which can be very expensive or unstable in practice. To improve upon these marginal alignment techniques, in this paper, we first derive a generalization bound for the target loss based on the training loss and the reverse Kullback-Leibler (KL) divergence between the source and the target representation distributions. Based on this bound, we derive an algorithm that minimizes the KL term to obtain a better generalization to the target domain. We show that with a probabilistic representation network, the KL term can be estimated efficiently via minibatch samples without any additional network or a minimax objective. This leads to a theoretically sound alignment method which is also very efficient and stable in practice. Experimental results also suggest that our method outperforms other representation-alignment approaches.
△ Less
Submitted 14 March, 2022; v1 submitted 14 June, 2021;
originally announced June 2021.
-
A Portable, Self-Contained Neuroprosthetic Hand with Deep Learning-Based Finger Control
Authors:
Anh Tuan Nguyen,
Markus W. Drealan,
Diu Khue Luu,
Ming Jiang,
Jian Xu,
Jonathan Cheng,
Qi Zhao,
Edward W. Keefer,
Zhi Yang
Abstract:
Objective: Deep learning-based neural decoders have emerged as the prominent approach to enable dexterous and intuitive control of neuroprosthetic hands. Yet few studies have materialized the use of deep learning in clinical settings due to its high computational requirements. Methods: Recent advancements of edge computing devices bring the potential to alleviate this problem. Here we present the…
▽ More
Objective: Deep learning-based neural decoders have emerged as the prominent approach to enable dexterous and intuitive control of neuroprosthetic hands. Yet few studies have materialized the use of deep learning in clinical settings due to its high computational requirements. Methods: Recent advancements of edge computing devices bring the potential to alleviate this problem. Here we present the implementation of a neuroprosthetic hand with embedded deep learning-based control. The neural decoder is designed based on the recurrent neural network (RNN) architecture and deployed on the NVIDIA Jetson Nano - a compacted yet powerful edge computing platform for deep learning inference. This enables the implementation of the neuroprosthetic hand as a portable and self-contained unit with real-time control of individual finger movements. Results: The proposed system is evaluated on a transradial amputee using peripheral nerve signals (ENG) with implanted intrafascicular microelectrodes. The experiment results demonstrate the system's capabilities of providing robust, high-accuracy (95-99%) and low-latency (50-120 msec) control of individual finger movements in various laboratory and real-world environments. Conclusion: Modern edge computing platforms enable the effective use of deep learning-based neural decoders for neuroprosthesis control as an autonomous system. Significance: This work helps pioneer the deployment of deep neural networks in clinical applications underlying a new class of wearable biomedical devices with embedded artificial intelligence.
△ Less
Submitted 24 March, 2021;
originally announced March 2021.
-
Domain Invariant Representation Learning with Domain Density Transformations
Authors:
A. Tuan Nguyen,
Toan Tran,
Yarin Gal,
Atılım Güneş Baydin
Abstract:
Domain generalization refers to the problem where we aim to train a model on data from a set of source domains so that the model can generalize to unseen target domains. Naively training a model on the aggregate set of data (pooled from all source domains) has been shown to perform suboptimally, since the information learned by that model might be domain-specific and generalize imperfectly to targ…
▽ More
Domain generalization refers to the problem where we aim to train a model on data from a set of source domains so that the model can generalize to unseen target domains. Naively training a model on the aggregate set of data (pooled from all source domains) has been shown to perform suboptimally, since the information learned by that model might be domain-specific and generalize imperfectly to target domains. To tackle this problem, a predominant approach is to find and learn some domain-invariant information in order to use it for the prediction task. In this paper, we propose a theoretically grounded method to learn a domain-invariant representation by enforcing the representation network to be invariant under all transformation functions among domains. We also show how to use generative adversarial networks to learn such domain transformations to implement our method in practice. We demonstrate the effectiveness of our method on several widely used datasets for the domain generalization problem, on all of which we achieve competitive results with state-of-the-art models.
△ Less
Submitted 15 February, 2022; v1 submitted 9 February, 2021;
originally announced February 2021.
-
Improved algorithms for non-adaptive group testing with consecutive positives
Authors:
Thach V. Bui,
Mahdi Cheraghchi,
An T. H. Nguyen,
Thuc D. Nguyen
Abstract:
The goal of group testing is to efficiently identify a few specific items, called positives, in a large population of items via tests. A test is an action on a subset of items which returns positive if the subset contains at least one positive and negative otherwise. In non-adaptive group testing, all tests are fixed in advance and can be performed in parallel. In this work, we consider non-adapti…
▽ More
The goal of group testing is to efficiently identify a few specific items, called positives, in a large population of items via tests. A test is an action on a subset of items which returns positive if the subset contains at least one positive and negative otherwise. In non-adaptive group testing, all tests are fixed in advance and can be performed in parallel. In this work, we consider non-adaptive group testing with consecutive positives in which the items are linearly ordered and the positives are consecutive in that order.
We present two contributions here. The first is the direct use of a binary code to construct measurement matrices compared to the use of Gray code in the state-of-the-art work, which is a rearrangement of the binary code, when the maximum number of consecutive positives is known. This leads to a reduction in decoding time in practice. The second one is efficient designs to identify positives when the number of consecutive positives is known. To the best of our knowledge, this setting has not been surveyed yet. Our simulations verify the efficiency of our proposed designs. In particular, it only requires up to $300$ tests to identify up to $100$ positives in a set of $2^{32} \approx 4.3\mathrm{B}$ items in less than $300$ nanoseconds. When the maximum number of consecutive positives is known, the simulations validate the superiority of our proposed design in decoding compared to the state-of-the-art work. Moreover, when the number of consecutive positives is known, the number of tests and the decoding time are almost reduced half.
△ Less
Submitted 5 November, 2021; v1 submitted 27 January, 2021;
originally announced January 2021.
-
VinDr-CXR: An open dataset of chest X-rays with radiologist's annotations
Authors:
Ha Q. Nguyen,
Khanh Lam,
Linh T. Le,
Hieu H. Pham,
Dat Q. Tran,
Dung B. Nguyen,
Dung D. Le,
Chi M. Pham,
Hang T. T. Tong,
Diep H. Dinh,
Cuong D. Do,
Luu T. Doan,
Cuong N. Nguyen,
Binh T. Nguyen,
Que V. Nguyen,
Au D. Hoang,
Hien N. Phan,
Anh T. Nguyen,
Phuong H. Ho,
Dat T. Ngo,
Nghia T. Nguyen,
Nhan T. Nguyen,
Minh Dao,
Van Vu
Abstract:
Most of the existing chest X-ray datasets include labels from a list of findings without specifying their locations on the radiographs. This limits the development of machine learning algorithms for the detection and localization of chest abnormalities. In this work, we describe a dataset of more than 100,000 chest X-ray scans that were retrospectively collected from two major hospitals in Vietnam…
▽ More
Most of the existing chest X-ray datasets include labels from a list of findings without specifying their locations on the radiographs. This limits the development of machine learning algorithms for the detection and localization of chest abnormalities. In this work, we describe a dataset of more than 100,000 chest X-ray scans that were retrospectively collected from two major hospitals in Vietnam. Out of this raw data, we release 18,000 images that were manually annotated by a total of 17 experienced radiologists with 22 local labels of rectangles surrounding abnormalities and 6 global labels of suspected diseases. The released dataset is divided into a training set of 15,000 and a test set of 3,000. Each scan in the training set was independently labeled by 3 radiologists, while each scan in the test set was labeled by the consensus of 5 radiologists. We designed and built a labeling platform for DICOM images to facilitate these annotation procedures. All images are made publicly available (https://www.physionet.org/content/vindr-cxr/1.0.0/) in DICOM format along with the labels of both the training set and the test set.
△ Less
Submitted 20 March, 2022; v1 submitted 29 December, 2020;
originally announced December 2020.
-
A Pilot Study of Text-to-SQL Semantic Parsing for Vietnamese
Authors:
Anh Tuan Nguyen,
Mai Hoang Dao,
Dat Quoc Nguyen
Abstract:
Semantic parsing is an important NLP task. However, Vietnamese is a low-resource language in this research area. In this paper, we present the first public large-scale Text-to-SQL semantic parsing dataset for Vietnamese. We extend and evaluate two strong semantic parsing baselines EditSQL (Zhang et al., 2019) and IRNet (Guo et al., 2019) on our dataset. We compare the two baselines with key config…
▽ More
Semantic parsing is an important NLP task. However, Vietnamese is a low-resource language in this research area. In this paper, we present the first public large-scale Text-to-SQL semantic parsing dataset for Vietnamese. We extend and evaluate two strong semantic parsing baselines EditSQL (Zhang et al., 2019) and IRNet (Guo et al., 2019) on our dataset. We compare the two baselines with key configurations and find that: automatic Vietnamese word segmentation improves the parsing results of both baselines; the normalized pointwise mutual information (NPMI) score (Bouma, 2009) is useful for schema linking; latent syntactic features extracted from a neural dependency parser for Vietnamese also improve the results; and the monolingual language model PhoBERT for Vietnamese (Nguyen and Nguyen, 2020) helps produce higher performances than the recent best multilingual language model XLM-R (Conneau et al., 2020).
△ Less
Submitted 5 October, 2020;
originally announced October 2020.
-
Practical Cross-modal Manifold Alignment for Grounded Language
Authors:
Andre T. Nguyen,
Luke E. Richards,
Gaoussou Youssouf Kebe,
Edward Raff,
Kasra Darvish,
Frank Ferraro,
Cynthia Matuszek
Abstract:
We propose a cross-modality manifold alignment procedure that leverages triplet loss to jointly learn consistent, multi-modal embeddings of language-based concepts of real-world items. Our approach learns these embeddings by sampling triples of anchor, positive, and negative data points from RGB-depth images and their natural language descriptions. We show that our approach can benefit from, but d…
▽ More
We propose a cross-modality manifold alignment procedure that leverages triplet loss to jointly learn consistent, multi-modal embeddings of language-based concepts of real-world items. Our approach learns these embeddings by sampling triples of anchor, positive, and negative data points from RGB-depth images and their natural language descriptions. We show that our approach can benefit from, but does not require, post-processing steps such as Procrustes analysis, in contrast to some of our baselines which require it for reasonable performance. We demonstrate the effectiveness of our approach on two datasets commonly used to develop robotic-based grounded language learning systems, where our approach outperforms four baselines, including a state-of-the-art approach, across five evaluation metrics.
△ Less
Submitted 1 September, 2020;
originally announced September 2020.
-
TATL at W-NUT 2020 Task 2: A Transformer-based Baseline System for Identification of Informative COVID-19 English Tweets
Authors:
Anh Tuan Nguyen
Abstract:
As the COVID-19 outbreak continues to spread throughout the world, more and more information about the pandemic has been shared publicly on social media. For example, there are a huge number of COVID-19 English Tweets daily on Twitter. However, the majority of those Tweets are uninformative, and hence it is important to be able to automatically select only the informative ones for downstream appli…
▽ More
As the COVID-19 outbreak continues to spread throughout the world, more and more information about the pandemic has been shared publicly on social media. For example, there are a huge number of COVID-19 English Tweets daily on Twitter. However, the majority of those Tweets are uninformative, and hence it is important to be able to automatically select only the informative ones for downstream applications. In this short paper, we present our participation in the W-NUT 2020 Shared Task 2: Identification of Informative COVID-19 English Tweets. Inspired by the recent advances in pretrained Transformer language models, we propose a simple yet effective baseline for the task. Despite its simplicity, our proposed approach shows very competitive results in the leaderboard as we ranked 8 over 56 teams participated in total.
△ Less
Submitted 28 August, 2020;
originally announced August 2020.
-
An Early Warning Approach to Monitor COVID-19 Activity with Multiple Digital Traces in Near Real-Time
Authors:
Nicole E. Kogan,
Leonardo Clemente,
Parker Liautaud,
Justin Kaashoek,
Nicholas B. Link,
Andre T. Nguyen,
Fred S. Lu,
Peter Huybers,
Bernd Resch,
Clemens Havas,
Andreas Petutschnig,
Jessica Davis,
Matteo Chinazzi,
Backtosch Mustafa,
William P. Hanage,
Alessandro Vespignani,
Mauricio Santillana
Abstract:
Non-pharmaceutical interventions (NPIs) have been crucial in curbing COVID-19 in the United States (US). Consequently, relaxing NPIs through a phased re-opening of the US amid still-high levels of COVID-19 susceptibility could lead to new epidemic waves. This calls for a COVID-19 early warning system. Here we evaluate multiple digital data streams as early warning indicators of increasing or decre…
▽ More
Non-pharmaceutical interventions (NPIs) have been crucial in curbing COVID-19 in the United States (US). Consequently, relaxing NPIs through a phased re-opening of the US amid still-high levels of COVID-19 susceptibility could lead to new epidemic waves. This calls for a COVID-19 early warning system. Here we evaluate multiple digital data streams as early warning indicators of increasing or decreasing state-level US COVID-19 activity between January and June 2020. We estimate the timing of sharp changes in each data stream using a simple Bayesian model that calculates in near real-time the probability of exponential growth or decay. Analysis of COVID-19-related activity on social network microblogs, Internet searches, point-of-care medical software, and a metapopulation mechanistic model, as well as fever anomalies captured by smart thermometer networks, shows exponential growth roughly 2-3 weeks prior to comparable growth in confirmed COVID-19 cases and 3-4 weeks prior to comparable growth in COVID-19 deaths across the US over the last 6 months. We further observe exponential decay in confirmed cases and deaths 5-6 weeks after implementation of NPIs, as measured by anonymized and aggregated human mobility data from mobile phones. Finally, we propose a combined indicator for exponential growth in multiple data streams that may aid in developing an early warning system for future COVID-19 outbreaks. These efforts represent an initial exploratory framework, and both continued study of the predictive power of digital indicators as well as further development of the statistical approach are needed.
△ Less
Submitted 3 July, 2020; v1 submitted 1 July, 2020;
originally announced July 2020.
-
Set Based Stochastic Subsampling
Authors:
Bruno Andreis,
Seanie Lee,
A. Tuan Nguyen,
Juho Lee,
Eunho Yang,
Sung Ju Hwang
Abstract:
Deep models are designed to operate on huge volumes of high dimensional data such as images. In order to reduce the volume of data these models must process, we propose a set-based two-stage end-to-end neural subsampling model that is jointly optimized with an \textit{arbitrary} downstream task network (e.g. classifier). In the first stage, we efficiently subsample \textit{candidate elements} usin…
▽ More
Deep models are designed to operate on huge volumes of high dimensional data such as images. In order to reduce the volume of data these models must process, we propose a set-based two-stage end-to-end neural subsampling model that is jointly optimized with an \textit{arbitrary} downstream task network (e.g. classifier). In the first stage, we efficiently subsample \textit{candidate elements} using conditionally independent Bernoulli random variables by capturing coarse grained global information using set encoding functions, followed by conditionally dependent autoregressive subsampling of the candidate elements using Categorical random variables by modeling pair-wise interactions using set attention networks in the second stage. We apply our method to feature and instance selection and show that it outperforms the relevant baselines under low subsampling rates on a variety of tasks including image classification, image reconstruction, function reconstruction and few-shot classification. Additionally, for nonparametric models such as Neural Processes that require to leverage the whole training data at inference time, we show that our method enhances the scalability of these models.
△ Less
Submitted 30 May, 2022; v1 submitted 25 June, 2020;
originally announced June 2020.
-
Clinical Risk Prediction with Temporal Probabilistic Asymmetric Multi-Task Learning
Authors:
A. Tuan Nguyen,
Hyewon Jeong,
Eunho Yang,
Sung Ju Hwang
Abstract:
Although recent multi-task learning methods have shown to be effective in improving the generalization of deep neural networks, they should be used with caution for safety-critical applications, such as clinical risk prediction. This is because even if they achieve improved task-average performance, they may still yield degraded performance on individual tasks, which may be critical (e.g., predict…
▽ More
Although recent multi-task learning methods have shown to be effective in improving the generalization of deep neural networks, they should be used with caution for safety-critical applications, such as clinical risk prediction. This is because even if they achieve improved task-average performance, they may still yield degraded performance on individual tasks, which may be critical (e.g., prediction of mortality risk). Existing asymmetric multi-task learning methods tackle this negative transfer problem by performing knowledge transfer from tasks with low loss to tasks with high loss. However, using loss as a measure of reliability is risky since it could be a result of overfitting. In the case of time-series prediction tasks, knowledge learned for one task (e.g., predicting the sepsis onset) at a specific timestep may be useful for learning another task (e.g., prediction of mortality) at a later timestep, but lack of loss at each timestep makes it difficult to measure the reliability at each timestep. To capture such dynamically changing asymmetric relationships between tasks in time-series data, we propose a novel temporal asymmetric multi-task learning model that performs knowledge transfer from certain tasks/timesteps to relevant uncertain tasks, based on feature-level uncertainty. We validate our model on multiple clinical risk prediction tasks against various deep learning models for time-series prediction, which our model significantly outperforms, without any sign of negative transfer. Further qualitative analysis of learned knowledge graphs by clinicians shows that they are helpful in analyzing the predictions of the model. Our final code is available at https://github.com/anhtuan5696/TPAMTL.
△ Less
Submitted 18 February, 2021; v1 submitted 23 June, 2020;
originally announced June 2020.
-
BERTweet: A pre-trained language model for English Tweets
Authors:
Dat Quoc Nguyen,
Thanh Vu,
Anh Tuan Nguyen
Abstract:
We present BERTweet, the first public large-scale pre-trained language model for English Tweets. Our BERTweet, having the same architecture as BERT-base (Devlin et al., 2019), is trained using the RoBERTa pre-training procedure (Liu et al., 2019). Experiments show that BERTweet outperforms strong baselines RoBERTa-base and XLM-R-base (Conneau et al., 2020), producing better performance results tha…
▽ More
We present BERTweet, the first public large-scale pre-trained language model for English Tweets. Our BERTweet, having the same architecture as BERT-base (Devlin et al., 2019), is trained using the RoBERTa pre-training procedure (Liu et al., 2019). Experiments show that BERTweet outperforms strong baselines RoBERTa-base and XLM-R-base (Conneau et al., 2020), producing better performance results than the previous state-of-the-art models on three Tweet NLP tasks: Part-of-speech tagging, Named-entity recognition and text classification. We release BERTweet under the MIT License to facilitate future research and applications on Tweet data. Our BERTweet is available at https://github.com/VinAIResearch/BERTweet
△ Less
Submitted 5 October, 2020; v1 submitted 20 May, 2020;
originally announced May 2020.
-
PhoBERT: Pre-trained language models for Vietnamese
Authors:
Dat Quoc Nguyen,
Anh Tuan Nguyen
Abstract:
We present PhoBERT with two versions, PhoBERT-base and PhoBERT-large, the first public large-scale monolingual language models pre-trained for Vietnamese. Experimental results show that PhoBERT consistently outperforms the recent best pre-trained multilingual model XLM-R (Conneau et al., 2020) and improves the state-of-the-art in multiple Vietnamese-specific NLP tasks including Part-of-speech tagg…
▽ More
We present PhoBERT with two versions, PhoBERT-base and PhoBERT-large, the first public large-scale monolingual language models pre-trained for Vietnamese. Experimental results show that PhoBERT consistently outperforms the recent best pre-trained multilingual model XLM-R (Conneau et al., 2020) and improves the state-of-the-art in multiple Vietnamese-specific NLP tasks including Part-of-speech tagging, Dependency parsing, Named-entity recognition and Natural language inference. We release PhoBERT to facilitate future research and downstream applications for Vietnamese NLP. Our PhoBERT models are available at https://github.com/VinAIResearch/PhoBERT
△ Less
Submitted 5 October, 2020; v1 submitted 2 March, 2020;
originally announced March 2020.
-
Robust Design of Deep Neural Networks against Adversarial Attacks based on Lyapunov Theory
Authors:
Arash Rahnama,
Andre T. Nguyen,
Edward Raff
Abstract:
Deep neural networks (DNNs) are vulnerable to subtle adversarial perturbations applied to the input. These adversarial perturbations, though imperceptible, can easily mislead the DNN. In this work, we take a control theoretic approach to the problem of robustness in DNNs. We treat each individual layer of the DNN as a nonlinear dynamical system and use Lyapunov theory to prove stability and robust…
▽ More
Deep neural networks (DNNs) are vulnerable to subtle adversarial perturbations applied to the input. These adversarial perturbations, though imperceptible, can easily mislead the DNN. In this work, we take a control theoretic approach to the problem of robustness in DNNs. We treat each individual layer of the DNN as a nonlinear dynamical system and use Lyapunov theory to prove stability and robustness locally. We then proceed to prove stability and robustness globally for the entire DNN. We develop empirically tight bounds on the response of the output layer, or any hidden layer, to adversarial perturbations added to the input, or the input of hidden layers. Recent works have proposed spectral norm regularization as a solution for improving robustness against l2 adversarial attacks. Our results give new insights into how spectral norm regularization can mitigate the adversarial effects. Finally, we evaluate the power of our approach on a variety of data sets and network architectures and against some of the well-known adversarial attacks.
△ Less
Submitted 11 November, 2019;
originally announced November 2019.
-
Towards the Use of Neural Networks for Influenza Prediction at Multiple Spatial Resolutions
Authors:
Emily L. Aiken,
Andre T. Nguyen,
Mauricio Santillana
Abstract:
We introduce the use of a Gated Recurrent Unit (GRU) for influenza prediction at the state- and city-level in the US, and experiment with the inclusion of real-time flu-related Internet search data. We find that a GRU has lower prediction error than current state-of-the-art methods for data-driven influenza prediction at time horizons of over two weeks. In contrast with other machine learning appr…
▽ More
We introduce the use of a Gated Recurrent Unit (GRU) for influenza prediction at the state- and city-level in the US, and experiment with the inclusion of real-time flu-related Internet search data. We find that a GRU has lower prediction error than current state-of-the-art methods for data-driven influenza prediction at time horizons of over two weeks. In contrast with other machine learning approaches, the inclusion of real-time Internet search data does not improve GRU predictions.
△ Less
Submitted 13 November, 2019; v1 submitted 6 November, 2019;
originally announced November 2019.
-
Would a File by Any Other Name Seem as Malicious?
Authors:
Andre T. Nguyen,
Edward Raff,
Aaron Sant-Miller
Abstract:
Successful malware attacks on information technology systems can cause millions of dollars in damage, the exposure of sensitive and private information, and the irreversible destruction of data. Anti-virus systems that analyze a file's contents use a combination of static and dynamic analysis to detect and remove/remediate such malware. However, examining a file's entire contents is not always pos…
▽ More
Successful malware attacks on information technology systems can cause millions of dollars in damage, the exposure of sensitive and private information, and the irreversible destruction of data. Anti-virus systems that analyze a file's contents use a combination of static and dynamic analysis to detect and remove/remediate such malware. However, examining a file's entire contents is not always possible in practice, as the volume and velocity of incoming data may be too high, or access to the underlying file contents may be restricted or unavailable. If it were possible to obtain estimates of a file's relative likelihood of being malicious without looking at the file contents, we could better prioritize file processing order and aid analysts in situations where a file is unavailable. In this work, we demonstrate that file names can contain information predictive of the presence of malware in a file. In particular, we show the effectiveness of a character-level convolutional neural network at predicting malware status using file names on Endgame's EMBER malware detection benchmark dataset.
△ Less
Submitted 9 October, 2019;
originally announced October 2019.